Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

transfer-proxy-token-encryption-aes-key → Length? #1270

Closed
jerzy-wachowiak opened this issue May 1, 2024 · 1 comment · Fixed by #1339
Closed

transfer-proxy-token-encryption-aes-key → Length? #1270

jerzy-wachowiak opened this issue May 1, 2024 · 1 comment · Fixed by #1339
Labels
documentation Improvements or additions to documentation triage all new issues awaiting classification

Comments

@jerzy-wachowiak
Copy link

jerzy-wachowiak commented May 1, 2024

Missing information in the documentation for:

transferProxyTokenEncryptionAesKey: transfer-proxy-token-encryption-aes-key

What are the requirements for the aes key?

  1. length (128, 256)?
  2. mode (GCM, CBC, ECB, CTR, etc)?
  3. anything else?

openssl enc -aes-256-cbc -k secret -P -md sha1 ?

@jerzy-wachowiak jerzy-wachowiak added bug Something isn't working triage all new issues awaiting classification labels May 1, 2024
@ndr-brt ndr-brt added documentation Improvements or additions to documentation and removed bug Something isn't working labels May 2, 2024
@github-project-automation github-project-automation bot moved this to Open in EDC Board May 2, 2024
@wolf4ood
Copy link
Contributor

wolf4ood commented May 28, 2024

Hi @jerzy-wachowiak

thanks for raising this the transferProxyTokenEncryptionAesKey is not needed anymore for the runtime to be working.

I think this is just a leftover. Will do a PR for removal
Thanks

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation triage all new issues awaiting classification
Projects
Status: Done
Development

Successfully merging a pull request may close this issue.

3 participants