Rebase rights/from_file.py.

Apply proposed/asked changes.
This commit is contained in:
Dipl. Ing. Péter Varkoly 2024-08-26 11:21:53 +02:00
parent 19e5972b4f
commit 5167f12624
4 changed files with 45 additions and 57 deletions

18
config
View file

@ -14,8 +14,6 @@
# CalDAV server hostnames separated by a comma # CalDAV server hostnames separated by a comma
# IPv4 syntax: address:port # IPv4 syntax: address:port
# IPv6 syntax: [address]:port # IPv6 syntax: [address]:port
# For example: 0.0.0.0:9999, [::]:9999
hosts = 0.0.0.0:5232
# Hostname syntax (using "getaddrinfo" to resolve to IPv4/IPv6 adress(es)): hostname:port # Hostname syntax (using "getaddrinfo" to resolve to IPv4/IPv6 adress(es)): hostname:port
# For example: 0.0.0.0:9999, [::]:9999, localhost:9999 # For example: 0.0.0.0:9999, [::]:9999, localhost:9999
#hosts = localhost:5232 #hosts = localhost:5232
@ -55,23 +53,23 @@ hosts = 0.0.0.0:5232
[auth] [auth]
# Authentication method # Authentication method
# Value: none | htpasswd | remote_user | http_x_remote_user # Value: none | htpasswd | remote_user | http_x_remote_user | ldap
type = ldap #type = ldap
# URI to the LDAP server # URI to the LDAP server
ldap_uri = ldap://localhost #ldap_uri = ldap://localhost
# The base DN of the LDAP server # The base DN of the LDAP server
ldap_base = ##BASE_DN## #ldap_base = ##BASE_DN##
# The reader DN of the LDAP server # The reader DN of the LDAP server
ldap_reader_dn = CN=ossreader,CN=Users,##BASE_DN## #ldap_reader_dn = CN=ldapreader,CN=Users,##BASE_DN##
# Password of the reader DN # Password of the reader DN
ldap_secret = ossreader #ldap_secret = ldapreader-secret
# If the ldap groups of the user need to be loaded # If the ldap groups of the user need to be loaded
ldap_load_groups = True #ldap_load_groups = True
# Value: none | htpasswd | remote_user | http_x_remote_user | denyall # Value: none | htpasswd | remote_user | http_x_remote_user | denyall
#type = none #type = none
@ -103,7 +101,7 @@ ldap_load_groups = True
#type = owner_only #type = owner_only
# File for rights management from_file # File for rights management from_file
file = /etc/radicale/rights #file = /etc/radicale/rights
# Permit delete of a collection (global) # Permit delete of a collection (global)
#permit_delete_collection = True #permit_delete_collection = True

View file

@ -250,11 +250,12 @@ class Application(ApplicationPartDelete, ApplicationPartHead,
authorization.encode("ascii"))).split(":", 1) authorization.encode("ascii"))).split(":", 1)
user = self._auth.login(login, password) or "" if login else "" user = self._auth.login(login, password) or "" if login else ""
try: if self.configuration.get("auth", "type") == "ldap":
logger.debug("Groups %r",",".join(self._auth._ldap_groups)) try:
self._rights._user_groups = self._auth._ldap_groups logger.debug("Groups %r",",".join(self._auth._ldap_groups))
except AttributeError: self._rights._user_groups = self._auth._ldap_groups
pass except AttributeError:
pass
if user and login == user: if user and login == user:
logger.info("Successful login: %r", user) logger.info("Successful login: %r", user)
elif user: elif user:

