Completed
Pull Request — master (#5623)
by Georg
21:59 queued 09:37
created
apps/encryption/lib/Migration.php 3 patches
Braces   +3 added lines, -2 removed lines patch added patch discarded remove patch
@@ -348,8 +348,9 @@
 block discarded – undo
348 348
 			$systemMountPoints = $this->getSystemMountPoints();
349 349
 			foreach ($systemMountPoints as $mountPoint) {
350 350
 				$normalizedMountPoint = \OC\Files\Filesystem::normalizePath($mountPoint['mountpoint']) . '/';
351
-				if (strpos($normalized, $normalizedMountPoint) === 0)
352
-					return $targetDir;
351
+				if (strpos($normalized, $normalizedMountPoint) === 0) {
352
+									return $targetDir;
353
+				}
353 354
 			}
354 355
 		} else if ($trash === false && $this->view->file_exists('/' . $user. '/files/' . $filePath)) {
355 356
 			return $targetDir;
Please login to merge, or discard this patch.
Indentation   +358 added lines, -358 removed lines patch added patch discarded remove patch
@@ -33,362 +33,362 @@
 block discarded – undo
33 33
 
34 34
 class Migration {
35 35
 
36
-	private $moduleId;
37
-	/** @var \OC\Files\View */
38
-	private $view;
39
-	/** @var \OCP\IDBConnection */
40
-	private $connection;
41
-	/** @var IConfig */
42
-	private $config;
43
-	/** @var  ILogger */
44
-	private $logger;
45
-	/** @var string*/
46
-	protected $installedVersion;
47
-	/** @var IAppManager */
48
-	protected $appManager;
49
-
50
-	/**
51
-	 * @param IConfig $config
52
-	 * @param View $view
53
-	 * @param IDBConnection $connection
54
-	 * @param ILogger $logger
55
-	 */
56
-	public function __construct(IConfig $config, View $view, IDBConnection $connection, ILogger $logger, IAppManager $appManager) {
57
-		$this->view = $view;
58
-		$this->view->disableCacheUpdate();
59
-		$this->connection = $connection;
60
-		$this->moduleId = \OCA\Encryption\Crypto\Encryption::ID;
61
-		$this->config = $config;
62
-		$this->logger = $logger;
63
-		$this->installedVersion = $this->config->getAppValue('files_encryption', 'installed_version', '-1');
64
-		$this->appManager = $appManager;
65
-	}
66
-
67
-	public function finalCleanUp() {
68
-		$this->view->deleteAll('files_encryption/public_keys');
69
-		$this->updateFileCache();
70
-		$this->config->deleteAppValue('files_encryption', 'installed_version');
71
-	}
72
-
73
-	/**
74
-	 * update file cache, copy unencrypted_size to the 'size' column
75
-	 */
76
-	private function updateFileCache() {
77
-		// make sure that we don't update the file cache multiple times
78
-		// only update during the first run
79
-		if ($this->installedVersion !== '-1') {
80
-			$query = $this->connection->getQueryBuilder();
81
-			$query->update('filecache')
82
-				->set('size', 'unencrypted_size')
83
-				->where($query->expr()->eq('encrypted', $query->createParameter('encrypted')))
84
-				->setParameter('encrypted', 1);
85
-			$query->execute();
86
-		}
87
-	}
88
-
89
-	/**
90
-	 * iterate through users and reorganize the folder structure
91
-	 */
92
-	public function reorganizeFolderStructure() {
93
-		$this->reorganizeSystemFolderStructure();
94
-
95
-		$limit = 500;
96
-		$offset = 0;
97
-		do {
98
-			$users = \OCP\User::getUsers('', $limit, $offset);
99
-			foreach ($users as $user) {
100
-				$this->reorganizeFolderStructureForUser($user);
101
-			}
102
-			$offset += $limit;
103
-		} while (count($users) >= $limit);
104
-	}
105
-
106
-	/**
107
-	 * reorganize system wide folder structure
108
-	 */
109
-	public function reorganizeSystemFolderStructure() {
110
-
111
-		$this->createPathForKeys('/files_encryption');
112
-
113
-		// backup system wide folders
114
-		$this->backupSystemWideKeys();
115
-
116
-		// rename system wide mount point
117
-		$this->renameFileKeys('', '/files_encryption/keys');
118
-
119
-		// rename system private keys
120
-		$this->renameSystemPrivateKeys();
121
-
122
-		$storage = $this->view->getMount('')->getStorage();
123
-		$storage->getScanner()->scan('files_encryption');
124
-	}
125
-
126
-
127
-	/**
128
-	 * reorganize folder structure for user
129
-	 *
130
-	 * @param string $user
131
-	 */
132
-	public function reorganizeFolderStructureForUser($user) {
133
-		// backup all keys
134
-		\OC_Util::tearDownFS();
135
-		\OC_Util::setupFS($user);
136
-		if ($this->backupUserKeys($user)) {
137
-			// rename users private key
138
-			$this->renameUsersPrivateKey($user);
139
-			$this->renameUsersPublicKey($user);
140
-			// rename file keys
141
-			$path = '/files_encryption/keys';
142
-			$this->renameFileKeys($user, $path);
143
-			$trashPath = '/files_trashbin/keys';
144
-			if ($this->appManager->isEnabledForUser('files_trashbin') && $this->view->is_dir($user . '/' . $trashPath)) {
145
-				$this->renameFileKeys($user, $trashPath, true);
146
-				$this->view->deleteAll($trashPath);
147
-			}
148
-			// delete old folders
149
-			$this->deleteOldKeys($user);
150
-			$this->view->getMount('/' . $user)->getStorage()->getScanner()->scan('files_encryption');
151
-		}
152
-	}
153
-
154
-	/**
155
-	 * update database
156
-	 */
157
-	public function updateDB() {
158
-
159
-		// make sure that we don't update the file cache multiple times
160
-		// only update during the first run
161
-		if ($this->installedVersion === '-1') {
162
-			return;
163
-		}
164
-
165
-		// delete left-over from old encryption which is no longer needed
166
-		$this->config->deleteAppValue('files_encryption', 'ocsid');
167
-		$this->config->deleteAppValue('files_encryption', 'types');
168
-		$this->config->deleteAppValue('files_encryption', 'enabled');
169
-
170
-		$oldAppValues = $this->connection->getQueryBuilder();
171
-		$oldAppValues->select('*')
172
-			->from('appconfig')
173
-			->where($oldAppValues->expr()->eq('appid', $oldAppValues->createParameter('appid')))
174
-			->setParameter('appid', 'files_encryption');
175
-		$appSettings = $oldAppValues->execute();
176
-
177
-		while ($row = $appSettings->fetch()) {
178
-			// 'installed_version' gets deleted at the end of the migration process
179
-			if ($row['configkey'] !== 'installed_version' ) {
180
-				$this->config->setAppValue('encryption', $row['configkey'], $row['configvalue']);
181
-				$this->config->deleteAppValue('files_encryption', $row['configkey']);
182
-			}
183
-		}
184
-
185
-		$oldPreferences = $this->connection->getQueryBuilder();
186
-		$oldPreferences->select('*')
187
-			->from('preferences')
188
-			->where($oldPreferences->expr()->eq('appid', $oldPreferences->createParameter('appid')))
189
-			->setParameter('appid', 'files_encryption');
190
-		$preferenceSettings = $oldPreferences->execute();
191
-
192
-		while ($row = $preferenceSettings->fetch()) {
193
-			$this->config->setUserValue($row['userid'], 'encryption', $row['configkey'], $row['configvalue']);
194
-			$this->config->deleteUserValue($row['userid'], 'files_encryption', $row['configkey']);
195
-		}
196
-	}
197
-
198
-	/**
199
-	 * create backup of system-wide keys
200
-	 */
201
-	private function backupSystemWideKeys() {
202
-		$backupDir = 'encryption_migration_backup_' . date("Y-m-d_H-i-s");
203
-		$this->view->mkdir($backupDir);
204
-		$this->view->copy('files_encryption', $backupDir . '/files_encryption');
205
-	}
206
-
207
-	/**
208
-	 * create backup of user specific keys
209
-	 *
210
-	 * @param string $user
211
-	 * @return bool
212
-	 */
213
-	private function backupUserKeys($user) {
214
-		$encryptionDir = $user . '/files_encryption';
215
-		if ($this->view->is_dir($encryptionDir)) {
216
-			$backupDir = $user . '/encryption_migration_backup_' . date("Y-m-d_H-i-s");
217
-			$this->view->mkdir($backupDir);
218
-			$this->view->copy($encryptionDir, $backupDir);
219
-			return true;
220
-		}
221
-		return false;
222
-	}
223
-
224
-	/**
225
-	 * rename system-wide private keys
226
-	 */
227
-	private function renameSystemPrivateKeys() {
228
-		$dh = $this->view->opendir('files_encryption');
229
-		$this->createPathForKeys('/files_encryption/' . $this->moduleId );
230
-		if (is_resource($dh)) {
231
-			while (($privateKey = readdir($dh)) !== false) {
232
-				if (!\OC\Files\Filesystem::isIgnoredDir($privateKey) ) {
233
-					if (!$this->view->is_dir('/files_encryption/' . $privateKey)) {
234
-						$this->view->rename('files_encryption/' . $privateKey, 'files_encryption/' . $this->moduleId . '/' . $privateKey);
235
-						$this->renameSystemPublicKey($privateKey);
236
-					}
237
-				}
238
-			}
239
-			closedir($dh);
240
-		}
241
-	}
242
-
243
-	/**
244
-	 * rename system wide public key
245
-	 *
246
-	 * @param string $privateKey private key for which we want to rename the corresponding public key
247
-	 */
248
-	private function renameSystemPublicKey($privateKey) {
249
-		$publicKey = substr($privateKey,0 , strrpos($privateKey, '.privateKey')) . '.publicKey';
250
-		$this->view->rename('files_encryption/public_keys/' . $publicKey, 'files_encryption/' . $this->moduleId . '/' . $publicKey);
251
-	}
252
-
253
-	/**
254
-	 * rename user-specific private keys
255
-	 *
256
-	 * @param string $user
257
-	 */
258
-	private function renameUsersPrivateKey($user) {
259
-		$oldPrivateKey = $user . '/files_encryption/' . $user . '.privateKey';
260
-		$newPrivateKey = $user . '/files_encryption/' . $this->moduleId . '/' . $user . '.privateKey';
261
-		if ($this->view->file_exists($oldPrivateKey)) {
262
-			$this->createPathForKeys(dirname($newPrivateKey));
263
-			$this->view->rename($oldPrivateKey, $newPrivateKey);
264
-		}
265
-	}
266
-
267
-	/**
268
-	 * rename user-specific public keys
269
-	 *
270
-	 * @param string $user
271
-	 */
272
-	private function renameUsersPublicKey($user) {
273
-		$oldPublicKey = '/files_encryption/public_keys/' . $user . '.publicKey';
274
-		$newPublicKey = $user . '/files_encryption/' . $this->moduleId . '/' . $user . '.publicKey';
275
-		if ($this->view->file_exists($oldPublicKey)) {
276
-			$this->createPathForKeys(dirname($newPublicKey));
277
-			$this->view->rename($oldPublicKey, $newPublicKey);
278
-		}
279
-	}
280
-
281
-	/**
282
-	 * rename file keys
283
-	 *
284
-	 * @param string $user
285
-	 * @param string $path
286
-	 * @param bool $trash
287
-	 */
288
-	private function renameFileKeys($user, $path, $trash = false) {
289
-
290
-		if ($this->view->is_dir($user . '/' . $path) === false) {
291
-			$this->logger->info('Skip dir /' . $user . '/' . $path . ': does not exist');
292
-			return;
293
-		}
294
-
295
-		$dh = $this->view->opendir($user . '/' . $path);
296
-
297
-		if (is_resource($dh)) {
298
-			while (($file = readdir($dh)) !== false) {
299
-				if (!\OC\Files\Filesystem::isIgnoredDir($file)) {
300
-					if ($this->view->is_dir($user . '/' . $path . '/' . $file)) {
301
-						$this->renameFileKeys($user, $path . '/' . $file, $trash);
302
-					} else {
303
-						$target = $this->getTargetDir($user, $path, $file, $trash);
304
-						if ($target !== false) {
305
-							$this->createPathForKeys(dirname($target));
306
-							$this->view->rename($user . '/' . $path . '/' . $file, $target);
307
-						} else {
308
-							$this->logger->warning(
309
-								'did not move key "' . $file
310
-								. '" could not find the corresponding file in /data/' . $user . '/files.'
311
-							. 'Most likely the key was already moved in a previous migration run and is already on the right place.');
312
-						}
313
-					}
314
-				}
315
-			}
316
-			closedir($dh);
317
-		}
318
-	}
319
-
320
-	/**
321
-	 * get system mount points
322
-	 * wrap static method so that it can be mocked for testing
323
-	 *
324
-	 * @internal
325
-	 * @return array
326
-	 */
327
-	protected function getSystemMountPoints() {
328
-		return \OC_Mount_Config::getSystemMountPoints();
329
-	}
330
-
331
-	/**
332
-	 * generate target directory
333
-	 *
334
-	 * @param string $user
335
-	 * @param string $keyPath
336
-	 * @param string $filename
337
-	 * @param bool $trash
338
-	 * @return string
339
-	 */
340
-	private function getTargetDir($user, $keyPath, $filename, $trash) {
341
-		if ($trash) {
342
-			$filePath = substr($keyPath, strlen('/files_trashbin/keys/'));
343
-			$targetDir = $user . '/files_encryption/keys/files_trashbin/' . $filePath . '/' . $this->moduleId . '/' . $filename;
344
-		} else {
345
-			$filePath = substr($keyPath, strlen('/files_encryption/keys/'));
346
-			$targetDir = $user . '/files_encryption/keys/files/' . $filePath . '/' . $this->moduleId . '/' . $filename;
347
-		}
348
-
349
-		if ($user === '') {
350
-			// for system wide mounts we need to check if the mount point really exists
351
-			$normalized = \OC\Files\Filesystem::normalizePath($filePath);
352
-			$systemMountPoints = $this->getSystemMountPoints();
353
-			foreach ($systemMountPoints as $mountPoint) {
354
-				$normalizedMountPoint = \OC\Files\Filesystem::normalizePath($mountPoint['mountpoint']) . '/';
355
-				if (strpos($normalized, $normalizedMountPoint) === 0)
356
-					return $targetDir;
357
-			}
358
-		} else if ($trash === false && $this->view->file_exists('/' . $user. '/files/' . $filePath)) {
359
-			return $targetDir;
360
-		} else if ($trash === true && $this->view->file_exists('/' . $user. '/files_trashbin/' . $filePath)) {
361
-				return $targetDir;
362
-			}
363
-
364
-		return false;
365
-	}
366
-
367
-	/**
368
-	 * delete old keys
369
-	 *
370
-	 * @param string $user
371
-	 */
372
-	private function deleteOldKeys($user) {
373
-		$this->view->deleteAll($user . '/files_encryption/keyfiles');
374
-		$this->view->deleteAll($user . '/files_encryption/share-keys');
375
-	}
376
-
377
-	/**
378
-	 * create directories for the keys recursively
379
-	 *
380
-	 * @param string $path
381
-	 */
382
-	private function createPathForKeys($path) {
383
-		if (!$this->view->file_exists($path)) {
384
-			$sub_dirs = explode('/', $path);
385
-			$dir = '';
386
-			foreach ($sub_dirs as $sub_dir) {
387
-				$dir .= '/' . $sub_dir;
388
-				if (!$this->view->is_dir($dir)) {
389
-					$this->view->mkdir($dir);
390
-				}
391
-			}
392
-		}
393
-	}
36
+    private $moduleId;
37
+    /** @var \OC\Files\View */
38
+    private $view;
39
+    /** @var \OCP\IDBConnection */
40
+    private $connection;
41
+    /** @var IConfig */
42
+    private $config;
43
+    /** @var  ILogger */
44
+    private $logger;
45
+    /** @var string*/
46
+    protected $installedVersion;
47
+    /** @var IAppManager */
48
+    protected $appManager;
49
+
50
+    /**
51
+     * @param IConfig $config
52
+     * @param View $view
53
+     * @param IDBConnection $connection
54
+     * @param ILogger $logger
55
+     */
56
+    public function __construct(IConfig $config, View $view, IDBConnection $connection, ILogger $logger, IAppManager $appManager) {
57
+        $this->view = $view;
58
+        $this->view->disableCacheUpdate();
59
+        $this->connection = $connection;
60
+        $this->moduleId = \OCA\Encryption\Crypto\Encryption::ID;
61
+        $this->config = $config;
62
+        $this->logger = $logger;
63
