1use std::{
16 collections::{BTreeMap, HashMap},
17 sync::{Arc, RwLock},
18};
19
20use async_trait::async_trait;
21use gloo_utils::format::JsValueSerdeExt;
22use hkdf::Hkdf;
23use indexed_db_futures::{
24 KeyRange,
25 cursor::Cursor,
26 database::Database,
27 internals::SystemRepr,
28 object_store::ObjectStore,
29 prelude::*,
30 transaction::{Transaction, TransactionMode},
31};
32use js_sys::Array;
33use matrix_sdk_base::cross_process_lock::{
34 CrossProcessLockGeneration, FIRST_CROSS_PROCESS_LOCK_GENERATION,
35};
36use matrix_sdk_crypto::{
37 Account, DeviceData, GossipRequest, GossippedSecret, SecretInfo, TrackedUser, UserIdentityData,
38 olm::{
39 Curve25519PublicKey, InboundGroupSession, OlmMessageHash, OutboundGroupSession,
40 PickledInboundGroupSession, PrivateCrossSigningIdentity, SenderDataType, Session,
41 StaticAccountData,
42 },
43 store::{
44 CryptoStore, CryptoStoreError,
45 types::{
46 BackupKeys, Changes, DehydratedDeviceKey, PendingChanges, RoomKeyCounts,
47 RoomKeyWithheldEntry, RoomPendingKeyBundleDetails, RoomSettings,
48 StoredRoomKeyBundleData,
49 },
50 },
51 vodozemac::base64_encode,
52};
53use matrix_sdk_store_encryption::StoreCipher;
54use ruma::{
55 DeviceId, MilliSecondsSinceUnixEpoch, OwnedDeviceId, RoomId, TransactionId, UserId,
56 events::secret::request::SecretName,
57};
58use serde::{Deserialize, Serialize};
59use sha2::Sha256;
60use tokio::sync::Mutex;
61use tracing::{debug, warn};
62use wasm_bindgen::JsValue;
63
64use crate::{
65 crypto_store::migrations::open_and_upgrade_db,
66 error::GenericError,
67 serializer::{MaybeEncrypted, SafeEncodeSerializer, SafeEncodeSerializerError},
68};
69
70mod migrations;
71
72mod keys {
73 pub const CORE: &str = "core";
75
76 pub const SESSION: &str = "session";
77
78 pub const INBOUND_GROUP_SESSIONS_V3: &str = "inbound_group_sessions3";
79 pub const INBOUND_GROUP_SESSIONS_BACKUP_INDEX: &str = "backup";
80 pub const INBOUND_GROUP_SESSIONS_BACKED_UP_TO_INDEX: &str = "backed_up_to";
81 pub const INBOUND_GROUP_SESSIONS_SENDER_KEY_INDEX: &str =
82 "inbound_group_session_sender_key_sender_data_type_idx";
83
84 pub const OUTBOUND_GROUP_SESSIONS: &str = "outbound_group_sessions";
85
86 pub const TRACKED_USERS: &str = "tracked_users";
87 pub const OLM_HASHES: &str = "olm_hashes";
88
89 pub const DEVICES: &str = "devices";
90 pub const IDENTITIES: &str = "identities";
91
92 pub const GOSSIP_REQUESTS: &str = "gossip_requests";
93 pub const GOSSIP_REQUESTS_UNSENT_INDEX: &str = "unsent";
94 pub const GOSSIP_REQUESTS_BY_INFO_INDEX: &str = "by_info";
95
96 pub const ROOM_SETTINGS: &str = "room_settings";
97
98 pub const SECRETS_INBOX: &str = "secrets_inbox";
99
100 pub const WITHHELD_SESSIONS: &str = "withheld_sessions";
101
102 pub const RECEIVED_ROOM_KEY_BUNDLES: &str = "received_room_key_bundles";
103
104 pub const LEASE_LOCKS: &str = "lease_locks";
105
106 pub const ROOM_KEY_BACKUPS_FULLY_DOWNLOADED: &str = "room_key_backups_fully_downloaded";
107 pub const ROOMS_PENDING_KEY_BUNDLE: &str = "rooms_pending_key_bundle";
108
109 pub const STORE_CIPHER: &str = "store_cipher";
111 pub const ACCOUNT: &str = "account";
112 pub const NEXT_BATCH_TOKEN: &str = "next_batch_token";
113 pub const PRIVATE_IDENTITY: &str = "private_identity";
114
115 pub const BACKUP_KEYS: &str = "backup_keys";
117
118 pub const BACKUP_VERSION_V1: &str = "backup_version_v1";
121
122 pub const RECOVERY_KEY_V1: &str = "recovery_key_v1";
128
129 pub const DEHYDRATION_PICKLE_KEY: &str = "dehydration_pickle_key";
131}
132
133pub struct IndexeddbCryptoStore {
138 static_account: RwLock<Option<StaticAccountData>>,
139 name: String,
140 pub(crate) inner: Database,
141
142 serializer: SafeEncodeSerializer,
143 save_changes_lock: Arc<Mutex<()>>,
144}
145
146#[cfg(not(tarpaulin_include))]
147impl std::fmt::Debug for IndexeddbCryptoStore {
148 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
149 f.debug_struct("IndexeddbCryptoStore").field("name", &self.name).finish()
150 }
151}
152
153#[derive(Debug, thiserror::Error)]
154pub enum IndexeddbCryptoStoreError {
155 #[error(transparent)]
156 Serialization(#[from] serde_json::Error),
157 #[error("DomException {name} ({code}): {message}")]
158 DomException {
159 code: u16,
161 name: String,
163 message: String,
165 },
166 #[error(transparent)]
167 CryptoStoreError(#[from] CryptoStoreError),
168 #[error(
169 "The schema version of the crypto store is too new. \
170 Existing version: {current_version}; max supported version: {max_supported_version}"
171 )]
172 SchemaTooNewError { max_supported_version: u32, current_version: u32 },
173}
174
175impl From<SafeEncodeSerializerError> for IndexeddbCryptoStoreError {
176 fn from(value: SafeEncodeSerializerError) -> Self {
177 match value {
178 SafeEncodeSerializerError::Serialization(error) => Self::Serialization(error),
179 SafeEncodeSerializerError::DomException { code, name, message } => {
180 Self::DomException { code, name, message }
181 }
182 SafeEncodeSerializerError::CryptoStoreError(crypto_store_error) => {
183 Self::CryptoStoreError(crypto_store_error)
184 }
185 }
186 }
187}
188
189impl From<web_sys::DomException> for IndexeddbCryptoStoreError {
190 fn from(frm: web_sys::DomException) -> IndexeddbCryptoStoreError {
191 IndexeddbCryptoStoreError::DomException {
192 name: frm.name(),
193 message: frm.message(),
194 code: frm.code(),
195 }
196 }
197}
198
199impl From<serde_wasm_bindgen::Error> for IndexeddbCryptoStoreError {
200 fn from(e: serde_wasm_bindgen::Error) -> Self {
201 IndexeddbCryptoStoreError::Serialization(serde::de::Error::custom(e.to_string()))
202 }
203}
204
205impl From<IndexeddbCryptoStoreError> for CryptoStoreError {
206 fn from(frm: IndexeddbCryptoStoreError) -> CryptoStoreError {
207 match frm {
208 IndexeddbCryptoStoreError::Serialization(e) => CryptoStoreError::Serialization(e),
209 IndexeddbCryptoStoreError::CryptoStoreError(e) => e,
210 _ => CryptoStoreError::backend(frm),
211 }
212 }
213}
214
215impl From<indexed_db_futures::error::DomException> for IndexeddbCryptoStoreError {
216 fn from(value: indexed_db_futures::error::DomException) -> Self {
217 web_sys::DomException::from(value).into()
218 }
219}
220
221impl From<indexed_db_futures::error::SerialisationError> for IndexeddbCryptoStoreError {
222 fn from(value: indexed_db_futures::error::SerialisationError) -> Self {
223 Self::Serialization(serde::de::Error::custom(value.to_string()))
224 }
225}
226
227impl From<indexed_db_futures::error::UnexpectedDataError> for IndexeddbCryptoStoreError {
228 fn from(value: indexed_db_futures::error::UnexpectedDataError) -> Self {
229 Self::CryptoStoreError(CryptoStoreError::backend(value))
230 }
231}
232
233impl From<GenericError> for IndexeddbCryptoStoreError {
234 fn from(value: GenericError) -> Self {
235 Self::CryptoStoreError(value.into())
236 }
237}
238
239impl From<indexed_db_futures::error::JSError> for IndexeddbCryptoStoreError {
240 fn from(value: indexed_db_futures::error::JSError) -> Self {
241 GenericError::from(value.to_string()).into()
242 }
243}
244
245impl From<indexed_db_futures::error::Error> for IndexeddbCryptoStoreError {
246 fn from(value: indexed_db_futures::error::Error) -> Self {
