2011-10-21 19:02:11 +04:00
|
|
|
<?php
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ownCloud
|
|
|
|
*
|
2012-07-25 21:28:56 +04:00
|
|
|
* @author Sam Tuke, Robin Appelman
|
|
|
|
* @copyright 2012 Sam Tuke samtuke@owncloud.com, Robin Appelman
|
|
|
|
* icewind1991@gmail.com
|
2011-10-21 19:02:11 +04:00
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 3 of the License, or any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public
|
|
|
|
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2013-01-30 22:52:02 +04:00
|
|
|
/**
|
|
|
|
* @brief Encryption proxy which handles filesystem operations before and after
|
|
|
|
* execution and encrypts, and handles keyfiles accordingly. Used for
|
|
|
|
* webui.
|
|
|
|
*/
|
|
|
|
|
2012-10-17 19:35:19 +04:00
|
|
|
namespace OCA\Encryption;
|
2012-07-25 21:28:56 +04:00
|
|
|
|
|
|
|
class Proxy extends \OC_FileProxy {
|
2012-07-25 19:25:24 +04:00
|
|
|
|
|
|
|
private static $blackList = null; //mimetypes blacklisted from encryption
|
|
|
|
|
|
|
|
private static $enableEncryption = null;
|
2011-11-24 04:44:54 +04:00
|
|
|
|
|
|
|
/**
|
2012-07-11 20:51:27 +04:00
|
|
|
* Check if a file requires encryption
|
2011-11-24 04:44:54 +04:00
|
|
|
* @param string $path
|
|
|
|
* @return bool
|
2012-07-11 20:51:27 +04:00
|
|
|
*
|
2012-08-10 14:27:09 +04:00
|
|
|
* Tests if server side encryption is enabled, and file is allowed by blacklists
|
2011-11-24 04:44:54 +04:00
|
|
|
*/
|
2012-07-11 20:51:27 +04:00
|
|
|
private static function shouldEncrypt( $path ) {
|
2012-10-17 19:35:19 +04:00
|
|
|
|
2012-07-11 20:51:27 +04:00
|
|
|
if ( is_null( self::$enableEncryption ) ) {
|
|
|
|
|
2012-11-16 22:31:37 +04:00
|
|
|
if (
|
2013-01-24 22:37:34 +04:00
|
|
|
\OCP\Config::getAppValue( 'files_encryption', 'enable_encryption', 'true' ) == 'true'
|
|
|
|
&& Crypt::mode() == 'server'
|
2012-11-16 22:31:37 +04:00
|
|
|
) {
|
|
|
|
|
|
|
|
self::$enableEncryption = true;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
|
|
|
self::$enableEncryption = false;
|
|
|
|
|
|
|
|
}
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-04-18 18:02:35 +04:00
|
|
|
}
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-11-16 22:31:37 +04:00
|
|
|
if ( !self::$enableEncryption ) {
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-04-18 18:02:35 +04:00
|
|
|
return false;
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-04-18 18:02:35 +04:00
|
|
|
}
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2012-11-16 22:31:37 +04:00
|
|
|
if ( is_null(self::$blackList ) ) {
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2013-02-22 19:08:08 +04:00
|
|
|
self::$blackList = explode(',', \OCP\Config::getAppValue( 'files_encryption', 'type_blacklist', '' ) );
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2013-03-09 22:18:34 +04:00
|
|
|
if ( Crypt::isCatfileContent( $path ) ) {
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
return true;
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2013-01-24 22:37:34 +04:00
|
|
|
$extension = substr( $path, strrpos( $path, '.' ) +1 );
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2013-01-24 22:37:34 +04:00
|
|
|
if ( array_search( $extension, self::$blackList ) === false ) {
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
return true;
|
2012-07-11 20:51:27 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
2012-07-11 20:51:27 +04:00
|
|
|
|
|
|
|
return false;
