NCEndToEndMetadata.swift 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500
  1. //
  2. // NCEndToEndMetadata.swift
  3. // Nextcloud
  4. //
  5. // Created by Marino Faggiana on 13/11/17.
  6. // Copyright © 2017 Marino Faggiana. All rights reserved.
  7. //
  8. // Author Marino Faggiana <marino.faggiana@nextcloud.com>
  9. //
  10. // This program is free software: you can redistribute it and/or modify
  11. // it under the terms of the GNU General Public License as published by
  12. // the Free Software Foundation, either version 3 of the License, or
  13. // (at your option) any later version.
  14. //
  15. // This program is distributed in the hope that it will be useful,
  16. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. // GNU General Public License for more details.
  19. //
  20. // You should have received a copy of the GNU General Public License
  21. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  22. //
  23. import UIKit
  24. import NextcloudKit
  25. class NCEndToEndMetadata: NSObject {
  26. struct E2eeV1: Codable {
  27. struct Metadata: Codable {
  28. let metadataKeys: [String: String]
  29. let version: Double
  30. }
  31. struct Encrypted: Codable {
  32. let key: String
  33. let filename: String
  34. let mimetype: String
  35. }
  36. struct Files: Codable {
  37. let initializationVector: String
  38. let authenticationTag: String?
  39. let metadataKey: Int
  40. let encrypted: String
  41. }
  42. let metadata: Metadata
  43. let files: [String: Files]?
  44. }
  45. struct E2eeV12: Codable {
  46. struct Metadata: Codable {
  47. let metadataKey: String
  48. let version: Double
  49. let checksum: String?
  50. }
  51. struct Encrypted: Codable {
  52. let key: String
  53. let filename: String
  54. let mimetype: String
  55. }
  56. struct Files: Codable {
  57. let initializationVector: String
  58. let authenticationTag: String?
  59. let encrypted: String
  60. }
  61. struct Filedrop: Codable {
  62. let initializationVector: String
  63. let authenticationTag: String?
  64. let encrypted: String
  65. let encryptedKey: String?
  66. let encryptedTag: String?
  67. let encryptedInitializationVector: String?
  68. }
  69. let metadata: Metadata
  70. let files: [String: Files]?
  71. let filedrop: [String: Filedrop]?
  72. }
  73. // --------------------------------------------------------------------------------------------
  74. // MARK: Encode JSON Metadata V1.2
  75. // --------------------------------------------------------------------------------------------
  76. func encoderMetadata(_ items: [tableE2eEncryption], account: String, serverUrl: String) -> String? {
  77. let encoder = JSONEncoder()
  78. var metadataKey: String = ""
  79. let metadataVersion = 1.2
  80. var files: [String: E2eeV12.Files] = [:]
  81. var filesCodable: [String: E2eeV12.Files]?
  82. var filedrop: [String: E2eeV12.Filedrop] = [:]
  83. var filedropCodable: [String: E2eeV12.Filedrop]?
  84. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  85. var fileNameIdentifiers: [String] = []
  86. // let shortVersion: String = Bundle.main.infoDictionary?["CFBundleShortVersionString"] as? String ?? ""
  87. // var filesCodable: [String: E2eeV12.Files] = [String: E2eeV12.Files]()
  88. // var filedropCodable: [String: E2eeV12.Filedrop] = [String: E2eeV12.Filedrop]()
  89. //
  90. // metadata
  91. //
  92. if items.isEmpty, let key = NCEndToEndEncryption.sharedManager()?.generateKey() as? NSData {
  93. if let key = key.base64EncodedString().data(using: .utf8)?.base64EncodedString(),
  94. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(key, publicKey: nil, privateKey: privateKey) {
  95. metadataKey = metadataKeyEncrypted.base64EncodedString()
  96. }
  97. } else if let metadatakey = (items.first!.metadataKey.data(using: .utf8)?.base64EncodedString()),
  98. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(metadatakey, publicKey: nil, privateKey: privateKey) {
  99. metadataKey = metadataKeyEncrypted.base64EncodedString()
  100. }
  101. for item in items {
  102. //
  103. // files
  104. //
  105. if item.blob == "files" {
  106. let encrypted = E2eeV12.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType)
  107. do {
  108. // Create "encrypted"
  109. let json = try encoder.encode(encrypted)
  110. if let encrypted = NCEndToEndEncryption.sharedManager().encryptPayloadFile(String(data: json, encoding: .utf8), key: item.metadataKey) {
  111. let record = E2eeV12.Files(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, encrypted: encrypted)
  112. files.updateValue(record, forKey: item.fileNameIdentifier)
  113. }
  114. fileNameIdentifiers.append(item.fileNameIdentifier)
  115. } catch let error {
  116. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  117. return nil
  118. }
  119. }
  120. //
  121. // filedrop
  122. //
  123. if item.blob == "filedrop" {
  124. var encryptedKey: String?
