pax_global_header00006660000000000000000000000064124600116250014507gustar00rootroot0000000000000052 comment=78b0a55ae126666b49ec9ac88582d453b971967d sabre-dav-1.8.12/000077500000000000000000000000001246001162500134445ustar00rootroot00000000000000sabre-dav-1.8.12/.gitignore000066400000000000000000000004211246001162500154310ustar00rootroot00000000000000docs/api docs/wikidocs build.properties build public data fileserver.php fileserver2.php calendarserver.php groupwareserver.php package.xml tmpdata tests/temp tests/.sabredav *.swp composer.lock vendor bin/phing bin/phpunit bin/vobjectvalidate.php bin/phpdocmd bin/phpunit sabre-dav-1.8.12/.travis.yml000066400000000000000000000011231246001162500155520ustar00rootroot00000000000000language: php php: - 5.3.3 - 5.3 - 5.4 - 5.5 - 5.6 - hhvm matrix: fast_finish: true allow_failures: - php: hhvm env: matrix: - VOBJECT=2 LOWEST_DEPS="" - VOBJECT=2 LOWEST_DEPS="--prefer-lowest" - VOBJECT=3 LOWEST_DEPS="" - VOBJECT=3 LOWEST_DEPS="--prefer-lowest" services: - mysql before_script: - mysql -e 'create database sabredav' - composer self-update - if [ "$VOBJECT" == "3" ]; then cp tests/composer.vobject3.json composer.json; fi - composer update --prefer-source $LOWEST_DEPS script: - phpunit --configuration tests/phpunit.xml sabre-dav-1.8.12/ChangeLog000066400000000000000000001551421246001162500152260ustar00rootroot000000000000001.8.12-stable (2015-01-21) * The zip release ships with sabre/vobject 2.1.7. * #568: Support empty usernames and passwords in basic auth. 1.8.11-stable (2014-12-10) * The zip release ships with sabre/vobject 2.1.6. * Updated: MySQL database schema optimized by using more efficient column types. * #516: The DAV client will now only redirect to HTTP and HTTPS urls. 1.8.10-stable (2014-05-15) * The zip release ships with sabre/vobject 2.1.4. * includes changes from version 1.7.12. 1.8.9-stable (2014-02-26) * The zip release ships with sabre/vobject 2.1.3. * includes changes from version 1.7.11. 1.8.8-stable (2014-02-09) * The zip release ships with sabre/vobject 2.1.3. * includes changes from version 1.7.10. 1.8.7-stable (2013-10-02) * the zip release ships with sabre/vobject 2.1.3. * includes changes from version 1.7.9. 1.8.6-stable (2013-06-18) * The zip release ships with sabre/vobject 2.1.0. * Includes changes from version 1.7.8. 1.8.5-stable (2013-04-11) * The zip release ships with sabre/vobject 2.0.7. * Includes changes from version 1.7.7. 1.8.4-stable (2013-04-08) * The zip release ships with sabre/vobject 2.0.7. * Includes changes from version 1.7.6. 1.8.3-stable (2013-03-01) * The zip release ships with sabre/vobject 2.0.6. * Includes changes from version 1.7.5. * Fixed: organizer email-address for shared calendars is now prefixed with mailto:, as it should. 1.8.2-stable (2013-01-19) * The zip release ships with sabre/vobject 2.0.5. * Includes changes from version 1.7.4. 1.8.1-stable (2012-12-01) * The zip release ships with sabre/vobject 2.0.5. * Includes changes from version 1.7.3. * Fixed: Typo in 1.7 migration script caused it to fail. 1.8.0-stable (2012-11-08) * The zip release ships with sabre/vobject 2.0.5. * BC Break: Moved the entire codebase to PHP namespaces. * BC Break: Every backend package (CalDAV, CardDAV, Auth, Locks, Principals) now has consistent naming conventions. There's a BackendInterface, and an AbstractBackend class. * BC Break: Changed a bunch of constructor signatures in the CalDAV package, to reduce dependencies on the ACL package. * BC Break: Sabre_CalDAV_ISharedCalendar now also has a getShares method, so sharees can figure out who is also on a shared calendar. * Added: Sabre_DAVACL_IPrincipalCollection interface, to advertise support for principal-property-search on any node. * Added: Simple console script to fire up a fileserver in the current directory using PHP 5.4's built-in webserver. * Added: Sharee's can now also read out the list of invites for a shared calendar. * Added: The Proxy principal classes now both implement an interface, for greater flexiblity. 1.7.13-stable (2014-07-28) * The zip release ships with sabre/vobject 2.1.4. * Changed: Removed phing and went with a custom build script for now. 1.7.12-stable (2014-05-15) * The zip release ships with sabre/vobject 2.1.4. * Updated: Issue #439. Lots of updates in PATCH support. The Sabre_DAV_PartialUpdate_IFile interface is now deprecated and will be removed in a future version. * Fixed: Restoring old setting after changing libxml_disable_entity_loader. * Fixed: Issue #422: Preconditions were not being set on PUT on non- existant files. Not really a chance for data-loss, but incorrect nevertheless. * Fixed: Issue #427: Now checking preconditions on DELETE requests. * Fixed: Issue #428: Etag check with If: fails if the target is a collection. * Fixed: Issue #393: PATCH request with missing end-range was handled incorrectly. * Added: Sabre_DAV_Exception_LengthRequired to omit 411 errors. 1.7.11-stable (2014-02-26) * The zip release ships with sabre/vobject 2.1.3. * Fixed: Issue #407: large downloads failed. * Fixed: Issue #414: XXE security problem on older PHP versions. 1.7.10-stable (2014-02-09) * The zip release ships with sabre/vobject 2.1.3. * Fixed: Potential security vulnerability in the http client. * Fixed: Issue #374: Don't urlescape colon (:) when it's not required. 1.7.9-stable (2013-10-02) * The zip release ships with sabre/vobject 2.1.3. * Fixed: Issue #365. Incorrect output when principal urls have spaces in them. * Added: Issue #367: Automatically adding a UID to vcards that don't have them. 1.7.8-stable (2013-06-17) * The zip release ships with sabre/vobject 2.1.0. * Changed: Sabre\DAV\Client::verifyPeer is now a protected property (instead of private). * Fixed: Text was incorrectly escaped in the Href and HrefList properties, disallowing urls with ampersands (&) in them. * Added: deserializer for Sabre\DAVACL\Property\CurrentUserPrivilegeSet. * Fixed: Issue 335: Client only deserializes properties with status 200. * Fixed: Issue 341: Escaping xml in 423 Locked error responses. * Added: Issue 339: beforeGetPropertiesForPath event. 1.7.7-stable (2013-04-11) * The zip release ships with sabre/vobject 2.0.7. * Fixed: Assets in the browser plugins were not being served on windows machines. 1.7.6-stable (2013-04-08) * The zip release ships with sabre/vobject 2.0.7. * Fixed: vcardurl in database schema can now hold 255 characters instead of 80 (which is often way to small). * Fixed: The browser plugin potentially allowed people to open any arbitrary file on windows servers (CVE-2013-1939). 1.7.5-stable (2013-03-01) * The zip release ships with sabre/vobject 2.0.6. * Change: No longer advertising support for 4.0 vcards. iOS and OS X address book don't handle this well, and just advertising 3.0 support seems like the most logical course of action. * Added: ->setVerifyPeers to Sabre_DAV_Client (greatly resisting against it, don't use this..). 1.7.4-stable (2013-01-19) * The zip release ships with sabre/vobject 2.0.5. * Changed: To be compatibile with MS Office 2011 for Mac, a workaround was removed that was added to support old versions of Windows XP (pre-SP3). Indeed! We needed a crazy workaround to work with one MS product in the past, and we can't keep that workaround to be compatible with another MS product. * Fixed: expand-properties REPORT had incorrect values for the href element. * Fixed: Range requests now work for non-seekable streams. (Thanks Alfred Klomp). * Fixed: Changed serialization of {DAV:}getlastmodified and {DAV:}supportedlock to improve compatiblity with MS Office 2011 for Mac. * Changed: reverted the automatic translation of 'DAV:' xml namespaces to 'urn:DAV' when parsing files. Issues were reported with libxml 2.6.32, on a relatively recent debian release, so we'll wait till 2015 to take this one out again. * Added: Sabre_DAV_Exception_ServiceUnavailable, for emitting 503's. 1.7.3-stable (2012-12-01) * The zip release ships with sabre/vobject 2.0.5. * Fixed: Removing double slashes from getPropertiesForPath. * Change: Marked a few more properties in the CardDAV as protected, instead of private. * Fixed: SharingPlugin now plays nicer with other plugins with similar functionality. * Fixed: Issue 174. Sending back HTTP/1.0 for requests with this version. 1.7.2-stable (2012-11-08) * The zip release ships with sabre/vobject 2.0.5. * Added: ACL plugin advertises support for 'calendarserver-principal- property-search'. * Fixed: [#153] Allowing for relative http principals in iMip requests. * Added: Support for cs:first-name and cs:last-name properties in sharing invites. * Fixed: Made a bunch of properties protected, where they were private before. * Added: Some non-standard properties for sharing to improve compatibility. * Fixed: some bugfixes in postgres sql script. * Fixed: When requesting some properties using PROPFIND, they could show up as both '200 Ok' and '403 Forbidden'. * Fixed: calendar-proxy principals were not checked for deeper principal membership than 1 level. * Fixed: setGroupMemberSet argument now correctly receives relative principal urls, instead of the absolute ones. * Fixed: Server class will filter out any bonus properties if any extra were returned. This means the implementor of the IProperty class can be a bit lazier when implementing. Note: bug numbers after this line refer to Google Code tickets. We're using github now. 1.7.1-stable (2012-10-07) * Fixed: include path problem in the migration script. 1.7.0-stable (2012-10-06) * BC Break: The calendarobjects database table has a bunch of new fields, and a migration script is required to ensure everything will keep working. Read the wiki for more details. * BC Break: The ICalendar interface now has a new method: calendarQuery. * BC Break: In this version a number of classes have been deleted, that have been previously deprecated. Namely: - Sabre_DAV_Directory (now: Sabre_DAV_Collection) - Sabre_DAV_SimpleDirectory (now: Sabre_DAV_SimpleCollection) * BC Break: Sabre_CalDAV_Schedule_IMip::sendMessage now has an extra argument. If you extended this class, you should fix this method. It's only used for informational purposes. * BC Break: The DAV: namespace is no longer converted to urn:DAV. This was a workaround for a bug in older PHP versions (pre-5.3). * Removed: Sabre.includes.php was deprecated, and is now removed. * Removed: Sabre_CalDAV_Server was deprecated, and is now removed. Please use Sabre_DAV_Server and check the examples in the examples/ directory. * Changed: The Sabre_VObject library now spawned into it's own project! The VObject library is still included in the SabreDAV zip package. * Added: Experimental interfaces to allow implementation of caldav-sharing. Note that no implementation is provided yet, just the api hooks. * Added: Free-busy reporting compliant with the caldav-scheduling standard. This allows iCal and other clients to fetch other users' free-busy data. * Added: Experimental NotificationSupport interface to add caldav notifications. * Added: VCF Export plugin. If enabled, it can generate an export of an entire addressbook. * Added: Support for PATCH using a SabreDAV format, to live-patch files. * Added: Support for Prefer: return-minimal and Brief: t headers for PROPFIND and PROPPATCH requests. * Changed: Responsibility for dealing with the calendar-query is now moved from the CalDAV plugin to the CalDAV backends. This allows for heavy optimizations. * Changed: The CalDAV PDO backend is now a lot faster for common calendar queries. * Changed: We are now using the composer autoloader. * Changed: The CalDAV backend now all implement an interface. * Changed: Instead of Sabre_DAV_Property, Sabre_DAV_PropertyInterface is now the basis of every property class. * Update: Caching results for principal lookups. This should cut down queries and performance for a number of heavy requests. * Update: ObjectTree caches lookups much more aggresively, which will help especially speeding up a bunch of REPORT queries. * Added: Support for the schedule-calendar-transp property. * Fixed: Marking both the text/calendar and text/x-vcard as UTF-8 encoded. * Fixed: Workaround for the SOGO connector, as it doesn't understand receiving "text/x-vcard; charset=utf-8" for a contenttype. * Added: Sabre_DAV_Client now throws more specific exceptions in cases where we already has an exception class. * Added: Sabre_DAV_PartialUpdate. This plugin allows you to use the PATCH method to update parts of a file. * Added: Tons of timezone name mappings for Microsoft Exchange. * Added: Support for an 'exception' event in the server class. * Fixed: Uploaded VCards without a UID are now rejected. (thanks Dominik!) * Fixed: Rejecting calendar objects if they are not in the supported-calendar-component list. (thanks Armin!) * Fixed: Issue 219: serialize() now reorders correctly. * Fixed: Sabre_DAV_XMLUtil no longer returns empty $dom->childNodes if there is whitespace in $dom. * Fixed: Returning 409 Conflict instead of 500 when an attempt is made to create a file as a child of something that's not a collection. * Fixed: Issue 237: xml-encoding values in SabreDAV error responses. * Fixed: Returning 403, instead of 501 when an unknown REPORT is requested. * Fixed: Postfixing slash on {DAV:}owner properties. * Fixed: Several embarrassing spelling mistakes in docblocks. 1.6.10-stable (2013-06-17) * Fixed: Text was incorrectly escaped in the Href and HrefList properties, disallowing urls with ampersands (&) in them. * Fixed: Issue 341: Escaping xml in 423 Locked error responses. 1.6.9-stable (2013-04-11) * Fixed: Assets in the browser plugins were not being served on windows machines. 1.6.8-stable (2013-04-08) * Fixed: vcardurl in database schema can now hold 255 characters instead of 80 (which is often way to small). * Fixed: The browser plugin potentially allowed people to open any arbitrary file on windows servers. (CVE-2013-1939). 1.6.7-stable (2013-03-01) * Change: No longer advertising support for 4.0 vcards. iOS and OS X address book don't handle this well, and just advertising 3.0 support seems like the most logical course of action. * Added: ->setVerifyPeers to Sabre_DAV_Client (greatly resisting against it, don't use this..). 1.6.6-stable (2013-01-19) * Fixed: Backported a fix for broken XML serialization in error responses. (Thanks @DeepDiver1975!) 1.6.5-stable (2012-10-04) * Fixed: Workaround for line-ending bug OS X 10.8 addressbook has. * Added: Ability to allow users to set SSL certificates for the Client class. (Thanks schiesbn!). * Fixed: Directory indexes with lots of nodes should be a lot faster. * Fixed: Issue 235: E_NOTICE thrown when doing a propfind request with Sabre_DAV_Client, and no valid properties are returned. * Fixed: Issue with filtering on alarms in tasks. 1.6.4-stable (2012-08-02) * Fixed: Issue 220: Calendar-query filters may fail when filtering on alarms, if an overridden event has it's alarm removed. * Fixed: Compatibility for OS/X 10.8 iCal in the IMipHandler. * Fixed: Issue 222: beforeWriteContent shouldn't be called for lock requests. * Fixed: Problem with POST requests to the outbox if mailto: was not lower cased. * Fixed: Yearly recurrence rule expansion on leap-days no behaves correctly. * Fixed: Correctly checking if recurring, all-day events with no dtstart fall in a timerange if the start of the time-range exceeds the start of the instance of an event, but not the end. * Fixed: All-day recurring events wouldn't match if an occurence ended exactly on the start of a time-range. * Fixed: HTTP basic auth did not correctly deal with passwords containing colons on some servers. * Fixed: Issue 228: DTEND is now non-inclusive for all-day events in the calendar-query REPORT and free-busy calculations. 1.6.3-stable (2012-06-12) * Added: It's now possible to specify in Sabre_DAV_Client which type of authentication is to be used. * Fixed: Issue 206: Sabre_DAV_Client PUT requests are fixed. * Fixed: Issue 205: Parsing an iCalendar 0-second date interval. * Fixed: Issue 112: Stronger validation of iCalendar objects. Now making sure every iCalendar object only contains 1 component, and disallowing vcards, forcing every component to have a UID. * Fixed: Basic validation for vcards in the CardDAV plugin. * Fixed: Issue 213: Workaround for an Evolution bug, that prevented it from updating events. * Fixed: Issue 211: A time-limit query on a non-relative alarm trigger in a recurring event could result in an endless loop. * Fixed: All uri fields are now a maximum of 200 characters. The Bynari outlook plugin used much longer strings so this should improve compatibility. * Fixed: Added a workaround for a bug in KDE 4.8.2 contact syncing. See https://bugs.kde.org/show_bug.cgi?id=300047 * Fixed: Issue 217: Sabre_DAV_Tree_FileSystem was pretty broken. 1.6.2-stable (2012-04-16) * Fixed: Sabre_VObject_Node::$parent should have been public. * Fixed: Recurrence rules of events are now taken into consideration when doing time-range queries on alarms. * Fixed: Added a workaround for the fact that php's DateInterval cannot parse weeks and days at the same time. * Added: Sabre_DAV_Server::$exposeVersion, allowing you to hide SabreDAV's version number from various outputs. * Fixed: DTSTART values would be incorrect when expanding events. * Fixed: DTSTART and DTEND would be incorrect for expansion of WEEKLY BYDAY recurrences. * Fixed: Issue 203: A problem with overridden events hitting the exact date and time of a subsequent event in the recurrence set. * Fixed: There was a problem with recurrence rules, for example the 5th tuesday of the month, if this day did not exist. * Added: New HTTP status codes from draft-nottingham-http-new-status-04. 1.6.1-stable (2012-03-05) * Added: createFile and put() can now return an ETag. * Added: Sending back an ETag on for operations on CardDAV backends. This should help with OS X 10.6 Addressbook compatibility. * Fixed: Fixed a bug where an infinite loop could occur in the recurrence iterator if the recurrence was YEARLY, with a BYMONTH rule, and either BYDAY or BYMONTHDAY match the first day of the month. * Fixed: Events that are excluded using EXDATE are still counted in the COUNT= parameter in the RRULE property. * Added: Support for time-range filters on VALARM components. * Fixed: Correctly filtering all-day events. * Fixed: Sending back correct mimetypes from the browser plugin (thanks Jürgen). * Fixed: Issue 195: Sabre_CardDAV pear package had an incorrect dependency. * Fixed: Calendardata would be destroyed when performing a MOVE request. 1.6.0-stable (2012-02-22) * BC Break: Now requires PHP 5.3 * BC Break: Any node that implemented Sabre_DAVACL_IACL must now also implement the getSupportedPrivilegeSet method. See website for details. * BC Break: Moved functions from Sabre_CalDAV_XMLUtil to Sabre_VObject_DateTimeParser. * BC Break: The Sabre_DAVACL_IPrincipalCollection now has two new methods: 'searchPrincipals' and 'updatePrincipal'. * BC Break: Sabre_DAV_ILockable is removed and all related per-node locking functionality. * BC Break: Sabre_DAV_Exception_FileNotFound is now deprecated in favor of Sabre_DAV_Exception_NotFound. The former will be removed in a later version. * BC Break: Removed Sabre_CalDAV_ICalendarUtil, use Sabre_VObject instead. * BC Break: Sabre_CalDAV_Server is now deprecated, check out the documentation on how to setup a caldav server with just Sabre_DAV_Server. * BC Break: Default Principals PDO backend now needs a new field in the 'principals' table. See the website for details. * Added: Ability to create new calendars and addressbooks from within the browser plugin. * Added: Browser plugin: icons for various nodes. * Added: Support for FREEBUSY reports! * Added: Support for creating principals with admin-level privileges. * Added: Possibility to let server send out invitation emails on behalf of CalDAV client, using Sabre_CalDAV_Schedule_IMip. * Changed: beforeCreateFile event now passes data argument by reference. * Changed: The 'propertyMap' property from Sabre_VObject_Reader, must now be specified in Sabre_VObject_Property::$classMap. * Added: Ability for plugins to tell the ACL plugin which principal plugins are searchable. * Added: [DAVACL] Per-node overriding of supported privileges. This allows for custom privileges where needed. * Added: [DAVACL] Public 'principalSearch' method on the DAVACL plugin, which allows for easy searching for principals, based on their properties. * Added: Sabre_VObject_Component::getComponents() to return a list of only components and not properties. * Added: An includes.php file in every sub-package (CalDAV, CardDAV, DAV, DAVACL, HTTP, VObject) as an alternative to the autoloader. This often works much faster. * Added: Support for the 'Me card', which allows Addressbook.app users specify which vcard is their own. * Added: Support for updating principal properties in the DAVACL principal backends. * Changed: Major refactoring in the calendar-query REPORT code. Should make things more flexible and correct. * Changed: The calendar-proxy-[read|write] principals will now only appear in the tree, if they actually exist in the Principal backend. This should reduce some problems people have been having with this. * Changed: Sabre_VObject_Element_* classes are now renamed to Sabre_VObject_Property. Old classes are retained for backwards compatibility, but this will be removed in the future. * Added: Sabre_VObject_FreeBusyGenerator to generate free-busy reports based on lists of events. * Added: Sabre_VObject_RecurrenceIterator to find all the dates and times for recurring events. * Fixed: Issue 97: Correctly handling RRULE for the calendar-query REPORT. * Fixed: Issue 154: Encoding of VObject parameters with no value was incorrect. * Added: Support for {DAV:}acl-restrictions property from RFC3744. * Added: The contentlength for calendar objects can now be supplied by a CalDAV backend, allowing for more optimizations. * Fixed: Much faster implementation of Sabre_DAV_URLUtil::encodePath. * Fixed: {DAV:}getcontentlength may now be not specified. * Fixed: Issue 66: Using rawurldecode instead of urldecode to decode paths from clients. This means that + will now be treated as a literal rather than a space, and this should improve compatibility with the Windows built-in client. * Added: Sabre_DAV_Exception_PaymentRequired exception, to emit HTTP 402 status codes. * Added: Some mysql unique constraints to example files. * Fixed: Correctly formatting HTTP dates. * Fixed: Issue 94: Sending back Last-Modified header for 304 responses. * Added: Sabre_VObject_Component_VEvent, Sabre_VObject_Component_VJournal, Sabre_VObject_Component_VTodo and Sabre_VObject_Component_VCalendar. * Changed: Properties are now also automatically mapped to their appropriate classes, if they are created using the add() or __set() methods. * Changed: Cloning VObject objects now clones the entire tree, rather than just the default shallow copy. * Added: Support for recurrence expansion in the CALDAV:calendar-multiget and CALDAV:calendar-query REPORTS. * Changed: CalDAV PDO backend now sorts calendars based on the internal 'calendarorder' field. * Added: Issue 181: Carddav backends may no optionally not supply the carddata in getCards, if etag and size are specified. This may speed up certain requests. * Added: More arguments to beforeWriteContent and beforeCreateFile (see WritingPlugins wiki document). * Added: Hook for iCalendar validation. This allows us to validate iCalendar objects when they're uploaded. At the moment we're just validating syntax. * Added: VObject now support Windows Timezone names correctly (thanks mrpace2). * Added: If a timezonename could not be detected, we fall back on the default PHP timezone. * Added: Now a Composer package (thanks willdurand). * Fixed: Support for \N as a newline character in the VObject reader. * Added: afterWriteContent, afterCreateFile and afterUnbind events. * Added: Postgresql example files. Not part of the unittests though, so use at your own risk. * Fixed: Issue 182: Removed backticks from sql queries, so it will work with Postgres. 1.5.9-stable (2012-04-16) * Fixed: Issue with parsing timezone identifiers that were surrounded by quotes. (Fixes emClient compatibility). 1.5.8-stable (2012-02-22) * Fixed: Issue 95: Another timezone parsing issue, this time in calendar-query. 1.5.7-stable (2012-02-19) * Fixed: VObject properties are now always encoded before components. * Fixed: Sabre_DAVACL had issues with multiple levels of privilege aggregration. * Changed: Added 'GuessContentType' plugin to fileserver.php example. * Fixed: The Browser plugin will now trigger the correct events when creating files. * Fixed: The ICSExportPlugin now considers ACL's. * Added: Made it optional to supply carddata from an Addressbook backend when requesting getCards. This can make some operations much faster, and could result in much lower memory use. * Fixed: Issue 187: Sabre_DAV_UUIDUtil was missing from includes file. * Fixed: Issue 191: beforeUnlock was triggered twice. 1.5.6-stable (2012-01-07) * Fixed: Issue 174: VObject could break UTF-8 characters. * Fixed: pear package installation issues. 1.5.5-stable (2011-12-16) * Fixed: CalDAV time-range filter workaround for recurring events. * Fixed: Bug in Sabre_DAV_Locks_Backend_File that didn't allow multiple files to be locked at the same time. 1.5.4-stable (2011-10-28) * Fixed: GuessContentType plugin now supports mixed case file extensions. * Fixed: DATE-TIME encoding was wrong in VObject. (we used 'DATETIME'). * Changed: Sending back HTTP 204 after a PUT request on an existing resource instead of HTTP 200. This should fix Evolution CardDAV client compatibility. * Fixed: Issue 95: Parsing X-LIC-LOCATION if it's available. * Added: All VObject elements now have a reference to their parent node. 1.5.3-stable (2011-09-28) * Fixed: Sabre_DAV_Collection was missing from the includes file. * Fixed: Issue 152. iOS 1.4.2 apparantly requires HTTP/1.1 200 OK to be in uppercase. * Fixed: Issue 153: Support for files with mixed newline styles in Sabre_VObject. * Fixed: Issue 159: Automatically converting any vcard and icalendardata to UTF-8. * Added: Sabre_DAV_SimpleFile class for easy static file creation. * Added: Issue 158: Support for the CARDDAV:supported-address-data property. 1.5.2-stable (2011-09-21) * Fixed: carddata and calendardata MySQL fields are now of type 'mediumblob'. 'TEXT' was too small sometimes to hold all the data. * Fixed: {DAV:}supported-report-set is now correctly reporting the reports for IAddressBook. * Added: Sabre_VObject_Property::add() to add duplicate parameters to properties. * Added: Issue 151: Sabre_CalDAV_ICalendar and Sabre_CalDAV_ICalendarObject interfaces. * Fixed: Issue 140: Not returning 201 Created if an event cancelled the creation of a file. * Fixed: Issue 150: Faster URLUtil::encodePath() implementation. * Fixed: Issue 144: Browser plugin could interfere with TemporaryFileFilterPlugin if it was loaded first. * Added: It's not possible to specify more 'alternate uris' in principal backends. 1.5.1-stable (2011-08-24) * Fixed: Issue 137. Hiding action interface in HTML browser for non-collections. * Fixed: addressbook-query is now correctly returned from the {DAV:}supported-report-set property. * Fixed: Issue 142: Bugs in groupwareserver.php example. * Fixed: Issue 139: Rejecting PUT requests with Content-Range. 1.5.0-stable (2011-08-12) * Added: CardDAV support. * Added: An experimental WebDAV client. * Added: MIME-Directory grouping support in the VObject library. This is very useful for people attempting to parse vcards. * BC Break: Adding parameters with the VObject libraries now overwrites the previous parameter, rather than just add it. This makes more sense for 99% of the cases. * BC Break: lib/Sabre.autoload.php is now removed in favor of lib/Sabre/autoload.php. * Deprecated: Sabre_DAV_Directory is now deprecated and will be removed in a future version. Use Sabre_DAV_Collection instead. * Deprecated: Sabre_DAV_SimpleDirectory is now deprecated and will be removed in a future version. Use Sabre_DAV_SimpleCollection instead. * Fixed: Problem with overriding tablenames for the CalDAV backend. * Added: Clark-notation parser to XML utility. * Added: unset() support to VObject components. * Fixed: Refactored CalDAV property fetching to be faster and simpler. * Added: Central string-matcher for CalDAV and CardDAV plugins. * Added: i;unicode-casemap support * Fixed: VObject bug: wouldn't parse parameters if they weren't specified in uppercase. * Fixed: VObject bug: Parameters now behave more like Properties. * Fixed: VObject bug: Parameters with no value are now correctly parsed. * Changed: If calendars don't specify which components they allow, 'all' components are assumed (e.g.: VEVENT, VTODO, VJOURNAL). * Changed: Browser plugin now uses POST variable 'sabreAction' instead of 'action' to reduce the chance of collisions. 1.4.4-stable (2011-07-07) * Fixed: Issue 131: Custom CalDAV backends could break in certain cases. * Added: The option to override the default tablename all PDO backends use. (Issue 60). * Fixed: Issue 124: 'File' authentication backend now takes realm into consideration. * Fixed: Sabre_DAV_Property_HrefList now properly deserializes. This allows users to update the {DAV:}group-member-set property. * Added: Helper functions for DateTime-values in Sabre_VObject package. * Added: VObject library can now automatically map iCalendar properties to custom classes. 1.4.3-stable (2011-04-25) * Fixed: Issue 123: Added workaround for Windows 7 UNLOCK bug. * Fixed: datatype of lastmodified field in mysql.calendars.sql. Please change the DATETIME field to an INT to ensure this field will work correctly. * Change: Sabre_DAV_Property_Principal is now renamed to Sabre_DAVACL_Property_Principal. * Added: API level support for ACL HTTP method. * Fixed: Bug in serializing {DAV:}acl property. * Added: deserializer for {DAV:}resourcetype property. * Added: deserializer for {DAV:}acl property. * Added: deserializer for {DAV:}principal property. 1.4.2-beta (2011-04-01) * Added: It's not possible to disable listing of nodes that are denied read access by ACL. * Fixed: Changed a few properties in CalDAV classes from private to protected. * Fixed: Issue 119: Terrible things could happen when relying on guessBaseUri, the server was running on the root of the domain and a user tried to access a file ending in .php. This is a slight BC break. * Fixed: Issue 118: Lock tokens in If headers without a uri should be treated as the request uri, not 'all relevant uri's. * Fixed: Issue 120: PDO backend was incorrectly fetching too much locks in cases where there were similar named locked files in a directory. 1.4.1-beta (2011-02-26) * Fixed: Sabre_DAV_Locks_Backend_PDO returned too many locks. * Fixed: Sabre_HTTP_Request::getHeader didn't return Content-Type when running on apache, so a few workarounds were added. * Change: Slightly changed CalDAV Backend API's, to allow for heavy optimizations. This is non-bc breaking. 1.4.0-beta (2011-02-12) * Added: Partly RFC3744 ACL support. * Added: Calendar-delegation (caldav-proxy) support. * BC break: In order to fix Issue 99, a new argument had to be added to Sabre_DAV_Locks_Backend_*::getLocks classes. Consult the classes for details. * Deprecated: Sabre_DAV_Locks_Backend_FS is now deprecated and will be removed in a later version. Use PDO or the new File class instead. * Deprecated: The Sabre_CalDAV_ICalendarUtil class is now marked deprecated, and will be removed in a future version. Please use Sabre_VObject instead. * Removed: All principal-related functionality has been removed from the Sabre_DAV_Auth_Plugin, and moved to the Sabre_DAVACL_Plugin. * Added: VObject library, for easy vcard/icalendar parsing using a natural interface. * Added: Ability to automatically generate full .ics feeds off calendars. To use: Add the Sabre_CalDAV_ICSExportPlugin, and add ?export to your calendar url. * Added: Plugins can now specify a pluginname, for easy access using Sabre_DAV_Server::getPlugin(). * Added: beforeGetProperties event. * Added: updateProperties event. * Added: Principal listings and calendar-access can now be done privately, disallowing users from accessing or modifying other users' data. * Added: You can now pass arrays to the Sabre_DAV_Server constructor. If it's an array with node-objects, a Root collection will automatically be created, and the nodes are used as top-level children. * Added: The principal base uri is now customizable. It used to be hardcoded to 'principals/[user]'. * Added: getSupportedReportSet method in ServerPlugin class. This allows you to easily specify which reports you're implementing. * Added: A '..' link to the HTML browser. * Fixed: Issue 99: Locks on child elements were ignored when their parent nodes were deleted. * Fixed: Issue 90: lockdiscovery property and LOCK response now include a {DAV}lockroot element. * Fixed: Issue 96: support for 'default' collation in CalDAV text-match filters. * Fixed: Issue 102: Ensuring that copy and move with identical source and destination uri's fails. * Fixed: Issue 105: Supporting MKCALENDAR with no body. * Fixed: Issue 109: Small fixes in Sabre_HTTP_Util. * Fixed: Issue 111: Properly catching the ownername in a lock (if it's a string) * Fixed: Sabre_DAV_ObjectTree::nodeExist always returned false for the root node. * Added: Global way to easily supply new resourcetypes for certain node classes. * Fixed: Issue 59: Allowing the user to override the authentication realm in Sabre_CalDAV_Server. * Update: Issue 97: Looser time-range checking if there's a recurrence rule in an event. This fixes 'missing recurring events'. 1.3.0 (2010-10-14) * Added: childExists method to Sabre_DAV_ICollection. This is an api break, so if you implement Sabre_DAV_ICollection directly, add the method. * Changed: Almost all HTTP method implementations now take a uri argument, including events. This allows for internal rerouting of certain calls. If you have custom plugins, make sure they use this argument. If they don't, they will likely still work, but it might get in the way of future changes. * Changed: All getETag methods MUST now surround the etag with double-quotes. This was a mistake made in all previous SabreDAV versions. If you don't do this, any If-Match, If-None-Match and If: headers using Etags will work incorrectly. (Issue 85). * Added: Sabre_DAV_Auth_Backend_AbstractBasic class, which can be used to easily implement basic authentication. * Removed: Sabre_DAV_PermissionDenied class. Use Sabre_DAV_Forbidden instead. * Removed: Sabre_DAV_IDirectory interface, use Sabre_DAV_ICollection instead. * Added: Browser plugin now uses {DAV:}displayname if this property is available. * Added: Cache layer in the ObjectTree. * Added: Tree classes now have a delete and getChildren method. * Fixed: If-Modified-Since and If-Unmodified-Since would be incorrect if the date is an exact match. * Fixed: Support for multiple ETags in If-Match and If-None-Match headers. * Fixed: Improved baseUrl handling. * Fixed: Issue 67: Non-seekable stream support in ::put()/::get(). * Fixed: Issue 65: Invalid dates are now ignored. * Updated: Refactoring in Sabre_CalDAV to make everything a bit more ledgable. * Fixed: Issue 88, Issue 89: Fixed compatibility for running SabreDAV on Windows. * Fixed: Issue 86: Fixed Content-Range top-boundary from 'file size' to 'file size'-1. 1.2.4 (2010-07-13) * Fixed: Issue 62: Guessing baseUrl fails when url contains a query-string. * Added: Apache configuration sample for CGI/FastCGI setups. * Fixed: Issue 64: Only returning calendar-data when it was actually requested. 1.2.3 (2010-06-26) * Fixed: Issue 57: Supporting quotes around etags in If-Match and If-None-Match 1.2.2 (2010-06-21) * Updated: SabreDAV now attempts to guess the BaseURI if it's not set. * Updated: Better compatibility with BitKinex * Fixed: Issue 56: Incorrect behaviour for If-None-Match headers and GET requests. * Fixed: Issue with certain encoded paths in Browser Plugin. 1.2.1 (2010-06-07) * Fixed: Issue 50, patch by Mattijs Hoitink. * Fixed: Issue 51, Adding windows 7 lockfiles to TemporaryFileFilter. * Fixed: Issue 38, Allowing custom filters to be added to TemporaryFileFilter. * Fixed: Issue 53, ETags in the If: header were always failing. This behaviour is now corrected. * Added: Apache Authentication backend, in case authentication through .htaccess is desired. * Updated: Small improvements to example files. 1.2.0 (2010-05-24) * Fixed: Browser plugin now displays international characters. * Changed: More properties in CalDAV classes are now protected instead of private. 1.2.0beta3 (2010-05-14) * Fixed: Custom properties were not properly sent back for allprops requests. * Fixed: Issue 49, incorrect parsing of PROPPATCH, affecting Office 2007. * Changed: Removed CalDAV items from includes.php, and added a few missing ones. 1.2.0beta2 (2010-05-04) * Fixed: Issue 46: Fatal error for some non-existent nodes. * Updated: some example sql to include email address. * Added: 208 and 508 statuscodes from RFC5842. * Added: Apache2 configuration examples 1.2.0beta1 (2010-04-28) * Fixed: redundant namespace declaration in resourcetypes. * Fixed: 2 locking bugs triggered by litmus when no Sabre_DAV_ILockable interface is used. * Changed: using http://sabredav.org/ns for all custom xml properties. * Added: email address property to principals. * Updated: CalendarObject validation. 1.2.0alpha4 (2010-04-24) * Added: Support for If-Range, If-Match, If-None-Match, If-Modified-Since, If-Unmodified-Since. * Changed: Brand new build system. Functionality is split up between Sabre, Sabre_HTTP, Sabre_DAV and Sabre_CalDAV packages. In addition to that a new non-pear package will be created with all this functionality combined. * Changed: Autoloader moved to Sabre/autoload.php. * Changed: The Allow: header is now more accurate, with appropriate HTTP methods per uri. * Changed: Now throwing back Sabre_DAV_Exception_MethodNotAllowed on a few places where Sabre_DAV_Exception_NotImplemented was used. 1.2.0alpha3 (2010-04-20) * Update: Complete rewrite of property updating. Now easier to use and atomic. * Fixed: Issue 16, automatically adding trailing / to baseUri. * Added: text/plain is used for .txt files in GuessContentType plugin. * Added: support for principal-property-search and principal-search-property-set reports. * Added: Issue 31: Hiding exception information by default. Can be turned on with the Sabre_DAV_Server::$debugExceptions property. 1.2.0alpha2 (2010-04-08) * Added: Calendars are now private and can only be read by the owner. * Fixed: double namespace declaration in multistatus responses. * Added: MySQL database dumps. MySQL is now also supported next to SQLite. * Added: expand-properties REPORT from RFC 3253. * Added: Sabre_DAV_Property_IHref interface for properties exposing urls. * Added: Issue 25: Throwing error on broken Finder behaviour. * Changed: Authentication backend is now aware of current user. 1.2.0alpha1 (2010-03-31) * Fixed: Issue 26: Workaround for broken GVFS behaviour with encoded special characters. * Fixed: Issue 34: Incorrect Lock-Token response header for LOCK. Fixes Office 2010 compatibility. * Added: Issue 35: SabreDAV version to header to OPTIONS response to ease debugging. * Fixed: Issue 36: Incorrect variable name, throwing error in some requests. * Fixed: Issue 37: Incorrect smultron regex in temporary filefilter. * Fixed: Issue 33: Converting ISO-8859-1 characters to UTF-8. * Fixed: Issue 39 & Issue 40: Basename fails on non-utf-8 locales. * Added: More unittests. * Added: SabreDAV version to all error responses. * Added: URLUtil class for decoding urls. * Changed: Now using pear.sabredav.org pear channel. * Changed: Sabre_DAV_Server::getCopyAndMoveInfo is now a public method. 1.1.2-alpha (2010-03-18) * Added: RFC5397 - current-user-principal support. * Fixed: Issue 27: encoding entities in property responses. * Added: naturalselection script now allows the user to specify a 'minimum number of bytes' for deletion. This should reduce load due to less crawling * Added: Full support for the calendar-query report. * Added: More unittests. * Added: Support for complex property deserialization through the static ::unserialize() method. * Added: Support for modifying calendar-component-set * Fixed: Issue 29: Added TIMEOUT_INFINITE constant 1.1.1-alpha (2010-03-11) * Added: RFC5689 - Extended MKCOL support. * Fixed: Evolution support for CalDAV. * Fixed: PDO-locks backend was pretty much completely broken. This is 100% unittested now. * Added: support for ctags. * Fixed: Comma's between HTTP methods in 'Allow' method. * Changed: default argument for Sabre_DAV_Locks_Backend_FS. This means a datadirectory must always be specified from now on. * Changed: Moved Sabre_DAV_Server::parseProps to Sabre_DAV_XMLUtil::parseProperties. * Changed: Sabre_DAV_IDirectory is now Sabre_DAV_ICollection. * Changed: Sabre_DAV_Exception_PermissionDenied is now Sabre_DAV_Exception_Forbidden. * Changed: Sabre_CalDAV_ICalendarCollection is removed. * Added: Sabre_DAV_IExtendedCollection. * Added: Many more unittests. * Added: support for calendar-timezone property. 1.1.0-alpha (2010-03-01) * Note: This version is forked from version 1.0.5, so release dates may be out of order. * Added: CalDAV - RFC 4791 * Removed: Sabre_PHP_Exception. PHP has a built-in ErrorException for this. * Added: PDO authentication backend. * Added: Example sql for auth, caldav, locks for sqlite. * Added: Sabre_DAV_Browser_GuessContentType plugin * Changed: Authentication plugin refactored, making it possible to implement non-digest authentication. * Fixed: Better error display in browser plugin. * Added: Support for {DAV:}supported-report-set * Added: XML utility class with helper functions for the WebDAV protocol. * Added: Tons of unittests * Added: PrincipalCollection and Principal classes * Added: Sabre_DAV_Server::getProperties for easy property retrieval * Changed: {DAV:}resourceType defaults to 0 * Changed: Any non-null resourceType now gets a / appended to the href value. Before this was just for {DAV:}collection's, but this is now also the case for for example {DAV:}principal. * Changed: The Href property class can now optionally create non-relative uri's. * Changed: Sabre_HTTP_Response now returns false if headers are already sent and header-methods are called. * Fixed: Issue 19: HEAD requests on Collections * Fixed: Issue 21: Typo in Sabre_DAV_Property_Response * Fixed: Issue 18: Doesn't work with Evolution Contacts 1.0.15-stable (2010-05-28) * Added: Issue 31: Hiding exception information by default. Can be turned on with the Sabre_DAV_Server::$debugExceptions property. * Added: Moved autoload from lib/ to lib/Sabre/autoload.php. This is also the case in the upcoming 1.2.0, so it will improve future compatibility. 1.0.14-stable (2010-04-15) * Fixed: double namespace declaration in multistatus responses. 1.0.13-stable (2010-03-30) * Fixed: Issue 40: Last references to basename/dirname 1.0.12-stable (2010-03-30) * Fixed: Issue 37: Incorrect smultron regex in temporary filefilter. * Fixed: Issue 26: Workaround for broken GVFS behaviour with encoded special characters. * Fixed: Issue 33: Converting ISO-8859-1 characters to UTF-8. * Fixed: Issue 39: Basename fails on non-utf-8 locales. * Added: More unittests. * Added: SabreDAV version to all error responses. * Added: URLUtil class for decoding urls. * Updated: Now using pear.sabredav.org pear channel. 1.0.11-stable (2010-03-23) * Non-public release. This release is identical to 1.0.10, but it is used to test releasing packages to pear.sabredav.org. 1.0.10-stable (2010-03-22) * Fixed: Issue 34: Invalid Lock-Token header response. * Added: Issue 35: Addign SabreDAV version to HTTP OPTIONS responses. 1.0.9-stable (2010-03-19) * Fixed: Issue 27: Entities not being encoded in PROPFIND responses. * Fixed: Issue 29: Added missing TIMEOUT_INFINITE constant. 1.0.8-stable (2010-03-03) * Fixed: Issue 21: typos causing errors * Fixed: Issue 23: Comma's between methods in Allow header. * Added: Sabre_DAV_ICollection interface, to aid in future compatibility. * Added: Sabre_DAV_Exception_Forbidden exception. This will replace Sabre_DAV_Exception_PermissionDenied in the future, and can already be used to ensure future compatibility. 1.0.7-stable (2010-02-24) * Fixed: Issue 19 regression for MS Office 1.0.6-stable (2010-02-23) * Fixed: Issue 19: HEAD requests on Collections 1.0.5-stable (2010-01-22) * Fixed: Fatal error when a malformed url was used for unlocking, in conjuction with Sabre.autoload.php due to a incorrect filename. * Fixed: Improved unittests and build system 1.0.4-stable (2010-01-11) * Fixed: needed 2 different releases. One for googlecode and one for pearfarm. This is to retain the old method to install SabreDAV until pearfarm becomes the standard installation method. 1.0.3-stable (2010-01-11) * Added: RFC4709 support (davmount) * Added: 6 unittests * Added: naturalselection. A tool to keep cache directories below a specified theshold. * Changed: Now using pearfarm.org channel server. 1.0.1-stable (2009-12-22) * Fixed: Issue 15: typos in examples * Fixed: Minor pear installation issues 1.0.0-stable (2009-11-02) * Added: SimpleDirectory class. This class allows creating static directory structures with ease. * Changed: Custom complex properties and exceptions now get an instance of Sabre_DAV_Server as their first argument in serialize() * Changed: Href complex property now prepends server's baseUri * Changed: delete before an overwriting copy/move is now handles by server class instead of tree classes * Changed: events must now explicitly return false to stop execution. Before, execution would be stopped by anything loosely evaluating to false. * Changed: the getPropertiesForPath method now takes a different set of arguments, and returns a different response. This allows plugin developers to return statuses for properties other than 200 and 404. The hrefs are now also always calculated relative to the baseUri, and not the uri of the request. * Changed: generatePropFindResponse is renamed to generateMultiStatus, and now takes a list of properties similar to the response of getPropertiesForPath. This was also needed to improve flexibility for plugin development. * Changed: Auth plugins are no longer included. They were not yet stable quality, so they will probably be reintroduced in a later version. * Changed: PROPPATCH also used generateMultiStatus now. * Removed: unknownProperties event. This is replaced by the afterGetProperties event, which should provide more flexibility. * Fixed: Only calling getSize() on IFile instances in httpHead() * Added: beforeBind event. This is invoked upon file or directory creation * Added: beforeWriteContent event, this is invoked by PUT and LOCK on an existing resource. * Added: beforeUnbind event. This is invoked right before deletion of any resource. * Added: afterGetProperties event. This event can be used to make modifications to property responses. * Added: beforeLock and beforeUnlock events. * Added: afterBind event. * Fixed: Copy and Move could fail in the root directory. This is now fixed. * Added: Plugins can now be retrieved by their classname. This is useful for inter-plugin communication. * Added: The Auth backend can now return usernames and user-id's. * Added: The Auth backend got a getUsers method * Added: Sabre_DAV_FSExt_Directory now returns quota info 0.12.1-beta (2009-09-11) * Fixed: UNLOCK bug. Unlock didn't work at all 0.12-beta (2009-09-10) * Updated: Browser plugin now shows multiple {DAV:}resourcetype values if available. * Added: Experimental PDO backend for Locks Manager * Fixed: Sending Content-Length: 0 for every empty response. This improves NGinx compatibility. * Fixed: Last modification time is reported in UTC timezone. This improves Finder compatibility. 0.11-beta (2009-08-11) * Updated: Now in Beta * Updated: Pear package no longer includes docs/ directory. These just contained rfc's, which are publically available. This reduces the package from ~800k to ~60k * Added: generatePropfindResponse now takes a baseUri argument * Added: ResourceType property can now contain multiple resourcetypes. * Fixed: Issue 13. 0.10-alpha (2009-08-03) * Added: Plugin to automatically map GET requests to non-files to PROPFIND (Sabre_DAV_Browser_MapGetToPropFind). This should allow easier debugging of complicated WebDAV setups. * Added: Sabre_DAV_Property_Href class. For future use. * Added: Ability to choose to use auth-int, auth or both for HTTP Digest authentication. (Issue 11) * Changed: Made more methods in Sabre_DAV_Server public. * Fixed: TemporaryFileFilter plugin now intercepts HTTP LOCK requests to non-existent files. (Issue 12) * Added: Central list of defined xml namespace prefixes. This can reduce Bandwidth and legibility for xml bodies with user-defined namespaces. * Added: now a PEAR-compatible package again, thanks to Michael Gauthier * Changed: moved default copy and move logic from ObjectTree to Tree class 0.9-alpha (2009-07-21) * Changed: Major refactoring, removed most of the logic from the Tree objects. The Server class now directly works with the INode, IFile and IDirectory objects. If you created your own Tree objects, this will most likely break in this release. * Changed: Moved all the Locking logic from the Tree and Server classes into a separate plugin. * Changed: TemporaryFileFilter is now a plugin. * Added: Comes with an autoloader script. This can be used instead of the includer script, and is preferred by some people. * Added: AWS Authentication class. * Added: simpleserversetup.py script. This will quickly get a fileserver up and running. * Added: When subscribing to events, it is now possible to supply a priority. This is for example needed to ensure that the Authentication Plugin is used before any other Plugin. * Added: 22 new tests. * Added: Users-manager plugin for .htdigest files. Experimental and subject to change. * Added: RFC 2324 HTTP 418 status code * Fixed: Exclusive locks could in some cases be picked up as shared locks * Fixed: Digest auth for non-apache servers had a bug (still not actually tested this well). 0.8-alpha (2009-05-30) * Changed: Renamed all exceptions! This is a compatibility break. Every Exception now follows Sabre_DAV_Exception_FileNotFound convention instead of Sabre_DAV_FileNotFoundException. * Added: Browser plugin now allows uploading and creating directories straight from the browser. * Added: 12 more unittests * Fixed: Locking bug, which became prevalent on Windows Vista. * Fixed: Netdrive support * Fixed: TemporaryFileFilter filtered out too many files. Fixed some of the regexes. * Fixed: Added README and ChangeLog to package 0.7-alpha (2009-03-29) * Added: System to return complex properties from PROPFIND. * Added: support for {DAV:}supportedlock. * Added: support for {DAV:}lockdiscovery. * Added: 6 new tests. * Added: New plugin system. * Added: Simple HTML directory plugin, for browser access. * Added: Server class now sends back standard pre-condition error xml bodies. This was new since RFC4918. * Added: Sabre_DAV_Tree_Aggregrate, which can 'host' multiple Tree objects into one. * Added: simple basis for HTTP REPORT method. This method is not used yet, but can be used by plugins to add reports. * Changed: ->getSize is only called for files, no longer for collections. r303 * Changed: Sabre_DAV_FilterTree is now Sabre_DAV_Tree_Filter * Changed: Sabre_DAV_TemporaryFileFilter is now called Sabre_DAV_Tree_TemporaryFileFilter. * Changed: removed functions (get(/set)HTTPRequest(/Response)) from Server class, and using a public property instead. * Fixed: bug related to parsing proppatch and propfind requests. Didn't show up in most clients, but it needed fixing regardless. (r255) * Fixed: auth-int is now properly supported within HTTP Digest. * Fixed: Using application/xml for a mimetype vs. text/xml as per RFC4918 sec 8.2. * Fixed: TemporaryFileFilter now lets through GET's if they actually exist on the backend. (r274) * FIxed: Some methods didn't get passed through in the FilterTree (r283). * Fixed: LockManager is now slightly more complex, Tree classes slightly less. (r287) 0.6-alpha (2009-02-16) * Added: Now uses streams for files, instead of strings. This means it won't require to hold entire files in memory, which can be an issue if you're dealing with big files. Note that this breaks compatibility for put() and createFile methods. * Added: HTTP Digest Authentication helper class. * Added: Support for HTTP Range header * Added: Support for ETags within If: headers * Added: The API can now return ETags and override the default Content-Type * Added: starting with basic framework for unittesting, using PHPUnit. * Added: 49 unittests. * Added: Abstraction for the HTTP request. * Updated: Using Clark Notation for tags in properties. This means tags are serialized as {namespace}tagName instead of namespace#tagName * Fixed: HTTP_BasicAuth class now works as expected. * Fixed: DAV_Server uses / for a default baseUrl. * Fixed: Last modification date is no longer ignored in PROPFIND. * Fixed: PROPFIND now sends back information about the requestUri even when "Depth: 1" is specified. 0.5-alpha (2009-01-14) * Added: Added a very simple example for implementing a mapping to PHP file streams. This should allow easy implementation of for example a WebDAV to FTP proxy. * Added: HTTP Basic Authentication helper class. * Added: Sabre_HTTP_Response class. This centralizes HTTP operations and will be a start towards the creating of a testing framework. * Updated: Backwards compatibility break: all require_once() statements are removed from all the files. It is now recommended to use autoloading of classes, or just including lib/Sabre.includes.php. This fix was made to allow easier integration into applications not using this standard inclusion model. * Updated: Better in-file documentation. * Updated: Sabre_DAV_Tree can now work with Sabre_DAV_LockManager. * Updated: Fixes a shared-lock bug. * Updated: Removed ?> from the bottom of each php file. * Updated: Split up some operations from Sabre_DAV_Server to Sabre_HTTP_Response. * Fixed: examples are now actually included in the pear package. 0.4-alpha (2008-11-05) * Passes all litmus tests! * Added: more examples * Added: Custom property support * Added: Shared lock support * Added: Depth support to locks * Added: Locking on unmapped urls (non-existent nodes) * Fixed: Advertising as WebDAV class 3 support 0.3-alpha (2008-06-29) * Fully working in MS Windows clients. * Added: temporary file filter: support for smultron files. * Added: Phing build scripts * Added: PEAR package * Fixed: MOVE bug identified using finder. * Fixed: Using gzuncompress instead of gzdecode in the temporary file filter. This seems more common. 0.2-alpha (2008-05-27) * Somewhat working in Windows clients * Added: Working PROPPATCH method (doesn't support custom properties yet) * Added: Temporary filename handling system * Added: Sabre_DAV_IQuota to return quota information * Added: PROPFIND now reads the request body and only supplies the requested properties 0.1-alpha (2008-04-04) * First release! * Passes litmus: basic, http and copymove test. * Fully working in Finder and DavFSv2 Project started: 2007-12-13 sabre-dav-1.8.12/LICENSE000066400000000000000000000030501246001162500144470ustar00rootroot00000000000000Copyright (C) 2007-2015 fruux GmbH (https://fruux.com/). All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of SabreDAV nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. sabre-dav-1.8.12/README.md000066400000000000000000000036051246001162500147270ustar00rootroot00000000000000# What is SabreDAV SabreDAV allows you to easily add WebDAV support to a PHP application. SabreDAV is meant to cover the entire standard, and attempts to allow integration using an easy to understand API. ### Feature list: * Fully WebDAV compliant * Supports Windows XP, Windows Vista, Mac OS/X, DavFSv2, Cadaver, Netdrive, Open Office, and probably more. * Passing all Litmus tests. * Supporting class 1, 2 and 3 Webdav servers. * Locking support. * Custom property support. * CalDAV (tested with [Evolution](http://code.google.com/p/sabredav/wiki/Evolution), [iCal](http://code.google.com/p/sabredav/wiki/ICal), [iPhone](http://code.google.com/p/sabredav/wiki/IPhone) and [Lightning](http://code.google.com/p/sabredav/wiki/Lightning)). * CardDAV (tested with [OS/X addressbook](http://code.google.com/p/sabredav/wiki/OSXAddressbook), the [iOS addressbook](http://code.google.com/p/sabredav/wiki/iOSCardDAV) and [Evolution](http://code.google.com/p/sabredav/wiki/Evolution)). * Over 97% unittest code coverage. ### Supported RFC's: * [RFC2617](http://www.ietf.org/rfc/rfc2617.txt): Basic/Digest auth. * [RFC2518](http://www.ietf.org/rfc/rfc2518.txt): First WebDAV spec. * [RFC3744](http://www.ietf.org/rfc/rfc3744.txt): ACL (some features missing). * [RFC4709](http://www.ietf.org/rfc/rfc4709.txt): [DavMount](http://code.google.com/p/sabredav/wiki/DavMount). * [RFC4791](http://www.ietf.org/rfc/rfc4791.txt): CalDAV. * [RFC4918](http://www.ietf.org/rfc/rfc4918.txt): WebDAV revision. * [RFC5397](http://www.ietf.org/rfc/rfc5689.txt): current-user-principal. * [RFC5689](http://www.ietf.org/rfc/rfc5689.txt): Extended MKCOL. * [RFC5789](http://tools.ietf.org/html/rfc5789): PATCH method for HTTP. * [RFC6352](http://www.ietf.org/rfc/rfc6352.txt): CardDAV * [draft-daboo-carddav-directory-gateway](http://tools.ietf.org/html/draft-daboo-carddav-directory-gateway): CardDAV directory gateway * CalDAV ctag, CalDAV-proxy. sabre-dav-1.8.12/bin/000077500000000000000000000000001246001162500142145ustar00rootroot00000000000000sabre-dav-1.8.12/bin/build.php000066400000000000000000000057051246001162500160330ustar00rootroot00000000000000 [ 'init', 'test', 'clean', ], 'markrelease' => [ 'init', 'test', 'clean', ], 'clean' => [], 'test' => [ 'composerupdate', ], 'init' => [], 'composerupdate' => [], ]; $default = 'buildzip'; $baseDir = __DIR__ . '/../'; chdir($baseDir); $currentTask = $default; if ($argc > 1) $currentTask = $argv[1]; $version = null; if ($argc > 2) $version = $argv[2]; if (!isset($tasks[$currentTask])) { echo "Task not found: ", $currentTask, "\n"; die(1); } // Creating the dependency graph $newTaskList = []; $oldTaskList = [$currentTask => true]; while(count($oldTaskList)>0) { foreach($oldTaskList as $task=>$foo) { if (!isset($tasks[$task])) { echo "Dependency not found: " . $task, "\n"; die(1); } $dependencies = $tasks[$task]; $fullFilled = true; foreach($dependencies as $dependency) { if (isset($newTaskList[$dependency])) { // Already in the fulfilled task list. continue; } else { $oldTaskList[$dependency] = true; $fullFilled = false; } } if ($fullFilled) { unset($oldTaskList[$task]); $newTaskList[$task] = 1; } } } foreach(array_keys($newTaskList) as $task) { echo "task: " . $task, "\n"; call_user_func($task); echo "\n"; } function init() { global $version; if (!$version) { include __DIR__ . '/../vendor/autoload.php'; $version = Sabre\DAV\Version::VERSION; } echo " Building sabre/dav " . $version, "\n"; } function clean() { global $baseDir; echo " Removing build files\n"; $outputDir = $baseDir . '/build/SabreDAV'; if (is_dir($outputDir)) { system('rm -r ' . $baseDir . '/build/SabreDAV'); } } function composerupdate() { global $baseDir; echo " Updating composer packages to latest version\n\n"; system('cd ' . $baseDir . '; composer update --dev'); } function test() { global $baseDir; echo " Running all unittests.\n"; echo " This may take a while.\n\n"; system(__DIR__ . '/phpunit --configuration ' . $baseDir . '/tests/phpunit.xml --stop-on-failure', $code); if ($code != 0) { echo "PHPUnit reported error code $code\n"; die(1); } } function buildzip() { global $baseDir, $version; echo " Asking composer to download sabre/dav $version\n\n"; system("composer create-project --no-dev sabre/dav build/SabreDAV $version", $code); if ($code!==0) { echo "Composer reported error code $code\n"; die(1); } // echo "\n"; echo "Zipping the sabredav distribution\n\n"; system('cd build; zip -qr sabredav-' . $version . '.zip SabreDAV'); echo "Done."; } sabre-dav-1.8.12/bin/googlecode_upload.py000077500000000000000000000213211246001162500202430ustar00rootroot00000000000000#!