NCEndToEndMetadata.swift 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534
  1. //
  2. // NCEndToEndMetadata.swift
  3. // Nextcloud
  4. //
  5. // Created by Marino Faggiana on 13/11/17.
  6. // Copyright © 2017 Marino Faggiana. All rights reserved.
  7. //
  8. // Author Marino Faggiana <marino.faggiana@nextcloud.com>
  9. //
  10. // This program is free software: you can redistribute it and/or modify
  11. // it under the terms of the GNU General Public License as published by
  12. // the Free Software Foundation, either version 3 of the License, or
  13. // (at your option) any later version.
  14. //
  15. // This program is distributed in the hope that it will be useful,
  16. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. // GNU General Public License for more details.
  19. //
  20. // You should have received a copy of the GNU General Public License
  21. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  22. //
  23. import UIKit
  24. import NextcloudKit
  25. class NCEndToEndMetadata: NSObject {
  26. struct E2eeV1: Codable {
  27. struct Metadata: Codable {
  28. let metadataKeys: [String: String]
  29. let version: Int
  30. }
  31. struct Encrypted: Codable {
  32. let key: String
  33. let filename: String
  34. let mimetype: String
  35. let version: Int
  36. }
  37. struct Files: Codable {
  38. let initializationVector: String
  39. let authenticationTag: String?
  40. let metadataKey: Int
  41. let encrypted: String
  42. }
  43. struct Filedrop: Codable {
  44. let initializationVector: String
  45. let authenticationTag: String?
  46. let metadataKey: Int
  47. let encrypted: String
  48. }
  49. let metadata: Metadata
  50. let files: [String: Files]?
  51. let filedrop: [String: Filedrop]?
  52. }
  53. struct E2eeV12: Codable {
  54. struct Metadata: Codable {
  55. let metadataKey: String
  56. //let version: Int?
  57. }
  58. struct Encrypted: Codable {
  59. let key: String
  60. let filename: String
  61. let mimetype: String
  62. let version: Int
  63. }
  64. struct Files: Codable {
  65. let initializationVector: String
  66. let authenticationTag: String?
  67. let encrypted: String
  68. }
  69. struct Filedrop: Codable {
  70. let initializationVector: String
  71. let authenticationTag: String?
  72. let encrypted: String
  73. }
  74. let metadata: Metadata
  75. let files: [String: Files]?
  76. let filedrop: [String: Filedrop]?
  77. }
  78. // --------------------------------------------------------------------------------------------
  79. // MARK: Encode JSON Metadata V1
  80. // --------------------------------------------------------------------------------------------
  81. func encoderMetadata(_ items: [tableE2eEncryption], account: String, serverUrl: String) -> String? {
  82. let encoder = JSONEncoder()
  83. var metadataKeys: [String: String] = [:]
  84. let metadataVersion: Int = 1
  85. var files: [String: E2eeV1.Files] = [:]
  86. var filesCodable: [String: E2eeV1.Files]?
  87. var filedrop: [String: E2eeV1.Filedrop] = [:]
  88. var filedropCodable: [String: E2eeV1.Filedrop]?
