2015-01-14 22:39:23 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2015-04-07 18:02:49 +03:00
|
|
|
* @author Björn Schießle <schiessle@owncloud.com>
|
2015-06-25 12:43:55 +03:00
|
|
|
* @author Joas Schilling <nickvergessen@owncloud.com>
|
|
|
|
* @author Lukas Reschke <lukas@owncloud.com>
|
2015-10-26 15:54:55 +03:00
|
|
|
* @author Robin Appelman <icewind@owncloud.com>
|
2015-04-07 18:02:49 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
2015-01-14 22:39:23 +03:00
|
|
|
*
|
2016-01-12 17:02:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
2015-04-07 18:02:49 +03:00
|
|
|
* @license AGPL-3.0
|
2015-01-14 22:39:23 +03:00
|
|
|
*
|
2015-04-07 18:02:49 +03:00
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
2015-01-14 22:39:23 +03:00
|
|
|
*
|
2015-04-07 18:02:49 +03:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2015-01-14 22:39:23 +03:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-04-07 18:02:49 +03:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-01-14 22:39:23 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Files\Storage\Wrapper;
|
|
|
|
|
|
|
|
use OC\Encryption\Exceptions\ModuleDoesNotExistsException;
|
2015-04-23 17:48:11 +03:00
|
|
|
use OC\Encryption\Update;
|
|
|
|
use OC\Encryption\Util;
|
2015-04-20 17:50:12 +03:00
|
|
|
use OC\Files\Filesystem;
|
2015-05-21 15:07:42 +03:00
|
|
|
use OC\Files\Mount\Manager;
|
2015-04-02 15:44:58 +03:00
|
|
|
use OC\Files\Storage\LocalTempFileTrait;
|
2015-07-09 19:04:35 +03:00
|
|
|
use OCP\Encryption\Exceptions\GenericEncryptionException;
|
2015-04-24 14:06:03 +03:00
|
|
|
use OCP\Encryption\IFile;
|
|
|
|
use OCP\Encryption\IManager;
|
2015-04-23 17:48:11 +03:00
|
|
|
use OCP\Encryption\Keys\IStorage;
|
2015-04-07 10:42:54 +03:00
|
|
|
use OCP\Files\Mount\IMountPoint;
|
2015-05-21 15:07:42 +03:00
|
|
|
use OCP\Files\Storage;
|
2015-04-24 14:06:03 +03:00
|
|
|
use OCP\ILogger;
|
2015-01-14 22:39:23 +03:00
|
|
|
|
|
|
|
class Encryption extends Wrapper {
|
|
|
|
|
2015-04-02 15:44:58 +03:00
|
|
|
use LocalTempFileTrait;
|
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
/** @var string */
|
|
|
|
private $mountPoint;
|
|
|
|
|
|
|
|
/** @var \OC\Encryption\Util */
|
|
|
|
private $util;
|
|
|
|
|
2015-04-24 14:06:03 +03:00
|
|
|
/** @var \OCP\Encryption\IManager */
|
2015-01-14 22:39:23 +03:00
|
|
|
private $encryptionManager;
|
|
|
|
|
2015-04-24 14:06:03 +03:00
|
|
|
/** @var \OCP\ILogger */
|
2015-01-14 22:39:23 +03:00
|
|
|
private $logger;
|
|
|
|
|
|
|
|
/** @var string */
|
|
|
|
private $uid;
|
|
|
|
|
|
|
|
/** @var array */
|
|
|
|
private $unencryptedSize;
|
|
|
|
|
2015-04-24 14:06:03 +03:00
|
|
|
/** @var \OCP\Encryption\IFile */
|
2015-04-01 11:37:48 +03:00
|
|
|
private $fileHelper;
|
|
|
|
|
2015-04-07 10:42:54 +03:00
|
|
|
/** @var IMountPoint */
|
|
|
|
private $mount;
|
|
|
|
|
2015-04-15 10:49:50 +03:00
|
|
|
/** @var IStorage */
|
2015-04-22 14:09:42 +03:00
|
|
|
private $keyStorage;
|
|
|
|
|
2015-04-15 10:49:50 +03:00
|
|
|
/** @var Update */
|
2015-04-23 17:48:11 +03:00
|
|
|
private $update;
|
|
|
|
|
2015-05-21 15:07:42 +03:00
|
|
|
/** @var Manager */
|
|
|
|
private $mountManager;
|
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
/**
|
|
|
|
* @param array $parameters
|
2015-04-15 10:49:50 +03:00
|
|
|
* @param IManager $encryptionManager
|
|
|
|
* @param Util $util
|
|
|
|
* @param ILogger $logger
|
|
|
|
* @param IFile $fileHelper
|
|
|
|
* @param string $uid
|
2015-04-23 17:48:11 +03:00
|
|
|
* @param IStorage $keyStorage
|
|
|
|
* @param Update $update
|
2015-05-21 15:07:42 +03:00
|
|
|
* @param Manager $mountManager
|
2015-01-14 22:39:23 +03:00
|
|
|
*/
|
|
|
|
public function __construct(
|
|
|
|
$parameters,
|
2015-04-24 14:06:03 +03:00
|
|
|
IManager $encryptionManager = null,
|
2015-04-23 17:48:11 +03:00
|
|
|
Util $util = null,
|
2015-04-24 14:06:03 +03:00
|
|
|
ILogger $logger = null,
|
|
|
|
IFile $fileHelper = null,
|
2015-04-22 14:09:42 +03:00
