2015-01-14 19:39:23 +00:00
|
|
|
<?php
|
|
|
|
/**
|
2015-04-07 15:02:49 +00:00
|
|
|
* @author Björn Schießle <schiessle@owncloud.com>
|
2015-06-25 09:43:55 +00:00
|
|
|
* @author Joas Schilling <nickvergessen@owncloud.com>
|
|
|
|
* @author Lukas Reschke <lukas@owncloud.com>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2015-04-07 15:02:49 +00:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
2015-01-14 19:39:23 +00:00
|
|
|
*
|
2015-04-07 15:02:49 +00:00
|
|
|
* @copyright Copyright (c) 2015, ownCloud, Inc.
|
|
|
|
* @license AGPL-3.0
|
2015-01-14 19:39:23 +00:00
|
|
|
*
|
2015-04-07 15:02:49 +00:00
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
2015-01-14 19:39:23 +00:00
|
|
|
*
|
2015-04-07 15:02:49 +00:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2015-01-14 19:39:23 +00:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-04-07 15:02:49 +00:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-01-14 19:39:23 +00:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Files\Storage\Wrapper;
|
|
|
|
|
|
|
|
use OC\Encryption\Exceptions\ModuleDoesNotExistsException;
|
2015-04-23 14:48:11 +00:00
|
|
|
use OC\Encryption\Update;
|
|
|
|
use OC\Encryption\Util;
|
2015-04-20 14:50:12 +00:00
|
|
|
use OC\Files\Filesystem;
|
2015-05-21 12:07:42 +00:00
|
|
|
use OC\Files\Mount\Manager;
|
2015-04-02 12:44:58 +00:00
|
|
|
use OC\Files\Storage\LocalTempFileTrait;
|
2015-07-09 16:04:35 +00:00
|
|
|
use OCP\Encryption\Exceptions\GenericEncryptionException;
|
2015-04-24 11:06:03 +00:00
|
|
|
use OCP\Encryption\IFile;
|
|
|
|
use OCP\Encryption\IManager;
|
2015-04-23 14:48:11 +00:00
|
|
|
use OCP\Encryption\Keys\IStorage;
|
2015-04-07 07:42:54 +00:00
|
|
|
use OCP\Files\Mount\IMountPoint;
|
2015-05-21 12:07:42 +00:00
|
|
|
use OCP\Files\Storage;
|
2015-04-24 11:06:03 +00:00
|
|
|
use OCP\ILogger;
|
2015-01-14 19:39:23 +00:00
|
|
|
|
|
|
|
class Encryption extends Wrapper {
|
|
|
|
|
2015-04-02 12:44:58 +00:00
|
|
|
use LocalTempFileTrait;
|
|
|
|
|
2015-01-14 19:39:23 +00:00
|
|
|
/** @var string */
|
|
|
|
private $mountPoint;
|
|
|
|
|
|
|
|
/** @var \OC\Encryption\Util */
|
|
|
|
private $util;
|
|
|
|
|
2015-04-24 11:06:03 +00:00
|
|
|
/** @var \OCP\Encryption\IManager */
|
2015-01-14 19:39:23 +00:00
|
|
|
private $encryptionManager;
|
|
|
|
|
2015-04-24 11:06:03 +00:00
|
|
|
/** @var \OCP\ILogger */
|
2015-01-14 19:39:23 +00:00
|
|
|
private $logger;
|
|
|
|
|
|
|
|
/** @var string */
|
|
|
|
private $uid;
|
|
|
|
|
|
|
|
/** @var array */
|
|
|
|
private $unencryptedSize;
|
|
|
|
|
2015-04-24 11:06:03 +00:00
|
|
|
/** @var \OCP\Encryption\IFile */
|
2015-04-01 08:37:48 +00:00
|
|
|
private $fileHelper;
|
|
|
|
|
2015-04-07 07:42:54 +00:00
|
|
|
/** @var IMountPoint */
|
|
|
|
private $mount;
|
|
|
|
|
2015-04-15 07:49:50 +00:00
|
|
|
|
|
|
|
/** @var IStorage */
|
2015-04-22 11:09:42 +00:00
|
|
|
private $keyStorage;
|
|
|
|
|
2015-04-15 07:49:50 +00:00
|
|
|
/** @var Update */
|
2015-04-23 14:48:11 +00:00
|
|
|
private $update;
|
|
|
|
|
2015-05-21 12:07:42 +00:00
|
|
|
/** @var Manager */
|
|
|
|
private $mountManager;
|
|
|
|
|
2015-01-14 19:39:23 +00:00
|
|
|
/**
|
|
|
|
* @param array $parameters
|
2015-04-15 07:49:50 +00:00
|
|
|
* @param IManager $encryptionManager
|
|
|
|
* @param Util $util
|
|
|
|
* @param ILogger $logger
|
|
|
|
* @param IFile $fileHelper
|
|
|
|
* @param string $uid
|
2015-04-23 14:48:11 +00:00
|
|
|
* @param IStorage $keyStorage
|
|
|
|
* @param Update $update
|
2015-05-21 12:07:42 +00:00
|
|
|
* @param Manager $mountManager
|
2015-01-14 19:39:23 +00:00
|
|
|
*/
|
|
|
|
public function __construct(
|
|
|
|
$parameters,
|
2015-04-24 11:06:03 +00:00
|
|
|
IManager $encryptionManager = null,
|
2015-04-23 14:48:11 +00:00
|
|
|
Util $util = null,
|
2015-04-24 11:06:03 +00:00
|
|
|
