NCEntoToEndInterface.swift 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465
  1. //
  2. // NCEntoToEndInterface.swift
  3. // Nextcloud
  4. //
  5. // Created by Marino Faggiana on 03/04/17.
  6. // Copyright © 2017 TWS. All rights reserved.
  7. //
  8. // Author Marino Faggiana <m.faggiana@twsweb.it>
  9. //
  10. // This program is free software: you can redistribute it and/or modify
  11. // it under the terms of the GNU General Public License as published by
  12. // the Free Software Foundation, either version 3 of the License, or
  13. // (at your option) any later version.
  14. //
  15. // This program is distributed in the hope that it will be useful,
  16. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. // GNU General Public License for more details.
  19. //
  20. // You should have received a copy of the GNU General Public License
  21. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  22. //
  23. import Foundation
  24. class NCEntoToEndInterface : NSObject, OCNetworkingDelegate {
  25. let appDelegate = UIApplication.shared.delegate as! AppDelegate
  26. override init() {
  27. }
  28. // --------------------------------------------------------------------------------------------
  29. // MARK: Initialize
  30. // --------------------------------------------------------------------------------------------
  31. @objc func initEndToEndEncryption() {
  32. // Clear all keys
  33. CCUtility.clearAllKeysEnd(toEnd: appDelegate.activeAccount)
  34. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  35. metadataNet.action = actionGetEndToEndPublicKeys
  36. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  37. }
  38. func getPrivateKeyCipher() {
  39. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  40. metadataNet.action = actionGetEndToEndPrivateKeyCipher
  41. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  42. }
  43. func getPublicKeyServer() {
  44. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  45. metadataNet.action = actionGetEndToEndServerPublicKey
  46. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  47. }
  48. // --------------------------------------------------------------------------------------------
  49. // MARK: Manage PublicKey
  50. // --------------------------------------------------------------------------------------------
  51. func getEndToEndPublicKeysSuccess(_ metadataNet: CCMetadataNet!) {
  52. CCUtility.setEndToEndPublicKey(appDelegate.activeAccount, publicKey: metadataNet.key)
  53. // Request PrivateKey chiper to Server
  54. getPrivateKeyCipher()
  55. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndPublicKeys, note: "E2E PublicKey present on Server and stored to keychain", type: k_activityTypeSuccess, verbose: false, activeUrl: "")
  56. }
  57. func getEndToEndPublicKeysFailure(_ metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  58. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndPublicKeys, note: message as String!, type: k_activityTypeFailure, verbose: false, activeUrl: "")
  59. switch errorCode {
  60. case 400:
  61. appDelegate.messageNotification("E2E publicKey", description: "bad request: unpredictable internal error", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  62. case 404:
  63. guard let csr = NCEndToEndEncryption.sharedManager().createCSR(appDelegate.activeUserID, directoryUser: appDelegate.directoryUser) else {
  64. appDelegate.messageNotification("E2E Csr", description: "E2E Error to create Csr", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  65. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndPublicKeys, note: "E2E Error to create Csr", type: k_activityTypeFailure, verbose: false, activeUrl: "")
  66. return
  67. }
  68. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  69. metadataNet.action = actionSignEndToEndPublicKey;
  70. metadataNet.key = csr;
  71. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  72. case 409:
  73. appDelegate.messageNotification("E2E publicKey", description: "forbidden: the user can't access the public keys", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  74. default:
  75. appDelegate.messageNotification("E2E publicKey", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  76. }
  77. }
  78. func signEnd(toEndPublicKeySuccess metadataNet: CCMetadataNet!) {
  79. guard let publicKey = metadataNet.key else {
  80. appDelegate.messageNotification("E2E publicKey", description: "Error : publicKey not present", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: 0)
  81. return
  82. }
  83. CCUtility.setEndToEndPublicKey(appDelegate.activeAccount, publicKey: publicKey)
  84. // Request PrivateKey chiper to Server
  85. getPrivateKeyCipher()
  86. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionSignEndToEndPublicKey, note: "E2E Csr - publicKey sign on Server and stored publicKey locally", type: k_activityTypeFailure, verbose: false, activeUrl: "")
  87. }
  88. func signEnd(toEndPublicKeyFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  89. appDelegate.messageNotification("E2E sign Csr - publicKey", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  90. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionSignEndToEndPublicKey, note: message, type: k_activityTypeFailure, verbose: false, activeUrl: "")
  91. }
  92. func deleteEnd(toEndPublicKeySuccess metadataNet: CCMetadataNet!) {
  93. appDelegate.messageNotification("E2E delete publicKey", description: "Success", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.success, errorCode: 0)
  94. }
  95. func deleteEnd(toEndPublicKeyFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  96. appDelegate.messageNotification("E2E delete publicKey", description: message, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  97. }
  98. // --------------------------------------------------------------------------------------------
  99. // MARK: Manage PrivateKey
  100. // --------------------------------------------------------------------------------------------
  101. func getEndToEndPrivateKeyCipherSuccess(_ metadataNet: CCMetadataNet!) {
  102. // request Passphrase
  103. var passphraseTextField: UITextField?
