use rusqlite::Connection; use std::path::Path; pub fn open_encrypted_db(path: &Path, key: &str) -> anyhow::Result { let conn = Connection::open(path)?; // ALL cipher settings MUST be set before the first database access. // cipher_page_size in particular must precede any read/write so it takes // effect for both creation (new DB) and reopening (existing DB). // 16384 matches 16KB kernel page size (Asahi Linux / Apple Silicon aarch64). conn.execute_batch(&format!( "PRAGMA key = '{}';\ PRAGMA cipher_page_size = 16384;\ PRAGMA kdf_iter = 256000;\ PRAGMA cipher_hmac_algorithm = HMAC_SHA512;\ PRAGMA cipher_kdf_algorithm = PBKDF2_HMAC_SHA512;", key.replace('\'', "''") ))?; // Verify the key and settings work conn.execute_batch("SELECT count(*) FROM sqlite_master;")?; Ok(conn) } pub fn open_dev_db(path: &Path) -> anyhow::Result { let conn = Connection::open(path)?; Ok(conn) } pub fn init_db(data_dir: &Path) -> anyhow::Result { std::fs::create_dir_all(data_dir)?; let db_path = data_dir.join("tftsr.db"); // In dev/test mode use unencrypted DB; in production use encryption let key = std::env::var("TFTSR_DB_KEY").unwrap_or_else(|_| "dev-key-change-in-prod".to_string()); let conn = if cfg!(debug_assertions) { open_dev_db(&db_path)? } else { open_encrypted_db(&db_path, &key)? }; crate::db::migrations::run_migrations(&conn)?; Ok(conn) }