Skip to content

Commit ac8234f

Browse files
committed
CODEOWNERS update
1 parent b2504d6 commit ac8234f

File tree

3 files changed

+56
-1
lines changed

3 files changed

+56
-1
lines changed

CODEOWNERS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
* @contentstack/security-admin @contentstack/sdk-admin
1+
* @contentstack/security-admin

config/contentstack.yml

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
# Add environment based contentstack configuration here
2+
3+
default: &default
4+
api_key: 'API_KEY'
5+
access_token: 'DELIVERY_TOKEN'
6+
environment: 'ENVIRONMENT'
7+
8+
development:
9+
<<: *default
10+
api_key: 'API_KEY'
11+
access_token: 'DELIVERY_TOKEN'
12+
environment: 'ENVIRONMENT'
13+
test:
14+
<<: *default
15+
api_key: ''
16+
access_token: ''
17+
18+
production:
19+
<<: *default
20+
api_key: 'API_KEY'
21+
access_token: 'DELIVERY_TOKEN'
22+
environment: 'ENVIRONMENT'
23+

config/secrets.yml

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
# Be sure to restart your server when you modify this file.
2+
3+
# Your secret key is used for verifying the integrity of signed cookies.
4+
# If you change this key, all old signed cookies will become invalid!
5+
6+
# Make sure the secret is at least 30 characters and all random,
7+
# no regular words or you'll be exposed to dictionary attacks.
8+
# You can use `rails secret` to generate a secure secret key.
9+
10+
# Make sure the secrets in this file are kept private
11+
# if you're sharing your code publicly.
12+
13+
# Shared secrets are available across all environments.
14+
15+
# shared:
16+
# api_key: ***REMOVED***
17+
18+
# Environmental secrets are only available for that specific environment.
19+
20+
development:
21+
secret_key_base: ***REMOVED***
22+
23+
test:
24+
secret_key_base: ***REMOVED***
25+
26+
# Do not keep production secrets in the unencrypted secrets file.
27+
# Instead, either read values from the environment.
28+
# Or, use `bin/rails secrets:setup` to configure encrypted secrets
29+
# and move the `production:` environment over there.
30+
31+
production:
32+
secret_key_base: <%= ENV["SECRET_KEY_BASE"] %>

0 commit comments

Comments
 (0)