Skip to content

Add note on opening existing SQLCipher databases with SQLite3 Multiple Ciphers#5307

Merged
AndriySvyryd merged 6 commits intomainfrom
copilot/update-sqlite-breaking-change
Mar 27, 2026
Merged

Add note on opening existing SQLCipher databases with SQLite3 Multiple Ciphers#5307
AndriySvyryd merged 6 commits intomainfrom
copilot/update-sqlite-breaking-change

Conversation

Copy link
Copy Markdown
Contributor

Copilot AI commented Mar 26, 2026

Users migrating from the removed bundle_e_sqlcipher package to SQLite3 Multiple Ciphers need to know that existing SQLCipher-encrypted databases require explicit cipher configuration in the connection string.

  • Added a subitem under the SQLite3 Multiple Ciphers mitigation option explaining how to open existing SQLCipher databases using URI cipher parameters
  • Links to upstream documentation for full details

Example connection string for opening an existing SQLCipher database:

Data Source=file:example.db?cipher=sqlcipher&legacy=4;******

Copy link
Copy Markdown

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Adds guidance to the EF Core 11.0 breaking changes documentation to help users migrating from the removed bundle_e_sqlcipher package open existing SQLCipher-encrypted databases when using SQLite3 Multiple Ciphers.

Changes:

  • Updates the “SQLite3 Multiple Ciphers” mitigation link to point to the upstream SQLite3MultipleCiphers-NuGet documentation.
  • Adds a sub-bullet explaining that opening existing SQLCipher databases requires specifying cipher settings via URI parameters in the connection string.

Comment thread entity-framework/core/what-is-new/ef-core-11.0/breaking-changes.md Outdated
Comment thread entity-framework/core/what-is-new/ef-core-11.0/breaking-changes.md Outdated
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
@AndriySvyryd AndriySvyryd marked this pull request as ready for review March 26, 2026 18:39
Copilot AI review requested due to automatic review settings March 26, 2026 18:39
@AndriySvyryd AndriySvyryd enabled auto-merge (squash) March 26, 2026 18:40
Copy link
Copy Markdown

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Copilot reviewed 1 out of 1 changed files in this pull request and generated no new comments.

Comment thread entity-framework/core/what-is-new/ef-core-11.0/breaking-changes.md Outdated
Agent-Logs-Url: https://github.com/dotnet/EntityFramework.Docs/sessions/1a06de2e-d2ce-4125-8fff-4ebec8ab5734

Co-authored-by: AndriySvyryd <6539701+AndriySvyryd@users.noreply.github.com>
auto-merge was automatically disabled March 27, 2026 04:09

Head branch was pushed to by a user without write access

Copilot AI requested a review from AndriySvyryd March 27, 2026 04:09
Comment thread entity-framework/core/what-is-new/ef-core-11.0/breaking-changes.md Outdated
@AndriySvyryd
Copy link
Copy Markdown
Member

@bricelam @utelle FYI

@AndriySvyryd AndriySvyryd merged commit cd3d880 into main Mar 27, 2026
5 checks passed
@AndriySvyryd AndriySvyryd deleted the copilot/update-sqlite-breaking-change branch March 27, 2026 18:45
@utelle
Copy link
Copy Markdown

utelle commented Mar 27, 2026

Thank you for letting us know.

It definitely makes sense to mention the SQLite3 Multiple Ciphers NuGet package's availability. Also, the point about the need to specify additional configuration parameters for existing SQLCipher encrypted databases is valid.

However, I would like to point out that this applies not only to existing databases, but in general. If a user wants to encrypt a new database with the SQLCipher scheme, it is also necessary to specify configuration parameters accordingly. Only for the default cipher scheme (which is chacha20) no additional configuration parameters are required.

Comment thread entity-framework/core/what-is-new/ef-core-11.0/breaking-changes.md
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants