##// END OF EJS Templates
Let the secret token be set in configuration.yml....
Jean-Philippe Lang -
r9384:bceaf8be9409
parent child
Show More
@@ -154,6 +154,15 default:
154 #
154 #
155 #mirror_plugins_assets_on_startup: false
155 #mirror_plugins_assets_on_startup: false
156
156
157 # Your secret key for verifying cookie session data integrity. If you
158 # change this key, all old sessions will become invalid! Make sure the
159 # secret is at least 30 characters and all random, no regular words or
160 # you'll be exposed to dictionary attacks.
161 #
162 # If you have a load-balancing Redmine cluster, you have to use the
163 # same secret token on each machine.
164 #secret_token: 'change it to a long random string'
165
157 # specific configuration options for production environment
166 # specific configuration options for production environment
158 # that overrides the default ones
167 # that overrides the default ones
159 production:
168 production:
@@ -4,6 +4,12 I18n::Backend::Simple.send(:include, I18n::Backend::Fallbacks)
4
4
5 require 'redmine'
5 require 'redmine'
6
6
7 # Load the secret token from the Redmine configuration file
8 secret = Redmine::Configuration['secret_token']
9 if secret.present?
10 RedmineApp::Application.config.secret_token = secret
11 end
12
7 Redmine::Plugin.load
13 Redmine::Plugin.load
8 unless Redmine::Configuration['mirror_plugins_assets_on_startup'] == false
14 unless Redmine::Configuration['mirror_plugins_assets_on_startup'] == false
9 Redmine::Plugin.mirror_assets
15 Redmine::Plugin.mirror_assets
General Comments 0
You need to be logged in to leave comments. Login now