247 use indexed_db_futures::error::Error;
248 match value {
249 Error::DomException(e) => e.into(),
250 Error::Serialisation(e) => e.into(),
251 Error::MissingData(e) => e.into(),
252 Error::Unknown(e) => e.into(),
253 }
254 }
255}
256
257impl From<indexed_db_futures::error::OpenDbError> for IndexeddbCryptoStoreError {
258 fn from(value: indexed_db_futures::error::OpenDbError) -> Self {
259 use indexed_db_futures::error::OpenDbError;
260 match value {
261 OpenDbError::Base(error) => error.into(),
262 _ => GenericError::from(value.to_string()).into(),
263 }
264 }
265}
266
267type Result<A, E = IndexeddbCryptoStoreError> = std::result::Result<A, E>;
268
269enum PendingOperation {
271 Put { key: JsValue, value: JsValue },
272 Delete(JsValue),
273}
274
275struct PendingIndexeddbChanges {
281 store_to_key_values: BTreeMap<&'static str, Vec<PendingOperation>>,
284}
285
286struct PendingStoreChanges<'a> {
288 operations: &'a mut Vec<PendingOperation>,
289}
290
291impl PendingStoreChanges<'_> {
292 fn put(&mut self, key: JsValue, value: JsValue) {
293 self.operations.push(PendingOperation::Put { key, value });
294 }
295
296 fn delete(&mut self, key: JsValue) {
297 self.operations.push(PendingOperation::Delete(key));
298 }
299}
300
301impl PendingIndexeddbChanges {
302 fn get(&mut self, store: &'static str) -> PendingStoreChanges<'_> {
303 PendingStoreChanges { operations: self.store_to_key_values.entry(store).or_default() }
304 }
305}
306
307impl PendingIndexeddbChanges {
308 fn new() -> Self {
309 Self { store_to_key_values: BTreeMap::new() }
310 }
311
312 fn touched_stores(&self) -> Vec<&str> {
316 self.store_to_key_values
317 .iter()
318 .filter_map(
319 |(store, pending_operations)| {
320 if !pending_operations.is_empty() { Some(*store) } else { None }
321 },
322 )
323 .collect()
324 }
325
326 fn apply(self, tx: &Transaction<'_>) -> Result<()> {
328 for (store, operations) in self.store_to_key_values {
329 if operations.is_empty() {
330 continue;
331 }
332 let object_store = tx.object_store(store)?;
333 for op in operations {
334 match op {
335 PendingOperation::Put { key, value } => {
336 object_store.put(&value).with_key(key).build()?;
337 }
338 PendingOperation::Delete(key) => {
339 object_store.delete(&key).build()?;
340 }
341 }
342 }
343 }
344 Ok(())
345 }
346}
347
348impl IndexeddbCryptoStore {
349 pub(crate) async fn open_with_store_cipher(
350 prefix: &str,
351 store_cipher: Option<Arc<StoreCipher>>,
352 ) -> Result<Self> {
353 let name = format!("{prefix:0}::matrix-sdk-crypto");
354
355 let serializer = SafeEncodeSerializer::new(store_cipher);
356 debug!("IndexedDbCryptoStore: opening main store {name}");
357 let db = open_and_upgrade_db(&name, &serializer).await?;
358
359 Ok(Self {
360 name,
361 inner: db,
362 serializer,
363 static_account: RwLock::new(None),
364 save_changes_lock: Default::default(),
365 })
366 }
367
368 pub async fn open() -> Result<Self> {
370 IndexeddbCryptoStore::open_with_store_cipher("crypto", None).await
371 }
372
373 pub async fn open_with_passphrase(prefix: &str, passphrase: &str) -> Result<Self> {
390 let db = open_meta_db(prefix).await?;
391 let store_cipher = load_store_cipher(&db).await?;
392
393 let store_cipher = match store_cipher {
394 Some(cipher) => {
395 debug!("IndexedDbCryptoStore: decrypting store cipher");
396 StoreCipher::import(passphrase, &cipher)
397 .map_err(|_| CryptoStoreError::UnpicklingError)?
398 }
399 None => {
400 debug!("IndexedDbCryptoStore: encrypting new store cipher");
401 let cipher = StoreCipher::new().map_err(CryptoStoreError::backend)?;
402 #[cfg(not(test))]
403 let export = cipher.export(passphrase);
404 #[cfg(test)]
405 let export = cipher._insecure_export_fast_for_testing(passphrase);
406
407 let export = export.map_err(CryptoStoreError::backend)?;
408
409 save_store_cipher(&db, &export).await?;
410 cipher
411 }
412 };
413
414 db.close();
417
418 IndexeddbCryptoStore::open_with_store_cipher(prefix, Some(store_cipher.into())).await
419 }
420
421 pub async fn open_with_key(prefix: &str, key: &[u8; 32]) -> Result<Self> {
437 let mut chacha_key = zeroize::Zeroizing::new([0u8; 32]);
440 const HKDF_INFO: &[u8] = b"CRYPTOSTORE_CIPHER";
441 let hkdf = Hkdf::<Sha256>::new(None, key);
442 hkdf.expand(HKDF_INFO, &mut *chacha_key)
443 .expect("We should be able to generate a 32-byte key");
444
445 let db = open_meta_db(prefix).await?;
446 let store_cipher = load_store_cipher(&db).await?;
447
448 let store_cipher = match store_cipher {
449 Some(cipher) => {
450 debug!("IndexedDbCryptoStore: decrypting store cipher");
451 import_store_cipher_with_key(&chacha_key, key, &cipher, &db).await?
452 }
453 None => {
454 debug!("IndexedDbCryptoStore: encrypting new store cipher");
455 let cipher = StoreCipher::new().map_err(CryptoStoreError::backend)?;
456 let export =
457 cipher.export_with_key(&chacha_key).map_err(CryptoStoreError::backend)?;
458 save_store_cipher(&db, &export).await?;
459 cipher
460 }
461 };
462
463 db.close();
466
467 IndexeddbCryptoStore::open_with_store_cipher(prefix, Some(store_cipher.into())).await
468 }
469
470 pub async fn open_with_name(name: &str) -> Result<Self> {
472 IndexeddbCryptoStore::open_with_store_cipher(name, None).await
473 }
474
475 #[cfg(test)]
477 pub fn delete_stores(prefix: &str) -> Result<()> {
478 Database::delete_by_name(&format!("{prefix:0}::matrix-sdk-crypto-meta"))?;
479 Database::delete_by_name(&format!("{prefix:0}::matrix-sdk-crypto"))?;
480 Ok(())
481 }
482
483 fn get_static_account(&self) -> Option<StaticAccountData> {
484 self.static_account.read().unwrap().clone()
485 }
486
487 async fn serialize_inbound_group_session(
490 &self,
491 session: &InboundGroupSession,
492 ) -> Result<JsValue> {
493 let obj =
494 InboundGroupSessionIndexedDbObject::from_session(session, &self.serializer).await?;
495 Ok(serde_wasm_bindgen::to_value(&obj)?)
496 }
497
498 fn deserialize_inbound_group_session(
501 &self,
502 stored_value: JsValue,
503 ) -> Result<InboundGroupSession> {
504 let idb_object: InboundGroupSessionIndexedDbObject =
505 serde_wasm_bindgen::from_value(stored_value)?;
506 let pickled_session: PickledInboundGroupSession =
507 self.serializer.maybe_decrypt_value(idb_object.pickled_session)?;
508 let session = InboundGroupSession::from_pickle(pickled_session)
509 .map_err(|e| IndexeddbCryptoStoreError::CryptoStoreError(e.into()))?;
510
511 if idb_object.needs_backup {
515 session.reset_backup_state();
516 } else {
517 session.mark_as_backed_up();
518 }
519
520 Ok(session)
521 }
522
523 fn serialize_gossip_request(&self, gossip_request: &GossipRequest) -> Result<JsValue> {
526 let obj = GossipRequestIndexedDbObject {
527 info: self
529 .serializer
530 .encode_key_as_string(keys::GOSSIP_REQUESTS, gossip_request.info.as_key()),
531
532 request: self.serializer.serialize_value_as_bytes(gossip_request)?,
534
535 unsent: !gossip_request.sent_out,
536 };
537
538 Ok(serde_wasm_bindgen::to_value(&obj)?)
539 }
540
541 fn deserialize_gossip_request(&self, stored_request: JsValue) -> Result<GossipRequest> {
544 let idb_object: GossipRequestIndexedDbObject =
545 serde_wasm_bindgen::from_value(stored_request)?;
