Merge pull request #1720 from pbiering/improvements-2

Adjustments related to reverse proxy
This commit is contained in:
Peter Bieringer 2025-03-02 10:35:22 +01:00 committed by GitHub
commit b729a4c192
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
10 changed files with 203 additions and 78 deletions

View file

@ -1,6 +1,6 @@
# Changelog # Changelog
## 3.4.2.dev ## 3.5.0.dev
* Add: option [auth] type oauth2 by code migration from https://gitlab.mim-libre.fr/alphabet/radicale_oauth/-/blob/dev/oauth2/ * Add: option [auth] type oauth2 by code migration from https://gitlab.mim-libre.fr/alphabet/radicale_oauth/-/blob/dev/oauth2/
* Fix: catch OS errors on PUT MKCOL MKCALENDAR MOVE PROPPATCH (insufficient storage, access denied, internal server error) * Fix: catch OS errors on PUT MKCOL MKCALENDAR MOVE PROPPATCH (insufficient storage, access denied, internal server error)
@ -9,6 +9,9 @@
* Add: option [auth] type pam by code migration from v1, add new option pam_serivce * Add: option [auth] type pam by code migration from v1, add new option pam_serivce
* Cosmetics: extend list of used modules with their version on startup * Cosmetics: extend list of used modules with their version on startup
* Improve: WebUI * Improve: WebUI
* Add: option [server] script_name for reverse proxy base_prefix handling
* Fix: proper base_prefix stripping if running behind reverse proxy
* Review: Apache reverse proxy config example
## 3.4.1 ## 3.4.1
* Add: option [auth] dovecot_connection_type / dovecot_host / dovecot_port * Add: option [auth] dovecot_connection_type / dovecot_host / dovecot_port

View file

@ -775,6 +775,12 @@ Format: OpenSSL cipher list (see also "man openssl-ciphers")
Default: (system-default) Default: (system-default)
##### script_name
Strip script name from URI if called by reverse proxy
Default: (taken from HTTP_X_SCRIPT_NAME or SCRIPT_NAME)
#### encoding #### encoding
##### request ##### request

3
config
View file

@ -46,6 +46,9 @@
# SSL ciphersuite, secure configuration: DHE:ECDHE:-NULL:-SHA (see also "man openssl-ciphers") # SSL ciphersuite, secure configuration: DHE:ECDHE:-NULL:-SHA (see also "man openssl-ciphers")
#ciphersuite = (default) #ciphersuite = (default)
# script name to strip from URI if called by reverse proxy
#script_name = (default taken from HTTP_X_SCRIPT_NAME or SCRIPT_NAME)
[encoding] [encoding]

View file

@ -4,6 +4,7 @@
## Apache acting as reverse proxy and forward requests via ProxyPass to a running "radicale" server ## Apache acting as reverse proxy and forward requests via ProxyPass to a running "radicale" server
# SELinux WARNING: To use this correctly, you will need to set: # SELinux WARNING: To use this correctly, you will need to set:
# setsebool -P httpd_can_network_connect=1 # setsebool -P httpd_can_network_connect=1
# URI prefix: /radicale
#Define RADICALE_SERVER_REVERSE_PROXY #Define RADICALE_SERVER_REVERSE_PROXY
@ -11,11 +12,12 @@
# MAY CONFLICT with other WSG servers on same system -> use then inside a VirtualHost # MAY CONFLICT with other WSG servers on same system -> use then inside a VirtualHost
# SELinux WARNING: To use this correctly, you will need to set: # SELinux WARNING: To use this correctly, you will need to set:
# setsebool -P httpd_can_read_write_radicale=1 # setsebool -P httpd_can_read_write_radicale=1
# URI prefix: /radicale
#Define RADICALE_SERVER_WSGI #Define RADICALE_SERVER_WSGI
### Extra options ### Extra options
## Apache starting a dedicated VHOST with SSL ## Apache starting a dedicated VHOST with SSL without "/radicale" prefix in URI on port 8443
#Define RADICALE_SERVER_VHOST_SSL #Define RADICALE_SERVER_VHOST_SSL
@ -27,8 +29,13 @@
#Define RADICALE_ENFORCE_SSL #Define RADICALE_ENFORCE_SSL
### enable authentication by web server (config: [auth] type = http_x_remote_user)
#Define RADICALE_SERVER_USER_AUTHENTICATION
### Particular configuration EXAMPLES, adjust/extend/override to your needs ### Particular configuration EXAMPLES, adjust/extend/override to your needs
########################## ##########################
### default host ### default host
########################## ##########################
@ -37,9 +44,14 @@
## RADICALE_SERVER_REVERSE_PROXY ## RADICALE_SERVER_REVERSE_PROXY
<IfDefine RADICALE_SERVER_REVERSE_PROXY> <IfDefine RADICALE_SERVER_REVERSE_PROXY>
RewriteEngine On RewriteEngine On
RewriteRule ^/radicale$ /radicale/ [R,L] RewriteRule ^/radicale$ /radicale/ [R,L]
<Location /radicale> RewriteCond %{REQUEST_METHOD} GET
RewriteRule ^/radicale/$ /radicale/.web/ [R,L]
<LocationMatch "^/radicale/\.web.*>
# Internal WebUI does not need authentication at all
RequestHeader set X-Script-Name /radicale RequestHeader set X-Script-Name /radicale
RequestHeader set X-Forwarded-Port "%{SERVER_PORT}s" RequestHeader set X-Forwarded-Port "%{SERVER_PORT}s"
@ -48,21 +60,40 @@
ProxyPass http://localhost:5232/ retry=0 ProxyPass http://localhost:5232/ retry=0
ProxyPassReverse http://localhost:5232/ ProxyPassReverse http://localhost:5232/
## User authentication handled by "radicale"
Require local Require local
<IfDefine RADICALE_PERMIT_PUBLIC_ACCESS> <IfDefine RADICALE_PERMIT_PUBLIC_ACCESS>
Require all granted Require all granted
</IfDefine> </IfDefine>
</LocationMatch>
## You may want to use apache's authentication (config: [auth] type = http_x_remote_user) <LocationMatch "^/radicale(?!/\.web)">
## e.g. create a new file with a testuser: htpasswd -c -B /etc/httpd/conf/htpasswd-radicale testuser RequestHeader set X-Script-Name /radicale
#AuthBasicProvider file
#AuthType Basic RequestHeader set X-Forwarded-Port "%{SERVER_PORT}s"
#AuthName "Enter your credentials" RequestHeader set X-Forwarded-Proto expr=%{REQUEST_SCHEME}
#AuthUserFile /etc/httpd/conf/htpasswd-radicale
#AuthGroupFile /dev/null ProxyPass http://localhost:5232/ retry=0
#Require valid-user ProxyPassReverse http://localhost:5232/
#RequestHeader set X-Remote-User expr=%{REMOTE_USER}
