@metamask-previews/keyring-controller 24.0.0-preview-e2a66c7a → 24.0.0-preview-cb2e5c04

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -7,6 +7,27 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
7
7
 
8
8
  ## [Unreleased]
9
9
 
10
+ ### Added
11
+
12
+ - Added optional `EncryptionKey`, `SupportedKeyDerivationOptions` and `EncryptionResult` type parameters to the `KeyringController`, `ExportableKeyEncryptor` and `KeyringControllerOptions` types ([#7127](https://github.com/MetaMask/core/pull/7127))
13
+ - This type parameter allows specifying the encryption key, key derivation options and encryption result types supported by the injected encryptor, defaulting to `@metamask/browser-passworder` types.
14
+
15
+ ### Changed
16
+
17
+ - **BREAKING:** The `KeyringController` constructor options now require an encryptor ([#7127](https://github.com/MetaMask/core/pull/7127))
18
+ - The `encryptor` constructor option was previously optional and defaulted to an instance of `@metamask/browser-passworder`.
19
+ - **BREAKING:** The `GenericEncryptor` and `ExportableKeyEncryptor` types have been merged into a single `Encryptor` type ([#7127](https://github.com/MetaMask/core/pull/7127))
20
+ - **BREAKING:** The `Encryptor` type requires `exportKey`, `keyFromPassword` and `generateSalt` methods ([#7127](https://github.com/MetaMask/core/pull/7127))
21
+
22
+ ### Removed
23
+
24
+ - **BREAKING:** The `cacheEncryptionKey` parameter has been removed from the `KeyringController` constructor options ([#7127](https://github.com/MetaMask/core/pull/7127))
25
+ - This parameter was previously used to enable encryption key in-memory caching, but it is no longer needed as the controller now always uses the latest encryption key.
26
+
27
+ ### Fixed
28
+
29
+ - Fixed incorrect type for `decryptWithKey` method of `ExportableKeyEncryptor` ([#7127](https://github.com/MetaMask/core/pull/7127))
30
+
10
31
  ## [24.0.0]
11
32
 
12
33
  ### Changed
@@ -36,12 +36,11 @@ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (
36
36
  var __importDefault = (this && this.__importDefault) || function (mod) {
37
37
  return (mod && mod.__esModule) ? mod : { "default": mod };
38
38
  };
39
- var _KeyringController_instances, _KeyringController_controllerOperationMutex, _KeyringController_vaultOperationMutex, _KeyringController_keyringBuilders, _KeyringController_encryptor, _KeyringController_cacheEncryptionKey, _KeyringController_keyrings, _KeyringController_unsupportedKeyrings, _KeyringController_password, _KeyringController_registerMessageHandlers, _KeyringController_getKeyringById, _KeyringController_getKeyringByIdOrDefault, _KeyringController_getKeyringMetadata, _KeyringController_getKeyringBuilderForType, _KeyringController_createNewVaultWithKeyring, _KeyringController_verifySeedPhrase, _KeyringController_getUpdatedKeyrings, _KeyringController_getSerializedKeyrings, _KeyringController_getSessionState, _KeyringController_restoreSerializedKeyrings, _KeyringController_unlockKeyrings, _KeyringController_updateVault, _KeyringController_isNewEncryptionAvailable, _KeyringController_getAccountsFromKeyrings, _KeyringController_createKeyringWithFirstAccount, _KeyringController_newKeyring, _KeyringController_createKeyring, _KeyringController_clearKeyrings, _KeyringController_restoreKeyring, _KeyringController_destroyKeyring, _KeyringController_removeEmptyKeyrings, _KeyringController_assertNoDuplicateAccounts, _KeyringController_setUnlocked, _KeyringController_assertIsUnlocked, _KeyringController_persistOrRollback, _KeyringController_withRollback, _KeyringController_assertControllerMutexIsLocked, _KeyringController_withControllerLock, _KeyringController_withVaultLock;
