Reset secret of web app that could have been exposed by Doorkeeper (#13688)
There are no obvious ways it could be misused, as the secret is not really used for anything, but it is best to secure it for the future Follow-up to #13613master
parent
8012fce727
commit
4b2d9b8a55
@ -0,0 +1,15 @@ |
|||||||
|
class ResetWebAppSecret < ActiveRecord::Migration[5.2] |
||||||
|
disable_ddl_transaction! |
||||||
|
|
||||||
|
def up |
||||||
|
web_app = Doorkeeper::Application.find_by(superapp: true) |
||||||
|
|
||||||
|
return if web_app.nil? |
||||||
|
|
||||||
|
web_app.renew_secret |
||||||
|
web_app.save! |
||||||
|
end |
||||||
|
|
||||||
|
def down |
||||||
|
end |
||||||
|
end |
Loading…
Reference in new issue