v0.9
ReBAC, API Keys, and Trust Center
Added
- Relationship-based access control (ReBAC) — 1-hop relation policies using `relation.<name>` condition prefix. Define resource ownership, team membership, or project access with a single Policy Studio rule.
- API Keys management — create and revoke named API keys directly from the dashboard. Keys are bcrypt-hashed at rest; plaintext shown exactly once on creation.
- Failure mode config per-org — Enterprise orgs can now switch from fail-closed (default) to fail-open-with-audit via support request. Every error-time allow is flagged in the audit log.
- Trust Center page at /trust with SOC 2 audit status, encryption details, and responsible disclosure contact.
- Design Partners page at /design-partners for teams interested in early access and roadmap input.
Changed
- Relationship cache TTL reduced from 120s to 60s. Cache invalidated automatically on any Relationship mutation.
- Access Simulator Live Preview top_k cap enforced at 20 (was previously up to 100 in some edge cases).
Fixed
- Policy evaluation now correctly returns `False` for `relation.*` conditions when evaluated in ingestion context (no resource to check against).
- Qdrant lister returns `[]` on HTTP 404 (collection not found) instead of raising a connection error during retroactive registration.