<IfDefine !RADICALE_SERVER_USER_AUTHENTICATION>
## User authentication handled by "radicale"
Require local
<IfDefine RADICALE_PERMIT_PUBLIC_ACCESS>
Require all granted
</IfDefine>
</IfDefine>
<IfDefine RADICALE_SERVER_USER_AUTHENTICATION>
## You may want to use apache's authentication (config: [auth] type = http_x_remote_user)
## e.g. create a new file with a testuser: htpasswd -c -B /etc/httpd/conf/htpasswd-radicale testuser
AuthBasicProvider file
AuthType Basic
AuthName "Enter your credentials"
AuthUserFile /etc/httpd/conf/htpasswd-radicale
AuthGroupFile /dev/null
Require valid-user
RequestHeader set X-Remote-User expr=%{REMOTE_USER}
</IfDefine>
<IfDefine RADICALE_ENFORCE_SSL> <IfDefine RADICALE_ENFORCE_SSL>
<IfModule !ssl_module> <IfModule !ssl_module>
@ -70,7 +101,7 @@
</IfModule> </IfModule>
SSLRequireSSL SSLRequireSSL
</IfDefine> </IfDefine>
</Location> </LocationMatch>
</IfDefine> </IfDefine>
@ -96,24 +127,38 @@
WSGIScriptAlias /radicale /usr/share/radicale/radicale.wsgi WSGIScriptAlias /radicale /usr/share/radicale/radicale.wsgi
<Location /radicale> # Internal WebUI does not need authentication at all
<LocationMatch "^/radicale/\.web.*>
RequestHeader set X-Script-Name /radicale RequestHeader set X-Script-Name /radicale
## User authentication handled by "radicale"
Require local Require local
<IfDefine RADICALE_PERMIT_PUBLIC_ACCESS> <IfDefine RADICALE_PERMIT_PUBLIC_ACCESS>
Require all granted Require all granted
</IfDefine> </IfDefine>
</LocationMatch>
## You may want to use apache's authentication (config: [auth] type = http_x_remote_user) <LocationMatch "^/radicale(?!/\.web)">
## e.g. create a new file with a testuser: htpasswd -c -B /etc/httpd/conf/htpasswd-radicale testuser RequestHeader set X-Script-Name /radicale
#AuthBasicProvider file
#AuthType Basic <IfDefine !RADICALE_SERVER_USER_AUTHENTICATION>
#AuthName "Enter your credentials" ## User authentication handled by "radicale"
#AuthUserFile /etc/httpd/conf/htpasswd-radicale Require local
#AuthGroupFile /dev/null <IfDefine RADICALE_PERMIT_PUBLIC_ACCESS>
#Require valid-user Require all granted
#RequestHeader set X-Remote-User expr=%{REMOTE_USER} </IfDefine>
</IfDefine>
<IfDefine RADICALE_SERVER_USER_AUTHENTICATION>
## You may want to use apache's authentication (config: [auth] type = http_x_remote_user)
## e.g. create a new file with a testuser: htpasswd -c -B /etc/httpd/conf/htpasswd-radicale testuser
AuthBasicProvider file
AuthType Basic
AuthName "Enter your credentials"
AuthUserFile /etc/httpd/conf/htpasswd-radicale
AuthGroupFile /dev/null
Require valid-user
RequestHeader set X-Remote-User expr=%{REMOTE_USER}
</IfDefine>
<IfDefine RADICALE_ENFORCE_SSL> <IfDefine RADICALE_ENFORCE_SSL>
<IfModule !ssl_module> <IfModule !ssl_module>
@ -121,7 +166,7 @@
</IfModule> </IfModule>
SSLRequireSSL SSLRequireSSL
</IfDefine> </IfDefine>
</Location> </LocationMatch>
</IfModule> </IfModule>
<IfModule !wsgi_module> <IfModule !wsgi_module>
Error "RADICALE_SERVER_WSGI selected but wsgi module not loaded/enabled" Error "RADICALE_SERVER_WSGI selected but wsgi module not loaded/enabled"
@ -165,30 +210,51 @@ CustomLog logs/ssl_request_log "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"
## RADICALE_SERVER_REVERSE_PROXY ## RADICALE_SERVER_REVERSE_PROXY
<IfDefine RADICALE_SERVER_REVERSE_PROXY> <IfDefine RADICALE_SERVER_REVERSE_PROXY>
<Location /> RewriteEngine On
RequestHeader set X-Script-Name /
RewriteCond %{REQUEST_METHOD} GET
RewriteRule ^/$ /.web/ [R,L]
<LocationMatch "^/\.web.*>
RequestHeader set X-Forwarded-Port "%{SERVER_PORT}s" RequestHeader set X-Forwarded-Port "%{SERVER_PORT}s"