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
|
|
|
|
2013-04-23 21:08:52 +04:00
|
|
|
public function preFile_put_contents( $path, &$data ) {
|
|
|
|
|
2013-05-09 20:09:20 +04:00
|
|
|
if ( self::shouldEncrypt( $path ) ) {
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-09 20:09:20 +04:00
|
|
|
// Stream put contents should have been converted to fopen
|
2013-02-09 22:39:32 +04:00
|
|
|
if ( !is_resource( $data ) ) {
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-09 20:09:20 +04:00
|
|
|
$userId = \OCP\USER::getUser();
|
|
|
|
$view = new \OC_FilesystemView( '/' );
|
|
|
|
$util = new Util( $view, $userId );
|
|
|
|
$session = new Session( $view );
|
2013-02-27 22:46:44 +04:00
|
|
|
$privateKey = $session->getPrivateKey();
|
2013-02-11 14:21:23 +04:00
|
|
|
$filePath = $util->stripUserFilesPath( $path );
|
2012-07-25 21:28:56 +04:00
|
|
|
// Set the filesize for userland, before encrypting
|
2012-07-11 20:51:27 +04:00
|
|
|
$size = strlen( $data );
|
2013-05-09 20:09:20 +04:00
|
|
|
|
2012-08-14 22:06:56 +04:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
2013-05-09 20:09:20 +04:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2013-02-27 22:46:44 +04:00
|
|
|
// Check if there is an existing key we can reuse
|
2013-05-09 20:09:20 +04:00
|
|
|
if ( $encKeyfile = Keymanager::getFileKey( $view, $userId, $filePath ) ) {
|
2013-04-10 19:37:03 +04:00
|
|
|
|
|
|
|
// Fetch shareKey
|
2013-05-09 20:09:20 +04:00
|
|
|
$shareKey = Keymanager::getShareKey( $view, $userId, $filePath );
|
2013-04-10 19:37:03 +04:00
|
|
|
|
2013-02-27 22:46:44 +04:00
|
|
|
// Decrypt the keyfile
|
2013-04-10 19:37:03 +04:00
|
|
|
$plainKey = Crypt::multiKeyDecrypt( $encKeyfile, $shareKey, $privateKey );
|
2013-02-27 22:46:44 +04:00
|
|
|
|
|
|
|
} else {
|
|
|
|
|
|
|
|
// Make a new key
|
|
|
|
$plainKey = Crypt::generateKey();
|
2013-05-09 20:09:20 +04:00
|
|
|
|
2013-02-27 22:46:44 +04:00
|
|
|
}
|
|
|
|
|
2013-02-11 14:21:23 +04:00
|
|
|
// Encrypt data
|
2013-02-27 22:46:44 +04:00
|
|
|
$encData = Crypt::symmetricEncryptFileContent( $data, $plainKey );
|
2013-01-14 23:07:28 +04:00
|
|
|
|
2013-04-16 20:29:22 +04:00
|
|
|
$sharingEnabled = \OCP\Share::isEnabled();
|
2013-03-20 22:26:59 +04:00
|
|
|
|
2013-04-22 14:25:55 +04:00
|
|
|
$uniqueUserIds = $util->getSharingUsersArray( $sharingEnabled, $filePath, $userId );
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-09 20:09:20 +04:00
|
|
|
// Fetch public keys for all users who will share the file
|
|
|
|
$publicKeys = Keymanager::getPublicKeys( $view, $uniqueUserIds );
|
2013-04-25 17:20:06 +04:00
|
|
|
|
2013-05-09 20:09:20 +04:00
|
|
|
// Encrypt plain keyfile to multiple sharefiles
|
2013-03-20 22:26:59 +04:00
|
|
|
$multiEncrypted = Crypt::multiKeyEncrypt( $plainKey, $publicKeys );
|
|
|
|
|
|
|
|
// Save sharekeys to user folders
|
2013-05-09 20:09:20 +04:00
|
|
|
Keymanager::setShareKeys( $view, $filePath, $multiEncrypted['keys'] );
|
2013-03-20 22:26:59 +04:00
|
|
|
|
|
|
|
// Set encrypted keyfile as common varname
|
|
|
|
$encKey = $multiEncrypted['data'];
|
|
|
|
|
2013-04-18 17:42:28 +04:00
|
|
|
// Save keyfile for newly encrypted file in parallel directory tree
|
2013-05-09 20:09:20 +04:00
|
|
|
Keymanager::setFileKey( $view, $filePath, $userId, $encKey );
|
2013-04-18 17:42:28 +04:00
|
|
|
|
2013-02-11 14:21:23 +04:00
|
|
|
// Replace plain content with encrypted content by reference
|
2013-02-27 22:46:44 +04:00
|
|
|
$data = $encData;
|
