2015-01-14 22:39:23 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 18:07:57 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Bjoern Schiessle <bjoern@schiessle.org>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2020-03-31 11:49:10 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2016-07-21 18:07:57 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Piotr M <mrow4a@yahoo.com>
|
2016-07-21 19:13:36 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2015-04-07 18:02:49 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
2016-03-01 19:25:15 +03:00
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
2015-01-14 22:39:23 +03:00
|
|
|
*
|
2015-04-07 18:02:49 +03:00
|
|
|
* @license AGPL-3.0
|
2015-01-14 22:39:23 +03:00
|
|
|
*
|
2015-04-07 18:02:49 +03:00
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
2015-01-14 22:39:23 +03:00
|
|
|
*
|
2015-04-07 18:02:49 +03:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2015-01-14 22:39:23 +03:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-04-07 18:02:49 +03:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-01-14 22:39:23 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Files\Storage\Wrapper;
|
|
|
|
|
|
|
|
use OC\Encryption\Exceptions\ModuleDoesNotExistsException;
|
2015-04-23 17:48:11 +03:00
|
|
|
use OC\Encryption\Update;
|
|
|
|
use OC\Encryption\Util;
|
2015-12-02 16:59:13 +03:00
|
|
|
use OC\Files\Cache\CacheEntry;
|
2015-04-20 17:50:12 +03:00
|
|
|
use OC\Files\Filesystem;
|
2015-05-21 15:07:42 +03:00
|
|
|
use OC\Files\Mount\Manager;
|
2015-04-02 15:44:58 +03:00
|
|
|
use OC\Files\Storage\LocalTempFileTrait;
|
2016-03-31 00:20:37 +03:00
|
|
|
use OC\Memcache\ArrayCache;
|
2015-07-09 19:04:35 +03:00
|
|
|
use OCP\Encryption\Exceptions\GenericEncryptionException;
|
2015-04-24 14:06:03 +03:00
|
|
|
use OCP\Encryption\IFile;
|
|
|
|
use OCP\Encryption\IManager;
|
2015-04-23 17:48:11 +03:00
|
|
|
use OCP\Encryption\Keys\IStorage;
|
2019-11-22 22:52:10 +03:00
|
|
|
use OCP\Files\Cache\ICacheEntry;
|
2015-04-07 10:42:54 +03:00
|
|
|
use OCP\Files\Mount\IMountPoint;
|
2015-05-21 15:07:42 +03:00
|
|
|
use OCP\Files\Storage;
|
2015-04-24 14:06:03 +03:00
|
|
|
use OCP\ILogger;
|
2015-01-14 22:39:23 +03:00
|
|
|
|
|
|
|
class Encryption extends Wrapper {
|
2015-04-02 15:44:58 +03:00
|
|
|
use LocalTempFileTrait;
|
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
/** @var string */
|
|
|
|
private $mountPoint;
|
|
|
|
|
|
|
|
/** @var \OC\Encryption\Util */
|
|
|
|
private $util;
|
|
|
|
|
2015-04-24 14:06:03 +03:00
|
|
|
/** @var \OCP\Encryption\IManager */
|
2015-01-14 22:39:23 +03:00
|
|
|
private $encryptionManager;
|
|
|
|
|
2015-04-24 14:06:03 +03:00
|
|
|
/** @var \OCP\ILogger */
|
2015-01-14 22:39:23 +03:00
|
|
|
private $logger;
|
|
|
|
|
|
|
|
/** @var string */
|
|
|
|
private $uid;
|
|
|
|
|
|
|
|
/** @var array */
|
2016-02-22 19:28:53 +03:00
|
|
|
protected $unencryptedSize;
|
2015-01-14 22:39:23 +03:00
|
|
|
|
2015-04-24 14:06:03 +03:00
|
|
|
/** @var \OCP\Encryption\IFile */
|
2015-04-01 11:37:48 +03:00
|
|
|
private $fileHelper;
|
|
|
|
|
2015-04-07 10:42:54 +03:00
|
|
|
/** @var IMountPoint */
|
|
|
|
private $mount;
|
|
|
|
|
2015-04-15 10:49:50 +03:00
|
|
|
/** @var IStorage */
|
2015-04-22 14:09:42 +03:00
|
|
|
private $keyStorage;
|
|
|
|
|
2015-04-15 10:49:50 +03:00
|
|
|
/** @var Update */
|
2015-04-23 17:48:11 +03:00
|
|
|
private $update;
|
|
|
|
|
2015-05-21 15:07:42 +03:00
|
|
|
/** @var Manager */
|
|
|
|
private $mountManager;
|
|
|
|
|
2016-02-22 19:28:53 +03:00
|
|
|
/** @var array remember for which path we execute the repair step to avoid recursions */
|
2020-03-26 11:30:18 +03:00
|
|
|
private $fixUnencryptedSizeOf = [];
|
2016-02-22 19:28:53 +03:00
|
|
|
|
2016-03-31 00:20:37 +03:00
|
|
|
/** @var ArrayCache */
|
|
|
|
private $arrayCache;
|
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
/**
|
|
|
|
* @param array $parameters
|
2015-04-15 10:49:50 +03:00
|
|
|
* @param IManager $encryptionManager
|
|
|
|
* @param Util $util
|
|
|
|
* @param ILogger $logger
|
|
|
|
* @param IFile $fileHelper
|
|
|
|
* @param string $uid
|
2015-04-23 17:48:11 +03:00
|
|
|
* @param IStorage $keyStorage
|
|
|
|
* @param Update $update
|
2015-05-21 15:07:42 +03:00
|
|
|
* @param Manager $mountManager
|
2016-03-31 00:20:37 +03:00
|
|
|
* @param ArrayCache $arrayCache
|
2015-01-14 22:39:23 +03:00
|
|
|
*/
|
|
|
|
public function __construct(
|
2020-03-27 19:47:20 +03:00
|
|
|
$parameters,
|
|
|
|
IManager $encryptionManager = null,
|
|
|
|
Util $util = null,
|
|
|
|
ILogger $logger = null,
|
|
|
|
IFile $fileHelper = null,
|
|
|
|
$uid = null,
|
|
|
|
IStorage $keyStorage = null,
|
|
|
|
Update $update = null,
|
|
|
|
Manager $mountManager = null,
|
|
|
|
ArrayCache $arrayCache = null
|
|
|
|
) {
|
2015-01-14 22:39:23 +03:00
|
|
|
$this->mountPoint = $parameters['mountPoint'];
|
2015-04-07 10:42:54 +03:00
|
|
|
$this->mount = $parameters['mount'];
|
2015-01-14 22:39:23 +03:00
|
|
|
$this->encryptionManager = $encryptionManager;
|
|
|
|
$this->util = $util;
|
|
|
|
$this->logger = $logger;
|
|
|
|
$this->uid = $uid;
|
2015-04-01 11:37:48 +03:00
|
|
|
$this->fileHelper = $fileHelper;
|
2015-04-22 14:09:42 +03:00
|
|
|
$this->keyStorage = $keyStorage;
|
2020-03-26 11:30:18 +03:00
|
|
|
$this->unencryptedSize = [];
|
2015-04-23 17:48:11 +03:00
|
|
|
$this->update = $update;
|
2015-05-21 15:07:42 +03:00
|
|
|
$this->mountManager = $mountManager;
|
2016-03-31 00:20:37 +03:00
|
|
|