|
|
|
$uid = null,
|
2015-04-23 17:48:11 +03:00
|
|
|
IStorage $keyStorage = null,
|
2015-05-21 15:07:42 +03:00
|
|
|
Update $update = null,
|
|
|
|
Manager $mountManager = null
|
2015-01-14 22:39:23 +03:00
|
|
|
) {
|
2015-05-21 15:07:42 +03:00
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
$this->mountPoint = $parameters['mountPoint'];
|
2015-04-07 10:42:54 +03:00
|
|
|
$this->mount = $parameters['mount'];
|
2015-01-14 22:39:23 +03:00
|
|
|
$this->encryptionManager = $encryptionManager;
|
|
|
|
$this->util = $util;
|
|
|
|
$this->logger = $logger;
|
|
|
|
$this->uid = $uid;
|
2015-04-01 11:37:48 +03:00
|
|
|
$this->fileHelper = $fileHelper;
|
2015-04-22 14:09:42 +03:00
|
|
|
$this->keyStorage = $keyStorage;
|
2015-01-14 22:39:23 +03:00
|
|
|
$this->unencryptedSize = array();
|
2015-04-23 17:48:11 +03:00
|
|
|
$this->update = $update;
|
2015-05-21 15:07:42 +03:00
|
|
|
$this->mountManager = $mountManager;
|
2015-01-14 22:39:23 +03:00
|
|
|
parent::__construct($parameters);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.filesize.php
|
|
|
|
* The result for filesize when called on a folder is required to be 0
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
public function filesize($path) {
|
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
|
|
|
|
$info = $this->getCache()->get($path);
|
2015-04-01 18:42:56 +03:00
|
|
|
if (isset($this->unencryptedSize[$fullPath])) {
|
2015-01-14 22:39:23 +03:00
|
|
|
$size = $this->unencryptedSize[$fullPath];
|
2015-07-31 16:44:27 +03:00
|
|
|
// update file cache
|
|
|
|
$info['encrypted'] = true;
|
|
|
|
$info['size'] = $size;
|
|
|
|
$this->getCache()->put($path, $info);
|
2015-04-01 18:42:56 +03:00
|
|
|
|
2015-04-14 13:44:51 +03:00
|
|
|
return $size;
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
2015-04-14 13:44:51 +03:00
|
|
|
if (isset($info['fileid']) && $info['encrypted']) {
|
|
|
|
return $info['size'];
|
|
|
|
}
|
|
|
|
return $this->storage->filesize($path);
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
2015-04-20 15:25:39 +03:00
|
|
|
/**
|
2015-04-20 15:54:54 +03:00
|
|
|
* @param string $path
|
2015-04-20 15:25:39 +03:00
|
|
|
* @return array
|
|
|
|
*/
|
2015-04-20 15:54:54 +03:00
|
|
|
public function getMetaData($path) {
|
|
|
|
$data = $this->storage->getMetaData($path);
|
2015-04-20 17:50:12 +03:00
|
|
|
if (is_null($data)) {
|
|
|
|
return null;
|
|
|
|
}
|
2015-04-20 15:25:39 +03:00
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
|
|
|
|
if (isset($this->unencryptedSize[$fullPath])) {
|
|
|
|
$data['encrypted'] = true;
|
2015-04-20 17:50:12 +03:00
|
|
|
$data['size'] = $this->unencryptedSize[$fullPath];
|
2015-04-20 15:25:39 +03:00
|
|
|
} else {
|
|
|
|
$info = $this->getCache()->get($path);
|
|
|
|
if (isset($info['fileid']) && $info['encrypted']) {
|
|
|
|
$data['encrypted'] = true;
|
|
|
|
$data['size'] = $info['size'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $data;
|
|
|
|
}
|
2015-01-14 22:39:23 +03:00
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.file_get_contents.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function file_get_contents($path) {
|
|
|
|
|
|
|
|
$encryptionModule = $this->getEncryptionModule($path);
|
|
|
|
|
2015-07-09 19:04:35 +03:00
|
|
|
if ($encryptionModule) {
|
2015-04-02 17:18:10 +03:00
|
|
|
$handle = $this->fopen($path, "r");
|
|
|
|
if (!$handle) {
|
|
|
|
return false;
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
2015-04-02 17:18:10 +03:00
|
|
|
$data = stream_get_contents($handle);
|
|
|
|
fclose($handle);
|
|
|
|
return $data;
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
2015-04-02 17:18:10 +03:00
|
|
|
return $this->storage->file_get_contents($path);
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.file_put_contents.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param string $data
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function file_put_contents($path, $data) {