RequestHeader set X-Forwarded-Proto expr=%{REQUEST_SCHEME} RequestHeader set X-Forwarded-Proto expr=%{REQUEST_SCHEME}
ProxyPass http://localhost:5232/ retry=0 ProxyPass http://localhost:5232/ retry=0
ProxyPassReverse http://localhost:5232/ ProxyPassReverse http://localhost:5232/
## User authentication handled by "radicale"
Require local Require local
<IfDefine RADICALE_PERMIT_PUBLIC_ACCESS> <IfDefine RADICALE_PERMIT_PUBLIC_ACCESS>
Require all granted Require all granted
</IfDefine> </IfDefine>
</LocationMatch>
## You may want to use apache's authentication (config: [auth] type = http_x_remote_user) <LocationMatch "^(?!/\.web)">
## e.g. create a new file with a testuser: htpasswd -c -B /etc/httpd/conf/htpasswd-radicale testuser RequestHeader set X-Forwarded-Port "%{SERVER_PORT}s"
#AuthBasicProvider file RequestHeader set X-Forwarded-Proto expr=%{REQUEST_SCHEME}
#AuthType Basic
#AuthName "Enter your credentials" ProxyPass http://localhost:5232/ retry=0
#AuthUserFile /etc/httpd/conf/htpasswd-radicale ProxyPassReverse http://localhost:5232/
#AuthGroupFile /dev/null
#Require valid-user <IfDefine !RADICALE_SERVER_USER_AUTHENTICATION>
</Location> ## User authentication handled by "radicale"
Require local
<IfDefine RADICALE_PERMIT_PUBLIC_ACCESS>
Require all granted
</IfDefine>
</IfDefine>
<IfDefine RADICALE_SERVER_USER_AUTHENTICATION>
## You may want to use apache's authentication (config: [auth] type = http_x_remote_user)
## e.g. create a new file with a testuser: htpasswd -c -B /etc/httpd/conf/htpasswd-radicale testuser
AuthBasicProvider file
AuthType Basic
AuthName "Enter your credentials"
AuthUserFile /etc/httpd/conf/htpasswd-radicale
AuthGroupFile /dev/null
Require valid-user
RequestHeader set X-Remote-User expr=%{REMOTE_USER}
</IfDefine>
</LocationMatch>
</IfDefine> </IfDefine>
@ -214,24 +280,27 @@ CustomLog logs/ssl_request_log "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"
WSGIScriptAlias / /usr/share/radicale/radicale.wsgi WSGIScriptAlias / /usr/share/radicale/radicale.wsgi
<Location /> <LocationMatch "^/(?!/\.web)">
RequestHeader set X-Script-Name / <IfDefine !RADICALE_SERVER_USER_AUTHENTICATION>
## User authentication handled by "radicale"
## User authentication handled by "radicale" Require local
Require local <IfDefine RADICALE_PERMIT_PUBLIC_ACCESS>
<IfDefine RADICALE_PERMIT_PUBLIC_ACCESS> Require all granted
Require all granted </IfDefine>
</IfDefine> </IfDefine>
## You may want to use apache's authentication (config: [auth] type = http_x_remote_user) <IfDefine RADICALE_SERVER_USER_AUTHENTICATION>
## e.g. create a new file with a testuser: htpasswd -c -B /etc/httpd/conf/htpasswd-radicale testuser ## You may want to use apache's authentication (config: [auth] type = http_x_remote_user)
#AuthBasicProvider file ## e.g. create a new file with a testuser: htpasswd -c -B /etc/httpd/conf/htpasswd-radicale testuser
#AuthType Basic AuthBasicProvider file
#AuthName "Enter your credentials" AuthType Basic
#AuthUserFile /etc/httpd/conf/htpasswd-radicale AuthName "Enter your credentials"
#AuthGroupFile /dev/null AuthUserFile /etc/httpd/conf/htpasswd-radicale
#Require valid-user AuthGroupFile /dev/null
</Location> Require valid-user
RequestHeader set X-Remote-User expr=%{REMOTE_USER}
</IfDefine>
</LocationMatch>
</IfModule> </IfModule>
<IfModule !wsgi_module> <IfModule !wsgi_module>
Error "RADICALE_SERVER_WSGI selected but wsgi module not loaded/enabled" Error "RADICALE_SERVER_WSGI selected but wsgi module not loaded/enabled"

