Download the PHP package glen/docker-secrets-provider without Composer

On this page you can find all versions of the php package glen/docker-secrets-provider. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.

FAQ

After the download, you have to make one include require_once('vendor/autoload.php');. After that you have to import the classes with use statements.

Example:
If you use only one package a project is not needed. But if you use more then one package, without a project it is not possible to import the classes with use statements.

In general, it is recommended to use always a project to download your libraries. In an application normally there is more than one library needed.
Some PHP packages are not free to download and because of that hosted in private repositories. In this case some credentials are needed to access such packages. Please use the auth.json textarea to insert credentials, if a package is coming from a private repository. You can look here for more information.

  • Some hosting areas are not accessible by a terminal or SSH. Then it is not possible to use Composer.
  • To use Composer is sometimes complicated. Especially for beginners.
  • Composer needs much resources. Sometimes they are not available on a simple webspace.
  • If you are using private repositories you don't need to share your credentials. You can set up everything on our site and then you provide a simple download link to your team member.
  • Simplify your Composer build process. Use our own command line tool to download the vendor folder as binary. This makes your build process faster and you don't need to expose your credentials for private repositories.
Please rate this library. Is it a good library?

Informations about the package docker-secrets-provider

DockerSecretsProvider

DockerSecretsProvider is a Pimple to manage sensitive data with Docker secrets, mostly useful for Silex based applications.

Docker 1.13 provides secrets in swarm mode.

You can use secrets to manage any sensitive data which a Docker container needs at runtime but you don't want to store in the image or in source control, such as:

Usage

Create the secret, using docker CLI

Note the -n parameter with echo; this is necessary to suppress the trailing newline character. If you don't do this, your value is not correctly encoded.

Mount it into container, this example is for docker-compose or docker stack deploy

In development mode, you may use file: directive to use secrets without swarm:

Require the library

Map the secret in Pimple container

This would make $app['my.secret'] read as "This is a secret"

In case of nested structure ($app['option']['key']), the value can be callback, to allow assigning value to sub-keys.

Here's example using saxulum/saxulum-doctrine-mongodb-odm-provider:

To avoid Indirect modification of overloaded element, the value needs to be made copy and assigned again:


All versions of docker-secrets-provider with dependencies

PHP Build Version
Package Version
Requires php Version ^5.3.0 || ^7.0
pimple/pimple Version ^3.0
Composer command for our command line client (download client) This client runs in each environment. You don't need a specific PHP version etc. The first 20 API calls are free. Standard composer command

The package glen/docker-secrets-provider contains the following files

Loading the files please wait ....