server/apps/files_encryption/hooks/hooks.php

568 lines
17 KiB
PHP
Raw Normal View History

<?php
/**
* ownCloud
*
* @author Sam Tuke
* @copyright 2012 Sam Tuke samtuke@owncloud.org
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
* License as published by the Free Software Foundation; either
* version 3 of the License, or any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
*
* You should have received a copy of the GNU Affero General Public
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
*
*/
namespace OCA\Encryption;
use OC\Files\Filesystem;
/**
* Class for hook specific logic
*/
class Hooks {
// TODO: use passphrase for encrypting private key that is separate to
// the login password
/**
* @brief Startup encryption backend upon user login
* @note This method should never be called for users using client side encryption
*/
2013-05-27 15:26:58 +00:00
public static function login($params) {
$l = new \OC_L10N('files_encryption');
//check if all requirements are met
if(!Helper::checkRequirements() ) {
$error_msg = $l->t("Missing requirements.");
2013-07-04 12:50:07 +00:00
$hint = $l->t('Please make sure that PHP 5.3.3 or newer is installed and that the OpenSSL PHP extension is enabled and configured properly. For now, the encryption app has been disabled.');
\OC_App::disable('files_encryption');
\OCP\Util::writeLog('Encryption library', $error_msg . ' ' . $hint, \OCP\Util::ERROR);
\OCP\Template::printErrorPage($error_msg, $hint);
}
2013-05-27 15:26:58 +00:00
$view = new \OC_FilesystemView('/');
// ensure filesystem is loaded
if(!\OC\Files\Filesystem::$loaded) {
\OC_Util::setupFS($params['uid']);
}
2013-05-27 15:26:58 +00:00
$util = new Util($view, $params['uid']);
// setup user, if user not ready force relogin
if (Helper::setupUser($util, $params['password']) === false) {
return false;
}
$encryptedKey = Keymanager::getPrivateKey($view, $params['uid']);
$privateKey = Crypt::decryptPrivateKey($encryptedKey, $params['password']);
2013-06-03 16:42:13 +00:00
if ($privateKey === false) {
\OCP\Util::writeLog('Encryption library', 'Private key for user "' . $params['uid']
. '" is not valid! Maybe the user password was changed from outside if so please change it back to gain access', \OCP\Util::ERROR);
}
$session = new \OCA\Encryption\Session($view);
2013-05-27 15:26:58 +00:00
$session->setPrivateKey($privateKey);
2013-05-15 12:33:08 +00:00
// Check if first-run file migration has already been performed
$ready = false;
if ($util->getMigrationStatus() === Util::MIGRATION_OPEN) {
$ready = $util->beginMigration();
}
2013-05-27 15:26:58 +00:00
// If migration not yet done
if ($ready) {
2013-05-27 15:26:58 +00:00
$userView = new \OC_FilesystemView('/' . $params['uid']);
// Set legacy encryption key if it exists, to support
// depreciated encryption system
2013-05-20 19:24:39 +00:00
if (
2013-05-27 15:26:58 +00:00
$userView->file_exists('encryption.key')
&& $encLegacyKey = $userView->file_get_contents('encryption.key')
) {
$plainLegacyKey = Crypt::legacyDecrypt($encLegacyKey, $params['password']);
2013-05-27 15:26:58 +00:00
$session->setLegacyKey($plainLegacyKey);
}
// Encrypt existing user files:
// This serves to upgrade old versions of the encryption
// app (see appinfo/spec.txt)
if (
2013-05-27 15:26:58 +00:00
$util->encryptAll('/' . $params['uid'] . '/' . 'files', $session->getLegacyKey(), $params['password'])
) {
2013-05-27 15:26:58 +00:00
\OC_Log::write(
'Encryption library', 'Encryption of existing files belonging to "' . $params['uid'] . '" completed'
2013-05-27 15:26:58 +00:00
, \OC_Log::INFO
);
2013-05-27 15:26:58 +00:00
}
// Register successful migration in DB
$util->finishMigration();
2013-05-27 15:26:58 +00:00
}
return true;
