2011-10-21 19:02:11 +04:00
|
|
|
<?php
|
|
|
|
|
|
|
|
/**
|
2013-05-20 03:24:36 +04:00
|
|
|
* ownCloud
|
|
|
|
*
|
|
|
|
* @author Sam Tuke, Robin Appelman
|
|
|
|
* @copyright 2012 Sam Tuke samtuke@owncloud.com, Robin Appelman
|
|
|
|
* icewind1991@gmail.com
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 3 of the License, or any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public
|
|
|
|
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
2011-10-21 19:02:11 +04:00
|
|
|
|
2013-01-30 22:52:02 +04:00
|
|
|
/**
|
2013-05-20 03:24:36 +04:00
|
|
|
* @brief Encryption proxy which handles filesystem operations before and after
|
|
|
|
* execution and encrypts, and handles keyfiles accordingly. Used for
|
|
|
|
* webui.
|
|
|
|
*/
|
2013-01-30 22:52:02 +04:00
|
|
|
|
2012-10-17 19:35:19 +04:00
|
|
|
namespace OCA\Encryption;
|
2012-07-25 21:28:56 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
/**
|
|
|
|
* Class Proxy
|
|
|
|
* @package OCA\Encryption
|
|
|
|
*/
|
2013-05-27 19:26:58 +04:00
|
|
|
class Proxy extends \OC_FileProxy {
|
2012-07-25 19:25:24 +04:00
|
|
|
|
|
|
|
private static $blackList = null; //mimetypes blacklisted from encryption
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-07-25 19:25:24 +04:00
|
|
|
private static $enableEncryption = null;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
/**
|
2012-07-11 20:51:27 +04:00
|
|
|
* Check if a file requires encryption
|
2011-11-24 04:44:54 +04:00
|
|
|
* @param string $path
|
|
|
|
* @return bool
|
2012-07-11 20:51:27 +04:00
|
|
|
*
|
2012-08-10 14:27:09 +04:00
|
|
|
* Tests if server side encryption is enabled, and file is allowed by blacklists
|
2011-11-24 04:44:54 +04:00
|
|
|
*/
|
2013-05-27 19:26:58 +04:00
|
|
|
private static function shouldEncrypt($path) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
if (is_null(self::$enableEncryption)) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
|
|
|
if (
|
2013-05-27 22:44:38 +04:00
|
|
|
\OCP\Config::getAppValue('files_encryption', 'enable_encryption', 'true') === 'true'
|
|
|
|
&& Crypt::mode() === 'server'
|
2012-11-16 22:31:37 +04:00
|
|
|
) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-11-16 22:31:37 +04:00
|
|
|
self::$enableEncryption = true;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-11-16 22:31:37 +04:00
|
|
|
} else {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-11-16 22:31:37 +04:00
|
|
|
self::$enableEncryption = false;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-11-16 22:31:37 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-04-18 18:02:35 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
if (!self::$enableEncryption) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-04-18 18:02:35 +04:00
|
|
|
return false;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-04-18 18:02:35 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
if (is_null(self::$blackList)) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
self::$blackList = explode(',', \OCP\Config::getAppValue('files_encryption', 'type_blacklist', ''));
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
if (Crypt::isCatfileContent($path)) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
return true;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
$extension = substr($path, strrpos($path, '.') + 1);
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
if (array_search($extension, self::$blackList) === false) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
return true;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-07-11 20:51:27 +04:00
|
|
|
return false;
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
/**
|
|
|
|
* @param $path
|
|
|
|
* @param $data
|
|
|
|
* @return bool
|
|
|
|
*/
|
2013-05-27 19:26:58 +04:00
|
|
|
public function preFile_put_contents($path, &$data) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
if (self::shouldEncrypt($path)) {
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
if (!is_resource($data)) {
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
// get root view
|
2013-05-27 19:26:58 +04:00
|
|
|
$view = new \OC_FilesystemView('/');
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
// get relative path
|
|
|
|
$relativePath = \OCA\Encryption\Helper::stripUserFilesPath($path);
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
if (!isset($relativePath)) {
|
|
|
|
return true;
|
2013-05-16 02:31:17 +04:00
|
|
|
}
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-31 00:07:36 +04:00
|
|
|
$handle = fopen('crypt://' . $relativePath . '.etmp', 'w');
|
2013-05-30 03:13:22 +04:00
|
|
|
