Skip to content

Commit fac97a1

Browse files
author
Tim Bannister
committed
Fix sort order for at-rest API encryption providers
List "identity" first, then other providers alphabetically.
1 parent e3720c7 commit fac97a1

File tree

1 file changed

+14
-11
lines changed

1 file changed

+14
-11
lines changed

content/en/docs/tasks/administer-cluster/encrypt-data.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,8 @@ The following table describes each available provider:
154154
<th>Key length</th>
155155
</tr>
156156
</thead>
157-
<tbody>
157+
<tbody id="encryption-providers-identity">
158+
<!-- list identity first, even when the remaining rows are sorted alphabetically -->
158159
<tr>
159160
<th rowspan="2" scope="row"><tt>identity</tt></th>
160161
<td><strong>None</strong></td>
@@ -166,6 +167,8 @@ The following table describes each available provider:
166167
<td colspan="4">Resources written as-is without encryption. When set as the first provider, the resource will be decrypted as new values are written. Existing encrypted resources are <strong>not</strong> automatically overwritten with the plaintext data.
167168
The <tt>identity</tt> provider is the default if you do not specify otherwise.</td>
168169
</tr>
170+
</tbody>
171+
<tbody id="encryption-providers-that-encrypt">
169172
<tr>
170173
<th rowspan="2" scope="row"><tt>aescbc</tt></th>
171174
<td>AES-CBC with <a href="https://datatracker.ietf.org/doc/html/rfc2315">PKCS#7</a> padding</td>
@@ -187,16 +190,6 @@ The following table describes each available provider:
187190
<td colspan="4">Not recommended for use except when an automated key rotation scheme is implemented. Key material accessible from control plane host.</td>
188191
</tr>
189192
<tr>
190-
<th rowspan="2" scope="row"><tt>secretbox</tt></th>
191-
<td>XSalsa20 and Poly1305</td>
192-
<td>Strong</td>
193-
<td>Faster</td>
194-
<td>32-byte</td>
195-
</tr>
196-
<tr>
197-
<td colspan="4">Uses relatively new encryption technologies that may not be considered acceptable in environments that require high levels of review. Key material accessible from control plane host.</td>
198-
</tr>
199-
<tr>
200193
<th rowspan="2" scope="row"><tt>kms</tt> v1</th>
201194
<td>Uses envelope encryption scheme with DEK per resource.</td>
202195
<td>Strongest</td>
@@ -234,6 +227,16 @@ The following table describes each available provider:
234227
Read how to <a href="/docs/tasks/administer-cluster/kms-provider#configuring-the-kms-provider-kms-v2">configure the KMS V2 provider</a>.
235228
</td>
236229
</tr>
230+
<tr>
231+
<th rowspan="2" scope="row"><tt>secretbox</tt></th>
232+
<td>XSalsa20 and Poly1305</td>
233+
<td>Strong</td>
234+
<td>Faster</td>
235+
<td>32-byte</td>
236+
</tr>
237+
<tr>
238+
<td colspan="4">Uses relatively new encryption technologies that may not be considered acceptable in environments that require high levels of review. Key material accessible from control plane host.</td>
239+
</tr>
237240
</tbody>
238241
</table>
239242

0 commit comments

Comments
 (0)