Skip to content

Commit 060ce8d

Browse files
authored
Use credentials instead of secrets (#947)
## Summary - remove legacy secrets.yml from dummy app - configure Devise to read secret key from Rails credentials ## Testing - `bin/codex_style_guard` - `bundle exec rubocop` - `bundle exec brakeman -q -w2` - `bundle exec bundler-audit --update` - `bin/ci` *(fails: could not connect to database)* ------ https://chatgpt.com/codex/tasks/task_e_689279c283a883219f33b0cd05e3abcc
2 parents 1cfa0ad + c55576e commit 060ce8d

File tree

2 files changed

+1
-23
lines changed

2 files changed

+1
-23
lines changed

config/initializers/devise.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
# confirmation, reset password and unlock tokens in the database.
1515
# Devise will use the `secret_key_base` as its `secret_key`
1616
# by default. You can change it below and use your own secret key.
17-
config.secret_key = ENV.fetch('DEVISE_SECRET', nil)
17+
config.secret_key = ENV.fetch('DEVISE_SECRET') { Rails.application.credentials.secret_key_base }
1818

1919
config.pepper = ENV.fetch('DEVISE_PEPPER', nil)
2020

spec/dummy/config/secrets.yml

Lines changed: 0 additions & 22 deletions
This file was deleted.

0 commit comments

Comments
 (0)