39
+ var _KeyringController_instances, _KeyringController_controllerOperationMutex, _KeyringController_vaultOperationMutex, _KeyringController_keyringBuilders, _KeyringController_encryptor, _KeyringController_keyrings, _KeyringController_unsupportedKeyrings, _KeyringController_encryptionKey, _KeyringController_registerMessageHandlers, _KeyringController_getKeyringById, _KeyringController_getKeyringByIdOrDefault, _KeyringController_getKeyringMetadata, _KeyringController_getKeyringBuilderForType, _KeyringController_createNewVaultWithKeyring, _KeyringController_deriveEncryptionKey, _KeyringController_setEncryptionKey, _KeyringController_verifySeedPhrase, _KeyringController_getUpdatedKeyrings, _KeyringController_getSerializedKeyrings, _KeyringController_getSessionState, _KeyringController_restoreSerializedKeyrings, _KeyringController_unlockKeyrings, _KeyringController_updateVault, _KeyringController_isNewEncryptionAvailable, _KeyringController_getAccountsFromKeyrings, _KeyringController_createKeyringWithFirstAccount, _KeyringController_newKeyring, _KeyringController_createKeyring, _KeyringController_clearKeyrings, _KeyringController_restoreKeyring, _KeyringController_destroyKeyring, _KeyringController_removeEmptyKeyrings, _KeyringController_assertNoDuplicateAccounts, _KeyringController_setUnlocked, _KeyringController_assertIsUnlocked, _KeyringController_persistOrRollback, _KeyringController_withRollback, _KeyringController_assertControllerMutexIsLocked, _KeyringController_withControllerLock, _KeyringController_withVaultLock;
40
40
  Object.defineProperty(exports, "__esModule", { value: true });
41
41
  exports.KeyringController = exports.getDefaultKeyringState = exports.keyringBuilderFactory = exports.SignTypedDataVersion = exports.AccountImportStrategy = exports.isCustodyKeyring = exports.KeyringTypes = void 0;
42
42
  const util_1 = require("@ethereumjs/util");
43
43
  const base_controller_1 = require("@metamask/base-controller");
44
- const encryptorUtils = __importStar(require("@metamask/browser-passworder"));
45
44
  const eth_hd_keyring_1 = require("@metamask/eth-hd-keyring");
46
45
  const eth_sig_util_1 = require("@metamask/eth-sig-util");
47
46
  const eth_simple_keyring_1 = __importDefault(require("@metamask/eth-simple-keyring"));
@@ -136,23 +135,6 @@ function assertHasUint8ArrayMnemonic(keyring) {
136
135
  throw new Error("Can't get mnemonic bytes from keyring");
137
136
  }
138
137
  }
139
- /**
140
- * Assert that the provided encryptor supports
141
- * encryption and encryption key export.
142
- *
143
- * @param encryptor - The encryptor to check.
144
- * @throws If the encryptor does not support key encryption.
145
- */
146
- function assertIsExportableKeyEncryptor(encryptor) {
147
- if (!('importKey' in encryptor &&
148
- typeof encryptor.importKey === 'function' &&
149
- 'decryptWithKey' in encryptor &&
150
- typeof encryptor.decryptWithKey === 'function' &&
151
- 'encryptWithKey' in encryptor &&
152
- typeof encryptor.encryptWithKey === 'function')) {
153
- throw new Error(constants_1.KeyringControllerError.UnsupportedEncryptionKeyExport);
154
- }
155
- }
156
138
  /**
157
139
  * Assert that the provided password is a valid non-empty string.
158
140
  *
@@ -259,7 +241,7 @@ class KeyringController extends base_controller_1.BaseController {
259
241
  * @param options.state - Initial state to set on this controller.
