| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187 |
- # This file is part of Radicale Server - Calendar Server
- # Copyright © 2017-2019 Unrud <unrud@outlook.com>
- #
- # This library is free software: you can redistribute it and/or modify
- # it under the terms of the GNU General Public License as published by
- # the Free Software Foundation, either version 3 of the License, or
- # (at your option) any later version.
- #
- # This library is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU General Public License for more details.
- #
- # You should have received a copy of the GNU General Public License
- # along with Radicale. If not, see <http://www.gnu.org/licenses/>.
- """
- Radicale tests with simple requests and rights.
- """
- import base64
- import os
- import shutil
- import tempfile
- from radicale import Application, config
- from radicale.tests.helpers import get_file_content
- from radicale.tests.test_base import BaseTest
- class TestBaseRightsRequests(BaseTest):
- """Tests basic requests with rights."""
- def setup(self):
- self.configuration = config.load()
- self.colpath = tempfile.mkdtemp()
- self.configuration.update({
- "storage": {"filesystem_folder": self.colpath},
- # Disable syncing to disk for better performance
- "internal": {"filesystem_fsync": "False"}}, "test", internal=True)
- def teardown(self):
- shutil.rmtree(self.colpath)
- def _test_rights(self, rights_type, user, path, mode, expected_status,
- with_auth=True):
- assert mode in ("r", "w")
- assert user in ("", "tmp")
- htpasswd_file_path = os.path.join(self.colpath, ".htpasswd")
- with open(htpasswd_file_path, "w") as f:
- f.write("tmp:bepo\nother:bepo")
- self.configuration.update({
- "rights": {"type": rights_type},
- "auth": {"type": "htpasswd" if with_auth else "none",
- "htpasswd_filename": htpasswd_file_path,
- "htpasswd_encryption": "plain"}}, "test")
- self.application = Application(self.configuration)
- for u in ("tmp", "other"):
- status, _, _ = self.request(
- "PROPFIND", "/%s" % u, HTTP_AUTHORIZATION="Basic %s" %
- base64.b64encode(("%s:bepo" % u).encode()).decode())
- assert status == 207
- status, _, _ = self.request(
- "PROPFIND" if mode == "r" else "PROPPATCH", path,
- HTTP_AUTHORIZATION="Basic %s" % base64.b64encode(
- ("tmp:bepo").encode()).decode() if user else "")
- assert status == expected_status
- def test_owner_only(self):
- self._test_rights("owner_only", "", "/", "r", 401)
- self._test_rights("owner_only", "", "/", "w", 401)
- self._test_rights("owner_only", "", "/tmp", "r", 401)
- self._test_rights("owner_only", "", "/tmp", "w", 401)
- self._test_rights("owner_only", "tmp", "/", "r", 207)
- self._test_rights("owner_only", "tmp", "/", "w", 403)
- self._test_rights("owner_only", "tmp", "/tmp", "r", 207)
- self._test_rights("owner_only", "tmp", "/tmp", "w", 207)
- self._test_rights("owner_only", "tmp", "/other", "r", 403)
- self._test_rights("owner_only", "tmp", "/other", "w", 403)
- def test_owner_only_without_auth(self):
- self._test_rights("owner_only", "", "/", "r", 207, False)
- self._test_rights("owner_only", "", "/", "w", 401, False)
- self._test_rights("owner_only", "", "/tmp", "r", 207, False)
- self._test_rights("owner_only", "", "/tmp", "w", 207, False)
- def test_owner_write(self):
- self._test_rights("owner_write", "", "/", "r", 401)
- self._test_rights("owner_write", "", "/", "w", 401)
- self._test_rights("owner_write", "", "/tmp", "r", 401)
- self._test_rights("owner_write", "", "/tmp", "w", 401)
- self._test_rights("owner_write", "tmp", "/", "r", 207)
- self._test_rights("owner_write", "tmp", "/", "w", 403)
- self._test_rights("owner_write", "tmp", "/tmp", "r", 207)
- self._test_rights("owner_write", "tmp", "/tmp", "w", 207)
