__init__.py 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310
  1. # -*- coding: utf-8 -*-
  2. #
  3. # This file is part of Radicale Server - Calendar Server
  4. # Copyright © 2008-2011 Guillaume Ayoub
  5. # Copyright © 2008 Nicolas Kandel
  6. # Copyright © 2008 Pascal Halter
  7. #
  8. # This library is free software: you can redistribute it and/or modify
  9. # it under the terms of the GNU General Public License as published by
  10. # the Free Software Foundation, either version 3 of the License, or
  11. # (at your option) any later version.
  12. #
  13. # This library is distributed in the hope that it will be useful,
  14. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. # GNU General Public License for more details.
  17. #
  18. # You should have received a copy of the GNU General Public License
  19. # along with Radicale. If not, see <http://www.gnu.org/licenses/>.
  20. """
  21. Radicale Server module.
  22. This module offers 3 useful classes:
  23. - ``HTTPServer`` is a simple HTTP server;
  24. - ``HTTPSServer`` is a HTTPS server, wrapping the HTTP server in a socket
  25. managing SSL connections;
  26. - ``CalendarHTTPHandler`` is a CalDAV request handler for HTTP(S) servers.
  27. To use this module, you should take a look at the file ``radicale.py`` that
  28. should have been included in this package.
  29. """
  30. import os
  31. import posixpath
  32. import base64
  33. import socket
  34. # Manage Python2/3 different modules
  35. # pylint: disable=F0401
  36. try:
  37. from http import client, server
  38. except ImportError:
  39. import httplib as client
  40. import BaseHTTPServer as server
  41. # pylint: enable=F0401
  42. from radicale import acl, config, ical, xmlutils, log
  43. VERSION = "git"
  44. def _check(request, function):
  45. """Check if user has sufficient rights for performing ``request``."""
  46. log.log(10, "Check if user has sufficient rights for performing ``request`` %s." % (request.command))
  47. # ``_check`` decorator can access ``request`` protected functions
  48. # pylint: disable=W0212
  49. # If we have no calendar, don't check rights
  50. if not request._calendar:
  51. return function(request)
  52. authorization = request.headers.get("Authorization", None)
  53. if authorization:
  54. challenge = authorization.lstrip("Basic").strip().encode("ascii")
  55. plain = request._decode(base64.b64decode(challenge))
  56. user, password = plain.split(":")
  57. else:
  58. user = password = None
  59. if request.server.acl.has_right(request._calendar.owner, user, password):
  60. log.log(20, "Sufficient rights for performing ``request`` %s." % (request.command))
  61. function(request)
  62. else:
  63. log.log(40, "No sufficient rights for performing ``request``.")
  64. request.send_response(client.UNAUTHORIZED)
  65. request.send_header(
  66. "WWW-Authenticate",
  67. "Basic realm=\"Radicale Server - Password Required\"")
  68. request.end_headers()
  69. # pylint: enable=W0212
  70. class HTTPServer(server.HTTPServer):
  71. """HTTP server."""
  72. PROTOCOL = "http"
  73. # Maybe a Pylint bug, ``__init__`` calls ``server.HTTPServer.__init__``
  74. # pylint: disable=W0231
  75. def __init__(self, address, handler, bind_and_activate=True):
  76. """Create server."""
  77. log.log(10, "Create HTTP server.")
  78. ipv6 = ":" in address[0]
  79. if ipv6:
  80. self.address_family = socket.AF_INET6
  81. # Do not bind and activate, as we might change socketopts
  82. server.HTTPServer.__init__(self, address, handler, False)
  83. if ipv6:
  84. # Only allow IPv6 connections to the IPv6 socket
  85. self.socket.setsockopt(socket.IPPROTO_IPV6, socket.IPV6_V6ONLY, 1)
  86. if bind_and_activate:
  87. self.server_bind()
  88. self.server_activate()
  89. self.acl = acl.load()
  90. # pylint: enable=W0231
  91. class HTTPSServer(HTTPServer):
  92. """HTTPS server."""