/usr/bin/env python # # Copyright 2006, 2007 Google Inc. All Rights Reserved. # Author: danderson@google.com (David Anderson) # # Script for uploading files to a Google Code project. # # This is intended to be both a useful script for people who want to # streamline project uploads and a reference implementation for # uploading files to Google Code projects. # # To upload a file to Google Code, you need to provide a path to the # file on your local machine, a small summary of what the file is, a # project name, and a valid account that is a member or owner of that # project. You can optionally provide a list of labels that apply to # the file. The file will be uploaded under the same name that it has # in your local filesystem (that is, the "basename" or last path # component). Run the script with '--help' to get the exact syntax # and available options. # # Note that the upload script requests that you enter your # googlecode.com password. This is NOT your Gmail account password! # This is the password you use on googlecode.com for committing to # Subversion and uploading files. You can find your password by going # to http://code.google.com/hosting/settings when logged in with your # Gmail account. If you have already committed to your project's # Subversion repository, the script will automatically retrieve your # credentials from there (unless disabled, see the output of '--help' # for details). # # If you are looking at this script as a reference for implementing # your own Google Code file uploader, then you should take a look at # the upload() function, which is the meat of the uploader. You # basically need to build a multipart/form-data POST request with the # right fields and send it to https://PROJECT.googlecode.com/files . # Authenticate the request using HTTP Basic authentication, as is # shown below. # # Licensed under the terms of the Apache Software License 2.0: # http://www.apache.org/licenses/LICENSE-2.0 # # Questions, comments, feature requests and patches are most welcome. # Please direct all of these to the Google Code users group: # http://groups.google.com/group/google-code-hosting """Google Code file uploader script. """ __author__ = 'danderson@google.com (David Anderson)' import httplib import os.path import optparse import getpass import base64 import sys def upload(file, project_name, user_name, password, summary, labels=None): """Upload a file to a Google Code project's file server. Args: file: The local path to the file. project_name: The name of your project on Google Code. user_name: Your Google account name. password: The googlecode.com password for your account. Note that this is NOT your global Google Account password! summary: A small description for the file. labels: an optional list of label strings with which to tag the file. Returns: a tuple: http_status: 201 if the upload succeeded, something else if an error occurred. http_reason: The human-readable string associated with http_status file_url: If the upload succeeded, the URL of the file on Google Code, None otherwise. """ # The login is the user part of user@gmail.com. If the login provided # is in the full user@domain form, strip it down. if user_name.endswith('@gmail.com'): user_name = user_name[:user_name.index('@gmail.com')] form_fields = [('summary', summary)] if labels is not None: form_fields.extend([('label', l.strip()) for l in labels]) content_type, body = encode_upload_request(form_fields, file) upload_host = '%s.googlecode.com' % project_name upload_uri = '/files' auth_token = base64.b64encode('%s:%s'% (user_name, password)) headers = { 'Authorization': 'Basic %s' % auth_token, 'User-Agent': 'Googlecode.com uploader v0.9.4', 'Content-Type': content_type, } server = httplib.HTTPSConnection(upload_host) server.request('POST', upload_uri, body, headers) resp = server.getresponse() server.close() if resp.status == 201: location = resp.getheader('Location', None) else: location = None return resp.status, resp.reason, location def encode_upload_request(fields, file_path): """Encode the given fields and file into a multipart form body. fields is a sequence of (name, value) pairs. file is the path of the file to upload. The file will be uploaded to Google Code with the same file name. Returns: (content_type, body) ready for httplib.HTTP instance """ BOUNDARY = '----------Googlecode_boundary_reindeer_flotilla' CRLF = '\r\n' body = [] # Add the metadata about the upload first for key, value in fields: body.extend( ['--' + BOUNDARY, 'Content-Disposition: form-data; name="%s"' % key, '', value, ]) # Now add the file itself file_name = os.path.basename(file_path) f = open(file_path, 'rb') file_content = f.read() f.close() body.extend( ['--' + BOUNDARY, 'Content-Disposition: form-data; name="filename"; filename="%s"' % file_name, # The upload server determines the mime-type, no need to set it. 'Content-Type: application/octet-stream', '', file_content, ]) # Finalize the form body body.extend(['--' + BOUNDARY + '--', '']) return 'multipart/form-data; boundary=%s' % BOUNDARY, CRLF.join(body) def upload_find_auth(file_path, project_name, summary, labels=None, user_name=None, password=None, tries=3): """Find credentials and upload a file to a Google Code project's file server. file_path, project_name, summary, and labels are passed as-is to upload. Args: file_path: The local path to the file. project_name: The name of your project on Google Code. summary: A small description for the file. labels: an optional list of label strings with which to tag the file. config_dir: Path to Subversion configuration directory, 'none', or None. user_name: Your Google account name. tries: How many attempts to make. """ while tries > 0: if user_name is None: # Read username if not specified or loaded from svn config, or on # subsequent tries. sys.stdout.write('Please enter your googlecode.com username: ') sys.stdout.flush() user_name = sys.stdin.readline().rstrip() if password is None: # Read password if not loaded from svn config, or on subsequent tries. print 'Please enter your googlecode.com password.' print '** Note that this is NOT your Gmail account password! **' print 'It is the password you use to access Subversion repositories,' print 'and can be found here: http://code.google.com/hosting/settings' password = getpass.getpass() status, reason, url = upload(file_path, project_name, user_name, password, summary, labels) # Returns 403 Forbidden instead of 401 Unauthorized for bad # credentials as of 2007-07-17. if status in [httplib.FORBIDDEN, httplib.UNAUTHORIZED]: # Rest for another try. user_name = password = None tries = tries - 1 else: # We're done. break return status, reason, url def main(): parser = optparse.OptionParser(usage='googlecode-upload.py -s SUMMARY ' '-p PROJECT [options] FILE') parser.add_option('-s', '--summary', dest='summary', help='Short description of the file') parser.add_option('-p', '--project', dest='project', help='Google Code project name') parser.add_option('-u', '--user', dest='user', help='Your Google Code username') parser.add_option('-w', '--password', dest='password', help='Your Google Code password') parser.add_option('-l', '--labels', dest='labels', help='An optional list of comma-separated labels to attach ' 'to the file') options, args = parser.parse_args() if not options.summary: parser.error('File summary is missing.') elif not options.project: parser.error('Project name is missing.') elif len(args) < 1: parser.error('File to upload not provided.') elif len(args) > 1: parser.error('Only one file may be specified.') file_path = args[0] if options.labels: labels = options.labels.split(',') else: labels = None status, reason, url = upload_find_auth(file_path, options.project, options.summary, labels, options.user, options.password) if url: print 'The file was uploaded successfully.' print 'URL: %s' % url return 0 else: print 'An error occurred. Your file was not uploaded.' print 'Google Code upload server said: %s (%s)' % (reason, status) return 1 if __name__ == '__main__': sys.exit(main()) sabre-dav-1.8.12/bin/migrateto17.php000077500000000000000000000203311246001162500170720ustar00rootroot00000000000000#!/usr/bin/env php setAttribute(PDO::ATTR_ERRMODE, PDO::ERRMODE_EXCEPTION); $pdo->setAttribute(PDO::ATTR_DEFAULT_FETCH_MODE, PDO::FETCH_ASSOC); echo "Validating existing table layout\n"; // The only cross-db way to do this, is to just fetch a single record. $row = $pdo->query("SELECT * FROM calendarobjects LIMIT 1")->fetch(); if (!$row) { echo "Error: This database did not have any records in the calendarobjects table, you should just recreate the table.\n"; exit(-1); } $requiredFields = array( 'id', 'calendardata', 'uri', 'calendarid', 'lastmodified', ); foreach($requiredFields as $requiredField) { if (!array_key_exists($requiredField,$row)) { echo "Error: The current 'calendarobjects' table was missing a field we expected to exist.\n"; echo "For safety reasons, this process is stopped.\n"; exit(-1); } } $fields17 = array( 'etag', 'size', 'componenttype', 'firstoccurence', 'lastoccurence', ); $found = 0; foreach($fields17 as $field) { if (array_key_exists($field, $row)) { $found++; } } if ($found === 0) { echo "The database had the 1.6 schema. Table will now be altered.\n"; echo "This may take some time for large tables\n"; switch($pdo->getAttribute(PDO::ATTR_DRIVER_NAME)) { case 'mysql' : $pdo->exec(<<exec('ALTER TABLE calendarobjects ADD etag text'); $pdo->exec('ALTER TABLE calendarobjects ADD size integer'); $pdo->exec('ALTER TABLE calendarobjects ADD componenttype TEXT'); $pdo->exec('ALTER TABLE calendarobjects ADD firstoccurence integer'); $pdo->exec('ALTER TABLE calendarobjects ADD lastoccurence integer'); break; default : die('This upgrade script does not support this driver (' . $pdo->getAttribute(PDO::ATTR_DRIVER_NAME) . ")\n"); } echo "Database schema upgraded.\n"; } elseif ($found === 5) { echo "Database already had the 1.7 schema\n"; } else { echo "The database had $found out of 5 from the changes for 1.7. This is scary and unusual, so we have to abort.\n"; echo "You can manually try to upgrade the schema, and then run this script again.\n"; exit(-1); } echo "Now, we need to parse every record and pull out some information.\n"; $result = $pdo->query('SELECT id, calendardata FROM calendarobjects'); $stmt = $pdo->prepare('UPDATE calendarobjects SET etag = ?, size = ?, componenttype = ?, firstoccurence = ?, lastoccurence = ? WHERE id = ?'); echo "Total records found: " . $result->rowCount() . "\n"; $done = 0; $total = $result->rowCount(); while($row = $result->fetch()) { try { $newData = getDenormalizedData($row['calendardata']); } catch (Exception $e) { echo "===\nException caught will trying to parser calendarobject.\n"; echo "Error message: " . $e->getMessage() . "\n"; echo "Record id: " . $row['id'] . "\n"; echo "This record is ignored, you should inspect it to see if there's anything wrong.\n===\n"; continue; } $stmt->execute(array( $newData['etag'], $newData['size'], $newData['componentType'], $newData['firstOccurence'], $newData['lastOccurence'], $row['id'], )); $done++; if ($done % 500 === 0) { echo "Completed: $done / $total\n"; } } echo "Completed: $done / $total\n"; echo "Checking the calendars table needs changes.\n"; $row = $pdo->query("SELECT * FROM calendars LIMIT 1")->fetch(); if (array_key_exists('transparent', $row)) { echo "The calendars table is already up to date\n"; } else { echo "Adding the 'transparent' field to the calendars table\n"; switch($pdo->getAttribute(PDO::ATTR_DRIVER_NAME)) { case 'mysql' : $pdo->exec("ALTER TABLE calendars ADD transparent TINYINT(1) NOT NULL DEFAULT '0'"); break; case 'sqlite' : $pdo->exec("ALTER TABLE calendars ADD transparent bool"); break; default : die('This upgrade script does not support this driver (' . $pdo->getAttribute(PDO::ATTR_DRIVER_NAME) . ")\n"); } } echo "Process completed!\n"; /** * Parses some information from calendar objects, used for optimized * calendar-queries. * * Blantently copied from Sabre\CalDAV\Backend\PDO * * Returns an array with the following keys: * * etag * * size * * componentType * * firstOccurence * * lastOccurence * * @param string $calendarData * @return array */ function getDenormalizedData($calendarData) { $vObject = \Sabre\VObject\Reader::read($calendarData); $componentType = null; $component = null; $firstOccurence = null; $lastOccurence = null; foreach($vObject->getComponents() as $component) { if ($component->name!=='VTIMEZONE') { $componentType = $component->name; break; } } if (!$componentType) { throw new \Sabre\DAV\Exception\BadRequest('Calendar objects must have a VJOURNAL, VEVENT or VTODO component'); } if ($componentType === 'VEVENT') { $firstOccurence = $component->DTSTART->getDateTime()->getTimeStamp(); // Finding the last occurence is a bit harder if (!isset($component->RRULE)) { if (isset($component->DTEND)) { $lastOccurence = $component->DTEND->getDateTime()->getTimeStamp(); } elseif (isset($component->DURATION)) { $endDate = clone $component->DTSTART->getDateTime(); $endDate->add(\Sabre\VObject\DateTimeParser::parse($component->DURATION->value)); $lastOccurence = $endDate->getTimeStamp(); } elseif (!$component->DTSTART->hasTime()) { $endDate = clone $component->DTSTART->getDateTime(); $endDate->modify('+1 day'); $lastOccurence = $endDate->getTimeStamp(); } else { $lastOccurence = $firstOccurence; } } else { $it = new \Sabre\VObject\RecurrenceIterator($vObject, (string)$component->UID); $maxDate = new DateTime(\Sabre\CalDAV\Backend\PDO::MAX_DATE); if ($it->isInfinite()) { $lastOccurence = $maxDate->getTimeStamp(); } else { $end = $it->getDtEnd(); while($it->valid() && $end < $maxDate) { $end = $it->getDtEnd(); $it->next(); } $lastOccurence = $end->getTimeStamp(); } } } return array( 'etag' => md5($calendarData), 'size' => strlen($calendarData), 'componentType' => $componentType, 'firstOccurence' => $firstOccurence, 'lastOccurence' => $lastOccurence, ); } sabre-dav-1.8.12/bin/naturalselection.py000077500000000000000000000076621246001162500201600ustar00rootroot00000000000000#!/usr/bin/env python # # Copyright (c) 2009-2010 Evert Pot # All rights reserved. # http://www.rooftopsolutions.nl/ # # This utility is distributed along with SabreDAV # license: http://code.google.com/p/sabredav/wiki/License Modified BSD License import os from optparse import OptionParser import time def getfreespace(path): stat = os.statvfs(path) return stat.f_frsize * stat.f_bavail def getbytesleft(path,treshold): return getfreespace(path)-treshold def run(cacheDir, treshold, sleep=5, simulate=False, min_erase = 0): bytes = getbytesleft(cacheDir,treshold) if (bytes>0): print "Bytes to go before we hit treshhold:", bytes else: print "Treshold exceeded with:", -bytes, "bytes" dir = os.listdir(cacheDir) dir2 = [] for file in dir: path = cacheDir + '/' + file dir2.append({ "path" : path, "atime": os.stat(path).st_atime, "size" : os.stat(path).st_size }) dir2.sort(lambda x,y: int(x["atime"]-y["atime"])) filesunlinked = 0 gainedspace = 0 # Left is the amount of bytes that need to be freed up # The default is the 'min_erase setting' left = min_erase # If the min_erase setting is lower than the amount of bytes over # the treshold, we use that number instead. if left < -bytes : left = -bytes print "Need to delete at least:", left; for file in dir2: # Only deleting files if we're not simulating if not simulate: os.unlink(file["path"]) left = int(left - file["size"]) gainedspace = gainedspace + file["size"] filesunlinked = filesunlinked + 1 if(left<0): break print "%d files deleted (%d bytes)" % (filesunlinked, gainedspace) time.sleep(sleep) def main(): parser = OptionParser( version="naturalselecton v0.3", description="Cache directory manager. Deletes cache entries based on accesstime and free space tresholds.\n" + "This utility is distributed alongside SabreDAV.", usage="usage: %prog [options] cacheDirectory", ) parser.add_option( '-s', dest="simulate", action="store_true", help="Don't actually make changes, but just simulate the behaviour", ) parser.add_option( '-r','--runs', help="How many times to check before exiting. -1 is infinite, which is the default", type="int", dest="runs", default=-1 ) parser.add_option( '-n','--interval', help="Sleep time in seconds (default = 5)", type="int", dest="sleep", default=5 ) parser.add_option( '-l','--treshold', help="Treshhold in bytes (default = 10737418240, which is 10GB)", type="int", dest="treshold", default=10737418240 ) parser.add_option( '-m', '--min-erase', help="Minimum number of bytes to erase when the treshold is reached. " + "Setting this option higher will reduce the amount of times the cache directory will need to be scanned. " + "(the default is 1073741824, which is 1GB.)", type="int", dest="min_erase", default=1073741824 ) options,args = parser.parse_args() if len(args)<1: parser.error("This utility requires at least 1 argument") cacheDir = args[0] print "Natural Selection" print "Cache directory:", cacheDir free = getfreespace(cacheDir); print "Current free disk space:", free runs = options.runs; while runs!=0 : run( cacheDir, sleep=options.sleep, simulate=options.simulate, treshold=options.treshold, min_erase=options.min_erase ) if runs>0: runs = runs - 1 if __name__ == '__main__' : main() sabre-dav-1.8.12/bin/sabredav000077500000000000000000000000701246001162500157260ustar00rootroot00000000000000#!/bin/sh php -S 0.0.0.0:8080 `dirname $0`/sabredav.php sabre-dav-1.8.12/bin/sabredav.php000077500000000000000000000014501246001162500165170ustar00rootroot00000000000000stream = fopen('php://stdout','w'); } function log($msg) { fwrite($this->stream, $msg . "\n"); } } $log = new CliLog(); if (php_sapi_name()!=='cli-server') { die("This script is intended to run on the built-in php webserver"); } // Finding composer $paths = array( __DIR__ . '/../vendor/autoload.php', __DIR__ . '/../../../autoload.php', ); foreach($paths as $path) { if (file_exists($path)) { include $path; break; } } use Sabre\DAV; // Root $root = new DAV\FS\Directory(getcwd()); // Setting up server. $server = new DAV\Server($root); // Browser plugin $server->addPlugin(new DAV\Browser\Plugin()); $server->exec(); sabre-dav-1.8.12/composer.json000066400000000000000000000030071246001162500161660ustar00rootroot00000000000000{ "name": "sabre/dav", "type": "library", "description": "WebDAV Framework for PHP", "keywords": ["Framework", "WebDAV", "CalDAV", "CardDAV", "iCalendar"], "homepage": "http://code.google.com/p/sabredav/", "license" : "BSD-3-Clause", "authors": [ { "name": "Evert Pot", "email": "me@evertpot.com", "homepage" : "http://evertpot.com/", "role" : "Developer" } ], "require": { "php": ">=5.3.1", "sabre/vobject" : "~2.1.0", "ext-dom": "*", "ext-pcre": "*", "ext-spl": "*", "ext-simplexml": "*", "ext-mbstring" : "*", "ext-ctype" : "*", "ext-date" : "*", "ext-iconv" : "*", "ext-libxml" : "*" }, "require-dev" : { "phpunit/phpunit" : "~4.0.0", "evert/phpdoc-md" : "~0.0.7" }, "provide" : { "evert/sabredav" : "1.7.*" }, "suggest" : { "ext-apc" : "*", "ext-curl" : "*", "ext-pdo" : "*" }, "autoload": { "psr-0" : { "Sabre\\DAV" : "lib/", "Sabre\\HTTP" : "lib/", "Sabre\\DAVACL" : "lib/", "Sabre\\CalDAV" : "lib/", "Sabre\\CardDAV" : "lib/" } }, "support" : { "forum" : "https://groups.google.com/group/sabredav-discuss", "source" : "https://github.com/evert/sabredav" }, "bin" : [ "bin/sabredav" ], "config" : { "bin-dir" : "./bin" } } sabre-dav-1.8.12/examples/000077500000000000000000000000001246001162500152625ustar00rootroot00000000000000sabre-dav-1.8.12/examples/addressbookserver.php000066400000000000000000000032371246001162500215270ustar00rootroot00000000000000setAttribute(PDO::ATTR_ERRMODE,PDO::ERRMODE_EXCEPTION); //Mapping PHP errors to exceptions function exception_error_handler($errno, $errstr, $errfile, $errline ) { throw new ErrorException($errstr, 0, $errno, $errfile, $errline); } set_error_handler("exception_error_handler"); // Autoloader require_once 'vendor/autoload.php'; // Backends $authBackend = new Sabre\DAV\Auth\Backend\PDO($pdo); $principalBackend = new Sabre\DAVACL\PrincipalBackend\PDO($pdo); $carddavBackend = new Sabre\CardDAV\Backend\PDO($pdo); //$caldavBackend = new Sabre\CalDAV\Backend\PDO($pdo); // Setting up the directory tree // $nodes = array( new Sabre\DAVACL\PrincipalCollection($principalBackend), // new Sabre\CalDAV\CalendarRootNode($authBackend, $caldavBackend), new Sabre\CardDAV\AddressBookRoot($principalBackend, $carddavBackend), ); // The object tree needs in turn to be passed to the server class $server = new Sabre\DAV\Server($nodes); $server->setBaseUri($baseUri); // Plugins $server->addPlugin(new Sabre\DAV\Auth\Plugin($authBackend,'SabreDAV')); $server->addPlugin(new Sabre\DAV\Browser\Plugin()); //$server->addPlugin(new Sabre\CalDAV\Plugin()); $server->addPlugin(new Sabre\CardDAV\Plugin()); $server->addPlugin(new Sabre\DAVACL\Plugin()); // And off we go! $server->exec(); sabre-dav-1.8.12/examples/basicauth.php000066400000000000000000000007571246001162500177470ustar00rootroot00000000000000getUserPass(); if (!$result || $result[0]!=$u || $result[1]!=$p) { $auth->requireLogin(); echo "Authentication required\n"; die(); } sabre-dav-1.8.12/examples/calendarserver.php000066400000000000000000000030471246001162500207770ustar00rootroot00000000000000setAttribute(PDO::ATTR_ERRMODE,PDO::ERRMODE_EXCEPTION); //Mapping PHP errors to exceptions function exception_error_handler($errno, $errstr, $errfile, $errline ) { throw new \ErrorException($errstr, 0, $errno, $errfile, $errline); } set_error_handler("exception_error_handler"); // Files we need require_once 'vendor/autoload.php'; // Backends $authBackend = new \Sabre\DAV\Auth\Backend\PDO($pdo); $calendarBackend = new \Sabre\CalDAV\Backend\PDO($pdo); $principalBackend = new \Sabre\DAVACL\PrincipalBackend\PDO($pdo); // Directory structure $tree = array( new \Sabre\CalDAV\Principal\Collection($principalBackend), new \Sabre\CalDAV\CalendarRootNode($principalBackend, $calendarBackend), ); $server = new \Sabre\DAV\Server($tree); if (isset($baseUri)) $server->setBaseUri($baseUri); /* Server Plugins */ $authPlugin = new \Sabre\DAV\Auth\Plugin($authBackend,'SabreDAV'); $server->addPlugin($authPlugin); $aclPlugin = new \Sabre\DAVACL\Plugin(); $server->addPlugin($aclPlugin); $caldavPlugin = new \Sabre\CalDAV\Plugin(); $server->addPlugin($caldavPlugin); // Support for html frontend $browser = new \Sabre\DAV\Browser\Plugin(); $server->addPlugin($browser); // And off we go! $server->exec(); sabre-dav-1.8.12/examples/digestauth.php000066400000000000000000000007541246001162500201420ustar00rootroot00000000000000init(); if ($auth->getUsername() != $u || !$auth->validatePassword($p)) { $auth->requireLogin(); echo "Authentication required\n"; die(); } sabre-dav-1.8.12/examples/fileserver.php000066400000000000000000000027231246001162500201450ustar00rootroot00000000000000setBaseUri($baseUri); // Support for LOCK and UNLOCK $lockBackend = new \Sabre\DAV\Locks\Backend\File($tmpDir . '/locksdb'); $lockPlugin = new \Sabre\DAV\Locks\Plugin($lockBackend); $server->addPlugin($lockPlugin); // Support for html frontend $browser = new \Sabre\DAV\Browser\Plugin(); $server->addPlugin($browser); // Automatically guess (some) contenttypes, based on extesion $server->addPlugin(new \Sabre\DAV\Browser\GuessContentType()); // Authentication backend $authBackend = new \Sabre\DAV\Auth\Backend\File('.htdigest'); $auth = new \Sabre\DAV\Auth\Plugin($authBackend,'SabreDAV'); $server->addPlugin($auth); // Temporary file filter $tempFF = new \Sabre\DAV\TemporaryFileFilterPlugin($tmpDir); $server->addPlugin($tempFF); // And off we go! $server->exec(); sabre-dav-1.8.12/examples/groupwareserver.php000066400000000000000000000053671246001162500212500ustar00rootroot00000000000000setAttribute(PDO::ATTR_ERRMODE,PDO::ERRMODE_EXCEPTION); /** * Mapping PHP errors to exceptions. * * While this is not strictly needed, it makes a lot of sense to do so. If an * E_NOTICE or anything appears in your code, this allows SabreDAV to intercept * the issue and send a proper response back to the client (HTTP/1.1 500). */ function exception_error_handler($errno, $errstr, $errfile, $errline ) { throw new ErrorException($errstr, 0, $errno, $errfile, $errline); } set_error_handler("exception_error_handler"); // Autoloader require_once 'vendor/autoload.php'; /** * The backends. Yes we do really need all of them. * * This allows any developer to subclass just any of them and hook into their * own backend systems. */ $authBackend = new \Sabre\DAV\Auth\Backend\PDO($pdo); $principalBackend = new \Sabre\DAVACL\PrincipalBackend\PDO($pdo); $carddavBackend = new \Sabre\CardDAV\Backend\PDO($pdo); $caldavBackend = new \Sabre\CalDAV\Backend\PDO($pdo); /** * The directory tree * * Basically this is an array which contains the 'top-level' directories in the * WebDAV server. */ $nodes = array( // /principals new \Sabre\CalDAV\Principal\Collection($principalBackend), // /calendars new \Sabre\CalDAV\CalendarRootNode($principalBackend, $caldavBackend), // /addressbook new \Sabre\CardDAV\AddressBookRoot($principalBackend, $carddavBackend), ); // The object tree needs in turn to be passed to the server class $server = new \Sabre\DAV\Server($nodes); $server->setBaseUri($baseUri); // Plugins $server->addPlugin(new \Sabre\DAV\Auth\Plugin($authBackend,'SabreDAV')); $server->addPlugin(new \Sabre\DAV\Browser\Plugin()); $server->addPlugin(new \Sabre\CalDAV\Plugin()); $server->addPlugin(new \Sabre\CardDAV\Plugin()); $server->addPlugin(new \Sabre\DAVACL\Plugin()); // And off we go! $server->exec(); sabre-dav-1.8.12/examples/simplefsserver.php000066400000000000000000000045531246001162500210530ustar00rootroot00000000000000myPath = $myPath; } function getChildren() { $children = array(); // Loop through the directory, and create objects for each node foreach(scandir($this->myPath) as $node) { // Ignoring files staring with . if ($node[0]==='.') continue; $children[] = $this->getChild($node); } return $children; } function getChild($name) { $path = $this->myPath . '/' . $name; // We have to throw a NotFound exception if the file didn't exist if (!file\exists($this->myPath)) throw new \Sabre\DAV\Exception\NotFound('The file with name: ' . $name . ' could not be found'); // Some added security if ($name[0]=='.') throw new \Sabre\DAV\Exception\Forbidden('Access denied'); if (is_dir($path)) { return new \MyCollection($name); } else { return new \MyFile($path); } } function getName() { return basename($this->myPath); } } class MyFile extends \Sabre\DAV\File { private $myPath; function __construct($myPath) { $this->myPath = $myPath; } function getName() { return basename($this->myPath); } function get() { return fopen($this->myPath,'r'); } function getSize() { return filesize($this->myPath); } } // Make sure there is a directory in your current directory named 'public'. We will be exposing that directory to WebDAV $rootNode = new \MyCollection($publicDir); // The rootNode needs to be passed to the server object. $server = new \Sabre\DAV\Server($rootNode); // And off we go! $server->exec(); sabre-dav-1.8.12/examples/sql/000077500000000000000000000000001246001162500160615ustar00rootroot00000000000000sabre-dav-1.8.12/examples/sql/mysql.addressbook.sql000066400000000000000000000011501246001162500222430ustar00rootroot00000000000000CREATE TABLE addressbooks ( id INT(11) UNSIGNED NOT NULL PRIMARY KEY AUTO_INCREMENT, principaluri VARCHAR(255), displayname VARCHAR(255), uri VARCHAR(200), description TEXT, ctag INT(11) UNSIGNED NOT NULL DEFAULT '1', UNIQUE(principaluri(100), uri(100)) ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; CREATE TABLE cards ( id INT(11) UNSIGNED NOT NULL PRIMARY KEY AUTO_INCREMENT, addressbookid INT(11) UNSIGNED NOT NULL, carddata MEDIUMBLOB, uri VARCHAR(200), lastmodified INT(11) UNSIGNED ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; sabre-dav-1.8.12/examples/sql/mysql.calendars.sql000066400000000000000000000017511246001162500217060ustar00rootroot00000000000000CREATE TABLE calendarobjects ( id INTEGER UNSIGNED NOT NULL PRIMARY KEY AUTO_INCREMENT, calendardata MEDIUMBLOB, uri VARBINARY(200), calendarid INTEGER UNSIGNED NOT NULL, lastmodified INT(11) UNSIGNED, etag VARBINARY(32), size INT(11) UNSIGNED NOT NULL, componenttype VARBINARY(8), firstoccurence INT(11) UNSIGNED, lastoccurence INT(11) UNSIGNED, UNIQUE(calendarid, uri) ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; CREATE TABLE calendars ( id INTEGER UNSIGNED NOT NULL PRIMARY KEY AUTO_INCREMENT, principaluri VARBINARY(100), displayname VARCHAR(100), uri VARBINARY(200), ctag INTEGER UNSIGNED NOT NULL DEFAULT '0', description TEXT, calendarorder INTEGER UNSIGNED NOT NULL DEFAULT '0', calendarcolor VARBINARY(10), timezone TEXT, components VARBINARY(20), transparent TINYINT(1) NOT NULL DEFAULT '0', UNIQUE(principaluri, uri) ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; sabre-dav-1.8.12/examples/sql/mysql.locks.sql000066400000000000000000000004401246001162500210570ustar00rootroot00000000000000CREATE TABLE locks ( id INTEGER UNSIGNED NOT NULL PRIMARY KEY AUTO_INCREMENT, owner VARCHAR(100), timeout INTEGER UNSIGNED, created INTEGER, token VARBINARY(100), scope TINYINT, depth TINYINT, uri VARBINARY(1000), INDEX(token), INDEX(uri(100)) ); sabre-dav-1.8.12/examples/sql/mysql.principals.sql000066400000000000000000000012171246001162500221130ustar00rootroot00000000000000CREATE TABLE principals ( id INTEGER UNSIGNED NOT NULL PRIMARY KEY AUTO_INCREMENT, uri VARCHAR(200) NOT NULL, email VARCHAR(80), displayname VARCHAR(80), vcardurl VARCHAR(255), UNIQUE(uri) ); CREATE TABLE groupmembers ( id INTEGER UNSIGNED NOT NULL PRIMARY KEY AUTO_INCREMENT, principal_id INTEGER UNSIGNED NOT NULL, member_id INTEGER UNSIGNED NOT NULL, UNIQUE(principal_id, member_id) ); INSERT INTO principals (uri,email,displayname) VALUES ('principals/admin', 'admin@example.org','Administrator'), ('principals/admin/calendar-proxy-read', null, null), ('principals/admin/calendar-proxy-write', null, null); sabre-dav-1.8.12/examples/sql/mysql.users.sql000066400000000000000000000003741246001162500211130ustar00rootroot00000000000000CREATE TABLE users ( id INTEGER UNSIGNED NOT NULL PRIMARY KEY AUTO_INCREMENT, username VARCHAR(50), digesta1 VARCHAR(32), UNIQUE(username) ); INSERT INTO users (username,digesta1) VALUES ('admin', '87fd274b7b6c01e48d7c2f965da8ddf7'); sabre-dav-1.8.12/examples/sql/pgsql.addressbook.sql000066400000000000000000000014741246001162500222350ustar00rootroot00000000000000CREATE TABLE addressbooks ( id SERIAL NOT NULL, principaluri VARCHAR(255), displayname VARCHAR(255), uri VARCHAR(200), description TEXT, ctag INTEGER NOT NULL DEFAULT 1 ); ALTER TABLE ONLY addressbooks ADD CONSTRAINT addressbooks_pkey PRIMARY KEY (id); CREATE UNIQUE INDEX addressbooks_ukey ON addressbooks USING btree (principaluri, uri); CREATE TABLE cards ( id SERIAL NOT NULL, addressbookid INTEGER NOT NULL, carddata TEXT, uri VARCHAR(200), lastmodified INTEGER ); ALTER TABLE ONLY cards ADD CONSTRAINT cards_pkey PRIMARY KEY (id); CREATE UNIQUE INDEX cards_ukey ON cards USING btree (addressbookid, uri); ALTER TABLE ONLY cards ADD CONSTRAINT cards_addressbookid_fkey FOREIGN KEY (addressbookid) REFERENCES addressbooks(id) ON DELETE CASCADE; sabre-dav-1.8.12/examples/sql/pgsql.calendars.sql000066400000000000000000000022301246001162500216600ustar00rootroot00000000000000CREATE TABLE calendars ( id SERIAL NOT NULL, principaluri VARCHAR(100), displayname VARCHAR(100), uri VARCHAR(200), ctag INTEGER NOT NULL DEFAULT 0, description TEXT, calendarorder INTEGER NOT NULL DEFAULT 0, calendarcolor VARCHAR(10), timezone TEXT, components VARCHAR(20), transparent SMALLINT NOT NULL DEFAULT '0' ); ALTER TABLE ONLY calendars ADD CONSTRAINT calendars_pkey PRIMARY KEY (id); CREATE UNIQUE INDEX calendars_ukey ON calendars USING btree (principaluri, uri); CREATE TABLE calendarobjects ( id SERIAL NOT NULL, calendarid INTEGER NOT NULL, calendardata TEXT, uri VARCHAR(200), etag VARCHAR(32), size INTEGER NOT NULL, componenttype VARCHAR(8), lastmodified INTEGER, firstoccurence INTEGER, lastoccurence INTEGER ); ALTER TABLE ONLY calendarobjects ADD CONSTRAINT calendarobjects_pkey PRIMARY KEY (id); CREATE UNIQUE INDEX calendarobjects_ukey ON calendarobjects USING btree (calendarid, uri); ALTER TABLE ONLY calendarobjects ADD CONSTRAINT calendarobjects_calendarid_fkey FOREIGN KEY (calendarid) REFERENCES calendars(id) ON DELETE CASCADE; sabre-dav-1.8.12/examples/sql/pgsql.locks.sql000066400000000000000000000004071246001162500210430ustar00rootroot00000000000000CREATE TABLE locks ( id SERIAL NOT NULL, owner VARCHAR(100), timeout INTEGER, created INTEGER, token VARCHAR(100), scope smallint, depth smallint, uri text ); ALTER TABLE ONLY locks ADD CONSTRAINT locks_pkey PRIMARY KEY (id); sabre-dav-1.8.12/examples/sql/pgsql.principals.sql000066400000000000000000000022771246001162500221030ustar00rootroot00000000000000CREATE TABLE principals ( id SERIAL NOT NULL, uri VARCHAR(100) NOT NULL, email VARCHAR(80), displayname VARCHAR(80), vcardurl VARCHAR(255) ); ALTER TABLE ONLY principals ADD CONSTRAINT principals_pkey PRIMARY KEY (id); CREATE UNIQUE INDEX principals_ukey ON principals USING btree (uri); CREATE TABLE groupmembers ( id SERIAL NOT NULL, principal_id INTEGER NOT NULL, member_id INTEGER NOT NULL ); ALTER TABLE ONLY groupmembers ADD CONSTRAINT groupmembers_pkey PRIMARY KEY (id); CREATE UNIQUE INDEX groupmembers_ukey ON groupmembers USING btree (principal_id, member_id); ALTER TABLE ONLY groupmembers ADD CONSTRAINT groupmembers_principal_id_fkey FOREIGN KEY (principal_id) REFERENCES principals(id) ON DELETE CASCADE; -- Is this correct correct link ... or not? -- ALTER TABLE ONLY groupmembers -- ADD CONSTRAINT groupmembers_member_id_id_fkey FOREIGN KEY (member_id) REFERENCES users(id) -- ON DELETE CASCADE; INSERT INTO principals (uri,email,displayname) VALUES ('principals/admin', 'admin@example.org','Administrator'), ('principals/admin/calendar-proxy-read', null, null), ('principals/admin/calendar-proxy-write', null, null); sabre-dav-1.8.12/examples/sql/pgsql.users.sql000066400000000000000000000005441246001162500210730ustar00rootroot00000000000000CREATE TABLE users ( id SERIAL NOT NULL, username VARCHAR(50), digesta1 VARCHAR(32), UNIQUE(username) ); ALTER TABLE ONLY users ADD CONSTRAINT users_pkey PRIMARY KEY (id); CREATE UNIQUE INDEX users_ukey ON users USING btree (username); INSERT INTO users (username,digesta1) VALUES ('admin', '87fd274b7b6c01e48d7c2f965da8ddf7'); sabre-dav-1.8.12/examples/sql/sqlite.addressbooks.sql000066400000000000000000000004521246001162500225660ustar00rootroot00000000000000CREATE TABLE addressbooks ( id integer primary key asc, principaluri text, displayname text, uri text, description text, ctag integer ); CREATE TABLE cards ( id integer primary key asc, addressbookid integer, carddata blob, uri text, lastmodified integer ); sabre-dav-1.8.12/examples/sql/sqlite.calendars.sql000066400000000000000000000010301246001162500220300ustar00rootroot00000000000000CREATE TABLE calendarobjects ( id integer primary key asc, calendardata blob, uri text, calendarid integer, lastmodified integer, etag text, size integer, componenttype text, firstoccurence integer, lastoccurence integer ); CREATE TABLE calendars ( id integer primary key asc, principaluri text, displayname text, uri text, ctag integer, description text, calendarorder integer, calendarcolor text, timezone text, components text, transparent bool ); sabre-dav-1.8.12/examples/sql/sqlite.locks.sql000066400000000000000000000002701246001162500212140ustar00rootroot00000000000000BEGIN TRANSACTION; CREATE TABLE locks ( id integer primary key asc, owner text, timeout integer, created integer, token text, scope integer, depth integer, uri text ); COMMIT; sabre-dav-1.8.12/examples/sql/sqlite.principals.sql000066400000000000000000000011661246001162500222520ustar00rootroot00000000000000CREATE TABLE principals ( id INTEGER PRIMARY KEY ASC, uri TEXT, email TEXT, displayname TEXT, vcardurl TEXT, UNIQUE(uri) ); CREATE TABLE groupmembers ( id INTEGER PRIMARY KEY ASC, principal_id INTEGER, member_id INTEGER, UNIQUE(principal_id, member_id) ); INSERT INTO principals (uri,email,displayname) VALUES ('principals/admin', 'admin@example.org','Administrator'); INSERT INTO principals (uri,email,displayname) VALUES ('principals/admin/calendar-proxy-read', null, null); INSERT INTO principals (uri,email,displayname) VALUES ('principals/admin/calendar-proxy-write', null, null); sabre-dav-1.8.12/examples/sql/sqlite.users.sql000066400000000000000000000003051246001162500212410ustar00rootroot00000000000000CREATE TABLE users ( id integer primary key asc, username TEXT, digesta1 TEXT, UNIQUE(username) ); INSERT INTO users (username,digesta1) VALUES ('admin', '87fd274b7b6c01e48d7c2f965da8ddf7'); sabre-dav-1.8.12/examples/webserver/000077500000000000000000000000001246001162500172665ustar00rootroot00000000000000sabre-dav-1.8.12/examples/webserver/apache2_htaccess.conf000066400000000000000000000007601246001162500233200ustar00rootroot00000000000000RewriteEngine On # This makes every request go to server.php RewriteRule (.*) server.php [L] # Output buffering needs to be off, to prevent high memory usage php_flag output_buffering off # This is also to prevent high memory usage php_flag always_populate_raw_post_data off # This is almost a given, but magic quotes is *still* on on some # linux distributions php_flag magic_quotes_gpc off # SabreDAV is not compatible with mbstring function overloading php_flag mbstring.func_overload off sabre-dav-1.8.12/examples/webserver/apache2_vhost.conf000066400000000000000000000020241246001162500226610ustar00rootroot00000000000000# This is a sample configuration to setup a dedicated Apache vhost for WebDAV. # # The main thing that should be configured is the servername, and the path to # your SabreDAV installation (DocumentRoot). # # This configuration assumed mod_php5 is used, as it sets a few default php # settings as well. # Don't forget to change the server name # ServerName dav.example.org # The DocumentRoot is also required # DocumentRoot /home/sabredav/ RewriteEngine On # This makes every request go to server.php RewriteRule ^/(.*)$ /server.php [L] # Output buffering needs to be off, to prevent high memory usage php_flag output_buffering off # This is also to prevent high memory usage php_flag always_populate_raw_post_data off # This is almost a given, but magic quotes is *still* on on some # linux distributions php_flag magic_quotes_gpc off # SabreDAV is not compatible with mbstring function overloading php_flag mbstring.func_overload off sabre-dav-1.8.12/examples/webserver/apache2_vhost_cgi.conf000066400000000000000000000013601246001162500235050ustar00rootroot00000000000000# This is a sample configuration to setup a dedicated Apache vhost for WebDAV. # # The main thing that should be configured is the servername, and the path to # your SabreDAV installation (DocumentRoot). # # This configuration assumes CGI or FastCGI is used. # Don't forget to change the server name # ServerName dav.example.org # The DocumentRoot is also required # DocumentRoot /home/sabredav/ # This makes every request go to server.php. This also makes sure # the Authentication information is available. If your server script is # not called server.php, be sure to change it. RewriteEngine On RewriteRule ^/(.*)$ /server.php [E=HTTP_AUTHORIZATION:%{HTTP:Authorization}] sabre-dav-1.8.12/lib/000077500000000000000000000000001246001162500142125ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/000077500000000000000000000000001246001162500152465ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/CalDAV/000077500000000000000000000000001246001162500163005ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/CalDAV/Backend/000077500000000000000000000000001246001162500176275ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/CalDAV/Backend/AbstractBackend.php000066400000000000000000000124601246001162500233560ustar00rootroot00000000000000 array( * '{DAV:}displayname' => null, * ), * 424 => array( * '{DAV:}owner' => null, * ) * ) * * In this example it was forbidden to update {DAV:}displayname. * (403 Forbidden), which in turn also caused {DAV:}owner to fail * (424 Failed Dependency) because the request needs to be atomic. * * @param mixed $calendarId * @param array $mutations * @return bool|array */ public function updateCalendar($calendarId, array $mutations) { return false; } /** * Performs a calendar-query on the contents of this calendar. * * The calendar-query is defined in RFC4791 : CalDAV. Using the * calendar-query it is possible for a client to request a specific set of * object, based on contents of iCalendar properties, date-ranges and * iCalendar component types (VTODO, VEVENT). * * This method should just return a list of (relative) urls that match this * query. * * The list of filters are specified as an array. The exact array is * documented by \Sabre\CalDAV\CalendarQueryParser. * * Note that it is extremely likely that getCalendarObject for every path * returned from this method will be called almost immediately after. You * may want to anticipate this to speed up these requests. * * This method provides a default implementation, which parses *all* the * iCalendar objects in the specified calendar. * * This default may well be good enough for personal use, and calendars * that aren't very large. But if you anticipate high usage, big calendars * or high loads, you are strongly adviced to optimize certain paths. * * The best way to do so is override this method and to optimize * specifically for 'common filters'. * * Requests that are extremely common are: * * requests for just VEVENTS * * requests for just VTODO * * requests with a time-range-filter on either VEVENT or VTODO. * * ..and combinations of these requests. It may not be worth it to try to * handle every possible situation and just rely on the (relatively * easy to use) CalendarQueryValidator to handle the rest. * * Note that especially time-range-filters may be difficult to parse. A * time-range filter specified on a VEVENT must for instance also handle * recurrence rules correctly. * A good example of how to interprete all these filters can also simply * be found in \Sabre\CalDAV\CalendarQueryFilter. This class is as correct * as possible, so it gives you a good idea on what type of stuff you need * to think of. * * @param mixed $calendarId * @param array $filters * @return array */ public function calendarQuery($calendarId, array $filters) { $result = array(); $objects = $this->getCalendarObjects($calendarId); $validator = new \Sabre\CalDAV\CalendarQueryValidator(); foreach($objects as $object) { if ($this->validateFilterForObject($object, $filters)) { $result[] = $object['uri']; } } return $result; } /** * This method validates if a filters (as passed to calendarQuery) matches * the given object. * * @param array $object * @param array $filters * @return bool */ protected function validateFilterForObject(array $object, array $filters) { // Unfortunately, setting the 'calendardata' here is optional. If // it was excluded, we actually need another call to get this as // well. if (!isset($object['calendardata'])) { $object = $this->getCalendarObject($object['calendarid'], $object['uri']); } $data = is_resource($object['calendardata'])?stream_get_contents($object['calendardata']):$object['calendardata']; $vObject = VObject\Reader::read($data); $validator = new CalDAV\CalendarQueryValidator(); return $validator->validate($vObject, $filters); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Backend/BackendInterface.php000066400000000000000000000211121246001162500235050ustar00rootroot00000000000000 array( * '{DAV:}displayname' => null, * ), * 424 => array( * '{DAV:}owner' => null, * ) * ) * * In this example it was forbidden to update {DAV:}displayname. * (403 Forbidden), which in turn also caused {DAV:}owner to fail * (424 Failed Dependency) because the request needs to be atomic. * * @param mixed $calendarId * @param array $mutations * @return bool|array */ public function updateCalendar($calendarId, array $mutations); /** * Delete a calendar and all it's objects * * @param mixed $calendarId * @return void */ public function deleteCalendar($calendarId); /** * Returns all calendar objects within a calendar. * * Every item contains an array with the following keys: * * id - unique identifier which will be used for subsequent updates * * calendardata - The iCalendar-compatible calendar data * * uri - a unique key which will be used to construct the uri. This can be any arbitrary string. * * lastmodified - a timestamp of the last modification time * * etag - An arbitrary string, surrounded by double-quotes. (e.g.: * ' "abcdef"') * * calendarid - The calendarid as it was passed to this function. * * size - The size of the calendar objects, in bytes. * * Note that the etag is optional, but it's highly encouraged to return for * speed reasons. * * The calendardata is also optional. If it's not returned * 'getCalendarObject' will be called later, which *is* expected to return * calendardata. * * If neither etag or size are specified, the calendardata will be * used/fetched to determine these numbers. If both are specified the * amount of times this is needed is reduced by a great degree. * * @param mixed $calendarId * @return array */ public function getCalendarObjects($calendarId); /** * Returns information from a single calendar object, based on it's object * uri. * * The returned array must have the same keys as getCalendarObjects. The * 'calendardata' object is required here though, while it's not required * for getCalendarObjects. * * This method must return null if the object did not exist. * * @param mixed $calendarId * @param string $objectUri * @return array|null */ public function getCalendarObject($calendarId,$objectUri); /** * Creates a new calendar object. * * It is possible return an etag from this function, which will be used in * the response to this PUT request. Note that the ETag must be surrounded * by double-quotes. * * However, you should only really return this ETag if you don't mangle the * calendar-data. If the result of a subsequent GET to this object is not * the exact same as this request body, you should omit the ETag. * * @param mixed $calendarId * @param string $objectUri * @param string $calendarData * @return string|null */ public function createCalendarObject($calendarId,$objectUri,$calendarData); /** * Updates an existing calendarobject, based on it's uri. * * It is possible return an etag from this function, which will be used in * the response to this PUT request. Note that the ETag must be surrounded * by double-quotes. * * However, you should only really return this ETag if you don't mangle the * calendar-data. If the result of a subsequent GET to this object is not * the exact same as this request body, you should omit the ETag. * * @param mixed $calendarId * @param string $objectUri * @param string $calendarData * @return string|null */ public function updateCalendarObject($calendarId,$objectUri,$calendarData); /** * Deletes an existing calendar object. * * @param mixed $calendarId * @param string $objectUri * @return void */ public function deleteCalendarObject($calendarId,$objectUri); /** * Performs a calendar-query on the contents of this calendar. * * The calendar-query is defined in RFC4791 : CalDAV. Using the * calendar-query it is possible for a client to request a specific set of * object, based on contents of iCalendar properties, date-ranges and * iCalendar component types (VTODO, VEVENT). * * This method should just return a list of (relative) urls that match this * query. * * The list of filters are specified as an array. The exact array is * documented by Sabre\CalDAV\CalendarQueryParser. * * Note that it is extremely likely that getCalendarObject for every path * returned from this method will be called almost immediately after. You * may want to anticipate this to speed up these requests. * * This method provides a default implementation, which parses *all* the * iCalendar objects in the specified calendar. * * This default may well be good enough for personal use, and calendars * that aren't very large. But if you anticipate high usage, big calendars * or high loads, you are strongly adviced to optimize certain paths. * * The best way to do so is override this method and to optimize * specifically for 'common filters'. * * Requests that are extremely common are: * * requests for just VEVENTS * * requests for just VTODO * * requests with a time-range-filter on either VEVENT or VTODO. * * ..and combinations of these requests. It may not be worth it to try to * handle every possible situation and just rely on the (relatively * easy to use) CalendarQueryValidator to handle the rest. * * Note that especially time-range-filters may be difficult to parse. A * time-range filter specified on a VEVENT must for instance also handle * recurrence rules correctly. * A good example of how to interprete all these filters can also simply * be found in Sabre\CalDAV\CalendarQueryFilter. This class is as correct * as possible, so it gives you a good idea on what type of stuff you need * to think of. * * @param mixed $calendarId * @param array $filters * @return array */ public function calendarQuery($calendarId, array $filters); } sabre-dav-1.8.12/lib/Sabre/CalDAV/Backend/NotificationSupport.php000066400000000000000000000030071246001162500243630ustar00rootroot00000000000000 'displayname', '{urn:ietf:params:xml:ns:caldav}calendar-description' => 'description', '{urn:ietf:params:xml:ns:caldav}calendar-timezone' => 'timezone', '{http://apple.com/ns/ical/}calendar-order' => 'calendarorder', '{http://apple.com/ns/ical/}calendar-color' => 'calendarcolor', ); /** * Creates the backend * * @param \PDO $pdo * @param string $calendarTableName * @param string $calendarObjectTableName */ public function __construct(\PDO $pdo, $calendarTableName = 'calendars', $calendarObjectTableName = 'calendarobjects') { $this->pdo = $pdo; $this->calendarTableName = $calendarTableName; $this->calendarObjectTableName = $calendarObjectTableName; } /** * Returns a list of calendars for a principal. * * Every project is an array with the following keys: * * id, a unique id that will be used by other functions to modify the * calendar. This can be the same as the uri or a database key. * * uri, which the basename of the uri with which the calendar is * accessed. * * principaluri. The owner of the calendar. Almost always the same as * principalUri passed to this method. * * Furthermore it can contain webdav properties in clark notation. A very * common one is '{DAV:}displayname'. * * @param string $principalUri * @return array */ public function getCalendarsForUser($principalUri) { $fields = array_values($this->propertyMap); $fields[] = 'id'; $fields[] = 'uri'; $fields[] = 'ctag'; $fields[] = 'components'; $fields[] = 'principaluri'; $fields[] = 'transparent'; // Making fields a comma-delimited list $fields = implode(', ', $fields); $stmt = $this->pdo->prepare("SELECT " . $fields . " FROM ".$this->calendarTableName." WHERE principaluri = ? ORDER BY calendarorder ASC"); $stmt->execute(array($principalUri)); $calendars = array(); while($row = $stmt->fetch(\PDO::FETCH_ASSOC)) { $components = array(); if ($row['components']) { $components = explode(',',$row['components']); } $calendar = array( 'id' => $row['id'], 'uri' => $row['uri'], 'principaluri' => $row['principaluri'], '{' . CalDAV\Plugin::NS_CALENDARSERVER . '}getctag' => $row['ctag']?$row['ctag']:'0', '{' . CalDAV\Plugin::NS_CALDAV . '}supported-calendar-component-set' => new CalDAV\Property\SupportedCalendarComponentSet($components), '{' . CalDAV\Plugin::NS_CALDAV . '}schedule-calendar-transp' => new CalDAV\Property\ScheduleCalendarTransp($row['transparent']?'transparent':'opaque'), ); foreach($this->propertyMap as $xmlName=>$dbName) { $calendar[$xmlName] = $row[$dbName]; } $calendars[] = $calendar; } return $calendars; } /** * Creates a new calendar for a principal. * * If the creation was a success, an id must be returned that can be used to reference * this calendar in other methods, such as updateCalendar * * @param string $principalUri * @param string $calendarUri * @param array $properties * @return string */ public function createCalendar($principalUri, $calendarUri, array $properties) { $fieldNames = array( 'principaluri', 'uri', 'ctag', 'transparent', ); $values = array( ':principaluri' => $principalUri, ':uri' => $calendarUri, ':ctag' => 1, ':transparent' => 0, ); // Default value $sccs = '{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set'; $fieldNames[] = 'components'; if (!isset($properties[$sccs])) { $values[':components'] = 'VEVENT,VTODO'; } else { if (!($properties[$sccs] instanceof CalDAV\Property\SupportedCalendarComponentSet)) { throw new DAV\Exception('The ' . $sccs . ' property must be of type: \Sabre\CalDAV\Property\SupportedCalendarComponentSet'); } $values[':components'] = implode(',',$properties[$sccs]->getValue()); } $transp = '{' . CalDAV\Plugin::NS_CALDAV . '}schedule-calendar-transp'; if (isset($properties[$transp])) { $values[':transparent'] = $properties[$transp]->getValue()==='transparent'; } foreach($this->propertyMap as $xmlName=>$dbName) { if (isset($properties[$xmlName])) { $values[':' . $dbName] = $properties[$xmlName]; $fieldNames[] = $dbName; } } $stmt = $this->pdo->prepare("INSERT INTO ".$this->calendarTableName." (".implode(', ', $fieldNames).") VALUES (".implode(', ',array_keys($values)).")"); $stmt->execute($values); return $this->pdo->lastInsertId(); } /** * Updates properties for a calendar. * * The mutations array uses the propertyName in clark-notation as key, * and the array value for the property value. In the case a property * should be deleted, the property value will be null. * * This method must be atomic. If one property cannot be changed, the * entire operation must fail. * * If the operation was successful, true can be returned. * If the operation failed, false can be returned. * * Deletion of a non-existent property is always successful. * * Lastly, it is optional to return detailed information about any * failures. In this case an array should be returned with the following * structure: * * array( * 403 => array( * '{DAV:}displayname' => null, * ), * 424 => array( * '{DAV:}owner' => null, * ) * ) * * In this example it was forbidden to update {DAV:}displayname. * (403 Forbidden), which in turn also caused {DAV:}owner to fail * (424 Failed Dependency) because the request needs to be atomic. * * @param string $calendarId * @param array $mutations * @return bool|array */ public function updateCalendar($calendarId, array $mutations) { $newValues = array(); $result = array( 200 => array(), // Ok 403 => array(), // Forbidden 424 => array(), // Failed Dependency ); $hasError = false; foreach($mutations as $propertyName=>$propertyValue) { switch($propertyName) { case '{' . CalDAV\Plugin::NS_CALDAV . '}schedule-calendar-transp' : $fieldName = 'transparent'; $newValues[$fieldName] = $propertyValue->getValue()==='transparent'; break; default : // Checking the property map if (!isset($this->propertyMap[$propertyName])) { // We don't know about this property. $hasError = true; $result[403][$propertyName] = null; unset($mutations[$propertyName]); continue; } $fieldName = $this->propertyMap[$propertyName]; $newValues[$fieldName] = $propertyValue; } } // If there were any errors we need to fail the request if ($hasError) { // Properties has the remaining properties foreach($mutations as $propertyName=>$propertyValue) { $result[424][$propertyName] = null; } // Removing unused statuscodes for cleanliness foreach($result as $status=>$properties) { if (is_array($properties) && count($properties)===0) unset($result[$status]); } return $result; } // Success // Now we're generating the sql query. $valuesSql = array(); foreach($newValues as $fieldName=>$value) { $valuesSql[] = $fieldName . ' = ?'; } $valuesSql[] = 'ctag = ctag + 1'; $stmt = $this->pdo->prepare("UPDATE " . $this->calendarTableName . " SET " . implode(', ',$valuesSql) . " WHERE id = ?"); $newValues['id'] = $calendarId; $stmt->execute(array_values($newValues)); return true; } /** * Delete a calendar and all it's objects * * @param string $calendarId * @return void */ public function deleteCalendar($calendarId) { $stmt = $this->pdo->prepare('DELETE FROM '.$this->calendarObjectTableName.' WHERE calendarid = ?'); $stmt->execute(array($calendarId)); $stmt = $this->pdo->prepare('DELETE FROM '.$this->calendarTableName.' WHERE id = ?'); $stmt->execute(array($calendarId)); } /** * Returns all calendar objects within a calendar. * * Every item contains an array with the following keys: * * id - unique identifier which will be used for subsequent updates * * calendardata - The iCalendar-compatible calendar data * * uri - a unique key which will be used to construct the uri. This can be any arbitrary string. * * lastmodified - a timestamp of the last modification time * * etag - An arbitrary string, surrounded by double-quotes. (e.g.: * ' "abcdef"') * * calendarid - The calendarid as it was passed to this function. * * size - The size of the calendar objects, in bytes. * * Note that the etag is optional, but it's highly encouraged to return for * speed reasons. * * The calendardata is also optional. If it's not returned * 'getCalendarObject' will be called later, which *is* expected to return * calendardata. * * If neither etag or size are specified, the calendardata will be * used/fetched to determine these numbers. If both are specified the * amount of times this is needed is reduced by a great degree. * * @param string $calendarId * @return array */ public function getCalendarObjects($calendarId) { $stmt = $this->pdo->prepare('SELECT id, uri, lastmodified, etag, calendarid, size FROM '.$this->calendarObjectTableName.' WHERE calendarid = ?'); $stmt->execute(array($calendarId)); $result = array(); foreach($stmt->fetchAll(\PDO::FETCH_ASSOC) as $row) { $result[] = array( 'id' => $row['id'], 'uri' => $row['uri'], 'lastmodified' => $row['lastmodified'], 'etag' => '"' . $row['etag'] . '"', 'calendarid' => $row['calendarid'], 'size' => (int)$row['size'], ); } return $result; } /** * Returns information from a single calendar object, based on it's object * uri. * * The returned array must have the same keys as getCalendarObjects. The * 'calendardata' object is required here though, while it's not required * for getCalendarObjects. * * This method must return null if the object did not exist. * * @param string $calendarId * @param string $objectUri * @return array|null */ public function getCalendarObject($calendarId,$objectUri) { $stmt = $this->pdo->prepare('SELECT id, uri, lastmodified, etag, calendarid, size, calendardata FROM '.$this->calendarObjectTableName.' WHERE calendarid = ? AND uri = ?'); $stmt->execute(array($calendarId, $objectUri)); $row = $stmt->fetch(\PDO::FETCH_ASSOC); if(!$row) return null; return array( 'id' => $row['id'], 'uri' => $row['uri'], 'lastmodified' => $row['lastmodified'], 'etag' => '"' . $row['etag'] . '"', 'calendarid' => $row['calendarid'], 'size' => (int)$row['size'], 'calendardata' => $row['calendardata'], ); } /** * Creates a new calendar object. * * It is possible return an etag from this function, which will be used in * the response to this PUT request. Note that the ETag must be surrounded * by double-quotes. * * However, you should only really return this ETag if you don't mangle the * calendar-data. If the result of a subsequent GET to this object is not * the exact same as this request body, you should omit the ETag. * * @param mixed $calendarId * @param string $objectUri * @param string $calendarData * @return string|null */ public function createCalendarObject($calendarId,$objectUri,$calendarData) { $extraData = $this->getDenormalizedData($calendarData); $stmt = $this->pdo->prepare('INSERT INTO '.$this->calendarObjectTableName.' (calendarid, uri, calendardata, lastmodified, etag, size, componenttype, firstoccurence, lastoccurence) VALUES (?,?,?,?,?,?,?,?,?)'); $stmt->execute(array( $calendarId, $objectUri, $calendarData, time(), $extraData['etag'], $extraData['size'], $extraData['componentType'], $extraData['firstOccurence'], $extraData['lastOccurence'], )); $stmt = $this->pdo->prepare('UPDATE '.$this->calendarTableName.' SET ctag = ctag + 1 WHERE id = ?'); $stmt->execute(array($calendarId)); return '"' . $extraData['etag'] . '"'; } /** * Updates an existing calendarobject, based on it's uri. * * It is possible return an etag from this function, which will be used in * the response to this PUT request. Note that the ETag must be surrounded * by double-quotes. * * However, you should only really return this ETag if you don't mangle the * calendar-data. If the result of a subsequent GET to this object is not * the exact same as this request body, you should omit the ETag. * * @param mixed $calendarId * @param string $objectUri * @param string $calendarData * @return string|null */ public function updateCalendarObject($calendarId,$objectUri,$calendarData) { $extraData = $this->getDenormalizedData($calendarData); $stmt = $this->pdo->prepare('UPDATE '.