123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142 |
- <?php
- /**
- * SPDX-FileCopyrightText: 2016-2024 Nextcloud GmbH and Nextcloud contributors
- * SPDX-FileCopyrightText: 2016 ownCloud, Inc.
- * SPDX-License-Identifier: AGPL-3.0-only
- */
- namespace OC\Core\Command\Encryption;
- use OCP\App\IAppManager;
- use OCP\Encryption\IManager;
- use OCP\IConfig;
- use Symfony\Component\Console\Command\Command;
- use Symfony\Component\Console\Helper\QuestionHelper;
- use Symfony\Component\Console\Input\InputArgument;
- use Symfony\Component\Console\Input\InputInterface;
- use Symfony\Component\Console\Output\OutputInterface;
- use Symfony\Component\Console\Question\ConfirmationQuestion;
- class DecryptAll extends Command {
- protected bool $wasTrashbinEnabled = false;
- protected bool $wasMaintenanceModeEnabled = false;
- public function __construct(
- protected IManager $encryptionManager,
- protected IAppManager $appManager,
- protected IConfig $config,
- protected \OC\Encryption\DecryptAll $decryptAll,
- protected QuestionHelper $questionHelper,
- ) {
- parent::__construct();
- }
- /**
- * Set maintenance mode and disable the trashbin app
- */
- protected function forceMaintenanceAndTrashbin(): void {
- $this->wasTrashbinEnabled = $this->appManager->isEnabledForUser('files_trashbin');
- $this->wasMaintenanceModeEnabled = $this->config->getSystemValueBool('maintenance');
- $this->config->setSystemValue('maintenance', true);
- $this->appManager->disableApp('files_trashbin');
- }
- /**
- * Reset the maintenance mode and re-enable the trashbin app
- */
- protected function resetMaintenanceAndTrashbin(): void {
- $this->config->setSystemValue('maintenance', $this->wasMaintenanceModeEnabled);
- if ($this->wasTrashbinEnabled) {
- $this->appManager->enableApp('files_trashbin');
- }
- }
- protected function configure() {
- parent::configure();
- $this->setName('encryption:decrypt-all');
- $this->setDescription('Disable server-side encryption and decrypt all files');
- $this->setHelp(
- 'This will disable server-side encryption and decrypt all files for '
- . 'all users if it is supported by your encryption module. '
- . 'Please make sure that no user access his files during this process!'
- );
- $this->addArgument(
- 'user',
- InputArgument::OPTIONAL,
- 'user for which you want to decrypt all files (optional)',
- ''
- );
- }
- protected function execute(InputInterface $input, OutputInterface $output): int {
- if (!$input->isInteractive()) {
- $output->writeln('Invalid TTY.');
- $output->writeln('If you are trying to execute the command in a Docker ');
- $output->writeln("container, do not forget to execute 'docker exec' with");
- $output->writeln("the '-i' and '-t' options.");
- $output->writeln('');
- return 1;
- }
- $isMaintenanceModeEnabled = $this->config->getSystemValue('maintenance', false);
- if ($isMaintenanceModeEnabled) {
- $output->writeln("Maintenance mode must be disabled when starting decryption,");
- $output->writeln("in order to load the relevant encryption modules correctly.");
- $output->writeln("Your instance will automatically be put to maintenance mode");
- $output->writeln("during the actual decryption of the files.");
- return 1;
- }
- try {
- if ($this->encryptionManager->isEnabled() === true) {
- $output->write('Disable server side encryption... ');
- $this->config->setAppValue('core', 'encryption_enabled', 'no');
- $output->writeln('done.');
- } else {
- $output->writeln('Server side encryption not enabled. Nothing to do.');
- return 0;
- }
- $uid = $input->getArgument('user');
- if ($uid === '') {
- $message = 'your Nextcloud';
- } else {
- $message = "$uid's account";
- }
- $output->writeln("\n");
- $output->writeln("You are about to start to decrypt all files stored in $message.");
- $output->writeln('It will depend on the encryption module and your setup if this is possible.');
- $output->writeln('Depending on the number and size of your files this can take some time');
- $output->writeln('Please make sure that no user access his files during this process!');
- $output->writeln('');
- $question = new ConfirmationQuestion('Do you really want to continue? (y/n) ', false);
- if ($this->questionHelper->ask($input, $output, $question)) {
- $this->forceMaintenanceAndTrashbin();
- $user = $input->getArgument('user');
- $result = $this->decryptAll->decryptAll($input, $output, $user);
- if ($result === false) {
- $output->writeln(' aborted.');
- $output->writeln('Server side encryption remains enabled');
- $this->config->setAppValue('core', 'encryption_enabled', 'yes');
- } elseif ($uid !== '') {
- $output->writeln('Server side encryption remains enabled');
- $this->config->setAppValue('core', 'encryption_enabled', 'yes');
- }
- $this->resetMaintenanceAndTrashbin();
- return 0;
- }
- $output->write('Enable server side encryption... ');
- $this->config->setAppValue('core', 'encryption_enabled', 'yes');
- $output->writeln('done.');
- $output->writeln('aborted');
- return 1;
- } catch (\Exception $e) {
- // enable server side encryption again if something went wrong
- $this->config->setAppValue('core', 'encryption_enabled', 'yes');
- $this->resetMaintenanceAndTrashbin();
- throw $e;
- }
- }
- }
|