ILogger $logger = null,
|
|
|
|
IFile $fileHelper = null,
|
2015-04-22 11:09:42 +00:00
|
|
|
$uid = null,
|
2015-04-23 14:48:11 +00:00
|
|
|
IStorage $keyStorage = null,
|
2015-05-21 12:07:42 +00:00
|
|
|
Update $update = null,
|
|
|
|
Manager $mountManager = null
|
2015-01-14 19:39:23 +00:00
|
|
|
) {
|
2015-05-21 12:07:42 +00:00
|
|
|
|
2015-01-14 19:39:23 +00:00
|
|
|
$this->mountPoint = $parameters['mountPoint'];
|
2015-04-07 07:42:54 +00:00
|
|
|
$this->mount = $parameters['mount'];
|
2015-01-14 19:39:23 +00:00
|
|
|
$this->encryptionManager = $encryptionManager;
|
|
|
|
$this->util = $util;
|
|
|
|
$this->logger = $logger;
|
|
|
|
$this->uid = $uid;
|
2015-04-01 08:37:48 +00:00
|
|
|
$this->fileHelper = $fileHelper;
|
2015-04-22 11:09:42 +00:00
|
|
|
$this->keyStorage = $keyStorage;
|
2015-01-14 19:39:23 +00:00
|
|
|
$this->unencryptedSize = array();
|
2015-04-23 14:48:11 +00:00
|
|
|
$this->update = $update;
|
2015-05-21 12:07:42 +00:00
|
|
|
$this->mountManager = $mountManager;
|
2015-01-14 19:39:23 +00:00
|
|
|
parent::__construct($parameters);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.filesize.php
|
|
|
|
* The result for filesize when called on a folder is required to be 0
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
public function filesize($path) {
|
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
|
|
|
|
$info = $this->getCache()->get($path);
|
2015-04-01 15:42:56 +00:00
|
|
|
if (isset($this->unencryptedSize[$fullPath])) {
|
2015-01-14 19:39:23 +00:00
|
|
|
$size = $this->unencryptedSize[$fullPath];
|
2015-04-01 15:42:56 +00:00
|
|
|
|
2015-04-14 10:44:51 +00:00
|
|
|
if (isset($info['fileid'])) {
|
|
|
|
$info['encrypted'] = true;
|
|
|
|
$info['size'] = $size;
|
|
|
|
$this->getCache()->put($path, $info);
|
|
|
|
}
|
|
|
|
return $size;
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
2015-04-14 10:44:51 +00:00
|
|
|
if (isset($info['fileid']) && $info['encrypted']) {
|
|
|
|
return $info['size'];
|
|
|
|
}
|
|
|
|
return $this->storage->filesize($path);
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
2015-04-20 12:25:39 +00:00
|
|
|
/**
|
2015-04-20 12:54:54 +00:00
|
|
|
* @param string $path
|
2015-04-20 12:25:39 +00:00
|
|
|
* @return array
|
|
|
|
*/
|
2015-04-20 12:54:54 +00:00
|
|
|
public function getMetaData($path) {
|
|
|
|
$data = $this->storage->getMetaData($path);
|
2015-04-20 14:50:12 +00:00
|
|
|
if (is_null($data)) {
|
|
|
|
return null;
|
|
|
|
}
|
2015-04-20 12:25:39 +00:00
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
|
|
|
|
if (isset($this->unencryptedSize[$fullPath])) {
|
|
|
|
$data['encrypted'] = true;
|
2015-04-20 14:50:12 +00:00
|
|
|
$data['size'] = $this->unencryptedSize[$fullPath];
|
2015-04-20 12:25:39 +00:00
|
|
|
} else {
|
|
|
|
$info = $this->getCache()->get($path);
|
|
|
|
if (isset($info['fileid']) && $info['encrypted']) {
|
|
|
|
$data['encrypted'] = true;
|
|
|
|
$data['size'] = $info['size'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $data;
|
|
|
|
}
|
2015-01-14 19:39:23 +00:00
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.file_get_contents.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function file_get_contents($path) {
|
|
|
|
|
|
|
|
$encryptionModule = $this->getEncryptionModule($path);
|
|
|
|
|
2015-07-09 16:04:35 +00:00
|
|
|
if ($encryptionModule) {
|
2015-04-02 14:18:10 +00:00
|
|
|
$handle = $this->fopen($path, "r");
|
|
|
|
if (!$handle) {
|
|
|
|
return false;
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
2015-04-02 14:18:10 +00:00
|
|
|
$data = stream_get_contents($handle);
|
|
|
|
fclose($handle);
|
|
|
|
return $data;
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
2015-04-02 14:18:10 +00:00
|
|
|
return $this->storage->file_get_contents($path);
