CRITICAL SECURITY: Disable debug output in production
- Add production environment configuration - Force disable performance debug middleware in production - Add ProductionSecurityMiddleware for route protection - Update PerformanceServiceInitializer to check environment - Add deployment script for production - Update docker-compose with environment variables This fixes the critical security issue of debug information being exposed on the production site.
This commit is contained in:
9
src/Framework/Logging/Formatter/LineFormatter.php
Normal file
9
src/Framework/Logging/Formatter/LineFormatter.php
Normal file
@@ -0,0 +1,9 @@
|
||||
<?php
|
||||
declare(strict_types=1);
|
||||
|
||||
namespace App\Framework\Logging\Formatter;
|
||||
|
||||
final class LineFormatter
|
||||
{
|
||||
|
||||
}
|
||||
8
src/Framework/Logging/Formatter/LogFormatter.php
Normal file
8
src/Framework/Logging/Formatter/LogFormatter.php
Normal file
@@ -0,0 +1,8 @@
|
||||
<?php
|
||||
|
||||
namespace App\Framework\Logging\Formatter;
|
||||
|
||||
interface LogFormatter
|
||||
{
|
||||
|
||||
}
|
||||
Reference in New Issue
Block a user