|
|
|
|
// file put content will always be translated to a stream write
|
|
|
|
$handle = $this->fopen($path, 'w');
|
2015-10-15 13:12:52 +03:00
|
|
|
if (is_resource($handle)) {
|
|
|
|
$written = fwrite($handle, $data);
|
|
|
|
fclose($handle);
|
|
|
|
return $written;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.unlink.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function unlink($path) {
|
2015-04-07 19:05:54 +03:00
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
if ($this->util->isExcluded($fullPath)) {
|
2015-01-14 22:39:23 +03:00
|
|
|
return $this->storage->unlink($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
$encryptionModule = $this->getEncryptionModule($path);
|
|
|
|
if ($encryptionModule) {
|
2015-05-13 15:39:27 +03:00
|
|
|
$this->keyStorage->deleteAllFileKeys($this->getFullPath($path));
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return $this->storage->unlink($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.rename.php
|
|
|
|
*
|
|
|
|
* @param string $path1
|
|
|
|
* @param string $path2
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function rename($path1, $path2) {
|
|
|
|
|
|
|
|
$result = $this->storage->rename($path1, $path2);
|
2015-04-27 12:40:10 +03:00
|
|
|
|
2015-09-29 14:17:39 +03:00
|
|
|
if ($result &&
|
|
|
|
// versions always use the keys from the original file, so we can skip
|
|
|
|
// this step for versions
|
|
|
|
$this->isVersion($path2) === false &&
|
|
|
|
$this->encryptionManager->isEnabled()) {
|
2015-04-27 12:40:10 +03:00
|
|
|
$source = $this->getFullPath($path1);
|
|
|
|
if (!$this->util->isExcluded($source)) {
|
|
|
|
$target = $this->getFullPath($path2);
|
|
|
|
if (isset($this->unencryptedSize[$source])) {
|
|
|
|
$this->unencryptedSize[$target] = $this->unencryptedSize[$source];
|
|
|
|
}
|
2015-05-11 11:35:42 +03:00
|
|
|
$this->keyStorage->renameKeys($source, $target);
|
2015-04-23 17:48:11 +03:00
|
|
|
}
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
2015-05-13 15:39:27 +03:00
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.rmdir.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function rmdir($path) {
|
|
|
|
$result = $this->storage->rmdir($path);
|
2015-05-18 12:54:51 +03:00
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
if ($result &&
|
|
|
|
$this->util->isExcluded($fullPath) === false &&
|
|
|
|
$this->encryptionManager->isEnabled()
|
|
|
|
) {
|
|
|
|
$this->keyStorage->deleteAllFileKeys($fullPath);
|
2015-05-13 15:39:27 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
2015-05-12 19:49:25 +03:00
|
|
|
/**
|
|
|
|
* check if a file can be read
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function isReadable($path) {
|
|
|
|
|
|
|
|
$isReadable = true;
|
|
|
|
|
|
|
|
$metaData = $this->getMetaData($path);
|
|
|
|
if (
|
|
|
|
!$this->is_dir($path) &&
|
|
|
|
isset($metaData['encrypted']) &&
|
|
|
|
$metaData['encrypted'] === true
|
|
|
|
) {
|
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
$module = $this->getEncryptionModule($path);
|
|
|
|
$isReadable = $module->isReadable($fullPath, $this->uid);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $this->storage->isReadable($path) && $isReadable;
|
|
|
|
}
|
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.copy.php
|
|
|
|
*
|
|
|
|
* @param string $path1
|
|
|
|
* @param string $path2
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function copy($path1, $path2) {
|
2015-04-27 12:40:10 +03:00
|
|
|
|
2015-05-21 15:07:42 +03:00
|
|
|
$source = $this->getFullPath($path1);
|
2015-04-27 14:13:27 +03:00
|
|
|
|
2015-05-21 15:07:42 +03:00
|
|
|
if ($this->util->isExcluded($source)) {
|
2015-04-07 19:05:54 +03:00
|
|
|
return $this->storage->copy($path1, $path2);
|
2015-04-02 17:25:01 +03:00
|
|
|
}
|
|
|
|
|
2015-08-24 16:57:03 +03:00
|
|
|
// need to stream copy file by file in case we copy between a encrypted
|
|
|
|
// and a unencrypted storage
|
|
|
|
$this->unlink($path2);
