2011-10-21 19:02:11 +04:00
|
|
|
<?php
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ownCloud
|
|
|
|
*
|
2012-07-25 21:28:56 +04:00
|
|
|
* @author Sam Tuke, Robin Appelman
|
|
|
|
* @copyright 2012 Sam Tuke samtuke@owncloud.com, Robin Appelman
|
|
|
|
* icewind1991@gmail.com
|
2011-10-21 19:02:11 +04:00
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 3 of the License, or any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public
|
|
|
|
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2011-10-21 19:02:11 +04:00
|
|
|
/**
|
|
|
|
* transparent encryption
|
|
|
|
*/
|
|
|
|
|
2012-10-17 19:35:19 +04:00
|
|
|
namespace OCA\Encryption;
|
2012-07-25 21:28:56 +04:00
|
|
|
|
|
|
|
class Proxy extends \OC_FileProxy {
|
2012-07-25 19:25:24 +04:00
|
|
|
|
|
|
|
private static $blackList = null; //mimetypes blacklisted from encryption
|
|
|
|
|
|
|
|
private static $enableEncryption = null;
|
2011-11-24 04:44:54 +04:00
|
|
|
|
|
|
|
/**
|
2012-07-11 20:51:27 +04:00
|
|
|
* Check if a file requires encryption
|
2011-11-24 04:44:54 +04:00
|
|
|
* @param string $path
|
|
|
|
* @return bool
|
2012-07-11 20:51:27 +04:00
|
|
|
*
|
2012-08-10 14:27:09 +04:00
|
|
|
* Tests if server side encryption is enabled, and file is allowed by blacklists
|
2011-11-24 04:44:54 +04:00
|
|
|
*/
|
2012-07-11 20:51:27 +04:00
|
|
|
private static function shouldEncrypt( $path ) {
|
2012-10-17 19:35:19 +04:00
|
|
|
|
2012-07-11 20:51:27 +04:00
|
|
|
if ( is_null( self::$enableEncryption ) ) {
|
|
|
|
|
2012-11-16 22:31:37 +04:00
|
|
|
if (
|
|
|
|
\OCP\Config::getAppValue( 'files_encryption', 'enable_encryption', 'true' ) == 'true'
|
|
|
|
&& Crypt::mode() == 'server'
|
|
|
|
) {
|
|
|
|
|
|
|
|
self::$enableEncryption = true;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
|
|
|
self::$enableEncryption = false;
|
|
|
|
|
|
|
|
}
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-04-18 18:02:35 +04:00
|
|
|
}
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-11-16 22:31:37 +04:00
|
|
|
if ( !self::$enableEncryption ) {
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-04-18 18:02:35 +04:00
|
|
|
return false;
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-04-18 18:02:35 +04:00
|
|
|
}
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-11-16 22:31:37 +04:00
|
|
|
if ( is_null(self::$blackList ) ) {
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-07-25 21:28:56 +04:00
|
|
|
self::$blackList = explode(',', \OCP\Config::getAppValue( 'files_encryption','type_blacklist','jpg,png,jpeg,avi,mpg,mpeg,mkv,mp3,oga,ogv,ogg' ) );
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-11-16 22:31:37 +04:00
|
|
|
if ( Crypt::isEncryptedContent( $path ) ) {
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
return true;
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
2012-07-11 20:51:27 +04:00
|
|
|
|
|
|
|
$extension = substr( $path, strrpos( $path,'.' ) +1 );
|
|
|
|
|
|
|
|
if ( array_search( $extension, self::$blackList ) === false ){
|
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
return true;
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
2012-07-11 20:51:27 +04:00
|
|
|
|
|
|
|
return false;
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
|
|
|
|
2012-07-11 20:51:27 +04:00
|
|
|
public function preFile_put_contents( $path, &$data ) {
|
|
|
|
|
|
|
|
if ( self::shouldEncrypt( $path ) ) {
|
|
|
|
|
2012-11-22 18:08:19 +04:00
|
|
|
if ( !is_resource( $data ) ) { //stream put contents should have been converted to fopen
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-07-25 21:28:56 +04:00
|
|
|
// Set the filesize for userland, before encrypting
|
2012-07-11 20:51:27 +04:00
|
|
|
$size = strlen( $data );
|
|
|
|
|
2012-08-14 22:06:56 +04:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2012-07-25 21:28:56 +04:00
|
|
|
// Encrypt plain data and fetch key
|
2012-08-14 22:06:56 +04:00
|
