npm install email@example.com
rekey()functions which accepts key as a Buffer in https://github.com/m4heshd/better-sqlite3-multiple-ciphers/pull/41 (Thanks @mivtdole)
Full Changelog: https://github.com/m4heshd/better-sqlite3-multiple-ciphers/compare/v8.1.0...v8.2.0
The fastest and simplest library for SQLite3 in Node.js. This particular fork supports multiple-cipher encryption using SQLite3MultipleCiphers. Check usage to learn more.
better-sqlite3 is used by thousands of developers and engineers on a daily basis. Long nights and weekends were spent keeping this project strong and dependable, with no ask for compensation or funding, until now. If your company uses
better-sqlite3, ask your manager to consider supporting the project:
Also head over to SQLite3MultipleCiphers repo and give some support to the developer to keep this very useful extension alive.
You can also support me (the maintainer of this fork) by buying me a coffee. 😊
|select 1 row ||select 100 rows ||select 100 rows ||insert 1 row ||insert 100 rows in a transaction|
|sqlite and sqlite3||11.7x slower||2.9x slower||24.4x slower||2.8x slower||15.6x slower|
You can verify these results by running the benchmark yourself.
npm install better-sqlite3-multiple-ciphers
npm install better-sqlite3-multiple-ciphers@beta
You must be using Node.js v14.21.1 or above. Prebuilt binaries are available for Node.js LTS versions and Electron. If you have trouble installing, check the troubleshooting guide.
const db = require('better-sqlite3-multiple-ciphers')('foobar.db', options); const row = db.prepare('SELECT * FROM users WHERE id = ?').get(userId); console.log(row.firstName, row.lastName, row.email);
Though not required, it is generally important to set the WAL pragma for performance reasons.
db.pragma('journal_mode = WAL');
import Database from 'better-sqlite3-multiple-ciphers'; const db = new Database('foobar.db', options); db.pragma('journal_mode = WAL');
A database can be encrypted and decrypted simply using
Running this will encrypt the database using the default cipher:
const db = require('better-sqlite3-multiple-ciphers')('foobar.db', options); db.pragma("rekey='secret-key'"); db.close();
To read an encrypted database (assuming default cipher):
const db = require('better-sqlite3-multiple-ciphers')('foobar.db', options); db.pragma("key='secret-key'"); const row = db.prepare("SELECT * FROM users WHERE id = ?").get(userId); console.log(row.firstName, row.lastName, row.email);
To read an encrypted database (legacy SQLCipher) created by tools like DB Browser for SQLite:
const db = require('better-sqlite3-multiple-ciphers')('foobar.db', options); db.pragma(`cipher='sqlcipher'`) db.pragma(`legacy=4`) db.pragma("key='secret-key'"); const row = db.prepare("SELECT * FROM users WHERE id = ?").get(userId); console.log(row.firstName, row.lastName, row.email);
The same method should be used if you want to create a new encrypted database that can be opened using DB Browser for SQLite.
You can also use
rekey() functions for encryption and decryption tasks.
node-sqlite3uses asynchronous APIs for tasks that are either CPU-bound or serialized. That's not only bad design, but it wastes tons of resources. It also causes mutex thrashing which has devastating effects on performance.
node-sqlite3exposes low-level (C language) memory management functions.
better-sqlite3is simpler to use, and it provides nice utilities for some operations that are very difficult or impossible in
better-sqlite3is much faster than
node-sqlite3in most cases, and just as fast in all other cases.
In most cases, if you're attempting something that cannot be reasonably accomplished with
better-sqlite3, it probably cannot be reasonably accomplished with SQLite3 in general. For example, if you're executing queries that take one second to complete, and you expect to have many concurrent users executing those queries, no amount of asynchronicity will save you from SQLite3's serialized nature. Fortunately, SQLite3 is very very fast. With proper indexing, we've been able to achieve upward of 2000 queries per second with 5-way-joins in a 60 GB database, where each query was handling 5–50 kilobytes of real data.
If you have a performance problem, the most likely causes are inefficient queries, improper indexing, or a lack of WAL mode—not
better-sqlite3 itself. However, there are some cases where
better-sqlite3 could be inappropriate:
For these situations, you should probably use a full-fledged RDBMS such as PostgreSQL.
better-sqlite3 with multiple-cipher encryption support
The npm package better-sqlite3-multiple-ciphers receives a total of 414 weekly downloads. As such, better-sqlite3-multiple-ciphers popularity was classified as not popular.
We found that better-sqlite3-multiple-ciphers demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket installs a Github app to automatically flag issues on every pull request and report the health of your dependencies. Find out what is inside your node modules and prevent malicious activity before you update the dependencies.