  93. PROTOCOL = "https"
  94. def __init__(self, address, handler, bind_and_activate=True):
  95. """Create server by wrapping HTTP socket in an SSL socket."""
  96. log.log(10, "Create server by wrapping HTTP socket in an SSL socket.")
  97. # Fails with Python 2.5, import if needed
  98. # pylint: disable=F0401
  99. import ssl
  100. # pylint: enable=F0401
  101. HTTPServer.__init__(self, address, handler, False)
  102. self.socket = ssl.wrap_socket(
  103. self.socket,
  104. server_side=True,
  105. certfile=config.get("server", "certificate"),
  106. keyfile=config.get("server", "key"),
  107. ssl_version=ssl.PROTOCOL_SSLv23)
  108. if bind_and_activate:
  109. self.server_bind()
  110. self.server_activate()
  111. class CalendarHTTPHandler(server.BaseHTTPRequestHandler):
  112. """HTTP requests handler for calendars."""
  113. log.log(10, "HTTP requests handler for calendars.")
  114. _encoding = config.get("encoding", "request")
  115. # Decorator checking rights before performing request
  116. check_rights = lambda function: lambda request: _check(request, function)
  117. @property
  118. def _calendar(self):
  119. """The ``ical.Calendar`` object corresponding to the given path."""
  120. log.log(10, "The ``ical.Calendar`` object corresponding to the given path. (%s)" % (self.path))
  121. # ``self.path`` must be something like a posix path
  122. # ``normpath`` should clean malformed and malicious request paths
  123. attributes = posixpath.normpath(self.path.strip("/")).split("/")
  124. if len(attributes) >= 2:
  125. path = "%s/%s" % (attributes[0], attributes[1])
  126. return ical.Calendar(path)
  127. def _decode(self, text):
  128. """Try to decode text according to various parameters."""
  129. log.log(10, "Try to decode text according to various parameters.")
  130. # List of charsets to try
  131. charsets = []
  132. # First append content charset given in the request
  133. content_type = self.headers.get("Content-Type", None)
  134. if content_type and "charset=" in content_type:
  135. charsets.append(content_type.split("charset=")[1].strip())
  136. # Then append default Radicale charset
  137. charsets.append(self._encoding)
  138. # Then append various fallbacks
  139. charsets.append("utf-8")
  140. charsets.append("iso8859-1")
  141. # Try to decode
  142. for charset in charsets:
  143. try:
  144. return text.decode(charset)
  145. except UnicodeDecodeError:
  146. pass
  147. raise UnicodeDecodeError
  148. # Naming methods ``do_*`` is OK here
  149. # pylint: disable=C0103
  150. def do_GET(self):
  151. """Manage GET request."""
  152. log.log(10, "Manage GET request.")
  153. self.do_HEAD()
  154. if self._answer:
  155. self.wfile.write(self._answer)
  156. @check_rights
  157. def do_HEAD(self):
  158. """Manage HEAD request."""
  159. log.log(10, "Manage HEAD request.")
  160. item_name = xmlutils.name_from_path(self.path)
  161. if item_name:
  162. # Get calendar item
  163. item = self._calendar.get_item(item_name)
  164. if item:
  165. items = self._calendar.timezones
  166. items.append(item)
  167. answer_text = ical.serialize(
  168. headers=self._calendar.headers, items=items)
  169. etag = item.etag
  170. else:
  171. self._answer = None
  172. self.send_response(client.GONE)
  173. return
  174. else:
  175. # Get whole calendar
  176. answer_text = self._calendar.text
  177. etag = self._calendar.etag
  178. self._answer = answer_text.encode(self._encoding)
  179. self.send_response(client.OK)
  180. self.send_header("Content-Length", len(self._answer))
  181. self.send_header("Content-Type", "text/calendar")
  182. self.send_header("Last-Modified", self._calendar.last_modified)
  183. self.send_header("ETag", etag)
  184. self.end_headers()
  185. @check_rights
  186. def do_DELETE(self):
  187. """Manage DELETE request."""