$this->arrayCache = $arrayCache;
|
2015-01-14 22:39:23 +03:00
|
|
|
parent::__construct($parameters);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.filesize.php
|
|
|
|
* The result for filesize when called on a folder is required to be 0
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
public function filesize($path) {
|
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
|
2015-12-02 16:59:13 +03:00
|
|
|
/** @var CacheEntry $info */
|
2015-01-14 22:39:23 +03:00
|
|
|
$info = $this->getCache()->get($path);
|
2015-04-01 18:42:56 +03:00
|
|
|
if (isset($this->unencryptedSize[$fullPath])) {
|
2015-01-14 22:39:23 +03:00
|
|
|
$size = $this->unencryptedSize[$fullPath];
|
2015-07-31 16:44:27 +03:00
|
|
|
// update file cache
|
2016-02-09 20:07:07 +03:00
|
|
|
if ($info instanceof ICacheEntry) {
|
2016-02-08 22:57:20 +03:00
|
|
|
$info = $info->getData();
|
2016-02-08 22:35:33 +03:00
|
|
|
$info['encrypted'] = $info['encryptedVersion'];
|
2016-02-08 22:57:20 +03:00
|
|
|
} else {
|
2016-02-09 20:07:07 +03:00
|
|
|
if (!is_array($info)) {
|
|
|
|
$info = [];
|
|
|
|
}
|
2016-02-08 22:35:33 +03:00
|
|
|
$info['encrypted'] = true;
|
2016-02-08 22:57:20 +03:00
|
|
|
}
|
|
|
|
|
2015-07-31 16:44:27 +03:00
|
|
|
$info['size'] = $size;
|
2016-02-08 22:57:20 +03:00
|
|
|
$this->getCache()->put($path, $info);
|
2015-04-01 18:42:56 +03:00
|
|
|
|
2015-04-14 13:44:51 +03:00
|
|
|
return $size;
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
2015-04-14 13:44:51 +03:00
|
|
|
if (isset($info['fileid']) && $info['encrypted']) {
|
2016-02-22 19:28:53 +03:00
|
|
|
return $this->verifyUnencryptedSize($path, $info['size']);
|
2015-04-14 13:44:51 +03:00
|
|
|
}
|
2016-02-22 19:28:53 +03:00
|
|
|
|
2015-04-14 13:44:51 +03:00
|
|
|
return $this->storage->filesize($path);
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
2020-03-27 19:47:20 +03:00
|
|
|
private function modifyMetaData(string $path, array $data): array {
|
2015-04-20 15:25:39 +03:00
|
|
|
$fullPath = $this->getFullPath($path);
|
2016-03-31 19:06:37 +03:00
|
|
|
$info = $this->getCache()->get($path);
|
2015-04-20 15:25:39 +03:00
|
|
|
|
|
|
|
if (isset($this->unencryptedSize[$fullPath])) {
|
|
|
|
$data['encrypted'] = true;
|
2015-04-20 17:50:12 +03:00
|
|
|
$data['size'] = $this->unencryptedSize[$fullPath];
|
2015-04-20 15:25:39 +03:00
|
|
|
} else {
|
|
|
|
if (isset($info['fileid']) && $info['encrypted']) {
|
2016-02-22 19:28:53 +03:00
|
|
|
$data['size'] = $this->verifyUnencryptedSize($path, $info['size']);
|
2015-04-20 15:25:39 +03:00
|
|
|
$data['encrypted'] = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-31 19:06:37 +03:00
|
|
|
if (isset($info['encryptedVersion']) && $info['encryptedVersion'] > 1) {
|
|
|
|
$data['encryptedVersion'] = $info['encryptedVersion'];
|
|
|
|
}
|
|
|
|
|
2015-04-20 15:25:39 +03:00
|
|
|
return $data;
|
|
|
|
}
|
2016-03-31 19:06:37 +03:00
|
|
|
|
2020-03-27 19:47:20 +03:00
|
|
|
/**
|
|
|
|
* @param string $path
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function getMetaData($path) {
|
|
|
|
$data = $this->storage->getMetaData($path);
|
|
|
|
if (is_null($data)) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
return $this->modifyMetaData($path, $data);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getDirectoryContent($directory): \Traversable {
|
|
|
|
$parent = rtrim($directory, '/');
|
|
|
|
foreach ($this->getWrapperStorage()->getDirectoryContent($directory) as $data) {
|
|
|
|
yield $this->modifyMetaData($parent . '/' . $data['name'], $data);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.file_get_contents.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function file_get_contents($path) {
|
|
|
|
$encryptionModule = $this->getEncryptionModule($path);
|
|
|
|
|
2015-07-09 19:04:35 +03:00
|
|
|
if ($encryptionModule) {
|
2015-04-02 17:18:10 +03:00
|
|
|
$handle = $this->fopen($path, "r");
|
|
|
|
if (!$handle) {
|
|
|
|
return false;
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
2015-04-02 17:18:10 +03:00
|
|
|
$data = stream_get_contents($handle);
|
|
|
|
fclose($handle);
|
|
|
|
return $data;
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
2015-04-02 17:18:10 +03:00
|
|
|
return $this->storage->file_get_contents($path);
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.file_put_contents.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param string $data
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function file_put_contents($path, $data) {
|
|
|
|
// file put content will always be translated to a stream write
|
|
|
|
$handle = $this->fopen($path, 'w');
|
2015-10-15 13:12:52 +03:00
|
|
|
if (is_resource($handle)) {
|
|
|
|
$written = fwrite($handle, $data);
|
|
|
|
fclose($handle);
|
|
|
|
return $written;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.unlink.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function unlink($path) {
|
2015-04-07 19:05:54 +03:00
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
if ($this->util->isExcluded($fullPath)) {
|
2015-01-14 22:39:23 +03:00
|
|
|
return $this->storage->unlink($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
$encryptionModule = $this->getEncryptionModule($path);
|
|
|
|
if ($encryptionModule) {
|
2015-05-13 15:39:27 +03:00
|
|
|
$this->keyStorage->deleteAllFileKeys($this->getFullPath($path));
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return $this->storage->unlink($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.rename.php
|
|
|
|
*
|
|
|
|
