NCEndToEndMetadata.swift 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461
  1. //
  2. // NCEndToEndMetadata.swift
  3. // Nextcloud
  4. //
  5. // Created by Marino Faggiana on 13/11/17.
  6. // Copyright © 2017 Marino Faggiana. All rights reserved.
  7. //
  8. // Author Marino Faggiana <marino.faggiana@nextcloud.com>
  9. //
  10. // This program is free software: you can redistribute it and/or modify
  11. // it under the terms of the GNU General Public License as published by
  12. // the Free Software Foundation, either version 3 of the License, or
  13. // (at your option) any later version.
  14. //
  15. // This program is distributed in the hope that it will be useful,
  16. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. // GNU General Public License for more details.
  19. //
  20. // You should have received a copy of the GNU General Public License
  21. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  22. //
  23. import UIKit
  24. import NextcloudKit
  25. class NCEndToEndMetadata: NSObject {
  26. struct E2eeV1: Codable {
  27. struct Metadata: Codable {
  28. let metadataKeys: [String: String]
  29. let version: Double
  30. }
  31. struct Encrypted: Codable {
  32. let key: String
  33. let filename: String
  34. let mimetype: String
  35. }
  36. struct Files: Codable {
  37. let initializationVector: String
  38. let authenticationTag: String?
  39. let metadataKey: Int
  40. let encrypted: String
  41. }
  42. let metadata: Metadata
  43. let files: [String: Files]?
  44. }
  45. struct E2eeV12: Codable {
  46. struct Metadata: Codable {
  47. let metadataKey: String
  48. let version: Double
  49. }
  50. struct Encrypted: Codable {
  51. let key: String
  52. let filename: String
  53. let mimetype: String
  54. }
  55. struct Files: Codable {
  56. let initializationVector: String
  57. let authenticationTag: String?
  58. let encrypted: String
  59. }
  60. struct Filedrop: Codable {
  61. let initializationVector: String
  62. let authenticationTag: String?
  63. let encrypted: String
  64. }
  65. let metadata: Metadata
  66. let files: [String: Files]?
  67. let filedrop: [String: Filedrop]?
  68. }
  69. // --------------------------------------------------------------------------------------------
  70. // MARK: Encode JSON Metadata V1.2
  71. // --------------------------------------------------------------------------------------------
  72. func encoderMetadata(_ items: [tableE2eEncryption], account: String, serverUrl: String) -> String? {
  73. let encoder = JSONEncoder()
  74. var metadataKey: String = ""
  75. let metadataVersion = 1.2
  76. var files: [String: E2eeV12.Files] = [:]
  77. var filesCodable: [String: E2eeV12.Files]?
  78. var filedrop: [String: E2eeV12.Filedrop] = [:]
  79. var filedropCodable: [String: E2eeV12.Filedrop]?
  80. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  81. for item in items {
  82. //
  83. // metadata
  84. //
  85. if let metadatakey = (item.metadataKey.data(using: .utf8)?.base64EncodedString()),
  86. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(metadatakey, publicKey: nil, privateKey: privateKey) {
  87. metadataKey = metadataKeyEncrypted.base64EncodedString()
  88. }
  89. //
  90. // files
  91. //
  92. if item.blob == "files" {
  93. let encrypted = E2eeV12.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType)
  94. do {
  95. // Create "encrypted"
  96. let json = try encoder.encode(encrypted)
  97. let encryptedString = String(data: json, encoding: .utf8)
  98. if let encrypted = NCEndToEndEncryption.sharedManager().encryptPayloadFile(encryptedString, key: item.metadataKey) {
  99. let record = E2eeV12.Files(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, encrypted: encrypted)
  100. files.updateValue(record, forKey: item.fileNameIdentifier)
  101. }
  102. } catch let error {
  103. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  104. return nil
  105. }
  106. }
  107. //
  108. // filedrop
  109. //
  110. if item.blob == "filedrop" {
  111. let encrypted = E2eeV12.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType)
  112. do {
  113. // Create "encrypted"
  114. let json = try encoder.encode(encrypted)
  115. let encryptedString = (json.base64EncodedString())
  116. if let encryptedData = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(encryptedString, publicKey: nil, privateKey: privateKey) {
  117. let encrypted = encryptedData.base64EncodedString()
  118. let record = E2eeV12.Filedrop(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, encrypted: encrypted)
  119. filedrop.updateValue(record, forKey: item.fileNameIdentifier)
  120. }
  121. } catch let error {
  122. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  123. return nil
  124. }
  125. }
  126. }
  127. // Create Json
  128. let metadata = E2eeV12.Metadata(metadataKey: metadataKey, version: metadataVersion)
  129. if !files.isEmpty { filesCodable = files }
  130. if !filedrop.isEmpty { filedropCodable = filedrop }
  131. let e2ee = E2eeV12(metadata: metadata, files: filesCodable, filedrop: filedropCodable)
  132. do {
  133. let data = try encoder.encode(e2ee)
  134. data.printJson()
  135. let jsonString = String(data: data, encoding: .utf8)
  136. return jsonString
  137. } catch let error {
  138. print("Serious internal error in encoding e2ee (" + error.localizedDescription + ")")