+        $this->installedVersion = $this->config->getAppValue('files_encryption', 'installed_version', '-1');
64
+        $this->appManager = $appManager;
65
+    }
66
+
67
+    public function finalCleanUp() {
68
+        $this->view->deleteAll('files_encryption/public_keys');
69
+        $this->updateFileCache();
70
+        $this->config->deleteAppValue('files_encryption', 'installed_version');
71
+    }
72
+
73
+    /**
74
+     * update file cache, copy unencrypted_size to the 'size' column
75
+     */
76
+    private function updateFileCache() {
77
+        // make sure that we don't update the file cache multiple times
78
+        // only update during the first run
79
+        if ($this->installedVersion !== '-1') {
80
+            $query = $this->connection->getQueryBuilder();
81
+            $query->update('filecache')
82
+                ->set('size', 'unencrypted_size')
83
+                ->where($query->expr()->eq('encrypted', $query->createParameter('encrypted')))
84
+                ->setParameter('encrypted', 1);
85
+            $query->execute();
86
+        }
87
+    }
88
+
89
+    /**
90
+     * iterate through users and reorganize the folder structure
91
+     */
92
+    public function reorganizeFolderStructure() {
93
+        $this->reorganizeSystemFolderStructure();
94
+
95
+        $limit = 500;
96
+        $offset = 0;
97
+        do {
98
+            $users = \OCP\User::getUsers('', $limit, $offset);
99
+            foreach ($users as $user) {
100
+                $this->reorganizeFolderStructureForUser($user);
101
+            }
102
+            $offset += $limit;
103
+        } while (count($users) >= $limit);
104
+    }
105
+
106
+    /**
107
+     * reorganize system wide folder structure
108
+     */
109
+    public function reorganizeSystemFolderStructure() {
110
+
111
+        $this->createPathForKeys('/files_encryption');
112
+
113
+        // backup system wide folders
114
+        $this->backupSystemWideKeys();
115
+
116
+        // rename system wide mount point
117
+        $this->renameFileKeys('', '/files_encryption/keys');
118
+
119
+        // rename system private keys
120
+        $this->renameSystemPrivateKeys();
121
+
122
+        $storage = $this->view->getMount('')->getStorage();
123
+        $storage->getScanner()->scan('files_encryption');
124
+    }
125
+
126
+
127
+    /**
128
+     * reorganize folder structure for user
129
+     *
130
+     * @param string $user
131
+     */
132
+    public function reorganizeFolderStructureForUser($user) {
133
+        // backup all keys
134
+        \OC_Util::tearDownFS();
135
+        \OC_Util::setupFS($user);
136
+        if ($this->backupUserKeys($user)) {
137
+            // rename users private key
138
+            $this->renameUsersPrivateKey($user);
139
+            $this->renameUsersPublicKey($user);
140
+            // rename file keys
141
+            $path = '/files_encryption/keys';
142
+            $this->renameFileKeys($user, $path);
143
+            $trashPath = '/files_trashbin/keys';
144
+            if ($this->appManager->isEnabledForUser('files_trashbin') && $this->view->is_dir($user . '/' . $trashPath)) {
145
+                $this->renameFileKeys($user, $trashPath, true);
146
+                $this->view->deleteAll($trashPath);
147
+            }
148
+            // delete old folders
149
+            $this->deleteOldKeys($user);
150
+            $this->view->getMount('/' . $user)->getStorage()->getScanner()->scan('files_encryption');
151
+        }
152
+    }
153
+
154
+    /**
155
+     * update database
156
+     */
157
+    public function updateDB() {
158
+
159
+        // make sure that we don't update the file cache multiple times
160
+        // only update during the first run
161
+        if ($this->installedVersion === '-1') {
162
+            return;
163
+        }
164
+
165
+        // delete left-over from old encryption which is no longer needed
166
+        $this->config->deleteAppValue('files_encryption', 'ocsid');
167
+        $this->config->deleteAppValue('files_encryption', 'types');
168
+        $this->config->deleteAppValue('files_encryption', 'enabled');
169
+
170
+        $oldAppValues = $this->connection->getQueryBuilder();
171
+        $oldAppValues->select('*')
172
+            ->from('appconfig')
173
+            ->where($oldAppValues->expr()->eq('appid', $oldAppValues->createParameter('appid')))
174
+            ->setParameter('appid', 'files_encryption');
175
+        $appSettings = $oldAppValues->execute();
176
+
177
+        while ($row = $appSettings->fetch()) {
178
+            // 'installed_version' gets deleted at the end of the migration process
179
+            if ($row['configkey'] !== 'installed_version' ) {
180
+                $this->config->setAppValue('encryption', $row['configkey'], $row['configvalue']);
181
+                $this->config->deleteAppValue('files_encryption', $row['configkey']);
182
+            }
183
+        }
184
+
185
+        $oldPreferences = $this->connection->getQueryBuilder();
186
+        $oldPreferences->select('*')
187
+            ->from('preferences')
188
+            ->where($oldPreferences->expr()->eq('appid', $oldPreferences->createParameter('appid')))
189
+            ->setParameter('appid', 'files_encryption');
190
+        $preferenceSettings = $oldPreferences->execute();
191
+
192
+        while ($row = $preferenceSettings->fetch()) {
193
+            $this->config->setUserValue($row['userid'], 'encryption', $row['configkey'], $row['configvalue']);
194
+            $this->config->deleteUserValue($row['userid'], 'files_encryption', $row['configkey']);
195
+        }
196
+    }
197
+
198
+    /**
199
+     * create backup of system-wide keys
200
+     */
201
+    private function backupSystemWideKeys() {
202
+        $backupDir = 'encryption_migration_backup_' . date("Y-m-d_H-i-s");
203
+        $this->view->mkdir($backupDir);
204
+        $this->view->copy('files_encryption', $backupDir . '/files_encryption');
205
+    }
206
+
207
+    /**
208
+     * create backup of user specific keys
209
+     *
210
+     * @param string $user
211
+     * @return bool
212
+     */
213
+    private function backupUserKeys($user) {
214
+        $encryptionDir = $user . '/files_encryption';
215
+        if ($this->view->is_dir($encryptionDir)) {
216
+            $backupDir = $user . '/encryption_migration_backup_' . date("Y-m-d_H-i-s");
217
+            $this->view->mkdir($backupDir);
218
+            $this->view->copy($encryptionDir, $backupDir);
219
+            return true;
220
+        }
221
+        return false;
222
+    }
223
+
224
+    /**
225
+     * rename system-wide private keys
226
+     */
227
+    private function renameSystemPrivateKeys() {
228
+        $dh = $this->view->opendir('files_encryption');
229
+        $this->createPathForKeys('/files_encryption/' . $this->moduleId );
230
+        if (is_resource($dh)) {
231
+            while (($privateKey = readdir($dh)) !== false) {
232
+                if (!\OC\Files\Filesystem::isIgnoredDir($privateKey) ) {
233
+                    if (!$this->view->is_dir('/files_encryption/' . $privateKey)) {
234
+                        $this->view->rename('files_encryption/' . $privateKey, 'files_encryption/' . $this->moduleId . '/' . $privateKey);
235
+                        $this->renameSystemPublicKey($privateKey);
236
+                    }
237
+                }
238
+            }
239
+            closedir($dh);
240
+        }
241
+    }
242
+
243
+    /**
244
+     * rename system wide public key
245
+     *
246
+     * @param string $privateKey private key for which we want to rename the corresponding public key
247
+     */
248
+    private function renameSystemPublicKey($privateKey) {
249
+        $publicKey = substr($privateKey,0 , strrpos($privateKey, '.privateKey')) . '.publicKey';
250
+        $this->view->rename('files_encryption/public_keys/' . $publicKey, 'files_encryption/' . $this->moduleId . '/' . $publicKey);
251
+    }
252
+
253
+    /**
254
+     * rename user-specific private keys
255
+     *
256
+     * @param string $user
257
+     */
258
+    private function renameUsersPrivateKey($user) {
259
+        $oldPrivateKey = $user . '/files_encryption/' . $user . '.privateKey';
260
+        $newPrivateKey = $user . '/files_encryption/' . $this->moduleId . '/' . $user . '.privateKey';
261
+        if ($this->view->file_exists($oldPrivateKey)) {
262
+            $this->createPathForKeys(dirname($newPrivateKey));
263
+            $this->view->rename($oldPrivateKey, $newPrivateKey);
264
+        }
265
+    }
266
+
267
+    /**
268
+     * rename user-specific public keys
269
+     *
270
+     * @param string $user
271
+     */
272
+    private function renameUsersPublicKey($user) {
273
+        $oldPublicKey = '/files_encryption/public_keys/' . $user . '.publicKey';
274
+        $newPublicKey = $user . '/files_encryption/' . $this->moduleId . '/' . $user . '.publicKey';
275
+        if ($this->view->file_exists($oldPublicKey)) {
276
+            $this->createPathForKeys(dirname($newPublicKey));
277
+            $this->view->rename($oldPublicKey, $newPublicKey);
278
+        }
279
+    }
280
+
281
+    /**
282
+     * rename file keys
283
+     *
284
+     * @param string $user
285
+     * @param string $path
286
+     * @param bool $trash
287
+     */
288
+    private function renameFileKeys($user, $path, $trash = false) {
289
+
290
+        if ($this->view->is_dir($user . '/' . $path) === false) {
291
+            $this->logger->info('Skip dir /' . $user . '/' . $path . ': does not exist');
292
+            return;
293
+        }
294
+
295
+        $dh = $this->view->opendir($user . '/' . $path);
296
+
297
+        if (is_resource($dh)) {
298
+            while (($file = readdir($dh)) !== false) {
299
+                if (!\OC\Files\Filesystem::isIgnoredDir($file)) {
300
+                    if ($this->view->is_dir($user . '/' . $path . '/' . $file)) {
301
+                        $this->renameFileKeys($user, $path . '/' . $file, $trash);
302
+                    } else {
303
+                        $target = $this->getTargetDir($user, $path, $file, $trash);
304
+                        if ($target !== false) {
305
+                            $this->createPathForKeys(dirname($target));
306
+                            $this->view->rename($user . '/' . $path . '/' . $file, $target);
307
+                        } else {
308
+                            $this->logger->warning(
309
+                                'did not move key "' . $file
310
+                                . '" could not find the corresponding file in /data/' . $user . '/files.'
311
+                            . 'Most likely the key was already moved in a previous migration run and is already on the right place.');
312
+                        }
313
+                    }
314
+                }
315
+            }
316
+            closedir($dh);
317
+        }
318
+    }
319
+
320
+    /**
321
+     * get system mount points
322
+     * wrap static method so that it can be mocked for testing
323
+     *
324
+     * @internal
325
+     * @return array
326
+     */
327
+    protected function getSystemMountPoints() {
328
+        return \OC_Mount_Config::getSystemMountPoints();
329
+    }
330
+
331
+    /**
332
+     * generate target directory
333
+     *
334
+     * @param string $user
335
+     * @param string $keyPath
336
+     * @param string $filename
337
+     * @param bool $trash
338
+     * @return string
339
+     */
340
+    private function getTargetDir($user, $keyPath, $filename, $trash) {
341
+        if ($trash) {
342
+            $filePath = substr($keyPath, strlen('/files_trashbin/keys/'));
343
+            $targetDir = $user . '/files_encryption/keys/files_trashbin/' . $filePath . '/' . $this->moduleId . '/' . $filename;
344
+        } else {
345
+            $filePath = substr($keyPath, strlen('/files_encryption/keys/'));
346
+            $targetDir = $user . '/files_encryption/keys/files/' . $filePath . '/' . $this->moduleId . '/' . $filename;
347
+        }
348
+
349
+        if ($user === '') {
350
+            // for system wide mounts we need to check if the mount point really exists
351
+            $normalized = \OC\Files\Filesystem::normalizePath($filePath);
352
+            $systemMountPoints = $this->getSystemMountPoints();
353
+            foreach ($systemMountPoints as $mountPoint) {
354
+                $normalizedMountPoint = \OC\Files\Filesystem::normalizePath($mountPoint['mountpoint']) . '/';
355
+                if (strpos($normalized, $normalizedMountPoint) === 0)
356
+                    return $targetDir;
357
+            }
358
+        } else if ($trash === false && $this->view->file_exists('/' . $user. '/files/' . $filePath)) {
359
+            return $targetDir;
360
+        } else if ($trash === true && $this->view->file_exists('/' . $user. '/files_trashbin/' . $filePath)) {
361
+                return $targetDir;
362
+            }
363
+
364
+        return false;
365
+    }
366
+
367
+    /**
368
+     * delete old keys
369
+     *
370
+     * @param string $user
371
+     */
372
+    private function deleteOldKeys($user) {
373
+        $this->view->deleteAll($user . '/files_encryption/keyfiles');
374
+        $this->view->deleteAll($user . '/files_encryption/share-keys');
375
+    }
376
+
377
+    /**
378
+     * create directories for the keys recursively
379
+     *
380
+     * @param string $path
381
+     */
382
+    private function createPathForKeys($path) {
383
+        if (!$this->view->file_exists($path)) {
384
+            $sub_dirs = explode('/', $path);
385
+            $dir = '';
386
+            foreach ($sub_dirs as $sub_dir) {
387
+                $dir .= '/' . $sub_dir;
388
+                if (!$this->view->is_dir($dir)) {
389
+                    $this->view->mkdir($dir);
390
+                }
391
+            }
392
+        }
393
+    }
394 394
 }
Please login to merge, or discard this patch.
Spacing   +33 added lines, -33 removed lines patch added patch discarded remove patch
@@ -141,13 +141,13 @@  discard block
 block discarded – undo
141 141
 			$path = '/files_encryption/keys';
142 142
 			$this->renameFileKeys($user, $path);
143 143
 			$trashPath = '/files_trashbin/keys';
144
-			if ($this->appManager->isEnabledForUser('files_trashbin') && $this->view->is_dir($user . '/' . $trashPath)) {
144
+			if ($this->appManager->isEnabledForUser('files_trashbin') && $this->view->is_dir($user.'/'.$trashPath)) {
145 145
 				$this->renameFileKeys($user, $trashPath, true);
146 146
 				$this->view->deleteAll($trashPath);
147 147
 			}
148 148
 			// delete old folders
149 149
 			$this->deleteOldKeys($user);
150
-			$this->view->getMount('/' . $user)->getStorage()->getScanner()->scan('files_encryption');
150
+			$this->view->getMount('/'.$user)->getStorage()->getScanner()->scan('files_encryption');
151 151
 		}
152 152
 	}
153 153
 
