nextcloud/apps/files_encryption/tests/keymanager.php

205 lines
5.6 KiB
PHP
Raw Normal View History

<?php
/**
* Copyright (c) 2012 Sam Tuke <samtuke@owncloud.com>
* This file is licensed under the Affero General Public License version 3 or
* later.
* See the COPYING-README file.
*/
2013-05-20 03:24:36 +04:00
require_once realpath(dirname(__FILE__) . '/../../../lib/base.php');
require_once realpath(dirname(__FILE__) . '/../lib/crypt.php');
require_once realpath(dirname(__FILE__) . '/../lib/keymanager.php');
require_once realpath(dirname(__FILE__) . '/../lib/proxy.php');
require_once realpath(dirname(__FILE__) . '/../lib/stream.php');
require_once realpath(dirname(__FILE__) . '/../lib/util.php');
require_once realpath(dirname(__FILE__) . '/../lib/helper.php');
require_once realpath(dirname(__FILE__) . '/../appinfo/app.php');
use OCA\Encryption;
2013-05-20 00:28:48 +04:00
/**
* Class Test_Encryption_Keymanager
*/
2013-05-20 03:24:36 +04:00
class Test_Encryption_Keymanager extends \PHPUnit_Framework_TestCase
{
2013-05-20 00:28:48 +04:00
public $userId;
public $pass;
public $stateFilesTrashbin;
/**
* @var OC_FilesystemView
*/
public $view;
public $randomKey;
2013-05-20 03:24:36 +04:00
function setUp()
{
// reset backend
\OC_User::clearBackends();
\OC_User::useBackend('database');
\OC_FileProxy::$enabled = false;
2013-05-20 03:24:36 +04:00
// set content for encrypting / decrypting in tests
2013-05-20 03:24:36 +04:00
$this->dataLong = file_get_contents(realpath(dirname(__FILE__) . '/../lib/crypt.php'));
$this->dataShort = 'hats';
2013-05-20 03:24:36 +04:00
$this->dataUrl = realpath(dirname(__FILE__) . '/../lib/crypt.php');
$this->legacyData = realpath(dirname(__FILE__) . '/legacy-text.txt');
$this->legacyEncryptedData = realpath(dirname(__FILE__) . '/legacy-encrypted-text.txt');
$this->randomKey = Encryption\Crypt::generateKey();
2013-05-20 03:24:36 +04:00
$keypair = Encryption\Crypt::createKeypair();
2013-05-20 03:24:36 +04:00
$this->genPublicKey = $keypair['publicKey'];
$this->genPrivateKey = $keypair['privateKey'];
2013-05-20 03:24:36 +04:00
$this->view = new \OC_FilesystemView('/');
2013-05-20 03:24:36 +04:00
\OC_User::setUserId('admin');
$this->userId = 'admin';
$this->pass = 'admin';
2013-05-20 03:24:36 +04:00
$userHome = \OC_User::getHome($this->userId);
$this->dataDir = str_replace('/' . $this->userId, '', $userHome);
2013-05-20 03:24:36 +04:00
// Filesystem related hooks
\OCA\Encryption\Helper::registerFilesystemHooks();
2013-05-20 03:24:36 +04:00
\OC_FileProxy::register(new OCA\Encryption\Proxy());
2013-05-17 03:07:26 +04:00
// remember files_trashbin state
$this->stateFilesTrashbin = OC_App::isEnabled('files_trashbin');
// we don't want to tests with app files_trashbin enabled
\OC_App::disable('files_trashbin');
2013-05-20 03:24:36 +04:00
\OC_Util::tearDownFS();
\OC_User::setUserId('');
\OC\Files\Filesystem::tearDown();
\OC_Util::setupFS($this->userId);
\OC_User::setUserId($this->userId);
2013-05-01 03:43:56 +04:00
2013-05-20 03:24:36 +04:00
$params['uid'] = $this->userId;
$params['password'] = $this->pass;
OCA\Encryption\Hooks::login($params);
}
2013-05-20 03:24:36 +04:00
function tearDown()
{
\OC_FileProxy::$enabled = true;
\OC_FileProxy::clearProxies();
2013-05-17 03:07:26 +04:00
// reset app files_trashbin
if ($this->stateFilesTrashbin) {
OC_App::enable('files_trashbin');
} else {
OC_App::disable('files_trashbin');
}
}
2013-05-20 03:24:36 +04:00
function testGetPrivateKey()
{
