Passer au contenu principal Passer à la navigation Passer au pied de page

Journal des modifications

Suivez les dernières mises à jour, améliorations et corrections.

  • New [`rdc config prune`](/docs/pruning#config-prune) command — sweeps stale leftovers from the local config file: ACME cert-cache entries whose anchor is gone, expired archived repositories past their grace window, and dangling cross-references between machines/strategies/repos. Pure-local, no SSH calls.
  • New `rdc machine prune --prune-unknown` flag — surgical alternative to `--orphaned-repos`. Deletes only repos that both the local config and the renet `.interim/state` mirror fail to classify, so legitimate forks created by other tools are preserved. See [Pruning — Phase 3](/docs/pruning#phase-3---prune-unknown-surgical).
  • Mount-safety preflight on `rdc storage prune` and `rdc machine prune --prune-unknown` — refuses to delete cloud backups or machine images of GUIDs currently mounted or running on the executor. Override with `--force-delete-mounted` (distinct from `--force` so the two escape hatches stay separate).
  • `rdc repo backup list` now auto-merges hot and cold backup folders into a single table with `Mode` / `Name` / `GUID` / `Size` / `Modified` columns. `--path <hot|cold>` drills into a single mode. Names resolve from local config; sizes are human-readable; modified timestamps come from the storage backend.
  • `rdc repo list -m` adds a tristate `Type` column (`grand` / `fork` / `unknown`) sourced from the new [`.interim/state` mirror](/docs/repositories#type-column-and-the-state-mirror). The mirror is written at every mount and at fork-creation time, so unmounted forks are correctly identified without unlocking the LUKS volume.
  • Scheduled-backup storage layout split into `hot/` and `cold/` subfolders so the two streams never mix; per-mode delete is now batched into a single rclone call regardless of how many GUIDs.

  • Enterprise config-edit surface: pointer-addressed `rdc config field {get,set,unset,rotate,list}` plus validated `rdc config edit` with a redacted JSONC projection
  • AI-safety firewalls: agent detection via env vars + Linux /proc ancestry, knowledge-gate (`--current`) on sensitive writes, redaction by default, ancestry-verified REDIACC_ALLOW_CONFIG_EDIT override
  • Hash-chained JSONL audit log of every config mutation, refusal, and `--reveal` grant — inspect with `rdc config audit {log, tail, verify}`
  • Server-side envelope v2 with per-field HMAC commitments — zero-knowledge preserved; precondition + anti-downgrade enforced at the config store
  • Config schema v2: bucketed under `resources`, `credentials`, `account`, `infra`, `encryption`; per-field encryption-at-rest replaces the coarse `encryptedResources` blob
  • New [AI Agent Safety & Guardrails](/docs/ai-agents-safety) reference doc

  • Newsletter subscription and lead capture system
  • Dedicated pricing page with detailed comparison
  • ROI calculator with cost breakdown
  • Changelog page for release tracking

  • Homepage redesign with feature showcase tabs
  • Logo wall with trusted brands
  • Dark mode support across all pages
  • Blog sticky navigation bar

  • Solution pages for all use cases
  • Multi-language support (9 languages)
  • Professional services page
  • Disaster recovery landing page

  • Initial release of Rediacc Console
  • CLI tool for infrastructure management
  • Desktop application (Electron)
  • Documentation site with guides