NCEndToEndMetadata.swift 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459
  1. //
  2. // NCEndToEndMetadata.swift
  3. // Nextcloud
  4. //
  5. // Created by Marino Faggiana on 13/11/17.
  6. // Copyright © 2017 Marino Faggiana. All rights reserved.
  7. //
  8. // Author Marino Faggiana <marino.faggiana@nextcloud.com>
  9. //
  10. // This program is free software: you can redistribute it and/or modify
  11. // it under the terms of the GNU General Public License as published by
  12. // the Free Software Foundation, either version 3 of the License, or
  13. // (at your option) any later version.
  14. //
  15. // This program is distributed in the hope that it will be useful,
  16. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. // GNU General Public License for more details.
  19. //
  20. // You should have received a copy of the GNU General Public License
  21. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  22. //
  23. import UIKit
  24. import NextcloudKit
  25. class NCEndToEndMetadata: NSObject {
  26. struct E2eeV1: Codable {
  27. struct Metadata: Codable {
  28. let metadataKeys: [String: String]
  29. let version: Double
  30. }
  31. struct Encrypted: Codable {
  32. let key: String
  33. let filename: String
  34. let mimetype: String
  35. }
  36. struct Files: Codable {
  37. let initializationVector: String
  38. let authenticationTag: String?
  39. let metadataKey: Int
  40. let encrypted: String
  41. }
  42. let metadata: Metadata
  43. let files: [String: Files]?
  44. }
  45. struct E2eeV12: Codable {
  46. struct Metadata: Codable {
  47. let metadataKey: String
  48. let version: Double
  49. }
  50. struct Encrypted: Codable {
  51. let key: String
  52. let filename: String
  53. let mimetype: String
  54. }
  55. struct Files: Codable {
  56. let initializationVector: String
  57. let authenticationTag: String?
  58. let encrypted: String
  59. }
  60. struct Filedrop: Codable {
  61. let initializationVector: String
  62. let authenticationTag: String?
  63. let encrypted: String
  64. }
  65. let metadata: Metadata
  66. let files: [String: Files]?
  67. let filedrop: [String: Filedrop]?
  68. }
  69. // --------------------------------------------------------------------------------------------
  70. // MARK: Encode JSON Metadata V1.2
  71. // --------------------------------------------------------------------------------------------
  72. func encoderMetadata(_ items: [tableE2eEncryption], account: String, serverUrl: String) -> String? {
  73. let encoder = JSONEncoder()
  74. var metadataKey: String = ""
  75. let metadataVersion = 1.2
  76. var files: [String: E2eeV12.Files] = [:]
  77. var filesCodable: [String: E2eeV12.Files]?
  78. var filedrop: [String: E2eeV12.Filedrop] = [:]
  79. var filedropCodable: [String: E2eeV12.Filedrop]?
  80. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  81. for item in items {
  82. //
  83. // metadata
  84. //
  85. if let metadatakey = (item.metadataKey.data(using: .utf8)?.base64EncodedString()),
  86. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(metadatakey, publicKey: nil, privateKey: privateKey) {
  87. metadataKey = metadataKeyEncrypted.base64EncodedString()
  88. }
  89. //
  90. // files
  91. //
  92. if item.blob == "files" {
  93. let encrypted = E2eeV12.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType)
  94. do {
  95. // Create "encrypted"
  96. let json = try encoder.encode(encrypted)
  97. let encryptedString = String(data: json, encoding: .utf8)
  98. if let encrypted = NCEndToEndEncryption.sharedManager().encryptPayloadFile(encryptedString, key: item.metadataKey) {
  99. let record = E2eeV12.Files(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, encrypted: encrypted)
  100. files.updateValue(record, forKey: item.fileNameIdentifier)
  101. }
  102. } catch let error {
  103. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  104. return nil
  105. }
  106. }
  107. //
  108. // filedrop
  109. //
  110. if item.blob == "filedrop" {
  111. let encrypted = E2eeV12.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType)
  112. do {
  113. // Create "encrypted"
  114. let json = try encoder.encode(encrypted)
  115. let encryptedString = (json.base64EncodedString())
  116. if let encryptedData = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(encryptedString, publicKey: nil, privateKey: privateKey) {
  117. let encrypted = encryptedData.base64EncodedString()
  118. let record = E2eeV12.Filedrop(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, encrypted: encrypted)
  119. filedrop.updateValue(record, forKey: item.fileNameIdentifier)
  120. }
  121. } catch let error {
  122. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  123. return nil
  124. }
  125. }
  126. }
  127. // Create Json
  128. let metadata = E2eeV12.Metadata(metadataKey: metadataKey, version: metadataVersion)
  129. if !files.isEmpty { filesCodable = files }
  130. if !filedrop.isEmpty { filedropCodable = filedrop }
  131. let e2ee = E2eeV12(metadata: metadata, files: filesCodable, filedrop: filedropCodable)
  132. do {
  133. let data = try encoder.encode(e2ee)
  134. data.printJson()
  135. let jsonString = String(data: data, encoding: .utf8)
  136. return jsonString
  137. } catch let error {
  138. print("Serious internal error in encoding e2ee (" + error.localizedDescription + ")")
