NCEndToEndMetadata.swift 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534
  1. //
  2. // NCEndToEndMetadata.swift
  3. // Nextcloud
  4. //
  5. // Created by Marino Faggiana on 13/11/17.
  6. // Copyright © 2017 Marino Faggiana. All rights reserved.
  7. //
  8. // Author Marino Faggiana <marino.faggiana@nextcloud.com>
  9. //
  10. // This program is free software: you can redistribute it and/or modify
  11. // it under the terms of the GNU General Public License as published by
  12. // the Free Software Foundation, either version 3 of the License, or
  13. // (at your option) any later version.
  14. //
  15. // This program is distributed in the hope that it will be useful,
  16. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. // GNU General Public License for more details.
  19. //
  20. // You should have received a copy of the GNU General Public License
  21. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  22. //
  23. import UIKit
  24. import NextcloudKit
  25. class NCEndToEndMetadata: NSObject {
  26. struct E2eeV1: Codable {
  27. struct Metadata: Codable {
  28. let metadataKeys: [String: String]
  29. let version: Int
  30. }
  31. struct Encrypted: Codable {
  32. let key: String
  33. let filename: String
  34. let mimetype: String
  35. let version: Int
  36. }
  37. struct Files: Codable {
  38. let initializationVector: String
  39. let authenticationTag: String?
  40. let metadataKey: Int
  41. let encrypted: String
  42. }
  43. struct Filedrop: Codable {
  44. let initializationVector: String
  45. let authenticationTag: String?
  46. let metadataKey: Int
  47. let encrypted: String
  48. }
  49. let metadata: Metadata
  50. let files: [String: Files]?
  51. let filedrop: [String: Filedrop]?
  52. }
  53. struct E2eeV12: Codable {
  54. struct Metadata: Codable {
  55. let metadataKey: String
  56. //let version: Int?
  57. }
  58. struct Encrypted: Codable {
  59. let key: String
  60. let filename: String
  61. let mimetype: String
  62. }
  63. struct Files: Codable {
  64. let initializationVector: String
  65. let authenticationTag: String?
  66. let encrypted: String
  67. }
  68. struct Filedrop: Codable {
  69. let initializationVector: String
  70. let authenticationTag: String?
  71. let encrypted: String
  72. }
  73. let metadata: Metadata
  74. let files: [String: Files]?
  75. let filedrop: [String: Filedrop]?
  76. }
  77. // --------------------------------------------------------------------------------------------
  78. // MARK: Encode JSON Metadata V1
  79. // --------------------------------------------------------------------------------------------
  80. func encoderMetadata(_ items: [tableE2eEncryption], account: String, serverUrl: String) -> String? {
  81. let encoder = JSONEncoder()
  82. var metadataKeys: [String: String] = [:]
  83. let metadataVersion: Int = 1
  84. var files: [String: E2eeV1.Files] = [:]
  85. var filesCodable: [String: E2eeV1.Files]?
  86. var filedrop: [String: E2eeV1.Filedrop] = [:]
  87. var filedropCodable: [String: E2eeV1.Filedrop]?
