mirror of
https://github.com/vector-im/element-web.git
synced 2024-11-16 13:14:58 +08:00
993a7029b8
* Show a progress bar during migration of crypto data * playwright: add new `pageWithCredentials` fixture * Add a playwright test for migration progress * Add documentation for `idbSave` |
||
---|---|---|
.. | ||
dump.json | ||
index.html | ||
load.js | ||
README.md |
Dump of libolm indexeddb cryptostore
This directory contains, in dump.json
, a dump of a real indexeddb store from a session using
libolm crypto.
The corresponding pickle key is +1k2Ppd7HIisUY824v7JtV3/oEE4yX0TqtmNPyhaD7o
.
This directory also contains, in index.html
and load.js
, a page which will populate indexeddb with the data
(and the pickle key). This can be served via a Playwright Route so as to
populate the indexeddb before the main application loads. Note that encrypting the pickle key requires the test User ID
and Device ID, so they must be stored in localstorage
before loading index.html
.
Creation of the dump file
The dump was created by pasting the following into the browser console:
async function exportIndexedDb(name) {
const db = await new Promise((resolve, reject) => {
const dbReq = indexedDB.open(name);
dbReq.onerror = reject;
dbReq.onsuccess = () => resolve(dbReq.result);
});
const storeNames = db.objectStoreNames;
const exports = {};
for (const store of storeNames) {
exports[store] = [];
const txn = db.transaction(store, "readonly");
const objectStore = txn.objectStore(store);
await new Promise((resolve, reject) => {
const cursorReq = objectStore.openCursor();
cursorReq.onerror = reject;
cursorReq.onsuccess = (event) => {
const cursor = event.target.result;
if (cursor) {
const entry = { value: cursor.value };
if (!objectStore.keyPath) {
entry.key = cursor.key;
}
exports[store].push(entry);
cursor.continue();
} else {
resolve();
}
};
});
}
return exports;
}
window.saveAs(
new Blob([JSON.stringify(await exportIndexedDb("matrix-js-sdk:crypto"), null, 2)], {
type: "application/json;charset=utf-8",
}),
"dump.json",
);
The pickle key is extracted via mxMatrixClientPeg.get().crypto.olmDevice.pickleKey
.