search
HomeBackend DevelopmentPHP TutorialInstallation and use of Composer for handwritten PHP API framework (2)

In the previous article "Handwritten PHP API Framework (1) PSR Specification" we introduced the specifications we need to follow. In this article we will introduce one that we need to use in our project Dependency management tool------Composer.

Composer is a dependency management tool for PHP. It allows you to declare code libraries that your project depends on and it will install them for you in your project.

Installation and use of Composer for handwritten PHP API framework (2)

If you are a front-end engineer, you should have used npm; if you are a pyhton developer, you should have used pip. In short, you can understand composer like this .

composer may be often mentioned in the manual. Let’s learn about installation and common commands.

Installation

  • Linux

The installation of composer is relatively simple. It is not recommended to use yum and other management packages to install directly, because there are May modify your default php version. We can skip the following installation:

curl -sS getcomposer.org/installer | php

mv composer.phar / usr/local/bin/composer

  • Windows

Download and run Composer-Setup.exe, it will install the latest version Composer, it is recommended to add the system environment variable, so that you can use the composer command directly in any directory.

Modify the mirror source

The default mirror source is relatively slow to download in China, it is recommended to change the mirror source

##composer config -g repo.packagist composer

packagist.phpcomposer .com

You can also use Ali’s mirror source (recommended)

composer config -g repo.packagist composer

mirrors.aliyun.com/ composer/

config -g/--global represents global configuration

Composer common commands

  • init initialization

参数:--name: 包的名称。--description: 包的描述。--author: 包的作者。--homepage: 包的主页。--require: 需要依赖的其它包,必须要有一个版本约束。并且应该遵循 foo/bar:1.0.0 这样的格式。--require-dev: 开发版的依赖包,内容格式与 --require 相同。--stability (-s): minimum-stability 字段的值。复制代码
  • require addition

require command adds new dependency packages to composer.json file in the current directory, and the version can be specified.

composer require vendor/package:2.* vendor/package2:dev-master

install installation

install command Read the composer.json file from the current directory, handle the dependencies, and install it into the vendor directory.

If the composer.lock file exists in the current directory, it will read the dependency version from this file instead of obtaining the dependency from the composer.json file. This ensures that every consumer of the library gets the same dependency version.

If there is no composer.lock file, composer will create it after handling the dependencies.

You can simply understand composer.lock as the cache of the extension library.

update update

To get the latest versions of dependencies and update the composer.lock file, you should use the update command.

composer update

This will resolve all dependencies of the project and write the exact version number to composer.lock.

If you just want to update a few packages, you can list them individually like this:

composer update vendor/package vendor/package2

==Note==: The update command will update the latest dependencies of the limited version in composer.json. For example, if you write "monolog/monolog": "1.*", the update command may update version 1.0 to version 1.2, but will not update 1.0 to version 2.0. So you need to pay attention when using it.

search

The search command allows you to search for dependent packages for the current project. Usually it only searches packages on packagist.org. You can simply enter your search criteria. .

show

To list all available packages, you can use the show command.

Installation and use of Composer for handwritten PHP API framework (2)

You can also click to view more composer packages

dump-autoload

Print the autoloader index. In some cases you need to update the autoloader, for example if a new class is added to your package. You can use dump-autoload to do this without having to execute the install or update commands.

In addition, it can print an optimized index of classes that conform to the PSR-0/4 specification, which is also for performance considerations. In large applications, there will be many class files, and the autoloader will take up a large part of the time of each request. Using classmaps may not be convenient during development, but it can still obtain PSR-0/ while ensuring performance. 4. Convenience brought by standards.

Please click to view more composer commands


Okay, in this section we introduce the installation and common commands of composer. We can later integrate the framework into a composer package and share it with other development students.

Recommended learning: "PHP Video Tutorial"

The above is the detailed content of Installation and use of Composer for handwritten PHP API framework (2). For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:juejin. If there is any infringement, please contact admin@php.cn delete
How can you prevent session fixation attacks?How can you prevent session fixation attacks?Apr 28, 2025 am 12:25 AM

Effective methods to prevent session fixed attacks include: 1. Regenerate the session ID after the user logs in; 2. Use a secure session ID generation algorithm; 3. Implement the session timeout mechanism; 4. Encrypt session data using HTTPS. These measures can ensure that the application is indestructible when facing session fixed attacks.

How do you implement sessionless authentication?How do you implement sessionless authentication?Apr 28, 2025 am 12:24 AM

Implementing session-free authentication can be achieved by using JSONWebTokens (JWT), a token-based authentication system where all necessary information is stored in the token without server-side session storage. 1) Use JWT to generate and verify tokens, 2) Ensure that HTTPS is used to prevent tokens from being intercepted, 3) Securely store tokens on the client side, 4) Verify tokens on the server side to prevent tampering, 5) Implement token revocation mechanisms, such as using short-term access tokens and long-term refresh tokens.

What are some common security risks associated with PHP sessions?What are some common security risks associated with PHP sessions?Apr 28, 2025 am 12:24 AM

The security risks of PHP sessions mainly include session hijacking, session fixation, session prediction and session poisoning. 1. Session hijacking can be prevented by using HTTPS and protecting cookies. 2. Session fixation can be avoided by regenerating the session ID before the user logs in. 3. Session prediction needs to ensure the randomness and unpredictability of session IDs. 4. Session poisoning can be prevented by verifying and filtering session data.

How do you destroy a PHP session?How do you destroy a PHP session?Apr 28, 2025 am 12:16 AM

To destroy a PHP session, you need to start the session first, then clear the data and destroy the session file. 1. Use session_start() to start the session. 2. Use session_unset() to clear the session data. 3. Finally, use session_destroy() to destroy the session file to ensure data security and resource release.

How can you change the default session save path in PHP?How can you change the default session save path in PHP?Apr 28, 2025 am 12:12 AM

How to change the default session saving path of PHP? It can be achieved through the following steps: use session_save_path('/var/www/sessions');session_start(); in PHP scripts to set the session saving path. Set session.save_path="/var/www/sessions" in the php.ini file to change the session saving path globally. Use Memcached or Redis to store session data, such as ini_set('session.save_handler','memcached'); ini_set(

How do you modify data stored in a PHP session?How do you modify data stored in a PHP session?Apr 27, 2025 am 12:23 AM

TomodifydatainaPHPsession,startthesessionwithsession_start(),thenuse$_SESSIONtoset,modify,orremovevariables.1)Startthesession.2)Setormodifysessionvariablesusing$_SESSION.3)Removevariableswithunset().4)Clearallvariableswithsession_unset().5)Destroythe

Give an example of storing an array in a PHP session.Give an example of storing an array in a PHP session.Apr 27, 2025 am 12:20 AM

Arrays can be stored in PHP sessions. 1. Start the session and use session_start(). 2. Create an array and store it in $_SESSION. 3. Retrieve the array through $_SESSION. 4. Optimize session data to improve performance.

How does garbage collection work for PHP sessions?How does garbage collection work for PHP sessions?Apr 27, 2025 am 12:19 AM

PHP session garbage collection is triggered through a probability mechanism to clean up expired session data. 1) Set the trigger probability and session life cycle in the configuration file; 2) You can use cron tasks to optimize high-load applications; 3) You need to balance the garbage collection frequency and performance to avoid data loss.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!