2013-05-09 21:36:18 +04:00
< ? php
/**
* ownCloud
*
* @ author Florin Peter
* @ copyright 2013 Florin Peter < owncloud @ florin - peter . de >
*
* This library is free software ; you can redistribute it and / or
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
* License as published by the Free Software Foundation ; either
* version 3 of the License , or any later version .
*
* This library is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU AFFERO GENERAL PUBLIC LICENSE for more details .
*
* You should have received a copy of the GNU Affero General Public
* License along with this library . If not , see < http :// www . gnu . org / licenses />.
*
*/
namespace OCA\Encryption ;
2013-05-17 02:58:41 +04:00
/**
2013-05-27 22:44:38 +04:00
* @ brief Class to manage registration of hooks an various helper methods
2013-05-17 02:58:41 +04:00
* @ package OCA\Encryption
*/
2013-05-27 19:26:58 +04:00
class Helper {
2013-05-20 03:24:36 +04:00
2013-05-09 21:36:18 +04:00
/**
* @ brief register share related hooks
2013-05-20 03:24:36 +04:00
*
*/
2013-05-24 01:56:31 +04:00
public static function registerShareHooks () {
2013-05-20 03:24:36 +04:00
2013-05-27 19:26:58 +04:00
\OCP\Util :: connectHook ( 'OCP\Share' , 'pre_shared' , 'OCA\Encryption\Hooks' , 'preShared' );
\OCP\Util :: connectHook ( 'OCP\Share' , 'post_shared' , 'OCA\Encryption\Hooks' , 'postShared' );
\OCP\Util :: connectHook ( 'OCP\Share' , 'post_unshare' , 'OCA\Encryption\Hooks' , 'postUnshare' );
2013-05-20 03:24:36 +04:00
}
/**
* @ brief register user related hooks
*
2013-05-09 21:36:18 +04:00
*/
2013-05-24 01:56:31 +04:00
public static function registerUserHooks () {
2013-05-09 21:36:18 +04:00
2013-05-27 19:26:58 +04:00
\OCP\Util :: connectHook ( 'OC_User' , 'post_login' , 'OCA\Encryption\Hooks' , 'login' );
\OCP\Util :: connectHook ( 'OC_User' , 'post_setPassword' , 'OCA\Encryption\Hooks' , 'setPassphrase' );
2013-06-06 15:32:02 +04:00
\OCP\Util :: connectHook ( 'OC_User' , 'pre_setPassword' , 'OCA\Encryption\Hooks' , 'preSetPassphrase' );
2013-05-27 19:26:58 +04:00
\OCP\Util :: connectHook ( 'OC_User' , 'post_createUser' , 'OCA\Encryption\Hooks' , 'postCreateUser' );
\OCP\Util :: connectHook ( 'OC_User' , 'post_deleteUser' , 'OCA\Encryption\Hooks' , 'postDeleteUser' );
2013-05-09 21:36:18 +04:00
}
2013-05-20 03:24:36 +04:00
/**
* @ brief register filesystem related hooks
*
*/
2013-05-24 01:56:31 +04:00
public static function registerFilesystemHooks () {
2013-05-20 03:24:36 +04:00
2013-05-27 19:26:58 +04:00
\OCP\Util :: connectHook ( 'OC_Filesystem' , 'post_rename' , 'OCA\Encryption\Hooks' , 'postRename' );
2013-05-20 03:24:36 +04:00
}
2013-06-27 16:09:22 +04:00
/**
2013-06-27 16:14:25 +04:00
* @ brief register app management related hooks
2013-06-27 16:09:22 +04:00
*
*/
public static function registerAppHooks () {
\OCP\Util :: connectHook ( 'OC_App' , 'pre_disable' , 'OCA\Encryption\Hooks' , 'preDisable' );
}
2013-05-20 03:24:36 +04:00
/**
* @ brief setup user for files_encryption
*
* @ param Util $util
* @ param string $password
* @ return bool
*/
2013-05-27 19:26:58 +04:00
public static function setupUser ( $util , $password ) {
2013-05-20 03:24:36 +04:00
// Check files_encryption infrastructure is ready for action
2013-05-27 19:26:58 +04:00
if ( ! $util -> ready ()) {
2013-05-20 03:24:36 +04:00
2013-05-27 22:51:52 +04:00
\OCP\Util :: writeLog ( 'Encryption library' , 'User account "' . $util -> getUserId ()
2013-06-03 20:42:13 +04:00
. '" is not ready for encryption; configuration started' , \OCP\Util :: DEBUG );
2013-05-20 03:24:36 +04:00
2013-05-27 19:26:58 +04:00
if ( ! $util -> setupServerSide ( $password )) {
2013-05-20 03:24:36 +04:00
return false ;
}
}
return true ;
}
2013-05-17 02:58:41 +04:00
/**
* @ brief enable recovery
*
* @ param $recoveryKeyId
* @ param $recoveryPassword
