Store SQLCipher decryption key in separate file
First, we write the key a whole lot less. We write it on creation, then never again. Second, it's in a file we control very closely. Instead of blindly regenerating the key if the target file generates an error on read, we block startup unless the error is 'ENOENT' - the file isn't there at all. This still allows for the key.txt file to be deleted or corrupted somehow, but it should be a lot less common than the high-traffic config.json used for window location and media permissions.pull/27/head^2
parent
006700f9a2
commit
496ebf2a47
@ -0,0 +1,62 @@
|
|||||||
|
const fs = require('fs');
|
||||||
|
const path = require('path');
|
||||||
|
const crypto = require('crypto');
|
||||||
|
|
||||||
|
const { app } = require('electron');
|
||||||
|
|
||||||
|
const ENCODING = 'utf8';
|
||||||
|
const userDataPath = app.getPath('userData');
|
||||||
|
const targetPath = path.join(userDataPath, 'key.txt');
|
||||||
|
|
||||||
|
module.exports = {
|
||||||
|
get,
|
||||||
|
set,
|
||||||
|
initialize,
|
||||||
|
remove,
|
||||||
|
};
|
||||||
|
|
||||||
|
function get() {
|
||||||
|
try {
|
||||||
|
const key = fs.readFileSync(targetPath, ENCODING);
|
||||||
|
console.log('key/get: Successfully read key file');
|
||||||
|
return key;
|
||||||
|
} catch (error) {
|
||||||
|
if (error.code === 'ENOENT') {
|
||||||
|
console.log('key/get: Could not find key file, returning null');
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
throw error;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function set(key) {
|
||||||
|
console.log('key/set: Saving key to disk');
|
||||||
|
fs.writeFileSync(targetPath, key, ENCODING);
|
||||||
|
}
|
||||||
|
|
||||||
|
function remove() {
|
||||||
|
console.log('key/remove: Deleting key from disk');
|
||||||
|
fs.unlinkSync(targetPath);
|
||||||
|
}
|
||||||
|
|
||||||
|
function initialize({ userConfig }) {
|
||||||
|
const keyFromConfig = userConfig.get('key');
|
||||||
|
const keyFromStore = get();
|
||||||
|
|
||||||
|
let key = keyFromStore || keyFromConfig;
|
||||||
|
if (!key) {
|
||||||
|
console.log(
|
||||||
|
'key/initialize: Generating new encryption key, since we did not find it on disk'
|
||||||
|
);
|
||||||
|
// https://www.zetetic.net/sqlcipher/sqlcipher-api/#key
|
||||||
|
key = crypto.randomBytes(32).toString('hex');
|
||||||
|
set(key);
|
||||||
|
} else if (keyFromConfig) {
|
||||||
|
set(key);
|
||||||
|
console.log('key/initialize: Removing key from config.json');
|
||||||
|
userConfig.delete('key');
|
||||||
|
}
|
||||||
|
|
||||||
|
return key;
|
||||||
|
}
|
Loading…
Reference in New Issue