260
242
  */
261
243
  constructor(options) {
262
- const { encryptor = encryptorUtils, keyringBuilders, messenger, state, } = options;
244
+ const { encryptor, keyringBuilders, messenger, state } = options;
263
245
  super({
264
246
  name,
265
247
  metadata: {
@@ -305,22 +287,15 @@ class KeyringController extends base_controller_1.BaseController {
305
287
  _KeyringController_vaultOperationMutex.set(this, new async_mutex_1.Mutex());
306
288
  _KeyringController_keyringBuilders.set(this, void 0);
307
289
  _KeyringController_encryptor.set(this, void 0);
308
- _KeyringController_cacheEncryptionKey.set(this, void 0);
309
290
  _KeyringController_keyrings.set(this, void 0);
310
291
  _KeyringController_unsupportedKeyrings.set(this, void 0);
311
- _KeyringController_password.set(this, void 0);
292
+ _KeyringController_encryptionKey.set(this, void 0);
312
293
  __classPrivateFieldSet(this, _KeyringController_keyringBuilders, keyringBuilders
313
294
  ? keyringBuilders.concat(defaultKeyringBuilders)
314
295
  : defaultKeyringBuilders, "f");
315
296
  __classPrivateFieldSet(this, _KeyringController_encryptor, encryptor, "f");
316
297
  __classPrivateFieldSet(this, _KeyringController_keyrings, [], "f");
317
298
  __classPrivateFieldSet(this, _KeyringController_unsupportedKeyrings, [], "f");
318
- // This option allows the controller to cache an exported key
319
- // for use in decrypting and encrypting data without password
320
- __classPrivateFieldSet(this, _KeyringController_cacheEncryptionKey, Boolean(options.cacheEncryptionKey), "f");
321
- if (__classPrivateFieldGet(this, _KeyringController_cacheEncryptionKey, "f")) {
322
- assertIsExportableKeyEncryptor(encryptor);
323
- }
324
299
  __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_registerMessageHandlers).call(this);
325
300
  }
326
301
  /**
@@ -691,7 +666,7 @@ class KeyringController extends base_controller_1.BaseController {
691
666
  async setLocked() {
692
667
  __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertIsUnlocked).call(this);
693
668
  return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withRollback).call(this, async () => {
694
- __classPrivateFieldSet(this, _KeyringController_password, undefined, "f");
669
+ __classPrivateFieldSet(this, _KeyringController_encryptionKey, undefined, "f");
695
670
  await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_clearKeyrings).call(this);
696
671
  this.update((state) => {
697
672
  state.isUnlocked = false;
@@ -873,22 +848,11 @@ class KeyringController extends base_controller_1.BaseController {
873
848
  */
874
849
  changePassword(password) {
875
850
  __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertIsUnlocked).call(this);
876
- // If the password is the same, do nothing.
877
- if (__classPrivateFieldGet(this, _KeyringController_password, "f") === password) {
878
- return Promise.resolve();
879
- }
880
851
  return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_persistOrRollback).call(this, async () => {
881
852
  assertIsValidPassword(password);
882
- __classPrivateFieldSet(this, _KeyringController_password, password, "f");
883
- // We need to clear encryption key and salt from state
884
- // to force the controller to re-encrypt the vault using
885
- // the new password.
