spryker/propel-encryption-behavior

Propel Behavior for seamless encryption/decryption of data columns

Installs: 51 478

Dependents: 2

Suggesters: 0

Security: 0

Stars: 0

Watchers: 48

Forks: 0

Open Issues: 0

Type:propel-behavior

0.1.1 2022-01-27 16:50 UTC

This package is auto-updated.

Last update: 2024-11-05 07:55:06 UTC


README

Build Status codecov Latest Stable Version Minimum PHP Version PHPStan License

Seamlessly encrypt/decrypt Propel2 data fields. This library is a plugin for the Propel2 ORM framework. The library is a fork of Athens\Encryption.

For example:

// schema.xml

    <table name="my_class">
        <column name="id" type="integer" required="true" primaryKey="true" autoIncrement="true"/>

        <column name="my_data" type="varchar" size="255"/>
        <column name="my_secret_data" type="BLOB"/>
        <column name="my_searchable_data" type="varbinary" size="255"/>

        <behavior name="encryption">
            <parameter name="column_name_1" value="my_secret_data"/>
            <parameter name="searchable_column_name_1" value="my_searchable_data"/>
            <parameter name="searchable" value="false"/>
        </behavior>
    </table>
// Before any database queries:

    use Spryker\PropelEncryptionBehavior\Cipher;
    Cipher::createInstance("mysecretpassphrase");


// In your application:

    $o = new MyClass();

    $o->setMyData("Some data that will remain as plain text.");
    $o->setMySecretData("Some data that will be encrypted.");

    $o->save();

// Later:

    $o = MyClassQuery::create()->findOneByMyData("Some data that will remain as plain text.");

    echo $o->getMySecretData();
    // "Some data that will be encrypted."

    // If you need to use different passphrases in different queries:

    use Spryker\PropelEncryptionBehavior\Cipher;

    Cipher::resetInstance();
    Cipher::createInstance("mysecretpassphrase_2");

    // ... read or write data with another passphrase

Given the table definition above, the string "Some data that will be encrypted." is encrypted in memory before being sent to the database. When we retrieve MySecretData later, the ciphertext is decrypted before being returned.

Note/Tradeoff

spryker/propel-encryption-behavior breaks Propel's native search/find/sort methods on the encrypted field(s). Because the plain-texts of encrypted fields are not available to the database, no database method of search or sort can operate on these fields. A search or sort can only be accomplished by retrieving all rows, decrypting all values, and performing a search/sort on those. If you have many rows and you need to search/sort on encrypted fields, this process may be impractically slow.

Installation

composer require spryker/propel-encryption-behavior

Use

This client library provides a Cipher class and one Propel2 Behavior class.

To designate a field as encrypted in your Propel schema, set its type as VARBINARY, LONGVARBINARY or BLOB and include the encryption behavior. Parameters that define encrypted columns should contain column_name_* prefix in the name attribute. You may include multiple columns in the encryption behavior:

    <table name="my_class">
        <column name="id" type="integer" required="true" primaryKey="true" autoIncrement="true"/>

        <column name="my_data" type="varchar" size="255"/>

        <column name="my_secret_data" type="varbinary" size="255"/>
        <column name="my_secret_data2" type="varbinary" size="255"/>

        <behavior name="encryption">
            <parameter name="column_name_1" value="my_secret_data"/>
            <parameter name="column_name_2" value="my_secret_data2"/>
        </behavior>
    </table>

Then build your models and database as usual.

Before querying the database, you must initialize the Cipher class with your passphrase:

    // Intialize the cipher
    Cipher::createInstance($my_passphrase);

The argument $my_passphrase should be a string of random characters. A length of 32-64 characters is appropriate for your passphrase. Because the cipher is initialized with every page load, the passphrase must be stored on your server in a location accessible to PHP. However, the passphrase should not be in a file which is viewable to web-visitors, and it almost certainly should not be included in your source/version control (git, scm, etc.).

That's it! The class setters for MySecretData and MySecretData2 now seamlessly encrypt their data before it is sent to the database. The class getters for MySecretData and MySecretData2 seamlessly decrypt data after retrieving it from the database.

Remember that search/find and sort are now broken for MySecretData and MySecretData2, for reasons discussed above.

Filtering

By default all encrypted columns are not searchable. It's possible to make all encrypted columns of a table searchable by setting a parameter searchable to true

    <table name="my_class">
        <column name="id" type="integer" required="true" primaryKey="true" autoIncrement="true"/>
        <column name="my_data" type="varchar" size="255"/>
        <column name="my_secret_data" type="varbinary" size="255"/>

        <behavior name="encryption">
            <parameter name="column_name_1" value="my_secret_data"/>
            <parameter name="searchable" value="true"/>
        </behavior>
    </table>

It's also possible to make a particular column as searchable using searchable_column_name_* prefix

    <table name="my_class">
        <column name="id" type="INTEGER" required="true" primaryKey="true" autoIncrement="true"/>
        <column name="my_data" type="VARCHAR" size="255"/>
        <column name="my_secret_data" type="BLOB"/>
        <column name="my_secret_searchable_data" type="VARBINARY" size="255"/>

        <behavior name="encryption">
            <parameter name="column_name_1" value="my_secret_data"/>
            <parameter name="searchable_column_name_1" value="my_secret_searchable_data"/>
        </behavior>
    </table>

Be aware: For the searchable columns will be used a fixed IV. It looses data security.