Reset secret of web app that could have been exposed by Doorkeeper (#13688)
There are no obvious ways it could be misused, as the secret is not really used for anything, but it is best to secure it for the future Follow-up to #13613master
parent
8012fce727
commit
4b2d9b8a55
@ -0,0 +1,15 @@ |
||||
class ResetWebAppSecret < ActiveRecord::Migration[5.2] |
||||
disable_ddl_transaction! |
||||
|
||||
def up |
||||
web_app = Doorkeeper::Application.find_by(superapp: true) |
||||
|
||||
return if web_app.nil? |
||||
|
||||
web_app.renew_secret |
||||
web_app.save! |
||||
end |
||||
|
||||
def down |
||||
end |
||||
end |
Loading…
Reference in new issue