  88. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  89. for item in items {
  90. //
  91. // metadata
  92. //
  93. if let metadatakey = (item.metadataKey.data(using: .utf8)?.base64EncodedString()),
  94. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(metadatakey, publicKey: nil, privateKey: privateKey) {
  95. let metadataKeyEncryptedBase64 = metadataKeyEncrypted.base64EncodedString()
  96. metadataKeys["\(item.metadataKeyIndex)"] = metadataKeyEncryptedBase64
  97. }
  98. //
  99. // files
  100. //
  101. if item.blob == "files" {
  102. let encrypted = E2eeV1.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType, version: item.version)
  103. do {
  104. // Create "encrypted"
  105. let json = try encoder.encode(encrypted)
  106. let encryptedString = String(data: json, encoding: .utf8)
  107. if let encrypted = NCEndToEndEncryption.sharedManager().encryptEncryptedJson(encryptedString, key: item.metadataKey) {
  108. let record = E2eeV1.Files(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, metadataKey: 0, encrypted: encrypted)
  109. files.updateValue(record, forKey: item.fileNameIdentifier)
  110. }
  111. } catch let error {
  112. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  113. return nil
  114. }
  115. }
  116. //
  117. // filedrop
  118. //
  119. if item.blob == "filedrop" {
  120. let encrypted = E2eeV1.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType, version: item.version)
  121. do {
  122. // Create "encrypted"
  123. let json = try encoder.encode(encrypted)
  124. let encryptedString = (json.base64EncodedString())
  125. if let encryptedData = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(encryptedString, publicKey: nil, privateKey: privateKey) {
  126. let encrypted = encryptedData.base64EncodedString()
  127. let record = E2eeV1.Filedrop(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, metadataKey: 0, encrypted: encrypted)
  128. filedrop.updateValue(record, forKey: item.fileNameIdentifier)
  129. }
  130. } catch let error {
  131. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  132. return nil
  133. }
  134. }
  135. }
  136. // Create Json
  137. let metadata = E2eeV1.Metadata(metadataKeys: metadataKeys, version: metadataVersion)
  138. if !files.isEmpty { filesCodable = files }
  139. if !filedrop.isEmpty { filedropCodable = filedrop }
  140. let e2ee = E2eeV1(metadata: metadata, files: filesCodable, filedrop: filedropCodable)
  141. do {
  142. let data = try encoder.encode(e2ee)
  143. data.printJson()
  144. let jsonString = String(data: data, encoding: .utf8)
  145. return jsonString
  146. } catch let error {
  147. print("Serious internal error in encoding e2ee (" + error.localizedDescription + ")")
  148. return nil
  149. }
  150. }
  151. // --------------------------------------------------------------------------------------------
  152. // MARK: Decode JSON Metadata Bridge
  153. // --------------------------------------------------------------------------------------------
  154. func decoderMetadata(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> Bool {
  155. guard let data = json.data(using: .utf8) else { return false }
  156. data.printJson()
  157. let decoder = JSONDecoder()
  158. if (try? decoder.decode(E2eeV1.self, from: data)) != nil {
  159. return decoderMetadataV1(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId)
  160. } else if (try? decoder.decode(E2eeV12.self, from: data)) != nil {
  161. return decoderMetadataV12(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId, ownerId: ownerId)
  162. } else {
  163. return false
  164. }
  165. }
  166. // --------------------------------------------------------------------------------------------
  167. // MARK: Decode JSON Metadata V1
  168. // --------------------------------------------------------------------------------------------
  169. func decoderMetadataV1(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String) -> Bool {
  170. guard let data = json.data(using: .utf8) else { return false }
  171. let decoder = JSONDecoder()
  172. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  173. do {
  174. data.printJson()
  175. let json = try decoder.decode(E2eeV1.self, from: data)
  176. let metadata = json.metadata
  177. let files = json.files
  178. let filedrop = json.filedrop
  179. var metadataKeys: [String: String] = [:]
  180. let metadataVersion: Int = metadata.version
  181. //
  182. // metadata
  183. //
  184. for metadataKey in metadata.metadataKeys {
  185. let data = Data(base64Encoded: metadataKey.value)
  186. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  187. let keyData = Data(base64Encoded: decrypted) {
  188. let key = String(data: keyData, encoding: .utf8)
  189. metadataKeys[metadataKey.key] = key
  190. }
  191. }
  192. //
  193. // files
  194. //
  195. if let files = files {
  196. for files in files {
  197. let fileNameIdentifier = files.key
  198. let files = files.value as E2eeV1.Files
  199. let encrypted = files.encrypted
  200. let authenticationTag = files.authenticationTag
  201. guard let metadataKey = metadataKeys["\(files.metadataKey)"] else { continue }
  202. let metadataKeyIndex = files.metadataKey