2013-05-09 20:09:20 +04:00
|
|
|
|
2012-07-25 21:28:56 +04:00
|
|
|
// Update the file cache with file info
|
2013-05-09 20:09:20 +04:00
|
|
|
\OC\Files\Filesystem::putFileInfo( $filePath, array( 'encrypted'=>true, 'size' => strlen($size), 'unencrypted_size' => $size), '' );
|
2013-04-30 22:44:42 +04:00
|
|
|
|
2013-05-09 20:09:20 +04:00
|
|
|
// Re-enable proxy - our work is done
|
2013-04-25 17:20:06 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2012-08-14 22:06:56 +04:00
|
|
|
|
2011-10-21 19:02:11 +04:00
|
|
|
}
|
|
|
|
}
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-05-09 20:09:20 +04:00
|
|
|
return true;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
public function postFile_put_contents( $path, $length ) {
|
|
|
|
|
|
|
|
$userId = \OCP\USER::getUser();
|
|
|
|
$view = new \OC_FilesystemView( '/' );
|
|
|
|
$util = new Util( $view, $userId );
|
|
|
|
|
|
|
|
// Check if recoveryAdmin is enabled for system and user
|
|
|
|
// TODO: Consider storing recoveryAdmin status for user in session
|
|
|
|
if (
|
|
|
|
\OC_Appconfig::getValue( 'files_encryption', 'recoveryAdminEnabled' )
|
|
|
|
&& $util->recoveryEnabledForUser()
|
|
|
|
) {
|
|
|
|
|
|
|
|
// Get owner UID and filepath
|
|
|
|
list( $owner, $ownerPath ) = $util->getUidAndFilename( $path );
|
|
|
|
|
|
|
|
$recoveryAdminUid = \OC_Appconfig::getValue( 'files_encryption', 'recoveryAdminEnabled' );
|
|
|
|
$usersSharing = \OCP\Share::getUsersSharingFile( $ownerPath, $owner,true, true, true );
|
|
|
|
|
|
|
|
// Check if file is already shared to recoveryAdmin
|
|
|
|
if ( ! in_array( $recoveryAdminUid, $usersSharing ) ) {
|
|
|
|
|
|
|
|
$relPath = $util->stripFilesPath( $path );
|
|
|
|
|
|
|
|
// Get file info from filecache
|
|
|
|
$fileInfo = \OC\Files\Filesystem::getFileInfo( $path );
|
|
|
|
|
|
|
|
// Register share to recoveryAdmin with share API
|
|
|
|
// FIXME: Some of these vars aren't set
|
|
|
|
// FIXME: What should the permission number be to grant all rights?
|
|
|
|
// \OCP\Share::shareItem( $itemType, $itemSource, 0, $recoveryAdminUid, 17 );
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2011-10-21 19:02:11 +04:00
|
|
|
}
|
|
|
|
|
2012-12-11 19:10:56 +04:00
|
|
|
/**
|
|
|
|
* @param string $path Path of file from which has been read
|
|
|
|
* @param string $data Data that has been read from file
|
|
|
|
*/
|
2012-07-25 19:25:24 +04:00
|
|
|
public function postFile_get_contents( $path, $data ) {
|
2013-03-26 15:23:28 +04:00
|
|
|
|
2013-04-23 21:08:52 +04:00
|
|
|
// FIXME: $path for shared files is just /uid/files/Shared/filepath
|
2013-02-20 23:18:00 +04:00
|
|
|
|
|
|
|
$userId = \OCP\USER::getUser();
|
|
|
|
$view = new \OC_FilesystemView( '/' );
|
|
|
|
$util = new Util( $view, $userId );
|
|
|
|
|
2013-03-26 15:23:28 +04:00
|
|
|
$relPath = $util->stripUserFilesPath( $path );
|
2013-02-20 23:18:00 +04:00
|
|
|
|
|
|
|
|
2013-02-11 15:12:21 +04:00
|
|
|
// TODO check for existing key file and reuse it if possible to avoid problems with versioning etc.
|
2012-11-28 22:39:19 +04:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
2013-04-25 17:20:06 +04:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
|
|
|
// If data is a catfile
|
2012-11-28 22:39:19 +04:00
|
|
|
if (
|
2013-01-24 22:37:34 +04:00
|
|
|
Crypt::mode() == 'server'
|
2013-04-10 19:37:03 +04:00
|
|
|
&& Crypt::isCatfileContent( $data ) // TODO: Do we really need this check? Can't we assume it is properly encrypted?
