diff options
author | yuuji.yaginuma <yuuji.yaginuma@gmail.com> | 2017-10-06 09:27:20 +0900 |
---|---|---|
committer | yuuji.yaginuma <yuuji.yaginuma@gmail.com> | 2017-10-06 09:28:35 +0900 |
commit | 0bf8d1e4a607611ff7eaeb88a5c73804d6b4d8f3 (patch) | |
tree | a897a097420d3d8aed02a0335b1ec38557b5e7fa /railties | |
parent | 8c9a93090bff5f7350f2b22de5d37d863feffa53 (diff) | |
download | rails-0bf8d1e4a607611ff7eaeb88a5c73804d6b4d8f3.tar.gz rails-0bf8d1e4a607611ff7eaeb88a5c73804d6b4d8f3.tar.bz2 rails-0bf8d1e4a607611ff7eaeb88a5c73804d6b4d8f3.zip |
Remove unused `secrets.yml` template
`secrets.yml` no longer used since #30067.
Together, removed `app_secret` method that only used in `secrets.yml`
Diffstat (limited to 'railties')
-rw-r--r-- | railties/lib/rails/generators/rails/app/app_generator.rb | 4 | ||||
-rw-r--r-- | railties/lib/rails/generators/rails/app/templates/config/secrets.yml | 32 |
2 files changed, 0 insertions, 36 deletions
diff --git a/railties/lib/rails/generators/rails/app/app_generator.rb b/railties/lib/rails/generators/rails/app/app_generator.rb index 23fdf03b05..b431495781 100644 --- a/railties/lib/rails/generators/rails/app/app_generator.rb +++ b/railties/lib/rails/generators/rails/app/app_generator.rb @@ -509,10 +509,6 @@ module Rails end end - def app_secret - SecureRandom.hex(64) - end - def mysql_socket @mysql_socket ||= [ "/tmp/mysql.sock", # default diff --git a/railties/lib/rails/generators/rails/app/templates/config/secrets.yml b/railties/lib/rails/generators/rails/app/templates/config/secrets.yml deleted file mode 100644 index ea9d47396c..0000000000 --- a/railties/lib/rails/generators/rails/app/templates/config/secrets.yml +++ /dev/null @@ -1,32 +0,0 @@ -# Be sure to restart your server when you modify this file. - -# Your secret key is used for verifying the integrity of signed cookies. -# If you change this key, all old signed cookies will become invalid! - -# Make sure the secret is at least 30 characters and all random, -# no regular words or you'll be exposed to dictionary attacks. -# You can use `rails secret` to generate a secure secret key. - -# Make sure the secrets in this file are kept private -# if you're sharing your code publicly. - -# Shared secrets are available across all environments. - -# shared: -# api_key: a1B2c3D4e5F6 - -# Environmental secrets are only available for that specific environment. - -development: - secret_key_base: <%= app_secret %> - -test: - secret_key_base: <%= app_secret %> - -# Do not keep production secrets in the unencrypted secrets file. -# Instead, either read values from the environment. -# Or, use `bin/rails secrets:setup` to configure encrypted secrets -# and move the `production:` environment over there. - -production: - secret_key_base: <%%= ENV["SECRET_KEY_BASE"] %> |