@metamask-previews/keyring-controller 24.0.0-preview-e2a66c7a → 24.0.0-preview-cb2e5c04
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +21 -0
- package/dist/KeyringController.cjs +117 -135
- package/dist/KeyringController.cjs.map +1 -1
- package/dist/KeyringController.d.cts +49 -29
- package/dist/KeyringController.d.cts.map +1 -1
- package/dist/KeyringController.d.mts +49 -29
- package/dist/KeyringController.d.mts.map +1 -1
- package/dist/KeyringController.mjs +118 -136
- package/dist/KeyringController.mjs.map +1 -1
- package/dist/constants.cjs +1 -0
- package/dist/constants.cjs.map +1 -1
- package/dist/constants.d.cts +1 -0
- package/dist/constants.d.cts.map +1 -1
- package/dist/constants.d.mts +1 -0
- package/dist/constants.d.mts.map +1 -1
- package/dist/constants.mjs +1 -0
- package/dist/constants.mjs.map +1 -1
- package/package.json +1 -1
package/CHANGELOG.md
CHANGED
|
@@ -7,6 +7,27 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|
|
7
7
|
|
|
8
8
|
## [Unreleased]
|
|
9
9
|
|
|
10
|
+
### Added
|
|
11
|
+
|
|
12
|
+
- Added optional `EncryptionKey`, `SupportedKeyDerivationOptions` and `EncryptionResult` type parameters to the `KeyringController`, `ExportableKeyEncryptor` and `KeyringControllerOptions` types ([#7127](https://github.com/MetaMask/core/pull/7127))
|
|
13
|
+
- This type parameter allows specifying the encryption key, key derivation options and encryption result types supported by the injected encryptor, defaulting to `@metamask/browser-passworder` types.
|
|
14
|
+
|
|
15
|
+
### Changed
|
|
16
|
+
|
|
17
|
+
- **BREAKING:** The `KeyringController` constructor options now require an encryptor ([#7127](https://github.com/MetaMask/core/pull/7127))
|
|
18
|
+
- The `encryptor` constructor option was previously optional and defaulted to an instance of `@metamask/browser-passworder`.
|
|
19
|
+
- **BREAKING:** The `GenericEncryptor` and `ExportableKeyEncryptor` types have been merged into a single `Encryptor` type ([#7127](https://github.com/MetaMask/core/pull/7127))
|
|
20
|
+
- **BREAKING:** The `Encryptor` type requires `exportKey`, `keyFromPassword` and `generateSalt` methods ([#7127](https://github.com/MetaMask/core/pull/7127))
|
|
21
|
+
|
|
22
|
+
### Removed
|
|
23
|
+
|
|
24
|
+
- **BREAKING:** The `cacheEncryptionKey` parameter has been removed from the `KeyringController` constructor options ([#7127](https://github.com/MetaMask/core/pull/7127))
|
|
25
|
+
- This parameter was previously used to enable encryption key in-memory caching, but it is no longer needed as the controller now always uses the latest encryption key.
|
|
26
|
+
|
|
27
|
+
### Fixed
|
|
28
|
+
|
|
29
|
+
- Fixed incorrect type for `decryptWithKey` method of `ExportableKeyEncryptor` ([#7127](https://github.com/MetaMask/core/pull/7127))
|
|
30
|
+
|
|
10
31
|
## [24.0.0]
|
|
11
32
|
|
|
12
33
|
### Changed
|
|
@@ -36,12 +36,11 @@ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (
|
|
|
36
36
|
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
37
37
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
38
38
|
};
|
|
39
|
-
var _KeyringController_instances, _KeyringController_controllerOperationMutex, _KeyringController_vaultOperationMutex, _KeyringController_keyringBuilders, _KeyringController_encryptor,
|
|
39
|
+