* @param string $path1
|
|
|
|
* @param string $path2
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function rename($path1, $path2) {
|
|
|
|
$result = $this->storage->rename($path1, $path2);
|
2015-04-27 12:40:10 +03:00
|
|
|
|
2015-09-29 14:17:39 +03:00
|
|
|
if ($result &&
|
|
|
|
// versions always use the keys from the original file, so we can skip
|
|
|
|
// this step for versions
|
|
|
|
$this->isVersion($path2) === false &&
|
|
|
|
$this->encryptionManager->isEnabled()) {
|
2015-04-27 12:40:10 +03:00
|
|
|
$source = $this->getFullPath($path1);
|
|
|
|
if (!$this->util->isExcluded($source)) {
|
|
|
|
$target = $this->getFullPath($path2);
|
|
|
|
if (isset($this->unencryptedSize[$source])) {
|
|
|
|
$this->unencryptedSize[$target] = $this->unencryptedSize[$source];
|
|
|
|
}
|
2015-05-11 11:35:42 +03:00
|
|
|
$this->keyStorage->renameKeys($source, $target);
|
2016-02-10 14:34:55 +03:00
|
|
|
$module = $this->getEncryptionModule($path2);
|
|
|
|
if ($module) {
|
|
|
|
$module->update($target, $this->uid, []);
|
|
|
|
}
|
2015-04-23 17:48:11 +03:00
|
|
|
}
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
2015-05-13 15:39:27 +03:00
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.rmdir.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function rmdir($path) {
|
|
|
|
$result = $this->storage->rmdir($path);
|
2015-05-18 12:54:51 +03:00
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
if ($result &&
|
|
|
|
$this->util->isExcluded($fullPath) === false &&
|
|
|
|
$this->encryptionManager->isEnabled()
|
|
|
|
) {
|
|
|
|
$this->keyStorage->deleteAllFileKeys($fullPath);
|
2015-05-13 15:39:27 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
2015-05-12 19:49:25 +03:00
|
|
|
/**
|
|
|
|
* check if a file can be read
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function isReadable($path) {
|
|
|
|
$isReadable = true;
|
|
|
|
|
|
|
|
$metaData = $this->getMetaData($path);
|
|
|
|
if (
|
|
|
|
!$this->is_dir($path) &&
|
|
|
|
isset($metaData['encrypted']) &&
|
|
|
|
$metaData['encrypted'] === true
|
|
|
|
) {
|
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
$module = $this->getEncryptionModule($path);
|
|
|
|
$isReadable = $module->isReadable($fullPath, $this->uid);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $this->storage->isReadable($path) && $isReadable;
|
|
|
|
}
|
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.copy.php
|
|
|
|
*
|
|
|
|
* @param string $path1
|
|
|
|
* @param string $path2
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function copy($path1, $path2) {
|
2015-05-21 15:07:42 +03:00
|
|
|
$source = $this->getFullPath($path1);
|
2015-04-27 14:13:27 +03:00
|
|
|
|
2015-05-21 15:07:42 +03:00
|
|
|
if ($this->util->isExcluded($source)) {
|
2015-04-07 19:05:54 +03:00
|
|
|
return $this->storage->copy($path1, $path2);
|
2015-04-02 17:25:01 +03:00
|
|
|
}
|
|
|
|
|
2015-08-24 16:57:03 +03:00
|
|
|
// need to stream copy file by file in case we copy between a encrypted
|
|
|
|
// and a unencrypted storage
|
|
|
|
$this->unlink($path2);
|
2018-02-13 23:55:24 +03:00
|
|
|
return $this->copyFromStorage($this, $path1, $path2);
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.fopen.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param string $mode
|
2015-10-15 13:06:49 +03:00
|
|
|
* @return resource|bool
|
2015-07-09 19:04:35 +03:00
|
|
|
* @throws GenericEncryptionException
|
|
|
|
* @throws ModuleDoesNotExistsException
|
2015-01-14 22:39:23 +03:00
|
|
|
*/
|
|
|
|
public function fopen($path, $mode) {
|
|
|
|
|
2016-03-31 00:20:37 +03:00
|
|
|
// check if the file is stored in the array cache, this means that we
|
|
|
|
// copy a file over to the versions folder, in this case we don't want to
|
|
|
|
// decrypt it
|
|
|
|
if ($this->arrayCache->hasKey('encryption_copy_version_' . $path)) {
|
|
|
|
$this->arrayCache->remove('encryption_copy_version_' . $path);
|
|
|
|
return $this->storage->fopen($path, $mode);
|
|
|
|
}
|
|
|
|
|
2015-04-08 17:41:20 +03:00
|
|
|
$encryptionEnabled = $this->encryptionManager->isEnabled();
|
2015-01-14 22:39:23 +03:00
|
|
|
$shouldEncrypt = false;
|
|
|
|
$encryptionModule = null;
|
2015-07-09 19:04:35 +03:00
|
|
|
$header = $this->getHeader($path);
|
2018-01-26 14:36:25 +03:00
|
|
|
$signed = isset($header['signed']) && $header['signed'] === 'true';
|
2015-01-14 22:39:23 +03:00
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
$encryptionModuleId = $this->util->getEncryptionModuleId($header);
|
|
|
|
|
2015-05-27 14:01:32 +03:00
|
|
|
if ($this->util->isExcluded($fullPath) === false) {
|
|
|
|
$size = $unencryptedSize = 0;
|
2015-06-23 11:43:28 +03:00
|
|
|
$realFile = $this->util->stripPartialFileExtension($path);
|
2015-06-26 12:26:40 +03:00
|
|
|
$targetExists = $this->file_exists($realFile) || $this->file_exists($path);
|
2015-05-27 14:01:32 +03:00
|
|
|
$targetIsEncrypted = false;
|
|
|
|
if ($targetExists) {
|
|
|
|
// in case the file exists we require the explicit module as
|
|
|
|
// specified in the file header - otherwise we need to fail hard to
|
|
|
|
// prevent data loss on client side
|
|
|
|
if (!empty($encryptionModuleId)) {
|
|
|
|
$targetIsEncrypted = true;
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule($encryptionModuleId);
|
|
|
|
}
|
2015-04-02 18:16:27 +03:00
|
|
|
|
2015-06-30 11:21:03 +03:00
|
|
|
if ($this->file_exists($path)) {
|
|
|
|
$size = $this->storage->filesize($path);
|
|
|
|
$unencryptedSize = $this->filesize($path);
|
|
|
|
} else {
|
|
|
|