|
|
$encrypted = Crypt::keyEncryptKeyfile( $data, Keymanager::getPublicKey() );
|
2012-07-25 21:28:56 +04:00
|
|
|
|
|
|
|
// Replace plain content with encrypted content by reference
|
2012-08-14 22:06:56 +04:00
|
|
|
$data = $encrypted['data'];
|
2012-07-25 21:28:56 +04:00
|
|
|
|
2012-07-31 22:28:11 +04:00
|
|
|
$filePath = explode( '/', $path );
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-07-31 22:28:11 +04:00
|
|
|
$filePath = array_slice( $filePath, 3 );
|
|
|
|
|
|
|
|
$filePath = '/' . implode( '/', $filePath );
|
|
|
|
|
2012-08-01 17:11:41 +04:00
|
|
|
# TODO: make keyfile dir dynamic from app config
|
|
|
|
$view = new \OC_FilesystemView( '/' . \OCP\USER::getUser() . '/files_encryption/keyfiles' );
|
|
|
|
|
2012-07-31 22:28:11 +04:00
|
|
|
// Save keyfile for newly encrypted file in parallel directory tree
|
2012-08-14 22:06:56 +04:00
|
|
|
Keymanager::setFileKey( $filePath, $encrypted['key'], $view, '\OC_DB' );
|
2012-07-25 21:28:56 +04:00
|
|
|
|
|
|
|
// Update the file cache with file info
|
|
|
|
\OC_FileCache::put( $path, array( 'encrypted'=>true, 'size' => $size ), '' );
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-10-17 19:35:19 +04:00
|
|
|
// Re-enable proxy - our work is done
|
2012-08-14 22:06:56 +04:00
|
|
|
\OC_FileProxy::$enabled = true;
|
|
|
|
|
2011-10-21 19:02:11 +04:00
|
|
|
}
|
|
|
|
}
|
2012-11-16 22:31:37 +04:00
|
|
|
|
2011-10-21 19:02:11 +04:00
|
|
|
}
|
|
|
|
|
2012-07-25 19:25:24 +04:00
|
|
|
public function postFile_get_contents( $path, $data ) {
|
|
|
|
|
2012-08-15 21:49:53 +04:00
|
|
|
# TODO: Use dependency injection to add required args for view and user etc. to this method
|
2012-11-28 22:39:19 +04:00
|
|
|
|
|
|
|
// Disable encryption proxy to prevent recursive calls
|
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
|
|
|
if (
|
|
|
|
Crypt::mode() == 'server'
|
|
|
|
&& Crypt::isEncryptedContent( $data )
|
|
|
|
) {
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-23 00:19:03 +04:00
|
|
|
$filePath = explode( '/', $path );
|
|
|
|
|
|
|
|
$filePath = array_slice( $filePath, 3 );
|
|
|
|
|
|
|
|
$filePath = '/' . implode( '/', $filePath );
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-07-25 21:28:56 +04:00
|
|
|
$cached = \OC_FileCache_Cached::get( $path, '' );
|
2012-07-25 19:25:24 +04:00
|
|
|
|
2012-08-14 22:06:56 +04:00
|
|
|
$keyFile = Keymanager::getFileKey( $filePath );
|
|
|
|
|
2012-08-15 21:49:53 +04:00
|
|
|
$data = Crypt::keyDecryptKeyfile( $data, $keyFile, $_SESSION['enckey'] );
|
2012-07-25 19:25:24 +04:00
|
|
|
|
2012-11-28 22:39:19 +04:00
|
|
|
} elseif (
|
|
|
|
Crypt::mode() == 'server'
|
|
|
|
&& isset( $_SESSION['legacyenckey'] )
|
|
|
|
//&& Crypt::isEncryptedMeta( $path )
|
|
|
|
) {
|
|
|
|
|
|
|
|
$data = Crypt::legacyDecrypt( $data, $_SESSION['legacyenckey'] );
|
|
|
|
//trigger_error($data);
|
|
|
|
|
2011-10-21 19:02:11 +04:00
|
|
|
}
|
2012-07-25 19:25:24 +04:00
|
|
|
|
2012-11-28 22:39:19 +04:00
|
|
|
\OC_FileProxy::$enabled = true;
|
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
return $data;
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2011-10-21 19:02:11 +04:00
|
|
|
}
|
|
|
|
|
2012-07-31 22:28:11 +04:00
|
|
|
public function postFopen( $path, &$result ){
|
2012-11-22 23:36:48 +04:00
|
|
|
|
2012-07-31 22:28:11 +04:00
|
|
|
if ( !$result ) {
|
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
return $result;
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-10-17 19:35:19 +04:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2012-07-31 22:28:11 +04:00
|
|
|
$meta = stream_get_meta_data( $result );
|
|
|
|
|
2012-11-22 23:36:48 +04:00
|
|
|
// trigger_error("\$meta(result) = ".var_export($meta, 1));
|
|
|
|
|
2012-11-22 18:08:19 +04:00
|
|
|
$view = new \OC_FilesystemView( '' );
|
2012-10-17 19:35:19 +04:00
|
|
|
|
|
|
|
$util = new Util( $view, \OCP\USER::getUser());
|
|
|
|
|
