Skip to content

Commit bcbdd9e

Browse files
committedJun 17, 2020
Add CLI
1 parent b763711 commit bcbdd9e

11 files changed

+350
-525
lines changed
 

‎.npmignore

+58
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
# Logs
2+
logs
3+
*.log
4+
npm-debug.log*
5+
yarn-debug.log*
6+
yarn-error.log*
7+
8+
# Runtime data
9+
pids
10+
*.pid
11+
*.seed
12+
*.pid.lock
13+
14+
# Directory for instrumented libs generated by jscoverage/JSCover
15+
lib-cov
16+
17+
# Coverage directory used by tools like istanbul
18+
coverage
19+
20+
# nyc test coverage
21+
.nyc_output
22+
23+
# Grunt intermediate storage (http://gruntjs.com/creating-plugins#storing-task-files)
24+
.grunt
25+
26+
# Bower dependency directory (https://bower.io/)
27+
bower_components
28+
29+
# node-waf configuration
30+
.lock-wscript
31+
32+
# Compiled binary addons (http://nodejs.org/api/addons.html)
33+
build/Release
34+
35+
# Dependency directories
36+
node_modules/
37+
jspm_packages/
38+
39+
# Typescript v1 declaration files
40+
typings/
41+
42+
# Optional npm cache directory
43+
.npm
44+
45+
# Optional eslint cache
46+
.eslintcache
47+
48+
# Optional REPL history
49+
.node_repl_history
50+
51+
# Output of 'npm pack'
52+
*.tgz
53+
54+
# Yarn Integrity file
55+
.yarn-integrity
56+
57+
# dotenv environment variables file
58+
.env

‎cli.js

+2
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
#!/usr/bin/env node
2+
require("./dist/cli");

‎package-lock.json

+114-427
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

‎package.json

+4-2
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,10 @@
44
"description": "Webpack loader that decrypts assets encrypted by node-cipher",
55
"repository": "https://github.com/Ansimorph/decryption-loader/",
66
"main": "index.js",
7+
"bin": "./cli.js",
78
"scripts": {
89
"build": "tsc --version && tsc",
9-
"test": "jest"
10+
"test": "npm run build && jest --runInBand"
1011
},
1112
"author": "Björn Ganslandt",
1213
"license": "MIT",
@@ -22,12 +23,13 @@
2223
"schema-utils": "^2.0.1"
2324
},
2425
"devDependencies": {
26+
"@types/inquirer": "^6.5.0",
2527
"@types/loader-utils": "^2.0.1",
2628
"@types/webpack": "^4.41.17",
2729
"del": "^5.0.0",
30+
"inquirer": "^7.2.0",
2831
"jest": "^26.0.1",
2932
"memory-fs": "^0.5.0",
30-
"node-cipher": "^6.3.3",
3133
"prettier": "^2.0.5",
3234
"raw-loader": "^4.0.0",
3335
"typescript": "^3.9.5",

‎readme.md

+11-16
Original file line numberDiff line numberDiff line change
@@ -3,25 +3,27 @@
33

44
# Decryption Loader
55

6-
Decrypt assets that were encrypted with [node-cipher][node-cipher-url] in webpack
6+
Decrypt assets with webpack
77

88
## Why?
99

10-
If your public repository includes files you can't share with the world, one solution is to encrypt them. [node-cipher][node-cipher-url] is a node-based cli for this purpose. Decryption-loader allows you to decrypt encrypted assets at build-time right in webpack.
10+
If your public repository includes files you can't share with the world, one solution is to encrypt them. Decryption-loader allows you to encrypt assets via CLI and decrypt them at build-time right in webpack.
1111

1212
## Install
1313

1414
```bash
1515
npm install decryption-loader
1616
```
1717

18-
To encrypt files, install [node-cipher][node-cipher-url]:
18+
## Encryption
1919

2020
```bash
21-
npm install node-cipher -g
21+
npx decryption-loader example.txt
2222
```
2323

24-
## Usage
24+
You will be prompted for a password and an encrypted file `example.txt.enc` is created.
25+
26+
## Decryption
2527