var _KeyringController_instances, _KeyringController_controllerOperationMutex, _KeyringController_vaultOperationMutex, _KeyringController_keyringBuilders, _KeyringController_encryptor, _KeyringController_keyrings, _KeyringController_unsupportedKeyrings, _KeyringController_encryptionKey, _KeyringController_registerMessageHandlers, _KeyringController_getKeyringById, _KeyringController_getKeyringByIdOrDefault, _KeyringController_getKeyringMetadata, _KeyringController_getKeyringBuilderForType, _KeyringController_createNewVaultWithKeyring, _KeyringController_deriveEncryptionKey, _KeyringController_setEncryptionKey, _KeyringController_verifySeedPhrase, _KeyringController_getUpdatedKeyrings, _KeyringController_getSerializedKeyrings, _KeyringController_getSessionState, _KeyringController_restoreSerializedKeyrings, _KeyringController_unlockKeyrings, _KeyringController_updateVault, _KeyringController_isNewEncryptionAvailable, _KeyringController_getAccountsFromKeyrings, _KeyringController_createKeyringWithFirstAccount, _KeyringController_newKeyring, _KeyringController_createKeyring, _KeyringController_clearKeyrings, _KeyringController_restoreKeyring, _KeyringController_destroyKeyring, _KeyringController_removeEmptyKeyrings, _KeyringController_assertNoDuplicateAccounts, _KeyringController_setUnlocked, _KeyringController_assertIsUnlocked, _KeyringController_persistOrRollback, _KeyringController_withRollback, _KeyringController_assertControllerMutexIsLocked, _KeyringController_withControllerLock, _KeyringController_withVaultLock;
|
|
40
40
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
41
41
|
exports.KeyringController = exports.getDefaultKeyringState = exports.keyringBuilderFactory = exports.SignTypedDataVersion = exports.AccountImportStrategy = exports.isCustodyKeyring = exports.KeyringTypes = void 0;
|
|
42
42
|
const util_1 = require("@ethereumjs/util");
|
|
43
43
|
const base_controller_1 = require("@metamask/base-controller");
|
|
44
|
-
const encryptorUtils = __importStar(require("@metamask/browser-passworder"));
|
|
45
44
|
const eth_hd_keyring_1 = require("@metamask/eth-hd-keyring");
|
|
46
45
|
const eth_sig_util_1 = require("@metamask/eth-sig-util");
|
|
47
46
|
const eth_simple_keyring_1 = __importDefault(require("@metamask/eth-simple-keyring"));
|
|
@@ -136,23 +135,6 @@ function assertHasUint8ArrayMnemonic(keyring) {
|
|
|
136
135
|
throw new Error("Can't get mnemonic bytes from keyring");
|
|
137
136
|
}
|
|
138
137
|
}
|
|
139
|
-
/**
|
|
140
|
-
* Assert that the provided encryptor supports
|
|
141
|
-
* encryption and encryption key export.
|
|
142
|
-
*
|
|
143
|
-
* @param encryptor - The encryptor to check.
|
|
144
|
-
* @throws If the encryptor does not support key encryption.
|
|
145
|
-
*/
|
|
146
|
-
function assertIsExportableKeyEncryptor(encryptor) {
|
|
147
|
-
if (!('importKey' in encryptor &&
|
|
148
|
-
typeof encryptor.importKey === 'function' &&
|
|
149
|
-
'decryptWithKey' in encryptor &&
|
|
150
|
-
typeof encryptor.decryptWithKey === 'function' &&
|
|
151
|
-
'encryptWithKey' in encryptor &&
|
|
152
|
-
typeof encryptor.encryptWithKey === 'function')) {
|
|
153
|
-
throw new Error(constants_1.KeyringControllerError.UnsupportedEncryptionKeyExport);
|
|
154
|
-
}
|
|
155
|
-
}
|
|
156
138
|
/**
|
|
157
139
|
* Assert that the provided password is a valid non-empty string.
|
|
158
140
|
*
|
|
@@ -259,7 +241,7 @@ class KeyringController extends base_controller_1.BaseController {
|
|
|
259
241
|
* @param options.state - Initial state to set on this controller.