  139. return nil
  140. }
  141. }
  142. // --------------------------------------------------------------------------------------------
  143. // MARK: Decode JSON Metadata Bridge
  144. // --------------------------------------------------------------------------------------------
  145. func decoderMetadata(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> Bool {
  146. guard let data = json.data(using: .utf8) else { return false }
  147. let versionE2EE = NCManageDatabase.shared.getCapabilitiesServerString(account: account, elements: NCElementsJSON.shared.capabilitiesE2EEApiVersion) ?? ""
  148. data.printJson()
  149. let decoder = JSONDecoder()
  150. if (try? decoder.decode(E2eeV1.self, from: data)) != nil {
  151. return decoderMetadataV1(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId)
  152. } else if (try? decoder.decode(E2eeV12.self, from: data)) != nil {
  153. return decoderMetadataV12(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId, ownerId: ownerId)
  154. } else {
  155. let error = NKError(errorCode: NCGlobal.shared.errorInternalError, errorDescription: "Server E2EE version " + versionE2EE + ", not compatible")
  156. NCContentPresenter.shared.showError(error: error)
  157. return false
  158. }
  159. }
  160. // --------------------------------------------------------------------------------------------
  161. // MARK: Decode JSON Metadata V1
  162. // --------------------------------------------------------------------------------------------
  163. func decoderMetadataV1(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String) -> Bool {
  164. guard let data = json.data(using: .utf8) else { return false }
  165. let decoder = JSONDecoder()
  166. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  167. do {
  168. data.printJson()
  169. let json = try decoder.decode(E2eeV1.self, from: data)
  170. let metadata = json.metadata
  171. let files = json.files
  172. var metadataKeys: [String: String] = [:]
  173. let metadataVersion = metadata.version
  174. //
  175. // metadata
  176. //
  177. for metadataKey in metadata.metadataKeys {
  178. let data = Data(base64Encoded: metadataKey.value)
  179. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  180. let keyData = Data(base64Encoded: decrypted) {
  181. let key = String(data: keyData, encoding: .utf8)
  182. metadataKeys[metadataKey.key] = key
  183. }
  184. }
  185. //
  186. // files
  187. //
  188. if let files = files {
  189. for files in files {
  190. let fileNameIdentifier = files.key
  191. let files = files.value as E2eeV1.Files
  192. let encrypted = files.encrypted
  193. let authenticationTag = files.authenticationTag
  194. guard let metadataKey = metadataKeys["\(files.metadataKey)"] else { continue }
  195. let metadataKeyIndex = files.metadataKey
  196. let initializationVector = files.initializationVector
  197. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(encrypted, key: metadataKey),
  198. let decryptedData = Data(base64Encoded: decrypted) {
  199. do {
  200. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  201. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  202. let object = tableE2eEncryption()
  203. object.account = account
  204. object.authenticationTag = authenticationTag ?? ""
  205. object.blob = "files"
  206. object.fileName = encrypted.filename
  207. object.fileNameIdentifier = fileNameIdentifier
  208. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  209. object.key = encrypted.key
  210. object.initializationVector = initializationVector
  211. object.metadataKey = metadataKey
  212. object.metadataKeyIndex = metadataKeyIndex
  213. object.metadataVersion = metadataVersion
  214. object.mimeType = encrypted.mimetype
  215. object.serverUrl = serverUrl
  216. // If exists remove records
  217. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  218. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  219. // Write file parameter for decrypted on DB
  220. NCManageDatabase.shared.addE2eEncryption(object)
  221. // Update metadata on tableMetadata
  222. metadata.fileNameView = encrypted.filename
  223. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  224. metadata.contentType = results.mimeType
  225. metadata.iconName = results.iconName
  226. metadata.classFile = results.classFile
  227. NCManageDatabase.shared.addMetadata(metadata)
  228. }
  229. } catch let error {
  230. print("Serious internal error in decoding files (" + error.localizedDescription + ")")
  231. return false
  232. }
  233. }
  234. }
  235. }
  236. } catch let error {
  237. print("Serious internal error in decoding metadata (" + error.localizedDescription + ")")
  238. return false
  239. }
  240. return true
  241. }
  242. // --------------------------------------------------------------------------------------------
  243. // MARK: Decode JSON Metadata V12
  244. // --------------------------------------------------------------------------------------------
  245. func decoderMetadataV12(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> Bool {
  246. guard let data = json.data(using: .utf8) else { return false }
  247. let decoder = JSONDecoder()
  248. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  249. do {
  250. data.printJson()
  251. let json = try decoder.decode(E2eeV12.self, from: data)
