Blame view

sources/apps/files_encryption/tests/util.php 19.8 KB
03e52840d   Kload   Init
1
2
3
4
5
6
7
  <?php
  /**
   * Copyright (c) 2012 Sam Tuke <samtuke@owncloud.com>
   * This file is licensed under the Affero General Public License version 3 or
   * later.
   * See the COPYING-README file.
   */
31b7f2792   Kload   Upgrade to ownclo...
8
9
10
11
12
13
14
  require_once __DIR__ . '/../../../lib/base.php';
  require_once __DIR__ . '/../lib/crypt.php';
  require_once __DIR__ . '/../lib/keymanager.php';
  require_once __DIR__ . '/../lib/proxy.php';
  require_once __DIR__ . '/../lib/stream.php';
  require_once __DIR__ . '/../lib/util.php';
  require_once __DIR__ . '/../appinfo/app.php';
03e52840d   Kload   Init
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
  
  use OCA\Encryption;
  
  /**
   * Class Test_Encryption_Util
   */
  class Test_Encryption_Util extends \PHPUnit_Framework_TestCase {
  
  	const TEST_ENCRYPTION_UTIL_USER1 = "test-util-user1";
  	const TEST_ENCRYPTION_UTIL_LEGACY_USER = "test-legacy-user";
  
  	public $userId;
  	public $encryptionDir;
  	public $publicKeyDir;
  	public $pass;
  	/**
6d9380f96   Cédric Dupont   Update sources OC...
31
  	 * @var OC\Files\View
03e52840d   Kload   Init
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
  	 */
  	public $view;
  	public $keyfilesPath;
  	public $publicKeyPath;
  	public $privateKeyPath;
  	/**
  	 * @var \OCA\Encryption\Util
  	 */
  	public $util;
  	public $dataShort;
  	public $legacyEncryptedData;
  	public $legacyEncryptedDataKey;
  	public $legacyKey;
  	public $stateFilesTrashbin;
  
  	public static function setUpBeforeClass() {
  		// reset backend
  		\OC_User::clearBackends();
  		\OC_User::useBackend('database');
  
  		// Filesystem related hooks
  		\OCA\Encryption\Helper::registerFilesystemHooks();
  
  		// clear and register hooks
  		\OC_FileProxy::clearProxies();
  		\OC_FileProxy::register(new OCA\Encryption\Proxy());
  
  		// create test user
  		\Test_Encryption_Util::loginHelper(\Test_Encryption_Util::TEST_ENCRYPTION_UTIL_USER1, true);
  		\Test_Encryption_Util::loginHelper(\Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER, true);
  	}
  
  
  	function setUp() {
a293d369c   Kload   Update sources to...
66
67
  		// login user
  		\Test_Encryption_Util::loginHelper(\Test_Encryption_Util::TEST_ENCRYPTION_UTIL_USER1);
03e52840d   Kload   Init
68
69
70
71
72
  		\OC_User::setUserId(\Test_Encryption_Util::TEST_ENCRYPTION_UTIL_USER1);
  		$this->userId = \Test_Encryption_Util::TEST_ENCRYPTION_UTIL_USER1;
  		$this->pass = \Test_Encryption_Util::TEST_ENCRYPTION_UTIL_USER1;
  
  		// set content for encrypting / decrypting in tests
31b7f2792   Kload   Upgrade to ownclo...
73
  		$this->dataUrl = __DIR__ . '/../lib/crypt.php';
03e52840d   Kload   Init
74
  		$this->dataShort = 'hats';
31b7f2792   Kload   Upgrade to ownclo...
75
76
77
78
  		$this->dataLong = file_get_contents(__DIR__ . '/../lib/crypt.php');
  		$this->legacyData = __DIR__ . '/legacy-text.txt';
  		$this->legacyEncryptedData = __DIR__ . '/legacy-encrypted-text.txt';
  		$this->legacyEncryptedDataKey = __DIR__ . '/encryption.key';
03e52840d   Kload   Init
79
80
81
82
83
84
85
86
87
88
89
90
91
92
  		$this->legacyKey = "30943623843030686906\0\0\0\0";
  
