2015-01-14 22:39:23 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2015-04-07 18:02:49 +03:00
|
|
|
* @author Björn Schießle <schiessle@owncloud.com>
|
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
2015-01-14 22:39:23 +03:00
|
|
|
*
|
2015-04-07 18:02:49 +03:00
|
|
|
* @copyright Copyright (c) 2015, ownCloud, Inc.
|
|
|
|
* @license AGPL-3.0
|
2015-01-14 22:39:23 +03:00
|
|
|
*
|
2015-04-07 18:02:49 +03:00
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
2015-01-14 22:39:23 +03:00
|
|
|
*
|
2015-04-07 18:02:49 +03:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2015-01-14 22:39:23 +03:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-04-07 18:02:49 +03:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-01-14 22:39:23 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Encryption\Keys;
|
|
|
|
|
|
|
|
use OC\Encryption\Util;
|
|
|
|
use OC\Files\View;
|
2015-04-01 17:36:08 +03:00
|
|
|
use OCP\Encryption\Exceptions\GenericEncryptionException;
|
2015-01-14 22:39:23 +03:00
|
|
|
|
|
|
|
class Storage implements \OCP\Encryption\Keys\IStorage {
|
|
|
|
|
|
|
|
/** @var View */
|
|
|
|
private $view;
|
|
|
|
|
|
|
|
/** @var Util */
|
|
|
|
private $util;
|
|
|
|
|
|
|
|
// base dir where all the file related keys are stored
|
|
|
|
private $keys_base_dir;
|
|
|
|
private $encryption_base_dir;
|
|
|
|
|
|
|
|
private $keyCache = array();
|
|
|
|
|
|
|
|
/** @var string */
|
|
|
|
private $encryptionModuleId;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $encryptionModuleId
|
|
|
|
* @param View $view
|
|
|
|
* @param Util $util
|
|
|
|
*/
|
|
|
|
public function __construct($encryptionModuleId, View $view, Util $util) {
|
|
|
|
$this->view = $view;
|
|
|
|
$this->util = $util;
|
|
|
|
$this->encryptionModuleId = $encryptionModuleId;
|
|
|
|
|
|
|
|
$this->encryption_base_dir = '/files_encryption';
|
|
|
|
$this->keys_base_dir = $this->encryption_base_dir .'/keys';
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get user specific key
|
|
|
|
*
|
|
|
|
* @param string $uid ID if the user for whom we want the key
|
|
|
|
* @param string $keyId id of the key
|
|
|
|
*
|
|
|
|
* @return mixed key
|
|
|
|
*/
|
|
|
|
public function getUserKey($uid, $keyId) {
|
2015-03-20 18:24:44 +03:00
|
|
|
$path = $this->constructUserKeyPath($keyId, $uid);
|
2015-01-14 22:39:23 +03:00
|
|
|
return $this->getKey($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get file specific key
|
|
|
|
*
|
|
|
|
* @param string $path path to file
|
|
|
|
* @param string $keyId id of the key
|
|
|
|
*
|
|
|
|
* @return mixed key
|
|
|
|
*/
|
|
|
|
public function getFileKey($path, $keyId) {
|
|
|
|
$keyDir = $this->getFileKeyDir($path);
|
|
|
|
return $this->getKey($keyDir . $keyId);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get system-wide encryption keys not related to a specific user,
|
|
|
|
* e.g something like a key for public link shares
|
|
|
|
*
|
|
|
|
* @param string $keyId id of the key
|
|
|
|
*
|
|
|
|
* @return mixed key
|
|
|
|
*/
|
|
|
|
public function getSystemUserKey($keyId) {
|
2015-03-20 18:24:44 +03:00
|
|
|
$path = $this->constructUserKeyPath($keyId);
|
2015-01-14 22:39:23 +03:00
|
|
|
return $this->getKey($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* set user specific key
|
|
|
|
*
|
|
|
|
* @param string $uid ID if the user for whom we want the key
|
|
|
|
* @param string $keyId id of the key
|
|
|
|
* @param mixed $key
|
|
|
|
*/
|
|
|
|
public function setUserKey($uid, $keyId, $key) {
|
2015-03-20 18:24:44 +03:00
|
|
|
$path = $this->constructUserKeyPath($keyId, $uid);
|
2015-01-14 22:39:23 +03:00
|
|
|
return $this->setKey($path, $key);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* set file specific key
|
|
|
|
*
|
|
|
|
* @param string $path path to file
|
|
|
|
* @param string $keyId id of the key
|
2015-03-26 15:37:34 +03:00
|
|
|
* @param boolean
|
2015-01-14 22:39:23 +03:00
|
|
|
*/
|
|
|
|
public function setFileKey($path, $keyId, $key) {
