Dan has more than 22 years of software design, development, and architecture experience. He is also a husband, father, carpenter, and runs obstacle races like Tough Mudder.
Fair enough, but why even use that as an example, if you immediately say "don't do this"? You could have picked API url endpoints, or other non-secure environment specific configuration values to use as an example.
That said, I fully concede my skimming the last paragraph, and accept my -1.
I'm guessing you missed the bold text at the bottom.
Dont ever comment on an article critiquing it without first reading the full contents... -1 point
Fair enough, but why even use that as an example, if you immediately say "don't do this"? You could have picked API url endpoints, or other non-secure environment specific configuration values to use as an example.
That said, I fully concede my skimming the last paragraph, and accept my -1.
😂 you gracefully accepted that -1, well played 👏
I'm not saying not to do it, the configurations in the example could be fully legit, I'm just saying don't add it to source control.