$key = Encryption\Keymanager::getPrivateKey($this->view, $this->userId);
2013-04-30 03:54:19 +04:00
2013-05-20 03:24:36 +04:00
$privateKey = Encryption\Crypt::symmetricDecryptFileContent($key, $this->pass);
2013-04-30 03:54:19 +04:00
2013-05-19 00:00:35 +04:00
$res = openssl_pkey_get_private($privateKey);
2013-04-30 03:54:19 +04:00
2013-05-19 00:00:35 +04:00
$this->assertTrue(is_resource($res));
$sslInfo = openssl_pkey_get_details($res);
$this->assertArrayHasKey('key', $sslInfo);
2013-05-20 03:24:36 +04:00
}
2013-05-20 03:24:36 +04:00
function testGetPublicKey()
{
$publiceKey = Encryption\Keymanager::getPublicKey($this->view, $this->userId);
2013-05-19 00:00:35 +04:00
$res = openssl_pkey_get_public($publiceKey);
$this->assertTrue(is_resource($res));
$sslInfo = openssl_pkey_get_details($res);
$this->assertArrayHasKey('key', $sslInfo);
}
2013-05-20 03:24:36 +04:00
function testSetFileKey()
{
# NOTE: This cannot be tested until we are able to break out
# of the FileSystemView data directory root
2013-05-20 03:24:36 +04:00
$key = Encryption\Crypt::symmetricEncryptFileContentKeyfile($this->randomKey, 'hat');
$file = 'unittest-' . time() . '.txt';
2013-05-20 03:24:36 +04:00
// Disable encryption proxy to prevent recursive calls
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
2013-05-20 03:24:36 +04:00
$this->view->file_put_contents($this->userId . '/files/' . $file, $key['encrypted']);
// Re-enable proxy - our work is done
\OC_FileProxy::$enabled = $proxyStatus;
//$view = new \OC_FilesystemView( '/' . $this->userId . '/files_encryption/keyfiles' );
2013-05-20 03:24:36 +04:00
Encryption\Keymanager::setFileKey($this->view, $file, $this->userId, $key['key']);
2013-05-17 03:07:26 +04:00
// Disable encryption proxy to prevent recursive calls
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = true;
// cleanup
2013-05-20 03:24:36 +04:00
$this->view->unlink('/' . $this->userId . '/files/' . $file);
2013-05-17 03:07:26 +04:00
// Re-enable proxy - our work is done
\OC_FileProxy::$enabled = $proxyStatus;
2013-05-20 03:24:36 +04:00
}
2013-05-20 03:24:36 +04:00
// /**
// * @depends testGetPrivateKey
// */
// function testGetPrivateKey_decrypt() {
//
// $key = Encryption\Keymanager::getPrivateKey( $this->view, $this->userId );
//
// # TODO: replace call to Crypt with a mock object?
// $decrypted = Encryption\Crypt::symmetricDecryptFileContent( $key, $this->passphrase );
//
// $this->assertEquals( 1704, strlen( $decrypted ) );
//
// $this->assertEquals( '-----BEGIN PRIVATE KEY-----', substr( $decrypted, 0, 27 ) );
//
// }
2013-05-20 03:24:36 +04:00
function testGetUserKeys()
{
$keys = Encryption\Keymanager::getUserKeys($this->view, $this->userId);
2013-04-30 03:54:19 +04:00
2013-05-19 00:25:47 +04:00
$resPublic = openssl_pkey_get_public($keys['publicKey']);
2013-04-30 03:54:19 +04:00
2013-05-19 00:25:47 +04:00
$this->assertTrue(is_resource($resPublic));
2013-04-30 03:54:19 +04:00
2013-05-19 00:25:47 +04:00
$sslInfoPublic = openssl_pkey_get_details($resPublic);
2013-04-30 03:54:19 +04:00
2013-05-19 00:25:47 +04:00
$this->assertArrayHasKey('key', $sslInfoPublic);
2013-05-20 03:24:36 +04:00
$privateKey = Encryption\Crypt::symmetricDecryptFileContent($keys['privateKey'], $this->pass);
2013-05-19 00:25:47 +04:00
$resPrivate = openssl_pkey_get_private($privateKey);
$this->assertTrue(is_resource($resPrivate));
$sslInfoPrivate = openssl_pkey_get_details($resPrivate);
$this->assertArrayHasKey('key', $sslInfoPrivate);
}
}