|
|
|
|
$keyDir = $this->getFileKeyDir($path);
|
|
|
|
return $this->setKey($keyDir . $keyId, $key);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* set system-wide encryption keys not related to a specific user,
|
|
|
|
* e.g something like a key for public link shares
|
|
|
|
*
|
|
|
|
* @param string $keyId id of the key
|
|
|
|
* @param mixed $key
|
|
|
|
*
|
|
|
|
* @return mixed key
|
|
|
|
*/
|
|
|
|
public function setSystemUserKey($keyId, $key) {
|
2015-03-20 18:24:44 +03:00
|
|
|
$path = $this->constructUserKeyPath($keyId);
|
2015-01-14 22:39:23 +03:00
|
|
|
return $this->setKey($path, $key);
|
|
|
|
}
|
|
|
|
|
2015-03-20 18:24:44 +03:00
|
|
|
/**
|
|
|
|
* delete user specific key
|
|
|
|
*
|
|
|
|
* @param string $uid ID if the user for whom we want to delete the key
|
|
|
|
* @param string $keyId id of the key
|
|
|
|
*
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function deleteUserKey($uid, $keyId) {
|
|
|
|
$path = $this->constructUserKeyPath($keyId, $uid);
|
|
|
|
return $this->view->unlink($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* delete file specific key
|
|
|
|
*
|
|
|
|
* @param string $path path to file
|
|
|
|
* @param string $keyId id of the key
|
|
|
|
*
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function deleteFileKey($path, $keyId) {
|
|
|
|
$keyDir = $this->getFileKeyDir($path);
|
|
|
|
return $this->view->unlink($keyDir . $keyId);
|
|
|
|
}
|
|
|
|
|
2015-03-26 11:24:28 +03:00
|
|
|
/**
|
|
|
|
* delete all file keys for a given file
|
|
|
|
*
|
|
|
|
* @param string $path to the file
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function deleteAllFileKeys($path) {
|
|
|
|
$keyDir = $this->getFileKeyDir($path);
|
|
|
|
return $this->view->deleteAll(dirname($keyDir));
|
|
|
|
}
|
|
|
|
|
2015-03-20 18:24:44 +03:00
|
|
|
/**
|
|
|
|
* delete system-wide encryption keys not related to a specific user,
|
|
|
|
* e.g something like a key for public link shares
|
|
|
|
*
|
|
|
|
* @param string $keyId id of the key
|
|
|
|
*
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function deleteSystemUserKey($keyId) {
|
|
|
|
$path = $this->constructUserKeyPath($keyId);
|
|
|
|
return $this->view->unlink($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* construct path to users key
|
|
|
|
*
|
|
|
|
* @param string $keyId
|
|
|
|
* @param string $uid
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
protected function constructUserKeyPath($keyId, $uid = null) {
|
|
|
|
|
|
|
|
if ($uid === null) {
|
|
|
|
$path = $this->encryption_base_dir . '/' . $this->encryptionModuleId . '/' . $keyId;
|
|
|
|
} else {
|
|
|
|
$path = '/' . $uid . $this->encryption_base_dir . '/'
|
|
|
|
. $this->encryptionModuleId . '/' . $uid . '.' . $keyId;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $path;
|
|
|
|
}
|
2015-01-14 22:39:23 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* read key from hard disk
|
|
|
|
*
|
|
|
|
* @param string $path to key
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
private function getKey($path) {
|
|
|
|
|
|
|
|
$key = '';
|
|
|
|
|
|
|
|
if ($this->view->file_exists($path)) {
|
|
|
|
if (isset($this->keyCache[$path])) {
|
|
|
|
$key = $this->keyCache[$path];
|
|
|
|
} else {
|
|
|
|
$key = $this->view->file_get_contents($path);
|
|
|
|
$this->keyCache[$path] = $key;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $key;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* write key to disk
|
|
|
|
*
|
|
|
|
*
|
|
|
|
* @param string $path path to key directory
|
|
|
|
* @param string $key key
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
private function setKey($path, $key) {
|
|
|
|
$this->keySetPreparation(dirname($path));
|
|
|
|
|
|
|
|
$result = $this->view->file_put_contents($path, $key);
|
|
|
|
|
|
|
|
if (is_int($result) && $result > 0) {
|
|
|
|
$this->keyCache[$path] = $key;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get path to key folder for a given file