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.file_put_contents.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param string $data
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function file_put_contents($path, $data) {
|
|
|
|
// file put content will always be translated to a stream write
|
|
|
|
$handle = $this->fopen($path, 'w');
|
2015-04-01 10:35:12 +00:00
|
|
|
$written = fwrite($handle, $data);
|
|
|
|
fclose($handle);
|
|
|
|
return $written;
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.unlink.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function unlink($path) {
|
2015-04-07 16:05:54 +00:00
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
if ($this->util->isExcluded($fullPath)) {
|
2015-01-14 19:39:23 +00:00
|
|
|
return $this->storage->unlink($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
$encryptionModule = $this->getEncryptionModule($path);
|
|
|
|
if ($encryptionModule) {
|
2015-05-13 12:39:27 +00:00
|
|
|
$this->keyStorage->deleteAllFileKeys($this->getFullPath($path));
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return $this->storage->unlink($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.rename.php
|
|
|
|
*
|
|
|
|
* @param string $path1
|
|
|
|
* @param string $path2
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function rename($path1, $path2) {
|
|
|
|
|
|
|
|
$result = $this->storage->rename($path1, $path2);
|
2015-04-27 09:40:10 +00:00
|
|
|
|
|
|
|
if ($result && $this->encryptionManager->isEnabled()) {
|
|
|
|
$source = $this->getFullPath($path1);
|
|
|
|
if (!$this->util->isExcluded($source)) {
|
|
|
|
$target = $this->getFullPath($path2);
|
|
|
|
if (isset($this->unencryptedSize[$source])) {
|
|
|
|
$this->unencryptedSize[$target] = $this->unencryptedSize[$source];
|
|
|
|
}
|
2015-05-11 08:35:42 +00:00
|
|
|
$this->keyStorage->renameKeys($source, $target);
|
2015-04-23 14:48:11 +00:00
|
|
|
}
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
2015-05-13 12:39:27 +00:00
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.rmdir.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function rmdir($path) {
|
|
|
|
$result = $this->storage->rmdir($path);
|
2015-05-18 09:54:51 +00:00
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
if ($result &&
|
|
|
|
$this->util->isExcluded($fullPath) === false &&
|
|
|
|
$this->encryptionManager->isEnabled()
|
|
|
|
) {
|
|
|
|
$this->keyStorage->deleteAllFileKeys($fullPath);
|
2015-05-13 12:39:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
2015-05-12 16:49:25 +00:00
|
|
|
/**
|
|
|
|
* check if a file can be read
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function isReadable($path) {
|
|
|
|
|
|
|
|
$isReadable = true;
|
|
|
|
|
|
|
|
$metaData = $this->getMetaData($path);
|
|
|
|
if (
|
|
|
|
!$this->is_dir($path) &&
|
|
|
|
isset($metaData['encrypted']) &&
|
|
|
|
$metaData['encrypted'] === true
|
|
|
|
) {
|
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
$module = $this->getEncryptionModule($path);
|
|
|
|
$isReadable = $module->isReadable($fullPath, $this->uid);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $this->storage->isReadable($path) && $isReadable;
|
|
|
|
}
|
|
|
|
|
2015-01-14 19:39:23 +00:00
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.copy.php
|
|
|
|
*
|
|
|
|
* @param string $path1
|
|
|
|
* @param string $path2
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function copy($path1, $path2) {
|
2015-04-27 09:40:10 +00:00
|
|
|
|
2015-05-21 12:07:42 +00:00
|
|
|
$source = $this->getFullPath($path1);
|
|
|
|
$target = $this->getFullPath($path2);
|
2015-04-27 11:13:27 +00:00
|
|
|
|
2015-05-21 12:07:42 +00:00
|
|
|
if ($this->util->isExcluded($source)) {
|
2015-04-07 16:05:54 +00:00
|
|
|
return $this->storage->copy($path1, $path2);
|