if (is_resource($handle)) {
|
2013-04-25 17:20:06 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
// write data to stream
|
|
|
|
fwrite($handle, $data);
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
// close stream
|
|
|
|
fclose($handle);
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
// disable encryption proxy to prevent recursive calls
|
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
// get encrypted content
|
2013-05-31 00:07:36 +04:00
|
|
|
$data = $view->file_get_contents($path . '.etmp');
|
2013-04-18 17:42:28 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
// remove our temp file
|
2013-05-31 00:07:36 +04:00
|
|
|
$view->unlink($path . '.etmp');
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
// re-enable proxy - our work is done
|
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
|
|
|
}
|
2011-10-21 19:02:11 +04:00
|
|
|
}
|
|
|
|
}
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-09 20:09:20 +04:00
|
|
|
return true;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-09 20:09:20 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-12-11 19:10:56 +04:00
|
|
|
/**
|
|
|
|
* @param string $path Path of file from which has been read
|
|
|
|
* @param string $data Data that has been read from file
|
|
|
|
*/
|
2013-05-27 19:26:58 +04:00
|
|
|
public function postFile_get_contents($path, $data) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
$plainData = null;
|
2013-05-27 19:26:58 +04:00
|
|
|
$view = new \OC_FilesystemView('/');
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
// get relative path
|
|
|
|
$relativePath = \OCA\Encryption\Helper::stripUserFilesPath($path);
|
2013-04-25 17:20:06 +04:00
|
|
|
|
2013-05-22 02:53:07 +04:00
|
|
|
// init session
|
2013-05-29 11:21:00 +04:00
|
|
|
$session = new \OCA\Encryption\Session($view);
|
2013-05-22 02:53:07 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
// If data is a catfile
|
|
|
|
if (
|
2013-05-27 22:44:38 +04:00
|
|
|
Crypt::mode() === 'server'
|
2013-05-27 19:26:58 +04:00
|
|
|
&& Crypt::isCatfileContent($data)
|
2012-11-28 22:39:19 +04:00
|
|
|
) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
$handle = fopen('crypt://' . $relativePath, 'r');
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
if (is_resource($handle)) {
|
|
|
|
while (($plainDataChunk = fgets($handle, 8192)) !== false) {
|
|
|
|
$plainData .= $plainDataChunk;
|
|
|
|
}
|
|
|
|
}
|
2012-12-11 19:10:56 +04:00
|
|
|
|
2012-11-28 22:39:19 +04:00
|
|
|
} elseif (
|
2013-05-20 03:24:36 +04:00
|
|
|
Crypt::mode() == 'server'
|
2013-05-29 11:21:00 +04:00
|
|
|
&& \OC::$session->exists('legacyenckey')
|
2013-05-27 19:26:58 +04:00
|
|
|
&& Crypt::isEncryptedMeta($path)
|
2012-11-28 22:39:19 +04:00
|
|
|
) {
|
2013-05-30 03:13:22 +04:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2013-05-27 20:09:35 +04:00
|
|
|
$plainData = Crypt::legacyBlockDecrypt($data, $session->getLegacyKey());
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
if (!isset($plainData)) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-02-11 14:21:23 +04:00
|
|
|
$plainData = $data;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-12-11 19:10:56 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-02-11 14:21:23 +04:00
|
|
|
return $plainData;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2011-10-21 19:02:11 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-01-29 23:54:40 +04:00
|
|
|
/**
|
|
|
|
* @brief When a file is deleted, remove its keyfile also
|
|
|
|
*/
|
2013-05-27 19:26:58 +04:00
|
|
|
public function preUnlink($path) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-04-18 04:03:03 +04:00
|
|
|
// let the trashbin handle this
|
2013-05-27 19:26:58 +04:00
|
|
|
if (\OCP\App::isEnabled('files_trashbin')) {
|
2013-05-20 03:24:36 +04:00
|
|
|
return true;
|
2013-04-18 04:03:03 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-01-29 23:54:40 +04:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
2013-05-20 03:24:36 +04:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
$view = new \OC_FilesystemView('/');
|
2013-03-26 19:17:26 +04:00
|
|
|
|
2013-01-30 22:52:02 +04:00
|
|
|
$userId = \OCP\USER::getUser();
|
2013-03-26 19:17:26 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
$util = new Util($view, $userId);
|
2013-03-26 19:17:26 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
// get relative path
|
|
|
|
$relativePath = \OCA\Encryption\Helper::stripUserFilesPath($path);
|
2013-04-16 20:29:22 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
list($owner, $ownerPath) = $util->getUidAndFilename($relativePath);