View file

@ -3,7 +3,7 @@ name = "Radicale"
# When the version is updated, a new section in the CHANGELOG.md file must be # When the version is updated, a new section in the CHANGELOG.md file must be
# added too. # added too.
readme = "README.md" readme = "README.md"
version = "3.4.2.dev" version = "3.5.0.dev"
authors = [{name = "Guillaume Ayoub", email = "guillaume.ayoub@kozea.fr"}, {name = "Unrud", email = "unrud@outlook.com"}, {name = "Peter Bieringer", email = "pb@bieringer.de"}] authors = [{name = "Guillaume Ayoub", email = "guillaume.ayoub@kozea.fr"}, {name = "Unrud", email = "unrud@outlook.com"}, {name = "Peter Bieringer", email = "pb@bieringer.de"}]
license = {text = "GNU GPL v3"} license = {text = "GNU GPL v3"}
description = "CalDAV and CardDAV Server" description = "CalDAV and CardDAV Server"

View file

@ -68,6 +68,7 @@ class Application(ApplicationPartDelete, ApplicationPartHead,
_internal_server: bool _internal_server: bool
_max_content_length: int _max_content_length: int
_auth_realm: str _auth_realm: str
_script_name: str
_extra_headers: Mapping[str, str] _extra_headers: Mapping[str, str]
_permit_delete_collection: bool _permit_delete_collection: bool
_permit_overwrite_collection: bool _permit_overwrite_collection: bool
@ -87,6 +88,19 @@ class Application(ApplicationPartDelete, ApplicationPartHead,
self._response_content_on_debug = configuration.get("logging", "response_content_on_debug") self._response_content_on_debug = configuration.get("logging", "response_content_on_debug")
self._auth_delay = configuration.get("auth", "delay") self._auth_delay = configuration.get("auth", "delay")
self._internal_server = configuration.get("server", "_internal_server") self._internal_server = configuration.get("server", "_internal_server")
self._script_name = configuration.get("server", "script_name")
if self._script_name:
if self._script_name[0] != "/":
logger.error("server.script_name must start with '/': %r", self._script_name)
raise RuntimeError("server.script_name option has to start with '/'")
else:
if self._script_name.endswith("/"):
logger.error("server.script_name must not end with '/': %r", self._script_name)
raise RuntimeError("server.script_name option must not end with '/'")
else:
logger.info("Provided script name to strip from URI if called by reverse proxy: %r", self._script_name)
else:
logger.info("Default script name to strip from URI if called by reverse proxy is taken from HTTP_X_SCRIPT_NAME or SCRIPT_NAME")
self._max_content_length = configuration.get( self._max_content_length = configuration.get(
"server", "max_content_length") "server", "max_content_length")
self._auth_realm = configuration.get("auth", "realm") self._auth_realm = configuration.get("auth", "realm")
@ -178,14 +192,18 @@ class Application(ApplicationPartDelete, ApplicationPartHead,
# Return response content # Return response content
return status_text, list(headers.items()), answers return status_text, list(headers.items()), answers
reverse_proxy = False
remote_host = "unknown" remote_host = "unknown"
if environ.get("REMOTE_HOST"): if environ.get("REMOTE_HOST"):
remote_host = repr(environ["REMOTE_HOST"]) remote_host = repr(environ["REMOTE_HOST"])
elif environ.get("REMOTE_ADDR"): elif environ.get("REMOTE_ADDR"):
remote_host = environ["REMOTE_ADDR"] remote_host = environ["REMOTE_ADDR"]
if environ.get("HTTP_X_FORWARDED_FOR"): if environ.get("HTTP_X_FORWARDED_FOR"):
reverse_proxy = True
remote_host = "%s (forwarded for %r)" % ( remote_host = "%s (forwarded for %r)" % (
remote_host, environ["HTTP_X_FORWARDED_FOR"]) remote_host, environ["HTTP_X_FORWARDED_FOR"])
if environ.get("HTTP_X_FORWARDED_HOST") or environ.get("HTTP_X_FORWARDED_PROTO") or environ.get("HTTP_X_FORWARDED_SERVER"):
reverse_proxy = True
remote_useragent = "" remote_useragent = ""
if environ.get("HTTP_USER_AGENT"): if environ.get("HTTP_USER_AGENT"):
remote_useragent = " using %r" % environ["HTTP_USER_AGENT"] remote_useragent = " using %r" % environ["HTTP_USER_AGENT"]
@ -204,24 +222,37 @@ class Application(ApplicationPartDelete, ApplicationPartHead,
# SCRIPT_NAME is already removed from PATH_INFO, according to the # SCRIPT_NAME is already removed from PATH_INFO, according to the
# WSGI specification. # WSGI specification.
# Reverse proxies can overwrite SCRIPT_NAME with X-SCRIPT-NAME header # Reverse proxies can overwrite SCRIPT_NAME with X-SCRIPT-NAME header
base_prefix_src = ("HTTP_X_SCRIPT_NAME" if "HTTP_X_SCRIPT_NAME" in if self._script_name and (reverse_proxy is True):
environ else "SCRIPT_NAME") base_prefix_src = "config"
base_prefix = environ.get(base_prefix_src, "") base_prefix = self._script_name
if base_prefix and base_prefix[0] != "/": else:
logger.error("Base prefix (from %s) must start with '/': %r", base_prefix_src = ("HTTP_X_SCRIPT_NAME" if "HTTP_X_SCRIPT_NAME" in
base_prefix_src, base_prefix) environ else "SCRIPT_NAME")
if base_prefix_src == "HTTP_X_SCRIPT_NAME": base_prefix = environ.get(base_prefix_src, "")
return response(*httputils.BAD_REQUEST) if base_prefix and base_prefix[0] != "/":
return response(*httputils.INTERNAL_SERVER_ERROR) logger.error("Base prefix (from %s) must start with '/': %r",
if base_prefix.endswith("/"): base_prefix_src, base_prefix)
logger.warning("Base prefix (from %s) must not end with '/': %r", if base_prefix_src == "HTTP_X_SCRIPT_NAME":
base_prefix_src, base_prefix) return response(*httputils.BAD_REQUEST)
base_prefix = base_prefix.rstrip("/") return response(*httputils.INTERNAL_SERVER_ERROR)
logger.debug("Base prefix (from %s): %r", base_prefix_src, base_prefix) if base_prefix.endswith("/"):
logger.warning("Base prefix (from %s) must not end with '/': %r",
base_prefix_src, base_prefix)
base_prefix = base_prefix.rstrip("/")
if base_prefix:
logger.debug("Base prefix (from %s): %r", base_prefix_src, base_prefix)
# Sanitize request URI (a WSGI server indicates with an empty path, # Sanitize request URI (a WSGI server indicates with an empty path,
# that the URL targets the application root without a trailing slash) # that the URL targets the application root without a trailing slash)
path = pathutils.sanitize_path(unsafe_path) path = pathutils.sanitize_path(unsafe_path)
logger.debug("Sanitized path: %r", path) logger.debug("Sanitized path: %r", path)
if (reverse_proxy is True) and (len(base_prefix) > 0):
if path.startswith(base_prefix):
path_new = path.removeprefix(base_prefix)
logger.debug("Called by reverse proxy, remove base prefix %r from path: %r => %r", base_prefix, path, path_new)
path = path_new
else:
logger.warning("Called by reverse proxy, cannot removed base prefix %r from path: %r as not matching", base_prefix, path)
# Get function corresponding to method # Get function corresponding to method
function = getattr(self, "do_%s" % request_method, None) function = getattr(self, "do_%s" % request_method, None)

