You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Would you be open to the idea of adding a safe=False option to read_dotenv? The way it would work is similar to dotenv-safe for Node.js, i.e. require the existence of .env.example and make sure that each entry from the example contains a value in .env.
The text was updated successfully, but these errors were encountered:
Would you be open to the idea of adding a
safe=False
option toread_dotenv
? The way it would work is similar to dotenv-safe for Node.js, i.e. require the existence of.env.example
and make sure that each entry from the example contains a value in.env
.The text was updated successfully, but these errors were encountered: