2017-12-26 12:38:53 +02:00
|
|
|
const { BaseCommand } = require('./base-command.js');
|
2021-08-07 13:22:37 +02:00
|
|
|
import { _ } from '@joplin/lib/locale';
|
2021-08-23 19:47:07 +02:00
|
|
|
import EncryptionService from '@joplin/lib/services/e2ee/EncryptionService';
|
2021-08-07 13:22:37 +02:00
|
|
|
import DecryptionWorker from '@joplin/lib/services/DecryptionWorker';
|
|
|
|
import BaseItem from '@joplin/lib/models/BaseItem';
|
|
|
|
import Setting from '@joplin/lib/models/Setting';
|
|
|
|
import shim from '@joplin/lib/shim';
|
|
|
|
import * as pathUtils from '@joplin/lib/path-utils';
|
2021-11-22 14:46:57 +02:00
|
|
|
import { getEncryptionEnabled, localSyncInfo } from '@joplin/lib/services/synchronizer/syncInfoUtils';
|
|
|
|
import { generateMasterKeyAndEnableEncryption, loadMasterKeysFromSettings, masterPasswordIsValid, setupAndDisableEncryption } from '@joplin/lib/services/e2ee/utils';
|
2019-03-05 22:57:15 +02:00
|
|
|
const imageType = require('image-type');
|
|
|
|
const readChunk = require('read-chunk');
|
2017-12-26 12:38:53 +02:00
|
|
|
|
|
|
|
class Command extends BaseCommand {
|
|
|
|
usage() {
|
2017-12-04 21:01:56 +02:00
|
|
|
return 'e2ee <command> [path]';
|
2017-12-26 12:38:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
description() {
|
2021-10-03 17:00:49 +02:00
|
|
|
return _('Manages E2EE configuration. Commands are `enable`, `disable`, `decrypt`, `status`, `decrypt-file`, and `target-status`.'); // `generate-ppk`
|
2017-12-26 12:38:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
options() {
|
|
|
|
return [
|
|
|
|
// This is here mostly for testing - shouldn't be used
|
|
|
|
['-p, --password <password>', 'Use this password as master password (For security reasons, it is not recommended to use this option).'],
|
2017-12-04 21:01:56 +02:00
|
|
|
['-v, --verbose', 'More verbose output for the `target-status` command'],
|
2019-03-05 22:57:15 +02:00
|
|
|
['-o, --output <directory>', 'Output directory'],
|
2020-04-08 19:02:31 +02:00
|
|
|
['--retry-failed-items', 'Applies to `decrypt` command - retries decrypting items that previously could not be decrypted.'],
|
2017-12-26 12:38:53 +02:00
|
|
|
];
|
|
|
|
}
|
|
|
|
|
2021-08-07 13:22:37 +02:00
|
|
|
async action(args: any) {
|
2017-12-26 12:38:53 +02:00
|
|
|
const options = args.options;
|
|
|
|
|
2021-08-07 13:22:37 +02:00
|
|
|
const askForMasterKey = async (error: any) => {
|
2019-03-05 22:57:15 +02:00
|
|
|
const masterKeyId = error.masterKeyId;
|
|
|
|
const password = await this.prompt(_('Enter master password:'), { type: 'string', secure: true });
|
|
|
|
if (!password) {
|
|
|
|
this.stdout(_('Operation cancelled'));
|
|
|
|
return false;
|
|
|
|
}
|
2021-11-22 14:46:57 +02:00
|
|
|
|
|
|
|
const masterKey = localSyncInfo().masterKeys.find(mk => mk.id === masterKeyId);
|
|
|
|
if (!(await masterPasswordIsValid(password, masterKey))) {
|
|
|
|
this.stdout(_('Invalid password'));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-10-09 19:35:46 +02:00
|
|
|
