feat: Release v0.2.0 - AES-256-GCM default encryption#1
Conversation
## New Features - AES-256-GCM (AEAD) as default encryption method - Encryption versioning (v2 for GCM, v1 for legacy CBC+HMAC) - Password policy: password_min_length (default: 12) - Custom password validator support - Key wrapping option for defense in depth - Privacy mode to hide status details - Secure deletion with SQLite secure_delete pragma ## Security Fixes - v1 format now enforces AES-256-CBC (fixes cipher mode mismatch) - Host header validation in web interface example - HMAC authentication for v1 CBC payloads ## Documentation - Migration guide with backward compatibility verification - Rollback procedure documentation - Updated API reference and configuration docs ## Breaking Changes - Default encryption changed from AES-256-CBC to AES-256-GCM - Minimum password length increased to 12 characters - Encrypted data now uses versioned format (v2: or v1: prefix) Backward compatible: existing data without prefix still supported.
|
Caution Review failedThe pull request is closed. 📝 WalkthroughWalkthroughA version release (0.1.0 → 0.2.0) introducing dual encryption versioning (v1: CBC+HMAC, v2: AES-256-GCM AEAD as default), password policies with minimum length enforcement, optional key wrapping, privacy mode, secure deletion, and comprehensive documentation and configuration updates. Changes
Estimated code review effort🎯 4 (Complex) | ⏱️ ~50 minutes Poem
✨ Finishing touches
📜 Recent review detailsConfiguration used: defaults Review profile: CHILL Plan: Pro 📒 Files selected for processing (14)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
New Features
Security Fixes
Documentation
Breaking Changes
Backward compatible: existing data without prefix still supported.
Summary by CodeRabbit
New Features
Changed
✏️ Tip: You can customize this high-level summary in your review settings.