Unrud 8 лет назад
Родитель
Сommit
3e715a9aff
2 измененных файлов с 166 добавлено и 0 удалено
  1. 27 0
      radicale/tests/custom/rights.py
  2. 139 0
      radicale/tests/test_rights.py

+ 27 - 0
radicale/tests/custom/rights.py

@@ -0,0 +1,27 @@
+# This file is part of Radicale Server - Calendar Server
+# Copyright (C) 2017 Unrud <unrud@openaliasbox.org>
+#
+# This library is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# This library is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with Radicale.  If not, see <http://www.gnu.org/licenses/>.
+
+"""
+Custom rights management.
+
+"""
+
+from radicale import rights
+
+
+class Rights(rights.BaseRights):
+    def authorized(self, user, path, permission):
+        return path.strip("/") in ("tmp", "other")

+ 139 - 0
radicale/tests/test_rights.py

@@ -0,0 +1,139 @@
+# This file is part of Radicale Server - Calendar Server
+# Copyright (C) 2017 Unrud <unrud@openaliasbox.org>
+#
+# This library is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# This library is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with Radicale.  If not, see <http://www.gnu.org/licenses/>.
+
+"""
+Radicale tests with simple requests and rights.
+"""
+
+import base64
+import os
+import shutil
+import tempfile
+
+from radicale import Application, config
+
+from .test_base import BaseTest
+
+
+class TestBaseAuthRequests(BaseTest):
+    """Tests basic requests with rights."""
+
+    def setup(self):
+        self.configuration = config.load()
+        self.colpath = tempfile.mkdtemp()
+        self.configuration.set("storage", "filesystem_folder", self.colpath)
+        # Disable syncing to disk for better performance
+        self.configuration.set("storage", "filesystem_fsync", "False")
+        # Required on Windows, doesn't matter on Unix
+        self.configuration.set("storage", "close_lock_file", "True")
+
+    def teardown(self):
+        shutil.rmtree(self.colpath)
+
+    def _test_rights(self, rights_type, user, path, mode, expected_status):
+        assert mode in ("r", "w")
+        assert user in ("", "tmp")
+        htpasswd_file_path = os.path.join(self.colpath, ".htpasswd")
+        with open(htpasswd_file_path, "w") as f:
+            f.write("tmp:bepo\nother:bepo")
+        self.configuration.set("rights", "type", rights_type)
+        self.configuration.set("auth", "type", "htpasswd")
+        self.configuration.set("auth", "htpasswd_filename", htpasswd_file_path)
+        self.configuration.set("auth", "htpasswd_encryption", "plain")
+        self.application = Application(self.configuration, self.logger)
+        for u in ("tmp", "other"):
+            status, _, _ = self.request(
+                "PROPFIND", "/%s" % u, HTTP_AUTHORIZATION="Basic %s" %
+                base64.b64encode(("%s:bepo" % u).encode()).decode())
+            assert status == 207
+        status, _, _ = self.request(
+            "PROPFIND" if mode == "r" else "PROPPATCH", path,
+            HTTP_AUTHORIZATION="Basic %s" % base64.b64encode(
+                ("tmp:bepo").encode()).decode() if user else "")
+        assert status == expected_status
+
+    def test_owner_only(self):
+        self._test_rights("owner_only", "", "/", "r", 401)
+        self._test_rights("owner_only", "", "/", "w", 401)
+        self._test_rights("owner_only", "", "/tmp", "r", 401)
+        self._test_rights("owner_only", "", "/tmp", "w", 401)
+        self._test_rights("owner_only", "tmp", "/", "r", 207)
+        self._test_rights("owner_only", "tmp", "/", "w", 403)
+        self._test_rights("owner_only", "tmp", "/tmp", "r", 207)
+        self._test_rights("owner_only", "tmp", "/tmp", "w", 207)
+        self._test_rights("owner_only", "tmp", "/other", "r", 403)
+        self._test_rights("owner_only", "tmp", "/other", "w", 403)
+
+    def test_owner_write(self):
+        self._test_rights("owner_write", "", "/", "r", 401)
+        self._test_rights("owner_write", "", "/", "w", 401)
+        self._test_rights("owner_write", "", "/tmp", "r", 401)
+        self._test_rights("owner_write", "", "/tmp", "w", 401)
+        self._test_rights("owner_write", "tmp", "/", "r", 207)
+        self._test_rights("owner_write", "tmp", "/", "w", 403)
+        self._test_rights("owner_write", "tmp", "/tmp", "r", 207)
+        self._test_rights("owner_write", "tmp", "/tmp", "w", 207)
+        self._test_rights("owner_write", "tmp", "/other", "r", 207)
+        self._test_rights("owner_write", "tmp", "/other", "w", 403)
+
+    def test_authenticated(self):
+        self._test_rights("authenticated", "", "/", "r", 401)
+        self._test_rights("authenticated", "", "/", "w", 401)
+        self._test_rights("authenticated", "", "/tmp", "r", 401)
+        self._test_rights("authenticated", "", "/tmp", "w", 401)
+        self._test_rights("authenticated", "tmp", "/", "r", 207)
+        self._test_rights("authenticated", "tmp", "/", "w", 207)
+        self._test_rights("authenticated", "tmp", "/tmp", "r", 207)
+        self._test_rights("authenticated", "tmp", "/tmp", "w", 207)
+        self._test_rights("authenticated", "tmp", "/other", "r", 207)
+        self._test_rights("authenticated", "tmp", "/other", "w", 207)
+
+    def test_none(self):
+        self._test_rights("None", "", "/", "r", 207)
+        self._test_rights("None", "", "/", "w", 207)
+        self._test_rights("None", "", "/tmp", "r", 207)
+        self._test_rights("None", "", "/tmp", "w", 207)
+        self._test_rights("None", "tmp", "/", "r", 207)
+        self._test_rights("None", "tmp", "/", "w", 207)
+        self._test_rights("None", "tmp", "/tmp", "r", 207)
+        self._test_rights("None", "tmp", "/tmp", "w", 207)
+        self._test_rights("None", "tmp", "/other", "r", 207)
+        self._test_rights("None", "tmp", "/other", "w", 207)
+
+    def test_from_file(self):
+        rights_file_path = os.path.join(self.colpath, "rights")
+        with open(rights_file_path, "w") as f:
+            f.write("""\
+[owner]
+user: .+
+collection: %(login)s(/.*)?
+permission: rw
+[custom]
+user: .*
+collection: custom(/.*)?
+permission: r""")
+        self.configuration.set("rights", "file", rights_file_path)
+        self._test_rights("from_file", "", "/other", "r", 401)
+        self._test_rights("from_file", "tmp", "/other", "r", 403)
+        self._test_rights("from_file", "", "/custom/sub", "r", 404)
+        self._test_rights("from_file", "tmp", "/custom/sub", "r", 404)
+        self._test_rights("from_file", "", "/custom/sub", "w", 401)
+        self._test_rights("from_file", "tmp", "/custom/sub", "w", 403)
+
+    def test_custom(self):
+        """Custom rights management."""
+        self._test_rights("tests.custom.rights", "", "/", "r", 401)
+        self._test_rights("tests.custom.rights", "", "/tmp", "r", 207)