Taking the configuration out of applications, using the same principles that underly dependency injection

Latest Versions

3 versions โ†’
VersionVulnerabilitiesUsagesDate
2.3.x
2.3
0
Nov 28, 2016
2.2.x
2.2
0
Nov 28, 2016
1.4.x
1.4
0
Aug 12, 2012
3 versions โ†’