- self._test_rights("owner_write", "tmp", "/other", "r", 207)
- self._test_rights("owner_write", "tmp", "/other", "w", 403)
- def test_owner_write_without_auth(self):
- self._test_rights("owner_write", "", "/", "r", 207, False)
- self._test_rights("owner_write", "", "/", "w", 401, False)
- self._test_rights("owner_write", "", "/tmp", "r", 207, False)
- self._test_rights("owner_write", "", "/tmp", "w", 207, False)
- def test_authenticated(self):
- self._test_rights("authenticated", "", "/", "r", 401)
- self._test_rights("authenticated", "", "/", "w", 401)
- self._test_rights("authenticated", "", "/tmp", "r", 401)
- self._test_rights("authenticated", "", "/tmp", "w", 401)
- self._test_rights("authenticated", "tmp", "/", "r", 207)
- self._test_rights("authenticated", "tmp", "/", "w", 207)
- self._test_rights("authenticated", "tmp", "/tmp", "r", 207)
- self._test_rights("authenticated", "tmp", "/tmp", "w", 207)
- self._test_rights("authenticated", "tmp", "/other", "r", 207)
- self._test_rights("authenticated", "tmp", "/other", "w", 207)
- def test_authenticated_without_auth(self):
- self._test_rights("authenticated", "", "/", "r", 207, False)
- self._test_rights("authenticated", "", "/", "w", 207, False)
- self._test_rights("authenticated", "", "/tmp", "r", 207, False)
- self._test_rights("authenticated", "", "/tmp", "w", 207, False)
- def test_from_file(self):
- rights_file_path = os.path.join(self.colpath, "rights")
- with open(rights_file_path, "w") as f:
- f.write("""\
- [owner]
- user: .+
- collection: %(login)s(/.*)?
- permissions: RrWw
- [custom]
- user: .*
- collection: custom(/.*)?
- permissions: Rr""")
- self.configuration.update(
- {"rights": {"file": rights_file_path}}, "test")
- self._test_rights("from_file", "", "/other", "r", 401)
- self._test_rights("from_file", "tmp", "/other", "r", 403)
- self._test_rights("from_file", "", "/custom/sub", "r", 404)
- self._test_rights("from_file", "tmp", "/custom/sub", "r", 404)
- self._test_rights("from_file", "", "/custom/sub", "w", 401)
- self._test_rights("from_file", "tmp", "/custom/sub", "w", 403)
- def test_custom(self):
- """Custom rights management."""
- self._test_rights("radicale.tests.custom.rights", "", "/", "r", 401)
- self._test_rights("radicale.tests.custom.rights", "", "/tmp", "r", 207)
- def test_collections_and_items(self):
- """Test rights for creation of collections, calendars and items.
- Collections are allowed at "/" and "/.../".
- Calendars/Address books are allowed at "/.../.../".
- Items are allowed at "/.../.../...".
- """
- self.application = Application(self.configuration)
- status, _, _ = self.request("MKCALENDAR", "/")
- assert status == 401
- status, _, _ = self.request("MKCALENDAR", "/user/")
- assert status == 401
- status, _, _ = self.request("MKCOL", "/user/")
- assert status == 201
- status, _, _ = self.request("MKCOL", "/user/calendar/")
- assert status == 401
- status, _, _ = self.request("MKCALENDAR", "/user/calendar/")
- assert status == 201
- status, _, _ = self.request("MKCOL", "/user/calendar/item")
- assert status == 401
- status, _, _ = self.request("MKCALENDAR", "/user/calendar/item")
- assert status == 401
- def test_put_collections_and_items(self):
- """Test rights for creation of calendars and items with PUT."""
- self.application = Application(self.configuration)
- status, _, _ = self.request(
- "PUT", "/user/", "BEGIN:VCALENDAR\r\nEND:VCALENDAR")
- assert status == 401
- status, _, _ = self.request("MKCOL", "/user/")
- assert status == 201
- status, _, _ = self.request(
- "PUT", "/user/calendar/", "BEGIN:VCALENDAR\r\nEND:VCALENDAR")
- assert status == 201
- event1 = get_file_content("event1.ics")
- status, _, _ = self.request(
- "PUT", "/user/calendar/event1.ics", event1)
- assert status == 201
|