546 Ok(self.serializer.deserialize_value_from_bytes(&idb_object.request)?)
547 }
548
549 async fn prepare_for_transaction(&self, changes: &Changes) -> Result<PendingIndexeddbChanges> {
556 let mut indexeddb_changes = PendingIndexeddbChanges::new();
557
558 let private_identity_pickle =
559 if let Some(i) = &changes.private_identity { Some(i.pickle().await) } else { None };
560
561 let decryption_key_pickle = &changes.backup_decryption_key;
562 let backup_version = &changes.backup_version;
563 let dehydration_pickle_key = &changes.dehydrated_device_pickle_key;
564
565 let mut core = indexeddb_changes.get(keys::CORE);
566 if let Some(next_batch) = &changes.next_batch_token {
567 core.put(
568 JsValue::from_str(keys::NEXT_BATCH_TOKEN),
569 self.serializer.serialize_value(next_batch)?,
570 );
571 }
572
573 if let Some(i) = &private_identity_pickle {
574 core.put(
575 JsValue::from_str(keys::PRIVATE_IDENTITY),
576 self.serializer.serialize_value(i)?,
577 );
578 }
579
580 if let Some(i) = &dehydration_pickle_key {
581 core.put(
582 JsValue::from_str(keys::DEHYDRATION_PICKLE_KEY),
583 self.serializer.serialize_value(i)?,
584 );
585 }
586
587 if let Some(a) = &decryption_key_pickle {
588 indexeddb_changes.get(keys::BACKUP_KEYS).put(
589 JsValue::from_str(keys::RECOVERY_KEY_V1),
590 self.serializer.serialize_value(&a)?,
591 );
592 }
593
594 if let Some(a) = &backup_version {
595 indexeddb_changes.get(keys::BACKUP_KEYS).put(
596 JsValue::from_str(keys::BACKUP_VERSION_V1),
597 self.serializer.serialize_value(&a)?,
598 );
599 }
600
601 if !changes.sessions.is_empty() {
602 let mut sessions = indexeddb_changes.get(keys::SESSION);
603
604 for session in &changes.sessions {
605 let sender_key = session.sender_key().to_base64();
606 let session_id = session.session_id();
607
608 let pickle = session.pickle().await;
609 let key = self.serializer.encode_key(keys::SESSION, (&sender_key, session_id));
610
611 sessions.put(key, self.serializer.serialize_value(&pickle)?);
612 }
613 }
614
615 if !changes.inbound_group_sessions.is_empty() {
616 let mut sessions = indexeddb_changes.get(keys::INBOUND_GROUP_SESSIONS_V3);
617
618 for session in &changes.inbound_group_sessions {
619 let room_id = session.room_id();
620 let session_id = session.session_id();
621 let key = self
622 .serializer
623 .encode_key(keys::INBOUND_GROUP_SESSIONS_V3, (room_id, session_id));
624 let value = self.serialize_inbound_group_session(session).await?;
625 sessions.put(key, value);
626 }
627 }
628
629 if !changes.outbound_group_sessions.is_empty() {
630 let mut sessions = indexeddb_changes.get(keys::OUTBOUND_GROUP_SESSIONS);
631
632 for session in &changes.outbound_group_sessions {
633 let room_id = session.room_id();
634 let pickle = session.pickle().await;
635 sessions.put(
636 self.serializer.encode_key(keys::OUTBOUND_GROUP_SESSIONS, room_id),
637 self.serializer.serialize_value(&pickle)?,
638 );
639 }
640 }
641
642 let device_changes = &changes.devices;
643 let identity_changes = &changes.identities;
644 let olm_hashes = &changes.message_hashes;
645 let key_requests = &changes.key_requests;
646 let withheld_session_info = &changes.withheld_session_info;
647 let room_settings_changes = &changes.room_settings;
648
649 let mut device_store = indexeddb_changes.get(keys::DEVICES);
650
651 for device in device_changes.new.iter().chain(&device_changes.changed) {
652 let key =
653 self.serializer.encode_key(keys::DEVICES, (device.user_id(), device.device_id()));
654 let device = self.serializer.serialize_value(&device)?;
655
656 device_store.put(key, device);
657 }
658
659 for device in &device_changes.deleted {
660 let key =
661 self.serializer.encode_key(keys::DEVICES, (device.user_id(), device.device_id()));
662 device_store.delete(key);
663 }
664
665 if !identity_changes.changed.is_empty() || !identity_changes.new.is_empty() {
666 let mut identities = indexeddb_changes.get(keys::IDENTITIES);
667 for identity in identity_changes.changed.iter().chain(&identity_changes.new) {
668 identities.put(
669 self.serializer.encode_key(keys::IDENTITIES, identity.user_id()),
670 self.serializer.serialize_value(&identity)?,
671 );
672 }
673 }
674
675 if !olm_hashes.is_empty() {
676 let mut hashes = indexeddb_changes.get(keys::OLM_HASHES);
677 for hash in olm_hashes {
678 hashes.put(
679 self.serializer.encode_key(keys::OLM_HASHES, (&hash.sender_key, &hash.hash)),
680 JsValue::TRUE,
681 );
682 }
683 }
684
685 if !key_requests.is_empty() {
686 let mut gossip_requests = indexeddb_changes.get(keys::GOSSIP_REQUESTS);
687
688 for gossip_request in key_requests {
689 let key_request_id = self
690 .serializer
691 .encode_key(keys::GOSSIP_REQUESTS, gossip_request.request_id.as_str());
692 let key_request_value = self.serialize_gossip_request(gossip_request)?;
693 gossip_requests.put(key_request_id, key_request_value);
694 }
695 }
696
697 if !withheld_session_info.is_empty() {
698 let mut withhelds = indexeddb_changes.get(keys::WITHHELD_SESSIONS);
699
700 for (room_id, data) in withheld_session_info {
701 for (session_id, event) in data {
702 let key =
703 self.serializer.encode_key(keys::WITHHELD_SESSIONS, (&room_id, session_id));
704 withhelds.put(key, self.serializer.serialize_value(&event)?);
705 }
706 }
707 }
708
709 if !room_settings_changes.is_empty() {
710 let mut settings_store = indexeddb_changes.get(keys::ROOM_SETTINGS);
711
712 for (room_id, settings) in room_settings_changes {
713 let key = self.serializer.encode_key(keys::ROOM_SETTINGS, room_id);
714 let value = self.serializer.serialize_value(&settings)?;
715 settings_store.put(key, value);
716 }
717 }
718
719 if !changes.secrets.is_empty() {
720 let mut secret_store = indexeddb_changes.get(keys::SECRETS_INBOX);
721
722 for secret in &changes.secrets {
723 let key = self.serializer.encode_key(
724 keys::SECRETS_INBOX,
725 (secret.secret_name.as_str(), secret.event.content.request_id.as_str()),
726 );
727 let value = self.serializer.serialize_value(&secret)?;
728
729 secret_store.put(key, value);
730 }
731 }
732
733 if !changes.received_room_key_bundles.is_empty() {
734 let mut bundle_store = indexeddb_changes.get(keys::RECEIVED_ROOM_KEY_BUNDLES);
735 for bundle in &changes.received_room_key_bundles {
736 let key = self.serializer.encode_key(
737 keys::RECEIVED_ROOM_KEY_BUNDLES,
738 (&bundle.bundle_data.room_id, &bundle.sender_user),
739 );
740 let value = self.serializer.serialize_value(&bundle)?;
741 bundle_store.put(key, value);
742 }
743 }
744
745 if !changes.room_key_backups_fully_downloaded.is_empty() {
746 let mut room_store = indexeddb_changes.get(keys::ROOM_KEY_BACKUPS_FULLY_DOWNLOADED);
747 for room_id in &changes.room_key_backups_fully_downloaded {
748 room_store.put(
749 self.serializer.encode_key(keys::ROOM_KEY_BACKUPS_FULLY_DOWNLOADED, room_id),
750 JsValue::TRUE,
751 );
752 }
753 }
754
755 if !changes.rooms_pending_key_bundle.is_empty() {
756 let mut room_store = indexeddb_changes.get(keys::ROOMS_PENDING_KEY_BUNDLE);
757 for (room_id, details) in &changes.rooms_pending_key_bundle {
758 let key = self.serializer.encode_key(keys::ROOMS_PENDING_KEY_BUNDLE, room_id);
759 if let Some(details) = details {
760 let value = self.serializer.serialize_value(details)?;
761 room_store.put(key, value);
762 } else {
763 room_store.delete(key);
764 }
765 }
766 }
767
768 Ok(indexeddb_changes)
769 }
770}
771
772#[cfg(target_family = "wasm")]
781macro_rules! impl_crypto_store {
782 ( $($body:tt)* ) => {
783 #[async_trait(?Send)]
784 impl CryptoStore for IndexeddbCryptoStore {
785 type Error = IndexeddbCryptoStoreError;
786
787 $($body)*
788 }
789 };
790}
791
792#[cfg(not(target_family = "wasm"))]
793macro_rules! impl_crypto_store {
794 ( $($body:tt)* ) => {
795 impl IndexeddbCryptoStore {
796 $($body)*
797 }
798 };
799}
800
801impl_crypto_store! {
802 async fn save_pending_changes(&self, changes: PendingChanges) -> Result<()> {
803 let _guard = self.save_changes_lock.lock().await;
808
809 let stores: Vec<&str> = [(changes.account.is_some(), keys::CORE)]
810 .iter()
811 .filter_map(|(id, key)| if *id { Some(*key) } else { None })
812 .collect();
813
814 if stores.is_empty() {
815 return Ok(());
817 }
818
819 let tx = self.inner.transaction(stores).with_mode(TransactionMode::Readwrite).build()?;
820
821 let account_pickle = if let Some(account) = changes.account {
822 *self.static_account.write().unwrap() = Some(account.static_data().clone());
823 Some(account.pickle())
824 } else {
825 None
826 };
827
828 if let Some(a) = &account_pickle {
829 tx.object_store(keys::CORE)?
830 .put(&self.serializer.serialize_value(&a)?)
831 .with_key(JsValue::from_str(keys::ACCOUNT))
832 .build()?;
833 }
834
835 tx.commit().await?;
836
837 Ok(())
838 }
839
840 async fn save_changes(&self, changes: Changes) -> Result<()> {
841 let _guard = self.save_changes_lock.lock().await;
846
847 let indexeddb_changes = self.prepare_for_transaction(&changes).await?;
848
849 let stores = indexeddb_changes.touched_stores();
850
851 if stores.is_empty() {
852 return Ok(());
854 }
855
856 let tx = self.inner.transaction(stores).with_mode(TransactionMode::Readwrite).build()?;
857
858 indexeddb_changes.apply(&tx)?;
859
860 tx.commit().await?;
861
862 Ok(())
863 }
864
865 async fn save_inbound_group_sessions(
866 &self,
867 sessions: Vec<InboundGroupSession>,
868 backed_up_to_version: Option<&str>,
869 ) -> Result<()> {
870 sessions.iter().for_each(|s| {
872 let backed_up = s.backed_up();
873 if backed_up != backed_up_to_version.is_some() {
874 warn!(
875 backed_up,
876 backed_up_to_version,
877 "Session backed-up flag does not correspond to backup version setting",
878 );
879 }
880 });
881
882 self.save_changes(Changes { inbound_group_sessions: sessions, ..Changes::default() }).await
885 }
886
887 async fn load_tracked_users(&self) -> Result<Vec<TrackedUser>> {
888 let tx = self
889 .inner
890 .transaction(keys::TRACKED_USERS)
891 .with_mode(TransactionMode::Readonly)
892 .build()?;
893 let os = tx.object_store(keys::TRACKED_USERS)?;
894 let user_ids = os.get_all_keys::<JsValue>().await?;
895
896 let mut users = Vec::new();
897
898 for result in user_ids {
899 let user_id = result?;
900 let dirty: bool = !matches!(
901 os.get(&user_id).await?.map(|v: JsValue| v.into_serde()),
902 Some(Ok(false))
903 );
904 let Some(Ok(user_id)) = user_id.as_string().map(UserId::parse) else { continue };
905
906 users.push(TrackedUser { user_id, dirty });
907 }
908
909 Ok(users)
910 }
911
912 async fn get_outbound_group_session(
913 &self,
914 room_id: &RoomId,
915 ) -> Result<Option<OutboundGroupSession>> {
916 let account_info = self.get_static_account().ok_or(CryptoStoreError::AccountUnset)?;
917 if let Some(value) = self
918 .inner
919 .transaction(keys::OUTBOUND_GROUP_SESSIONS)
920 .with_mode(TransactionMode::Readonly)
921 .build()?
