__init__.py 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292
  1. # -*- coding: utf-8 -*-
  2. #
  3. # This file is part of Radicale Server - Calendar Server
  4. # Copyright © 2008-2011 Guillaume Ayoub
  5. # Copyright © 2008 Nicolas Kandel
  6. # Copyright © 2008 Pascal Halter
  7. #
  8. # This library is free software: you can redistribute it and/or modify
  9. # it under the terms of the GNU General Public License as published by
  10. # the Free Software Foundation, either version 3 of the License, or
  11. # (at your option) any later version.
  12. #
  13. # This library is distributed in the hope that it will be useful,
  14. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. # GNU General Public License for more details.
  17. #
  18. # You should have received a copy of the GNU General Public License
  19. # along with Radicale. If not, see <http://www.gnu.org/licenses/>.
  20. """
  21. Radicale Server module.
  22. This module offers 3 useful classes:
  23. - ``HTTPServer`` is a simple HTTP server;
  24. - ``HTTPSServer`` is a HTTPS server, wrapping the HTTP server in a socket
  25. managing SSL connections;
  26. - ``CalendarHTTPHandler`` is a CalDAV request handler for HTTP(S) servers.
  27. To use this module, you should take a look at the file ``radicale.py`` that
  28. should have been included in this package.
  29. """
  30. import os
  31. import posixpath
  32. import base64
  33. import socket
  34. # Manage Python2/3 different modules
  35. # pylint: disable=F0401
  36. try:
  37. from http import client, server
  38. except ImportError:
  39. import httplib as client
  40. import BaseHTTPServer as server
  41. # pylint: enable=F0401
  42. from radicale import acl, config, ical, xmlutils
  43. VERSION = "git"
  44. def _check(request, function):
  45. """Check if user has sufficient rights for performing ``request``."""
  46. # ``_check`` decorator can access ``request`` protected functions
  47. # pylint: disable=W0212
  48. # If we have no calendar, don't check rights
  49. if not request._calendar:
  50. return function(request)
  51. authorization = request.headers.get("Authorization", None)
  52. if authorization:
  53. challenge = authorization.lstrip("Basic").strip().encode("ascii")
  54. plain = request._decode(base64.b64decode(challenge))
  55. user, password = plain.split(":")
  56. else:
  57. user = password = None
  58. if request.server.acl.has_right(request._calendar.owner, user, password):
  59. function(request)
  60. else:
  61. request.send_response(client.UNAUTHORIZED)
  62. request.send_header(
  63. "WWW-Authenticate",
  64. "Basic realm=\"Radicale Server - Password Required\"")
  65. request.end_headers()
  66. # pylint: enable=W0212
  67. class HTTPServer(server.HTTPServer):
  68. """HTTP server."""
  69. PROTOCOL = "http"
  70. # Maybe a Pylint bug, ``__init__`` calls ``server.HTTPServer.__init__``
  71. # pylint: disable=W0231
  72. def __init__(self, address, handler, bind_and_activate=True):
  73. """Create server."""
  74. ipv6 = ":" in address[0]
  75. if ipv6:
  76. self.address_family = socket.AF_INET6
  77. # Do not bind and activate, as we might change socketopts
  78. server.HTTPServer.__init__(self, address, handler, False)
  79. if ipv6:
  80. # Only allow IPv6 connections to the IPv6 socket
  81. self.socket.setsockopt(socket.IPPROTO_IPV6, socket.IPV6_V6ONLY, 1)
  82. if bind_and_activate:
  83. self.server_bind()
  84. self.server_activate()
  85. self.acl = acl.load()
  86. # pylint: enable=W0231
  87. class HTTPSServer(HTTPServer):
  88. """HTTPS server."""
  89. PROTOCOL = "https"
  90. def __init__(self, address, handler, bind_and_activate=True):
  91. """Create server by wrapping HTTP socket in an SSL socket."""
  92. # Fails with Python 2.5, import if needed
  93. # pylint: disable=F0401
  94. import ssl
  95. # pylint: enable=F0401
  96. HTTPServer.__init__(self, address, handler, False)
  97. self.socket = ssl.wrap_socket(
  98. self.socket,
  99. server_side=True,
  100. certfile=config.get("server", "certificate"),
  101. keyfile=config.get("server", "key"),
  102. ssl_version=ssl.PROTOCOL_SSLv23)
  103. if bind_and_activate:
  104. self.server_bind()
  105. self.server_activate()
  106. class CalendarHTTPHandler(server.BaseHTTPRequestHandler):
  107. """HTTP requests handler for calendars."""
  108. _encoding = config.get("encoding", "request")
  109. # Decorator checking rights before performing request
  110. check_rights = lambda function: lambda request: _check(request, function)
  111. @property
  112. def _calendar(self):
  113. """The ``ical.Calendar`` object corresponding to the given path."""
  114. # ``self.path`` must be something like a posix path
  115. # ``normpath`` should clean malformed and malicious request paths
  116. attributes = posixpath.normpath(self.path.strip("/")).split("/")
  117. if len(attributes) >= 2:
  118. path = "%s/%s" % (attributes[0], attributes[1])
  119. return ical.Calendar(path)
  120. def _decode(self, text):
  121. """Try to decode text according to various parameters."""
