1
0
Fork 0
mirror of https://github.com/Kozea/Radicale.git synced 2025-06-26 16:45:52 +00:00
Radicale/radicale/app/mkcol.py

77 lines
3.2 KiB
Python
Raw Normal View History

2021-12-08 21:45:42 +01:00
# This file is part of Radicale - CalDAV and CardDAV server
2018-08-28 16:19:36 +02:00
# Copyright © 2008 Nicolas Kandel
# Copyright © 2008 Pascal Halter
# Copyright © 2008-2017 Guillaume Ayoub
2019-06-17 04:13:24 +02:00
# Copyright © 2017-2018 Unrud <unrud@outlook.com>
2018-08-28 16:19:36 +02:00
#
# This library is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Radicale. If not, see <http://www.gnu.org/licenses/>.
2019-06-15 09:01:55 +02:00
import posixpath
2018-08-28 16:19:36 +02:00
import socket
from http import client
2021-07-26 20:56:46 +02:00
import radicale.item as radicale_item
from radicale import httputils, pathutils, rights, storage, types, xmlutils
from radicale.app.base import ApplicationBase
2018-08-28 16:19:36 +02:00
from radicale.log import logger
2021-07-26 20:56:46 +02:00
class ApplicationPartMkcol(ApplicationBase):
def do_MKCOL(self, environ: types.WSGIEnviron, base_prefix: str,
path: str, user: str) -> types.WSGIResponse:
2018-08-28 16:19:36 +02:00
"""Manage MKCOL request."""
2020-04-22 19:20:07 +02:00
permissions = self._rights.authorization(user, path)
if not rights.intersect(permissions, "Ww"):
2018-08-28 16:19:36 +02:00
return httputils.NOT_ALLOWED
try:
2020-09-14 21:19:48 +02:00
xml_content = self._read_xml_request_body(environ)
2018-08-28 16:19:36 +02:00
except RuntimeError as e:
logger.warning(
"Bad MKCOL request on %r: %s", path, e, exc_info=True)
return httputils.BAD_REQUEST
2018-11-04 18:54:11 +00:00
except socket.timeout:
logger.debug("Client timed out", exc_info=True)
2018-08-28 16:19:36 +02:00
return httputils.REQUEST_TIMEOUT
# Prepare before locking
2021-07-26 20:56:46 +02:00
props_with_remove = xmlutils.props_from_request(xml_content)
2018-08-28 16:19:36 +02:00
try:
2021-07-26 20:56:46 +02:00
props = radicale_item.check_and_sanitize_props(props_with_remove)
2018-08-28 16:19:36 +02:00
except ValueError as e:
logger.warning(
"Bad MKCOL request on %r: %s", path, e, exc_info=True)
return httputils.BAD_REQUEST
if (props.get("tag") and "w" not in permissions or
not props.get("tag") and "W" not in permissions):
return httputils.NOT_ALLOWED
with self._storage.acquire_lock("w", user):
2021-07-26 20:56:46 +02:00
item = next(iter(self._storage.discover(path)), None)
2018-08-28 16:19:36 +02:00
if item:
return httputils.METHOD_NOT_ALLOWED
2018-08-28 16:19:50 +02:00
parent_path = pathutils.unstrip_path(
posixpath.dirname(pathutils.strip_path(path)), True)
2021-07-26 20:56:46 +02:00
parent_item = next(iter(self._storage.discover(parent_path)), None)
2018-08-28 16:19:36 +02:00
if not parent_item:
return httputils.CONFLICT
if (not isinstance(parent_item, storage.BaseCollection) or
2021-07-26 20:56:46 +02:00
parent_item.tag):
2018-08-28 16:19:36 +02:00
return httputils.FORBIDDEN
try:
self._storage.create_collection(path, props=props)
2018-08-28 16:19:36 +02:00
except ValueError as e:
logger.warning(
"Bad MKCOL request on %r: %s", path, e, exc_info=True)
return httputils.BAD_REQUEST
return client.CREATED, {}, None