db-keystore 0.4.1

SQLite-backed credential store for the `keyring-core` API
Documentation
//! In db-keystore 0.4.1 and greater, attempting to open an encrypted db-keystore
//! with the wrong key returns error keyring_core::Error::NoStorageAccess.
//! The panic was fixed in turso 0.5.0.
//!
//! In db-keystore-0.4.0 and earlier, (which used turso 0.4.x), opening an encrypted
//! db with the wrong key caused a panic. This example was included to demonstrate
//! how to catch the panic.
//!

use db_keystore::{DbKeyStore, DbKeyStoreConfig, EncryptionOpts};
use keyring_core::api::CredentialStoreApi;
use std::{collections::HashMap, panic, path::Path, sync::Arc};
use zeroize::Zeroizing;

// See project README for list of supported ciphers and notes on creating
// and securing keys.
//
// supported ciphers include "aegis2456", "aes256gcm", and others
const CIPHER: &str = "aegis256";
// hexkey is 64 hex chars for 256 bit key. Create with (for example) `openssl rand -hex 32`
const HEXKEY: &str = "0000000011111111222222223333333344444444555555556666666677777777";

fn create_db_config(
    path: &Path,
    cipher: &str,
    hexkey: &str,
) -> Result<Arc<DbKeyStore>, keyring_core::Error> {
    let encryption_opts = EncryptionOpts::new(cipher, hexkey);
    let config = DbKeyStoreConfig {
        path: path.to_owned(),
        encryption_opts: Some(encryption_opts),
        ..Default::default()
    };
    DbKeyStore::new(config)
}

fn main() -> Result<(), Box<dyn std::error::Error>> {
    let service = "demo";
    let user = "alice";
    let password = Zeroizing::new("dromomeryx".to_string());
    let db_path = tempfile::tempdir()?.path().join("encrypted_wrongkey.db");

    // store password for alice
    {
        let store = create_db_config(&db_path, CIPHER, HEXKEY)?;
        let entry = store.build(service, user, None)?;
        entry.set_password(password.as_str())?;
    }
    {
        // trying to open db with wrong password panics in turso v0.4.3.
        // Fixed in PR 4670 https://github.com/tursodatabase/turso/pull/4670
        let wrong_key = Zeroizing::new(HEXKEY.replace("000", "123"));
        let store = match panic::catch_unwind(panic::AssertUnwindSafe(|| {
            create_db_config(&db_path, CIPHER, wrong_key.as_str())
        })) {
            // opened with correct key
            Ok(Ok(store)) => {
                println!("opened ok");
                store
            }
            Ok(Err(err)) => {
                if let keyring_core::Error::NoStorageAccess(msg) = &err {
                    eprintln!("{msg}"); // Invalid encryption key or cipher ...
                    std::process::exit(1);
                } else {
                    eprintln!("Open failed: {err:?}");
                    std::process::exit(1);
                }
            }
            // Wrong key (for db-keystore <= 0.4.0)
            Err(panic_payload) => {
                eprintln!(
                    "Panic caught opening encrypted db with wrong key. Upgrade db-keystore to 0.4.1 or greater"
                );
                std::mem::forget(panic_payload);
                std::process::exit(1);
            }
        };

        let results = store.search(&HashMap::from([("service", service), ("user", user)]))?;
        assert_eq!(results.len(), 1);
        let first = results.first().expect("found password");
        let fetched = Zeroizing::new(first.get_password()?);
        assert_eq!(fetched.as_str(), password.as_str());
        if fetched.as_str() == password.as_str() {
            println!("passwords match!")
        }
    }

    Ok(())
}