-
Notifications
You must be signed in to change notification settings - Fork 138
Replace hardcoded sensitive data with environment variables #31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Updated configuration settings, such as `SECRET_KEY`, `DEBUG`, and `ALLOWED_HOSTS`, by replacing hardcoded values with environment variables.
Thanks for opening this! I'm seeing a few exceptions when I tried this out in a codespace:
|
@joshaber Thank you for your response. Could you please tell me that you created an |
I didn't, but we want the templates to work out of the box in codespaces so if that's a requirement then we need to provide it, even if the user ends up modifying it. |
@joshaber Got it. The reason I named the file |
Good question 🤔 What if we added a |
Thank you for pointing me in the right direction. That is a great help. |
I have made the necessary changes. Please review them. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good, thanks! ⚡
Hi everyone,
I've made some improvements to security and the development process:
.env.example
file to serve as a template for the.env
file..env.example
file.python-dotenv
module insettings.py
to access environment variables.settings.py
.I have tested these changes in CodeSpaces and they worked well. Kindly review and merge the pull request. Would love your thoughts!
Thank you!