2012-04-25 21:17:49 +04:00
|
|
|
desc 'Generates a secret token for the application.'
|
2009-02-21 14:04:50 +03:00
|
|
|
|
2012-04-25 21:17:49 +04:00
|
|
|
file 'config/initializers/secret_token.rb' do
|
|
|
|
path = File.join(Rails.root, 'config', 'initializers', 'secret_token.rb')
|
|
|
|
secret = SecureRandom.hex(40)
|
2009-02-21 14:04:50 +03:00
|
|
|
File.open(path, 'w') do |f|
|
|
|
|
f.write <<"EOF"
|
2012-04-25 21:17:49 +04:00
|
|
|
# This file was generated by 'rake generate_secret_token', and should
|
|
|
|
# not be made visible to public.
|
2009-02-21 14:04:50 +03:00
|
|
|
# If you have a load-balancing Redmine cluster, you will need to use the
|
|
|
|
# same version of this file on each machine. And be sure to restart your
|
|
|
|
# server when you modify this file.
|
2012-04-25 21:17:49 +04:00
|
|
|
#
|
2009-02-21 14:04:50 +03:00
|
|
|
# Your secret key for verifying cookie session data integrity. If you
|
|
|
|
# change this key, all old sessions will become invalid! Make sure the
|
|
|
|
# secret is at least 30 characters and all random, no regular words or
|
|
|
|
# you'll be exposed to dictionary attacks.
|
2012-04-25 21:17:49 +04:00
|
|
|
RedmineApp::Application.config.secret_token = '#{secret}'
|
2009-02-21 14:04:50 +03:00
|
|
|
EOF
|
|
|
|
end
|
|
|
|
end
|
2009-12-30 03:46:48 +03:00
|
|
|
|
2012-04-25 21:17:49 +04:00
|
|
|
desc 'Generates a secret token for the application.'
|
|
|
|
task :generate_secret_token => ['config/initializers/secret_token.rb']
|