Remove secret data from version control

This commit is contained in:
Petko Bordjukov 2014-07-28 13:04:42 +03:00
parent 7958f661c5
commit 7a2d84af42
3 changed files with 2 additions and 22 deletions

2
.gitignore vendored
View File

@ -14,3 +14,5 @@
# Ignore all logfiles and tempfiles.
/log/*.log
/tmp
/config/database.yml
/config/secrets.yml

View File

@ -1,22 +0,0 @@
# Be sure to restart your server when you modify this file.
# Your secret key is used for verifying the integrity of signed cookies.
# If you change this key, all old signed cookies will become invalid!
# Make sure the secret is at least 30 characters and all random,
# no regular words or you'll be exposed to dictionary attacks.
# You can use `rake secret` to generate a secure secret key.
# Make sure the secrets in this file are kept private
# if you're sharing your code publicly.
development:
secret_key_base: e6d9559950ffe4abdb044cbcc888d654db13c20d0250b84193b885a6d24917b8a31bf046e2266706c1f0711c891284c27fd885a9718d1869f70e849d8fc976cb
test:
secret_key_base: 62d407018705432f9b986d0ba6e8bec53f6a2114d93ef1855a334c9f2a822124e419ba0600d7726fe95ab0c200bddb22123c4faf6ec82f00bd2d8b85d5aa7e66
# Do not keep production secrets in the repository,
# instead read values from the environment.
production:
secret_key_base: <%= ENV["SECRET_KEY_BASE"] %>