import 'dart:async'; import 'dart:convert'; import 'dart:typed_data'; import 'package:fast_immutable_collections/fast_immutable_collections.dart'; import 'package:veilid/veilid.dart'; import 'package:riverpod_annotation/riverpod_annotation.dart'; import '../tools/tools.dart'; import '../veilid_support/veilid_support.dart'; import '../entities/entities.dart'; import '../entities/proto.dart' as proto; part 'local_accounts.g.dart'; // Local account manager @riverpod class LocalAccounts extends _$LocalAccounts with AsyncTableDBBacked<IList<LocalAccount>> { ////////////////////////////////////////////////////////////// /// AsyncTableDBBacked @override String tableName() => "local_account_manager"; @override String tableKeyName() => "local_accounts"; @override IList<LocalAccount> reviveJson(Object? obj) => obj != null ? IList<LocalAccount>.fromJson( obj, genericFromJson(LocalAccount.fromJson)) : IList<LocalAccount>(); /// Get all local account information @override FutureOr<IList<LocalAccount>> build() async { return await load(); } ////////////////////////////////////////////////////////////// /// Mutators and Selectors /// Creates a new master identity and returns it with its secrets Future<IdentityMasterWithSecrets> newIdentityMaster() async { final crypto = await Veilid.instance.bestCryptoSystem(); final dhtctx = (await Veilid.instance.routingContext()) .withPrivacy() .withSequencing(Sequencing.ensureOrdered); // IdentityMaster DHT record is public/unencrypted return (await DHTRecord.create(dhtctx, crypto: const DHTRecordCryptoPublic())) .deleteScope((masterRec) async { // Identity record is private return (await DHTRecord.create(dhtctx)).deleteScope((identityRec) async { // Make IdentityMaster final masterRecordKey = masterRec.key(); final masterOwner = masterRec.ownerKeyPair()!; final masterSigBuf = masterRecordKey.decode() ..addAll(masterOwner.key.decode()); final identityRecordKey = identityRec.key(); final identityOwner = identityRec.ownerKeyPair()!; final identitySigBuf = identityRecordKey.decode() ..addAll(identityOwner.key.decode()); final identitySignature = await crypto.signWithKeyPair(masterOwner, identitySigBuf); final masterSignature = await crypto.signWithKeyPair(identityOwner, masterSigBuf); final identityMaster = IdentityMaster( identityRecordKey: identityRecordKey, identityPublicKey: identityOwner.key, masterRecordKey: masterRecordKey, masterPublicKey: masterOwner.key, identitySignature: identitySignature, masterSignature: masterSignature); // Write identity master to master dht key await masterRec.eventualWriteJson(identityMaster); // Make empty identity const identity = Identity(accountRecords: IMapConst({})); // Write empty identity to identity dht key await identityRec.eventualWriteJson(identity); return IdentityMasterWithSecrets( identityMaster: identityMaster, masterSecret: masterOwner.secret, identitySecret: identityOwner.secret); }); }); } /// Creates a new account associated with master identity Future<LocalAccount> newAccount( IdentityMaster identityMaster, SecretKey identitySecret, EncryptionKeyType encryptionKeyType, String encryptionKey, proto.Account account) async { final localAccounts = state.requireValue; // Encrypt identitySecret with key late final Uint8List identitySecretBytes; late final Uint8List identitySecretSaltBytes; switch (encryptionKeyType) { case EncryptionKeyType.none: identitySecretBytes = identitySecret.decode(); identitySecretSaltBytes = Uint8List(0); case EncryptionKeyType.pin: case EncryptionKeyType.password: final cs = await Veilid.instance .getCryptoSystem(identityMaster.identityRecordKey.kind); final ekbytes = Uint8List.fromList(utf8.encode(encryptionKey)); final nonce = await cs.randomNonce(); identitySecretSaltBytes = nonce.decode(); SharedSecret sharedSecret = await cs.deriveSharedSecret(ekbytes, identitySecretSaltBytes); identitySecretBytes = await cs.cryptNoAuth(identitySecret.decode(), nonce, sharedSecret); } // Create local account object final localAccount = LocalAccount( identityMaster: identityMaster, identitySecretKeyBytes: identitySecretBytes, identitySecretSaltBytes: identitySecretSaltBytes, encryptionKeyType: encryptionKeyType, biometricsEnabled: false, hiddenAccount: false, ); /////// Add account with profile to DHT // Create private routing context final dhtctx = (await Veilid.instance.routingContext()) .withPrivacy() .withSequencing(Sequencing.ensureOrdered); // Open identity key for writing (await DHTRecord.openWrite(dhtctx, identityMaster.identityRecordKey, identityMaster.identityWriter(identitySecret))) .scope((identityRec) async { // Create new account to insert into identity (await DHTRecord.create(dhtctx)).deleteScope((accountRec) async { // Write account key await accountRec.eventualWriteProtobuf(account); // Update identity key to include account final newAccountRecordInfo = AccountRecordInfo( key: accountRec.key(), owner: accountRec.ownerKeyPair()!); await identityRec.eventualUpdateJson(Identity.fromJson, (oldIdentity) async { final accountRecords = IMapOfSets.from(oldIdentity.accountRecords) .add("VeilidChat", newAccountRecordInfo) .asIMap(); return oldIdentity.copyWith(accountRecords: accountRecords); }); }); }); // Add local account object to internal store final newLocalAccounts = localAccounts.add(localAccount); await store(newLocalAccounts); state = AsyncValue.data(newLocalAccounts); // Return local account object return localAccount; } /// Import an account from another VeilidChat instance /// Recover an account with the master identity secret }