|
|
260
242
|
*/
|
|
261
243
|
constructor(options) {
|
|
262
|
-
const { encryptor
|
|
244
|
+
const { encryptor, keyringBuilders, messenger, state } = options;
|
|
263
245
|
super({
|
|
264
246
|
name,
|
|
265
247
|
metadata: {
|
|
@@ -305,22 +287,15 @@ class KeyringController extends base_controller_1.BaseController {
|
|
|
305
287
|
_KeyringController_vaultOperationMutex.set(this, new async_mutex_1.Mutex());
|
|
306
288
|
_KeyringController_keyringBuilders.set(this, void 0);
|
|
307
289
|
_KeyringController_encryptor.set(this, void 0);
|
|
308
|
-
_KeyringController_cacheEncryptionKey.set(this, void 0);
|
|
309
290
|
_KeyringController_keyrings.set(this, void 0);
|
|
310
291
|
_KeyringController_unsupportedKeyrings.set(this, void 0);
|
|
311
|
-
|
|
292
|
+
_KeyringController_encryptionKey.set(this, void 0);
|
|
312
293
|
__classPrivateFieldSet(this, _KeyringController_keyringBuilders, keyringBuilders
|
|
313
294
|
? keyringBuilders.concat(defaultKeyringBuilders)
|
|
314
295
|
: defaultKeyringBuilders, "f");
|
|
315
296
|
__classPrivateFieldSet(this, _KeyringController_encryptor, encryptor, "f");
|
|
316
297
|
__classPrivateFieldSet(this, _KeyringController_keyrings, [], "f");
|
|
317
298
|
__classPrivateFieldSet(this, _KeyringController_unsupportedKeyrings, [], "f");
|
|
318
|
-
// This option allows the controller to cache an exported key
|
|
319
|
-
// for use in decrypting and encrypting data without password
|
|
320
|
-
__classPrivateFieldSet(this, _KeyringController_cacheEncryptionKey, Boolean(options.cacheEncryptionKey), "f");
|
|
321
|
-
if (__classPrivateFieldGet(this, _KeyringController_cacheEncryptionKey, "f")) {
|
|
322
|
-
assertIsExportableKeyEncryptor(encryptor);
|
|
323
|
-
}
|
|
324
299
|
__classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_registerMessageHandlers).call(this);
|
|
325
300
|
}
|
|
326
301
|
/**
|
|
@@ -691,7 +666,7 @@ class KeyringController extends base_controller_1.BaseController {
|
|
|
691
666
|
async setLocked() {
|
|
692
667
|
__classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertIsUnlocked).call(this);
|
|
693
668
|
return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withRollback).call(this, async () => {
|
|
694
|
-
__classPrivateFieldSet(this,
|
|
669
|
+
__classPrivateFieldSet(this, _KeyringController_encryptionKey, undefined, "f");
|
|
695
670
|
await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_clearKeyrings).call(this);
|
|
696
671
|
this.update((state) => {
|
|
697
672
|
state.isUnlocked = false;
|
|
@@ -873,22 +848,11 @@ class KeyringController extends base_controller_1.BaseController {
|
|
|
873
848
|
*/
|
|
874
849
|
changePassword(password) {
|
|
875
850
|
__classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertIsUnlocked).call(this);
|
|
876
|
-
// If the password is the same, do nothing.
|
|
877
|
-
if (__classPrivateFieldGet(this, _KeyringController_password, "f") === password) {
|
|
878
|
-
return Promise.resolve();
|
|
879
|
-
}
|
|
880
851
|
return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_persistOrRollback).call(this, async () => {
|
|
881
852
|
assertIsValidPassword(password);
|
|
882
|
-
|
|
883
|
-
|
|
884
|
-
|
|
885
|
-
// the new password.
|
|
886
|
-
if (__classPrivateFieldGet(this, _KeyringController_cacheEncryptionKey, "f")) {
|
|
887
|
-
this.update((state) => {
|
|
888
|
-
delete state.encryptionKey;
|
|
889
|
-
delete state.encryptionSalt;
|
|
890
|
-
});
|
|
891
|
-
}
|
|
853
|
+
await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_deriveEncryptionKey).call(this, password, {
|
|
854
|
+
ignoreExistingVault: true,
|
|
855
|
+
});
|
|
892
856
|
});
|
|
893
857
|
}
|
|
894
858
|
/**
|
|
@@ -902,7 +866,10 @@ class KeyringController extends base_controller_1.BaseController {
|
|
|
902
866
|
*/
|
|
903
867
|
async submitEncryptionKey(encryptionKey, encryptionSalt) {
|
|
904
868
|
const { newMetadata } = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withRollback).call(this, async () => {
|
|
905
|
-
const result = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_unlockKeyrings).call(this,
|
|
869
|
+
const result = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_unlockKeyrings).call(this, {
|
|
870
|
+
encryptionKey,
|
|
871
|
+
encryptionSalt,
|
|
872
|
+
});
|
|
906
873
|
__classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_setUnlocked).call(this);
|
|
907
874
|
return result;
|
|
908
875
|
});
|
|
@@ -929,9 +896,8 @@ class KeyringController extends base_controller_1.BaseController {
|
|
|
929
896
|
async exportEncryptionKey() {
|
|
930
897
|
__classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertIsUnlocked).call(this);
|
|
931
898
|
return await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withControllerLock).call(this, async () => {
|
|
932
|
-
|
|
933
|
-
|
|
934
|
-
return encryptionKey;
|
|
899
|
+
assertIsEncryptionKeySet(__classPrivateFieldGet(this, _KeyringController_encryptionKey, "f")?.serialized);
|
|
900
|
+
return __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").serialized;
|
|
935
901
|
});
|
|
936
902
|
}
|
|
937
903
|
/**
|
|
@@ -943,7 +909,7 @@ class KeyringController extends base_controller_1.BaseController {
|
|
|
943
909
|
*/
|
|
944
910
|
async submitPassword(password) {
|
|
945
911
|
const { newMetadata } = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withRollback).call(this, async () => {
|
|
946
|
-
const result = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_unlockKeyrings).call(this, password);
|
|
912
|
+
const result = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_unlockKeyrings).call(this, { password });
|
|
947
913
|
__classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_setUnlocked).call(this);
|
|
948
914
|
return result;
|
|
949
915
|
});
|
|
@@ -953,6 +919,12 @@ class KeyringController extends base_controller_1.BaseController {
|
|
|
953
919
|
// can attempt to upgrade the vault.
