[9.x] Prevents booting providers when running env:decrypt
#44654
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR fixes an issue with the
env:decryptcommand which can occur when a service provider relies on the presence of a value in the environment file.For example, the Pusher broadcast driver relies on the API token set in the environment and that token doesn't exist until the environment file is decrypted. However, when running the command, the
BroadcastServiceProvideris booted which attempts to instantiate Pusher and an exception is thrown.This PR aims to resolve that issue by omitting
\Illuminate\Foundation\Bootstrap\BootProviders::classfrom the kernel bootstrappers only when invoking theenv:decryptcommand.This functionality has been added to both the
handleandcallmethods.As part of this, I have also added the option to decrypt a file to a different path.
Running the command above would result decrypting a file called
.env.encryptedto/tmp/.envOf course, you may combine this with the other options:
The above command will decrypt
.env.production.encryptedto/tmp/.env