m4heshd / better-sqlite3-multiple-ciphers

better-sqlite3 with multiple-cipher encryption support 🔒
MIT License
137 stars 27 forks source link
cryptography database electron encryption nodejs sql sqlcipher sqleet sqlite sqlite3

better-sqlite3-multiple-ciphers

NPM version Downloads Build status

The fastest and simplest library for SQLite3 in Node.js. This particular fork supports multiple-cipher encryption using SQLite3MultipleCiphers. Check usage to learn more.

Current versions

Help this project stay strong! 💪

better-sqlite3 is used by thousands of developers and engineers on a daily basis. Long nights and weekends were spent keeping this project strong and dependable, with no ask for compensation or funding, until now. If your company uses better-sqlite3, ask your manager to consider supporting the project:

Also head over to SQLite3MultipleCiphers repo and give some support to the developer to keep this very useful extension alive.

You can also support me (the maintainer of this fork) by buying me a coffee. 😊

ko-fi

Donate to m4heshd

How other libraries compare

select 1 row  get()  select 100 rows   all()   select 100 rows iterate() 1-by-1 insert 1 row run() insert 100 rows in a transaction
better-sqlite3 1x 1x 1x 1x 1x
sqlite and sqlite3 11.7x slower 2.9x slower 24.4x slower 2.8x slower 15.6x slower

You can verify these results by running the benchmark yourself.

Installation

Stable

npm install better-sqlite3-multiple-ciphers

Beta

npm install better-sqlite3-multiple-ciphers@beta

You must be using Node.js v14.21.1 or above. Prebuilt binaries are available for Node.js LTS versions and Electron. If you have trouble installing, check the troubleshooting guide.

Usage

const db = require('better-sqlite3-multiple-ciphers')('foobar.db', options);

const row = db.prepare('SELECT * FROM users WHERE id = ?').get(userId);
console.log(row.firstName, row.lastName, row.email);

Though not required, it is generally important to set the WAL pragma for performance reasons.

db.pragma('journal_mode = WAL');
In ES6 module notation:
import Database from 'better-sqlite3-multiple-ciphers';
const db = new Database('foobar.db', options);
db.pragma('journal_mode = WAL');

Encryption

A database can be encrypted and decrypted simply using key and rekey PRAGMA statements.

Running this will encrypt the database using the default cipher (sqleet):

const db = require('better-sqlite3-multiple-ciphers')('foobar.db', options);

db.pragma(`rekey='secret-key'`);
db.close();

To read an encrypted database (assuming default cipher):

const db = require('better-sqlite3-multiple-ciphers')('foobar.db', options);

db.pragma(`key='secret-key'`);
const row = db.prepare('SELECT * FROM users WHERE id = ?').get(userId);
console.log(row.firstName, row.lastName, row.email);

To read an encrypted database (legacy SQLCipher) created by tools like DB Browser for SQLite:

const db = require('better-sqlite3-multiple-ciphers')('foobar.db', options);

db.pragma(`cipher='sqlcipher'`)
db.pragma(`legacy=4`)
db.pragma(`key='secret-key'`);
const row = db.prepare('SELECT * FROM users WHERE id = ?').get(userId);
console.log(row.firstName, row.lastName, row.email);

The same method should be used if you want to create a new encrypted database that can be opened using DB Browser for SQLite.

You can also use key() and rekey() functions for encryption and decryption tasks.

GUI database editors:

Even though better-sqlite3-multiple-ciphers supports opening databases created using DB Browser for SQLite, it only supports creating/editing legacy SQLCipher databases which means, it's highly likely that you won't be able to open a database created using better-sqlite3-multiple-ciphers in DB Browser for SQLite.

To visually edit databases created using better-sqlite3-multiple-ciphers regardless of the cipher configuration, it's recommended to use a tool like SQLiteStudio because it also uses SQLite3MultipleCiphers under the hood.

Read more about encryption at SQLite3MultipleCiphers documentation.

Why should I use this instead of node-sqlite3?

When is this library not appropriate?

In most cases, if you're attempting something that cannot be reasonably accomplished with better-sqlite3, it probably cannot be reasonably accomplished with SQLite3 in general. For example, if you're executing queries that take one second to complete, and you expect to have many concurrent users executing those queries, no amount of asynchronicity will save you from SQLite3's serialized nature. Fortunately, SQLite3 is very very fast. With proper indexing, we've been able to achieve upward of 2000 queries per second with 5-way-joins in a 60 GB database, where each query was handling 5–50 kilobytes of real data.

If you have a performance problem, the most likely causes are inefficient queries, improper indexing, or a lack of WAL mode—not better-sqlite3 itself. However, there are some cases where better-sqlite3 could be inappropriate:

For these situations, you should probably use a full-fledged RDBMS such as PostgreSQL.

Documentation

License

MIT