$this->calendarObjectTableName.' SET calendardata = ?, lastmodified = ?, etag = ?, size = ?, componenttype = ?, firstoccurence = ?, lastoccurence = ? WHERE calendarid = ? AND uri = ?'); $stmt->execute(array($calendarData,time(), $extraData['etag'], $extraData['size'], $extraData['componentType'], $extraData['firstOccurence'], $extraData['lastOccurence'] ,$calendarId,$objectUri)); $stmt = $this->pdo->prepare('UPDATE '.$this->calendarTableName.' SET ctag = ctag + 1 WHERE id = ?'); $stmt->execute(array($calendarId)); return '"' . $extraData['etag'] . '"'; } /** * Parses some information from calendar objects, used for optimized * calendar-queries. * * Returns an array with the following keys: * * etag * * size * * componentType * * firstOccurence * * lastOccurence * * @param string $calendarData * @return array */ protected function getDenormalizedData($calendarData) { $vObject = VObject\Reader::read($calendarData); $componentType = null; $component = null; $firstOccurence = null; $lastOccurence = null; foreach($vObject->getComponents() as $component) { if ($component->name!=='VTIMEZONE') { $componentType = $component->name; break; } } if (!$componentType) { throw new \Sabre\DAV\Exception\BadRequest('Calendar objects must have a VJOURNAL, VEVENT or VTODO component'); } if ($componentType === 'VEVENT') { $firstOccurence = $component->DTSTART->getDateTime()->getTimeStamp(); // Finding the last occurence is a bit harder if (!isset($component->RRULE)) { if (isset($component->DTEND)) { $lastOccurence = $component->DTEND->getDateTime()->getTimeStamp(); } elseif (isset($component->DURATION)) { $endDate = clone $component->DTSTART->getDateTime(); $endDate->add(VObject\DateTimeParser::parse($component->DURATION->getValue())); $lastOccurence = $endDate->getTimeStamp(); } elseif (!$component->DTSTART->hasTime()) { $endDate = clone $component->DTSTART->getDateTime(); $endDate->modify('+1 day'); $lastOccurence = $endDate->getTimeStamp(); } else { $lastOccurence = $firstOccurence; } } else { $it = new VObject\RecurrenceIterator($vObject, (string)$component->UID); $maxDate = new \DateTime(self::MAX_DATE); if ($it->isInfinite()) { $lastOccurence = $maxDate->getTimeStamp(); } else { $end = $it->getDtEnd(); while($it->valid() && $end < $maxDate) { $end = $it->getDtEnd(); $it->next(); } $lastOccurence = $end->getTimeStamp(); } } } return array( 'etag' => md5($calendarData), 'size' => strlen($calendarData), 'componentType' => $componentType, 'firstOccurence' => $firstOccurence, 'lastOccurence' => $lastOccurence, ); } /** * Deletes an existing calendar object. * * @param string $calendarId * @param string $objectUri * @return void */ public function deleteCalendarObject($calendarId,$objectUri) { $stmt = $this->pdo->prepare('DELETE FROM '.$this->calendarObjectTableName.' WHERE calendarid = ? AND uri = ?'); $stmt->execute(array($calendarId,$objectUri)); $stmt = $this->pdo->prepare('UPDATE '. $this->calendarTableName .' SET ctag = ctag + 1 WHERE id = ?'); $stmt->execute(array($calendarId)); } /** * Performs a calendar-query on the contents of this calendar. * * The calendar-query is defined in RFC4791 : CalDAV. Using the * calendar-query it is possible for a client to request a specific set of * object, based on contents of iCalendar properties, date-ranges and * iCalendar component types (VTODO, VEVENT). * * This method should just return a list of (relative) urls that match this * query. * * The list of filters are specified as an array. The exact array is * documented by \Sabre\CalDAV\CalendarQueryParser. * * Note that it is extremely likely that getCalendarObject for every path * returned from this method will be called almost immediately after. You * may want to anticipate this to speed up these requests. * * This method provides a default implementation, which parses *all* the * iCalendar objects in the specified calendar. * * This default may well be good enough for personal use, and calendars * that aren't very large. But if you anticipate high usage, big calendars * or high loads, you are strongly adviced to optimize certain paths. * * The best way to do so is override this method and to optimize * specifically for 'common filters'. * * Requests that are extremely common are: * * requests for just VEVENTS * * requests for just VTODO * * requests with a time-range-filter on a VEVENT. * * ..and combinations of these requests. It may not be worth it to try to * handle every possible situation and just rely on the (relatively * easy to use) CalendarQueryValidator to handle the rest. * * Note that especially time-range-filters may be difficult to parse. A * time-range filter specified on a VEVENT must for instance also handle * recurrence rules correctly. * A good example of how to interprete all these filters can also simply * be found in \Sabre\CalDAV\CalendarQueryFilter. This class is as correct * as possible, so it gives you a good idea on what type of stuff you need * to think of. * * This specific implementation (for the PDO) backend optimizes filters on * specific components, and VEVENT time-ranges. * * @param string $calendarId * @param array $filters * @return array */ public function calendarQuery($calendarId, array $filters) { $result = array(); $validator = new \Sabre\CalDAV\CalendarQueryValidator(); $componentType = null; $requirePostFilter = true; $timeRange = null; // if no filters were specified, we don't need to filter after a query if (!$filters['prop-filters'] && !$filters['comp-filters']) { $requirePostFilter = false; } // Figuring out if there's a component filter if (count($filters['comp-filters']) > 0 && !$filters['comp-filters'][0]['is-not-defined']) { $componentType = $filters['comp-filters'][0]['name']; // Checking if we need post-filters if (!$filters['prop-filters'] && !$filters['comp-filters'][0]['comp-filters'] && !$filters['comp-filters'][0]['time-range'] && !$filters['comp-filters'][0]['prop-filters']) { $requirePostFilter = false; } // There was a time-range filter if ($componentType == 'VEVENT' && isset($filters['comp-filters'][0]['time-range'])) { $timeRange = $filters['comp-filters'][0]['time-range']; // If start time OR the end time is not specified, we can do a // 100% accurate mysql query. if (!$filters['prop-filters'] && !$filters['comp-filters'][0]['comp-filters'] && !$filters['comp-filters'][0]['prop-filters'] && (!$timeRange['start'] || !$timeRange['end'])) { $requirePostFilter = false; } } } if ($requirePostFilter) { $query = "SELECT uri, calendardata FROM ".$this->calendarObjectTableName." WHERE calendarid = :calendarid"; } else { $query = "SELECT uri FROM ".$this->calendarObjectTableName." WHERE calendarid = :calendarid"; } $values = array( 'calendarid' => $calendarId, ); if ($componentType) { $query.=" AND componenttype = :componenttype"; $values['componenttype'] = $componentType; } if ($timeRange && $timeRange['start']) { $query.=" AND lastoccurence > :startdate"; $values['startdate'] = $timeRange['start']->getTimeStamp(); } if ($timeRange && $timeRange['end']) { $query.=" AND firstoccurence < :enddate"; $values['enddate'] = $timeRange['end']->getTimeStamp(); } $stmt = $this->pdo->prepare($query); $stmt->execute($values); $result = array(); while($row = $stmt->fetch(\PDO::FETCH_ASSOC)) { if ($requirePostFilter) { if (!$this->validateFilterForObject($row, $filters)) { continue; } } $result[] = $row['uri']; } return $result; } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Backend/SharingSupport.php000066400000000000000000000215701246001162500233350ustar00rootroot00000000000000caldavBackend = $caldavBackend; $this->calendarInfo = $calendarInfo; } /** * Returns the name of the calendar * * @return string */ public function getName() { return $this->calendarInfo['uri']; } /** * Updates properties such as the display name and description * * @param array $mutations * @return array */ public function updateProperties($mutations) { return $this->caldavBackend->updateCalendar($this->calendarInfo['id'],$mutations); } /** * Returns the list of properties * * @param array $requestedProperties * @return array */ public function getProperties($requestedProperties) { $response = array(); foreach($requestedProperties as $prop) switch($prop) { case '{urn:ietf:params:xml:ns:caldav}supported-calendar-data' : $response[$prop] = new Property\SupportedCalendarData(); break; case '{urn:ietf:params:xml:ns:caldav}supported-collation-set' : $response[$prop] = new Property\SupportedCollationSet(); break; case '{DAV:}owner' : $response[$prop] = new DAVACL\Property\Principal(DAVACL\Property\Principal::HREF,$this->calendarInfo['principaluri']); break; default : if (isset($this->calendarInfo[$prop])) $response[$prop] = $this->calendarInfo[$prop]; break; } return $response; } /** * Returns a calendar object * * The contained calendar objects are for example Events or Todo's. * * @param string $name * @return \Sabre\CalDAV\ICalendarObject */ public function getChild($name) { $obj = $this->caldavBackend->getCalendarObject($this->calendarInfo['id'],$name); if (!$obj) throw new DAV\Exception\NotFound('Calendar object not found'); $obj['acl'] = $this->getACL(); // Removing the irrelivant foreach($obj['acl'] as $key=>$acl) { if ($acl['privilege'] === '{' . Plugin::NS_CALDAV . '}read-free-busy') { unset($obj['acl'][$key]); } } return new CalendarObject($this->caldavBackend,$this->calendarInfo,$obj); } /** * Returns the full list of calendar objects * * @return array */ public function getChildren() { $objs = $this->caldavBackend->getCalendarObjects($this->calendarInfo['id']); $children = array(); foreach($objs as $obj) { $obj['acl'] = $this->getACL(); // Removing the irrelivant foreach($obj['acl'] as $key=>$acl) { if ($acl['privilege'] === '{' . Plugin::NS_CALDAV . '}read-free-busy') { unset($obj['acl'][$key]); } } $children[] = new CalendarObject($this->caldavBackend,$this->calendarInfo,$obj); } return $children; } /** * Checks if a child-node exists. * * @param string $name * @return bool */ public function childExists($name) { $obj = $this->caldavBackend->getCalendarObject($this->calendarInfo['id'],$name); if (!$obj) return false; else return true; } /** * Creates a new directory * * We actually block this, as subdirectories are not allowed in calendars. * * @param string $name * @return void */ public function createDirectory($name) { throw new DAV\Exception\MethodNotAllowed('Creating collections in calendar objects is not allowed'); } /** * Creates a new file * * The contents of the new file must be a valid ICalendar string. * * @param string $name * @param resource $calendarData * @return string|null */ public function createFile($name,$calendarData = null) { if (is_resource($calendarData)) { $calendarData = stream_get_contents($calendarData); } return $this->caldavBackend->createCalendarObject($this->calendarInfo['id'],$name,$calendarData); } /** * Deletes the calendar. * * @return void */ public function delete() { $this->caldavBackend->deleteCalendar($this->calendarInfo['id']); } /** * Renames the calendar. Note that most calendars use the * {DAV:}displayname to display a name to display a name. * * @param string $newName * @return void */ public function setName($newName) { throw new DAV\Exception\MethodNotAllowed('Renaming calendars is not yet supported'); } /** * Returns the last modification date as a unix timestamp. * * @return void */ public function getLastModified() { return null; } /** * Returns the owner principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getOwner() { return $this->calendarInfo['principaluri']; } /** * Returns a group principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getGroup() { return null; } /** * Returns a list of ACE's for this node. * * Each ACE has the following properties: * * 'privilege', a string such as {DAV:}read or {DAV:}write. These are * currently the only supported privileges * * 'principal', a url to the principal who owns the node * * 'protected' (optional), indicating that this ACE is not allowed to * be updated. * * @return array */ public function getACL() { return array( array( 'privilege' => '{DAV:}read', 'principal' => $this->getOwner(), 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => $this->getOwner(), 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => $this->getOwner() . '/calendar-proxy-write', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => $this->getOwner() . '/calendar-proxy-write', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => $this->getOwner() . '/calendar-proxy-read', 'protected' => true, ), array( 'privilege' => '{' . Plugin::NS_CALDAV . '}read-free-busy', 'principal' => '{DAV:}authenticated', 'protected' => true, ), ); } /** * Updates the ACL * * This method will receive a list of new ACE's. * * @param array $acl * @return void */ public function setACL(array $acl) { throw new DAV\Exception\MethodNotAllowed('Changing ACL is not yet supported'); } /** * Returns the list of supported privileges for this node. * * The returned data structure is a list of nested privileges. * See \Sabre\DAVACL\Plugin::getDefaultSupportedPrivilegeSet for a simple * standard structure. * * If null is returned from this method, the default privilege set is used, * which is fine for most common usecases. * * @return array|null */ public function getSupportedPrivilegeSet() { $default = DAVACL\Plugin::getDefaultSupportedPrivilegeSet(); // We need to inject 'read-free-busy' in the tree, aggregated under // {DAV:}read. foreach($default['aggregates'] as &$agg) { if ($agg['privilege'] !== '{DAV:}read') continue; $agg['aggregates'][] = array( 'privilege' => '{' . Plugin::NS_CALDAV . '}read-free-busy', ); } return $default; } /** * Performs a calendar-query on the contents of this calendar. * * The calendar-query is defined in RFC4791 : CalDAV. Using the * calendar-query it is possible for a client to request a specific set of * object, based on contents of iCalendar properties, date-ranges and * iCalendar component types (VTODO, VEVENT). * * This method should just return a list of (relative) urls that match this * query. * * The list of filters are specified as an array. The exact array is * documented by Sabre\CalDAV\CalendarQueryParser. * * @param array $filters * @return array */ public function calendarQuery(array $filters) { return $this->caldavBackend->calendarQuery($this->calendarInfo['id'], $filters); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/CalendarObject.php000066400000000000000000000156071246001162500216620ustar00rootroot00000000000000caldavBackend = $caldavBackend; if (!isset($objectData['calendarid'])) { throw new \InvalidArgumentException('The objectData argument must contain a \'calendarid\' property'); } if (!isset($objectData['uri'])) { throw new \InvalidArgumentException('The objectData argument must contain an \'uri\' property'); } $this->calendarInfo = $calendarInfo; $this->objectData = $objectData; } /** * Returns the uri for this object * * @return string */ public function getName() { return $this->objectData['uri']; } /** * Returns the ICalendar-formatted object * * @return string */ public function get() { // Pre-populating the 'calendardata' is optional, if we don't have it // already we fetch it from the backend. if (!isset($this->objectData['calendardata'])) { $this->objectData = $this->caldavBackend->getCalendarObject($this->objectData['calendarid'], $this->objectData['uri']); } return $this->objectData['calendardata']; } /** * Updates the ICalendar-formatted object * * @param string|resource $calendarData * @return string */ public function put($calendarData) { if (is_resource($calendarData)) { $calendarData = stream_get_contents($calendarData); } $etag = $this->caldavBackend->updateCalendarObject($this->calendarInfo['id'],$this->objectData['uri'],$calendarData); $this->objectData['calendardata'] = $calendarData; $this->objectData['etag'] = $etag; return $etag; } /** * Deletes the calendar object * * @return void */ public function delete() { $this->caldavBackend->deleteCalendarObject($this->calendarInfo['id'],$this->objectData['uri']); } /** * Returns the mime content-type * * @return string */ public function getContentType() { return 'text/calendar; charset=utf-8'; } /** * Returns an ETag for this object. * * The ETag is an arbitrary string, but MUST be surrounded by double-quotes. * * @return string */ public function getETag() { if (isset($this->objectData['etag'])) { return $this->objectData['etag']; } else { return '"' . md5($this->get()). '"'; } } /** * Returns the last modification date as a unix timestamp * * @return int */ public function getLastModified() { return $this->objectData['lastmodified']; } /** * Returns the size of this object in bytes * * @return int */ public function getSize() { if (array_key_exists('size',$this->objectData)) { return $this->objectData['size']; } else { return strlen($this->get()); } } /** * Returns the owner principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getOwner() { return $this->calendarInfo['principaluri']; } /** * Returns a group principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getGroup() { return null; } /** * Returns a list of ACE's for this node. * * Each ACE has the following properties: * * 'privilege', a string such as {DAV:}read or {DAV:}write. These are * currently the only supported privileges * * 'principal', a url to the principal who owns the node * * 'protected' (optional), indicating that this ACE is not allowed to * be updated. * * @return array */ public function getACL() { // An alternative acl may be specified in the object data. if (isset($this->objectData['acl'])) { return $this->objectData['acl']; } // The default ACL return array( array( 'privilege' => '{DAV:}read', 'principal' => $this->calendarInfo['principaluri'], 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => $this->calendarInfo['principaluri'], 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => $this->calendarInfo['principaluri'] . '/calendar-proxy-write', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => $this->calendarInfo['principaluri'] . '/calendar-proxy-write', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => $this->calendarInfo['principaluri'] . '/calendar-proxy-read', 'protected' => true, ), ); } /** * Updates the ACL * * This method will receive a list of new ACE's. * * @param array $acl * @return void */ public function setACL(array $acl) { throw new \Sabre\DAV\Exception\MethodNotAllowed('Changing ACL is not yet supported'); } /** * Returns the list of supported privileges for this node. * * The returned data structure is a list of nested privileges. * See \Sabre\DAVACL\Plugin::getDefaultSupportedPrivilegeSet for a simple * standard structure. * * If null is returned from this method, the default privilege set is used, * which is fine for most common usecases. * * @return array|null */ public function getSupportedPrivilegeSet() { return null; } } sabre-dav-1.8.12/lib/Sabre/CalDAV/CalendarQueryParser.php000066400000000000000000000207661246001162500227400ustar00rootroot00000000000000dom = $dom; $this->xpath = new \DOMXPath($dom); $this->xpath->registerNameSpace('cal',Plugin::NS_CALDAV); $this->xpath->registerNameSpace('dav','urn:DAV'); } /** * Parses the request. * * @return void */ public function parse() { $filterNode = null; $filter = $this->xpath->query('/cal:calendar-query/cal:filter'); if ($filter->length !== 1) { throw new \Sabre\DAV\Exception\BadRequest('Only one filter element is allowed'); } $compFilters = $this->parseCompFilters($filter->item(0)); if (count($compFilters)!==1) { throw new \Sabre\DAV\Exception\BadRequest('There must be exactly 1 top-level comp-filter.'); } $this->filters = $compFilters[0]; $this->requestedProperties = array_keys(\Sabre\DAV\XMLUtil::parseProperties($this->dom->firstChild)); $expand = $this->xpath->query('/cal:calendar-query/dav:prop/cal:calendar-data/cal:expand'); if ($expand->length>0) { $this->expand = $this->parseExpand($expand->item(0)); } } /** * Parses all the 'comp-filter' elements from a node * * @param \DOMElement $parentNode * @return array */ protected function parseCompFilters(\DOMElement $parentNode) { $compFilterNodes = $this->xpath->query('cal:comp-filter', $parentNode); $result = array(); for($ii=0; $ii < $compFilterNodes->length; $ii++) { $compFilterNode = $compFilterNodes->item($ii); $compFilter = array(); $compFilter['name'] = $compFilterNode->getAttribute('name'); $compFilter['is-not-defined'] = $this->xpath->query('cal:is-not-defined', $compFilterNode)->length>0; $compFilter['comp-filters'] = $this->parseCompFilters($compFilterNode); $compFilter['prop-filters'] = $this->parsePropFilters($compFilterNode); $compFilter['time-range'] = $this->parseTimeRange($compFilterNode); if ($compFilter['time-range'] && !in_array($compFilter['name'],array( 'VEVENT', 'VTODO', 'VJOURNAL', 'VFREEBUSY', 'VALARM', ))) { throw new \Sabre\DAV\Exception\BadRequest('The time-range filter is not defined for the ' . $compFilter['name'] . ' component'); }; $result[] = $compFilter; } return $result; } /** * Parses all the prop-filter elements from a node * * @param \DOMElement $parentNode * @return array */ protected function parsePropFilters(\DOMElement $parentNode) { $propFilterNodes = $this->xpath->query('cal:prop-filter', $parentNode); $result = array(); for ($ii=0; $ii < $propFilterNodes->length; $ii++) { $propFilterNode = $propFilterNodes->item($ii); $propFilter = array(); $propFilter['name'] = $propFilterNode->getAttribute('name'); $propFilter['is-not-defined'] = $this->xpath->query('cal:is-not-defined', $propFilterNode)->length>0; $propFilter['param-filters'] = $this->parseParamFilters($propFilterNode); $propFilter['text-match'] = $this->parseTextMatch($propFilterNode); $propFilter['time-range'] = $this->parseTimeRange($propFilterNode); $result[] = $propFilter; } return $result; } /** * Parses the param-filter element * * @param \DOMElement $parentNode * @return array */ protected function parseParamFilters(\DOMElement $parentNode) { $paramFilterNodes = $this->xpath->query('cal:param-filter', $parentNode); $result = array(); for($ii=0;$ii<$paramFilterNodes->length;$ii++) { $paramFilterNode = $paramFilterNodes->item($ii); $paramFilter = array(); $paramFilter['name'] = $paramFilterNode->getAttribute('name'); $paramFilter['is-not-defined'] = $this->xpath->query('cal:is-not-defined', $paramFilterNode)->length>0; $paramFilter['text-match'] = $this->parseTextMatch($paramFilterNode); $result[] = $paramFilter; } return $result; } /** * Parses the text-match element * * @param \DOMElement $parentNode * @return array|null */ protected function parseTextMatch(\DOMElement $parentNode) { $textMatchNodes = $this->xpath->query('cal:text-match', $parentNode); if ($textMatchNodes->length === 0) return null; $textMatchNode = $textMatchNodes->item(0); $negateCondition = $textMatchNode->getAttribute('negate-condition'); $negateCondition = $negateCondition==='yes'; $collation = $textMatchNode->getAttribute('collation'); if (!$collation) $collation = 'i;ascii-casemap'; return array( 'negate-condition' => $negateCondition, 'collation' => $collation, 'value' => $textMatchNode->nodeValue ); } /** * Parses the time-range element * * @param \DOMElement $parentNode * @return array|null */ protected function parseTimeRange(\DOMElement $parentNode) { $timeRangeNodes = $this->xpath->query('cal:time-range', $parentNode); if ($timeRangeNodes->length === 0) { return null; } $timeRangeNode = $timeRangeNodes->item(0); if ($start = $timeRangeNode->getAttribute('start')) { $start = VObject\DateTimeParser::parseDateTime($start); } else { $start = null; } if ($end = $timeRangeNode->getAttribute('end')) { $end = VObject\DateTimeParser::parseDateTime($end); } else { $end = null; } if (!is_null($start) && !is_null($end) && $end <= $start) { throw new \Sabre\DAV\Exception\BadRequest('The end-date must be larger than the start-date in the time-range filter'); } return array( 'start' => $start, 'end' => $end, ); } /** * Parses the CALDAV:expand element * * @param \DOMElement $parentNode * @return void */ protected function parseExpand(\DOMElement $parentNode) { $start = $parentNode->getAttribute('start'); if(!$start) { throw new \Sabre\DAV\Exception\BadRequest('The "start" attribute is required for the CALDAV:expand element'); } $start = VObject\DateTimeParser::parseDateTime($start); $end = $parentNode->getAttribute('end'); if(!$end) { throw new \Sabre\DAV\Exception\BadRequest('The "end" attribute is required for the CALDAV:expand element'); } $end = VObject\DateTimeParser::parseDateTime($end); if ($end <= $start) { throw new \Sabre\DAV\Exception\BadRequest('The end-date must be larger than the start-date in the expand element.'); } return array( 'start' => $start, 'end' => $end, ); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/CalendarQueryValidator.php000066400000000000000000000317361246001162500234300ustar00rootroot00000000000000name !== $filters['name']) { return false; } return $this->validateCompFilters($vObject, $filters['comp-filters']) && $this->validatePropFilters($vObject, $filters['prop-filters']); } /** * This method checks the validity of comp-filters. * * A list of comp-filters needs to be specified. Also the parent of the * component we're checking should be specified, not the component to check * itself. * * @param VObject\Component $parent * @param array $filters * @return bool */ protected function validateCompFilters(VObject\Component $parent, array $filters) { foreach($filters as $filter) { $isDefined = isset($parent->$filter['name']); if ($filter['is-not-defined']) { if ($isDefined) { return false; } else { continue; } } if (!$isDefined) { return false; } if ($filter['time-range']) { foreach($parent->$filter['name'] as $subComponent) { if ($this->validateTimeRange($subComponent, $filter['time-range']['start'], $filter['time-range']['end'])) { continue 2; } } return false; } if (!$filter['comp-filters'] && !$filter['prop-filters']) { continue; } // If there are sub-filters, we need to find at least one component // for which the subfilters hold true. foreach($parent->$filter['name'] as $subComponent) { if ( $this->validateCompFilters($subComponent, $filter['comp-filters']) && $this->validatePropFilters($subComponent, $filter['prop-filters'])) { // We had a match, so this comp-filter succeeds continue 2; } } // If we got here it means there were sub-comp-filters or // sub-prop-filters and there was no match. This means this filter // needs to return false. return false; } // If we got here it means we got through all comp-filters alive so the // filters were all true. return true; } /** * This method checks the validity of prop-filters. * * A list of prop-filters needs to be specified. Also the parent of the * property we're checking should be specified, not the property to check * itself. * * @param VObject\Component $parent * @param array $filters * @return bool */ protected function validatePropFilters(VObject\Component $parent, array $filters) { foreach($filters as $filter) { $isDefined = isset($parent->$filter['name']); if ($filter['is-not-defined']) { if ($isDefined) { return false; } else { continue; } } if (!$isDefined) { return false; } if ($filter['time-range']) { foreach($parent->$filter['name'] as $subComponent) { if ($this->validateTimeRange($subComponent, $filter['time-range']['start'], $filter['time-range']['end'])) { continue 2; } } return false; } if (!$filter['param-filters'] && !$filter['text-match']) { continue; } // If there are sub-filters, we need to find at least one property // for which the subfilters hold true. foreach($parent->$filter['name'] as $subComponent) { if( $this->validateParamFilters($subComponent, $filter['param-filters']) && (!$filter['text-match'] || $this->validateTextMatch($subComponent, $filter['text-match'])) ) { // We had a match, so this prop-filter succeeds continue 2; } } // If we got here it means there were sub-param-filters or // text-match filters and there was no match. This means the // filter needs to return false. return false; } // If we got here it means we got through all prop-filters alive so the // filters were all true. return true; } /** * This method checks the validity of param-filters. * * A list of param-filters needs to be specified. Also the parent of the * parameter we're checking should be specified, not the parameter to check * itself. * * @param VObject\Property $parent * @param array $filters * @return bool */ protected function validateParamFilters(VObject\Property $parent, array $filters) { foreach($filters as $filter) { $isDefined = isset($parent[$filter['name']]); if ($filter['is-not-defined']) { if ($isDefined) { return false; } else { continue; } } if (!$isDefined) { return false; } if (!$filter['text-match']) { continue; } if (version_compare(VObject\Version::VERSION, '3.0.0beta1', '>=')) { // If there are sub-filters, we need to find at least one parameter // for which the subfilters hold true. foreach($parent[$filter['name']]->getParts() as $subParam) { if($this->validateTextMatch($subParam,$filter['text-match'])) { // We had a match, so this param-filter succeeds continue 2; } } } else { // If there are sub-filters, we need to find at least one parameter // for which the subfilters hold true. foreach($parent[$filter['name']] as $subParam) { if($this->validateTextMatch($subParam,$filter['text-match'])) { // We had a match, so this param-filter succeeds continue 2; } } } // If we got here it means there was a text-match filter and there // were no matches. This means the filter needs to return false. return false; } // If we got here it means we got through all param-filters alive so the // filters were all true. return true; } /** * This method checks the validity of a text-match. * * A single text-match should be specified as well as the specific property * or parameter we need to validate. * * @param VObject\Node|string $check Value to check against. * @param array $textMatch * @return bool */ protected function validateTextMatch($check, array $textMatch) { if ($check instanceof VObject\Node) { $check = (string)$check; } $isMatching = \Sabre\DAV\StringUtil::textMatch($check, $textMatch['value'], $textMatch['collation']); return ($textMatch['negate-condition'] xor $isMatching); } /** * Validates if a component matches the given time range. * * This is all based on the rules specified in rfc4791, which are quite * complex. * * @param VObject\Node $component * @param DateTime $start * @param DateTime $end * @return bool */ protected function validateTimeRange(VObject\Node $component, $start, $end) { if (is_null($start)) { $start = new DateTime('1900-01-01'); } if (is_null($end)) { $end = new DateTime('3000-01-01'); } switch($component->name) { case 'VEVENT' : case 'VTODO' : case 'VJOURNAL' : return $component->isInTimeRange($start, $end); case 'VALARM' : // If the valarm is wrapped in a recurring event, we need to // expand the recursions, and validate each. // // Our datamodel doesn't easily allow us to do this straight // in the VALARM component code, so this is a hack, and an // expensive one too. if ($component->parent->name === 'VEVENT' && $component->parent->RRULE) { // Fire up the iterator! $it = new VObject\RecurrenceIterator($component->parent->parent, (string)$component->parent->UID); while($it->valid()) { $expandedEvent = $it->getEventObject(); // We need to check from these expanded alarms, which // one is the first to trigger. Based on this, we can // determine if we can 'give up' expanding events. $firstAlarm = null; if ($expandedEvent->VALARM !== null) { foreach($expandedEvent->VALARM as $expandedAlarm) { $effectiveTrigger = $expandedAlarm->getEffectiveTriggerTime(); if ($expandedAlarm->isInTimeRange($start, $end)) { return true; } if ((string)$expandedAlarm->TRIGGER['VALUE'] === 'DATE-TIME') { // This is an alarm with a non-relative trigger // time, likely created by a buggy client. The // implication is that every alarm in this // recurring event trigger at the exact same // time. It doesn't make sense to traverse // further. } else { // We store the first alarm as a means to // figure out when we can stop traversing. if (!$firstAlarm || $effectiveTrigger < $firstAlarm) { $firstAlarm = $effectiveTrigger; } } } } if (is_null($firstAlarm)) { // No alarm was found. // // Or technically: No alarm that will change for // every instance of the recurrence was found, // which means we can assume there was no match. return false; } if ($firstAlarm > $end) { return false; } $it->next(); } return false; } else { return $component->isInTimeRange($start, $end); } case 'VFREEBUSY' : throw new \Sabre\DAV\Exception\NotImplemented('time-range filters are currently not supported on ' . $component->name . ' components'); case 'COMPLETED' : case 'CREATED' : case 'DTEND' : case 'DTSTAMP' : case 'DTSTART' : case 'DUE' : case 'LAST-MODIFIED' : return ($start <= $component->getDateTime() && $end >= $component->getDateTime()); default : throw new \Sabre\DAV\Exception\BadRequest('You cannot create a time-range filter on a ' . $component->name . ' component'); } } } sabre-dav-1.8.12/lib/Sabre/CalDAV/CalendarRootNode.php000066400000000000000000000042021246001162500221720ustar00rootroot00000000000000caldavBackend = $caldavBackend; } /** * Returns the nodename * * We're overriding this, because the default will be the 'principalPrefix', * and we want it to be Sabre\CalDAV\Plugin::CALENDAR_ROOT * * @return string */ public function getName() { return Plugin::CALENDAR_ROOT; } /** * This method returns a node for a principal. * * The passed array contains principal information, and is guaranteed to * at least contain a uri item. Other properties may or may not be * supplied by the authentication backend. * * @param array $principal * @return \Sabre\DAV\INode */ public function getChildForPrincipal(array $principal) { return new UserCalendars($this->caldavBackend, $principal); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Exception/000077500000000000000000000000001246001162500202365ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/CalDAV/Exception/InvalidComponentType.php000066400000000000000000000015521246001162500250650ustar00rootroot00000000000000ownerDocument; $np = $doc->createElementNS(CalDAV\Plugin::NS_CALDAV,'cal:supported-calendar-component'); $errorNode->appendChild($np); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/ICSExportPlugin.php000066400000000000000000000075151246001162500220200ustar00rootroot00000000000000server = $server; $this->server->subscribeEvent('beforeMethod',array($this,'beforeMethod'), 90); } /** * 'beforeMethod' event handles. This event handles intercepts GET requests ending * with ?export * * @param string $method * @param string $uri * @return bool */ public function beforeMethod($method, $uri) { if ($method!='GET') return; if ($this->server->httpRequest->getQueryString()!='export') return; // splitting uri list($uri) = explode('?',$uri,2); $node = $this->server->tree->getNodeForPath($uri); if (!($node instanceof Calendar)) return; // Checking ACL, if available. if ($aclPlugin = $this->server->getPlugin('acl')) { $aclPlugin->checkPrivileges($uri, '{DAV:}read'); } $this->server->httpResponse->setHeader('Content-Type','text/calendar'); $this->server->httpResponse->sendStatus(200); $nodes = $this->server->getPropertiesForPath($uri, array( '{' . Plugin::NS_CALDAV . '}calendar-data', ),1); $this->server->httpResponse->sendBody($this->generateICS($nodes)); // Returning false to break the event chain return false; } /** * Merges all calendar objects, and builds one big ics export * * @param array $nodes * @return string */ public function generateICS(array $nodes) { $calendar = new VObject\Component\VCalendar(); $calendar->version = '2.0'; if (DAV\Server::$exposeVersion) { $calendar->prodid = '-//SabreDAV//SabreDAV ' . DAV\Version::VERSION . '//EN'; } else { $calendar->prodid = '-//SabreDAV//SabreDAV//EN'; } $calendar->calscale = 'GREGORIAN'; $collectedTimezones = array(); $timezones = array(); $objects = array(); foreach($nodes as $node) { if (!isset($node[200]['{' . Plugin::NS_CALDAV . '}calendar-data'])) { continue; } $nodeData = $node[200]['{' . Plugin::NS_CALDAV . '}calendar-data']; $nodeComp = VObject\Reader::read($nodeData); foreach($nodeComp->children() as $child) { switch($child->name) { case 'VEVENT' : case 'VTODO' : case 'VJOURNAL' : $objects[] = $child; break; // VTIMEZONE is special, because we need to filter out the duplicates case 'VTIMEZONE' : // Naively just checking tzid. if (in_array((string)$child->TZID, $collectedTimezones)) continue; $timezones[] = $child; $collectedTimezones[] = $child->TZID; break; } } } foreach($timezones as $tz) $calendar->add($tz); foreach($objects as $obj) $calendar->add($obj); return $calendar->serialize(); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/ICalendar.php000066400000000000000000000021011246001162500206250ustar00rootroot00000000000000caldavBackend = $caldavBackend; $this->principalUri = $principalUri; } /** * Returns all notifications for a principal * * @return array */ public function getChildren() { $children = array(); $notifications = $this->caldavBackend->getNotificationsForPrincipal($this->principalUri); foreach($notifications as $notification) { $children[] = new Node( $this->caldavBackend, $this->principalUri, $notification ); } return $children; } /** * Returns the name of this object * * @return string */ public function getName() { return 'notifications'; } /** * Returns the owner principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getOwner() { return $this->principalUri; } /** * Returns a group principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getGroup() { return null; } /** * Returns a list of ACE's for this node. * * Each ACE has the following properties: * * 'privilege', a string such as {DAV:}read or {DAV:}write. These are * currently the only supported privileges * * 'principal', a url to the principal who owns the node * * 'protected' (optional), indicating that this ACE is not allowed to * be updated. * * @return array */ public function getACL() { return array( array( 'principal' => $this->getOwner(), 'privilege' => '{DAV:}read', 'protected' => true, ), array( 'principal' => $this->getOwner(), 'privilege' => '{DAV:}write', 'protected' => true, ) ); } /** * Updates the ACL * * This method will receive a list of new ACE's as an array argument. * * @param array $acl * @return void */ public function setACL(array $acl) { throw new DAV\Exception\NotImplemented('Updating ACLs is not implemented here'); } /** * Returns the list of supported privileges for this node. * * The returned data structure is a list of nested privileges. * See Sabre\DAVACL\Plugin::getDefaultSupportedPrivilegeSet for a simple * standard structure. * * If null is returned from this method, the default privilege set is used, * which is fine for most common usecases. * * @return array|null */ public function getSupportedPrivilegeSet() { return null; } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Notifications/ICollection.php000066400000000000000000000011621246001162500240260ustar00rootroot00000000000000caldavBackend = $caldavBackend; $this->principalUri = $principalUri; $this->notification = $notification; } /** * Returns the path name for this notification * * @return id */ public function getName() { return $this->notification->getId() . '.xml'; } /** * Returns the etag for the notification. * * The etag must be surrounded by litteral double-quotes. * * @return string */ public function getETag() { return $this->notification->getETag(); } /** * This method must return an xml element, using the * Sabre\CalDAV\Notifications\INotificationType classes. * * @return INotificationType */ public function getNotificationType() { return $this->notification; } /** * Deletes this notification * * @return void */ public function delete() { $this->caldavBackend->deleteNotification($this->getOwner(), $this->notification); } /** * Returns the owner principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getOwner() { return $this->principalUri; } /** * Returns a group principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getGroup() { return null; } /** * Returns a list of ACE's for this node. * * Each ACE has the following properties: * * 'privilege', a string such as {DAV:}read or {DAV:}write. These are * currently the only supported privileges * * 'principal', a url to the principal who owns the node * * 'protected' (optional), indicating that this ACE is not allowed to * be updated. * * @return array */ public function getACL() { return array( array( 'principal' => $this->getOwner(), 'privilege' => '{DAV:}read', 'protected' => true, ), array( 'principal' => $this->getOwner(), 'privilege' => '{DAV:}write', 'protected' => true, ) ); } /** * Updates the ACL * * This method will receive a list of new ACE's as an array argument. * * @param array $acl * @return void */ public function setACL(array $acl) { throw new DAV\Exception\NotImplemented('Updating ACLs is not implemented here'); } /** * Returns the list of supported privileges for this node. * * The returned data structure is a list of nested privileges. * See Sabre\DAVACL\Plugin::getDefaultSupportedPrivilegeSet for a simple * standard structure. * * If null is returned from this method, the default privilege set is used, * which is fine for most common usecases. * * @return array|null */ public function getSupportedPrivilegeSet() { return null; } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Notifications/Notification/000077500000000000000000000000001246001162500235375ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/CalDAV/Notifications/Notification/Invite.php000066400000000000000000000223361246001162500255140ustar00rootroot00000000000000$value) { if (!property_exists($this, $key)) { throw new \InvalidArgumentException('Unknown option: ' . $key); } $this->$key = $value; } } /** * Serializes the notification as a single property. * * You should usually just encode the single top-level element of the * notification. * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serialize(DAV\Server $server, \DOMElement $node) { $prop = $node->ownerDocument->createElement('cs:invite-notification'); $node->appendChild($prop); } /** * This method serializes the entire notification, as it is used in the * response body. * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serializeBody(DAV\Server $server, \DOMElement $node) { $doc = $node->ownerDocument; $dt = $doc->createElement('cs:dtstamp'); $this->dtStamp->setTimezone(new \DateTimezone('GMT')); $dt->appendChild($doc->createTextNode($this->dtStamp->format('Ymd\\THis\\Z'))); $node->appendChild($dt); $prop = $doc->createElement('cs:invite-notification'); $node->appendChild($prop); $uid = $doc->createElement('cs:uid'); $uid->appendChild( $doc->createTextNode($this->id) ); $prop->appendChild($uid); $href = $doc->createElement('d:href'); $href->appendChild( $doc->createTextNode( $this->href ) ); $prop->appendChild($href); $nodeName = null; switch($this->type) { case SharingPlugin::STATUS_ACCEPTED : $nodeName = 'cs:invite-accepted'; break; case SharingPlugin::STATUS_DECLINED : $nodeName = 'cs:invite-declined'; break; case SharingPlugin::STATUS_DELETED : $nodeName = 'cs:invite-deleted'; break; case SharingPlugin::STATUS_NORESPONSE : $nodeName = 'cs:invite-noresponse'; break; } $prop->appendChild( $doc->createElement($nodeName) ); $hostHref = $doc->createElement('d:href', $server->getBaseUri() . $this->hostUrl); $hostUrl = $doc->createElement('cs:hosturl'); $hostUrl->appendChild($hostHref); $prop->appendChild($hostUrl); $access = $doc->createElement('cs:access'); if ($this->readOnly) { $access->appendChild($doc->createElement('cs:read')); } else { $access->appendChild($doc->createElement('cs:read-write')); } $prop->appendChild($access); $organizerUrl = $doc->createElement('cs:organizer'); // If the organizer contains a 'mailto:' part, it means it should be // treated as absolute. if (strtolower(substr($this->organizer,0,7))==='mailto:') { $organizerHref = new DAV\Property\Href($this->organizer, false); } else { $organizerHref = new DAV\Property\Href($this->organizer, true); } $organizerHref->serialize($server, $organizerUrl); if ($this->commonName) { $commonName = $doc->createElement('cs:common-name'); $commonName->appendChild($doc->createTextNode($this->commonName)); $organizerUrl->appendChild($commonName); $commonNameOld = $doc->createElement('cs:organizer-cn'); $commonNameOld->appendChild($doc->createTextNode($this->commonName)); $prop->appendChild($commonNameOld); } if ($this->firstName) { $firstName = $doc->createElement('cs:first-name'); $firstName->appendChild($doc->createTextNode($this->firstName)); $organizerUrl->appendChild($firstName); $firstNameOld = $doc->createElement('cs:organizer-first'); $firstNameOld->appendChild($doc->createTextNode($this->firstName)); $prop->appendChild($firstNameOld); } if ($this->lastName) { $lastName = $doc->createElement('cs:last-name'); $lastName->appendChild($doc->createTextNode($this->lastName)); $organizerUrl->appendChild($lastName); $lastNameOld = $doc->createElement('cs:organizer-last'); $lastNameOld->appendChild($doc->createTextNode($this->lastName)); $prop->appendChild($lastNameOld); } $prop->appendChild($organizerUrl); if ($this->summary) { $summary = $doc->createElement('cs:summary'); $summary->appendChild($doc->createTextNode($this->summary)); $prop->appendChild($summary); } if ($this->supportedComponents) { $xcomp = $doc->createElement('cal:supported-calendar-component-set'); $this->supportedComponents->serialize($server, $xcomp); $prop->appendChild($xcomp); } } /** * Returns a unique id for this notification * * This is just the base url. This should generally be some kind of unique * id. * * @return string */ public function getId() { return $this->id; } /** * Returns the ETag for this notification. * * The ETag must be surrounded by literal double-quotes. * * @return string */ public function getETag() { return $this->etag; } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Notifications/Notification/InviteReply.php000066400000000000000000000131171246001162500265250ustar00rootroot00000000000000$value) { if (!property_exists($this, $key)) { throw new \InvalidArgumentException('Unknown option: ' . $key); } $this->$key = $value; } } /** * Serializes the notification as a single property. * * You should usually just encode the single top-level element of the * notification. * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serialize(DAV\Server $server, \DOMElement $node) { $prop = $node->ownerDocument->createElement('cs:invite-reply'); $node->appendChild($prop); } /** * This method serializes the entire notification, as it is used in the * response body. * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serializeBody(DAV\Server $server, \DOMElement $node) { $doc = $node->ownerDocument; $dt = $doc->createElement('cs:dtstamp'); $this->dtStamp->setTimezone(new \DateTimezone('GMT')); $dt->appendChild($doc->createTextNode($this->dtStamp->format('Ymd\\THis\\Z'))); $node->appendChild($dt); $prop = $doc->createElement('cs:invite-reply'); $node->appendChild($prop); $uid = $doc->createElement('cs:uid'); $uid->appendChild($doc->createTextNode($this->id)); $prop->appendChild($uid); $inReplyTo = $doc->createElement('cs:in-reply-to'); $inReplyTo->appendChild( $doc->createTextNode($this->inReplyTo) ); $prop->appendChild($inReplyTo); $href = $doc->createElement('d:href'); $href->appendChild( $doc->createTextNode($this->href) ); $prop->appendChild($href); $nodeName = null; switch($this->type) { case SharingPlugin::STATUS_ACCEPTED : $nodeName = 'cs:invite-accepted'; break; case SharingPlugin::STATUS_DECLINED : $nodeName = 'cs:invite-declined'; break; } $prop->appendChild( $doc->createElement($nodeName) ); $hostHref = $doc->createElement('d:href', $server->getBaseUri() . $this->hostUrl); $hostUrl = $doc->createElement('cs:hosturl'); $hostUrl->appendChild($hostHref); $prop->appendChild($hostUrl); if ($this->summary) { $summary = $doc->createElement('cs:summary'); $summary->appendChild($doc->createTextNode($this->summary)); $prop->appendChild($summary); } } /** * Returns a unique id for this notification * * This is just the base url. This should generally be some kind of unique * id. * * @return string */ public function getId() { return $this->id; } /** * Returns the ETag for this notification. * * The ETag must be surrounded by literal double-quotes. * * @return string */ public function getETag() { return $this->etag; } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Notifications/Notification/SystemStatus.php000066400000000000000000000103111246001162500267340ustar00rootroot00000000000000id = $id; $this->type = $type; $this->description = $description; $this->href = $href; $this->etag = $etag; } /** * Serializes the notification as a single property. * * You should usually just encode the single top-level element of the * notification. * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serialize(DAV\Server $server, \DOMElement $node) { switch($this->type) { case self::TYPE_LOW : $type = 'low'; break; case self::TYPE_MEDIUM : $type = 'medium'; break; default : case self::TYPE_HIGH : $type = 'high'; break; } $prop = $node->ownerDocument->createElement('cs:systemstatus'); $prop->setAttribute('type', $type); $node->appendChild($prop); } /** * This method serializes the entire notification, as it is used in the * response body. * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serializeBody(DAV\Server $server, \DOMElement $node) { switch($this->type) { case self::TYPE_LOW : $type = 'low'; break; case self::TYPE_MEDIUM : $type = 'medium'; break; default : case self::TYPE_HIGH : $type = 'high'; break; } $prop = $node->ownerDocument->createElement('cs:systemstatus'); $prop->setAttribute('type', $type); if ($this->description) { $text = $node->ownerDocument->createTextNode($this->description); $desc = $node->ownerDocument->createElement('cs:description'); $desc->appendChild($text); $prop->appendChild($desc); } if ($this->href) { $text = $node->ownerDocument->createTextNode($this->href); $href = $node->ownerDocument->createElement('d:href'); $href->appendChild($text); $prop->appendChild($href); } $node->appendChild($prop); } /** * Returns a unique id for this notification * * This is just the base url. This should generally be some kind of unique * id. * * @return string */ public function getId() { return $this->id; } /* * Returns the ETag for this notification. * * The ETag must be surrounded by literal double-quotes. * * @return string */ public function getETag() { return $this->etag; } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Plugin.php000066400000000000000000001372001246001162500202520ustar00rootroot00000000000000imipHandler = $imipHandler; } /** * Use this method to tell the server this plugin defines additional * HTTP methods. * * This method is passed a uri. It should only return HTTP methods that are * available for the specified uri. * * @param string $uri * @return array */ public function getHTTPMethods($uri) { // The MKCALENDAR is only available on unmapped uri's, whose // parents extend IExtendedCollection list($parent, $name) = DAV\URLUtil::splitPath($uri); $node = $this->server->tree->getNodeForPath($parent); if ($node instanceof DAV\IExtendedCollection) { try { $node->getChild($name); } catch (DAV\Exception\NotFound $e) { return array('MKCALENDAR'); } } return array(); } /** * Returns a list of features for the DAV: HTTP header. * * @return array */ public function getFeatures() { return array('calendar-access', 'calendar-proxy'); } /** * Returns a plugin name. * * Using this name other plugins will be able to access other plugins * using DAV\Server::getPlugin * * @return string */ public function getPluginName() { return 'caldav'; } /** * Returns a list of reports this plugin supports. * * This will be used in the {DAV:}supported-report-set property. * Note that you still need to subscribe to the 'report' event to actually * implement them * * @param string $uri * @return array */ public function getSupportedReportSet($uri) { $node = $this->server->tree->getNodeForPath($uri); $reports = array(); if ($node instanceof ICalendar || $node instanceof ICalendarObject) { $reports[] = '{' . self::NS_CALDAV . '}calendar-multiget'; $reports[] = '{' . self::NS_CALDAV . '}calendar-query'; } if ($node instanceof ICalendar) { $reports[] = '{' . self::NS_CALDAV . '}free-busy-query'; } return $reports; } /** * Initializes the plugin * * @param DAV\Server $server * @return void */ public function initialize(DAV\Server $server) { $this->server = $server; $server->subscribeEvent('unknownMethod',array($this,'unknownMethod')); //$server->subscribeEvent('unknownMethod',array($this,'unknownMethod2'),1000); $server->subscribeEvent('report',array($this,'report')); $server->subscribeEvent('beforeGetProperties',array($this,'beforeGetProperties')); $server->subscribeEvent('onHTMLActionsPanel', array($this,'htmlActionsPanel')); $server->subscribeEvent('onBrowserPostAction', array($this,'browserPostAction')); $server->subscribeEvent('beforeWriteContent', array($this, 'beforeWriteContent')); $server->subscribeEvent('beforeCreateFile', array($this, 'beforeCreateFile')); $server->subscribeEvent('beforeMethod', array($this,'beforeMethod')); $server->xmlNamespaces[self::NS_CALDAV] = 'cal'; $server->xmlNamespaces[self::NS_CALENDARSERVER] = 'cs'; $server->propertyMap['{' . self::NS_CALDAV . '}supported-calendar-component-set'] = 'Sabre\\CalDAV\\Property\\SupportedCalendarComponentSet'; $server->propertyMap['{' . self::NS_CALDAV . '}schedule-calendar-transp'] = 'Sabre\\CalDAV\\Property\\ScheduleCalendarTransp'; $server->resourceTypeMapping['\\Sabre\\CalDAV\\ICalendar'] = '{urn:ietf:params:xml:ns:caldav}calendar'; $server->resourceTypeMapping['\\Sabre\\CalDAV\\Schedule\\IOutbox'] = '{urn:ietf:params:xml:ns:caldav}schedule-outbox'; $server->resourceTypeMapping['\\Sabre\\CalDAV\\Principal\\IProxyRead'] = '{http://calendarserver.org/ns/}calendar-proxy-read'; $server->resourceTypeMapping['\\Sabre\\CalDAV\\Principal\\IProxyWrite'] = '{http://calendarserver.org/ns/}calendar-proxy-write'; $server->resourceTypeMapping['\\Sabre\\CalDAV\\Notifications\\ICollection'] = '{' . self::NS_CALENDARSERVER . '}notification'; array_push($server->protectedProperties, '{' . self::NS_CALDAV . '}supported-calendar-component-set', '{' . self::NS_CALDAV . '}supported-calendar-data', '{' . self::NS_CALDAV . '}max-resource-size', '{' . self::NS_CALDAV . '}min-date-time', '{' . self::NS_CALDAV . '}max-date-time', '{' . self::NS_CALDAV . '}max-instances', '{' . self::NS_CALDAV . '}max-attendees-per-instance', '{' . self::NS_CALDAV . '}calendar-home-set', '{' . self::NS_CALDAV . '}supported-collation-set', '{' . self::NS_CALDAV . '}calendar-data', // scheduling extension '{' . self::NS_CALDAV . '}schedule-inbox-URL', '{' . self::NS_CALDAV . '}schedule-outbox-URL', '{' . self::NS_CALDAV . '}calendar-user-address-set', '{' . self::NS_CALDAV . '}calendar-user-type', // CalendarServer extensions '{' . self::NS_CALENDARSERVER . '}getctag', '{' . self::NS_CALENDARSERVER . '}calendar-proxy-read-for', '{' . self::NS_CALENDARSERVER . '}calendar-proxy-write-for', '{' . self::NS_CALENDARSERVER . '}notification-URL', '{' . self::NS_CALENDARSERVER . '}notificationtype' ); } /** * This function handles support for the MKCALENDAR method * * @param string $method * @param string $uri * @return bool */ public function unknownMethod($method, $uri) { switch ($method) { case 'MKCALENDAR' : $this->httpMkCalendar($uri); // false is returned to stop the propagation of the // unknownMethod event. return false; case 'POST' : // Checking if this is a text/calendar content type $contentType = $this->server->httpRequest->getHeader('Content-Type'); if (strpos($contentType, 'text/calendar')!==0) { return; } // Checking if we're talking to an outbox try { $node = $this->server->tree->getNodeForPath($uri); } catch (DAV\Exception\NotFound $e) { return; } if (!$node instanceof Schedule\IOutbox) return; $this->outboxRequest($node, $uri); return false; } } /** * This functions handles REPORT requests specific to CalDAV * * @param string $reportName * @param \DOMNode $dom * @return bool */ public function report($reportName,$dom) { switch($reportName) { case '{'.self::NS_CALDAV.'}calendar-multiget' : $this->calendarMultiGetReport($dom); return false; case '{'.self::NS_CALDAV.'}calendar-query' : $this->calendarQueryReport($dom); return false; case '{'.self::NS_CALDAV.'}free-busy-query' : $this->freeBusyQueryReport($dom); return false; } } /** * This function handles the MKCALENDAR HTTP method, which creates * a new calendar. * * @param string $uri * @return void */ public function httpMkCalendar($uri) { // Due to unforgivable bugs in iCal, we're completely disabling MKCALENDAR support // for clients matching iCal in the user agent //$ua = $this->server->httpRequest->getHeader('User-Agent'); //if (strpos($ua,'iCal/')!==false) { // throw new \Sabre\DAV\Exception\Forbidden('iCal has major bugs in it\'s RFC3744 support. Therefore we are left with no other choice but disabling this feature.'); //} $body = $this->server->httpRequest->getBody(true); $properties = array(); if ($body) { $dom = DAV\XMLUtil::loadDOMDocument($body); foreach($dom->firstChild->childNodes as $child) { if (DAV\XMLUtil::toClarkNotation($child)!=='{DAV:}set') continue; foreach(DAV\XMLUtil::parseProperties($child,$this->server->propertyMap) as $k=>$prop) { $properties[$k] = $prop; } } } $resourceType = array('{DAV:}collection','{urn:ietf:params:xml:ns:caldav}calendar'); $this->server->createCollection($uri,$resourceType,$properties); $this->server->httpResponse->sendStatus(201); $this->server->httpResponse->setHeader('Content-Length',0); } /** * beforeGetProperties * * This method handler is invoked before any after properties for a * resource are fetched. This allows us to add in any CalDAV specific * properties. * * @param string $path * @param DAV\INode $node * @param array $requestedProperties * @param array $returnedProperties * @return void */ public function beforeGetProperties($path, DAV\INode $node, &$requestedProperties, &$returnedProperties) { if ($node instanceof DAVACL\IPrincipal) { // calendar-home-set property $calHome = '{' . self::NS_CALDAV . '}calendar-home-set'; if (in_array($calHome,$requestedProperties)) { $principalId = $node->getName(); $calendarHomePath = self::CALENDAR_ROOT . '/' . $principalId . '/'; unset($requestedProperties[array_search($calHome, $requestedProperties)]); $returnedProperties[200][$calHome] = new DAV\Property\Href($calendarHomePath); } // schedule-outbox-URL property $scheduleProp = '{' . self::NS_CALDAV . '}schedule-outbox-URL'; if (in_array($scheduleProp,$requestedProperties)) { $principalId = $node->getName(); $outboxPath = self::CALENDAR_ROOT . '/' . $principalId . '/outbox'; unset($requestedProperties[array_search($scheduleProp, $requestedProperties)]); $returnedProperties[200][$scheduleProp] = new DAV\Property\Href($outboxPath); } // calendar-user-address-set property $calProp = '{' . self::NS_CALDAV . '}calendar-user-address-set'; if (in_array($calProp,$requestedProperties)) { $addresses = $node->getAlternateUriSet(); $addresses[] = $this->server->getBaseUri() . DAV\URLUtil::encodePath($node->getPrincipalUrl() . '/'); unset($requestedProperties[array_search($calProp, $requestedProperties)]); $returnedProperties[200][$calProp] = new DAV\Property\HrefList($addresses, false); } // These two properties are shortcuts for ical to easily find // other principals this principal has access to. $propRead = '{' . self::NS_CALENDARSERVER . '}calendar-proxy-read-for'; $propWrite = '{' . self::NS_CALENDARSERVER . '}calendar-proxy-write-for'; if (in_array($propRead,$requestedProperties) || in_array($propWrite,$requestedProperties)) { $aclPlugin = $this->server->getPlugin('acl'); $membership = $aclPlugin->getPrincipalMembership($path); $readList = array(); $writeList = array(); foreach($membership as $group) { $groupNode = $this->server->tree->getNodeForPath($group); // If the node is either ap proxy-read or proxy-write // group, we grab the parent principal and add it to the // list. if ($groupNode instanceof Principal\IProxyRead) { list($readList[]) = DAV\URLUtil::splitPath($group); } if ($groupNode instanceof Principal\IProxyWrite) { list($writeList[]) = DAV\URLUtil::splitPath($group); } } if (in_array($propRead,$requestedProperties)) { unset($requestedProperties[$propRead]); $returnedProperties[200][$propRead] = new DAV\Property\HrefList($readList); } if (in_array($propWrite,$requestedProperties)) { unset($requestedProperties[$propWrite]); $returnedProperties[200][$propWrite] = new DAV\Property\HrefList($writeList); } } // notification-URL property $notificationUrl = '{' . self::NS_CALENDARSERVER . '}notification-URL'; if (($index = array_search($notificationUrl, $requestedProperties)) !