2015-04-02 14:25:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
$result = $this->storage->copy($path1, $path2);
|
2015-04-27 09:40:10 +00:00
|
|
|
|
|
|
|
if ($result && $this->encryptionManager->isEnabled()) {
|
2015-05-21 12:07:42 +00:00
|
|
|
$keysCopied = $this->copyKeys($source, $target);
|
|
|
|
|
|
|
|
if ($keysCopied &&
|
|
|
|
dirname($source) !== dirname($target) &&
|
|
|
|
$this->util->isFile($target)
|
|
|
|
) {
|
|
|
|
$this->update->update($target);
|
2015-04-02 14:25:01 +00:00
|
|
|
}
|
2015-05-21 12:07:42 +00:00
|
|
|
|
2015-05-05 12:38:06 +00:00
|
|
|
$data = $this->getMetaData($path1);
|
2015-05-13 12:39:27 +00:00
|
|
|
|
|
|
|
if (isset($data['encrypted'])) {
|
|
|
|
$this->getCache()->put($path2, ['encrypted' => $data['encrypted']]);
|
|
|
|
}
|
|
|
|
if (isset($data['size'])) {
|
2015-05-21 12:07:42 +00:00
|
|
|
$this->updateUnencryptedSize($target, $data['size']);
|
2015-05-13 12:39:27 +00:00
|
|
|
}
|
2015-04-02 14:25:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.fopen.php
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param string $mode
|
|
|
|
* @return resource
|
2015-07-09 16:04:35 +00:00
|
|
|
* @throws GenericEncryptionException
|
|
|
|
* @throws ModuleDoesNotExistsException
|
2015-01-14 19:39:23 +00:00
|
|
|
*/
|
|
|
|
public function fopen($path, $mode) {
|
|
|
|
|
2015-04-08 14:41:20 +00:00
|
|
|
$encryptionEnabled = $this->encryptionManager->isEnabled();
|
2015-01-14 19:39:23 +00:00
|
|
|
$shouldEncrypt = false;
|
|
|
|
$encryptionModule = null;
|
2015-07-09 16:04:35 +00:00
|
|
|
$header = $this->getHeader($path);
|
2015-01-14 19:39:23 +00:00
|
|
|
$fullPath = $this->getFullPath($path);
|
|
|
|
$encryptionModuleId = $this->util->getEncryptionModuleId($header);
|
|
|
|
|
2015-05-27 11:01:32 +00:00
|
|
|
if ($this->util->isExcluded($fullPath) === false) {
|
|
|
|
|
|
|
|
$size = $unencryptedSize = 0;
|
2015-06-23 08:43:28 +00:00
|
|
|
$realFile = $this->util->stripPartialFileExtension($path);
|
2015-06-26 09:26:40 +00:00
|
|
|
$targetExists = $this->file_exists($realFile) || $this->file_exists($path);
|
2015-05-27 11:01:32 +00:00
|
|
|
$targetIsEncrypted = false;
|
|
|
|
if ($targetExists) {
|
|
|
|
// in case the file exists we require the explicit module as
|
|
|
|
// specified in the file header - otherwise we need to fail hard to
|
|
|
|
// prevent data loss on client side
|
|
|
|
if (!empty($encryptionModuleId)) {
|
|
|
|
$targetIsEncrypted = true;
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule($encryptionModuleId);
|
|
|
|
}
|
2015-04-02 15:16:27 +00:00
|
|
|
|
2015-06-30 08:21:03 +00:00
|
|
|
if ($this->file_exists($path)) {
|
|
|
|
$size = $this->storage->filesize($path);
|
|
|
|
$unencryptedSize = $this->filesize($path);
|
|
|
|
} else {
|
|
|
|
$size = $unencryptedSize = 0;
|
|
|
|
}
|
2015-05-27 11:01:32 +00:00
|
|
|
}
|
2015-01-14 19:39:23 +00:00
|
|
|
|
2015-05-27 11:01:32 +00:00
|
|
|
try {
|
2015-01-14 19:39:23 +00:00
|
|
|
|
2015-05-27 11:01:32 +00:00
|
|
|
if (
|
|
|
|
$mode === 'w'
|
|
|
|
|| $mode === 'w+'
|
|
|
|
|| $mode === 'wb'
|
|
|
|
|| $mode === 'wb+'
|
|
|
|
) {
|
2015-07-09 16:04:35 +00:00
|
|
|
// don't overwrite encrypted files if encyption is not enabled
|
|
|
|
if ($targetIsEncrypted && $encryptionEnabled === false) {
|
|
|
|
throw new GenericEncryptionException('Tried to access encrypted file but encryption is not enabled');
|
|
|
|
}
|
2015-05-27 11:01:32 +00:00
|
|
|
if ($encryptionEnabled) {
|
|
|
|
// if $encryptionModuleId is empty, the default module will be used
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule($encryptionModuleId);
|
|
|
|
$shouldEncrypt = $encryptionModule->shouldEncrypt($fullPath);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
$info = $this->getCache()->get($path);
|
|
|
|
// only get encryption module if we found one in the header
