NCEndToEndMetadata.swift 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463
  1. //
  2. // NCEndToEndMetadata.swift
  3. // Nextcloud
  4. //
  5. // Created by Marino Faggiana on 13/11/17.
  6. // Copyright © 2017 Marino Faggiana. All rights reserved.
  7. //
  8. // Author Marino Faggiana <marino.faggiana@nextcloud.com>
  9. //
  10. // This program is free software: you can redistribute it and/or modify
  11. // it under the terms of the GNU General Public License as published by
  12. // the Free Software Foundation, either version 3 of the License, or
  13. // (at your option) any later version.
  14. //
  15. // This program is distributed in the hope that it will be useful,
  16. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. // GNU General Public License for more details.
  19. //
  20. // You should have received a copy of the GNU General Public License
  21. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  22. //
  23. import UIKit
  24. import NextcloudKit
  25. class NCEndToEndMetadata: NSObject {
  26. struct E2eeV1: Codable {
  27. struct Metadata: Codable {
  28. let metadataKeys: [String: String]
  29. let version: Double
  30. }
  31. struct Encrypted: Codable {
  32. let key: String
  33. let filename: String
  34. let mimetype: String
  35. let version: Double
  36. }
  37. struct Files: Codable {
  38. let initializationVector: String
  39. let authenticationTag: String?
  40. let metadataKey: Int
  41. let encrypted: String
  42. }
  43. let metadata: Metadata
  44. let files: [String: Files]?
  45. }
  46. struct E2eeV12: Codable {
  47. struct Metadata: Codable {
  48. let metadataKey: String
  49. let version: Double
  50. }
  51. struct Encrypted: Codable {
  52. let key: String
  53. let filename: String
  54. let mimetype: String
  55. let version: Double
  56. }
  57. struct Files: Codable {
  58. let initializationVector: String
  59. let authenticationTag: String?
  60. let encrypted: String
  61. }
  62. struct Filedrop: Codable {
  63. let initializationVector: String
  64. let authenticationTag: String?
  65. let encrypted: String
  66. }
  67. let metadata: Metadata
  68. let files: [String: Files]?
  69. let filedrop: [String: Filedrop]?
  70. }
  71. // --------------------------------------------------------------------------------------------
  72. // MARK: Encode JSON Metadata V1.2
  73. // --------------------------------------------------------------------------------------------
  74. func encoderMetadata(_ items: [tableE2eEncryption], account: String, serverUrl: String) -> String? {
  75. let encoder = JSONEncoder()
  76. var metadataKey: String = ""
  77. let metadataVersion = 1.2
  78. var files: [String: E2eeV12.Files] = [:]
  79. var filesCodable: [String: E2eeV12.Files]?
  80. var filedrop: [String: E2eeV12.Filedrop] = [:]
  81. var filedropCodable: [String: E2eeV12.Filedrop]?
  82. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  83. for item in items {
  84. //
  85. // metadata
  86. //
  87. if let metadatakey = (item.metadataKey.data(using: .utf8)?.base64EncodedString()),
  88. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(metadatakey, publicKey: nil, privateKey: privateKey) {
  89. metadataKey = metadataKeyEncrypted.base64EncodedString()
  90. }
  91. //
  92. // files
  93. //
  94. if item.blob == "files" {
  95. let encrypted = E2eeV12.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType, version: item.version)
  96. do {
  97. // Create "encrypted"
  98. let json = try encoder.encode(encrypted)
  99. let encryptedString = String(data: json, encoding: .utf8)
  100. if let encrypted = NCEndToEndEncryption.sharedManager().encryptEncryptedJson(encryptedString, key: item.metadataKey) {
  101. let record = E2eeV12.Files(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, encrypted: encrypted)
  102. files.updateValue(record, forKey: item.fileNameIdentifier)
  103. }
  104. } catch let error {
  105. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  106. return nil
  107. }
  108. }
  109. //
  110. // filedrop
  111. //
  112. if item.blob == "filedrop" {
  113. let encrypted = E2eeV12.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType, version: item.version)
  114. do {
  115. // Create "encrypted"
  116. let json = try encoder.encode(encrypted)
  117. let encryptedString = (json.base64EncodedString())
  118. if let encryptedData = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(encryptedString, publicKey: nil, privateKey: privateKey) {
  119. let encrypted = encryptedData.base64EncodedString()
  120. let record = E2eeV12.Filedrop(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, encrypted: encrypted)
  121. filedrop.updateValue(record, forKey: item.fileNameIdentifier)
  122. }
  123. } catch let error {
  124. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  125. return nil
  126. }
  127. }
  128. }
  129. // Create Json
  130. let metadata = E2eeV12.Metadata(metadataKey: metadataKey, version: metadataVersion)
  131. if !files.isEmpty { filesCodable = files }
  132. if !filedrop.isEmpty { filedropCodable = filedrop }
  133. let e2ee = E2eeV12(metadata: metadata, files: filesCodable, filedrop: filedropCodable)
  134. do {
  135. let data = try encoder.encode(e2ee)
  136. data.printJson()
  137. let jsonString = String(data: data, encoding: .utf8)