$size = $unencryptedSize = 0;
|
|
|
|
}
|
2015-05-27 14:01:32 +03:00
|
|
|
}
|
2015-01-14 22:39:23 +03:00
|
|
|
|
2015-05-27 14:01:32 +03:00
|
|
|
try {
|
|
|
|
if (
|
|
|
|
$mode === 'w'
|
|
|
|
|| $mode === 'w+'
|
|
|
|
|| $mode === 'wb'
|
|
|
|
|| $mode === 'wb+'
|
|
|
|
) {
|
2018-07-05 17:57:48 +03:00
|
|
|
// if we update a encrypted file with a un-encrypted one we change the db flag
|
2015-07-09 19:04:35 +03:00
|
|
|
if ($targetIsEncrypted && $encryptionEnabled === false) {
|
2018-07-05 17:57:48 +03:00
|
|
|
$cache = $this->storage->getCache();
|
|
|
|
if ($cache) {
|
|
|
|
$entry = $cache->get($path);
|
|
|
|
$cache->update($entry->getId(), ['encrypted' => 0]);
|
|
|
|
}
|
2015-07-09 19:04:35 +03:00
|
|
|
}
|
2015-05-27 14:01:32 +03:00
|
|
|
if ($encryptionEnabled) {
|
|
|
|
// if $encryptionModuleId is empty, the default module will be used
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule($encryptionModuleId);
|
|
|
|
$shouldEncrypt = $encryptionModule->shouldEncrypt($fullPath);
|
2016-01-05 17:29:44 +03:00
|
|
|
$signed = true;
|
2015-05-27 14:01:32 +03:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
$info = $this->getCache()->get($path);
|
|
|
|
// only get encryption module if we found one in the header
|
|
|
|
// or if file should be encrypted according to the file cache
|
|
|
|
if (!empty($encryptionModuleId)) {
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule($encryptionModuleId);
|
|
|
|
$shouldEncrypt = true;
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif (empty($encryptionModuleId) && $info['encrypted'] === true) {
|
2015-05-27 14:01:32 +03:00
|
|
|
// we come from a old installation. No header and/or no module defined
|
|
|
|
// but the file is encrypted. In this case we need to use the
|
|
|
|
// OC_DEFAULT_MODULE to read the file
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule('OC_DEFAULT_MODULE');
|
|
|
|
$shouldEncrypt = true;
|
2015-07-10 14:14:07 +03:00
|
|
|
$targetIsEncrypted = true;
|
2015-05-27 14:01:32 +03:00
|
|
|
}
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
2015-05-27 14:01:32 +03:00
|
|
|
} catch (ModuleDoesNotExistsException $e) {
|
2018-01-17 17:21:56 +03:00
|
|
|
$this->logger->logException($e, [
|
|
|
|
'message' => 'Encryption module "' . $encryptionModuleId . '" not found, file will be stored unencrypted',
|
2018-04-25 16:22:28 +03:00
|
|
|
'level' => ILogger::WARN,
|
2018-01-17 17:21:56 +03:00
|
|
|
'app' => 'core',
|
|
|
|
]);
|
2015-05-27 14:01:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// encryption disabled on write of new file and write to existing unencrypted file -> don't encrypt
|
2016-11-29 18:27:28 +03:00
|
|
|
if (!$encryptionEnabled || !$this->shouldEncrypt($path)) {
|
2015-05-27 14:01:32 +03:00
|
|
|
if (!$targetExists || !$targetIsEncrypted) {
|
|
|
|
$shouldEncrypt = false;
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-27 14:01:32 +03:00
|
|
|
if ($shouldEncrypt === true && $encryptionModule !== null) {
|
2015-07-27 15:29:07 +03:00
|
|
|
$headerSize = $this->getHeaderSize($path);
|
2015-05-27 14:01:32 +03:00
|
|
|
$source = $this->storage->fopen($path, $mode);
|
2015-10-15 13:06:49 +03:00
|
|
|
if (!is_resource($source)) {
|
|
|
|
return false;
|
|
|
|
}
|
2015-05-27 14:01:32 +03:00
|
|
|
$handle = \OC\Files\Stream\Encryption::wrap($source, $path, $fullPath, $header,
|
|
|
|
$this->uid, $encryptionModule, $this->storage, $this, $this->util, $this->fileHelper, $mode,
|
2016-01-05 17:29:44 +03:00
|
|
|
$size, $unencryptedSize, $headerSize, $signed);
|
2015-05-27 14:01:32 +03:00
|
|
|
return $handle;
|
2015-04-02 18:16:27 +03:00
|
|
|
}
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
2015-05-27 14:01:32 +03:00
|
|
|
|
|
|
|
return $this->storage->fopen($path, $mode);
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
2016-02-22 19:28:53 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* perform some plausibility checks if the the unencrypted size is correct.
|
|
|
|
* If not, we calculate the correct unencrypted size and return it
|
|
|
|
*
|
|
|
|
* @param string $path internal path relative to the storage root
|
|
|
|
* @param int $unencryptedSize size of the unencrypted file
|
|
|
|
*
|
|
|
|
* @return int unencrypted size
|
|
|
|
*/
|
|
|
|
protected function verifyUnencryptedSize($path, $unencryptedSize) {
|
|
|
|
$size = $this->storage->filesize($path);
|
|
|
|
$result = $unencryptedSize;
|
|
|
|
|
|
|
|
if ($unencryptedSize < 0 ||
|
|
|
|
($size > 0 && $unencryptedSize === $size)
|
|
|
|
) {
|
|
|
|
// check if we already calculate the unencrypted size for the
|
|
|
|
// given path to avoid recursions
|
|
|
|
if (isset($this->fixUnencryptedSizeOf[$this->getFullPath($path)]) === false) {
|
|
|
|
$this->fixUnencryptedSizeOf[$this->getFullPath($path)] = true;
|
|
|
|
try {
|
|
|
|
$result = $this->fixUnencryptedSize($path, $size, $unencryptedSize);
|
|
|
|
} catch (\Exception $e) {
|
2020-03-27 19:47:20 +03:00
|
|
|
$this->logger->error('Couldn\'t re-calculate unencrypted size for ' . $path);
|
2016-02-22 19:28:53 +03:00
|
|
|
$this->logger->logException($e);
|
|
|
|
}
|
|
|
|
unset($this->fixUnencryptedSizeOf[$this->getFullPath($path)]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* calculate the unencrypted size
|
|
|
|
*
|
|
|
|
* @param string $path internal path relative to the storage root
|
|
|
|
* @param int $size size of the physical file
|
|
|
|
* @param int $unencryptedSize size of the unencrypted file
|
|
|
|
*
|
|
|
|
* @return int calculated unencrypted size
