Store some fields in CloudKit unencrypted #244
Replies: 3 comments 14 replies
-
|
@finnvoor We could definitely support something like: try SyncEngine(
for: $0.defaultDatabase,
tables: RemindersList.self, Reminder.self,
unencryptedFields: RemindersList.title, Reminder.title
)And maybe even a flipped initializer for Can you explain a bit more about your use case, though? What kind of CloudKit querying do you need to do that can't be done using SQLiteData's tools? |
Beta Was this translation helpful? Give feedback.
-
|
I believe CKQuery based subscriptions also do not work with encrypted fields. That is, you can't have a predicate on your query referencing an encrypted field. |
Beta Was this translation helpful? Give feedback.
-
|
Just wanted to add my use-case for making some fields queriable - initial sync on clean install. Use cases:
In all these case, on clean install, first pull latest data for x days. Then let the sync engine do it's thing. I'm assuming, that when filling sqlite with custom pulled data, as they have id's from iCloud, sync engine will later figure it out, that these are the same record. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi, sqlite-data seems to encrypt every value stored on CloudKit-synced CKRecords at the moment. CloudKit doesn’t support indexes on encrypted fields, so I can't query the CloudKit database using any predicates or sort descriptors (i.e. sort by
addedAtdate). It would be nice if some fields could be marked as unencrypted for use when querying the CloudKit database outside of sqlite-data.Beta Was this translation helpful? Give feedback.
All reactions