View file

@ -66,6 +66,8 @@ class ApplicationPartGet(ApplicationBase):
if path == "/.web" or path.startswith("/.web/"): if path == "/.web" or path.startswith("/.web/"):
# Redirect to sanitized path for all subpaths of /.web # Redirect to sanitized path for all subpaths of /.web
unsafe_path = environ.get("PATH_INFO", "") unsafe_path = environ.get("PATH_INFO", "")
if len(base_prefix) > 0:
unsafe_path = unsafe_path.removeprefix(base_prefix)
if unsafe_path != path: if unsafe_path != path:
location = base_prefix + path location = base_prefix + path
logger.info("Redirecting to sanitized path: %r ==> %r", logger.info("Redirecting to sanitized path: %r ==> %r",

View file

@ -187,6 +187,10 @@ DEFAULT_CONFIG_SCHEMA: types.CONFIG_SCHEMA = OrderedDict([
"help": "set CA certificate for validating clients", "help": "set CA certificate for validating clients",
"aliases": ("--certificate-authority",), "aliases": ("--certificate-authority",),
"type": filepath}), "type": filepath}),
("script_name", {
"value": "",
"help": "script name to strip from URI if called by reverse proxy (default taken from HTTP_X_SCRIPT_NAME or SCRIPT_NAME)",
"type": str}),
("_internal_server", { ("_internal_server", {
"value": "False", "value": "False",
"help": "the internal server is used", "help": "the internal server is used",
@ -203,7 +207,7 @@ DEFAULT_CONFIG_SCHEMA: types.CONFIG_SCHEMA = OrderedDict([
("auth", OrderedDict([ ("auth", OrderedDict([
("type", { ("type", {
"value": "none", "value": "none",
"help": "authentication method", "help": "authentication method (" + "|".join(auth.INTERNAL_TYPES) + ")",
"type": str_or_callable, "type": str_or_callable,
"internal": auth.INTERNAL_TYPES}), "internal": auth.INTERNAL_TYPES}),
("cache_logins", { ("cache_logins", {