922 .object_store(keys::OUTBOUND_GROUP_SESSIONS)?
923 .get(&self.serializer.encode_key(keys::OUTBOUND_GROUP_SESSIONS, room_id))
924 .await?
925 {
926 Ok(Some(
927 OutboundGroupSession::from_pickle(
928 account_info.device_id,
929 account_info.identity_keys,
930 self.serializer.deserialize_value(value)?,
931 )
932 .map_err(CryptoStoreError::from)?,
933 ))
934 } else {
935 Ok(None)
936 }
937 }
938
939 async fn get_outgoing_secret_requests(
940 &self,
941 request_id: &TransactionId,
942 ) -> Result<Option<GossipRequest>> {
943 let jskey = self.serializer.encode_key(keys::GOSSIP_REQUESTS, request_id.as_str());
944 self.inner
945 .transaction(keys::GOSSIP_REQUESTS)
946 .with_mode(TransactionMode::Readonly)
947 .build()?
948 .object_store(keys::GOSSIP_REQUESTS)?
949 .get(jskey)
950 .await?
951 .map(|val| self.deserialize_gossip_request(val))
952 .transpose()
953 }
954
955 async fn load_account(&self) -> Result<Option<Account>> {
956 if let Some(pickle) = self
957 .inner
958 .transaction(keys::CORE)
959 .with_mode(TransactionMode::Readonly)
960 .build()?
961 .object_store(keys::CORE)?
962 .get(&JsValue::from_str(keys::ACCOUNT))
963 .await?
964 {
965 let pickle = self.serializer.deserialize_value(pickle)?;
966
967 let account = Account::from_pickle(pickle).map_err(CryptoStoreError::from)?;
968
969 *self.static_account.write().unwrap() = Some(account.static_data().clone());
970
971 Ok(Some(account))
972 } else {
973 Ok(None)
974 }
975 }
976
977 async fn next_batch_token(&self) -> Result<Option<String>> {
978 if let Some(serialized) = self
979 .inner
980 .transaction(keys::CORE)
981 .with_mode(TransactionMode::Readonly)
982 .build()?
983 .object_store(keys::CORE)?
984 .get(&JsValue::from_str(keys::NEXT_BATCH_TOKEN))
985 .await?
986 {
987 let token = self.serializer.deserialize_value(serialized)?;
988 Ok(Some(token))
989 } else {
990 Ok(None)
991 }
992 }
993
994 async fn load_identity(&self) -> Result<Option<PrivateCrossSigningIdentity>> {
995 if let Some(pickle) = self
996 .inner
997 .transaction(keys::CORE)
998 .with_mode(TransactionMode::Readonly)
999 .build()?
1000 .object_store(keys::CORE)?
1001 .get(&JsValue::from_str(keys::PRIVATE_IDENTITY))
1002 .await?
1003 {
1004 let pickle = self.serializer.deserialize_value(pickle)?;
1005
1006 Ok(Some(
1007 PrivateCrossSigningIdentity::from_pickle(pickle)
1008 .map_err(|_| CryptoStoreError::UnpicklingError)?,
1009 ))
1010 } else {
1011 Ok(None)
1012 }
1013 }
1014
1015 async fn get_sessions(&self, sender_key: &str) -> Result<Option<Vec<Session>>> {
1016 let device_keys = self.get_own_device().await?.as_device_keys().clone();
1017
1018 let range = self.serializer.encode_to_range(keys::SESSION, sender_key);
1019 let sessions: Vec<Session> = self
1020 .inner
1021 .transaction(keys::SESSION)
1022 .with_mode(TransactionMode::Readonly)
1023 .build()?
1024 .object_store(keys::SESSION)?
1025 .get_all()
1026 .with_query(&range)
1027 .await?
1028 .filter_map(Result::ok)
1029 .filter_map(|f| {
1030 self.serializer.deserialize_value(f).ok().map(|p| {
1031 Session::from_pickle(device_keys.clone(), p).map_err(|_| {
1032 IndexeddbCryptoStoreError::CryptoStoreError(CryptoStoreError::AccountUnset)
1033 })
1034 })
1035 })
1036 .collect::<Result<Vec<Session>>>()?;
1037
1038 if sessions.is_empty() {
1039 Ok(None)
1040 } else {
1041 Ok(Some(sessions))
1042 }
1043 }
1044
1045 async fn get_inbound_group_session(
1046 &self,
1047 room_id: &RoomId,
1048 session_id: &str,
1049 ) -> Result<Option<InboundGroupSession>> {
1050 let key =
1051 self.serializer.encode_key(keys::INBOUND_GROUP_SESSIONS_V3, (room_id, session_id));
1052 if let Some(value) = self
1053 .inner
1054 .transaction(keys::INBOUND_GROUP_SESSIONS_V3)
1055 .with_mode(TransactionMode::Readonly)
1056 .build()?
1057 .object_store(keys::INBOUND_GROUP_SESSIONS_V3)?
1058 .get(&key)
1059 .await?
1060 {
1061 Ok(Some(self.deserialize_inbound_group_session(value)?))
1062 } else {
1063 Ok(None)
1064 }
1065 }
1066
1067 async fn get_inbound_group_sessions(&self) -> Result<Vec<InboundGroupSession>> {
1068 const INBOUND_GROUP_SESSIONS_BATCH_SIZE: usize = 1000;
1069
1070 let transaction = self
1071 .inner
1072 .transaction(keys::INBOUND_GROUP_SESSIONS_V3)
1073 .with_mode(TransactionMode::Readonly)
1074 .build()?;
1075
1076 let object_store = transaction.object_store(keys::INBOUND_GROUP_SESSIONS_V3)?;
1077
1078 fetch_from_object_store_batched(
1079 object_store,
1080 |value| self.deserialize_inbound_group_session(value),
1081 INBOUND_GROUP_SESSIONS_BATCH_SIZE,
1082 )
1083 .await
1084 }
1085
1086 async fn get_inbound_group_sessions_by_room_id(
1087 &self,
1088 room_id: &RoomId,
1089 ) -> Result<Vec<InboundGroupSession>> {
1090 let range = self.serializer.encode_to_range(keys::INBOUND_GROUP_SESSIONS_V3, room_id);
1091 Ok(self
1092 .inner
1093 .transaction(keys::INBOUND_GROUP_SESSIONS_V3)
1094 .with_mode(TransactionMode::Readonly)
1095 .build()?
1096 .object_store(keys::INBOUND_GROUP_SESSIONS_V3)?
1097 .get_all()
1098 .with_query(&range)
1099 .await?