|
|
|
|
*/
|
|
|
|
protected function fixUnencryptedSize($path, $size, $unencryptedSize) {
|
|
|
|
$headerSize = $this->getHeaderSize($path);
|
|
|
|
$header = $this->getHeader($path);
|
|
|
|
$encryptionModule = $this->getEncryptionModule($path);
|
|
|
|
|
|
|
|
$stream = $this->storage->fopen($path, 'r');
|
|
|
|
|
|
|
|
// if we couldn't open the file we return the old unencrypted size
|
|
|
|
if (!is_resource($stream)) {
|
|
|
|
$this->logger->error('Could not open ' . $path . '. Recalculation of unencrypted size aborted.');
|
|
|
|
return $unencryptedSize;
|
|
|
|
}
|
|
|
|
|
|
|
|
$newUnencryptedSize = 0;
|
|
|
|
$size -= $headerSize;
|
|
|
|
$blockSize = $this->util->getBlockSize();
|
|
|
|
|
|
|
|
// if a header exists we skip it
|
|
|
|
if ($headerSize > 0) {
|
|
|
|
fread($stream, $headerSize);
|
|
|
|
}
|
|
|
|
|
|
|
|
// fast path, else the calculation for $lastChunkNr is bogus
|
|
|
|
if ($size === 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-01-26 14:36:25 +03:00
|
|
|
$signed = isset($header['signed']) && $header['signed'] === 'true';
|
2016-02-22 19:28:53 +03:00
|
|
|
$unencryptedBlockSize = $encryptionModule->getUnencryptedBlockSize($signed);
|
|
|
|
|
|
|
|
// calculate last chunk nr
|
|
|
|
// next highest is end of chunks, one subtracted is last one
|
|
|
|
// we have to read the last chunk, we can't just calculate it (because of padding etc)
|
|
|
|
|
2020-03-27 19:47:20 +03:00
|
|
|
$lastChunkNr = ceil($size / $blockSize) - 1;
|
2016-02-22 19:28:53 +03:00
|
|
|
// calculate last chunk position
|
|
|
|
$lastChunkPos = ($lastChunkNr * $blockSize);
|
|
|
|
// try to fseek to the last chunk, if it fails we have to read the whole file
|
|
|
|
if (@fseek($stream, $lastChunkPos, SEEK_CUR) === 0) {
|
|
|
|
$newUnencryptedSize += $lastChunkNr * $unencryptedBlockSize;
|
|
|
|
}
|
|
|
|
|
2020-03-27 19:47:20 +03:00
|
|
|
$lastChunkContentEncrypted = '';
|
2016-02-22 19:28:53 +03:00
|
|
|
$count = $blockSize;
|
|
|
|
|
|
|
|
while ($count > 0) {
|
2020-03-27 19:47:20 +03:00
|
|
|
$data = fread($stream, $blockSize);
|
|
|
|
$count = strlen($data);
|
2016-02-22 19:28:53 +03:00
|
|
|
$lastChunkContentEncrypted .= $data;
|
2020-04-10 15:19:56 +03:00
|
|
|
if (strlen($lastChunkContentEncrypted) > $blockSize) {
|
2016-02-22 19:28:53 +03:00
|
|
|
$newUnencryptedSize += $unencryptedBlockSize;
|
2020-03-27 19:47:20 +03:00
|
|
|
$lastChunkContentEncrypted = substr($lastChunkContentEncrypted, $blockSize);
|
2016-02-22 19:28:53 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fclose($stream);
|
|
|
|
|
|
|
|
// we have to decrypt the last chunk to get it actual size
|
|
|
|
$encryptionModule->begin($this->getFullPath($path), $this->uid, 'r', $header, []);
|
|
|
|
$decryptedLastChunk = $encryptionModule->decrypt($lastChunkContentEncrypted, $lastChunkNr . 'end');
|
|
|
|
$decryptedLastChunk .= $encryptionModule->end($this->getFullPath($path), $lastChunkNr . 'end');
|
|
|
|
|
|
|
|
// calc the real file size with the size of the last chunk
|
|
|
|
$newUnencryptedSize += strlen($decryptedLastChunk);
|
|
|
|
|
|
|
|
$this->updateUnencryptedSize($this->getFullPath($path), $newUnencryptedSize);
|
|
|
|
|
|
|
|
// write to cache if applicable
|
|
|
|
$cache = $this->storage->getCache();
|
|
|
|
if ($cache) {
|
|
|
|
$entry = $cache->get($path);
|
|
|
|
$cache->update($entry['fileid'], ['size' => $newUnencryptedSize]);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $newUnencryptedSize;
|
|
|
|
}
|
|
|
|
|
2015-04-15 10:49:50 +03:00
|
|
|
/**
|
2017-07-19 20:44:10 +03:00
|
|
|
* @param Storage\IStorage $sourceStorage
|
2015-04-15 10:49:50 +03:00
|
|
|
* @param string $sourceInternalPath
|
|
|
|
* @param string $targetInternalPath
|
|
|
|
* @param bool $preserveMtime
|
|
|
|
* @return bool
|
|
|
|
*/
|
2017-07-19 20:44:10 +03:00
|
|
|
public function moveFromStorage(Storage\IStorage $sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime = true) {
|
2015-09-07 18:19:50 +03:00
|
|
|
if ($sourceStorage === $this) {
|
|
|
|
return $this->rename($sourceInternalPath, $targetInternalPath);
|
|
|
|
}
|
2015-04-30 15:30:02 +03:00
|
|
|
|
|
|
|
// TODO clean this up once the underlying moveFromStorage in OC\Files\Storage\Wrapper\Common is fixed:
|
|
|
|
// - call $this->storage->moveFromStorage() instead of $this->copyBetweenStorage
|
|
|
|
// - copy the file cache update from $this->copyBetweenStorage to this method
|
2015-05-21 15:07:42 +03:00
|
|
|
// - copy the copyKeys() call from $this->copyBetweenStorage to this method
|
2015-04-30 15:30:02 +03:00
|
|
|
// - remove $this->copyBetweenStorage
|
|
|
|
|
2016-02-19 14:59:10 +03:00
|
|
|
if (!$sourceStorage->isDeletable($sourceInternalPath)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2015-04-30 15:30:02 +03:00
|
|
|
$result = $this->copyBetweenStorage($sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime, true);
|
2015-04-15 10:49:50 +03:00
|
|
|
if ($result) {
|
|
|
|
if ($sourceStorage->is_dir($sourceInternalPath)) {
|
|
|
|
$result &= $sourceStorage->rmdir($sourceInternalPath);
|
|
|
|
} else {
|
|
|
|
$result &= $sourceStorage->unlink($sourceInternalPath);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2017-07-19 20:44:10 +03:00
|
|
|
* @param Storage\IStorage $sourceStorage
|
2015-04-15 10:49:50 +03:00
|
|
|
* @param string $sourceInternalPath
|
|
|
|
* @param string $targetInternalPath
|
|
|
|
* @param bool $preserveMtime
|
2016-04-20 13:12:41 +03:00
|
|
|
* @param bool $isRename
|
2015-04-15 10:49:50 +03:00