  104. let alertController = UIAlertController(title: NSLocalizedString("_e2e_passphrase_request_title_", comment: ""), message: NSLocalizedString("_e2e_passphrase_request_message_", comment: ""), preferredStyle: .alert)
  105. let ok = UIAlertAction(title: "OK", style: .default, handler: { (action) -> Void in
  106. let passphrase = passphraseTextField?.text
  107. let publicKey = CCUtility.getEndToEndPublicKey(self.appDelegate.activeAccount)
  108. guard (NCEndToEndEncryption.sharedManager().decryptPrivateKey(metadataNet.key, passphrase: passphrase, publicKey: publicKey)) != nil else {
  109. self.appDelegate.messageNotification("E2E decrypt privateKey", description: "E2E Error to decrypt Private Key", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: 0)
  110. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndPrivateKeyCipher, note: "E2E Error to decrypt PrivateKey", type: k_activityTypeFailure, verbose: false, activeUrl: "")
  111. return
  112. }
  113. // Save to keychain
  114. CCUtility.setEndToEndPrivateKeyCipher(self.appDelegate.activeAccount, privateKeyCipher: metadataNet.key)
  115. CCUtility.setEndToEndPassphrase(self.appDelegate.activeAccount, passphrase:passphrase)
  116. // request publicKey Server()
  117. self.getPublicKeyServer()
  118. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndPrivateKeyCipher, note: "E2E PrivateKey present on Server and stored to keychain", type: k_activityTypeSuccess, verbose: false, activeUrl: "")
  119. })
  120. let cancel = UIAlertAction(title: "Cancel", style: .cancel) { (action) -> Void in
  121. }
  122. alertController.addAction(ok)
  123. alertController.addAction(cancel)
  124. alertController.addTextField { (textField) -> Void in
  125. passphraseTextField = textField
  126. passphraseTextField?.placeholder = "Enter passphrase (12 words)"
  127. }
  128. appDelegate.activeMain.present(alertController, animated: true)
  129. }
  130. func getEndToEndPrivateKeyCipherFailure(_ metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  131. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndPrivateKeyCipher, note: message as String!, type: k_activityTypeFailure, verbose: false, activeUrl: "")
  132. switch errorCode {
  133. case 400:
  134. appDelegate.messageNotification("E2E privateKey", description: "bad request: unpredictable internal error", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  135. case 404:
  136. // message
  137. let e2ePassphrase = NYMnemonic.generateString(128, language: "english")
  138. let message = "\n" + NSLocalizedString("_e2e_settings_view_passphrase_", comment: "") + "\n\n" + e2ePassphrase!