|
|
|
|
*
|
|
|
|
* @param string $path path to the file, relative to data/
|
|
|
|
* @return string
|
2015-03-30 23:36:48 +03:00
|
|
|
* @throws GenericEncryptionException
|
2015-01-14 22:39:23 +03:00
|
|
|
* @internal param string $keyId
|
|
|
|
*/
|
|
|
|
private function getFileKeyDir($path) {
|
|
|
|
|
|
|
|
if ($this->view->is_dir($path)) {
|
2015-04-01 17:36:08 +03:00
|
|
|
throw new GenericEncryptionException("file was expected but directory was given: $path");
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
list($owner, $filename) = $this->util->getUidAndFilename($path);
|
|
|
|
$filename = $this->util->stripPartialFileExtension($filename);
|
|
|
|
|
|
|
|
// in case of system wide mount points the keys are stored directly in the data directory
|
|
|
|
if ($this->util->isSystemWideMountPoint($filename)) {
|
|
|
|
$keyPath = $this->keys_base_dir . $filename . '/';
|
|
|
|
} else {
|
|
|
|
$keyPath = '/' . $owner . $this->keys_base_dir . $filename . '/';
|
|
|
|
}
|
|
|
|
|
|
|
|
return \OC\Files\Filesystem::normalizePath($keyPath . $this->encryptionModuleId . '/', false);
|
|
|
|
}
|
|
|
|
|
2015-03-26 11:24:28 +03:00
|
|
|
/**
|
|
|
|
* move keys if a file was renamed
|
|
|
|
*
|
|
|
|
* @param string $source
|
|
|
|
* @param string $target
|
|
|
|
* @param string $owner
|
|
|
|
* @param bool $systemWide
|
|
|
|
*/
|
2015-04-02 17:25:01 +03:00
|
|
|
public function renameKeys($source, $target) {
|
|
|
|
|
|
|
|
list($owner, $source) = $this->util->getUidAndFilename($source);
|
|
|
|
list(, $target) = $this->util->getUidAndFilename($target);
|
|
|
|
$systemWide = $this->util->isSystemWideMountPoint($target);
|
|
|
|
|
2015-03-26 11:24:28 +03:00
|
|
|
if ($systemWide) {
|
|
|
|
$sourcePath = $this->keys_base_dir . $source . '/';
|
|
|
|
$targetPath = $this->keys_base_dir . $target . '/';
|
|
|
|
} else {
|
|
|
|
$sourcePath = '/' . $owner . $this->keys_base_dir . $source . '/';
|
|
|
|
$targetPath = '/' . $owner . $this->keys_base_dir . $target . '/';
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($this->view->file_exists($sourcePath)) {
|
|
|
|
$this->keySetPreparation(dirname($targetPath));
|
|
|
|
$this->view->rename($sourcePath, $targetPath);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-02 17:25:01 +03:00
|
|
|
/**
|
|
|
|
* copy keys if a file was renamed
|
|
|
|
*
|
|
|
|
* @param string $source
|
|
|
|
* @param string $target
|
|
|
|
* @param string $owner
|
|
|
|
* @param bool $systemWide
|
|
|
|
*/
|
|
|
|
public function copyKeys($source, $target) {
|
|
|
|
|
|
|
|
list($owner, $source) = $this->util->getUidAndFilename($source);
|
|
|
|
list(, $target) = $this->util->getUidAndFilename($target);
|
|
|
|
$systemWide = $this->util->isSystemWideMountPoint($target);
|
|
|
|
|
|
|
|
if ($systemWide) {
|
|
|
|
$sourcePath = $this->keys_base_dir . $source . '/';
|
|
|
|
$targetPath = $this->keys_base_dir . $target . '/';
|
|
|
|
} else {
|
|
|
|
$sourcePath = '/' . $owner . $this->keys_base_dir . $source . '/';
|
|
|
|
$targetPath = '/' . $owner . $this->keys_base_dir . $target . '/';
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($this->view->file_exists($sourcePath)) {
|
|
|
|
$this->keySetPreparation(dirname($targetPath));
|
|
|
|
$this->view->copy($sourcePath, $targetPath);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
/**
|
|
|
|
* Make preparations to filesystem for saving a keyfile
|
|
|
|
*
|
|
|
|
* @param string $path relative to the views root
|
|
|
|
*/
|
|
|
|
protected function keySetPreparation($path) {
|
|
|
|
// If the file resides within a subdirectory, create it
|
|
|
|
if (!$this->view->file_exists($path)) {
|
2015-04-02 17:42:28 +03:00
|
|
|
$sub_dirs = explode('/', ltrim($path, '/'));
|
2015-01-14 22:39:23 +03:00
|
|
|
$dir = '';
|
|
|
|
foreach ($sub_dirs as $sub_dir) {
|
|
|
|
$dir .= '/' . $sub_dir;
|
|
|
|
if (!$this->view->is_dir($dir)) {
|
|
|
|
$this->view->mkdir($dir);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|