  89. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  90. for item in items {
  91. //
  92. // metadata
  93. //
  94. if let metadatakey = (item.metadataKey.data(using: .utf8)?.base64EncodedString()),
  95. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(metadatakey, publicKey: nil, privateKey: privateKey) {
  96. let metadataKeyEncryptedBase64 = metadataKeyEncrypted.base64EncodedString()
  97. metadataKeys["\(item.metadataKeyIndex)"] = metadataKeyEncryptedBase64
  98. }
  99. //
  100. // files
  101. //
  102. if item.blob == "files" {
  103. let encrypted = E2eeV1.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType, version: item.version)
  104. do {
  105. // Create "encrypted"
  106. let json = try encoder.encode(encrypted)
  107. let encryptedString = String(data: json, encoding: .utf8)
  108. if let encrypted = NCEndToEndEncryption.sharedManager().encryptEncryptedJson(encryptedString, key: item.metadataKey) {
  109. let record = E2eeV1.Files(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, metadataKey: 0, encrypted: encrypted)
  110. files.updateValue(record, forKey: item.fileNameIdentifier)
  111. }
  112. } catch let error {
  113. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  114. return nil
  115. }
  116. }
  117. //
  118. // filedrop
  119. //
  120. if item.blob == "filedrop" {
  121. let encrypted = E2eeV1.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType, version: item.version)
  122. do {
  123. // Create "encrypted"
  124. let json = try encoder.encode(encrypted)
  125. let encryptedString = (json.base64EncodedString())
  126. if let encryptedData = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(encryptedString, publicKey: nil, privateKey: privateKey) {
  127. let encrypted = encryptedData.base64EncodedString()
  128. let record = E2eeV1.Filedrop(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, metadataKey: 0, encrypted: encrypted)
  129. filedrop.updateValue(record, forKey: item.fileNameIdentifier)
  130. }
  131. } catch let error {
  132. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  133. return nil
  134. }
  135. }
  136. }
  137. // Create Json
  138. let metadata = E2eeV1.Metadata(metadataKeys: metadataKeys, version: metadataVersion)
  139. if !files.isEmpty { filesCodable = files }
  140. if !filedrop.isEmpty { filedropCodable = filedrop }
  141. let e2ee = E2eeV1(metadata: metadata, files: filesCodable, filedrop: filedropCodable)
  142. do {
  143. let data = try encoder.encode(e2ee)
  144. data.printJson()
  145. let jsonString = String(data: data, encoding: .utf8)
  146. return jsonString
  147. } catch let error {
  148. print("Serious internal error in encoding e2ee (" + error.localizedDescription + ")")
  149. return nil
  150. }
  151. }
  152. // --------------------------------------------------------------------------------------------
  153. // MARK: Decode JSON Metadata Bridge
  154. // --------------------------------------------------------------------------------------------
  155. func decoderMetadata(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> Bool {
  156. guard let data = json.data(using: .utf8) else { return false }
  157. data.printJson()
  158. let decoder = JSONDecoder()
  159. if (try? decoder.decode(E2eeV1.self, from: data)) != nil {
  160. return decoderMetadataV1(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId)
  161. } else if (try? decoder.decode(E2eeV12.self, from: data)) != nil {
  162. return decoderMetadataV12(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId, ownerId: ownerId)
  163. } else {
  164. return false
  165. }
  166. }
  167. // --------------------------------------------------------------------------------------------
  168. // MARK: Decode JSON Metadata V1
  169. // --------------------------------------------------------------------------------------------
  170. func decoderMetadataV1(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String) -> Bool {
  171. guard let data = json.data(using: .utf8) else { return false }
  172. let decoder = JSONDecoder()
  173. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  174. do {
  175. data.printJson()
  176. let json = try decoder.decode(E2eeV1.self, from: data)
  177. let metadata = json.metadata
  178. let files = json.files
  179. let filedrop = json.filedrop
  180. var metadataKeys: [String: String] = [:]
  181. let metadataVersion: Int = metadata.version
  182. //
  183. // metadata
  184. //
  185. for metadataKey in metadata.metadataKeys {
  186. let data = Data(base64Encoded: metadataKey.value)
  187. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  188. let keyData = Data(base64Encoded: decrypted) {
  189. let key = String(data: keyData, encoding: .utf8)
  190. metadataKeys[metadataKey.key] = key
  191. }
  192. }
  193. //
  194. // files
  195. //
  196. if let files = files {
  197. for files in files {
  198. let fileNameIdentifier = files.key
  199. let files = files.value as E2eeV1.Files
  200. let encrypted = files.encrypted
  201. let authenticationTag = files.authenticationTag
  202. guard let metadataKey = metadataKeys["\(files.metadataKey)"] else { continue }
  203. let metadataKeyIndex = files.metadataKey