|
|
|
|
$result = $this->copyFromStorage($this, $path1, $path2);
|
2015-04-02 17:25:01 +03:00
|
|
|
|
|
|
|
return $result;
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.fopen.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param string $mode
|
2015-10-15 13:06:49 +03:00
|
|
|
* @return resource|bool
|
2015-07-09 19:04:35 +03:00
|
|
|
* @throws GenericEncryptionException
|
|
|
|
* @throws ModuleDoesNotExistsException
|
2015-01-14 22:39:23 +03:00
|
|
|
*/
|
|
|
|
public function fopen($path, $mode) {
|
|
|
|
|
2015-04-08 17:41:20 +03:00
|
|
|
$encryptionEnabled = $this->encryptionManager->isEnabled();
|
2015-01-14 22:39:23 +03:00
|
|
|
$shouldEncrypt = false;
|
|
|
|
$encryptionModule = null;
|
2015-07-09 19:04:35 +03:00
|
|
|
$header = $this->getHeader($path);
|
2015-01-14 22:39:23 +03:00
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
$encryptionModuleId = $this->util->getEncryptionModuleId($header);
|
|
|
|
|
2015-05-27 14:01:32 +03:00
|
|
|
if ($this->util->isExcluded($fullPath) === false) {
|
|
|
|
|
|
|
|
$size = $unencryptedSize = 0;
|
2015-06-23 11:43:28 +03:00
|
|
|
$realFile = $this->util->stripPartialFileExtension($path);
|
2015-06-26 12:26:40 +03:00
|
|
|
$targetExists = $this->file_exists($realFile) || $this->file_exists($path);
|
2015-05-27 14:01:32 +03:00
|
|
|
$targetIsEncrypted = false;
|
|
|
|
if ($targetExists) {
|
|
|
|
// in case the file exists we require the explicit module as
|
|
|
|
// specified in the file header - otherwise we need to fail hard to
|
|
|
|
// prevent data loss on client side
|
|
|
|
if (!empty($encryptionModuleId)) {
|
|
|
|
$targetIsEncrypted = true;
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule($encryptionModuleId);
|
|
|
|
}
|
2015-04-02 18:16:27 +03:00
|
|
|
|
2015-06-30 11:21:03 +03:00
|
|
|
if ($this->file_exists($path)) {
|
|
|
|
$size = $this->storage->filesize($path);
|
|
|
|
$unencryptedSize = $this->filesize($path);
|
|
|
|
} else {
|
|
|
|
$size = $unencryptedSize = 0;
|
|
|
|
}
|
2015-05-27 14:01:32 +03:00
|
|
|
}
|
2015-01-14 22:39:23 +03:00
|
|
|
|
2015-05-27 14:01:32 +03:00
|
|
|
try {
|
2015-01-14 22:39:23 +03:00
|
|
|
|
2015-05-27 14:01:32 +03:00
|
|
|
if (
|
|
|
|
$mode === 'w'
|
|
|
|
|| $mode === 'w+'
|
|
|
|
|| $mode === 'wb'
|
|
|
|
|| $mode === 'wb+'
|
|
|
|
) {
|
2015-07-09 19:04:35 +03:00
|
|
|
// don't overwrite encrypted files if encyption is not enabled
|
|
|
|
if ($targetIsEncrypted && $encryptionEnabled === false) {
|
|
|
|
throw new GenericEncryptionException('Tried to access encrypted file but encryption is not enabled');
|
|
|
|
}
|
2015-05-27 14:01:32 +03:00
|
|
|
if ($encryptionEnabled) {
|
|
|
|
// if $encryptionModuleId is empty, the default module will be used
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule($encryptionModuleId);
|
|
|
|
$shouldEncrypt = $encryptionModule->shouldEncrypt($fullPath);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
$info = $this->getCache()->get($path);
|
|
|
|
// only get encryption module if we found one in the header
|
|
|
|
// or if file should be encrypted according to the file cache
|
|
|
|
if (!empty($encryptionModuleId)) {
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule($encryptionModuleId);
|
|
|
|
$shouldEncrypt = true;
|
|
|
|
} else if (empty($encryptionModuleId) && $info['encrypted'] === true) {
|
|
|
|
// we come from a old installation. No header and/or no module defined
|
|
|
|
// but the file is encrypted. In this case we need to use the
|
|
|
|
// OC_DEFAULT_MODULE to read the file
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule('OC_DEFAULT_MODULE');
|
|
|
|
$shouldEncrypt = true;
|
2015-07-10 14:14:07 +03:00
|
|
|
$targetIsEncrypted = true;
|
2015-05-27 14:01:32 +03:00
|
|
|
}
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
2015-05-27 14:01:32 +03:00
|
|
|
} catch (ModuleDoesNotExistsException $e) {
|
|
|
|
$this->logger->warning('Encryption module "' . $encryptionModuleId .