  203. let initializationVector = files.initializationVector
  204. if let decrypted = NCEndToEndEncryption.sharedManager().decryptEncryptedJson(encrypted, key: metadataKey),
  205. let decryptedData = Data(base64Encoded: decrypted) {
  206. do {
  207. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  208. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  209. let object = tableE2eEncryption()
  210. object.account = account
  211. object.authenticationTag = authenticationTag ?? ""
  212. object.blob = "files"
  213. object.fileName = encrypted.filename
  214. object.fileNameIdentifier = fileNameIdentifier
  215. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  216. object.key = encrypted.key
  217. object.initializationVector = initializationVector
  218. object.metadataKey = metadataKey
  219. object.metadataKeyIndex = metadataKeyIndex
  220. object.metadataVersion = metadataVersion
  221. object.mimeType = encrypted.mimetype
  222. object.serverUrl = serverUrl
  223. object.version = encrypted.version
  224. // If exists remove records
  225. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  226. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  227. // Write file parameter for decrypted on DB
  228. NCManageDatabase.shared.addE2eEncryption(object)
  229. // Update metadata on tableMetadata
  230. metadata.fileNameView = encrypted.filename
  231. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  232. metadata.contentType = results.mimeType
  233. metadata.iconName = results.iconName
  234. metadata.classFile = results.classFile
  235. NCManageDatabase.shared.addMetadata(metadata)
  236. }
  237. } catch let error {
  238. print("Serious internal error in decoding files (" + error.localizedDescription + ")")
  239. return false
  240. }
  241. }
  242. }
  243. }
  244. //
  245. // filedrop
  246. //
  247. if let filedrop = filedrop {
  248. for filedrop in filedrop {
  249. let fileNameIdentifier = filedrop.key
  250. let filedrop = filedrop.value as E2eeV1.Filedrop
  251. let encrypted = filedrop.encrypted
  252. let authenticationTag = filedrop.authenticationTag
  253. guard let metadataKey = metadataKeys["\(filedrop.metadataKey)"] else { continue }
  254. let metadataKeyIndex = filedrop.metadataKey
  255. let initializationVector = filedrop.initializationVector
  256. if let encryptedData = NSData(base64Encoded: encrypted, options: NSData.Base64DecodingOptions(rawValue: 0)),
  257. let encryptedBase64 = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(encryptedData as Data?, privateKey: privateKey),
  258. let encryptedBase64Data = Data(base64Encoded: encryptedBase64, options: NSData.Base64DecodingOptions(rawValue: 0)),
  259. let encrypted = String(data: encryptedBase64Data, encoding: .utf8),
  260. let encryptedData = encrypted.data(using: .utf8) {
  261. do {
  262. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: encryptedData)
  263. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  264. let object = tableE2eEncryption()
  265. object.account = account
  266. object.authenticationTag = authenticationTag ?? ""
  267. object.blob = "filedrop"
  268. object.fileName = encrypted.filename
  269. object.fileNameIdentifier = fileNameIdentifier
  270. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  271. object.key = encrypted.key
  272. object.initializationVector = initializationVector
  273. object.metadataKey = metadataKey
  274. object.metadataKeyIndex = metadataKeyIndex
  275. object.metadataVersion = metadataVersion
  276. object.mimeType = encrypted.mimetype
  277. object.serverUrl = serverUrl
  278. object.version = encrypted.version
  279. // If exists remove records
  280. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  281. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  282. // Write file parameter for decrypted on DB
  283. NCManageDatabase.shared.addE2eEncryption(object)
  284. // Update metadata on tableMetadata
  285. metadata.fileNameView = encrypted.filename
  286. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  287. metadata.contentType = results.mimeType
  288. metadata.iconName = results.iconName
  289. metadata.classFile = results.classFile
  290. NCManageDatabase.shared.addMetadata(metadata)
  291. }
  292. } catch let error {
  293. print("Serious internal error in decoding filedrop (" + error.localizedDescription + ")")
  294. return false
  295. }
  296. }
  297. }
  298. }
  299. } catch let error {
  300. print("Serious internal error in decoding metadata (" + error.localizedDescription + ")")
  301. return false
  302. }
  303. return true
  304. }
  305. // --------------------------------------------------------------------------------------------
  306. // MARK: Decode JSON Metadata V2
  307. // --------------------------------------------------------------------------------------------
  308. func decoderMetadataV12(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> Bool {
  309. guard let data = json.data(using: .utf8) else { return false }
  310. let decoder = JSONDecoder()
  311. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  312. do {
  313. data.printJson()
  314. let json = try decoder.decode(E2eeV12.self, from: data)
  315. let metadata = json.metadata
  316. let files = json.files