* @ internal param \OCA\Encryption\Util $util
* @ internal param string $password
* @ return bool
*/
2013-05-27 19:26:58 +04:00
public static function adminEnableRecovery ( $recoveryKeyId , $recoveryPassword ) {
2013-06-03 16:19:31 +04:00
2013-05-27 19:26:58 +04:00
$view = new \OC\Files\View ( '/' );
2013-05-17 02:58:41 +04:00
2013-05-27 19:26:58 +04:00
if ( $recoveryKeyId === null ) {
$recoveryKeyId = 'recovery_' . substr ( md5 ( time ()), 0 , 8 );
\OC_Appconfig :: setValue ( 'files_encryption' , 'recoveryKeyId' , $recoveryKeyId );
2013-05-17 02:58:41 +04:00
}
2013-05-27 19:26:58 +04:00
if ( ! $view -> is_dir ( '/owncloud_private_key' )) {
$view -> mkdir ( '/owncloud_private_key' );
2013-05-17 02:58:41 +04:00
}
if (
2013-05-27 19:26:58 +04:00
( ! $view -> file_exists ( " /public-keys/ " . $recoveryKeyId . " .public.key " )
|| ! $view -> file_exists ( " /owncloud_private_key/ " . $recoveryKeyId . " .private.key " ))
2013-05-17 02:58:41 +04:00
) {
$keypair = \OCA\Encryption\Crypt :: createKeypair ();
\OC_FileProxy :: $enabled = false ;
// Save public key
2013-05-27 19:26:58 +04:00
if ( ! $view -> is_dir ( '/public-keys' )) {
$view -> mkdir ( '/public-keys' );
2013-05-17 02:58:41 +04:00
}
2013-05-27 19:26:58 +04:00
$view -> file_put_contents ( '/public-keys/' . $recoveryKeyId . '.public.key' , $keypair [ 'publicKey' ]);
2013-05-17 02:58:41 +04:00
2013-07-01 23:12:21 +04:00
// Encrypt private key empty passphrase
2013-05-27 19:26:58 +04:00
$encryptedPrivateKey = \OCA\Encryption\Crypt :: symmetricEncryptFileContent ( $keypair [ 'privateKey' ], $recoveryPassword );
2013-05-17 02:58:41 +04:00
// Save private key
2013-05-27 19:26:58 +04:00
$view -> file_put_contents ( '/owncloud_private_key/' . $recoveryKeyId . '.private.key' , $encryptedPrivateKey );
2013-05-17 02:58:41 +04:00
\OC_FileProxy :: $enabled = true ;
// Set recoveryAdmin as enabled
2013-05-27 19:26:58 +04:00
\OC_Appconfig :: setValue ( 'files_encryption' , 'recoveryAdminEnabled' , 1 );
2013-05-17 02:58:41 +04:00
$return = true ;
} else { // get recovery key and check the password
2013-05-27 19:26:58 +04:00
$util = new \OCA\Encryption\Util ( new \OC_FilesystemView ( '/' ), \OCP\User :: getUser ());
$return = $util -> checkRecoveryPassword ( $recoveryPassword );
if ( $return ) {
\OC_Appconfig :: setValue ( 'files_encryption' , 'recoveryAdminEnabled' , 1 );
2013-05-17 02:58:41 +04:00
}
}
return $return ;
}
/**
* @ brief disable recovery
*
* @ param $recoveryPassword
* @ return bool
*/
2013-05-27 19:26:58 +04:00
public static function adminDisableRecovery ( $recoveryPassword ) {
$util = new Util ( new \OC_FilesystemView ( '/' ), \OCP\User :: getUser ());
$return = $util -> checkRecoveryPassword ( $recoveryPassword );
2013-05-17 02:58:41 +04:00
2013-05-27 19:26:58 +04:00
if ( $return ) {
2013-05-17 02:58:41 +04:00
// Set recoveryAdmin as disabled
2013-05-27 19:26:58 +04:00
\OC_Appconfig :: setValue ( 'files_encryption' , 'recoveryAdminEnabled' , 0 );
2013-05-17 02:58:41 +04:00
}
return $return ;
}
2013-05-28 11:27:04 +04:00
/**
* @ brief checks if access is public / anonymous user
* @ return bool
*/
public static function isPublicAccess () {
if ( \OCP\USER :: getUser () === false
|| ( isset ( $_GET [ 'service' ]) && $_GET [ 'service' ] == 'files'
&& isset ( $_GET [ 't' ]))
) {
return true ;
} else {
return false ;
}
}
2013-05-30 03:13:22 +04:00
/**
* @ brief Format a path to be relative to the / user / files / directory
* @ param string $path the absolute path
* @ return string e . g . turns '/admin/files/test.txt' into 'test.txt'
*/
public static function stripUserFilesPath ( $path ) {
$trimmed = ltrim ( $path , '/' );
$split = explode ( '/' , $trimmed );
2013-08-30 12:17:50 +04:00
2013-06-10 13:03:07 +04:00
// it is not a file relative to data/user/files
2013-07-30 17:27:59 +04:00
if ( count ( $split ) < 3 || $split [ 1 ] !== 'files' ) {