== false) { $principalId = $node->getName(); $calendarHomePath = 'calendars/' . $principalId . '/notifications/'; unset($requestedProperties[$index]); $returnedProperties[200][$notificationUrl] = new DAV\Property\Href($calendarHomePath); } } // instanceof IPrincipal if ($node instanceof Notifications\INode) { $propertyName = '{' . self::NS_CALENDARSERVER . '}notificationtype'; if (($index = array_search($propertyName, $requestedProperties)) !== false) { $returnedProperties[200][$propertyName] = $node->getNotificationType(); unset($requestedProperties[$index]); } } // instanceof Notifications_INode if ($node instanceof ICalendarObject) { // The calendar-data property is not supposed to be a 'real' // property, but in large chunks of the spec it does act as such. // Therefore we simply expose it as a property. $calDataProp = '{' . Plugin::NS_CALDAV . '}calendar-data'; if (in_array($calDataProp, $requestedProperties)) { unset($requestedProperties[$calDataProp]); $val = $node->get(); if (is_resource($val)) $val = stream_get_contents($val); // Taking out \r to not screw up the xml output $returnedProperties[200][$calDataProp] = str_replace("\r","", $val); } } } /** * This function handles the calendar-multiget REPORT. * * This report is used by the client to fetch the content of a series * of urls. Effectively avoiding a lot of redundant requests. * * @param \DOMNode $dom * @return void */ public function calendarMultiGetReport($dom) { $properties = array_keys(DAV\XMLUtil::parseProperties($dom->firstChild)); $hrefElems = $dom->getElementsByTagNameNS('urn:DAV','href'); $xpath = new \DOMXPath($dom); $xpath->registerNameSpace('cal',Plugin::NS_CALDAV); $xpath->registerNameSpace('dav','urn:DAV'); $expand = $xpath->query('/cal:calendar-multiget/dav:prop/cal:calendar-data/cal:expand'); if ($expand->length>0) { $expandElem = $expand->item(0); $start = $expandElem->getAttribute('start'); $end = $expandElem->getAttribute('end'); if(!$start || !$end) { throw new DAV\Exception\BadRequest('The "start" and "end" attributes are required for the CALDAV:expand element'); } $start = VObject\DateTimeParser::parseDateTime($start); $end = VObject\DateTimeParser::parseDateTime($end); if ($end <= $start) { throw new DAV\Exception\BadRequest('The end-date must be larger than the start-date in the expand element.'); } $expand = true; } else { $expand = false; } foreach($hrefElems as $elem) { $uri = $this->server->calculateUri($elem->nodeValue); list($objProps) = $this->server->getPropertiesForPath($uri,$properties); if ($expand && isset($objProps[200]['{' . self::NS_CALDAV . '}calendar-data'])) { $vObject = VObject\Reader::read($objProps[200]['{' . self::NS_CALDAV . '}calendar-data']); $vObject->expand($start, $end); $objProps[200]['{' . self::NS_CALDAV . '}calendar-data'] = $vObject->serialize(); } $propertyList[]=$objProps; } $prefer = $this->server->getHTTPPRefer(); $this->server->httpResponse->sendStatus(207); $this->server->httpResponse->setHeader('Content-Type','application/xml; charset=utf-8'); $this->server->httpResponse->setHeader('Vary','Brief,Prefer'); $this->server->httpResponse->sendBody($this->server->generateMultiStatus($propertyList, $prefer['return-minimal'])); } /** * This function handles the calendar-query REPORT * * This report is used by clients to request calendar objects based on * complex conditions. * * @param \DOMNode $dom * @return void */ public function calendarQueryReport($dom) { $parser = new CalendarQueryParser($dom); $parser->parse(); $node = $this->server->tree->getNodeForPath($this->server->getRequestUri()); $depth = $this->server->getHTTPDepth(0); // The default result is an empty array $result = array(); // The calendarobject was requested directly. In this case we handle // this locally. if ($depth == 0 && $node instanceof ICalendarObject) { $requestedCalendarData = true; $requestedProperties = $parser->requestedProperties; if (!in_array('{urn:ietf:params:xml:ns:caldav}calendar-data', $requestedProperties)) { // We always retrieve calendar-data, as we need it for filtering. $requestedProperties[] = '{urn:ietf:params:xml:ns:caldav}calendar-data'; // If calendar-data wasn't explicitly requested, we need to remove // it after processing. $requestedCalendarData = false; } $properties = $this->server->getPropertiesForPath( $this->server->getRequestUri(), $requestedProperties, 0 ); // This array should have only 1 element, the first calendar // object. $properties = current($properties); // If there wasn't any calendar-data returned somehow, we ignore // this. if (isset($properties[200]['{urn:ietf:params:xml:ns:caldav}calendar-data'])) { $validator = new CalendarQueryValidator(); $vObject = VObject\Reader::read($properties[200]['{urn:ietf:params:xml:ns:caldav}calendar-data']); if ($validator->validate($vObject,$parser->filters)) { // If the client didn't require the calendar-data property, // we won't give it back. if (!$requestedCalendarData) { unset($properties[200]['{urn:ietf:params:xml:ns:caldav}calendar-data']); } else { if ($parser->expand) { $vObject->expand($parser->expand['start'], $parser->expand['end']); $properties[200]['{' . self::NS_CALDAV . '}calendar-data'] = $vObject->serialize(); } } $result = array($properties); } } } // If we're dealing with a calendar, the calendar itself is responsible // for the calendar-query. if ($node instanceof ICalendar && $depth = 1) { $nodePaths = $node->calendarQuery($parser->filters); foreach($nodePaths as $path) { list($properties) = $this->server->getPropertiesForPath($this->server->getRequestUri() . '/' . $path, $parser->requestedProperties); if ($parser->expand) { // We need to do some post-processing $vObject = VObject\Reader::read($properties[200]['{urn:ietf:params:xml:ns:caldav}calendar-data']); $vObject->expand($parser->expand['start'], $parser->expand['end']); $properties[200]['{' . self::NS_CALDAV . '}calendar-data'] = $vObject->serialize(); } $result[] = $properties; } } $prefer = $this->server->getHTTPPRefer(); $this->server->httpResponse->sendStatus(207); $this->server->httpResponse->setHeader('Content-Type','application/xml; charset=utf-8'); $this->server->httpResponse->setHeader('Vary','Brief,Prefer'); $this->server->httpResponse->sendBody($this->server->generateMultiStatus($result, $prefer['return-minimal'])); } /** * This method is responsible for parsing the request and generating the * response for the CALDAV:free-busy-query REPORT. * * @param \DOMNode $dom * @return void */ protected function freeBusyQueryReport(\DOMNode $dom) { $start = null; $end = null; foreach($dom->firstChild->childNodes as $childNode) { $clark = DAV\XMLUtil::toClarkNotation($childNode); if ($clark == '{' . self::NS_CALDAV . '}time-range') { $start = $childNode->getAttribute('start'); $end = $childNode->getAttribute('end'); break; } } if ($start) { $start = VObject\DateTimeParser::parseDateTime($start); } if ($end) { $end = VObject\DateTimeParser::parseDateTime($end); } if (!$start && !$end) { throw new DAV\Exception\BadRequest('The freebusy report must have a time-range filter'); } $acl = $this->server->getPlugin('acl'); if (!$acl) { throw new DAV\Exception('The ACL plugin must be loaded for free-busy queries to work'); } $uri = $this->server->getRequestUri(); $acl->checkPrivileges($uri,'{' . self::NS_CALDAV . '}read-free-busy'); $calendar = $this->server->tree->getNodeForPath($uri); if (!$calendar instanceof ICalendar) { throw new DAV\Exception\NotImplemented('The free-busy-query REPORT is only implemented on calendars'); } // Doing a calendar-query first, to make sure we get the most // performance. $urls = $calendar->calendarQuery(array( 'name' => 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => $start, 'end' => $end, ), ), ), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, )); $objects = array_map(function($url) use ($calendar) { $obj = $calendar->getChild($url)->get(); return $obj; }, $urls); $generator = new VObject\FreeBusyGenerator(); $generator->setObjects($objects); $generator->setTimeRange($start, $end); $result = $generator->getResult(); $result = $result->serialize(); $this->server->httpResponse->sendStatus(200); $this->server->httpResponse->setHeader('Content-Type', 'text/calendar'); $this->server->httpResponse->setHeader('Content-Length', strlen($result)); $this->server->httpResponse->sendBody($result); } /** * This method is triggered before a file gets updated with new content. * * This plugin uses this method to ensure that CalDAV objects receive * valid calendar data. * * @param string $path * @param DAV\IFile $node * @param resource $data * @return void */ public function beforeWriteContent($path, DAV\IFile $node, &$data) { if (!$node instanceof ICalendarObject) return; $this->validateICalendar($data, $path); } /** * This method is triggered before a new file is created. * * This plugin uses this method to ensure that newly created calendar * objects contain valid calendar data. * * @param string $path * @param resource $data * @param DAV\ICollection $parentNode * @return void */ public function beforeCreateFile($path, &$data, DAV\ICollection $parentNode) { if (!$parentNode instanceof Calendar) return; $this->validateICalendar($data, $path); } /** * This event is triggered before any HTTP request is handled. * * We use this to intercept GET calls to notification nodes, and return the * proper response. * * @param string $method * @param string $path * @return void */ public function beforeMethod($method, $path) { if ($method!=='GET') return; try { $node = $this->server->tree->getNodeForPath($path); } catch (DAV\Exception\NotFound $e) { return; } if (!$node instanceof Notifications\INode) return; if (!$this->server->checkPreconditions(true)) return false; $dom = new \DOMDocument('1.0', 'UTF-8'); $dom->formatOutput = true; $root = $dom->createElement('cs:notification'); foreach($this->server->xmlNamespaces as $namespace => $prefix) { $root->setAttribute('xmlns:' . $prefix, $namespace); } $dom->appendChild($root); $node->getNotificationType()->serializeBody($this->server, $root); $this->server->httpResponse->setHeader('Content-Type','application/xml'); $this->server->httpResponse->setHeader('ETag',$node->getETag()); $this->server->httpResponse->sendStatus(200); $this->server->httpResponse->sendBody($dom->saveXML()); return false; } /** * Checks if the submitted iCalendar data is in fact, valid. * * An exception is thrown if it's not. * * @param resource|string $data * @param string $path * @return void */ protected function validateICalendar(&$data, $path) { // If it's a stream, we convert it to a string first. if (is_resource($data)) { $data = stream_get_contents($data); } // Converting the data to unicode, if needed. $data = DAV\StringUtil::ensureUTF8($data); try { $vobj = VObject\Reader::read($data); } catch (VObject\ParseException $e) { throw new DAV\Exception\UnsupportedMediaType('This resource only supports valid iCalendar 2.0 data. Parse error: ' . $e->getMessage()); } if ($vobj->name !== 'VCALENDAR') { throw new DAV\Exception\UnsupportedMediaType('This collection can only support iCalendar objects.'); } // Get the Supported Components for the target calendar list($parentPath,$object) = DAV\URLUtil::splitPath($path); $calendarProperties = $this->server->getProperties($parentPath,array('{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set')); $supportedComponents = $calendarProperties['{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set']->getValue(); $foundType = null; $foundUID = null; foreach($vobj->getComponents() as $component) { switch($component->name) { case 'VTIMEZONE' : continue 2; case 'VEVENT' : case 'VTODO' : case 'VJOURNAL' : if (is_null($foundType)) { $foundType = $component->name; if (!in_array($foundType, $supportedComponents)) { throw new Exception\InvalidComponentType('This calendar only supports ' . implode(', ', $supportedComponents) . '. We found a ' . $foundType); } if (!isset($component->UID)) { throw new DAV\Exception\BadRequest('Every ' . $component->name . ' component must have an UID'); } $foundUID = (string)$component->UID; } else { if ($foundType !== $component->name) { throw new DAV\Exception\BadRequest('A calendar object must only contain 1 component. We found a ' . $component->name . ' as well as a ' . $foundType); } if ($foundUID !== (string)$component->UID) { throw new DAV\Exception\BadRequest('Every ' . $component->name . ' in this object must have identical UIDs'); } } break; default : throw new DAV\Exception\BadRequest('You are not allowed to create components of type: ' . $component->name . ' here'); } } if (!$foundType) throw new DAV\Exception\BadRequest('iCalendar object must contain at least 1 of VEVENT, VTODO or VJOURNAL'); } /** * This method handles POST requests to the schedule-outbox. * * Currently, two types of requests are support: * * FREEBUSY requests from RFC 6638 * * Simple iTIP messages from draft-desruisseaux-caldav-sched-04 * * The latter is from an expired early draft of the CalDAV scheduling * extensions, but iCal depends on a feature from that spec, so we * implement it. * * @param Schedule\IOutbox $outboxNode * @param string $outboxUri * @return void */ public function outboxRequest(Schedule\IOutbox $outboxNode, $outboxUri) { // Parsing the request body try { $vObject = VObject\Reader::read($this->server->httpRequest->getBody(true)); } catch (VObject\ParseException $e) { throw new DAV\Exception\BadRequest('The request body must be a valid iCalendar object. Parse error: ' . $e->getMessage()); } // The incoming iCalendar object must have a METHOD property, and a // component. The combination of both determines what type of request // this is. $componentType = null; foreach($vObject->getComponents() as $component) { if ($component->name !== 'VTIMEZONE') { $componentType = $component->name; break; } } if (is_null($componentType)) { throw new DAV\Exception\BadRequest('We expected at least one VTODO, VJOURNAL, VFREEBUSY or VEVENT component'); } // Validating the METHOD $method = strtoupper((string)$vObject->METHOD); if (!$method) { throw new DAV\Exception\BadRequest('A METHOD property must be specified in iTIP messages'); } // So we support two types of requests: // // REQUEST with a VFREEBUSY component // REQUEST, REPLY, ADD, CANCEL on VEVENT components $acl = $this->server->getPlugin('acl'); if ($componentType === 'VFREEBUSY' && $method === 'REQUEST') { $acl && $acl->checkPrivileges($outboxUri,'{' . Plugin::NS_CALDAV . '}schedule-query-freebusy'); $this->handleFreeBusyRequest($outboxNode, $vObject); } elseif ($componentType === 'VEVENT' && in_array($method, array('REQUEST','REPLY','ADD','CANCEL'))) { $acl && $acl->checkPrivileges($outboxUri,'{' . Plugin::NS_CALDAV . '}schedule-post-vevent'); $this->handleEventNotification($outboxNode, $vObject); } else { throw new DAV\Exception\NotImplemented('SabreDAV supports only VFREEBUSY (REQUEST) and VEVENT (REQUEST, REPLY, ADD, CANCEL)'); } } /** * This method handles the REQUEST, REPLY, ADD and CANCEL methods for * VEVENT iTip messages. * * @return void */ protected function handleEventNotification(Schedule\IOutbox $outboxNode, VObject\Component $vObject) { $originator = $this->server->httpRequest->getHeader('Originator'); $recipients = $this->server->httpRequest->getHeader('Recipient'); if (!$originator) { throw new DAV\Exception\BadRequest('The Originator: header must be specified when making POST requests'); } if (!$recipients) { throw new DAV\Exception\BadRequest('The Recipient: header must be specified when making POST requests'); } $recipients = explode(',',$recipients); foreach($recipients as $k=>$recipient) { $recipient = trim($recipient); if (!preg_match('/^mailto:(.*)@(.*)$/i', $recipient)) { throw new DAV\Exception\BadRequest('Recipients must start with mailto: and must be valid email address'); } $recipient = substr($recipient, 7); $recipients[$k] = $recipient; } // We need to make sure that 'originator' matches one of the email // addresses of the selected principal. $principal = $outboxNode->getOwner(); $props = $this->server->getProperties($principal,array( '{' . self::NS_CALDAV . '}calendar-user-address-set', )); $addresses = array(); if (isset($props['{' . self::NS_CALDAV . '}calendar-user-address-set'])) { $addresses = $props['{' . self::NS_CALDAV . '}calendar-user-address-set']->getHrefs(); } $found = false; foreach($addresses as $address) { // Trimming the / on both sides, just in case.. if (rtrim(strtolower($originator),'/') === rtrim(strtolower($address),'/')) { $found = true; break; } } if (!$found) { throw new DAV\Exception\Forbidden('The addresses specified in the Originator header did not match any addresses in the owners calendar-user-address-set header'); } // If the Originator header was a url, and not a mailto: address.. // we're going to try to pull the mailto: from the vobject body. if (strtolower(substr($originator,0,7)) !== 'mailto:') { $originator = (string)$vObject->VEVENT->ORGANIZER; } if (strtolower(substr($originator,0,7)) !== 'mailto:') { throw new DAV\Exception\Forbidden('Could not find mailto: address in both the Orignator header, and the ORGANIZER property in the VEVENT'); } $originator = substr($originator,7); $result = $this->iMIPMessage($originator, $recipients, $vObject, $principal); $this->server->httpResponse->sendStatus(200); $this->server->httpResponse->setHeader('Content-Type','application/xml'); $this->server->httpResponse->sendBody($this->generateScheduleResponse($result)); } /** * Sends an iMIP message by email. * * This method must return an array with status codes per recipient. * This should look something like: * * array( * 'user1@example.org' => '2.0;Success' * ) * * Formatting for this status code can be found at: * https://tools.ietf.org/html/rfc5545#section-3.8.8.3 * * A list of valid status codes can be found at: * https://tools.ietf.org/html/rfc5546#section-3.6 * * @param string $originator * @param array $recipients * @param VObject\Component $vObject * @param string $principal Principal url * @return array */ protected function iMIPMessage($originator, array $recipients, VObject\Component $vObject, $principal) { if (!$this->imipHandler) { $resultStatus = '5.2;This server does not support this operation'; } else { $this->imipHandler->sendMessage($originator, $recipients, $vObject, $principal); $resultStatus = '2.0;Success'; } $result = array(); foreach($recipients as $recipient) { $result[$recipient] = $resultStatus; } return $result; } /** * Generates a schedule-response XML body * * The recipients array is a key->value list, containing email addresses * and iTip status codes. See the iMIPMessage method for a description of * the value. * * @param array $recipients * @return string */ public function generateScheduleResponse(array $recipients) { $dom = new \DOMDocument('1.0','utf-8'); $dom->formatOutput = true; $xscheduleResponse = $dom->createElement('cal:schedule-response'); $dom->appendChild($xscheduleResponse); foreach($this->server->xmlNamespaces as $namespace=>$prefix) { $xscheduleResponse->setAttribute('xmlns:' . $prefix, $namespace); } foreach($recipients as $recipient=>$status) { $xresponse = $dom->createElement('cal:response'); $xrecipient = $dom->createElement('cal:recipient'); $xrecipient->appendChild($dom->createTextNode($recipient)); $xresponse->appendChild($xrecipient); $xrequestStatus = $dom->createElement('cal:request-status'); $xrequestStatus->appendChild($dom->createTextNode($status)); $xresponse->appendChild($xrequestStatus); $xscheduleResponse->appendChild($xresponse); } return $dom->saveXML(); } /** * This method is responsible for parsing a free-busy query request and * returning it's result. * * @param Schedule\IOutbox $outbox * @param string $request * @return string */ protected function handleFreeBusyRequest(Schedule\IOutbox $outbox, VObject\Component $vObject) { $vFreeBusy = $vObject->VFREEBUSY; $organizer = $vFreeBusy->organizer; $organizer = (string)$organizer; // Validating if the organizer matches the owner of the inbox. $owner = $outbox->getOwner(); $caldavNS = '{' . Plugin::NS_CALDAV . '}'; $uas = $caldavNS . 'calendar-user-address-set'; $props = $this->server->getProperties($owner,array($uas)); if (empty($props[$uas]) || !in_array($organizer, $props[$uas]->getHrefs())) { throw new DAV\Exception\Forbidden('The organizer in the request did not match any of the addresses for the owner of this inbox'); } if (!isset($vFreeBusy->ATTENDEE)) { throw new DAV\Exception\BadRequest('You must at least specify 1 attendee'); } $attendees = array(); foreach($vFreeBusy->ATTENDEE as $attendee) { $attendees[]= (string)$attendee; } if (!isset($vFreeBusy->DTSTART) || !isset($vFreeBusy->DTEND)) { throw new DAV\Exception\BadRequest('DTSTART and DTEND must both be specified'); } $startRange = $vFreeBusy->DTSTART->getDateTime(); $endRange = $vFreeBusy->DTEND->getDateTime(); $results = array(); foreach($attendees as $attendee) { $results[] = $this->getFreeBusyForEmail($attendee, $startRange, $endRange, $vObject); } $dom = new \DOMDocument('1.0','utf-8'); $dom->formatOutput = true; $scheduleResponse = $dom->createElement('cal:schedule-response'); foreach($this->server->xmlNamespaces as $namespace=>$prefix) { $scheduleResponse->setAttribute('xmlns:' . $prefix,$namespace); } $dom->appendChild($scheduleResponse); foreach($results as $result) { $response = $dom->createElement('cal:response'); $recipient = $dom->createElement('cal:recipient'); $recipientHref = $dom->createElement('d:href'); $recipientHref->appendChild($dom->createTextNode($result['href'])); $recipient->appendChild($recipientHref); $response->appendChild($recipient); $reqStatus = $dom->createElement('cal:request-status'); $reqStatus->appendChild($dom->createTextNode($result['request-status'])); $response->appendChild($reqStatus); if (isset($result['calendar-data'])) { $calendardata = $dom->createElement('cal:calendar-data'); $calendardata->appendChild($dom->createTextNode(str_replace("\r\n","\n",$result['calendar-data']->serialize()))); $response->appendChild($calendardata); } $scheduleResponse->appendChild($response); } $this->server->httpResponse->sendStatus(200); $this->server->httpResponse->setHeader('Content-Type','application/xml'); $this->server->httpResponse->sendBody($dom->saveXML()); } /** * Returns free-busy information for a specific address. The returned * data is an array containing the following properties: * * calendar-data : A VFREEBUSY VObject * request-status : an iTip status code. * href: The principal's email address, as requested * * The following request status codes may be returned: * * 2.0;description * * 3.7;description * * @param string $email address * @param \DateTime $start * @param \DateTime $end * @param VObject\Component $request * @return array */ protected function getFreeBusyForEmail($email, \DateTime $start, \DateTime $end, VObject\Component $request) { $caldavNS = '{' . Plugin::NS_CALDAV . '}'; $aclPlugin = $this->server->getPlugin('acl'); if (substr($email,0,7)==='mailto:') $email = substr($email,7); $result = $aclPlugin->principalSearch( array('{http://sabredav.org/ns}email-address' => $email), array( '{DAV:}principal-URL', $caldavNS . 'calendar-home-set', '{http://sabredav.org/ns}email-address', ) ); if (!count($result)) { return array( 'request-status' => '3.7;Could not find principal', 'href' => 'mailto:' . $email, ); } if (!isset($result[0][200][$caldavNS . 'calendar-home-set'])) { return array( 'request-status' => '3.7;No calendar-home-set property found', 'href' => 'mailto:' . $email, ); } $homeSet = $result[0][200][$caldavNS . 'calendar-home-set']->getHref(); // Grabbing the calendar list $objects = array(); foreach($this->server->tree->getNodeForPath($homeSet)->getChildren() as $node) { if (!$node instanceof ICalendar) { continue; } $aclPlugin->checkPrivileges($homeSet . $node->getName() ,$caldavNS . 'read-free-busy'); // Getting the list of object uris within the time-range $urls = $node->calendarQuery(array( 'name' => 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => $start, 'end' => $end, ), ), ), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, )); $calObjects = array_map(function($url) use ($node) { $obj = $node->getChild($url)->get(); return $obj; }, $urls); $objects = array_merge($objects,$calObjects); } $vcalendar = new VObject\Component\VCalendar(); $vcalendar->VERSION = '2.0'; $vcalendar->METHOD = 'REPLY'; $vcalendar->CALSCALE = 'GREGORIAN'; $vcalendar->PRODID = '-//SabreDAV//SabreDAV ' . DAV\Version::VERSION . '//EN'; $generator = new VObject\FreeBusyGenerator(); $generator->setObjects($objects); $generator->setTimeRange($start, $end); $generator->setBaseObject($vcalendar); $result = $generator->getResult(); $vcalendar->VFREEBUSY->ATTENDEE = 'mailto:' . $email; $vcalendar->VFREEBUSY->UID = (string)$request->VFREEBUSY->UID; $vcalendar->VFREEBUSY->ORGANIZER = clone $request->VFREEBUSY->ORGANIZER; return array( 'calendar-data' => $result, 'request-status' => '2.0;Success', 'href' => 'mailto:' . $email, ); } /** * This method is used to generate HTML output for the * DAV\Browser\Plugin. This allows us to generate an interface users * can use to create new calendars. * * @param DAV\INode $node * @param string $output * @return bool */ public function htmlActionsPanel(DAV\INode $node, &$output) { if (!$node instanceof UserCalendars) return; $output.= '

Create new calendar



'; return false; } /** * This method allows us to intercept the 'mkcalendar' sabreAction. This * action enables the user to create new calendars from the browser plugin. * * @param string $uri * @param string $action * @param array $postVars * @return bool */ public function browserPostAction($uri, $action, array $postVars) { if ($action!=='mkcalendar') return; $resourceType = array('{DAV:}collection','{urn:ietf:params:xml:ns:caldav}calendar'); $properties = array(); if (isset($postVars['{DAV:}displayname'])) { $properties['{DAV:}displayname'] = $postVars['{DAV:}displayname']; } $this->server->createCollection($uri . '/' . $postVars['name'],$resourceType,$properties); return false; } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Principal/000077500000000000000000000000001246001162500202215ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/CalDAV/Principal/Collection.php000066400000000000000000000015171246001162500230310ustar00rootroot00000000000000principalBackend, $principalInfo); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Principal/IProxyRead.php000066400000000000000000000006621246001162500227640ustar00rootroot00000000000000principalInfo = $principalInfo; $this->principalBackend = $principalBackend; } /** * Returns this principals name. * * @return string */ public function getName() { return 'calendar-proxy-read'; } /** * Returns the last modification time * * @return null */ public function getLastModified() { return null; } /** * Deletes the current node * * @throws DAV\Exception\Forbidden * @return void */ public function delete() { throw new DAV\Exception\Forbidden('Permission denied to delete node'); } /** * Renames the node * * @throws DAV\Exception\Forbidden * @param string $name The new name * @return void */ public function setName($name) { throw new DAV\Exception\Forbidden('Permission denied to rename file'); } /** * Returns a list of alternative urls for a principal * * This can for example be an email address, or ldap url. * * @return array */ public function getAlternateUriSet() { return array(); } /** * Returns the full principal url * * @return string */ public function getPrincipalUrl() { return $this->principalInfo['uri'] . '/' . $this->getName(); } /** * Returns the list of group members * * If this principal is a group, this function should return * all member principal uri's for the group. * * @return array */ public function getGroupMemberSet() { return $this->principalBackend->getGroupMemberSet($this->getPrincipalUrl()); } /** * Returns the list of groups this principal is member of * * If this principal is a member of a (list of) groups, this function * should return a list of principal uri's for it's members. * * @return array */ public function getGroupMembership() { return $this->principalBackend->getGroupMembership($this->getPrincipalUrl()); } /** * Sets a list of group members * * If this principal is a group, this method sets all the group members. * The list of members is always overwritten, never appended to. * * This method should throw an exception if the members could not be set. * * @param array $principals * @return void */ public function setGroupMemberSet(array $principals) { $this->principalBackend->setGroupMemberSet($this->getPrincipalUrl(), $principals); } /** * Returns the displayname * * This should be a human readable name for the principal. * If none is available, return the nodename. * * @return string */ public function getDisplayName() { return $this->getName(); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Principal/ProxyWrite.php000066400000000000000000000076331246001162500230770ustar00rootroot00000000000000principalInfo = $principalInfo; $this->principalBackend = $principalBackend; } /** * Returns this principals name. * * @return string */ public function getName() { return 'calendar-proxy-write'; } /** * Returns the last modification time * * @return null */ public function getLastModified() { return null; } /** * Deletes the current node * * @throws DAV\Exception\Forbidden * @return void */ public function delete() { throw new DAV\Exception\Forbidden('Permission denied to delete node'); } /** * Renames the node * * @throws DAV\Exception\Forbidden * @param string $name The new name * @return void */ public function setName($name) { throw new DAV\Exception\Forbidden('Permission denied to rename file'); } /** * Returns a list of alternative urls for a principal * * This can for example be an email address, or ldap url. * * @return array */ public function getAlternateUriSet() { return array(); } /** * Returns the full principal url * * @return string */ public function getPrincipalUrl() { return $this->principalInfo['uri'] . '/' . $this->getName(); } /** * Returns the list of group members * * If this principal is a group, this function should return * all member principal uri's for the group. * * @return array */ public function getGroupMemberSet() { return $this->principalBackend->getGroupMemberSet($this->getPrincipalUrl()); } /** * Returns the list of groups this principal is member of * * If this principal is a member of a (list of) groups, this function * should return a list of principal uri's for it's members. * * @return array */ public function getGroupMembership() { return $this->principalBackend->getGroupMembership($this->getPrincipalUrl()); } /** * Sets a list of group members * * If this principal is a group, this method sets all the group members. * The list of members is always overwritten, never appended to. * * This method should throw an exception if the members could not be set. * * @param array $principals * @return void */ public function setGroupMemberSet(array $principals) { $this->principalBackend->setGroupMemberSet($this->getPrincipalUrl(), $principals); } /** * Returns the displayname * * This should be a human readable name for the principal. * If none is available, return the nodename. * * @return string */ public function getDisplayName() { return $this->getName(); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Principal/User.php000066400000000000000000000074071246001162500216600ustar00rootroot00000000000000principalBackend->getPrincipalByPath($this->getPrincipalURL() . '/' . $name); if (!$principal) { throw new DAV\Exception\NotFound('Node with name ' . $name . ' was not found'); } if ($name === 'calendar-proxy-read') return new ProxyRead($this->principalBackend, $this->principalProperties); if ($name === 'calendar-proxy-write') return new ProxyWrite($this->principalBackend, $this->principalProperties); throw new DAV\Exception\NotFound('Node with name ' . $name . ' was not found'); } /** * Returns an array with all the child nodes * * @return DAV\INode[] */ public function getChildren() { $r = array(); if ($this->principalBackend->getPrincipalByPath($this->getPrincipalURL() . '/calendar-proxy-read')) { $r[] = new ProxyRead($this->principalBackend, $this->principalProperties); } if ($this->principalBackend->getPrincipalByPath($this->getPrincipalURL() . '/calendar-proxy-write')) { $r[] = new ProxyWrite($this->principalBackend, $this->principalProperties); } return $r; } /** * Returns whether or not the child node exists * * @param string $name * @return bool */ public function childExists($name) { try { $this->getChild($name); return true; } catch (DAV\Exception\NotFound $e) { return false; } } /** * Returns a list of ACE's for this node. * * Each ACE has the following properties: * * 'privilege', a string such as {DAV:}read or {DAV:}write. These are * currently the only supported privileges * * 'principal', a url to the principal who owns the node * * 'protected' (optional), indicating that this ACE is not allowed to * be updated. * * @return array */ public function getACL() { $acl = parent::getACL(); $acl[] = array( 'privilege' => '{DAV:}read', 'principal' => $this->principalProperties['uri'] . '/calendar-proxy-read', 'protected' => true, ); $acl[] = array( 'privilege' => '{DAV:}read', 'principal' => $this->principalProperties['uri'] . '/calendar-proxy-write', 'protected' => true, ); return $acl; } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Property/000077500000000000000000000000001246001162500201245ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/CalDAV/Property/AllowedSharingModes.php000066400000000000000000000035601246001162500245340ustar00rootroot00000000000000canBeShared = $canBeShared; $this->canBePublished = $canBePublished; } /** * Serializes the property in a DOMDocument * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serialize(DAV\Server $server, \DOMElement $node) { $doc = $node->ownerDocument; if ($this->canBeShared) { $xcomp = $doc->createElement('cs:can-be-shared'); $node->appendChild($xcomp); } if ($this->canBePublished) { $xcomp = $doc->createElement('cs:can-be-published'); $node->appendChild($xcomp); } } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Property/Invite.php000066400000000000000000000166621246001162500221060ustar00rootroot00000000000000users = $users; $this->organizer = $organizer; } /** * Returns the list of users, as it was passed to the constructor. * * @return array */ public function getValue() { return $this->users; } /** * Serializes the property in a DOMDocument * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serialize(DAV\Server $server,\DOMElement $node) { $doc = $node->ownerDocument; if (!is_null($this->organizer)) { $xorganizer = $doc->createElement('cs:organizer'); $href = $doc->createElement('d:href'); $href->appendChild($doc->createTextNode($this->organizer['href'])); $xorganizer->appendChild($href); if (isset($this->organizer['commonName']) && $this->organizer['commonName']) { $commonName = $doc->createElement('cs:common-name'); $commonName->appendChild($doc->createTextNode($this->organizer['commonName'])); $xorganizer->appendChild($commonName); } if (isset($this->organizer['firstName']) && $this->organizer['firstName']) { $firstName = $doc->createElement('cs:first-name'); $firstName->appendChild($doc->createTextNode($this->organizer['firstName'])); $xorganizer->appendChild($firstName); } if (isset($this->organizer['lastName']) && $this->organizer['lastName']) { $lastName = $doc->createElement('cs:last-name'); $lastName->appendChild($doc->createTextNode($this->organizer['lastName'])); $xorganizer->appendChild($lastName); } $node->appendChild($xorganizer); } foreach($this->users as $user) { $xuser = $doc->createElement('cs:user'); $href = $doc->createElement('d:href'); $href->appendChild($doc->createTextNode($user['href'])); $xuser->appendChild($href); if (isset($user['commonName']) && $user['commonName']) { $commonName = $doc->createElement('cs:common-name'); $commonName->appendChild($doc->createTextNode($user['commonName'])); $xuser->appendChild($commonName); } switch($user['status']) { case SharingPlugin::STATUS_ACCEPTED : $status = $doc->createElement('cs:invite-accepted'); $xuser->appendChild($status); break; case SharingPlugin::STATUS_DECLINED : $status = $doc->createElement('cs:invite-declined'); $xuser->appendChild($status); break; case SharingPlugin::STATUS_NORESPONSE : $status = $doc->createElement('cs:invite-noresponse'); $xuser->appendChild($status); break; case SharingPlugin::STATUS_INVALID : $status = $doc->createElement('cs:invite-invalid'); $xuser->appendChild($status); break; } $xaccess = $doc->createElement('cs:access'); if ($user['readOnly']) { $xaccess->appendChild( $doc->createElement('cs:read') ); } else { $xaccess->appendChild( $doc->createElement('cs:read-write') ); } $xuser->appendChild($xaccess); if (isset($user['summary']) && $user['summary']) { $summary = $doc->createElement('cs:summary'); $summary->appendChild($doc->createTextNode($user['summary'])); $xuser->appendChild($summary); } $node->appendChild($xuser); } } /** * Unserializes the property. * * This static method should return a an instance of this object. * * @param \DOMElement $prop * @return DAV\IProperty */ static function unserialize(\DOMElement $prop) { $xpath = new \DOMXPath($prop->ownerDocument); $xpath->registerNamespace('cs', CalDAV\Plugin::NS_CALENDARSERVER); $xpath->registerNamespace('d', 'urn:DAV'); $users = array(); foreach($xpath->query('cs:user', $prop) as $user) { $status = null; if ($xpath->evaluate('boolean(cs:invite-accepted)', $user)) { $status = SharingPlugin::STATUS_ACCEPTED; } elseif ($xpath->evaluate('boolean(cs:invite-declined)', $user)) { $status = SharingPlugin::STATUS_DECLINED; } elseif ($xpath->evaluate('boolean(cs:invite-noresponse)', $user)) { $status = SharingPlugin::STATUS_NORESPONSE; } elseif ($xpath->evaluate('boolean(cs:invite-invalid)', $user)) { $status = SharingPlugin::STATUS_INVALID; } else { throw new DAV\Exception('Every cs:user property must have one of cs:invite-accepted, cs:invite-declined, cs:invite-noresponse or cs:invite-invalid'); } $users[] = array( 'href' => $xpath->evaluate('string(d:href)', $user), 'commonName' => $xpath->evaluate('string(cs:common-name)', $user), 'readOnly' => $xpath->evaluate('boolean(cs:access/cs:read)', $user), 'summary' => $xpath->evaluate('string(cs:summary)', $user), 'status' => $status, ); } return new self($users); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Property/ScheduleCalendarTransp.php000066400000000000000000000051421246001162500252150ustar00rootroot00000000000000value = $value; } /** * Returns the current value * * @return string */ public function getValue() { return $this->value; } /** * Serializes the property in a DOMDocument * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serialize(DAV\Server $server,\DOMElement $node) { $doc = $node->ownerDocument; switch($this->value) { case self::TRANSPARENT : $xval = $doc->createElement('cal:transparent'); break; case self::OPAQUE : $xval = $doc->createElement('cal:opaque'); break; } $node->appendChild($xval); } /** * Unserializes the DOMElement back into a Property class. * * @param \DOMElement $node * @return ScheduleCalendarTransp */ static function unserialize(\DOMElement $node) { $value = null; foreach($node->childNodes as $childNode) { switch(DAV\XMLUtil::toClarkNotation($childNode)) { case '{' . CalDAV\Plugin::NS_CALDAV . '}opaque' : $value = self::OPAQUE; break; case '{' . CalDAV\Plugin::NS_CALDAV . '}transparent' : $value = self::TRANSPARENT; break; } } if (is_null($value)) return null; return new self($value); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Property/SupportedCalendarComponentSet.php000066400000000000000000000040011246001162500266060ustar00rootroot00000000000000components = $components; } /** * Returns the list of supported components * * @return array */ public function getValue() { return $this->components; } /** * Serializes the property in a DOMDocument * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serialize(DAV\Server $server,\DOMElement $node) { $doc = $node->ownerDocument; foreach($this->components as $component) { $xcomp = $doc->createElement('cal:comp'); $xcomp->setAttribute('name',$component); $node->appendChild($xcomp); } } /** * Unserializes the DOMElement back into a Property class. * * @param \DOMElement $node * @return Property_SupportedCalendarComponentSet */ static function unserialize(\DOMElement $node) { $components = array(); foreach($node->childNodes as $childNode) { if (DAV\XMLUtil::toClarkNotation($childNode)==='{' . CalDAV\Plugin::NS_CALDAV . '}comp') { $components[] = $childNode->getAttribute('name'); } } return new self($components); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Property/SupportedCalendarData.php000066400000000000000000000022101246001162500250410ustar00rootroot00000000000000ownerDocument; $prefix = isset($server->xmlNamespaces[Plugin::NS_CALDAV])?$server->xmlNamespaces[Plugin::NS_CALDAV]:'cal'; $caldata = $doc->createElement($prefix . ':calendar-data'); $caldata->setAttribute('content-type','text/calendar'); $caldata->setAttribute('version','2.0'); $node->appendChild($caldata); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Property/SupportedCollationSet.php000066400000000000000000000022441246001162500251450ustar00rootroot00000000000000ownerDocument; $prefix = $node->lookupPrefix('urn:ietf:params:xml:ns:caldav'); if (!$prefix) $prefix = 'cal'; $node->appendChild( $doc->createElement($prefix . ':supported-collation','i;ascii-casemap') ); $node->appendChild( $doc->createElement($prefix . ':supported-collation','i;octet') ); $node->appendChild( $doc->createElement($prefix . ':supported-collation','i;unicode-casemap') ); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Schedule/000077500000000000000000000000001246001162500200345ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/CalDAV/Schedule/IMip.php000066400000000000000000000063601246001162500214100ustar00rootroot00000000000000senderEmail = $senderEmail; } /** * Sends one or more iTip messages through email. * * @param string $originator Originator Email * @param array $recipients Array of email addresses * @param VObject\Component $vObject * @param string $principal Principal Url of the originator * @return void */ public function sendMessage($originator, array $recipients, VObject\Component $vObject, $principal) { foreach($recipients as $recipient) { $to = $recipient; $replyTo = $originator; $subject = 'SabreDAV iTIP message'; switch(strtoupper($vObject->METHOD)) { case 'REPLY' : $subject = 'Response for: ' . $vObject->VEVENT->SUMMARY; break; case 'REQUEST' : $subject = 'Invitation for: ' .$vObject->VEVENT->SUMMARY; break; case 'CANCEL' : $subject = 'Cancelled event: ' . $vObject->VEVENT->SUMMARY; break; } $headers = array(); $headers[] = 'Reply-To: ' . $replyTo; $headers[] = 'From: ' . $this->senderEmail; $headers[] = 'Content-Type: text/calendar; method=' . (string)$vObject->method . '; charset=utf-8'; if (DAV\Server::$exposeVersion) { $headers[] = 'X-Sabre-Version: ' . DAV\Version::VERSION . '-' . DAV\Version::STABILITY; } $vcalBody = $vObject->serialize(); $this->mail($to, $subject, $vcalBody, $headers); } } // @codeCoverageIgnoreStart // This is deemed untestable in a reasonable manner /** * This function is reponsible for sending the actual email. * * @param string $to Recipient email address * @param string $subject Subject of the email * @param string $body iCalendar body * @param array $headers List of headers * @return void */ protected function mail($to, $subject, $body, array $headers) { mail($to, $subject, $body, implode("\r\n", $headers)); } // @codeCoverageIgnoreEnd } sabre-dav-1.8.12/lib/Sabre/CalDAV/Schedule/IOutbox.php000066400000000000000000000006071246001162500221410ustar00rootroot00000000000000principalUri = $principalUri; } /** * Returns the name of the node. * * This is used to generate the url. * * @return string */ public function getName() { return 'outbox'; } /** * Returns an array with all the child nodes * * @return \Sabre\DAV\INode[] */ public function getChildren() { return array(); } /** * Returns the owner principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getOwner() { return $this->principalUri; } /** * Returns a group principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getGroup() { return null; } /** * Returns a list of ACE's for this node. * * Each ACE has the following properties: * * 'privilege', a string such as {DAV:}read or {DAV:}write. These are * currently the only supported privileges * * 'principal', a url to the principal who owns the node * * 'protected' (optional), indicating that this ACE is not allowed to * be updated. * * @return array */ public function getACL() { return array( array( 'privilege' => '{' . CalDAV\Plugin::NS_CALDAV . '}schedule-query-freebusy', 'principal' => $this->getOwner(), 'protected' => true, ), array( 'privilege' => '{' . CalDAV\Plugin::NS_CALDAV . '}schedule-post-vevent', 'principal' => $this->getOwner(), 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => $this->getOwner(), 'protected' => true, ), ); } /** * Updates the ACL * * This method will receive a list of new ACE's. * * @param array $acl * @return void */ public function setACL(array $acl) { throw new DAV\Exception\MethodNotAllowed('You\'re not allowed to update the ACL'); } /** * Returns the list of supported privileges for this node. * * The returned data structure is a list of nested privileges. * See Sabre\DAVACL\Plugin::getDefaultSupportedPrivilegeSet for a simple * standard structure. * * If null is returned from this method, the default privilege set is used, * which is fine for most common usecases. * * @return array|null */ public function getSupportedPrivilegeSet() { $default = DAVACL\Plugin::getDefaultSupportedPrivilegeSet(); $default['aggregates'][] = array( 'privilege' => '{' . CalDAV\Plugin::NS_CALDAV . '}schedule-query-freebusy', ); $default['aggregates'][] = array( 'privilege' => '{' . CalDAV\Plugin::NS_CALDAV . '}schedule-post-vevent', ); return $default; } } sabre-dav-1.8.12/lib/Sabre/CalDAV/ShareableCalendar.php000066400000000000000000000040351246001162500223330ustar00rootroot00000000000000caldavBackend->updateShares($this->calendarInfo['id'], $add, $remove); } /** * Returns the list of people whom this calendar is shared with. * * Every element in this array should have the following properties: * * href - Often a mailto: address * * commonName - Optional, for example a first + last name * * status - See the Sabre\CalDAV\SharingPlugin::STATUS_ constants. * * readOnly - boolean * * summary - Optional, a description for the share * * @return array */ public function getShares() { return $this->caldavBackend->getShares($this->calendarInfo['id']); } /** * Marks this calendar as published. * * Publishing a calendar should automatically create a read-only, public, * subscribable calendar. * * @param bool $value * @return void */ public function setPublishStatus($value) { $this->caldavBackend->setPublishStatus($this->calendarInfo['id'], $value); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/SharedCalendar.php000066400000000000000000000064651246001162500216640ustar00rootroot00000000000000calendarInfo['{http://calendarserver.org/ns/}shared-url']; } /** * Returns the owner principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getOwner() { return $this->calendarInfo['{http://sabredav.org/ns}owner-principal']; } /** * Returns a list of ACE's for this node. * * Each ACE has the following properties: * * 'privilege', a string such as {DAV:}read or {DAV:}write. These are * currently the only supported privileges * * 'principal', a url to the principal who owns the node * * 'protected' (optional), indicating that this ACE is not allowed to * be updated. * * @return array */ public function getACL() { // The top-level ACL only contains access information for the true // owner of the calendar, so we need to add the information for the // sharee. $acl = parent::getACL(); $acl[] = array( 'privilege' => '{DAV:}read', 'principal' => $this->calendarInfo['principaluri'], 'protected' => true, ); if (!$this->calendarInfo['{http://sabredav.org/ns}read-only']) { $acl[] = array( 'privilege' => '{DAV:}write', 'principal' => $this->calendarInfo['principaluri'], 'protected' => true, ); } return $acl; } /** * Returns the list of people whom this calendar is shared with. * * Every element in this array should have the following properties: * * href - Often a mailto: address * * commonName - Optional, for example a first + last name * * status - See the Sabre\CalDAV\SharingPlugin::STATUS_ constants. * * readOnly - boolean * * summary - Optional, a description for the share * * @return array */ public function getShares() { return $this->caldavBackend->getShares($this->calendarInfo['id']); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/SharingPlugin.php000066400000000000000000000430061246001162500215660ustar00rootroot00000000000000server = $server; $server->resourceTypeMapping['Sabre\\CalDAV\\ISharedCalendar'] = '{' . Plugin::NS_CALENDARSERVER . '}shared'; array_push( $this->server->protectedProperties, '{' . Plugin::NS_CALENDARSERVER . '}invite', '{' . Plugin::NS_CALENDARSERVER . '}allowed-sharing-modes', '{' . Plugin::NS_CALENDARSERVER . '}shared-url' ); $this->server->subscribeEvent('beforeGetProperties', array($this, 'beforeGetProperties')); $this->server->subscribeEvent('afterGetProperties', array($this, 'afterGetProperties')); $this->server->subscribeEvent('updateProperties', array($this, 'updateProperties')); $this->server->subscribeEvent('unknownMethod', array($this,'unknownMethod')); } /** * This event is triggered when properties are requested for a certain * node. * * This allows us to inject any properties early. * * @param string $path * @param DAV\INode $node * @param array $requestedProperties * @param array $returnedProperties * @return void */ public function beforeGetProperties($path, DAV\INode $node, &$requestedProperties, &$returnedProperties) { if ($node instanceof IShareableCalendar) { if (($index = array_search('{' . Plugin::NS_CALENDARSERVER . '}invite', $requestedProperties))!==false) { unset($requestedProperties[$index]); $returnedProperties[200]['{' . Plugin::NS_CALENDARSERVER . '}invite'] = new Property\Invite( $node->getShares() ); } } if ($node instanceof ISharedCalendar) { if (($index = array_search('{' . Plugin::NS_CALENDARSERVER . '}shared-url', $requestedProperties))!==false) { unset($requestedProperties[$index]); $returnedProperties[200]['{' . Plugin::NS_CALENDARSERVER . '}shared-url'] = new DAV\Property\Href( $node->getSharedUrl() ); } // The 'invite' property is slightly different for the 'shared' // instance of the calendar, as it also contains the owner // information. if (($index = array_search('{' . Plugin::NS_CALENDARSERVER . '}invite', $requestedProperties))!==false) { unset($requestedProperties[$index]); // Fetching owner information $props = $this->server->getPropertiesForPath($node->getOwner(), array( '{http://sabredav.org/ns}email-address', '{DAV:}displayname', ), 1); $ownerInfo = array( 'href' => $node->getOwner(), ); if (isset($props[0][200])) { // We're mapping the internal webdav properties to the // elements caldav-sharing expects. if (isset($props[0][200]['{http://sabredav.org/ns}email-address'])) { $ownerInfo['href'] = 'mailto:' . $props[0][200]['{http://sabredav.org/ns}email-address']; } if (isset($props[0][200]['{DAV:}displayname'])) { $ownerInfo['commonName'] = $props[0][200]['{DAV:}displayname']; } } $returnedProperties[200]['{' . Plugin::NS_CALENDARSERVER . '}invite'] = new Property\Invite( $node->getShares(), $ownerInfo ); } } } /** * This method is triggered *after* all properties have been retrieved. * This allows us to inject the correct resourcetype for calendars that * have been shared. * * @param string $path * @param array $properties * @param DAV\INode $node * @return void */ public function afterGetProperties($path, &$properties, DAV\INode $node) { if ($node instanceof IShareableCalendar) { if (isset($properties[200]['{DAV:}resourcetype'])) { if (count($node->getShares())>0) { $properties[200]['{DAV:}resourcetype']->add( '{' . Plugin::NS_CALENDARSERVER . '}shared-owner' ); } } $propName = '{' . Plugin::NS_CALENDARSERVER . '}allowed-sharing-modes'; if (array_key_exists($propName, $properties[404])) { unset($properties[404][$propName]); $properties[200][$propName] = new Property\AllowedSharingModes(true,false); } } } /** * This method is trigged when a user attempts to update a node's * properties. * * A previous draft of the sharing spec stated that it was possible to use * PROPPATCH to remove 'shared-owner' from the resourcetype, thus unsharing * the calendar. * * Even though this is no longer in the current spec, we keep this around * because OS X 10.7 may still make use of this feature. * * @param array $mutations * @param array $result * @param DAV\INode $node * @return void */ public function updateProperties(array &$mutations, array &$result, DAV\INode $node) { if (!$node instanceof IShareableCalendar) return; if (!isset($mutations['{DAV:}resourcetype'])) { return; } // Only doing something if shared-owner is indeed not in the list. if($mutations['{DAV:}resourcetype']->is('{' . Plugin::NS_CALENDARSERVER . '}shared-owner')) return; $shares = $node->getShares(); $remove = array(); foreach($shares as $share) { $remove[] = $share['href']; } $node->updateShares(array(), $remove); // We're marking this update as 200 OK $result[200]['{DAV:}resourcetype'] = null; // Removing it from the mutations list unset($mutations['{DAV:}resourcetype']); } /** * This event is triggered when the server didn't know how to handle a * certain request. * * We intercept this to handle POST requests on calendars. * * @param string $method * @param string $uri * @return null|bool */ public function unknownMethod($method, $uri) { if ($method!=='POST') { return; } // Only handling xml $contentType = $this->server->httpRequest->getHeader('Content-Type'); if (strpos($contentType,'application/xml')===false && strpos($contentType,'text/xml')===false) return; // Making sure the node exists try { $node = $this->server->tree->getNodeForPath($uri); } catch (DAV\Exception\NotFound $e) { return; } $requestBody = $this->server->httpRequest->getBody(true); // If this request handler could not deal with this POST request, it // will return 'null' and other plugins get a chance to handle the // request. // // However, we already requested the full body. This is a problem, // because a body can only be read once. This is why we preemptively // re-populated the request body with the existing data. $this->server->httpRequest->setBody($requestBody); $dom = DAV\XMLUtil::loadDOMDocument($requestBody); $documentType = DAV\XMLUtil::toClarkNotation($dom->firstChild); switch($documentType) { // Dealing with the 'share' document, which modified invitees on a // calendar. case '{' . Plugin::NS_CALENDARSERVER . '}share' : // We can only deal with IShareableCalendar objects if (!$node instanceof IShareableCalendar) { return; } // Getting ACL info $acl = $this->server->getPlugin('acl'); // If there's no ACL support, we allow everything if ($acl) { $acl->checkPrivileges($uri, '{DAV:}write'); } $mutations = $this->parseShareRequest($dom); $node->updateShares($mutations[0], $mutations[1]); $this->server->httpResponse->sendStatus(200); // Adding this because sending a response body may cause issues, // and I wanted some type of indicator the response was handled. $this->server->httpResponse->setHeader('X-Sabre-Status', 'everything-went-well'); // Breaking the event chain return false; // The invite-reply document is sent when the user replies to an // invitation of a calendar share. case '{'. Plugin::NS_CALENDARSERVER.'}invite-reply' : // This only works on the calendar-home-root node. if (!$node instanceof UserCalendars) { return; } // Getting ACL info $acl = $this->server->getPlugin('acl'); // If there's no ACL support, we allow everything if ($acl) { $acl->checkPrivileges($uri, '{DAV:}write'); } $message = $this->parseInviteReplyRequest($dom); $url = $node->shareReply( $message['href'], $message['status'], $message['calendarUri'], $message['inReplyTo'], $message['summary'] ); $this->server->httpResponse->sendStatus(200); // Adding this because sending a response body may cause issues, // and I wanted some type of indicator the response was handled. $this->server->httpResponse->setHeader('X-Sabre-Status', 'everything-went-well'); if ($url) { $dom = new \DOMDocument('1.0', 'UTF-8'); $dom->formatOutput = true; $root = $dom->createElement('cs:shared-as'); foreach($this->server->xmlNamespaces as $namespace => $prefix) { $root->setAttribute('xmlns:' . $prefix, $namespace); } $dom->appendChild($root); $href = new DAV\Property\Href($url); $href->serialize($this->server, $root); $this->server->httpResponse->setHeader('Content-Type','application/xml'); $this->server->httpResponse->sendBody($dom->saveXML()); } // Breaking the event chain return false; case '{' . Plugin::NS_CALENDARSERVER . '}publish-calendar' : // We can only deal with IShareableCalendar objects if (!$node instanceof IShareableCalendar) { return; } // Getting ACL info $acl = $this->server->getPlugin('acl'); // If there's no ACL support, we allow everything if ($acl) { $acl->checkPrivileges($uri, '{DAV:}write'); } $node->setPublishStatus(true); // iCloud sends back the 202, so we will too. $this->server->httpResponse->sendStatus(202); // Adding this because sending a response body may cause issues, // and I wanted some type of indicator the response was handled. $this->server->httpResponse->setHeader('X-Sabre-Status', 'everything-went-well'); // Breaking the event chain return false; case '{' . Plugin::NS_CALENDARSERVER . '}unpublish-calendar' : // We can only deal with IShareableCalendar objects if (!$node instanceof IShareableCalendar) { return; } // Getting ACL info $acl = $this->server->getPlugin('acl'); // If there's no ACL support, we allow everything if ($acl) { $acl->checkPrivileges($uri, '{DAV:}write'); } $node->setPublishStatus(false); $this->server->httpResponse->sendStatus(200); // Adding this because sending a response body may cause issues, // and I wanted some type of indicator the response was handled. $this->server->httpResponse->setHeader('X-Sabre-Status', 'everything-went-well'); // Breaking the event chain return false; } } /** * Parses the 'share' POST request. * * This method returns an array, containing two arrays. * The first array is a list of new sharees. Every element is a struct * containing a: * * href element. (usually a mailto: address) * * commonName element (often a first and lastname, but can also be * false) * * readOnly (true or false) * * summary (A description of the share, can also be false) * * The second array is a list of sharees that are to be removed. This is * just a simple array with 'hrefs'. * * @param \DOMDocument $dom * @return array */ protected function parseShareRequest(\DOMDocument $dom) { $xpath = new \DOMXPath($dom); $xpath->registerNamespace('cs', Plugin::NS_CALENDARSERVER); $xpath->registerNamespace('d', 'urn:DAV'); $set = array(); $elems = $xpath->query('cs:set'); for($i=0; $i < $elems->length; $i++) { $xset = $elems->item($i); $set[] = array( 'href' => $xpath->evaluate('string(d:href)', $xset), 'commonName' => $xpath->evaluate('string(cs:common-name)', $xset), 'summary' => $xpath->evaluate('string(cs:summary)', $xset), 'readOnly' => $xpath->evaluate('boolean(cs:read)', $xset)!==false ); } $remove = array(); $elems = $xpath->query('cs:remove'); for($i=0; $i < $elems->length; $i++) { $xremove = $elems->item($i); $remove[] = $xpath->evaluate('string(d:href)', $xremove); } return array($set, $remove); } /** * Parses the 'invite-reply' POST request. * * This method returns an array, containing the following properties: * * href - The sharee who is replying * * status - One of the self::STATUS_* constants * * calendarUri - The url of the shared calendar * * inReplyTo - The unique id of the share invitation. * * summary - Optional description of the reply. * * @param \DOMDocument $dom * @return array */ protected function parseInviteReplyRequest(\DOMDocument $dom) { $xpath = new \DOMXPath($dom); $xpath->registerNamespace('cs', Plugin::NS_CALENDARSERVER); $xpath->registerNamespace('d', 'urn:DAV'); $hostHref = $xpath->evaluate('string(cs:hosturl/d:href)'); if (!