|
|
954
920
|
await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withRollback).call(this, async () => {
|
|
955
921
|
if (newMetadata || __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_isNewEncryptionAvailable).call(this)) {
|
|
922
|
+
await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_deriveEncryptionKey).call(this, password, {
|
|
923
|
+
// If the vault is being upgraded, we want to ignore the metadata
|
|
924
|
+
// that is already in the vault, so we can effectively
|
|
925
|
+
// re-encrypt the vault with the new encryption config.
|
|
926
|
+
ignoreExistingVault: true,
|
|
927
|
+
});
|
|
956
928
|
await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_updateVault).call(this);
|
|
957
929
|
}
|
|
958
930
|
});
|
|
@@ -1015,7 +987,7 @@ class KeyringController extends base_controller_1.BaseController {
|
|
|
1015
987
|
}
|
|
1016
988
|
}
|
|
1017
989
|
exports.KeyringController = KeyringController;
|
|
1018
|
-
_KeyringController_controllerOperationMutex = new WeakMap(), _KeyringController_vaultOperationMutex = new WeakMap(), _KeyringController_keyringBuilders = new WeakMap(), _KeyringController_encryptor = new WeakMap(),
|
|
990
|
+
_KeyringController_controllerOperationMutex = new WeakMap(), _KeyringController_vaultOperationMutex = new WeakMap(), _KeyringController_keyringBuilders = new WeakMap(), _KeyringController_encryptor = new WeakMap(), _KeyringController_keyrings = new WeakMap(), _KeyringController_unsupportedKeyrings = new WeakMap(), _KeyringController_encryptionKey = new WeakMap(), _KeyringController_instances = new WeakSet(), _KeyringController_registerMessageHandlers = function _KeyringController_registerMessageHandlers() {
|
|
1019
991
|
this.messenger.registerActionHandler(`${name}:signMessage`, this.signMessage.bind(this));
|
|
1020
992
|
this.messenger.registerActionHandler(`${name}:signEip7702Authorization`, this.signEip7702Authorization.bind(this));
|
|
1021
993
|
this.messenger.registerActionHandler(`${name}:signPersonalMessage`, this.signPersonalMessage.bind(this));
|
|
@@ -1074,10 +1046,70 @@ async function _KeyringController_createNewVaultWithKeyring(password, keyring) {
|
|
|
1074
1046
|
delete state.encryptionKey;
|
|
1075
1047
|
delete state.encryptionSalt;
|
|
1076
1048
|
});
|
|
1077
|
-
|
|
1049
|
+
await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_deriveEncryptionKey).call(this, password, {
|
|
1050
|
+
ignoreExistingVault: true,
|
|
1051
|
+
});
|
|
1078
1052
|
await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_clearKeyrings).call(this);
|
|
1079
1053
|
await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_createKeyringWithFirstAccount).call(this, keyring.type, keyring.opts);
|
|
1080
1054
|
__classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_setUnlocked).call(this);
|
|
1055
|
+
}, _KeyringController_deriveEncryptionKey =
|
|
1056
|
+
/**
|
|
1057
|
+
* Derive the vault encryption key from the provided password, and
|
|
1058
|
+
* assign it to the instance variable for later use with cryptographic
|
|
1059
|
+
* functions.
