Details
-
Sub-task
-
Status: Resolved
-
Critical
-
Resolution: Fixed
-
1.9.2
Description
The three implementations of the encrypted repositories all use per-repo code and varying configurations to protect the data. These configurations should be streamlined to allow for a single shared configuration across all repos with particular repositories being overridden as necessary.