2628
**webpack.config.js**
2729

@@ -47,14 +49,8 @@ Be careful: Your webpack configuration file is probably not a safe place to keep
4749

4850
## Options
4951

50-
Decryption loader mirrors the [options available in node-cipher](https://github.com/nathanbuchar/node-cipher/blob/master/docs/using-the-node-js-api.md#options):
51-
5252
- **`password`** (string) _required_: The password used to derive the encryption key
53-
- **`algorithm`** (string): The algorithm used to encrypt the data. Run `nodecipher -A` for a complete list of available algorithms. Default is _cast5_
54-
- **`salt`** (string): The salt used to derive the encryption key. Default is _nodecipher_
55-
- **`iterations`** (number): The number of iterations used to derive the key. Default is _1000_
56-
- **`keylen`** (number): The byte length of the derived key. Default is _512_
57-
- **`digest`** (string): The hash function used to derive the key. Run `nodecipher -H` for a complete list of available hash algorithms Default is _sha1_
53+
- **`salt`** (string): The salt used to derive the encryption key. Default is _secure_
5854

5955
## An Example
6056

@@ -63,7 +59,7 @@ Decryption loader mirrors the [options available in node-cipher](https://github.
6359
Say you have `font.woff`, a commercial font that you want to include in your public repository, but can't because of licensing issues. Let's encrypt it to solve this problem:
6460

6561
```bash
66-
nodecipher enc font.woff font.woff.cast5 -p password
62+
npx decryption-loader font.woff
6763
```
6864

