// Copyright (c) 2021 Slack Technologies, Inc. // Use of this source code is governed by the MIT license that can be // found in the LICENSE file. #include "shell/browser/api/electron_api_safe_storage.h" #include #include #include "components/os_crypt/os_crypt.h" #include "shell/browser/browser.h" #include "shell/common/gin_converters/base_converter.h" #include "shell/common/gin_converters/callback_converter.h" #include "shell/common/gin_helper/dictionary.h" #include "shell/common/node_includes.h" #include "shell/common/platform_util.h" namespace electron::safestorage { static const char* kEncryptionVersionPrefixV10 = "v10"; static const char* kEncryptionVersionPrefixV11 = "v11"; #if DCHECK_IS_ON() static bool electron_crypto_ready = false; void SetElectronCryptoReady(bool ready) { electron_crypto_ready = ready; } #endif bool IsEncryptionAvailable() { #if BUILDFLAG(IS_LINUX) // Calling IsEncryptionAvailable() before the app is ready results in a crash // on Linux. // Refs: https://github.com/electron/electron/issues/32206. if (!Browser::Get()->is_ready()) return false; #endif return OSCrypt::IsEncryptionAvailable(); } v8::Local EncryptString(v8::Isolate* isolate, const std::string& plaintext) { if (!IsEncryptionAvailable()) { if (!Browser::Get()->is_ready()) { gin_helper::ErrorThrower(isolate).ThrowError( "safeStorage cannot be used before app is ready"); return v8::Local(); } gin_helper::ErrorThrower(isolate).ThrowError( "Error while decrypting the ciphertext provided to " "safeStorage.decryptString. " "Encryption is not available."); return v8::Local(); } std::string ciphertext; bool encrypted = OSCrypt::EncryptString(plaintext, &ciphertext); if (!encrypted) { gin_helper::ErrorThrower(isolate).ThrowError( "Error while encrypting the text provided to " "safeStorage.encryptString."); return v8::Local(); } return node::Buffer::Copy(isolate, ciphertext.c_str(), ciphertext.size()) .ToLocalChecked(); } std::string DecryptString(v8::Isolate* isolate, v8::Local buffer) { if (!IsEncryptionAvailable()) { if (!Browser::Get()->is_ready()) { gin_helper::ErrorThrower(isolate).ThrowError( "safeStorage cannot be used before app is ready"); return ""; } gin_helper::ErrorThrower(isolate).ThrowError( "Error while decrypting the ciphertext provided to " "safeStorage.decryptString. " "Decryption is not available."); return ""; } if (!node::Buffer::HasInstance(buffer)) { gin_helper::ErrorThrower(isolate).ThrowError( "Expected the first argument of decryptString() to be a buffer"); return ""; } // ensures an error is thrown in Mac or Linux on // decryption failure, rather than failing silently const char* data = node::Buffer::Data(buffer); auto size = node::Buffer::Length(buffer); std::string ciphertext(data, size); if (ciphertext.empty()) { return ""; } if (ciphertext.find(kEncryptionVersionPrefixV10) != 0 && ciphertext.find(kEncryptionVersionPrefixV11) != 0) { gin_helper::ErrorThrower(isolate).ThrowError( "Error while decrypting the ciphertext provided to " "safeStorage.decryptString. " "Ciphertext does not appear to be encrypted."); return ""; } std::string plaintext; bool decrypted = OSCrypt::DecryptString(ciphertext, &plaintext); if (!decrypted) { gin_helper::ErrorThrower(isolate).ThrowError( "Error while decrypting the ciphertext provided to " "safeStorage.decryptString."); return ""; } return plaintext; } } // namespace electron::safestorage void Initialize(v8::Local exports, v8::Local unused, v8::Local context, void* priv) { v8::Isolate* isolate = context->GetIsolate(); gin_helper::Dictionary dict(isolate, exports); dict.SetMethod("isEncryptionAvailable", &electron::safestorage::IsEncryptionAvailable); dict.SetMethod("encryptString", &electron::safestorage::EncryptString); dict.SetMethod("decryptString", &electron::safestorage::DecryptString); } NODE_LINKED_BINDING_CONTEXT_AWARE(electron_browser_safe_storage, Initialize)