|
|
|
|
'" not found, file will be stored unencrypted (' . $e->getMessage() . ')');
|
|
|
|
}
|
|
|
|
|
|
|
|
// encryption disabled on write of new file and write to existing unencrypted file -> don't encrypt
|
|
|
|
if (!$encryptionEnabled || !$this->mount->getOption('encrypt', true)) {
|
|
|
|
if (!$targetExists || !$targetIsEncrypted) {
|
|
|
|
$shouldEncrypt = false;
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-27 14:01:32 +03:00
|
|
|
if ($shouldEncrypt === true && $encryptionModule !== null) {
|
2015-07-27 15:29:07 +03:00
|
|
|
$headerSize = $this->getHeaderSize($path);
|
2015-05-27 14:01:32 +03:00
|
|
|
$source = $this->storage->fopen($path, $mode);
|
2015-10-15 13:06:49 +03:00
|
|
|
if (!is_resource($source)) {
|
|
|
|
return false;
|
|
|
|
}
|
2015-05-27 14:01:32 +03:00
|
|
|
$handle = \OC\Files\Stream\Encryption::wrap($source, $path, $fullPath, $header,
|
|
|
|
$this->uid, $encryptionModule, $this->storage, $this, $this->util, $this->fileHelper, $mode,
|
2015-07-27 15:29:07 +03:00
|
|
|
$size, $unencryptedSize, $headerSize);
|
2015-05-27 14:01:32 +03:00
|
|
|
return $handle;
|
2015-04-02 18:16:27 +03:00
|
|
|
}
|
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
2015-05-27 14:01:32 +03:00
|
|
|
|
|
|
|
return $this->storage->fopen($path, $mode);
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
2015-04-15 10:49:50 +03:00
|
|
|
/**
|
2015-05-21 15:07:42 +03:00
|
|
|
* @param Storage $sourceStorage
|
2015-04-15 10:49:50 +03:00
|
|
|
* @param string $sourceInternalPath
|
|
|
|
* @param string $targetInternalPath
|
|
|
|
* @param bool $preserveMtime
|
|
|
|
* @return bool
|
|
|
|
*/
|
2015-05-21 15:07:42 +03:00
|
|
|
public function moveFromStorage(Storage $sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime = true) {
|
2015-09-07 18:19:50 +03:00
|
|
|
if ($sourceStorage === $this) {
|
|
|
|
return $this->rename($sourceInternalPath, $targetInternalPath);
|
|
|
|
}
|
2015-04-30 15:30:02 +03:00
|
|
|
|
|
|
|
// TODO clean this up once the underlying moveFromStorage in OC\Files\Storage\Wrapper\Common is fixed:
|
|
|
|
// - call $this->storage->moveFromStorage() instead of $this->copyBetweenStorage
|
|
|
|
// - copy the file cache update from $this->copyBetweenStorage to this method
|
2015-05-21 15:07:42 +03:00
|
|
|
// - copy the copyKeys() call from $this->copyBetweenStorage to this method
|
2015-04-30 15:30:02 +03:00
|
|
|
// - remove $this->copyBetweenStorage
|
|
|
|
|
|
|
|
$result = $this->copyBetweenStorage($sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime, true);
|
2015-04-15 10:49:50 +03:00
|
|
|
if ($result) {
|
|
|
|
if ($sourceStorage->is_dir($sourceInternalPath)) {
|
|
|
|
$result &= $sourceStorage->rmdir($sourceInternalPath);
|
|
|
|
} else {
|
|
|
|
$result &= $sourceStorage->unlink($sourceInternalPath);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-05-21 15:07:42 +03:00
|
|
|
* @param Storage $sourceStorage
|
2015-04-15 10:49:50 +03:00
|
|
|
* @param string $sourceInternalPath
|
|
|
|
* @param string $targetInternalPath
|
|
|
|
* @param bool $preserveMtime
|
|
|
|
* @return bool
|
|
|
|
*/
|
2015-05-21 15:07:42 +03:00
|
|
|
public function copyFromStorage(Storage $sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime = false) {
|
2015-04-30 15:30:02 +03:00
|
|
|
|
|
|
|
// TODO clean this up once the underlying moveFromStorage in OC\Files\Storage\Wrapper\Common is fixed:
|
2015-09-29 14:17:39 +03:00
|
|
|
// - call $this->storage->copyFromStorage() instead of $this->copyBetweenStorage
|
2015-04-30 15:30:02 +03:00
|
|
|
// - copy the file cache update from $this->copyBetweenStorage to this method
|
2015-05-21 15:07:42 +03:00
|
|
|
// - copy the copyKeys() call from $this->copyBetweenStorage to this method
|
2015-04-30 15:30:02 +03:00
|
|
|
// - remove $this->copyBetweenStorage
|
|
|
|
|
|
|
|
return $this->copyBetweenStorage($sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime, false);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* copy file between two storages
|
|
|
|
*
|
2015-05-21 15:07:42 +03:00
|
|
|
* @param Storage $sourceStorage
|
2015-05-06 13:14:18 +03:00
