287ef6caa2
Don't launch tests on Travis with Python 2 anymore
2016-03-31 19:59:52 +02:00
434cb533e9
Remove Python 2 support
2016-03-31 19:57:40 +02:00
fa4eaef08e
Merge pull request #353 from Unrud/patch-7
...
Integrated server without busy waiting
2016-03-31 19:24:43 +02:00
f27ed8e6ff
Merge pull request #363 from igogold/readonly-collections
...
Fix privilege set for read only collection
2016-03-31 19:23:47 +02:00
63f8b36df3
Merge pull request #368 from cdpb/master
...
move base image to alpine
2016-03-31 19:22:13 +02:00
5ec5b75558
move base image to alpine
2016-03-28 10:51:36 +02:00
2ea35a2fc3
Merge pull request #209 from vuntz/no-autocreate-multifilesystem
...
Do not autocreate .props files for multifilesystem backend
2016-03-10 18:48:29 +01:00
aa04aa04b7
Fix privilege set for read only collection
2016-03-04 11:05:13 +05:00
bbe71c1ad1
Integrated server without threads and busy waiting
2016-01-27 07:17:38 +01:00
3a4184d1ab
Merge pull request #351 from Unrud/patch-6
...
Quick fix for multifilesystem
2016-01-15 10:54:47 +01:00
060d265129
Merge branch 'master' of github.com:Kozea/radicale
2016-01-15 10:51:24 +01:00
9a2668e425
Fix the Collection._parse docstring
2016-01-15 10:50:36 +01:00
a55cff8eb6
Also remove items from the collections itself
2016-01-15 01:13:18 +01:00
5081fcbcd1
Use component names to filter duplicates
2016-01-15 01:09:43 +01:00
9bc8635bdf
Merge pull request #350 from Unrud/patch-5
...
Repair "head" request
2016-01-15 00:00:33 +01:00
6be7dab03f
Correct function name
2016-01-14 23:07:53 +01:00
f8b068e9fe
Version 1.1.1
2016-01-07 23:31:19 +01:00
83304c1378
Stupid me, that was PEP 20 (fix 347 for Python 2 too)
2016-01-06 21:44:20 +01:00
620d9f8316
Readability counts - PEP8™ ( fix #347 )
2016-01-06 20:19:12 +01:00
e47b50421e
Version 1.1
2015-12-31 12:51:23 +01:00
e7ce00d54f
Style
2015-12-31 12:49:41 +01:00
95fe2b6824
Merge pull request #345 from cdpb/master
...
add improved docker version
2015-12-31 11:59:09 +01:00
b484d42547
Merge pull request #335 from Kozea/permissions
...
Use the first matching section for getting rights
2015-12-31 11:30:29 +01:00
365e35cdba
add improved docker version
2015-12-28 19:17:30 +01:00
20960bee84
Merge pull request #339 from Unrud/patch-2
...
Improve daemonization
2015-12-24 16:00:39 +01:00
18c88642fb
Merge pull request #343 from Unrud/paths
...
Secure path handling
2015-12-24 15:48:14 +01:00
0f9a38eba7
Test with Python 3.5
2015-12-24 15:22:48 +01:00
eed37792ae
Convert filesystem paths safely to paths
...
This only becomes a problem if the OS/filesystem
allows / in filenames or . respectively
.. as filenames.
2015-12-24 14:39:29 +01:00
bcaf452e51
Convert component names safely to filenames
...
Component names are controlled by the user and
without this checks access to arbitrary files is
possible if the multifilesystem backend is used.
2015-12-24 14:39:29 +01:00
b4b3d51f33
Convert paths safely to file system paths
...
With the old implementation on Windows a path like
"/c:/file/ignore" got converted to "c:\file" and
allowed access to files outside of FOLDER
2015-12-24 14:39:29 +01:00
6b7e79a368
Use sanitize_path instead of normpath
...
See a7b47f075499a1e1b40539bc1fa872a3ab77a204
The check for "." is now needless because the sane
path is always absolute.
```path.replace(os.sep, "/")``` is only relevant
for the (multi)filesystem backend and should be
there.
2015-12-24 14:39:24 +01:00
1ad994cadf
Move sanitize_path into pathutils.py
2015-12-24 14:39:15 +01:00
ed44830447
Error message if path not starting with prefix
...
Before the program crashed implicitly
2015-12-24 14:32:21 +01:00
780cecc0f2
Always sanitize request URI
...
Do no rely on the HTTP server
2015-12-24 14:32:21 +01:00
ee095a463d
Improve URI sanitation
...
The old implementation failed to sanitize URIs
like ".", "..", "../.." or "//"
2015-12-24 14:32:21 +01:00
c217e5d2ff
Merge pull request #342 from Unrud/handler
...
Introduce naming scheme for request handlers
2015-12-24 10:21:13 +01:00
592537e37c
Introduce naming scheme for request handlers
...
The do_ prefix and upper case name allows easy
distinction between methods that handle requests
and other methods.
Without this distinction an attacker could
call arbitrary methods.
Currently there is no method that matches the
argument count, but that's easy to miss when new
methods are added.
2015-12-24 07:22:55 +01:00
1109973a92
Merge pull request #341 from Unrud/patch-4
...
Prevent "regex injection"
2015-12-23 12:09:00 +01:00
4bfe7c9f79
Prevent "regex injection"
...
If an attacker is able to authenticate with a user name like .* he can bypass limitations imposed by "owner_write" and "owner_only".
2015-12-23 07:05:20 +01:00
c7fe4777b1
Merge pull request #340 from Unrud/patch-3
...
Improve regex for Well-Known URIs
2015-12-22 15:01:21 +01:00
7cb31fe22b
Improve regex for Well-Known URIs
...
Example to show the problem:
/Xwell-known/carddavXX
2015-12-22 12:44:19 +01:00
367ca6fcbf
Replace standard file descriptors of daemon
...
Overwriting ```sys.stdout``` and ```sys.stderr``` is not sufficient.
(e.g. the logger still uses the old file descriptors)
2015-12-22 08:50:16 +01:00
ecb8ad747e
Decouple the daemon from its parent environment
2015-12-22 08:50:16 +01:00
3a9238f670
Check and create PID file in a race-free manner
2015-12-22 08:50:16 +01:00
0a09804821
Close PID file
2015-12-22 08:49:58 +01:00
53c3113b44
Merge pull request #337 from Unrud/patch-1
...
Assign new items to correct key
2015-12-10 11:05:59 +01:00
80ecae40cb
Assign new items to correct key
2015-12-10 09:46:38 +01:00
e807c3d35b
Use the first matching section for getting rights
2015-12-03 15:22:12 +01:00
9875db9a6c
Add md5 and bcrypt as available encryptions methods for htpasswd in config file
2015-10-21 02:09:11 +02:00
7b82121c12
Encode message and committer for git commits ( fix #313 )
2015-09-22 11:01:33 +02:00