  125. var encryptedInitializationVector: NSString?
  126. var encryptedTag: NSString?
  127. if let metadataKeyFiledrop = (item.metadataKeyFiledrop.data(using: .utf8)?.base64EncodedString()),
  128. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(metadataKeyFiledrop, publicKey: nil, privateKey: privateKey) {
  129. encryptedKey = metadataKeyEncrypted.base64EncodedString()
  130. }
  131. let encrypted = E2eeV12.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType)
  132. do {
  133. // Create "encrypted"
  134. let json = try encoder.encode(encrypted)
  135. if let encrypted = NCEndToEndEncryption.sharedManager().encryptPayloadFile(String(data: json, encoding: .utf8), key: item.metadataKeyFiledrop, initializationVector: &encryptedInitializationVector, authenticationTag: &encryptedTag) {
  136. let record = E2eeV12.Filedrop(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, encrypted: encrypted, encryptedKey: encryptedKey, encryptedTag: encryptedTag as? String, encryptedInitializationVector: encryptedInitializationVector as? String)
  137. filedrop.updateValue(record, forKey: item.fileNameIdentifier)
  138. }
  139. } catch let error {
  140. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  141. return nil
  142. }
  143. }
  144. }
  145. // Create checksum
  146. let passphrase = CCUtility.getEndToEndPassphrase(account).replacingOccurrences(of: " ", with: "")
  147. let checksum = NCEndToEndEncryption.sharedManager().createSHA256(passphrase + fileNameIdentifiers.sorted().joined() + metadataKey)
  148. // Create Json
  149. let metadata = E2eeV12.Metadata(metadataKey: metadataKey, version: metadataVersion, checksum: checksum)
  150. if !files.isEmpty { filesCodable = files }
  151. if !filedrop.isEmpty { filedropCodable = filedrop }
  152. let e2ee = E2eeV12(metadata: metadata, files: filesCodable, filedrop: filedropCodable)
  153. do {
  154. let data = try encoder.encode(e2ee)
  155. data.printJson()
  156. let jsonString = String(data: data, encoding: .utf8)
  157. // Updated metadata to 1.2
  158. if NCManageDatabase.shared.getE2eMetadata(account: account, serverUrl: serverUrl) == nil {
  159. NCManageDatabase.shared.setE2eMetadata(account: account, serverUrl: serverUrl, metadataKey: metadataKey, version: metadataVersion)
  160. }
  161. return jsonString
  162. } catch let error {
  163. print("Serious internal error in encoding e2ee (" + error.localizedDescription + ")")
  164. return nil
  165. }
  166. }
  167. // --------------------------------------------------------------------------------------------
  168. // MARK: Decode JSON Metadata Bridge
  169. // --------------------------------------------------------------------------------------------
  170. func decoderMetadata(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> (version: Double, metadataKey: String, error: NKError) {
  171. guard let data = json.data(using: .utf8) else {
  172. return (0, "", NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON"))
  173. }
  174. data.printJson()
  175. let decoder = JSONDecoder()
  176. if (try? decoder.decode(E2eeV1.self, from: data)) != nil {
  177. return decoderMetadataV1(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId)
  178. } else if (try? decoder.decode(E2eeV12.self, from: data)) != nil {
  179. return decoderMetadataV12(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId, ownerId: ownerId)
  180. } else {
  181. return (0, "", NKError(errorCode: NCGlobal.shared.errorInternalError, errorDescription: "Server E2EE version " + NCGlobal.shared.capabilityE2EEApiVersion + ", not compatible"))
  182. }
  183. }
  184. // --------------------------------------------------------------------------------------------
  185. // MARK: Decode JSON Metadata V1.1
  186. // --------------------------------------------------------------------------------------------
  187. func decoderMetadataV1(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String) -> (version: Double, metadataKey: String, error: NKError) {
  188. guard let data = json.data(using: .utf8) else {
  189. return (0, "", NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON"))
  190. }
  191. let decoder = JSONDecoder()
  192. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  193. var metadataVersion: Double = 0
  194. do {
  195. let json = try decoder.decode(E2eeV1.self, from: data)
  196. let metadata = json.metadata
  197. let files = json.files
  198. var metadataKeys: [String: String] = [:]
  199. metadataVersion = metadata.version
  200. // DATA
  201. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  202. //
  203. // metadata
  204. //
  205. for metadataKey in metadata.metadataKeys {