}
2013-05-13 20:34:11 +00:00
2013-05-27 15:26:58 +00:00
/**
* @brief setup encryption backend upon user created
* @note This method should never be called for users using client side encryption
*/
public static function postCreateUser($params) {
$view = new \OC_FilesystemView('/');
2013-05-13 20:34:11 +00:00
2013-05-27 15:26:58 +00:00
$util = new Util($view, $params['uid']);
2013-05-13 20:34:11 +00:00
2013-05-27 15:26:58 +00:00
Helper::setupUser($util, $params['password']);
}
2013-05-13 20:34:11 +00:00
2013-05-27 15:26:58 +00:00
/**
* @brief cleanup encryption backend upon user deleted
* @note This method should never be called for users using client side encryption
*/
public static function postDeleteUser($params) {
$view = new \OC_FilesystemView('/');
2013-05-27 15:26:58 +00:00
// cleanup public key
$publicKey = '/public-keys/' . $params['uid'] . '.public.key';
2013-05-27 15:26:58 +00:00
// Disable encryption proxy to prevent recursive calls
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
2013-05-27 15:26:58 +00:00
$view->unlink($publicKey);
2013-05-27 15:26:58 +00:00
\OC_FileProxy::$enabled = $proxyStatus;
}
/**
* @brief If the password can't be changed within ownCloud, than update the key password in advance.
*/
public static function preSetPassphrase($params) {
if ( ! \OC_User::canUserChangePassword($params['uid']) ) {
self::setPassphrase($params);
}
}
2013-05-27 15:26:58 +00:00
/**
* @brief Change a user's encryption passphrase
* @param array $params keys: uid, password
*/
public static function setPassphrase($params) {
// Only attempt to change passphrase if server-side encryption
// is in use (client-side encryption does not have access to
// the necessary keys)
if (Crypt::mode() === 'server') {
2013-04-29 21:37:08 +00:00
if ($params['uid'] === \OCP\User::getUser()) {
2013-04-29 21:37:08 +00:00
$view = new \OC_FilesystemView('/');
$session = new \OCA\Encryption\Session($view);
// Get existing decrypted private key
$privateKey = $session->getPrivateKey();
// Encrypt private key with new user pwd as passphrase
$encryptedPrivateKey = Crypt::symmetricEncryptFileContent($privateKey, $params['password']);
// Save private key
Keymanager::setPrivateKey($encryptedPrivateKey);
// NOTE: Session does not need to be updated as the
// private key has not changed, only the passphrase
// used to decrypt it has changed
2013-05-27 15:26:58 +00:00
} else { // admin changed the password for a different user, create new keys and reencrypt file keys
2013-05-27 15:26:58 +00:00
$user = $params['uid'];
$recoveryPassword = $params['recoveryPassword'];
$newUserPassword = $params['password'];
$view = new \OC_FilesystemView('/');
// make sure that the users home is mounted
\OC\Files\Filesystem::initMountPoints($user);
$keypair = Crypt::createKeypair();
2013-05-27 15:26:58 +00:00
// Disable encryption proxy to prevent recursive calls
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
// Save public key
2013-05-27 15:26:58 +00:00
$view->file_put_contents('/public-keys/' . $user . '.public.key', $keypair['publicKey']);
2013-05-23 21:56:31 +00:00
// Encrypt private key empty passphrase
2013-05-27 15:26:58 +00:00
$encryptedPrivateKey = Crypt::symmetricEncryptFileContent($keypair['privateKey'], $newUserPassword);
// Save private key
2013-05-27 15:26:58 +00:00
$view->file_put_contents(
'/' . $user . '/files_encryption/' . $user . '.private.key', $encryptedPrivateKey);
2013-05-27 15:26:58 +00:00
if ($recoveryPassword) { // if recovery key is set we can re-encrypt the key files
$util = new Util($view, $user);
$util->recoverUsersFiles($recoveryPassword);
}
\OC_FileProxy::$enabled = $proxyStatus;
}
}
}
/*
* @brief check if files can be encrypted to every user.
