@metamask-previews/keyring-controller 24.0.0-preview-950f30f7 → 24.0.0-preview-fe9b7e4c

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -7,6 +7,25 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
7
7
 
8
8
  ## [Unreleased]
9
9
 
10
+ ### Added
11
+
12
+ - Added optional `EncryptionKey` and `SupportedKeyDerivationOptions` type parameters to the `KeyringController, `ExportableKeyEncryptor` and `KeyringControllerOptions` type ([#5963](https://github.com/MetaMask/core/pull/5963))
13
+ - This type parameter allows specifying the key derivation options supported by the injected encryptor, defaulting to `@metamask/browser-passworder` types.
14
+
15
+ ### Changed
16
+
17
+ - **BREAKING:** The `KeyringController` constructor now requires an encryptor supporting the `keyFromPassword`, `exportKey` and `generateSalt` methods ([#5963](https://github.com/MetaMask/core/pull/5963))
18
+
19
+ ### Removed
20
+
21
+ - **BREAKING:** The `cacheEncryptionKey` parameter has been removed from the `KeyringController` constructor options ([#5963](https://github.com/MetaMask/core/pull/5963))
22
+ - This parameter was previously used to enable encryption key in-memory caching, but it is no longer needed as the controller now always uses the latest encryption key.
23
+ - **BREAKING:** The `GenericEncryptor` type has been removed ([#5963](https://github.com/MetaMask/core/pull/5963))
24
+
25
+ ### Fixed
26
+
27
+ - Fixed incorrect type for `decryptWithKey` method of `ExportableKeyEncryptor` ([#5963](https://github.com/MetaMask/core/pull/5963))
28
+
10
29
  ## [24.0.0]
11
30
 
12
31
  ### Changed
@@ -36,12 +36,11 @@ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (
36
36
  var __importDefault = (this && this.__importDefault) || function (mod) {
37
37
  return (mod && mod.__esModule) ? mod : { "default": mod };
38
38
  };
39
- var _KeyringController_instances, _KeyringController_controllerOperationMutex, _KeyringController_vaultOperationMutex, _KeyringController_keyringBuilders, _KeyringController_encryptor, _KeyringController_cacheEncryptionKey, _KeyringController_keyrings, _KeyringController_unsupportedKeyrings, _KeyringController_password, _KeyringController_registerMessageHandlers, _KeyringController_getKeyringById, _KeyringController_getKeyringByIdOrDefault, _KeyringController_getKeyringMetadata, _KeyringController_getKeyringBuilderForType, _KeyringController_createNewVaultWithKeyring, _KeyringController_verifySeedPhrase, _KeyringController_getUpdatedKeyrings, _KeyringController_getSerializedKeyrings, _KeyringController_getSessionState, _KeyringController_restoreSerializedKeyrings, _KeyringController_unlockKeyrings, _KeyringController_updateVault, _KeyringController_isNewEncryptionAvailable, _KeyringController_getAccountsFromKeyrings, _KeyringController_createKeyringWithFirstAccount, _KeyringController_newKeyring, _KeyringController_createKeyring, _KeyringController_clearKeyrings, _KeyringController_restoreKeyring, _KeyringController_destroyKeyring, _KeyringController_removeEmptyKeyrings, _KeyringController_assertNoDuplicateAccounts, _KeyringController_setUnlocked, _KeyringController_assertIsUnlocked, _KeyringController_persistOrRollback, _KeyringController_withRollback, _KeyringController_assertControllerMutexIsLocked, _KeyringController_withControllerLock, _KeyringController_withVaultLock;
39