@@ -176,7 +176,7 @@  discard block
 block discarded – undo
176 176
 
177 177
 		while ($row = $appSettings->fetch()) {
178 178
 			// 'installed_version' gets deleted at the end of the migration process
179
-			if ($row['configkey'] !== 'installed_version' ) {
179
+			if ($row['configkey'] !== 'installed_version') {
180 180
 				$this->config->setAppValue('encryption', $row['configkey'], $row['configvalue']);
181 181
 				$this->config->deleteAppValue('files_encryption', $row['configkey']);
182 182
 			}
@@ -199,9 +199,9 @@  discard block
 block discarded – undo
199 199
 	 * create backup of system-wide keys
200 200
 	 */
201 201
 	private function backupSystemWideKeys() {
202
-		$backupDir = 'encryption_migration_backup_' . date("Y-m-d_H-i-s");
202
+		$backupDir = 'encryption_migration_backup_'.date("Y-m-d_H-i-s");
203 203
 		$this->view->mkdir($backupDir);
204
-		$this->view->copy('files_encryption', $backupDir . '/files_encryption');
204
+		$this->view->copy('files_encryption', $backupDir.'/files_encryption');
205 205
 	}
206 206
 
207 207
 	/**
@@ -211,9 +211,9 @@  discard block
 block discarded – undo
211 211
 	 * @return bool
212 212
 	 */
213 213
 	private function backupUserKeys($user) {
214
-		$encryptionDir = $user . '/files_encryption';
214
+		$encryptionDir = $user.'/files_encryption';
215 215
 		if ($this->view->is_dir($encryptionDir)) {
216
-			$backupDir = $user . '/encryption_migration_backup_' . date("Y-m-d_H-i-s");
216
+			$backupDir = $user.'/encryption_migration_backup_'.date("Y-m-d_H-i-s");
217 217
 			$this->view->mkdir($backupDir);
218 218
 			$this->view->copy($encryptionDir, $backupDir);
219 219
 			return true;
@@ -226,12 +226,12 @@  discard block
 block discarded – undo
226 226
 	 */
227 227
 	private function renameSystemPrivateKeys() {
228 228
 		$dh = $this->view->opendir('files_encryption');
229
-		$this->createPathForKeys('/files_encryption/' . $this->moduleId );
229
+		$this->createPathForKeys('/files_encryption/'.$this->moduleId);
230 230
 		if (is_resource($dh)) {
231 231
 			while (($privateKey = readdir($dh)) !== false) {
232
-				if (!\OC\Files\Filesystem::isIgnoredDir($privateKey) ) {
233
-					if (!$this->view->is_dir('/files_encryption/' . $privateKey)) {
234
-						$this->view->rename('files_encryption/' . $privateKey, 'files_encryption/' . $this->moduleId . '/' . $privateKey);
232
+				if (!\OC\Files\Filesystem::isIgnoredDir($privateKey)) {
233
+					if (!$this->view->is_dir('/files_encryption/'.$privateKey)) {
234
+						$this->view->rename('files_encryption/'.$privateKey, 'files_encryption/'.$this->moduleId.'/'.$privateKey);
235 235
 						$this->renameSystemPublicKey($privateKey);
236 236
 					}
237 237
 				}
@@ -246,8 +246,8 @@  discard block
 block discarded – undo
246 246
 	 * @param string $privateKey private key for which we want to rename the corresponding public key
247 247
 	 */
248 248
 	private function renameSystemPublicKey($privateKey) {
249
-		$publicKey = substr($privateKey,0 , strrpos($privateKey, '.privateKey')) . '.publicKey';
250
-		$this->view->rename('files_encryption/public_keys/' . $publicKey, 'files_encryption/' . $this->moduleId . '/' . $publicKey);
249
+		$publicKey = substr($privateKey, 0, strrpos($privateKey, '.privateKey')).'.publicKey';
250
+		$this->view->rename('files_encryption/public_keys/'.$publicKey, 'files_encryption/'.$this->moduleId.'/'.$publicKey);
251 251
 	}
252 252
 
253 253
 	/**
@@ -256,8 +256,8 @@  discard block
 block discarded – undo
256 256
 	 * @param string $user
257 257
 	 */
258 258
 	private function renameUsersPrivateKey($user) {
259
-		$oldPrivateKey = $user . '/files_encryption/' . $user . '.privateKey';
260
-		$newPrivateKey = $user . '/files_encryption/' . $this->moduleId . '/' . $user . '.privateKey';
259
+		$oldPrivateKey = $user.'/files_encryption/'.$user.'.privateKey';
260
+		$newPrivateKey = $user.'/files_encryption/'.$this->moduleId.'/'.$user.'.privateKey';
261 261
 		if ($this->view->file_exists($oldPrivateKey)) {
262 262
 			$this->createPathForKeys(dirname($newPrivateKey));
263 263
 			$this->view->rename($oldPrivateKey, $newPrivateKey);
@@ -270,8 +270,8 @@  discard block
 block discarded – undo
270 270
 	 * @param string $user
271 271
 	 */
272 272
 	private function renameUsersPublicKey($user) {
273
-		$oldPublicKey = '/files_encryption/public_keys/' . $user . '.publicKey';
274
-		$newPublicKey = $user . '/files_encryption/' . $this->moduleId . '/' . $user . '.publicKey';
273
+		$oldPublicKey = '/files_encryption/public_keys/'.$user.'.publicKey';
274
+		$newPublicKey = $user.'/files_encryption/'.$this->moduleId.'/'.$user.'.publicKey';
275 275
 		if ($this->view->file_exists($oldPublicKey)) {
276 276
 			$this->createPathForKeys(dirname($newPublicKey));
277 277
 			$this->view->rename($oldPublicKey, $newPublicKey);
@@ -287,27 +287,27 @@  discard block
 block discarded – undo
287 287
 	 */
288 288
 	private function renameFileKeys($user, $path, $trash = false) {
289 289
 
290
-		if ($this->view->is_dir($user . '/' . $path) === false) {
291
-			$this->logger->info('Skip dir /' . $user . '/' . $path . ': does not exist');
290
+		if ($this->view->is_dir($user.'/'.$path) === false) {
291
+			$this->logger->info('Skip dir /'.$user.'/'.$path.': does not exist');
292 292
 			return;
293 293
 		}
294 294
 
295
-		$dh = $this->view->opendir($user . '/' . $path);
295
+		$dh = $this->view->opendir($user.'/'.$path);
296 296
 
297 297
 		if (is_resource($dh)) {
298 298
 			while (($file = readdir($dh)) !== false) {
299 299
 				if (!\OC\Files\Filesystem::isIgnoredDir($file)) {
300
-					if ($this->view->is_dir($user . '/' . $path . '/' . $file)) {
301
-						$this->renameFileKeys($user, $path . '/' . $file, $trash);
300
+					if ($this->view->is_dir($user.'/'.$path.'/'.$file)) {
301
+						$this->renameFileKeys($user, $path.'/'.$file, $trash);
302 302
 					} else {
303 303
 						$target = $this->getTargetDir($user, $path, $file, $trash);
304 304
 						if ($target !== false) {
305 305
 							$this->createPathForKeys(dirname($target));
306
-							$this->view->rename($user . '/' . $path . '/' . $file, $target);
306
+							$this->view->rename($user.'/'.$path.'/'.$file, $target);
307 307
 						} else {
308 308
 							$this->logger->warning(
309
-								'did not move key "' . $file
310
-								. '" could not find the corresponding file in /data/' . $user . '/files.'
309
+								'did not move key "'.$file
310
+								. '" could not find the corresponding file in /data/'.$user.'/files.'
311 311
 							. 'Most likely the key was already moved in a previous migration run and is already on the right place.');
312 312
 						}
313 313
 					}
@@ -340,10 +340,10 @@  discard block
 block discarded – undo
340 340
 	private function getTargetDir($user, $keyPath, $filename, $trash) {
341 341
 		if ($trash) {
342 342
 			$filePath = substr($keyPath, strlen('/files_trashbin/keys/'));
343
-			$targetDir = $user . '/files_encryption/keys/files_trashbin/' . $filePath . '/' . $this->moduleId . '/' . $filename;
343
+			$targetDir = $user.'/files_encryption/keys/files_trashbin/'.$filePath.'/'.$this->moduleId.'/'.$filename;
344 344
 		} else {
345 345
 			$filePath = substr($keyPath, strlen('/files_encryption/keys/'));
346
-			$targetDir = $user . '/files_encryption/keys/files/' . $filePath . '/' . $this->moduleId . '/' . $filename;
346
+			$targetDir = $user.'/files_encryption/keys/files/'.$filePath.'/'.$this->moduleId.'/'.$filename;
347 347
 		}
348 348
 
349 349
 		if ($user === '') {
@@ -351,13 +351,13 @@  discard block
 block discarded – undo
351 351
 			$normalized = \OC\Files\Filesystem::normalizePath($filePath);
352 352
 			$systemMountPoints = $this->getSystemMountPoints();
353 353
 			foreach ($systemMountPoints as $mountPoint) {
354
-				$normalizedMountPoint = \OC\Files\Filesystem::normalizePath($mountPoint['mountpoint']) . '/';
354
+				$normalizedMountPoint = \OC\Files\Filesystem::normalizePath($mountPoint['mountpoint']).'/';
355 355
 				if (strpos($normalized, $normalizedMountPoint) === 0)
356 356
 					return $targetDir;
357 357
 			}
358
-		} else if ($trash === false && $this->view->file_exists('/' . $user. '/files/' . $filePath)) {
358
+		} else if ($trash === false && $this->view->file_exists('/'.$user.'/files/'.$filePath)) {
359 359
 			return $targetDir;
360
-		} else if ($trash === true && $this->view->file_exists('/' . $user. '/files_trashbin/' . $filePath)) {
360
+		} else if ($trash === true && $this->view->file_exists('/'.$user.'/files_trashbin/'.$filePath)) {
361 361
 				return $targetDir;
362 362
 			}
363 363
 
@@ -370,8 +370,8 @@  discard block
 block discarded – undo
370 370
 	 * @param string $user
371 371
 	 */
372 372
 	private function deleteOldKeys($user) {
373
-		$this->view->deleteAll($user . '/files_encryption/keyfiles');
374
-		$this->view->deleteAll($user . '/files_encryption/share-keys');
373
+		$this->view->deleteAll($user.'/files_encryption/keyfiles');
374
+		$this->view->deleteAll($user.'/files_encryption/share-keys');
375 375
 	}
376 376
 
377 377
 	/**
@@ -384,7 +384,7 @@  discard block
 block discarded – undo
384 384
 			$sub_dirs = explode('/', $path);
385 385
 			$dir = '';
386 386
 			foreach ($sub_dirs as $sub_dir) {
387
-				$dir .= '/' . $sub_dir;
387
+				$dir .= '/'.$sub_dir;
388 388
 				if (!$this->view->is_dir($dir)) {
389 389
 					$this->view->mkdir($dir);
390 390
 				}
Please login to merge, or discard this patch.
apps/encryption/lib/Util.php 2 patches
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -163,7 +163,7 @@  discard block
 block discarded – undo
163 163
 	 * @return bool
164 164
 	 */
165 165
 	public function userHasFiles($uid) {
166
-		return $this->files->file_exists($uid . '/files');
166
+		return $this->files->file_exists($uid.'/files');
167 167
 	}
168 168
 
169 169
 	/**
@@ -179,7 +179,7 @@  discard block
 block discarded – undo
179 179
 		if (count($parts) > 1) {
180 180
 			$owner = $parts[1];
181 181
 			if ($this->userManager->userExists($owner) === false) {
182
-				throw new \BadMethodCallException('Unknown user: ' .
182
+				throw new \BadMethodCallException('Unknown user: '.
183 183
 				'method expects path to a user folder relative to the data folder');
184 184
 			}
185 185
 
Please login to merge, or discard this patch.
Indentation   +162 added lines, -162 removed lines patch added patch discarded remove patch
@@ -36,167 +36,167 @@
 block discarded – undo
36 36
 use OCP\PreConditionNotMetException;
37 37
 
38 38
 class Util {
39
-	/**
40
-	 * @var View
41
-	 */
42
-	private $files;
43
-	/**
44
-	 * @var Crypt
45
-	 */
46
-	private $crypt;
47
-	/**
48
-	 * @var ILogger
49
-	 */
50
-	private $logger;
51
-	/**
52
-	 * @var bool|IUser
53
-	 */
54
-	private $user;
55
-	/**
56
-	 * @var IConfig
57
-	 */
58
-	private $config;
59
-	/**
60
-	 * @var IUserManager
61
-	 */
62
-	private $userManager;
63
-
64
-	/**
65
-	 * Util constructor.
66
-	 *
67
-	 * @param View $files
68
-	 * @param Crypt $crypt
69
-	 * @param ILogger $logger
70
-	 * @param IUserSession $userSession
71
-	 * @param IConfig $config
72
-	 * @param IUserManager $userManager
73
-	 */
74
-	public function __construct(View $files,
75
-								Crypt $crypt,
76
-								ILogger $logger,
77
-								IUserSession $userSession,
78
-								IConfig $config,
79
-								IUserManager $userManager
80
-	) {
81
-		$this->files = $files;
82
-		$this->crypt = $crypt;
83
-		$this->logger = $logger;
84
-		$this->user = $userSession && $userSession->isLoggedIn() ? $userSession->getUser() : false;
85
-		$this->config = $config;
86
-		$this->userManager = $userManager;
87
-	}
88
-
89
-	/**
90
-	 * check if recovery key is enabled for user
91
-	 *
92
-	 * @param string $uid
93
-	 * @return bool
94
-	 */
95
-	public function isRecoveryEnabledForUser($uid) {
96
-		$recoveryMode = $this->config->getUserValue($uid,
97
-			'encryption',
98
-			'recoveryEnabled',
99
-			'0');
100
-
101
-		return ($recoveryMode === '1');
102
-	}
103
-
104
-	/**
105
-	 * check if the home storage should be encrypted
106
-	 *
107
-	 * @return bool
108
-	 */
109
-	public function shouldEncryptHomeStorage() {
110
-		$encryptHomeStorage = $this->config->getAppValue(
111
-			'encryption',
112
-			'encryptHomeStorage',
113
-			'1'
114
-		);
115
-
116
-		return ($encryptHomeStorage === '1');
117
-	}
118
-
119
-	/**
120
-	 * set the home storage encryption on/off
121
-	 *
122
-	 * @param bool $encryptHomeStorage
123
-	 */
124
-	public function setEncryptHomeStorage($encryptHomeStorage) {
125
-		$value = $encryptHomeStorage ? '1' : '0';
126
-		$this->config->setAppValue(
127
-			'encryption',
128
-			'encryptHomeStorage',
129
-			$value
130
-		);
131
-	}
132
-
133
-	/**
134
-	 * check if master key is enabled
135
-	 *
136
-	 * @return bool
137
-	 */
138
-	public function isMasterKeyEnabled() {
139
-		$userMasterKey = $this->config->getAppValue('encryption', 'useMasterKey', '1');
140
-		return ($userMasterKey === '1');
141
-	}
142
-
143
-	/**
144
-	 * @param $enabled
145
-	 * @return bool
146
-	 */
147
-	public function setRecoveryForUser($enabled) {
148
-		$value = $enabled ? '1' : '0';
149
-
150
-		try {
151
-			$this->config->setUserValue($this->user->getUID(),
152
-				'encryption',
153
-				'recoveryEnabled',
154
-				$value);
155
-			return true;
156
-		} catch (PreConditionNotMetException $e) {
157
-			return false;
158
-		}
159
-	}
160
-
161
-	/**
162
-	 * @param string $uid
163
-	 * @return bool
164
-	 */
165
-	public function userHasFiles($uid) {
166
-		return $this->files->file_exists($uid . '/files');
167
-	}
168
-
169
-	/**
170
-	 * get owner from give path, path relative to data/ expected
171
-	 *
172
-	 * @param string $path relative to data/
173
-	 * @return string
174
-	 * @throws \BadMethodCallException
175
-	 */
176
-	public function getOwner($path) {
177
-		$owner = '';
178
-		$parts = explode('/', $path, 3);
179
-		if (count($parts) > 1) {
180
-			$owner = $parts[1];
181
-			if ($this->userManager->userExists($owner) === false) {
182
-				throw new \BadMethodCallException('Unknown user: ' .
183
-				'method expects path to a user folder relative to the data folder');
184
-			}
185
-
186
-		}
187
-
188
-		return $owner;
189
-	}
190
-
191
-	/**
192
-	 * get storage of path
193
-	 *
194
-	 * @param string $path
195
-	 * @return \OC\Files\Storage\Storage
196
-	 */
197
-	public function getStorage($path) {
198
-		$storage = $this->files->getMount($path)->getStorage();
199
-		return $storage;
200
-	}
39
+    /**
40
+     * @var View
41
+     */
42
+    private $files;
43
+    /**
44
+     * @var Crypt
45
+     */
46
+    private $crypt;
47
+    /**
48
+     * @var ILogger
49
+     */
50
+    private $logger;
51
+    /**
52
+     * @var bool|IUser
53
+     */
54
+    private $user;
55
+    /**
56
+     * @var IConfig
57
+     */
58
+    private $config;
59
+    /**
60
+     * @var IUserManager
61
+     */
62
+    private $userManager;
63
+
64
+    /**
65
+     * Util constructor.
66
+     *
67
+     * @param View $files
68
+     * @param Crypt $crypt
69
+     * @param ILogger $logger
70
+     * @param IUserSession $userSession
71
+     * @param IConfig $config
72
+     * @param IUserManager $userManager
73
+     */
74
+    public function __construct(View $files,
75
+                                Crypt $crypt,
76
+                                ILogger $logger,
77
+                                IUserSession $userSession,
78
+                                IConfig $config,
79
+                                IUserManager $userManager
80
+    ) {
81
+        $this->files = $files;
82
+        $this->crypt = $crypt;
83
+        $this->logger = $logger;
84
+        $this->user = $userSession && $userSession->isLoggedIn() ? $userSession->getUser() : false;
85
+        $this->config = $config;
86
+        $this->userManager = $userManager;
87
+    }
88
+
89
+    /**
90
+     * check if recovery key is enabled for user
91
+     *
92
+     * @param string $uid
93
+     * @return bool
94
+     */
95
+    public function isRecoveryEnabledForUser($uid) {
96
+        $recoveryMode = $this->config->getUserValue($uid,
97
+            'encryption',
98
+            'recoveryEnabled',
99
+            '0');
100
+
101
+        return ($recoveryMode === '1');
102
+    }
103
+
104
+    /**
105
+     * check if the home storage should be encrypted
106
+     *
107
+     * @return bool
108
+     */
109
+    public function shouldEncryptHomeStorage() {
110
+        $encryptHomeStorage = $this->config->getAppValue(
111
+            'encryption',
112
+            'encryptHomeStorage',
113
+            '1'
114
+        );
115
+
116
+        return ($encryptHomeStorage === '1');
117
+    }
118
+
119
+    /**
120
+     * set the home storage encryption on/off
121
+     *
122
+     * @param bool $encryptHomeStorage
123
+     */
124
+    public function setEncryptHomeStorage($encryptHomeStorage) {
125
+        $value = $encryptHomeStorage ? '1' : '0';
126
+        $this->config->setAppValue(
127
+            'encryption',
128
+            'encryptHomeStorage',
129
+            $value
130
+        );
131
+    }
132
+
133
+    /**
134
+     * check if master key is enabled
135
+     *
136
+     * @return bool
137
+     */
138
+    public function isMasterKeyEnabled() {
139
+        $userMasterKey = $this->config->getAppValue('encryption', 'useMasterKey', '1');
140
+        return ($userMasterKey === '1');
141
+    }
142
+
143
+    /**
144
+     * @param $enabled
145
+     * @return bool
146
+     */
147
+    public function setRecoveryForUser($enabled) {
148
+        $value = $enabled ? '1' : '0';
149
+
150
+        try {
151
+            $this->config->setUserValue($this->user->getUID(),
152
+                'encryption',
153
+                'recoveryEnabled',
154
+                $value);
155
+            return true;
156
+        } catch (PreConditionNotMetException $e) {
157
+            return false;
158
+        }
159
+    }
160
+
161
+    /**
162
+     * @param string $uid
163
+     * @return bool
164
+     */
165
+    public function userHasFiles($uid) {
166
+        return $this->files->file_exists($uid . '/files');
167
+    }
168
+
169
+    /**
170
+     * get owner from give path, path relative to data/ expected
171
+     *
172
+     * @param string $path relative to data/
173
+     * @return string
174
+     * @throws \BadMethodCallException
175
+     */
176
+    public function getOwner($path) {
177
+        $owner = '';
178
+        $parts = explode('/', $path, 3);
179
+        if (count($parts) > 1) {
180
+            $owner = $parts[1];
181
+            if ($this->userManager->userExists($owner) === false) {
182
+                throw new \BadMethodCallException('Unknown user: ' .
183
+                'method expects path to a user folder relative to the data folder');
184
+            }
185
+
186
+        }
187
+
188
+        return $owner;
189
+    }
190
+
191
+    /**
192
+     * get storage of path
193
+     *
194
+     * @param string $path
195
+     * @return \OC\Files\Storage\Storage
196
+     */
197
+    public function getStorage($path) {
198
+        $storage = $this->files->getMount($path)->getStorage();
199
+        return $storage;
200
+    }
201 201
 
