Skip to content

Commit

Permalink
set sidekiq version to 6.0.7
Browse files Browse the repository at this point in the history
  • Loading branch information
Greg Luis Ramirez committed Jul 2, 2020
1 parent 7b0fbae commit cbf7002
Show file tree
Hide file tree
Showing 3 changed files with 11 additions and 5 deletions.
2 changes: 1 addition & 1 deletion Gemfile
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ gem 'puma', '~> 3.12'
gem 'rails', '~> 5.1.6'
gem 'rsolr', '>= 1.0'
gem 'sass-rails', '~> 5.0'
gem 'sidekiq'
gem 'sidekiq', '~> 6.0.7'
gem 'tzinfo-data'
gem 'uglifier', '>= 1.3.0'
gem 'ruby-oembed'
Expand Down
11 changes: 7 additions & 4 deletions Gemfile.lock
Original file line number Diff line number Diff line change
Expand Up @@ -118,7 +118,7 @@ GEM
activerecord (>= 4.0.0, < 7.0)
aws-eventstream (1.1.0)
aws-partitions (1.337.0)
aws-sdk-core (3.102.1)
aws-sdk-core (3.103.0)
aws-eventstream (~> 1, >= 1.0.2)
aws-partitions (~> 1, >= 1.239.0)
aws-sigv4 (~> 1.1)
Expand Down Expand Up @@ -667,6 +667,8 @@ GEM
rack (2.2.3)
rack-honeycomb (0.5.0)
libhoney (>= 1.5.0)
rack-protection (2.0.8.1)
rack
rack-test (1.1.0)
rack (>= 1.0, < 3)
rails (5.1.7)
Expand Down Expand Up @@ -871,10 +873,11 @@ GEM
sxp (~> 1.0)
shoulda-matchers (4.3.0)
activesupport (>= 4.2.0)
sidekiq (6.1.0)
sidekiq (6.0.7)
connection_pool (>= 2.2.2)
rack (~> 2.0)
redis (>= 4.2.0)
rack-protection (>= 2.0.0)
redis (>= 4.1.0)
signet (0.14.0)
addressable (~> 2.3)
faraday (>= 0.17.3, < 2.0)
Expand Down Expand Up @@ -1031,7 +1034,7 @@ DEPENDENCIES
sass-rails (~> 5.0)
selenium-webdriver
shoulda-matchers (~> 4)
sidekiq
sidekiq (~> 6.0.7)
simplecov (>= 0.9)
triplestore-adapter!
tzinfo-data
Expand Down
3 changes: 3 additions & 0 deletions config/initializers/sidekiq.rb
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,9 @@
require 'sidekiq/web'
Sidekiq::Web.set :session_secret, Rails.application.secrets[:secret_key_base]
Sidekiq::Web.set :sessions, Rails.application.config.session_options
Sidekiq::Web.class_eval do
use Rack::Protection, origin_whitelist: ENV.fetch('SIDEKIQ_ADMIN_SAFE_URLS', '').split(',')
end

config = YAML.safe_load(ERB.new(IO.read(Rails.root + 'config' + 'redis.yml')).result)[Rails.env].with_indifferent_access

Expand Down

0 comments on commit cbf7002

Please sign in to comment.