+ var _KeyringController_instances, _KeyringController_controllerOperationMutex, _KeyringController_vaultOperationMutex, _KeyringController_keyringBuilders, _KeyringController_encryptor, _KeyringController_keyrings, _KeyringController_unsupportedKeyrings, _KeyringController_encryptionKey, _KeyringController_registerMessageHandlers, _KeyringController_getKeyringById, _KeyringController_getKeyringByIdOrDefault, _KeyringController_getKeyringMetadata, _KeyringController_getKeyringBuilderForType, _KeyringController_createNewVaultWithKeyring, _KeyringController_deriveEncryptionKey, _KeyringController_setEncryptionKey, _KeyringController_verifySeedPhrase, _KeyringController_getUpdatedKeyrings, _KeyringController_getSerializedKeyrings, _KeyringController_getSessionState, _KeyringController_restoreSerializedKeyrings, _KeyringController_unlockKeyrings, _KeyringController_updateVault, _KeyringController_isNewEncryptionAvailable, _KeyringController_getAccountsFromKeyrings, _KeyringController_createKeyringWithFirstAccount, _KeyringController_newKeyring, _KeyringController_createKeyring, _KeyringController_clearKeyrings, _KeyringController_restoreKeyring, _KeyringController_destroyKeyring, _KeyringController_removeEmptyKeyrings, _KeyringController_assertNoDuplicateAccounts, _KeyringController_setUnlocked, _KeyringController_assertIsUnlocked, _KeyringController_persistOrRollback, _KeyringController_withRollback, _KeyringController_assertControllerMutexIsLocked, _KeyringController_withControllerLock, _KeyringController_withVaultLock;
40
40
  Object.defineProperty(exports, "__esModule", { value: true });
41
41
  exports.KeyringController = exports.getDefaultKeyringState = exports.keyringBuilderFactory = exports.SignTypedDataVersion = exports.AccountImportStrategy = exports.isCustodyKeyring = exports.KeyringTypes = void 0;
42
42
  const util_1 = require("@ethereumjs/util");
43
43
  const base_controller_1 = require("@metamask/base-controller");
44
- const encryptorUtils = __importStar(require("@metamask/browser-passworder"));
45
44
  const eth_hd_keyring_1 = require("@metamask/eth-hd-keyring");
46
45
  const eth_sig_util_1 = require("@metamask/eth-sig-util");
47
46
  const eth_simple_keyring_1 = __importDefault(require("@metamask/eth-simple-keyring"));
@@ -136,23 +135,6 @@ function assertHasUint8ArrayMnemonic(keyring) {
136
135
  throw new Error("Can't get mnemonic bytes from keyring");
137
136
  }
138
137
  }
139
- /**
140
- * Assert that the provided encryptor supports
141
- * encryption and encryption key export.
142
- *
143
- * @param encryptor - The encryptor to check.
144
- * @throws If the encryptor does not support key encryption.
145
- */
146
- function assertIsExportableKeyEncryptor(encryptor) {
147
- if (!('importKey' in encryptor &&
148
- typeof encryptor.importKey === 'function' &&
149
- 'decryptWithKey' in encryptor &&
150
- typeof encryptor.decryptWithKey === 'function' &&
151
- 'encryptWithKey' in encryptor &&
152
- typeof encryptor.encryptWithKey === 'function')) {
153
- throw new Error(constants_1.KeyringControllerError.UnsupportedEncryptionKeyExport);
154
- }
155
- }
156
138
  /**
157
139
  * Assert that the provided password is a valid non-empty string.
158
140
  *
@@ -254,12 +236,11 @@ class KeyringController extends base_controller_1.BaseController {
254
236
  * @param options - Initial options used to configure this controller
255
237
  * @param options.encryptor - An optional object for defining encryption schemes.
256
238
  * @param options.keyringBuilders - Set a new name for account.
257
- * @param options.cacheEncryptionKey - Whether to cache or not encryption key.
258
239
  * @param options.messenger - A restricted messenger.
259
240
  * @param options.state - Initial state to set on this controller.