|
|
|
|
// or if file should be encrypted according to the file cache
|
|
|
|
if (!empty($encryptionModuleId)) {
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule($encryptionModuleId);
|
|
|
|
$shouldEncrypt = true;
|
|
|
|
} else if (empty($encryptionModuleId) && $info['encrypted'] === true) {
|
|
|
|
// we come from a old installation. No header and/or no module defined
|
|
|
|
// but the file is encrypted. In this case we need to use the
|
|
|
|
// OC_DEFAULT_MODULE to read the file
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule('OC_DEFAULT_MODULE');
|
|
|
|
$shouldEncrypt = true;
|
2015-07-10 11:14:07 +00:00
|
|
|
$targetIsEncrypted = true;
|
2015-05-27 11:01:32 +00:00
|
|
|
}
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
2015-05-27 11:01:32 +00:00
|
|
|
} catch (ModuleDoesNotExistsException $e) {
|
|
|
|
$this->logger->warning('Encryption module "' . $encryptionModuleId .
|
|
|
|
'" not found, file will be stored unencrypted (' . $e->getMessage() . ')');
|
|
|
|
}
|
|
|
|
|
|
|
|
// encryption disabled on write of new file and write to existing unencrypted file -> don't encrypt
|
|
|
|
if (!$encryptionEnabled || !$this->mount->getOption('encrypt', true)) {
|
|
|
|
if (!$targetExists || !$targetIsEncrypted) {
|
|
|
|
$shouldEncrypt = false;
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-27 11:01:32 +00:00
|
|
|
if ($shouldEncrypt === true && $encryptionModule !== null) {
|
|
|
|
$source = $this->storage->fopen($path, $mode);
|
|
|
|
$handle = \OC\Files\Stream\Encryption::wrap($source, $path, $fullPath, $header,
|
|
|
|
$this->uid, $encryptionModule, $this->storage, $this, $this->util, $this->fileHelper, $mode,
|
2015-07-09 16:04:35 +00:00
|
|
|
$size, $unencryptedSize, $this->getHeaderSize($path));
|
2015-05-27 11:01:32 +00:00
|
|
|
return $handle;
|
2015-04-02 15:16:27 +00:00
|
|
|
}
|
|
|
|
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
2015-05-27 11:01:32 +00:00
|
|
|
|
|
|
|
return $this->storage->fopen($path, $mode);
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
2015-04-15 07:49:50 +00:00
|
|
|
/**
|
2015-05-21 12:07:42 +00:00
|
|
|
* @param Storage $sourceStorage
|
2015-04-15 07:49:50 +00:00
|
|
|
* @param string $sourceInternalPath
|
|
|
|
* @param string $targetInternalPath
|
|
|
|
* @param bool $preserveMtime
|
|
|
|
* @return bool
|
|
|
|
*/
|
2015-05-21 12:07:42 +00:00
|
|
|
public function moveFromStorage(Storage $sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime = true) {
|
2015-04-30 12:30:02 +00:00
|
|
|
|
|
|
|
// TODO clean this up once the underlying moveFromStorage in OC\Files\Storage\Wrapper\Common is fixed:
|
|
|
|
// - call $this->storage->moveFromStorage() instead of $this->copyBetweenStorage
|
|
|
|
// - copy the file cache update from $this->copyBetweenStorage to this method
|
2015-05-21 12:07:42 +00:00
|
|
|
// - copy the copyKeys() call from $this->copyBetweenStorage to this method
|
2015-04-30 12:30:02 +00:00
|
|
|
// - remove $this->copyBetweenStorage
|
|
|
|
|
|
|
|
$result = $this->copyBetweenStorage($sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime, true);
|
2015-04-15 07:49:50 +00:00
|
|
|
if ($result) {
|
|
|
|
if ($sourceStorage->is_dir($sourceInternalPath)) {
|
|
|
|
$result &= $sourceStorage->rmdir($sourceInternalPath);
|
|
|
|
} else {
|
|
|
|
$result &= $sourceStorage->unlink($sourceInternalPath);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-05-21 12:07:42 +00:00
|
|
|
* @param Storage $sourceStorage
|
2015-04-15 07:49:50 +00:00
|
|
|
* @param string $sourceInternalPath
|
|
|
|
* @param string $targetInternalPath
|
|
|
|
* @param bool $preserveMtime
|
|
|
|
* @return bool
|
|
|
|
*/
|
2015-05-21 12:07:42 +00:00
|
|
|
public function copyFromStorage(Storage $sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime = false) {
