1
0
Fork 0
mirror of https://github.com/rails/rails.git synced 2022-11-09 12:12:34 -05:00

Replace secrets with credentials in comments

In comments in templates for `config/database.yml`, there is a
reference to `secrets.yml` which is now deprecated.
They should be replaced with `credentials.yml` so that everyone
using latest Rails can understand.
This commit is contained in:
okuramasafumi 2019-01-11 13:35:40 +09:00
parent 7d7a952c6f
commit f897263768
9 changed files with 9 additions and 9 deletions

View file

@ -24,7 +24,7 @@ test:
<<: *default
database: <%= app_name %>_test
# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#

View file

@ -60,7 +60,7 @@ test:
<<: *default
database: <%= app_name[0,4] %>_tst
# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#

View file

@ -54,7 +54,7 @@ test:
<<: *default
url: jdbc:db://localhost/<%= app_name %>_test
# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#

View file

@ -27,7 +27,7 @@ test:
<<: *default
database: <%= app_name %>_test
# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#

View file

@ -43,7 +43,7 @@ test:
<<: *default
database: <%= app_name %>_test
# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#

View file

@ -32,7 +32,7 @@ test:
<<: *default
database: <%= app_name %>_test
# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#

View file

@ -33,7 +33,7 @@ test:
<<: *default
database: <%= app_name %>_test
# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#

View file

@ -59,7 +59,7 @@ test:
<<: *default
database: <%= app_name %>_test
# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#

View file

@ -26,7 +26,7 @@ test:
<<: *default
database: <%= app_name %>_test
# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#