260
241
  */
261
242
  constructor(options) {
262
- const { encryptor = encryptorUtils, keyringBuilders, messenger, state, } = options;
243
+ const { encryptor, keyringBuilders, messenger, state } = options;
263
244
  super({
264
245
  name,
265
246
  metadata: {
@@ -305,22 +286,15 @@ class KeyringController extends base_controller_1.BaseController {
305
286
  _KeyringController_vaultOperationMutex.set(this, new async_mutex_1.Mutex());
306
287
  _KeyringController_keyringBuilders.set(this, void 0);
307
288
  _KeyringController_encryptor.set(this, void 0);
308
- _KeyringController_cacheEncryptionKey.set(this, void 0);
309
289
  _KeyringController_keyrings.set(this, void 0);
310
290
  _KeyringController_unsupportedKeyrings.set(this, void 0);
311
- _KeyringController_password.set(this, void 0);
291
+ _KeyringController_encryptionKey.set(this, void 0);
312
292
  __classPrivateFieldSet(this, _KeyringController_keyringBuilders, keyringBuilders
313
293
  ? keyringBuilders.concat(defaultKeyringBuilders)
314
294
  : defaultKeyringBuilders, "f");
315
295
  __classPrivateFieldSet(this, _KeyringController_encryptor, encryptor, "f");
316
296
  __classPrivateFieldSet(this, _KeyringController_keyrings, [], "f");
317
297
  __classPrivateFieldSet(this, _KeyringController_unsupportedKeyrings, [], "f");
318
- // This option allows the controller to cache an exported key
319
- // for use in decrypting and encrypting data without password
320
- __classPrivateFieldSet(this, _KeyringController_cacheEncryptionKey, Boolean(options.cacheEncryptionKey), "f");
321
- if (__classPrivateFieldGet(this, _KeyringController_cacheEncryptionKey, "f")) {
322
- assertIsExportableKeyEncryptor(encryptor);
323
- }
324
298
  __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_registerMessageHandlers).call(this);
325
299
  }
326
300
  /**
@@ -691,7 +665,7 @@ class KeyringController extends base_controller_1.BaseController {
691
665
  async setLocked() {
692
666
  __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertIsUnlocked).call(this);
693
667
  return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withRollback).call(this, async () => {
694
- __classPrivateFieldSet(this, _KeyringController_password, undefined, "f");
668
+ __classPrivateFieldSet(this, _KeyringController_encryptionKey, undefined, "f");
695
669
  await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_clearKeyrings).call(this);
696
670
  this.update((state) => {
697
671
  state.isUnlocked = false;
@@ -873,22 +847,9 @@ class KeyringController extends base_controller_1.BaseController {
873
847
  */
874
848
  changePassword(password) {
875
849
  __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertIsUnlocked).call(this);
876
- // If the password is the same, do nothing.
877
- if (__classPrivateFieldGet(this, _KeyringController_password, "f") === password) {
878
- return Promise.resolve();
879
- }
880
850
  return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_persistOrRollback).call(this, async () => {
881
851
  assertIsValidPassword(password);
882
- __classPrivateFieldSet(this, _KeyringController_password, password, "f");
883
- // We need to clear encryption key and salt from state
884
- // to force the controller to re-encrypt the vault using
885
- // the new password.
886
- if (__classPrivateFieldGet(this, _KeyringController_cacheEncryptionKey, "f")) {
887
- this.update((state) => {
888
- delete state.encryptionKey;
889
- delete state.encryptionSalt;
890
- });
891
- }
852
+ await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_deriveEncryptionKey).call(this, password);
892
853
  });
893
854
  }
894
855
  /**
@@ -897,12 +858,15 @@ class KeyringController extends base_controller_1.BaseController {
897
858
  * consistency with the vault salt.
898
859
  *
899
860
  * @param encryptionKey - Key to unlock the keychain.
900
- * @param encryptionSalt - Optional salt to unlock the keychain.
861
+ * @param keyDerivationSalt - Optional salt to unlock the keychain.
901
862
  * @returns Promise resolving when the operation completes.