|
|
1060
|
+
*
|
|
1061
|
+
* When the controller has a vault in its state, the key is derived
|
|
1062
|
+
* using the salt from the vault. If the vault is empty, a new salt
|
|
1063
|
+
* is generated and used to derive the key.
|
|
1064
|
+
*
|
|
1065
|
+
* If `options.ignoreExistingVault` is set to `false`, the existing
|
|
1066
|
+
* vault is completely ignored: the new key won't be able to decrypt
|
|
1067
|
+
* the existing vault, and should be used to re-encrypt it.
|
|
1068
|
+
*
|
|
1069
|
+
* @param password - The password to use for decryption or derivation.
|
|
1070
|
+
* @param options - Options for the key derivation.
|
|
1071
|
+
* @param options.ignoreExistingVault - Whether to use the existing vault salt and key metadata
|
|
1072
|
+
*/
|
|
1073
|
+
async function _KeyringController_deriveEncryptionKey(password, options = {
|
|
1074
|
+
ignoreExistingVault: false,
|
|
1075
|
+
}) {
|
|
1076
|
+
__classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertControllerMutexIsLocked).call(this);
|
|
1077
|
+
const { vault } = this.state;
|
|
1078
|
+
if (typeof password !== 'string') {
|
|
1079
|
+
throw new TypeError(constants_1.KeyringControllerError.WrongPasswordType);
|
|
1080
|
+
}
|
|
1081
|
+
let serializedEncryptionKey, salt;
|
|
1082
|
+
if (vault && !options.ignoreExistingVault) {
|
|
1083
|
+
// The `decryptWithDetail` method is being used here instead of
|
|
1084
|
+
// `keyFromPassword` + `exportKey` to let the encryptor handle
|
|
1085
|
+
// any legacy encryption formats and metadata that might be
|
|
1086
|
+
// present (or absent) in the vault.
|
|
1087
|
+
const { exportedKeyString, salt: existingSalt } = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").decryptWithDetail(password, vault);
|
|
1088
|
+
serializedEncryptionKey = exportedKeyString;
|
|
1089
|
+
salt = existingSalt;
|
|
1090
|
+
}
|
|
1091
|
+
else {
|
|
1092
|
+
salt = __classPrivateFieldGet(this, _KeyringController_encryptor, "f").generateSalt();
|
|
1093
|
+
serializedEncryptionKey = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").exportKey(await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").keyFromPassword(password, salt, true));
|
|
1094
|
+
}
|
|
1095
|
+
__classPrivateFieldSet(this, _KeyringController_encryptionKey, {
|
|
1096
|
+
salt,
|
|
1097
|
+
serialized: serializedEncryptionKey,
|
|
1098
|
+
}, "f");
|
|
1099
|
+
}, _KeyringController_setEncryptionKey = function _KeyringController_setEncryptionKey(encryptionKey, keyDerivationSalt) {
|
|
1100
|
+
__classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertControllerMutexIsLocked).call(this);
|
|
1101
|
+
if (typeof encryptionKey !== 'string' ||
|
|
1102
|
+
typeof keyDerivationSalt !== 'string') {
|
|
1103
|
+
throw new TypeError(constants_1.KeyringControllerError.WrongEncryptionKeyType);
|
|
1104
|
+
}
|
|
1105
|
+
const { vault } = this.state;
|
|
1106
|
+
if (vault && JSON.parse(vault).salt !== keyDerivationSalt) {
|
|
1107
|
+
throw new Error(constants_1.KeyringControllerError.ExpiredCredentials);
|
|
1108
|
+
}
|
|
1109
|
+
__classPrivateFieldSet(this, _KeyringController_encryptionKey, {
|
|
1110
|
+
salt: keyDerivationSalt,
|
|
1111
|
+
serialized: encryptionKey,
|
|
1112
|
+
}, "f");
|
|
1081
1113
|
}, _KeyringController_verifySeedPhrase =
|
|
1082
1114
|
/**
|
|
1083
1115
|
* Internal non-exclusive method to verify the seed phrase.