|
2015-04-30 12:30:02 +00:00
|
|
|
|
|
|
|
// TODO clean this up once the underlying moveFromStorage in OC\Files\Storage\Wrapper\Common is fixed:
|
|
|
|
// - call $this->storage->moveFromStorage() instead of $this->copyBetweenStorage
|
|
|
|
// - copy the file cache update from $this->copyBetweenStorage to this method
|
2015-05-21 12:07:42 +00:00
|
|
|
// - copy the copyKeys() call from $this->copyBetweenStorage to this method
|
2015-04-30 12:30:02 +00:00
|
|
|
// - remove $this->copyBetweenStorage
|
|
|
|
|
|
|
|
return $this->copyBetweenStorage($sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime, false);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* copy file between two storages
|
|
|
|
*
|
2015-05-21 12:07:42 +00:00
|
|
|
* @param Storage $sourceStorage
|
2015-05-06 10:14:18 +00:00
|
|
|
* @param string $sourceInternalPath
|
|
|
|
* @param string $targetInternalPath
|
|
|
|
* @param bool $preserveMtime
|
|
|
|
* @param bool $isRename
|
2015-04-30 12:30:02 +00:00
|
|
|
* @return bool
|
|
|
|
*/
|
2015-05-21 12:07:42 +00:00
|
|
|
private function copyBetweenStorage(Storage $sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime, $isRename) {
|
|
|
|
|
|
|
|
// first copy the keys that we reuse the existing file key on the target location
|
|
|
|
// and don't create a new one which would break versions for example.
|
|
|
|
$mount = $this->mountManager->findByStorageId($sourceStorage->getId());
|
|
|
|
if (count($mount) === 1) {
|
|
|
|
$mountPoint = $mount[0]->getMountPoint();
|
|
|
|
$source = $mountPoint . '/' . $sourceInternalPath;
|
|
|
|
$target = $this->getFullPath($targetInternalPath);
|
|
|
|
$this->copyKeys($source, $target);
|
|
|
|
} else {
|
|
|
|
$this->logger->error('Could not find mount point, can\'t keep encryption keys');
|
|
|
|
}
|
|
|
|
|
2015-04-15 07:49:50 +00:00
|
|
|
if ($sourceStorage->is_dir($sourceInternalPath)) {
|
|
|
|
$dh = $sourceStorage->opendir($sourceInternalPath);
|
|
|
|
$result = $this->mkdir($targetInternalPath);
|
|
|
|
if (is_resource($dh)) {
|
|
|
|
while ($result and ($file = readdir($dh)) !== false) {
|
|
|
|
if (!Filesystem::isIgnoredDir($file)) {
|
|
|
|
$result &= $this->copyFromStorage($sourceStorage, $sourceInternalPath . '/' . $file, $targetInternalPath . '/' . $file);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
$source = $sourceStorage->fopen($sourceInternalPath, 'r');
|
|
|
|
$target = $this->fopen($targetInternalPath, 'w');
|
|
|
|
list(, $result) = \OC_Helper::streamCopy($source, $target);
|
|
|
|
fclose($source);
|
|
|
|
fclose($target);
|
|
|
|
|
2015-04-30 12:30:02 +00:00
|
|
|
if($result) {
|
|
|
|
if ($preserveMtime) {
|
|
|
|
$this->touch($targetInternalPath, $sourceStorage->filemtime($sourceInternalPath));
|
|
|
|
}
|
2015-07-23 13:18:59 +00:00
|
|
|
$isEncrypted = $this->encryptionManager->isEnabled() && $this->mount->getOption('encrypt', true) ? 1 : 0;
|
2015-04-30 12:30:02 +00:00
|
|
|
|
|
|
|
// in case of a rename we need to manipulate the source cache because
|
|
|
|
// this information will be kept for the new target
|
|
|
|
if ($isRename) {
|
|
|
|
$sourceStorage->getCache()->put($sourceInternalPath, ['encrypted' => $isEncrypted]);
|
|
|
|
} else {
|
|
|
|
$this->getCache()->put($targetInternalPath, ['encrypted' => $isEncrypted]);
|
|
|
|
}
|
|
|
|
} else {
|
2015-04-15 07:49:50 +00:00
|
|
|
// delete partially written target file
|
|
|
|
$this->unlink($targetInternalPath);
|
|
|
|
// delete cache entry that was created by fopen
|
|
|
|
$this->getCache()->remove($targetInternalPath);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return (bool)$result;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2015-04-02 12:44:58 +00:00
|
|
|
/**
|
|
|
|
* get the path to a local version of the file.