|
|
|
* @return bool
|
|
|
|
*/
|
2017-07-19 20:44:10 +03:00
|
|
|
public function copyFromStorage(Storage\IStorage $sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime = false, $isRename = false) {
|
2015-04-30 15:30:02 +03:00
|
|
|
|
|
|
|
// TODO clean this up once the underlying moveFromStorage in OC\Files\Storage\Wrapper\Common is fixed:
|
2015-09-29 14:17:39 +03:00
|
|
|
// - call $this->storage->copyFromStorage() instead of $this->copyBetweenStorage
|
2015-04-30 15:30:02 +03:00
|
|
|
// - copy the file cache update from $this->copyBetweenStorage to this method
|
2015-05-21 15:07:42 +03:00
|
|
|
// - copy the copyKeys() call from $this->copyBetweenStorage to this method
|
2015-04-30 15:30:02 +03:00
|
|
|
// - remove $this->copyBetweenStorage
|
|
|
|
|
2016-04-20 13:12:41 +03:00
|
|
|
return $this->copyBetweenStorage($sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime, $isRename);
|
2015-04-30 15:30:02 +03:00
|
|
|
}
|
|
|
|
|
2016-03-02 22:37:13 +03:00
|
|
|
/**
|
|
|
|
* Update the encrypted cache version in the database
|
|
|
|
*
|
2017-07-19 20:44:10 +03:00
|
|
|
* @param Storage\IStorage $sourceStorage
|
2016-03-02 22:37:13 +03:00
|
|
|
* @param string $sourceInternalPath
|
|
|
|
* @param string $targetInternalPath
|
|
|
|
* @param bool $isRename
|
2018-03-28 17:27:29 +03:00
|
|
|
* @param bool $keepEncryptionVersion
|
2016-03-02 22:37:13 +03:00
|
|
|
*/
|
2018-03-28 17:27:29 +03:00
|
|
|
private function updateEncryptedVersion(Storage\IStorage $sourceStorage, $sourceInternalPath, $targetInternalPath, $isRename, $keepEncryptionVersion) {
|
|
|
|
$isEncrypted = $this->encryptionManager->isEnabled() && $this->shouldEncrypt($targetInternalPath);
|
2016-03-02 22:37:13 +03:00
|
|
|
$cacheInformation = [
|
2018-03-28 17:27:29 +03:00
|
|
|
'encrypted' => $isEncrypted,
|
2016-03-02 22:37:13 +03:00
|
|
|
];
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($isEncrypted) {
|
2016-03-10 17:58:24 +03:00
|
|
|
$encryptedVersion = $sourceStorage->getCache()->get($sourceInternalPath)['encryptedVersion'];
|
|
|
|
|
|
|
|
// In case of a move operation from an unencrypted to an encrypted
|
|
|
|
// storage the old encrypted version would stay with "0" while the
|
|
|
|
// correct value would be "1". Thus we manually set the value to "1"
|
|
|
|
// for those cases.
|
|
|
|
// See also https://github.com/owncloud/core/issues/23078
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($encryptedVersion === 0 || !$keepEncryptionVersion) {
|
2016-03-10 17:58:24 +03:00
|
|
|
$encryptedVersion = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
$cacheInformation['encryptedVersion'] = $encryptedVersion;
|
2016-03-02 22:37:13 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// in case of a rename we need to manipulate the source cache because
|
|
|
|
// this information will be kept for the new target
|
|
|
|
if ($isRename) {
|
|
|
|
$sourceStorage->getCache()->put($sourceInternalPath, $cacheInformation);
|
|
|
|
} else {
|
|
|
|
$this->getCache()->put($targetInternalPath, $cacheInformation);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-30 15:30:02 +03:00
|
|
|
/**
|
|
|
|
* copy file between two storages
|
|
|
|
*
|
2017-07-19 20:44:10 +03:00
|
|
|
* @param Storage\IStorage $sourceStorage
|
2015-05-06 13:14:18 +03:00
|
|
|
* @param string $sourceInternalPath
|
|
|
|
* @param string $targetInternalPath
|
|
|
|
* @param bool $preserveMtime
|
|
|
|
* @param bool $isRename
|
2015-04-30 15:30:02 +03:00
|
|
|
* @return bool
|
2015-11-04 12:15:28 +03:00
|
|
|
* @throws \Exception
|
2015-04-30 15:30:02 +03:00
|
|
|
*/
|
2017-07-19 20:44:10 +03:00
|
|
|
private function copyBetweenStorage(Storage\IStorage $sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime, $isRename) {
|
2015-05-21 15:07:42 +03:00
|
|
|
|
2015-09-29 14:17:39 +03:00
|
|
|
// for versions we have nothing to do, because versions should always use the
|
|
|
|
// key from the original file. Just create a 1:1 copy and done
|
|
|
|
if ($this->isVersion($targetInternalPath) ||
|
|
|
|
$this->isVersion($sourceInternalPath)) {
|
2016-03-31 00:20:37 +03:00
|
|
|
// remember that we try to create a version so that we can detect it during
|
|
|
|
// fopen($sourceInternalPath) and by-pass the encryption in order to
|
|
|
|
// create a 1:1 copy of the file
|
|
|
|
$this->arrayCache->set('encryption_copy_version_' . $sourceInternalPath, true);
|
2015-11-04 12:15:28 +03:00
|
|
|
$result = $this->storage->copyFromStorage($sourceStorage, $sourceInternalPath, $targetInternalPath);
|
2016-03-31 22:52:23 +03:00
|
|
|
$this->arrayCache->remove('encryption_copy_version_' . $sourceInternalPath);
|
2015-11-04 12:15:28 +03:00
|
|
|
if ($result) {
|
|
|
|
$info = $this->getCache('', $sourceStorage)->get($sourceInternalPath);
|
|
|
|
// make sure that we update the unencrypted size for the version
|
|
|
|
if (isset($info['encrypted']) && $info['encrypted'] === true) {
|
|
|
|
$this->updateUnencryptedSize(
|
|
|
|
$this->getFullPath($targetInternalPath),
|
|
|
|
$info['size']
|
|
|
|
);
|
|
|
|
}
|
2018-03-28 17:27:29 +03:00
|
|
|
$this->updateEncryptedVersion($sourceStorage, $sourceInternalPath, $targetInternalPath, $isRename, true);
|
2015-11-04 12:15:28 +03:00
|
|
|
}
|
|
|
|
return $result;
|
2015-09-29 14:17:39 +03:00
|
|
|
}
|
|
|
|
|
2015-05-21 15:07:42 +03:00
|
|
|
// first copy the keys that we reuse the existing file key on the target location
|
|
|
|
// and don't create a new one which would break versions for example.
