@@ -28,7 +28,7 @@ store them by using Symfony's secrets management system - sometimes called a
2828Generate Cryptographic Keys
2929---------------------------
3030
31- In order to encrypt and decrypt **secrets **, symfony needs **cryptographic keys **.
31+ In order to encrypt and decrypt **secrets **, Symfony needs **cryptographic keys **.
3232A pair of keys can be generated by running:
3333
3434.. code-block :: terminal
@@ -199,7 +199,7 @@ If you entered ``root``, you will now see this in your ``.env.dev.local`` file:
199199 DATABASE_PASSWORD=root
200200
201201 This will *override * the ``DATABASE_PASSWORD `` secret because environment variables
202- always "win" over secrets.
202+ always take precedence over secrets.
203203
204204Listing the secrets will now also display the local variable:
205205
@@ -229,11 +229,11 @@ values via the ``.env.test`` file:
229229 # .env.test
230230 DATABASE_PASSWORD=" testing"
231231
232- Deploy secrets to production
232+ Deploy Secrets to Production
233233----------------------------
234234
235- Because the ** decryption key ** is not committed, you'll need to manually
236- store this file somewhere and deploy it. There are 2 ways to do that:
235+ Due to the fact that decryption keys should never be committed, you will need to
236+ manually store this file somewhere and deploy it. There are 2 ways to do that:
237237
2382381) Uploading the file:
239239
@@ -317,5 +317,4 @@ The secrets system is enabled by default and some of its behavior can be configu
317317
318318
319319 .. _`libsodium` : https://pecl.php.net/package/libsodium
320- .. _`sodium_compatparagonie/sodium_compat` : https://packagist.org/packages/paragonie/sodium_compat
321320.. _`paragonie/sodium_compat` : https://github.com/paragonie/sodium_compat
0 commit comments