Setting.setObjectValue('encryption.passwordCache', masterKeyId, password);
|
2021-08-12 17:54:10 +02:00
|
|
|
await loadMasterKeysFromSettings(EncryptionService.instance());
|
2019-03-05 22:57:15 +02:00
|
|
|
return true;
|
2019-07-30 09:35:42 +02:00
|
|
|
};
|
2019-03-05 22:57:15 +02:00
|
|
|
|
2020-04-08 19:02:31 +02:00
|
|
|
const startDecryption = async () => {
|
|
|
|
this.stdout(_('Starting decryption... Please wait as it may take several minutes depending on how much there is to decrypt.'));
|
|
|
|
while (true) {
|
|
|
|
try {
|
2020-05-13 17:28:54 +02:00
|
|
|
const result = await DecryptionWorker.instance().start();
|
2020-10-30 01:37:19 +02:00
|
|
|
|
|
|
|
if (result.error) throw result.error;
|
|
|
|
|
2020-05-13 17:28:54 +02:00
|
|
|
const line = [];
|
|
|
|
line.push(_('Decrypted items: %d', result.decryptedItemCount));
|
|
|
|
if (result.skippedItemCount) line.push(_('Skipped items: %d (use --retry-failed-items to retry decrypting them)', result.skippedItemCount));
|
|
|
|
this.stdout(line.join('\n'));
|
2020-04-08 19:02:31 +02:00
|
|
|
break;
|
|
|
|
} catch (error) {
|
|
|
|
if (error.code === 'masterKeyNotLoaded') {
|
|
|
|
const ok = await askForMasterKey(error);
|
|
|
|
if (!ok) return;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
throw error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
this.stdout(_('Completed decryption.'));
|
|
|
|
};
|
|
|
|
|
2017-12-26 12:38:53 +02:00
|
|
|
if (args.command === 'enable') {
|
2021-06-15 18:15:00 +02:00
|
|
|
const argPassword = options.password ? options.password.toString() : '';
|
|
|
|
const password = argPassword ? argPassword : await this.prompt(_('Enter master password:'), { type: 'string', secure: true });
|
2017-12-26 12:38:53 +02:00
|
|
|
if (!password) {
|
|
|
|
this.stdout(_('Operation cancelled'));
|
|
|
|
return;
|
|
|
|
}
|
2021-06-15 18:15:00 +02:00
|
|
|
|
|
|
|
// If the password was passed via command line, we don't ask for
|
|
|
|
// confirmation. This is to allow setting up E2EE entirely from the
|
|
|
|
// command line.
|
|
|
|
if (!argPassword) {
|
|
|
|
const password2 = await this.prompt(_('Confirm password:'), { type: 'string', secure: true });
|
|
|
|
if (!password2) {
|
|
|
|
this.stdout(_('Operation cancelled'));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (password !== password2) {
|
|
|
|
this.stdout(_('Passwords do not match!'));
|
|
|
|
return;
|
|
|
|
}
|
2019-10-02 08:48:58 +02:00
|
|
|
}
|
2021-06-15 18:15:00 +02:00
|
|
|
|
2021-08-12 17:54:10 +02:00
|
|
|
await generateMasterKeyAndEnableEncryption(EncryptionService.instance(), password);
|
2017-12-26 12:38:53 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (args.command === 'disable') {
|
2021-08-12 17:54:10 +02:00
|
|
|
await setupAndDisableEncryption(EncryptionService.instance());
|
2017-12-26 12:38:53 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (args.command === 'decrypt') {
|
2019-02-10 18:43:55 +02:00
|
|
|
if (args.path) {
|
|
|
|
const plainText = await EncryptionService.instance().decryptString(args.path);
|
|
|
|
this.stdout(plainText);