  		$keypair = Encryption\Crypt::createKeypair();
  
  		$this->genPublicKey = $keypair['publicKey'];
  		$this->genPrivateKey = $keypair['privateKey'];
  
  		$this->publicKeyDir = '/' . 'public-keys';
  		$this->encryptionDir = '/' . $this->userId . '/' . 'files_encryption';
  		$this->keyfilesPath = $this->encryptionDir . '/' . 'keyfiles';
  		$this->publicKeyPath =
  			$this->publicKeyDir . '/' . $this->userId . '.public.key'; // e.g. data/public-keys/admin.public.key
  		$this->privateKeyPath =
  			$this->encryptionDir . '/' . $this->userId . '.private.key'; // e.g. data/admin/admin.private.key
6d9380f96   Cédric Dupont   Update sources OC...
93
  		$this->view = new \OC\Files\View('/');
03e52840d   Kload   Init
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
  
  		$this->util = new Encryption\Util($this->view, $this->userId);
  
  		// remember files_trashbin state
  		$this->stateFilesTrashbin = OC_App::isEnabled('files_trashbin');
  
  		// we don't want to tests with app files_trashbin enabled
  		\OC_App::disable('files_trashbin');
  	}
  
  	function tearDown() {
  		// reset app files_trashbin
  		if ($this->stateFilesTrashbin) {
  			OC_App::enable('files_trashbin');
  		}
  		else {
  			OC_App::disable('files_trashbin');
  		}
  	}
  
  	public static function tearDownAfterClass() {
  		// cleanup test user
  		\OC_User::deleteUser(\Test_Encryption_Util::TEST_ENCRYPTION_UTIL_USER1);
  		\OC_User::deleteUser(\Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER);
  	}
  
  	/**
31b7f2792   Kload   Upgrade to ownclo...
121
  	 * @medium
6d9380f96   Cédric Dupont   Update sources OC...
122
  	 * test that paths set during User construction are correct
03e52840d   Kload   Init
123
124
125
126
127
128
129
130
131
132
133
134
135
  	 */
  	function testKeyPaths() {
  		$util = new Encryption\Util($this->view, $this->userId);
  
  		$this->assertEquals($this->publicKeyDir, $util->getPath('publicKeyDir'));
  		$this->assertEquals($this->encryptionDir, $util->getPath('encryptionDir'));
  		$this->assertEquals($this->keyfilesPath, $util->getPath('keyfilesPath'));
  		$this->assertEquals($this->publicKeyPath, $util->getPath('publicKeyPath'));
  		$this->assertEquals($this->privateKeyPath, $util->getPath('privateKeyPath'));
  
  	}
  
  	/**
31b7f2792   Kload   Upgrade to ownclo...
136
  	 * @medium
6d9380f96   Cédric Dupont   Update sources OC...
137
  	 * test detection of encrypted files
837968727   Kload   [enh] Upgrade to ...
138
139
140
141
142
143
  	 */
  	function testIsEncryptedPath() {
  
  		$util = new Encryption\Util($this->view, $this->userId);
  
  		self::loginHelper($this->userId);
6d9380f96   Cédric Dupont   Update sources OC...
144
145
  		$unencryptedFile = '/tmpUnencrypted-' . uniqid() . '.txt';
  		$encryptedFile =  '/tmpEncrypted-' . uniqid() . '.txt';
837968727   Kload   [enh] Upgrade to ...
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
  
  		// Disable encryption proxy to write a unencrypted file
  		$proxyStatus = \OC_FileProxy::$enabled;
  		\OC_FileProxy::$enabled = false;
  
  		$this->view->file_put_contents($this->userId . '/files/' . $unencryptedFile, $this->dataShort);
  
  		// Re-enable proxy - our work is done
  		\OC_FileProxy::$enabled = $proxyStatus;
  
  		// write a encrypted file
  		$this->view->file_put_contents($this->userId . '/files/' . $encryptedFile, $this->dataShort);
  
