summaryrefslogtreecommitdiffstats
path: root/apps
diff options
context:
space:
mode:
authorBjoern Schiessle <schiessle@owncloud.com>2016-03-15 11:23:49 +0100
committerBjoern Schiessle <schiessle@owncloud.com>2016-03-15 15:14:45 +0100
commit38f8f2837e81f23eb12a005b7cf89efaf08a0fd3 (patch)
tree77dfde0f39c7cc7e6a834144dcef3ae87919f12b /apps
parenta5de6b371321bc7c62c89b10c48191be0c8a667b (diff)
downloadnextcloud-server-38f8f2837e81f23eb12a005b7cf89efaf08a0fd3.tar.gz
nextcloud-server-38f8f2837e81f23eb12a005b7cf89efaf08a0fd3.zip
allow group shares, even if not all public keys are available
Diffstat (limited to 'apps')
-rw-r--r--apps/encryption/lib/crypto/encryption.php6
-rw-r--r--apps/encryption/tests/lib/crypto/encryptionTest.php38
2 files changed, 42 insertions, 2 deletions
diff --git a/apps/encryption/lib/crypto/encryption.php b/apps/encryption/lib/crypto/encryption.php
index 1a05277e20d..85b1a781e89 100644
--- a/apps/encryption/lib/crypto/encryption.php
+++ b/apps/encryption/lib/crypto/encryption.php
@@ -349,7 +349,11 @@ class Encryption implements IEncryptionModule {
$publicKeys[$this->keyManager->getMasterKeyId()] = $this->keyManager->getPublicMasterKey();
} else {
foreach ($accessList['users'] as $user) {
- $publicKeys[$user] = $this->keyManager->getPublicKey($user);
+ try {
+ $publicKeys[$user] = $this->keyManager->getPublicKey($user);
+ } catch (PublicKeyMissingException $e) {
+ $this->logger->warning('Could not encrypt file for ' . $user . ': ' . $e->getMessage());
+ }
}
}
diff --git a/apps/encryption/tests/lib/crypto/encryptionTest.php b/apps/encryption/tests/lib/crypto/encryptionTest.php
index f76bdfb6d61..1652b578855 100644
--- a/apps/encryption/tests/lib/crypto/encryptionTest.php
+++ b/apps/encryption/tests/lib/crypto/encryptionTest.php
@@ -296,7 +296,6 @@ class EncryptionTest extends TestCase {
$this->assertSame($expected,
$this->instance->update('path', 'user1', ['users' => ['user1']])
);
-
}
public function dataTestUpdate() {
@@ -307,6 +306,43 @@ class EncryptionTest extends TestCase {
}
/**
+ * Test case if the public key is missing. ownCloud should still encrypt
+ * the file for the remaining users
+ */
+ public function testUpdateMissingPublicKey() {
+ $this->keyManagerMock->expects($this->once())
+ ->method('getFileKey')->willReturn('fileKey');
+
+ $this->keyManagerMock->expects($this->any())
+ ->method('getPublicKey')->willReturnCallback(
+ function($user) {
+ throw new PublicKeyMissingException($user);
+ }
+ );
+
+ $this->keyManagerMock->expects($this->any())
+ ->method('addSystemKeys')
+ ->willReturnCallback(function($accessList, $publicKeys) {
+ return $publicKeys;
+ });
+
+ $this->cryptMock->expects($this->once())->method('multiKeyEncrypt')
+ ->willReturnCallback(
+ function($fileKey, $publicKeys) {
+ $this->assertEmpty($publicKeys);
+ $this->assertSame('fileKey', $fileKey);
+ }
+ );
+
+ $this->keyManagerMock->expects($this->never())->method('getVersion');
+ $this->keyManagerMock->expects($this->never())->method('setVersion');
+
+ $this->assertTrue(
+ $this->instance->update('path', 'user1', ['users' => ['user1']])
+ );
+ }
+
+ /**
* by default the encryption module should encrypt regular files, files in
* files_versions and files in files_trashbin
*