  139. return nil
  140. }
  141. }
  142. // --------------------------------------------------------------------------------------------
  143. // MARK: Decode JSON Metadata Bridge
  144. // --------------------------------------------------------------------------------------------
  145. func decoderMetadata(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> Bool {
  146. guard let data = json.data(using: .utf8) else { return false }
  147. let versionE2EE = NCManageDatabase.shared.getCapabilitiesServerString(account: account, elements: NCElementsJSON.shared.capabilitiesE2EEApiVersion) ?? ""
  148. data.printJson()
  149. let decoder = JSONDecoder()
  150. if (try? decoder.decode(E2eeV1.self, from: data)) != nil {
  151. return decoderMetadataV1(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId)
  152. } else if (try? decoder.decode(E2eeV12.self, from: data)) != nil {
  153. return decoderMetadataV12(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId, ownerId: ownerId)
  154. } else {
  155. let error = NKError(errorCode: NCGlobal.shared.errorInternalError, errorDescription: "Server E2EE version " + versionE2EE + ", not compatible")
  156. NCContentPresenter.shared.showError(error: error)
  157. return false
  158. }
  159. }
  160. // --------------------------------------------------------------------------------------------
  161. // MARK: Decode JSON Metadata V1
  162. // --------------------------------------------------------------------------------------------
  163. func decoderMetadataV1(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String) -> Bool {
  164. guard let data = json.data(using: .utf8) else { return false }
  165. let decoder = JSONDecoder()
  166. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  167. do {
  168. let json = try decoder.decode(E2eeV1.self, from: data)
  169. let metadata = json.metadata
  170. let files = json.files
  171. var metadataKeys: [String: String] = [:]
  172. let metadataVersion = metadata.version
  173. //
  174. // metadata
  175. //
  176. for metadataKey in metadata.metadataKeys {
  177. let data = Data(base64Encoded: metadataKey.value)
  178. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  179. let keyData = Data(base64Encoded: decrypted) {
  180. let key = String(data: keyData, encoding: .utf8)
  181. metadataKeys[metadataKey.key] = key
  182. }
  183. }
  184. //
  185. // files
  186. //
  187. if let files = files {
  188. for files in files {
  189. let fileNameIdentifier = files.key
  190. let files = files.value as E2eeV1.Files
  191. let encrypted = files.encrypted
  192. let authenticationTag = files.authenticationTag
  193. guard let metadataKey = metadataKeys["\(files.metadataKey)"] else { continue }
  194. let metadataKeyIndex = files.metadataKey
  195. let initializationVector = files.initializationVector
  196. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(encrypted, key: metadataKey),
  197. let decryptedData = Data(base64Encoded: decrypted) {
  198. do {
  199. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  200. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  201. let object = tableE2eEncryption()
  202. object.account = account
  203. object.authenticationTag = authenticationTag ?? ""
  204. object.blob = "files"
  205. object.fileName = encrypted.filename
  206. object.fileNameIdentifier = fileNameIdentifier
  207. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  208. object.key = encrypted.key
  209. object.initializationVector = initializationVector
  210. object.metadataKey = metadataKey
  211. object.metadataKeyIndex = metadataKeyIndex
  212. object.metadataVersion = metadataVersion
  213. object.mimeType = encrypted.mimetype
  214. object.serverUrl = serverUrl
  215. // If exists remove records
  216. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  217. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  218. // Write file parameter for decrypted on DB
  219. NCManageDatabase.shared.addE2eEncryption(object)
  220. // Update metadata on tableMetadata
  221. metadata.fileNameView = encrypted.filename
  222. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  223. metadata.contentType = results.mimeType
  224. metadata.iconName = results.iconName
  225. metadata.classFile = results.classFile
  226. NCManageDatabase.shared.addMetadata(metadata)
  227. }
  228. } catch let error {
  229. print("Serious internal error in decoding files (" + error.localizedDescription + ")")
  230. return false
  231. }
  232. }
  233. }
  234. }
  235. } catch let error {
  236. print("Serious internal error in decoding metadata (" + error.localizedDescription + ")")
  237. return false
  238. }
  239. return true
  240. }
  241. // --------------------------------------------------------------------------------------------
  242. // MARK: Decode JSON Metadata V12
  243. // --------------------------------------------------------------------------------------------
  244. func decoderMetadataV12(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> Bool {
  245. guard let data = json.data(using: .utf8) else { return false }
  246. let decoder = JSONDecoder()
  247. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  248. do {
  249. let json = try decoder.decode(E2eeV12.self, from: data)