  		// test if both files are detected correctly
  		$this->assertFalse($util->isEncryptedPath($this->userId . '/files/' . $unencryptedFile));
  		$this->assertTrue($util->isEncryptedPath($this->userId . '/files/' . $encryptedFile));
  
  		// cleanup
6d9380f96   Cédric Dupont   Update sources OC...
164
165
  		$this->view->unlink($this->userId . '/files/' . $unencryptedFile);
  		$this->view->unlink($this->userId . '/files/' . $encryptedFile);
837968727   Kload   [enh] Upgrade to ...
166
167
168
169
170
  
  	}
  
  	/**
  	 * @medium
6d9380f96   Cédric Dupont   Update sources OC...
171
  	 * test setup of encryption directories
03e52840d   Kload   Init
172
173
174
175
176
177
  	 */
  	function testSetupServerSide() {
  		$this->assertEquals(true, $this->util->setupServerSide($this->pass));
  	}
  
  	/**
31b7f2792   Kload   Upgrade to ownclo...
178
  	 * @medium
6d9380f96   Cédric Dupont   Update sources OC...
179
  	 * test checking whether account is ready for encryption,
03e52840d   Kload   Init
180
181
182
183
184
185
  	 */
  	function testUserIsReady() {
  		$this->assertEquals(true, $this->util->ready());
  	}
  
  	/**
6d9380f96   Cédric Dupont   Update sources OC...
186
  	 * test checking whether account is not ready for encryption,
03e52840d   Kload   Init
187
188
189
190
191
192
193
194
195
196
197
198
  	 */
  //	function testUserIsNotReady() {
  //		$this->view->unlink($this->publicKeyDir);
  //
  //		$params['uid'] = $this->userId;
  //		$params['password'] = $this->pass;
  //		$this->assertFalse(OCA\Encryption\Hooks::login($params));
  //
  //		$this->view->unlink($this->privateKeyPath);
  //	}
  
  	/**
31b7f2792   Kload   Upgrade to ownclo...
199
  	 * @medium
6d9380f96   Cédric Dupont   Update sources OC...
200
  	 * test checking whether account is not ready for encryption,
03e52840d   Kload   Init
201
202
203
  	 */
  	function testIsLegacyUser() {
  		\Test_Encryption_Util::loginHelper(\Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER);
6d9380f96   Cédric Dupont   Update sources OC...
204
  		$userView = new \OC\Files\View('/' . \Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER);
03e52840d   Kload   Init
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
  
  		// Disable encryption proxy to prevent recursive calls
  		$proxyStatus = \OC_FileProxy::$enabled;
  		\OC_FileProxy::$enabled = false;
  
  		$encryptionKeyContent = file_get_contents($this->legacyEncryptedDataKey);
  		$userView->file_put_contents('/encryption.key', $encryptionKeyContent);
  
  		\OC_FileProxy::$enabled = $proxyStatus;
  
  		$params['uid'] = \Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER;
  		$params['password'] = \Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER;
  
  		$this->setMigrationStatus(0, \Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER);
  
  		$this->assertTrue(OCA\Encryption\Hooks::login($params));
31b7f2792   Kload   Upgrade to ownclo...
221
  		$this->assertEquals($this->legacyKey, \OC::$session->get('legacyKey'));
03e52840d   Kload   Init
222
  	}
31b7f2792   Kload   Upgrade to ownclo...
223
224
225
  	/**
  	 * @medium
  	 */
03e52840d   Kload   Init
226
227
228
229
230
231
  	function testRecoveryEnabledForUser() {
  
  		$util = new Encryption\Util($this->view, $this->userId);
  
  		// Record the value so we can return it to it's original state later
  		$enabled = $util->recoveryEnabledForUser();
6d9380f96   Cédric Dupont   Update sources OC...
232
  		$this->assertTrue($util->setRecoveryForUser(!$enabled));
03e52840d   Kload   Init
233

6d9380f96   Cédric Dupont   Update sources OC...
234
  		$this->assertEquals(!$enabled, $util->recoveryEnabledForUser());
03e52840d   Kload   Init
235

6d9380f96   Cédric Dupont   Update sources OC...
236
  		$this->assertTrue($util->setRecoveryForUser($enabled));
03e52840d   Kload   Init
237

