Make it clear in README that backing up secret.txt is ok

master
Mohammed Anas 3 years ago committed by Tom Hacohen
parent d4de717cf7
commit d11504093c

@ -109,9 +109,10 @@ The default configuration creates a file “`secret.txt`” in the projects
base directory, which is used as the value of the Django `SECRET_KEY` base directory, which is used as the value of the Django `SECRET_KEY`
setting. You can revoke this key by deleting the `secret.txt` file and the setting. You can revoke this key by deleting the `secret.txt` file and the
next time the app is run, a new one will be generated. Make sure you keep next time the app is run, a new one will be generated. Make sure you keep
the `secret.txt` file secret (dont accidentally commit it to version the `secret.txt` file secret (e.g. dont accidentally commit it to version
control, exclude it from your backups, etc.). If you want to change to a control). However, backing it up is okay, and it makes it easier to restore
more secure system for storing secrets, edit `etesync_server/settings.py` the database to a new EteSync server, but it's not essential. If you want to
change to a more secure system for storing secrets, edit `etesync_server/settings.py`
and implement your own method for setting `SECRET_KEY` (remove the line and implement your own method for setting `SECRET_KEY` (remove the line
where it uses the `get_secret_from_file` function). Read the Django docs where it uses the `get_secret_from_file` function). Read the Django docs
for more information about the `SECRET_KEY` and its uses. for more information about the `SECRET_KEY` and its uses.

Loading…
Cancel
Save