902
863
  */
903
- async submitEncryptionKey(encryptionKey, encryptionSalt) {
864
+ async submitEncryptionKey(encryptionKey, keyDerivationSalt) {
904
865
  const { newMetadata } = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withRollback).call(this, async () => {
905
- const result = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_unlockKeyrings).call(this, undefined, encryptionKey, encryptionSalt);
866
+ const result = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_unlockKeyrings).call(this, {
867
+ encryptionKey,
868
+ keyDerivationSalt,
869
+ });
906
870
  __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_setUnlocked).call(this);
907
871
  return result;
908
872
  });
@@ -929,9 +893,8 @@ class KeyringController extends base_controller_1.BaseController {
929
893
  async exportEncryptionKey() {
930
894
  __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertIsUnlocked).call(this);
931
895
  return await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withControllerLock).call(this, async () => {
932
- const { encryptionKey } = this.state;
933
- assertIsEncryptionKeySet(encryptionKey);
934
- return encryptionKey;
896
+ assertIsEncryptionKeySet(__classPrivateFieldGet(this, _KeyringController_encryptionKey, "f")?.serialized);
897
+ return __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").serialized;
935
898
  });
936
899
  }
937
900
  /**
@@ -943,7 +906,7 @@ class KeyringController extends base_controller_1.BaseController {
943
906
  */
944
907
  async submitPassword(password) {
945
908
  const { newMetadata } = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withRollback).call(this, async () => {
946
- const result = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_unlockKeyrings).call(this, password);
909
+ const result = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_unlockKeyrings).call(this, { password });
947
910
  __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_setUnlocked).call(this);
948
911
  return result;
949
912
  });
@@ -953,6 +916,12 @@ class KeyringController extends base_controller_1.BaseController {
953
916
  // can attempt to upgrade the vault.
954
917
  await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withRollback).call(this, async () => {
955
918
  if (newMetadata || __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_isNewEncryptionAvailable).call(this)) {
919
+ await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_deriveEncryptionKey).call(this, password, {
920
+ // If the vault is being upgraded, we want to ignore the metadata
921
+ // that is already in the vault, so we can effectively
922
+ // re-encrypt the vault with the new encryption config.
923
+ useVaultKeyMetadata: false,
924
+ });
956
925
  await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_updateVault).call(this);
957
926
  }
958
927
  });
@@ -1015,7 +984,7 @@ class KeyringController extends base_controller_1.BaseController {
1015
984
  }
1016
985
  }
1017
986
  exports.KeyringController = KeyringController;
1018
- _KeyringController_controllerOperationMutex = new WeakMap(), _KeyringController_vaultOperationMutex = new WeakMap(), _KeyringController_keyringBuilders = new WeakMap(), _KeyringController_encryptor = new WeakMap(), _KeyringController_cacheEncryptionKey = new WeakMap(), _KeyringController_keyrings = new WeakMap(), _KeyringController_unsupportedKeyrings = new WeakMap(), _KeyringController_password = new WeakMap(), _KeyringController_instances = new WeakSet(), _KeyringController_registerMessageHandlers = function _KeyringController_registerMessageHandlers() {
987
+ _KeyringController_controllerOperationMutex = new WeakMap(), _KeyringController_vaultOperationMutex = new WeakMap(), _KeyringController_keyringBuilders = new WeakMap(), _KeyringController_encryptor = new WeakMap(), _KeyringController_keyrings = new WeakMap(), _KeyringController_unsupportedKeyrings = new WeakMap(), _KeyringController_encryptionKey = new WeakMap(), _KeyringController_instances = new WeakSet(), _KeyringController_registerMessageHandlers = function _KeyringController_registerMessageHandlers() {
1019
988
  this.messenger.registerActionHandler(`${name}:signMessage`, this.signMessage.bind(this));
1020
989
  this.messenger.registerActionHandler(`${name}:signEip7702Authorization`, this.signEip7702Authorization.bind(this));
1021
990
  this.messenger.registerActionHandler(`${name}:signPersonalMessage`, this.signPersonalMessage.bind(this));
@@ -1074,10 +1043,60 @@ async function _KeyringController_createNewVaultWithKeyring(password, keyring) {
1074
1043
  delete state.encryptionKey;
1075
1044
  delete state.encryptionSalt;
1076
1045
  });
1077
- __classPrivateFieldSet(this, _KeyringController_password, password, "f");
1046
+ await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_deriveEncryptionKey).call(this, password);
1078
1047
  await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_clearKeyrings).call(this);
1079
1048
  await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_createKeyringWithFirstAccount).call(this, keyring.type, keyring.opts);
1080
1049
  __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_setUnlocked).call(this);
1050
+ }, _KeyringController_deriveEncryptionKey =
1051
+ /**
1052
+ * Derive the vault encryption key from the provided password, and
1053
+ * assign it to the instance variable for later use with cryptographic
1054
+ * functions.