6d9380f96   Cédric Dupont   Update sources OC...
238
  		$this->assertEquals($enabled, $util->recoveryEnabledForUser());
03e52840d   Kload   Init
239

03e52840d   Kload   Init
240
241
  
  	}
31b7f2792   Kload   Upgrade to ownclo...
242
243
244
  	/**
  	 * @medium
  	 */
03e52840d   Kload   Init
245
246
247
  	function testGetUidAndFilename() {
  
  		\OC_User::setUserId(\Test_Encryption_Util::TEST_ENCRYPTION_UTIL_USER1);
a293d369c   Kload   Update sources to...
248
  		$filename = '/tmp-' . uniqid() . '.test';
03e52840d   Kload   Init
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
  
  		// Disable encryption proxy to prevent recursive calls
  		$proxyStatus = \OC_FileProxy::$enabled;
  		\OC_FileProxy::$enabled = false;
  
  		$this->view->file_put_contents($this->userId . '/files/' . $filename, $this->dataShort);
  
  		// Re-enable proxy - our work is done
  		\OC_FileProxy::$enabled = $proxyStatus;
  
  		$util = new Encryption\Util($this->view, $this->userId);
  
  		list($fileOwnerUid, $file) = $util->getUidAndFilename($filename);
  
  		$this->assertEquals(\Test_Encryption_Util::TEST_ENCRYPTION_UTIL_USER1, $fileOwnerUid);
  
  		$this->assertEquals($file, $filename);
  
  		$this->view->unlink($this->userId . '/files/' . $filename);
  	}
  
  	/**
6d9380f96   Cédric Dupont   Update sources OC...
271
  <	 * Test that data that is read by the crypto stream wrapper
03e52840d   Kload   Init
272
273
274
  	 */
  	function testGetFileSize() {
  		\Test_Encryption_Util::loginHelper(\Test_Encryption_Util::TEST_ENCRYPTION_UTIL_USER1);
a293d369c   Kload   Update sources to...
275
  		$filename = 'tmp-' . uniqid();
03e52840d   Kload   Init
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
  		$externalFilename = '/' . $this->userId . '/files/' . $filename;
  
  		// Test for 0 byte files
  		$problematicFileSizeData = "";
  		$cryptedFile = $this->view->file_put_contents($externalFilename, $problematicFileSizeData);
  		$this->assertTrue(is_int($cryptedFile));
  		$this->assertEquals($this->util->getFileSize($externalFilename), 0);
  		$decrypt = $this->view->file_get_contents($externalFilename);
  		$this->assertEquals($problematicFileSizeData, $decrypt);
  		$this->view->unlink($this->userId . '/files/' . $filename);
  
  		// Test a file with 18377 bytes as in https://github.com/owncloud/mirall/issues/1009
  		$problematicFileSizeData = str_pad("", 18377, "abc");
  		$cryptedFile = $this->view->file_put_contents($externalFilename, $problematicFileSizeData);
  		$this->assertTrue(is_int($cryptedFile));
  		$this->assertEquals($this->util->getFileSize($externalFilename), 18377);
  		$decrypt = $this->view->file_get_contents($externalFilename);
  		$this->assertEquals($problematicFileSizeData, $decrypt);
  		$this->view->unlink($this->userId . '/files/' . $filename);
  	}
31b7f2792   Kload   Upgrade to ownclo...
296
  	function testEncryptAll() {
a293d369c   Kload   Update sources to...
297
  		$filename = "/encryptAll" . uniqid() . ".txt";
31b7f2792   Kload   Upgrade to ownclo...
298
299
300
301
302
303
304
305
  		$util = new Encryption\Util($this->view, $this->userId);
  
  		// disable encryption to upload a unencrypted file
  		\OC_App::disable('files_encryption');
  
  		$this->view->file_put_contents($this->userId . '/files/' . $filename, $this->dataShort);
  