|
|
|
|
} else {
|
2020-04-08 19:02:31 +02:00
|
|
|
if (args.options['retry-failed-items']) await DecryptionWorker.instance().clearDisabledItems();
|
|
|
|
await startDecryption();
|
2018-06-28 21:48:39 +02:00
|
|
|
}
|
2017-12-28 21:51:24 +02:00
|
|
|
|
2017-12-26 12:38:53 +02:00
|
|
|
return;
|
|
|
|
}
|
2017-12-04 21:01:56 +02:00
|
|
|
|
2018-01-05 19:40:57 +02:00
|
|
|
if (args.command === 'status') {
|
2021-08-12 17:54:10 +02:00
|
|
|
this.stdout(_('Encryption is: %s', getEncryptionEnabled() ? _('Enabled') : _('Disabled')));
|
2018-01-05 19:40:57 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-03-05 22:57:15 +02:00
|
|
|
if (args.command === 'decrypt-file') {
|
|
|
|
while (true) {
|
|
|
|
try {
|
|
|
|
const outputDir = options.output ? options.output : require('os').tmpdir();
|
2019-09-19 23:51:18 +02:00
|
|
|
let outFile = `${outputDir}/${pathUtils.filename(args.path)}.${Date.now()}.bin`;
|
2019-03-05 22:57:15 +02:00
|
|
|
await EncryptionService.instance().decryptFile(args.path, outFile);
|
|
|
|
const buffer = await readChunk(outFile, 0, 64);
|
|
|
|
const detectedType = imageType(buffer);
|
|
|
|
|
|
|
|
if (detectedType) {
|
2019-09-19 23:51:18 +02:00
|
|
|
const newOutFile = `${outFile}.${detectedType.ext}`;
|
2019-03-05 22:57:15 +02:00
|
|
|
await shim.fsDriver().move(outFile, newOutFile);
|
|
|
|
outFile = newOutFile;
|
|
|
|
}
|
|
|
|
|
|
|
|
this.stdout(outFile);
|
|
|
|
break;
|
|
|
|
} catch (error) {
|
|
|
|
if (error.code === 'masterKeyNotLoaded') {
|
|
|
|
const ok = await askForMasterKey(error);
|
|
|
|
if (!ok) return;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
throw error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-10-03 17:00:49 +02:00
|
|
|
// if (args.command === 'generate-ppk') {
|
|
|
|
// const syncInfo = localSyncInfo();
|
|
|
|
// if (syncInfo.ppk) throw new Error('This account already has a public-private key pair');
|
|
|
|
|
|
|
|
// const argPassword = options.password ? options.password.toString() : '';
|
|
|
|
// if (!argPassword) throw new Error('Password must be provided'); // TODO: should get from prompt
|
|
|
|
// const ppk = await generateKeyPair(EncryptionService.instance(), argPassword);
|
|
|
|
|
|
|
|
// syncInfo.ppk = ppk;
|
|
|
|
// saveLocalSyncInfo(syncInfo);
|
|
|
|
// await Setting.saveAll();
|
|
|
|
// }
|
|
|
|
|
2017-12-04 21:01:56 +02:00
|
|
|
if (args.command === 'target-status') {
|
|
|
|
const fs = require('fs-extra');
|
|
|
|
|
|
|
|
const targetPath = args.path;
|
|
|
|
if (!targetPath) throw new Error('Please specify the sync target path.');
|
|
|
|
|
2021-08-07 13:22:37 +02:00
|
|
|
const dirPaths = function(targetPath: string) {
|
|
|
|
const paths: string[] = [];
|
|
|
|
fs.readdirSync(targetPath).forEach((path: string) => {
|
2017-12-04 21:01:56 +02:00
|
|
|
paths.push(path);
|
|
|
|
});
|
|
|
|
return paths;
|
2019-07-30 09:35:42 +02:00
|
|
|
};
|
2017-12-04 21:01:56 +02:00
|
|
|
|
|
|
|
let itemCount = 0;
|
|
|
|
let resourceCount = 0;
|
|
|
|
let encryptedItemCount = 0;
|
|
|
|
let encryptedResourceCount = 0;