  250. let metadata = json.metadata
  251. let files = json.files
  252. let filedrop = json.filedrop
  253. var metadataKey = ""
  254. let metadataVersion = metadata.version
  255. //
  256. // metadata
  257. //
  258. let data = Data(base64Encoded: metadata.metadataKey)
  259. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  260. let keyData = Data(base64Encoded: decrypted),
  261. let key = String(data: keyData, encoding: .utf8) {
  262. metadataKey = key
  263. } else {
  264. print("Serious internal error in decoding metadataKey")
  265. return false
  266. }
  267. //
  268. // files
  269. //
  270. if let files = files {
  271. for files in files {
  272. let fileNameIdentifier = files.key
  273. let files = files.value as E2eeV12.Files
  274. let encrypted = files.encrypted
  275. let authenticationTag = files.authenticationTag
  276. let initializationVector = files.initializationVector
  277. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(encrypted, key: metadataKey),
  278. let decryptedData = Data(base64Encoded: decrypted) {
  279. do {
  280. decryptedData.printJson()
  281. let encrypted = try decoder.decode(E2eeV12.Encrypted.self, from: decryptedData)
  282. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  283. let object = tableE2eEncryption()
  284. object.account = account
  285. object.authenticationTag = authenticationTag ?? ""
  286. object.blob = "files"
  287. object.fileName = encrypted.filename
  288. object.fileNameIdentifier = fileNameIdentifier
  289. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  290. object.key = encrypted.key
  291. object.initializationVector = initializationVector
  292. object.metadataKey = metadataKey
  293. object.metadataVersion = metadataVersion
  294. object.mimeType = encrypted.mimetype
  295. object.serverUrl = serverUrl
  296. // If exists remove records
  297. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  298. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  299. // Write file parameter for decrypted on DB
  300. NCManageDatabase.shared.addE2eEncryption(object)
  301. // Update metadata on tableMetadata
  302. metadata.fileNameView = encrypted.filename
  303. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  304. metadata.contentType = results.mimeType
  305. metadata.iconName = results.iconName
  306. metadata.classFile = results.classFile
  307. NCManageDatabase.shared.addMetadata(metadata)
  308. }
  309. } catch let error {
  310. print("Serious internal error in decoding files (" + error.localizedDescription + ")")
  311. return false
  312. }
  313. }
  314. }
  315. }
  316. //
  317. // filedrop
  318. //
  319. if let filedrop = filedrop {
  320. for filedrop in filedrop {
  321. let fileNameIdentifier = filedrop.key
  322. let filedrop = filedrop.value as E2eeV12.Filedrop
  323. let encrypted = filedrop.encrypted
  324. let authenticationTag = filedrop.authenticationTag
  325. let initializationVector = filedrop.initializationVector
  326. /*
  327. if let encryptedData = NSData(base64Encoded: encrypted, options: NSData.Base64DecodingOptions(rawValue: 0)),
  328. let encryptedBase64 = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(encryptedData as Data?, privateKey: privateKey),
  329. let encryptedBase64Data = Data(base64Encoded: encryptedBase64, options: NSData.Base64DecodingOptions(rawValue: 0)),
  330. let encrypted = String(data: encryptedBase64Data, encoding: .utf8),
  331. let encryptedData = encrypted.data(using: .utf8) {
  332. */
  333. let data = Data(base64Encoded: encrypted)
  334. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  335. let decryptedData = Data(base64Encoded: decrypted) {
  336. do {
  337. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  338. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  339. let object = tableE2eEncryption()
  340. object.account = account
  341. object.authenticationTag = authenticationTag ?? ""
  342. object.blob = "filedrop"
  343. object.fileName = encrypted.filename
  344. object.fileNameIdentifier = fileNameIdentifier
  345. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  346. object.key = encrypted.key
  347. object.initializationVector = initializationVector
  348. object.metadataKey = metadataKey
  349. object.metadataVersion = metadataVersion
  350. object.mimeType = encrypted.mimetype
  351. object.serverUrl = serverUrl
  352. // If exists remove records
  353. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  354. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  355. // Write file parameter for decrypted on DB
  356. NCManageDatabase.shared.addE2eEncryption(object)
  357. // Update metadata on tableMetadata
  358. metadata.fileNameView = encrypted.filename
  359. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  360. metadata.contentType = results.mimeType
  361. metadata.iconName = results.iconName
  362. metadata.classFile = results.classFile
  363. NCManageDatabase.shared.addMetadata(metadata)
  364. }
  365. } catch let error {
  366. print("Serious internal error in decoding filedrop (" + error.localizedDescription + ")")
  367. return false
  368. }
  369. }
  370. }
  371. }
  372. } catch let error {
  373. print("Serious internal error in decoding metadata (" + error.localizedDescription + ")")
  374. return false
  375. }
  376. return true
  377. }
  378. }