examples/symmetric-encryption.yml in symmetric-encryption-0.3.0 vs examples/symmetric-encryption.yml in symmetric-encryption-0.3.1

- old
+ new

@@ -4,12 +4,12 @@ --- # For the development and test environments the test symmetric encryption keys # can be placed directly in the source code. # And therefore no RSA private key is required development: &development_defaults - symmetric_key: 1234567890ABCDEF1234567890ABCDEF - symmetric_iv: 1234567890ABCDEF + key: 1234567890ABCDEF1234567890ABCDEF + iv: 1234567890ABCDEF cipher: aes-128-cbc test: <<: *development_defaults @@ -51,12 +51,12 @@ # List Symmetric Key Ciphers in the order of current / latest first ciphers: # Filename containing Symmetric Encryption Key encrypted using the # RSA public key derived from the private key above - - symmetric_key_filename: /etc/rails/.rails.key - symmetric_iv_filename: /etc/rails/.rails.iv + - key_filename: /etc/rails/.rails.key + iv_filename: /etc/rails/.rails.iv # Encryption cipher # Recommended values: # aes-256-cbc # 256 AES CBC Algorithm. Very strong @@ -104,8 +104,8 @@ # # Any previous Symmetric Encryption Keys # # Only used when old data still exists that requires old decryption keys # to be used - - symmetric_key_filename: /etc/rails/.rails_old.key - symmetric_iv_filename: /etc/rails/.rails_old.iv + - key_filename: /etc/rails/.rails_old.key + iv_filename: /etc/rails/.rails_old.iv cipher: aes-256-cbc