|
2012-11-28 22:39:19 +04:00
|
|
|
) {
|
2013-02-20 23:18:00 +04:00
|
|
|
|
2013-04-10 19:37:03 +04:00
|
|
|
// TODO: use get owner to find correct location of key files for shared files
|
|
|
|
$session = new Session( $view );
|
2013-02-11 14:21:23 +04:00
|
|
|
$privateKey = $session->getPrivateKey( $userId );
|
2012-11-23 00:19:03 +04:00
|
|
|
|
2013-02-11 14:21:23 +04:00
|
|
|
// Get the encrypted keyfile
|
2013-04-18 18:34:23 +04:00
|
|
|
$encKeyfile = Keymanager::getFileKey( $view, $userId, $relPath );
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2013-02-20 23:18:00 +04:00
|
|
|
// Attempt to fetch the user's shareKey
|
|
|
|
$shareKey = Keymanager::getShareKey( $view, $userId, $relPath );
|
|
|
|
|
2013-04-10 19:37:03 +04:00
|
|
|
// Decrypt keyfile with shareKey
|
|
|
|
$plainKeyfile = Crypt::multiKeyDecrypt( $encKeyfile, $shareKey, $privateKey );
|
|
|
|
|
2013-02-11 14:21:23 +04:00
|
|
|
$plainData = Crypt::symmetricDecryptFileContent( $data, $plainKeyfile );
|
2012-12-11 19:10:56 +04:00
|
|
|
|
2012-11-28 22:39:19 +04:00
|
|
|
} elseif (
|
|
|
|
Crypt::mode() == 'server'
|
|
|
|
&& isset( $_SESSION['legacyenckey'] )
|
2012-12-04 23:53:13 +04:00
|
|
|
&& Crypt::isEncryptedMeta( $path )
|
2012-11-28 22:39:19 +04:00
|
|
|
) {
|
|
|
|
|
2013-02-11 14:21:23 +04:00
|
|
|
$plainData = Crypt::legacyDecrypt( $data, $session->getLegacyKey() );
|
2012-11-28 22:39:19 +04:00
|
|
|
|
2011-10-21 19:02:11 +04:00
|
|
|
}
|
2012-07-25 19:25:24 +04:00
|
|
|
|
2013-04-25 17:20:06 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2012-11-28 22:39:19 +04:00
|
|
|
|
2013-02-11 14:21:23 +04:00
|
|
|
if ( ! isset( $plainData ) ) {
|
2012-12-11 19:10:56 +04:00
|
|
|
|
2013-02-11 14:21:23 +04:00
|
|
|
$plainData = $data;
|
2012-12-11 19:10:56 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-02-11 14:21:23 +04:00
|
|
|
return $plainData;
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2011-10-21 19:02:11 +04:00
|
|
|
}
|
|
|
|
|
2013-01-29 23:54:40 +04:00
|
|
|
/**
|
|
|
|
* @brief When a file is deleted, remove its keyfile also
|
|
|
|
*/
|
2013-01-30 21:25:17 +04:00
|
|
|
public function preUnlink( $path ) {
|
2013-01-29 23:54:40 +04:00
|
|
|
|
2013-04-18 04:03:03 +04:00
|
|
|
// let the trashbin handle this
|
|
|
|
if ( \OCP\App::isEnabled('files_trashbin') ) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-01-29 23:54:40 +04:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
2013-04-25 17:20:06 +04:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-01-29 23:54:40 +04:00
|
|
|
|
|
|
|
$view = new \OC_FilesystemView( '/' );
|
2013-03-26 19:17:26 +04:00
|
|
|
|
2013-01-30 22:52:02 +04:00
|
|
|
$userId = \OCP\USER::getUser();
|
2013-03-26 19:17:26 +04:00
|
|
|
|
|
|
|
$util = new Util( $view, $userId );
|
|
|
|
|
2013-01-29 23:54:40 +04:00
|
|
|
// Format path to be relative to user files dir
|
2013-04-16 20:29:22 +04:00
|
|
|
$relPath = $util->stripUserFilesPath( $path );
|
|
|
|
|
2013-04-22 17:29:58 +04:00
|
|
|
list( $owner, $ownerPath ) = $util->getUidAndFilename( $relPath );
|
2013-03-26 19:52:58 +04:00
|
|
|
|
|
|
|
// Delete keyfile & shareKey so it isn't orphaned
|
|
|
|
if (
|
|
|
|
! (
|
2013-04-22 17:29:58 +04:00
|
|
|
Keymanager::deleteFileKey( $view, $owner, $ownerPath )
|
|
|
|
&& Keymanager::delAllShareKeys( $view, $owner, $ownerPath )