|
|
@@ -1158,7 +1190,7 @@ async function _KeyringController_getSerializedKeyrings({ includeUnsupported } =
|
|
|
1158
1190
|
return serializedKeyrings;
|
|
1159
1191
|
}, _KeyringController_getSessionState =
|
|
1160
1192
|
/**
|
|
1161
|
-
* Get a snapshot of session data held by
|
|
1193
|
+
* Get a snapshot of session data held by instance variables.
|
|
1162
1194
|
*
|
|
1163
1195
|
* @returns An object with serialized keyrings, keyrings metadata,
|
|
1164
1196
|
* and the user password.
|
|
@@ -1166,7 +1198,7 @@ async function _KeyringController_getSerializedKeyrings({ includeUnsupported } =
|
|
|
1166
1198
|
async function _KeyringController_getSessionState() {
|
|
1167
1199
|
return {
|
|
1168
1200
|
keyrings: await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getSerializedKeyrings).call(this),
|
|
1169
|
-
|
|
1201
|
+
encryptionKey: __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f"),
|
|
1170
1202
|
};
|
|
1171
1203
|
}, _KeyringController_restoreSerializedKeyrings =
|
|
1172
1204
|
/**
|
|
@@ -1195,54 +1227,27 @@ async function _KeyringController_restoreSerializedKeyrings(serializedKeyrings)
|
|
|
1195
1227
|
* Unlock Keyrings, decrypting the vault and deserializing all
|
|
1196
1228
|
* keyrings contained in it, using a password or an encryption key with salt.
|
|
1197
1229
|
*
|
|
1198
|
-
* @param
|
|
1199
|
-
* @param encryptionKey - An exported key string to unlock keyrings with.
|
|
1200
|
-
* @param encryptionSalt - The salt used to encrypt the vault.
|
|
1230
|
+
* @param credentials - The credentials to unlock the keyrings.
|
|
1201
1231
|
* @returns A promise resolving to the deserialized keyrings array.
|
|
1202
1232
|
*/
|
|
1203
|
-
async function _KeyringController_unlockKeyrings(
|
|
1233
|
+
async function _KeyringController_unlockKeyrings(credentials) {
|
|
1204
1234
|
return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withVaultLock).call(this, async () => {
|
|
1205
|
-
|
|
1206
|
-
if (!encryptedVault) {
|
|
1235
|
+
if (!this.state.vault) {
|
|
1207
1236
|
throw new Error(constants_1.KeyringControllerError.VaultError);
|
|
1208
1237
|
}
|
|
1209
|
-
|
|
1210
|
-
|
|
1211
|
-
|
|
1212
|
-
assertIsExportableKeyEncryptor(__classPrivateFieldGet(this, _KeyringController_encryptor, "f"));
|
|
1213
|
-
if (password) {
|
|
1214
|
-
const result = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").decryptWithDetail(password, encryptedVault);
|
|
1215
|
-
vault = result.vault;
|
|
1216
|
-
__classPrivateFieldSet(this, _KeyringController_password, password, "f");
|
|
1217
|
-
updatedState.encryptionKey = result.exportedKeyString;
|
|
1218
|
-
updatedState.encryptionSalt = result.salt;
|
|
1219
|
-
}
|
|
1220
|
-
else {
|
|
1221
|
-
const parsedEncryptedVault = JSON.parse(encryptedVault);
|
|
1222
|
-
if (encryptionSalt && encryptionSalt !== parsedEncryptedVault.salt) {
|
|
1223
|
-
throw new Error(constants_1.KeyringControllerError.ExpiredCredentials);
|
|
1224
|
-
}
|
|
1225
|
-
else {
|
|
1226
|
-
encryptionSalt = parsedEncryptedVault.salt;
|
|
1227
|
-
}
|
|
1228
|
-
if (typeof encryptionKey !== 'string') {
|
|
1229
|
-
throw new TypeError(constants_1.KeyringControllerError.WrongPasswordType);
|
|
1230
|
-
}
|
|
1231
|
-
const key = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").importKey(encryptionKey);
|
|
1232
|
-
vault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").decryptWithKey(key, parsedEncryptedVault);
|
|
1233
|
-
// This call is required on the first call because encryptionKey
|
|
1234
|
-
// is not yet inside the memStore
|
|
1235
|
-
updatedState.encryptionKey = encryptionKey;
|
|
1236
|
-
updatedState.encryptionSalt = encryptionSalt;
|
|
1237
|
-
}
|
|
1238
|
+
const parsedEncryptedVault = JSON.parse(this.state.vault);
|
|
1239
|
+
if ('password' in credentials) {
|
|
1240
|
+
await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_deriveEncryptionKey).call(this, credentials.password);
|
|
1238
1241
|
}
|
|
1239
1242
|
else {
|
|
1240
|
-
|
|
1241
|
-
throw new TypeError(constants_1.KeyringControllerError.WrongPasswordType);
|
|
1242
|
-
}
|
|
1243
|
-
vault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").decrypt(password, encryptedVault);
|
|
1244
|
-
__classPrivateFieldSet(this, _KeyringController_password, password, "f");
|
