Fair enough, but why even use that as an example, if you immediately say "don't do this"? You could have picked API url endpoints, or other non-secure environment specific configuration values to use as an example.
That said, I fully concede my skimming the last paragraph, and accept my -1.
Fair enough, but why even use that as an example, if you immediately say "don't do this"? You could have picked API url endpoints, or other non-secure environment specific configuration values to use as an example.
That said, I fully concede my skimming the last paragraph, and accept my -1.
😂 you gracefully accepted that -1, well played 👏
I'm not saying not to do it, the configurations in the example could be fully legit, I'm just saying don't add it to source control.