  139. let alertController = UIAlertController(title: NSLocalizedString("_e2e_settings_title_", comment: ""), message: NSLocalizedString(message, comment: ""), preferredStyle: .alert)
  140. let OKAction = UIAlertAction(title: NSLocalizedString("_ok_", comment: ""), style: .default) { action in
  141. guard let privateKeyChiper = NCEndToEndEncryption.sharedManager().encryptPrivateKey(self.appDelegate.activeUserID, directoryUser: self.appDelegate.directoryUser, passphrase: e2ePassphrase) else {
  142. self.appDelegate.messageNotification("E2E privateKey", description: "E2E Error to create PrivateKey chiper", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  143. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndPrivateKeyCipher, note: "E2E Error to create PrivateKey chiper", type: k_activityTypeFailure, verbose: false, activeUrl: "")
  144. return
  145. }
  146. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: self.appDelegate.activeAccount)
  147. metadataNet.action = actionStoreEndToEndPrivateKeyCipher
  148. metadataNet.key = privateKeyChiper
  149. metadataNet.password = e2ePassphrase
  150. self.appDelegate.addNetworkingOperationQueue(self.appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  151. }
  152. alertController.addAction(OKAction)
  153. appDelegate.activeMain.present(alertController, animated: true)
  154. case 409:
  155. appDelegate.messageNotification("E2E privateKey", description: "forbidden: the user can't access the private key", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  156. default:
  157. appDelegate.messageNotification("E2E privateKey", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  158. }
  159. }
  160. func storeEnd(toEndPrivateKeyCipherSuccess metadataNet: CCMetadataNet!) {
  161. guard let privateKeyCipher = metadataNet.key else {
  162. appDelegate.messageNotification("E2E privateKey", description: "Error : privateKey not present", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: 0)
  163. return
  164. }
  165. CCUtility.setEndToEndPrivateKeyCipher(appDelegate.activeAccount, privateKeyCipher: privateKeyCipher)
  166. CCUtility.setEndToEndPassphrase(appDelegate.activeAccount, passphrase:metadataNet.password)
  167. // request publicKey Server()
  168. self.getPublicKeyServer()
  169. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionStoreEndToEndPrivateKeyCipher, note: "E2E PrivateKey stored on Server and stored locally", type: k_activityTypeSuccess, verbose: false, activeUrl: "")
  170. }
  171. func storeEnd(toEndPrivateKeyCipherFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  172. appDelegate.messageNotification("E2E sign privateKey", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  173. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionStoreEndToEndPrivateKeyCipher, note: message, type: k_activityTypeFailure, verbose: false, activeUrl: "")
  174. }
  175. func deleteEnd(toEndPrivateKeySuccess metadataNet: CCMetadataNet!) {
  176. appDelegate.messageNotification("E2E delete privateKey", description: "Success", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.success, errorCode: 0)
  177. }
  178. func deleteEnd(toEndPrivateKeyFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  179. appDelegate.messageNotification("E2E delete privateKey", description: message, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  180. }
  181. // --------------------------------------------------------------------------------------------
  182. // MARK: Manage Server PublicKey
  183. // --------------------------------------------------------------------------------------------
  184. func getEndToEndServerPublicKeySuccess(_ metadataNet: CCMetadataNet!) {
  185. CCUtility.setEndToEndPublicKeyServer(appDelegate.activeAccount, publicKey: metadataNet.key)
  186. // OK Activated
  187. NotificationCenter.default.post(name: Notification.Name("reloadManageEndToEndEncryption"), object: nil)
  188. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndServerPublicKey, note: "E2E Server PublicKey present on Server and stored to keychain", type: k_activityTypeSuccess, verbose: false, activeUrl: "")
  189. }
  190. func getEndToEndServerPublicKeyFailure(_ metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  191. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndServerPublicKey, note: message as String!, type: k_activityTypeFailure, verbose: false, activeUrl: "")
  192. switch (errorCode) {
  193. case 400:
  194. appDelegate.messageNotification("E2E Server publicKey", description: "bad request: unpredictable internal error", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  195. case 404:
  196. appDelegate.messageNotification("E2E Server publicKey", description: "Server publickey doesn't exists", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  197. case 409:
  198. appDelegate.messageNotification("E2E Server publicKey", description: "forbidden: the user can't access the Server publickey", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  199. default:
  200. appDelegate.messageNotification("E2E Server publicKey", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  201. }
  202. }