$hostHref) { throw new DAV\Exception\BadRequest('The {' . Plugin::NS_CALENDARSERVER . '}hosturl/{DAV:}href element is required'); } return array( 'href' => $xpath->evaluate('string(d:href)'), 'calendarUri' => $this->server->calculateUri($hostHref), 'inReplyTo' => $xpath->evaluate('string(cs:in-reply-to)'), 'summary' => $xpath->evaluate('string(cs:summary)'), 'status' => $xpath->evaluate('boolean(cs:invite-accepted)')?self::STATUS_ACCEPTED:self::STATUS_DECLINED ); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/UserCalendars.php000066400000000000000000000215351246001162500215520ustar00rootroot00000000000000caldavBackend = $caldavBackend; $this->principalInfo = $principalInfo; } /** * Returns the name of this object * * @return string */ public function getName() { list(,$name) = DAV\URLUtil::splitPath($this->principalInfo['uri']); return $name; } /** * Updates the name of this object * * @param string $name * @return void */ public function setName($name) { throw new DAV\Exception\Forbidden(); } /** * Deletes this object * * @return void */ public function delete() { throw new DAV\Exception\Forbidden(); } /** * Returns the last modification date * * @return int */ public function getLastModified() { return null; } /** * Creates a new file under this object. * * This is currently not allowed * * @param string $filename * @param resource $data * @return void */ public function createFile($filename, $data=null) { throw new DAV\Exception\MethodNotAllowed('Creating new files in this collection is not supported'); } /** * Creates a new directory under this object. * * This is currently not allowed. * * @param string $filename * @return void */ public function createDirectory($filename) { throw new DAV\Exception\MethodNotAllowed('Creating new collections in this collection is not supported'); } /** * Returns a single calendar, by name * * @param string $name * @todo needs optimizing * @return Calendar */ public function getChild($name) { foreach($this->getChildren() as $child) { if ($name==$child->getName()) return $child; } throw new DAV\Exception\NotFound('Calendar with name \'' . $name . '\' could not be found'); } /** * Checks if a calendar exists. * * @param string $name * @todo needs optimizing * @return bool */ public function childExists($name) { foreach($this->getChildren() as $child) { if ($name==$child->getName()) return true; } return false; } /** * Returns a list of calendars * * @return array */ public function getChildren() { $calendars = $this->caldavBackend->getCalendarsForUser($this->principalInfo['uri']); $objs = array(); foreach($calendars as $calendar) { if ($this->caldavBackend instanceof Backend\SharingSupport) { if (isset($calendar['{http://calendarserver.org/ns/}shared-url'])) { $objs[] = new SharedCalendar($this->caldavBackend, $calendar); } else { $objs[] = new ShareableCalendar($this->caldavBackend, $calendar); } } else { $objs[] = new Calendar($this->caldavBackend, $calendar); } } $objs[] = new Schedule\Outbox($this->principalInfo['uri']); // We're adding a notifications node, if it's supported by the backend. if ($this->caldavBackend instanceof Backend\NotificationSupport) { $objs[] = new Notifications\Collection($this->caldavBackend, $this->principalInfo['uri']); } return $objs; } /** * Creates a new calendar * * @param string $name * @param array $resourceType * @param array $properties * @return void */ public function createExtendedCollection($name, array $resourceType, array $properties) { $isCalendar = false; foreach($resourceType as $rt) { switch ($rt) { case '{DAV:}collection' : case '{http://calendarserver.org/ns/}shared-owner' : // ignore break; case '{urn:ietf:params:xml:ns:caldav}calendar' : $isCalendar = true; break; default : throw new DAV\Exception\InvalidResourceType('Unknown resourceType: ' . $rt); } } if (!$isCalendar) { throw new DAV\Exception\InvalidResourceType('You can only create calendars in this collection'); } $this->caldavBackend->createCalendar($this->principalInfo['uri'], $name, $properties); } /** * Returns the owner principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getOwner() { return $this->principalInfo['uri']; } /** * Returns a group principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getGroup() { return null; } /** * Returns a list of ACE's for this node. * * Each ACE has the following properties: * * 'privilege', a string such as {DAV:}read or {DAV:}write. These are * currently the only supported privileges * * 'principal', a url to the principal who owns the node * * 'protected' (optional), indicating that this ACE is not allowed to * be updated. * * @return array */ public function getACL() { return array( array( 'privilege' => '{DAV:}read', 'principal' => $this->principalInfo['uri'], 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => $this->principalInfo['uri'], 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => $this->principalInfo['uri'] . '/calendar-proxy-write', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => $this->principalInfo['uri'] . '/calendar-proxy-write', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => $this->principalInfo['uri'] . '/calendar-proxy-read', 'protected' => true, ), ); } /** * Updates the ACL * * This method will receive a list of new ACE's. * * @param array $acl * @return void */ public function setACL(array $acl) { throw new DAV\Exception\MethodNotAllowed('Changing ACL is not yet supported'); } /** * Returns the list of supported privileges for this node. * * The returned data structure is a list of nested privileges. * See Sabre\DAVACL\Plugin::getDefaultSupportedPrivilegeSet for a simple * standard structure. * * If null is returned from this method, the default privilege set is used, * which is fine for most common usecases. * * @return array|null */ public function getSupportedPrivilegeSet() { return null; } /** * This method is called when a user replied to a request to share. * * This method should return the url of the newly created calendar if the * share was accepted. * * @param string href The sharee who is replying (often a mailto: address) * @param int status One of the SharingPlugin::STATUS_* constants * @param string $calendarUri The url to the calendar thats being shared * @param string $inReplyTo The unique id this message is a response to * @param string $summary A description of the reply * @return null|string */ public function shareReply($href, $status, $calendarUri, $inReplyTo, $summary = null) { if (!$this->caldavBackend instanceof Backend\SharingSupport) { throw new DAV\Exception\NotImplemented('Sharing support is not implemented by this backend.'); } return $this->caldavBackend->shareReply($href, $status, $calendarUri, $inReplyTo, $summary); } } sabre-dav-1.8.12/lib/Sabre/CalDAV/Version.php000066400000000000000000000007071246001162500204420ustar00rootroot00000000000000carddavBackend = $carddavBackend; $this->addressBookInfo = $addressBookInfo; } /** * Returns the name of the addressbook * * @return string */ public function getName() { return $this->addressBookInfo['uri']; } /** * Returns a card * * @param string $name * @return \ICard */ public function getChild($name) { $obj = $this->carddavBackend->getCard($this->addressBookInfo['id'],$name); if (!$obj) throw new DAV\Exception\NotFound('Card not found'); return new Card($this->carddavBackend,$this->addressBookInfo,$obj); } /** * Returns the full list of cards * * @return array */ public function getChildren() { $objs = $this->carddavBackend->getCards($this->addressBookInfo['id']); $children = array(); foreach($objs as $obj) { $children[] = new Card($this->carddavBackend,$this->addressBookInfo,$obj); } return $children; } /** * Creates a new directory * * We actually block this, as subdirectories are not allowed in addressbooks. * * @param string $name * @return void */ public function createDirectory($name) { throw new DAV\Exception\MethodNotAllowed('Creating collections in addressbooks is not allowed'); } /** * Creates a new file * * The contents of the new file must be a valid VCARD. * * This method may return an ETag. * * @param string $name * @param resource $vcardData * @return string|null */ public function createFile($name,$vcardData = null) { if (is_resource($vcardData)) { $vcardData = stream_get_contents($vcardData); } // Converting to UTF-8, if needed $vcardData = DAV\StringUtil::ensureUTF8($vcardData); return $this->carddavBackend->createCard($this->addressBookInfo['id'],$name,$vcardData); } /** * Deletes the entire addressbook. * * @return void */ public function delete() { $this->carddavBackend->deleteAddressBook($this->addressBookInfo['id']); } /** * Renames the addressbook * * @param string $newName * @return void */ public function setName($newName) { throw new DAV\Exception\MethodNotAllowed('Renaming addressbooks is not yet supported'); } /** * Returns the last modification date as a unix timestamp. * * @return void */ public function getLastModified() { return null; } /** * Updates properties on this node, * * The properties array uses the propertyName in clark-notation as key, * and the array value for the property value. In the case a property * should be deleted, the property value will be null. * * This method must be atomic. If one property cannot be changed, the * entire operation must fail. * * If the operation was successful, true can be returned. * If the operation failed, false can be returned. * * Deletion of a non-existent property is always successful. * * Lastly, it is optional to return detailed information about any * failures. In this case an array should be returned with the following * structure: * * array( * 403 => array( * '{DAV:}displayname' => null, * ), * 424 => array( * '{DAV:}owner' => null, * ) * ) * * In this example it was forbidden to update {DAV:}displayname. * (403 Forbidden), which in turn also caused {DAV:}owner to fail * (424 Failed Dependency) because the request needs to be atomic. * * @param array $mutations * @return bool|array */ public function updateProperties($mutations) { return $this->carddavBackend->updateAddressBook($this->addressBookInfo['id'], $mutations); } /** * Returns a list of properties for this nodes. * * The properties list is a list of propertynames the client requested, * encoded in clark-notation {xmlnamespace}tagname * * If the array is empty, it means 'all properties' were requested. * * @param array $properties * @return array */ public function getProperties($properties) { $response = array(); foreach($properties as $propertyName) { if (isset($this->addressBookInfo[$propertyName])) { $response[$propertyName] = $this->addressBookInfo[$propertyName]; } } return $response; } /** * Returns the owner principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getOwner() { return $this->addressBookInfo['principaluri']; } /** * Returns a group principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getGroup() { return null; } /** * Returns a list of ACE's for this node. * * Each ACE has the following properties: * * 'privilege', a string such as {DAV:}read or {DAV:}write. These are * currently the only supported privileges * * 'principal', a url to the principal who owns the node * * 'protected' (optional), indicating that this ACE is not allowed to * be updated. * * @return array */ public function getACL() { return array( array( 'privilege' => '{DAV:}read', 'principal' => $this->addressBookInfo['principaluri'], 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => $this->addressBookInfo['principaluri'], 'protected' => true, ), ); } /** * Updates the ACL * * This method will receive a list of new ACE's. * * @param array $acl * @return void */ public function setACL(array $acl) { throw new DAV\Exception\MethodNotAllowed('Changing ACL is not yet supported'); } /** * Returns the list of supported privileges for this node. * * The returned data structure is a list of nested privileges. * See Sabre\DAVACL\Plugin::getDefaultSupportedPrivilegeSet for a simple * standard structure. * * If null is returned from this method, the default privilege set is used, * which is fine for most common usecases. * * @return array|null */ public function getSupportedPrivilegeSet() { return null; } } sabre-dav-1.8.12/lib/Sabre/CardDAV/AddressBookQueryParser.php000066400000000000000000000136331246001162500235740ustar00rootroot00000000000000dom = $dom; $this->xpath = new \DOMXPath($dom); $this->xpath->registerNameSpace('card',Plugin::NS_CARDDAV); } /** * Parses the request. * * @return void */ public function parse() { $filterNode = null; $limit = $this->xpath->evaluate('number(/card:addressbook-query/card:limit/card:nresults)'); if (is_nan($limit)) $limit = null; $filter = $this->xpath->query('/card:addressbook-query/card:filter'); // According to the CardDAV spec there needs to be exactly 1 filter // element. However, KDE 4.8.2 contains a bug that will encode 0 filter // elements, so this is a workaround for that. // // See: https://bugs.kde.org/show_bug.cgi?id=300047 if ($filter->length === 0) { $test = null; $filter = null; } elseif ($filter->length === 1) { $filter = $filter->item(0); $test = $this->xpath->evaluate('string(@test)', $filter); } else { throw new DAV\Exception\BadRequest('Only one filter element is allowed'); } if (!$test) $test = self::TEST_ANYOF; if ($test !== self::TEST_ANYOF && $test !== self::TEST_ALLOF) { throw new DAV\Exception\BadRequest('The test attribute must either hold "anyof" or "allof"'); } $propFilters = array(); $propFilterNodes = $this->xpath->query('card:prop-filter', $filter); for($ii=0; $ii < $propFilterNodes->length; $ii++) { $propFilters[] = $this->parsePropFilterNode($propFilterNodes->item($ii)); } $this->filters = $propFilters; $this->limit = $limit; $this->requestedProperties = array_keys(DAV\XMLUtil::parseProperties($this->dom->firstChild)); $this->test = $test; } /** * Parses the prop-filter xml element * * @param \DOMElement $propFilterNode * @return array */ protected function parsePropFilterNode(\DOMElement $propFilterNode) { $propFilter = array(); $propFilter['name'] = $propFilterNode->getAttribute('name'); $propFilter['test'] = $propFilterNode->getAttribute('test'); if (!$propFilter['test']) $propFilter['test'] = 'anyof'; $propFilter['is-not-defined'] = $this->xpath->query('card:is-not-defined', $propFilterNode)->length>0; $paramFilterNodes = $this->xpath->query('card:param-filter', $propFilterNode); $propFilter['param-filters'] = array(); for($ii=0;$ii<$paramFilterNodes->length;$ii++) { $propFilter['param-filters'][] = $this->parseParamFilterNode($paramFilterNodes->item($ii)); } $propFilter['text-matches'] = array(); $textMatchNodes = $this->xpath->query('card:text-match', $propFilterNode); for($ii=0;$ii<$textMatchNodes->length;$ii++) { $propFilter['text-matches'][] = $this->parseTextMatchNode($textMatchNodes->item($ii)); } return $propFilter; } /** * Parses the param-filter element * * @param \DOMElement $paramFilterNode * @return array */ public function parseParamFilterNode(\DOMElement $paramFilterNode) { $paramFilter = array(); $paramFilter['name'] = $paramFilterNode->getAttribute('name'); $paramFilter['is-not-defined'] = $this->xpath->query('card:is-not-defined', $paramFilterNode)->length>0; $paramFilter['text-match'] = null; $textMatch = $this->xpath->query('card:text-match', $paramFilterNode); if ($textMatch->length>0) { $paramFilter['text-match'] = $this->parseTextMatchNode($textMatch->item(0)); } return $paramFilter; } /** * Text match * * @param \DOMElement $textMatchNode * @return array */ public function parseTextMatchNode(\DOMElement $textMatchNode) { $matchType = $textMatchNode->getAttribute('match-type'); if (!$matchType) $matchType = 'contains'; if (!in_array($matchType, array('contains', 'equals', 'starts-with', 'ends-with'))) { throw new DAV\Exception\BadRequest('Unknown match-type: ' . $matchType); } $negateCondition = $textMatchNode->getAttribute('negate-condition'); $negateCondition = $negateCondition==='yes'; $collation = $textMatchNode->getAttribute('collation'); if (!$collation) $collation = 'i;unicode-casemap'; return array( 'negate-condition' => $negateCondition, 'collation' => $collation, 'match-type' => $matchType, 'value' => $textMatchNode->nodeValue ); } } sabre-dav-1.8.12/lib/Sabre/CardDAV/AddressBookRoot.php000066400000000000000000000041561246001162500222350ustar00rootroot00000000000000carddavBackend = $carddavBackend; parent::__construct($principalBackend, $principalPrefix); } /** * Returns the name of the node * * @return string */ public function getName() { return Plugin::ADDRESSBOOK_ROOT; } /** * This method returns a node for a principal. * * The passed array contains principal information, and is guaranteed to * at least contain a uri item. Other properties may or may not be * supplied by the authentication backend. * * @param array $principal * @return \Sabre\DAV\INode */ public function getChildForPrincipal(array $principal) { return new UserAddressBooks($this->carddavBackend, $principal['uri']); } } sabre-dav-1.8.12/lib/Sabre/CardDAV/Backend/000077500000000000000000000000001246001162500200015ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/CardDAV/Backend/AbstractBackend.php000066400000000000000000000007021246001162500235240ustar00rootroot00000000000000pdo = $pdo; $this->addressBooksTableName = $addressBooksTableName; $this->cardsTableName = $cardsTableName; } /** * Returns the list of addressbooks for a specific user. * * @param string $principalUri * @return array */ public function getAddressBooksForUser($principalUri) { $stmt = $this->pdo->prepare('SELECT id, uri, displayname, principaluri, description, ctag FROM '.$this->addressBooksTableName.' WHERE principaluri = ?'); $stmt->execute(array($principalUri)); $addressBooks = array(); foreach($stmt->fetchAll() as $row) { $addressBooks[] = array( 'id' => $row['id'], 'uri' => $row['uri'], 'principaluri' => $row['principaluri'], '{DAV:}displayname' => $row['displayname'], '{' . CardDAV\Plugin::NS_CARDDAV . '}addressbook-description' => $row['description'], '{http://calendarserver.org/ns/}getctag' => $row['ctag'], '{' . CardDAV\Plugin::NS_CARDDAV . '}supported-address-data' => new CardDAV\Property\SupportedAddressData(), ); } return $addressBooks; } /** * Updates an addressbook's properties * * See Sabre\DAV\IProperties for a description of the mutations array, as * well as the return value. * * @param mixed $addressBookId * @param array $mutations * @see Sabre\DAV\IProperties::updateProperties * @return bool|array */ public function updateAddressBook($addressBookId, array $mutations) { $updates = array(); foreach($mutations as $property=>$newValue) { switch($property) { case '{DAV:}displayname' : $updates['displayname'] = $newValue; break; case '{' . CardDAV\Plugin::NS_CARDDAV . '}addressbook-description' : $updates['description'] = $newValue; break; default : // If any unsupported values were being updated, we must // let the entire request fail. return false; } } // No values are being updated? if (!$updates) { return false; } $query = 'UPDATE ' . $this->addressBooksTableName . ' SET ctag = ctag + 1 '; foreach($updates as $key=>$value) { $query.=', `' . $key . '` = :' . $key . ' '; } $query.=' WHERE id = :addressbookid'; $stmt = $this->pdo->prepare($query); $updates['addressbookid'] = $addressBookId; $stmt->execute($updates); return true; } /** * Creates a new address book * * @param string $principalUri * @param string $url Just the 'basename' of the url. * @param array $properties * @return void */ public function createAddressBook($principalUri, $url, array $properties) { $values = array( 'displayname' => null, 'description' => null, 'principaluri' => $principalUri, 'uri' => $url, ); foreach($properties as $property=>$newValue) { switch($property) { case '{DAV:}displayname' : $values['displayname'] = $newValue; break; case '{' . CardDAV\Plugin::NS_CARDDAV . '}addressbook-description' : $values['description'] = $newValue; break; default : throw new DAV\Exception\BadRequest('Unknown property: ' . $property); } } $query = 'INSERT INTO ' . $this->addressBooksTableName . ' (uri, displayname, description, principaluri, ctag) VALUES (:uri, :displayname, :description, :principaluri, 1)'; $stmt = $this->pdo->prepare($query); $stmt->execute($values); } /** * Deletes an entire addressbook and all its contents * * @param int $addressBookId * @return void */ public function deleteAddressBook($addressBookId) { $stmt = $this->pdo->prepare('DELETE FROM ' . $this->cardsTableName . ' WHERE addressbookid = ?'); $stmt->execute(array($addressBookId)); $stmt = $this->pdo->prepare('DELETE FROM ' . $this->addressBooksTableName . ' WHERE id = ?'); $stmt->execute(array($addressBookId)); } /** * Returns all cards for a specific addressbook id. * * This method should return the following properties for each card: * * carddata - raw vcard data * * uri - Some unique url * * lastmodified - A unix timestamp * * It's recommended to also return the following properties: * * etag - A unique etag. This must change every time the card changes. * * size - The size of the card in bytes. * * If these last two properties are provided, less time will be spent * calculating them. If they are specified, you can also ommit carddata. * This may speed up certain requests, especially with large cards. * * @param mixed $addressbookId * @return array */ public function getCards($addressbookId) { $stmt = $this->pdo->prepare('SELECT id, carddata, uri, lastmodified FROM ' . $this->cardsTableName . ' WHERE addressbookid = ?'); $stmt->execute(array($addressbookId)); return $stmt->fetchAll(\PDO::FETCH_ASSOC); } /** * Returns a specfic card. * * The same set of properties must be returned as with getCards. The only * exception is that 'carddata' is absolutely required. * * @param mixed $addressBookId * @param string $cardUri * @return array */ public function getCard($addressBookId, $cardUri) { $stmt = $this->pdo->prepare('SELECT id, carddata, uri, lastmodified FROM ' . $this->cardsTableName . ' WHERE addressbookid = ? AND uri = ? LIMIT 1'); $stmt->execute(array($addressBookId, $cardUri)); $result = $stmt->fetchAll(\PDO::FETCH_ASSOC); return (count($result)>0?$result[0]:false); } /** * Creates a new card. * * The addressbook id will be passed as the first argument. This is the * same id as it is returned from the getAddressbooksForUser method. * * The cardUri is a base uri, and doesn't include the full path. The * cardData argument is the vcard body, and is passed as a string. * * It is possible to return an ETag from this method. This ETag is for the * newly created resource, and must be enclosed with double quotes (that * is, the string itself must contain the double quotes). * * You should only return the ETag if you store the carddata as-is. If a * subsequent GET request on the same card does not have the same body, * byte-by-byte and you did return an ETag here, clients tend to get * confused. * * If you don't return an ETag, you can just return null. * * @param mixed $addressBookId * @param string $cardUri * @param string $cardData * @return string|null */ public function createCard($addressBookId, $cardUri, $cardData) { $stmt = $this->pdo->prepare('INSERT INTO ' . $this->cardsTableName . ' (carddata, uri, lastmodified, addressbookid) VALUES (?, ?, ?, ?)'); $result = $stmt->execute(array($cardData, $cardUri, time(), $addressBookId)); $stmt2 = $this->pdo->prepare('UPDATE ' . $this->addressBooksTableName . ' SET ctag = ctag + 1 WHERE id = ?'); $stmt2->execute(array($addressBookId)); return '"' . md5($cardData) . '"'; } /** * Updates a card. * * The addressbook id will be passed as the first argument. This is the * same id as it is returned from the getAddressbooksForUser method. * * The cardUri is a base uri, and doesn't include the full path. The * cardData argument is the vcard body, and is passed as a string. * * It is possible to return an ETag from this method. This ETag should * match that of the updated resource, and must be enclosed with double * quotes (that is: the string itself must contain the actual quotes). * * You should only return the ETag if you store the carddata as-is. If a * subsequent GET request on the same card does not have the same body, * byte-by-byte and you did return an ETag here, clients tend to get * confused. * * If you don't return an ETag, you can just return null. * * @param mixed $addressBookId * @param string $cardUri * @param string $cardData * @return string|null */ public function updateCard($addressBookId, $cardUri, $cardData) { $stmt = $this->pdo->prepare('UPDATE ' . $this->cardsTableName . ' SET carddata = ?, lastmodified = ? WHERE uri = ? AND addressbookid =?'); $stmt->execute(array($cardData, time(), $cardUri, $addressBookId)); $stmt2 = $this->pdo->prepare('UPDATE ' . $this->addressBooksTableName . ' SET ctag = ctag + 1 WHERE id = ?'); $stmt2->execute(array($addressBookId)); return '"' . md5($cardData) . '"'; } /** * Deletes a card * * @param mixed $addressBookId * @param string $cardUri * @return bool */ public function deleteCard($addressBookId, $cardUri) { $stmt = $this->pdo->prepare('DELETE FROM ' . $this->cardsTableName . ' WHERE addressbookid = ? AND uri = ?'); $stmt->execute(array($addressBookId, $cardUri)); $stmt2 = $this->pdo->prepare('UPDATE ' . $this->addressBooksTableName . ' SET ctag = ctag + 1 WHERE id = ?'); $stmt2->execute(array($addressBookId)); return $stmt->rowCount()===1; } } sabre-dav-1.8.12/lib/Sabre/CardDAV/Card.php000066400000000000000000000135211246001162500200360ustar00rootroot00000000000000carddavBackend = $carddavBackend; $this->addressBookInfo = $addressBookInfo; $this->cardData = $cardData; } /** * Returns the uri for this object * * @return string */ public function getName() { return $this->cardData['uri']; } /** * Returns the VCard-formatted object * * @return string */ public function get() { // Pre-populating 'carddata' is optional. If we don't yet have it // already, we fetch it from the backend. if (!isset($this->cardData['carddata'])) { $this->cardData = $this->carddavBackend->getCard($this->addressBookInfo['id'], $this->cardData['uri']); } return $this->cardData['carddata']; } /** * Updates the VCard-formatted object * * @param string $cardData * @return string|null */ public function put($cardData) { if (is_resource($cardData)) $cardData = stream_get_contents($cardData); // Converting to UTF-8, if needed $cardData = DAV\StringUtil::ensureUTF8($cardData); $etag = $this->carddavBackend->updateCard($this->addressBookInfo['id'],$this->cardData['uri'],$cardData); $this->cardData['carddata'] = $cardData; $this->cardData['etag'] = $etag; return $etag; } /** * Deletes the card * * @return void */ public function delete() { $this->carddavBackend->deleteCard($this->addressBookInfo['id'],$this->cardData['uri']); } /** * Returns the mime content-type * * @return string */ public function getContentType() { return 'text/x-vcard; charset=utf-8'; } /** * Returns an ETag for this object * * @return string */ public function getETag() { if (isset($this->cardData['etag'])) { return $this->cardData['etag']; } else { $data = $this->get(); if (is_string($data)) { return '"' . md5($data) . '"'; } else { // We refuse to calculate the md5 if it's a stream. return null; } } } /** * Returns the last modification date as a unix timestamp * * @return int */ public function getLastModified() { return isset($this->cardData['lastmodified'])?$this->cardData['lastmodified']:null; } /** * Returns the size of this object in bytes * * @return int */ public function getSize() { if (array_key_exists('size', $this->cardData)) { return $this->cardData['size']; } else { return strlen($this->get()); } } /** * Returns the owner principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getOwner() { return $this->addressBookInfo['principaluri']; } /** * Returns a group principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getGroup() { return null; } /** * Returns a list of ACE's for this node. * * Each ACE has the following properties: * * 'privilege', a string such as {DAV:}read or {DAV:}write. These are * currently the only supported privileges * * 'principal', a url to the principal who owns the node * * 'protected' (optional), indicating that this ACE is not allowed to * be updated. * * @return array */ public function getACL() { return array( array( 'privilege' => '{DAV:}read', 'principal' => $this->addressBookInfo['principaluri'], 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => $this->addressBookInfo['principaluri'], 'protected' => true, ), ); } /** * Updates the ACL * * This method will receive a list of new ACE's. * * @param array $acl * @return void */ public function setACL(array $acl) { throw new DAV\Exception\MethodNotAllowed('Changing ACL is not yet supported'); } /** * Returns the list of supported privileges for this node. * * The returned data structure is a list of nested privileges. * See Sabre\DAVACL\Plugin::getDefaultSupportedPrivilegeSet for a simple * standard structure. * * If null is returned from this method, the default privilege set is used, * which is fine for most common usecases. * * @return array|null */ public function getSupportedPrivilegeSet() { return null; } } sabre-dav-1.8.12/lib/Sabre/CardDAV/IAddressBook.php000066400000000000000000000006131246001162500214740ustar00rootroot00000000000000subscribeEvent('beforeGetProperties', array($this, 'beforeGetProperties')); $server->subscribeEvent('afterGetProperties', array($this, 'afterGetProperties')); $server->subscribeEvent('updateProperties', array($this, 'updateProperties')); $server->subscribeEvent('report', array($this,'report')); $server->subscribeEvent('onHTMLActionsPanel', array($this,'htmlActionsPanel')); $server->subscribeEvent('onBrowserPostAction', array($this,'browserPostAction')); $server->subscribeEvent('beforeWriteContent', array($this, 'beforeWriteContent')); $server->subscribeEvent('beforeCreateFile', array($this, 'beforeCreateFile')); /* Namespaces */ $server->xmlNamespaces[self::NS_CARDDAV] = 'card'; /* Mapping Interfaces to {DAV:}resourcetype values */ $server->resourceTypeMapping['Sabre\\CardDAV\\IAddressBook'] = '{' . self::NS_CARDDAV . '}addressbook'; $server->resourceTypeMapping['Sabre\\CardDAV\\IDirectory'] = '{' . self::NS_CARDDAV . '}directory'; /* Adding properties that may never be changed */ $server->protectedProperties[] = '{' . self::NS_CARDDAV . '}supported-address-data'; $server->protectedProperties[] = '{' . self::NS_CARDDAV . '}max-resource-size'; $server->protectedProperties[] = '{' . self::NS_CARDDAV . '}addressbook-home-set'; $server->protectedProperties[] = '{' . self::NS_CARDDAV . '}supported-collation-set'; $server->propertyMap['{http://calendarserver.org/ns/}me-card'] = 'Sabre\\DAV\\Property\\Href'; $this->server = $server; } /** * Returns a list of supported features. * * This is used in the DAV: header in the OPTIONS and PROPFIND requests. * * @return array */ public function getFeatures() { return array('addressbook'); } /** * Returns a list of reports this plugin supports. * * This will be used in the {DAV:}supported-report-set property. * Note that you still need to subscribe to the 'report' event to actually * implement them * * @param string $uri * @return array */ public function getSupportedReportSet($uri) { $node = $this->server->tree->getNodeForPath($uri); if ($node instanceof IAddressBook || $node instanceof ICard) { return array( '{' . self::NS_CARDDAV . '}addressbook-multiget', '{' . self::NS_CARDDAV . '}addressbook-query', ); } return array(); } /** * Adds all CardDAV-specific properties * * @param string $path * @param DAV\INode $node * @param array $requestedProperties * @param array $returnedProperties * @return void */ public function beforeGetProperties($path, DAV\INode $node, array &$requestedProperties, array &$returnedProperties) { if ($node instanceof DAVACL\IPrincipal) { // calendar-home-set property $addHome = '{' . self::NS_CARDDAV . '}addressbook-home-set'; if (in_array($addHome,$requestedProperties)) { $principalId = $node->getName(); $addressbookHomePath = self::ADDRESSBOOK_ROOT . '/' . $principalId . '/'; unset($requestedProperties[array_search($addHome, $requestedProperties)]); $returnedProperties[200][$addHome] = new DAV\Property\Href($addressbookHomePath); } $directories = '{' . self::NS_CARDDAV . '}directory-gateway'; if ($this->directories && in_array($directories, $requestedProperties)) { unset($requestedProperties[array_search($directories, $requestedProperties)]); $returnedProperties[200][$directories] = new DAV\Property\HrefList($this->directories); } } if ($node instanceof ICard) { // The address-data property is not supposed to be a 'real' // property, but in large chunks of the spec it does act as such. // Therefore we simply expose it as a property. $addressDataProp = '{' . self::NS_CARDDAV . '}address-data'; if (in_array($addressDataProp, $requestedProperties)) { unset($requestedProperties[$addressDataProp]); $val = $node->get(); if (is_resource($val)) $val = stream_get_contents($val); $returnedProperties[200][$addressDataProp] = $val; } } if ($node instanceof UserAddressBooks) { $meCardProp = '{http://calendarserver.org/ns/}me-card'; if (in_array($meCardProp, $requestedProperties)) { $props = $this->server->getProperties($node->getOwner(), array('{http://sabredav.org/ns}vcard-url')); if (isset($props['{http://sabredav.org/ns}vcard-url'])) { $returnedProperties[200][$meCardProp] = new DAV\Property\Href( $props['{http://sabredav.org/ns}vcard-url'] ); $pos = array_search($meCardProp, $requestedProperties); unset($requestedProperties[$pos]); } } } } /** * This event is triggered when a PROPPATCH method is executed * * @param array $mutations * @param array $result * @param DAV\INode $node * @return bool */ public function updateProperties(&$mutations, &$result, DAV\INode $node) { if (!$node instanceof UserAddressBooks) { return true; } $meCard = '{http://calendarserver.org/ns/}me-card'; // The only property we care about if (!isset($mutations[$meCard])) return true; $value = $mutations[$meCard]; unset($mutations[$meCard]); if ($value instanceof DAV\Property\IHref) { $value = $value->getHref(); $value = $this->server->calculateUri($value); } elseif (!is_null($value)) { $result[400][$meCard] = null; return false; } $innerResult = $this->server->updateProperties( $node->getOwner(), array( '{http://sabredav.org/ns}vcard-url' => $value, ) ); $closureResult = false; foreach($innerResult as $status => $props) { if (is_array($props) && array_key_exists('{http://sabredav.org/ns}vcard-url', $props)) { $result[$status][$meCard] = null; $closureResult = ($status>=200 && $status<300); } } return $result; } /** * This functions handles REPORT requests specific to CardDAV * * @param string $reportName * @param \DOMNode $dom * @return bool */ public function report($reportName,$dom) { switch($reportName) { case '{'.self::NS_CARDDAV.'}addressbook-multiget' : $this->addressbookMultiGetReport($dom); return false; case '{'.self::NS_CARDDAV.'}addressbook-query' : $this->addressBookQueryReport($dom); return false; default : return; } } /** * This function handles the addressbook-multiget REPORT. * * This report is used by the client to fetch the content of a series * of urls. Effectively avoiding a lot of redundant requests. * * @param \DOMNode $dom * @return void */ public function addressbookMultiGetReport($dom) { $properties = array_keys(DAV\XMLUtil::parseProperties($dom->firstChild)); $hrefElems = $dom->getElementsByTagNameNS('urn:DAV','href'); $propertyList = array(); foreach($hrefElems as $elem) { $uri = $this->server->calculateUri($elem->nodeValue); list($propertyList[]) = $this->server->getPropertiesForPath($uri,$properties); } $prefer = $this->server->getHTTPPRefer(); $this->server->httpResponse->sendStatus(207); $this->server->httpResponse->setHeader('Content-Type','application/xml; charset=utf-8'); $this->server->httpResponse->setHeader('Vary','Brief,Prefer'); $this->server->httpResponse->sendBody($this->server->generateMultiStatus($propertyList, $prefer['return-minimal'])); } /** * This method is triggered before a file gets updated with new content. * * This plugin uses this method to ensure that Card nodes receive valid * vcard data. * * @param string $path * @param DAV\IFile $node * @param resource $data * @return void */ public function beforeWriteContent($path, DAV\IFile $node, &$data) { if (!$node instanceof ICard) return; $this->validateVCard($data); } /** * This method is triggered before a new file is created. * * This plugin uses this method to ensure that Card nodes receive valid * vcard data. * * @param string $path * @param resource $data * @param DAV\ICollection $parentNode * @return void */ public function beforeCreateFile($path, &$data, DAV\ICollection $parentNode) { if (!$parentNode instanceof IAddressBook) return; $this->validateVCard($data); } /** * Checks if the submitted iCalendar data is in fact, valid. * * An exception is thrown if it's not. * * @param resource|string $data * @return void */ protected function validateVCard(&$data) { // If it's a stream, we convert it to a string first. if (is_resource($data)) { $data = stream_get_contents($data); } // Converting the data to unicode, if needed. $data = DAV\StringUtil::ensureUTF8($data); try { $vobj = VObject\Reader::read($data); } catch (VObject\ParseException $e) { throw new DAV\Exception\UnsupportedMediaType('This resource only supports valid vcard data. Parse error: ' . $e->getMessage()); } if ($vobj->name !== 'VCARD') { throw new DAV\Exception\UnsupportedMediaType('This collection can only support vcard objects.'); } if (!isset($vobj->UID)) { // No UID in vcards is invalid, but we'll just add it in anyway. $vobj->add('UID', DAV\UUIDUtil::getUUID()); $data = $vobj->serialize(); } } /** * This function handles the addressbook-query REPORT * * This report is used by the client to filter an addressbook based on a * complex query. * * @param \DOMNode $dom * @return void */ protected function addressbookQueryReport($dom) { $query = new AddressBookQueryParser($dom); $query->parse(); $depth = $this->server->getHTTPDepth(0); if ($depth==0) { $candidateNodes = array( $this->server->tree->getNodeForPath($this->server->getRequestUri()) ); } else { $candidateNodes = $this->server->tree->getChildren($this->server->getRequestUri()); } $validNodes = array(); foreach($candidateNodes as $node) { if (!$node instanceof ICard) continue; $blob = $node->get(); if (is_resource($blob)) { $blob = stream_get_contents($blob); } if (!$this->validateFilters($blob, $query->filters, $query->test)) { continue; } $validNodes[] = $node; if ($query->limit && $query->limit <= count($validNodes)) { // We hit the maximum number of items, we can stop now. break; } } $result = array(); foreach($validNodes as $validNode) { if ($depth==0) { $href = $this->server->getRequestUri(); } else { $href = $this->server->getRequestUri() . '/' . $validNode->getName(); } list($result[]) = $this->server->getPropertiesForPath($href, $query->requestedProperties, 0); } $prefer = $this->server->getHTTPPRefer(); $this->server->httpResponse->sendStatus(207); $this->server->httpResponse->setHeader('Content-Type','application/xml; charset=utf-8'); $this->server->httpResponse->setHeader('Vary','Brief,Prefer'); $this->server->httpResponse->sendBody($this->server->generateMultiStatus($result, $prefer['return-minimal'])); } /** * Validates if a vcard makes it throught a list of filters. * * @param string $vcardData * @param array $filters * @param string $test anyof or allof (which means OR or AND) * @return bool */ public function validateFilters($vcardData, array $filters, $test) { $vcard = VObject\Reader::read($vcardData); if (!$filters) return true; foreach($filters as $filter) { $isDefined = isset($vcard->{$filter['name']}); if ($filter['is-not-defined']) { if ($isDefined) { $success = false; } else { $success = true; } } elseif ((!$filter['param-filters'] && !$filter['text-matches']) || !$isDefined) { // We only need to check for existence $success = $isDefined; } else { $vProperties = $vcard->select($filter['name']); $results = array(); if ($filter['param-filters']) { $results[] = $this->validateParamFilters($vProperties, $filter['param-filters'], $filter['test']); } if ($filter['text-matches']) { $texts = array(); foreach($vProperties as $vProperty) $texts[] = $vProperty->getValue(); $results[] = $this->validateTextMatches($texts, $filter['text-matches'], $filter['test']); } if (count($results)===1) { $success = $results[0]; } else { if ($filter['test'] === 'anyof') { $success = $results[0] || $results[1]; } else { $success = $results[0] && $results[1]; } } } // else // There are two conditions where we can already determine whether // or not this filter succeeds. if ($test==='anyof' && $success) { return true; } if ($test==='allof' && !$success) { return false; } } // foreach // If we got all the way here, it means we haven't been able to // determine early if the test failed or not. // // This implies for 'anyof' that the test failed, and for 'allof' that // we succeeded. Sounds weird, but makes sense. return $test==='allof'; } /** * Validates if a param-filter can be applied to a specific property. * * @todo currently we're only validating the first parameter of the passed * property. Any subsequence parameters with the same name are * ignored. * @param array $vProperties * @param array $filters * @param string $test * @return bool */ protected function validateParamFilters(array $vProperties, array $filters, $test) { foreach($filters as $filter) { $isDefined = false; foreach($vProperties as $vProperty) { $isDefined = isset($vProperty[$filter['name']]); if ($isDefined) break; } if ($filter['is-not-defined']) { if ($isDefined) { $success = false; } else { $success = true; } // If there's no text-match, we can just check for existence } elseif (!$filter['text-match'] || !$isDefined) { $success = $isDefined; } else { $success = false; foreach($vProperties as $vProperty) { // If we got all the way here, we'll need to validate the // text-match filter. $success = DAV\StringUtil::textMatch($vProperty[$filter['name']]->getValue(), $filter['text-match']['value'], $filter['text-match']['collation'], $filter['text-match']['match-type']); if ($success) break; } if ($filter['text-match']['negate-condition']) { $success = !$success; } } // else // There are two conditions where we can already determine whether // or not this filter succeeds. if ($test==='anyof' && $success) { return true; } if ($test==='allof' && !$success) { return false; } } // If we got all the way here, it means we haven't been able to // determine early if the test failed or not. // // This implies for 'anyof' that the test failed, and for 'allof' that // we succeeded. Sounds weird, but makes sense. return $test==='allof'; } /** * Validates if a text-filter can be applied to a specific property. * * @param array $texts * @param array $filters * @param string $test * @return bool */ protected function validateTextMatches(array $texts, array $filters, $test) { foreach($filters as $filter) { $success = false; foreach($texts as $haystack) { $success = DAV\StringUtil::textMatch($haystack, $filter['value'], $filter['collation'], $filter['match-type']); // Breaking on the first match if ($success) break; } if ($filter['negate-condition']) { $success = !$success; } if ($success && $test==='anyof') return true; if (!$success && $test=='allof') return false; } // If we got all the way here, it means we haven't been able to // determine early if the test failed or not. // // This implies for 'anyof' that the test failed, and for 'allof' that // we succeeded. Sounds weird, but makes sense. return $test==='allof'; } /** * This event is triggered after webdav-properties have been retrieved. * * @return bool */ public function afterGetProperties($uri, &$properties) { // If the request was made using the SOGO connector, we must rewrite // the content-type property. By default SabreDAV will send back // text/x-vcard; charset=utf-8, but for SOGO we must strip that last // part. if (!isset($properties[200]['{DAV:}getcontenttype'])) return; if (strpos($this->server->httpRequest->getHeader('User-Agent'),'Thunderbird')===false) { return; } if (strpos($properties[200]['{DAV:}getcontenttype'],'text/x-vcard')===0) { $properties[200]['{DAV:}getcontenttype'] = 'text/x-vcard'; } } /** * This method is used to generate HTML output for the * Sabre\DAV\Browser\Plugin. This allows us to generate an interface users * can use to create new calendars. * * @param DAV\INode $node * @param string $output * @return bool */ public function htmlActionsPanel(DAV\INode $node, &$output) { if (!$node instanceof UserAddressBooks) return; $output.= '

Create new address book



'; return false; } /** * This method allows us to intercept the 'mkcalendar' sabreAction. This * action enables the user to create new calendars from the browser plugin. * * @param string $uri * @param string $action * @param array $postVars * @return bool */ public function browserPostAction($uri, $action, array $postVars) { if ($action!=='mkaddressbook') return; $resourceType = array('{DAV:}collection','{urn:ietf:params:xml:ns:carddav}addressbook'); $properties = array(); if (isset($postVars['{DAV:}displayname'])) { $properties['{DAV:}displayname'] = $postVars['{DAV:}displayname']; } $this->server->createCollection($uri . '/' . $postVars['name'],$resourceType,$properties); return false; } } sabre-dav-1.8.12/lib/Sabre/CardDAV/Property/000077500000000000000000000000001246001162500202765ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/CardDAV/Property/SupportedAddressData.php000066400000000000000000000034541246001162500251020ustar00rootroot00000000000000 'text/vcard', 'version' => '3.0'), // array('contentType' => 'text/vcard', 'version' => '4.0'), ); } $this->supportedData = $supportedData; } /** * Serializes the property in a DOMDocument * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serialize(DAV\Server $server,\DOMElement $node) { $doc = $node->ownerDocument; $prefix = isset($server->xmlNamespaces[CardDAV\Plugin::NS_CARDDAV]) ? $server->xmlNamespaces[CardDAV\Plugin::NS_CARDDAV] : 'card'; foreach($this->supportedData as $supported) { $caldata = $doc->createElementNS(CardDAV\Plugin::NS_CARDDAV, $prefix . ':address-data-type'); $caldata->setAttribute('content-type',$supported['contentType']); $caldata->setAttribute('version',$supported['version']); $node->appendChild($caldata); } } } sabre-dav-1.8.12/lib/Sabre/CardDAV/UserAddressBooks.php000066400000000000000000000135151246001162500224120ustar00rootroot00000000000000carddavBackend = $carddavBackend; $this->principalUri = $principalUri; } /** * Returns the name of this object * * @return string */ public function getName() { list(,$name) = DAV\URLUtil::splitPath($this->principalUri); return $name; } /** * Updates the name of this object * * @param string $name * @return void */ public function setName($name) { throw new DAV\Exception\MethodNotAllowed(); } /** * Deletes this object * * @return void */ public function delete() { throw new DAV\Exception\MethodNotAllowed(); } /** * Returns the last modification date * * @return int */ public function getLastModified() { return null; } /** * Creates a new file under this object. * * This is currently not allowed * * @param string $filename * @param resource $data * @return void */ public function createFile($filename, $data=null) { throw new DAV\Exception\MethodNotAllowed('Creating new files in this collection is not supported'); } /** * Creates a new directory under this object. * * This is currently not allowed. * * @param string $filename * @return void */ public function createDirectory($filename) { throw new DAV\Exception\MethodNotAllowed('Creating new collections in this collection is not supported'); } /** * Returns a single calendar, by name * * @param string $name * @todo needs optimizing * @return \AddressBook */ public function getChild($name) { foreach($this->getChildren() as $child) { if ($name==$child->getName()) return $child; } throw new DAV\Exception\NotFound('Addressbook with name \'' . $name . '\' could not be found'); } /** * Returns a list of addressbooks * * @return array */ public function getChildren() { $addressbooks = $this->carddavBackend->getAddressbooksForUser($this->principalUri); $objs = array(); foreach($addressbooks as $addressbook) { $objs[] = new AddressBook($this->carddavBackend, $addressbook); } return $objs; } /** * Creates a new addressbook * * @param string $name * @param array $resourceType * @param array $properties * @return void */ public function createExtendedCollection($name, array $resourceType, array $properties) { if (!in_array('{'.Plugin::NS_CARDDAV.'}addressbook',$resourceType) || count($resourceType)!==2) { throw new DAV\Exception\InvalidResourceType('Unknown resourceType for this collection'); } $this->carddavBackend->createAddressBook($this->principalUri, $name, $properties); } /** * Returns the owner principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getOwner() { return $this->principalUri; } /** * Returns a group principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getGroup() { return null; } /** * Returns a list of ACE's for this node. * * Each ACE has the following properties: * * 'privilege', a string such as {DAV:}read or {DAV:}write. These are * currently the only supported privileges * * 'principal', a url to the principal who owns the node * * 'protected' (optional), indicating that this ACE is not allowed to * be updated. * * @return array */ public function getACL() { return array( array( 'privilege' => '{DAV:}read', 'principal' => $this->principalUri, 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => $this->principalUri, 'protected' => true, ), ); } /** * Updates the ACL * * This method will receive a list of new ACE's. * * @param array $acl * @return void */ public function setACL(array $acl) { throw new DAV\Exception\MethodNotAllowed('Changing ACL is not yet supported'); } /** * Returns the list of supported privileges for this node. * * The returned data structure is a list of nested privileges. * See Sabre\DAVACL\Plugin::getDefaultSupportedPrivilegeSet for a simple * standard structure. * * If null is returned from this method, the default privilege set is used, * which is fine for most common usecases. * * @return array|null */ public function getSupportedPrivilegeSet() { return null; } } sabre-dav-1.8.12/lib/Sabre/CardDAV/VCFExportPlugin.php000066400000000000000000000053221246001162500221640ustar00rootroot00000000000000server = $server; $this->server->subscribeEvent('beforeMethod',array($this,'beforeMethod'), 90); } /** * 'beforeMethod' event handles. This event handles intercepts GET requests ending * with ?export * * @param string $method * @param string $uri * @return bool */ public function beforeMethod($method, $uri) { if ($method!='GET') return; if ($this->server->httpRequest->getQueryString()!='export') return; // splitting uri list($uri) = explode('?',$uri,2); $node = $this->server->tree->getNodeForPath($uri); if (!($node instanceof IAddressBook)) return; // Checking ACL, if available. if ($aclPlugin = $this->server->getPlugin('acl')) { $aclPlugin->checkPrivileges($uri, '{DAV:}read'); } $this->server->httpResponse->setHeader('Content-Type','text/directory'); $this->server->httpResponse->sendStatus(200); $nodes = $this->server->getPropertiesForPath($uri, array( '{' . Plugin::NS_CARDDAV . '}address-data', ),1); $this->server->httpResponse->sendBody($this->generateVCF($nodes)); // Returning false to break the event chain return false; } /** * Merges all vcard objects, and builds one big vcf export * * @param array $nodes * @return string */ public function generateVCF(array $nodes) { $output = ""; foreach($nodes as $node) { if (!isset($node[200]['{' . Plugin::NS_CARDDAV . '}address-data'])) { continue; } $nodeData = $node[200]['{' . Plugin::NS_CARDDAV . '}address-data']; // Parsing this node so VObject can clean up the output. $output .= VObject\Reader::read($nodeData)->serialize(); } return $output; } } sabre-dav-1.8.12/lib/Sabre/CardDAV/Version.php000066400000000000000000000007361246001162500206160ustar00rootroot00000000000000currentUser; } /** * Authenticates the user based on the current request. * * If authentication is successful, true must be returned. * If authentication fails, an exception must be thrown. * * @param DAV\Server $server * @param string $realm * @throws DAV\Exception\NotAuthenticated * @return bool */ public function authenticate(DAV\Server $server, $realm) { $auth = new HTTP\BasicAuth(); $auth->setHTTPRequest($server->httpRequest); $auth->setHTTPResponse($server->httpResponse); $auth->setRealm($realm); $userpass = $auth->getUserPass(); if (!$userpass) { $auth->requireLogin(); throw new DAV\Exception\NotAuthenticated('No basic authentication headers were found'); } // Authenticates the user if (!$this->validateUserPass($userpass[0],$userpass[1])) { $auth->requireLogin(); throw new DAV\Exception\NotAuthenticated('Username or password does not match'); } $this->currentUser = $userpass[0]; return true; } } sabre-dav-1.8.12/lib/Sabre/DAV/Auth/Backend/AbstractDigest.php000066400000000000000000000054641246001162500235350ustar00rootroot00000000000000setHTTPRequest($server->httpRequest); $digest->setHTTPResponse($server->httpResponse); $digest->setRealm($realm); $digest->init(); $username = $digest->getUsername(); // No username was given if (!$username) { $digest->requireLogin(); throw new DAV\Exception\NotAuthenticated('No digest authentication headers were found'); } $hash = $this->getDigestHash($realm, $username); // If this was false, the user account didn't exist if ($hash===false || is_null($hash)) { $digest->requireLogin(); throw new DAV\Exception\NotAuthenticated('The supplied username was not on file'); } if (!is_string($hash)) { throw new DAV\Exception('The returned value from getDigestHash must be a string or null'); } // If this was false, the password or part of the hash was incorrect. if (!$digest->validateA1($hash)) { $digest->requireLogin(); throw new DAV\Exception\NotAuthenticated('Incorrect username'); } $this->currentUser = $username; return true; } /** * Returns the currently logged in username. * * @return string|null */ public function getCurrentUser() { return $this->currentUser; } } sabre-dav-1.8.12/lib/Sabre/DAV/Auth/Backend/Apache.php000066400000000000000000000030461246001162500220050ustar00rootroot00000000000000httpRequest->getRawServerValue('REMOTE_USER'); if (is_null($remoteUser)) { throw new DAV\Exception('We did not receive the $_SERVER[REMOTE_USER] property. This means that apache might have been misconfigured'); } $this->remoteUser = $remoteUser; return true; } /** * Returns information about the currently logged in user. * * If nobody is currently logged in, this method should return null. * * @return array|null */ public function getCurrentUser() { return $this->remoteUser; } } sabre-dav-1.8.12/lib/Sabre/DAV/Auth/Backend/BackendInterface.php000066400000000000000000000016151246001162500237740ustar00rootroot00000000000000loadFile($filename); } /** * Loads an htdigest-formatted file. This method can be called multiple times if * more than 1 file is used. * * @param string $filename * @return void */ public function loadFile($filename) { foreach(file($filename,FILE_IGNORE_NEW_LINES) as $line) { if (substr_count($line, ":") !== 2) throw new DAV\Exception('Malformed htdigest file. Every line should contain 2 colons'); list($username,$realm,$A1) = explode(':',$line); if (!preg_match('/^[a-zA-Z0-9]{32}$/', $A1)) throw new DAV\Exception('Malformed htdigest file. Invalid md5 hash'); $this->users[$realm . ':' . $username] = $A1; } } /** * Returns a users' information * * @param string $realm * @param string $username * @return string */ public function getDigestHash($realm, $username) { return isset($this->users[$realm . ':' . $username])?$this->users[$realm . ':' . $username]:false; } } sabre-dav-1.8.12/lib/Sabre/DAV/Auth/Backend/PDO.php000066400000000000000000000026711246001162500212510ustar00rootroot00000000000000pdo = $pdo; $this->tableName = $tableName; } /** * Returns the digest hash for a user. * * @param string $realm * @param string $username * @return string|null */ public function getDigestHash($realm,$username) { $stmt = $this->pdo->prepare('SELECT username, digesta1 FROM '.$this->tableName.' WHERE username = ?'); $stmt->execute(array($username)); $result = $stmt->fetchAll(); if (!count($result)) return; return $result[0]['digesta1']; } } sabre-dav-1.8.12/lib/Sabre/DAV/Auth/Plugin.php000066400000000000000000000046621246001162500205400ustar00rootroot00000000000000authBackend = $authBackend; $this->realm = $realm; } /** * Initializes the plugin. This function is automatically called by the server * * @param DAV\Server $server * @return void */ public function initialize(DAV\Server $server) { $this->server = $server; $this->server->subscribeEvent('beforeMethod',array($this,'beforeMethod'),10); } /** * Returns a plugin name. * * Using this name other plugins will be able to access other plugins * using DAV\Server::getPlugin * * @return string */ public function getPluginName() { return 'auth'; } /** * Returns the current users' principal uri. * * If nobody is logged in, this will return null. * * @return string|null */ public function getCurrentUser() { $userInfo = $this->authBackend->getCurrentUser(); if (!$userInfo) return null; return $userInfo; } /** * This method is called before any HTTP method and forces users to be authenticated * * @param string $method * @param string $uri * @throws Sabre\DAV\Exception\NotAuthenticated * @return bool */ public function beforeMethod($method, $uri) { $this->authBackend->authenticate($this->server,$this->realm); } } sabre-dav-1.8.12/lib/Sabre/DAV/Browser/000077500000000000000000000000001246001162500173035ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/DAV/Browser/GuessContentType.php000066400000000000000000000047131246001162500233040ustar00rootroot00000000000000 'image/jpeg', 'gif' => 'image/gif', 'png' => 'image/png', // groupware 'ics' => 'text/calendar', 'vcf' => 'text/x-vcard', // text 'txt' => 'text/plain', ); /** * Initializes the plugin * * @param DAV\Server $server * @return void */ public function initialize(DAV\Server $server) { // Using a relatively low priority (200) to allow other extensions // to set the content-type first. $server->subscribeEvent('afterGetProperties',array($this,'afterGetProperties'),200); } /** * Handler for teh afterGetProperties event * * @param string $path * @param array $properties * @return void */ public function afterGetProperties($path, &$properties) { if (array_key_exists('{DAV:}getcontenttype', $properties[404])) { list(, $fileName) = DAV\URLUtil::splitPath($path); $contentType = $this->getContentType($fileName); if ($contentType) { $properties[200]['{DAV:}getcontenttype'] = $contentType; unset($properties[404]['{DAV:}getcontenttype']); } } } /** * Simple method to return the contenttype * * @param string $fileName * @return string */ protected function getContentType($fileName) { // Just grabbing the extension $extension = strtolower(substr($fileName,strrpos($fileName,'.')+1)); if (isset($this->extensionMap[$extension])) return $this->extensionMap[$extension]; } } sabre-dav-1.8.12/lib/Sabre/DAV/Browser/MapGetToPropFind.php000066400000000000000000000025201246001162500231350ustar00rootroot00000000000000server = $server; $this->server->subscribeEvent('beforeMethod',array($this,'httpGetInterceptor')); } /** * This method intercepts GET requests to non-files, and changes it into an HTTP PROPFIND request * * @param string $method * @param string $uri * @return bool */ public function httpGetInterceptor($method, $uri) { if ($method!='GET') return true; $node = $this->server->tree->getNodeForPath($uri); if ($node instanceof DAV\IFile) return; $this->server->invokeMethod('PROPFIND',$uri); return false; } } sabre-dav-1.8.12/lib/Sabre/DAV/Browser/Plugin.php000066400000000000000000000366671246001162500212740ustar00rootroot00000000000000 'icons/file', 'Sabre\\DAV\\ICollection' => 'icons/collection', 'Sabre\\DAVACL\\IPrincipal' => 'icons/principal', 'Sabre\\CalDAV\\ICalendar' => 'icons/calendar', 'Sabre\\CardDAV\\IAddressBook' => 'icons/addressbook', 'Sabre\\CardDAV\\ICard' => 'icons/card', ); /** * The file extension used for all icons * * @var string */ public $iconExtension = '.png'; /** * reference to server class * * @var Sabre\DAV\Server */ protected $server; /** * enablePost turns on the 'actions' panel, which allows people to create * folders and upload files straight from a browser. * * @var bool */ protected $enablePost = true; /** * By default the browser plugin will generate a favicon and other images. * To turn this off, set this property to false. * * @var bool */ protected $enableAssets = true; /** * Creates the object. * * By default it will allow file creation and uploads. * Specify the first argument as false to disable this * * @param bool $enablePost * @param bool $enableAssets */ public function __construct($enablePost=true, $enableAssets = true) { $this->enablePost = $enablePost; $this->enableAssets = $enableAssets; } /** * Initializes the plugin and subscribes to events * * @param DAV\Server $server * @return void */ public function initialize(DAV\Server $server) { $this->server = $server; $this->server->subscribeEvent('beforeMethod',array($this,'httpGetInterceptor')); $this->server->subscribeEvent('onHTMLActionsPanel', array($this, 'htmlActionsPanel'),200); if ($this->enablePost) $this->server->subscribeEvent('unknownMethod',array($this,'httpPOSTHandler')); } /** * This method intercepts GET requests to collections and returns the html * * @param string $method * @param string $uri * @return bool */ public function httpGetInterceptor($method, $uri) { if ($method !== 'GET') return true; // We're not using straight-up $_GET, because we want everything to be // unit testable. $getVars = array(); parse_str($this->server->httpRequest->getQueryString(), $getVars); if (isset($getVars['sabreAction']) && $getVars['sabreAction'] === 'asset' && isset($getVars['assetName'])) { $this->serveAsset($getVars['assetName']); return false; } try { $node = $this->server->tree->getNodeForPath($uri); } catch (DAV\Exception\NotFound $e) { // We're simply stopping when the file isn't found to not interfere // with other plugins. return; } if ($node instanceof DAV\IFile) return; $this->server->httpResponse->sendStatus(200); $this->server->httpResponse->setHeader('Content-Type','text/html; charset=utf-8'); $this->server->httpResponse->sendBody( $this->generateDirectoryIndex($uri) ); return false; } /** * Handles POST requests for tree operations. * * @param string $method * @param string $uri * @return bool */ public function httpPOSTHandler($method, $uri) { if ($method!='POST') return; $contentType = $this->server->httpRequest->getHeader('Content-Type'); list($contentType) = explode(';', $contentType); if ($contentType !== 'application/x-www-form-urlencoded' && $contentType !== 'multipart/form-data') { return; } $postVars = $this->server->httpRequest->getPostVars(); if (!isset($postVars['sabreAction'])) return; if ($this->server->broadcastEvent('onBrowserPostAction', array($uri, $postVars['sabreAction'], $postVars))) { switch($postVars['sabreAction']) { case 'mkcol' : if (isset($postVars['name']) && trim($postVars['name'])) { // Using basename() because we won't allow slashes list(, $folderName) = DAV\URLUtil::splitPath(trim($postVars['name'])); $this->server->createDirectory($uri . '/' . $folderName); } break; case 'put' : if ($_FILES) $file = current($_FILES); else break; list(, $newName) = DAV\URLUtil::splitPath(trim($file['name'])); if (isset($postVars['name']) && trim($postVars['name'])) $newName = trim($postVars['name']); // Making sure we only have a 'basename' component list(, $newName) = DAV\URLUtil::splitPath($newName); if (is_uploaded_file($file['tmp_name'])) { $this->server->createFile($uri . '/' . $newName, fopen($file['tmp_name'],'r')); } break; } } $this->server->httpResponse->setHeader('Location',$this->server->httpRequest->getUri()); $this->server->httpResponse->sendStatus(302); return false; } /** * Escapes a string for html. * * @param string $value * @return string */ public function escapeHTML($value) { return htmlspecialchars($value,ENT_QUOTES,'UTF-8'); } /** * Generates the html directory index for a given url * * @param string $path * @return string */ public function generateDirectoryIndex($path) { $version = ''; if (DAV\Server::$exposeVersion) { $version = DAV\Version::VERSION ."-". DAV\Version::STABILITY; } $html = " Index for " . $this->escapeHTML($path) . "/ - SabreDAV " . $version . " "; if ($this->enableAssets) { $html.=''; } $html .= "