|
2013-03-26 19:52:58 +04:00
|
|
|
)
|
|
|
|
) {
|
2013-01-29 23:54:40 +04:00
|
|
|
|
2013-04-22 20:54:23 +04:00
|
|
|
\OC_Log::write( 'Encryption library', 'Keyfile or shareKey could not be deleted for file "'.$ownerPath.'"', \OC_Log::ERROR );
|
2013-02-27 20:15:03 +04:00
|
|
|
|
2013-01-30 21:25:17 +04:00
|
|
|
}
|
2013-02-27 20:15:03 +04:00
|
|
|
|
2013-04-25 17:20:06 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-02-27 20:15:03 +04:00
|
|
|
|
|
|
|
// If we don't return true then file delete will fail; better
|
|
|
|
// to leave orphaned keyfiles than to disallow file deletion
|
|
|
|
return true;
|
2013-01-29 23:54:40 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2013-04-26 00:49:47 +04:00
|
|
|
* @brief When a file is renamed, rename its keyfile also
|
|
|
|
* @return bool Result of rename()
|
|
|
|
* @note This is pre rather than post because using post didn't work
|
|
|
|
*/
|
2013-04-27 22:21:46 +04:00
|
|
|
public function postWrite( $path )
|
2013-04-26 00:49:47 +04:00
|
|
|
{
|
2013-04-27 22:21:46 +04:00
|
|
|
$this->handleFile($path);
|
2013-04-26 00:49:47 +04:00
|
|
|
|
2013-04-27 22:21:46 +04:00
|
|
|
return true;
|
|
|
|
}
|
2013-04-26 00:49:47 +04:00
|
|
|
|
2013-04-27 22:21:46 +04:00
|
|
|
public function postTouch( $path )
|
|
|
|
{
|
|
|
|
$this->handleFile($path);
|
2013-04-26 00:49:47 +04:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-04-22 06:40:49 +04:00
|
|
|
public function postFopen( $path, &$result ){
|
2013-04-23 21:08:52 +04:00
|
|
|
|
|
|
|
if ( !$result ) {
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
return $result;
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
}
|
2013-04-23 21:08:52 +04:00
|
|
|
|
|
|
|
// Reformat path for use with OC_FSV
|
2012-12-04 23:53:13 +04:00
|
|
|
$path_split = explode( '/', $path );
|
2013-02-09 16:42:18 +04:00
|
|
|
$path_f = implode( '/', array_slice( $path_split, 3 ) );
|
2013-04-25 22:23:54 +04:00
|
|
|
|
|
|
|
// FIXME: handling for /userId/cache used by webdav for chunking. The cache chunks are NOT encrypted
|
|
|
|
if($path_split[2] == 'cache') {
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
2012-10-17 19:35:19 +04:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
2013-04-25 17:20:06 +04:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
|
|
|
$meta = stream_get_meta_data( $result );
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-22 18:08:19 +04:00
|
|
|
$view = new \OC_FilesystemView( '' );
|
2012-10-17 19:35:19 +04:00
|
|
|
|
|
|
|
$util = new Util( $view, \OCP\USER::getUser());
|
|
|
|
|
2012-11-22 23:36:48 +04:00
|
|
|
// If file is already encrypted, decrypt using crypto protocol
|
2012-12-04 23:53:13 +04:00
|
|
|
if (
|
2013-01-24 22:37:34 +04:00
|
|
|
Crypt::mode() == 'server'
|
|
|
|
&& $util->isEncryptedPath( $path )
|
2012-12-04 23:53:13 +04:00
|
|
|
) {
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-22 23:36:48 +04:00
|
|
|
// Close the original encrypted file
|
2012-10-17 19:35:19 +04:00
|
|
|
fclose( $result );
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-12-04 23:53:13 +04:00
|
|
|
// Open the file using the crypto stream wrapper
|
|
|
|
// protocol and let it do the decryption work instead
|
|
|
|
$result = fopen( 'crypt://' . $path_f, $meta['mode'] );
|