View file

@ -2,7 +2,7 @@
# Copyright © 2014 Jean-Marc Martins # Copyright © 2014 Jean-Marc Martins
# Copyright © 2012-2017 Guillaume Ayoub # Copyright © 2012-2017 Guillaume Ayoub
# Copyright © 2017-2021 Unrud <unrud@outlook.com> # Copyright © 2017-2021 Unrud <unrud@outlook.com>
# Copyright © 2024-2024 Peter Bieringer <pb@bieringer.de> # Copyright © 2024-2025 Peter Bieringer <pb@bieringer.de>
# #
# This library is free software: you can redistribute it and/or modify # This library is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -21,6 +21,7 @@ import os
from radicale import item as radicale_item from radicale import item as radicale_item
from radicale import pathutils, storage from radicale import pathutils, storage
from radicale.log import logger
from radicale.storage import multifilesystem from radicale.storage import multifilesystem
from radicale.storage.multifilesystem.base import StorageBase from radicale.storage.multifilesystem.base import StorageBase
@ -34,10 +35,12 @@ class StoragePartMove(StorageBase):
assert isinstance(to_collection, multifilesystem.Collection) assert isinstance(to_collection, multifilesystem.Collection)
assert isinstance(item.collection, multifilesystem.Collection) assert isinstance(item.collection, multifilesystem.Collection)
assert item.href assert item.href
os.replace(pathutils.path_to_filesystem( move_from = pathutils.path_to_filesystem(item.collection._filesystem_path, item.href)
item.collection._filesystem_path, item.href), move_to = pathutils.path_to_filesystem(to_collection._filesystem_path, to_href)
pathutils.path_to_filesystem( try:
to_collection._filesystem_path, to_href)) os.replace(move_from, move_to)
except OSError as e:
raise ValueError("Failed to move file %r => %r %s" % (move_from, move_to, e)) from e
self._sync_directory(to_collection._filesystem_path) self._sync_directory(to_collection._filesystem_path)
if item.collection._filesystem_path != to_collection._filesystem_path: if item.collection._filesystem_path != to_collection._filesystem_path:
self._sync_directory(item.collection._filesystem_path) self._sync_directory(item.collection._filesystem_path)
@ -45,11 +48,15 @@ class StoragePartMove(StorageBase):
cache_folder = self._get_collection_cache_subfolder(item.collection._filesystem_path, ".Radicale.cache", "item") cache_folder = self._get_collection_cache_subfolder(item.collection._filesystem_path, ".Radicale.cache", "item")
to_cache_folder = self._get_collection_cache_subfolder(to_collection._filesystem_path, ".Radicale.cache", "item") to_cache_folder = self._get_collection_cache_subfolder(to_collection._filesystem_path, ".Radicale.cache", "item")
self._makedirs_synced(to_cache_folder) self._makedirs_synced(to_cache_folder)
move_from = os.path.join(cache_folder, item.href)
move_to = os.path.join(to_cache_folder, to_href)
try: try:
os.replace(os.path.join(cache_folder, item.href), os.replace(move_from, move_to)
os.path.join(to_cache_folder, to_href))
except FileNotFoundError: except FileNotFoundError:
pass pass
except OSError as e:
logger.error("Failed to move cache file %r => %r %s" % (move_from, move_to, e))
pass
else: else:
self._makedirs_synced(to_cache_folder) self._makedirs_synced(to_cache_folder)
if cache_folder != to_cache_folder: if cache_folder != to_cache_folder:

View file

@ -20,7 +20,7 @@ from setuptools import find_packages, setup
# When the version is updated, a new section in the CHANGELOG.md file must be # When the version is updated, a new section in the CHANGELOG.md file must be
# added too. # added too.
VERSION = "3.4.2.dev" VERSION = "3.5.0.dev"
with open("README.md", encoding="utf-8") as f: with open("README.md", encoding="utf-8") as f:
long_description = f.read() long_description = f.read()