Files
PMS/config/secrets.yml
2026-01-28 09:53:14 +06:30

33 lines
1.2 KiB
YAML

# Be sure to restart your server when you modify this file.
# Your secret key is used for verifying the integrity of signed cookies.
# If you change this key, all old signed cookies will become invalid!
# Make sure the secret is at least 30 characters and all random,
# no regular words or you'll be exposed to dictionary attacks.
# You can use `rails secret` to generate a secure secret key.
# Make sure the secrets in this file are kept private
# if you're sharing your code publicly.
# Shared secrets are available across all environments.
# shared:
# api_key: a1B2c3D4e5F6
# Environmental secrets are only available for that specific environment.
development:
secret_key_base: c7d0df60d7482f05b17e4f135166fe13b859285f9f3fbc250e1d26b633e63efc2006336e581a96c905be9ddcf4ab0b9c8a7ed4c140f2f9f880f5239af4b0320e
test:
secret_key_base: b77419db6aa8eca0f21e8f8ddfb0107a4881775b2223a2d18c2400ef71bc812c62e2ea71eb0a90bdaddcb4075c39dadd27b67ae48a4358cbde28c9edd4d45ca0
# Do not keep production secrets in the unencrypted secrets file.
# Instead, either read values from the environment.
# Or, use `bin/rails secrets:setup` to configure encrypted secrets
# and move the `production:` environment over there.
production:
secret_key_base: <%= ENV["SECRET_KEY_BASE"] %>