Dexie Encrypted Addon
This addon can be used as a stand-alone addon for Dexie.js yet is also part of dexie-addon-suite that combines a number of addons for Dexie. It contains code to combine some addons like populated rxjs observables.
Install over npm
npm install @pvermeer/dexie-encrypted-addon
Dexie.js
Dexie Encrypted Addon depends on Dexie.js v3.
npm install dexie
Updating package
Updating the addon to major version 3 requires a database version update. The addon needs to create an internal table to check if the encryption key has changed.
db.version(2).stores({ friends: "++id, $name, shoeSize" }); // Provide full schema with all tables on upgrading to version 2
Angular > 10
Angular now checks for CommonJS or AMD dependencies optimazations. This will give to following warning:
WARNING in /<your path>/node_modules/@pvermeer/dexie-encrypted-addon/dist/esm-es5/encryption.class.js depends on 'tweetnacl'. CommonJS or AMD dependencies can cause optimization bailouts.
For more info see: https://angular.io/guide/build#configuring-commonjs-dependencies
As mentioned in the provided link add:
"build": {
"builder": "@angular-devkit/build-angular:browser",
"options": {
"allowedCommonJsDependencies": [
"tweetnacl"
]
...
}
...
}
to your angular.json file. The tweetnacl package handles the encryption and is not bundled in the main npm package (it is bundled in the min version) so it will be updated on patches.
Documentation
Encrypt your data the Dexie way!
Addon is written to be as easy to use as Dexie.js itself.
Added Schema Syntax
Symbol | Description |
---|---|
$ | Encrypt this value (does not create an index) |
# | Only as first key: Hash the original document and create an index |
const friend = '#id, $name, age';
{
id: 'hashed id', // Indexed
name: 'some encryption string', // Not indexed
age: 34, // Indexed
shoeSize: 42 // Not indexed
}
Using $ on your keys will encrypt these keys.
Using # on the first key will hash this key with the document on creation. This will create an unique primary key based on the document itself and will update or create the key on the document itself.
Secret key
On first use of the database a new key can be generated with Encryption.createRandomEncryptionKey()
on the exported Encryption
class.
import { Encryption } from "@pvermeer/dexie-encrypted-addon";
// Generate a random key
const newSecret = Encryption.createRandomEncryptionKey();
// Save it somewhere secure
You are responsible for saving this key somewhere secure and use it when opening the database. To keep it secure in your app you could:
- provide it from a backend after user is logged in and / or is verified;
- save it locally in an encrypted state that only the correct user can unlock (e.g. with a key based on the user's password or a separate password / pin).
Make sure it's not persistent on the client! Watch out for serverless databases with persistence enabled (e.g. Google's Firebase with offline first strategy).
Providing a different key than the initial key on database creation result in a 'Encryption key has changed'
error. To protect your database it cannot be openend until the correct key is provided.
Wait for open
Always open the database yourself.
await db.open();
To help with this, the option 'autoOpen' has been disabled.
Indices
Encrypted values will not be indexed. IndexedDB does not support index based on encryption. Doing where() calls would mean the whole collection has to be read and decrypted (unless someone has a better idea? PR's are always welcome :D). Implementing this yourself would be more performend when also modeling the database to support this.
Versioning
Always provide the full schema in stores()
. This is because the addon derives what keys are encrypted from the the provided schema.
New versions also need to specify all tables!
db.version(2).stores({ friends: "#id, $name, shoeSize" }); // Always provide the full schema with all tables on version increase
When also an upgrade()
is necessary and/or encrypted keys have changed the Encrypted
class can be used to decrypt and encrypt data.
import { Encryption } from "@pvermeer/dexie-encrypted-addon";
db.version(3)
.stores({ friends: "#id, shoeSize, $firstName, $lastName" })
.upgrade((tx) => {
const encryption = new Encryption(secretKey);
// Do upgrade work, see Dexie docs
// TODO add example
});
Immutable
Dexie does not do immutability by default. This is recommended so your original input object does not change after encrypting values or hashing the primary index key.
By default immutablity is applied to all creation and update methods via overrides via @pvermeer/dexie-immutable-addon
.
The immutable addon is loaded with this addon so you don't have to provide it.
This behavior can be disabled via the options object provided to the addon:
interface EncryptedOptions {
secretKey: string;
immutable?: boolean; // Default true
}
Setting this to false can lead to unexpected / weird behavior in your application
Getting and setting a raw document
To get or set raw document, unaltered by hooks, a transaction can be used while setting raw
to true
on the transaction
object:
await db.transaction("readonly", db.friends, async (transaction) => {
transaction.raw = true;
const friendRaw = (await db.friends.get(id)) as RawFriend;
});
All read actions in the transaction will return a raw document as saved in the db. All set actions will save the document as is. So no Class mapping or decryption / encryption will be performed on the document.
