From b16dcc872bb3c094cf1f1d890bdd302593acbbe8 Mon Sep 17 00:00:00 2001 From: Kasper Timm Hansen Date: Thu, 9 Mar 2017 20:19:58 +0100 Subject: [ci skip] Document read_encrypted_secrets config. Mostly just that it's there. Closes #28193. --- railties/lib/rails/commands/secrets/USAGE | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/railties/lib/rails/commands/secrets/USAGE b/railties/lib/rails/commands/secrets/USAGE index 4b7deb4e2a..96e322fe91 100644 --- a/railties/lib/rails/commands/secrets/USAGE +++ b/railties/lib/rails/commands/secrets/USAGE @@ -40,6 +40,14 @@ be encrypted. A `shared:` top level key is also supported such that any keys there is merged into the other environments. +Additionally, Rails won't read encrypted secrets out of the box even if you have +the key. Add this: + + config.read_encrypted_secrets = true + +to the environment you'd like to read encrypted secrets. `bin/rails secrets:setup` +inserts this into the production environment by default. + === Editing Secrets After `bin/rails secrets:setup`, run `bin/rails secrets:edit`. -- cgit v1.2.3