password-salt
v5.0.1
Published
Simple browser module for password-encrypting JS objects.
Downloads
28
Maintainers
Readme
Browser Passworder
A simple module for encrypting & decrypting JavaScript objects with a password in the browser.
Serializes the encrypted payload as a string of text for easy storage.
Uses browser native crypto to be the lightest possible module you can have, with the most vetted internals you could ask for (the real guts here are implemented by the browser provider).
Installation
You need to have Node.js installed.
yarn add @metamask/browser-passworder
Usage
const { strict: assert } = require('assert');
const passworder = require('browser-passworder');
const secrets = { coolStuff: 'all', ssn: 'livin large' };
const password = 'hunter55';
passworder
.encrypt(password, secrets)
.then(function (blob) {
return passworder.decrypt(password, blob);
})
.then(function (result) {
assert.deepEqual(result, secrets);
});
There are also some more advanced internal methods you can choose to use, but that's the basic version of it.
The most advanced alternate usage would be if you want to cache the password-derived key to speed up performance for many encryptions/decryptions with the same password.
Details
The serialized text is stored as a JSON blob that includes three base64-encoded fields, data
, iv
, and salt
, none of which you need to worry about.
A key is derived from the password using PBKDF2
with a salt sampled from crypto.getRandomValues()
.
The data is encrypted using the AES-GCM
algorithm with an initialization vector sampled from crypto.getRandomValues()
.
Contributing
Setup
- Install Node.js version 18
- If you are using nvm (recommended) running
nvm use
will automatically choose the right node version for you.
- If you are using nvm (recommended) running
- Install Yarn v3
- Run
yarn install
to install dependencies and run any required post-install scripts
Testing and Linting
Run yarn test
to run the tests once.
Run yarn lint
to run the linter, or run yarn lint:fix
to run the linter and fix any automatically fixable issues.
Release & Publishing
The project follows the same release process as the other libraries in the MetaMask organization. The GitHub Actions action-create-release-pr
and action-publish-release
are used to automate the release process; see those repositories for more information about how they work.
Choose a release version.
- The release version should be chosen according to SemVer. Analyze the changes to see whether they include any breaking changes, new features, or deprecations, then choose the appropriate SemVer version. See the SemVer specification for more information.
If this release is backporting changes onto a previous release, then ensure there is a major version branch for that version (e.g.
1.x
for av1
backport release).- The major version branch should be set to the most recent release with that major version. For example, when backporting a
v1.0.2
release, you'd want to ensure there was a1.x
branch that was set to thev1.0.1
tag.
- The major version branch should be set to the most recent release with that major version. For example, when backporting a
Trigger the
workflow_dispatch
event manually for theCreate Release Pull Request
action to create the release PR.- For a backport release, the base branch should be the major version branch that you ensured existed in step 2. For a normal release, the base branch should be the main branch for that repository (which should be the default value).
- This should trigger the
action-create-release-pr
workflow to create the release PR.
Update the changelog to move each change entry into the appropriate change category (See here for the full list of change categories, and the correct ordering), and edit them to be more easily understood by users of the package.
- Generally any changes that don't affect consumers of the package (e.g. lockfile changes or development environment changes) are omitted. Exceptions may be made for changes that might be of interest despite not having an effect upon the published package (e.g. major test improvements, security improvements, improved documentation, etc.).
- Try to explain each change in terms that users of the package would understand (e.g. avoid referencing internal variables/concepts).
- Consolidate related changes into one change entry if it makes it easier to explain.
- Run
yarn auto-changelog validate --rc
to check that the changelog is correctly formatted.
Review and QA the release.
- If changes are made to the base branch, the release branch will need to be updated with these changes and review/QA will need to restart again. As such, it's probably best to avoid merging other PRs into the base branch while review is underway.
Squash & Merge the release.
- This should trigger the
action-publish-release
workflow to tag the final release commit and publish the release on GitHub.
- This should trigger the
Publish the release on npm.
- Wait for the
publish-release
GitHub Action workflow to finish. This should trigger a second job (publish-npm
), which will wait for a run approval by thenpm publishers
team. - Approve the
publish-npm
job (or ask somebody on the npm publishers team to approve it for you). - Once the
publish-npm
job has finished, check npm to verify that it has been published.
- Wait for the