1100 .filter_map(Result::ok)
1101 .filter_map(|v| match self.deserialize_inbound_group_session(v) {
1102 Ok(session) => Some(session),
1103 Err(e) => {
1104 warn!("Failed to deserialize inbound group session: {e}");
1105 None
1106 }
1107 })
1108 .collect::<Vec<InboundGroupSession>>())
1109 }
1110
1111 async fn get_inbound_group_sessions_for_device_batch(
1112 &self,
1113 sender_key: Curve25519PublicKey,
1114 sender_data_type: SenderDataType,
1115 after_session_id: Option<String>,
1116 limit: usize,
1117 ) -> Result<Vec<InboundGroupSession>> {
1118 let sender_key =
1119 self.serializer.encode_key(keys::INBOUND_GROUP_SESSIONS_V3, sender_key.to_base64());
1120
1121 let after_session_id = after_session_id
1123 .map(|s| self.serializer.encode_key(keys::INBOUND_GROUP_SESSIONS_V3, s))
1124 .unwrap_or("".into());
1125
1126 let lower_bound: Array =
1127 [sender_key.clone(), (sender_data_type as u8).into(), after_session_id]
1128 .iter()
1129 .collect();
1130 let upper_bound: Array =
1131 [sender_key, ((sender_data_type as u8) + 1).into()].iter().collect();
1132 let key = KeyRange::Bound(lower_bound, true, upper_bound, true);
1133
1134 let tx = self
1135 .inner
1136 .transaction(keys::INBOUND_GROUP_SESSIONS_V3)
1137 .with_mode(TransactionMode::Readonly)
1138 .build()?;
1139
1140 let store = tx.object_store(keys::INBOUND_GROUP_SESSIONS_V3)?;
1141 let idx = store.index(keys::INBOUND_GROUP_SESSIONS_SENDER_KEY_INDEX)?;
1142 let serialized_sessions =
1143 idx.get_all().with_query::<Array, _>(key).with_limit(limit as u32).await?;
1144
1145 let result = serialized_sessions
1147 .filter_map(Result::ok)
1148 .filter_map(|v| match self.deserialize_inbound_group_session(v) {
1149 Ok(session) => Some(session),
1150 Err(e) => {
1151 warn!("Failed to deserialize inbound group session: {e}");
1152 None
1153 }
1154 })
1155 .collect::<Vec<InboundGroupSession>>();
1156
1157 Ok(result)
1158 }
1159
1160 async fn inbound_group_session_counts(
1161 &self,
1162 _backup_version: Option<&str>,
1163 ) -> Result<RoomKeyCounts> {
1164 let tx = self
1165 .inner
1166 .transaction(keys::INBOUND_GROUP_SESSIONS_V3)
1167 .with_mode(TransactionMode::Readonly)
1168 .build()?;
1169 let store = tx.object_store(keys::INBOUND_GROUP_SESSIONS_V3)?;
1170 let all = store.count().await? as usize;
1171 let not_backed_up =
1172 store.index(keys::INBOUND_GROUP_SESSIONS_BACKUP_INDEX)?.count().await? as usize;
1173 tx.commit().await?;
1174 Ok(RoomKeyCounts { total: all, backed_up: all - not_backed_up })
1175 }
1176
1177 async fn inbound_group_sessions_for_backup(
1178 &self,
1179 _backup_version: &str,
1180 limit: usize,
1181 ) -> Result<Vec<InboundGroupSession>> {
1182 let tx = self
1183 .inner
1184 .transaction(keys::INBOUND_GROUP_SESSIONS_V3)
1185 .with_mode(TransactionMode::Readonly)
1186 .build()?;
1187
1188 let store = tx.object_store(keys::INBOUND_GROUP_SESSIONS_V3)?;
1189 let idx = store.index(keys::INBOUND_GROUP_SESSIONS_BACKUP_INDEX)?;
1190
1191 let Some(mut cursor) = idx.open_cursor().await? else {
1195 return Ok(vec![]);
1196 };
1197
1198 let mut serialized_sessions = Vec::with_capacity(limit);
1199 for _ in 0..limit {
1200 let Some(value) = cursor.next_record().await? else {
1201 break;
1202 };
1203 serialized_sessions.push(value)
1204 }
1205
1206 tx.commit().await?;
1207
1208 let result = serialized_sessions
1210 .into_iter()
1211 .filter_map(|v| match self.deserialize_inbound_group_session(v) {
1212 Ok(session) => Some(session),
1213 Err(e) => {
1214 warn!("Failed to deserialize inbound group session: {e}");
1215 None
1216 }
1217 })
1218 .collect::<Vec<InboundGroupSession>>();
1219
1220 Ok(result)
1221 }
1222
1223 async fn mark_inbound_group_sessions_as_backed_up(
1224 &self,
1225 _backup_version: &str,
1226 room_and_session_ids: &[(&RoomId, &str)],
1227 ) -> Result<()> {
1228 let tx = self
1229 .inner
1230 .transaction(keys::INBOUND_GROUP_SESSIONS_V3)
1231 .with_mode(TransactionMode::Readwrite)
1232 .build()?;
1233
1234 let object_store = tx.object_store(keys::INBOUND_GROUP_SESSIONS_V3)?;
1235
1236 for (room_id, session_id) in room_and_session_ids {
1237 let key =
1238 self.serializer.encode_key(keys::INBOUND_GROUP_SESSIONS_V3, (room_id, session_id));
1239 if let Some(idb_object_js) = object_store.get(&key).await? {
1240 let mut idb_object: InboundGroupSessionIndexedDbObject =
1241 serde_wasm_bindgen::from_value(idb_object_js)?;
1242 idb_object.needs_backup = false;
1243 object_store
1244 .put(&serde_wasm_bindgen::to_value(&idb_object)?)
1245 .with_key(key)
1246 .build()?;
1247 } else {
1248 warn!(?key, "Could not find inbound group session to mark it as backed up.");
1249 }
1250 }
1251
1252 Ok(tx.commit().await?)
1253 }
1254
1255 async fn reset_backup_state(&self) -> Result<()> {
1256 let tx = self
1257 .inner
1258 .transaction(keys::INBOUND_GROUP_SESSIONS_V3)
1259 .with_mode(TransactionMode::Readwrite)
1260 .build()?;
1261
1262 if let Some(mut cursor) =
1263 tx.object_store(keys::INBOUND_GROUP_SESSIONS_V3)?.open_cursor().await?
1264 {
1265 while let Some(value) = cursor.next_record().await? {
1266 let mut idb_object: InboundGroupSessionIndexedDbObject =
1267 serde_wasm_bindgen::from_value(value)?;
1268 if !idb_object.needs_backup {
1269 idb_object.needs_backup = true;
1270 let idb_object = serde_wasm_bindgen::to_value(&idb_object)?;
1274 cursor.update(&idb_object).await?;
1275 }
1276 }
1277 }
1278
1279 Ok(tx.commit().await?)
1280 }
1281
1282 async fn save_tracked_users(&self, users: &[(&UserId, bool)]) -> Result<()> {
1283 let tx = self
1284 .inner
1285 .transaction(keys::TRACKED_USERS)
1286 .with_mode(TransactionMode::Readwrite)
1287 .build()?;
1288 let os = tx.object_store(keys::TRACKED_USERS)?;
1289
1290 for (user, dirty) in users {
1291 os.put(&JsValue::from(*dirty)).with_key(JsValue::from_str(user.as_str())).build()?;
1292 }
1293
1294 tx.commit().await?;
1295 Ok(())
1296 }
1297
1298 async fn get_device(
1299 &self,
1300 user_id: &UserId,
1301 device_id: &DeviceId,
1302 ) -> Result<Option<DeviceData>> {
1303 let key = self.serializer.encode_key(keys::DEVICES, (user_id, device_id));
1304 self.inner
1305 .transaction(keys::DEVICES)
1306 .with_mode(TransactionMode::Readonly)
1307 .build()?
1308 .object_store(keys::DEVICES)?
1309 .get(&key)
1310 .await?
1311 .map(|i| self.serializer.deserialize_value(i).map_err(Into::into))
1312 .transpose()
1313 }
1314
1315 async fn get_user_devices(
1316 &self,
1317 user_id: &UserId,
1318 ) -> Result<HashMap<OwnedDeviceId, DeviceData>> {
1319 let range = self.serializer.encode_to_range(keys::DEVICES, user_id);
1320 Ok(self
1321 .inner
1322 .transaction(keys::DEVICES)
1323 .with_mode(TransactionMode::Readonly)
1324 .build()?
1325 .object_store(keys::DEVICES)?
1326 .get_all()
1327 .with_query(&range)
1328 .await?
1329 .filter_map(Result::ok)
1330 .filter_map(|d| {
1331 let d: DeviceData = self.serializer.deserialize_value(d).ok()?;
1332 Some((d.device_id().to_owned(), d))
1333 })
1334 .collect::<HashMap<_, _>>())
1335 }
1336
1337 async fn get_own_device(&self) -> Result<DeviceData> {
1338 let account_info = self.get_static_account().ok_or(CryptoStoreError::AccountUnset)?;
1339 Ok(self.get_device(&account_info.user_id, &account_info.device_id).await?.unwrap())
1340 }
1341
1342 async fn get_user_identity(&self, user_id: &UserId) -> Result<Option<UserIdentityData>> {
1343 self.inner
1344 .transaction(keys::IDENTITIES)
1345 .with_mode(TransactionMode::Readonly)
1346 .build()?
1347 .object_store(keys::IDENTITIES)?
1348 .get(&self.serializer.encode_key(keys::IDENTITIES, user_id))
1349 .await?
1350 .map(|i| self.serializer.deserialize_value(i).map_err(Into::into))
1351 .transpose()
1352 }
1353
1354 async fn is_message_known(&self, hash: &OlmMessageHash) -> Result<bool> {
1355 Ok(self
1356 .inner
1357 .transaction(keys::OLM_HASHES)
1358 .with_mode(TransactionMode::Readonly)
1359 .build()?
1360 .object_store(keys::OLM_HASHES)?
1361 .get::<JsValue, _, _>(
1362 &self.serializer.encode_key(keys::OLM_HASHES, (&hash.sender_key, &hash.hash)),
1363 )
1364 .await?
1365 .is_some())
1366 }
1367
1368 async fn get_secrets_from_inbox(
1369 &self,
1370 secret_name: &SecretName,
1371 ) -> Result<Vec<GossippedSecret>> {
1372 let range = self.serializer.encode_to_range(keys::SECRETS_INBOX, secret_name.as_str());
1373
1374 self.inner
1375 .transaction(keys::SECRETS_INBOX)
1376 .with_mode(TransactionMode::Readonly)
1377 .build()?
1378 .object_store(keys::SECRETS_INBOX)?
1379 .get_all()
1380 .with_query(&range)
1381 .await?
1382 .map(|result| {
1383 let d = result?;
1384 let secret = self.serializer.deserialize_value(d)?;
1385 Ok(secret)
1386 })
1387 .collect()
1388 }
1389
1390 #[allow(clippy::unused_async)] async fn delete_secrets_from_inbox(&self, secret_name: &SecretName) -> Result<()> {
1392 let range = self.serializer.encode_to_range(keys::SECRETS_INBOX, secret_name.as_str());
1393
1394 let transaction = self
1395 .inner
1396 .transaction(keys::SECRETS_INBOX)
1397 .with_mode(TransactionMode::Readwrite)
1398 .build()?;
1399 transaction.object_store(keys::SECRETS_INBOX)?.delete(&range).build()?;
1400 transaction.commit().await?;
1401
1402 Ok(())
1403 }
1404
1405 async fn get_secret_request_by_info(
1406 &self,
1407 key_info: &SecretInfo,
1408 ) -> Result<Option<GossipRequest>> {
1409 let key = self.serializer.encode_key(keys::GOSSIP_REQUESTS, key_info.as_key());
1410
1411 let val = self
1412 .inner
1413 .transaction(keys::GOSSIP_REQUESTS)
1414 .with_mode(TransactionMode::Readonly)
1415 .build()?
1416 .object_store(keys::GOSSIP_REQUESTS)?
