33 lines
1.4 KiB
YAML
Executable File
33 lines
1.4 KiB
YAML
Executable File
# Be sure to restart your server when you modify this file.
|
|
|
|
# Your secret key is used for verifying the integrity of signed cookies.
|
|
# If you change this key, all old signed cookies will become invalid!
|
|
|
|
# Make sure the secret is at least 30 characters and all random,
|
|
# no regular words or you'll be exposed to dictionary attacks.
|
|
# You can use `rails secret` to generate a secure secret key.
|
|
|
|
# Make sure the secrets in this file are kept private
|
|
# if you're sharing your code publicly.
|
|
|
|
development:
|
|
secret_key_base: b61d85f8ed2a1a9e0eeece3443b3e8f838d002cc1d9f32115d8e93db920e2957adfedc57501d44741211538f3108b742cdeada87d5bfae796c53da1f90a3cd61
|
|
sx_provision_url: 192.168.1.147:3002/api #provision.zsai.ws/api
|
|
server_mode: application
|
|
cipher_type: AES-256-CBC
|
|
aes_key: <%= ENV['AES_KEY'] %>
|
|
aes_iv: <%= ENV['AES_IV'] %>
|
|
|
|
test:
|
|
secret_key_base: 5c92143fd4a844fdaf8b22aba0cda22ef1fc68f1b26dd3d40656866893718ae5e58625b4c3a5dc86b04c8be0a505ec0ebc0be3bf52249a3d1e0c1334ee591cf0
|
|
|
|
# Do not keep production secrets in the repository,
|
|
# instead read values from the environment.
|
|
production:
|
|
secret_key_base: c4bc81065013f9a3506d385bcbd49586c42e586488144b0de90c7da36867de9fa880f46b5c4f86f0ce9b7c783bb5a73bdb0e5605a47716567294390e726d3e22
|
|
sx_provision_url: provision.zsai.ws/api #192.168.1.94:3002
|
|
server_mode: cloud
|
|
aes_key: <%= ENV['AES_KEY'] %>
|
|
aes_iv: <%= ENV['AES_IV'] %>
|
|
|