Socket
Book a DemoInstallSign in
Socket

config-shield

Package Overview
Dependencies
Maintainers
1
Versions
7
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

config-shield

Store and retrieve data sensative in nature

latest
Source
npmnpm
Version
0.2.3
Version published
Maintainers
1
Created
Source

Config Shield

Build Status NPM version Dependency Status Bitdeli Badge

NPM

About

The mission behind this project is to provide a "safe" process from which to store properties sensitive in nature, in a manner that is both developer friendly as well as optimized for production use.

Making configuration changes

Install config-shield in your project:

  npm install config-shield --save

Startup the command-line interface from root of application:

  npm run config-shield
  : enter path of config (enter to use secure-config.json)>
  : enter path of private key> my.app.key
  set simple_property true
  set my-json-prop { "nested": { "values": [ 1, 2, 3 ] } }
  set null-prop null
  set evaluable-prop-as-string "null"
  set string-prop this will be stored as string if type cannot be determined
  set array-pop [ 1, 2, 3 ]
  set boolean-prop true
  set number-prop 5
  remove number-prop
  get my-json-prop
  : { "nested": { "values": [ 1, 2, 3 ] } }
  save
  : changes saved
  exit

Optionally you may also install config-shield globally:

  npm install config-shield -g
  config-shield

Deploy your config

This step should be built into your CICD process, to clone the applicable environment config and copy secure-config.json over. Ideally these assets will be in a limited-access store to avoid unnecessary risk.

Do not under any circumstance store your production private keys within your project.

Loading config from your App

  var secureConfig = require('config-shield');
  // one-time load
  secureConfig.load({
    configPath: './secure-config.json', // not required if default
    privateKeyPath: '/etc/pki/tls/certs/my.app.key'
  });

  var myObj = secureConfig.getProp('my-json-prop');

Access your secure config from anywhere in your app:

  var secureConfig = require('config-shield');
  var myObj = secureConfig.getProp('my-json-prop');

Multiple configs? No problem:

  var secureConfig = require('config-shield');
  secureConfig.load({
    instance: 'my-other-config',
    configPath: './my-other-secure-config.json',
    privateKeyPath: '/etc/pki/tls/certs/my.app.key'
  });

  var myOtherSecureConfig = secureConfig.instance('my-other-config');
  var myObj = myOtherSecureConfig.getProp('my-prop');

Developer Environment

Optionally you may include your development private key within your project to keep things simple, but please do not do this for production environments as you'll be negating the value of this module. Only a limited few should have access to production private keys.

API

  var secureConfig = require('config-shield');
  • load (options[, cb]) - Load config.
    • options.instance (default: 'default') - Name of the config instance.
    • options.configPath (required) - Config to load, relative to the current working directory.
    • options.privateKeyPath (required) - Private key to load. Or could be any secret.
    • options.noCache (default: false) - Will disable caching of decrypted values if true.
    • options.alg (default: 'aes-256-ctr') - Algorithm to use for encryption.
    • cb (function(err, secureConfig)) - If callback is provided, will load asynchronously, otherwise will return synchronously.
  • save ([configPath][, cb]) - Save config.
    • configPath (required) - Config to save, relative to the current working directory.
    • cb (function(err)) - If callback is provided, will save asynchronously, otherwise will return synchronously.
  • convert ([options][, cb]) - Convert existing config to new private key.
    • options.privateKeyPath (required) - Private key file to load. Or could be any secret file.
    • options.backup (default: false) - Write old config values as backup to allow for a rotationary period where old key will continue to work.
    • options.alg (default: 'aes-256-ctr') - Algorithm to use for encryption.
    • cb (function(err)) - If callback is provided, will save asynchronously, otherwise will return synchronously.
  • dropBackup () - Removes all backup keys.
  • getProp (propName) - Return decrypted config value.
  • setProp (propName, propValue) - Store config value.
  • removeProp (propName) - Remove config value.
  • removeAll () - Remove all config values.
  • getKeys () - Return an array of available property keys.
  • getInstance (instanceName) - Return a config instance.
  • setInstance (instance) - Set a config instance.

Rotating keys

In the case you have keys that must be rotated, you can use the convert with backup option. The process would require you to:

  • Load config with old private key.
  • Convert with new private key, setting backup to true.
  • Deploy your config change.
  • Rotate your private keys.
  • Load config with new private key.
  • Run dropBackup.
  • Deploy your final config change.

In CLI, would look something like:

  config-shield
  enter path of config> secure-config.json
  enter path of private key> old.key
  > convert
  enter path of private key> new.key
  backup old values to enable key rotations? (enter to disable, or `true`)> true
  > save
  > exit

Deploy your change, then update your config one last time:

  config-shield
  enter path of config> secure-config.json
  enter path of private key> new.key
  > dropBackup
  > save
  > exit

Deploy the final config. If you skip the step of dropping the backup, your config will become vulnerable to attacks using the old private key, negating most of the value of rotating keys.

Future

Possible future enhancements:

  • tts - Time to stale before auto-reloading config.

License

MIT

FAQs

Package last updated on 21 Jan 2021

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

About

Packages

Stay in touch

Get open source security insights delivered straight into your inbox.

  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc

U.S. Patent No. 12,346,443 & 12,314,394. Other pending.