Permalink
Browse files

Replace `secrets` with `credentials` in comments

In comments in templates for `config/database.yml`, there is a
reference to `secrets.yml` which is now deprecated.
They should be replaced with `credentials.yml` so that everyone
using latest Rails can understand.
  • Loading branch information...
okuramasafumi committed Jan 11, 2019
1 parent 7d7a952 commit f897263768f01ba8d5351806431ebe25d9c9283c
@@ -24,7 +24,7 @@ test:
<<: *default
database: <%= app_name %>_test

# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#
@@ -60,7 +60,7 @@ test:
<<: *default
database: <%= app_name[0,4] %>_tst

# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#
@@ -54,7 +54,7 @@ test:
<<: *default
url: jdbc:db://localhost/<%= app_name %>_test

# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#
@@ -27,7 +27,7 @@ test:
<<: *default
database: <%= app_name %>_test

# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#
@@ -43,7 +43,7 @@ test:
<<: *default
database: <%= app_name %>_test

# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#
@@ -32,7 +32,7 @@ test:
<<: *default
database: <%= app_name %>_test

# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#
@@ -33,7 +33,7 @@ test:
<<: *default
database: <%= app_name %>_test

# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#
@@ -59,7 +59,7 @@ test:
<<: *default
database: <%= app_name %>_test

# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#
@@ -26,7 +26,7 @@ test:
<<: *default
database: <%= app_name %>_test

# As with config/secrets.yml, you never want to store sensitive information,
# As with config/credentials.yml, you never want to store sensitive information,
# like your database password, in your source code. If your source code is
# ever seen by anyone, they now have access to your database.
#

0 comments on commit f897263

Please sign in to comment.