|
1243
|
+
__classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_setEncryptionKey).call(this, credentials.encryptionKey, credentials.encryptionSalt || parsedEncryptedVault.salt);
|
|
1245
1244
|
}
|
|
1245
|
+
const encryptionKey = __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f")?.serialized;
|
|
1246
|
+
if (!encryptionKey) {
|
|
1247
|
+
throw new Error(constants_1.KeyringControllerError.MissingCredentials);
|
|
1248
|
+
}
|
|
1249
|
+
const key = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").importKey(encryptionKey);
|
|
1250
|
+
const vault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").decryptWithKey(key, parsedEncryptedVault);
|
|
1246
1251
|
if (!isSerializedKeyringsArray(vault)) {
|
|
1247
1252
|
throw new Error(constants_1.KeyringControllerError.VaultDataError);
|
|
1248
1253
|
}
|
|
@@ -1250,10 +1255,8 @@ async function _KeyringController_unlockKeyrings(password, encryptionKey, encryp
|
|
|
1250
1255
|
const updatedKeyrings = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getUpdatedKeyrings).call(this);
|
|
1251
1256
|
this.update((state) => {
|
|
1252
1257
|
state.keyrings = updatedKeyrings;
|
|
1253
|
-
|
|
1254
|
-
|
|
1255
|
-
state.encryptionSalt = updatedState.encryptionSalt;
|
|
1256
|
-
}
|
|
1258
|
+
state.encryptionKey = encryptionKey;
|
|
1259
|
+
state.encryptionSalt = parsedEncryptedVault.salt;
|
|
1257
1260
|
});
|
|
1258
1261
|
return { keyrings, newMetadata };
|
|
1259
1262
|
});
|
|
@@ -1261,57 +1264,36 @@ async function _KeyringController_unlockKeyrings(password, encryptionKey, encryp
|
|
|
1261
1264
|
return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withVaultLock).call(this, async () => {
|
|
1262
1265
|
// Ensure no duplicate accounts are persisted.
|
|
1263
1266
|
await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_assertNoDuplicateAccounts).call(this);
|
|
1264
|
-
|
|
1265
|
-
// READ THIS CAREFULLY:
|
|
1266
|
-
// We do check if the vault is still considered up-to-date, if not, we would not re-use the
|
|
1267
|
-
// cached key and we will re-generate a new one (based on the password).
|
|
1268
|
-
//
|
|
1269
|
-
// This helps doing seamless updates of the vault. Useful in case we change some cryptographic
|
|
1270
|
-
// parameters to the KDF.
|
|
1271
|
-
const useCachedKey = encryptionKey && vault && __classPrivateFieldGet(this, _KeyringController_encryptor, "f").isVaultUpdated?.(vault);
|
|
1272
|
-
if (!__classPrivateFieldGet(this, _KeyringController_password, "f") && !encryptionKey) {
|
|
1267
|
+
if (!__classPrivateFieldGet(this, _KeyringController_encryptionKey, "f")) {
|
|
1273
1268
|
throw new Error(constants_1.KeyringControllerError.MissingCredentials);
|
|
1274
1269
|
}
|
|
1275
1270
|
const serializedKeyrings = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getSerializedKeyrings).call(this);
|
|
1276
1271
|
if (!serializedKeyrings.some((keyring) => keyring.type === KeyringTypes.hd)) {
|
|
1277
1272
|
throw new Error(constants_1.KeyringControllerError.NoHdKeyring);
|
|
1278
1273
|
}
|
|
1279
|
-
const
|
|
1280
|
-
|
|
1281
|
-
|
|
1282
|
-
|
|
1283
|
-
|
|
1284
|
-
|
|
1285
|
-
|
|
1286
|
-
|
|
1287
|
-
|
|
1288
|
-
|
|
1289
|
-
|
|
1290
|
-
updatedState.vault = newVault;
|
|
1291
|
-
updatedState.encryptionKey = exportedKeyString;
|
|
1292
|
-
}
|
|
1293
|
-
}
|
|
1294
|
-
else {
|
|
1295
|
-
assertIsValidPassword(__classPrivateFieldGet(this, _KeyringController_password, "f"));
|
|
1296
|
-
updatedState.vault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").encrypt(__classPrivateFieldGet(this, _KeyringController_password, "f"), serializedKeyrings);
|
|
1297
|
-
}
|
|
1298
|
-
if (!updatedState.vault) {
|
|
1299
|
-
throw new Error(constants_1.KeyringControllerError.MissingVaultData);
|
|
1300
|
-
}
|
|
1274
|
+
const key = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").importKey(__classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").serialized);
|
|
1275
|
+
const encryptedVault = await __classPrivateFieldGet(this, _KeyringController_encryptor, "f").encryptWithKey(key, serializedKeyrings);
|
|
1276
|
+
// We need to include the salt used to derive
|
|
1277
|
+
// the encryption key, to be able to derive it
|
|
1278
|
+
// from password again.
