From 0f84a4b30c8dcb6930e9fed3f4adc21be48e15f7 Mon Sep 17 00:00:00 2001 From: Brandt Lareau Date: Tue, 9 Apr 2024 13:27:29 -0700 Subject: [PATCH] fixed DEPRECATION WARNING: `Rails.application.secrets` commit-id:9f758dec --- app/tool_box/simply_encrypt.rb | 2 +- config/initializers/secret_key_base.rb | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/app/tool_box/simply_encrypt.rb b/app/tool_box/simply_encrypt.rb index f0e413fa..7f88f34f 100644 --- a/app/tool_box/simply_encrypt.rb +++ b/app/tool_box/simply_encrypt.rb @@ -2,7 +2,7 @@ module SimplyEncrypt MODE = 'AES-256-CBC' - KEY = Digest::SHA1.hexdigest(Rails.application.secrets.secret_key_base)[..31] + KEY = Digest::SHA1.hexdigest(Rails.application.credentials.secret_key_base)[..31] def encrypt(data) return [nil, nil] if data.blank? diff --git a/config/initializers/secret_key_base.rb b/config/initializers/secret_key_base.rb index 6c723cd5..c93be58c 100644 --- a/config/initializers/secret_key_base.rb +++ b/config/initializers/secret_key_base.rb @@ -7,7 +7,7 @@ # This will have a few costs like for # example session becoming invalid on new devices and you can share cookies between multiple servers # However you can still use the ENV["SECRET_KEY_BASE"] and all this does not mater -if Rails.application.secrets.secret_key_base.nil? +if Rails.application.credentials.secret_key_base.nil? key_file = Rails.root.join("tmp/#{Rails.env}_secret.txt") unless File.exist?(key_file) random_key = SecureRandom.hex(64) @@ -16,5 +16,5 @@ File.binwrite(key_file, random_key) end - Rails.application.secrets.secret_key_base = ENV.fetch('SECRET_KEY_BASE', File.binread(key_file)) + Rails.application.credentials.secret_key_base = ENV.fetch('SECRET_KEY_BASE', File.binread(key_file)) end