202 202
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Users/Setup.php 1 patch
Indentation   +50 added lines, -50 removed lines patch added patch discarded remove patch
@@ -32,58 +32,58 @@
 block discarded – undo
32 32
 use OCP\IUserSession;
33 33
 
34 34
 class Setup {
35
-	/**
36
-	 * @var Crypt
37
-	 */
38
-	private $crypt;
39
-	/**
40
-	 * @var KeyManager
41
-	 */
42
-	private $keyManager;
43
-	/**
44
-	 * @var ILogger
45
-	 */
46
-	private $logger;
47
-	/**
48
-	 * @var bool|string
49
-	 */
50
-	private $user;
35
+    /**
36
+     * @var Crypt
37
+     */
38
+    private $crypt;
39
+    /**
40
+     * @var KeyManager
41
+     */
42
+    private $keyManager;
43
+    /**
44
+     * @var ILogger
45
+     */
46
+    private $logger;
47
+    /**
48
+     * @var bool|string
49
+     */
50
+    private $user;
51 51
 
52 52
 
53
-	/**
54
-	 * @param ILogger $logger
55
-	 * @param IUserSession $userSession
56
-	 * @param Crypt $crypt
57
-	 * @param KeyManager $keyManager
58
-	 */
59
-	public function __construct(ILogger $logger,
60
-								IUserSession $userSession,
61
-								Crypt $crypt,
62
-								KeyManager $keyManager) {
63
-		$this->logger = $logger;
64
-		$this->user = $userSession && $userSession->isLoggedIn() ? $userSession->getUser()->getUID() : false;
65
-		$this->crypt = $crypt;
66
-		$this->keyManager = $keyManager;
67
- 	}
53
+    /**
54
+     * @param ILogger $logger
55
+     * @param IUserSession $userSession
56
+     * @param Crypt $crypt
57
+     * @param KeyManager $keyManager
58
+     */
59
+    public function __construct(ILogger $logger,
60
+                                IUserSession $userSession,
61
+                                Crypt $crypt,
62
+                                KeyManager $keyManager) {
63
+        $this->logger = $logger;
64
+        $this->user = $userSession && $userSession->isLoggedIn() ? $userSession->getUser()->getUID() : false;
65
+        $this->crypt = $crypt;
66
+        $this->keyManager = $keyManager;
67
+        }
68 68
 
69
-	/**
70
-	 * @param string $uid user id
71
-	 * @param string $password user password
72
-	 * @return bool
73
-	 */
74
-	public function setupUser($uid, $password) {
75
-		if (!$this->keyManager->userHasKeys($uid)) {
76
-			return $this->keyManager->storeKeyPair($uid, $password,
77
-				$this->crypt->createKeyPair());
78
-		}
79
-		return true;
80
-	}
69
+    /**
70
+     * @param string $uid user id
71
+     * @param string $password user password
72
+     * @return bool
73
+     */
74
+    public function setupUser($uid, $password) {
75
+        if (!$this->keyManager->userHasKeys($uid)) {
76
+            return $this->keyManager->storeKeyPair($uid, $password,
77
+                $this->crypt->createKeyPair());
78
+        }
79
+        return true;
80
+    }
81 81
 
82
-	/**
83
-	 * make sure that all system keys exists
84
-	 */
85
-	public function setupSystem() {
86
-		$this->keyManager->validateShareKey();
87
-		$this->keyManager->validateMasterKey();
88
-	}
82
+    /**
83
+     * make sure that all system keys exists
84
+     */
85
+    public function setupSystem() {
86
+        $this->keyManager->validateShareKey();
87
+        $this->keyManager->validateMasterKey();
88
+    }
89 89
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Controller/SettingsController.php 2 patches
Indentation   +124 added lines, -124 removed lines patch added patch discarded remove patch
@@ -38,129 +38,129 @@
 block discarded – undo
38 38
 
39 39
 class SettingsController extends Controller {
40 40
 
41
-	/** @var IL10N */
42
-	private $l;
43
-
44
-	/** @var IUserManager */
45
-	private $userManager;
46
-
47
-	/** @var IUserSession */
48
-	private $userSession;
49
-
50
-	/** @var KeyManager */
51
-	private $keyManager;
52
-
53
-	/** @var Crypt */
54
-	private $crypt;
55
-
56
-	/** @var Session */
57
-	private $session;
58
-
59
-	/** @var ISession  */
60
-	private $ocSession;
61
-
62
-	/** @var  Util */
63
-	private $util;
64
-
65
-	/**
66
-	 * @param string $AppName
67
-	 * @param IRequest $request
68
-	 * @param IL10N $l10n
69
-	 * @param IUserManager $userManager
70
-	 * @param IUserSession $userSession
71
-	 * @param KeyManager $keyManager
72
-	 * @param Crypt $crypt
73
-	 * @param Session $session
74
-	 * @param ISession $ocSession
75
-	 * @param Util $util
76
-	 */
77
-	public function __construct($AppName,
78
-								IRequest $request,
79
-								IL10N $l10n,
80
-								IUserManager $userManager,
81
-								IUserSession $userSession,
82
-								KeyManager $keyManager,
83
-								Crypt $crypt,
84
-								Session $session,
85
-								ISession $ocSession,
86
-								Util $util
41
+    /** @var IL10N */
42
+    private $l;
43
+
44
+    /** @var IUserManager */
45
+    private $userManager;
46
+
47
+    /** @var IUserSession */
48
+    private $userSession;
49
+
50
+    /** @var KeyManager */
51
+    private $keyManager;
52
+
53
+    /** @var Crypt */
54
+    private $crypt;
55
+
56
+    /** @var Session */
57
+    private $session;
58
+
59
+    /** @var ISession  */
60
+    private $ocSession;
61
+
62
+    /** @var  Util */
63
+    private $util;
64
+
65
+    /**
66
+     * @param string $AppName
67
+     * @param IRequest $request
68
+     * @param IL10N $l10n
69
+     * @param IUserManager $userManager
70
+     * @param IUserSession $userSession
71
+     * @param KeyManager $keyManager
72
+     * @param Crypt $crypt
73
+     * @param Session $session
74
+     * @param ISession $ocSession
75
+     * @param Util $util
76
+     */
77
+    public function __construct($AppName,
78
+                                IRequest $request,
79
+                                IL10N $l10n,
80
+                                IUserManager $userManager,
81
+                                IUserSession $userSession,
82
+                                KeyManager $keyManager,
83
+                                Crypt $crypt,
84
+                                Session $session,
85
+                                ISession $ocSession,
86
+                                Util $util
87 87
 ) {
88
-		parent::__construct($AppName, $request);
89
-		$this->l = $l10n;
90
-		$this->userSession = $userSession;
91
-		$this->userManager = $userManager;
92
-		$this->keyManager = $keyManager;
93
-		$this->crypt = $crypt;
94
-		$this->session = $session;
95
-		$this->ocSession = $ocSession;
96
-		$this->util = $util;
97
-	}
98
-
99
-
100
-	/**
101
-	 * @NoAdminRequired
102
-	 * @UseSession
103
-	 *
104
-	 * @param string $oldPassword
105
-	 * @param string $newPassword
106
-	 * @return DataResponse
107
-	 */
108
-	public function updatePrivateKeyPassword($oldPassword, $newPassword) {
109
-		$result = false;
110
-		$uid = $this->userSession->getUser()->getUID();
111
-		$errorMessage = $this->l->t('Could not update the private key password.');
112
-
113
-		//check if password is correct
114
-		$passwordCorrect = $this->userManager->checkPassword($uid, $newPassword);
115
-		if ($passwordCorrect === false) {
116
-			// if check with uid fails we need to check the password with the login name
117
-			// e.g. in the ldap case. For local user we need to check the password with
118
-			// the uid because in this case the login name is case insensitive
119
-			$loginName = $this->ocSession->get('loginname');
120
-			$passwordCorrect = $this->userManager->checkPassword($loginName, $newPassword);
121
-		}
122
-
123
-		if ($passwordCorrect !== false) {
124
-			$encryptedKey = $this->keyManager->getPrivateKey($uid);
125
-			$decryptedKey = $this->crypt->decryptPrivateKey($encryptedKey, $oldPassword, $uid);
126
-
127
-			if ($decryptedKey) {
128
-				$encryptedKey = $this->crypt->encryptPrivateKey($decryptedKey, $newPassword, $uid);
129
-				$header = $this->crypt->generateHeader();
130
-				if ($encryptedKey) {
131
-					$this->keyManager->setPrivateKey($uid, $header . $encryptedKey);
132
-					$this->session->setPrivateKey($decryptedKey);
133
-					$result = true;
134
-				}
135
-			} else {
136
-				$errorMessage = $this->l->t('The old password was not correct, please try again.');
137
-			}
138
-		} else {
139
-			$errorMessage = $this->l->t('The current log-in password was not correct, please try again.');
140
-		}
141
-
142
-		if ($result === true) {
143
-			$this->session->setStatus(Session::INIT_SUCCESSFUL);
144
-			return new DataResponse(
145
-				['message' => (string) $this->l->t('Private key password successfully updated.')]
146
-			);
147
-		} else {
148
-			return new DataResponse(
149
-				['message' => (string) $errorMessage],
150
-				Http::STATUS_BAD_REQUEST
151
-			);
152
-		}
153
-
154
-	}
155
-
156
-	/**
157
-	 * @UseSession
158
-	 *
159
-	 * @param bool $encryptHomeStorage
160
-	 * @return DataResponse
161
-	 */
162
-	public function setEncryptHomeStorage($encryptHomeStorage) {
163
-		$this->util->setEncryptHomeStorage($encryptHomeStorage);
164
-		return new DataResponse();
165
-	}
88
+        parent::__construct($AppName, $request);
89
+        $this->l = $l10n;
90
+        $this->userSession = $userSession;
91
+        $this->userManager = $userManager;
92
+        $this->keyManager = $keyManager;
93
+        $this->crypt = $crypt;
94
+        $this->session = $session;
95
+        $this->ocSession = $ocSession;
96
+        $this->util = $util;
97
+    }
98
+
99
+
100
+    /**
101
+     * @NoAdminRequired
102
+     * @UseSession
103
+     *
104
+     * @param string $oldPassword
105
+     * @param string $newPassword
106
+     * @return DataResponse
107
+     */
108
+    public function updatePrivateKeyPassword($oldPassword, $newPassword) {
109
+        $result = false;
110
+        $uid = $this->userSession->getUser()->getUID();
111
+        $errorMessage = $this->l->t('Could not update the private key password.');
112
+
113
+        //check if password is correct
114
+        $passwordCorrect = $this->userManager->checkPassword($uid, $newPassword);
115
+        if ($passwordCorrect === false) {
116
+            // if check with uid fails we need to check the password with the login name
117
+            // e.g. in the ldap case. For local user we need to check the password with
118
+            // the uid because in this case the login name is case insensitive
119
+            $loginName = $this->ocSession->get('loginname');
120
+            $passwordCorrect = $this->userManager->checkPassword($loginName, $newPassword);
121
+        }
122
+
123
+        if ($passwordCorrect !== false) {
124
+            $encryptedKey = $this->keyManager->getPrivateKey($uid);
125
+            $decryptedKey = $this->crypt->decryptPrivateKey($encryptedKey, $oldPassword, $uid);
126
+
127
+            if ($decryptedKey) {
128
+                $encryptedKey = $this->crypt->encryptPrivateKey($decryptedKey, $newPassword, $uid);
129
+                $header = $this->crypt->generateHeader();
130
+                if ($encryptedKey) {
131
+                    $this->keyManager->setPrivateKey($uid, $header . $encryptedKey);
132
+                    $this->session->setPrivateKey($decryptedKey);
133
+                    $result = true;
134
+                }
135
+            } else {
136
+                $errorMessage = $this->l->t('The old password was not correct, please try again.');
137
+            }
138
+        } else {
139
+            $errorMessage = $this->l->t('The current log-in password was not correct, please try again.');
140
+        }
141
+
142
+        if ($result === true) {
143
+            $this->session->setStatus(Session::INIT_SUCCESSFUL);
144
+            return new DataResponse(
145
+                ['message' => (string) $this->l->t('Private key password successfully updated.')]
146
+            );
147
+        } else {
148
+            return new DataResponse(
149
+                ['message' => (string) $errorMessage],
150
+                Http::STATUS_BAD_REQUEST
151
+            );
152
+        }
153
+
154
+    }
155
+
156
+    /**
157
+     * @UseSession
158
+     *
159
+     * @param bool $encryptHomeStorage
160
+     * @return DataResponse
161
+     */
162
+    public function setEncryptHomeStorage($encryptHomeStorage) {
163
+        $this->util->setEncryptHomeStorage($encryptHomeStorage);
164
+        return new DataResponse();
165
+    }
166 166
 }
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -128,7 +128,7 @@
 block discarded – undo
128 128
 				$encryptedKey = $this->crypt->encryptPrivateKey($decryptedKey, $newPassword, $uid);
129 129
 				$header = $this->crypt->generateHeader();
130 130
 				if ($encryptedKey) {
131
-					$this->keyManager->setPrivateKey($uid, $header . $encryptedKey);
131
+					$this->keyManager->setPrivateKey($uid, $header.$encryptedKey);
132 132
 					$this->session->setPrivateKey($decryptedKey);
133 133
 					$result = true;
134 134
 				}
Please login to merge, or discard this patch.
apps/encryption/lib/Controller/RecoveryController.php 2 patches
Indentation   +155 added lines, -155 removed lines patch added patch discarded remove patch
@@ -34,160 +34,160 @@
 block discarded – undo
34 34
 use OCP\AppFramework\Http\DataResponse;
35 35
 