1055
+ *
1056
+ * When the controller has a vault in its state, the key is derived
1057
+ * using the salt from the vault. If the vault is empty, a new salt
1058
+ * is generated and used to derive the key.
1059
+ *
1060
+ * @param password - The password to use for decryption or derivation.
1061
+ * @param options - Options for the key derivation.
1062
+ * @param options.useVaultKeyMetadata - Whether to use the vault key metadata
1063
+ */
1064
+ async function _KeyringController_deriveEncryptionKey(password, options = {
1065
+ useVaultKeyMetadata: true,
1066
+ }) {
1067
+ __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertControllerMutexIsLocked).call(this);
1068
+ const { vault } = this.state;
1069
+ if (typeof password !== 'string') {
1070
+ throw new TypeError(constants_1.KeyringControllerError.WrongPasswordType);
1071
+ }
1072
+ let salt, keyMetadata;
1073
+ if (vault && options.useVaultKeyMetadata) {
1074
+ const parsedVault = JSON.parse(vault);
1075
+ salt = parsedVault.salt;
1076
+ keyMetadata = parsedVault.keyMetadata;
1077
+ }
1078
+ else {
1079
+ salt = __classPrivateFieldGet(this, _KeyringController_encryptor, "f").generateSalt();
1080
+ }
1081
+ const serializedEncryptionKey = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").exportKey(await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").keyFromPassword(password, salt, true, keyMetadata));
1082
+ __classPrivateFieldSet(this, _KeyringController_encryptionKey, {
1083
+ salt,
1084
+ serialized: serializedEncryptionKey,
1085
+ }, "f");
1086
+ }, _KeyringController_setEncryptionKey = function _KeyringController_setEncryptionKey(encryptionKey, keyDerivationSalt) {
1087
+ __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertControllerMutexIsLocked).call(this);
1088
+ if (typeof encryptionKey !== 'string' ||
1089
+ typeof keyDerivationSalt !== 'string') {
1090
+ throw new TypeError(constants_1.KeyringControllerError.WrongEncryptionKeyType);
1091
+ }
1092
+ const { vault } = this.state;
1093
+ if (vault && JSON.parse(vault).salt !== keyDerivationSalt) {
1094
+ throw new Error(constants_1.KeyringControllerError.ExpiredCredentials);
1095
+ }
1096
+ __classPrivateFieldSet(this, _KeyringController_encryptionKey, {
1097
+ salt: keyDerivationSalt,
1098
+ serialized: encryptionKey,
1099
+ }, "f");
1081
1100
  }, _KeyringController_verifySeedPhrase =
1082
1101
  /**
1083
1102
  * Internal non-exclusive method to verify the seed phrase.
@@ -1158,7 +1177,7 @@ async function _KeyringController_getSerializedKeyrings({ includeUnsupported } =
1158
1177
  return serializedKeyrings;
1159
1178
  }, _KeyringController_getSessionState =
1160
1179
  /**
1161
- * Get a snapshot of session data held by class variables.