|
|
|
|
$mount = $this->mountManager->findByStorageId($sourceStorage->getId());
|
|
|
|
if (count($mount) === 1) {
|
|
|
|
$mountPoint = $mount[0]->getMountPoint();
|
|
|
|
$source = $mountPoint . '/' . $sourceInternalPath;
|
|
|
|
$target = $this->getFullPath($targetInternalPath);
|
|
|
|
$this->copyKeys($source, $target);
|
|
|
|
} else {
|
|
|
|
$this->logger->error('Could not find mount point, can\'t keep encryption keys');
|
|
|
|
}
|
|
|
|
|
2015-04-15 10:49:50 +03:00
|
|
|
if ($sourceStorage->is_dir($sourceInternalPath)) {
|
|
|
|
$dh = $sourceStorage->opendir($sourceInternalPath);
|
|
|
|
$result = $this->mkdir($targetInternalPath);
|
|
|
|
if (is_resource($dh)) {
|
|
|
|
while ($result and ($file = readdir($dh)) !== false) {
|
|
|
|
if (!Filesystem::isIgnoredDir($file)) {
|
2016-04-20 13:12:41 +03:00
|
|
|
$result &= $this->copyFromStorage($sourceStorage, $sourceInternalPath . '/' . $file, $targetInternalPath . '/' . $file, false, $isRename);
|
2015-04-15 10:49:50 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2015-08-24 16:57:03 +03:00
|
|
|
try {
|
|
|
|
$source = $sourceStorage->fopen($sourceInternalPath, 'r');
|
|
|
|
$target = $this->fopen($targetInternalPath, 'w');
|
2020-03-27 19:47:20 +03:00
|
|
|
[, $result] = \OC_Helper::streamCopy($source, $target);
|
2015-08-24 16:57:03 +03:00
|
|
|
fclose($source);
|
|
|
|
fclose($target);
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
fclose($source);
|
|
|
|
fclose($target);
|
|
|
|
throw $e;
|
|
|
|
}
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($result) {
|
2015-04-30 15:30:02 +03:00
|
|
|
if ($preserveMtime) {
|
|
|
|
$this->touch($targetInternalPath, $sourceStorage->filemtime($sourceInternalPath));
|
|
|
|
}
|
2018-03-28 17:27:29 +03:00
|
|
|
$this->updateEncryptedVersion($sourceStorage, $sourceInternalPath, $targetInternalPath, $isRename, false);
|
2015-04-30 15:30:02 +03:00
|
|
|
} else {
|
2015-04-15 10:49:50 +03:00
|
|
|
// delete partially written target file
|
|
|
|
$this->unlink($targetInternalPath);
|
|
|
|
// delete cache entry that was created by fopen
|
|
|
|
$this->getCache()->remove($targetInternalPath);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return (bool)$result;
|
|
|
|
}
|
|
|
|
|
2015-04-02 15:44:58 +03:00
|
|
|
/**
|
|
|
|
* get the path to a local version of the file.
|
|
|
|
* The local version of the file can be temporary and doesn't have to be persistent across requests
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function getLocalFile($path) {
|
2015-05-05 17:19:24 +03:00
|
|
|
if ($this->encryptionManager->isEnabled()) {
|
2015-05-06 12:16:44 +03:00
|
|
|
$cachedFile = $this->getCachedFile($path);
|
|
|
|
if (is_string($cachedFile)) {
|
|
|
|
return $cachedFile;
|
|
|
|
}
|
2015-05-05 17:19:24 +03:00
|
|
|
}
|
|
|
|
return $this->storage->getLocalFile($path);
|
2015-04-02 15:44:58 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the wrapped storage's value for isLocal()
|
|
|
|
*
|
|
|
|
* @return bool wrapped storage's isLocal() value
|
|
|
|
*/
|
|
|
|
public function isLocal() {
|
2015-04-27 15:26:05 +03:00
|
|
|
if ($this->encryptionManager->isEnabled()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return $this->storage->isLocal();
|
2015-04-02 15:44:58 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.stat.php
|
|
|
|
* only the following keys are required in the result: size and mtime
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function stat($path) {
|
|
|
|
$stat = $this->storage->stat($path);
|
|
|
|
$fileSize = $this->filesize($path);
|
|
|
|
$stat['size'] = $fileSize;
|
|
|
|
$stat[7] = $fileSize;
|
2020-08-12 14:22:24 +03:00
|
|
|
$stat['hasHeader'] = $this->getHeaderSize($path) > 0;
|
2015-04-02 15:44:58 +03:00
|
|
|
return $stat;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.hash.php
|
|
|
|
*
|
|
|
|
* @param string $type
|
|
|
|
* @param string $path
|
|
|
|
* @param bool $raw
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function hash($type, $path, $raw = false) {
|
|
|
|
$fh = $this->fopen($path, 'rb');
|
|
|
|
$ctx = hash_init($type);
|
|
|
|
hash_update_stream($ctx, $fh);
|
|
|
|
fclose($fh);
|
|
|
|
return hash_final($ctx, $raw);
|
|
|
|
}
|
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
/**
|
|
|
|
* return full path, including mount point
|
|
|
|
*
|
|
|
|
* @param string $path relative to mount point
|
|
|
|
* @return string full path including mount point
|
|
|
|
*/
|
|
|
|
protected function getFullPath($path) {
|
2015-04-20 17:50:12 +03:00
|
|
|
return Filesystem::normalizePath($this->mountPoint . '/' . $path);
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
2015-07-09 19:04:35 +03:00
|
|
|
/**
|
|
|
|
* read first block of encrypted file, typically this will contain the
|
|
|
|
* encryption header
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
protected function readFirstBlock($path) {
|
|
|
|
$firstBlock = '';
|
|
|
|
if ($this->storage->file_exists($path)) {
|
|
|
|
$handle = $this->storage->fopen($path, 'r');
|
|
|
|
$firstBlock = fread($handle, $this->util->getHeaderSize());
|
|
|
|
fclose($handle);
|
|
|
|
}
|
|
|
|
return $firstBlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* return header size of given file
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
protected function getHeaderSize($path) {
|
|
|
|
$headerSize = 0;
|
|
|
|
$realFile = $this->util->stripPartialFileExtension($path);
|
|
|
|
if ($this->storage->file_exists($realFile)) {
|
|
|
|
$path = $realFile;
|
|
|
|
}
|
|
|
|
$firstBlock = $this->readFirstBlock($path);
|
|
|
|
|
|
|
|
if (substr($firstBlock, 0, strlen(Util::HEADER_START)) === Util::HEADER_START) {
|
2016-03-21 17:47:24 +03:00
|
|
|
$headerSize = $this->util->getHeaderSize();
|
2015-07-09 19:04:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return $headerSize;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* parse raw header to array
|
|
|
|
*
|
|
|
|
* @param string $rawHeader