|
2013-03-26 19:52:58 +04:00
|
|
|
|
|
|
|
// Delete keyfile & shareKey so it isn't orphaned
|
2013-05-27 19:26:58 +04:00
|
|
|
if (!Keymanager::deleteFileKey($view, $owner, $ownerPath)) {
|
2013-05-27 22:51:52 +04:00
|
|
|
\OCP\Util::writeLog('Encryption library',
|
|
|
|
'Keyfile or shareKey could not be deleted for file "' . $ownerPath . '"', \OCP\Util::ERROR);
|
2013-01-30 21:25:17 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
Keymanager::delAllShareKeys($view, $owner, $ownerPath);
|
2013-05-24 01:56:31 +04:00
|
|
|
|
2013-04-25 17:20:06 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-02-27 20:15:03 +04:00
|
|
|
// If we don't return true then file delete will fail; better
|
|
|
|
// to leave orphaned keyfiles than to disallow file deletion
|
|
|
|
return true;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-01-29 23:54:40 +04:00
|
|
|
}
|
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
/**
|
|
|
|
* @param $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
2013-05-27 19:26:58 +04:00
|
|
|
public function postTouch($path) {
|
|
|
|
$this->handleFile($path);
|
2013-04-26 00:49:47 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
return true;
|
|
|
|
}
|
2013-04-26 00:49:47 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
/**
|
|
|
|
* @param $path
|
|
|
|
* @param $result
|
|
|
|
* @return resource
|
|
|
|
*/
|
2013-05-27 19:26:58 +04:00
|
|
|
public function postFopen($path, &$result) {
|
2013-04-26 00:49:47 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
if (!$result) {
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
return $result;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
// split the path parts
|
|
|
|
$pathParts = explode('/', $path);
|
|
|
|
|
|
|
|
// get relative path
|
|
|
|
$relativePath = \OCA\Encryption\Helper::stripUserFilesPath($path);
|
2013-04-25 22:23:54 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
// FIXME: handling for /userId/cache used by webdav for chunking. The cache chunks are NOT encrypted
|
2013-05-30 03:13:22 +04:00
|
|
|
if (isset($pathParts[2]) && $pathParts[2] === 'cache') {
|
2013-05-20 03:24:36 +04:00
|
|
|
return $result;
|
|
|
|
}
|
2013-04-25 22:23:54 +04:00
|
|
|
|
2012-10-17 19:35:19 +04:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
2013-05-20 03:24:36 +04:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
$meta = stream_get_meta_data($result);
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
$view = new \OC_FilesystemView('');
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
$util = new Util($view, \OCP\USER::getUser());
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-11-22 23:36:48 +04:00
|
|
|
// If file is already encrypted, decrypt using crypto protocol
|
2013-05-20 03:24:36 +04:00
|
|
|
if (
|
2013-05-27 22:44:38 +04:00
|
|
|
Crypt::mode() === 'server'
|
2013-05-27 19:26:58 +04:00
|
|
|
&& $util->isEncryptedPath($path)
|
2012-12-04 23:53:13 +04:00
|
|
|
) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-11-22 23:36:48 +04:00
|
|
|
// Close the original encrypted file
|
2013-05-27 19:26:58 +04:00
|
|
|
fclose($result);
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-12-04 23:53:13 +04:00
|
|
|
// Open the file using the crypto stream wrapper
|
|
|
|
// protocol and let it do the decryption work instead
|
2013-05-30 03:13:22 +04:00
|
|
|
$result = fopen('crypt://' . $relativePath, $meta['mode']);
|
2013-05-20 03:24:36 +04:00
|
|
|
|
|
|
|
} elseif (
|
2013-05-27 19:26:58 +04:00
|
|
|
self::shouldEncrypt($path)
|
2013-05-27 22:44:38 +04:00
|
|
|
and $meta ['mode'] !== 'r'
|
|
|
|
and $meta['mode'] !== 'rb'
|
2012-07-31 22:28:11 +04:00
|
|
|
) {
|
2013-05-30 03:13:22 +04:00
|
|
|
$result = fopen('crypt://' . $relativePath, $meta['mode']);
|
2012-11-22 18:08:19 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-11-14 17:58:57 +04:00
|
|
|
// Re-enable the proxy
|
2013-04-25 17:20:06 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
return $result;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2011-10-21 19:02:11 +04:00
|
|
|
}
|
2012-02-16 00:44:58 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
/**
|
|
|
|
* @param $path
|
|
|
|
* @param $data
|
|
|
|
* @return array
|
|
|
|
*/
|
2013-05-27 19:26:58 +04:00
|
|
|
public function postGetFileInfo($path, $data) {
|
2013-04-26 00:49:47 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
// if path is a folder do nothing
|
2013-05-27 19:26:58 +04:00
|
|
|
if (is_array($data) && array_key_exists('size', $data)) {
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
// get file size
|
2013-05-27 19:26:58 +04:00