  122. # List of charsets to try
  123. charsets = []
  124. # First append content charset given in the request
  125. content_type = self.headers.get("Content-Type", None)
  126. if content_type and "charset=" in content_type:
  127. charsets.append(content_type.split("charset=")[1].strip())
  128. # Then append default Radicale charset
  129. charsets.append(self._encoding)
  130. # Then append various fallbacks
  131. charsets.append("utf-8")
  132. charsets.append("iso8859-1")
  133. # Try to decode
  134. for charset in charsets:
  135. try:
  136. return text.decode(charset)
  137. except UnicodeDecodeError:
  138. pass
  139. raise UnicodeDecodeError
  140. # Naming methods ``do_*`` is OK here
  141. # pylint: disable=C0103
  142. def do_GET(self):
  143. """Manage GET request."""
  144. self.do_HEAD()
  145. if self._answer:
  146. self.wfile.write(self._answer)
  147. @check_rights
  148. def do_HEAD(self):
  149. """Manage HEAD request."""
  150. item_name = xmlutils.name_from_path(self.path)
  151. if item_name:
  152. # Get calendar item
  153. item = self._calendar.get_item(item_name)
  154. if item:
  155. items = self._calendar.timezones
  156. items.append(item)
  157. answer_text = ical.serialize(
  158. headers=self._calendar.headers, items=items)
  159. etag = item.etag
  160. else:
  161. self._answer = None
  162. self.send_response(client.GONE)
  163. return
  164. else:
  165. # Get whole calendar
  166. answer_text = self._calendar.text
  167. etag = self._calendar.etag
  168. self._answer = answer_text.encode(self._encoding)
  169. self.send_response(client.OK)
  170. self.send_header("Content-Length", len(self._answer))
  171. self.send_header("Content-Type", "text/calendar")
  172. self.send_header("Last-Modified", self._calendar.last_modified)
  173. self.send_header("ETag", etag)
  174. self.end_headers()
  175. @check_rights
  176. def do_DELETE(self):
  177. """Manage DELETE request."""
  178. item = self._calendar.get_item(xmlutils.name_from_path(self.path))
  179. if item and self.headers.get("If-Match", item.etag) == item.etag:
  180. # No ETag precondition or precondition verified, delete item
  181. self._answer = xmlutils.delete(self.path, self._calendar)
  182. self.send_response(client.NO_CONTENT)
  183. self.send_header("Content-Length", len(self._answer))
  184. self.end_headers()
  185. self.wfile.write(self._answer)
  186. else:
  187. # No item or ETag precondition not verified, do not delete item
  188. self.send_response(client.PRECONDITION_FAILED)
  189. @check_rights
  190. def do_MKCALENDAR(self):
  191. """Manage MKCALENDAR request."""
  192. self.send_response(client.CREATED)
  193. self.end_headers()
  194. def do_OPTIONS(self):
  195. """Manage OPTIONS request."""
  196. self.send_response(client.OK)
  197. self.send_header(
  198. "Allow", "DELETE, HEAD, GET, MKCALENDAR, "
  199. "OPTIONS, PROPFIND, PUT, REPORT")
  200. self.send_header("DAV", "1, calendar-access")
  201. self.end_headers()
  202. def do_PROPFIND(self):
  203. """Manage PROPFIND request."""
  204. xml_request = self.rfile.read(int(self.headers["Content-Length"]))
  205. self._answer = xmlutils.propfind(
  206. self.path, xml_request, self._calendar,
  207. self.headers.get("depth", "infinity"))
  208. self.send_response(client.MULTI_STATUS)
  209. self.send_header("DAV", "1, calendar-access")
  210. self.send_header("Content-Length", len(self._answer))
  211. self.send_header("Content-Type", "text/xml")
  212. self.end_headers()
  213. self.wfile.write(self._answer)
  214. @check_rights
  215. def do_PUT(self):
  216. """Manage PUT request."""
  217. item_name = xmlutils.name_from_path(self.path)
  218. item = self._calendar.get_item(item_name)
  219. if (not item and not self.headers.get("If-Match")) or \
  220. (item and self.headers.get("If-Match", item.etag) == item.etag):
  221. # PUT allowed in 3 cases
  222. # Case 1: No item and no ETag precondition: Add new item
  223. # Case 2: Item and ETag precondition verified: Modify item
  224. # Case 3: Item and no Etag precondition: Force modifying item
  225. ical_request = self._decode(
  226. self.rfile.read(int(self.headers["Content-Length"])))
  227. xmlutils.put(self.path, ical_request, self._calendar)
  228. etag = self._calendar.get_item(item_name).etag
  229. self.send_response(client.CREATED)
  230. self.send_header("ETag", etag)
  231. self.end_headers()
  232. else:
  233. # PUT rejected in all other cases
  234. self.send_response(client.PRECONDITION_FAILED)
  235. @check_rights
  236. def do_REPORT(self):
  237. """Manage REPORT request."""
  238. xml_request = self.rfile.read(int(self.headers["Content-Length"]))
  239. self._answer = xmlutils.report(self.path, xml_request, self._calendar)
  240. self.send_response(client.MULTI_STATUS)
  241. self.send_header("Content-Length", len(self._answer))
  242. self.end_headers()
  243. self.wfile.write(self._answer)
  244. # pylint: enable=C0103