  252. let metadata = json.metadata
  253. let files = json.files
  254. let filedrop = json.filedrop
  255. var metadataKey = ""
  256. let metadataVersion = metadata.version
  257. //
  258. // metadata
  259. //
  260. let data = Data(base64Encoded: metadata.metadataKey)
  261. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  262. let keyData = Data(base64Encoded: decrypted),
  263. let key = String(data: keyData, encoding: .utf8) {
  264. metadataKey = key
  265. } else {
  266. print("Serious internal error in decoding metadataKey")
  267. return false
  268. }
  269. //
  270. // files
  271. //
  272. if let files = files {
  273. for files in files {
  274. let fileNameIdentifier = files.key
  275. let files = files.value as E2eeV12.Files
  276. let encrypted = files.encrypted
  277. let authenticationTag = files.authenticationTag
  278. let initializationVector = files.initializationVector
  279. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(encrypted, key: metadataKey),
  280. let decryptedData = Data(base64Encoded: decrypted) {
  281. do {
  282. decryptedData.printJson()
  283. let encrypted = try decoder.decode(E2eeV12.Encrypted.self, from: decryptedData)
  284. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  285. let object = tableE2eEncryption()
  286. object.account = account
  287. object.authenticationTag = authenticationTag ?? ""
  288. object.blob = "files"
  289. object.fileName = encrypted.filename
  290. object.fileNameIdentifier = fileNameIdentifier
  291. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  292. object.key = encrypted.key
  293. object.initializationVector = initializationVector
  294. object.metadataKey = metadataKey
  295. object.metadataVersion = metadataVersion
  296. object.mimeType = encrypted.mimetype
  297. object.serverUrl = serverUrl
  298. // If exists remove records
  299. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  300. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  301. // Write file parameter for decrypted on DB
  302. NCManageDatabase.shared.addE2eEncryption(object)
  303. // Update metadata on tableMetadata
  304. metadata.fileNameView = encrypted.filename
  305. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  306. metadata.contentType = results.mimeType
  307. metadata.iconName = results.iconName
  308. metadata.classFile = results.classFile
  309. NCManageDatabase.shared.addMetadata(metadata)
  310. }
  311. } catch let error {
  312. print("Serious internal error in decoding files (" + error.localizedDescription + ")")
  313. return false
  314. }
  315. }
  316. }
  317. }
  318. //
  319. // filedrop
  320. //
  321. if let filedrop = filedrop {
  322. for filedrop in filedrop {
  323. let fileNameIdentifier = filedrop.key
  324. let filedrop = filedrop.value as E2eeV12.Filedrop
  325. let encrypted = filedrop.encrypted
  326. let authenticationTag = filedrop.authenticationTag
  327. let initializationVector = filedrop.initializationVector
  328. /*
  329. if let encryptedData = NSData(base64Encoded: encrypted, options: NSData.Base64DecodingOptions(rawValue: 0)),
  330. let encryptedBase64 = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(encryptedData as Data?, privateKey: privateKey),
  331. let encryptedBase64Data = Data(base64Encoded: encryptedBase64, options: NSData.Base64DecodingOptions(rawValue: 0)),
  332. let encrypted = String(data: encryptedBase64Data, encoding: .utf8),
  333. let encryptedData = encrypted.data(using: .utf8) {
  334. */
  335. let data = Data(base64Encoded: encrypted)
  336. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  337. let decryptedData = Data(base64Encoded: decrypted) {
  338. do {
  339. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  340. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  341. let object = tableE2eEncryption()
  342. object.account = account
  343. object.authenticationTag = authenticationTag ?? ""
  344. object.blob = "filedrop"
  345. object.fileName = encrypted.filename
  346. object.fileNameIdentifier = fileNameIdentifier
  347. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  348. object.key = encrypted.key
  349. object.initializationVector = initializationVector
  350. object.metadataKey = metadataKey
  351. object.metadataVersion = metadataVersion
  352. object.mimeType = encrypted.mimetype
  353. object.serverUrl = serverUrl
  354. // If exists remove records
  355. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  356. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  357. // Write file parameter for decrypted on DB
  358. NCManageDatabase.shared.addE2eEncryption(object)
  359. // Update metadata on tableMetadata
  360. metadata.fileNameView = encrypted.filename
  361. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  362. metadata.contentType = results.mimeType
  363. metadata.iconName = results.iconName
  364. metadata.classFile = results.classFile
  365. NCManageDatabase.shared.addMetadata(metadata)
  366. }
  367. } catch let error {
  368. print("Serious internal error in decoding filedrop (" + error.localizedDescription + ")")
  369. return false
  370. }
  371. }
  372. }
  373. }
  374. } catch let error {
  375. print("Serious internal error in decoding metadata (" + error.localizedDescription + ")")
  376. return false
  377. }
  378. return true
  379. }
  380. }