  188. log.log(10, "Manage DELETE request.")
  189. item = self._calendar.get_item(xmlutils.name_from_path(self.path))
  190. if item and self.headers.get("If-Match", item.etag) == item.etag:
  191. # No ETag precondition or precondition verified, delete item
  192. self._answer = xmlutils.delete(self.path, self._calendar)
  193. self.send_response(client.NO_CONTENT)
  194. self.send_header("Content-Length", len(self._answer))
  195. self.end_headers()
  196. self.wfile.write(self._answer)
  197. else:
  198. # No item or ETag precondition not verified, do not delete item
  199. self.send_response(client.PRECONDITION_FAILED)
  200. @check_rights
  201. def do_MKCALENDAR(self):
  202. """Manage MKCALENDAR request."""
  203. self.send_response(client.CREATED)
  204. self.end_headers()
  205. def do_OPTIONS(self):
  206. """Manage OPTIONS request."""
  207. log.log(10, "Manage OPTIONS request.")
  208. self.send_response(client.OK)
  209. self.send_header(
  210. "Allow", "DELETE, HEAD, GET, MKCALENDAR, "
  211. "OPTIONS, PROPFIND, PUT, REPORT")
  212. self.send_header("DAV", "1, calendar-access")
  213. self.end_headers()
  214. def do_PROPFIND(self):
  215. """Manage PROPFIND request."""
  216. log.log(10, "Manage PROPFIND request.")
  217. xml_request = self.rfile.read(int(self.headers["Content-Length"]))
  218. self._answer = xmlutils.propfind(
  219. self.path, xml_request, self._calendar,
  220. self.headers.get("depth", "infinity"))
  221. self.send_response(client.MULTI_STATUS)
  222. self.send_header("DAV", "1, calendar-access")
  223. self.send_header("Content-Length", len(self._answer))
  224. self.send_header("Content-Type", "text/xml")
  225. self.end_headers()
  226. self.wfile.write(self._answer)
  227. @check_rights
  228. def do_PUT(self):
  229. """Manage PUT request."""
  230. log.log(10, "Manage PUT request.")
  231. item_name = xmlutils.name_from_path(self.path)
  232. item = self._calendar.get_item(item_name)
  233. if (not item and not self.headers.get("If-Match")) or \
  234. (item and self.headers.get("If-Match", item.etag) == item.etag):
  235. # PUT allowed in 3 cases
  236. # Case 1: No item and no ETag precondition: Add new item
  237. # Case 2: Item and ETag precondition verified: Modify item
  238. # Case 3: Item and no Etag precondition: Force modifying item
  239. ical_request = self._decode(
  240. self.rfile.read(int(self.headers["Content-Length"])))
  241. xmlutils.put(self.path, ical_request, self._calendar)
  242. etag = self._calendar.get_item(item_name).etag
  243. self.send_response(client.CREATED)
  244. self.send_header("ETag", etag)
  245. self.end_headers()
  246. else:
  247. # PUT rejected in all other cases
  248. self.send_response(client.PRECONDITION_FAILED)
  249. @check_rights
  250. def do_REPORT(self):
  251. """Manage REPORT request."""
  252. log.log(10, "Manage REPORT request.")
  253. xml_request = self.rfile.read(int(self.headers["Content-Length"]))
  254. self._answer = xmlutils.report(self.path, xml_request, self._calendar)
  255. self.send_response(client.MULTI_STATUS)
  256. self.send_header("Content-Length", len(self._answer))
  257. self.end_headers()
  258. self.wfile.write(self._answer)
  259. def log_message(self, format, *args):
  260. log.log(10, format % (args))
  261. # pylint: enable=C0103