2012-11-22 23:36:48 +04:00
|
|
|
// If file is already encrypted, decrypt using crypto protocol
|
2012-10-17 19:35:19 +04:00
|
|
|
if ( Crypt::mode() == 'server' && $util->isEncryptedPath( $path ) ) {
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-22 23:36:48 +04:00
|
|
|
// Close the original encrypted file
|
2012-10-17 19:35:19 +04:00
|
|
|
fclose( $result );
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-22 23:36:48 +04:00
|
|
|
// Open the file using the crypto protocol and let
|
|
|
|
// it do the decryption work instead
|
2012-10-17 19:35:19 +04:00
|
|
|
$result = fopen( 'crypt://' . $path, $meta['mode'] );
|
2012-11-22 23:36:48 +04:00
|
|
|
|
2012-10-17 19:35:19 +04:00
|
|
|
|
2012-11-22 18:08:19 +04:00
|
|
|
} elseif (
|
2012-07-31 22:28:11 +04:00
|
|
|
self::shouldEncrypt( $path )
|
|
|
|
and $meta ['mode'] != 'r'
|
|
|
|
and $meta['mode'] != 'rb'
|
|
|
|
) {
|
2012-11-22 23:36:48 +04:00
|
|
|
// If the file should be encrypted and has been opened for
|
|
|
|
// reading only
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-23 00:19:03 +04:00
|
|
|
// Reformat path for use with OC_FSV
|
|
|
|
$path_split = explode( '/', $path );
|
|
|
|
$path_f = implode( array_slice( $path_split, 3 ) );
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-23 00:19:03 +04:00
|
|
|
// trigger_error("$path_f = ".var_export($path_f, 1));
|
|
|
|
|
|
|
|
if (
|
|
|
|
$view->file_exists( $path )
|
|
|
|
and $view->filesize( $path ) > 0
|
|
|
|
) {
|
|
|
|
$x = $view->file_get_contents( $path );
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-23 00:19:03 +04:00
|
|
|
trigger_error( "size = ".var_export( $x, 1 ) );
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-23 00:19:03 +04:00
|
|
|
$tmp = tmpfile();
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-23 00:19:03 +04:00
|
|
|
// trigger_error("Result meta = ".var_export($meta, 1));
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-23 00:19:03 +04:00
|
|
|
// // Make a temporary copy of the original file
|
|
|
|
// \OCP\Files::streamCopy( $result, $tmp );
|
|
|
|
//
|
|
|
|
// // Close the original stream, we'll return another one
|
|
|
|
// fclose( $result );
|
|
|
|
//
|
|
|
|
// $view->file_put_contents( $path_f, $tmp );
|
|
|
|
//
|
|
|
|
// fclose( $tmp );
|
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-23 00:19:03 +04:00
|
|
|
$result = fopen( 'crypt://'.$path_f, $meta['mode'] );
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-22 18:08:19 +04:00
|
|
|
}
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-14 17:58:57 +04:00
|
|
|
// Re-enable the proxy
|
|
|
|
\OC_FileProxy::$enabled = true;
|
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
return $result;
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2011-10-21 19:02:11 +04:00
|
|
|
}
|
2012-02-16 00:44:58 +04:00
|
|
|
|
|
|
|
public function postGetMimeType($path,$mime){
|
2012-08-10 14:27:09 +04:00
|
|
|
if( Crypt::isEncryptedContent($path)){
|
2012-07-25 21:28:56 +04:00
|
|
|
$mime = \OCP\Files::getMimeType('crypt://'.$path,'w');
|
2012-02-21 23:48:14 +04:00
|
|
|
}
|
2012-02-26 18:56:47 +04:00
|
|
|
return $mime;
|
2012-02-16 00:44:58 +04:00
|
|
|
}
|
2012-06-21 19:37:53 +04:00
|
|
|
|
|
|
|
public function postStat($path,$data){
|
2012-08-10 14:27:09 +04:00
|
|
|
if( Crypt::isEncryptedContent($path)){
|
2012-07-25 21:28:56 +04:00
|
|
|
$cached= \OC_FileCache_Cached::get($path,'');
|
2012-06-21 19:37:53 +04:00
|
|
|
$data['size']=$cached['size'];
|
|
|
|
}
|
|
|
|
return $data;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function postFileSize($path,$size){
|
2012-08-10 14:27:09 +04:00
|
|
|
if( Crypt::isEncryptedContent($path)){
|
2012-07-25 21:28:56 +04:00
|
|
|
$cached = \OC_FileCache_Cached::get($path,'');
|
2012-06-21 19:37:53 +04:00
|
|
|
return $cached['size'];
|
|
|
|
}else{
|
|
|
|
return $size;
|
|
|
|
}
|
|
|
|
}
|
2011-10-21 19:02:11 +04:00
|
|
|
}
|