  138. return jsonString
  139. } catch let error {
  140. print("Serious internal error in encoding e2ee (" + error.localizedDescription + ")")
  141. return nil
  142. }
  143. }
  144. // --------------------------------------------------------------------------------------------
  145. // MARK: Decode JSON Metadata Bridge
  146. // --------------------------------------------------------------------------------------------
  147. func decoderMetadata(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> Bool {
  148. guard let data = json.data(using: .utf8) else { return false }
  149. data.printJson()
  150. let decoder = JSONDecoder()
  151. if (try? decoder.decode(E2eeV1.self, from: data)) != nil {
  152. return decoderMetadataV1(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId)
  153. } else if (try? decoder.decode(E2eeV12.self, from: data)) != nil {
  154. return decoderMetadataV12(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId, ownerId: ownerId)
  155. } else {
  156. return false
  157. }
  158. }
  159. // --------------------------------------------------------------------------------------------
  160. // MARK: Decode JSON Metadata V1
  161. // --------------------------------------------------------------------------------------------
  162. func decoderMetadataV1(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String) -> Bool {
  163. guard let data = json.data(using: .utf8) else { return false }
  164. let decoder = JSONDecoder()
  165. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  166. do {
  167. data.printJson()
  168. let json = try decoder.decode(E2eeV1.self, from: data)
  169. let metadata = json.metadata
  170. let files = json.files
  171. var metadataKeys: [String: String] = [:]
  172. let metadataVersion = metadata.version
  173. //
  174. // metadata
  175. //
  176. for metadataKey in metadata.metadataKeys {
  177. let data = Data(base64Encoded: metadataKey.value)
  178. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  179. let keyData = Data(base64Encoded: decrypted) {
  180. let key = String(data: keyData, encoding: .utf8)
  181. metadataKeys[metadataKey.key] = key
  182. }
  183. }
  184. //
  185. // files
  186. //
  187. if let files = files {
  188. for files in files {
  189. let fileNameIdentifier = files.key
  190. let files = files.value as E2eeV1.Files
  191. let encrypted = files.encrypted
  192. let authenticationTag = files.authenticationTag
  193. guard let metadataKey = metadataKeys["\(files.metadataKey)"] else { continue }
  194. let metadataKeyIndex = files.metadataKey
  195. let initializationVector = files.initializationVector
  196. if let decrypted = NCEndToEndEncryption.sharedManager().decryptEncryptedJson(encrypted, key: metadataKey),
  197. let decryptedData = Data(base64Encoded: decrypted) {
  198. do {
  199. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  200. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  201. let object = tableE2eEncryption()
  202. object.account = account
  203. object.authenticationTag = authenticationTag ?? ""
  204. object.blob = "files"
  205. object.fileName = encrypted.filename
  206. object.fileNameIdentifier = fileNameIdentifier
  207. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  208. object.key = encrypted.key
  209. object.initializationVector = initializationVector
  210. object.metadataKey = metadataKey
  211. object.metadataKeyIndex = metadataKeyIndex
  212. object.metadataVersion = metadataVersion
  213. object.mimeType = encrypted.mimetype
  214. object.serverUrl = serverUrl
  215. object.version = encrypted.version
  216. // If exists remove records
  217. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  218. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  219. // Write file parameter for decrypted on DB
  220. NCManageDatabase.shared.addE2eEncryption(object)
  221. // Update metadata on tableMetadata
  222. metadata.fileNameView = encrypted.filename
  223. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  224. metadata.contentType = results.mimeType
  225. metadata.iconName = results.iconName
  226. metadata.classFile = results.classFile
  227. NCManageDatabase.shared.addMetadata(metadata)
  228. }
  229. } catch let error {
  230. print("Serious internal error in decoding files (" + error.localizedDescription + ")")
  231. return false
  232. }
  233. }
  234. }
  235. }
  236. } catch let error {
  237. print("Serious internal error in decoding metadata (" + error.localizedDescription + ")")
  238. return false
  239. }
  240. return true
  241. }
  242. // --------------------------------------------------------------------------------------------
  243. // MARK: Decode JSON Metadata V12
  244. // --------------------------------------------------------------------------------------------
  245. func decoderMetadataV12(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> Bool {
  246. guard let data = json.data(using: .utf8) else { return false }
  247. let decoder = JSONDecoder()
  248. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  249. do {
  250. data.printJson()
  251. let json = try decoder.decode(E2eeV12.self, from: data)
  252. let metadata = json.metadata
  253. let files = json.files
  254. let filedrop = json.filedrop
  255. var metadataKey = ""
