![Oracle Drags Its Feet in the JavaScript Trademark Dispute](https://cdn.sanity.io/images/cgdhsj6q/production/919c3b22c24f93884c548d60cbb338e819ff2435-1024x1024.webp?w=400&fit=max&auto=format)
Security News
Oracle Drags Its Feet in the JavaScript Trademark Dispute
Oracle seeks to dismiss fraud claims in the JavaScript trademark dispute, delaying the case and avoiding questions about its right to the name.
iron-store
Advanced tools
🧿 in-memory, signed and encrypted JavaScript store
This is a low-level module that you can use to implement signed and encrypted sessions using cookies for example, like next-iron-session
does.
Signature and encryption is based on @hapi/iron.
Use https://1password.com/password-generator/ to generate strong passwords.
You can use multiple passwords (password rotation).
npm add iron-store
Creating a store with sealed data (encrypt):
import ironStore from "iron-store";
const store = await ironStore({
password: "generated_complex_password_at_least_32_characters_long",
});
store.set("user", { id: 80, admin: true });
const seal = await store.seal();
//
Creating a store from previously sealed data (decrypt):
import ironStore from "iron-store";
const store = await ironStore({
password: "generated_complex_password_at_least_32_characters_long",
sealed: "seal_obtained_from_previous_store.seal()_call",
});
const user = store.get("user");
console.log(user);
// { id:80, admin:true }
Creating a store using multiple passwords (password rotation):
You can implement password rotation by providing an array of passwords and ids. The id can be a string (letters, numbers and _) or just a number.
The first password in the array is always the one used to seal
data. All the other passwords are used to decrypt data.
Note: The id
is mandatory and part of the seal, so that we can know in advance which password to use when decrypting. You need to use unique ids. You cannot reuse a id for a different password.
Note: If you started to use the string
form of password, you can always move to an array
of password objects. The string
form of your password is internally handled as { id: 1, password }
.
import ironStore from "iron-store";
const store = await ironStore({
password: [
{
id: 2,
password: "generated_complex_password_at_least_32_characters_long",
},
{
id: 1,
password: "generated_complex_password_at_least_32_characters_long",
},
],
});
store.set("user", { id: 80, admin: true });
const seal = await store.seal();
FAQs
in-memory, signed and encrypted JavaScript store
The npm package iron-store receives a total of 0 weekly downloads. As such, iron-store popularity was classified as not popular.
We found that iron-store demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Oracle seeks to dismiss fraud claims in the JavaScript trademark dispute, delaying the case and avoiding questions about its right to the name.
Security News
The Linux Foundation is warning open source developers that compliance with global sanctions is mandatory, highlighting legal risks and restrictions on contributions.
Security News
Maven Central now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages.