You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+18-16Lines changed: 18 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,21 +24,23 @@ The content is encrypted with AES-256 in Python using PyCryptodome and decrypted
24
24
>
25
25
> Additionally password levels can be defined in mkdocs.yml or external yaml file with user/password credentials.
26
26
27
-
## Todos for 3.0.x
28
-
29
-
*~~Rework password handling or inventory of some sort~~
30
-
*~~Rework crypto (PBKDF2 + AES256)~~
31
-
*~~Save the generated random keys instead of passwords to session storage (remember_keys)~~
32
-
*~~Sign generated generated and javascript files used in encrypted pages to make it more tamper proof~~
33
-
*~~Add urlencode for latin1 encoding in passwords, as it pycryptodome's implementation of PBKDF2 requires it~~
34
-
*~~find an equivalent way to define multiple passwords in the password inventory as global password~~
35
-
*~~make it possible to define passwords in external yaml file(s)~~
36
-
*~~decrypt all possible keys by one login (replace path fallback)~~
37
-
*~~optional replace crypto-js by webcrypto functions~~
38
-
*~~localStorage option is rather useless now (being unsafe to start with). Fix it nevertheless by saving credentials instead of keys~~
39
-
* Update/Restructure documentation
40
-
* Quick share links
41
-
*~~Implement keystore cache to speed up build time~~
27
+
## New features (compared to version 2.5.x)
28
+
29
+
* Stronger cryptography (PBKDF2 for key derivation)
30
+
* Faster cryptography (Webcrypto as alternative to crypto-js)
31
+
* Allow password inventory or levels in mkdocs.yml or external file for credential handling
32
+
* Allow user name + password as credentials
33
+
* If credential is reused in different levels it also decrypts all of their content
34
+
* Optional adding of credentials to URLs for sharing
35
+
* Optional tamper check by signing generated files with Ed25519
36
+
* New [Documentation](https://unverbuggt.github.io/mkdocs-encryptcontent-plugin/) and [Test bench](https://unverbuggt.github.io/mkdocs-encryptcontent-plugin/testbench/)
37
+
38
+
## Upgrading from version 2.5.x
39
+
40
+
The `use_secret` functionality was discontinued in the plugin configuration and as a meta tag.
41
+
42
+
In order to use environment variables in user names or passwords, use the
Copy file name to clipboardExpand all lines: documentation/docs/index.md
+17-15Lines changed: 17 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,21 +20,23 @@ The content is encrypted with AES-256 in Python using PyCryptodome and decrypted
20
20
>
21
21
> Additionally password levels can be defined in mkdocs.yml or external yaml file with user/password credentials.
22
22
23
-
## Todos for 3.0.x
24
-
25
-
*~~Rework password handling or inventory of some sort~~
26
-
*~~Rework crypto (PBKDF2 + AES256)~~
27
-
*~~Save the generated random keys instead of passwords to session storage (remember_keys)~~
28
-
*~~Sign generated generated and javascript files used in encrypted pages to make it more tamper proof~~
29
-
*~~Add urlencode for latin1 encoding in passwords, as it pycryptodome's implementation of PBKDF2 requires it~~
30
-
*~~find an equivalent way to define multiple passwords in the password inventory as global password~~
31
-
*~~make it possible to define passwords in external yaml file(s)~~
32
-
*~~decrypt all possible keys by one login (replace path fallback)~~
33
-
*~~optional replace crypto-js by webcrypto functions~~
34
-
*~~localStorage option is rather useless now (being unsafe to start with). Fix it nevertheless by saving credentials instead of keys~~
35
-
* Update/Restructure documentation
36
-
* Quick share links
37
-
*~~Implement keystore cache to speed up build time~~
23
+
## New features (compared to version 2.5.x)
24
+
25
+
* Stronger cryptography (PBKDF2 for key derivation)
26
+
* Faster cryptography (Webcrypto as alternative to crypto-js)
27
+
* Allow password inventory or levels in mkdocs.yml or external file for credential handling
28
+
* Allow user name + password as credentials
29
+
* If credential is reused in different levels it also decrypts all of their content
30
+
* Optional adding of credentials to URLs for sharing
31
+
* Optional tamper check by signing generated files with Ed25519
32
+
* New [Documentation](https://unverbuggt.github.io/mkdocs-encryptcontent-plugin/) and [Test bench](https://unverbuggt.github.io/mkdocs-encryptcontent-plugin/testbench/)
33
+
34
+
## Upgrading from version 2.5.x
35
+
36
+
The `use_secret` functionality was discontinued in the plugin configuration and as a meta tag.
37
+
38
+
In order to use environment variables in user names or passwords, use the
0 commit comments