886
- if (__classPrivateFieldGet(this, _KeyringController_cacheEncryptionKey, "f")) {
887
- this.update((state) => {
888
- delete state.encryptionKey;
889
- delete state.encryptionSalt;
890
- });
891
- }
853
+ await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_deriveEncryptionKey).call(this, password, {
854
+ ignoreExistingVault: true,
855
+ });
892
856
  });
893
857
  }
894
858
  /**
@@ -902,7 +866,10 @@ class KeyringController extends base_controller_1.BaseController {
902
866
  */
903
867
  async submitEncryptionKey(encryptionKey, encryptionSalt) {
904
868
  const { newMetadata } = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withRollback).call(this, async () => {
905
- const result = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_unlockKeyrings).call(this, undefined, encryptionKey, encryptionSalt);
869
+ const result = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_unlockKeyrings).call(this, {
870
+ encryptionKey,
871
+ encryptionSalt,
872
+ });
906
873
  __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_setUnlocked).call(this);
907
874
  return result;
908
875
  });
@@ -929,9 +896,8 @@ class KeyringController extends base_controller_1.BaseController {
929
896
  async exportEncryptionKey() {
930
897
  __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertIsUnlocked).call(this);
931
898
  return await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withControllerLock).call(this, async () => {
932
- const { encryptionKey } = this.state;
933
- assertIsEncryptionKeySet(encryptionKey);
934
- return encryptionKey;
899
+ assertIsEncryptionKeySet(__classPrivateFieldGet(this, _KeyringController_encryptionKey, "f")?.serialized);
900
+ return __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").serialized;
935
901
  });
936
902
  }
937
903
  /**
@@ -943,7 +909,7 @@ class KeyringController extends base_controller_1.BaseController {
943
909
  */
944
910
  async submitPassword(password) {
945
911
  const { newMetadata } = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withRollback).call(this, async () => {
946
- const result = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_unlockKeyrings).call(this, password);
912
+ const result = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_unlockKeyrings).call(this, { password });
947
913
  __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_setUnlocked).call(this);
948
914
  return result;
949
915
  });
@@ -953,6 +919,12 @@ class KeyringController extends base_controller_1.BaseController {
953
919
  // can attempt to upgrade the vault.
954
920
  await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withRollback).call(this, async () => {
955
921
  if (newMetadata || __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_isNewEncryptionAvailable).call(this)) {
922
+ await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_deriveEncryptionKey).call(this, password, {
923
+ // If the vault is being upgraded, we want to ignore the metadata
924
+ // that is already in the vault, so we can effectively
925
+ // re-encrypt the vault with the new encryption config.
926
+ ignoreExistingVault: true,
927
+ });
956
928
  await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_updateVault).call(this);
957
929
  }
958
930
  });
@@ -1015,7 +987,7 @@ class KeyringController extends base_controller_1.BaseController {
1015
987
  }
1016
988
  }
1017
989
  exports.KeyringController = KeyringController;
1018
- _KeyringController_controllerOperationMutex = new WeakMap(), _KeyringController_vaultOperationMutex = new WeakMap(), _KeyringController_keyringBuilders = new WeakMap(), _KeyringController_encryptor = new WeakMap(), _KeyringController_cacheEncryptionKey = new WeakMap(), _KeyringController_keyrings = new WeakMap(), _KeyringController_unsupportedKeyrings = new WeakMap(), _KeyringController_password = new WeakMap(), _KeyringController_instances = new WeakSet(), _KeyringController_registerMessageHandlers = function _KeyringController_registerMessageHandlers() {
990
+ _KeyringController_controllerOperationMutex = new WeakMap(), _KeyringController_vaultOperationMutex = new WeakMap(), _KeyringController_keyringBuilders = new WeakMap(), _KeyringController_encryptor = new WeakMap(), _KeyringController_keyrings = new WeakMap(), _KeyringController_unsupportedKeyrings = new WeakMap(), _KeyringController_encryptionKey = new WeakMap(), _KeyringController_instances = new WeakSet(), _KeyringController_registerMessageHandlers = function _KeyringController_registerMessageHandlers() {
1019
991
  this.messenger.registerActionHandler(`${name}:signMessage`, this.signMessage.bind(this));
1020
992
  this.messenger.registerActionHandler(`${name}:signEip7702Authorization`, this.signEip7702Authorization.bind(this));
1021
993
  this.messenger.registerActionHandler(`${name}:signPersonalMessage`, this.signPersonalMessage.bind(this));
@@ -1074,10 +1046,70 @@ async function _KeyringController_createNewVaultWithKeyring(password, keyring) {
1074
1046
  delete state.encryptionKey;
1075
1047
  delete state.encryptionSalt;
1076
1048
  });
1077
- __classPrivateFieldSet(this, _KeyringController_password, password, "f");
1049
+ await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_deriveEncryptionKey).call(this, password, {
1050
+ ignoreExistingVault: true,
1051
+ });
1078
1052
  await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_clearKeyrings).call(this);
1079
1053
  await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_createKeyringWithFirstAccount).call(this, keyring.type, keyring.opts);
1080
1054
  __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_setUnlocked).call(this);
1055
+ }, _KeyringController_deriveEncryptionKey =
1056
+ /**
1057
+ * Derive the vault encryption key from the provided password, and
1058
+ * assign it to the instance variable for later use with cryptographic
1059
+ * functions.