1417 .index(keys::GOSSIP_REQUESTS_BY_INFO_INDEX)?
1418 .get(key)
1419 .await?;
1420
1421 if let Some(val) = val {
1422 let deser = self.deserialize_gossip_request(val)?;
1423 Ok(Some(deser))
1424 } else {
1425 Ok(None)
1426 }
1427 }
1428
1429 async fn get_unsent_secret_requests(&self) -> Result<Vec<GossipRequest>> {
1430 let results = self
1431 .inner
1432 .transaction(keys::GOSSIP_REQUESTS)
1433 .with_mode(TransactionMode::Readonly)
1434 .build()?
1435 .object_store(keys::GOSSIP_REQUESTS)?
1436 .index(keys::GOSSIP_REQUESTS_UNSENT_INDEX)?
1437 .get_all()
1438 .await?
1439 .filter_map(Result::ok)
1440 .filter_map(|val| self.deserialize_gossip_request(val).ok())
1441 .collect();
1442
1443 Ok(results)
1444 }
1445
1446 async fn delete_outgoing_secret_requests(&self, request_id: &TransactionId) -> Result<()> {
1447 let jskey = self.serializer.encode_key(keys::GOSSIP_REQUESTS, request_id);
1448 let tx = self
1449 .inner
1450 .transaction(keys::GOSSIP_REQUESTS)
1451 .with_mode(TransactionMode::Readwrite)
1452 .build()?;
1453 tx.object_store(keys::GOSSIP_REQUESTS)?.delete(jskey).build()?;
1454 tx.commit().await.map_err(|e| e.into())
1455 }
1456
1457 async fn load_backup_keys(&self) -> Result<BackupKeys> {
1458 let key = {
1459 let tx = self
1460 .inner
1461 .transaction(keys::BACKUP_KEYS)
1462 .with_mode(TransactionMode::Readonly)
1463 .build()?;
1464 let store = tx.object_store(keys::BACKUP_KEYS)?;
1465
1466 let backup_version = store
1467 .get(&JsValue::from_str(keys::BACKUP_VERSION_V1))
1468 .await?
1469 .map(|i| self.serializer.deserialize_value(i))
1470 .transpose()?;
1471
1472 let decryption_key = store
1473 .get(&JsValue::from_str(keys::RECOVERY_KEY_V1))
1474 .await?
1475 .map(|i| self.serializer.deserialize_value(i))
1476 .transpose()?;
1477
1478 BackupKeys { backup_version, decryption_key }
1479 };
1480
1481 Ok(key)
1482 }
1483
1484 async fn load_dehydrated_device_pickle_key(&self) -> Result<Option<DehydratedDeviceKey>> {
1485 if let Some(pickle) = self
1486 .inner
1487 .transaction(keys::CORE)
1488 .with_mode(TransactionMode::Readonly)
1489 .build()?
1490 .object_store(keys::CORE)?
1491 .get(&JsValue::from_str(keys::DEHYDRATION_PICKLE_KEY))
1492 .await?
1493 {
1494 let pickle: DehydratedDeviceKey = self.serializer.deserialize_value(pickle)?;
1495
1496 Ok(Some(pickle))
1497 } else {
1498 Ok(None)
1499 }
1500 }
1501
1502 async fn delete_dehydrated_device_pickle_key(&self) -> Result<()> {
1503 self.remove_custom_value(keys::DEHYDRATION_PICKLE_KEY).await?;
1504 Ok(())
1505 }
1506
1507 async fn get_withheld_info(
1508 &self,
1509 room_id: &RoomId,
1510 session_id: &str,
1511 ) -> Result<Option<RoomKeyWithheldEntry>> {
1512 let key = self.serializer.encode_key(keys::WITHHELD_SESSIONS, (room_id, session_id));
1513 if let Some(pickle) = self
1514 .inner
1515 .transaction(keys::WITHHELD_SESSIONS)
1516 .with_mode(TransactionMode::Readonly)
1517 .build()?
1518 .object_store(keys::WITHHELD_SESSIONS)?
1519 .get(&key)
1520 .await?
1521 {
1522 let info = self.serializer.deserialize_value(pickle)?;
1523 Ok(Some(info))
1524 } else {
1525 Ok(None)
1526 }
1527 }
1528
1529 async fn get_withheld_sessions_by_room_id(
1530 &self,
1531 room_id: &RoomId,
1532 ) -> Result<Vec<RoomKeyWithheldEntry>> {
1533 let range = self.serializer.encode_to_range(keys::WITHHELD_SESSIONS, room_id);
1534
1535 self
1536 .inner
1537 .transaction(keys::WITHHELD_SESSIONS)
1538 .with_mode(TransactionMode::Readonly)
1539 .build()?
1540 .object_store(keys::WITHHELD_SESSIONS)?
1541 .get_all()
1542 .with_query(&range)
1543 .await?
1544 .map(|val| self.serializer.deserialize_value(val?).map_err(Into::into))
1545 .collect()
1546 }
1547
1548 async fn get_room_settings(&self, room_id: &RoomId) -> Result<Option<RoomSettings>> {
1549 let key = self.serializer.encode_key(keys::ROOM_SETTINGS, room_id);
1550 self.inner
1551 .transaction(keys::ROOM_SETTINGS)
1552 .with_mode(TransactionMode::Readonly)
1553 .build()?
1554 .object_store(keys::ROOM_SETTINGS)?
1555 .get(&key)
1556 .await?
1557 .map(|v| self.serializer.deserialize_value(v).map_err(Into::into))
1558 .transpose()
1559 }
1560
1561 async fn get_received_room_key_bundle_data(
1562 &self,
1563 room_id: &RoomId,
1564 user_id: &UserId,
1565 ) -> Result<Option<StoredRoomKeyBundleData>> {
1566 let key = self.serializer.encode_key(keys::RECEIVED_ROOM_KEY_BUNDLES, (room_id, user_id));
1567 let result = self
1568 .inner
1569 .transaction(keys::RECEIVED_ROOM_KEY_BUNDLES)
1570 .with_mode(TransactionMode::Readonly)
1571 .build()?
1572 .object_store(keys::RECEIVED_ROOM_KEY_BUNDLES)?
1573 .get(&key)
1574 .await?
1575 .map(|v| self.serializer.deserialize_value(v))
1576 .transpose()?;
1577
1578 Ok(result)
1579 }
1580
1581 async fn has_downloaded_all_room_keys(&self, room_id: &RoomId) -> Result<bool> {
1582 let key = self.serializer.encode_key(keys::ROOM_KEY_BACKUPS_FULLY_DOWNLOADED, room_id);
1583 let result = self
1584 .inner
1585 .transaction(keys::ROOM_KEY_BACKUPS_FULLY_DOWNLOADED)
1586 .with_mode(TransactionMode::Readonly)
1587 .build()?
1588 .object_store(keys::ROOM_KEY_BACKUPS_FULLY_DOWNLOADED)?
1589 .get::<JsValue, _, _>(&key)
1590 .await?
1591 .is_some();
1592
1593 Ok(result)
1594 }
1595
1596 async fn get_pending_key_bundle_details_for_room(&self, room_id: &RoomId) -> Result<Option<RoomPendingKeyBundleDetails >> {
1597 let key = self.serializer.encode_key(keys::ROOMS_PENDING_KEY_BUNDLE, room_id);
1598 let result = self
1599 .inner
1600 .transaction(keys::ROOMS_PENDING_KEY_BUNDLE)
1601 .with_mode(TransactionMode::Readonly)
1602 .build()?
1603 .object_store(keys::ROOMS_PENDING_KEY_BUNDLE)?
1604 .get(&key)
1605 .await?
1606 .map(|v| self.serializer.deserialize_value(v))
1607 .transpose()?;
1608 Ok(result)
1609 }
1610
1611 async fn get_all_rooms_pending_key_bundles(&self) -> Result<Vec<RoomPendingKeyBundleDetails>> {
1612 let result = self
1613 .inner
1614 .transaction(keys::ROOMS_PENDING_KEY_BUNDLE)
1615 .with_mode(TransactionMode::Readonly)
1616 .build()?
1617 .object_store(keys::ROOMS_PENDING_KEY_BUNDLE)?
1618 .get_all()
1619 .await?
1620 .map(|result| {
1621 result
1622 .map_err(Into::into)
1623 .and_then(|v| self.serializer.deserialize_value(v).map_err(Into::into))
1624 })
1625 .collect::<Result<Vec<_>>>()?;
1626 Ok(result)
1627 }
1628
1629 async fn get_custom_value(&self, key: &str) -> Result<Option<Vec<u8>>> {
1630 self.inner
1631 .transaction(keys::CORE)
1632 .with_mode(TransactionMode::Readonly)
1633 .build()?
1634 .object_store(keys::CORE)?
1635 .get(&JsValue::from_str(key))
1636 .await?
1637 .map(|v| self.serializer.deserialize_value(v).map_err(Into::into))
1638 .transpose()
1639 }
1640
1641 #[allow(clippy::unused_async)] async fn set_custom_value(&self, key: &str, value: Vec<u8>) -> Result<()> {
1643 let transaction =
1644 self.inner.transaction(keys::CORE).with_mode(TransactionMode::Readwrite).build()?;
1645 transaction
1646 .object_store(keys::CORE)?
1647 .put(&self.serializer.serialize_value(&value)?)