  206. let data = Data(base64Encoded: metadataKey.value)
  207. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  208. let keyData = Data(base64Encoded: decrypted) {
  209. let key = String(data: keyData, encoding: .utf8)
  210. metadataKeys[metadataKey.key] = key
  211. }
  212. }
  213. //
  214. // verify version
  215. //
  216. if let tableE2eMetadata = NCManageDatabase.shared.getE2eMetadata(account: account, serverUrl: serverUrl) {
  217. if tableE2eMetadata.version > metadataVersion {
  218. return (metadataVersion, "", NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error verify version \(tableE2eMetadata.version)"))
  219. }
  220. }
  221. //
  222. // files
  223. //
  224. if let files = files {
  225. for files in files {
  226. let fileNameIdentifier = files.key
  227. let files = files.value as E2eeV1.Files
  228. let encrypted = files.encrypted
  229. let authenticationTag = files.authenticationTag
  230. guard let metadataKey = metadataKeys["\(files.metadataKey)"] else { continue }
  231. let metadataKeyIndex = files.metadataKey
  232. let initializationVector = files.initializationVector
  233. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(encrypted, key: metadataKey),
  234. let decryptedData = Data(base64Encoded: decrypted) {
  235. do {
  236. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  237. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  238. let object = tableE2eEncryption()
  239. object.account = account
  240. object.authenticationTag = authenticationTag ?? ""
  241. object.blob = "files"
  242. object.fileName = encrypted.filename
  243. object.fileNameIdentifier = fileNameIdentifier
  244. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  245. object.key = encrypted.key
  246. object.initializationVector = initializationVector
  247. object.metadataKey = metadataKey
  248. object.metadataKeyIndex = metadataKeyIndex
  249. object.metadataVersion = metadataVersion
  250. object.mimeType = encrypted.mimetype
  251. object.serverUrl = serverUrl
  252. // Write file parameter for decrypted on DB
  253. NCManageDatabase.shared.addE2eEncryption(object)
  254. // Update metadata on tableMetadata
  255. metadata.fileNameView = encrypted.filename
  256. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  257. metadata.contentType = results.mimeType
  258. metadata.iconName = results.iconName
  259. metadata.classFile = results.classFile
  260. NCManageDatabase.shared.addMetadata(metadata)
  261. }
  262. } catch let error {
  263. return (metadataVersion, metadataKey, NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt file: " + error.localizedDescription))
  264. }
  265. }
  266. }
  267. }
  268. } catch let error {
  269. return (metadataVersion, "", NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: error.localizedDescription))
  270. }
  271. return (metadataVersion, "", NKError())
  272. }
  273. // --------------------------------------------------------------------------------------------
  274. // MARK: Decode JSON Metadata V1.2
  275. // --------------------------------------------------------------------------------------------
  276. func decoderMetadataV12(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> (version: Double, metadataKey: String, error: NKError) {
  277. guard let data = json.data(using: .utf8) else {
  278. return (0, "", NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON"))
  279. }
  280. let decoder = JSONDecoder()
  281. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  282. var metadataVersion: Double = 0
  283. var metadataKey = ""
  284. do {
  285. let json = try decoder.decode(E2eeV12.self, from: data)
  286. let metadata = json.metadata
  287. let files = json.files
  288. let filedrop = json.filedrop
  289. var fileNameIdentifiers: [String] = []
  290. metadataVersion = metadata.version
  291. //
  292. // metadata
  293. //
  294. let data = Data(base64Encoded: metadata.metadataKey)
  295. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  296. let keyData = Data(base64Encoded: decrypted),
  297. let key = String(data: keyData, encoding: .utf8) {
  298. metadataKey = key
  299. } else {
  300. return (metadataVersion, "", NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt metadataKey"))
  301. }
  302. // DATA
  303. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  304. //
  305. // files
  306. //
  307. if let files = files {
  308. for file in files {
  309. let fileNameIdentifier = file.key
  310. let files = file.value as E2eeV12.Files
  311. let encrypted = files.encrypted
  312. let authenticationTag = files.authenticationTag