1060
+ *
1061
+ * When the controller has a vault in its state, the key is derived
1062
+ * using the salt from the vault. If the vault is empty, a new salt
1063
+ * is generated and used to derive the key.
1064
+ *
1065
+ * If `options.ignoreExistingVault` is set to `false`, the existing
1066
+ * vault is completely ignored: the new key won't be able to decrypt
1067
+ * the existing vault, and should be used to re-encrypt it.
1068
+ *
1069
+ * @param password - The password to use for decryption or derivation.
1070
+ * @param options - Options for the key derivation.
1071
+ * @param options.ignoreExistingVault - Whether to use the existing vault salt and key metadata
1072
+ */
1073
+ async function _KeyringController_deriveEncryptionKey(password, options = {
1074
+ ignoreExistingVault: false,
1075
+ }) {
1076
+ __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertControllerMutexIsLocked).call(this);
1077
+ const { vault } = this.state;
1078
+ if (typeof password !== 'string') {
1079
+ throw new TypeError(constants_1.KeyringControllerError.WrongPasswordType);
1080
+ }
1081
+ let serializedEncryptionKey, salt;
1082
+ if (vault && !options.ignoreExistingVault) {
1083
+ // The `decryptWithDetail` method is being used here instead of
1084
+ // `keyFromPassword` + `exportKey` to let the encryptor handle
1085
+ // any legacy encryption formats and metadata that might be
1086
+ // present (or absent) in the vault.
1087
+ const { exportedKeyString, salt: existingSalt } = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").decryptWithDetail(password, vault);
1088
+ serializedEncryptionKey = exportedKeyString;
1089
+ salt = existingSalt;
1090
+ }
1091
+ else {
1092
+ salt = __classPrivateFieldGet(this, _KeyringController_encryptor, "f").generateSalt();
1093
+ serializedEncryptionKey = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").exportKey(await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").keyFromPassword(password, salt, true));
1094
+ }
1095
+ __classPrivateFieldSet(this, _KeyringController_encryptionKey, {
1096
+ salt,
1097
+ serialized: serializedEncryptionKey,
1098
+ }, "f");
1099
+ }, _KeyringController_setEncryptionKey = function _KeyringController_setEncryptionKey(encryptionKey, keyDerivationSalt) {
1100
+ __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertControllerMutexIsLocked).call(this);
1101
+ if (typeof encryptionKey !== 'string' ||
1102
+ typeof keyDerivationSalt !== 'string') {
1103
+ throw new TypeError(constants_1.KeyringControllerError.WrongEncryptionKeyType);
1104
+ }
1105
+ const { vault } = this.state;
1106
+ if (vault && JSON.parse(vault).salt !== keyDerivationSalt) {
1107
+ throw new Error(constants_1.KeyringControllerError.ExpiredCredentials);
1108
+ }
1109
+ __classPrivateFieldSet(this, _KeyringController_encryptionKey, {
1110
+ salt: keyDerivationSalt,
1111
+ serialized: encryptionKey,
1112
+ }, "f");
1081
1113
  }, _KeyringController_verifySeedPhrase =
1082
1114
  /**
1083
1115
  * Internal non-exclusive method to verify the seed phrase.