*/
2013-05-20 19:46:28 +00:00
/**
* @param $params
*/
public static function preShared($params) {
$users = array();
$view = new \OC\Files\View('/public-keys/');
switch ($params['shareType']) {
case \OCP\Share::SHARE_TYPE_USER:
$users[] = $params['shareWith'];
break;
case \OCP\Share::SHARE_TYPE_GROUP:
$users = \OC_Group::usersInGroup($params['shareWith']);
break;
}
2013-05-20 21:44:10 +00:00
$error = false;
foreach ($users as $user) {
if (!$view->file_exists($user . '.public.key')) {
2013-05-20 21:44:10 +00:00
$error = true;
break;
}
}
2013-05-20 21:44:10 +00:00
2013-05-27 15:26:58 +00:00
if ($error) // Set flag var 'run' to notify emitting
2013-05-20 21:44:10 +00:00
// script that hook execution failed
2013-05-27 15:26:58 +00:00
{
2013-05-20 21:44:10 +00:00
$params['run']->run = false;
2013-05-27 15:26:58 +00:00
}
// TODO: Make sure files_sharing provides user
// feedback on failed share
}
/**
2013-05-27 15:26:58 +00:00
* @brief
*/
public static function postShared($params) {
// NOTE: $params has keys:
// [itemType] => file
// itemSource -> int, filecache file ID
// [parent] =>
// [itemTarget] => /13
// shareWith -> string, uid of user being shared to
// fileTarget -> path of file being shared
// uidOwner -> owner of the original file being shared
// [shareType] => 0
// [shareWith] => test1
// [uidOwner] => admin
// [permissions] => 17
// [fileSource] => 13
// [fileTarget] => /test8
// [id] => 10
// [token] =>
// [run] => whether emitting script should continue to run
// TODO: Should other kinds of item be encrypted too?
if ($params['itemType'] === 'file' || $params['itemType'] === 'folder') {
$view = new \OC_FilesystemView('/');
$session = new \OCA\Encryption\Session($view);
$userId = \OCP\User::getUser();
$util = new Util($view, $userId);
$path = $util->fileIdToPath($params['itemSource']);
$share = $util->getParentFromShare($params['id']);
//if parent is set, then this is a re-share action
if ($share['parent'] !== null) {
// get the parent from current share
$parent = $util->getShareParent($params['parent']);
// if parent is file the it is an 1:1 share
if ($parent['item_type'] === 'file') {
// prefix path with Shared
$path = '/Shared' . $parent['file_target'];
} else {
// NOTE: parent is folder but shared was a file!
// we try to rebuild the missing path
// some examples we face here
// user1 share folder1 with user2 folder1 has
// the following structure
// /folder1/subfolder1/subsubfolder1/somefile.txt
// user2 re-share subfolder2 with user3
// user3 re-share somefile.txt user4
// so our path should be
// /Shared/subfolder1/subsubfolder1/somefile.txt
// while user3 is sharing
if ($params['itemType'] === 'file') {
// get target path
$targetPath = $util->fileIdToPath($params['fileSource']);
$targetPathSplit = array_reverse(explode('/', $targetPath));
// init values
$path = '';
$sharedPart = ltrim($parent['file_target'], '/');
// rebuild path
foreach ($targetPathSplit as $pathPart) {
if ($pathPart !== $sharedPart) {
$path = '/' . $pathPart . $path;
} else {
break;
}
}
// prefix path with Shared
$path = '/Shared' . $parent['file_target'] . $path;
} else {
// prefix path with Shared
$path = '/Shared' . $parent['file_target'] . $params['fileTarget'];
}
}
}
$sharingEnabled = \OCP\Share::isEnabled();
2013-05-29 23:38:11 +00:00
// get the path including mount point only if not a shared folder
2013-06-03 16:42:13 +00:00