  		$fileInfoUnencrypted = $this->view->getFileInfo($this->userId . '/files/' . $filename);
6d9380f96   Cédric Dupont   Update sources OC...
306
  		$this->assertTrue($fileInfoUnencrypted instanceof \OC\Files\FileInfo);
31b7f2792   Kload   Upgrade to ownclo...
307
308
309
310
311
312
313
314
  
  		// enable file encryption again
  		\OC_App::enable('files_encryption');
  
  		// encrypt all unencrypted files
  		$util->encryptAll('/' . $this->userId . '/' . 'files');
  
  		$fileInfoEncrypted = $this->view->getFileInfo($this->userId . '/files/' . $filename);
6d9380f96   Cédric Dupont   Update sources OC...
315
  		$this->assertTrue($fileInfoEncrypted instanceof \OC\Files\FileInfo);
31b7f2792   Kload   Upgrade to ownclo...
316
317
318
  
  		// check if mtime and etags unchanged
  		$this->assertEquals($fileInfoEncrypted['mtime'], $fileInfoUnencrypted['mtime']);
6d9380f96   Cédric Dupont   Update sources OC...
319
  		$this->assertSame($fileInfoEncrypted['etag'], $fileInfoUnencrypted['etag']);
31b7f2792   Kload   Upgrade to ownclo...
320
321
322
  
  		$this->view->unlink($this->userId . '/files/' . $filename);
  	}
31b7f2792   Kload   Upgrade to ownclo...
323
  	function testDecryptAll() {
a293d369c   Kload   Update sources to...
324
  		$filename = "/decryptAll" . uniqid() . ".txt";
6d9380f96   Cédric Dupont   Update sources OC...
325
326
  		$datadir = \OC_Config::getValue('datadirectory', \OC::$SERVERROOT . '/data/');
  		$userdir = $datadir . '/' . $this->userId . '/files/';
31b7f2792   Kload   Upgrade to ownclo...
327
328
329
330
  
  		$this->view->file_put_contents($this->userId . '/files/' . $filename, $this->dataShort);
  
  		$fileInfoEncrypted = $this->view->getFileInfo($this->userId . '/files/' . $filename);
6d9380f96   Cédric Dupont   Update sources OC...
331
  		$this->assertTrue($fileInfoEncrypted instanceof \OC\Files\FileInfo);
a293d369c   Kload   Update sources to...
332
  		$this->assertEquals($fileInfoEncrypted['encrypted'], 1);
31b7f2792   Kload   Upgrade to ownclo...
333

6d9380f96   Cédric Dupont   Update sources OC...
334
  		$encContent = file_get_contents($userdir . $filename);
a293d369c   Kload   Update sources to...
335

6d9380f96   Cédric Dupont   Update sources OC...
336
  		\OC_App::disable('files_encryption');
31b7f2792   Kload   Upgrade to ownclo...
337

6d9380f96   Cédric Dupont   Update sources OC...
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
  		$user = \OCP\User::getUser();
  		$this->logoutHelper();
  		$this->loginHelper($user, false, false, false);
  
  		$content = file_get_contents($userdir . $filename);
  
  		//content should be encrypted
  		$this->assertSame($encContent, $content);
  
  		// now we load the encryption app again
  		OC_App::loadApp('files_encryption');
  
  		// init encryption app
  		$params = array('uid' => \OCP\User::getUser(),
  			'password' => \OCP\User::getUser());
31b7f2792   Kload   Upgrade to ownclo...
353

6d9380f96   Cédric Dupont   Update sources OC...
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
  		$view = new OC\Files\View('/');
  		$util = new \OCA\Encryption\Util($view, \OCP\User::getUser());
  
  		$result = $util->initEncryption($params);
  
  		$this->assertTrue($result instanceof \OCA\Encryption\Session);
  
  		$successful = $util->decryptAll();
  
  		$this->assertTrue($successful);
  
  		$this->logoutHelper();
  		$this->loginHelper($user, false, false, false);
  
  		// file should be unencrypted and fileInfo should contain the correct values
  		$content = file_get_contents($userdir . $filename);
  
  		// now we should get the plain data
  		$this->assertSame($this->dataShort, $content);
  
