Encryption
There are two ways to use drift on encrypted databases.
The encrypted_drift
package is similar to drift_sqflite
and uses a platform plugin written in
Java.
Alternatively, you can use the ffi-based implementation with the sqlcipher_flutter_libs
package.
For new apps, we recommend using sqlcipher_flutter_libs
with a NativeDatabase
from drift.
An example of a Flutter app using the new encryption package is available
here.
Using encrypted_drift
¶
The drift repository provides a version of drift that can work with encrypted databases by using the
sqflite_sqlcipher library
by @davidmartos96. To use it, you need to
remove the dependency on drift_sqflite
from your pubspec.yaml
and replace it
with this:
dependencies:
drift: ^2.21.0
encrypted_drift:
git:
url: https://github.com/simolus3/drift.git
path: extras/encryption
Instead of importing package:drift_sqflite/drift_sqflite.dart
(or package:drift/native.dart
) in your apps,
you would then import both package:drift/drift.dart
and package:encrypted_drift/encrypted_drift.dart
.
Finally, you can replace SqfliteQueryExecutor
(or a NativeDatabase
) with an EncryptedExecutor
.
Extra setup on Android and iOS¶
Some extra steps may have to be taken in your project so that SQLCipher works correctly. For example, the ProGuard configuration on Android for apps built for release.
Read instructions (Usage and installation instructions of the package can be ignored, as that is handled internally by encrypted_drift
)
Encrypted version of a NativeDatabase
¶
You can also use the new drift/native
library with an encrypted executor.
This allows you to use an encrypted drift database on more platforms, which is particularly
interesting for Desktop applications.
Setup¶
To use sqlcipher
, add a dependency on sqlcipher_flutter_libs
:
If you already have a dependency on sqlite3_flutter_libs
, drop that dependency.
sqlite3_flutter_libs
and sqlcipher_flutter_libs
are not compatible
as they both provide a (different) set of sqlite3
native apis.
On Android, you also need to adapt the opening behavior of the sqlite3
package to use the encrypted library instead
of the regular libsqlite3.so
:
import 'package:sqlite3/open.dart';
import 'package:sqlcipher_flutter_libs/sqlcipher_flutter_libs.dart';
// call this method before using drift
Future<void> setupSqlCipher() async {
await applyWorkaroundToOpenSqlCipherOnOldAndroidVersions();
open.overrideFor(OperatingSystem.android, openCipherOnAndroid);
}
When using drift on a background database, you need to call setupSqlCipher
on the background isolate
as well. With NativeDatabase.createInBackground
, which are using isolates internally, you can use
the setupIsolate
callback to do this - the examples on this page use this as well.
Since applyWorkaroundToOpenSqlCipherOnOldAndroidVersions()
invokes a platform channel, one needs
to install a BackgroundIsolateBinaryMessenger
on the isolate as well.
On iOS, macOS and Windows, no additional setup is necessary - simply depend on sqlcipher_flutter_libs
.
For Linux builds, note that OpenSSL is linked statically by default. If you want to compile your app to use
a dynamically-linked distribution of OpenSSL, see this
issue comment.
Using¶
SQLCipher implements sqlite3's C api, which means that you can continue to use the sqlite3
package
or drift/ffi
without changes. They're both fully compatible with sqlcipher_flutter_libs
.
To actually encrypt a database, you must set an encryption key before using it.
A good place to do that in drift is the setup
parameter of NativeDatabase
, which runs before drift
is using the database in any way:
final token = RootIsolateToken.instance!;
NativeDatabase.createInBackground(
myDatabaseFile,
isolateSetup: () async {
BackgroundIsolateBinaryMessenger.ensureInitialized(token);
await setupSqlCipher();
},
setup: (rawDb) {
rawDb.execute("PRAGMA key = 'passphrase';");
// Recommended option, not enabled by default on SQLCipher
rawDb.config.doubleQuotedStringLiterals = false;
},
);
Disabling double-quoted string literals
In sqlite3_flutter_libs
, sqlite3 is compiled to only accept single-quoted string literals.
This is a recommended option to avoid confusion - SELECT "column" FROM tbl
is always a
column reference, SELECT 'column'
is always a string literal.
SQLCipher does not disable double-quoted string literals at compile-time. For consistency, it is recommended to manually disable them for databases used with drift.
Important notice¶
On the native side, SQLCipher
and sqlite3
stand in conflict with each other.
If your package depends on both native libraries, the one you will actually get may be undefined on some platforms.
In particular, if you depend on sqlcipher_flutter_libs
and another package you use depends on say sqflite
,
you could still be getting the regular sqlite3
library without support for encryption!
For this reason, it is recommended that you check that the cipher_version
pragma is available at runtime:
bool _debugCheckHasCipher(Database database) {
return database.select('PRAGMA cipher_version;').isNotEmpty;
}
Next, add an assert(_debugCheckHasCipher(database))
before using the database. A suitable place is the
setup
parameter to a NativeDatabase
:
NativeDatabase.createInBackground(
myDatabaseFile,
isolateSetup: () async {
BackgroundIsolateBinaryMessenger.ensureInitialized(token);
await setupSqlCipher();
},
setup: (rawDb) {
assert(_debugCheckHasCipher(rawDb));
rawDb.execute("PRAGMA key = 'passphrase';");
// Recommended option, not enabled by default on SQLCipher
rawDb.config.doubleQuotedStringLiterals = false;
},
);
If this check reveals that the encrypted variant is not available, please see the documentation here for advice.