Index for " . $this->escapeHTML($path) . "/

"; $files = $this->server->getPropertiesForPath($path,array( '{DAV:}displayname', '{DAV:}resourcetype', '{DAV:}getcontenttype', '{DAV:}getcontentlength', '{DAV:}getlastmodified', ),1); $parent = $this->server->tree->getNodeForPath($path); if ($path) { list($parentUri) = DAV\URLUtil::splitPath($path); $fullPath = DAV\URLUtil::encodePath($this->server->getBaseUri() . $parentUri); $icon = $this->enableAssets?'Parent':''; $html.= ""; } foreach($files as $file) { // This is the current directory, we can skip it if (rtrim($file['href'],'/')==$path) continue; list(, $name) = DAV\URLUtil::splitPath($file['href']); $type = null; if (isset($file[200]['{DAV:}resourcetype'])) { $type = $file[200]['{DAV:}resourcetype']->getValue(); // resourcetype can have multiple values if (!is_array($type)) $type = array($type); foreach($type as $k=>$v) { // Some name mapping is preferred switch($v) { case '{DAV:}collection' : $type[$k] = 'Collection'; break; case '{DAV:}principal' : $type[$k] = 'Principal'; break; case '{urn:ietf:params:xml:ns:carddav}addressbook' : $type[$k] = 'Addressbook'; break; case '{urn:ietf:params:xml:ns:caldav}calendar' : $type[$k] = 'Calendar'; break; case '{urn:ietf:params:xml:ns:caldav}schedule-inbox' : $type[$k] = 'Schedule Inbox'; break; case '{urn:ietf:params:xml:ns:caldav}schedule-outbox' : $type[$k] = 'Schedule Outbox'; break; case '{http://calendarserver.org/ns/}calendar-proxy-read' : $type[$k] = 'Proxy-Read'; break; case '{http://calendarserver.org/ns/}calendar-proxy-write' : $type[$k] = 'Proxy-Write'; break; } } $type = implode(', ', $type); } // If no resourcetype was found, we attempt to use // the contenttype property if (!$type && isset($file[200]['{DAV:}getcontenttype'])) { $type = $file[200]['{DAV:}getcontenttype']; } if (!$type) $type = 'Unknown'; $size = isset($file[200]['{DAV:}getcontentlength'])?(int)$file[200]['{DAV:}getcontentlength']:''; $lastmodified = isset($file[200]['{DAV:}getlastmodified'])?$file[200]['{DAV:}getlastmodified']->getTime()->format(\DateTime::ATOM):''; $fullPath = DAV\URLUtil::encodePath('/' . trim($this->server->getBaseUri() . ($path?$path . '/':'') . $name,'/')); $displayName = isset($file[200]['{DAV:}displayname'])?$file[200]['{DAV:}displayname']:$name; $displayName = $this->escapeHTML($displayName); $type = $this->escapeHTML($type); $icon = ''; if ($this->enableAssets) { $node = $this->server->tree->getNodeForPath(($path?$path.'/':'') . $name); foreach(array_reverse($this->iconMap) as $class=>$iconName) { if ($node instanceof $class) { $icon = ''; break; } } } $html.= ""; } $html.= ""; $output = ''; if ($this->enablePost) { $this->server->broadcastEvent('onHTMLActionsPanel',array($parent, &$output)); } $html.=$output; $html.= "
NameTypeSizeLast modified

$icon .. [parent]
$icon {$displayName} {$type} {$size} {$lastmodified}

Generated by SabreDAV " . $version . " (c)2007-2015 http://sabre.io/
"; return $html; } /** * This method is used to generate the 'actions panel' output for * collections. * * This specifically generates the interfaces for creating new files, and * creating new directories. * * @param DAV\INode $node * @param mixed $output * @return void */ public function htmlActionsPanel(DAV\INode $node, &$output) { if (!$node instanceof DAV\ICollection) return; // We also know fairly certain that if an object is a non-extended // SimpleCollection, we won't need to show the panel either. if (get_class($node)==='Sabre\\DAV\\SimpleCollection') return; $output.= '

Create new folder

Name:

Upload file

Name (optional):
File:
'; } /** * This method takes a path/name of an asset and turns it into url * suiteable for http access. * * @param string $assetName * @return string */ protected function getAssetUrl($assetName) { return $this->server->getBaseUri() . '?sabreAction=asset&assetName=' . urlencode($assetName); } /** * This method returns a local pathname to an asset. * * @param string $assetName * @return string */ protected function getLocalAssetPath($assetName) { $assetDir = __DIR__ . '/assets/'; $path = $assetDir . $assetName; // Making sure people aren't trying to escape from the base path. if (strpos(realpath($path), realpath($assetDir)) === 0) { return $path; } throw new DAV\Exception\Forbidden('Path does not exist, or escaping from the base path was detected'); } /** * This method reads an asset from disk and generates a full http response. * * @param string $assetName * @return void */ protected function serveAsset($assetName) { $assetPath = $this->getLocalAssetPath($assetName); if (!file_exists($assetPath)) { throw new DAV\Exception\NotFound('Could not find an asset with this name'); } // Rudimentary mime type detection switch(strtolower(substr($assetPath,strpos($assetPath,'.')+1))) { case 'ico' : $mime = 'image/vnd.microsoft.icon'; break; case 'png' : $mime = 'image/png'; break; default: $mime = 'application/octet-stream'; break; } $this->server->httpResponse->setHeader('Content-Type', $mime); $this->server->httpResponse->setHeader('Content-Length', filesize($assetPath)); $this->server->httpResponse->setHeader('Cache-Control', 'public, max-age=1209600'); $this->server->httpResponse->sendStatus(200); $this->server->httpResponse->sendBody(fopen($assetPath,'r')); } } sabre-dav-1.8.12/lib/Sabre/DAV/Browser/assets/000077500000000000000000000000001246001162500206055ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/DAV/Browser/assets/favicon.ico000066400000000000000000000102761246001162500227340ustar00rootroot00000000000000  ( @   5~Q ^#tV `@.w W U)+8\`w8{wN~Vl+3/Ba(#{ #+0+ ?G#9j  +F C In6 ~pgP <x<|?sabre-dav-1.8.12/lib/Sabre/DAV/Browser/assets/icons/000077500000000000000000000000001246001162500217205ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/DAV/Browser/assets/icons/addressbook.png000066400000000000000000000161001246001162500247240ustar00rootroot00000000000000PNG  IHDR00 tEXtSoftwareAdobe ImageReadyqe< iTXtXML:com.adobe.xmp © 2009 by Oliver Twardowski Oliver Twardowski 4FIDATxb?6" r101|ćWw /?`8A[o g΀H| o 10xƼg`Ynj))\m-7ëνeK/_0| %Xgx'B ?b$;~`u @]U"?/A@ZWDW >bxGaY[-׿!&ǰeVf`X 0|b6`|?X3|MU204g, .  }O?YՆ~g3B?å k1m7 D?0ZT6 ԯ0ii-7(O t 88>E']]87Q+C-rK/ Ĵpߟ[ݲ<>Л- {msL#| _}xƘQ^]öW`Z0MM.&aGڸ?g]&DY1 \(޿#"BL|P:c(8*}ri1\ BM!&z :д^0Ǿ_g6EjTi~Aul?>׳ZI#io: (+łN7!^`?Hǩ;6\ݛ+kծDE̎71/'F` " Di(JCD H)JJE(% Dk:ڎ'[1YcsH.f!@mj [xAp x|&H/+ʓX/g *m3hM D$`mjfQS< EI"!5mM푮0KI151MhA[1*:Z=~;gnJ$j2@uM=􂌞pM, aSR1%=#mh`8yL +IU𑪀I1di=208K/Ӆ~n6nͦB%(t5SDg zQG8mܤ^8F0'Aq 5Q5s]G_,N,a4e$'.Ox΍[J7NU@o\]C& ,ݗ6ZWJx3z1("c~rh&vP\}PTe.*TApuMRGW;M* e]>*@ͧ')?6*+,# &`b|4}g3 (hw`efnη|FI&q* PeXЋ~%C+ЪnЯT' %ÎH|PE<NhaYPD;w(%pYAOk#I֓Nc6^guC(&,*΁#htrKH.@O7S4RnyIVS٫Y[' ?R/I-495Y+:2LB'ao%+i*0XG^~ӢV3ЇbXui#L}6W"xPm֟Eަ$d)}\[zv͉/-w?t}FQWb冻'-w.RTYKlTUνw"-C)4 DA]T&>0!, b1 c 4bBQ4Q,ԈH_v(sιБr &g;3YdRz2G윾I&w QQ߄9>U_υPo#O#o}uC*QTpybtn 'g+x-w/ M)s<Ϝ)8d+hcCHHI]EV\2n޼ǿ8w>ƆM>G5#L$.ƴ9:YH?bR:J jSB;ch_5yܳyFמʊ;Vjy=ZʨC/奕>*AtkDVYGZ -c\!ŲB"AVxBHJ*2tچN-j&`BH(r#|>\gs7_)EȾPg %M^2ƻ'4w76sBg"*V!> "då CE_š/9YaCw1y Ae9,F\kiJ=pߏ2)"K=-L<2%p!kyys8Lqym-T]1V䁮 e=8Kx,ĮͶ er'1hh'iD0sglHr /BT,`҄MdR^nhQ! 3ˬv‹}ؾe#=3 dE OF'2 `(.qN[e}[FX;D4IąIr5=&.D.8lBTȲiQ"&A24AD:'z'#>PGB lFHhkNUK CC e~s64] Qş% %@ױcɒxίES 4n٩;wt3hNxfO](bgg+fC\vC UV'bLT|n|yY7D;LcߦJef4G\^FM -V>LN@dvlhC&'M0cfW?fe .\!T)%ˁM=݀:yxlάEvv|3Zbq8 4hN(,ퟥXI٘np-?G5ZaHgMz7w;CINǟVF 6WsJkV#CӾ황#4҂;s^(vnbTj"IENDB`sabre-dav-1.8.12/lib/Sabre/DAV/Browser/assets/icons/calendar.png000066400000000000000000000104441246001162500242020ustar00rootroot00000000000000PNG  IHDR00 iTXtXML:com.adobe.xmp Oliver Twardowski  Made on a Mac! exclusive for Smashing Magazine icons flavour smashing magazine addicted to coffee © 2009 by Oliver Twardowski QtEXtSoftwareAdobe ImageReadyqe< IDATxb?6ĀXF@Z?c ( 0 7jҥ`ZRR;"## && **@J% h(ŐxÏ45/,, f탸 dϫW^xW?B<ӧOA) @B+tcGq,{o% YB`R.y ̛oTWηc` qù ^>UxYmGh%@TJ}圓g#y!tSJ;fﺎ6{(?jB@kuܺ45[jж-PN-)BQE""k'yp‘8v m W`DN*^z  9fiH= :a>=SE7Tb_%'`#.{Di# ESUC }\eY ]ΕRYmG)v2O88 N/.[&W'vt"tWYhϹvЂ.{y9{Ϲ\jY@?* ,yX [bwcQaE;lqPF/[$5%Y޼O477y{`qR;yl$bl6@2IRIK P7L&$%:l6eX#X=X*@ -V nh岲dq'lkb"^RQN3A8A~Uf'ЏL:}v}'YfSZ-U5=F#^FC:{bQyWx1s!nq@&Kd0\@׹'{&2c/WLݤ>Թxad 2oNAZ}t엙 p8;$=l-@3?4C*I6 -l]d K-,RmP `$V6fe12FYwfr>3^_f]M pofs=o݀8G&X%2A{:-e.y r5g Y'jgr$auP `),~4jyxy 楼ceM+(n/$J^\돹s9Q0$ W̖ 8c;ɬ51O )kS\jWksMB )E??W5`PTųrZ*'IacCYFLN5>U9+6{?Q#ښSѧ:"(RP/?::YI"NJe?+~)j)kS$F9BN<|( So'_J"C88hqNvrNpmeӃZ Ҩx5cNd ԾnŃF^V!" Bc1cxW,###ֆ%Oa#`<hrr\`MS<>>6󹾾^_9ve``Z Cjty_S)րy=}֖loo[[nz&yw+n<_gB 2?&ܜ!444dvX!ӅC7'&&}-2??os@~-..Hz`( ttSSSV[@u1꿖t;gffdzzZVVVdiiV׊4v+>C3̤brjVtNCtww[8e`EGGGM^押x0_]eX`Bqy`xu]aڌp5F(d̜. o_iŅ ~2iuy.i+3 *BUI[.,,4,0wtNgO:Ӹ I`N@MďZ\Կq#yU$H*\ MZZ# ?ƞ/ܾA?IENDB`sabre-dav-1.8.12/lib/Sabre/DAV/Browser/assets/icons/card.png000066400000000000000000000130771246001162500233470ustar00rootroot00000000000000PNG  IHDR00 tEXtSoftwareAdobe ImageReadyqe< iTXtXML:com.adobe.xmp © 2009 by Oliver Twardowski Oliver Twardowski 4EIDATxt 0 k(: |+dHhlr ?Lwc\#;Zkߢ87pwRqL)1X^"[1RUL/_ׯ_`V'O3*~?&ӞœUɏ?z]@}\Joz30s: D} D!iYIқ9{utuUB^16+{܄ o"H)]/#W>7IC.;W0n-,ߊ¡bx=fۻ~/"?I-D9zqj=U"s!.8iy]eE3ov8<3vaME( \68^kwa0UUSJG9& 0tיY7rg6K_N%=T'Ú@g_J/kd r="&uIe٧CoM$ %B^w+P>cG p8 ~ճ&DMRBH쵎E~B&"H6;\`Լ9n^]lʃ>v۽#%8hOa=+8%ZW0 knO4eR< ?ѻ)LtT* bTW(\?_6Y`,Aڶ 3F:>fشYG8;CSDԍb_?t7LtB{#|v66pT.T*,g>_}/+'bZsm]im"ÓV"@b/MGEHOz)'$!^`-]4S=7yPFP .tBX 2Dg:rٙymwwAY6נ\`x|7s99>ZR"2tp)$AxnibnX(_/ Lpj"pk$u@>p~4N"H  L&,`K8m;x"_ʏ:jQ}Ixn+JA\ĈCZ;jz[Je&GKE,CA~17Xza<wA~=C0LM%H=|kH**jƳBxXV 176x*t:08iˠ؄`_iWиF= ܵR._ѧݙPv\)8xcCd D Oliver Twardowski  Made on a Mac! exclusive for Smashing Magazine icons flavour smashing magazine addicted to coffee © 2009 by Oliver Twardowski QtEXtSoftwareAdobe ImageReadyqe<`IDATxb?6Ā/F66Fn.FIt88.s123wW_hv#^ ũ§ 7Ïn| t ,>cf@%aNҦkz,Mi* 4qlJa穖 `qah02p&6W0[0!?)L$,EvƯs^ϩwFk22h\[!9ޒ$94UMC9jX 'ZF+yY8M;5לl;̵E*/9)ѫ3$&0^ 9A>!"  P os`$ANk{A!7 y2@Rd^8+Tel6:gsv݇_qrT>6[vWi ¸EK%>X%66vbe vJFRڈAvƙ?w41rr7sh$䚬unkx;{NV" ߡ{GX%{FyL("2t%%t%{jTAuQRAֈצ1SH wT R, 8kFF僚Vw͔VdV{-5߁B3N "ǠY8X36AC5X@^МnTAqdeou?z .S$+'Q`2$RgC}A!gʹiK<C>&pxKdc|O},&G"Wɘ~'IjW$wr(xLRaaJb{ .úzVڌ )4SȖW=n[hYh7+* BDaҿ`'X؈V6 6N?]f^r7/;.@}o#$y9' 0a Z χo'&,Q[Ć).(A]Hcn?0xkc*2T)HJu=ޚ} Nwx1mY[\:$EЈFzg k-U=(Oܳ /' G~%ڒo6v2DkKvDƭKg_:Z9vMVJϫSzɎp?ǖg. 4=9MH-h\a1e۸ \eI_ f (d1~^k*J؛&" - 26ㅒ!HZX cH?@Vݧ1V1V2-Yj}0A0Lcjo_]xT@%߂V;FPJ $qaʒ52$Y<%=)?àDasqƅp~j+}C쾊^9_ܻFb*;xQ ۸ĉ/2kH־^Yk}&B#XIJ.«i76gfVڥbIENDB`sabre-dav-1.8.12/lib/Sabre/DAV/Browser/assets/icons/file.png000066400000000000000000000054251246001162500233530ustar00rootroot00000000000000PNG  IHDR00 iTXtXML:com.adobe.xmp Oliver Twardowski  Made on a Mac! exclusive for Smashing Magazine icons flavour smashing magazine addicted to coffee © 2009 by Oliver Twardowski QtEXtSoftwareAdobe ImageReadyqe<IDATxl P5sO +Q(bfjYk)3G"Zp86".x#^W}ߵkU>}2fUTWtT2di( W{b1`b8y$CTT#L 21i@_03 5Ü!((GV a>O999~(;i$\ //'A΅] 'j% e [k=x:s΋@h59R%ED12, {ҀR3ެ7Fϒ.݂dM6@Ca4Q40S*?|JQ/EP3ݔk,]ď+])u+FM$#I">HJɵ֮<Le5?޻swI Bo'qc]_{\RUuT( `,xۥ>oWEl!1$[v{ 8+ʲL[T|ZR`tEޣ1z{9Ռ00}$!)h@h͛ݏO޶l,yǹ1/ X9;Ⱥ om[7Mckqyk{egU^5Hw.xD=g@aZ{!Pu]~@4!T<ˇz֫g۳s 2Be+ج22x[T@C9 y.+j=3*T se;UA040BĄ14TPAOɱwUS[4'k@tQỆ>-pxSU&/w2 *Zϱ2=N!ڒ!?Fkv|^- (#!C57@+DHm<06xN9d,>Qx|kro5ZX !d%.6pXcX14uĵ]}|H/ cR^K]Zy49$%WF&$<9grby\ 1f!4Gǽuxݠd C(T21 2Y;˨b_mH9_\2""s< fe\wܻέ߹Mܒ@'nN$Nޜ:yqg<yh!H6IENDB`sabre-dav-1.8.12/lib/Sabre/DAV/Browser/assets/icons/parent.png000066400000000000000000000066221246001162500237250ustar00rootroot00000000000000PNG  IHDR00 iTXtXML:com.adobe.xmp Oliver Twardowski  Made on a Mac! exclusive for Smashing Magazine icons flavour smashing magazine addicted to coffee © 2009 by Oliver Twardowski QtEXtSoftwareAdobe ImageReadyqe<`IDATxb?6Ā/F66Fn.FIt88.s123wW_hv#^ ũ§ 7Ïn| t ,>cf@%aNҦkz,Mi* 4qlJa穖 `qah02p&6W0[0!?)L$,EvƯs^ϩwFk22h\[!9ޒ$94UMC9jX 'ZF+yY8M;5לl;̵E*/9)ѫ3$&0^ 9A>!"  P os`$ANk{A!7 y2@Rd^8+Tel6:gsv݇_qrT>6[vWi ¸EK%>X%66vbe vJFRڈAvƙ?w41rr7sh$䚬unkx;{NV" ߡ{GX%{FyL("2t%%t%{jTAuQRAֈצ1SH wT R, 8kFF僚Vw͔VdV{-5߁B3N "ǠY8X36AC5X@^МnTAqdeou?z .S$+'Q`2$RgC}A!gʹiK<C>&pxKdc|O},&G"Wɘ~'IjW$wr(xLRaaJb{ .úzVڌ )4SȖW=n[hYh7+* BDaҿ`'X؈V6 6N?]f^r7/;.@}o#$y9' 0a Z χo'&,Q[Ć).(A]Hcn?0xkc*2T)HJu=ޚ} Nwx1mY[\:$EЈFzg k-U=(Oܳ /' G~%ڒo6v2DkKvDƭKg_:Z9vMVJϫSzɎp?ǖg. 4=9MH-h\a1e۸ \eI_ f (d1~^k*J؛&" - 26ㅒ!HZX cH?@Vݧ1V1V2-Yj}0A0Lcjo_]xT@%߂V;FPJ $qaʒ52$Y<%=)?àDasqƅp~j+}C쾊^9_ܻFb*;xQ ۸ĉ/2kH־^Yk}&B#XIJ.«i76gfVڥbIENDB`sabre-dav-1.8.12/lib/Sabre/DAV/Browser/assets/icons/principal.png000066400000000000000000000125501246001162500244120ustar00rootroot00000000000000PNG  IHDR00 tEXtSoftwareAdobe ImageReadyqe< iTXtXML:com.adobe.xmp © 2009 by Oliver Twardowski Oliver Twardowski 4nIDATxb?Va%ybbM _,0l l |C֖6@?3_HXKp@1r(q ]%((.!"*i_|aa c@(a~^ʊ7d1L~!#ca@XXPn.nYΰo^F a ,,dUfF Dw6Ay| L@j?o^2!>1Aæ sqrob@xmnnn6`hLl RfzgϟqA &?q$^ 0L9.o+++I HNKB DKJH͛`1ffm M;18d20g ZpI=7M 3SsPv©' )JE.ae7##ß??_ f|a`ccfTJk{{x D'O^>A\Zgae7g)\n ߼qjLZJUgO8<ݿj~V.E@&,V B"4uKKH*T "`I*^MUqQ1aQk7%yv!Ny5U'0D=e`fe>ϐ `}k}-`e9@$M),Py^|l ~kʆD?},) Ov2ݸqZkK"XJX16 lQ83BUMe";;0.؀iDSz<#eP(}T*+)ڢ-?3ʀ ?&![YZ ;~3 \⇕A!-V222 _d7QE2PHg>+|Az"" wna cc`!qŪ \^R DбgΜaUH >~$@-p]dopfP;s6[tgu!MaU+\~F#$.H : 6 %0n0l5$validSetting = $settings[$validSetting]; } } if (isset($settings['authType'])) { $this->authType = $settings['authType']; } else { $this->authType = self::AUTH_BASIC | self::AUTH_DIGEST; } $this->propertyMap['{DAV:}resourcetype'] = 'Sabre\\DAV\\Property\\ResourceType'; } /** * Add trusted root certificates to the webdav client. * * The parameter certificates should be a absolute path to a file * which contains all trusted certificates * * @param string $certificates */ public function addTrustedCertificates($certificates) { $this->trustedCertificates = $certificates; } /** * Enables/disables SSL peer verification * * @param boolean $value */ public function setVerifyPeer($value) { $this->verifyPeer = $value; } /** * Does a PROPFIND request * * The list of requested properties must be specified as an array, in clark * notation. * * The returned array will contain a list of filenames as keys, and * properties as values. * * The properties array will contain the list of properties. Only properties * that are actually returned from the server (without error) will be * returned, anything else is discarded. * * Depth should be either 0 or 1. A depth of 1 will cause a request to be * made to the server to also return all child resources. * * @param string $url * @param array $properties * @param int $depth * @return array */ public function propFind($url, array $properties, $depth = 0) { $body = '' . "\n"; $body.= '' . "\n"; $body.= ' ' . "\n"; foreach($properties as $property) { list( $namespace, $elementName ) = XMLUtil::parseClarkNotation($property); if ($namespace === 'DAV:') { $body.=' ' . "\n"; } else { $body.=" \n"; } } $body.= ' ' . "\n"; $body.= ''; $response = $this->request('PROPFIND', $url, $body, array( 'Depth' => $depth, 'Content-Type' => 'application/xml' )); $result = $this->parseMultiStatus($response['body']); // If depth was 0, we only return the top item if ($depth===0) { reset($result); $result = current($result); return isset($result[200])?$result[200]:array(); } $newResult = array(); foreach($result as $href => $statusList) { $newResult[$href] = isset($statusList[200])?$statusList[200]:array(); } return $newResult; } /** * Updates a list of properties on the server * * The list of properties must have clark-notation properties for the keys, * and the actual (string) value for the value. If the value is null, an * attempt is made to delete the property. * * @todo Must be building the request using the DOM, and does not yet * support complex properties. * @param string $url * @param array $properties * @return void */ public function propPatch($url, array $properties) { $body = '' . "\n"; $body.= '' . "\n"; foreach($properties as $propName => $propValue) { list( $namespace, $elementName ) = XMLUtil::parseClarkNotation($propName); if ($propValue === null) { $body.="\n"; if ($namespace === 'DAV:') { $body.=' ' . "\n"; } else { $body.=" \n"; } $body.="\n"; } else { $body.="\n"; if ($namespace === 'DAV:') { $body.=' '; } else { $body.=" "; } // Shitty.. i know $body.=htmlspecialchars($propValue, ENT_NOQUOTES, 'UTF-8'); if ($namespace === 'DAV:') { $body.='' . "\n"; } else { $body.="\n"; } $body.="\n"; } } $body.= ''; $this->request('PROPPATCH', $url, $body, array( 'Content-Type' => 'application/xml' )); } /** * Performs an HTTP options request * * This method returns all the features from the 'DAV:' header as an array. * If there was no DAV header, or no contents this method will return an * empty array. * * @return array */ public function options() { $result = $this->request('OPTIONS'); if (!isset($result['headers']['dav'])) { return array(); } $features = explode(',', $result['headers']['dav']); foreach($features as &$v) { $v = trim($v); } return $features; } /** * Performs an actual HTTP request, and returns the result. * * If the specified url is relative, it will be expanded based on the base * url. * * The returned array contains 3 keys: * * body - the response body * * httpCode - a HTTP code (200, 404, etc) * * headers - a list of response http headers. The header names have * been lowercased. * * @param string $method * @param string $url * @param string $body * @param array $headers * @return array */ public function request($method, $url = '', $body = null, $headers = array()) { $url = $this->getAbsoluteUrl($url); $curlSettings = array( CURLOPT_RETURNTRANSFER => true, // Return headers as part of the response CURLOPT_HEADER => true, // For security we cast this to a string. If somehow an array could // be passed here, it would be possible for an attacker to use @ to // post local files. CURLOPT_POSTFIELDS => (string)$body, // Automatically follow redirects CURLOPT_FOLLOWLOCATION => true, CURLOPT_MAXREDIRS => 5, CURLOPT_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, CURLOPT_REDIR_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, ); if($this->verifyPeer !== null) { $curlSettings[CURLOPT_SSL_VERIFYPEER] = $this->verifyPeer; } if($this->trustedCertificates) { $curlSettings[CURLOPT_CAINFO] = $this->trustedCertificates; } switch ($method) { case 'HEAD' : // do not read body with HEAD requests (this is necessary because cURL does not ignore the body with HEAD // requests when the Content-Length header is given - which in turn is perfectly valid according to HTTP // specs...) cURL does unfortunately return an error in this case ("transfer closed transfer closed with // ... bytes remaining to read") this can be circumvented by explicitly telling cURL to ignore the // response body $curlSettings[CURLOPT_NOBODY] = true; $curlSettings[CURLOPT_CUSTOMREQUEST] = 'HEAD'; break; default: $curlSettings[CURLOPT_CUSTOMREQUEST] = $method; break; } // Adding HTTP headers $nHeaders = array(); foreach($headers as $key=>$value) { $nHeaders[] = $key . ': ' . $value; } $curlSettings[CURLOPT_HTTPHEADER] = $nHeaders; if ($this->proxy) { $curlSettings[CURLOPT_PROXY] = $this->proxy; } if ($this->userName && $this->authType) { $curlType = 0; if ($this->authType & self::AUTH_BASIC) { $curlType |= CURLAUTH_BASIC; } if ($this->authType & self::AUTH_DIGEST) { $curlType |= CURLAUTH_DIGEST; } $curlSettings[CURLOPT_HTTPAUTH] = $curlType; $curlSettings[CURLOPT_USERPWD] = $this->userName . ':' . $this->password; } list( $response, $curlInfo, $curlErrNo, $curlError ) = $this->curlRequest($url, $curlSettings); $headerBlob = substr($response, 0, $curlInfo['header_size']); $response = substr($response, $curlInfo['header_size']); // In the case of 100 Continue, or redirects we'll have multiple lists // of headers for each separate HTTP response. We can easily split this // because they are separated by \r\n\r\n $headerBlob = explode("\r\n\r\n", trim($headerBlob, "\r\n")); // We only care about the last set of headers $headerBlob = $headerBlob[count($headerBlob)-1]; // Splitting headers $headerBlob = explode("\r\n", $headerBlob); $headers = array(); foreach($headerBlob as $header) { $parts = explode(':', $header, 2); if (count($parts)==2) { $headers[strtolower(trim($parts[0]))] = trim($parts[1]); } } $response = array( 'body' => $response, 'statusCode' => $curlInfo['http_code'], 'headers' => $headers ); if ($curlErrNo) { throw new Exception('[CURL] Error while making request: ' . $curlError . ' (error code: ' . $curlErrNo . ')'); } if ($response['statusCode']>=400) { switch ($response['statusCode']) { case 400 : throw new Exception\BadRequest('Bad request'); case 401 : throw new Exception\NotAuthenticated('Not authenticated'); case 402 : throw new Exception\PaymentRequired('Payment required'); case 403 : throw new Exception\Forbidden('Forbidden'); case 404: throw new Exception\NotFound('Resource not found.'); case 405 : throw new Exception\MethodNotAllowed('Method not allowed'); case 409 : throw new Exception\Conflict('Conflict'); case 412 : throw new Exception\PreconditionFailed('Precondition failed'); case 416 : throw new Exception\RequestedRangeNotSatisfiable('Requested Range Not Satisfiable'); case 500 : throw new Exception('Internal server error'); case 501 : throw new Exception\NotImplemented('Not Implemented'); case 507 : throw new Exception\InsufficientStorage('Insufficient storage'); default: throw new Exception('HTTP error response. (errorcode ' . $response['statusCode'] . ')'); } } return $response; } /** * Wrapper for all curl functions. * * The only reason this was split out in a separate method, is so it * becomes easier to unittest. * * @param string $url * @param array $settings * @return array */ // @codeCoverageIgnoreStart protected function curlRequest($url, $settings) { $curl = curl_init($url); curl_setopt_array($curl, $settings); return array( curl_exec($curl), curl_getinfo($curl), curl_errno($curl), curl_error($curl) ); } // @codeCoverageIgnoreEnd /** * Returns the full url based on the given url (which may be relative). All * urls are expanded based on the base url as given by the server. * * @param string $url * @return string */ protected function getAbsoluteUrl($url) { // If the url starts with http:// or https://, the url is already absolute. if (preg_match('/^http(s?):\/\//', $url)) { return $url; } // If the url starts with a slash, we must calculate the url based off // the root of the base url. if (strpos($url,'/') === 0) { $parts = parse_url($this->baseUri); return $parts['scheme'] . '://' . $parts['host'] . (isset($parts['port'])?':' . $parts['port']:'') . $url; } // Otherwise... return $this->baseUri . $url; } /** * Parses a WebDAV multistatus response body * * This method returns an array with the following structure * * array( * 'url/to/resource' => array( * '200' => array( * '{DAV:}property1' => 'value1', * '{DAV:}property2' => 'value2', * ), * '404' => array( * '{DAV:}property1' => null, * '{DAV:}property2' => null, * ), * ) * 'url/to/resource2' => array( * .. etc .. * ) * ) * * * @param string $body xml body * @return array */ public function parseMultiStatus($body) { $body = XMLUtil::convertDAVNamespace($body); // Fixes an XXE vulnerability on PHP versions older than 5.3.23 or // 5.4.13. $previous = libxml_disable_entity_loader(true); $responseXML = simplexml_load_string($body, null, LIBXML_NOBLANKS | LIBXML_NOCDATA); libxml_disable_entity_loader($previous); if ($responseXML===false) { throw new \InvalidArgumentException('The passed data is not valid XML'); } $responseXML->registerXPathNamespace('d', 'urn:DAV'); $propResult = array(); foreach($responseXML->xpath('d:response') as $response) { $response->registerXPathNamespace('d', 'urn:DAV'); $href = $response->xpath('d:href'); $href = (string)$href[0]; $properties = array(); foreach($response->xpath('d:propstat') as $propStat) { $propStat->registerXPathNamespace('d', 'urn:DAV'); $status = $propStat->xpath('d:status'); list($httpVersion, $statusCode, $message) = explode(' ', (string)$status[0],3); // Only using the propertymap for results with status 200. $propertyMap = $statusCode==='200' ? $this->propertyMap : array(); $properties[$statusCode] = XMLUtil::parseProperties(dom_import_simplexml($propStat), $propertyMap); } $propResult[$href] = $properties; } return $propResult; } } sabre-dav-1.8.12/lib/Sabre/DAV/Collection.php000066400000000000000000000056501246001162500204720ustar00rootroot00000000000000getChildren() as $child) { if ($child->getName()==$name) return $child; } throw new Exception\NotFound('File not found: ' . $name); } /** * Checks is a child-node exists. * * It is generally a good idea to try and override this. Usually it can be optimized. * * @param string $name * @return bool */ public function childExists($name) { try { $this->getChild($name); return true; } catch(Exception\NotFound $e) { return false; } } /** * Creates a new file in the directory * * Data will either be supplied as a stream resource, or in certain cases * as a string. Keep in mind that you may have to support either. * * After succesful creation of the file, you may choose to return the ETag * of the new file here. * * The returned ETag must be surrounded by double-quotes (The quotes should * be part of the actual string). * * If you cannot accurately determine the ETag, you should not return it. * If you don't store the file exactly as-is (you're transforming it * somehow) you should also not return an ETag. * * This means that if a subsequent GET to this new file does not exactly * return the same contents of what was submitted here, you are strongly * recommended to omit the ETag. * * @param string $name Name of the file * @param resource|string $data Initial payload * @return null|string */ public function createFile($name, $data = null) { throw new Exception\Forbidden('Permission denied to create file (filename ' . $name . ')'); } /** * Creates a new subdirectory * * @param string $name * @throws Exception\Forbidden * @return void */ public function createDirectory($name) { throw new Exception\Forbidden('Permission denied to create directory'); } } sabre-dav-1.8.12/lib/Sabre/DAV/Exception.php000066400000000000000000000026711246001162500203350ustar00rootroot00000000000000lock) { $error = $errorNode->ownerDocument->createElementNS('DAV:','d:no-conflicting-lock'); $errorNode->appendChild($error); if (!is_object($this->lock)) var_dump($this->lock); $error->appendChild($errorNode->ownerDocument->createElementNS('DAV:','d:href',$this->lock->uri)); } } } sabre-dav-1.8.12/lib/Sabre/DAV/Exception/FileNotFound.php000066400000000000000000000007561246001162500226730ustar00rootroot00000000000000ownerDocument->createElementNS('DAV:','d:valid-resourcetype'); $errorNode->appendChild($error); } } sabre-dav-1.8.12/lib/Sabre/DAV/Exception/LengthRequired.php000066400000000000000000000011141246001162500232460ustar00rootroot00000000000000message = 'The locktoken supplied does not match any locks on this entity'; } /** * This method allows the exception to include additional information into the WebDAV error response * * @param DAV\Server $server * @param \DOMElement $errorNode * @return void */ public function serialize(DAV\Server $server,\DOMElement $errorNode) { $error = $errorNode->ownerDocument->createElementNS('DAV:','d:lock-token-matches-request-uri'); $errorNode->appendChild($error); } } sabre-dav-1.8.12/lib/Sabre/DAV/Exception/Locked.php000066400000000000000000000032771246001162500215410ustar00rootroot00000000000000lock = $lock; } /** * Returns the HTTP statuscode for this exception * * @return int */ public function getHTTPCode() { return 423; } /** * This method allows the exception to include additional information into the WebDAV error response * * @param DAV\Server $server * @param \DOMElement $errorNode * @return void */ public function serialize(DAV\Server $server,\DOMElement $errorNode) { if ($this->lock) { $error = $errorNode->ownerDocument->createElementNS('DAV:','d:lock-token-submitted'); $errorNode->appendChild($error); $href = $errorNode->ownerDocument->createElementNS('DAV:','d:href'); $href->appendChild($errorNode->ownerDocument->createTextNode($this->lock->uri)); $error->appendChild( $href ); } } } sabre-dav-1.8.12/lib/Sabre/DAV/Exception/MethodNotAllowed.php000066400000000000000000000017761246001162500235530ustar00rootroot00000000000000getAllowedMethods($server->getRequestUri()); return array( 'Allow' => strtoupper(implode(', ',$methods)), ); } } sabre-dav-1.8.12/lib/Sabre/DAV/Exception/NotAuthenticated.php000066400000000000000000000010721246001162500235720ustar00rootroot00000000000000header = $header; } /** * Returns the HTTP statuscode for this exception * * @return int */ public function getHTTPCode() { return 412; } /** * This method allows the exception to include additional information into the WebDAV error response * * @param DAV\Server $server * @param \DOMElement $errorNode * @return void */ public function serialize(DAV\Server $server,\DOMElement $errorNode) { if ($this->header) { $prop = $errorNode->ownerDocument->createElement('s:header'); $prop->nodeValue = $this->header; $errorNode->appendChild($prop); } } } sabre-dav-1.8.12/lib/Sabre/DAV/Exception/ReportNotSupported.php000066400000000000000000000015131246001162500241710ustar00rootroot00000000000000ownerDocument->createElementNS('DAV:','d:supported-report'); $errorNode->appendChild($error); } } sabre-dav-1.8.12/lib/Sabre/DAV/Exception/RequestedRangeNotSatisfiable.php000066400000000000000000000011321246001162500260720ustar00rootroot00000000000000 * @copyright Copyright (C) 2007-2015 fruux GmbH (https://fruux.com/). * @license http://sabre.io/license/ Modified BSD License */ class ServiceUnavailable extends DAV\Exception { /** * Returns the HTTP statuscode for this exception * * @return int */ public function getHTTPCode() { return 503; } } sabre-dav-1.8.12/lib/Sabre/DAV/Exception/UnsupportedMediaType.php000066400000000000000000000011671246001162500244660ustar00rootroot00000000000000path . '/' . $name; file_put_contents($newPath,$data); } /** * Creates a new subdirectory * * @param string $name * @return void */ public function createDirectory($name) { $newPath = $this->path . '/' . $name; mkdir($newPath); } /** * Returns a specific child node, referenced by its name * * This method must throw DAV\Exception\NotFound if the node does not * exist. * * @param string $name * @throws DAV\Exception\NotFound * @return DAV\INode */ public function getChild($name) { $path = $this->path . '/' . $name; if (!file_exists($path)) throw new DAV\Exception\NotFound('File with name ' . $path . ' could not be located'); if (is_dir($path)) { return new Directory($path); } else { return new File($path); } } /** * Returns an array with all the child nodes * * @return DAV\INode[] */ public function getChildren() { $nodes = array(); foreach(scandir($this->path) as $node) if($node!='.' && $node!='..') $nodes[] = $this->getChild($node); return $nodes; } /** * Checks if a child exists. * * @param string $name * @return bool */ public function childExists($name) { $path = $this->path . '/' . $name; return file_exists($path); } /** * Deletes all files in this directory, and then itself * * @return void */ public function delete() { foreach($this->getChildren() as $child) $child->delete(); rmdir($this->path); } /** * Returns available diskspace information * * @return array */ public function getQuotaInfo() { return array( disk_total_space($this->path)-disk_free_space($this->path), disk_free_space($this->path) ); } } sabre-dav-1.8.12/lib/Sabre/DAV/FS/File.php000066400000000000000000000030661246001162500175650ustar00rootroot00000000000000path,$data); } /** * Returns the data * * @return string */ public function get() { return fopen($this->path,'r'); } /** * Delete the current file * * @return void */ public function delete() { unlink($this->path); } /** * Returns the size of the node, in bytes * * @return int */ public function getSize() { return filesize($this->path); } /** * Returns the ETag for a file * * An ETag is a unique identifier representing the current version of the file. If the file changes, the ETag MUST change. * The ETag is an arbitrary string, but MUST be surrounded by double-quotes. * * Return null if the ETag can not effectively be determined * * @return mixed */ public function getETag() { return null; } /** * Returns the mime-type for a file * * If null is returned, we'll assume application/octet-stream * * @return mixed */ public function getContentType() { return null; } } sabre-dav-1.8.12/lib/Sabre/DAV/FS/Node.php000066400000000000000000000026761246001162500176010ustar00rootroot00000000000000path = $path; } /** * Returns the name of the node * * @return string */ public function getName() { list(, $name) = DAV\URLUtil::splitPath($this->path); return $name; } /** * Renames the node * * @param string $name The new name * @return void */ public function setName($name) { list($parentPath, ) = DAV\URLUtil::splitPath($this->path); list(, $newName) = DAV\URLUtil::splitPath($name); $newPath = $parentPath . '/' . $newName; rename($this->path,$newPath); $this->path = $newPath; } /** * Returns the last modification time, as a unix timestamp * * @return int */ public function getLastModified() { return filemtime($this->path); } } sabre-dav-1.8.12/lib/Sabre/DAV/FSExt/000077500000000000000000000000001246001162500166515ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/DAV/FSExt/Directory.php000066400000000000000000000101451246001162500213270ustar00rootroot00000000000000path . '/' . $name; file_put_contents($newPath,$data); return '"' . md5_file($newPath) . '"'; } /** * Creates a new subdirectory * * @param string $name * @return void */ public function createDirectory($name) { // We're not allowing dots if ($name=='.' || $name=='..') throw new DAV\Exception\Forbidden('Permission denied to . and ..'); $newPath = $this->path . '/' . $name; mkdir($newPath); } /** * Returns a specific child node, referenced by its name * * This method must throw Sabre\DAV\Exception\NotFound if the node does not * exist. * * @param string $name * @throws DAV\Exception\NotFound * @return DAV\INode */ public function getChild($name) { $path = $this->path . '/' . $name; if (!file_exists($path)) throw new DAV\Exception\NotFound('File could not be located'); if ($name=='.' || $name=='..') throw new DAV\Exception\Forbidden('Permission denied to . and ..'); if (is_dir($path)) { return new Directory($path); } else { return new File($path); } } /** * Checks if a child exists. * * @param string $name * @return bool */ public function childExists($name) { if ($name=='.' || $name=='..') throw new DAV\Exception\Forbidden('Permission denied to . and ..'); $path = $this->path . '/' . $name; return file_exists($path); } /** * Returns an array with all the child nodes * * @return DAV\INode[] */ public function getChildren() { $nodes = array(); foreach(scandir($this->path) as $node) if($node!='.' && $node!='..' && $node!='.sabredav') $nodes[] = $this->getChild($node); return $nodes; } /** * Deletes all files in this directory, and then itself * * @return bool */ public function delete() { // Deleting all children foreach($this->getChildren() as $child) $child->delete(); // Removing resource info, if its still around if (file_exists($this->path . '/.sabredav')) unlink($this->path . '/.sabredav'); // Removing the directory itself rmdir($this->path); return parent::delete(); } /** * Returns available diskspace information * * @return array */ public function getQuotaInfo() { return array( disk_total_space($this->path)-disk_free_space($this->path), disk_free_space($this->path) ); } } sabre-dav-1.8.12/lib/Sabre/DAV/FSExt/File.php000066400000000000000000000065211246001162500202450ustar00rootroot00000000000000path,$data); return '"' . md5_file($this->path) . '"'; } /** * Updates the file based on a range specification. * * The first argument is the data, which is either a readable stream * resource or a string. * * The second argument is the type of update we're doing. * This is either: * * 1. append * * 2. update based on a start byte * * 3. update based on an end byte *; * The third argument is the start or end byte. * * After a successful put operation, you may choose to return an ETag. The * etag must always be surrounded by double-quotes. These quotes must * appear in the actual string you're returning. * * Clients may use the ETag from a PUT request to later on make sure that * when they update the file, the contents haven't changed in the mean * time. * * @param resource|string $data * @param int $rangeType * @param int $offset * @return string|null */ public function patch($data, $rangeType, $offset = null) { switch($rangeType) { case 1 : $f = fopen($this->path, 'a'); break; case 2 : $f = fopen($this->path, 'c'); fseek($f,$offset); break; case 3 : $f = fopen($this->path, 'c'); fseek($f, $offset, SEEK_END); break; } if (is_string($data)) { fwrite($f, $data); } else { stream_copy_to_stream($data,$f); } fclose($f); return '"' . md5_file($this->path) . '"'; } /** * Returns the data * * @return resource */ public function get() { return fopen($this->path,'r'); } /** * Delete the current file * * @return bool */ public function delete() { unlink($this->path); return parent::delete(); } /** * Returns the ETag for a file * * An ETag is a unique identifier representing the current version of the file. If the file changes, the ETag MUST change. * The ETag is an arbitrary string, but MUST be surrounded by double-quotes. * * Return null if the ETag can not effectively be determined * * @return string|null */ public function getETag() { return '"' . md5_file($this->path). '"'; } /** * Returns the mime-type for a file * * If null is returned, we'll assume application/octet-stream * * @return string|null */ public function getContentType() { return null; } /** * Returns the size of the file, in bytes * * @return int */ public function getSize() { return filesize($this->path); } } sabre-dav-1.8.12/lib/Sabre/DAV/FSExt/Node.php000066400000000000000000000130701246001162500202500ustar00rootroot00000000000000getResourceData(); foreach($properties as $propertyName=>$propertyValue) { // If it was null, we need to delete the property if (is_null($propertyValue)) { if (isset($resourceData['properties'][$propertyName])) { unset($resourceData['properties'][$propertyName]); } } else { $resourceData['properties'][$propertyName] = $propertyValue; } } $this->putResourceData($resourceData); return true; } /** * Returns a list of properties for this nodes.; * * The properties list is a list of propertynames the client requested, encoded as xmlnamespace#tagName, for example: http://www.example.org/namespace#author * If the array is empty, all properties should be returned * * @param array $properties * @return array */ function getProperties($properties) { $resourceData = $this->getResourceData(); // if the array was empty, we need to return everything if (!$properties) return $resourceData['properties']; $props = array(); foreach($properties as $property) { if (isset($resourceData['properties'][$property])) $props[$property] = $resourceData['properties'][$property]; } return $props; } /** * Returns the path to the resource file * * @return string */ protected function getResourceInfoPath() { list($parentDir) = DAV\URLUtil::splitPath($this->path); return $parentDir . '/.sabredav'; } /** * Returns all the stored resource information * * @return array */ protected function getResourceData() { $path = $this->getResourceInfoPath(); if (!file_exists($path)) return array('properties' => array()); // opening up the file, and creating a shared lock $handle = fopen($path,'r'); flock($handle,LOCK_SH); $data = ''; // Reading data until the eof while(!feof($handle)) { $data.=fread($handle,8192); } // We're all good fclose($handle); // Unserializing and checking if the resource file contains data for this file $data = unserialize($data); if (!isset($data[$this->getName()])) { return array('properties' => array()); } $data = $data[$this->getName()]; if (!isset($data['properties'])) $data['properties'] = array(); return $data; } /** * Updates the resource information * * @param array $newData * @return void */ protected function putResourceData(array $newData) { $path = $this->getResourceInfoPath(); // opening up the file, and creating a shared lock $handle = fopen($path,'a+'); flock($handle,LOCK_EX); $data = ''; rewind($handle); // Reading data until the eof while(!feof($handle)) { $data.=fread($handle,8192); } // Unserializing and checking if the resource file contains data for this file $data = unserialize($data); $data[$this->getName()] = $newData; ftruncate($handle,0); rewind($handle); fwrite($handle,serialize($data)); fclose($handle); } /** * Renames the node * * @param string $name The new name * @return void */ public function setName($name) { list($parentPath, ) = DAV\URLUtil::splitPath($this->path); list(, $newName) = DAV\URLUtil::splitPath($name); $newPath = $parentPath . '/' . $newName; // We're deleting the existing resourcedata, and recreating it // for the new path. $resourceData = $this->getResourceData(); $this->deleteResourceData(); rename($this->path,$newPath); $this->path = $newPath; $this->putResourceData($resourceData); } /** * @return bool */ public function deleteResourceData() { // When we're deleting this node, we also need to delete any resource information $path = $this->getResourceInfoPath(); if (!file_exists($path)) return true; // opening up the file, and creating a shared lock $handle = fopen($path,'a+'); flock($handle,LOCK_EX); $data = ''; rewind($handle); // Reading data until the eof while(!feof($handle)) { $data.=fread($handle,8192); } // Unserializing and checking if the resource file contains data for this file $data = unserialize($data); if (isset($data[$this->getName()])) unset($data[$this->getName()]); ftruncate($handle,0); rewind($handle); fwrite($handle,serialize($data)); fclose($handle); return true; } public function delete() { return $this->deleteResourceData(); } } sabre-dav-1.8.12/lib/Sabre/DAV/File.php000066400000000000000000000033661246001162500172600ustar00rootroot00000000000000 array( * '{DAV:}displayname' => null, * ), * 424 => array( * '{DAV:}owner' => null, * ) * ) * * In this example it was forbidden to update {DAV:}displayname. * (403 Forbidden), which in turn also caused {DAV:}owner to fail * (424 Failed Dependency) because the request needs to be atomic. * * @param array $mutations * @return bool|array */ function updateProperties($mutations); /** * Returns a list of properties for this nodes. * * The properties list is a list of propertynames the client requested, * encoded in clark-notation {xmlnamespace}tagname * * If the array is empty, it means 'all properties' were requested. * * Note that it's fine to liberally give properties back, instead of * conforming to the list of requested properties. * The Server class will filter out the extra. * * @param array $properties * @return void */ function getProperties($properties); } sabre-dav-1.8.12/lib/Sabre/DAV/IQuota.php000066400000000000000000000013651246001162500176000ustar00rootroot00000000000000dataDir = $dataDir; } protected function getFileNameForUri($uri) { return $this->dataDir . '/sabredav_' . md5($uri) . '.locks'; } /** * Returns a list of Sabre\DAV\Locks\LockInfo objects * * This method should return all the locks for a particular uri, including * locks that might be set on a parent uri. * * If returnChildLocks is set to true, this method should also look for * any locks in the subtree of the uri for locks. * * @param string $uri * @param bool $returnChildLocks * @return array */ public function getLocks($uri, $returnChildLocks) { $lockList = array(); $currentPath = ''; foreach(explode('/',$uri) as $uriPart) { // weird algorithm that can probably be improved, but we're traversing the path top down if ($currentPath) $currentPath.='/'; $currentPath.=$uriPart; $uriLocks = $this->getData($currentPath); foreach($uriLocks as $uriLock) { // Unless we're on the leaf of the uri-tree we should ignore locks with depth 0 if($uri==$currentPath || $uriLock->depth!=0) { $uriLock->uri = $currentPath; $lockList[] = $uriLock; } } } // Checking if we can remove any of these locks foreach($lockList as $k=>$lock) { if (time() > $lock->timeout + $lock->created) unset($lockList[$k]); } return $lockList; } /** * Locks a uri * * @param string $uri * @param LockInfo $lockInfo * @return bool */ public function lock($uri, LockInfo $lockInfo) { // We're making the lock timeout 30 minutes $lockInfo->timeout = 1800; $lockInfo->created = time(); $locks = $this->getLocks($uri,false); foreach($locks as $k=>$lock) { if ($lock->token == $lockInfo->token) unset($locks[$k]); } $locks[] = $lockInfo; $this->putData($uri,$locks); return true; } /** * Removes a lock from a uri * * @param string $uri * @param LockInfo $lockInfo * @return bool */ public function unlock($uri, LockInfo $lockInfo) { $locks = $this->getLocks($uri,false); foreach($locks as $k=>$lock) { if ($lock->token == $lockInfo->token) { unset($locks[$k]); $this->putData($uri,$locks); return true; } } return false; } /** * Returns the stored data for a uri * * @param string $uri * @return array */ protected function getData($uri) { $path = $this->getFilenameForUri($uri); if (!file_exists($path)) return array(); // opening up the file, and creating a shared lock $handle = fopen($path,'r'); flock($handle,LOCK_SH); $data = ''; // Reading data until the eof while(!feof($handle)) { $data.=fread($handle,8192); } // We're all good fclose($handle); // Unserializing and checking if the resource file contains data for this file $data = unserialize($data); if (!$data) return array(); return $data; } /** * Updates the lock information * * @param string $uri * @param array $newData * @return void */ protected function putData($uri,array $newData) { $path = $this->getFileNameForUri($uri); // opening up the file, and creating a shared lock $handle = fopen($path,'a+'); flock($handle,LOCK_EX); ftruncate($handle,0); rewind($handle); fwrite($handle,serialize($newData)); fclose($handle); } } sabre-dav-1.8.12/lib/Sabre/DAV/Locks/Backend/File.php000066400000000000000000000103111246001162500216460ustar00rootroot00000000000000locksFile = $locksFile; } /** * Returns a list of Sabre\DAV\Locks\LockInfo objects * * This method should return all the locks for a particular uri, including * locks that might be set on a parent uri. * * If returnChildLocks is set to true, this method should also look for * any locks in the subtree of the uri for locks. * * @param string $uri * @param bool $returnChildLocks * @return array */ public function getLocks($uri, $returnChildLocks) { $newLocks = array(); $locks = $this->getData(); foreach($locks as $lock) { if ($lock->uri === $uri || //deep locks on parents ($lock->depth!=0 && strpos($uri, $lock->uri . '/')===0) || // locks on children ($returnChildLocks && (strpos($lock->uri, $uri . '/')===0)) ) { $newLocks[] = $lock; } } // Checking if we can remove any of these locks foreach($newLocks as $k=>$lock) { if (time() > $lock->timeout + $lock->created) unset($newLocks[$k]); } return $newLocks; } /** * Locks a uri * * @param string $uri * @param LockInfo $lockInfo * @return bool */ public function lock($uri, LockInfo $lockInfo) { // We're making the lock timeout 30 minutes $lockInfo->timeout = 1800; $lockInfo->created = time(); $lockInfo->uri = $uri; $locks = $this->getData(); foreach($locks as $k=>$lock) { if ( ($lock->token == $lockInfo->token) || (time() > $lock->timeout + $lock->created) ) { unset($locks[$k]); } } $locks[] = $lockInfo; $this->putData($locks); return true; } /** * Removes a lock from a uri * * @param string $uri * @param LockInfo $lockInfo * @return bool */ public function unlock($uri, LockInfo $lockInfo) { $locks = $this->getData(); foreach($locks as $k=>$lock) { if ($lock->token == $lockInfo->token) { unset($locks[$k]); $this->putData($locks); return true; } } return false; } /** * Loads the lockdata from the filesystem. * * @return array */ protected function getData() { if (!file_exists($this->locksFile)) return array(); // opening up the file, and creating a shared lock $handle = fopen($this->locksFile,'r'); flock($handle,LOCK_SH); // Reading data until the eof $data = stream_get_contents($handle); // We're all good fclose($handle); // Unserializing and checking if the resource file contains data for this file $data = unserialize($data); if (!$data) return array(); return $data; } /** * Saves the lockdata * * @param array $newData * @return void */ protected function putData(array $newData) { // opening up the file, and creating an exclusive lock $handle = fopen($this->locksFile,'a+'); flock($handle,LOCK_EX); // We can only truncate and rewind once the lock is acquired. ftruncate($handle,0); rewind($handle); fwrite($handle,serialize($newData)); fclose($handle); } } sabre-dav-1.8.12/lib/Sabre/DAV/Locks/Backend/PDO.php000066400000000000000000000110141246001162500214120ustar00rootroot00000000000000pdo = $pdo; $this->tableName = $tableName; } /** * Returns a list of Sabre\DAV\Locks\LockInfo objects * * This method should return all the locks for a particular uri, including * locks that might be set on a parent uri. * * If returnChildLocks is set to true, this method should also look for * any locks in the subtree of the uri for locks. * * @param string $uri * @param bool $returnChildLocks * @return array */ public function getLocks($uri, $returnChildLocks) { // NOTE: the following 10 lines or so could be easily replaced by // pure sql. MySQL's non-standard string concatenation prevents us // from doing this though. $query = 'SELECT owner, token, timeout, created, scope, depth, uri FROM '.$this->tableName.' WHERE ((created + timeout) > CAST(? AS UNSIGNED INTEGER)) AND ((uri = ?)'; $params = array(time(),$uri); // We need to check locks for every part in the uri. $uriParts = explode('/',$uri); // We already covered the last part of the uri array_pop($uriParts); $currentPath=''; foreach($uriParts as $part) { if ($currentPath) $currentPath.='/'; $currentPath.=$part; $query.=' OR (depth!=0 AND uri = ?)'; $params[] = $currentPath; } if ($returnChildLocks) { $query.=' OR (uri LIKE ?)'; $params[] = $uri . '/%'; } $query.=')'; $stmt = $this->pdo->prepare($query); $stmt->execute($params); $result = $stmt->fetchAll(); $lockList = array(); foreach($result as $row) { $lockInfo = new LockInfo(); $lockInfo->owner = $row['owner']; $lockInfo->token = $row['token']; $lockInfo->timeout = $row['timeout']; $lockInfo->created = $row['created']; $lockInfo->scope = $row['scope']; $lockInfo->depth = $row['depth']; $lockInfo->uri = $row['uri']; $lockList[] = $lockInfo; } return $lockList; } /** * Locks a uri * * @param string $uri * @param LockInfo $lockInfo * @return bool */ public function lock($uri, LockInfo $lockInfo) { // We're making the lock timeout 30 minutes $lockInfo->timeout = 30*60; $lockInfo->created = time(); $lockInfo->uri = $uri; $locks = $this->getLocks($uri,false); $exists = false; foreach($locks as $lock) { if ($lock->token == $lockInfo->token) $exists = true; } if ($exists) { $stmt = $this->pdo->prepare('UPDATE '.$this->tableName.' SET owner = ?, timeout = ?, scope = ?, depth = ?, uri = ?, created = ? WHERE token = ?'); $stmt->execute(array($lockInfo->owner,$lockInfo->timeout,$lockInfo->scope,$lockInfo->depth,$uri,$lockInfo->created,$lockInfo->token)); } else { $stmt = $this->pdo->prepare('INSERT INTO '.$this->tableName.' (owner,timeout,scope,depth,uri,created,token) VALUES (?,?,?,?,?,?,?)'); $stmt->execute(array($lockInfo->owner,$lockInfo->timeout,$lockInfo->scope,$lockInfo->depth,$uri,$lockInfo->created,$lockInfo->token)); } return true; } /** * Removes a lock from a uri * * @param string $uri * @param LockInfo $lockInfo * @return bool */ public function unlock($uri, LockInfo $lockInfo) { $stmt = $this->pdo->prepare('DELETE FROM '.$this->tableName.' WHERE uri = ? AND token = ?'); $stmt->execute(array($uri,$lockInfo->token)); return $stmt->rowCount()===1; } } sabre-dav-1.8.12/lib/Sabre/DAV/Locks/LockInfo.php000066400000000000000000000024231246001162500211510ustar00rootroot00000000000000addPlugin($lockPlugin); * * @copyright Copyright (C) 2007-2015 fruux GmbH (https://fruux.com/). * @author Evert Pot (http://evertpot.com/) * @license http://sabre.io/license/ Modified BSD License */ class Plugin extends DAV\ServerPlugin { /** * locksBackend * * @var Backend\Backend\Interface */ protected $locksBackend; /** * server * * @var Sabre\DAV\Server */ protected $server; /** * __construct * * @param Backend\BackendInterface $locksBackend */ public function __construct(Backend\BackendInterface $locksBackend = null) { $this->locksBackend = $locksBackend; } /** * Initializes the plugin * * This method is automatically called by the Server class after addPlugin. * * @param DAV\Server $server * @return void */ public function initialize(DAV\Server $server) { $this->server = $server; $server->subscribeEvent('unknownMethod',array($this,'unknownMethod')); $server->subscribeEvent('beforeMethod',array($this,'beforeMethod'),50); $server->subscribeEvent('afterGetProperties',array($this,'afterGetProperties')); } /** * Returns a plugin name. * * Using this name other plugins will be able to access other plugins * using Sabre\DAV\Server::getPlugin * * @return string */ public function getPluginName() { return 'locks'; } /** * This method is called by the Server if the user used an HTTP method * the server didn't recognize. * * This plugin intercepts the LOCK and UNLOCK methods. * * @param string $method * @param string $uri * @return bool */ public function unknownMethod($method, $uri) { switch($method) { case 'LOCK' : $this->httpLock($uri); return false; case 'UNLOCK' : $this->httpUnlock($uri); return false; } } /** * This method is called after most properties have been found * it allows us to add in any Lock-related properties * * @param string $path * @param array $newProperties * @return bool */ public function afterGetProperties($path, &$newProperties) { foreach($newProperties[404] as $propName=>$discard) { switch($propName) { case '{DAV:}supportedlock' : $val = false; if ($this->locksBackend) $val = true; $newProperties[200][$propName] = new DAV\Property\SupportedLock($val); unset($newProperties[404][$propName]); break; case '{DAV:}lockdiscovery' : $newProperties[200][$propName] = new DAV\Property\LockDiscovery($this->getLocks($path)); unset($newProperties[404][$propName]); break; } } return true; } /** * This method is called before the logic for any HTTP method is * handled. * * This plugin uses that feature to intercept access to locked resources. * * @param string $method * @param string $uri * @return bool */ public function beforeMethod($method, $uri) { switch($method) { case 'DELETE' : $lastLock = null; if (!$this->validateLock($uri,$lastLock, true)) throw new DAV\Exception\Locked($lastLock); break; case 'MKCOL' : case 'PROPPATCH' : case 'PUT' : case 'PATCH' : $lastLock = null; if (!$this->validateLock($uri,$lastLock)) throw new DAV\Exception\Locked($lastLock); break; case 'MOVE' : $lastLock = null; if (!$this->validateLock(array( $uri, $this->server->calculateUri($this->server->httpRequest->getHeader('Destination')), ),$lastLock, true)) throw new DAV\Exception\Locked($lastLock); break; case 'COPY' : $lastLock = null; if (!$this->validateLock( $this->server->calculateUri($this->server->httpRequest->getHeader('Destination')), $lastLock, true)) throw new DAV\Exception\Locked($lastLock); break; } return true; } /** * Use this method to tell the server this plugin defines additional * HTTP methods. * * This method is passed a uri. It should only return HTTP methods that are * available for the specified uri. * * @param string $uri * @return array */ public function getHTTPMethods($uri) { if ($this->locksBackend) return array('LOCK','UNLOCK'); return array(); } /** * Returns a list of features for the HTTP OPTIONS Dav: header. * * In this case this is only the number 2. The 2 in the Dav: header * indicates the server supports locks. * * @return array */ public function getFeatures() { return array(2); } /** * Returns all lock information on a particular uri * * This function should return an array with Sabre\DAV\Locks\LockInfo objects. If there are no locks on a file, return an empty array. * * Additionally there is also the possibility of locks on parent nodes, so we'll need to traverse every part of the tree * If the $returnChildLocks argument is set to true, we'll also traverse all the children of the object * for any possible locks and return those as well. * * @param string $uri * @param bool $returnChildLocks * @return array */ public function getLocks($uri, $returnChildLocks = false) { $lockList = array(); if ($this->locksBackend) $lockList = array_merge($lockList,$this->locksBackend->getLocks($uri, $returnChildLocks)); return $lockList; } /** * Locks an uri * * The WebDAV lock request can be operated to either create a new lock on a file, or to refresh an existing lock * If a new lock is created, a full XML body should be supplied, containing information about the lock such as the type * of lock (shared or exclusive) and the owner of the lock * * If a lock is to be refreshed, no body should be supplied and there should be a valid If header containing the lock * * Additionally, a lock can be requested for a non-existent file. In these case we're obligated to create an empty file as per RFC4918:S7.3 * * @param string $uri * @return void */ protected function httpLock($uri) { $lastLock = null; if (!$this->validateLock($uri,$lastLock)) { // If the existing lock was an exclusive lock, we need to fail if (!