  		$fileInfoUnencrypted = $this->view->getFileInfo($this->userId . '/files/' . $filename);
  		$this->assertTrue($fileInfoUnencrypted instanceof \OC\Files\FileInfo);
31b7f2792   Kload   Upgrade to ownclo...
376
377
378
  
  		// check if mtime and etags unchanged
  		$this->assertEquals($fileInfoEncrypted['mtime'], $fileInfoUnencrypted['mtime']);
6d9380f96   Cédric Dupont   Update sources OC...
379
  		$this->assertSame($fileInfoEncrypted['etag'], $fileInfoUnencrypted['etag']);
a293d369c   Kload   Update sources to...
380
381
  		// file should no longer be encrypted
  		$this->assertEquals(0, $fileInfoUnencrypted['encrypted']);
31b7f2792   Kload   Upgrade to ownclo...
382

6d9380f96   Cédric Dupont   Update sources OC...
383
384
385
386
387
388
389
  		// check if the keys where moved to the backup location
  		$this->assertTrue($this->view->is_dir($this->userId . '/files_encryption/keyfiles.backup'));
  		$this->assertTrue($this->view->file_exists($this->userId . '/files_encryption/keyfiles.backup/' . $filename . '.key'));
  		$this->assertTrue($this->view->is_dir($this->userId . '/files_encryption/share-keys.backup'));
  		$this->assertTrue($this->view->file_exists($this->userId . '/files_encryption/share-keys.backup/' . $filename . '.' . $user . '.shareKey'));
  
  		// cleanup
31b7f2792   Kload   Upgrade to ownclo...
390
  		$this->view->unlink($this->userId . '/files/' . $filename);
6d9380f96   Cédric Dupont   Update sources OC...
391
392
393
  		$this->view->deleteAll($this->userId . '/files_encryption/keyfiles.backup');
  		$this->view->deleteAll($this->userId . '/files_encryption/share-keys.backup');
  		OC_App::enable('files_encryption');
31b7f2792   Kload   Upgrade to ownclo...
394
395
  
  	}
6d9380f96   Cédric Dupont   Update sources OC...
396

a293d369c   Kload   Update sources to...
397
398
399
400
401
402
403
404
405
406
407
408
  	function testDescryptAllWithBrokenFiles() {
  
  		$file1 = "/decryptAll1" . uniqid() . ".txt";
  		$file2 = "/decryptAll2" . uniqid() . ".txt";
  
  		$util = new Encryption\Util($this->view, $this->userId);
  
  		$this->view->file_put_contents($this->userId . '/files/' . $file1, $this->dataShort);
  		$this->view->file_put_contents($this->userId . '/files/' . $file2, $this->dataShort);
  
  		$fileInfoEncrypted1 = $this->view->getFileInfo($this->userId . '/files/' . $file1);
  		$fileInfoEncrypted2 = $this->view->getFileInfo($this->userId . '/files/' . $file2);
6d9380f96   Cédric Dupont   Update sources OC...
409
410
  		$this->assertTrue($fileInfoEncrypted1 instanceof \OC\Files\FileInfo);
  		$this->assertTrue($fileInfoEncrypted2 instanceof \OC\Files\FileInfo);
a293d369c   Kload   Update sources to...
411
412
413
414
415
416
417
418
419
  		$this->assertEquals($fileInfoEncrypted1['encrypted'], 1);
  		$this->assertEquals($fileInfoEncrypted2['encrypted'], 1);
  
  		// rename keyfile for file1 so that the decryption for file1 fails
  		// Expected behaviour: decryptAll() returns false, file2 gets decrypted anyway
  		$this->view->rename($this->userId . '/files_encryption/keyfiles/' . $file1 . '.key',
  				$this->userId . '/files_encryption/keyfiles/' . $file1 . '.key.moved');
  
  		// decrypt all encrypted files
6d9380f96   Cédric Dupont   Update sources OC...
420
  		$result = $util->decryptAll();
a293d369c   Kload   Update sources to...
421
422
423
424
425
  
  		$this->assertFalse($result);
  