|
|
|
* @param string $sourceInternalPath
|
|
|
|
* @param string $targetInternalPath
|
|
|
|
* @param bool $preserveMtime
|
|
|
|
* @param bool $isRename
|
2015-04-30 15:30:02 +03:00
|
|
|
* @return bool
|
2015-11-04 12:15:28 +03:00
|
|
|
* @throws \Exception
|
2015-04-30 15:30:02 +03:00
|
|
|
*/
|
2015-05-21 15:07:42 +03:00
|
|
|
private function copyBetweenStorage(Storage $sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime, $isRename) {
|
|
|
|
|
2015-09-29 14:17:39 +03:00
|
|
|
// for versions we have nothing to do, because versions should always use the
|
|
|
|
// key from the original file. Just create a 1:1 copy and done
|
|
|
|
if ($this->isVersion($targetInternalPath) ||
|
|
|
|
$this->isVersion($sourceInternalPath)) {
|
2015-11-04 12:15:28 +03:00
|
|
|
$result = $this->storage->copyFromStorage($sourceStorage, $sourceInternalPath, $targetInternalPath);
|
|
|
|
if ($result) {
|
|
|
|
$info = $this->getCache('', $sourceStorage)->get($sourceInternalPath);
|
|
|
|
// make sure that we update the unencrypted size for the version
|
|
|
|
if (isset($info['encrypted']) && $info['encrypted'] === true) {
|
|
|
|
$this->updateUnencryptedSize(
|
|
|
|
$this->getFullPath($targetInternalPath),
|
|
|
|
$info['size']
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $result;
|
2015-09-29 14:17:39 +03:00
|
|
|
}
|
|
|
|
|
2015-05-21 15:07:42 +03:00
|
|
|
// first copy the keys that we reuse the existing file key on the target location
|
|
|
|
// and don't create a new one which would break versions for example.
|
|
|
|
$mount = $this->mountManager->findByStorageId($sourceStorage->getId());
|
|
|
|
if (count($mount) === 1) {
|
|
|
|
$mountPoint = $mount[0]->getMountPoint();
|
|
|
|
$source = $mountPoint . '/' . $sourceInternalPath;
|
|
|
|
$target = $this->getFullPath($targetInternalPath);
|
|
|
|
$this->copyKeys($source, $target);
|
|
|
|
} else {
|
|
|
|
$this->logger->error('Could not find mount point, can\'t keep encryption keys');
|
|
|
|
}
|
|
|
|
|
2015-04-15 10:49:50 +03:00
|
|
|
if ($sourceStorage->is_dir($sourceInternalPath)) {
|
|
|
|
$dh = $sourceStorage->opendir($sourceInternalPath);
|
|
|
|
$result = $this->mkdir($targetInternalPath);
|
|
|
|
if (is_resource($dh)) {
|
|
|
|
while ($result and ($file = readdir($dh)) !== false) {
|
|
|
|
if (!Filesystem::isIgnoredDir($file)) {
|
|
|
|
$result &= $this->copyFromStorage($sourceStorage, $sourceInternalPath . '/' . $file, $targetInternalPath . '/' . $file);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2015-08-24 16:57:03 +03:00
|
|
|
try {
|
|
|
|
$source = $sourceStorage->fopen($sourceInternalPath, 'r');
|
|
|
|
$target = $this->fopen($targetInternalPath, 'w');
|
|
|
|
list(, $result) = \OC_Helper::streamCopy($source, $target);
|
|
|
|
fclose($source);
|
|
|
|
fclose($target);
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
fclose($source);
|
|
|
|
fclose($target);
|
|
|
|
throw $e;
|
|
|
|
}
|
2015-04-30 15:30:02 +03:00
|
|
|
if($result) {
|
|
|
|
if ($preserveMtime) {
|
|
|
|
$this->touch($targetInternalPath, $sourceStorage->filemtime($sourceInternalPath));
|
|
|
|
}
|
2015-07-23 16:18:59 +03:00
|
|
|
$isEncrypted = $this->encryptionManager->isEnabled() && $this->mount->getOption('encrypt', true) ? 1 : 0;
|
2015-04-30 15:30:02 +03:00
|
|
|
|
|
|
|
// in case of a rename we need to manipulate the source cache because
|
|
|
|
// this information will be kept for the new target
|
|
|
|
if ($isRename) {
|
|
|
|
$sourceStorage->getCache()->put($sourceInternalPath, ['encrypted' => $isEncrypted]);
|
|
|
|
} else {
|
|
|
|
$this->getCache()->put($targetInternalPath, ['encrypted' => $isEncrypted]);
|
|
|
|
}
|
|
|
|
} else {
|
2015-04-15 10:49:50 +03:00
|
|
|
// delete partially written target file
|
|
|
|
$this->unlink($targetInternalPath);
|
|
|
|
// delete cache entry that was created by fopen
|
|
|
|
$this->getCache()->remove($targetInternalPath);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return (bool)$result;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2015-04-02 15:44:58 +03:00
|
|
|
/**
|
|
|
|
* get the path to a local version of the file.