  256. let metadataVersion = metadata.version
  257. //
  258. // metadata
  259. //
  260. let data = Data(base64Encoded: metadata.metadataKey)
  261. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  262. let keyData = Data(base64Encoded: decrypted),
  263. let key = String(data: keyData, encoding: .utf8) {
  264. metadataKey = key
  265. } else {
  266. print("Serious internal error in decoding metadataKey")
  267. return false
  268. }
  269. //
  270. // files
  271. //
  272. if let files = files {
  273. for files in files {
  274. let fileNameIdentifier = files.key
  275. let files = files.value as E2eeV12.Files
  276. let encrypted = files.encrypted
  277. let authenticationTag = files.authenticationTag
  278. let initializationVector = files.initializationVector
  279. if let decrypted = NCEndToEndEncryption.sharedManager().decryptEncryptedJson(encrypted, key: metadataKey),
  280. let decryptedData = Data(base64Encoded: decrypted) {
  281. do {
  282. decryptedData.printJson()
  283. let encrypted = try decoder.decode(E2eeV12.Encrypted.self, from: decryptedData)
  284. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  285. let object = tableE2eEncryption()
  286. object.account = account
  287. object.authenticationTag = authenticationTag ?? ""
  288. object.blob = "files"
  289. object.fileName = encrypted.filename
  290. object.fileNameIdentifier = fileNameIdentifier
  291. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  292. object.key = encrypted.key
  293. object.initializationVector = initializationVector
  294. object.metadataKey = metadataKey
  295. object.metadataVersion = metadataVersion
  296. object.mimeType = encrypted.mimetype
  297. object.serverUrl = serverUrl
  298. object.version = encrypted.version
  299. // If exists remove records
  300. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  301. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  302. // Write file parameter for decrypted on DB
  303. NCManageDatabase.shared.addE2eEncryption(object)
  304. // Update metadata on tableMetadata
  305. metadata.fileNameView = encrypted.filename
  306. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  307. metadata.contentType = results.mimeType
  308. metadata.iconName = results.iconName
  309. metadata.classFile = results.classFile
  310. NCManageDatabase.shared.addMetadata(metadata)
  311. }
  312. } catch let error {
  313. print("Serious internal error in decoding files (" + error.localizedDescription + ")")
  314. return false
  315. }
  316. }
  317. }
  318. }
  319. //
  320. // filedrop
  321. //
  322. if let filedrop = filedrop {
  323. for filedrop in filedrop {
  324. let fileNameIdentifier = filedrop.key
  325. let filedrop = filedrop.value as E2eeV12.Filedrop
  326. let encrypted = filedrop.encrypted
  327. let authenticationTag = filedrop.authenticationTag
  328. let initializationVector = filedrop.initializationVector
  329. /*
  330. if let encryptedData = NSData(base64Encoded: encrypted, options: NSData.Base64DecodingOptions(rawValue: 0)),
  331. let encryptedBase64 = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(encryptedData as Data?, privateKey: privateKey),
  332. let encryptedBase64Data = Data(base64Encoded: encryptedBase64, options: NSData.Base64DecodingOptions(rawValue: 0)),
  333. let encrypted = String(data: encryptedBase64Data, encoding: .utf8),
  334. let encryptedData = encrypted.data(using: .utf8) {
  335. */
  336. let data = Data(base64Encoded: encrypted)
  337. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  338. let decryptedData = Data(base64Encoded: decrypted) {
  339. do {
  340. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  341. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  342. let object = tableE2eEncryption()
  343. object.account = account
  344. object.authenticationTag = authenticationTag ?? ""
  345. object.blob = "filedrop"
  346. object.fileName = encrypted.filename
  347. object.fileNameIdentifier = fileNameIdentifier
  348. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  349. object.key = encrypted.key
  350. object.initializationVector = initializationVector
  351. object.metadataKey = metadataKey
  352. object.metadataVersion = metadataVersion
  353. object.mimeType = encrypted.mimetype
  354. object.serverUrl = serverUrl
  355. object.version = encrypted.version
  356. // If exists remove records
  357. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  358. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  359. // Write file parameter for decrypted on DB
  360. NCManageDatabase.shared.addE2eEncryption(object)
  361. // Update metadata on tableMetadata
  362. metadata.fileNameView = encrypted.filename
  363. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  364. metadata.contentType = results.mimeType
  365. metadata.iconName = results.iconName
  366. metadata.classFile = results.classFile
  367. NCManageDatabase.shared.addMetadata(metadata)
  368. }
  369. } catch let error {
  370. print("Serious internal error in decoding filedrop (" + error.localizedDescription + ")")
  371. return false
  372. }
  373. }
  374. }
  375. }
  376. } catch let error {
  377. print("Serious internal error in decoding metadata (" + error.localizedDescription + ")")
  378. return false
  379. }
  380. return true
  381. }
  382. }