@@ -1158,7 +1190,7 @@ async function _KeyringController_getSerializedKeyrings({ includeUnsupported } =
1158
1190
  return serializedKeyrings;
1159
1191
  }, _KeyringController_getSessionState =
1160
1192
  /**
1161
- * Get a snapshot of session data held by class variables.
1193
+ * Get a snapshot of session data held by instance variables.
1162
1194
  *
1163
1195
  * @returns An object with serialized keyrings, keyrings metadata,
1164
1196
  * and the user password.
@@ -1166,7 +1198,7 @@ async function _KeyringController_getSerializedKeyrings({ includeUnsupported } =
1166
1198
  async function _KeyringController_getSessionState() {
1167
1199
  return {
1168
1200
  keyrings: await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getSerializedKeyrings).call(this),
1169
- password: __classPrivateFieldGet(this, _KeyringController_password, "f"),
1201
+ encryptionKey: __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f"),
1170
1202
  };
1171
1203
  }, _KeyringController_restoreSerializedKeyrings =
1172
1204
  /**
@@ -1195,54 +1227,27 @@ async function _KeyringController_restoreSerializedKeyrings(serializedKeyrings)
1195
1227
  * Unlock Keyrings, decrypting the vault and deserializing all
1196
1228
  * keyrings contained in it, using a password or an encryption key with salt.
1197
1229
  *
1198
- * @param password - The keyring controller password.
1199
- * @param encryptionKey - An exported key string to unlock keyrings with.
1200
- * @param encryptionSalt - The salt used to encrypt the vault.
1230
+ * @param credentials - The credentials to unlock the keyrings.
1201
1231
  * @returns A promise resolving to the deserialized keyrings array.
1202
1232
  */
1203
- async function _KeyringController_unlockKeyrings(password, encryptionKey, encryptionSalt) {
1233
+ async function _KeyringController_unlockKeyrings(credentials) {
1204
1234
  return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withVaultLock).call(this, async () => {
1205
- const encryptedVault = this.state.vault;
1206
- if (!encryptedVault) {
1235
+ if (!this.state.vault) {
1207
1236
  throw new Error(constants_1.KeyringControllerError.VaultError);
1208
1237
  }
1209
- let vault;
1210
- const updatedState = {};
1211
- if (__classPrivateFieldGet(this, _KeyringController_cacheEncryptionKey, "f")) {
1212
- assertIsExportableKeyEncryptor(__classPrivateFieldGet(this, _KeyringController_encryptor, "f"));
1213
- if (password) {
1214
- const result = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").decryptWithDetail(password, encryptedVault);
1215
- vault = result.vault;
1216
- __classPrivateFieldSet(this, _KeyringController_password, password, "f");
1217
- updatedState.encryptionKey = result.exportedKeyString;
1218
- updatedState.encryptionSalt = result.salt;
1219
- }
1220
- else {
1221
- const parsedEncryptedVault = JSON.parse(encryptedVault);
1222
- if (encryptionSalt && encryptionSalt !== parsedEncryptedVault.salt) {
1223
- throw new Error(constants_1.KeyringControllerError.ExpiredCredentials);
1224
- }
1225
- else {
1226
- encryptionSalt = parsedEncryptedVault.salt;
1227
- }
1228
- if (typeof encryptionKey !== 'string') {
1229
- throw new TypeError(constants_1.KeyringControllerError.WrongPasswordType);
1230
- }
1231
- const key = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").importKey(encryptionKey);
1232
- vault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").decryptWithKey(key, parsedEncryptedVault);
1233
- // This call is required on the first call because encryptionKey
1234
- // is not yet inside the memStore
1235
- updatedState.encryptionKey = encryptionKey;
1236
- updatedState.encryptionSalt = encryptionSalt;
1237
- }
1238
+ const parsedEncryptedVault = JSON.parse(this.state.vault);
1239
+ if ('password' in credentials) {
1240
+ await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_deriveEncryptionKey).call(this, credentials.password);
1238
1241
  }
1239
1242
  else {
1240
- if (typeof password !== 'string') {
1241
- throw new TypeError(constants_1.KeyringControllerError.WrongPasswordType);
1242
- }
1243
- vault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").decrypt(password, encryptedVault);
1244
- __classPrivateFieldSet(this, _KeyringController_password, password, "f");
1243
+ __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_setEncryptionKey).call(this, credentials.encryptionKey, credentials.encryptionSalt || parsedEncryptedVault.salt);
1245
1244
  }
1245
+ const encryptionKey = __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f")?.serialized;