36 36
 class RecoveryController extends Controller {
37
-	/**
38
-	 * @var IConfig
39
-	 */
40
-	private $config;
41
-	/**
42
-	 * @var IL10N
43
-	 */
44
-	private $l;
45
-	/**
46
-	 * @var Recovery
47
-	 */
48
-	private $recovery;
49
-
50
-	/**
51
-	 * @param string $AppName
52
-	 * @param IRequest $request
53
-	 * @param IConfig $config
54
-	 * @param IL10N $l10n
55
-	 * @param Recovery $recovery
56
-	 */
57
-	public function __construct($AppName,
58
-								IRequest $request,
59
-								IConfig $config,
60
-								IL10N $l10n,
61
-								Recovery $recovery) {
62
-		parent::__construct($AppName, $request);
63
-		$this->config = $config;
64
-		$this->l = $l10n;
65
-		$this->recovery = $recovery;
66
-	}
67
-
68
-	/**
69
-	 * @param string $recoveryPassword
70
-	 * @param string $confirmPassword
71
-	 * @param string $adminEnableRecovery
72
-	 * @return DataResponse
73
-	 */
74
-	public function adminRecovery($recoveryPassword, $confirmPassword, $adminEnableRecovery) {
75
-		// Check if both passwords are the same
76
-		if (empty($recoveryPassword)) {
77
-			$errorMessage = (string)$this->l->t('Missing recovery key password');
78
-			return new DataResponse(['data' => ['message' => $errorMessage]],
79
-				Http::STATUS_BAD_REQUEST);
80
-		}
81
-
82
-		if (empty($confirmPassword)) {
83
-			$errorMessage = (string)$this->l->t('Please repeat the recovery key password');
84
-			return new DataResponse(['data' => ['message' => $errorMessage]],
85
-				Http::STATUS_BAD_REQUEST);
86
-		}
87
-
88
-		if ($recoveryPassword !== $confirmPassword) {
89
-			$errorMessage = (string)$this->l->t('Repeated recovery key password does not match the provided recovery key password');
90
-			return new DataResponse(['data' => ['message' => $errorMessage]],
91
-				Http::STATUS_BAD_REQUEST);
92
-		}
93
-
94
-		if (isset($adminEnableRecovery) && $adminEnableRecovery === '1') {
95
-			if ($this->recovery->enableAdminRecovery($recoveryPassword)) {
96
-				return new DataResponse(['data' => ['message' => (string)$this->l->t('Recovery key successfully enabled')]]);
97
-			}
98
-			return new DataResponse(['data' => ['message' => (string)$this->l->t('Could not enable recovery key. Please check your recovery key password!')]], Http::STATUS_BAD_REQUEST);
99
-		} elseif (isset($adminEnableRecovery) && $adminEnableRecovery === '0') {
100
-			if ($this->recovery->disableAdminRecovery($recoveryPassword)) {
101
-				return new DataResponse(['data' => ['message' => (string)$this->l->t('Recovery key successfully disabled')]]);
102
-			}
103
-			return new DataResponse(['data' => ['message' => (string)$this->l->t('Could not disable recovery key. Please check your recovery key password!')]], Http::STATUS_BAD_REQUEST);
104
-		}
105
-		// this response should never be sent but just in case.
106
-		return new DataResponse(['data' => ['message' => (string)$this->l->t('Missing parameters')]], Http::STATUS_BAD_REQUEST);
107
-	}
108
-
109
-	/**
110
-	 * @param string $newPassword
111
-	 * @param string $oldPassword
112
-	 * @param string $confirmPassword
113
-	 * @return DataResponse
114
-	 */
115
-	public function changeRecoveryPassword($newPassword, $oldPassword, $confirmPassword) {
116
-		//check if both passwords are the same
117
-		if (empty($oldPassword)) {
118
-			$errorMessage = (string)$this->l->t('Please provide the old recovery password');
119
-			return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
120
-		}
121
-
122
-		if (empty($newPassword)) {
123
-			$errorMessage = (string)$this->l->t('Please provide a new recovery password');
124
-			return new DataResponse (['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
125
-		}
126
-
127
-		if (empty($confirmPassword)) {
128
-			$errorMessage = (string)$this->l->t('Please repeat the new recovery password');
129
-			return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
130
-		}
131
-
132
-		if ($newPassword !== $confirmPassword) {
133
-			$errorMessage = (string)$this->l->t('Repeated recovery key password does not match the provided recovery key password');
134
-			return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
135
-		}
136
-
137
-		$result = $this->recovery->changeRecoveryKeyPassword($newPassword,
138
-			$oldPassword);
139
-
140
-		if ($result) {
141
-			return new DataResponse(
142
-				[
143
-					'data' => [
144
-						'message' => (string)$this->l->t('Password successfully changed.')]
145
-				]
146
-			);
147
-		}
148
-		return new DataResponse(
149
-			[
150
-				'data' => [
151
-					'message' => (string)$this->l->t('Could not change the password. Maybe the old password was not correct.')
152
-				]
153
-			], Http::STATUS_BAD_REQUEST);
154
-	}
155
-
156
-	/**
157
-	 * @NoAdminRequired
158
-	 *
159
-	 * @param string $userEnableRecovery
160
-	 * @return DataResponse
161
-	 */
162
-	public function userSetRecovery($userEnableRecovery) {
163
-		if ($userEnableRecovery === '0' || $userEnableRecovery === '1') {
164
-
165
-			$result = $this->recovery->setRecoveryForUser($userEnableRecovery);
166
-
167
-			if ($result) {
168
-				if ($userEnableRecovery === '0') {
169
-					return new DataResponse(
170
-						[
171
-							'data' => [
172
-								'message' => (string)$this->l->t('Recovery Key disabled')]
173
-						]
174
-					);
175
-				}
176
-				return new DataResponse(
177
-					[
178
-						'data' => [
179
-							'message' => (string)$this->l->t('Recovery Key enabled')]
180
-					]
181
-				);
182
-			}
183
-
184
-		}
185
-		return new DataResponse(
186
-			[
187
-				'data' => [
188
-					'message' => (string)$this->l->t('Could not enable the recovery key, please try again or contact your administrator')
189
-				]
190
-			], Http::STATUS_BAD_REQUEST);
191
-	}
37
+    /**
38
+     * @var IConfig
39
+     */
40
+    private $config;
41
+    /**
42
+     * @var IL10N
43
+     */
44
+    private $l;
45
+    /**
46
+     * @var Recovery
47
+     */
48
+    private $recovery;
49
+
50
+    /**
51
+     * @param string $AppName
52
+     * @param IRequest $request
53
+     * @param IConfig $config
54
+     * @param IL10N $l10n
55
+     * @param Recovery $recovery
56
+     */
57
+    public function __construct($AppName,
58
+                                IRequest $request,
59
+                                IConfig $config,
60
+                                IL10N $l10n,
61
+                                Recovery $recovery) {
62
+        parent::__construct($AppName, $request);
63
+        $this->config = $config;
64
+        $this->l = $l10n;
65
+        $this->recovery = $recovery;
66
+    }
67
+
68
+    /**
69
+     * @param string $recoveryPassword
70
+     * @param string $confirmPassword
71
+     * @param string $adminEnableRecovery
72
+     * @return DataResponse
73
+     */
74
+    public function adminRecovery($recoveryPassword, $confirmPassword, $adminEnableRecovery) {
75
+        // Check if both passwords are the same
76
+        if (empty($recoveryPassword)) {
77
+            $errorMessage = (string)$this->l->t('Missing recovery key password');
78
+            return new DataResponse(['data' => ['message' => $errorMessage]],
79
+                Http::STATUS_BAD_REQUEST);
80
+        }
81
+
82
+        if (empty($confirmPassword)) {
83
+            $errorMessage = (string)$this->l->t('Please repeat the recovery key password');
84
+            return new DataResponse(['data' => ['message' => $errorMessage]],
85
+                Http::STATUS_BAD_REQUEST);
86
+        }
87
+
88
+        if ($recoveryPassword !== $confirmPassword) {
89
+            $errorMessage = (string)$this->l->t('Repeated recovery key password does not match the provided recovery key password');
90
+            return new DataResponse(['data' => ['message' => $errorMessage]],
91
+                Http::STATUS_BAD_REQUEST);
92
+        }
93
+
94
+        if (isset($adminEnableRecovery) && $adminEnableRecovery === '1') {
95
+            if ($this->recovery->enableAdminRecovery($recoveryPassword)) {
96
+                return new DataResponse(['data' => ['message' => (string)$this->l->t('Recovery key successfully enabled')]]);
97
+            }
98
+            return new DataResponse(['data' => ['message' => (string)$this->l->t('Could not enable recovery key. Please check your recovery key password!')]], Http::STATUS_BAD_REQUEST);
99
+        } elseif (isset($adminEnableRecovery) && $adminEnableRecovery === '0') {
100
+            if ($this->recovery->disableAdminRecovery($recoveryPassword)) {
101
+                return new DataResponse(['data' => ['message' => (string)$this->l->t('Recovery key successfully disabled')]]);
102
+            }
103
+            return new DataResponse(['data' => ['message' => (string)$this->l->t('Could not disable recovery key. Please check your recovery key password!')]], Http::STATUS_BAD_REQUEST);
104
+        }
105
+        // this response should never be sent but just in case.
106
+        return new DataResponse(['data' => ['message' => (string)$this->l->t('Missing parameters')]], Http::STATUS_BAD_REQUEST);
107
+    }
108
+
109
+    /**
110
+     * @param string $newPassword
111
+     * @param string $oldPassword
112
+     * @param string $confirmPassword
113
+     * @return DataResponse
114
+     */
115
+    public function changeRecoveryPassword($newPassword, $oldPassword, $confirmPassword) {
116
+        //check if both passwords are the same
117
+        if (empty($oldPassword)) {
118
+            $errorMessage = (string)$this->l->t('Please provide the old recovery password');
119
+            return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
120
+        }
121
+
122
+        if (empty($newPassword)) {
123
+            $errorMessage = (string)$this->l->t('Please provide a new recovery password');
124
+            return new DataResponse (['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
125
+        }
126
+
127
+        if (empty($confirmPassword)) {
128
+            $errorMessage = (string)$this->l->t('Please repeat the new recovery password');
129
+            return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
130
+        }
131
+
132
+        if ($newPassword !== $confirmPassword) {
133
+            $errorMessage = (string)$this->l->t('Repeated recovery key password does not match the provided recovery key password');
134
+            return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
135
+        }
136
+
137
+        $result = $this->recovery->changeRecoveryKeyPassword($newPassword,
138
+            $oldPassword);
139
+
140
+        if ($result) {
141
+            return new DataResponse(
142
+                [
143
+                    'data' => [
144
+                        'message' => (string)$this->l->t('Password successfully changed.')]
145
+                ]
146
+            );
147
+        }
148
+        return new DataResponse(
149
+            [
150
+                'data' => [
151
+                    'message' => (string)$this->l->t('Could not change the password. Maybe the old password was not correct.')
152
+                ]
153
+            ], Http::STATUS_BAD_REQUEST);
154
+    }
155
+
156
+    /**
157
+     * @NoAdminRequired
158
+     *
159
+     * @param string $userEnableRecovery
160
+     * @return DataResponse
161
+     */
162
+    public function userSetRecovery($userEnableRecovery) {
163
+        if ($userEnableRecovery === '0' || $userEnableRecovery === '1') {
164
+
165
+            $result = $this->recovery->setRecoveryForUser($userEnableRecovery);
166
+
167
+            if ($result) {
168
+                if ($userEnableRecovery === '0') {
169
+                    return new DataResponse(
170
+                        [
171
+                            'data' => [
172
+                                'message' => (string)$this->l->t('Recovery Key disabled')]
173
+                        ]
174
+                    );
175
+                }
176
+                return new DataResponse(
177
+                    [
178
+                        'data' => [
179
+                            'message' => (string)$this->l->t('Recovery Key enabled')]
180
+                    ]
181
+                );
182
+            }
183
+
184
+        }
185
+        return new DataResponse(
186
+            [
187
+                'data' => [
188
+                    'message' => (string)$this->l->t('Could not enable the recovery key, please try again or contact your administrator')
189
+                ]
190
+            ], Http::STATUS_BAD_REQUEST);
191
+    }
192 192
 
193 193
 }
Please login to merge, or discard this patch.
Spacing   +18 added lines, -18 removed lines patch added patch discarded remove patch
@@ -74,36 +74,36 @@  discard block
 block discarded – undo
74 74
 	public function adminRecovery($recoveryPassword, $confirmPassword, $adminEnableRecovery) {
75 75
 		// Check if both passwords are the same
76 76
 		if (empty($recoveryPassword)) {
77
-			$errorMessage = (string)$this->l->t('Missing recovery key password');
77
+			$errorMessage = (string) $this->l->t('Missing recovery key password');
78 78
 			return new DataResponse(['data' => ['message' => $errorMessage]],
79 79
 				Http::STATUS_BAD_REQUEST);
80 80
 		}
81 81
 
82 82
 		if (empty($confirmPassword)) {
83
-			$errorMessage = (string)$this->l->t('Please repeat the recovery key password');
83
+			$errorMessage = (string) $this->l->t('Please repeat the recovery key password');
84 84
 			return new DataResponse(['data' => ['message' => $errorMessage]],
85 85
 				Http::STATUS_BAD_REQUEST);
86 86
 		}
87 87
 
88 88
 		if ($recoveryPassword !== $confirmPassword) {
89
-			$errorMessage = (string)$this->l->t('Repeated recovery key password does not match the provided recovery key password');
89
+			$errorMessage = (string) $this->l->t('Repeated recovery key password does not match the provided recovery key password');
90 90
 			return new DataResponse(['data' => ['message' => $errorMessage]],
91 91
 				Http::STATUS_BAD_REQUEST);
92 92
 		}
93 93
 
94 94
 		if (isset($adminEnableRecovery) && $adminEnableRecovery === '1') {
95 95
 			if ($this->recovery->enableAdminRecovery($recoveryPassword)) {
96
-				return new DataResponse(['data' => ['message' => (string)$this->l->t('Recovery key successfully enabled')]]);
96
+				return new DataResponse(['data' => ['message' => (string) $this->l->t('Recovery key successfully enabled')]]);
97 97
 			}
98
-			return new DataResponse(['data' => ['message' => (string)$this->l->t('Could not enable recovery key. Please check your recovery key password!')]], Http::STATUS_BAD_REQUEST);
98
+			return new DataResponse(['data' => ['message' => (string) $this->l->t('Could not enable recovery key. Please check your recovery key password!')]], Http::STATUS_BAD_REQUEST);
99 99
 		} elseif (isset($adminEnableRecovery) && $adminEnableRecovery === '0') {
100 100
 			if ($this->recovery->disableAdminRecovery($recoveryPassword)) {
101
-				return new DataResponse(['data' => ['message' => (string)$this->l->t('Recovery key successfully disabled')]]);
101
+				return new DataResponse(['data' => ['message' => (string) $this->l->t('Recovery key successfully disabled')]]);
102 102
 			}
103
-			return new DataResponse(['data' => ['message' => (string)$this->l->t('Could not disable recovery key. Please check your recovery key password!')]], Http::STATUS_BAD_REQUEST);
103
+			return new DataResponse(['data' => ['message' => (string) $this->l->t('Could not disable recovery key. Please check your recovery key password!')]], Http::STATUS_BAD_REQUEST);
104 104
 		}
105 105
 		// this response should never be sent but just in case.
106
-		return new DataResponse(['data' => ['message' => (string)$this->l->t('Missing parameters')]], Http::STATUS_BAD_REQUEST);
106
+		return new DataResponse(['data' => ['message' => (string) $this->l->t('Missing parameters')]], Http::STATUS_BAD_REQUEST);
107 107
 	}
108 108
 
109 109
 	/**
@@ -115,22 +115,22 @@  discard block
 block discarded – undo
115 115
 	public function changeRecoveryPassword($newPassword, $oldPassword, $confirmPassword) {
116 116
 		//check if both passwords are the same
117 117
 		if (empty($oldPassword)) {
118
-			$errorMessage = (string)$this->l->t('Please provide the old recovery password');
118
+			$errorMessage = (string) $this->l->t('Please provide the old recovery password');
119 119
 			return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
120 120
 		}
121 121
 
122 122
 		if (empty($newPassword)) {
123
-			$errorMessage = (string)$this->l->t('Please provide a new recovery password');
124
-			return new DataResponse (['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
123
+			$errorMessage = (string) $this->l->t('Please provide a new recovery password');
124
+			return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
125 125
 		}
126 126
 
127 127
 		if (empty($confirmPassword)) {
128
-			$errorMessage = (string)$this->l->t('Please repeat the new recovery password');
128
+			$errorMessage = (string) $this->l->t('Please repeat the new recovery password');
129 129
 			return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
130 130
 		}
131 131
 
