Moved dependencies out of Crypt methods (encKeyfileToMultipleUsers)(DI)

Fixed bug preventing sharing with users other than 'ownCloud'
Added comments
Moved functionality into filterShareReadyUsers()
Other changes
This commit is contained in:
Sam Tuke 2013-02-19 19:16:50 +00:00
parent 14ae373dfe
commit 1b880f2f96
4 changed files with 112 additions and 57 deletions

View File

@ -20,7 +20,7 @@ OCP\Util::connectHook( 'OCP\Share', 'post_unshare', 'OCA\Encryption\Hooks', 'pos
OCP\Util::connectHook( 'OCP\Share', 'post_unshareAll', 'OCA\Encryption\Hooks', 'postUnshareAll' );
// Webdav-related hooks
OCP\Util::connectHook( 'OC_Webdav_Properties', 'update', 'OCA\Encryption\Hooks', 'updateKeyfile' );
OCP\Util::connectHook( 'OC_Webdav_Properties', 'update', 'OCA\Encryption\Hooks', 'updateKeyfileFromClient' );
stream_wrapper_register( 'crypt', 'OCA\Encryption\Stream' );

View File

@ -139,7 +139,7 @@ class Hooks {
/**
* @brief update the encryption key of the file uploaded by the client
*/
public static function updateKeyfile( $params ) {
public static function updateKeyfileFromClient( $params ) {
if ( Crypt::mode() == 'client' ) {
@ -175,12 +175,13 @@ class Hooks {
// uidOwner -> owner of the original file being shared
$view = new \OC_FilesystemView( '/' );
$session = new Session();
$userId = \OCP\User::getUser();
$util = new Util( $view, $userId );
$path = Util::getFilePath($params['itemSource']);
$path = Util::getFilePath( $params['itemSource'] );
return Crypt::updateKeyfile($path);
return Crypt::updateKeyfile( $view, $session, $path );
}
@ -188,18 +189,26 @@ class Hooks {
* @brief
*/
public static function postUnshare( $params ) {
$path = Util::getFilePath($params['itemSource']);
$view = new \OC_FilesystemView( '/' );
$session = new Session();
$path = Util::getFilePath( $params['itemSource'] );
return Crypt::updateKeyfile( $view, $session, $path );
return Crypt::updateKeyfile($path);
}
/**
* @brief
*/
public static function postUnshareAll( $params ) {
$path = Util::getFilePath($params['itemSource']);
$view = new \OC_FilesystemView( '/' );
$session = new Session();
$path = Util::getFilePath( $params['itemSource'] );
return Crypt::updateKeyfile( $view, $session, $path );
return Crypt::updateKeyfile($path);
}
}

