mirror of
https://github.com/lennart-k/rustical.git
synced 2025-12-13 14:42:30 +00:00
fix(caldav): Fix permissions to allow for deletion of calendar subscriptions
fixes #84
This commit is contained in:
@@ -292,7 +292,12 @@ impl Resource for CalendarResource {
|
|||||||
}
|
}
|
||||||
|
|
||||||
fn get_user_privileges(&self, user: &Principal) -> Result<UserPrivilegeSet, Self::Error> {
|
fn get_user_privileges(&self, user: &Principal) -> Result<UserPrivilegeSet, Self::Error> {
|
||||||
if self.cal.subscription_url.is_some() || self.read_only {
|
if self.cal.subscription_url.is_some() {
|
||||||
|
return Ok(UserPrivilegeSet::owner_write_properties(
|
||||||
|
user.is_principal(&self.cal.principal),
|
||||||
|
));
|
||||||
|
}
|
||||||
|
if self.read_only {
|
||||||
return Ok(UserPrivilegeSet::owner_read(
|
return Ok(UserPrivilegeSet::owner_read(
|
||||||
user.is_principal(&self.cal.principal),
|
user.is_principal(&self.cal.principal),
|
||||||
));
|
));
|
||||||
|
|||||||
@@ -2,6 +2,7 @@ use quick_xml::name::Namespace;
|
|||||||
use rustical_xml::{XmlDeserialize, XmlSerialize};
|
use rustical_xml::{XmlDeserialize, XmlSerialize};
|
||||||
use std::collections::{HashMap, HashSet};
|
use std::collections::{HashMap, HashSet};
|
||||||
|
|
||||||
|
// https://datatracker.ietf.org/doc/html/rfc3744
|
||||||
#[derive(Debug, Clone, XmlSerialize, XmlDeserialize, Eq, Hash, PartialEq)]
|
#[derive(Debug, Clone, XmlSerialize, XmlDeserialize, Eq, Hash, PartialEq)]
|
||||||
pub enum UserPrivilege {
|
pub enum UserPrivilege {
|
||||||
Read,
|
Read,
|
||||||
@@ -47,6 +48,12 @@ pub struct UserPrivilegeSet {
|
|||||||
|
|
||||||
impl UserPrivilegeSet {
|
impl UserPrivilegeSet {
|
||||||
pub fn has(&self, privilege: &UserPrivilege) -> bool {
|
pub fn has(&self, privilege: &UserPrivilege) -> bool {
|
||||||
|
if (privilege == &UserPrivilege::WriteProperties
|
||||||
|
|| privilege == &UserPrivilege::WriteContent)
|
||||||
|
&& self.privileges.contains(&UserPrivilege::Write)
|
||||||
|
{
|
||||||
|
return true;
|
||||||
|
}
|
||||||
self.privileges.contains(privilege) || self.privileges.contains(&UserPrivilege::All)
|
self.privileges.contains(privilege) || self.privileges.contains(&UserPrivilege::All)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -72,6 +79,15 @@ impl UserPrivilegeSet {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub fn owner_write_properties(is_owner: bool) -> Self {
|
||||||
|
// Content is read-only but we can write properties
|
||||||
|
if is_owner {
|
||||||
|
Self::write_properties()
|
||||||
|
} else {
|
||||||
|
Self::default()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
pub fn read_only() -> Self {
|
pub fn read_only() -> Self {
|
||||||
Self {
|
Self {
|
||||||
privileges: HashSet::from([
|
privileges: HashSet::from([
|
||||||
@@ -81,6 +97,17 @@ impl UserPrivilegeSet {
|
|||||||
]),
|
]),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub fn write_properties() -> Self {
|
||||||
|
Self {
|
||||||
|
privileges: HashSet::from([
|
||||||
|
UserPrivilege::Read,
|
||||||
|
UserPrivilege::WriteProperties,
|
||||||
|
UserPrivilege::ReadAcl,
|
||||||
|
UserPrivilege::ReadCurrentUserPrivilegeSet,
|
||||||
|
]),
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<const N: usize> From<[UserPrivilege; N]> for UserPrivilegeSet {
|
impl<const N: usize> From<[UserPrivilege; N]> for UserPrivilegeSet {
|
||||||
|
|||||||
@@ -47,8 +47,9 @@ pub async fn route_delete<R: ResourceService>(
|
|||||||
) -> Result<(), R::Error> {
|
) -> Result<(), R::Error> {
|
||||||
let resource = resource_service.get_resource(path_components).await?;
|
let resource = resource_service.get_resource(path_components).await?;
|
||||||
|
|
||||||
|
// Kind of a bodge since we don't get unbind from the parent
|
||||||
let privileges = resource.get_user_privileges(principal)?;
|
let privileges = resource.get_user_privileges(principal)?;
|
||||||
if !privileges.has(&UserPrivilege::Write) {
|
if !privileges.has(&UserPrivilege::WriteProperties) {
|
||||||
return Err(Error::Unauthorized.into());
|
return Err(Error::Unauthorized.into());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user