1648 .with_key(JsValue::from_str(key))
1649 .build()?;
1650 transaction.commit().await?;
1651 Ok(())
1652 }
1653
1654 #[allow(clippy::unused_async)] async fn remove_custom_value(&self, key: &str) -> Result<()> {
1656 let transaction =
1657 self.inner.transaction(keys::CORE).with_mode(TransactionMode::Readwrite).build()?;
1658 transaction.object_store(keys::CORE)?.delete(&JsValue::from_str(key)).build()?;
1659 transaction.commit().await?;
1660 Ok(())
1661 }
1662
1663 async fn try_take_leased_lock(
1664 &self,
1665 lease_duration_ms: u32,
1666 key: &str,
1667 holder: &str,
1668 ) -> Result<Option<CrossProcessLockGeneration>> {
1669 let key = JsValue::from_str(key);
1671 let txn = self
1672 .inner
1673 .transaction(keys::LEASE_LOCKS)
1674 .with_mode(TransactionMode::Readwrite)
1675 .build()?;
1676 let object_store = txn.object_store(keys::LEASE_LOCKS)?;
1677
1678 #[derive(Deserialize, Serialize)]
1679 struct Lease {
1680 holder: String,
1681 expiration: u64,
1682 generation: CrossProcessLockGeneration,
1683 }
1684
1685 let now: u64 = MilliSecondsSinceUnixEpoch::now().get().into();
1686 let expiration = now + lease_duration_ms as u64;
1687
1688 let lease = match object_store.get(&key).await? {
1689 Some(entry) => {
1690 let mut lease: Lease = self.serializer.deserialize_value(entry)?;
1691
1692 if lease.holder == holder {
1693 lease.expiration = expiration;
1695
1696 Some(lease)
1697 } else {
1698 if lease.expiration < now {
1700 lease.holder = holder.to_owned();
1702 lease.expiration = expiration;
1703 lease.generation += 1;
1704
1705 Some(lease)
1706 } else {
1707 None
1709 }
1710 }
1711 }
1712 None => {
1713 let lease = Lease {
1714 holder: holder.to_owned(),
1715 expiration,
1716 generation: FIRST_CROSS_PROCESS_LOCK_GENERATION,
1717 };
1718
1719 Some(lease)
1720 }
1721 };
1722
1723 Ok(if let Some(lease) = lease {
1724 object_store.put(&self.serializer.serialize_value(&lease)?).with_key(key).build()?;
1725
1726 Some(lease.generation)
1727 } else {
1728 None
1729 })
1730 }
1731
1732 #[allow(clippy::unused_async)]
1733 async fn get_size(&self) -> Result<Option<usize>> {
1734 Ok(None)
1735 }
1736}
1737
1738impl Drop for IndexeddbCryptoStore {
1739 fn drop(&mut self) {
1740 self.inner.as_sys().close();
1743 }
1744}
1745
1746async fn open_meta_db(prefix: &str) -> Result<Database, IndexeddbCryptoStoreError> {
1750 let name = format!("{prefix:0}::matrix-sdk-crypto-meta");
1751
1752 debug!("IndexedDbCryptoStore: Opening meta-store {name}");
1753 Database::open(&name)
1754 .with_version(1u32)
1755 .with_on_upgrade_needed(|evt, tx| {
1756 let old_version = evt.old_version() as u32;
1757 if old_version < 1 {
1758 tx.db().create_object_store("matrix-sdk-crypto").build()?;
1760 }
1761 Ok(())
1762 })
1763 .await
1764 .map_err(Into::into)
1765}
1766
1767async fn load_store_cipher(
1777 meta_db: &Database,
1778) -> Result<Option<Vec<u8>>, IndexeddbCryptoStoreError> {
1779 let tx: Transaction<'_> =
1780 meta_db.transaction("matrix-sdk-crypto").with_mode(TransactionMode::Readonly).build()?;
1781 let ob = tx.object_store("matrix-sdk-crypto")?;
1782
1783 let store_cipher: Option<Vec<u8>> = ob
1784 .get(&JsValue::from_str(keys::STORE_CIPHER))
1785 .await?
1786 .map(|k: JsValue| k.into_serde())
1787 .transpose()?;
1788 Ok(store_cipher)
1789}
1790
1791async fn save_store_cipher(
1798 db: &Database,
1799 export: &Vec<u8>,
1800) -> Result<(), IndexeddbCryptoStoreError> {
1801 let tx: Transaction<'_> =
1802 db.transaction("matrix-sdk-crypto").with_mode(TransactionMode::Readwrite).build()?;
1803 let ob = tx.object_store("matrix-sdk-crypto")?;
1804
1805 ob.put(&JsValue::from_serde(&export)?)
1806 .with_key(JsValue::from_str(keys::STORE_CIPHER))
1807 .build()?;
1808 tx.commit().await?;
1809 Ok(())
1810}
1811
1812async fn import_store_cipher_with_key(
1826 chacha_key: &[u8; 32],
1827 original_key: &[u8],
1828 serialised_cipher: &[u8],
1829 db: &Database,
1830) -> Result<StoreCipher, IndexeddbCryptoStoreError> {
1831 let cipher = match StoreCipher::import_with_key(chacha_key, serialised_cipher) {
1832 Ok(cipher) => cipher,
1833 Err(matrix_sdk_store_encryption::Error::KdfMismatch) => {
1834 let cipher = StoreCipher::import(&base64_encode(original_key), serialised_cipher)
1839 .map_err(|_| CryptoStoreError::UnpicklingError)?;
1840
1841 debug!(
1845 "IndexedDbCryptoStore: Migrating passphrase-encrypted store cipher to key-encryption"
1846 );
1847
1848 let export = cipher.export_with_key(chacha_key).map_err(CryptoStoreError::backend)?;
1849 save_store_cipher(db, &export).await?;
1850 cipher
1851 }
1852 Err(_) => Err(CryptoStoreError::UnpicklingError)?,
1853 };
1854 Ok(cipher)
1855}
1856
1857async fn fetch_from_object_store_batched<R, F>(
1861 object_store: ObjectStore<'_>,
1862 f: F,
1863 batch_size: usize,
1864) -> Result<Vec<R>>
1865where
1866 F: Fn(JsValue) -> Result<R>,
1867{
1868 let mut result = Vec::new();
1869 let mut batch_n = 0;
1870
1871 let mut latest_key: JsValue = "".into();
1873
1874 loop {
1875 debug!("Fetching Indexed DB records starting from {}", batch_n * batch_size);
1876
1877 let after_latest_key = KeyRange::LowerBound(&latest_key, true);
1885 let cursor = object_store.open_cursor().with_query(&after_latest_key).await?;
1886
1887 let next_key = fetch_batch(cursor, batch_size, &f, &mut result).await?;
1889 if let Some(next_key) = next_key {
1890 latest_key = next_key;
1891 } else {
1892 break;
1893 }
1894
1895 batch_n += 1;
1896 }
1897
1898 Ok(result)
1899}
1900
1901async fn fetch_batch<R, F, Q>(
1905 cursor: Option<Cursor<'_, Q>>,
1906 batch_size: usize,
1907 f: &F,
1908 result: &mut Vec<R>,
1909) -> Result<Option<JsValue>>
1910where
1911 F: Fn(JsValue) -> Result<R>,
1912 Q: QuerySource,
1913{
1914 let Some(mut cursor) = cursor else {
1915 return Ok(None);
1917 };
1918
1919 let mut latest_key = None;
1920
1921 for _ in 0..batch_size {
1922 let Some(value) = cursor.next_record().await? else {
1923 return Ok(None);
1924 };
1925
1926 let processed = f(value);
1928 if let Ok(processed) = processed {
1929 result.push(processed);
1930 }
1931 if let Some(key) = cursor.key()? {
1936 latest_key = Some(key);
1937 }
1938 }
1939
1940 Ok(latest_key)
1943}
1944
1945#[derive(Debug, Serialize, Deserialize)]
1947struct GossipRequestIndexedDbObject {
1948 info: String,
1950
1951 request: Vec<u8>,
1953
1954 #[serde(
1963 default,
1964 skip_serializing_if = "std::ops::Not::not",
1965 with = "crate::serializer::foreign::bool"
1966 )]
1967 unsent: bool,
1968}
1969
1970#[derive(Serialize, Deserialize)]
1972struct InboundGroupSessionIndexedDbObject {
1973 pickled_session: MaybeEncrypted,
1976
1977 #[serde(default, skip_serializing_if = "Option::is_none")]
1985 session_id: Option<String>,
1986
1987 #[serde(
1996 default,
1997 skip_serializing_if = "std::ops::Not::not",
1998 with = "crate::serializer::foreign::bool"
1999 )]
2000 needs_backup: bool,
2001
2002 backed_up_to: i32,
2013
2014 #[serde(default, skip_serializing_if = "Option::is_none")]
2020 sender_key: Option<String>,
2021
2022 #[serde(default, skip_serializing_if = "Option::is_none")]
2028 sender_data_type: Option<u8>,
2029}
2030
2031impl InboundGroupSessionIndexedDbObject {
2032 pub async fn from_session(
2035 session: &InboundGroupSession,
2036 serializer: &SafeEncodeSerializer,
2037 ) -> Result<Self, CryptoStoreError> {
2038 let session_id =
2039 serializer.encode_key_as_string(keys::INBOUND_GROUP_SESSIONS_V3, session.session_id());
2040
2041 let sender_key = serializer.encode_key_as_string(
2042 keys::INBOUND_GROUP_SESSIONS_V3,
2043 session.sender_key().to_base64(),
2044 );
2045
2046 Ok(InboundGroupSessionIndexedDbObject {
2047 pickled_session: serializer.maybe_encrypt_value(session.pickle().await)?,
2048 session_id: Some(session_id),
2049 needs_backup: !session.backed_up(),
2050 backed_up_to: -1,
2051 sender_key: Some(sender_key),
2052 sender_data_type: Some(session.sender_data_type() as u8),
2053 })
2054 }
2055}
2056
2057#[cfg(test)]
2058mod unit_tests {
2059 use matrix_sdk_crypto::{
2060 olm::{Curve25519PublicKey, InboundGroupSession, SenderData, SessionKey},
2061 types::EventEncryptionAlgorithm,
2062 vodozemac::Ed25519Keypair,
2063 };
2064 use matrix_sdk_store_encryption::EncryptedValueBase64;
2065 use matrix_sdk_test::async_test;
2066 use ruma::{device_id, room_id, user_id};
2067
2068 use super::InboundGroupSessionIndexedDbObject;
2069 use crate::serializer::{MaybeEncrypted, SafeEncodeSerializer};
2070
2071 #[test]
2072 fn needs_backup_is_serialized_as_a_u8_in_json() {
2073 let session_needs_backup = backup_test_session(true);
2074
2075 assert!(
2079 serde_json::to_string(&session_needs_backup).unwrap().contains(r#""needs_backup":1"#),
2080 );
2081 }
2082
2083 #[test]
2084 fn doesnt_need_backup_is_serialized_with_missing_field_in_json() {
2085 let session_backed_up = backup_test_session(false);
2086
2087 assert!(
2088 !serde_json::to_string(&session_backed_up).unwrap().contains("needs_backup"),
2089 "The needs_backup field should be missing!"
