-
After running the installation instructions, there appears to be two files containing secrets. Neither of which is in the gitignore and one of which is already versioned:
Both of these files contain sensitive data that should not appear in version control histories (including tokens and passwords). These files should not be versioned for security reasons, in addition, I suggest splitting the data into two files, one which is safe to version and one which is not. |
Beta Was this translation helpful? Give feedback.
Replies: 4 comments
-
I propose even a step farther - not having .env at all in the codebase (.env.example, sure), but rather base64 encoding the .env file into the github secrets manager for a specific environment, and loading it up during github actions. |
Beta Was this translation helpful? Give feedback.
-
Would some of this be mitigated with I too am confused as to why |
Beta Was this translation helpful? Give feedback.
-
...I think I see why Another option: use Edit: This option does make |
Beta Was this translation helpful? Give feedback.
-
Indeed, the idea is that you can continue and modify the project as you see fit, storing passwords and secrets in any system you choose for deployments. But that's something I can't decide and enforce for others, just the starting point. There are many alternatives to handle this, but there's no single obvious one that would work for all use cases, so I would consider it out of scope for this project, at least for now. |
Beta Was this translation helpful? Give feedback.
Indeed, the idea is that you can continue and modify the project as you see fit, storing passwords and secrets in any system you choose for deployments. But that's something I can't decide and enforce for others, just the starting point. There are many alternatives to handle this, but there's no single obvious one that would work for all use cases, so I would consider it out of scope for this project, at least for now.