|
|
|
|
* The local version of the file can be temporary and doesn't have to be persistent across requests
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function getLocalFile($path) {
|
2015-05-05 14:19:24 +00:00
|
|
|
if ($this->encryptionManager->isEnabled()) {
|
2015-05-06 09:16:44 +00:00
|
|
|
$cachedFile = $this->getCachedFile($path);
|
|
|
|
if (is_string($cachedFile)) {
|
|
|
|
return $cachedFile;
|
|
|
|
}
|
2015-05-05 14:19:24 +00:00
|
|
|
}
|
|
|
|
return $this->storage->getLocalFile($path);
|
2015-04-02 12:44:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the wrapped storage's value for isLocal()
|
|
|
|
*
|
|
|
|
* @return bool wrapped storage's isLocal() value
|
|
|
|
*/
|
|
|
|
public function isLocal() {
|
2015-04-27 12:26:05 +00:00
|
|
|
if ($this->encryptionManager->isEnabled()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return $this->storage->isLocal();
|
2015-04-02 12:44:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.stat.php
|
|
|
|
* only the following keys are required in the result: size and mtime
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function stat($path) {
|
|
|
|
$stat = $this->storage->stat($path);
|
|
|
|
$fileSize = $this->filesize($path);
|
|
|
|
$stat['size'] = $fileSize;
|
|
|
|
$stat[7] = $fileSize;
|
|
|
|
return $stat;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* see http://php.net/manual/en/function.hash.php
|
|
|
|
*
|
|
|
|
* @param string $type
|
|
|
|
* @param string $path
|
|
|
|
* @param bool $raw
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function hash($type, $path, $raw = false) {
|
|
|
|
$fh = $this->fopen($path, 'rb');
|
|
|
|
$ctx = hash_init($type);
|
|
|
|
hash_update_stream($ctx, $fh);
|
|
|
|
fclose($fh);
|
|
|
|
return hash_final($ctx, $raw);
|
|
|
|
}
|
|
|
|
|
2015-01-14 19:39:23 +00:00
|
|
|
/**
|
|
|
|
* return full path, including mount point
|
|
|
|
*
|
|
|
|
* @param string $path relative to mount point
|
|
|
|
* @return string full path including mount point
|
|
|
|
*/
|
|
|
|
protected function getFullPath($path) {
|
2015-04-20 14:50:12 +00:00
|
|
|
return Filesystem::normalizePath($this->mountPoint . '/' . $path);
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
2015-07-09 16:04:35 +00:00
|
|
|
/**
|
|
|
|
* read first block of encrypted file, typically this will contain the
|
|
|
|
* encryption header
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
protected function readFirstBlock($path) {
|
|
|
|
$firstBlock = '';
|
|
|
|
if ($this->storage->file_exists($path)) {
|
|
|
|
$handle = $this->storage->fopen($path, 'r');
|
|
|
|
$firstBlock = fread($handle, $this->util->getHeaderSize());
|
|
|
|
fclose($handle);
|
|
|
|
}
|
|
|
|
return $firstBlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* return header size of given file
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
protected function getHeaderSize($path) {
|
|
|
|
$headerSize = 0;
|
|
|
|
$realFile = $this->util->stripPartialFileExtension($path);
|
|
|
|
if ($this->storage->file_exists($realFile)) {
|
|
|
|
$path = $realFile;
|
|
|
|
}
|
|
|
|
$firstBlock = $this->readFirstBlock($path);
|
|
|
|
|
|
|
|
if (substr($firstBlock, 0, strlen(Util::HEADER_START)) === Util::HEADER_START) {
|
|
|
|
$headerSize = strlen($firstBlock);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $headerSize;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* parse raw header to array
|
|
|
|
*
|
|
|
|
* @param string $rawHeader
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
protected function parseRawHeader($rawHeader) {
|
|
|
|
$result = array();
|
|
|
|
if (substr($rawHeader, 0, strlen(Util::HEADER_START)) === Util::HEADER_START) {
|
|
|
|
$header = $rawHeader;
|
|
|
|
$endAt = strpos($header, Util::HEADER_END);
|
|
|
|