$lastLock || $lastLock->scope == LockInfo::EXCLUSIVE) { //var_dump($lastLock); throw new DAV\Exception\ConflictingLock($lastLock); } } if ($body = $this->server->httpRequest->getBody(true)) { // This is a new lock request $lockInfo = $this->parseLockRequest($body); $lockInfo->depth = $this->server->getHTTPDepth(); $lockInfo->uri = $uri; if($lastLock && $lockInfo->scope != LockInfo::SHARED) throw new DAV\Exception\ConflictingLock($lastLock); } elseif ($lastLock) { // This must have been a lock refresh $lockInfo = $lastLock; // The resource could have been locked through another uri. if ($uri!=$lockInfo->uri) $uri = $lockInfo->uri; } else { // There was neither a lock refresh nor a new lock request throw new DAV\Exception\BadRequest('An xml body is required for lock requests'); } if ($timeout = $this->getTimeoutHeader()) $lockInfo->timeout = $timeout; $newFile = false; // If we got this far.. we should go check if this node actually exists. If this is not the case, we need to create it first try { $this->server->tree->getNodeForPath($uri); // We need to call the beforeWriteContent event for RFC3744 // Edit: looks like this is not used, and causing problems now. // // See Issue 222 // $this->server->broadcastEvent('beforeWriteContent',array($uri)); } catch (DAV\Exception\NotFound $e) { // It didn't, lets create it $this->server->createFile($uri,fopen('php://memory','r')); $newFile = true; } $this->lockNode($uri,$lockInfo); $this->server->httpResponse->setHeader('Content-Type','application/xml; charset=utf-8'); $this->server->httpResponse->setHeader('Lock-Token','token . '>'); $this->server->httpResponse->sendStatus($newFile?201:200); $this->server->httpResponse->sendBody($this->generateLockResponse($lockInfo)); } /** * Unlocks a uri * * This WebDAV method allows you to remove a lock from a node. The client should provide a valid locktoken through the Lock-token http header * The server should return 204 (No content) on success * * @param string $uri * @return void */ protected function httpUnlock($uri) { $lockToken = $this->server->httpRequest->getHeader('Lock-Token'); // If the locktoken header is not supplied, we need to throw a bad request exception if (!$lockToken) throw new DAV\Exception\BadRequest('No lock token was supplied'); $locks = $this->getLocks($uri); // Windows sometimes forgets to include < and > in the Lock-Token // header if ($lockToken[0]!=='<') $lockToken = '<' . $lockToken . '>'; foreach($locks as $lock) { if ('token . '>' == $lockToken) { $this->unlockNode($uri,$lock); $this->server->httpResponse->setHeader('Content-Length','0'); $this->server->httpResponse->sendStatus(204); return; } } // If we got here, it means the locktoken was invalid throw new DAV\Exception\LockTokenMatchesRequestUri(); } /** * Locks a uri * * All the locking information is supplied in the lockInfo object. The object has a suggested timeout, but this can be safely ignored * It is important that if the existing timeout is ignored, the property is overwritten, as this needs to be sent back to the client * * @param string $uri * @param LockInfo $lockInfo * @return bool */ public function lockNode($uri,LockInfo $lockInfo) { if (!$this->server->broadcastEvent('beforeLock',array($uri,$lockInfo))) return; if ($this->locksBackend) return $this->locksBackend->lock($uri,$lockInfo); throw new DAV\Exception\MethodNotAllowed('Locking support is not enabled for this resource. No Locking backend was found so if you didn\'t expect this error, please check your configuration.'); } /** * Unlocks a uri * * This method removes a lock from a uri. It is assumed all the supplied information is correct and verified * * @param string $uri * @param LockInfo $lockInfo * @return bool */ public function unlockNode($uri, LockInfo $lockInfo) { if (!$this->server->broadcastEvent('beforeUnlock',array($uri,$lockInfo))) return; if ($this->locksBackend) return $this->locksBackend->unlock($uri,$lockInfo); } /** * Returns the contents of the HTTP Timeout header. * * The method formats the header into an integer. * * @return int */ public function getTimeoutHeader() { $header = $this->server->httpRequest->getHeader('Timeout'); if ($header) { if (stripos($header,'second-')===0) $header = (int)(substr($header,7)); else if (strtolower($header)=='infinite') $header = LockInfo::TIMEOUT_INFINITE; else throw new DAV\Exception\BadRequest('Invalid HTTP timeout header'); } else { $header = 0; } return $header; } /** * Generates the response for successful LOCK requests * * @param LockInfo $lockInfo * @return string */ protected function generateLockResponse(LockInfo $lockInfo) { $dom = new \DOMDocument('1.0','utf-8'); $dom->formatOutput = true; $prop = $dom->createElementNS('DAV:','d:prop'); $dom->appendChild($prop); $lockDiscovery = $dom->createElementNS('DAV:','d:lockdiscovery'); $prop->appendChild($lockDiscovery); $lockObj = new DAV\Property\LockDiscovery(array($lockInfo),true); $lockObj->serialize($this->server,$lockDiscovery); return $dom->saveXML(); } /** * validateLock should be called when a write operation is about to happen * It will check if the requested url is locked, and see if the correct lock tokens are passed * * @param mixed $urls List of relevant urls. Can be an array, a string or nothing at all for the current request uri * @param mixed $lastLock This variable will be populated with the last checked lock object (Sabre\DAV\Locks\LockInfo) * @param bool $checkChildLocks If set to true, this function will also look for any locks set on child resources of the supplied urls. This is needed for for example deletion of entire trees. * @return bool */ protected function validateLock($urls = null,&$lastLock = null, $checkChildLocks = false) { if (is_null($urls)) { $urls = array($this->server->getRequestUri()); } elseif (is_string($urls)) { $urls = array($urls); } elseif (!is_array($urls)) { throw new DAV\Exception('The urls parameter should either be null, a string or an array'); } $conditions = $this->getIfConditions(); // We're going to loop through the urls and make sure all lock conditions are satisfied foreach($urls as $url) { $locks = $this->getLocks($url, $checkChildLocks); // If there were no conditions, but there were locks, we fail if (!$conditions && $locks) { reset($locks); $lastLock = current($locks); return false; } // If there were no locks or conditions, we go to the next url if (!$locks && !$conditions) continue; foreach($conditions as $condition) { if (!$condition['uri']) { $conditionUri = $this->server->getRequestUri(); } else { $conditionUri = $this->server->calculateUri($condition['uri']); } // If the condition has a url, and it isn't part of the affected url at all, check the next condition if ($conditionUri && strpos($url,$conditionUri)!==0) continue; // The tokens array contians arrays with 2 elements. 0=true/false for normal/not condition, 1=locktoken // At least 1 condition has to be satisfied foreach($condition['tokens'] as $conditionToken) { $etagValid = true; $lockValid = true; // key 2 can contain an etag if ($conditionToken[2]) { $uri = $conditionUri?$conditionUri:$this->server->getRequestUri(); $node = $this->server->tree->getNodeForPath($uri); $etagValid = $node instanceof DAV\IFile && $node->getETag()==$conditionToken[2]; } // key 1 can contain a lock token if ($conditionToken[1]) { $lockValid = false; // Match all the locks foreach($locks as $lockIndex=>$lock) { $lockToken = 'opaquelocktoken:' . $lock->token; // Checking NOT if (!$conditionToken[0] && $lockToken != $conditionToken[1]) { // Condition valid, onto the next $lockValid = true; break; } if ($conditionToken[0] && $lockToken == $conditionToken[1]) { $lastLock = $lock; // Condition valid and lock matched unset($locks[$lockIndex]); $lockValid = true; break; } } } // If, after checking both etags and locks they are stil valid, // we can continue with the next condition. if ($etagValid && $lockValid) continue 2; } // No conditions matched, so we fail throw new DAV\Exception\PreconditionFailed('The tokens provided in the if header did not match','If'); } // Conditions were met, we'll also need to check if all the locks are gone if (count($locks)) { reset($locks); // There's still locks, we fail $lastLock = current($locks); return false; } } // We got here, this means every condition was satisfied return true; } /** * This method is created to extract information from the WebDAV HTTP 'If:' header * * The If header can be quite complex, and has a bunch of features. We're using a regex to extract all relevant information * The function will return an array, containing structs with the following keys * * * uri - the uri the condition applies to. If this is returned as an * empty string, this implies it's referring to the request url. * * tokens - The lock token. another 2 dimensional array containing 2 elements (0 = true/false.. If this is a negative condition its set to false, 1 = the actual token) * * etag - an etag, if supplied * * @return array */ public function getIfConditions() { $header = $this->server->httpRequest->getHeader('If'); if (!$header) return array(); $matches = array(); $regex = '/(?:\<(?P.*?)\>\s)?\((?PNot\s)?(?:\<(?P[^\>]*)\>)?(?:\s?)(?:\[(?P[^\]]*)\])?\)/im'; preg_match_all($regex,$header,$matches,PREG_SET_ORDER); $conditions = array(); foreach($matches as $match) { $condition = array( 'uri' => $match['uri'], 'tokens' => array( array($match['not']?0:1,$match['token'],isset($match['etag'])?$match['etag']:'') ), ); if (!$condition['uri'] && count($conditions)) $conditions[count($conditions)-1]['tokens'][] = array( $match['not']?0:1, $match['token'], isset($match['etag'])?$match['etag']:'' ); else { $conditions[] = $condition; } } return $conditions; } /** * Parses a webdav lock xml body, and returns a new Sabre\DAV\Locks\LockInfo object * * @param string $body * @return DAV\Locks\LockInfo */ protected function parseLockRequest($body) { // Fixes an XXE vulnerability on PHP versions older than 5.3.23 or // 5.4.13. $previous = libxml_disable_entity_loader(true); $xml = simplexml_load_string( DAV\XMLUtil::convertDAVNamespace($body), null, LIBXML_NOWARNING); libxml_disable_entity_loader($previous); $xml->registerXPathNamespace('d','urn:DAV'); $lockInfo = new LockInfo(); $children = $xml->children("urn:DAV"); $lockInfo->owner = (string)$children->owner; $lockInfo->token = DAV\UUIDUtil::getUUID(); $lockInfo->scope = count($xml->xpath('d:lockscope/d:exclusive'))>0 ? LockInfo::EXCLUSIVE : LockInfo::SHARED; return $lockInfo; } } sabre-dav-1.8.12/lib/Sabre/DAV/Mount/000077500000000000000000000000001246001162500167625ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/DAV/Mount/Plugin.php000066400000000000000000000041401246001162500207300ustar00rootroot00000000000000server = $server; $this->server->subscribeEvent('beforeMethod',array($this,'beforeMethod'), 90); } /** * 'beforeMethod' event handles. This event handles intercepts GET requests ending * with ?mount * * @param string $method * @param string $uri * @return bool */ public function beforeMethod($method, $uri) { if ($method!='GET') return; if ($this->server->httpRequest->getQueryString()!='mount') return; $currentUri = $this->server->httpRequest->getAbsoluteUri(); // Stripping off everything after the ? list($currentUri) = explode('?',$currentUri); $this->davMount($currentUri); // Returning false to break the event chain return false; } /** * Generates the davmount response * * @param string $uri absolute uri * @return void */ public function davMount($uri) { $this->server->httpResponse->sendStatus(200); $this->server->httpResponse->setHeader('Content-Type','application/davmount+xml'); ob_start(); echo '', "\n"; echo "\n"; echo " ", htmlspecialchars($uri, ENT_NOQUOTES, 'UTF-8'), "\n"; echo ""; $this->server->httpResponse->sendBody(ob_get_clean()); } } sabre-dav-1.8.12/lib/Sabre/DAV/Node.php000066400000000000000000000020571246001162500172620ustar00rootroot00000000000000rootNode = $rootNode; } /** * Returns the INode object for the requested path * * @param string $path * @return INode */ public function getNodeForPath($path) { $path = trim($path,'/'); if (isset($this->cache[$path])) return $this->cache[$path]; // Is it the root node? if (!strlen($path)) { return $this->rootNode; } // Attempting to fetch its parent list($parentName, $baseName) = URLUtil::splitPath($path); // If there was no parent, we must simply ask it from the root node. if ($parentName==="") { $node = $this->rootNode->getChild($baseName); } else { // Otherwise, we recursively grab the parent and ask him/her. $parent = $this->getNodeForPath($parentName); if (!($parent instanceof ICollection)) throw new Exception\NotFound('Could not find node at path: ' . $path); $node = $parent->getChild($baseName); } $this->cache[$path] = $node; return $node; } /** * This function allows you to check if a node exists. * * @param string $path * @return bool */ public function nodeExists($path) { try { // The root always exists if ($path==='') return true; list($parent, $base) = URLUtil::splitPath($path); $parentNode = $this->getNodeForPath($parent); if (!$parentNode instanceof ICollection) return false; return $parentNode->childExists($base); } catch (Exception\NotFound $e) { return false; } } /** * Returns a list of childnodes for a given path. * * @param string $path * @return array */ public function getChildren($path) { $node = $this->getNodeForPath($path); $children = $node->getChildren(); foreach($children as $child) { $this->cache[trim($path,'/') . '/' . $child->getName()] = $child; } return $children; } /** * This method is called with every tree update * * Examples of tree updates are: * * node deletions * * node creations * * copy * * move * * renaming nodes * * If Tree classes implement a form of caching, this will allow * them to make sure caches will be expired. * * If a path is passed, it is assumed that the entire subtree is dirty * * @param string $path * @return void */ public function markDirty($path) { // We don't care enough about sub-paths // flushing the entire cache $path = trim($path,'/'); foreach($this->cache as $nodePath=>$node) { if ($nodePath == $path || strpos($nodePath,$path.'/')===0) unset($this->cache[$nodePath]); } } } sabre-dav-1.8.12/lib/Sabre/DAV/PartialUpdate/000077500000000000000000000000001246001162500204175ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/DAV/PartialUpdate/IFile.php000066400000000000000000000022041246001162500221160ustar00rootroot00000000000000addPlugin($patchPlugin); * * @copyright Copyright (C) 2007-2015 fruux GmbH (https://fruux.com/). * @author Jean-Tiare LE BIGOT (http://www.jtlebi.fr/) * @license http://sabre.io/license/ Modified BSD License */ class Plugin extends DAV\ServerPlugin { const RANGE_APPEND = 1; const RANGE_START = 2; const RANGE_END = 3; /** * Reference to server * * @var Sabre\DAV\Server */ protected $server; /** * Initializes the plugin * * This method is automatically called by the Server class after addPlugin. * * @param DAV\Server $server * @return void */ public function initialize(DAV\Server $server) { $this->server = $server; $server->subscribeEvent('unknownMethod',array($this,'unknownMethod')); } /** * Returns a plugin name. * * Using this name other plugins will be able to access other plugins * using DAV\Server::getPlugin * * @return string */ public function getPluginName() { return 'partialupdate'; } /** * This method is called by the Server if the user used an HTTP method * the server didn't recognize. * * This plugin intercepts the PATCH methods. * * @param string $method * @param string $uri * @return bool|null */ public function unknownMethod($method, $uri) { switch($method) { case 'PATCH': return $this->httpPatch($uri); } } /** * Use this method to tell the server this plugin defines additional * HTTP methods. * * This method is passed a uri. It should only return HTTP methods that are * available for the specified uri. * * We claim to support PATCH method (partial update) if and only if * - the node exist * - the node implements our partial update interface * * @param string $uri * @return array */ public function getHTTPMethods($uri) { $tree = $this->server->tree; if ($tree->nodeExists($uri)) { $node = $tree->getNodeForPath($uri); if ($node instanceof IFile || $node instanceof IPatchSupport) { return array('PATCH'); } } return array(); } /** * Returns a list of features for the HTTP OPTIONS Dav: header. * * @return array */ public function getFeatures() { return array('sabredav-partialupdate'); } /** * Patch an uri * * The WebDAV patch request can be used to modify only a part of an * existing resource. If the resource does not exist yet and the first * offset is not 0, the request fails * * @param string $uri * @return void */ protected function httpPatch($uri) { // Get the node. Will throw a 404 if not found $node = $this->server->tree->getNodeForPath($uri); if (!$node instanceof IFile && !$node instanceof IPatchSupport) { throw new DAV\Exception\MethodNotAllowed('The target resource does not support the PATCH method.'); } $range = $this->getHTTPUpdateRange(); if (!$range) { throw new DAV\Exception\BadRequest('No valid "X-Update-Range" found in the headers'); } $contentType = strtolower( $this->server->httpRequest->getHeader('Content-Type') ); if ($contentType != 'application/x-sabredav-partialupdate') { throw new DAV\Exception\UnsupportedMediaType('Unknown Content-Type header "' . $contentType . '"'); } $len = $this->server->httpRequest->getHeader('Content-Length'); if (!$len) throw new DAV\Exception\LengthRequired('A Content-Length header is required'); switch($range[0]) { case self::RANGE_START : // Calculate the end-range if it doesn't exist. if (!$range[2]) { $range[2] = $range[1] + $len - 1; } else { if ($range[2] < $range[1]) { throw new DAV\Exception\RequestedRangeNotSatisfiable('The end offset (' . $range[2] . ') is lower than the start offset (' . $range[1] . ')'); } if($range[2] - $range[1] + 1 != $len) { throw new DAV\Exception\RequestedRangeNotSatisfiable('Actual data length (' . $len . ') is not consistent with begin (' . $range[1] . ') and end (' . $range[2] . ') offsets'); } } break; } // Checking If-None-Match and related headers. if (!$this->server->checkPreconditions()) return; if (!$this->server->broadcastEvent('beforeWriteContent',array($uri, $node, null))) return; $body = $this->server->httpRequest->getBody(); if ($node instanceof IPatchSupport) { $etag = $node->patch($body, $range[0], isset($range[1])?$range[1]:null); } else { // The old interface switch($range[0]) { case self::RANGE_APPEND : throw new DAV\Exception\NotImplemented('This node does not support the append syntax. Please upgrade it to IPatchSupport'); case self::RANGE_START : $etag = $node->putRange($body, $range[1]); break; case self::RANGE_END : throw new DAV\Exception\NotImplemented('This node does not support the end-range syntax. Please upgrade it to IPatchSupport'); break; } } $this->server->broadcastEvent('afterWriteContent',array($uri, $node)); $this->server->httpResponse->setHeader('Content-Length','0'); if ($etag) $this->server->httpResponse->setHeader('ETag',$etag); $this->server->httpResponse->sendStatus(204); return false; } /** * Returns the HTTP custom range update header * * This method returns null if there is no well-formed HTTP range request * header. It returns array(1) if it was an append request, array(2, * $start, $end) if it's a start and end range, lastly it's array(3, * $endoffset) if the offset was negative, and should be calculated from * the end of the file. * * Examples: * * null - invalid * array(1) - append * array(2,10,15) - update bytes 10, 11, 12, 13, 14, 15 * array(2,10,null) - update bytes 10 until the end of the patch body * array(3,-5) - update from 5 bytes from the end of the file. * * @return array|null */ public function getHTTPUpdateRange() { $range = $this->server->httpRequest->getHeader('X-Update-Range'); if (is_null($range)) return null; // Matching "Range: bytes=1234-5678: both numbers are optional if (!preg_match('/^(append)|(?:bytes=([0-9]+)-([0-9]*))|(?:bytes=(-[0-9]+))$/i',$range,$matches)) return null; if ($matches[1]==='append') { return array(self::RANGE_APPEND); } elseif (strlen($matches[2])>0) { return array(self::RANGE_START, $matches[2], $matches[3]?:null); } elseif ($matches[4]) { return array(self::RANGE_END, $matches[4]); } else { return null; } } } sabre-dav-1.8.12/lib/Sabre/DAV/Property.php000066400000000000000000000012741246001162500202210ustar00rootroot00000000000000time = $time; } elseif (is_int($time) || ctype_digit($time)) { $this->time = new \DateTime('@' . $time); } else { $this->time = new \DateTime($time); } // Setting timezone to UTC $this->time->setTimezone(new \DateTimeZone('UTC')); } /** * serialize * * @param DAV\Server $server * @param \DOMElement $prop * @return void */ public function serialize(DAV\Server $server, \DOMElement $prop) { $doc = $prop->ownerDocument; //$prop->setAttribute('xmlns:b','urn:uuid:c2f41010-65b3-11d1-a29f-00aa00c14882/'); //$prop->setAttribute('b:dt','dateTime.rfc1123'); $prop->nodeValue = HTTP\Util::toHTTPDate($this->time); } /** * getTime * * @return \DateTime */ public function getTime() { return $this->time; } } sabre-dav-1.8.12/lib/Sabre/DAV/Property/Href.php000066400000000000000000000043771246001162500211140ustar00rootroot00000000000000href = $href; $this->autoPrefix = $autoPrefix; } /** * Returns the uri * * @return string */ public function getHref() { return $this->href; } /** * Serializes this property. * * It will additionally prepend the href property with the server's base uri. * * @param DAV\Server $server * @param \DOMElement $dom * @return void */ public function serialize(DAV\Server $server, \DOMElement $dom) { $prefix = $server->xmlNamespaces['DAV:']; $elem = $dom->ownerDocument->createElement($prefix . ':href'); if ($this->autoPrefix) { $value = $server->getBaseUri() . DAV\URLUtil::encodePath($this->href); } else { $value = $this->href; } $elem->appendChild($dom->ownerDocument->createTextNode($value)); $dom->appendChild($elem); } /** * Unserializes this property from a DOM Element * * This method returns an instance of this class. * It will only decode {DAV:}href values. For non-compatible elements null will be returned. * * @param \DOMElement $dom * @return DAV\Property\Href */ static function unserialize(\DOMElement $dom) { if ($dom->firstChild && DAV\XMLUtil::toClarkNotation($dom->firstChild)==='{DAV:}href') { return new self($dom->firstChild->textContent,false); } } } sabre-dav-1.8.12/lib/Sabre/DAV/Property/HrefList.php000066400000000000000000000044421246001162500217410ustar00rootroot00000000000000hrefs = $hrefs; $this->autoPrefix = $autoPrefix; } /** * Returns the uris * * @return array */ public function getHrefs() { return $this->hrefs; } /** * Serializes this property. * * It will additionally prepend the href property with the server's base uri. * * @param DAV\Server $server * @param \DOMElement $dom * @return void */ public function serialize(DAV\Server $server,\DOMElement $dom) { $prefix = $server->xmlNamespaces['DAV:']; foreach($this->hrefs as $href) { $elem = $dom->ownerDocument->createElement($prefix . ':href'); if ($this->autoPrefix) { $value = $server->getBaseUri() . DAV\URLUtil::encodePath($href); } else { $value = $href; } $elem->appendChild($dom->ownerDocument->createTextNode($value)); $dom->appendChild($elem); } } /** * Unserializes this property from a DOM Element * * This method returns an instance of this class. * It will only decode {DAV:}href values. * * @param \DOMElement $dom * @return DAV\Property\HrefList */ static function unserialize(\DOMElement $dom) { $hrefs = array(); foreach($dom->childNodes as $child) { if (DAV\XMLUtil::toClarkNotation($child)==='{DAV:}href') { $hrefs[] = $child->textContent; } } return new self($hrefs, false); } } sabre-dav-1.8.12/lib/Sabre/DAV/Property/IHref.php000066400000000000000000000010161246001162500212100ustar00rootroot00000000000000locks = $locks; $this->revealLockToken = $revealLockToken; } /** * serialize * * @param DAV\Server $server * @param \DOMElement $prop * @return void */ public function serialize(DAV\Server $server, \DOMElement $prop) { $doc = $prop->ownerDocument; foreach($this->locks as $lock) { $activeLock = $doc->createElementNS('DAV:','d:activelock'); $prop->appendChild($activeLock); $lockScope = $doc->createElementNS('DAV:','d:lockscope'); $activeLock->appendChild($lockScope); $lockScope->appendChild($doc->createElementNS('DAV:','d:' . ($lock->scope==DAV\Locks\LockInfo::EXCLUSIVE?'exclusive':'shared'))); $lockType = $doc->createElementNS('DAV:','d:locktype'); $activeLock->appendChild($lockType); $lockType->appendChild($doc->createElementNS('DAV:','d:write')); /* {DAV:}lockroot */ if (!self::$hideLockRoot) { $lockRoot = $doc->createElementNS('DAV:','d:lockroot'); $activeLock->appendChild($lockRoot); $href = $doc->createElementNS('DAV:','d:href'); $href->appendChild($doc->createTextNode($server->getBaseUri() . $lock->uri)); $lockRoot->appendChild($href); } $activeLock->appendChild($doc->createElementNS('DAV:','d:depth',($lock->depth == DAV\Server::DEPTH_INFINITY?'infinity':$lock->depth))); $activeLock->appendChild($doc->createElementNS('DAV:','d:timeout','Second-' . $lock->timeout)); if ($this->revealLockToken) { $lockToken = $doc->createElementNS('DAV:','d:locktoken'); $activeLock->appendChild($lockToken); $lockToken->appendChild($doc->createElementNS('DAV:','d:href','opaquelocktoken:' . $lock->token)); } $activeLock->appendChild($doc->createElementNS('DAV:','d:owner',$lock->owner)); } } } sabre-dav-1.8.12/lib/Sabre/DAV/Property/ResourceType.php000066400000000000000000000056411246001162500226540ustar00rootroot00000000000000resourceType = array(); elseif ($resourceType === DAV\Server::NODE_DIRECTORY) $this->resourceType = array('{DAV:}collection'); elseif (is_array($resourceType)) $this->resourceType = $resourceType; else $this->resourceType = array($resourceType); } /** * serialize * * @param DAV\Server $server * @param \DOMElement $prop * @return void */ public function serialize(DAV\Server $server, \DOMElement $prop) { $propName = null; $rt = $this->resourceType; foreach($rt as $resourceType) { if (preg_match('/^{([^}]*)}(.*)$/',$resourceType,$propName)) { if (isset($server->xmlNamespaces[$propName[1]])) { $prop->appendChild($prop->ownerDocument->createElement($server->xmlNamespaces[$propName[1]] . ':' . $propName[2])); } else { $prop->appendChild($prop->ownerDocument->createElementNS($propName[1],'custom:' . $propName[2])); } } } } /** * Returns the values in clark-notation * * For example array('{DAV:}collection') * * @return array */ public function getValue() { return $this->resourceType; } /** * Checks if the principal contains a certain value * * @param string $type * @return bool */ public function is($type) { return in_array($type, $this->resourceType); } /** * Adds a resourcetype value to this property * * @param string $type * @return void */ public function add($type) { $this->resourceType[] = $type; $this->resourceType = array_unique($this->resourceType); } /** * Unserializes a DOM element into a ResourceType property. * * @param \DOMElement $dom * @return DAV\Property\ResourceType */ static public function unserialize(\DOMElement $dom) { $value = array(); foreach($dom->childNodes as $child) { $value[] = DAV\XMLUtil::toClarkNotation($child); } return new self($value); } } sabre-dav-1.8.12/lib/Sabre/DAV/Property/Response.php000066400000000000000000000111501246001162500220110ustar00rootroot00000000000000href = $href; $this->responseProperties = $responseProperties; } /** * Returns the url * * @return string */ public function getHref() { return $this->href; } /** * Returns the property list * * @return array */ public function getResponseProperties() { return $this->responseProperties; } /** * serialize * * @param DAV\Server $server * @param \DOMElement $dom * @return void */ public function serialize(DAV\Server $server, \DOMElement $dom) { $document = $dom->ownerDocument; $properties = $this->responseProperties; $xresponse = $document->createElement('d:response'); $dom->appendChild($xresponse); $uri = DAV\URLUtil::encodePath($this->href); // Adding the baseurl to the beginning of the url $uri = $server->getBaseUri() . $uri; $xresponse->appendChild($document->createElement('d:href',$uri)); // The properties variable is an array containing properties, grouped by // HTTP status foreach($properties as $httpStatus=>$propertyGroup) { // The 'href' is also in this array, and it's special cased. // We will ignore it if ($httpStatus=='href') continue; // If there are no properties in this group, we can also just carry on if (!count($propertyGroup)) continue; $xpropstat = $document->createElement('d:propstat'); $xresponse->appendChild($xpropstat); $xprop = $document->createElement('d:prop'); $xpropstat->appendChild($xprop); $nsList = $server->xmlNamespaces; foreach($propertyGroup as $propertyName=>$propertyValue) { $propName = null; preg_match('/^{([^}]*)}(.*)$/',$propertyName,$propName); // special case for empty namespaces if ($propName[1]=='') { $currentProperty = $document->createElement($propName[2]); $xprop->appendChild($currentProperty); $currentProperty->setAttribute('xmlns',''); } else { if (!isset($nsList[$propName[1]])) { $nsList[$propName[1]] = 'x' . count($nsList); } // If the namespace was defined in the top-level xml namespaces, it means // there was already a namespace declaration, and we don't have to worry about it. if (isset($server->xmlNamespaces[$propName[1]])) { $currentProperty = $document->createElement($nsList[$propName[1]] . ':' . $propName[2]); } else { $currentProperty = $document->createElementNS($propName[1],$nsList[$propName[1]].':' . $propName[2]); } $xprop->appendChild($currentProperty); } if (is_scalar($propertyValue)) { $text = $document->createTextNode($propertyValue); $currentProperty->appendChild($text); } elseif ($propertyValue instanceof DAV\PropertyInterface) { $propertyValue->serialize($server,$currentProperty); } elseif (!is_null($propertyValue)) { throw new DAV\Exception('Unknown property value type: ' . gettype($propertyValue) . ' for property: ' . $propertyName); } } $xpropstat->appendChild($document->createElement('d:status',$server->httpResponse->getStatusMessage($httpStatus))); } } } sabre-dav-1.8.12/lib/Sabre/DAV/Property/ResponseList.php000066400000000000000000000024671246001162500226600ustar00rootroot00000000000000responses = $responses; } /** * serialize * * @param DAV\Server $server * @param \DOMElement $dom * @return void */ public function serialize(DAV\Server $server,\DOMElement $dom) { foreach($this->responses as $response) { $response->serialize($server, $dom); } } } sabre-dav-1.8.12/lib/Sabre/DAV/Property/SupportedLock.php000066400000000000000000000041621246001162500230160ustar00rootroot00000000000000supportsLocks = $supportsLocks; } /** * serialize * * @param DAV\Server $server * @param \DOMElement $prop * @return void */ public function serialize(DAV\Server $server,\DOMElement $prop) { $doc = $prop->ownerDocument; if (!$this->supportsLocks) return null; $lockEntry1 = $doc->createElement('d:lockentry'); $lockEntry2 = $doc->createElement('d:lockentry'); $prop->appendChild($lockEntry1); $prop->appendChild($lockEntry2); $lockScope1 = $doc->createElement('d:lockscope'); $lockScope2 = $doc->createElement('d:lockscope'); $lockType1 = $doc->createElement('d:locktype'); $lockType2 = $doc->createElement('d:locktype'); $lockEntry1->appendChild($lockScope1); $lockEntry1->appendChild($lockType1); $lockEntry2->appendChild($lockScope2); $lockEntry2->appendChild($lockType2); $lockScope1->appendChild($doc->createElement('d:exclusive')); $lockScope2->appendChild($doc->createElement('d:shared')); $lockType1->appendChild($doc->createElement('d:write')); $lockType2->appendChild($doc->createElement('d:write')); //$frag->appendXML(''); //$frag->appendXML(''); } } sabre-dav-1.8.12/lib/Sabre/DAV/Property/SupportedReportSet.php000066400000000000000000000052021246001162500240510ustar00rootroot00000000000000addReport($reports); } /** * Adds a report to this property * * The report must be a string in clark-notation. * Multiple reports can be specified as an array. * * @param mixed $report * @return void */ public function addReport($report) { if (!is_array($report)) $report = array($report); foreach($report as $r) { if (!preg_match('/^{([^}]*)}(.*)$/',$r)) throw new DAV\Exception('Reportname must be in clark-notation'); $this->reports[] = $r; } } /** * Returns the list of supported reports * * @return array */ public function getValue() { return $this->reports; } /** * Serializes the node * * @param DAV\Server $server * @param \DOMElement $prop * @return void */ public function serialize(DAV\Server $server, \DOMElement $prop) { foreach($this->reports as $reportName) { $supportedReport = $prop->ownerDocument->createElement('d:supported-report'); $prop->appendChild($supportedReport); $report = $prop->ownerDocument->createElement('d:report'); $supportedReport->appendChild($report); preg_match('/^{([^}]*)}(.*)$/',$reportName,$matches); list(, $namespace, $element) = $matches; $prefix = isset($server->xmlNamespaces[$namespace])?$server->xmlNamespaces[$namespace]:null; if ($prefix) { $report->appendChild($prop->ownerDocument->createElement($prefix . ':' . $element)); } else { $report->appendChild($prop->ownerDocument->createElementNS($namespace, 'x:' . $element)); } } } } sabre-dav-1.8.12/lib/Sabre/DAV/PropertyInterface.php000066400000000000000000000007041246001162500220370ustar00rootroot00000000000000 'd', 'http://sabredav.org/ns' => 's', ); /** * The propertymap can be used to map properties from * requests to property classes. * * @var array */ public $propertyMap = array( '{DAV:}resourcetype' => 'Sabre\\DAV\\Property\\ResourceType', ); public $protectedProperties = array( // RFC4918 '{DAV:}getcontentlength', '{DAV:}getetag', '{DAV:}getlastmodified', '{DAV:}lockdiscovery', '{DAV:}supportedlock', // RFC4331 '{DAV:}quota-available-bytes', '{DAV:}quota-used-bytes', // RFC3744 '{DAV:}supported-privilege-set', '{DAV:}current-user-privilege-set', '{DAV:}acl', '{DAV:}acl-restrictions', '{DAV:}inherited-acl-set', ); /** * This is a flag that allow or not showing file, line and code * of the exception in the returned XML * * @var bool */ public $debugExceptions = false; /** * This property allows you to automatically add the 'resourcetype' value * based on a node's classname or interface. * * The preset ensures that {DAV:}collection is automaticlly added for nodes * implementing Sabre\DAV\ICollection. * * @var array */ public $resourceTypeMapping = array( 'Sabre\\DAV\\ICollection' => '{DAV:}collection', ); /** * If this setting is turned off, SabreDAV's version number will be hidden * from various places. * * Some people feel this is a good security measure. * * @var bool */ static public $exposeVersion = true; /** * Sets up the server * * If a Sabre\DAV\Tree object is passed as an argument, it will * use it as the directory tree. If a Sabre\DAV\INode is passed, it * will create a Sabre\DAV\ObjectTree and use the node as the root. * * If nothing is passed, a Sabre\DAV\SimpleCollection is created in * a Sabre\DAV\ObjectTree. * * If an array is passed, we automatically create a root node, and use * the nodes in the array as top-level children. * * @param Tree|INode|array|null $treeOrNode The tree object */ public function __construct($treeOrNode = null) { if ($treeOrNode instanceof Tree) { $this->tree = $treeOrNode; } elseif ($treeOrNode instanceof INode) { $this->tree = new ObjectTree($treeOrNode); } elseif (is_array($treeOrNode)) { // If it's an array, a list of nodes was passed, and we need to // create the root node. foreach($treeOrNode as $node) { if (!($node instanceof INode)) { throw new Exception('Invalid argument passed to constructor. If you\'re passing an array, all the values must implement Sabre\\DAV\\INode'); } } $root = new SimpleCollection('root', $treeOrNode); $this->tree = new ObjectTree($root); } elseif (is_null($treeOrNode)) { $root = new SimpleCollection('root'); $this->tree = new ObjectTree($root); } else { throw new Exception('Invalid argument passed to constructor. Argument must either be an instance of Sabre\\DAV\\Tree, Sabre\\DAV\\INode, an array or null'); } $this->httpResponse = new HTTP\Response(); $this->httpRequest = new HTTP\Request(); } /** * Starts the DAV Server * * @return void */ public function exec() { try { // If nginx (pre-1.2) is used as a proxy server, and SabreDAV as an // origin, we must make sure we send back HTTP/1.0 if this was // requested. // This is mainly because nginx doesn't support Chunked Transfer // Encoding, and this forces the webserver SabreDAV is running on, // to buffer entire responses to calculate Content-Length. $this->httpResponse->defaultHttpVersion = $this->httpRequest->getHTTPVersion(); $this->invokeMethod($this->httpRequest->getMethod(), $this->getRequestUri()); } catch (Exception $e) { try { $this->broadcastEvent('exception', array($e)); } catch (Exception $ignore) { } $DOM = new \DOMDocument('1.0','utf-8'); $DOM->formatOutput = true; $error = $DOM->createElementNS('DAV:','d:error'); $error->setAttribute('xmlns:s',self::NS_SABREDAV); $DOM->appendChild($error); $h = function($v) { return htmlspecialchars($v, ENT_NOQUOTES, 'UTF-8'); }; $error->appendChild($DOM->createElement('s:exception',$h(get_class($e)))); $error->appendChild($DOM->createElement('s:message',$h($e->getMessage()))); if ($this->debugExceptions) { $error->appendChild($DOM->createElement('s:file',$h($e->getFile()))); $error->appendChild($DOM->createElement('s:line',$h($e->getLine()))); $error->appendChild($DOM->createElement('s:code',$h($e->getCode()))); $error->appendChild($DOM->createElement('s:stacktrace',$h($e->getTraceAsString()))); } if (self::$exposeVersion) { $error->appendChild($DOM->createElement('s:sabredav-version',$h(Version::VERSION))); } if($e instanceof Exception) { $httpCode = $e->getHTTPCode(); $e->serialize($this,$error); $headers = $e->getHTTPHeaders($this); } else { $httpCode = 500; $headers = array(); } $headers['Content-Type'] = 'application/xml; charset=utf-8'; $this->httpResponse->sendStatus($httpCode); $this->httpResponse->setHeaders($headers); $this->httpResponse->sendBody($DOM->saveXML()); } } /** * Sets the base server uri * * @param string $uri * @return void */ public function setBaseUri($uri) { // If the baseUri does not end with a slash, we must add it if ($uri[strlen($uri)-1]!=='/') $uri.='/'; $this->baseUri = $uri; } /** * Returns the base responding uri * * @return string */ public function getBaseUri() { if (is_null($this->baseUri)) $this->baseUri = $this->guessBaseUri(); return $this->baseUri; } /** * This method attempts to detect the base uri. * Only the PATH_INFO variable is considered. * * If this variable is not set, the root (/) is assumed. * * @return string */ public function guessBaseUri() { $pathInfo = $this->httpRequest->getRawServerValue('PATH_INFO'); $uri = $this->httpRequest->getRawServerValue('REQUEST_URI'); // If PATH_INFO is found, we can assume it's accurate. if (!empty($pathInfo)) { // We need to make sure we ignore the QUERY_STRING part if ($pos = strpos($uri,'?')) $uri = substr($uri,0,$pos); // PATH_INFO is only set for urls, such as: /example.php/path // in that case PATH_INFO contains '/path'. // Note that REQUEST_URI is percent encoded, while PATH_INFO is // not, Therefore they are only comparable if we first decode // REQUEST_INFO as well. $decodedUri = URLUtil::decodePath($uri); // A simple sanity check: if(substr($decodedUri,strlen($decodedUri)-strlen($pathInfo))===$pathInfo) { $baseUri = substr($decodedUri,0,strlen($decodedUri)-strlen($pathInfo)); return rtrim($baseUri,'/') . '/'; } throw new Exception('The REQUEST_URI ('. $uri . ') did not end with the contents of PATH_INFO (' . $pathInfo . '). This server might be misconfigured.'); } // The last fallback is that we're just going to assume the server root. return '/'; } /** * Adds a plugin to the server * * For more information, console the documentation of Sabre\DAV\ServerPlugin * * @param ServerPlugin $plugin * @return void */ public function addPlugin(ServerPlugin $plugin) { $this->plugins[$plugin->getPluginName()] = $plugin; $plugin->initialize($this); } /** * Returns an initialized plugin by it's name. * * This function returns null if the plugin was not found. * * @param string $name * @return ServerPlugin */ public function getPlugin($name) { if (isset($this->plugins[$name])) return $this->plugins[$name]; // This is a fallback and deprecated. foreach($this->plugins as $plugin) { if (get_class($plugin)===$name) return $plugin; } return null; } /** * Returns all plugins * * @return array */ public function getPlugins() { return $this->plugins; } /** * Subscribe to an event. * * When the event is triggered, we'll call all the specified callbacks. * It is possible to control the order of the callbacks through the * priority argument. * * This is for example used to make sure that the authentication plugin * is triggered before anything else. If it's not needed to change this * number, it is recommended to ommit. * * @param string $event * @param callback $callback * @param int $priority * @return void */ public function subscribeEvent($event, $callback, $priority = 100) { if (!isset($this->eventSubscriptions[$event])) { $this->eventSubscriptions[$event] = array(); } while(isset($this->eventSubscriptions[$event][$priority])) $priority++; $this->eventSubscriptions[$event][$priority] = $callback; ksort($this->eventSubscriptions[$event]); } /** * Broadcasts an event * * This method will call all subscribers. If one of the subscribers returns false, the process stops. * * The arguments parameter will be sent to all subscribers * * @param string $eventName * @param array $arguments * @return bool */ public function broadcastEvent($eventName,$arguments = array()) { if (isset($this->eventSubscriptions[$eventName])) { foreach($this->eventSubscriptions[$eventName] as $subscriber) { $result = call_user_func_array($subscriber,$arguments); if ($result===false) return false; } } return true; } /** * Handles a http request, and execute a method based on its name * * @param string $method * @param string $uri * @return void */ public function invokeMethod($method, $uri) { $method = strtoupper($method); if (!$this->broadcastEvent('beforeMethod',array($method, $uri))) return; // Make sure this is a HTTP method we support $internalMethods = array( 'OPTIONS', 'GET', 'HEAD', 'DELETE', 'PROPFIND', 'MKCOL', 'PUT', 'PROPPATCH', 'COPY', 'MOVE', 'REPORT' ); if (in_array($method,$internalMethods)) { call_user_func(array($this,'http' . $method), $uri); } else { if ($this->broadcastEvent('unknownMethod',array($method, $uri))) { // Unsupported method throw new Exception\NotImplemented('There was no handler found for this "' . $method . '" method'); } } } // {{{ HTTP Method implementations /** * HTTP OPTIONS * * @param string $uri * @return void */ protected function httpOptions($uri) { $methods = $this->getAllowedMethods($uri); $this->httpResponse->setHeader('Allow',strtoupper(implode(', ',$methods))); $features = array('1','3', 'extended-mkcol'); foreach($this->plugins as $plugin) $features = array_merge($features,$plugin->getFeatures()); $this->httpResponse->setHeader('DAV',implode(', ',$features)); $this->httpResponse->setHeader('MS-Author-Via','DAV'); $this->httpResponse->setHeader('Accept-Ranges','bytes'); if (self::$exposeVersion) { $this->httpResponse->setHeader('X-Sabre-Version',Version::VERSION); } $this->httpResponse->setHeader('Content-Length',0); $this->httpResponse->sendStatus(200); } /** * HTTP GET * * This method simply fetches the contents of a uri, like normal * * @param string $uri * @return bool */ protected function httpGet($uri) { $node = $this->tree->getNodeForPath($uri,0); if (!$this->checkPreconditions(true)) return false; if (!$node instanceof IFile) throw new Exception\NotImplemented('GET is only implemented on File objects'); $body = $node->get(); // Converting string into stream, if needed. if (is_string($body)) { $stream = fopen('php://temp','r+'); fwrite($stream,$body); rewind($stream); $body = $stream; } /* * TODO: getetag, getlastmodified, getsize should also be used using * this method */ $httpHeaders = $this->getHTTPHeaders($uri); /* ContentType needs to get a default, because many webservers will otherwise * default to text/html, and we don't want this for security reasons. */ if (!isset($httpHeaders['Content-Type'])) { $httpHeaders['Content-Type'] = 'application/octet-stream'; } if (isset($httpHeaders['Content-Length'])) { $nodeSize = $httpHeaders['Content-Length']; // Need to unset Content-Length, because we'll handle that during figuring out the range unset($httpHeaders['Content-Length']); } else { $nodeSize = null; } $this->httpResponse->setHeaders($httpHeaders); $range = $this->getHTTPRange(); $ifRange = $this->httpRequest->getHeader('If-Range'); $ignoreRangeHeader = false; // If ifRange is set, and range is specified, we first need to check // the precondition. if ($nodeSize && $range && $ifRange) { // if IfRange is parsable as a date we'll treat it as a DateTime // otherwise, we must treat it as an etag. try { $ifRangeDate = new \DateTime($ifRange); // It's a date. We must check if the entity is modified since // the specified date. if (!isset($httpHeaders['Last-Modified'])) $ignoreRangeHeader = true; else { $modified = new \DateTime($httpHeaders['Last-Modified']); if($modified > $ifRangeDate) $ignoreRangeHeader = true; } } catch (\Exception $e) { // It's an entity. We can do a simple comparison. if (!isset($httpHeaders['ETag'])) $ignoreRangeHeader = true; elseif ($httpHeaders['ETag']!==$ifRange) $ignoreRangeHeader = true; } } // We're only going to support HTTP ranges if the backend provided a filesize if (!$ignoreRangeHeader && $nodeSize && $range) { // Determining the exact byte offsets if (!is_null($range[0])) { $start = $range[0]; $end = $range[1]?$range[1]:$nodeSize-1; if($start >= $nodeSize) throw new Exception\RequestedRangeNotSatisfiable('The start offset (' . $range[0] . ') exceeded the size of the entity (' . $nodeSize . ')'); if($end < $start) throw new Exception\RequestedRangeNotSatisfiable('The end offset (' . $range[1] . ') is lower than the start offset (' . $range[0] . ')'); if($end >= $nodeSize) $end = $nodeSize-1; } else { $start = $nodeSize-$range[1]; $end = $nodeSize-1; if ($start<0) $start = 0; } // New read/write stream $newStream = fopen('php://temp','r+'); // stream_copy_to_stream() has a bug/feature: the `whence` argument // is interpreted as SEEK_SET (count from absolute offset 0), while // for a stream it should be SEEK_CUR (count from current offset). // If a stream is nonseekable, the function fails. So we *emulate* // the correct behaviour with fseek(): if ($start > 0) { if (($curOffs = ftell($body)) === false) $curOffs = 0; fseek($body, $start - $curOffs, SEEK_CUR); } stream_copy_to_stream($body, $newStream, $end-$start+1); rewind($newStream); $this->httpResponse->setHeader('Content-Length', $end-$start+1); $this->httpResponse->setHeader('Content-Range','bytes ' . $start . '-' . $end . '/' . $nodeSize); $this->httpResponse->sendStatus(206); $this->httpResponse->sendBody($newStream); } else { if ($nodeSize) $this->httpResponse->setHeader('Content-Length',$nodeSize); $this->httpResponse->sendStatus(200); $this->httpResponse->sendBody($body); } } /** * HTTP HEAD * * This method is normally used to take a peak at a url, and only get the HTTP response headers, without the body * This is used by clients to determine if a remote file was changed, so they can use a local cached version, instead of downloading it again * * @param string $uri * @return void */ protected function httpHead($uri) { $node = $this->tree->getNodeForPath($uri); /* This information is only collection for File objects. * Ideally we want to throw 405 Method Not Allowed for every * non-file, but MS Office does not like this */ if ($node instanceof IFile) { $headers = $this->getHTTPHeaders($this->getRequestUri()); if (!isset($headers['Content-Type'])) { $headers['Content-Type'] = 'application/octet-stream'; } $this->httpResponse->setHeaders($headers); } $this->httpResponse->sendStatus(200); } /** * HTTP Delete * * The HTTP delete method, deletes a given uri * * @param string $uri * @return void */ protected function httpDelete($uri) { // Checking If-None-Match and related headers. if (!$this->checkPreconditions()) return; if (!$this->broadcastEvent('beforeUnbind',array($uri))) return; $this->tree->delete($uri); $this->broadcastEvent('afterUnbind',array($uri)); $this->httpResponse->sendStatus(204); $this->httpResponse->setHeader('Content-Length','0'); } /** * WebDAV PROPFIND * * This WebDAV method requests information about an uri resource, or a list of resources * If a client wants to receive the properties for a single resource it will add an HTTP Depth: header with a 0 value * If the value is 1, it means that it also expects a list of sub-resources (e.g.: files in a directory) * * The request body contains an XML data structure that has a list of properties the client understands * The response body is also an xml document, containing information about every uri resource and the requested properties * * It has to return a HTTP 207 Multi-status status code * * @param string $uri * @return void */ protected function httpPropfind($uri) { $requestedProperties = $this->parsePropFindRequest($this->httpRequest->getBody(true)); $depth = $this->getHTTPDepth(1); // The only two options for the depth of a propfind is 0 or 1 if ($depth!=0) $depth = 1; $newProperties = $this->getPropertiesForPath($uri,$requestedProperties,$depth); // This is a multi-status response $this->httpResponse->sendStatus(207); $this->httpResponse->setHeader('Content-Type','application/xml; charset=utf-8'); $this->httpResponse->setHeader('Vary','Brief,Prefer'); // Normally this header is only needed for OPTIONS responses, however.. // iCal seems to also depend on these being set for PROPFIND. Since // this is not harmful, we'll add it. $features = array('1','3', 'extended-mkcol'); foreach($this->plugins as $plugin) $features = array_merge($features,$plugin->getFeatures()); $this->httpResponse->setHeader('DAV',implode(', ',$features)); $prefer = $this->getHTTPPrefer(); $minimal = $prefer['return-minimal']; $data = $this->generateMultiStatus($newProperties, $minimal); $this->httpResponse->sendBody($data); } /** * WebDAV PROPPATCH * * This method is called to update properties on a Node. The request is an XML body with all the mutations. * In this XML body it is specified which properties should be set/updated and/or deleted * * @param string $uri * @return void */ protected function httpPropPatch($uri) { $newProperties = $this->parsePropPatchRequest($this->httpRequest->getBody(true)); $result = $this->updateProperties($uri, $newProperties); $prefer = $this->getHTTPPrefer(); $this->httpResponse->setHeader('Vary','Brief,Prefer'); if ($prefer['return-minimal']) { // If return-minimal is specified, we only have to check if the // request was succesful, and don't need to return the // multi-status. $ok = true; foreach($result as $code=>$prop) { if ((int)$code > 299) { $ok = false; } } if ($ok) { $this->httpResponse->sendStatus(204); return; } } $this->httpResponse->sendStatus(207); $this->httpResponse->setHeader('Content-Type','application/xml; charset=utf-8'); $this->httpResponse->sendBody( $this->generateMultiStatus(array($result)) ); } /** * HTTP PUT method * * This HTTP method updates a file, or creates a new one. * * If a new resource was created, a 201 Created status code should be returned. If an existing resource is updated, it's a 204 No Content * * @param string $uri * @return bool */ protected function httpPut($uri) { $body = $this->httpRequest->getBody(); // Intercepting Content-Range if ($this->httpRequest->getHeader('Content-Range')) { /** Content-Range is dangerous for PUT requests: PUT per definition stores a full resource. draft-ietf-httpbis-p2-semantics-15 says in section 7.6: An origin server SHOULD reject any PUT request that contains a Content-Range header field, since it might be misinterpreted as partial content (or might be partial content that is being mistakenly PUT as a full representation). Partial content updates are possible by targeting a separately identified resource with state that overlaps a portion of the larger resource, or by using a different method that has been specifically defined for partial updates (for example, the PATCH method defined in [RFC5789]). This clarifies RFC2616 section 9.6: The recipient of the entity MUST NOT ignore any Content-* (e.g. Content-Range) headers that it does not understand or implement and MUST return a 501 (Not Implemented) response in such cases. OTOH is a PUT request with a Content-Range currently the only way to continue an aborted upload request and is supported by curl, mod_dav, Tomcat and others. Since some clients do use this feature which results in unexpected behaviour (cf PEAR::HTTP_WebDAV_Client 1.0.1), we reject all PUT requests with a Content-Range for now. */ throw new Exception\NotImplemented('PUT with Content-Range is not allowed.'); } // Intercepting the Finder problem if (($expected = $this->httpRequest->getHeader('X-Expected-Entity-Length')) && $expected > 0) { /** Many webservers will not cooperate well with Finder PUT requests, because it uses 'Chunked' transfer encoding for the request body. The symptom of this problem is that Finder sends files to the server, but they arrive as 0-length files in PHP. If we don't do anything, the user might think they are uploading files successfully, but they end up empty on the server. Instead, we throw back an error if we detect this. The reason Finder uses Chunked, is because it thinks the files might change as it's being uploaded, and therefore the Content-Length can vary. Instead it sends the X-Expected-Entity-Length header with the size of the file at the very start of the request. If this header is set, but we don't get a request body we will fail the request to protect the end-user. */ // Only reading first byte $firstByte = fread($body,1); if (strlen($firstByte)!==1) { throw new Exception\Forbidden('This server is not compatible with OS/X finder. Consider using a different WebDAV client or webserver.'); } // The body needs to stay intact, so we copy everything to a // temporary stream. $newBody = fopen('php://temp','r+'); fwrite($newBody,$firstByte); stream_copy_to_stream($body, $newBody); rewind($newBody); $body = $newBody; } // Checking If-None-Match and related headers. if (!$this->checkPreconditions()) return; if ($this->tree->nodeExists($uri)) { $node = $this->tree->getNodeForPath($uri); // If the node is a collection, we'll deny it if (!($node instanceof IFile)) throw new Exception\Conflict('PUT is not allowed on non-files.'); if (!$this->broadcastEvent('beforeWriteContent',array($uri, $node, &$body))) return false; $etag = $node->put($body); $this->broadcastEvent('afterWriteContent',array($uri, $node)); $this->httpResponse->setHeader('Content-Length','0'); if ($etag) $this->httpResponse->setHeader('ETag',$etag); $this->httpResponse->sendStatus(204); } else { $etag = null; // If we got here, the resource didn't exist yet. if (!$this->createFile($this->getRequestUri(),$body,$etag)) { // For one reason or another the file was not created. return; } $this->httpResponse->setHeader('Content-Length','0'); if ($etag) $this->httpResponse->setHeader('ETag', $etag); $this->httpResponse->sendStatus(201); } } /** * WebDAV MKCOL * * The MKCOL method is used to create a new collection (directory) on the server * * @param string $uri * @return void */ protected function httpMkcol($uri) { $requestBody = $this->httpRequest->getBody(true); if ($requestBody) { $contentType = $this->httpRequest->getHeader('Content-Type'); if (strpos($contentType,'application/xml')!==0 && strpos($contentType,'text/xml')!==0) { // We must throw 415 for unsupported mkcol bodies throw new Exception\UnsupportedMediaType('The request body for the MKCOL request must have an xml Content-Type'); } $dom = XMLUtil::loadDOMDocument($requestBody); if (XMLUtil::toClarkNotation($dom->firstChild)!=='{DAV:}mkcol') { // We must throw 415 for unsupported mkcol bodies throw new Exception\UnsupportedMediaType('The request body for the MKCOL request must be a {DAV:}mkcol request construct.'); } $properties = array(); foreach($dom->firstChild->childNodes as $childNode) { if (XMLUtil::toClarkNotation($childNode)!=='{DAV:}set') continue; $properties = array_merge($properties, XMLUtil::parseProperties($childNode, $this->propertyMap)); } if (!isset($properties['{DAV:}resourcetype'])) throw new Exception\BadRequest('The mkcol request must include a {DAV:}resourcetype property'); $resourceType = $properties['{DAV:}resourcetype']->getValue(); unset($properties['{DAV:}resourcetype']); } else { $properties = array(); $resourceType = array('{DAV:}collection'); } $result = $this->createCollection($uri, $resourceType, $properties); if (is_array($result)) { $this->httpResponse->sendStatus(207); $this->httpResponse->setHeader('Content-Type','application/xml; charset=utf-8'); $this->httpResponse->sendBody( $this->generateMultiStatus(array($result)) ); } else { $this->httpResponse->setHeader('Content-Length','0'); $this->httpResponse->sendStatus(201); } } /** * WebDAV HTTP MOVE method * * This method moves one uri to a different uri. A lot of the actual request processing is done in getCopyMoveInfo * * @param string $uri * @return bool */ protected function httpMove($uri) { $moveInfo = $this->getCopyAndMoveInfo(); // If the destination is part of the source tree, we must fail if ($moveInfo['destination']==$uri) throw new Exception\Forbidden('Source and destination uri are identical.'); if ($moveInfo['destinationExists']) { if (!$this->broadcastEvent('beforeUnbind',array($moveInfo['destination']))) return false; $this->tree->delete($moveInfo['destination']); $this->broadcastEvent('afterUnbind',array($moveInfo['destination'])); } if (!$this->broadcastEvent('beforeUnbind',array($uri))) return false; if (!$this->broadcastEvent('beforeBind',array($moveInfo['destination']))) return false; $this->tree->move($uri,$moveInfo['destination']); $this->broadcastEvent('afterUnbind',array($uri)); $this->broadcastEvent('afterBind',array($moveInfo['destination'])); // If a resource was overwritten we should send a 204, otherwise a 201 $this->httpResponse->setHeader('Content-Length','0'); $this->httpResponse->sendStatus($moveInfo['destinationExists']?204:201); } /** * WebDAV HTTP COPY method * * This method copies one uri to a different uri, and works much like the MOVE request * A lot of the actual request processing is done in getCopyMoveInfo * * @param string $uri * @return bool */ protected function httpCopy($uri) { $copyInfo = $this->getCopyAndMoveInfo(); // If the destination is part of the source tree, we must fail if ($copyInfo['destination']==$uri) throw new Exception\Forbidden('Source and destination uri are identical.'); if ($copyInfo['destinationExists']) { if (!$this->broadcastEvent('beforeUnbind',array($copyInfo['destination']))) return false; $this->tree->delete($copyInfo['destination']); } if (!$this->broadcastEvent('beforeBind',array($copyInfo['destination']))) return false; $this->tree->copy($uri,$copyInfo['destination']); $this->broadcastEvent('afterBind',array($copyInfo['destination'])); // If a resource was overwritten we should send a 204, otherwise a 201 $this->httpResponse->setHeader('Content-Length','0'); $this->httpResponse->sendStatus($copyInfo['destinationExists']?204:201); } /** * HTTP REPORT method implementation * * Although the REPORT method is not part of the standard WebDAV spec (it's from rfc3253) * It's used in a lot of extensions, so it made sense to implement it into the core. * * @param string $uri * @return void */ protected function httpReport($uri) { $body = $this->httpRequest->getBody(true); $dom = XMLUtil::loadDOMDocument($body); $reportName = XMLUtil::toClarkNotation($dom->firstChild); if ($this->broadcastEvent('report',array($reportName,$dom, $uri))) { // If broadcastEvent returned true, it means the report was not supported throw new Exception\ReportNotSupported(); } } // }}} // {{{ HTTP/WebDAV protocol helpers /** * Returns an array with all the supported HTTP methods for a specific uri. * * @param string $uri * @return array */ public function getAllowedMethods($uri) { $methods = array( 'OPTIONS', 'GET', 'HEAD', 'DELETE', 'PROPFIND', 'PUT', 'PROPPATCH', 'COPY', 'MOVE', 'REPORT' ); // The MKCOL is only allowed on an unmapped uri try { $this->tree->getNodeForPath($uri); } catch (Exception\NotFound $e) { $methods[] = 'MKCOL'; } // We're also checking if any of the plugins register any new methods foreach($this->plugins as $plugin) $methods = array_merge($methods, $plugin->getHTTPMethods($uri)); array_unique($methods); return $methods; } /** * Gets the uri for the request, keeping the base uri into consideration * * @return string */ public function getRequestUri() { return $this->calculateUri($this->httpRequest->getUri()); } /** * Calculates the uri for a request, making sure that the base uri is stripped out * * @param string $uri * @throws Exception\Forbidden A permission denied exception is thrown whenever there was an attempt to supply a uri outside of the base uri * @return string */ public function calculateUri($uri) { if ($uri[0]!