2012-11-22 23:36:48 +04:00
|
|
|
|
2012-10-17 19:35:19 +04:00
|
|
|
|
2012-11-22 18:08:19 +04:00
|
|
|
} elseif (
|
2013-01-24 22:37:34 +04:00
|
|
|
self::shouldEncrypt( $path )
|
|
|
|
and $meta ['mode'] != 'r'
|
|
|
|
and $meta['mode'] != 'rb'
|
2012-07-31 22:28:11 +04:00
|
|
|
) {
|
2012-12-04 23:53:13 +04:00
|
|
|
// If the file is not yet encrypted, but should be
|
|
|
|
// encrypted when it's saved (it's not read only)
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-12-04 23:53:13 +04:00
|
|
|
// NOTE: this is the case for new files saved via WebDAV
|
2012-11-23 00:19:03 +04:00
|
|
|
|
2013-04-25 17:20:06 +04:00
|
|
|
// if (
|
|
|
|
// $view->file_exists( $path )
|
|
|
|
// and $view->filesize( $path ) > 0
|
|
|
|
// ) {
|
|
|
|
// $x = $view->file_get_contents( $path );
|
|
|
|
//
|
|
|
|
// $tmp = tmpfile();
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-23 00:19:03 +04:00
|
|
|
// // Make a temporary copy of the original file
|
|
|
|
// \OCP\Files::streamCopy( $result, $tmp );
|
|
|
|
//
|
|
|
|
// // Close the original stream, we'll return another one
|
|
|
|
// fclose( $result );
|
|
|
|
//
|
|
|
|
// $view->file_put_contents( $path_f, $tmp );
|
|
|
|
//
|
|
|
|
// fclose( $tmp );
|
|
|
|
|
2013-04-25 17:20:06 +04:00
|
|
|
// }
|
2013-04-23 21:08:52 +04:00
|
|
|
|
|
|
|
$result = fopen( 'crypt://'.$path_f, $meta['mode'] );
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-22 18:08:19 +04:00
|
|
|
}
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2012-11-14 17:58:57 +04:00
|
|
|
// Re-enable the proxy
|
2013-04-25 17:20:06 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2012-11-14 17:58:57 +04:00
|
|
|
|
2011-11-24 04:44:54 +04:00
|
|
|
return $result;
|
2012-07-31 22:28:11 +04:00
|
|
|
|
2011-10-21 19:02:11 +04:00
|
|
|
}
|
2012-02-16 00:44:58 +04:00
|
|
|
|
2013-01-24 22:37:34 +04:00
|
|
|
public function postGetMimeType( $path, $mime ) {
|
2013-04-23 21:08:52 +04:00
|
|
|
|
|
|
|
if ( Crypt::isCatfileContent( $path ) ) {
|
2013-01-24 22:37:34 +04:00
|
|
|
|
|
|
|
$mime = \OCP\Files::getMimeType( 'crypt://' . $path, 'w' );
|
|
|
|
|
2012-02-21 23:48:14 +04:00
|
|
|
}
|
2013-01-24 22:37:34 +04:00
|
|
|
|
2012-02-26 18:56:47 +04:00
|
|
|
return $mime;
|
2013-01-24 22:37:34 +04:00
|
|
|
|
2012-02-16 00:44:58 +04:00
|
|
|
}
|
2012-06-21 19:37:53 +04:00
|
|
|
|
2013-04-23 21:08:52 +04:00
|
|
|
public function postGetFileInfo( $path, $data ) {
|
|
|
|
|
|
|
|
// if path is a folder do nothing
|
|
|
|
if(is_array($data) && array_key_exists('size', $data)) {
|
2013-04-26 00:49:47 +04:00
|
|
|
|
2013-04-23 21:08:52 +04:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
2013-04-25 17:20:06 +04:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-04-23 21:08:52 +04:00
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
|
|
|
// get file size
|
|
|
|
$data['size'] = self::postFileSize($path, $data['size']);
|
|
|
|
|
|
|
|
// Re-enable the proxy
|
2013-04-25 17:20:06 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-04-23 21:08:52 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return $data;
|
|
|
|
}
|
|
|
|
|
2013-04-27 22:21:46 +04:00
|
|
|
public function postStat($path, $data)
|
|
|
|
{
|
|
|
|
// check if file is encrypted
|
|
|
|
if (Crypt::isCatfileContent($path)) {
|
2013-04-23 21:08:52 +04:00