  317. let filedrop = json.filedrop
  318. var metadataKey = ""
  319. //
  320. // metadata
  321. //
  322. let data = Data(base64Encoded: metadata.metadataKey)
  323. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  324. let keyData = Data(base64Encoded: decrypted) {
  325. metadataKey = String(data: keyData, encoding: .utf8) ?? ""
  326. }
  327. //
  328. // files
  329. //
  330. if let files = files {
  331. for files in files {
  332. let fileNameIdentifier = files.key
  333. let files = files.value as E2eeV12.Files
  334. let encrypted = files.encrypted
  335. let authenticationTag = files.authenticationTag
  336. let initializationVector = files.initializationVector
  337. if let decrypted = NCEndToEndEncryption.sharedManager().decryptEncryptedJson(encrypted, key: metadataKey),
  338. let decryptedData = Data(base64Encoded: decrypted) {
  339. do {
  340. decryptedData.printJson()
  341. let encrypted = try decoder.decode(E2eeV12.Encrypted.self, from: decryptedData)
  342. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  343. let object = tableE2eEncryption()
  344. object.account = account
  345. object.authenticationTag = authenticationTag ?? ""
  346. object.blob = "files"
  347. object.fileName = encrypted.filename
  348. object.fileNameIdentifier = fileNameIdentifier
  349. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  350. object.key = encrypted.key
  351. object.initializationVector = initializationVector
  352. object.metadataKey = metadataKey
  353. object.metadataKeyIndex = 0
  354. object.metadataVersion = 0
  355. object.mimeType = encrypted.mimetype
  356. object.serverUrl = serverUrl
  357. object.version = 0 // encrypted.version
  358. // If exists remove records
  359. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  360. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  361. // Write file parameter for decrypted on DB
  362. NCManageDatabase.shared.addE2eEncryption(object)
  363. // Update metadata on tableMetadata
  364. metadata.fileNameView = encrypted.filename
  365. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  366. metadata.contentType = results.mimeType
  367. metadata.iconName = results.iconName
  368. metadata.classFile = results.classFile
  369. NCManageDatabase.shared.addMetadata(metadata)
  370. }
  371. } catch let error {
  372. print("Serious internal error in decoding files (" + error.localizedDescription + ")")
  373. return false
  374. }
  375. }
  376. }
  377. }
  378. //
  379. // filedrop
  380. //
  381. if let filedrop = filedrop {
  382. for filedrop in filedrop {
  383. let fileNameIdentifier = filedrop.key
  384. let filedrop = filedrop.value as E2eeV12.Filedrop
  385. let encrypted = filedrop.encrypted
  386. let authenticationTag = filedrop.authenticationTag
  387. let initializationVector = filedrop.initializationVector
  388. if let encryptedData = NSData(base64Encoded: encrypted, options: NSData.Base64DecodingOptions(rawValue: 0)),
  389. let encryptedBase64 = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(encryptedData as Data?, privateKey: privateKey),
  390. let encryptedBase64Data = Data(base64Encoded: encryptedBase64, options: NSData.Base64DecodingOptions(rawValue: 0)),
  391. let encrypted = String(data: encryptedBase64Data, encoding: .utf8),
  392. let encryptedData = encrypted.data(using: .utf8) {
  393. do {
  394. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: encryptedData)
  395. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  396. let object = tableE2eEncryption()
  397. object.account = account
  398. object.authenticationTag = authenticationTag ?? ""
  399. object.blob = "filedrop"
  400. object.fileName = encrypted.filename
  401. object.fileNameIdentifier = fileNameIdentifier
  402. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  403. object.key = encrypted.key
  404. object.initializationVector = initializationVector
  405. object.metadataKey = metadataKey
  406. object.metadataKeyIndex = 0
  407. object.metadataVersion = 0
  408. object.mimeType = encrypted.mimetype
  409. object.serverUrl = serverUrl
  410. object.version = encrypted.version
  411. // If exists remove records
  412. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNamePath == %@", object.account, object.fileNamePath))
  413. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND fileNameIdentifier == %@", object.account, object.fileNameIdentifier))
  414. // Write file parameter for decrypted on DB
  415. NCManageDatabase.shared.addE2eEncryption(object)
  416. // Update metadata on tableMetadata
  417. metadata.fileNameView = encrypted.filename
  418. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  419. metadata.contentType = results.mimeType
  420. metadata.iconName = results.iconName
  421. metadata.classFile = results.classFile
  422. NCManageDatabase.shared.addMetadata(metadata)
  423. }
  424. } catch let error {
  425. print("Serious internal error in decoding filedrop (" + error.localizedDescription + ")")
  426. return false
  427. }
  428. }
  429. }
  430. }
  431. } catch let error {
  432. print("Serious internal error in decoding metadata (" + error.localizedDescription + ")")
  433. return false
  434. }
  435. return true
  436. }
  437. }