  204. let initializationVector = files.initializationVector
  205. if let encrypted = NCEndToEndEncryption.sharedManager().decryptEncryptedJson(encrypted, key: metadataKey),
  206. let encryptedData = encrypted.data(using: .utf8) {
  207. do {
  208. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: encryptedData)
  209. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  210. let object = tableE2eEncryption()
  211. object.account = account
  212. object.authenticationTag = authenticationTag ?? ""
  213. object.blob = "files"
  214. object.fileName = encrypted.filename
  215. object.fileNameIdentifier = fileNameIdentifier
  216. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  217. object.key = encrypted.key
  218. object.initializationVector = initializationVector
  219. object.metadataKey = metadataKey
  220. object.metadataKeyIndex = metadataKeyIndex
  221. object.metadataVersion = metadataVersion
  222. object.mimeType = encrypted.mimetype
  223. object.serverUrl = serverUrl
  224. object.version = encrypted.version
  225. // If exists remove records
  226. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  227. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  228. // Write file parameter for decrypted on DB
  229. NCManageDatabase.shared.addE2eEncryption(object)
  230. // Update metadata on tableMetadata
  231. metadata.fileNameView = encrypted.filename
  232. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  233. metadata.contentType = results.mimeType
  234. metadata.iconName = results.iconName
  235. metadata.classFile = results.classFile
  236. NCManageDatabase.shared.addMetadata(metadata)
  237. }
  238. } catch let error {
  239. print("Serious internal error in decoding files (" + error.localizedDescription + ")")
  240. return false
  241. }
  242. }
  243. }
  244. }
  245. //
  246. // filedrop
  247. //
  248. if let filedrop = filedrop {
  249. for filedrop in filedrop {
  250. let fileNameIdentifier = filedrop.key
  251. let filedrop = filedrop.value as E2eeV1.Filedrop
  252. let encrypted = filedrop.encrypted
  253. let authenticationTag = filedrop.authenticationTag
  254. guard let metadataKey = metadataKeys["\(filedrop.metadataKey)"] else { continue }
  255. let metadataKeyIndex = filedrop.metadataKey
  256. let initializationVector = filedrop.initializationVector
  257. if let encryptedData = NSData(base64Encoded: encrypted, options: NSData.Base64DecodingOptions(rawValue: 0)),
  258. let encryptedBase64 = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(encryptedData as Data?, privateKey: privateKey),
  259. let encryptedBase64Data = Data(base64Encoded: encryptedBase64, options: NSData.Base64DecodingOptions(rawValue: 0)),
  260. let encrypted = String(data: encryptedBase64Data, encoding: .utf8),
  261. let encryptedData = encrypted.data(using: .utf8) {
  262. do {
  263. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: encryptedData)
  264. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  265. let object = tableE2eEncryption()
  266. object.account = account
  267. object.authenticationTag = authenticationTag ?? ""
  268. object.blob = "filedrop"
  269. object.fileName = encrypted.filename
  270. object.fileNameIdentifier = fileNameIdentifier
  271. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  272. object.key = encrypted.key
  273. object.initializationVector = initializationVector
  274. object.metadataKey = metadataKey
  275. object.metadataKeyIndex = metadataKeyIndex
  276. object.metadataVersion = metadataVersion
  277. object.mimeType = encrypted.mimetype
  278. object.serverUrl = serverUrl
  279. object.version = encrypted.version
  280. // If exists remove records
  281. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  282. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  283. // Write file parameter for decrypted on DB
  284. NCManageDatabase.shared.addE2eEncryption(object)
  285. // Update metadata on tableMetadata
  286. metadata.fileNameView = encrypted.filename
  287. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  288. metadata.contentType = results.mimeType
  289. metadata.iconName = results.iconName
  290. metadata.classFile = results.classFile
  291. NCManageDatabase.shared.addMetadata(metadata)
  292. }
  293. } catch let error {
  294. print("Serious internal error in decoding filedrop (" + error.localizedDescription + ")")
  295. return false
  296. }
  297. }
  298. }
  299. }
  300. } catch let error {
  301. print("Serious internal error in decoding metadata (" + error.localizedDescription + ")")
  302. return false
  303. }
  304. return true
  305. }
  306. // --------------------------------------------------------------------------------------------
  307. // MARK: Decode JSON Metadata V2
  308. // --------------------------------------------------------------------------------------------
  309. func decoderMetadataV12(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> Bool {
  310. guard let data = json.data(using: .utf8) else { return false }
  311. let decoder = JSONDecoder()
  312. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  313. do {
  314. data.printJson()