if (strncmp($path, '/Shared', strlen('/Shared') !== 0)) {
2013-05-29 23:38:11 +00:00
// get path including the the storage mount point
$path = $util->getPathWithMountPoint($params['itemSource']);
}
2013-05-18 19:12:53 +00:00
// if a folder was shared, get a list of all (sub-)folders
if ($params['itemType'] === 'folder') {
$allFiles = $util->getAllFiles($path);
} else {
$allFiles = array($path);
}
foreach ($allFiles as $path) {
$usersSharing = $util->getSharingUsersArray($sharingEnabled, $path);
2013-05-27 15:26:58 +00:00
$util->setSharedFileKeyfiles($session, $usersSharing, $path);
}
}
}
2013-05-27 15:26:58 +00:00
/**
2013-05-27 15:26:58 +00:00
* @brief
*/
2013-05-27 15:26:58 +00:00
public static function postUnshare($params) {
// NOTE: $params has keys:
// [itemType] => file
// [itemSource] => 13
// [shareType] => 0
// [shareWith] => test1
// [itemParent] =>
2013-05-27 15:26:58 +00:00
if ($params['itemType'] === 'file' || $params['itemType'] === 'folder') {
2013-05-27 15:26:58 +00:00
$view = new \OC_FilesystemView('/');
$userId = \OCP\User::getUser();
2013-05-27 15:26:58 +00:00
$util = new Util($view, $userId);
$path = $util->fileIdToPath($params['itemSource']);
// check if this is a re-share
2013-05-27 15:26:58 +00:00
if ($params['itemParent']) {
// get the parent from current share
2013-05-27 15:26:58 +00:00
$parent = $util->getShareParent($params['itemParent']);
// get target path
2013-05-27 15:26:58 +00:00
$targetPath = $util->fileIdToPath($params['itemSource']);
$targetPathSplit = array_reverse(explode('/', $targetPath));
// init values
$path = '';
2013-05-27 15:26:58 +00:00
$sharedPart = ltrim($parent['file_target'], '/');
// rebuild path
2013-05-27 15:26:58 +00:00
foreach ($targetPathSplit as $pathPart) {
if ($pathPart !== $sharedPart) {
$path = '/' . $pathPart . $path;
} else {
break;
}
}
// prefix path with Shared
$path = '/Shared' . $parent['file_target'] . $path;
}
// for group shares get a list of the group members
if ($params['shareType'] === \OCP\Share::SHARE_TYPE_GROUP) {
$userIds = \OC_Group::usersInGroup($params['shareWith']);
} else {
if ($params['shareType'] === \OCP\Share::SHARE_TYPE_LINK) {
2013-05-27 15:26:58 +00:00
$userIds = array($util->getPublicShareKeyId());
} else {
$userIds = array($params['shareWith']);
}
}
2013-05-29 23:38:11 +00:00
// get the path including mount point only if not a shared folder
2013-06-03 16:42:13 +00:00
if (strncmp($path, '/Shared', strlen('/Shared') !== 0)) {
2013-05-29 23:38:11 +00:00
// get path including the the storage mount point
$path = $util->getPathWithMountPoint($params['itemSource']);
}
2013-05-29 23:38:11 +00:00
// if we unshare a folder we need a list of all (sub-)files
if ($params['itemType'] === 'folder') {
2013-06-03 16:42:13 +00:00
$allFiles = $util->getAllFiles($path);
} else {
2013-05-27 15:26:58 +00:00
$allFiles = array($path);
}
2013-05-27 15:26:58 +00:00
foreach ($allFiles as $path) {
// check if the user still has access to the file, otherwise delete share key
2013-05-27 15:26:58 +00:00
$sharingUsers = $util->getSharingUsersArray(true, $path);
// Unshare every user who no longer has access to the file
2013-05-27 15:26:58 +00:00
$delUsers = array_diff($userIds, $sharingUsers);
2013-05-20 19:24:39 +00:00
// delete share key
2013-05-27 15:26:58 +00:00
Keymanager::delShareKey($view, $delUsers, $path);
}
}
}
2013-05-27 15:26:58 +00:00
/**
2013-05-27 15:26:58 +00:00
* @brief after a file is renamed, rename its keyfile and share-keys also fix the file size and fix also the sharing
* @param array with oldpath and newpath
*
* This function is connected to the rename signal of OC_Filesystem and adjust the name and location
* of the stored versions along the actual file
*/
public static function postRename($params) {
// Disable encryption proxy to prevent recursive calls
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
$view = new \OC_FilesystemView('/');
$session = new \OCA\Encryption\Session($view);
2013-05-27 15:26:58 +00:00
$userId = \OCP\User::getUser();
$util = new Util($view, $userId);
// Format paths to be relative to user files dir
if ($util->isSystemWideMountPoint($params['oldpath'])) {
$baseDir = 'files_encryption/';
$oldKeyfilePath = $baseDir . 'keyfiles/' . $params['oldpath'];
} else {
$baseDir = $userId . '/' . 'files_encryption/';
$oldKeyfilePath = $baseDir . 'keyfiles/' . $params['oldpath'];
}
if ($util->isSystemWideMountPoint($params['newpath'])) {
$newKeyfilePath = $baseDir . 'keyfiles/' . $params['newpath'];
} else {
$newKeyfilePath = $baseDir . 'keyfiles/' . $params['newpath'];
}
2013-05-27 15:26:58 +00:00
// add key ext if this is not an folder
if (!$view->is_dir($oldKeyfilePath)) {
$oldKeyfilePath .= '.key';
$newKeyfilePath .= '.key';
// handle share-keys
$localKeyPath = $view->getLocalFile($baseDir . 'share-keys/' . $params['oldpath']);
2013-06-25 14:50:10 +00:00
$escapedPath = preg_replace('/(\*|\?|\[)/', '[$1]', $localKeyPath);
$matches = glob($escapedPath . '*.shareKey');
2013-05-27 15:26:58 +00:00
foreach ($matches as $src) {
$dst = \OC\Files\Filesystem::normalizePath(str_replace($params['oldpath'], $params['newpath'], $src));
// create destination folder if not exists
if (!file_exists(dirname($dst))) {
mkdir(dirname($dst), 0750, true);
}
rename($src, $dst);
}
} else {
// handle share-keys folders
$oldShareKeyfilePath = $baseDir . 'share-keys/' . $params['oldpath'];
$newShareKeyfilePath = $baseDir . 'share-keys/' . $params['newpath'];
2013-05-27 15:26:58 +00:00
// create destination folder if not exists
if (!$view->file_exists(dirname($newShareKeyfilePath))) {
$view->mkdir(dirname($newShareKeyfilePath), 0750, true);
}
$view->rename($oldShareKeyfilePath, $newShareKeyfilePath);
}
// Rename keyfile so it isn't orphaned
if ($view->file_exists($oldKeyfilePath)) {
// create destination folder if not exists
if (!$view->file_exists(dirname($newKeyfilePath))) {
$view->mkdir(dirname($newKeyfilePath), 0750, true);
}
$view->rename($oldKeyfilePath, $newKeyfilePath);
}
// build the path to the file
$newPath = '/' . $userId . '/files' . $params['newpath'];
$newPathRelative = $params['newpath'];
if ($util->fixFileSize($newPath)) {
// get sharing app state
$sharingEnabled = \OCP\Share::isEnabled();
// get users
$usersSharing = $util->getSharingUsersArray($sharingEnabled, $newPathRelative);
// update sharing-keys
$util->setSharedFileKeyfiles($session, $usersSharing, $newPathRelative);
}
\OC_FileProxy::$enabled = $proxyStatus;
}
/**
* set migration status back to '0' so that all new files get encrypted
* if the app gets enabled again
* @param array $params contains the app ID
*/
public static function preDisable($params) {
if ($params['app'] === 'files_encryption') {
$query = \OC_DB::prepare('UPDATE `*PREFIX*encryption` SET `migration_status`=0');
$query->execute();
}
}
}