  		$fileInfoUnencrypted1 = $this->view->getFileInfo($this->userId . '/files/' . $file1);
  		$fileInfoUnencrypted2 = $this->view->getFileInfo($this->userId . '/files/' . $file2);
6d9380f96   Cédric Dupont   Update sources OC...
426
427
  		$this->assertTrue($fileInfoUnencrypted1 instanceof \OC\Files\FileInfo);
  		$this->assertTrue($fileInfoUnencrypted2 instanceof \OC\Files\FileInfo);
a293d369c   Kload   Update sources to...
428
429
430
431
432
433
434
435
436
437
438
439
440
441
  
  		// file1 should be still encrypted; file2 should be decrypted
  		$this->assertEquals(1, $fileInfoUnencrypted1['encrypted']);
  		$this->assertEquals(0, $fileInfoUnencrypted2['encrypted']);
  
  		// keyfiles and share keys should still exist
  		$this->assertTrue($this->view->is_dir($this->userId . '/files_encryption/keyfiles/'));
  		$this->assertTrue($this->view->is_dir($this->userId . '/files_encryption/share-keys/'));
  
  		// rename the keyfile for file1 back
  		$this->view->rename($this->userId . '/files_encryption/keyfiles/' . $file1 . '.key.moved',
  				$this->userId . '/files_encryption/keyfiles/' . $file1 . '.key');
  
  		// try again to decrypt all encrypted files
6d9380f96   Cédric Dupont   Update sources OC...
442
  		$result = $util->decryptAll();
a293d369c   Kload   Update sources to...
443
444
445
446
447
  
  		$this->assertTrue($result);
  
  		$fileInfoUnencrypted1 = $this->view->getFileInfo($this->userId . '/files/' . $file1);
  		$fileInfoUnencrypted2 = $this->view->getFileInfo($this->userId . '/files/' . $file2);
6d9380f96   Cédric Dupont   Update sources OC...
448
449
  		$this->assertTrue($fileInfoUnencrypted1 instanceof \OC\Files\FileInfo);
  		$this->assertTrue($fileInfoUnencrypted2 instanceof \OC\Files\FileInfo);
a293d369c   Kload   Update sources to...
450
451
452
453
454
455
456
457
  
  		// now both files should be decrypted
  		$this->assertEquals(0, $fileInfoUnencrypted1['encrypted']);
  		$this->assertEquals(0, $fileInfoUnencrypted2['encrypted']);
  
  		// keyfiles and share keys should be deleted
  		$this->assertFalse($this->view->is_dir($this->userId . '/files_encryption/keyfiles/'));
  		$this->assertFalse($this->view->is_dir($this->userId . '/files_encryption/share-keys/'));
6d9380f96   Cédric Dupont   Update sources OC...
458
  		//cleanup
a293d369c   Kload   Update sources to...
459
460
  		$this->view->unlink($this->userId . '/files/' . $file1);
  		$this->view->unlink($this->userId . '/files/' . $file2);
6d9380f96   Cédric Dupont   Update sources OC...
461
462
  		$this->view->deleteAll($this->userId . '/files_encryption/keyfiles.backup');
  		$this->view->deleteAll($this->userId . '/files_encryption/share-keys.backup');
a293d369c   Kload   Update sources to...
463
464
  
  	}
31b7f2792   Kload   Upgrade to ownclo...
465
466
467
  	/**
  	 * @large
  	 */
03e52840d   Kload   Init
468
469
  	function testEncryptLegacyFiles() {
  		\Test_Encryption_Util::loginHelper(\Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER);
6d9380f96   Cédric Dupont   Update sources OC...
470
471
  		$userView = new \OC\Files\View('/' . \Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER);
  		$view = new \OC\Files\View('/' . \Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER . '/files');
03e52840d   Kload   Init
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
  
  		// Disable encryption proxy to prevent recursive calls
  		$proxyStatus = \OC_FileProxy::$enabled;
  		\OC_FileProxy::$enabled = false;
  
  		$encryptionKeyContent = file_get_contents($this->legacyEncryptedDataKey);
  		$userView->file_put_contents('/encryption.key', $encryptionKeyContent);
  