|
|
1279
|
+
encryptedVault.salt = __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").salt;
|
|
1280
|
+
const updatedState = {
|
|
1281
|
+
vault: JSON.stringify(encryptedVault),
|
|
1282
|
+
encryptionKey: __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").serialized,
|
|
1283
|
+
encryptionSalt: __classPrivateFieldGet(this, _KeyringController_encryptionKey, "f").salt,
|
|
1284
|
+
};
|
|
1301
1285
|
const updatedKeyrings = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getUpdatedKeyrings).call(this);
|
|
1302
1286
|
this.update((state) => {
|
|
1303
1287
|
state.vault = updatedState.vault;
|
|
1304
1288
|
state.keyrings = updatedKeyrings;
|
|
1305
|
-
|
|
1306
|
-
|
|
1307
|
-
state.encryptionSalt = JSON.parse(updatedState.vault).salt;
|
|
1308
|
-
}
|
|
1289
|
+
state.encryptionKey = updatedState.encryptionKey;
|
|
1290
|
+
state.encryptionSalt = updatedState.encryptionSalt;
|
|
1309
1291
|
});
|
|
1310
1292
|
return true;
|
|
1311
1293
|
});
|
|
1312
1294
|
}, _KeyringController_isNewEncryptionAvailable = function _KeyringController_isNewEncryptionAvailable() {
|
|
1313
1295
|
const { vault } = this.state;
|
|
1314
|
-
if (!vault || !__classPrivateFieldGet(this,
|
|
1296
|
+
if (!vault || !__classPrivateFieldGet(this, _KeyringController_encryptor, "f").isVaultUpdated) {
|
|
1315
1297
|
return false;
|
|
1316
1298
|
}
|
|
1317
1299
|
return !__classPrivateFieldGet(this, _KeyringController_encryptor, "f").isVaultUpdated(vault);
|
|
@@ -1545,13 +1527,13 @@ async function _KeyringController_persistOrRollback(callback) {
|
|
|
1545
1527
|
async function _KeyringController_withRollback(callback) {
|
|
1546
1528
|
return __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_withControllerLock).call(this, async ({ releaseLock }) => {
|
|
1547
1529
|
const currentSerializedKeyrings = await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_getSerializedKeyrings).call(this);
|
|
1548
|
-
const
|
|
1530
|
+
const currentEncryptionKey = (0, lodash_1.cloneDeep)(__classPrivateFieldGet(this, _KeyringController_encryptionKey, "f"));
|
|
1549
1531
|
try {
|
|
1550
1532
|
return await callback({ releaseLock });
|
|
1551
1533
|
}
|
|
1552
1534
|
catch (e) {
|
|
1553
|
-
// Keyrings and
|
|
1554
|
-
__classPrivateFieldSet(this,
|
|
1535
|
+
// Keyrings and encryption credentials are restored to their previous state
|
|
1536
|
+
__classPrivateFieldSet(this, _KeyringController_encryptionKey, currentEncryptionKey, "f");
|
|
1555
1537
|
await __classPrivateFieldGet(this, _KeyringController_instances, "m", _KeyringController_restoreSerializedKeyrings).call(this, currentSerializedKeyrings);
|
|
1556
1538
|
throw e;
|
|
1557
1539
|
}
|