DRAGOPS
DRAGOPS
DocumentationNode libraryEncoding

Encoding

Base64, hex, URL encoding, hashing, HMAC, encryption, digital signatures, and certificate parsing nodes.

Encoding nodes handle data encoding, hashing, encryption, and cryptographic operations. They cover the full range of encoding tasks — from Base64 and URL encoding to SHA-256 hashing, HMAC signing, symmetric encryption, and X.509 certificate parsing.

All Encoding nodes are pure (blue header, no execution pins).


Base64 Encode

Encode a string to Base64.

PinDirectionTypeDescription
ValueInputStringThe string to encode
ResultOutputStringBase64-encoded string

Pure. Use Base64 Encode to prepare data for APIs that expect Base64 input — embedding content in JSON, building authentication headers.


Base64 Decode

Decode a Base64 string back to plain text.

PinDirectionTypeDescription
ValueInputStringThe Base64 string to decode
ResultOutputStringDecoded string

Pure. Use Base64 Decode to extract data from Base64-encoded API responses or email attachments.


URL Encode

Percent-encode a string for safe use in URLs.

PinDirectionTypeDescription
ValueInputStringThe string to encode
ResultOutputStringPercent-encoded string

Pure. Use URL Encode to safely embed query parameter values, especially those containing special characters.


URL Decode

Decode a percent-encoded string.

PinDirectionTypeDescription
ValueInputStringThe percent-encoded string
ResultOutputStringDecoded string

Pure. Use URL Decode to extract values from encoded URL parameters or form data.


HTML Encode

Encode special characters as HTML entities.

PinDirectionTypeDescription
ValueInputStringThe string to encode
ResultOutputStringHTML-encoded string

Pure. Use HTML Encode to sanitize text before embedding in HTML — preventing XSS when building email bodies or web content.


HTML Decode

Decode HTML entities back to characters.

PinDirectionTypeDescription
ValueInputStringThe HTML-encoded string
ResultOutputStringDecoded string

Pure. Use HTML Decode to extract readable text from HTML content.


Hash

Compute a cryptographic hash of a string. Supports SHA-256, SHA-512, SHA-1, and MD5.

PinDirectionTypeDescription
ValueInputStringThe string to hash
AlgorithmInputEnumHash algorithm: sha256, sha512, sha1, md5 (default: sha256)
HashOutputStringHex-encoded hash digest

Pure. Use Hash to compute checksums, generate fingerprints, or create deterministic identifiers from content.


HMAC

Compute a keyed hash (HMAC) for message authentication.

PinDirectionTypeDescription
ValueInputStringThe message to sign
KeyInputStringThe secret key
AlgorithmInputEnumHash algorithm: sha256, sha512, sha1, md5 (default: sha256)
HashOutputStringHex-encoded HMAC digest

Pure. Use HMAC to verify webhook signatures, sign API requests, or create authentication tokens.


HMAC (Raw)

Compute HMAC returning raw bytes instead of a hex string. Use this for multi-step signing chains.

PinDirectionTypeDescription
ValueInputAnyThe message to sign
KeyInputAnyThe secret key (string or binary)
AlgorithmInputEnumHash algorithm: sha256, sha512, sha1, md5 (default: sha256)
Raw BytesOutputBinaryRaw HMAC bytes

Pure. Use HMAC (Raw) when you need the raw bytes for chained signing operations like SigV4 request signing.


New GUID

Generate a UUID v4 (universally unique identifier).

PinDirectionTypeDescription
GUIDOutputStringA new UUID v4 string

Pure. Use New GUID to generate unique identifiers for records, correlation IDs, or deduplication keys.


Random Bytes

Generate cryptographically secure random bytes.

PinDirectionTypeDescription
LengthInputIntegerNumber of bytes to generate (default: 32)
BytesOutputBinaryRandom binary data

Pure. Use Random Bytes to generate encryption keys, nonces, or initialization vectors.


Hex Encode

Encode bytes to a lowercase hex string.

PinDirectionTypeDescription
ValueInputAnyThe value to encode
Hex StringOutputStringHex-encoded string

Pure. Use Hex Encode to convert binary data to a readable hex representation for logging or display.


Hex Decode

Decode a hex string to raw bytes.

PinDirectionTypeDescription
Hex StringInputStringThe hex string to decode
BytesOutputBinaryDecoded binary data

Pure. Use Hex Decode to convert hex-encoded data from APIs or logs back to binary.


Encrypt

Encrypt data with a symmetric key. Supports AES-256-GCM and other algorithms.

PinDirectionTypeDescription
DataInputStringPlaintext to encrypt
KeyInputStringEncryption key
AlgorithmInputEnumEncryption algorithm (default: aes-256-gcm)
CiphertextOutputStringEncrypted data (Base64-encoded)
IVOutputStringInitialization vector (Base64-encoded)
Auth TagOutputStringAuthentication tag for GCM modes (Base64-encoded)

Pure. Use Encrypt to protect sensitive data before storing or transmitting it — encrypting credentials, PII, or tokens.


Decrypt

Decrypt data with a symmetric key.

PinDirectionTypeDescription
CiphertextInputStringEncrypted data (Base64-encoded)
KeyInputStringDecryption key
IVInputStringInitialization vector
Auth TagInputStringAuthentication tag (for GCM modes)
AlgorithmInputEnumEncryption algorithm (default: aes-256-gcm)
DataOutputStringDecrypted plaintext

Pure. Use Decrypt to retrieve encrypted data — reading stored credentials or processing encrypted payloads.


Sign Data

Create a digital signature with a private key. Supports RSA and ECDSA algorithms.

PinDirectionTypeDescription
DataInputStringThe data to sign
Private KeyInputStringPEM-encoded private key
AlgorithmInputStringSigning algorithm: rsa-sha256, rsa-sha512, ecdsa-sha256, ecdsa-sha512
SignatureOutputStringBase64-encoded signature

Pure. Use Sign Data to create JWT tokens, sign API requests, or generate verifiable assertions.


Verify Signature

Verify a digital signature with a public key.

PinDirectionTypeDescription
DataInputStringThe original data
SignatureInputStringThe signature to verify
Public KeyInputStringPEM-encoded public key
AlgorithmInputStringSigning algorithm used
ValidOutputBooleanTrue if the signature is valid

Pure. Use Verify Signature to authenticate incoming requests, validate JWT tokens, or verify data integrity.


Parse Certificate

Parse an X.509 certificate (PEM or DER format) and extract its fields.

PinDirectionTypeDescription
CertificateInputStringPEM or DER-encoded certificate
SubjectOutputStringCertificate subject (e.g., "CN=*.example.com")
IssuerOutputStringCertificate issuer
Valid FromOutputStringCertificate validity start date
Valid ToOutputStringCertificate expiration date
Serial NumberOutputStringCertificate serial number
SANsOutputArraySubject Alternative Names

Pure. Use Parse Certificate to monitor TLS certificate expiration, validate certificate chains, or extract identity information.


  • HTTP — use HMAC and encoding for API authentication headers
  • String — manipulate encoded strings with concat, split, and replace
  • Variables — retrieve encryption keys from workspace secrets

On this page