From de3e23ecfa05799302958662a58a288f040b8cfe Mon Sep 17 00:00:00 2001 From: Maidul Islam Date: Fri, 14 Jun 2024 14:37:04 -0400 Subject: [PATCH] nits --- .../src/services/secret-sharing/secret-sharing-service.ts | 8 ++++---- docs/documentation/platform/secret-sharing.mdx | 6 ------ 2 files changed, 4 insertions(+), 10 deletions(-) diff --git a/backend/src/services/secret-sharing/secret-sharing-service.ts b/backend/src/services/secret-sharing/secret-sharing-service.ts index 4748dbc3e3..012b0f1302 100644 --- a/backend/src/services/secret-sharing/secret-sharing-service.ts +++ b/backend/src/services/secret-sharing/secret-sharing-service.ts @@ -46,12 +46,12 @@ export const secretSharingServiceFactory = ({ const currentTime = new Date().getTime(); const thirtyDays = 30 * 24 * 60 * 60 * 1000; if (expiryTime - currentTime > thirtyDays) { - throw new BadRequestError({ message: "Expiration date cannot be more than 30 days currently." }); + throw new BadRequestError({ message: "Expiration date cannot be more than 30 days" }); } // Limit Input ciphertext length to 13000 (equivalent to 10,000 characters of Plaintext) if (encryptedValue.length > 13000) { - throw new BadRequestError({ message: "Shared Secret Value too long" }); + throw new BadRequestError({ message: "Shared secret value too long" }); } const newSharedSecret = await secretSharingDAL.create({ @@ -78,12 +78,12 @@ export const secretSharingServiceFactory = ({ const currentTime = new Date().getTime(); const thirtyDays = 30 * 24 * 60 * 60 * 1000; if (expiryTime - currentTime > thirtyDays) { - throw new BadRequestError({ message: "Expiration date cannot be more than 30 days currently." }); + throw new BadRequestError({ message: "Expiration date cannot exceed more than 30 days" }); } // Limit Input ciphertext length to 13000 (equivalent to 10,000 characters of Plaintext) if (encryptedValue.length > 13000) { - throw new BadRequestError({ message: "Shared Secret Value too long" }); + throw new BadRequestError({ message: "Shared secret value too long" }); } const newSharedSecret = await secretSharingDAL.create({ diff --git a/docs/documentation/platform/secret-sharing.mdx b/docs/documentation/platform/secret-sharing.mdx index cd89986f3b..680751820a 100644 --- a/docs/documentation/platform/secret-sharing.mdx +++ b/docs/documentation/platform/secret-sharing.mdx @@ -9,12 +9,6 @@ Infisical offers a secure solution for sharing secrets over the internet in a ti With its zero-knowledge architecture, secrets shared via Infisical remain unreadable even to Infisical itself. - - Secret Sharing is available publicly as well as from the Infisical dashboard. - If you're signed in, you can access all your shared secrets and their expiry - details. - - ## Share a Secret 1. Navigate to the **Organization** page.