6965
### 2: Store password
@@ -106,7 +102,7 @@ module.exports = {
106102
module: {
107103
rules: [
108104
{
109-
test: /\.(cast5)$/,
105+
test: /\.(enc)$/,
110106
use: [
111107
{
112108
loader: "file-loader",
@@ -125,8 +121,7 @@ module.exports = {
125121
};
126122
```
127123

128-
And we're done. The encrypted file is now decrypted and then processed by file-loader as `font.woff`. You can reference the encrypted file `font.woff.cast5` in your CSS like a normal font file.
124+
And we're done. The encrypted file is now decrypted and then processed by file-loader as `font.woff`. You can reference the encrypted file `font.woff.enc` in your CSS like a normal font file.
129125

130126
[npm]: https://img.shields.io/npm/v/decryption-loader.svg
131127
[npm-url]: https://npmjs.com/package/decryption-loader
132-
[node-cipher-url]: https://www.npmjs.com/package/node-cipher

‎src/AppendInitVector.ts

+25
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
/* Taken from https://medium.com/@brandonstilson/lets-encrypt-files-with-node-85037bea8c0e */
2+
3+
import { Transform, TransformOptions } from "stream";
4+
5+
class AppendInitVect extends Transform {
6+
private initVector: Buffer;
7+
private appended: boolean;
8+
9+
constructor(initVector: Buffer, options?: TransformOptions) {
10+
super(options);
11+
this.initVector = initVector;
12+
this.appended = false;
13+
}
14+
15+
_transform(chunk: any, _encoding: string, callback: Function) {
16+
if (!this.appended) {
17+
this.push(this.initVector);
18+
this.appended = true;
19+
}
20+
this.push(chunk);
21+
callback();
22+
}
23+
}
24+
25+
export = AppendInitVect;

‎src/cli.ts

+38
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
import inquirer from "inquirer";
2+
import { encryptFile } from "./cryptoUtils";
3+
4+
const fileName = process.argv[2];
5+
6+
function cannotBeEmpty(value: string) {
7+
if (value && value !== "") {
8+
return true;
9+
}
10+
11+
return "Password cannot be empty";
12+
}
13+
14+
function fail() {
15+
console.log("Usage: node cli.ts FILENAME");
16+
process.exit(1);
17+
}
18+
19+
function main() {
20+
if (!fileName) {
21+
fail();
22+
}
23+
24+
inquirer
25+
.prompt([
26+
{
27+
type: "password",
28+
message: "Enter a password",
29+
name: "password",
30+
validate: cannotBeEmpty,
31+
},
32+
])
33+
.then((answers) => {
34+
encryptFile(fileName, answers.password);
35+
});
36+
}
37+
38+
main();

‎src/cryptoUtils.ts

+60
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
import {
2+
pbkdf2Sync,
3+
BinaryLike,
4+
createDecipheriv,
5+
createCipheriv,
6+
randomBytes,
7+
} from "crypto";
8+
import { createReadStream, createWriteStream } from "fs";
9+
import * as path from "path";
10+
import AppendInitVector from "./AppendInitVector";
11+
12+
const ITERATIONS = 1000;
13+
const KEY_LENGTH = 32;
14+
const DIGEST = "sha1";
15+
const CIPHER = "aes-256-cbc";
16+
const DEFAULT_SALT = "secure";
17+
const IV_LENGTH = 16;
18+
19+
export function getKey(
20+
password: BinaryLike,
21+
salt: BinaryLike = DEFAULT_SALT
22+
): Buffer {
23+
return pbkdf2Sync(password, salt, ITERATIONS, KEY_LENGTH, DIGEST);
24+
}
25+
26+
export function getDecipher(key: Buffer, iv: Buffer) {
27+
return createDecipheriv(CIPHER, key, iv);
28+
}
29+
30+
export function getCipher(key: Buffer, iv: Buffer) {
31+
return createCipheriv(CIPHER, key, iv);
32+
}
33+
34+
export function getIVFromBuffer(buffer: Buffer): Buffer {
35+
const iv = Buffer.alloc(IV_LENGTH);
36+
buffer.copy(iv, 0, 0, IV_LENGTH);
37+
38+
return iv;
39+
}
40+
41+
export function getCipherTextFromBuffer(buffer: Buffer): Buffer {
42+
const ciphertext = Buffer.alloc(IV_LENGTH);
43+
buffer.copy(ciphertext, 0, IV_LENGTH, buffer.length);
44+
45+
return ciphertext;
46+
}
47+
48+
export function encryptFile(file: string, key: string, salt?: string) {
49+
// Generate a secure, pseudo random initialization vector.
50+
const initVector = randomBytes(IV_LENGTH);
51+
52+
// Generate a cipher key from the password.
53+
const readStream = createReadStream(file);
54+
const cipher = getCipher(getKey(key, salt), initVector);
55+
const appendInitVect = new AppendInitVector(initVector);
56+
// Create a write stream with a different file extension.
57+
const writeStream = createWriteStream(path.join(file + ".enc"));
58+
59+
readStream.pipe(cipher).pipe(appendInitVect).pipe(writeStream);
60+
}

‎src/index.ts

+12-28
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
import { createDecipher, pbkdf2Sync } from "crypto";
21
import * as webpack from "webpack";