132 132
 		if ($newPassword !== $confirmPassword) {
133
-			$errorMessage = (string)$this->l->t('Repeated recovery key password does not match the provided recovery key password');
133
+			$errorMessage = (string) $this->l->t('Repeated recovery key password does not match the provided recovery key password');
134 134
 			return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
135 135
 		}
136 136
 
@@ -141,14 +141,14 @@  discard block
 block discarded – undo
141 141
 			return new DataResponse(
142 142
 				[
143 143
 					'data' => [
144
-						'message' => (string)$this->l->t('Password successfully changed.')]
144
+						'message' => (string) $this->l->t('Password successfully changed.')]
145 145
 				]
146 146
 			);
147 147
 		}
148 148
 		return new DataResponse(
149 149
 			[
150 150
 				'data' => [
151
-					'message' => (string)$this->l->t('Could not change the password. Maybe the old password was not correct.')
151
+					'message' => (string) $this->l->t('Could not change the password. Maybe the old password was not correct.')
152 152
 				]
153 153
 			], Http::STATUS_BAD_REQUEST);
154 154
 	}
@@ -169,14 +169,14 @@  discard block
 block discarded – undo
169 169
 					return new DataResponse(
170 170
 						[
171 171
 							'data' => [
172
-								'message' => (string)$this->l->t('Recovery Key disabled')]
172
+								'message' => (string) $this->l->t('Recovery Key disabled')]
173 173
 						]
174 174
 					);
175 175
 				}
176 176
 				return new DataResponse(
177 177
 					[
178 178
 						'data' => [
179
-							'message' => (string)$this->l->t('Recovery Key enabled')]
179
+							'message' => (string) $this->l->t('Recovery Key enabled')]
180 180
 					]
181 181
 				);
182 182
 			}
@@ -185,7 +185,7 @@  discard block
 block discarded – undo
185 185
 		return new DataResponse(
186 186
 			[
187 187
 				'data' => [
188
-					'message' => (string)$this->l->t('Could not enable the recovery key, please try again or contact your administrator')
188
+					'message' => (string) $this->l->t('Could not enable the recovery key, please try again or contact your administrator')
189 189
 				]
190 190
 			], Http::STATUS_BAD_REQUEST);
191 191
 	}
Please login to merge, or discard this patch.
apps/encryption/lib/Exceptions/PublicKeyMissingException.php 2 patches
Indentation   +9 added lines, -9 removed lines patch added patch discarded remove patch
@@ -25,14 +25,14 @@
 block discarded – undo
25 25
 
26 26
 class PublicKeyMissingException extends GenericEncryptionException {
27 27
 
28
-	/**
29
-	 * @param string $userId
30
-	 */
31
-	public function __construct($userId) {
32
-		if(empty($userId)) {
33
-			$userId = "<no-user-id-given>";
34
-		}
35
-		parent::__construct("Public Key missing for user: $userId");
36
-	}
28
+    /**
29
+     * @param string $userId
30
+     */
31
+    public function __construct($userId) {
32
+        if(empty($userId)) {
33
+            $userId = "<no-user-id-given>";
34
+        }
35
+        parent::__construct("Public Key missing for user: $userId");
36
+    }
37 37
 
38 38
 }
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -29,7 +29,7 @@
 block discarded – undo
29 29
 	 * @param string $userId
30 30
 	 */
31 31
 	public function __construct($userId) {
32
-		if(empty($userId)) {
32
+		if (empty($userId)) {
33 33
 			$userId = "<no-user-id-given>";
34 34
 		}
35 35
 		parent::__construct("Public Key missing for user: $userId");
Please login to merge, or discard this patch.
apps/encryption/lib/Exceptions/PrivateKeyMissingException.php 2 patches
Indentation   +9 added lines, -9 removed lines patch added patch discarded remove patch
@@ -28,14 +28,14 @@
 block discarded – undo
28 28
 
29 29
 class PrivateKeyMissingException extends GenericEncryptionException {
30 30
 
31
-	/**
32
-	 * @param string $userId
33
-	 */
34
-	public function __construct($userId) {
35
-		if(empty($userId)) {
36
-			$userId = "<no-user-id-given>";
37
-		}
38
-		parent::__construct("Private Key missing for user: $userId");
39
-	}
31
+    /**
32
+     * @param string $userId
33
+     */
34
+    public function __construct($userId) {
35
+        if(empty($userId)) {
36
+            $userId = "<no-user-id-given>";
37
+        }
38
+        parent::__construct("Private Key missing for user: $userId");
39
+    }
40 40
 
41 41
 }
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -32,7 +32,7 @@
 block discarded – undo
32 32
 	 * @param string $userId
33 33
 	 */
34 34
 	public function __construct($userId) {
35
-		if(empty($userId)) {
35
+		if (empty($userId)) {
36 36
 			$userId = "<no-user-id-given>";
37 37
 		}
38 38
 		parent::__construct("Private Key missing for user: $userId");
Please login to merge, or discard this patch.
apps/encryption/lib/AppInfo/Application.php 2 patches
Spacing   +12 added lines, -12 removed lines patch added patch discarded remove patch
@@ -62,7 +62,7 @@  discard block
 block discarded – undo
62 62
 		$this->encryptionManager = \OC::$server->getEncryptionManager();
63 63
 		$this->config = \OC::$server->getConfig();
64 64
 		$this->registerServices();
65
-		if($encryptionSystemReady === false) {
65
+		if ($encryptionSystemReady === false) {
66 66
 			/** @var Session $session */
67 67
 			$session = $this->getContainer()->query('Session');
68 68
 			$session->setStatus(Session::RUN_MIGRATION);
@@ -133,7 +133,7 @@  discard block
 block discarded – undo
133 133
 		$container = $this->getContainer();
134 134
 
135 135
 		$container->registerService('Crypt',
136
-			function (IAppContainer $c) {
136
+			function(IAppContainer $c) {
137 137
 				$server = $c->getServer();
138 138
 				return new Crypt($server->getLogger(),
139 139
 					$server->getUserSession(),
@@ -142,14 +142,14 @@  discard block
 block discarded – undo
142 142
 			});
143 143
 
144 144
 		$container->registerService('Session',
145
-			function (IAppContainer $c) {
145
+			function(IAppContainer $c) {
146 146
 				$server = $c->getServer();
147 147
 				return new Session($server->getSession());
148 148
 			}
149 149
 		);
150 150
 
151 151
 		$container->registerService('KeyManager',
152
-			function (IAppContainer $c) {
152
+			function(IAppContainer $c) {
153 153
 				$server = $c->getServer();
154 154
 
155 155
 				return new KeyManager($server->getEncryptionKeyStorage(),
@@ -163,7 +163,7 @@  discard block
 block discarded – undo
163 163
 			});
164 164
 
165 165
 		$container->registerService('Recovery',
166
-			function (IAppContainer $c) {
166
+			function(IAppContainer $c) {
167 167
 				$server = $c->getServer();
168 168
 
169 169
 				return new Recovery(
@@ -177,7 +177,7 @@  discard block
 block discarded – undo
177 177
 					new View());
178 178
 			});
179 179
 
180
-		$container->registerService('RecoveryController', function (IAppContainer $c) {
180
+		$container->registerService('RecoveryController', function(IAppContainer $c) {
181 181
 			$server = $c->getServer();
182 182
 			return new RecoveryController(
183 183
 				$c->getAppName(),
@@ -187,7 +187,7 @@  discard block
 block discarded – undo
187 187
 				$c->query('Recovery'));
188 188
 		});
189 189
 
190
-		$container->registerService('StatusController', function (IAppContainer $c) {
190
+		$container->registerService('StatusController', function(IAppContainer $c) {
191 191
 			$server = $c->getServer();
192 192
 			return new StatusController(
193 193
 				$c->getAppName(),
@@ -197,7 +197,7 @@  discard block
 block discarded – undo
197 197
 			);
198 198
 		});
199 199
 
200
-		$container->registerService('SettingsController', function (IAppContainer $c) {
200
+		$container->registerService('SettingsController', function(IAppContainer $c) {
201 201
 			$server = $c->getServer();
202 202
 			return new SettingsController(
203 203
 				$c->getAppName(),
@@ -214,7 +214,7 @@  discard block
 block discarded – undo
214 214
 		});
215 215
 
216 216
 		$container->registerService('UserSetup',
217
-			function (IAppContainer $c) {
217
+			function(IAppContainer $c) {
218 218
 				$server = $c->getServer();
219 219
 				return new Setup($server->getLogger(),
220 220
 					$server->getUserSession(),
@@ -223,7 +223,7 @@  discard block
 block discarded – undo
223 223
 			});
224 224
 
225 225
 		$container->registerService('Util',
226
-			function (IAppContainer $c) {
226
+			function(IAppContainer $c) {
227 227
 				$server = $c->getServer();
228 228
 
229 229
 				return new Util(
@@ -236,7 +236,7 @@  discard block
 block discarded – undo
236 236
 			});
237 237
 
238 238
 		$container->registerService('EncryptAll',
239
-			function (IAppContainer $c) {
239
+			function(IAppContainer $c) {
240 240
 				$server = $c->getServer();
241 241
 				return new EncryptAll(
242 242
 					$c->query('UserSetup'),
@@ -254,7 +254,7 @@  discard block
 block discarded – undo
254 254
 		);
255 255
 
256 256
 		$container->registerService('DecryptAll',
257
-			function (IAppContainer $c) {
257
+			function(IAppContainer $c) {
258 258
 				return new DecryptAll(
259 259
 					$c->query('Util'),
260 260
 					$c->query('KeyManager'),
Please login to merge, or discard this patch.
Indentation   +222 added lines, -222 removed lines patch added patch discarded remove patch
@@ -48,226 +48,226 @@
 block discarded – undo
48 48
 