|
|
|
|
* The local version of the file can be temporary and doesn't have to be persistent across requests
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function getLocalFile($path) {
|
2015-05-05 17:19:24 +03:00
|
|
|
if ($this->encryptionManager->isEnabled()) {
|
2015-05-06 12:16:44 +03:00
|
|
|
$cachedFile = $this->getCachedFile($path);
|
|
|
|
if (is_string($cachedFile)) {
|
|
|
|
return $cachedFile;
|
|
|
|
}
|
2015-05-05 17:19:24 +03:00
|
|
|
}
|
|
|
|
return $this->storage->getLocalFile($path);
|
2015-04-02 15:44:58 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the wrapped storage's value for isLocal()
|
|
|
|
*
|
|
|
|
* @return bool wrapped storage's isLocal() value
|
|
|
|
*/
|
|
|
|
public function isLocal() {
|
2015-04-27 15:26:05 +03:00
|
|
|
if ($this->encryptionManager->isEnabled()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return $this->storage->isLocal();
|
2015-04-02 15:44:58 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.stat.php
|
|
|
|
* only the following keys are required in the result: size and mtime
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function stat($path) {
|
|
|
|
$stat = $this->storage->stat($path);
|
|
|
|
$fileSize = $this->filesize($path);
|
|
|
|
$stat['size'] = $fileSize;
|
|
|
|
$stat[7] = $fileSize;
|
|
|
|
return $stat;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.hash.php
|
|
|
|
*
|
|
|
|
* @param string $type
|
|
|
|
* @param string $path
|
|
|
|
* @param bool $raw
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function hash($type, $path, $raw = false) {
|
|
|
|
$fh = $this->fopen($path, 'rb');
|
|
|
|
$ctx = hash_init($type);
|
|
|
|
hash_update_stream($ctx, $fh);
|
|
|
|
fclose($fh);
|
|
|
|
return hash_final($ctx, $raw);
|
|
|
|
}
|
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
/**
|
|
|
|
* return full path, including mount point
|
|
|
|
*
|
|
|
|
* @param string $path relative to mount point
|
|
|
|
* @return string full path including mount point
|
|
|
|
*/
|
|
|
|
protected function getFullPath($path) {
|
2015-04-20 17:50:12 +03:00
|
|
|
return Filesystem::normalizePath($this->mountPoint . '/' . $path);
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
2015-07-09 19:04:35 +03:00
|
|
|
/**
|
|
|
|
* read first block of encrypted file, typically this will contain the
|
|
|
|
* encryption header
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
protected function readFirstBlock($path) {
|
|
|
|
$firstBlock = '';
|
|
|
|
if ($this->storage->file_exists($path)) {
|
|
|
|
$handle = $this->storage->fopen($path, 'r');
|
|
|
|
$firstBlock = fread($handle, $this->util->getHeaderSize());
|
|
|
|
fclose($handle);
|
|
|
|
}
|
|
|
|
return $firstBlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* return header size of given file
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
protected function getHeaderSize($path) {
|
|
|
|
$headerSize = 0;
|
|
|
|
$realFile = $this->util->stripPartialFileExtension($path);
|
|
|
|
if ($this->storage->file_exists($realFile)) {
|
|
|
|
$path = $realFile;
|
|
|
|
}
|
|
|
|
$firstBlock = $this->readFirstBlock($path);
|
|
|
|
|
|
|
|
if (substr($firstBlock, 0, strlen(Util::HEADER_START)) === Util::HEADER_START) {
|
|
|
|
$headerSize = strlen($firstBlock);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $headerSize;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* parse raw header to array
|
|
|
|
*
|
|
|
|
* @param string $rawHeader
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
protected function parseRawHeader($rawHeader) {
|
|
|
|
$result = array();
|
|
|
|
if (substr($rawHeader, 0, strlen(Util::HEADER_START)) === Util::HEADER_START) {
|
|
|
|
$header = $rawHeader;
|
|
|
|
$endAt = strpos($header, Util::HEADER_END);
|
|
|
|
if ($endAt !== false) {
|
|
|
|
$header = substr($header, 0, $endAt + strlen(Util::HEADER_END));
|
|
|
|
|
|
|
|
// +1 to not start with an ':' which would result in empty element at the beginning