32
import * as loaderUtils from "loader-utils";
43
import validateOptions from "schema-utils";
@@ -7,48 +6,33 @@ import {
76
Schema,
87
ValidationErrorConfiguration,
98
} from "schema-utils/declarations/validate";
10-
11-
const defaultOptions = {
12-
password: "",
13-
algorithm: "cast5-cbc",
14-
salt: "nodecipher",
15-
digest: "sha1",
16-
iterations: 1000,
17-
keylen: 512,
18-
};
9+
import { getKey, getDecipher, getIVFromBuffer, getCipherTextFromBuffer } from "./cryptoUtils";
1910

2011
const validationErrorOptions = {
2112
name: "Decryption Loader",
2213
} as ValidationErrorConfiguration;
2314

24-
function loader(
25-
this: webpack.loader.LoaderContext,
26-
ciphertext: any
27-
): Buffer {
15+
interface Options {
16+
salt?: string,
17+
password: string
18+
}
19+
20+
function loader(this: webpack.loader.LoaderContext, content: any): Buffer {
2821
// Result can be cached
2922
this.cacheable && this.cacheable();
3023

3124
// Get and validate options
32-
const options = {
33-
...defaultOptions,
34-
...loaderUtils.getOptions(this),
35-
};
25+
const options = loaderUtils.getOptions(this) as unknown as Options;
3626

3727
validateOptions(validationSchema as Schema, options, validationErrorOptions);
3828

3929
// Derive Key from password
40-
const key = pbkdf2Sync(
41-
options.password,
42-
options.salt,
43-
options.iterations,
44-
options.keylen,
45-
options.digest
46-
);
30+
const key = getKey(options.password, options.salt);
4731

4832
// Run Decryption
49-
const decipher = createDecipher(options.algorithm, key.toString("hex"));
33+
const decipher = getDecipher(key, getIVFromBuffer(content));
5034

51-
return Buffer.concat([decipher.update(ciphertext), decipher.final()]);
52-
};
35+
return Buffer.concat([decipher.update(getCipherTextFromBuffer(content)), decipher.final()]);
36+
}
5337

5438
export = loader;

‎src/options-schema.json

-12
Original file line numberDiff line numberDiff line change
@@ -4,20 +4,8 @@
44
"password": {
55
"type": "string"
66
},
7-
"algorithm": {
8-
"type": "string"
9-
},
107
"salt": {
118
"type": "string"
12-
},
13-
"digest": {
14-
"type": "string"
15-
},
16-
"iterations": {
17-
"type": "number"
18-
},
19-
"keylen": {
20-
"type": "number"
219
}
2210
},
2311
"additionalProperties": false

‎test/index.test.js

+26-40
Original file line numberDiff line numberDiff line change
@@ -1,50 +1,36 @@
11
const compiler = require("./compiler.js");
2-
const nodecipher = require("node-cipher");
3-
const crypto = require("crypto");
2+
const cryptoUtils = require("../dist/cryptoUtils");
43
const del = require("del");
54

6-
async function enAndDecrypt(options) {
7-
// Generate unique filename for encrypted file
8-
const hash = crypto
9-
.createHash("md5")
10-
.update(JSON.stringify(options))
11-
.digest("hex");
12-
const filename = `fixture.txt.${hash}.enc`;
13-
14-
// Encrypt
15-
const nodecipherConfig = {
16-
input: "test/fixture.txt",
17-
output: `test/${filename}`,
18-
};
19-
20-
nodecipher.encryptSync(Object.assign(nodecipherConfig, options));
5+
const FILENAME = "test/fixture.txt";
6+
const FILENAME_ENCRYPTED = "test/fixture.txt.enc";
217

22-
// Decrypt
23-
const webpackConfig = {
24-
loader: {
25-
options: options,
26-
},
27-
};
28-
29-
return compiler(`${filename}`, webpackConfig).then(stats => {
30-
const { source } = stats.toJson().modules[0];
31-
expect(source).toBe("export default \"The Truth\";");
32-
33-
del.sync(`test/${filename}`);
34-
});
8+
async function enAndDecrypt(options) {
9+
// Encrypt
10+
cryptoUtils.encryptFile(FILENAME, options.password, options.salt);
11+
12+
// Decrypt
13+
const webpackConfig = {
14+
loader: {
15+
options: options,
16+
},
17+
};
18+
19+
return compiler("../" + FILENAME_ENCRYPTED, webpackConfig).then((stats) => {
20+
const { source } = stats.toJson().modules[0];
21+
expect(source).toContain('The Truth');
22+
23+
del.sync(FILENAME_ENCRYPTED);
24+
});
3525
}
3626

3727
test("Decrypt with default settings", () => {
38-
return enAndDecrypt({ password: "passwörd" });
28+
return enAndDecrypt({ password: "passwörd" });
3929
});
4030

41-
test("Decrypt with non-default settings", () => {
42-
return enAndDecrypt({
43-
password: "passlörd",
44-
algorithm: "aes-128-cbc",
45-
salt: "pepper",
46-
iterations: 2,
47-
keylen: 256,
48-
digest: "md5",
49-
});
31+
test("Decrypt with custom salt", () => {
32+
return enAndDecrypt({
33+
password: "passlörd",
34+
salt: "pepper",
35+
});
5036
});

0 commit comments

Comments
 (0)
Please sign in to comment.