1180
+ * Get a snapshot of session data held by instance variables.
1162
1181
  *
1163
1182
  * @returns An object with serialized keyrings, keyrings metadata,
1164
1183
  * and the user password.
@@ -1166,7 +1185,7 @@ async function _KeyringController_getSerializedKeyrings({ includeUnsupported } =
1166
1185
  async function _KeyringController_getSessionState() {
1167
1186
  return {
1168
1187
  keyrings: await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getSerializedKeyrings).call(this),
1169
- password: __classPrivateFieldGet(this, _KeyringController_password, "f"),
1188
+ encryptionKey: __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f"),
1170
1189
  };
1171
1190
  }, _KeyringController_restoreSerializedKeyrings =
1172
1191
  /**
@@ -1195,54 +1214,27 @@ async function _KeyringController_restoreSerializedKeyrings(serializedKeyrings)
1195
1214
  * Unlock Keyrings, decrypting the vault and deserializing all
1196
1215
  * keyrings contained in it, using a password or an encryption key with salt.
1197
1216
  *
1198
- * @param password - The keyring controller password.
1199
- * @param encryptionKey - An exported key string to unlock keyrings with.
1200
- * @param encryptionSalt - The salt used to encrypt the vault.
1217
+ * @param credentials - The credentials to unlock the keyrings.
1201
1218
  * @returns A promise resolving to the deserialized keyrings array.
1202
1219
  */
1203
- async function _KeyringController_unlockKeyrings(password, encryptionKey, encryptionSalt) {
1220
+ async function _KeyringController_unlockKeyrings(credentials) {
1204
1221
  return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withVaultLock).call(this, async () => {
1205
- const encryptedVault = this.state.vault;
1206
- if (!encryptedVault) {
1222
+ if (!this.state.vault) {
1207
1223
  throw new Error(constants_1.KeyringControllerError.VaultError);
1208
1224
  }
1209
- let vault;
1210
- const updatedState = {};
1211
- if (__classPrivateFieldGet(this, _KeyringController_cacheEncryptionKey, "f")) {
1212
- assertIsExportableKeyEncryptor(__classPrivateFieldGet(this, _KeyringController_encryptor, "f"));
1213
- if (password) {
1214
- const result = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").decryptWithDetail(password, encryptedVault);
1215
- vault = result.vault;
1216
- __classPrivateFieldSet(this, _KeyringController_password, password, "f");
1217
- updatedState.encryptionKey = result.exportedKeyString;
1218
- updatedState.encryptionSalt = result.salt;
1219
- }
1220
- else {
1221
- const parsedEncryptedVault = JSON.parse(encryptedVault);
1222
- if (encryptionSalt && encryptionSalt !== parsedEncryptedVault.salt) {
1223
- throw new Error(constants_1.KeyringControllerError.ExpiredCredentials);
1224
- }
1225
- else {
1226
- encryptionSalt = parsedEncryptedVault.salt;
1227
- }
1228
- if (typeof encryptionKey !== 'string') {
1229
- throw new TypeError(constants_1.KeyringControllerError.WrongPasswordType);
1230
- }
1231
- const key = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").importKey(encryptionKey);
1232
- vault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").decryptWithKey(key, parsedEncryptedVault);
1233
- // This call is required on the first call because encryptionKey
1234
- // is not yet inside the memStore
1235
- updatedState.encryptionKey = encryptionKey;
1236
- updatedState.encryptionSalt = encryptionSalt;
1237
- }
1225
+ const parsedEncryptedVault = JSON.parse(this.state.vault);
1226
+ if ('password' in credentials) {
1227
+ await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_deriveEncryptionKey).call(this, credentials.password);
1238
1228
  }
1239
1229
  else {
1240
- if (typeof password !== 'string') {
1241
- throw new TypeError(constants_1.KeyringControllerError.WrongPasswordType);
1242
- }
1243
- vault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").decrypt(password, encryptedVault);
1244
- __classPrivateFieldSet(this, _KeyringController_password, password, "f");
1230
+ __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_setEncryptionKey).call(this, credentials.encryptionKey, credentials.keyDerivationSalt || parsedEncryptedVault.salt);
1231
+ }
1232
+ const encryptionKey = __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f")?.serialized;
1233
+ if (!encryptionKey) {
1234
+ throw new Error(constants_1.KeyringControllerError.MissingCredentials);
1245
1235
  }