49 49
 class Application extends \OCP\AppFramework\App {
50 50
 
51
-	/** @var IManager */
52
-	private $encryptionManager;
53
-	/** @var IConfig */
54
-	private $config;
55
-
56
-	/**
57
-	 * @param array $urlParams
58
-	 * @param bool $encryptionSystemReady
59
-	 */
60
-	public function __construct($urlParams = array(), $encryptionSystemReady = true) {
61
-		parent::__construct('encryption', $urlParams);
62
-		$this->encryptionManager = \OC::$server->getEncryptionManager();
63
-		$this->config = \OC::$server->getConfig();
64
-		$this->registerServices();
65
-		if($encryptionSystemReady === false) {
66
-			/** @var Session $session */
67
-			$session = $this->getContainer()->query('Session');
68
-			$session->setStatus(Session::RUN_MIGRATION);
69
-		}
70
-
71
-	}
72
-
73
-	public function setUp() {
74
-		if ($this->encryptionManager->isEnabled()) {
75
-			/** @var Setup $setup */
76
-			$setup = $this->getContainer()->query('UserSetup');
77
-			$setup->setupSystem();
78
-		}
79
-	}
80
-
81
-	/**
82
-	 * register hooks
83
-	 */
84
-	public function registerHooks() {
85
-		if (!$this->config->getSystemValue('maintenance', false)) {
86
-
87
-			$container = $this->getContainer();
88
-			$server = $container->getServer();
89
-			// Register our hooks and fire them.
90
-			$hookManager = new HookManager();
91
-
92
-			$hookManager->registerHook([
93
-				new UserHooks($container->query('KeyManager'),
94
-					$server->getUserManager(),
95
-					$server->getLogger(),
96
-					$container->query('UserSetup'),
97
-					$server->getUserSession(),
98
-					$container->query('Util'),
99
-					$container->query('Session'),
100
-					$container->query('Crypt'),
101
-					$container->query('Recovery'))
102
-			]);
103
-
104
-			$hookManager->fireHooks();
105
-
106
-		} else {
107
-			// Logout user if we are in maintenance to force re-login
108
-			$this->getContainer()->getServer()->getUserSession()->logout();
109
-		}
110
-	}
111
-
112
-	public function registerEncryptionModule() {
113
-		$container = $this->getContainer();
114
-
115
-
116
-		$this->encryptionManager->registerEncryptionModule(
117
-			Encryption::ID,
118
-			Encryption::DISPLAY_NAME,
119
-			function() use ($container) {
120
-
121
-			return new Encryption(
122
-				$container->query('Crypt'),
123
-				$container->query('KeyManager'),
124
-				$container->query('Util'),
125
-				$container->query('Session'),
126
-				$container->query('EncryptAll'),
127
-				$container->query('DecryptAll'),
128
-				$container->getServer()->getLogger(),
129
-				$container->getServer()->getL10N($container->getAppName())
130
-			);
131
-		});
132
-
133
-	}
134
-
135
-	public function registerServices() {
136
-		$container = $this->getContainer();
137
-
138
-		$container->registerService('Crypt',
139
-			function (IAppContainer $c) {
140
-				$server = $c->getServer();
141
-				return new Crypt($server->getLogger(),
142
-					$server->getUserSession(),
143
-					$server->getConfig(),
144
-					$server->getL10N($c->getAppName()));
145
-			});
146
-
147
-		$container->registerService('Session',
148
-			function (IAppContainer $c) {
149
-				$server = $c->getServer();
150
-				return new Session($server->getSession());
151
-			}
152
-		);
153
-
154
-		$container->registerService('KeyManager',
155
-			function (IAppContainer $c) {
156
-				$server = $c->getServer();
157
-
158
-				return new KeyManager($server->getEncryptionKeyStorage(),
159
-					$c->query('Crypt'),
160
-					$server->getConfig(),
161
-					$server->getUserSession(),
162
-					new Session($server->getSession()),
163
-					$server->getLogger(),
164
-					$c->query('Util')
165
-				);
166
-			});
167
-
168
-		$container->registerService('Recovery',
169
-			function (IAppContainer $c) {
170
-				$server = $c->getServer();
171
-
172
-				return new Recovery(
173
-					$server->getUserSession(),
174
-					$c->query('Crypt'),
175
-					$server->getSecureRandom(),
176
-					$c->query('KeyManager'),
177
-					$server->getConfig(),
178
-					$server->getEncryptionKeyStorage(),
179
-					$server->getEncryptionFilesHelper(),
180
-					new View());
181
-			});
182
-
183
-		$container->registerService('RecoveryController', function (IAppContainer $c) {
184
-			$server = $c->getServer();
185
-			return new RecoveryController(
186
-				$c->getAppName(),
187
-				$server->getRequest(),
188
-				$server->getConfig(),
189
-				$server->getL10N($c->getAppName()),
190
-				$c->query('Recovery'));
191
-		});
192
-
193
-		$container->registerService('StatusController', function (IAppContainer $c) {
194
-			$server = $c->getServer();
195
-			return new StatusController(
196
-				$c->getAppName(),
197
-				$server->getRequest(),
198
-				$server->getL10N($c->getAppName()),
199
-				$c->query('Session'),
200
-				$server->getEncryptionManager()
201
-			);
202
-		});
203
-
204
-		$container->registerService('SettingsController', function (IAppContainer $c) {
205
-			$server = $c->getServer();
206
-			return new SettingsController(
207
-				$c->getAppName(),
208
-				$server->getRequest(),
209
-				$server->getL10N($c->getAppName()),
210
-				$server->getUserManager(),
211
-				$server->getUserSession(),
212
-				$c->query('KeyManager'),
213
-				$c->query('Crypt'),
214
-				$c->query('Session'),
215
-				$server->getSession(),
216
-				$c->query('Util')
217
-			);
218
-		});
219
-
220
-		$container->registerService('UserSetup',
221
-			function (IAppContainer $c) {
222
-				$server = $c->getServer();
223
-				return new Setup($server->getLogger(),
224
-					$server->getUserSession(),
225
-					$c->query('Crypt'),
226
-					$c->query('KeyManager'));
227
-			});
228
-
229
-		$container->registerService('Util',
230
-			function (IAppContainer $c) {
231
-				$server = $c->getServer();
232
-
233
-				return new Util(
234
-					new View(),
235
-					$c->query('Crypt'),
236
-					$server->getLogger(),
237
-					$server->getUserSession(),
238
-					$server->getConfig(),
239
-					$server->getUserManager());
240
-			});
241
-
242
-		$container->registerService('EncryptAll',
243
-			function (IAppContainer $c) {
244
-				$server = $c->getServer();
245
-				return new EncryptAll(
246
-					$c->query('UserSetup'),
247
-					$c->getServer()->getUserManager(),
248
-					new View(),
249
-					$c->query('KeyManager'),
250
-					$c->query('Util'),
251
-					$server->getConfig(),
252
-					$server->getMailer(),
253
-					$server->getL10N('encryption'),
254
-					new QuestionHelper(),
255
-					$server->getSecureRandom()
256
-				);
257
-			}
258
-		);
259
-
260
-		$container->registerService('DecryptAll',
261
-			function (IAppContainer $c) {
262
-				return new DecryptAll(
263
-					$c->query('Util'),
264
-					$c->query('KeyManager'),
265
-					$c->query('Crypt'),
266
-					$c->query('Session'),
267
-					new QuestionHelper()
268
-				);
269
-			}
270
-		);
271
-
272
-	}
51
+    /** @var IManager */
52
+    private $encryptionManager;
53
+    /** @var IConfig */
54
+    private $config;
55
+
56
+    /**
57
+     * @param array $urlParams
58
+     * @param bool $encryptionSystemReady
59
+     */
60
+    public function __construct($urlParams = array(), $encryptionSystemReady = true) {
61
+        parent::__construct('encryption', $urlParams);
62
+        $this->encryptionManager = \OC::$server->getEncryptionManager();
63
+        $this->config = \OC::$server->getConfig();
64
+        $this->registerServices();
65
+        if($encryptionSystemReady === false) {
66
+            /** @var Session $session */
67
+            $session = $this->getContainer()->query('Session');
68
+            $session->setStatus(Session::RUN_MIGRATION);
69
+        }
70
+
71
+    }
72
+
73
+    public function setUp() {
74
+        if ($this->encryptionManager->isEnabled()) {
75
+            /** @var Setup $setup */
76
+            $setup = $this->getContainer()->query('UserSetup');
77
+            $setup->setupSystem();
78
+        }
79
+    }
80
+
81
+    /**
82
+     * register hooks
83
+     */
84
+    public function registerHooks() {
85
+        if (!$this->config->getSystemValue('maintenance', false)) {
86
+
87
+            $container = $this->getContainer();
88
+            $server = $container->getServer();
89
+            // Register our hooks and fire them.
90
+            $hookManager = new HookManager();
91
+
92
+            $hookManager->registerHook([
93
+                new UserHooks($container->query('KeyManager'),
94
+                    $server->getUserManager(),
95
+                    $server->getLogger(),
96
+                    $container->query('UserSetup'),
97
+                    $server->getUserSession(),
98
+                    $container->query('Util'),
99
+                    $container->query('Session'),
100
+                    $container->query('Crypt'),
101
+                    $container->query('Recovery'))
102
+            ]);
103
+
104
+            $hookManager->fireHooks();
105
+
106
+        } else {
107
+            // Logout user if we are in maintenance to force re-login
108
+            $this->getContainer()->getServer()->getUserSession()->logout();
109
+        }
110
+    }
111
+
112
+    public function registerEncryptionModule() {
113
+        $container = $this->getContainer();
114
+
115
+
116
+        $this->encryptionManager->registerEncryptionModule(
117
+            Encryption::ID,
118
+            Encryption::DISPLAY_NAME,
119
+            function() use ($container) {
120
+
121
+            return new Encryption(
122
+                $container->query('Crypt'),
123
+                $container->query('KeyManager'),
124
+                $container->query('Util'),
125
+                $container->query('Session'),
126
+                $container->query('EncryptAll'),
127
+                $container->query('DecryptAll'),
128
+                $container->getServer()->getLogger(),
129
+                $container->getServer()->getL10N($container->getAppName())
130
+            );
131
+        });
132
+
133
+    }
134
+
135
+    public function registerServices() {
136
+        $container = $this->getContainer();
137
+
138
+        $container->registerService('Crypt',
139
+            function (IAppContainer $c) {
140
+                $server = $c->getServer();
141
+                return new Crypt($server->getLogger(),
142
+                    $server->getUserSession(),
143
+                    $server->getConfig(),
144
+                    $server->getL10N($c->getAppName()));
145
+            });
146
+
147
+        $container->registerService('Session',
148
+            function (IAppContainer $c) {
149
+                $server = $c->getServer();
150
+                return new Session($server->getSession());
151
+            }
152
+        );
153
+
154
+        $container->registerService('KeyManager',
155
+            function (IAppContainer $c) {
156
+                $server = $c->getServer();
157
+
158
+                return new KeyManager($server->getEncryptionKeyStorage(),
159
+                    $c->query('Crypt'),
160
+                    $server->getConfig(),
161
+                    $server->getUserSession(),
162
+                    new Session($server->getSession()),
163
+                    $server->getLogger(),
164
+                    $c->query('Util')
165
+                );
166
+            });
167
+
168
+        $container->registerService('Recovery',
169
+            function (IAppContainer $c) {
170
+                $server = $c->getServer();
171
+
172
+                return new Recovery(
173
+                    $server->getUserSession(),
174
+                    $c->query('Crypt'),
175
+                    $server->getSecureRandom(),
176
+                    $c->query('KeyManager'),
177
+                    $server->getConfig(),
178
+                    $server->getEncryptionKeyStorage(),
179
+                    $server->getEncryptionFilesHelper(),
180
+                    new View());
181
+            });
182
+
183
+        $container->registerService('RecoveryController', function (IAppContainer $c) {
184
+            $server = $c->getServer();
185
+            return new RecoveryController(
186
+                $c->getAppName(),
187
+                $server->getRequest(),
188
+                $server->getConfig(),
189
+                $server->getL10N($c->getAppName()),
190
+                $c->query('Recovery'));
191
+        });
192
+
193
+        $container->registerService('StatusController', function (IAppContainer $c) {
194
+            $server = $c->getServer();
195
+            return new StatusController(
196
+                $c->getAppName(),
197
+                $server->getRequest(),
198
+                $server->getL10N($c->getAppName()),
199
+                $c->query('Session'),
200
+                $server->getEncryptionManager()
201
+            );
202
+        });
203
+
204
+        $container->registerService('SettingsController', function (IAppContainer $c) {
205
+            $server = $c->getServer();
206
+            return new SettingsController(
207
+                $c->getAppName(),
208
+                $server->getRequest(),
209
+                $server->getL10N($c->getAppName()),
210
+                $server->getUserManager(),
211
+                $server->getUserSession(),
212
+                $c->query('KeyManager'),
213
+                $c->query('Crypt'),
214
+                $c->query('Session'),
215
+                $server->getSession(),
216
+                $c->query('Util')
217
+            );
218
+        });
219
+
220
+        $container->registerService('UserSetup',
221
+            function (IAppContainer $c) {
222
+                $server = $c->getServer();
223
+                return new Setup($server->getLogger(),
224
+                    $server->getUserSession(),
225
+                    $c->query('Crypt'),
226
+                    $c->query('KeyManager'));
227
+            });
228
+
229
+        $container->registerService('Util',
230
+            function (IAppContainer $c) {
231
+                $server = $c->getServer();
232
+
233
+                return new Util(
234
+                    new View(),
235
+                    $c->query('Crypt'),
236
+                    $server->getLogger(),
237
+                    $server->getUserSession(),
238
+                    $server->getConfig(),
239
+                    $server->getUserManager());
240
+            });
241
+
242
+        $container->registerService('EncryptAll',
243
+            function (IAppContainer $c) {
244
+                $server = $c->getServer();
245
+                return new EncryptAll(
246
+                    $c->query('UserSetup'),
247
+                    $c->getServer()->getUserManager(),
248
+                    new View(),
249
+                    $c->query('KeyManager'),
250
+                    $c->query('Util'),
251
+                    $server->getConfig(),
252
+                    $server->getMailer(),
253
+                    $server->getL10N('encryption'),
254
+                    new QuestionHelper(),
255
+                    $server->getSecureRandom()
256
+                );
257
+            }
258
+        );
259
+
260
+        $container->registerService('DecryptAll',
261
+            function (IAppContainer $c) {
262
+                return new DecryptAll(
263
+                    $c->query('Util'),
264
+                    $c->query('KeyManager'),
265
+                    $c->query('Crypt'),
266
+                    $c->query('Session'),
267
+                    new QuestionHelper()
268
+                );
269
+            }
270
+        );
271
+
272
+    }
273 273
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Recovery.php 2 patches
Indentation   +287 added lines, -287 removed lines patch added patch discarded remove patch
@@ -38,293 +38,293 @@
 block discarded – undo
38 38
 class Recovery {
39 39
 
