remove sample secret SECRET_KEY

This commit is contained in:
Kiara Grouwstra 2025-06-16 13:35:39 +02:00
parent 3a3a083793
commit ac3f472324
Signed by: kiara
SSH key fingerprint: SHA256:COspvLoLJ5WC5rFb9ZDe5urVCkK4LJZOsjfF4duRJFU
4 changed files with 2 additions and 10 deletions

View file

@ -37,9 +37,7 @@ in
enable = true; enable = true;
production = true; production = true;
domain = "demo.fediversity.eu"; domain = "demo.fediversity.eu";
secrets = { secrets = { };
SECRET_KEY = config.age.secrets.panel-secret-key.path;
};
port = 8000; port = 8000;
}; };
} }

View file

@ -41,7 +41,6 @@ in
# in production, secrets are passed via CREDENTIALS_DIRECTORY by systemd. # in production, secrets are passed via CREDENTIALS_DIRECTORY by systemd.
# use this directory for testing with local secrets # use this directory for testing with local secrets
mkdir -p $CREDENTIALS_DIRECTORY mkdir -p $CREDENTIALS_DIRECTORY
echo secret > ${builtins.toString ./.credentials}/SECRET_KEY
''; '';
}; };

View file

@ -10,9 +10,7 @@ let
production = false; production = false;
restart = "no"; restart = "no";
domain = "example.com"; domain = "example.com";
secrets = { secrets = { };
SECRET_KEY = pkgs.writeText "SECRET_KEY" "secret";
};
nixops4Package = pkgs.hello; # FIXME: actually pass NixOps4 nixops4Package = pkgs.hello; # FIXME: actually pass NixOps4
}; };

View file

@ -41,9 +41,6 @@ def get_secret(name: str, encoding: str = "utf-8") -> str:
return secret return secret
# SECURITY WARNING: keep the secret key used in production secret!
SECRET_KEY = get_secret("SECRET_KEY")
# SECURITY WARNING: don't run with debug turned on in production! # SECURITY WARNING: don't run with debug turned on in production!
DEBUG = True DEBUG = True