1236
+ const key = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").importKey(encryptionKey);
1237
+ const vault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").decryptWithKey(key, parsedEncryptedVault);
1246
1238
  if (!isSerializedKeyringsArray(vault)) {
1247
1239
  throw new Error(constants_1.KeyringControllerError.VaultDataError);
1248
1240
  }
@@ -1250,10 +1242,8 @@ async function _KeyringController_unlockKeyrings(password, encryptionKey, encryp
1250
1242
  const updatedKeyrings = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getUpdatedKeyrings).call(this);
1251
1243
  this.update((state) => {
1252
1244
  state.keyrings = updatedKeyrings;
1253
- if (updatedState.encryptionKey || updatedState.encryptionSalt) {
1254
- state.encryptionKey = updatedState.encryptionKey;
1255
- state.encryptionSalt = updatedState.encryptionSalt;
1256
- }
1245
+ state.encryptionKey = encryptionKey;
1246
+ state.encryptionSalt = parsedEncryptedVault.salt;
1257
1247
  });
1258
1248
  return { keyrings, newMetadata };
1259
1249
  });
@@ -1261,57 +1251,36 @@ async function _KeyringController_unlockKeyrings(password, encryptionKey, encryp
1261
1251
  return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withVaultLock).call(this, async () => {
1262
1252
  // Ensure no duplicate accounts are persisted.
1263
1253
  await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertNoDuplicateAccounts).call(this);
1264
- const { encryptionKey, encryptionSalt, vault } = this.state;
1265
- // READ THIS CAREFULLY:
1266
- // We do check if the vault is still considered up-to-date, if not, we would not re-use the
1267
- // cached key and we will re-generate a new one (based on the password).
1268
- //
1269
- // This helps doing seamless updates of the vault. Useful in case we change some cryptographic
1270
- // parameters to the KDF.
1271
- const useCachedKey = encryptionKey && vault && __classPrivateFieldGet(this, _KeyringController_encryptor, "f").isVaultUpdated?.(vault);
1272
- if (!__classPrivateFieldGet(this, _KeyringController_password, "f") && !encryptionKey) {
1254
+ if (!__classPrivateFieldGet(this, _KeyringController_encryptionKey, "f")) {
1273
1255
  throw new Error(constants_1.KeyringControllerError.MissingCredentials);
1274
1256
  }
1275
1257
  const serializedKeyrings = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getSerializedKeyrings).call(this);
1276
1258
  if (!serializedKeyrings.some((keyring) => keyring.type === KeyringTypes.hd)) {
1277
1259
  throw new Error(constants_1.KeyringControllerError.NoHdKeyring);
1278
1260
  }
1279
- const updatedState = {};
1280
- if (__classPrivateFieldGet(this, _KeyringController_cacheEncryptionKey, "f")) {
1281
- assertIsExportableKeyEncryptor(__classPrivateFieldGet(this, _KeyringController_encryptor, "f"));
1282
- if (useCachedKey) {
1283
- const key = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").importKey(encryptionKey);
1284
- const vaultJSON = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").encryptWithKey(key, serializedKeyrings);
1285
- vaultJSON.salt = encryptionSalt;
1286
- updatedState.vault = JSON.stringify(vaultJSON);
1287
- }
1288
- else if (__classPrivateFieldGet(this, _KeyringController_password, "f")) {
1289
- const { vault: newVault, exportedKeyString } = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").encryptWithDetail(__classPrivateFieldGet(this, _KeyringController_password, "f"), serializedKeyrings);
1290
- updatedState.vault = newVault;
1291
- updatedState.encryptionKey = exportedKeyString;
1292
- }
1293
- }
1294
- else {
1295
- assertIsValidPassword(__classPrivateFieldGet(this, _KeyringController_password, "f"));
1296
- updatedState.vault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").encrypt(__classPrivateFieldGet(this, _KeyringController_password, "f"), serializedKeyrings);
1297
- }
1298
- if (!updatedState.vault) {
1299
- throw new Error(constants_1.KeyringControllerError.MissingVaultData);
1300
- }
1261
+ const key = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").importKey(__classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").serialized);
1262
+ const encryptedVault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").encryptWithKey(key, serializedKeyrings);
1263
+ // We need to include the salt used to derive
1264
+ // the encryption key, to be able to derive it
1265
+ // from password again.