if ($endAt !== false) {
|
|
|
|
$header = substr($header, 0, $endAt + strlen(Util::HEADER_END));
|
|
|
|
|
|
|
|
// +1 to not start with an ':' which would result in empty element at the beginning
|
|
|
|
$exploded = explode(':', substr($header, strlen(Util::HEADER_START)+1));
|
|
|
|
|
|
|
|
$element = array_shift($exploded);
|
|
|
|
while ($element !== Util::HEADER_END) {
|
|
|
|
$result[$element] = array_shift($exploded);
|
|
|
|
$element = array_shift($exploded);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
2015-01-14 19:39:23 +00:00
|
|
|
/**
|
|
|
|
* read header from file
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
protected function getHeader($path) {
|
2015-06-23 08:43:28 +00:00
|
|
|
$realFile = $this->util->stripPartialFileExtension($path);
|
|
|
|
if ($this->storage->file_exists($realFile)) {
|
2015-06-26 09:26:40 +00:00
|
|
|
$path = $realFile;
|
|
|
|
}
|
|
|
|
|
2015-07-09 16:04:35 +00:00
|
|
|
$firstBlock = $this->readFirstBlock($path);
|
|
|
|
$result = $this->parseRawHeader($firstBlock);
|
|
|
|
|
|
|
|
// if the header doesn't contain a encryption module we check if it is a
|
|
|
|
// legacy file. If true, we add the default encryption module
|
|
|
|
if (!isset($result[Util::HEADER_ENCRYPTION_MODULE_KEY])) {
|
|
|
|
if (!empty($result)) {
|
|
|
|
$result[Util::HEADER_ENCRYPTION_MODULE_KEY] = 'OC_DEFAULT_MODULE';
|
|
|
|
} else {
|
|
|
|
// if the header was empty we have to check first if it is a encrypted file at all
|
|
|
|
$info = $this->getCache()->get($path);
|
|
|
|
if (isset($info['encrypted']) && $info['encrypted'] === true) {
|
|
|
|
$result[Util::HEADER_ENCRYPTION_MODULE_KEY] = 'OC_DEFAULT_MODULE';
|
|
|
|
}
|
2015-04-24 11:02:06 +00:00
|
|
|
}
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
2015-07-09 16:04:35 +00:00
|
|
|
|
|
|
|
return $result;
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* read encryption module needed to read/write the file located at $path
|
|
|
|
*
|
|
|
|
* @param string $path
|
2015-03-30 11:23:10 +00:00
|
|
|
* @return null|\OCP\Encryption\IEncryptionModule
|
|
|
|
* @throws ModuleDoesNotExistsException
|
|
|
|
* @throws \Exception
|
2015-01-14 19:39:23 +00:00
|
|
|
*/
|
|
|
|
protected function getEncryptionModule($path) {
|
|
|
|
$encryptionModule = null;
|
2015-07-09 16:04:35 +00:00
|
|
|
$header = $this->getHeader($path);
|
2015-01-14 19:39:23 +00:00
|
|
|
$encryptionModuleId = $this->util->getEncryptionModuleId($header);
|
|
|
|
if (!empty($encryptionModuleId)) {
|
|
|
|
try {
|
|
|
|
$encryptionModule = $this->encryptionManager->getEncryptionModule($encryptionModuleId);
|
|
|
|
} catch (ModuleDoesNotExistsException $e) {
|
2015-03-30 11:23:10 +00:00
|
|
|
$this->logger->critical('Encryption module defined in "' . $path . '" not loaded!');
|
2015-01-14 19:39:23 +00:00
|
|
|
throw $e;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $encryptionModule;
|
|
|
|
}
|
|
|
|
|
2015-05-21 22:17:38 +00:00
|
|
|
/**
|
|
|
|
* @param string $path
|
|
|
|
* @param int $unencryptedSize
|
|
|
|
*/
|
2015-01-14 19:39:23 +00:00
|
|
|
public function updateUnencryptedSize($path, $unencryptedSize) {
|
|
|
|
$this->unencryptedSize[$path] = $unencryptedSize;
|
|
|
|
}
|
2015-05-21 12:07:42 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* copy keys to new location
|
|
|
|
*
|
|
|
|
* @param string $source path relative to data/
|
|
|
|
* @param string $target path relative to data/
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
protected function copyKeys($source, $target) {
|
|
|
|
if (!$this->util->isExcluded($source)) {
|
|
|
|
return $this->keyStorage->copyKeys($source, $target);
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
2015-07-09 16:04:35 +00:00
|
|
|
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|