|
|
|
$data['size'] = self::postFileSize($path, $data['size']);
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
// Re-enable the proxy
|
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
|
|
|
}
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
return $data;
|
|
|
|
}
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
/**
|
|
|
|
* @param $path
|
|
|
|
* @param $size
|
|
|
|
* @return bool
|
|
|
|
*/
|
2013-05-27 19:26:58 +04:00
|
|
|
public function postFileSize($path, $size) {
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
$view = new \OC_FilesystemView('/');
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
// if path is a folder do nothing
|
2013-05-27 19:26:58 +04:00
|
|
|
if ($view->is_dir($path)) {
|
2013-05-20 03:24:36 +04:00
|
|
|
return $size;
|
|
|
|
}
|
2013-04-22 06:40:49 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
// get relative path
|
|
|
|
$relativePath = \OCA\Encryption\Helper::stripUserFilesPath($path);
|
2013-05-07 15:42:08 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
// if path is empty we cannot resolve anything
|
2013-05-30 03:13:22 +04:00
|
|
|
if (empty($relativePath)) {
|
2013-05-20 03:24:36 +04:00
|
|
|
return $size;
|
|
|
|
}
|
2013-04-22 06:40:49 +04:00
|
|
|
|
2013-05-21 23:09:25 +04:00
|
|
|
$fileInfo = false;
|
|
|
|
// get file info from database/cache if not .part file
|
2013-05-27 19:26:58 +04:00
|
|
|
if (!Keymanager::isPartialFilePath($path)) {
|
|
|
|
$fileInfo = $view->getFileInfo($path);
|
2013-05-21 23:09:25 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
|
|
|
// if file is encrypted return real file size
|
2013-05-27 19:26:58 +04:00
|
|
|
if (is_array($fileInfo) && $fileInfo['encrypted'] === true) {
|
2013-05-20 03:24:36 +04:00
|
|
|
$size = $fileInfo['unencrypted_size'];
|
|
|
|
} else {
|
|
|
|
// self healing if file was removed from file cache
|
2013-05-27 19:26:58 +04:00
|
|
|
if (!is_array($fileInfo)) {
|
2013-05-21 23:09:25 +04:00
|
|
|
$fileInfo = array();
|
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-21 23:09:25 +04:00
|
|
|
$userId = \OCP\User::getUser();
|
2013-05-27 19:26:58 +04:00
|
|
|
$util = new Util($view, $userId);
|
|
|
|
$fixSize = $util->getFileSize($path);
|
|
|
|
if ($fixSize > 0) {
|
2013-05-21 23:09:25 +04:00
|
|
|
$size = $fixSize;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-21 23:09:25 +04:00
|
|
|
$fileInfo['encrypted'] = true;
|
|
|
|
$fileInfo['unencrypted_size'] = $size;
|
|
|
|
|
|
|
|
// put file info if not .part file
|
2013-05-30 03:13:22 +04:00
|
|
|
if (!Keymanager::isPartialFilePath($relativePath)) {
|
2013-05-27 19:26:58 +04:00
|
|
|
$view->putFileInfo($path, $fileInfo);
|
2013-05-20 03:24:36 +04:00
|
|
|
}
|
|
|
|
}
|
2013-05-21 23:09:25 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
}
|
|
|
|
return $size;
|
|
|
|
}
|
2013-04-30 22:44:42 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
/**
|
|
|
|
* @param $path
|
|
|
|
*/
|
2013-05-27 19:26:58 +04:00
|
|
|
public function handleFile($path) {
|
2013-04-30 22:44:42 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-04-27 22:21:46 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
$view = new \OC_FilesystemView('/');
|
2013-05-29 11:21:00 +04:00
|
|
|
$session = new \OCA\Encryption\Session($view);
|
2013-05-20 03:24:36 +04:00
|
|
|
$userId = \OCP\User::getUser();
|
2013-05-27 19:26:58 +04:00
|
|
|
$util = new Util($view, $userId);
|
2013-04-27 22:21:46 +04:00
|
|
|
|
2013-05-30 03:13:22 +04:00
|
|
|
// split the path parts
|
|
|
|
$pathParts = explode('/', $path);
|
|
|
|
|
|
|
|
// get relative path
|
|
|
|
$relativePath = \OCA\Encryption\Helper::stripUserFilesPath($path);
|
2013-04-27 22:21:46 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
// only if file is on 'files' folder fix file size and sharing
|
2013-05-30 03:13:22 +04:00
|
|
|
if (isset($pathParts[2]) && $pathParts[2] === 'files' && $util->fixFileSize($path)) {
|
2013-04-27 22:21:46 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
// get sharing app state
|
|
|
|
$sharingEnabled = \OCP\Share::isEnabled();
|
2013-04-27 22:21:46 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
// get users
|
2013-05-30 03:13:22 +04:00
|
|
|
$usersSharing = $util->getSharingUsersArray($sharingEnabled, $relativePath);
|
2013-04-27 22:21:46 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
// update sharing-keys
|
2013-05-30 03:13:22 +04:00
|
|
|
$util->setSharedFileKeyfiles($session, $usersSharing, $relativePath);
|
2013-05-20 03:24:36 +04:00
|
|
|
}
|
2013-04-27 22:21:46 +04:00
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
|
|
|
}
|
|
|
|
}
|