1246
+ if (!encryptionKey) {
1247
+ throw new Error(constants_1.KeyringControllerError.MissingCredentials);
1248
+ }
1249
+ const key = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").importKey(encryptionKey);
1250
+ const vault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").decryptWithKey(key, parsedEncryptedVault);
1246
1251
  if (!isSerializedKeyringsArray(vault)) {
1247
1252
  throw new Error(constants_1.KeyringControllerError.VaultDataError);
1248
1253
  }
@@ -1250,10 +1255,8 @@ async function _KeyringController_unlockKeyrings(password, encryptionKey, encryp
1250
1255
  const updatedKeyrings = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getUpdatedKeyrings).call(this);
1251
1256
  this.update((state) => {
1252
1257
  state.keyrings = updatedKeyrings;
1253
- if (updatedState.encryptionKey || updatedState.encryptionSalt) {
1254
- state.encryptionKey = updatedState.encryptionKey;
1255
- state.encryptionSalt = updatedState.encryptionSalt;
1256
- }
1258
+ state.encryptionKey = encryptionKey;
1259
+ state.encryptionSalt = parsedEncryptedVault.salt;
1257
1260
  });
1258
1261
  return { keyrings, newMetadata };
1259
1262
  });
@@ -1261,57 +1264,36 @@ async function _KeyringController_unlockKeyrings(password, encryptionKey, encryp
1261
1264
  return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withVaultLock).call(this, async () => {
1262
1265
  // Ensure no duplicate accounts are persisted.
1263
1266
  await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertNoDuplicateAccounts).call(this);
1264
- const { encryptionKey, encryptionSalt, vault } = this.state;
1265
- // READ THIS CAREFULLY:
1266
- // We do check if the vault is still considered up-to-date, if not, we would not re-use the
1267
- // cached key and we will re-generate a new one (based on the password).
1268
- //
1269
- // This helps doing seamless updates of the vault. Useful in case we change some cryptographic
1270
- // parameters to the KDF.
1271
- const useCachedKey = encryptionKey && vault && __classPrivateFieldGet(this, _KeyringController_encryptor, "f").isVaultUpdated?.(vault);
1272
- if (!__classPrivateFieldGet(this, _KeyringController_password, "f") && !encryptionKey) {
1267
+ if (!__classPrivateFieldGet(this, _KeyringController_encryptionKey, "f")) {
1273
1268
  throw new Error(constants_1.KeyringControllerError.MissingCredentials);
1274
1269
  }
1275
1270
  const serializedKeyrings = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getSerializedKeyrings).call(this);
1276
1271
  if (!serializedKeyrings.some((keyring) => keyring.type === KeyringTypes.hd)) {
1277
1272
  throw new Error(constants_1.KeyringControllerError.NoHdKeyring);
1278
1273
  }
1279
- const updatedState = {};
1280
- if (__classPrivateFieldGet(this, _KeyringController_cacheEncryptionKey, "f")) {
1281
- assertIsExportableKeyEncryptor(__classPrivateFieldGet(this, _KeyringController_encryptor, "f"));
1282
- if (useCachedKey) {
1283
- const key = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").importKey(encryptionKey);
1284
- const vaultJSON = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").encryptWithKey(key, serializedKeyrings);
1285
- vaultJSON.salt = encryptionSalt;
1286
- updatedState.vault = JSON.stringify(vaultJSON);
1287
- }
1288
- else if (__classPrivateFieldGet(this, _KeyringController_password, "f")) {
1289
- const { vault: newVault, exportedKeyString } = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").encryptWithDetail(__classPrivateFieldGet(this, _KeyringController_password, "f"), serializedKeyrings);
1290
- updatedState.vault = newVault;
1291
- updatedState.encryptionKey = exportedKeyString;
1292
- }
1293
- }
1294
- else {
1295
- assertIsValidPassword(__classPrivateFieldGet(this, _KeyringController_password, "f"));
1296
- updatedState.vault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").encrypt(__classPrivateFieldGet(this, _KeyringController_password, "f"), serializedKeyrings);
1297
- }
1298
- if (!updatedState.vault) {
1299
- throw new Error(constants_1.KeyringControllerError.MissingVaultData);
1300
- }
1274
+ const key = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").importKey(__classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").serialized);
1275
+ const encryptedVault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").encryptWithKey(key, serializedKeyrings);
1276
+ // We need to include the salt used to derive
1277
+ // the encryption key, to be able to derive it
1278
+ // from password again.
