From 4b2d9b8a558190f8ccc51cfe67f5e151f2c3342b Mon Sep 17 00:00:00 2001 From: Eugen Rochko Date: Sun, 10 May 2020 18:18:12 +0200 Subject: Reset secret of web app that could have been exposed by Doorkeeper (#13688) There are no obvious ways it could be misused, as the secret is not really used for anything, but it is best to secure it for the future Follow-up to #13613 --- db/migrate/20200510110808_reset_web_app_secret.rb | 15 +++++++++++++++ 1 file changed, 15 insertions(+) create mode 100644 db/migrate/20200510110808_reset_web_app_secret.rb (limited to 'db/migrate') diff --git a/db/migrate/20200510110808_reset_web_app_secret.rb b/db/migrate/20200510110808_reset_web_app_secret.rb new file mode 100644 index 000000000..b274844c5 --- /dev/null +++ b/db/migrate/20200510110808_reset_web_app_secret.rb @@ -0,0 +1,15 @@ +class ResetWebAppSecret < ActiveRecord::Migration[5.2] + disable_ddl_transaction! + + def up + web_app = Doorkeeper::Application.find_by(superapp: true) + + return if web_app.nil? + + web_app.renew_secret + web_app.save! + end + + def down + end +end -- cgit