-
Notifications
You must be signed in to change notification settings - Fork 237
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Should not encourage sensitive credentials in repo #83
Comments
From the other issue:
|
Currently, the examples show What would using dotenv provide? After all, this approach still needs a |
Not a bad idea. In the past I've had setups where sensitive file is gitignore'd but leaving an example version like: |
As with https://github.com/veox/python2-krakenex/issues/4 the committing of a sensitive file to source control is less than ideal. Instead private sensitive information should be kept out of repositories.
The text was updated successfully, but these errors were encountered: