2015-01-14 19:39:23 +00:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 15:07:57 +00:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2017-11-06 14:56:42 +00:00
|
|
|
* @author Bjoern Schiessle <bjoern@schiessle.org>
|
2016-05-26 17:56:05 +00:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2016-07-21 15:07:57 +00:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2015-04-07 15:02:49 +00:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
2017-11-06 14:56:42 +00:00
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
2015-01-14 19:39:23 +00:00
|
|
|
*
|
2015-04-07 15:02:49 +00:00
|
|
|
* @license AGPL-3.0
|
2015-01-14 19:39:23 +00:00
|
|
|
*
|
2015-04-07 15:02:49 +00:00
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
2015-01-14 19:39:23 +00:00
|
|
|
*
|
2015-04-07 15:02:49 +00:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2015-01-14 19:39:23 +00:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-04-07 15:02:49 +00:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-01-14 19:39:23 +00:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Encryption\Keys;
|
|
|
|
|
|
|
|
use OC\Encryption\Util;
|
2015-04-22 09:18:18 +00:00
|
|
|
use OC\Files\Filesystem;
|
2015-01-14 19:39:23 +00:00
|
|
|
use OC\Files\View;
|
2015-04-22 09:18:18 +00:00
|
|
|
use OCP\Encryption\Keys\IStorage;
|
2017-01-18 16:42:07 +00:00
|
|
|
use OC\User\NoUserException;
|
2015-01-14 19:39:23 +00:00
|
|
|
|
2015-04-22 09:18:18 +00:00
|
|
|
class Storage implements IStorage {
|
2015-01-14 19:39:23 +00:00
|
|
|
|
2015-07-24 10:24:18 +00:00
|
|
|
// hidden file which indicate that the folder is a valid key storage
|
|
|
|
const KEY_STORAGE_MARKER = '.oc_key_storage';
|
|
|
|
|
2015-01-14 19:39:23 +00:00
|
|
|
/** @var View */
|
|
|
|
private $view;
|
|
|
|
|
|
|
|
/** @var Util */
|
|
|
|
private $util;
|
|
|
|
|
|
|
|
// base dir where all the file related keys are stored
|
2015-04-22 11:12:52 +00:00
|
|
|
/** @var string */
|
2015-01-14 19:39:23 +00:00
|
|
|
private $keys_base_dir;
|
2015-04-22 11:12:52 +00:00
|
|
|
|
2015-07-24 10:24:18 +00:00
|
|
|
// root of the key storage default is empty which means that we use the data folder
|
|
|
|
/** @var string */
|
|
|
|
private $root_dir;
|
|
|
|
|
2015-04-22 11:12:52 +00:00
|
|
|
/** @var string */
|
2015-01-14 19:39:23 +00:00
|
|
|
private $encryption_base_dir;
|
|
|
|
|
2017-01-02 20:24:37 +00:00
|
|
|
/** @var string */
|
|
|
|
private $backup_base_dir;
|
|
|
|
|
2015-04-22 11:12:52 +00:00
|
|
|
/** @var array */
|
|
|
|
private $keyCache = [];
|
2015-01-14 19:39:23 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param View $view
|
|
|
|
* @param Util $util
|
|
|
|
*/
|
2015-04-22 09:18:18 +00:00
|
|
|
public function __construct(View $view, Util $util) {
|
2015-01-14 19:39:23 +00:00
|
|
|
$this->view = $view;
|
|
|
|
$this->util = $util;
|
|
|
|
|
|
|
|
$this->encryption_base_dir = '/files_encryption';
|
|
|
|
$this->keys_base_dir = $this->encryption_base_dir .'/keys';
|
2017-01-02 20:24:37 +00:00
|
|
|
$this->backup_base_dir = $this->encryption_base_dir .'/backup';
|
2015-07-24 10:24:18 +00:00
|
|
|
$this->root_dir = $this->util->getKeyStorageRoot();
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-04-22 09:18:18 +00:00
|
|
|
* @inheritdoc
|
2015-01-14 19:39:23 +00:00
|
|
|
*/
|
2015-04-22 09:18:18 +00:00
|
|
|
public function getUserKey($uid, $keyId, $encryptionModuleId) {
|
|
|
|
$path = $this->constructUserKeyPath($encryptionModuleId, $keyId, $uid);
|
2015-01-14 19:39:23 +00:00
|
|
|
return $this->getKey($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-04-22 09:18:18 +00:00
|
|
|
* @inheritdoc
|
2015-01-14 19:39:23 +00:00
|
|
|
*/
|
2015-04-22 09:18:18 +00:00
|
|
|
public function getFileKey($path, $keyId, $encryptionModuleId) {
|
2015-05-22 10:12:31 +00:00
|
|
|
$realFile = $this->util->stripPartialFileExtension($path);
|
|
|
|
$keyDir = $this->getFileKeyDir($encryptionModuleId, $realFile);
|
2015-06-08 13:36:54 +00:00
|
|
|
$key = $this->getKey($keyDir . $keyId);
|
|
|
|
|
|
|
|
if ($key === '' && $realFile !== $path) {
|
|
|
|
// Check if the part file has keys and use them, if no normal keys
|
|
|
|
// exist. This is required to fix copyBetweenStorage() when we
|
|
|
|
// rename a .part file over storage borders.
|
|
|
|
$keyDir = $this->getFileKeyDir($encryptionModuleId, $path);
|
|
|
|
$key = $this->getKey($keyDir . $keyId);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $key;
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-04-22 09:18:18 +00:00
|
|
|
* @inheritdoc
|
2015-01-14 19:39:23 +00:00
|
|
|
*/
|
2015-04-22 09:18:18 +00:00
|
|
|
public function getSystemUserKey($keyId, $encryptionModuleId) {
|
|
|
|
$path = $this->constructUserKeyPath($encryptionModuleId, $keyId, null);
|
2015-01-14 19:39:23 +00:00
|
|
|
return $this->getKey($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-04-22 09:18:18 +00:00
|
|
|
* @inheritdoc
|
2015-01-14 19:39:23 +00:00
|
|
|
*/
|
2015-04-22 09:18:18 +00:00
|
|
|
public function setUserKey($uid, $keyId, $key, $encryptionModuleId) {
|
|
|
|
$path = $this->constructUserKeyPath($encryptionModuleId, $keyId, $uid);
|
2015-01-14 19:39:23 +00:00
|
|
|
return $this->setKey($path, $key);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-04-22 09:18:18 +00:00
|
|
|
* @inheritdoc
|
2015-01-14 19:39:23 +00:00
|
|
|
*/
|
2015-04-22 09:18:18 +00:00
|
|
|
public function setFileKey($path, $keyId, $key, $encryptionModuleId) {
|
|
|
|
$keyDir = $this->getFileKeyDir($encryptionModuleId, $path);
|
2015-01-14 19:39:23 +00:00
|
|
|
return $this->setKey($keyDir . $keyId, $key);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-04-22 09:18:18 +00:00
|
|
|
* @inheritdoc
|
2015-01-14 19:39:23 +00:00
|
|
|
*/
|
2015-04-22 09:18:18 +00:00
|
|
|
public function setSystemUserKey($keyId, $key, $encryptionModuleId) {
|
|
|
|
$path = $this->constructUserKeyPath($encryptionModuleId, $keyId, null);
|
2015-01-14 19:39:23 +00:00
|
|
|
return $this->setKey($path, $key);
|
|
|
|
}
|
|
|
|
|
2015-03-20 15:24:44 +00:00
|
|
|
/**
|
2015-04-22 09:18:18 +00:00
|
|
|
* @inheritdoc
|
2015-03-20 15:24:44 +00:00
|
|
|
*/
|
2015-04-22 09:18:18 +00:00
|
|
|
public function deleteUserKey($uid, $keyId, $encryptionModuleId) {
|
2017-01-18 16:42:07 +00:00
|
|
|
try {
|
|
|
|
$path = $this->constructUserKeyPath($encryptionModuleId, $keyId, $uid);
|
|
|
|
return !$this->view->file_exists($path) || $this->view->unlink($path);
|
|
|
|
} catch (NoUserException $e) {
|
|
|
|
// this exception can come from initMountPoints() from setupUserMounts()
|
|
|
|
// for a deleted user.
|
|
|
|
//
|
|
|
|
// It means, that:
|
|
|
|
// - we are not running in alternative storage mode because we don't call
|
|
|
|
// initMountPoints() in that mode
|
|
|
|
// - the keys were in the user's home but since the user was deleted, the
|
|
|
|
// user's home is gone and so are the keys
|
|
|
|
//
|
|
|
|
// So there is nothing to do, just ignore.
|
|
|
|
}
|
2015-03-20 15:24:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-04-22 09:18:18 +00:00
|
|
|
* @inheritdoc
|
2015-03-20 15:24:44 +00:00
|
|
|
*/
|
2015-04-22 09:18:18 +00:00
|
|
|
public function deleteFileKey($path, $keyId, $encryptionModuleId) {
|
|
|
|
$keyDir = $this->getFileKeyDir($encryptionModuleId, $path);
|
2015-04-09 08:28:02 +00:00
|
|
|
return !$this->view->file_exists($keyDir . $keyId) || $this->view->unlink($keyDir . $keyId);
|
2015-03-20 15:24:44 +00:00
|
|
|
}
|
|
|
|
|
2015-03-26 08:24:28 +00:00
|
|
|
/**
|
2015-04-22 09:18:18 +00:00
|
|
|
* @inheritdoc
|
2015-03-26 08:24:28 +00:00
|
|
|
*/
|
2015-05-13 12:39:27 +00:00
|
|
|
public function deleteAllFileKeys($path) {
|
|
|
|
$keyDir = $this->getFileKeyDir('', $path);
|
|
|
|
return !$this->view->file_exists($keyDir) || $this->view->deleteAll($keyDir);
|
2015-03-26 08:24:28 +00:00
|
|
|
}
|
|
|
|
|
2015-03-20 15:24:44 +00:00
|
|
|
/**
|
2015-04-22 09:18:18 +00:00
|
|
|
* @inheritdoc
|
2015-03-20 15:24:44 +00:00
|
|
|
*/
|
2015-04-22 09:18:18 +00:00
|
|
|
public function deleteSystemUserKey($keyId, $encryptionModuleId) {
|
|
|
|
$path = $this->constructUserKeyPath($encryptionModuleId, $keyId, null);
|
2015-04-09 08:28:02 +00:00
|
|
|
return !$this->view->file_exists($path) || $this->view->unlink($path);
|
2015-03-20 15:24:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* construct path to users key
|
|
|
|
*
|
2015-04-22 11:12:52 +00:00
|
|
|
* @param string $encryptionModuleId
|
2015-03-20 15:24:44 +00:00
|
|
|
* @param string $keyId
|
|
|
|
* @param string $uid
|
|
|
|
* @return string
|
|
|
|
*/
|
2015-04-22 09:18:18 +00:00
|
|
|
protected function constructUserKeyPath($encryptionModuleId, $keyId, $uid) {
|
2015-03-20 15:24:44 +00:00
|
|
|
|
|
|
|
if ($uid === null) {
|
2015-07-24 10:24:18 +00:00
|
|
|
$path = $this->root_dir . '/' . $this->encryption_base_dir . '/' . $encryptionModuleId . '/' . $keyId;
|
2015-03-20 15:24:44 +00:00
|
|
|
} else {
|
2015-07-24 10:24:18 +00:00
|
|
|
$path = $this->root_dir . '/' . $uid . $this->encryption_base_dir . '/'
|
2015-04-22 09:18:18 +00:00
|
|
|
. $encryptionModuleId . '/' . $uid . '.' . $keyId;
|
2015-03-20 15:24:44 +00:00
|
|
|
}
|
|
|
|
|
2015-07-24 10:24:18 +00:00
|
|
|
return \OC\Files\Filesystem::normalizePath($path);
|
2015-03-20 15:24:44 +00:00
|
|
|
}
|
2015-01-14 19:39:23 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* read key from hard disk
|
|
|
|
*
|
|
|
|
* @param string $path to key
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
private function getKey($path) {
|
|
|
|
|
|
|
|
$key = '';
|
|
|
|
|
|
|
|
if ($this->view->file_exists($path)) {
|
|
|
|
if (isset($this->keyCache[$path])) {
|
|
|
|
$key = $this->keyCache[$path];
|
|
|
|
} else {
|
|
|
|
$key = $this->view->file_get_contents($path);
|
|
|
|
$this->keyCache[$path] = $key;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $key;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* write key to disk
|
|
|
|
*
|
|
|
|
*
|
|
|
|
* @param string $path path to key directory
|
|
|
|
* @param string $key key
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
private function setKey($path, $key) {
|
|
|
|
$this->keySetPreparation(dirname($path));
|
|
|
|
|
|
|
|
$result = $this->view->file_put_contents($path, $key);
|
|
|
|
|
|
|
|
if (is_int($result) && $result > 0) {
|
|
|
|
$this->keyCache[$path] = $key;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get path to key folder for a given file
|
|
|
|
*
|
2015-04-22 11:12:52 +00:00
|
|
|
* @param string $encryptionModuleId
|
2015-01-14 19:39:23 +00:00
|
|
|
* @param string $path path to the file, relative to data/
|
|
|
|
* @return string
|
|
|
|
*/
|
2015-04-22 09:18:18 +00:00
|
|
|
private function getFileKeyDir($encryptionModuleId, $path) {
|
2015-01-14 19:39:23 +00:00
|
|
|
|
|
|
|
list($owner, $filename) = $this->util->getUidAndFilename($path);
|
|
|
|
|
|
|
|
// in case of system wide mount points the keys are stored directly in the data directory
|
2015-04-15 11:19:17 +00:00
|
|
|
if ($this->util->isSystemWideMountPoint($filename, $owner)) {
|
2015-07-24 10:24:18 +00:00
|
|
|
$keyPath = $this->root_dir . '/' . $this->keys_base_dir . $filename . '/';
|
2015-01-14 19:39:23 +00:00
|
|
|
} else {
|
2015-07-24 10:24:18 +00:00
|
|
|
$keyPath = $this->root_dir . '/' . $owner . $this->keys_base_dir . $filename . '/';
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
2015-04-22 09:18:18 +00:00
|
|
|
return Filesystem::normalizePath($keyPath . $encryptionModuleId . '/', false);
|
2015-01-14 19:39:23 +00:00
|
|
|
}
|
|
|
|
|
2015-03-26 08:24:28 +00:00
|
|
|
/**
|
|
|
|
* move keys if a file was renamed
|
|
|
|
*
|
|
|
|
* @param string $source
|
|
|
|
* @param string $target
|
2015-04-24 08:16:06 +00:00
|
|
|
* @return boolean
|
2015-03-26 08:24:28 +00:00
|
|
|
*/
|
2015-04-02 14:25:01 +00:00
|
|
|
public function renameKeys($source, $target) {
|
|
|
|
|
2015-06-03 09:12:44 +00:00
|
|
|
$sourcePath = $this->getPathToKeys($source);
|
|
|
|
$targetPath = $this->getPathToKeys($target);
|
2015-03-26 08:24:28 +00:00
|
|
|
|
|
|
|
if ($this->view->file_exists($sourcePath)) {
|
|
|
|
$this->keySetPreparation(dirname($targetPath));
|
|
|
|
$this->view->rename($sourcePath, $targetPath);
|
2015-04-24 08:16:06 +00:00
|
|
|
|
|
|
|
return true;
|
2015-03-26 08:24:28 +00:00
|
|
|
}
|
2015-04-24 08:16:06 +00:00
|
|
|
|
|
|
|
return false;
|
2015-03-26 08:24:28 +00:00
|
|
|
}
|
|
|
|
|
2015-06-03 09:12:44 +00:00
|
|
|
|
2015-04-02 14:25:01 +00:00
|
|
|
/**
|
|
|
|
* copy keys if a file was renamed
|
|
|
|
*
|
|
|
|
* @param string $source
|
|
|
|
* @param string $target
|
2015-04-24 08:16:06 +00:00
|
|
|
* @return boolean
|
2015-04-02 14:25:01 +00:00
|
|
|
*/
|
|
|
|
public function copyKeys($source, $target) {
|
|
|
|
|
2015-06-03 09:12:44 +00:00
|
|
|
$sourcePath = $this->getPathToKeys($source);
|
|
|
|
$targetPath = $this->getPathToKeys($target);
|
2015-04-02 14:25:01 +00:00
|
|
|
|
|
|
|
if ($this->view->file_exists($sourcePath)) {
|
|
|
|
$this->keySetPreparation(dirname($targetPath));
|
|
|
|
$this->view->copy($sourcePath, $targetPath);
|
2015-04-24 08:16:06 +00:00
|
|
|
return true;
|
2015-04-02 14:25:01 +00:00
|
|
|
}
|
2015-04-24 08:16:06 +00:00
|
|
|
|
|
|
|
return false;
|
2015-04-02 14:25:01 +00:00
|
|
|
}
|
|
|
|
|
2017-01-02 20:24:37 +00:00
|
|
|
/**
|
|
|
|
* backup keys of a given encryption module
|
|
|
|
*
|
|
|
|
* @param string $encryptionModuleId
|
|
|
|
* @param string $purpose
|
|
|
|
* @param string $uid
|
|
|
|
* @return bool
|
|
|
|
* @since 12.0.0
|
|
|
|
*/
|
|
|
|
public function backupUserKeys($encryptionModuleId, $purpose, $uid) {
|
|
|
|
$source = $uid . $this->encryption_base_dir . '/' . $encryptionModuleId;
|
|
|
|
$backupDir = $uid . $this->backup_base_dir;
|
|
|
|
if (!$this->view->file_exists($backupDir)) {
|
|
|
|
$this->view->mkdir($backupDir);
|
|
|
|
}
|
|
|
|
|
|
|
|
$backupDir = $backupDir . '/' . $purpose . '.' . $encryptionModuleId . '.' . $this->getTimestamp();
|
|
|
|
$this->view->mkdir($backupDir);
|
|
|
|
|
|
|
|
return $this->view->copy($source, $backupDir);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get the current timestamp
|
|
|
|
*
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
protected function getTimestamp() {
|
|
|
|
return time();
|
|
|
|
}
|
|
|
|
|
2015-06-03 09:12:44 +00:00
|
|
|
/**
|
|
|
|
* get system wide path and detect mount points
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
protected function getPathToKeys($path) {
|
|
|
|
list($owner, $relativePath) = $this->util->getUidAndFilename($path);
|
|
|
|
$systemWideMountPoint = $this->util->isSystemWideMountPoint($relativePath, $owner);
|
|
|
|
|
|
|
|
if ($systemWideMountPoint) {
|
2015-07-24 10:24:18 +00:00
|
|
|
$systemPath = $this->root_dir . '/' . $this->keys_base_dir . $relativePath . '/';
|
2015-06-03 09:12:44 +00:00
|
|
|
} else {
|
2015-07-24 10:24:18 +00:00
|
|
|
$systemPath = $this->root_dir . '/' . $owner . $this->keys_base_dir . $relativePath . '/';
|
2015-06-03 09:12:44 +00:00
|
|
|
}
|
|
|
|
|
2015-07-24 10:24:18 +00:00
|
|
|
return Filesystem::normalizePath($systemPath, false);
|
2015-06-03 09:12:44 +00:00
|
|
|
}
|
|
|
|
|
2015-01-14 19:39:23 +00:00
|
|
|
/**
|
2015-04-22 11:12:52 +00:00
|
|
|
* Make preparations to filesystem for saving a key file
|
2015-01-14 19:39:23 +00:00
|
|
|
*
|
|
|
|
* @param string $path relative to the views root
|
|
|
|
*/
|
|
|
|
protected function keySetPreparation($path) {
|
|
|
|
// If the file resides within a subdirectory, create it
|
|
|
|
if (!$this->view->file_exists($path)) {
|
2015-04-02 14:42:28 +00:00
|
|
|
$sub_dirs = explode('/', ltrim($path, '/'));
|
2015-01-14 19:39:23 +00:00
|
|
|
$dir = '';
|
|
|
|
foreach ($sub_dirs as $sub_dir) {
|
|
|
|
$dir .= '/' . $sub_dir;
|
|
|
|
if (!$this->view->is_dir($dir)) {
|
|
|
|
$this->view->mkdir($dir);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|