2016-08-25 00:14:36 +02:00
|
|
|
package fusefrontend_reverse
|
|
|
|
|
|
|
|
import (
|
2016-09-02 23:45:52 +02:00
|
|
|
"fmt"
|
2016-08-25 00:14:36 +02:00
|
|
|
"os"
|
2016-09-19 23:40:43 +02:00
|
|
|
"path/filepath"
|
2016-08-30 00:23:55 +02:00
|
|
|
"syscall"
|
2016-08-25 00:14:36 +02:00
|
|
|
|
|
|
|
"github.com/hanwen/go-fuse/fuse"
|
|
|
|
"github.com/hanwen/go-fuse/fuse/nodefs"
|
|
|
|
"github.com/hanwen/go-fuse/fuse/pathfs"
|
|
|
|
|
|
|
|
"github.com/rfjakob/gocryptfs/internal/contentenc"
|
|
|
|
"github.com/rfjakob/gocryptfs/internal/cryptocore"
|
|
|
|
"github.com/rfjakob/gocryptfs/internal/fusefrontend"
|
|
|
|
"github.com/rfjakob/gocryptfs/internal/nametransform"
|
|
|
|
)
|
|
|
|
|
2016-09-02 23:45:52 +02:00
|
|
|
const (
|
|
|
|
DirIVMode = syscall.S_IFREG | 0400
|
|
|
|
)
|
|
|
|
|
2016-08-30 00:23:55 +02:00
|
|
|
type reverseFS struct {
|
|
|
|
// Embed pathfs.defaultFileSystem for a ENOSYS implementation of all methods
|
2016-08-25 00:14:36 +02:00
|
|
|
pathfs.FileSystem
|
2016-08-30 00:23:55 +02:00
|
|
|
// pathfs.loopbackFileSystem, see go-fuse/fuse/pathfs/loopback.go
|
|
|
|
loopbackfs pathfs.FileSystem
|
2016-08-25 00:14:36 +02:00
|
|
|
// Stores configuration arguments
|
|
|
|
args fusefrontend.Args
|
|
|
|
// Filename encryption helper
|
|
|
|
nameTransform *nametransform.NameTransform
|
|
|
|
// Content encryption helper
|
|
|
|
contentEnc *contentenc.ContentEnc
|
|
|
|
}
|
|
|
|
|
|
|
|
// Encrypted FUSE overlay filesystem
|
2016-08-30 00:23:55 +02:00
|
|
|
func NewFS(args fusefrontend.Args) *reverseFS {
|
2016-08-25 00:14:36 +02:00
|
|
|
cryptoCore := cryptocore.New(args.Masterkey, args.OpenSSL, true)
|
|
|
|
contentEnc := contentenc.New(cryptoCore, contentenc.DefaultBS)
|
|
|
|
nameTransform := nametransform.New(cryptoCore, args.LongNames)
|
|
|
|
|
2016-08-30 00:23:55 +02:00
|
|
|
return &reverseFS{
|
|
|
|
// pathfs.defaultFileSystem returns ENOSYS for all operations
|
|
|
|
FileSystem: pathfs.NewDefaultFileSystem(),
|
|
|
|
loopbackfs: pathfs.NewLoopbackFileSystem(args.Cipherdir),
|
2016-08-25 00:14:36 +02:00
|
|
|
args: args,
|
|
|
|
nameTransform: nameTransform,
|
|
|
|
contentEnc: contentEnc,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-19 23:40:43 +02:00
|
|
|
// relDir is identical to filepath.Dir excepts that it returns "" when
|
|
|
|
// filepath.Dir would return ".".
|
|
|
|
// In the FUSE API, the root directory is called "", and we actually want that.
|
|
|
|
func relDir(path string) string {
|
|
|
|
dir := filepath.Dir(path)
|
|
|
|
if dir == "." {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
return dir
|
|
|
|
}
|
|
|
|
|
|
|
|
// dirIVAttr handles GetAttr requests for the virtual gocryptfs.diriv files.
|
|
|
|
func (rfs *reverseFS) dirIVAttr(relPath string, context *fuse.Context) (*fuse.Attr, fuse.Status) {
|
|
|
|
cDir := relDir(relPath)
|
|
|
|
dir, err := rfs.decryptPath(cDir)
|
|
|
|
if err != nil {
|
|
|
|
fmt.Printf("decrypt err %q\n", cDir)
|
|
|
|
return nil, fuse.ToStatus(err)
|
|
|
|
}
|
|
|
|
// Does the parent dir exist?
|
|
|
|
a, status := rfs.loopbackfs.GetAttr(dir, context)
|
|
|
|
if !status.Ok() {
|
|
|
|
fmt.Printf("missing parent\n")
|
|
|
|
return nil, status
|
|
|
|
}
|
|
|
|
// Is it a dir at all?
|
|
|
|
if !a.IsDir() {
|
|
|
|
fmt.Printf("not isdir\n")
|
|
|
|
return nil, fuse.ENOTDIR
|
|
|
|
}
|
|
|
|
// Does the user have execute permissions?
|
|
|
|
if a.Mode&syscall.S_IXUSR == 0 {
|
|
|
|
fmt.Printf("not exec")
|
|
|
|
return nil, fuse.EPERM
|
2016-09-02 23:45:52 +02:00
|
|
|
}
|
2016-09-19 23:40:43 +02:00
|
|
|
// All good. Let's fake the file.
|
|
|
|
// We use the inode number of the parent dir (can this cause problems?).
