Skip to content

Commit 37fd0ac

Browse files
committed
Merge branch '5.1'
* 5.1: Tweak Update secrets.rst Update security.rst Update voters.rst
2 parents 85936a0 + 47e663d commit 37fd0ac

File tree

3 files changed

+9
-8
lines changed

3 files changed

+9
-8
lines changed

configuration/secrets.rst

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -66,15 +66,15 @@ This will generate ``config/secrets/prod/prod.encrypt.public.php`` and
6666
Create or Update Secrets
6767
------------------------
6868

69-
Suppose you want to store your database password a secret. By using the
69+
Suppose you want to store your database password as a secret. By using the
7070
``secrets:set`` command, you should add this secret to both the ``dev`` *and*
7171
``prod`` vaults:
7272

7373
.. code-block:: terminal
7474
75-
# the input is hidden as you type for security
75+
# the input is hidden as you type for security reasons
7676
77-
# set your a default development value (can be overridden locally)
77+
# set your default development value (can be overridden locally)
7878
$ php bin/console secrets:set DATABASE_PASSWORD
7979
8080
# set your production value
@@ -102,7 +102,7 @@ Secret values can be referenced in the same way as
102102
accidentally define a secret *and* an environment variable with the same name:
103103
**environment variables override secrets**.
104104

105-
If you stored a ``DATABASE_PASSWORD`` secret, you can reference by:
105+
If you stored a ``DATABASE_PASSWORD`` secret, you can reference it by:
106106

107107
.. configuration-block::
108108

@@ -234,7 +234,7 @@ manually store this file somewhere and deploy it. There are 2 ways to do that:
234234
1) Uploading the file:
235235

236236
The first option is to copy the **production decryption key** -
237-
``config/secrets/prod/prod.decrypt.private.php`` to your server(s).
237+
``config/secrets/prod/prod.decrypt.private.php`` to your server.
238238

239239
2) Using an Environment Variable
240240

@@ -256,7 +256,7 @@ your secrets during deployment to the "local" vault:
256256
$ php bin/console secrets:decrypt-to-local --force --env=prod
257257
258258
This will write all the decrypted secrets into the ``.env.prod.local`` file.
259-
After doing this, the decryption key does *not* need to remain on the server.
259+
After doing this, the decryption key does *not* need to remain on the server(s).
260260

261261
Rotating Secrets
262262
----------------

reference/configuration/security.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ encoding algorithm. Also, each algorithm defines different config options:
157157
time_cost: 2 # Number of iterations
158158
159159
# MessageDigestPasswordEncoder encoder using SHA512 hashing with default options
160-
AppBundle\Entity\User: 'sha512'
160+
App\Entity\User: 'sha512'
161161
162162
.. code-block:: xml
163163

security/voters.rst

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,10 @@ However, if you don't reuse permissions or your rules are basic, you can always
1313
put that logic directly into your controller instead. Here's an example how
1414
this could look like, if you want to make a route accessible to the "owner" only::
1515

16-
// src/AppBundle/Controller/PostController.php
16+
// src/Controller/PostController.php
1717
// ...
1818

19+
// inside your controller action
1920
if ($post->getOwner() !== $this->getUser()) {
2021
throw $this->createAccessDeniedException();
2122
}

0 commit comments

Comments
 (0)