@@ -28,7 +28,7 @@ store them by using Symfony's secrets management system - sometimes called a
28
28
Generate Cryptographic Keys
29
29
---------------------------
30
30
31
- In order to encrypt and decrypt **secrets **, symfony needs **cryptographic keys **.
31
+ In order to encrypt and decrypt **secrets **, Symfony needs **cryptographic keys **.
32
32
A pair of keys can be generated by running:
33
33
34
34
.. code-block :: terminal
@@ -199,7 +199,7 @@ If you entered ``root``, you will now see this in your ``.env.dev.local`` file:
199
199
DATABASE_PASSWORD=root
200
200
201
201
This will *override * the ``DATABASE_PASSWORD `` secret because environment variables
202
- always "win" over secrets.
202
+ always take precedence over secrets.
203
203
204
204
Listing the secrets will now also display the local variable:
205
205
@@ -229,11 +229,11 @@ values via the ``.env.test`` file:
229
229
# .env.test
230
230
DATABASE_PASSWORD=" testing"
231
231
232
- Deploy secrets to production
232
+ Deploy Secrets to Production
233
233
----------------------------
234
234
235
- Because the ** decryption key ** is not committed, you'll need to manually
236
- store this file somewhere and deploy it. There are 2 ways to do that:
235
+ Due to the fact that decryption keys should never be committed, you will need to
236
+ manually store this file somewhere and deploy it. There are 2 ways to do that:
237
237
238
238
1) Uploading the file:
239
239
@@ -317,5 +317,4 @@ The secrets system is enabled by default and some of its behavior can be configu
317
317
318
318
319
319
.. _`libsodium` : https://pecl.php.net/package/libsodium
320
- .. _`sodium_compatparagonie/sodium_compat` : https://packagist.org/packages/paragonie/sodium_compat
321
320
.. _`paragonie/sodium_compat` : https://github.com/paragonie/sodium_compat
0 commit comments