  203. // --------------------------------------------------------------------------------------------
  204. // MARK: Mark/Delete Encrypted Folder
  205. // --------------------------------------------------------------------------------------------
  206. func markEnd(toEndFolderEncryptedSuccess metadataNet: CCMetadataNet!) {
  207. print("E2E mark folder success")
  208. }
  209. func markEnd(toEndFolderEncryptedFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  210. // Unauthorized
  211. if (errorCode == kOCErrorServerUnauthorized) {
  212. appDelegate.openLoginView(appDelegate.activeMain, loginType: loginModifyPasswordUser)
  213. }
  214. if (errorCode != kOCErrorServerUnauthorized) {
  215. appDelegate.messageNotification("_error_", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  216. }
  217. }
  218. @objc func markEndToEndFolderEncrypted(_ metadata: tableMetadata) {
  219. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  220. metadataNet.action = actionMarkEndToEndFolderEncrypted;
  221. metadataNet.fileID = metadata.fileID;
  222. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  223. }
  224. func deletemarkEnd(toEndFolderEncryptedSuccess metadataNet: CCMetadataNet!) {
  225. print("E2E delete mark folder success")
  226. }
  227. func deletemarkEnd(toEndFolderEncryptedFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  228. // Unauthorized
  229. if (errorCode == kOCErrorServerUnauthorized) {
  230. appDelegate.openLoginView(appDelegate.activeMain, loginType: loginModifyPasswordUser)
  231. }
  232. if (errorCode != kOCErrorServerUnauthorized) {
  233. appDelegate.messageNotification("_error_", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  234. }
  235. }
  236. @objc func deletemarkEndToEndFolderEncrypted(_ metadata: tableMetadata) {
  237. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  238. metadataNet.action = actionDeletemarkEndToEndFolderEncrypted;
  239. metadataNet.fileID = metadata.fileID;
  240. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  241. }
  242. // --------------------------------------------------------------------------------------------
  243. // MARK: Lock/Unlock Encrypted Folder
  244. // --------------------------------------------------------------------------------------------
  245. func unlockEnd(toEndFolderEncryptedSuccess metadataNet: CCMetadataNet!) {
  246. print("E2E lock file success")
  247. }
  248. func unlockEnd(toEndFolderEncryptedFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  249. // Unauthorized
  250. if (errorCode == kOCErrorServerUnauthorized) {
  251. appDelegate.openLoginView(appDelegate.activeMain, loginType: loginModifyPasswordUser)
  252. }
  253. if (errorCode != kOCErrorServerUnauthorized) {
  254. appDelegate.messageNotification("_error_", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  255. }
  256. }
  257. @objc func unlockEndToEndFolderEncrypted(_ metadata: tableMetadata) {
  258. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  259. metadataNet.action = actionUnlockEndToEndFolderEncrypted;
  260. metadataNet.fileID = metadata.fileID;
  261. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  262. }
  263. func lockEnd(toEndFolderEncryptedSuccess metadataNet: CCMetadataNet!) {
  264. print("E2E lock file success")
  265. }
  266. func lockEnd(toEndFolderEncryptedFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  267. // Unauthorized
  268. if (errorCode == kOCErrorServerUnauthorized) {
  269. appDelegate.openLoginView(appDelegate.activeMain, loginType: loginModifyPasswordUser)
  270. }
  271. if (errorCode != kOCErrorServerUnauthorized) {
  272. appDelegate.messageNotification("_error_", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  273. }
  274. }
  275. @objc func lockEndToEndFolderEncrypted(_ metadata: tableMetadata) {
  276. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  277. metadataNet.action = actionLockEndToEndFolderEncrypted;
  278. metadataNet.fileID = metadata.fileID;
  279. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  280. }
  281. // --------------------------------------------------------------------------------------------
  282. // MARK: Manage Metadata
  283. // --------------------------------------------------------------------------------------------
  284. func getEndToEndMetadataSuccess(_ metadataNet: CCMetadataNet!) {
  285. print("E2E get metadata file success")
  286. }
  287. func getEndToEndMetadataFailure(_ metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  288. // Unauthorized
  289. if (errorCode == kOCErrorServerUnauthorized) {
  290. appDelegate.openLoginView(appDelegate.activeMain, loginType: loginModifyPasswordUser)
  291. }
  292. if (errorCode != kOCErrorServerUnauthorized) {
  293. appDelegate.messageNotification("_error_", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  294. }
  295. }
  296. @objc func getEndToEndMetadata(_ metadata: tableMetadata) {
  297. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  298. metadataNet.action = actionGetEndToEndMetadata;
  299. metadataNet.fileID = metadata.fileID;
  300. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  301. }
  302. }