  315. let json = try decoder.decode(E2eeV12.self, from: data)
  316. let metadata = json.metadata
  317. let files = json.files
  318. let filedrop = json.filedrop
  319. var metadataKey = ""
  320. //
  321. // metadata
  322. //
  323. let data = Data(base64Encoded: metadata.metadataKey)
  324. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  325. let keyData = Data(base64Encoded: decrypted) {
  326. metadataKey = String(data: keyData, encoding: .utf8) ?? ""
  327. }
  328. //
  329. // files
  330. //
  331. if let files = files {
  332. for files in files {
  333. let fileNameIdentifier = files.key
  334. let files = files.value as E2eeV12.Files
  335. let encrypted = files.encrypted
  336. let authenticationTag = files.authenticationTag
  337. let initializationVector = files.initializationVector
  338. if let decrypted = NCEndToEndEncryption.sharedManager().decryptEncryptedJsonV12(encrypted, key: metadataKey),
  339. let decryptedData = Data(base64Encoded: decrypted) {
  340. do {
  341. let encrypted = try decoder.decode(E2eeV12.Encrypted.self, from: decryptedData)
  342. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  343. let object = tableE2eEncryption()
  344. object.account = account
  345. object.authenticationTag = authenticationTag ?? ""
  346. object.blob = "files"
  347. object.fileName = encrypted.filename
  348. object.fileNameIdentifier = fileNameIdentifier
  349. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  350. object.key = encrypted.key
  351. object.initializationVector = initializationVector
  352. object.metadataKey = metadataKey
  353. object.metadataKeyIndex = 0
  354. object.metadataVersion = 0
  355. object.mimeType = encrypted.mimetype
  356. object.serverUrl = serverUrl
  357. object.version = encrypted.version
  358. // If exists remove records
  359. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  360. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  361. // Write file parameter for decrypted on DB
  362. NCManageDatabase.shared.addE2eEncryption(object)
  363. // Update metadata on tableMetadata
  364. metadata.fileNameView = encrypted.filename
  365. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  366. metadata.contentType = results.mimeType
  367. metadata.iconName = results.iconName
  368. metadata.classFile = results.classFile
  369. NCManageDatabase.shared.addMetadata(metadata)
  370. }
  371. } catch let error {
  372. print("Serious internal error in decoding files (" + error.localizedDescription + ")")
  373. return false
  374. }
  375. }
  376. }
  377. }
  378. //
  379. // filedrop
  380. //
  381. if let filedrop = filedrop {
  382. for filedrop in filedrop {
  383. let fileNameIdentifier = filedrop.key
  384. let filedrop = filedrop.value as E2eeV12.Filedrop
  385. let encrypted = filedrop.encrypted
  386. let authenticationTag = filedrop.authenticationTag
  387. let initializationVector = filedrop.initializationVector
  388. if let encryptedData = NSData(base64Encoded: encrypted, options: NSData.Base64DecodingOptions(rawValue: 0)),
  389. let encryptedBase64 = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(encryptedData as Data?, privateKey: privateKey),
  390. let encryptedBase64Data = Data(base64Encoded: encryptedBase64, options: NSData.Base64DecodingOptions(rawValue: 0)),
  391. let encrypted = String(data: encryptedBase64Data, encoding: .utf8),
  392. let encryptedData = encrypted.data(using: .utf8) {
  393. do {
  394. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: encryptedData)
  395. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  396. let object = tableE2eEncryption()
  397. object.account = account
  398. object.authenticationTag = authenticationTag ?? ""
  399. object.blob = "filedrop"
  400. object.fileName = encrypted.filename
  401. object.fileNameIdentifier = fileNameIdentifier
  402. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  403. object.key = encrypted.key
  404. object.initializationVector = initializationVector
  405. object.metadataKey = metadataKey
  406. object.metadataKeyIndex = 0
  407. object.metadataVersion = 0
  408. object.mimeType = encrypted.mimetype
  409. object.serverUrl = serverUrl
  410. object.version = encrypted.version
  411. // If exists remove records
  412. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  413. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  414. // Write file parameter for decrypted on DB
  415. NCManageDatabase.shared.addE2eEncryption(object)
  416. // Update metadata on tableMetadata
  417. metadata.fileNameView = encrypted.filename
  418. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  419. metadata.contentType = results.mimeType
  420. metadata.iconName = results.iconName
  421. metadata.classFile = results.classFile
  422. NCManageDatabase.shared.addMetadata(metadata)
  423. }
  424. } catch let error {
  425. print("Serious internal error in decoding filedrop (" + error.localizedDescription + ")")
  426. return false
  427. }
  428. }
  429. }
  430. }
  431. } catch let error {
  432. print("Serious internal error in decoding metadata (" + error.localizedDescription + ")")
  433. return false
  434. }
  435. return true
  436. }
  437. }