Example (ESM)
import Dexie from "dexie";
import { encrypted, Encryption } from "@pvermeer/dexie-encrypted-addon";
// Generate a random key (only on first use the database)
const createNewSecret = Encryption.createRandomEncryptionKey();
// Save this key somewhere secure and trusted to be used on reopening the database
const secret = "[key fetched from a secure location]";
// Declare Database
const db = new Dexie("FriendDatabase", {
addons: [encrypted.setOptions({ secretKey: secret })],
});
db.version(1).stores({ friends: "#id, $name, $shoeSize, age" });
// Open the database
db.open().then(() => {
console.log("DB loaded! :D");
// Use Dexie
});
Example (Typescript)
import Dexie from "dexie";
import { encrypted, Encryption } from "@pvermeer/dexie-encrypted-addon";
interface Friend {
id?: number;
name?: string;
shoeSize?: number;
age?: number;
}
// Declare Database
class FriendsDatabase extends Dexie {
public friends: Dexie.Table<Friend, string>;
constructor(name: string, secret: string) {
super(name);
encrypted(this, { secretKey: secret });
this.version(1).stores({
friends: "#id, $name, $shoeSize, age",
});
}
}
// Generate a random key (only on first use the database)
const newSecret = Encryption.createRandomEncryptionKey();
// Save this key somewhere secure and trusted to be used on reopening the database
const secret = "[key fetched from a secure location]";
const db = new FriendDatabase("FriendsDatabase", secret);
// Open the database
db.open().then(() => {
console.log("DB loaded! :D");
// Use Dexie
});
Example (HTML import)
Bundled & minified package: https://unpkg.com/@pvermeer/dexie-encrypted-addon@latest/dist/dexie-encrypted-addon.min.js.
Addon is export as namespace DexieEncryptedAddon
<!DOCTYPE html>
<html>
<head>
<!-- Include Dexie -->
<script src="https://unpkg.com/dexie@latest/dist/dexie.js"></script>
<!-- Include DexieEncryptedAddon (always after Dexie, it's a dependency) -->
<script src="https://unpkg.com/@pvermeer/dexie-encrypted-addon@latest/dist/dexie-encrypted-addon.min.js"></script>
<script>
// Generate a random key (only on first use the database)
const newSecret =
DexieEncryptedAddon.Encryption.createRandomEncryptionKey();
// Save this key somewhere secure and trusted to be used on reopening the database
const secret = "[key fetched from a secure location]";
// Define your database
const db = new Dexie("FriendDatabase", {
addons: [
DexieEncryptedAddon.encrypted.setOptions({ secretKey: secret }),
],
});
db.version(1).stores({ friends: "#id, $name, $shoeSize, age" });
// Open the database
db.open().then(() => {
console.log("DB loaded! :D");
// Do Dexie stuff
});
</script>
</head>
</html>
API
The packet exposes two exports:
encrypted - addon function
/**
* @secretKey Your previously saved secret.
* @immutable Set to false to disable immutable state on document creation and updates.
*/
interface EncryptedOptions {
secretKey: string;
immutable?: boolean;
}
/**
* @method setOptions(string) Set options and return the addon.
* @param options Set secret key and / or immutable create methods.
* @returns The secret key (provided or generated)
*/
function encrypted(db: Dexie, options: EncryptedOptions): string;
/**
* Namespace to set options and return the addon function when used in (ES2016 / ES7)
*/
namespace encrypted {
function setOptions(options: EncryptedOptions): string;
}
Encryption - class
/**
* Class with cryptic methods
*/
class Encryption {
readonly secret: string;
readonly secretUint8Array: Uint8Array;
/**
* Create a random key.
*/
static createRandomEncryptionKey(): string;
/**
* Create a base64 SHA-512 hash string of the provided input.
* @param input Any non-circulair value.
*/
static hash(input: any): string;
/**
* Encrypt any value.
* @param json Any non-circulair value.
*/
public encrypt(json: any): string;
/**
* Decrypt values.
* @param json Any non-circulair value.
*/
public decrypt(messageWithNonce: string): any;
constructor(secret: string);
}
Dexie.js
Dexie.js is a wrapper library for indexedDB - the standard database in the browser. http://dexie.org