|
|
|
|
$exploded = explode(':', substr($header, strlen(Util::HEADER_START)+1));
|
|
|
|
|
|
|
|
$element = array_shift($exploded);
|
|
|
|
while ($element !== Util::HEADER_END) {
|
|
|
|
$result[$element] = array_shift($exploded);
|
|
|
|
$element = array_shift($exploded);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
/**
|
|
|
|
* read header from file
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
protected function getHeader($path) {
|
2015-06-23 11:43:28 +03:00
|
|
|
$realFile = $this->util->stripPartialFileExtension($path);
|
|
|
|
if ($this->storage->file_exists($realFile)) {
|
2015-06-26 12:26:40 +03:00
|
|
|
$path = $realFile;
|
|
|
|
}
|
|
|
|
|
2015-07-09 19:04:35 +03:00
|
|
|
$firstBlock = $this->readFirstBlock($path);
|
|
|
|
$result = $this->parseRawHeader($firstBlock);
|
|
|
|
|
|
|
|
// if the header doesn't contain a encryption module we check if it is a
|
|
|
|
// legacy file. If true, we add the default encryption module
|
|
|
|
if (!isset($result[Util::HEADER_ENCRYPTION_MODULE_KEY])) {
|
|
|
|
if (!empty($result)) {
|
|
|
|
$result[Util::HEADER_ENCRYPTION_MODULE_KEY] = 'OC_DEFAULT_MODULE';
|
|
|
|
} else {
|
|
|
|
// if the header was empty we have to check first if it is a encrypted file at all
|
|
|
|
$info = $this->getCache()->get($path);
|
|
|
|
if (isset($info['encrypted']) && $info['encrypted'] === true) {
|
|
|
|
$result[Util::HEADER_ENCRYPTION_MODULE_KEY] = 'OC_DEFAULT_MODULE';
|
|
|
|
}
|
2015-04-24 14:02:06 +03:00
|
|
|
}
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
2015-07-09 19:04:35 +03:00
|
|
|
|
|
|
|
return $result;
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* read encryption module needed to read/write the file located at $path
|
|
|
|
*
|
|
|
|
* @param string $path
|
2015-03-30 14:23:10 +03:00
|
|
|
* @return null|\OCP\Encryption\IEncryptionModule
|
|
|
|
* @throws ModuleDoesNotExistsException
|
|
|
|
* @throws \Exception
|
2015-01-14 22:39:23 +03:00
|
|
|
*/
|
|
|
|
protected function getEncryptionModule($path) {
|
|
|
|
$encryptionModule = null;
|
2015-07-09 19:04:35 +03:00
|
|
|
$header = $this->getHeader($path);
|
2015-01-14 22:39:23 +03:00
|
|
|
$encryptionModuleId = $this->util->getEncryptionModuleId($header);
|
|
|
|
if (!empty($encryptionModuleId)) {
|
|
|
|
try {
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule($encryptionModuleId);
|
|
|
|
} catch (ModuleDoesNotExistsException $e) {
|
2015-03-30 14:23:10 +03:00
|
|
|
$this->logger->critical('Encryption module defined in "' . $path . '" not loaded!');
|
2015-01-14 22:39:23 +03:00
|
|
|
throw $e;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $encryptionModule;
|
|
|
|
}
|
|
|
|
|
2015-05-22 01:17:38 +03:00
|
|
|
/**
|
|
|
|
* @param string $path
|
|
|
|
* @param int $unencryptedSize
|
|
|
|
*/
|
2015-01-14 22:39:23 +03:00
|
|
|
public function updateUnencryptedSize($path, $unencryptedSize) {
|
|
|
|
$this->unencryptedSize[$path] = $unencryptedSize;
|
|
|
|
}
|
2015-05-21 15:07:42 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* copy keys to new location
|
|
|
|
*
|
|
|
|
* @param string $source path relative to data/
|
|
|
|
* @param string $target path relative to data/
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
protected function copyKeys($source, $target) {
|
|
|
|
if (!$this->util->isExcluded($source)) {
|
|
|
|
return $this->keyStorage->copyKeys($source, $target);
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
2015-07-09 19:04:35 +03:00
|
|
|
|
2015-09-29 14:17:39 +03:00
|
|
|
/**
|
|
|
|
* check if path points to a files version
|
|
|
|
*
|
|
|
|
* @param $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
protected function isVersion($path) {
|
|
|
|
$normalized = Filesystem::normalizePath($path);
|
|
|
|
return substr($normalized, 0, strlen('/files_versions/')) === '/files_versions/';
|
|
|
|
}
|
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|