75 lines
3.1 KiB
Python
75 lines
3.1 KiB
Python
# This file is part of Radicale Server - Calendar Server
|
|
# Copyright © 2008 Nicolas Kandel
|
|
# Copyright © 2008 Pascal Halter
|
|
# Copyright © 2008-2017 Guillaume Ayoub
|
|
# Copyright © 2017-2018 Unrud <unrud@outlook.com>
|
|
#
|
|
# This library is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This library is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with Radicale. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
import posixpath
|
|
import socket
|
|
from http import client
|
|
|
|
from radicale import httputils
|
|
from radicale import item as radicale_item
|
|
from radicale import pathutils, rights, storage, xmlutils
|
|
from radicale.log import logger
|
|
|
|
|
|
class ApplicationMkcolMixin:
|
|
def do_MKCOL(self, environ, base_prefix, path, user):
|
|
"""Manage MKCOL request."""
|
|
permissions = self._rights.authorization(user, path)
|
|
if not rights.intersect(permissions, "Ww"):
|
|
return httputils.NOT_ALLOWED
|
|
try:
|
|
xml_content = self._read_xml_content(environ)
|
|
except RuntimeError as e:
|
|
logger.warning(
|
|
"Bad MKCOL request on %r: %s", path, e, exc_info=True)
|
|
return httputils.BAD_REQUEST
|
|
except socket.timeout:
|
|
logger.debug("client timed out", exc_info=True)
|
|
return httputils.REQUEST_TIMEOUT
|
|
# Prepare before locking
|
|
props = xmlutils.props_from_request(xml_content)
|
|
try:
|
|
radicale_item.check_and_sanitize_props(props)
|
|
except ValueError as e:
|
|
logger.warning(
|
|
"Bad MKCOL request on %r: %s", path, e, exc_info=True)
|
|
return httputils.BAD_REQUEST
|
|
if (props.get("tag") and "w" not in permissions or
|
|
not props.get("tag") and "W" not in permissions):
|
|
return httputils.NOT_ALLOWED
|
|
with self._storage.acquire_lock("w", user):
|
|
item = next(self._storage.discover(path), None)
|
|
if item:
|
|
return httputils.METHOD_NOT_ALLOWED
|
|
parent_path = pathutils.unstrip_path(
|
|
posixpath.dirname(pathutils.strip_path(path)), True)
|
|
parent_item = next(self._storage.discover(parent_path), None)
|
|
if not parent_item:
|
|
return httputils.CONFLICT
|
|
if (not isinstance(parent_item, storage.BaseCollection) or
|
|
parent_item.get_meta("tag")):
|
|
return httputils.FORBIDDEN
|
|
try:
|
|
self._storage.create_collection(path, props=props)
|
|
except ValueError as e:
|
|
logger.warning(
|
|
"Bad MKCOL request on %r: %s", path, e, exc_info=True)
|
|
return httputils.BAD_REQUEST
|
|
return client.CREATED, {}, None
|