View File

@ -746,52 +746,44 @@ class Crypt {
/**
* @brief encrypt file key to multiple users
* @param $users list of users which should be able to access the file
* @param $fileTarget target of the file
* @brief Encrypt keyfile to multiple users
* @param array $users list of users which should be able to access the file
* @param string $filePath path of the file to be shared
*/
private static function encKeyfileToMultipleUsers($users, $filePath) {
$view = new \OC_FilesystemView( '/' );
$owner = \OCP\User::getUser();
$util = new Util( $view, $userId );
$session = new Session();
private static function encKeyfileToMultipleUsers( \OC_FilesystemView $view, Util $util, Session $session, $userId, array $users, $filePath ) {
// Make sure users are capable of sharing
$filteredUids = $util->filterShareReadyUsers( $users );
$userIds = array();
foreach ( $users as $user ) {
$util = new Util( $view, $user );
// Check that the user is encryption capable
if ( $util->ready() && $user == 'ownCloud' ) {
// Construct array of just UIDs for Keymanager{}
$userIds[] = $user;
} else {
// Log warning; we can't do necessary setup here
// because we don't have the user passphrase
// TODO: Provide user feedback indicating that
// sharing failed
\OC_Log::write( 'Encryption library', 'File cannot be shared: user "'.$user.'" is not setup for encryption', \OC_Log::WARN );
}
}
$userPubKeys = Keymanager::getPublicKeys( $view, $userIds );
// Get public keys for each user, ready for generating sharekeys
$userPubKeys = Keymanager::getPublicKeys( $view, $filteredUids ); // TODO: check this includes the owner's public key
\OC_FileProxy::$enabled = false;
// get the keyfile
// Get the current users's private key for decrypting existing keyfile
$privateKey = $session->getPrivateKey();
// We need to get a decrypted key for the file
// Determine how to decrypt the keyfile by checking if current user is owner
if ( $userId == \OC\Files\Filesystem::getOwner( $filePath ) ) {
// If current user is owner, decrypt without using sharekey
} else {
// Current user is resharing a file they don't own
// Decrypt keyfile using sharekey
}
// get the existing keyfile
$encKeyfile = Keymanager::getFileKey( $view, $owner, $filePath );
$privateKey = $session->getPrivateKey();
// decrypt the keyfile
// decrypt the existing keyfile
$plainKeyfile = Crypt::keyDecrypt( $encKeyfile, $privateKey );
trigger_error("PUBKEYS = ". var_export($userPubKeys, 1));
// re-enc keyfile to sharekeys
$shareKeys = Crypt::multiKeyEncrypt( $plainKeyfile, $userPubKeys );
@ -816,29 +808,42 @@ class Crypt {
* @param path which needs to be updated
* @return bool success
*/
public static function updateKeyfile($path) {
public static function updateKeyfile( \OC_FilesystemView $view, Util $util, Session $session, $path ) {
$filesView = \OCP\Files::getStorage('files');
// Make path include 'files' dir for OC_FSV operations
$fPath = 'files' . $path;
$result = true;
if ( $filesView->is_dir($path) ) {
$content = $filesView->getDirectoryContent($path);
foreach ( $content as $c) {
if ( ! $view->is_dir( $fPath ) ) {
$shares = \OCP\Share::getUsersSharingFile( $path, true );
$result = self::encKeyfileToMultipleUsers( $view, $util, $session, $shares, $path );
} else {
$content = $view->getDirectoryContent( $fPath );
foreach ( $content as $c ) {
$path = substr($c['path'], 5);
if ( $filesView->is_dir($path) ) {
$result &= self::updateKeyfile($path);
if ( $view->is_dir( $fPath ) ) {
$result &= self::updateKeyfile( $path );
} else {
$shares = \OCP\Share::getUsersSharingFile( $path, true );
$result &= self::encKeyfileToMultipleUsers($shares, $path);
$result &= self::encKeyfileToMultipleUsers( $view, $util, $session, $shares, $path );
}
}
} else {
$shares = \OCP\Share::getUsersSharingFile( $path, true );
$result = self::encKeyfileToMultipleUsers($shares, $path);
}
return $result;
}
}

View File

@ -486,5 +486,46 @@ class Util {
$row = $result->fetchRow();
return substr($row['path'], 5);
}
/**
* @brief Filter an array of UIDs to return only ones ready for sharing
* @param array $unfilteredUsers users to be checked for sharing readiness
* @return array $userIds filtered users
*/
public function filterShareReadyUsers( $unfilteredUsers ) {
// This array will collect the filtered IDs
$userIds = array();
// Loop through users and create array of UIDs that need new keyfiles
foreach ( $unfilteredUsers as $user ) {
$util = new Util( $this->view, $user );
// Check that the user is encryption capable, or is the
// public system user 'ownCloud' (for public shares)
if (
$util->ready()
or $user == 'ownCloud'
) {
// Construct array of just UIDs for Keymanager{}
$userIds[] = $user;
} else {
// Log warning; we can't do necessary setup here
// because we don't have the user passphrase
// TODO: Provide user feedback indicating that
// sharing failed
\OC_Log::write( 'Encryption library', '"'.$user.'" is not setup for encryption', \OC_Log::WARN );
}
}
return $userIds;
}
}