|
|
|
|
a.Mode = DirIVMode
|
|
|
|
a.Size = nametransform.DirIVLen
|
|
|
|
a.Nlink = 1
|
2016-09-02 23:45:52 +02:00
|
|
|
|
2016-09-19 23:40:43 +02:00
|
|
|
return a, fuse.OK
|
|
|
|
}
|
|
|
|
|
|
|
|
// isDirIV determines if the path points to a gocryptfs.diriv file
|
|
|
|
func isDirIV(relPath string) bool {
|
|
|
|
return filepath.Base(relPath) == nametransform.DirIVFilename
|
|
|
|
}
|
|
|
|
|
|
|
|
func (rfs *reverseFS) GetAttr(relPath string, context *fuse.Context) (*fuse.Attr, fuse.Status) {
|
|
|
|
if isDirIV(relPath) {
|
|
|
|
return rfs.dirIVAttr(relPath, context)
|
|
|
|
}
|
2016-08-30 00:23:55 +02:00
|
|
|
if rfs.isFiltered(relPath) {
|
2016-08-25 00:14:36 +02:00
|
|
|
return nil, fuse.EPERM
|
|
|
|
}
|
2016-08-30 00:23:55 +02:00
|
|
|
relPath, err := rfs.decryptPath(relPath)
|
2016-08-25 00:14:36 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, fuse.ToStatus(err)
|
|
|
|
}
|
2016-08-30 00:23:55 +02:00
|
|
|
a, status := rfs.loopbackfs.GetAttr(relPath, context)
|
2016-09-02 23:45:52 +02:00
|
|
|
if !status.Ok() {
|
|
|
|
return nil, status
|
2016-08-25 00:14:36 +02:00
|
|
|
}
|
|
|
|
// Calculate encrypted file size
|
|
|
|
if a.IsRegular() {
|
2016-08-30 00:23:55 +02:00
|
|
|
a.Size = rfs.contentEnc.PlainSizeToCipherSize(a.Size)
|
2016-08-25 00:14:36 +02:00
|
|
|
}
|
|
|
|
return a, fuse.OK
|
|
|
|
}
|
|
|
|
|
2016-08-30 00:23:55 +02:00
|
|
|
func (rfs *reverseFS) Access(relPath string, mode uint32, context *fuse.Context) fuse.Status {
|
2016-09-19 23:40:43 +02:00
|
|
|
if isDirIV(relPath) {
|
|
|
|
return fuse.OK
|
|
|
|
}
|
2016-08-30 00:23:55 +02:00
|
|
|
if rfs.isFiltered(relPath) {
|
|
|
|
return fuse.EPERM
|
|
|
|
}
|
2016-09-19 23:40:43 +02:00
|
|
|
absPath, err := rfs.abs(rfs.decryptPath(relPath))
|
2016-08-30 00:23:55 +02:00
|
|
|
if err != nil {
|
|
|
|
return fuse.ToStatus(err)
|
|
|
|
}
|
2016-09-19 23:40:43 +02:00
|
|
|
return fuse.ToStatus(syscall.Access(absPath, mode))
|
2016-08-30 00:23:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (rfs *reverseFS) Open(relPath string, flags uint32, context *fuse.Context) (fuseFile nodefs.File, status fuse.Status) {
|
2016-09-19 23:40:43 +02:00
|
|
|
if isDirIV(relPath) {
|
2016-09-20 16:27:39 +02:00
|
|
|
return NewDirIVFile(relDir(relPath))
|
2016-09-19 23:40:43 +02:00
|
|
|
}
|
2016-08-30 00:23:55 +02:00
|
|
|
if rfs.isFiltered(relPath) {
|
2016-08-25 00:14:36 +02:00
|
|
|
return nil, fuse.EPERM
|
|
|
|
}
|
2016-08-30 00:23:55 +02:00
|
|
|
absPath, err := rfs.abs(rfs.decryptPath(relPath))
|
2016-08-25 00:14:36 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, fuse.ToStatus(err)
|
|
|
|
}
|
|
|
|
f, err := os.OpenFile(absPath, int(flags), 0666)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fuse.ToStatus(err)
|
|
|
|
}
|
2016-08-30 00:23:55 +02:00
|
|
|
return NewFile(f, rfs.contentEnc)
|
2016-08-25 00:14:36 +02:00
|
|
|
}
|
|
|
|
|
2016-09-19 23:40:43 +02:00
|
|
|
func (rfs *reverseFS) OpenDir(cipherPath string, context *fuse.Context) ([]fuse.DirEntry, fuse.Status) {
|
|
|
|
relPath, err := rfs.decryptPath(cipherPath)
|
2016-08-25 00:14:36 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, fuse.ToStatus(err)
|
|
|
|
}
|
|
|
|
// Read plaintext dir
|
2016-08-30 00:23:55 +02:00
|
|
|
entries, status := rfs.loopbackfs.OpenDir(relPath, context)
|
2016-08-25 00:14:36 +02:00
|
|
|
if entries == nil {
|
|
|
|
return nil, status
|
|
|
|
}
|
|
|
|
// Encrypt names
|
2016-09-19 23:40:43 +02:00
|
|
|
dirIV := deriveDirIV(cipherPath)
|
2016-08-25 00:14:36 +02:00
|
|
|
for i := range entries {
|
2016-09-19 23:40:43 +02:00
|
|
|
entries[i].Name = rfs.nameTransform.EncryptName(entries[i].Name, dirIV)
|
2016-08-25 00:14:36 +02:00
|
|
|
}
|
2016-09-02 23:45:52 +02:00
|
|
|
// Add virtual gocryptfs.diriv
|
|
|
|
entries = append(entries, fuse.DirEntry{syscall.S_IFREG | 0400, nametransform.DirIVFilename})
|
|
|
|
|
2016-08-25 00:14:36 +02:00
|
|
|
return entries, fuse.OK
|
|
|
|
}
|