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
protected function parseRawHeader($rawHeader) {
|
2020-03-26 11:30:18 +03:00
|
|
|
$result = [];
|
2015-07-09 19:04:35 +03:00
|
|
|
if (substr($rawHeader, 0, strlen(Util::HEADER_START)) === Util::HEADER_START) {
|
|
|
|
$header = $rawHeader;
|
|
|
|
$endAt = strpos($header, Util::HEADER_END);
|
|
|
|
if ($endAt !== false) {
|
|
|
|
$header = substr($header, 0, $endAt + strlen(Util::HEADER_END));
|
|
|
|
|
|
|
|
// +1 to not start with an ':' which would result in empty element at the beginning
|
2020-03-27 19:47:20 +03:00
|
|
|
$exploded = explode(':', substr($header, strlen(Util::HEADER_START) + 1));
|
2015-07-09 19:04:35 +03:00
|
|
|
|
|
|
|
$element = array_shift($exploded);
|
|
|
|
while ($element !== Util::HEADER_END) {
|
|
|
|
$result[$element] = array_shift($exploded);
|
|
|
|
$element = array_shift($exploded);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
/**
|
|
|
|
* read header from file
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
protected function getHeader($path) {
|
2015-06-23 11:43:28 +03:00
|
|
|
$realFile = $this->util->stripPartialFileExtension($path);
|
2017-03-28 15:49:06 +03:00
|
|
|
$exists = $this->storage->file_exists($realFile);
|
|
|
|
if ($exists) {
|
2015-06-26 12:26:40 +03:00
|
|
|
$path = $realFile;
|
|
|
|
}
|
|
|
|
|
2015-07-09 19:04:35 +03:00
|
|
|
$firstBlock = $this->readFirstBlock($path);
|
|
|
|
$result = $this->parseRawHeader($firstBlock);
|
|
|
|
|
|
|
|
// if the header doesn't contain a encryption module we check if it is a
|
|
|
|
// legacy file. If true, we add the default encryption module
|
|
|
|
if (!isset($result[Util::HEADER_ENCRYPTION_MODULE_KEY])) {
|
|
|
|
if (!empty($result)) {
|
|
|
|
$result[Util::HEADER_ENCRYPTION_MODULE_KEY] = 'OC_DEFAULT_MODULE';
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif ($exists) {
|
2015-07-09 19:04:35 +03:00
|
|
|
// if the header was empty we have to check first if it is a encrypted file at all
|
2017-03-28 15:49:06 +03:00
|
|
|
// We would do query to filecache only if we know that entry in filecache exists
|
2015-07-09 19:04:35 +03:00
|
|
|
$info = $this->getCache()->get($path);
|
|
|
|
if (isset($info['encrypted']) && $info['encrypted'] === true) {
|
|
|
|
$result[Util::HEADER_ENCRYPTION_MODULE_KEY] = 'OC_DEFAULT_MODULE';
|
|
|
|
}
|
2015-04-24 14:02:06 +03:00
|
|
|
}
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
2015-07-09 19:04:35 +03:00
|
|
|
|
|
|
|
return $result;
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* read encryption module needed to read/write the file located at $path
|
|
|
|
*
|
|
|
|
* @param string $path
|
2015-03-30 14:23:10 +03:00
|
|
|
* @return null|\OCP\Encryption\IEncryptionModule
|
|
|
|
* @throws ModuleDoesNotExistsException
|
|
|
|
* @throws \Exception
|
2015-01-14 22:39:23 +03:00
|
|
|
*/
|
|
|
|
protected function getEncryptionModule($path) {
|
|
|
|
$encryptionModule = null;
|
2015-07-09 19:04:35 +03:00
|
|
|
$header = $this->getHeader($path);
|
2015-01-14 22:39:23 +03:00
|
|
|
$encryptionModuleId = $this->util->getEncryptionModuleId($header);
|
|
|
|
if (!empty($encryptionModuleId)) {
|
|
|
|
try {
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule($encryptionModuleId);
|
|
|
|
} catch (ModuleDoesNotExistsException $e) {
|
2015-03-30 14:23:10 +03:00
|
|
|
$this->logger->critical('Encryption module defined in "' . $path . '" not loaded!');
|
2015-01-14 22:39:23 +03:00
|
|
|
throw $e;
|
|
|
|
}
|
|
|
|
}
|
2016-11-29 18:27:28 +03:00
|
|
|
|
2015-01-14 22:39:23 +03:00
|
|
|
return $encryptionModule;
|
|
|
|
}
|
|
|
|
|
2015-05-22 01:17:38 +03:00
|
|
|
/**
|
|
|
|
* @param string $path
|
|
|
|
* @param int $unencryptedSize
|
|
|
|
*/
|
2015-01-14 22:39:23 +03:00
|
|
|
public function updateUnencryptedSize($path, $unencryptedSize) {
|
|
|
|
$this->unencryptedSize[$path] = $unencryptedSize;
|
|
|
|
}
|
2015-05-21 15:07:42 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* copy keys to new location
|
|
|
|
*
|
|
|
|
* @param string $source path relative to data/
|
|
|
|
* @param string $target path relative to data/
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
protected function copyKeys($source, $target) {
|
|
|
|
if (!$this->util->isExcluded($source)) {
|
|
|
|
return $this->keyStorage->copyKeys($source, $target);
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
2015-07-09 19:04:35 +03:00
|
|
|
|
2015-09-29 14:17:39 +03:00
|
|
|
/**
|
|
|
|
* check if path points to a files version
|
|
|
|
*
|
|
|
|
* @param $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
protected function isVersion($path) {
|
|
|
|
$normalized = Filesystem::normalizePath($path);
|
|
|
|
return substr($normalized, 0, strlen('/files_versions/')) === '/files_versions/';
|
|
|
|
}
|
|
|
|
|
2016-11-29 18:27:28 +03:00
|
|
|
/**
|
|
|
|
* check if the given storage should be encrypted or not
|
|
|
|
*
|
|
|
|
* @param $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
protected function shouldEncrypt($path) {
|
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
$mountPointConfig = $this->mount->getOption('encrypt', true);
|
|
|
|
if ($mountPointConfig === false) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
$encryptionModule = $this->getEncryptionModule($fullPath);
|
|
|
|
} catch (ModuleDoesNotExistsException $e) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($encryptionModule === null) {
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule();
|
|
|
|
}
|
|
|
|
|
|
|
|
return $encryptionModule->shouldEncrypt($fullPath);
|
|
|
|
}
|
|
|
|
|
2018-10-31 18:16:37 +03:00
|
|
|
public function writeStream(string $path, $stream, int $size = null): int {
|
|
|
|
// always fall back to fopen
|
|
|
|
$target = $this->fopen($path, 'w');
|
2020-03-27 19:47:20 +03:00
|
|
|
[$count, $result] = \OC_Helper::streamCopy($stream, $target);
|
2018-10-31 18:16:37 +03:00
|
|
|
fclose($target);
|
|
|
|
return $count;
|
|
|
|
}
|
2015-01-14 22:39:23 +03:00
|
|
|
}
|