2013-06-10 13:03:07 +04:00
return false ;
}
2013-08-30 12:17:50 +04:00
2013-05-30 03:13:22 +04:00
$sliced = array_slice ( $split , 2 );
$relPath = implode ( '/' , $sliced );
return $relPath ;
}
2013-06-04 01:41:57 +04:00
2013-06-10 13:03:07 +04:00
/**
* @ brief get path to the correspondig file in data / user / files
* @ param string $path path to a version or a file in the trash
* @ return string path to correspondig file relative to data / user / files
*/
public static function getPathToRealFile ( $path ) {
$trimmed = ltrim ( $path , '/' );
$split = explode ( '/' , $trimmed );
2013-08-30 12:17:50 +04:00
2013-07-30 17:27:59 +04:00
if ( count ( $split ) < 3 || $split [ 1 ] !== " files_versions " ) {
2013-06-10 13:03:07 +04:00
return false ;
}
2013-08-30 12:17:50 +04:00
2013-06-10 13:03:07 +04:00
$sliced = array_slice ( $split , 2 );
$realPath = implode ( '/' , $sliced );
//remove the last .v
$realPath = substr ( $realPath , 0 , strrpos ( $realPath , '.v' ));
return $realPath ;
2013-08-30 12:17:50 +04:00
}
2013-06-04 01:41:57 +04:00
/**
* @ brief redirect to a error page
*/
2013-09-02 13:26:11 +04:00
public static function redirectToErrorPage ( $session ) {
2013-08-30 12:17:50 +04:00
$l = \OC_L10N :: get ( 'files_encryption' );
2013-09-02 13:26:11 +04:00
if ( $session -> getInitialized () === false ) {
2013-08-30 12:17:50 +04:00
$errorMsg = $l -> t ( 'Encryption app not initialized! Maybe the encryption app was re-enabled during your session. Please try to log out and log back in to initialize the encryption app.' );
} else {
$errorMsg = $l -> t ( 'Your private key is not valid! Likely your password was changed outside the ownCloud system (e.g. your corporate directory). You can update your private key password in your personal settings to recover access to your encrypted files.' );
}
2013-06-04 02:41:47 +04:00
if ( count ( $_POST ) > 0 ) {
2013-08-30 12:17:50 +04:00
header ( 'HTTP/1.0 404 ' . $errorMsg );
}
// check if ajax request
if ( ! empty ( $_SERVER [ 'HTTP_X_REQUESTED_WITH' ]) && strtolower ( $_SERVER [ 'HTTP_X_REQUESTED_WITH' ]) == 'xmlhttprequest' ) {
\OCP\JSON :: error ( array ( 'data' => array ( 'message' => $errorMsg )));
} else {
header ( 'HTTP/1.0 404 ' . $errorMsg );
$tmpl = new OC_Template ( 'files_encryption' , 'invalid_private_key' , 'guest' );
$tmpl -> printPage ();
2013-06-04 02:41:47 +04:00
}
2013-08-30 12:17:50 +04:00
exit ;
2013-06-04 01:41:57 +04:00
}
2013-07-01 14:16:36 +04:00
/**
2013-07-01 23:12:21 +04:00
* check requirements for encryption app .
2013-07-01 14:16:36 +04:00
* @ return bool true if requirements are met
*/
public static function checkRequirements () {
$result = true ;
//openssl extension needs to be loaded
$result &= extension_loaded ( " openssl " );
// we need php >= 5.3.3
2013-07-01 14:23:26 +04:00
$result &= version_compare ( phpversion (), '5.3.3' , '>=' );
2013-07-01 14:16:36 +04:00
2013-07-01 19:18:16 +04:00
return ( bool ) $result ;
2013-07-01 14:16:36 +04:00
}
2013-08-30 12:17:50 +04:00
2013-08-01 13:50:56 +04:00
/**
* check some common errors if the server isn ' t configured properly for encryption
* @ return bool true if configuration seems to be OK
*/
public static function checkConfiguration () {
if ( openssl_pkey_new ( array ( 'private_key_bits' => 4096 ))) {
return true ;
} else {
2013-08-01 17:52:00 +04:00
while ( $msg = openssl_error_string ()) {
\OCP\Util :: writeLog ( 'Encryption library' , 'openssl_pkey_new() fails: ' . $msg , \OCP\Util :: ERROR );
}
2013-08-01 13:50:56 +04:00
return false ;
}
}
2013-07-05 16:58:33 +04:00
/**
* @ brief glob uses different pattern than regular expressions , escape glob pattern only
* @ param unescaped path
* @ return escaped path
*/
public static function escapeGlobPattern ( $path ) {
return preg_replace ( '/(\*|\?|\[)/' , '[$1]' , $path );
}
}