40 40
 
41
-	/**
42
-	 * @var null|IUser
43
-	 */
44
-	protected $user;
45
-	/**
46
-	 * @var Crypt
47
-	 */
48
-	protected $crypt;
49
-	/**
50
-	 * @var ISecureRandom
51
-	 */
52
-	private $random;
53
-	/**
54
-	 * @var KeyManager
55
-	 */
56
-	private $keyManager;
57
-	/**
58
-	 * @var IConfig
59
-	 */
60
-	private $config;
61
-	/**
62
-	 * @var IStorage
63
-	 */
64
-	private $keyStorage;
65
-	/**
66
-	 * @var View
67
-	 */
68
-	private $view;
69
-	/**
70
-	 * @var IFile
71
-	 */
72
-	private $file;
73
-
74
-	/**
75
-	 * @param IUserSession $user
76
-	 * @param Crypt $crypt
77
-	 * @param ISecureRandom $random
78
-	 * @param KeyManager $keyManager
79
-	 * @param IConfig $config
80
-	 * @param IStorage $keyStorage
81
-	 * @param IFile $file
82
-	 * @param View $view
83
-	 */
84
-	public function __construct(IUserSession $user,
85
-								Crypt $crypt,
86
-								ISecureRandom $random,
87
-								KeyManager $keyManager,
88
-								IConfig $config,
89
-								IStorage $keyStorage,
90
-								IFile $file,
91
-								View $view) {
92
-		$this->user = ($user && $user->isLoggedIn()) ? $user->getUser() : false;
93
-		$this->crypt = $crypt;
94
-		$this->random = $random;
95
-		$this->keyManager = $keyManager;
96
-		$this->config = $config;
97
-		$this->keyStorage = $keyStorage;
98
-		$this->view = $view;
99
-		$this->file = $file;
100
-	}
101
-
102
-	/**
103
-	 * @param string $password
104
-	 * @return bool
105
-	 */
106
-	public function enableAdminRecovery($password) {
107
-		$appConfig = $this->config;
108
-		$keyManager = $this->keyManager;
109
-
110
-		if (!$keyManager->recoveryKeyExists()) {
111
-			$keyPair = $this->crypt->createKeyPair();
112
-			if(!is_array($keyPair)) {
113
-				return false;
114
-			}
115
-
116
-			$this->keyManager->setRecoveryKey($password, $keyPair);
117
-		}
118
-
119
-		if ($keyManager->checkRecoveryPassword($password)) {
120
-			$appConfig->setAppValue('encryption', 'recoveryAdminEnabled', 1);
121
-			return true;
122
-		}
123
-
124
-		return false;
125
-	}
126
-
127
-	/**
128
-	 * change recovery key id
129
-	 *
130
-	 * @param string $newPassword
131
-	 * @param string $oldPassword
132
-	 * @return bool
133
-	 */
134
-	public function changeRecoveryKeyPassword($newPassword, $oldPassword) {
135
-		$recoveryKey = $this->keyManager->getSystemPrivateKey($this->keyManager->getRecoveryKeyId());
136
-		$decryptedRecoveryKey = $this->crypt->decryptPrivateKey($recoveryKey, $oldPassword);
137
-		if($decryptedRecoveryKey === false) {
138
-			return false;
139
-		}
140
-		$encryptedRecoveryKey = $this->crypt->encryptPrivateKey($decryptedRecoveryKey, $newPassword);
141
-		$header = $this->crypt->generateHeader();
142
-		if ($encryptedRecoveryKey) {
143
-			$this->keyManager->setSystemPrivateKey($this->keyManager->getRecoveryKeyId(), $header . $encryptedRecoveryKey);
144
-			return true;
145
-		}
146
-		return false;
147
-	}
148
-
149
-	/**
150
-	 * @param string $recoveryPassword
151
-	 * @return bool
152
-	 */
153
-	public function disableAdminRecovery($recoveryPassword) {
154
-		$keyManager = $this->keyManager;
155
-
156
-		if ($keyManager->checkRecoveryPassword($recoveryPassword)) {
157
-			// Set recoveryAdmin as disabled
158
-			$this->config->setAppValue('encryption', 'recoveryAdminEnabled', 0);
159
-			return true;
160
-		}
161
-		return false;
162
-	}
163
-
164
-	/**
165
-	 * check if recovery is enabled for user
166
-	 *
167
-	 * @param string $user if no user is given we check the current logged-in user
168
-	 *
169
-	 * @return bool
170
-	 */
171
-	public function isRecoveryEnabledForUser($user = '') {
172
-		$uid = empty($user) ? $this->user->getUID() : $user;
173
-		$recoveryMode = $this->config->getUserValue($uid,
174
-			'encryption',
175
-			'recoveryEnabled',
176
-			0);
177
-
178
-		return ($recoveryMode === '1');
179
-	}
180
-
181
-	/**
182
-	 * check if recovery is key is enabled by the administrator
183
-	 *
184
-	 * @return bool
185
-	 */
186
-	public function isRecoveryKeyEnabled() {
187
-		$enabled = $this->config->getAppValue('encryption', 'recoveryAdminEnabled', 0);
188
-
189
-		return ($enabled === '1');
190
-	}
191
-
192
-	/**
193
-	 * @param string $value
194
-	 * @return bool
195
-	 */
196
-	public function setRecoveryForUser($value) {
197
-
198
-		try {
199
-			$this->config->setUserValue($this->user->getUID(),
200
-				'encryption',
201
-				'recoveryEnabled',
202
-				$value);
203
-
204
-			if ($value === '1') {
205
-				$this->addRecoveryKeys('/' . $this->user->getUID() . '/files/');
206
-			} else {
207
-				$this->removeRecoveryKeys('/' . $this->user->getUID() . '/files/');
208
-			}
209
-
210
-			return true;
211
-		} catch (PreConditionNotMetException $e) {
212
-			return false;
213
-		}
214
-	}
215
-
216
-	/**
217
-	 * add recovery key to all encrypted files
218
-	 * @param string $path
219
-	 */
220
-	private function addRecoveryKeys($path) {
221
-		$dirContent = $this->view->getDirectoryContent($path);
222
-		foreach ($dirContent as $item) {
223
-			$filePath = $item->getPath();
224
-			if ($item['type'] === 'dir') {
225
-				$this->addRecoveryKeys($filePath . '/');
226
-			} else {
227
-				$fileKey = $this->keyManager->getFileKey($filePath, $this->user->getUID());
228
-				if (!empty($fileKey)) {
229
-					$accessList = $this->file->getAccessList($filePath);
230
-					$publicKeys = array();
231
-					foreach ($accessList['users'] as $uid) {
232
-						$publicKeys[$uid] = $this->keyManager->getPublicKey($uid);
233
-					}
234
-
235
-					$publicKeys = $this->keyManager->addSystemKeys($accessList, $publicKeys, $this->user->getUID());
236
-
237
-					$encryptedKeyfiles = $this->crypt->multiKeyEncrypt($fileKey, $publicKeys);
238
-					$this->keyManager->setAllFileKeys($filePath, $encryptedKeyfiles);
239
-				}
240
-			}
241
-		}
242
-	}
243
-
244
-	/**
245
-	 * remove recovery key to all encrypted files
246
-	 * @param string $path
247
-	 */
248
-	private function removeRecoveryKeys($path) {
249
-		$dirContent = $this->view->getDirectoryContent($path);
250
-		foreach ($dirContent as $item) {
251
-			$filePath = $item->getPath();
252
-			if ($item['type'] === 'dir') {
253
-				$this->removeRecoveryKeys($filePath . '/');
254
-			} else {
255
-				$this->keyManager->deleteShareKey($filePath, $this->keyManager->getRecoveryKeyId());
256
-			}
257
-		}
258
-	}
259
-
260
-	/**
261
-	 * recover users files with the recovery key
262
-	 *
263
-	 * @param string $recoveryPassword
264
-	 * @param string $user
265
-	 */
266
-	public function recoverUsersFiles($recoveryPassword, $user) {
267
-		$encryptedKey = $this->keyManager->getSystemPrivateKey($this->keyManager->getRecoveryKeyId());
268
-
269
-		$privateKey = $this->crypt->decryptPrivateKey($encryptedKey, $recoveryPassword);
270
-		if($privateKey !== false) {
271
-			$this->recoverAllFiles('/' . $user . '/files/', $privateKey, $user);
272
-		}
273
-	}
274
-
275
-	/**
276
-	 * recover users files
277
-	 *
278
-	 * @param string $path
279
-	 * @param string $privateKey
280
-	 * @param string $uid
281
-	 */
282
-	private function recoverAllFiles($path, $privateKey, $uid) {
283
-		$dirContent = $this->view->getDirectoryContent($path);
284
-
285
-		foreach ($dirContent as $item) {
286
-			// Get relative path from encryption/keyfiles
287
-			$filePath = $item->getPath();
288
-			if ($this->view->is_dir($filePath)) {
289
-				$this->recoverAllFiles($filePath . '/', $privateKey, $uid);
290
-			} else {
291
-				$this->recoverFile($filePath, $privateKey, $uid);
292
-			}
293
-		}
294
-
295
-	}
296
-
297
-	/**
298
-	 * recover file
299
-	 *
300
-	 * @param string $path
301
-	 * @param string $privateKey
302
-	 * @param string $uid
303
-	 */
304
-	private function recoverFile($path, $privateKey, $uid) {
305
-		$encryptedFileKey = $this->keyManager->getEncryptedFileKey($path);
306
-		$shareKey = $this->keyManager->getShareKey($path, $this->keyManager->getRecoveryKeyId());
307
-
308
-		if ($encryptedFileKey && $shareKey && $privateKey) {
309
-			$fileKey = $this->crypt->multiKeyDecrypt($encryptedFileKey,
310
-				$shareKey,
311
-				$privateKey);
312
-		}
313
-
314
-		if (!empty($fileKey)) {
315
-			$accessList = $this->file->getAccessList($path);
316
-			$publicKeys = array();
317
-			foreach ($accessList['users'] as $user) {
318
-				$publicKeys[$user] = $this->keyManager->getPublicKey($user);
319
-			}
320
-
321
-			$publicKeys = $this->keyManager->addSystemKeys($accessList, $publicKeys, $uid);
322
-
323
-			$encryptedKeyfiles = $this->crypt->multiKeyEncrypt($fileKey, $publicKeys);
324
-			$this->keyManager->setAllFileKeys($path, $encryptedKeyfiles);
325
-		}
326
-
327
-	}
41
+    /**
42
+     * @var null|IUser
43
+     */
44
+    protected $user;
45
+    /**
46
+     * @var Crypt
47
+     */
48
+    protected $crypt;
49
+    /**
50
+     * @var ISecureRandom
51
+     */
52
+    private $random;
53
+    /**
54
+     * @var KeyManager
55
+     */
56
+    private $keyManager;
57
+    /**
58
+     * @var IConfig
59
+     */
60
+    private $config;
61
+    /**
62
+     * @var IStorage
63
+     */
64
+    private $keyStorage;
65
+    /**
66
+     * @var View
67
+     */
68
+    private $view;
69
+    /**
70
+     * @var IFile
71
+     */
72
+    private $file;
73
+
74
+    /**
75
+     * @param IUserSession $user
76
+     * @param Crypt $crypt
77
+     * @param ISecureRandom $random
78
+     * @param KeyManager $keyManager
79
+     * @param IConfig $config
80
+     * @param IStorage $keyStorage
81
+     * @param IFile $file
82
+     * @param View $view
83
+     */
84
+    public function __construct(IUserSession $user,
85
+                                Crypt $crypt,
86
+                                ISecureRandom $random,
87
+                                KeyManager $keyManager,
88
+                                IConfig $config,
89
+                                IStorage $keyStorage,
90
+                                IFile $file,
91
+                                View $view) {
92
+        $this->user = ($user && $user->isLoggedIn()) ? $user->getUser() : false;
93
+        $this->crypt = $crypt;
94
+        $this->random = $random;
95
+        $this->keyManager = $keyManager;
96
+        $this->config = $config;
97
+        $this->keyStorage = $keyStorage;
98
+        $this->view = $view;
99
+        $this->file = $file;
100
+    }
101
+
102
+    /**
103
+     * @param string $password
104
+     * @return bool
105
+     */
106
+    public function enableAdminRecovery($password) {
107
+        $appConfig = $this->config;
108
+        $keyManager = $this->keyManager;
109
+
110
+        if (!$keyManager->recoveryKeyExists()) {
111
+            $keyPair = $this->crypt->createKeyPair();
112
+            if(!is_array($keyPair)) {
113
+                return false;
114
+            }
115
+
116
+            $this->keyManager->setRecoveryKey($password, $keyPair);
117
+        }
118
+
119
+        if ($keyManager->checkRecoveryPassword($password)) {
120
+            $appConfig->setAppValue('encryption', 'recoveryAdminEnabled', 1);
121
+            return true;
122
+        }
123
+
124
+        return false;
125
+    }
126
+
127
+    /**
128
+     * change recovery key id
129
+     *
130
+     * @param string $newPassword
131
+     * @param string $oldPassword
132
+     * @return bool
133
+     */
134
+    public function changeRecoveryKeyPassword($newPassword, $oldPassword) {
135
+        $recoveryKey = $this->keyManager->getSystemPrivateKey($this->keyManager->getRecoveryKeyId());
136
+        $decryptedRecoveryKey = $this->crypt->decryptPrivateKey($recoveryKey, $oldPassword);
137
+        if($decryptedRecoveryKey === false) {
138
+            return false;
139
+        }
140
+        $encryptedRecoveryKey = $this->crypt->encryptPrivateKey($decryptedRecoveryKey, $newPassword);
141
+        $header = $this->crypt->generateHeader();
142
+        if ($encryptedRecoveryKey) {
143
+            $this->keyManager->setSystemPrivateKey($this->keyManager->getRecoveryKeyId(), $header . $encryptedRecoveryKey);
144
+            return true;
145
+        }
146
+        return false;
147
+    }
148
+
149
+    /**
150
+     * @param string $recoveryPassword
151
+     * @return bool
152
+     */
153
+    public function disableAdminRecovery($recoveryPassword) {
154
+        $keyManager = $this->keyManager;
155
+
156
+        if ($keyManager->checkRecoveryPassword($recoveryPassword)) {
157
+            // Set recoveryAdmin as disabled
158
+            $this->config->setAppValue('encryption', 'recoveryAdminEnabled', 0);
159
+            return true;
160
+        }
161
+        return false;
162
+    }
163
+
164
+    /**
165
+     * check if recovery is enabled for user
166
+     *
167
+     * @param string $user if no user is given we check the current logged-in user
168
+     *
169
+     * @return bool
170
+     */
171
+    public function isRecoveryEnabledForUser($user = '') {
172
+        $uid = empty($user) ? $this->user->getUID() : $user;
173
+        $recoveryMode = $this->config->getUserValue($uid,
174
+            'encryption',
175
+            'recoveryEnabled',
176
+            0);
177
+
178
+        return ($recoveryMode === '1');
179
+    }
180
+
181
+    /**
182
+     * check if recovery is key is enabled by the administrator
183
+     *
184
+     * @return bool
185
+     */
186
+    public function isRecoveryKeyEnabled() {
187
+        $enabled = $this->config->getAppValue('encryption', 'recoveryAdminEnabled', 0);
188
+
189
+        return ($enabled === '1');
190
+    }
191
+
192
+    /**
193
+     * @param string $value
194
+     * @return bool
195
+     */
196
+    public function setRecoveryForUser($value) {
197
+
198
+        try {
199
+            $this->config->setUserValue($this->user->getUID(),
200
+                'encryption',
201
+                'recoveryEnabled',
202
+                $value);
203
+
204
+            if ($value === '1') {
205
+                $this->addRecoveryKeys('/' . $this->user->getUID() . '/files/');
206
+            } else {
207
+                $this->removeRecoveryKeys('/' . $this->user->getUID() . '/files/');
208
+            }
209
+
210
+            return true;
211
+        } catch (PreConditionNotMetException $e) {
212
+            return false;
213
+        }
214
+    }
215
+
216
+    /**
217
+     * add recovery key to all encrypted files
218
+     * @param string $path
219
+     */
220
+    private function addRecoveryKeys($path) {
221
+        $dirContent = $this->view->getDirectoryContent($path);
222
+        foreach ($dirContent as $item) {
223
+            $filePath = $item->getPath();
224
+            if ($item['type'] === 'dir') {
225
+                $this->addRecoveryKeys($filePath . '/');
226
+            } else {
227
+                $fileKey = $this->keyManager->getFileKey($filePath, $this->user->getUID());
228
+                if (!empty($fileKey)) {
229
+                    $accessList = $this->file->getAccessList($filePath);
230
+                    $publicKeys = array();
231
+                    foreach ($accessList['users'] as $uid) {
232
+                        $publicKeys[$uid] = $this->keyManager->getPublicKey($uid);
233
+                    }
234
+
235
+                    $publicKeys = $this->keyManager->addSystemKeys($accessList, $publicKeys, $this->user->getUID());
236
+
237
+                    $encryptedKeyfiles = $this->crypt->multiKeyEncrypt($fileKey, $publicKeys);
238
+                    $this->keyManager->setAllFileKeys($filePath, $encryptedKeyfiles);
239
+                }
240
+            }
241
+        }
242
+    }
243
+
244
+    /**
245
+     * remove recovery key to all encrypted files
246
+     * @param string $path
247
+     */
248
+    private function removeRecoveryKeys($path) {
249
+        $dirContent = $this->view->getDirectoryContent($path);
250
+        foreach ($dirContent as $item) {
251
+            $filePath = $item->getPath();
252
+            if ($item['type'] === 'dir') {
253
+                $this->removeRecoveryKeys($filePath . '/');
254
+            } else {
255
+                $this->keyManager->deleteShareKey($filePath, $this->keyManager->getRecoveryKeyId());
256
+            }
257
+        }
258
+    }
259
+
260
+    /**
261
+     * recover users files with the recovery key
262
+     *
263
+     * @param string $recoveryPassword
264
+     * @param string $user
265
+     */
266
+    public function recoverUsersFiles($recoveryPassword, $user) {
267
+        $encryptedKey = $this->keyManager->getSystemPrivateKey($this->keyManager->getRecoveryKeyId());
268
+
269
+        $privateKey = $this->crypt->decryptPrivateKey($encryptedKey, $recoveryPassword);
270
+        if($privateKey !== false) {
271
+            $this->recoverAllFiles('/' . $user . '/files/', $privateKey, $user);
272
+        }
273
+    }
274
+
275
+    /**
276
+     * recover users files
277
+     *
278
+     * @param string $path
279
+     * @param string $privateKey
280
+     * @param string $uid
281
+     */
282
+    private function recoverAllFiles($path, $privateKey, $uid) {
283
+        $dirContent = $this->view->getDirectoryContent($path);
284
+
285
+        foreach ($dirContent as $item) {
286
+            // Get relative path from encryption/keyfiles
287
+            $filePath = $item->getPath();
288
+            if ($this->view->is_dir($filePath)) {
289
+                $this->recoverAllFiles($filePath . '/', $privateKey, $uid);
290
+            } else {
291
+                $this->recoverFile($filePath, $privateKey, $uid);
292
+            }
293
+        }
294
+
295
+    }
296
+
297
+    /**
298
+     * recover file
299
+     *
300
+     * @param string $path
301
+     * @param string $privateKey
302
+     * @param string $uid
303
+     */
304
+    private function recoverFile($path, $privateKey, $uid) {
305
+        $encryptedFileKey = $this->keyManager->getEncryptedFileKey($path);
306
+        $shareKey = $this->keyManager->getShareKey($path, $this->keyManager->getRecoveryKeyId());
307
+
308
+        if ($encryptedFileKey && $shareKey && $privateKey) {
309
+            $fileKey = $this->crypt->multiKeyDecrypt($encryptedFileKey,
310
+                $shareKey,
311
+                $privateKey);
312
+        }
313
+
314
+        if (!empty($fileKey)) {
315
+            $accessList = $this->file->getAccessList($path);
316
+            $publicKeys = array();
317
+            foreach ($accessList['users'] as $user) {
318
+                $publicKeys[$user] = $this->keyManager->getPublicKey($user);
319
+            }
320
+
321
+            $publicKeys = $this->keyManager->addSystemKeys($accessList, $publicKeys, $uid);
322
+
323
+            $encryptedKeyfiles = $this->crypt->multiKeyEncrypt($fileKey, $publicKeys);
324
+            $this->keyManager->setAllFileKeys($path, $encryptedKeyfiles);
325
+        }
326
+
327
+    }
328 328
 
329 329
 
330 330
 }
Please login to merge, or discard this patch.
Spacing   +10 added lines, -10 removed lines patch added patch discarded remove patch
@@ -109,7 +109,7 @@  discard block
 block discarded – undo
109 109
 
110 110
 		if (!$keyManager->recoveryKeyExists()) {
111 111
 			$keyPair = $this->crypt->createKeyPair();
112
-			if(!is_array($keyPair)) {
112
+			if (!is_array($keyPair)) {
113 113
 				return false;
114 114
 			}
115 115
 
@@ -134,13 +134,13 @@  discard block
 block discarded – undo
134 134
 	public function changeRecoveryKeyPassword($newPassword, $oldPassword) {
135 135
 		$recoveryKey = $this->keyManager->getSystemPrivateKey($this->keyManager->getRecoveryKeyId());
136 136
 		$decryptedRecoveryKey = $this->crypt->decryptPrivateKey($recoveryKey, $oldPassword);
137
-		if($decryptedRecoveryKey === false) {
137
+		if ($decryptedRecoveryKey === false) {
138 138
 			return false;
139 139
 		}
140 140
 		$encryptedRecoveryKey = $this->crypt->encryptPrivateKey($decryptedRecoveryKey, $newPassword);
141 141
 		$header = $this->crypt->generateHeader();
142 142
 		if ($encryptedRecoveryKey) {
143
-			$this->keyManager->setSystemPrivateKey($this->keyManager->getRecoveryKeyId(), $header . $encryptedRecoveryKey);
143
+			$this->keyManager->setSystemPrivateKey($this->keyManager->getRecoveryKeyId(), $header.$encryptedRecoveryKey);
144 144
 			return true;
145 145
 		}
146 146
 		return false;
@@ -202,9 +202,9 @@  discard block
 block discarded – undo
202 202
 				$value);
203 203
 
204 204
 			if ($value === '1') {
205
-				$this->addRecoveryKeys('/' . $this->user->getUID() . '/files/');
205
+				$this->addRecoveryKeys('/'.$this->user->getUID().'/files/');
206 206
 			} else {
207
-				$this->removeRecoveryKeys('/' . $this->user->getUID() . '/files/');
207
+				$this->removeRecoveryKeys('/'.$this->user->getUID().'/files/');
208 208
 			}
209 209
 
210 210
 			return true;
@@ -222,7 +222,7 @@  discard block
 block discarded – undo
222 222
 		foreach ($dirContent as $item) {
223 223
 			$filePath = $item->getPath();
224 224
 			if ($item['type'] === 'dir') {
225
-				$this->addRecoveryKeys($filePath . '/');
225
+				$this->addRecoveryKeys($filePath.'/');
226 226
 			} else {
227 227
 				$fileKey = $this->keyManager->getFileKey($filePath, $this->user->getUID());
228 228
 				if (!empty($fileKey)) {
@@ -250,7 +250,7 @@  discard block
 block discarded – undo
250 250
 		foreach ($dirContent as $item) {
251 251
 			$filePath = $item->getPath();
252 252
 			if ($item['type'] === 'dir') {
253
-				$this->removeRecoveryKeys($filePath . '/');
253
+				$this->removeRecoveryKeys($filePath.'/');
254 254
 			} else {
255 255
 				$this->keyManager->deleteShareKey($filePath, $this->keyManager->getRecoveryKeyId());
256 256
 			}
@@ -267,8 +267,8 @@  discard block
 block discarded – undo
267 267
 		$encryptedKey = $this->keyManager->getSystemPrivateKey($this->keyManager->getRecoveryKeyId());
268 268
 
269 269
 		$privateKey = $this->crypt->decryptPrivateKey($encryptedKey, $recoveryPassword);
270
-		if($privateKey !== false) {
271
-			$this->recoverAllFiles('/' . $user . '/files/', $privateKey, $user);
270
+		if ($privateKey !== false) {
271
+			$this->recoverAllFiles('/'.$user.'/files/', $privateKey, $user);
272 272
 		}
273 273
 	}
274 274
 
@@ -286,7 +286,7 @@  discard block
 block discarded – undo
286 286
 			// Get relative path from encryption/keyfiles
287 287
 			$filePath = $item->getPath();
288 288
 			if ($this->view->is_dir($filePath)) {
289
-				$this->recoverAllFiles($filePath . '/', $privateKey, $uid);
289
+				$this->recoverAllFiles($filePath.'/', $privateKey, $uid);
290 290
 			} else {
291 291
 				$this->recoverFile($filePath, $privateKey, $uid);
292 292
 			}
Please login to merge, or discard this patch.