1279
+ encryptedVault.salt = __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").salt;
1280
+ const updatedState = {
1281
+ vault: JSON.stringify(encryptedVault),
1282
+ encryptionKey: __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").serialized,
1283
+ encryptionSalt: __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").salt,
1284
+ };
1301
1285
  const updatedKeyrings = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getUpdatedKeyrings).call(this);
1302
1286
  this.update((state) => {
1303
1287
  state.vault = updatedState.vault;
1304
1288
  state.keyrings = updatedKeyrings;
1305
- if (updatedState.encryptionKey) {
1306
- state.encryptionKey = updatedState.encryptionKey;
1307
- state.encryptionSalt = JSON.parse(updatedState.vault).salt;
1308
- }
1289
+ state.encryptionKey = updatedState.encryptionKey;
1290
+ state.encryptionSalt = updatedState.encryptionSalt;
1309
1291
  });
1310
1292
  return true;
1311
1293
  });
1312
1294
  }, _KeyringController_isNewEncryptionAvailable = function _KeyringController_isNewEncryptionAvailable() {
1313
1295
  const { vault } = this.state;
1314
- if (!vault || !__classPrivateFieldGet(this, _KeyringController_password, "f") || !__classPrivateFieldGet(this, _KeyringController_encryptor, "f").isVaultUpdated) {
1296
+ if (!vault || !__classPrivateFieldGet(this, _KeyringController_encryptor, "f").isVaultUpdated) {
1315
1297
  return false;
1316
1298
  }
1317
1299
  return !__classPrivateFieldGet(this, _KeyringController_encryptor, "f").isVaultUpdated(vault);
@@ -1545,13 +1527,13 @@ async function _KeyringController_persistOrRollback(callback) {
1545
1527
  async function _KeyringController_withRollback(callback) {
1546
1528
  return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withControllerLock).call(this, async ({ releaseLock }) => {
1547
1529
  const currentSerializedKeyrings = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getSerializedKeyrings).call(this);
1548
- const currentPassword = __classPrivateFieldGet(this, _KeyringController_password, "f");
1530
+ const currentEncryptionKey = (0, lodash_1.cloneDeep)(__classPrivateFieldGet(this, _KeyringController_encryptionKey, "f"));
1549
1531
  try {
1550
1532
  return await callback({ releaseLock });
1551
1533
  }
1552
1534
  catch (e) {
1553
- // Keyrings and password are restored to their previous state
1554
- __classPrivateFieldSet(this, _KeyringController_password, currentPassword, "f");
1535
+ // Keyrings and encryption credentials are restored to their previous state
1536
+ __classPrivateFieldSet(this, _KeyringController_encryptionKey, currentEncryptionKey, "f");
1555
1537
  await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_restoreSerializedKeyrings).call(this, currentSerializedKeyrings);
1556
1538
  throw e;
1557
1539
  }