| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131 |
- # This file is part of Radicale - CalDAV and CardDAV server
- # Copyright © 2020 Unrud <unrud@outlook.com>
- #
- # This library is free software: you can redistribute it and/or modify
- # it under the terms of the GNU General Public License as published by
- # the Free Software Foundation, either version 3 of the License, or
- # (at your option) any later version.
- #
- # This library is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU General Public License for more details.
- #
- # You should have received a copy of the GNU General Public License
- # along with Radicale. If not, see <http://www.gnu.org/licenses/>.
- import io
- import logging
- import posixpath
- import sys
- import xml.etree.ElementTree as ET
- from typing import Optional
- from radicale import (auth, config, httputils, pathutils, rights, storage,
- types, web, xmlutils)
- from radicale.log import logger
- # HACK: https://github.com/tiran/defusedxml/issues/54
- import defusedxml.ElementTree as DefusedET # isort:skip
- sys.modules["xml.etree"].ElementTree = ET # type:ignore[attr-defined]
- class ApplicationBase:
- configuration: config.Configuration
- _auth: auth.BaseAuth
- _storage: storage.BaseStorage
- _rights: rights.BaseRights
- _web: web.BaseWeb
- _encoding: str
- def __init__(self, configuration: config.Configuration) -> None:
- self.configuration = configuration
- self._auth = auth.load(configuration)
- self._storage = storage.load(configuration)
- self._rights = rights.load(configuration)
- self._web = web.load(configuration)
- self._encoding = configuration.get("encoding", "request")
- def _read_xml_request_body(self, environ: types.WSGIEnviron
- ) -> Optional[ET.Element]:
- content = httputils.decode_request(
- self.configuration, environ,
- httputils.read_raw_request_body(self.configuration, environ))
- if not content:
- return None
- try:
- xml_content = DefusedET.fromstring(content)
- except ET.ParseError as e:
- logger.debug("Request content (Invalid XML):\n%s", content)
- raise RuntimeError("Failed to parse XML: %s" % e) from e
- if logger.isEnabledFor(logging.DEBUG):
- logger.debug("Request content:\n%s",
- xmlutils.pretty_xml(xml_content))
- return xml_content
- def _xml_response(self, xml_content: ET.Element) -> bytes:
- if logger.isEnabledFor(logging.DEBUG):
- logger.debug("Response content:\n%s",
- xmlutils.pretty_xml(xml_content))
- f = io.BytesIO()
- ET.ElementTree(xml_content).write(f, encoding=self._encoding,
- xml_declaration=True)
- return f.getvalue()
- def _webdav_error_response(self, status: int, human_tag: str
- ) -> types.WSGIResponse:
- """Generate XML error response."""
- headers = {"Content-Type": "text/xml; charset=%s" % self._encoding}
- content = self._xml_response(xmlutils.webdav_error(human_tag))
- return status, headers, content
- class Access:
- """Helper class to check access rights of an item"""
- user: str
- path: str
- parent_path: str
- permissions: str
- _rights: rights.BaseRights
- _parent_permissions: Optional[str]
- def __init__(self, rights: rights.BaseRights, user: str, path: str
- ) -> None:
- self._rights = rights
- self.user = user
- self.path = path
- self.parent_path = pathutils.unstrip_path(
- posixpath.dirname(pathutils.strip_path(path)), True)
- self.permissions = self._rights.authorization(self.user, self.path)
- self._parent_permissions = None
- @property
- def parent_permissions(self) -> str:
- if self.path == self.parent_path:
- return self.permissions
- if self._parent_permissions is None:
- self._parent_permissions = self._rights.authorization(
- self.user, self.parent_path)
- return self._parent_permissions
- def check(self, permission: str,
- item: Optional[types.CollectionOrItem] = None) -> bool:
- if permission not in "rw":
- raise ValueError("Invalid permission argument: %r" % permission)
- if not item:
- permissions = permission + permission.upper()
- parent_permissions = permission
- elif isinstance(item, storage.BaseCollection):
- if item.tag:
- permissions = permission
- else:
- permissions = permission.upper()
- parent_permissions = ""
- else:
- permissions = ""
- parent_permissions = permission
- return bool(rights.intersect(self.permissions, permissions) or (
- self.path != self.parent_path and
- rights.intersect(self.parent_permissions, parent_permissions)))
|