  313. let initializationVector = files.initializationVector
  314. fileNameIdentifiers.append(fileNameIdentifier)
  315. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(encrypted, key: metadataKey),
  316. let decryptedData = Data(base64Encoded: decrypted) {
  317. do {
  318. decryptedData.printJson()
  319. let encrypted = try decoder.decode(E2eeV12.Encrypted.self, from: decryptedData)
  320. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  321. let object = tableE2eEncryption()
  322. object.account = account
  323. object.authenticationTag = authenticationTag ?? ""
  324. object.blob = "files"
  325. object.fileName = encrypted.filename
  326. object.fileNameIdentifier = fileNameIdentifier
  327. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  328. object.key = encrypted.key
  329. object.initializationVector = initializationVector
  330. object.metadataKey = metadataKey
  331. object.metadataVersion = metadataVersion
  332. object.mimeType = encrypted.mimetype
  333. object.serverUrl = serverUrl
  334. // Write file parameter for decrypted on DB
  335. NCManageDatabase.shared.addE2eEncryption(object)
  336. // Update metadata on tableMetadata
  337. metadata.fileNameView = encrypted.filename
  338. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  339. metadata.contentType = results.mimeType
  340. metadata.iconName = results.iconName
  341. metadata.classFile = results.classFile
  342. NCManageDatabase.shared.addMetadata(metadata)
  343. }
  344. } catch let error {
  345. return (metadataVersion, metadataKey, NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt file: " + error.localizedDescription))
  346. }
  347. }
  348. }
  349. }
  350. //
  351. // filedrop
  352. //
  353. if let filedrop = filedrop {
  354. for filedrop in filedrop {
  355. let fileNameIdentifier = filedrop.key
  356. let filedrop = filedrop.value as E2eeV12.Filedrop
  357. var metadataKeyFiledrop: String?
  358. if let encryptedKey = filedrop.encryptedKey,
  359. let data = Data(base64Encoded: encryptedKey),
  360. let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey) {
  361. let keyData = Data(base64Encoded: decrypted)
  362. metadataKeyFiledrop = String(data: keyData!, encoding: .utf8)
  363. }
  364. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(filedrop.encrypted, key: metadataKeyFiledrop, initializationVector: filedrop.encryptedInitializationVector, authenticationTag: filedrop.encryptedTag),
  365. let decryptedData = Data(base64Encoded: decrypted) {
  366. do {
  367. decryptedData.printJson()
  368. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  369. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  370. let object = tableE2eEncryption()
  371. object.account = account
  372. object.authenticationTag = filedrop.authenticationTag ?? ""
  373. object.blob = "filedrop"
  374. object.fileName = encrypted.filename
  375. object.fileNameIdentifier = fileNameIdentifier
  376. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  377. object.key = encrypted.key
  378. object.metadataKeyFiledrop = metadataKeyFiledrop ?? ""
  379. object.initializationVector = filedrop.initializationVector
  380. object.metadataKey = metadataKey
  381. object.metadataVersion = metadataVersion
  382. object.mimeType = encrypted.mimetype
  383. object.serverUrl = serverUrl
  384. // Write file parameter for decrypted on DB
  385. NCManageDatabase.shared.addE2eEncryption(object)
  386. // Update metadata on tableMetadata
  387. metadata.fileNameView = encrypted.filename
  388. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  389. metadata.contentType = results.mimeType
  390. metadata.iconName = results.iconName
  391. metadata.classFile = results.classFile
  392. NCManageDatabase.shared.addMetadata(metadata)
  393. }
  394. } catch let error {
  395. return (metadataVersion, metadataKey, NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt filedrop: " + error.localizedDescription))
  396. }
  397. }
  398. }
  399. }
  400. // verify checksum
  401. let passphrase = CCUtility.getEndToEndPassphrase(account).replacingOccurrences(of: " ", with: "")
  402. let checksum = NCEndToEndEncryption.sharedManager().createSHA256(passphrase + fileNameIdentifiers.sorted().joined() + metadata.metadataKey)
  403. if metadata.checksum != checksum {
  404. return (metadataVersion, metadataKey, NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error checksum"))
  405. }
  406. } catch let error {
  407. return (metadataVersion, metadataKey, NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: error.localizedDescription))
  408. }
  409. return (metadataVersion, metadataKey, NKError())
  410. }
  411. }