|
|
|
|
let otherItemCount = 0;
|
|
|
|
|
2020-03-14 01:46:14 +02:00
|
|
|
const encryptedPaths = [];
|
|
|
|
const decryptedPaths = [];
|
2017-12-04 21:01:56 +02:00
|
|
|
|
2020-03-14 01:46:14 +02:00
|
|
|
const paths = dirPaths(targetPath);
|
2017-12-04 21:01:56 +02:00
|
|
|
|
|
|
|
for (let i = 0; i < paths.length; i++) {
|
|
|
|
const path = paths[i];
|
2019-09-19 23:51:18 +02:00
|
|
|
const fullPath = `${targetPath}/${path}`;
|
2017-12-04 21:01:56 +02:00
|
|
|
const stat = await fs.stat(fullPath);
|
|
|
|
|
|
|
|
// this.stdout(fullPath);
|
|
|
|
|
|
|
|
if (path === '.resource') {
|
2020-03-14 01:46:14 +02:00
|
|
|
const resourcePaths = dirPaths(fullPath);
|
2017-12-04 21:01:56 +02:00
|
|
|
for (let j = 0; j < resourcePaths.length; j++) {
|
|
|
|
const resourcePath = resourcePaths[j];
|
|
|
|
resourceCount++;
|
2019-09-19 23:51:18 +02:00
|
|
|
const fullResourcePath = `${fullPath}/${resourcePath}`;
|
2017-12-04 21:01:56 +02:00
|
|
|
const isEncrypted = await EncryptionService.instance().fileIsEncrypted(fullResourcePath);
|
|
|
|
if (isEncrypted) {
|
|
|
|
encryptedResourceCount++;
|
|
|
|
encryptedPaths.push(fullResourcePath);
|
|
|
|
} else {
|
|
|
|
decryptedPaths.push(fullResourcePath);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else if (stat.isDirectory()) {
|
|
|
|
continue;
|
|
|
|
} else {
|
|
|
|
const content = await fs.readFile(fullPath, 'utf8');
|
|
|
|
const item = await BaseItem.unserialize(content);
|
|
|
|
const ItemClass = BaseItem.itemClass(item);
|
|
|
|
|
|
|
|
if (!ItemClass.encryptionSupported()) {
|
|
|
|
otherItemCount++;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2018-01-26 01:01:18 +02:00
|
|
|
itemCount++;
|
|
|
|
|
2017-12-04 21:01:56 +02:00
|
|
|
const isEncrypted = await EncryptionService.instance().itemIsEncrypted(item);
|
|
|
|
|
|
|
|
if (isEncrypted) {
|
|
|
|
encryptedItemCount++;
|
|
|
|
encryptedPaths.push(fullPath);
|
|
|
|
} else {
|
|
|
|
decryptedPaths.push(fullPath);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-19 23:51:18 +02:00
|
|
|
this.stdout(`Encrypted items: ${encryptedItemCount}/${itemCount}`);
|
|
|
|
this.stdout(`Encrypted resources: ${encryptedResourceCount}/${resourceCount}`);
|
|
|
|
this.stdout(`Other items (never encrypted): ${otherItemCount}`);
|
2017-12-04 21:01:56 +02:00
|
|
|
|
|
|
|
if (options.verbose) {
|
|
|
|
this.stdout('');
|
|
|
|
this.stdout('# Encrypted paths');
|
|
|
|
this.stdout('');
|
|
|
|
for (let i = 0; i < encryptedPaths.length; i++) {
|
|
|
|
const path = encryptedPaths[i];
|
|
|
|
this.stdout(path);
|
|
|
|
}
|
|
|
|
|
|
|
|
this.stdout('');
|
|
|
|
this.stdout('# Decrypted paths');
|
|
|
|
this.stdout('');
|
|
|
|
for (let i = 0; i < decryptedPaths.length; i++) {
|
|
|
|
const path = decryptedPaths[i];
|
|
|
|
this.stdout(path);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-05 19:40:57 +02:00
|
|
|
return;
|
2017-12-04 21:01:56 +02:00
|
|
|
}
|
2017-12-26 12:38:53 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-30 09:35:42 +02:00
|
|
|
module.exports = Command;
|