README.md in kms_encrypted-1.5.1 vs README.md in kms_encrypted-1.6.0

- old
+ new

@@ -12,11 +12,11 @@ Supports [AWS KMS](https://aws.amazon.com/kms/), [Google Cloud KMS](https://cloud.google.com/kms/), and [Vault](https://www.vaultproject.io/) Check out [this post](https://ankane.org/sensitive-data-rails) for more info on securing sensitive data with Rails -[![Build Status](https://github.com/ankane/kms_encrypted/workflows/build/badge.svg?branch=master)](https://github.com/ankane/kms_encrypted/actions) +[![Build Status](https://github.com/ankane/kms_encrypted/actions/workflows/build.yml/badge.svg)](https://github.com/ankane/kms_encrypted/actions) ## How It Works This approach uses a key management service (KMS) to manage encryption keys and Lockbox / attr_encrypted to do the encryption. @@ -477,37 +477,9 @@ ``` ## Related Projects To securely search encrypted data, check out [Blind Index](https://github.com/ankane/blind_index). - -## Upgrading - -### 1.0 - -KMS Encrypted 1.0 brings a number of improvements. Here are a few breaking changes to be aware of: - -- There’s now a default encryption context with the model name and id -- ActiveSupport notifications were changed from `generate_data_key` and `decrypt_data_key` to `encrypt` and `decrypt` -- AWS KMS uses the `Encrypt` operation instead of `GenerateDataKey` - -If you didn’t previously use encryption context, add the `upgrade_context` option to your models: - -```ruby -class User < ApplicationRecord - has_kms_key upgrade_context: true -end -``` - -Then run: - -```ruby -User.where("encrypted_kms_key NOT LIKE 'v1:%'").find_each do |user| - user.rotate_kms_key! -end -``` - -And remove the `upgrade_context` option. ## History View the [changelog](CHANGELOG.md)