  		$legacyEncryptedData = file_get_contents($this->legacyEncryptedData);
  		$view->mkdir('/test/');
  		$view->mkdir('/test/subtest/');
  		$view->file_put_contents('/test/subtest/legacy-encrypted-text.txt', $legacyEncryptedData);
  
  		$fileInfo = $view->getFileInfo('/test/subtest/legacy-encrypted-text.txt');
  		$fileInfo['encrypted'] = true;
  		$view->putFileInfo('/test/subtest/legacy-encrypted-text.txt', $fileInfo);
  
  		\OC_FileProxy::$enabled = $proxyStatus;
  
  		$params['uid'] = \Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER;
  		$params['password'] = \Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER;
  
  		$util = new Encryption\Util($this->view, \Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER);
  		$this->setMigrationStatus(0, \Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER);
  
  		$this->assertTrue(OCA\Encryption\Hooks::login($params));
31b7f2792   Kload   Upgrade to ownclo...
498
  		$this->assertEquals($this->legacyKey, \OC::$session->get('legacyKey'));
03e52840d   Kload   Init
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
  
  		$files = $util->findEncFiles('/' . \Test_Encryption_Util::TEST_ENCRYPTION_UTIL_LEGACY_USER . '/files/');
  
  		$this->assertTrue(is_array($files));
  
  		$found = false;
  		foreach ($files['encrypted'] as $encryptedFile) {
  			if ($encryptedFile['name'] === 'legacy-encrypted-text.txt') {
  				$found = true;
  				break;
  			}
  		}
  
  		$this->assertTrue($found);
  	}
  
  	/**
6d9380f96   Cédric Dupont   Update sources OC...
516
  	 * @param string $user
03e52840d   Kload   Init
517
518
519
  	 * @param bool $create
  	 * @param bool $password
  	 */
6d9380f96   Cédric Dupont   Update sources OC...
520
  	public static function loginHelper($user, $create = false, $password = false, $loadEncryption = true) {
03e52840d   Kload   Init
521
  		if ($create) {
6d9380f96   Cédric Dupont   Update sources OC...
522
523
524
525
526
  			try {
  				\OC_User::createUser($user, $user);
  			} catch(\Exception $e) { // catch username is already being used from previous aborted runs
  
  			}
03e52840d   Kload   Init
527
528
529
530
531
532
533
534
535
  		}
  
  		if ($password === false) {
  			$password = $user;
  		}
  
  		\OC_Util::tearDownFS();
  		\OC_User::setUserId('');
  		\OC\Files\Filesystem::tearDown();
03e52840d   Kload   Init
536
  		\OC_User::setUserId($user);
6d9380f96   Cédric Dupont   Update sources OC...
537
  		\OC_Util::setupFS($user);
03e52840d   Kload   Init
538

6d9380f96   Cédric Dupont   Update sources OC...
539
540
541
542
543
  		if ($loadEncryption) {
  			$params['uid'] = $user;
  			$params['password'] = $password;
  			OCA\Encryption\Hooks::login($params);
  		}
03e52840d   Kload   Init
544
  	}
a293d369c   Kload   Update sources to...
545
546
547
548
549
  	public static function logoutHelper() {
  		\OC_Util::tearDownFS();
  		\OC_User::setUserId('');
  		\OC\Files\Filesystem::tearDown();
  	}
03e52840d   Kload   Init
550
551
552
  	/**
  	 * helper function to set migration status to the right value
  	 * to be able to test the migration path
31b7f2792   Kload   Upgrade to ownclo...
553
  	 *
6d9380f96   Cédric Dupont   Update sources OC...
554
555
  	 * @param integer $status needed migration status for test
  	 * @param string $user for which user the status should be set
03e52840d   Kload   Init
556
557
558
  	 * @return boolean
  	 */
  	private function setMigrationStatus($status, $user) {
6d9380f96   Cédric Dupont   Update sources OC...
559
  		return \OC_Preferences::setValue($user, 'files_encryption', 'migration_status', (string)$status);
03e52840d   Kload   Init
560
561
562
  	}
  
  }