2090 );
2091 }
2092
2093 pub fn backup_test_session(needs_backup: bool) -> InboundGroupSessionIndexedDbObject {
2094 InboundGroupSessionIndexedDbObject {
2095 pickled_session: MaybeEncrypted::Encrypted(EncryptedValueBase64::new(1, "", "")),
2096 session_id: None,
2097 needs_backup,
2098 backed_up_to: -1,
2099 sender_key: None,
2100 sender_data_type: None,
2101 }
2102 }
2103
2104 #[async_test]
2105 async fn test_sender_key_and_sender_data_type_are_serialized_in_json() {
2106 let sender_key = Curve25519PublicKey::from_bytes([0; 32]);
2107
2108 let sender_data = SenderData::sender_verified(
2109 user_id!("@test:user"),
2110 device_id!("ABC"),
2111 Ed25519Keypair::new().public_key(),
2112 );
2113
2114 let db_object = sender_data_test_session(sender_key, sender_data).await;
2115 let serialized = serde_json::to_string(&db_object).unwrap();
2116
2117 assert!(
2118 serialized.contains(r#""sender_key":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA""#)
2119 );
2120 assert!(serialized.contains(r#""sender_data_type":5"#));
2121 }
2122
2123 pub async fn sender_data_test_session(
2124 sender_key: Curve25519PublicKey,
2125 sender_data: SenderData,
2126 ) -> InboundGroupSessionIndexedDbObject {
2127 let session = InboundGroupSession::new(
2128 sender_key,
2129 Ed25519Keypair::new().public_key(),
2130 room_id!("!test:localhost"),
2131 &SessionKey::from_base64(
2133 "AgAAAABTyn3CR8mzAxhsHH88td5DrRqfipJCnNbZeMrfzhON6O1Cyr9ewx/sDFLO6\
2134 +NvyW92yGvMub7nuAEQb+SgnZLm7nwvuVvJgSZKpoJMVliwg8iY9TXKFT286oBtT2\
2135 /8idy6TcpKax4foSHdMYlZXu5zOsGDdd9eYnYHpUEyDT0utuiaakZM3XBMNLEVDj9\
2136 Ps929j1FGgne1bDeFVoty2UAOQK8s/0JJigbKSu6wQ/SzaCYpE/LD4Egk2Nxs1JE2\
2137 33ii9J8RGPYOp7QWl0kTEc8mAlqZL7mKppo9AwgtmYweAg",
2138 )
2139 .unwrap(),
2140 sender_data,
2141 None,
2142 EventEncryptionAlgorithm::MegolmV1AesSha2,
2143 None,
2144 false,
2145 )
2146 .unwrap();
2147
2148 InboundGroupSessionIndexedDbObject::from_session(&session, &SafeEncodeSerializer::new(None))
2149 .await
2150 .unwrap()
2151 }
2152}
2153
2154#[cfg(all(test, target_family = "wasm"))]
2155mod wasm_unit_tests {
2156 use std::collections::BTreeMap;
2157
2158 use matrix_sdk_crypto::{
2159 olm::{Curve25519PublicKey, SenderData},
2160 types::{DeviceKeys, Signatures},
2161 };
2162 use matrix_sdk_test::async_test;
2163 use ruma::{owned_device_id, owned_user_id};
2164 use wasm_bindgen::JsValue;
2165
2166 use crate::crypto_store::unit_tests::sender_data_test_session;
2167
2168 fn assert_field_equals(js_value: &JsValue, field: &str, expected: u32) {
2169 assert_eq!(
2170 js_sys::Reflect::get(&js_value, &field.into()).unwrap(),
2171 JsValue::from_f64(expected.into())
2172 );
2173 }
2174
2175 #[async_test]
2176 fn test_needs_backup_is_serialized_as_a_u8_in_js() {
2177 let session_needs_backup = super::unit_tests::backup_test_session(true);
2178
2179 let js_value = serde_wasm_bindgen::to_value(&session_needs_backup).unwrap();
2180
2181 assert!(js_value.is_object());
2182 assert_field_equals(&js_value, "needs_backup", 1);
2183 }
2184
2185 #[async_test]
2186 fn test_doesnt_need_backup_is_serialized_with_missing_field_in_js() {
2187 let session_backed_up = super::unit_tests::backup_test_session(false);
2188
2189 let js_value = serde_wasm_bindgen::to_value(&session_backed_up).unwrap();
2190
2191 assert!(!js_sys::Reflect::has(&js_value, &"needs_backup".into()).unwrap());
2192 }
2193
2194 #[async_test]
2195 async fn test_sender_key_and_device_type_are_serialized_in_js() {
2196 let sender_key = Curve25519PublicKey::from_bytes([0; 32]);
2197
2198 let sender_data = SenderData::device_info(DeviceKeys::new(
2199 owned_user_id!("@test:user"),
2200 owned_device_id!("ABC"),
2201 vec![],
2202 BTreeMap::new(),
2203 Signatures::new(),
2204 ));
2205 let db_object = sender_data_test_session(sender_key, sender_data).await;
2206
2207 let js_value = serde_wasm_bindgen::to_value(&db_object).unwrap();
2208
2209 assert!(js_value.is_object());
2210 assert_field_equals(&js_value, "sender_data_type", 2);
2211 assert_eq!(
2212 js_sys::Reflect::get(&js_value, &"sender_key".into()).unwrap(),
2213 JsValue::from_str("AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"),
2214 );
2215 }
2216}
2217
2218#[cfg(all(test, target_family = "wasm"))]
2219mod tests {
2220 use matrix_sdk_crypto::cryptostore_integration_tests;
2221
2222 use super::IndexeddbCryptoStore;
2223
2224 wasm_bindgen_test::wasm_bindgen_test_configure!(run_in_browser);
2225
2226 async fn get_store(
2227 name: &str,
2228 passphrase: Option<&str>,
2229 clear_data: bool,
2230 ) -> IndexeddbCryptoStore {
2231 if clear_data {
2232 IndexeddbCryptoStore::delete_stores(name).unwrap();
2233 }
2234 match passphrase {
2235 Some(pass) => IndexeddbCryptoStore::open_with_passphrase(name, pass)
2236 .await
2237 .expect("Can't create a passphrase protected store"),
2238 None => IndexeddbCryptoStore::open_with_name(name)
2239 .await
2240 .expect("Can't create store without passphrase"),
2241 }
2242 }
2243
2244 cryptostore_integration_tests!();
2245}
2246
2247#[cfg(all(test, target_family = "wasm"))]
2248mod encrypted_tests {
2249 use matrix_sdk_crypto::{
2250 cryptostore_integration_tests,
2251 olm::Account,
2252 store::{CryptoStore, types::PendingChanges},
2253 vodozemac::base64_encode,
2254 };
2255 use matrix_sdk_test::async_test;
2256 use ruma::{device_id, user_id};
2257
2258 use super::IndexeddbCryptoStore;
2259
2260 wasm_bindgen_test::wasm_bindgen_test_configure!(run_in_browser);
2261
2262 async fn get_store(
2263 name: &str,
2264 passphrase: Option<&str>,
2265 clear_data: bool,
2266 ) -> IndexeddbCryptoStore {
2267 if clear_data {
2268 IndexeddbCryptoStore::delete_stores(name).unwrap();
2269 }
2270
2271 let pass = passphrase.unwrap_or(name);
2272 IndexeddbCryptoStore::open_with_passphrase(&name, pass)
2273 .await
2274 .expect("Can't create a passphrase protected store")
2275 }
2276 cryptostore_integration_tests!();
2277
2278 #[async_test]
2281 async fn test_migrate_passphrase_to_key() {
2282 let store_name = "test_migrate_passphrase_to_key";
2283 let passdata: [u8; 32] = rand::random();
2284 let b64_passdata = base64_encode(passdata);
2285
2286 IndexeddbCryptoStore::delete_stores(store_name).unwrap();
2288 let store = IndexeddbCryptoStore::open_with_passphrase(&store_name, &b64_passdata)
2289 .await
2290 .expect("Can't create a passphrase-protected store");
2291
2292 store
2293 .save_pending_changes(PendingChanges {
2294 account: Some(Account::with_device_id(
2295 user_id!("@alice:example.org"),
2296 device_id!("ALICEDEVICE"),
2297 )),
2298 })
2299 .await
2300 .expect("Can't save account");
2301
2302 let store = IndexeddbCryptoStore::open_with_key(&store_name, &passdata)
2304 .await
2305 .expect("Can't create a key-protected store");
2306 let loaded_account =
2307 store.load_account().await.expect("Can't load account").expect("Account was not saved");
2308 assert_eq!(loaded_account.user_id, user_id!("@alice:example.org"));
2309 }
2310}