|
|
|
|
2013-04-27 22:21:46 +04:00
|
|
|
// get file info from cache
|
|
|
|
$cached = \OC\Files\Filesystem::getFileInfo($path, '');
|
2012-06-21 19:37:53 +04:00
|
|
|
|
2013-04-27 22:21:46 +04:00
|
|
|
// set the real file size
|
|
|
|
$data['size'] = $cached['unencrypted_size'];
|
|
|
|
}
|
2013-04-22 06:40:49 +04:00
|
|
|
|
2013-04-27 22:21:46 +04:00
|
|
|
return $data;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function postFileSize($path, $size)
|
|
|
|
{
|
|
|
|
|
|
|
|
$view = new \OC_FilesystemView('/');
|
2013-04-23 21:08:52 +04:00
|
|
|
|
|
|
|
// if path is a folder do nothing
|
2013-04-27 22:21:46 +04:00
|
|
|
if ($view->is_dir($path)) {
|
2013-04-23 21:08:52 +04:00
|
|
|
return $size;
|
|
|
|
}
|
|
|
|
|
2013-04-22 06:40:49 +04:00
|
|
|
// Reformat path for use with OC_FSV
|
|
|
|
$path_split = explode('/', $path);
|
|
|
|
$path_f = implode('/', array_slice($path_split, 3));
|
|
|
|
|
2013-05-07 15:42:08 +04:00
|
|
|
// if path is empty we cannot resolve anything
|
|
|
|
if(empty($path_f)) {
|
|
|
|
return $size;
|
|
|
|
}
|
|
|
|
|
2013-04-25 17:20:06 +04:00
|
|
|
// get file info from database/cache
|
|
|
|
$fileInfo = \OC\Files\Filesystem::getFileInfo($path_f);
|
2013-04-22 06:40:49 +04:00
|
|
|
|
2013-04-25 17:20:06 +04:00
|
|
|
// if file is encrypted return real file size
|
2013-04-30 22:44:42 +04:00
|
|
|
if (is_array($fileInfo) && $fileInfo['encrypted'] === true) {
|
2013-04-28 01:02:42 +04:00
|
|
|
$size = $fileInfo['unencrypted_size'];
|
2013-04-22 06:40:49 +04:00
|
|
|
} else {
|
2013-04-28 01:02:42 +04:00
|
|
|
// self healing if file was removed from file cache
|
2013-04-30 22:44:42 +04:00
|
|
|
if(is_array($fileInfo)) {
|
|
|
|
$userId = \OCP\User::getUser();
|
|
|
|
$util = new Util( $view, $userId );
|
|
|
|
$fixSize = $util->getFileSize($path);
|
|
|
|
if($fixSize > 0) {
|
|
|
|
$size = $fixSize;
|
|
|
|
|
|
|
|
$fileInfo['encrypted'] = 1;
|
|
|
|
$fileInfo['unencrypted_size'] = $size;
|
|
|
|
|
|
|
|
// put file info
|
|
|
|
$view->putFileInfo( $path_f, $fileInfo );
|
|
|
|
}
|
2013-04-28 01:02:42 +04:00
|
|
|
}
|
2013-04-22 06:40:49 +04:00
|
|
|
}
|
2013-04-28 01:02:42 +04:00
|
|
|
return $size;
|
2013-04-27 22:21:46 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
public function handleFile($path) {
|
|
|
|
|
|
|
|
// Disable encryption proxy to prevent recursive calls
|
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
|
|
|
$view = new \OC_FilesystemView('/');
|
|
|
|
$session = new Session($view);
|
|
|
|
$userId = \OCP\User::getUser();
|
|
|
|
$util = new Util( $view, $userId );
|
|
|
|
|
|
|
|
// Reformat path for use with OC_FSV
|
|
|
|
$path_split = explode( '/', $path );
|
|
|
|
$path_f = implode( '/', array_slice( $path_split, 3 ) );
|
|
|
|
|
|
|
|
// only if file is on 'files' folder fix file size and sharing
|
|
|
|
if($path_split[2] == 'files' && $util->fixFileSize($path)) {
|
|
|
|
|
|
|
|
// get sharing app state
|
|
|
|
$sharingEnabled = \OCP\Share::isEnabled();
|
|
|
|
|
|
|
|
// get users
|
|
|
|
$usersSharing = $util->getSharingUsersArray($sharingEnabled, $path_f);
|
|
|
|
|
|
|
|
// update sharing-keys
|
|
|
|
$util->setSharedFileKeyfiles($session, $usersSharing, $path_f);
|
|
|
|
}
|
|
|
|
|
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
|
|
|
}
|
|
|
|
}
|