1266
+ encryptedVault.salt = __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").salt;
1267
+ const updatedState = {
1268
+ vault: JSON.stringify(encryptedVault),
1269
+ encryptionKey: __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").serialized,
1270
+ encryptionSalt: __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").salt,
1271
+ };
1301
1272
  const updatedKeyrings = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getUpdatedKeyrings).call(this);
1302
1273
  this.update((state) => {
1303
1274
  state.vault = updatedState.vault;
1304
1275
  state.keyrings = updatedKeyrings;
1305
- if (updatedState.encryptionKey) {
1306
- state.encryptionKey = updatedState.encryptionKey;
1307
- state.encryptionSalt = JSON.parse(updatedState.vault).salt;
1308
- }
1276
+ state.encryptionKey = updatedState.encryptionKey;
1277
+ state.encryptionSalt = updatedState.encryptionSalt;
1309
1278
  });
1310
1279
  return true;
1311
1280
  });
1312
1281
  }, _KeyringController_isNewEncryptionAvailable = function _KeyringController_isNewEncryptionAvailable() {
1313
1282
  const { vault } = this.state;
1314
- if (!vault || !__classPrivateFieldGet(this, _KeyringController_password, "f") || !__classPrivateFieldGet(this, _KeyringController_encryptor, "f").isVaultUpdated) {
1283
+ if (!vault || !__classPrivateFieldGet(this, _KeyringController_encryptor, "f").isVaultUpdated) {
1315
1284
  return false;
1316
1285
  }
1317
1286
  return !__classPrivateFieldGet(this, _KeyringController_encryptor, "f").isVaultUpdated(vault);
@@ -1545,13 +1514,13 @@ async function _KeyringController_persistOrRollback(callback) {
1545
1514
  async function _KeyringController_withRollback(callback) {
1546
1515
  return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withControllerLock).call(this, async ({ releaseLock }) => {
1547
1516
  const currentSerializedKeyrings = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getSerializedKeyrings).call(this);
1548
- const currentPassword = __classPrivateFieldGet(this, _KeyringController_password, "f");
1517
+ const currentEncryptionKey = (0, lodash_1.cloneDeep)(__classPrivateFieldGet(this, _KeyringController_encryptionKey, "f"));
1549
1518
  try {
1550
1519
  return await callback({ releaseLock });
1551
1520
  }
1552
1521
  catch (e) {
1553
- // Keyrings and password are restored to their previous state
1554
- __classPrivateFieldSet(this, _KeyringController_password, currentPassword, "f");
1522
+ // Keyrings and encryption credentials are restored to their previous state
1523
+ __classPrivateFieldSet(this, _KeyringController_encryptionKey, currentEncryptionKey, "f");
1555
1524
  await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_restoreSerializedKeyrings).call(this, currentSerializedKeyrings);
1556
1525
  throw e;
1557
1526
  }