View file

@ -34,7 +34,7 @@ Leading or ending slashes are trimmed from collection's path.
""" """
from configparser import ConfigParser import configparser
import re import re
from radicale import config, pathutils, rights from radicale import config, pathutils, rights
@ -44,66 +44,55 @@ from radicale.log import logger
class Rights(rights.BaseRights): class Rights(rights.BaseRights):
_filename: str _filename: str
_rights_config: ConfigParser
_user_groups: set
def __init__(self, configuration: config.Configuration) -> None: def __init__(self, configuration: config.Configuration) -> None:
super().__init__(configuration) super().__init__(configuration)
self._filename = configuration.get("rights", "file") self._filename = configuration.get("rights", "file")
self._rights_config = ConfigParser()
try:
with open(self._filename, "r") as f:
self._rights_config.read_file(f)
logger.debug("Rights were read")
except Exception as e:
raise RuntimeError("Failed to load rights file %r: %s" %
(self._filename, e)) from e
def authorization(self, user: str, path: str) -> str: def authorization(self, user: str, path: str) -> str:
user = user or "" user = user or ""
sane_path = pathutils.strip_path(path) sane_path = pathutils.strip_path(path)
# Prevent "regex injection" # Prevent "regex injection"
escaped_user = re.escape(user) escaped_user = re.escape(user)
logger.debug("authorization called %r %r",user,path) rights_config = configparser.ConfigParser()
try:
for section in self._rights_config.sections(): with open(self._filename, "r") as f:
group_match = [] rights_config.read_file(f)
except Exception as e:
raise RuntimeError("Failed to load rights file %r: %s" %
(self._filename, e)) from e
for section in rights_config.sections():
group_match = False
try: try:
collection_pattern = self._rights_config.get(section, "collection") user_pattern = rights_config.get(section, "user")
user_pattern = self._rights_config.get(section, "user", fallback = "") collection_pattern = rights_config.get(section, "collection")
allowed_groups = self._rights_config.get(section, "groups", fallback = "").split(",") allowed_groups = rights_config.get(section, "groups", fallback = "").split(",")
try: try:
group_match = self._user_groups.intersection(allowed_groups) group_match = self._user_groups.intersection(allowed_groups) > 0
logger.debug("Groups %r, %r",",".join(group_match),";".join(groups))
except: except:
pass pass
# Use empty format() for harmonized handling of curly braces # Use empty format() for harmonized handling of curly braces
user_match = re.fullmatch(user_pattern.format(), user) user_match = re.fullmatch(user_pattern.format(), user)
u_collection_match = user_match and re.fullmatch( user_collection_match = user_match and re.fullmatch(
collection_pattern.format( collection_pattern.format(
*(re.escape(s) for s in user_match.groups()), *(re.escape(s) for s in user_match.groups()),
user=escaped_user), sane_path) user=escaped_user), sane_path)
g_collection_match = re.fullmatch( collection_pattern.format(user=escaped_user), sane_path) group_collection_match = re.fullmatch(collection_pattern.format(user=escaped_user), sane_path)
except Exception as e: except Exception as e:
raise RuntimeError("Error in section %r of rights file %r: " raise RuntimeError("Error in section %r of rights file %r: "
"%s" % (section, self._filename, e)) from e "%s" % (section, self._filename, e)) from e
if user_match and u_collection_match: if user_match and user_collection_match:
logger.debug("User rule %r:%r matches %r:%r from section %r", permission = rights_config.get(section, "permissions")
logger.debug("Rule %r:%r matches %r:%r from section %r permission %r",
user, sane_path, user_pattern, user, sane_path, user_pattern,
collection_pattern, section) collection_pattern, section, permission)
return self._rights_config.get(section, "permissions") return permission
if len(group_match) > 0 and g_collection_match: if group_match and group_collection_match:
logger.debug("Group rule %r:%r matches %r from section %r", permission = rights_config.get(section, "permissions")
group_match, sane_path, logger.debug("Rule %r:%r matches %r:%r from section %r permission %r by group membership",
collection_pattern, section) user, sane_path, user_pattern,
return self._rights_config.get(section, "permissions") collection_pattern, section, permission)
#if user_match and collection_match: return permission
# permission = rights_config.get(section, "permissions")
# logger.debug("Rule %r:%r matches %r:%r from section %r permission %r",
# user, sane_path, user_pattern,
# collection_pattern, section, permission)
# return permission
logger.debug("Rule %r:%r doesn't match %r:%r from section %r", logger.debug("Rule %r:%r doesn't match %r:%r from section %r",
user, sane_path, user_pattern, collection_pattern, user, sane_path, user_pattern, collection_pattern,
section) section)

8
rights
View file

@ -25,10 +25,10 @@ permissions: rw
# Allow reading calendars and address books that are direct # Allow reading calendars and address books that are direct
# children of the principal collection for other users # children of the principal collection for other users
[calendarsReader] #[calendarsReader]
user: .+ #user: .+
collection: {user}/[^/]+ #collection: {user}/[^/]+
permissions: r #permissions: r
# Rights management file for Radicale - A simple calendar server # Rights management file for Radicale - A simple calendar server
# #