rights 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135
  1. # -*- mode: conf -*-
  2. # vim:ft=cfg
  3. # Allow all rights for the Administrator
  4. #[root]
  5. #user: Administrator
  6. #collection: .*
  7. #permissions: RW
  8. # Allow reading principal collection (same as username)
  9. #[principal]
  10. #user: .+
  11. #collection: {user}
  12. #permissions: R
  13. # Allow reading and writing private collection (same as username)
  14. #[private]
  15. #user: .+
  16. #collection: {user}/private/
  17. #permissions: RW
  18. # Allow reading calendars and address books that are direct
  19. # children of the principal collection for other users
  20. #[calendarsReader]
  21. #user: .+
  22. #collection: {user}/[^/]+
  23. #permissions: r
  24. # Rights management file for Radicale - A simple calendar server
  25. #
  26. # The default path for this file is /etc/radicale/rights
  27. # The path can be specified in the rights section of the configuration file
  28. #
  29. # Section names are used for naming rules and must be unique.
  30. # The first rule matching both user and collection patterns will be used.
  31. # Example: owner_only plugin
  32. # Allow reading root collection for authenticated users
  33. #[root]
  34. #user: .+
  35. #collection:
  36. #permissions: R
  37. # Allow reading and writing principal collection (same as username)
  38. #[principal]
  39. #user: .+
  40. #collection: {user}
  41. #permissions: RW
  42. # Allow reading and writing calendars and address books that are direct
  43. # children of the principal collection
  44. #[calendars]
  45. #user: .+
  46. #collection: {user}/[^/]+
  47. #permissions: rw
  48. # Example: owner_write plugin
  49. # Only listed additional rules for the owner_only plugin example.
  50. # Allow reading principal collections of all users
  51. #[read-all-principals]
  52. #user: .+
  53. #collection: [^/]+
  54. #permissions: R
  55. # Allow reading all calendars and address books that are direct children of any
  56. # principal collection
  57. #[read-all-calendars]
  58. #user: .+
  59. #collection: [^/]+/[^/]+
  60. #permissions: r
  61. # Example: authenticated plugin
  62. # Allow reading and writing root and principal collections of all users
  63. #[root-and-principals]
  64. #user: .+
  65. #collection: [^/]*
  66. #permissions: RW
  67. # Allow reading and writing all calendars and address books that are direct
  68. # children of any principal collection
  69. #[calendars]
  70. #user: .+
  71. #collection: [^/]+/[^/]+
  72. #permissions: rw
  73. # Example: Allow user "admin" to read everything
  74. #[admin-read-all]
  75. #user: admin
  76. #collection: .*
  77. #permissions: Rr
  78. # Example: Allow everybody (including unauthenticated users) to read
  79. # the collection "public"
  80. # Allow reading collection "public" for authenticated users
  81. #[public-principal]
  82. #user: .+
  83. #collection: public
  84. #permissions: R
  85. # Allow reading all calendars and address books that are direct children of
  86. # the collection "public" for authenticated users
  87. #[public-calendars]
  88. #user: .+
  89. #collection: public/[^/]+
  90. #permissions: r
  91. # Allow access to public calendars and address books via HTTP GET for everyone
  92. #[public-calendars-restricted]
  93. #user: .*
  94. #collection: public/[^/]+
  95. #permissions: i
  96. # Example: Grant users of the form user@domain.tld read access to the
  97. # collection "domain.tld"
  98. # Allow reading the domain collection
  99. #[read-domain-principal]
  100. #user: .+@([^@]+)
  101. #collection: {0}
  102. #permissions: R
  103. # Allow reading all calendars and address books that are direct children of
  104. # the domain collection
  105. #[read-domain-calendars]
  106. #user: .+@([^@]+)
  107. #collection: {0}/[^/]+
  108. #permissions: r