examples/symmetric-encryption.yml in symmetric-encryption-0.3.0 vs examples/symmetric-encryption.yml in symmetric-encryption-0.3.1
- old
+ new
@@ -4,12 +4,12 @@
---
# For the development and test environments the test symmetric encryption keys
# can be placed directly in the source code.
# And therefore no RSA private key is required
development: &development_defaults
- symmetric_key: 1234567890ABCDEF1234567890ABCDEF
- symmetric_iv: 1234567890ABCDEF
+ key: 1234567890ABCDEF1234567890ABCDEF
+ iv: 1234567890ABCDEF
cipher: aes-128-cbc
test:
<<: *development_defaults
@@ -51,12 +51,12 @@
# List Symmetric Key Ciphers in the order of current / latest first
ciphers:
# Filename containing Symmetric Encryption Key encrypted using the
# RSA public key derived from the private key above
- - symmetric_key_filename: /etc/rails/.rails.key
- symmetric_iv_filename: /etc/rails/.rails.iv
+ - key_filename: /etc/rails/.rails.key
+ iv_filename: /etc/rails/.rails.iv
# Encryption cipher
# Recommended values:
# aes-256-cbc
# 256 AES CBC Algorithm. Very strong
@@ -104,8 +104,8 @@
#
# Any previous Symmetric Encryption Keys
#
# Only used when old data still exists that requires old decryption keys
# to be used
- - symmetric_key_filename: /etc/rails/.rails_old.key
- symmetric_iv_filename: /etc/rails/.rails_old.iv
+ - key_filename: /etc/rails/.rails_old.key
+ iv_filename: /etc/rails/.rails_old.iv
cipher: aes-256-cbc