='/' && strpos($uri,'://')) { $uri = parse_url($uri,PHP_URL_PATH); } $uri = str_replace('//','/',$uri); if (strpos($uri,$this->getBaseUri())===0) { return trim(URLUtil::decodePath(substr($uri,strlen($this->getBaseUri()))),'/'); // A special case, if the baseUri was accessed without a trailing // slash, we'll accept it as well. } elseif ($uri.'/' === $this->getBaseUri()) { return ''; } else { throw new Exception\Forbidden('Requested uri (' . $uri . ') is out of base uri (' . $this->getBaseUri() . ')'); } } /** * Returns the HTTP depth header * * This method returns the contents of the HTTP depth request header. If the depth header was 'infinity' it will return the Sabre\DAV\Server::DEPTH_INFINITY object * It is possible to supply a default depth value, which is used when the depth header has invalid content, or is completely non-existent * * @param mixed $default * @return int */ public function getHTTPDepth($default = self::DEPTH_INFINITY) { // If its not set, we'll grab the default $depth = $this->httpRequest->getHeader('Depth'); if (is_null($depth)) return $default; if ($depth == 'infinity') return self::DEPTH_INFINITY; // If its an unknown value. we'll grab the default if (!ctype_digit($depth)) return $default; return (int)$depth; } /** * Returns the HTTP range header * * This method returns null if there is no well-formed HTTP range request * header or array($start, $end). * * The first number is the offset of the first byte in the range. * The second number is the offset of the last byte in the range. * * If the second offset is null, it should be treated as the offset of the last byte of the entity * If the first offset is null, the second offset should be used to retrieve the last x bytes of the entity * * @return array|null */ public function getHTTPRange() { $range = $this->httpRequest->getHeader('range'); if (is_null($range)) return null; // Matching "Range: bytes=1234-5678: both numbers are optional if (!preg_match('/^bytes=([0-9]*)-([0-9]*)$/i',$range,$matches)) return null; if ($matches[1]==='' && $matches[2]==='') return null; return array( $matches[1]!==''?$matches[1]:null, $matches[2]!==''?$matches[2]:null, ); } /** * Returns the HTTP Prefer header information. * * The prefer header is defined in: * http://tools.ietf.org/html/draft-snell-http-prefer-14 * * This method will return an array with options. * * Currently, the following options may be returned: * array( * 'return-asynch' => true, * 'return-minimal' => true, * 'return-representation' => true, * 'wait' => 30, * 'strict' => true, * 'lenient' => true, * ) * * This method also supports the Brief header, and will also return * 'return-minimal' if the brief header was set to 't'. * * For the boolean options, false will be returned if the headers are not * specified. For the integer options it will be 'null'. * * @return array */ public function getHTTPPrefer() { $result = array( 'return-asynch' => false, 'return-minimal' => false, 'return-representation' => false, 'wait' => null, 'strict' => false, 'lenient' => false, ); if ($prefer = $this->httpRequest->getHeader('Prefer')) { $parameters = array_map('trim', explode(',', $prefer) ); foreach($parameters as $parameter) { // Right now our regex only supports the tokens actually // specified in the draft. We may need to expand this if new // tokens get registered. if(!preg_match('/^(?P[a-z0-9-]+)(?:=(?P[0-9]+))?$/', $parameter, $matches)) { continue; } switch($matches['token']) { case 'return-asynch' : case 'return-minimal' : case 'return-representation' : case 'strict' : case 'lenient' : $result[$matches['token']] = true; break; case 'wait' : $result[$matches['token']] = $matches['value']; break; } } } if ($this->httpRequest->getHeader('Brief')=='t') { $result['return-minimal'] = true; } return $result; } /** * Returns information about Copy and Move requests * * This function is created to help getting information about the source and the destination for the * WebDAV MOVE and COPY HTTP request. It also validates a lot of information and throws proper exceptions * * The returned value is an array with the following keys: * * destination - Destination path * * destinationExists - Whether or not the destination is an existing url (and should therefore be overwritten) * * @return array */ public function getCopyAndMoveInfo() { // Collecting the relevant HTTP headers if (!$this->httpRequest->getHeader('Destination')) throw new Exception\BadRequest('The destination header was not supplied'); $destination = $this->calculateUri($this->httpRequest->getHeader('Destination')); $overwrite = $this->httpRequest->getHeader('Overwrite'); if (!$overwrite) $overwrite = 'T'; if (strtoupper($overwrite)=='T') $overwrite = true; elseif (strtoupper($overwrite)=='F') $overwrite = false; // We need to throw a bad request exception, if the header was invalid else throw new Exception\BadRequest('The HTTP Overwrite header should be either T or F'); list($destinationDir) = URLUtil::splitPath($destination); try { $destinationParent = $this->tree->getNodeForPath($destinationDir); if (!($destinationParent instanceof ICollection)) throw new Exception\UnsupportedMediaType('The destination node is not a collection'); } catch (Exception\NotFound $e) { // If the destination parent node is not found, we throw a 409 throw new Exception\Conflict('The destination node is not found'); } try { $destinationNode = $this->tree->getNodeForPath($destination); // If this succeeded, it means the destination already exists // we'll need to throw precondition failed in case overwrite is false if (!$overwrite) throw new Exception\PreconditionFailed('The destination node already exists, and the overwrite header is set to false','Overwrite'); } catch (Exception\NotFound $e) { // Destination didn't exist, we're all good $destinationNode = false; } // These are the three relevant properties we need to return return array( 'destination' => $destination, 'destinationExists' => $destinationNode==true, 'destinationNode' => $destinationNode, ); } /** * Returns a list of properties for a path * * This is a simplified version getPropertiesForPath. * if you aren't interested in status codes, but you just * want to have a flat list of properties. Use this method. * * @param string $path * @param array $propertyNames */ public function getProperties($path, $propertyNames) { $result = $this->getPropertiesForPath($path,$propertyNames,0); return $result[0][200]; } /** * A kid-friendly way to fetch properties for a node's children. * * The returned array will be indexed by the path of the of child node. * Only properties that are actually found will be returned. * * The parent node will not be returned. * * @param string $path * @param array $propertyNames * @return array */ public function getPropertiesForChildren($path, $propertyNames) { $result = array(); foreach($this->getPropertiesForPath($path,$propertyNames,1) as $k=>$row) { // Skipping the parent path if ($k === 0) continue; $result[$row['href']] = $row[200]; } return $result; } /** * Returns a list of HTTP headers for a particular resource * * The generated http headers are based on properties provided by the * resource. The method basically provides a simple mapping between * DAV property and HTTP header. * * The headers are intended to be used for HEAD and GET requests. * * @param string $path * @return array */ public function getHTTPHeaders($path) { $propertyMap = array( '{DAV:}getcontenttype' => 'Content-Type', '{DAV:}getcontentlength' => 'Content-Length', '{DAV:}getlastmodified' => 'Last-Modified', '{DAV:}getetag' => 'ETag', ); $properties = $this->getProperties($path,array_keys($propertyMap)); $headers = array(); foreach($propertyMap as $property=>$header) { if (!isset($properties[$property])) continue; if (is_scalar($properties[$property])) { $headers[$header] = $properties[$property]; // GetLastModified gets special cased } elseif ($properties[$property] instanceof Property\GetLastModified) { $headers[$header] = HTTP\Util::toHTTPDate($properties[$property]->getTime()); } } return $headers; } /** * Returns a list of properties for a given path * * The path that should be supplied should have the baseUrl stripped out * The list of properties should be supplied in Clark notation. If the list is empty * 'allprops' is assumed. * * If a depth of 1 is requested child elements will also be returned. * * @param string $path * @param array $propertyNames * @param int $depth * @return array */ public function getPropertiesForPath($path, $propertyNames = array(), $depth = 0) { if ($depth!=0) $depth = 1; $path = rtrim($path,'/'); // This event allows people to intercept these requests early on in the // process. // // We're not doing anything with the result, but this can be helpful to // pre-fetch certain expensive live properties. $this->broadCastEvent('beforeGetPropertiesForPath', array($path, $propertyNames, $depth)); $returnPropertyList = array(); $parentNode = $this->tree->getNodeForPath($path); $nodes = array( $path => $parentNode ); if ($depth==1 && $parentNode instanceof ICollection) { foreach($this->tree->getChildren($path) as $childNode) $nodes[$path . '/' . $childNode->getName()] = $childNode; } // If the propertyNames array is empty, it means all properties are requested. // We shouldn't actually return everything we know though, and only return a // sensible list. $allProperties = count($propertyNames)==0; foreach($nodes as $myPath=>$node) { $currentPropertyNames = $propertyNames; $newProperties = array( '200' => array(), '404' => array(), ); if ($allProperties) { // Default list of propertyNames, when all properties were requested. $currentPropertyNames = array( '{DAV:}getlastmodified', '{DAV:}getcontentlength', '{DAV:}resourcetype', '{DAV:}quota-used-bytes', '{DAV:}quota-available-bytes', '{DAV:}getetag', '{DAV:}getcontenttype', ); } // If the resourceType was not part of the list, we manually add it // and mark it for removal. We need to know the resourcetype in order // to make certain decisions about the entry. // WebDAV dictates we should add a / and the end of href's for collections $removeRT = false; if (!in_array('{DAV:}resourcetype',$currentPropertyNames)) { $currentPropertyNames[] = '{DAV:}resourcetype'; $removeRT = true; } $result = $this->broadcastEvent('beforeGetProperties',array($myPath, $node, &$currentPropertyNames, &$newProperties)); // If this method explicitly returned false, we must ignore this // node as it is inaccessible. if ($result===false) continue; if (count($currentPropertyNames) > 0) { if ($node instanceof IProperties) { $nodeProperties = $node->getProperties($currentPropertyNames); // The getProperties method may give us too much, // properties, in case the implementor was lazy. // // So as we loop through this list, we will only take the // properties that were actually requested and discard the // rest. foreach($currentPropertyNames as $k=>$currentPropertyName) { if (isset($nodeProperties[$currentPropertyName])) { unset($currentPropertyNames[$k]); $newProperties[200][$currentPropertyName] = $nodeProperties[$currentPropertyName]; } } } } foreach($currentPropertyNames as $prop) { if (isset($newProperties[200][$prop])) continue; switch($prop) { case '{DAV:}getlastmodified' : if ($node->getLastModified()) $newProperties[200][$prop] = new Property\GetLastModified($node->getLastModified()); break; case '{DAV:}getcontentlength' : if ($node instanceof IFile) { $size = $node->getSize(); if (!is_null($size)) { $newProperties[200][$prop] = (int)$node->getSize(); } } break; case '{DAV:}quota-used-bytes' : if ($node instanceof IQuota) { $quotaInfo = $node->getQuotaInfo(); $newProperties[200][$prop] = $quotaInfo[0]; } break; case '{DAV:}quota-available-bytes' : if ($node instanceof IQuota) { $quotaInfo = $node->getQuotaInfo(); $newProperties[200][$prop] = $quotaInfo[1]; } break; case '{DAV:}getetag' : if ($node instanceof IFile && $etag = $node->getETag()) $newProperties[200][$prop] = $etag; break; case '{DAV:}getcontenttype' : if ($node instanceof IFile && $ct = $node->getContentType()) $newProperties[200][$prop] = $ct; break; case '{DAV:}supported-report-set' : $reports = array(); foreach($this->plugins as $plugin) { $reports = array_merge($reports, $plugin->getSupportedReportSet($myPath)); } $newProperties[200][$prop] = new Property\SupportedReportSet($reports); break; case '{DAV:}resourcetype' : $newProperties[200]['{DAV:}resourcetype'] = new Property\ResourceType(); foreach($this->resourceTypeMapping as $className => $resourceType) { if ($node instanceof $className) $newProperties[200]['{DAV:}resourcetype']->add($resourceType); } break; } // If we were unable to find the property, we will list it as 404. if (!$allProperties && !isset($newProperties[200][$prop])) $newProperties[404][$prop] = null; } $this->broadcastEvent('afterGetProperties',array(trim($myPath,'/'),&$newProperties, $node)); $newProperties['href'] = trim($myPath,'/'); // Its is a WebDAV recommendation to add a trailing slash to collectionnames. // Apple's iCal also requires a trailing slash for principals (rfc 3744), though this is non-standard. if ($myPath!='' && isset($newProperties[200]['{DAV:}resourcetype'])) { $rt = $newProperties[200]['{DAV:}resourcetype']; if ($rt->is('{DAV:}collection') || $rt->is('{DAV:}principal')) { $newProperties['href'] .='/'; } } // If the resourcetype property was manually added to the requested property list, // we will remove it again. if ($removeRT) unset($newProperties[200]['{DAV:}resourcetype']); $returnPropertyList[] = $newProperties; } return $returnPropertyList; } /** * This method is invoked by sub-systems creating a new file. * * Currently this is done by HTTP PUT and HTTP LOCK (in the Locks_Plugin). * It was important to get this done through a centralized function, * allowing plugins to intercept this using the beforeCreateFile event. * * This method will return true if the file was actually created * * @param string $uri * @param resource $data * @param string $etag * @return bool */ public function createFile($uri,$data, &$etag = null) { list($dir,$name) = URLUtil::splitPath($uri); if (!$this->broadcastEvent('beforeBind',array($uri))) return false; $parent = $this->tree->getNodeForPath($dir); if (!$parent instanceof ICollection) { throw new Exception\Conflict('Files can only be created as children of collections'); } if (!$this->broadcastEvent('beforeCreateFile',array($uri, &$data, $parent))) return false; $etag = $parent->createFile($name,$data); $this->tree->markDirty($dir . '/' . $name); $this->broadcastEvent('afterBind',array($uri)); $this->broadcastEvent('afterCreateFile',array($uri, $parent)); return true; } /** * This method is invoked by sub-systems creating a new directory. * * @param string $uri * @return void */ public function createDirectory($uri) { $this->createCollection($uri,array('{DAV:}collection'),array()); } /** * Use this method to create a new collection * * The {DAV:}resourcetype is specified using the resourceType array. * At the very least it must contain {DAV:}collection. * * The properties array can contain a list of additional properties. * * @param string $uri The new uri * @param array $resourceType The resourceType(s) * @param array $properties A list of properties * @return array|null */ public function createCollection($uri, array $resourceType, array $properties) { list($parentUri,$newName) = URLUtil::splitPath($uri); // Making sure {DAV:}collection was specified as resourceType if (!in_array('{DAV:}collection', $resourceType)) { throw new Exception\InvalidResourceType('The resourceType for this collection must at least include {DAV:}collection'); } // Making sure the parent exists try { $parent = $this->tree->getNodeForPath($parentUri); } catch (Exception\NotFound $e) { throw new Exception\Conflict('Parent node does not exist'); } // Making sure the parent is a collection if (!$parent instanceof ICollection) { throw new Exception\Conflict('Parent node is not a collection'); } // Making sure the child does not already exist try { $parent->getChild($newName); // If we got here.. it means there's already a node on that url, and we need to throw a 405 throw new Exception\MethodNotAllowed('The resource you tried to create already exists'); } catch (Exception\NotFound $e) { // This is correct } if (!$this->broadcastEvent('beforeBind',array($uri))) return; // There are 2 modes of operation. The standard collection // creates the directory, and then updates properties // the extended collection can create it directly. if ($parent instanceof IExtendedCollection) { $parent->createExtendedCollection($newName, $resourceType, $properties); } else { // No special resourcetypes are supported if (count($resourceType)>1) { throw new Exception\InvalidResourceType('The {DAV:}resourcetype you specified is not supported here.'); } $parent->createDirectory($newName); $rollBack = false; $exception = null; $errorResult = null; if (count($properties)>0) { try { $errorResult = $this->updateProperties($uri, $properties); if (!isset($errorResult[200])) { $rollBack = true; } } catch (Exception $e) { $rollBack = true; $exception = $e; } } if ($rollBack) { if (!$this->broadcastEvent('beforeUnbind',array($uri))) return; $this->tree->delete($uri); // Re-throwing exception if ($exception) throw $exception; return $errorResult; } } $this->tree->markDirty($parentUri); $this->broadcastEvent('afterBind',array($uri)); } /** * This method updates a resource's properties * * The properties array must be a list of properties. Array-keys are * property names in clarknotation, array-values are it's values. * If a property must be deleted, the value should be null. * * Note that this request should either completely succeed, or * completely fail. * * The response is an array with statuscodes for keys, which in turn * contain arrays with propertynames. This response can be used * to generate a multistatus body. * * @param string $uri * @param array $properties * @return array */ public function updateProperties($uri, array $properties) { // we'll start by grabbing the node, this will throw the appropriate // exceptions if it doesn't. $node = $this->tree->getNodeForPath($uri); $result = array( 200 => array(), 403 => array(), 424 => array(), ); $remainingProperties = $properties; $hasError = false; // Running through all properties to make sure none of them are protected if (!$hasError) foreach($properties as $propertyName => $value) { if(in_array($propertyName, $this->protectedProperties)) { $result[403][$propertyName] = null; unset($remainingProperties[$propertyName]); $hasError = true; } } if (!$hasError) { // Allowing plugins to take care of property updating $hasError = !$this->broadcastEvent('updateProperties',array( &$remainingProperties, &$result, $node )); } // If the node is not an instance of Sabre\DAV\IProperties, every // property is 403 Forbidden if (!$hasError && count($remainingProperties) && !($node instanceof IProperties)) { $hasError = true; foreach($properties as $propertyName=> $value) { $result[403][$propertyName] = null; } $remainingProperties = array(); } // Only if there were no errors we may attempt to update the resource if (!$hasError) { if (count($remainingProperties)>0) { $updateResult = $node->updateProperties($remainingProperties); if ($updateResult===true) { // success foreach($remainingProperties as $propertyName=>$value) { $result[200][$propertyName] = null; } } elseif ($updateResult===false) { // The node failed to update the properties for an // unknown reason foreach($remainingProperties as $propertyName=>$value) { $result[403][$propertyName] = null; } } elseif (is_array($updateResult)) { // The node has detailed update information // We need to merge the results with the earlier results. foreach($updateResult as $status => $props) { if (is_array($props)) { if (!isset($result[$status])) $result[$status] = array(); $result[$status] = array_merge($result[$status], $updateResult[$status]); } } } else { throw new Exception('Invalid result from updateProperties'); } $remainingProperties = array(); } } foreach($remainingProperties as $propertyName=>$value) { // if there are remaining properties, it must mean // there's a dependency failure $result[424][$propertyName] = null; } // Removing empty array values foreach($result as $status=>$props) { if (count($props)===0) unset($result[$status]); } $result['href'] = $uri; return $result; } /** * This method checks the main HTTP preconditions. * * Currently these are: * * If-Match * * If-None-Match * * If-Modified-Since * * If-Unmodified-Since * * The method will return true if all preconditions are met * The method will return false, or throw an exception if preconditions * failed. If false is returned the operation should be aborted, and * the appropriate HTTP response headers are already set. * * Normally this method will throw 412 Precondition Failed for failures * related to If-None-Match, If-Match and If-Unmodified Since. It will * set the status to 304 Not Modified for If-Modified_since. * * If the $handleAsGET argument is set to true, it will also return 304 * Not Modified for failure of the If-None-Match precondition. This is the * desired behaviour for HTTP GET and HTTP HEAD requests. * * @param bool $handleAsGET * @return bool */ public function checkPreconditions($handleAsGET = false) { $uri = $this->getRequestUri(); $node = null; $lastMod = null; $etag = null; if ($ifMatch = $this->httpRequest->getHeader('If-Match')) { // If-Match contains an entity tag. Only if the entity-tag // matches we are allowed to make the request succeed. // If the entity-tag is '*' we are only allowed to make the // request succeed if a resource exists at that url. try { $node = $this->tree->getNodeForPath($uri); } catch (Exception\NotFound $e) { throw new Exception\PreconditionFailed('An If-Match header was specified and the resource did not exist','If-Match'); } // Only need to check entity tags if they are not * if ($ifMatch!=='*') { // There can be multiple etags $ifMatch = explode(',',$ifMatch); $haveMatch = false; foreach($ifMatch as $ifMatchItem) { // Stripping any extra spaces $ifMatchItem = trim($ifMatchItem,' '); $etag = $node->getETag(); if ($etag===$ifMatchItem) { $haveMatch = true; } else { // Evolution has a bug where it sometimes prepends the " // with a \. This is our workaround. if (str_replace('\\"','"', $ifMatchItem) === $etag) { $haveMatch = true; } } } if (!$haveMatch) { throw new Exception\PreconditionFailed('An If-Match header was specified, but none of the specified the ETags matched.','If-Match'); } } } if ($ifNoneMatch = $this->httpRequest->getHeader('If-None-Match')) { // The If-None-Match header contains an etag. // Only if the ETag does not match the current ETag, the request will succeed // The header can also contain *, in which case the request // will only succeed if the entity does not exist at all. $nodeExists = true; if (!$node) { try { $node = $this->tree->getNodeForPath($uri); } catch (Exception\NotFound $e) { $nodeExists = false; } } if ($nodeExists) { $haveMatch = false; if ($ifNoneMatch==='*') $haveMatch = true; else { // There might be multiple etags $ifNoneMatch = explode(',', $ifNoneMatch); $etag = $node->getETag(); foreach($ifNoneMatch as $ifNoneMatchItem) { // Stripping any extra spaces $ifNoneMatchItem = trim($ifNoneMatchItem,' '); if ($etag===$ifNoneMatchItem) $haveMatch = true; } } if ($haveMatch) { if ($handleAsGET) { $this->httpResponse->sendStatus(304); return false; } else { throw new Exception\PreconditionFailed('An If-None-Match header was specified, but the ETag matched (or * was specified).','If-None-Match'); } } } } if (!$ifNoneMatch && ($ifModifiedSince = $this->httpRequest->getHeader('If-Modified-Since'))) { // The If-Modified-Since header contains a date. We // will only return the entity if it has been changed since // that date. If it hasn't been changed, we return a 304 // header // Note that this header only has to be checked if there was no If-None-Match header // as per the HTTP spec. $date = HTTP\Util::parseHTTPDate($ifModifiedSince); if ($date) { if (is_null($node)) { $node = $this->tree->getNodeForPath($uri); } $lastMod = $node->getLastModified(); if ($lastMod) { $lastMod = new \DateTime('@' . $lastMod); if ($lastMod <= $date) { $this->httpResponse->sendStatus(304); $this->httpResponse->setHeader('Last-Modified', HTTP\Util::toHTTPDate($lastMod)); return false; } } } } if ($ifUnmodifiedSince = $this->httpRequest->getHeader('If-Unmodified-Since')) { // The If-Unmodified-Since will allow allow the request if the // entity has not changed since the specified date. $date = HTTP\Util::parseHTTPDate($ifUnmodifiedSince); // We must only check the date if it's valid if ($date) { if (is_null($node)) { $node = $this->tree->getNodeForPath($uri); } $lastMod = $node->getLastModified(); if ($lastMod) { $lastMod = new \DateTime('@' . $lastMod); if ($lastMod > $date) { throw new Exception\PreconditionFailed('An If-Unmodified-Since header was specified, but the entity has been changed since the specified date.','If-Unmodified-Since'); } } } } return true; } // }}} // {{{ XML Readers & Writers /** * Generates a WebDAV propfind response body based on a list of nodes. * * If 'strip404s' is set to true, all 404 responses will be removed. * * @param array $fileProperties The list with nodes * @param bool strip404s * @return string */ public function generateMultiStatus(array $fileProperties, $strip404s = false) { $dom = new \DOMDocument('1.0','utf-8'); //$dom->formatOutput = true; $multiStatus = $dom->createElement('d:multistatus'); $dom->appendChild($multiStatus); // Adding in default namespaces foreach($this->xmlNamespaces as $namespace=>$prefix) { $multiStatus->setAttribute('xmlns:' . $prefix,$namespace); } foreach($fileProperties as $entry) { $href = $entry['href']; unset($entry['href']); if ($strip404s && isset($entry[404])) { unset($entry[404]); } $response = new Property\Response($href,$entry); $response->serialize($this,$multiStatus); } return $dom->saveXML(); } /** * This method parses a PropPatch request * * PropPatch changes the properties for a resource. This method * returns a list of properties. * * The keys in the returned array contain the property name (e.g.: {DAV:}displayname, * and the value contains the property value. If a property is to be removed the value * will be null. * * @param string $body xml body * @return array list of properties in need of updating or deletion */ public function parsePropPatchRequest($body) { //We'll need to change the DAV namespace declaration to something else in order to make it parsable $dom = XMLUtil::loadDOMDocument($body); $newProperties = array(); foreach($dom->firstChild->childNodes as $child) { if ($child->nodeType !== XML_ELEMENT_NODE) continue; $operation = XMLUtil::toClarkNotation($child); if ($operation!=='{DAV:}set' && $operation!=='{DAV:}remove') continue; $innerProperties = XMLUtil::parseProperties($child, $this->propertyMap); foreach($innerProperties as $propertyName=>$propertyValue) { if ($operation==='{DAV:}remove') { $propertyValue = null; } $newProperties[$propertyName] = $propertyValue; } } return $newProperties; } /** * This method parses the PROPFIND request and returns its information * * This will either be a list of properties, or an empty array; in which case * an {DAV:}allprop was requested. * * @param string $body * @return array */ public function parsePropFindRequest($body) { // If the propfind body was empty, it means IE is requesting 'all' properties if (!$body) return array(); $dom = XMLUtil::loadDOMDocument($body); $elem = $dom->getElementsByTagNameNS('urn:DAV','propfind')->item(0); return array_keys(XMLUtil::parseProperties($elem)); } // }}} } sabre-dav-1.8.12/lib/Sabre/DAV/ServerPlugin.php000066400000000000000000000037101246001162500210170ustar00rootroot00000000000000name = $name; foreach($children as $child) { if (!($child instanceof INode)) throw new Exception('Only instances of Sabre\DAV\INode are allowed to be passed in the children argument'); $this->addChild($child); } } /** * Adds a new childnode to this collection * * @param INode $child * @return void */ public function addChild(INode $child) { $this->children[$child->getName()] = $child; } /** * Returns the name of the collection * * @return string */ public function getName() { return $this->name; } /** * Returns a child object, by its name. * * This method makes use of the getChildren method to grab all the child nodes, and compares the name. * Generally its wise to override this, as this can usually be optimized * * This method must throw Sabre\DAV\Exception\NotFound if the node does not * exist. * * @param string $name * @throws Exception\NotFound * @return INode */ public function getChild($name) { if (isset($this->children[$name])) return $this->children[$name]; throw new Exception\NotFound('File not found: ' . $name . ' in \'' . $this->getName() . '\''); } /** * Returns a list of children for this collection * * @return array */ public function getChildren() { return array_values($this->children); } } sabre-dav-1.8.12/lib/Sabre/DAV/SimpleFile.php000066400000000000000000000046661246001162500204360ustar00rootroot00000000000000name = $name; $this->contents = $contents; $this->mimeType = $mimeType; } /** * Returns the node name for this file. * * This name is used to construct the url. * * @return string */ public function getName() { return $this->name; } /** * Returns the data * * This method may either return a string or a readable stream resource * * @return mixed */ public function get() { return $this->contents; } /** * Returns the size of the file, in bytes. * * @return int */ public function getSize() { return strlen($this->contents); } /** * Returns the ETag for a file * * An ETag is a unique identifier representing the current version of the file. If the file changes, the ETag MUST change. * The ETag is an arbitrary string, but MUST be surrounded by double-quotes. * * Return null if the ETag can not effectively be determined * @return string */ public function getETag() { return '"' . md5($this->contents) . '"'; } /** * Returns the mime-type for a file * * If null is returned, we'll assume application/octet-stream * @return string */ public function getContentType() { return $this->mimeType; } } sabre-dav-1.8.12/lib/Sabre/DAV/StringUtil.php000066400000000000000000000052351246001162500205020ustar00rootroot00000000000000dataDir = $dataDir; } /** * Initialize the plugin * * This is called automatically be the Server class after this plugin is * added with Sabre\DAV\Server::addPlugin() * * @param Server $server * @return void */ public function initialize(Server $server) { $this->server = $server; $server->subscribeEvent('beforeMethod',array($this,'beforeMethod')); $server->subscribeEvent('beforeCreateFile',array($this,'beforeCreateFile')); } /** * This method is called before any HTTP method handler * * This method intercepts any GET, DELETE, PUT and PROPFIND calls to * filenames that are known to match the 'temporary file' regex. * * @param string $method * @param string $uri * @return bool */ public function beforeMethod($method, $uri) { if (!$tempLocation = $this->isTempFile($uri)) return true; switch($method) { case 'GET' : return $this->httpGet($tempLocation); case 'PUT' : return $this->httpPut($tempLocation); case 'PROPFIND' : return $this->httpPropfind($tempLocation, $uri); case 'DELETE' : return $this->httpDelete($tempLocation); } return true; } /** * This method is invoked if some subsystem creates a new file. * * This is used to deal with HTTP LOCK requests which create a new * file. * * @param string $uri * @param resource $data * @return bool */ public function beforeCreateFile($uri,$data) { if ($tempPath = $this->isTempFile($uri)) { $hR = $this->server->httpResponse; $hR->setHeader('X-Sabre-Temp','true'); file_put_contents($tempPath,$data); return false; } return true; } /** * This method will check if the url matches the temporary file pattern * if it does, it will return an path based on $this->dataDir for the * temporary file storage. * * @param string $path * @return boolean|string */ protected function isTempFile($path) { // We're only interested in the basename. list(, $tempPath) = URLUtil::splitPath($path); foreach($this->temporaryFilePatterns as $tempFile) { if (preg_match($tempFile,$tempPath)) { return $this->getDataDir() . '/sabredav_' . md5($path) . '.tempfile'; } } return false; } /** * This method handles the GET method for temporary files. * If the file doesn't exist, it will return false which will kick in * the regular system for the GET method. * * @param string $tempLocation * @return bool */ public function httpGet($tempLocation) { if (!file_exists($tempLocation)) return true; $hR = $this->server->httpResponse; $hR->setHeader('Content-Type','application/octet-stream'); $hR->setHeader('Content-Length',filesize($tempLocation)); $hR->setHeader('X-Sabre-Temp','true'); $hR->sendStatus(200); $hR->sendBody(fopen($tempLocation,'r')); return false; } /** * This method handles the PUT method. * * @param string $tempLocation * @return bool */ public function httpPut($tempLocation) { $hR = $this->server->httpResponse; $hR->setHeader('X-Sabre-Temp','true'); $newFile = !file_exists($tempLocation); if (!$newFile && ($this->server->httpRequest->getHeader('If-None-Match'))) { throw new Exception\PreconditionFailed('The resource already exists, and an If-None-Match header was supplied'); } file_put_contents($tempLocation,$this->server->httpRequest->getBody()); $hR->sendStatus($newFile?201:200); return false; } /** * This method handles the DELETE method. * * If the file didn't exist, it will return false, which will make the * standard HTTP DELETE handler kick in. * * @param string $tempLocation * @return bool */ public function httpDelete($tempLocation) { if (!file_exists($tempLocation)) return true; unlink($tempLocation); $hR = $this->server->httpResponse; $hR->setHeader('X-Sabre-Temp','true'); $hR->sendStatus(204); return false; } /** * This method handles the PROPFIND method. * * It's a very lazy method, it won't bother checking the request body * for which properties were requested, and just sends back a default * set of properties. * * @param string $tempLocation * @param string $uri * @return bool */ public function httpPropfind($tempLocation, $uri) { if (!file_exists($tempLocation)) return true; $hR = $this->server->httpResponse; $hR->setHeader('X-Sabre-Temp','true'); $hR->sendStatus(207); $hR->setHeader('Content-Type','application/xml; charset=utf-8'); $this->server->parsePropFindRequest($this->server->httpRequest->getBody(true)); $properties = array( 'href' => $uri, 200 => array( '{DAV:}getlastmodified' => new Property\GetLastModified(filemtime($tempLocation)), '{DAV:}getcontentlength' => filesize($tempLocation), '{DAV:}resourcetype' => new Property\ResourceType(null), '{'.Server::NS_SABREDAV.'}tempFile' => true, ), ); $data = $this->server->generateMultiStatus(array($properties)); $hR->sendBody($data); return false; } /** * This method returns the directory where the temporary files should be stored. * * @return string */ protected function getDataDir() { return $this->dataDir; } } sabre-dav-1.8.12/lib/Sabre/DAV/Tree.php000066400000000000000000000116061246001162500172740ustar00rootroot00000000000000getNodeForPath($path); return true; } catch (Exception\NotFound $e) { return false; } } /** * Copies a file from path to another * * @param string $sourcePath The source location * @param string $destinationPath The full destination path * @return void */ public function copy($sourcePath, $destinationPath) { $sourceNode = $this->getNodeForPath($sourcePath); // grab the dirname and basename components list($destinationDir, $destinationName) = URLUtil::splitPath($destinationPath); $destinationParent = $this->getNodeForPath($destinationDir); $this->copyNode($sourceNode,$destinationParent,$destinationName); $this->markDirty($destinationDir); } /** * Moves a file from one location to another * * @param string $sourcePath The path to the file which should be moved * @param string $destinationPath The full destination path, so not just the destination parent node * @return int */ public function move($sourcePath, $destinationPath) { list($sourceDir, $sourceName) = URLUtil::splitPath($sourcePath); list($destinationDir, $destinationName) = URLUtil::splitPath($destinationPath); if ($sourceDir===$destinationDir) { $renameable = $this->getNodeForPath($sourcePath); $renameable->setName($destinationName); } else { $this->copy($sourcePath,$destinationPath); $this->getNodeForPath($sourcePath)->delete(); } $this->markDirty($sourceDir); $this->markDirty($destinationDir); } /** * Deletes a node from the tree * * @param string $path * @return void */ public function delete($path) { $node = $this->getNodeForPath($path); $node->delete(); list($parent) = URLUtil::splitPath($path); $this->markDirty($parent); } /** * Returns a list of childnodes for a given path. * * @param string $path * @return array */ public function getChildren($path) { $node = $this->getNodeForPath($path); return $node->getChildren(); } /** * This method is called with every tree update * * Examples of tree updates are: * * node deletions * * node creations * * copy * * move * * renaming nodes * * If Tree classes implement a form of caching, this will allow * them to make sure caches will be expired. * * If a path is passed, it is assumed that the entire subtree is dirty * * @param string $path * @return void */ public function markDirty($path) { } /** * copyNode * * @param INode $source * @param ICollection $destinationParent * @param string $destinationName * @return void */ protected function copyNode(INode $source,ICollection $destinationParent,$destinationName = null) { if (!$destinationName) $destinationName = $source->getName(); if ($source instanceof IFile) { $data = $source->get(); // If the body was a string, we need to convert it to a stream if (is_string($data)) { $stream = fopen('php://temp','r+'); fwrite($stream,$data); rewind($stream); $data = $stream; } $destinationParent->createFile($destinationName,$data); $destination = $destinationParent->getChild($destinationName); } elseif ($source instanceof ICollection) { $destinationParent->createDirectory($destinationName); $destination = $destinationParent->getChild($destinationName); foreach($source->getChildren() as $child) { $this->copyNode($child,$destination); } } if ($source instanceof IProperties && $destination instanceof IProperties) { $props = $source->getProperties(array()); $destination->updateProperties($props); } } } sabre-dav-1.8.12/lib/Sabre/DAV/Tree/000077500000000000000000000000001246001162500165575ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/DAV/Tree/Filesystem.php000066400000000000000000000060171246001162500214200ustar00rootroot00000000000000basePath = $basePath; } /** * Returns a new node for the given path * * @param string $path * @return DAV\FS\Node */ public function getNodeForPath($path) { $realPath = $this->getRealPath($path); if (!file_exists($realPath)) { throw new DAV\Exception\NotFound('File at location ' . $realPath . ' not found'); } if (is_dir($realPath)) { return new DAV\FS\Directory($realPath); } else { return new DAV\FS\File($realPath); } } /** * Returns the real filesystem path for a webdav url. * * @param string $publicPath * @return string */ protected function getRealPath($publicPath) { return rtrim($this->basePath,'/') . '/' . trim($publicPath,'/'); } /** * Copies a file or directory. * * This method must work recursively and delete the destination * if it exists * * @param string $source * @param string $destination * @return void */ public function copy($source,$destination) { $source = $this->getRealPath($source); $destination = $this->getRealPath($destination); $this->realCopy($source,$destination); } /** * Used by self::copy * * @param string $source * @param string $destination * @return void */ protected function realCopy($source,$destination) { if (is_file($source)) { copy($source,$destination); } else { mkdir($destination); foreach(scandir($source) as $subnode) { if ($subnode=='.' || $subnode=='..') continue; $this->realCopy($source.'/'.$subnode,$destination.'/'.$subnode); } } } /** * Moves a file or directory recursively. * * If the destination exists, delete it first. * * @param string $source * @param string $destination * @return void */ public function move($source,$destination) { $source = $this->getRealPath($source); $destination = $this->getRealPath($destination); rename($source,$destination); } } sabre-dav-1.8.12/lib/Sabre/DAV/URLUtil.php000066400000000000000000000062271246001162500177000ustar00rootroot00000000000000 * will be returned as: * {http://www.example.org}myelem * * This format is used throughout the SabreDAV sourcecode. * Elements encoded with the urn:DAV namespace will * be returned as if they were in the DAV: namespace. This is to avoid * compatibility problems. * * This function will return null if a nodetype other than an Element is passed. * * @param \DOMNode $dom * @return string */ static function toClarkNotation(\DOMNode $dom) { if ($dom->nodeType !== XML_ELEMENT_NODE) return null; // Mapping back to the real namespace, in case it was dav if ($dom->namespaceURI=='urn:DAV') $ns = 'DAV:'; else $ns = $dom->namespaceURI; // Mapping to clark notation return '{' . $ns . '}' . $dom->localName; } /** * Parses a clark-notation string, and returns the namespace and element * name components. * * If the string was invalid, it will throw an InvalidArgumentException. * * @param string $str * @throws InvalidArgumentException * @return array */ static function parseClarkNotation($str) { if (!preg_match('/^{([^}]*)}(.*)$/',$str,$matches)) { throw new \InvalidArgumentException('\'' . $str . '\' is not a valid clark-notation formatted string'); } return array( $matches[1], $matches[2] ); } /** * This method takes an XML document (as string) and converts all instances of the * DAV: namespace to urn:DAV * * This is unfortunately needed, because the DAV: namespace violates the xml namespaces * spec, and causes the DOM to throw errors * * @param string $xmlDocument * @return array|string|null */ static function convertDAVNamespace($xmlDocument) { // This is used to map the DAV: namespace to urn:DAV. This is needed, because the DAV: // namespace is actually a violation of the XML namespaces specification, and will cause errors return preg_replace("/xmlns(:[A-Za-z0-9_]*)?=(\"|\')DAV:(\\2)/","xmlns\\1=\\2urn:DAV\\2",$xmlDocument); } /** * This method provides a generic way to load a DOMDocument for WebDAV use. * * This method throws a Sabre\DAV\Exception\BadRequest exception for any xml errors. * It does not preserve whitespace, and it converts the DAV: namespace to urn:DAV. * * @param string $xml * @throws Sabre\DAV\Exception\BadRequest * @return DOMDocument */ static function loadDOMDocument($xml) { if (empty($xml)) throw new Exception\BadRequest('Empty XML document sent'); // The BitKinex client sends xml documents as UTF-16. PHP 5.3.1 (and presumably lower) // does not support this, so we must intercept this and convert to UTF-8. if (substr($xml,0,12) === "\x3c\x00\x3f\x00\x78\x00\x6d\x00\x6c\x00\x20\x00") { // Note: the preceeding byte sequence is "]*)encoding="UTF-16"([^>]*)>|u','',$xml); } // Retaining old error setting $oldErrorSetting = libxml_use_internal_errors(true); // Fixes an XXE vulnerability on PHP versions older than 5.3.23 or // 5.4.13. $oldEntityLoaderSetting = libxml_disable_entity_loader(true); // Clearing any previous errors libxml_clear_errors(); $dom = new \DOMDocument(); // We don't generally care about any whitespace $dom->preserveWhiteSpace = false; $dom->loadXML(self::convertDAVNamespace($xml),LIBXML_NOWARNING | LIBXML_NOERROR); if ($error = libxml_get_last_error()) { libxml_clear_errors(); throw new Exception\BadRequest('The request body had an invalid XML body. (message: ' . $error->message . ', errorcode: ' . $error->code . ', line: ' . $error->line . ')'); } // Restoring old mechanism for error handling if ($oldErrorSetting===false) libxml_use_internal_errors(false); if ($oldEntityLoaderSetting===false) libxml_disable_entity_loader(false); return $dom; } /** * Parses all WebDAV properties out of a DOM Element * * Generally WebDAV properties are enclosed in {DAV:}prop elements. This * method helps by going through all these and pulling out the actual * propertynames, making them array keys and making the property values, * well.. the array values. * * If no value was given (self-closing element) null will be used as the * value. This is used in for example PROPFIND requests. * * Complex values are supported through the propertyMap argument. The * propertyMap should have the clark-notation properties as it's keys, and * classnames as values. * * When any of these properties are found, the unserialize() method will be * (statically) called. The result of this method is used as the value. * * @param \DOMElement $parentNode * @param array $propertyMap * @return array */ static function parseProperties(\DOMElement $parentNode, array $propertyMap = array()) { $propList = array(); foreach($parentNode->childNodes as $propNode) { if (self::toClarkNotation($propNode)!=='{DAV:}prop') continue; foreach($propNode->childNodes as $propNodeData) { /* If there are no elements in here, we actually get 1 text node, this special case is dedicated to netdrive */ if ($propNodeData->nodeType != XML_ELEMENT_NODE) continue; $propertyName = self::toClarkNotation($propNodeData); if (isset($propertyMap[$propertyName])) { $propList[$propertyName] = call_user_func(array($propertyMap[$propertyName],'unserialize'),$propNodeData); } else { $propList[$propertyName] = $propNodeData->textContent; } } } return $propList; } } sabre-dav-1.8.12/lib/Sabre/DAVACL/000077500000000000000000000000001246001162500162005ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/DAVACL/AbstractPrincipalCollection.php000066400000000000000000000105021246001162500243300ustar00rootroot00000000000000principalPrefix = $principalPrefix; $this->principalBackend = $principalBackend; } /** * This method returns a node for a principal. * * The passed array contains principal information, and is guaranteed to * at least contain a uri item. Other properties may or may not be * supplied by the authentication backend. * * @param array $principalInfo * @return IPrincipal */ abstract function getChildForPrincipal(array $principalInfo); /** * Returns the name of this collection. * * @return string */ public function getName() { list(,$name) = DAV\URLUtil::splitPath($this->principalPrefix); return $name; } /** * Return the list of users * * @return array */ public function getChildren() { if ($this->disableListing) throw new DAV\Exception\MethodNotAllowed('Listing members of this collection is disabled'); $children = array(); foreach($this->principalBackend->getPrincipalsByPrefix($this->principalPrefix) as $principalInfo) { $children[] = $this->getChildForPrincipal($principalInfo); } return $children; } /** * Returns a child object, by its name. * * @param string $name * @throws DAV\Exception\NotFound * @return IPrincipal */ public function getChild($name) { $principalInfo = $this->principalBackend->getPrincipalByPath($this->principalPrefix . '/' . $name); if (!$principalInfo) throw new DAV\Exception\NotFound('Principal with name ' . $name . ' not found'); return $this->getChildForPrincipal($principalInfo); } /** * This method is used to search for principals matching a set of * properties. * * This search is specifically used by RFC3744's principal-property-search * REPORT. You should at least allow searching on * http://sabredav.org/ns}email-address. * * The actual search should be a unicode-non-case-sensitive search. The * keys in searchProperties are the WebDAV property names, while the values * are the property values to search on. * * If multiple properties are being searched on, the search should be * AND'ed. * * This method should simply return a list of 'child names', which may be * used to call $this->getChild in the future. * * @param array $searchProperties * @return array */ public function searchPrincipals(array $searchProperties) { $result = $this->principalBackend->searchPrincipals($this->principalPrefix, $searchProperties); $r = array(); foreach($result as $row) { list(, $r[]) = DAV\URLUtil::splitPath($row); } return $r; } } sabre-dav-1.8.12/lib/Sabre/DAVACL/Exception/000077500000000000000000000000001246001162500201365ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/DAVACL/Exception/AceConflict.php000066400000000000000000000015421246001162500230230ustar00rootroot00000000000000ownerDocument; $np = $doc->createElementNS('DAV:','d:no-ace-conflict'); $errorNode->appendChild($np); } } sabre-dav-1.8.12/lib/Sabre/DAVACL/Exception/NeedPrivileges.php000066400000000000000000000040151246001162500235540ustar00rootroot00000000000000uri = $uri; $this->privileges = $privileges; parent::__construct('User did not have the required privileges (' . implode(',', $privileges) . ') for path "' . $uri . '"'); } /** * Adds in extra information in the xml response. * * This method adds the {DAV:}need-privileges element as defined in rfc3744 * * @param DAV\Server $server * @param \DOMElement $errorNode * @return void */ public function serialize(DAV\Server $server,\DOMElement $errorNode) { $doc = $errorNode->ownerDocument; $np = $doc->createElementNS('DAV:','d:need-privileges'); $errorNode->appendChild($np); foreach($this->privileges as $privilege) { $resource = $doc->createElementNS('DAV:','d:resource'); $np->appendChild($resource); $resource->appendChild($doc->createElementNS('DAV:','d:href',$server->getBaseUri() . $this->uri)); $priv = $doc->createElementNS('DAV:','d:privilege'); $resource->appendChild($priv); preg_match('/^{([^}]*)}(.*)$/',$privilege,$privilegeParts); $priv->appendChild($doc->createElementNS($privilegeParts[1],'d:' . $privilegeParts[2])); } } } sabre-dav-1.8.12/lib/Sabre/DAVACL/Exception/NoAbstract.php000066400000000000000000000015541246001162500227140ustar00rootroot00000000000000ownerDocument; $np = $doc->createElementNS('DAV:','d:no-abstract'); $errorNode->appendChild($np); } } sabre-dav-1.8.12/lib/Sabre/DAVACL/Exception/NotRecognizedPrincipal.php000066400000000000000000000016331246001162500252660ustar00rootroot00000000000000ownerDocument; $np = $doc->createElementNS('DAV:','d:recognized-principal'); $errorNode->appendChild($np); } } sabre-dav-1.8.12/lib/Sabre/DAVACL/Exception/NotSupportedPrivilege.php000066400000000000000000000016161246001162500251700ustar00rootroot00000000000000ownerDocument; $np = $doc->createElementNS('DAV:','d:not-supported-privilege'); $errorNode->appendChild($np); } } sabre-dav-1.8.12/lib/Sabre/DAVACL/IACL.php000066400000000000000000000035241246001162500174250ustar00rootroot00000000000000getChild in the future. * * @param array $searchProperties * @return array */ function searchPrincipals(array $searchProperties); } sabre-dav-1.8.12/lib/Sabre/DAVACL/Plugin.php000066400000000000000000001262241246001162500201560ustar00rootroot00000000000000 'Display name', '{http://sabredav.org/ns}email-address' => 'Email address', ); /** * Any principal uri's added here, will automatically be added to the list * of ACL's. They will effectively receive {DAV:}all privileges, as a * protected privilege. * * @var array */ public $adminPrincipals = array(); /** * Returns a list of features added by this plugin. * * This list is used in the response of a HTTP OPTIONS request. * * @return array */ public function getFeatures() { return array('access-control', 'calendarserver-principal-property-search'); } /** * Returns a list of available methods for a given url * * @param string $uri * @return array */ public function getMethods($uri) { return array('ACL'); } /** * Returns a plugin name. * * Using this name other plugins will be able to access other plugins * using Sabre\DAV\Server::getPlugin * * @return string */ public function getPluginName() { return 'acl'; } /** * Returns a list of reports this plugin supports. * * This will be used in the {DAV:}supported-report-set property. * Note that you still need to subscribe to the 'report' event to actually * implement them * * @param string $uri * @return array */ public function getSupportedReportSet($uri) { return array( '{DAV:}expand-property', '{DAV:}principal-property-search', '{DAV:}principal-search-property-set', ); } /** * Checks if the current user has the specified privilege(s). * * You can specify a single privilege, or a list of privileges. * This method will throw an exception if the privilege is not available * and return true otherwise. * * @param string $uri * @param array|string $privileges * @param int $recursion * @param bool $throwExceptions if set to false, this method won't throw exceptions. * @throws Sabre\DAVACL\Exception\NeedPrivileges * @return bool */ public function checkPrivileges($uri, $privileges, $recursion = self::R_PARENT, $throwExceptions = true) { if (!is_array($privileges)) $privileges = array($privileges); $acl = $this->getCurrentUserPrivilegeSet($uri); if (is_null($acl)) { if ($this->allowAccessToNodesWithoutACL) { return true; } else { if ($throwExceptions) throw new Exception\NeedPrivileges($uri,$privileges); else return false; } } $failed = array(); foreach($privileges as $priv) { if (!in_array($priv, $acl)) { $failed[] = $priv; } } if ($failed) { if ($throwExceptions) throw new Exception\NeedPrivileges($uri,$failed); else return false; } return true; } /** * Returns the standard users' principal. * * This is one authorative principal url for the current user. * This method will return null if the user wasn't logged in. * * @return string|null */ public function getCurrentUserPrincipal() { $authPlugin = $this->server->getPlugin('auth'); if (is_null($authPlugin)) return null; /** @var $authPlugin Sabre\DAV\Auth\Plugin */ $userName = $authPlugin->getCurrentUser(); if (!$userName) return null; return $this->defaultUsernamePath . '/' . $userName; } /** * Returns a list of principals that's associated to the current * user, either directly or through group membership. * * @return array */ public function getCurrentUserPrincipals() { $currentUser = $this->getCurrentUserPrincipal(); if (is_null($currentUser)) return array(); return array_merge( array($currentUser), $this->getPrincipalMembership($currentUser) ); } /** * This array holds a cache for all the principals that are associated with * a single principal. * * @var array */ protected $principalMembershipCache = array(); /** * Returns all the principal groups the specified principal is a member of. * * @param string $principal * @return array */ public function getPrincipalMembership($mainPrincipal) { // First check our cache if (isset($this->principalMembershipCache[$mainPrincipal])) { return $this->principalMembershipCache[$mainPrincipal]; } $check = array($mainPrincipal); $principals = array(); while(count($check)) { $principal = array_shift($check); $node = $this->server->tree->getNodeForPath($principal); if ($node instanceof IPrincipal) { foreach($node->getGroupMembership() as $groupMember) { if (!in_array($groupMember, $principals)) { $check[] = $groupMember; $principals[] = $groupMember; } } } } // Store the result in the cache $this->principalMembershipCache[$mainPrincipal] = $principals; return $principals; } /** * Returns the supported privilege structure for this ACL plugin. * * See RFC3744 for more details. Currently we default on a simple, * standard structure. * * You can either get the list of privileges by a uri (path) or by * specifying a Node. * * @param string|DAV\INode $node * @return array */ public function getSupportedPrivilegeSet($node) { if (is_string($node)) { $node = $this->server->tree->getNodeForPath($node); } if ($node instanceof IACL) { $result = $node->getSupportedPrivilegeSet(); if ($result) return $result; } return self::getDefaultSupportedPrivilegeSet(); } /** * Returns a fairly standard set of privileges, which may be useful for * other systems to use as a basis. * * @return array */ static function getDefaultSupportedPrivilegeSet() { return array( 'privilege' => '{DAV:}all', 'abstract' => true, 'aggregates' => array( array( 'privilege' => '{DAV:}read', 'aggregates' => array( array( 'privilege' => '{DAV:}read-acl', 'abstract' => true, ), array( 'privilege' => '{DAV:}read-current-user-privilege-set', 'abstract' => true, ), ), ), // {DAV:}read array( 'privilege' => '{DAV:}write', 'aggregates' => array( array( 'privilege' => '{DAV:}write-acl', 'abstract' => true, ), array( 'privilege' => '{DAV:}write-properties', 'abstract' => true, ), array( 'privilege' => '{DAV:}write-content', 'abstract' => true, ), array( 'privilege' => '{DAV:}bind', 'abstract' => true, ), array( 'privilege' => '{DAV:}unbind', 'abstract' => true, ), array( 'privilege' => '{DAV:}unlock', 'abstract' => true, ), ), ), // {DAV:}write ), ); // {DAV:}all } /** * Returns the supported privilege set as a flat list * * This is much easier to parse. * * The returned list will be index by privilege name. * The value is a struct containing the following properties: * - aggregates * - abstract * - concrete * * @param string|DAV\INode $node * @return array */ final public function getFlatPrivilegeSet($node) { $privs = $this->getSupportedPrivilegeSet($node); $flat = array(); $this->getFPSTraverse($privs, null, $flat); return $flat; } /** * Traverses the privilege set tree for reordering * * This function is solely used by getFlatPrivilegeSet, and would have been * a closure if it wasn't for the fact I need to support PHP 5.2. * * @param array $priv * @param $concrete * @param array $flat * @return void */ final private function getFPSTraverse($priv, $concrete, &$flat) { $myPriv = array( 'privilege' => $priv['privilege'], 'abstract' => isset($priv['abstract']) && $priv['abstract'], 'aggregates' => array(), 'concrete' => isset($priv['abstract']) && $priv['abstract']?$concrete:$priv['privilege'], ); if (isset($priv['aggregates'])) foreach($priv['aggregates'] as $subPriv) $myPriv['aggregates'][] = $subPriv['privilege']; $flat[$priv['privilege']] = $myPriv; if (isset($priv['aggregates'])) { foreach($priv['aggregates'] as $subPriv) { $this->getFPSTraverse($subPriv, $myPriv['concrete'], $flat); } } } /** * Returns the full ACL list. * * Either a uri or a DAV\INode may be passed. * * null will be returned if the node doesn't support ACLs. * * @param string|DAV\INode $node * @return array */ public function getACL($node) { if (is_string($node)) { $node = $this->server->tree->getNodeForPath($node); } if (!$node instanceof IACL) { return null; } $acl = $node->getACL(); foreach($this->adminPrincipals as $adminPrincipal) { $acl[] = array( 'principal' => $adminPrincipal, 'privilege' => '{DAV:}all', 'protected' => true, ); } return $acl; } /** * Returns a list of privileges the current user has * on a particular node. * * Either a uri or a DAV\INode may be passed. * * null will be returned if the node doesn't support ACLs. * * @param string|DAV\INode $node * @return array */ public function getCurrentUserPrivilegeSet($node) { if (is_string($node)) { $node = $this->server->tree->getNodeForPath($node); } $acl = $this->getACL($node); if (is_null($acl)) return null; $principals = $this->getCurrentUserPrincipals(); $collected = array(); foreach($acl as $ace) { $principal = $ace['principal']; switch($principal) { case '{DAV:}owner' : $owner = $node->getOwner(); if ($owner && in_array($owner, $principals)) { $collected[] = $ace; } break; // 'all' matches for every user case '{DAV:}all' : // 'authenticated' matched for every user that's logged in. // Since it's not possible to use ACL while not being logged // in, this is also always true. case '{DAV:}authenticated' : $collected[] = $ace; break; // 'unauthenticated' can never occur either, so we simply // ignore these. case '{DAV:}unauthenticated' : break; default : if (in_array($ace['principal'], $principals)) { $collected[] = $ace; } break; } } // Now we deduct all aggregated privileges. $flat = $this->getFlatPrivilegeSet($node); $collected2 = array(); while(count($collected)) { $current = array_pop($collected); $collected2[] = $current['privilege']; foreach($flat[$current['privilege']]['aggregates'] as $subPriv) { $collected2[] = $subPriv; $collected[] = $flat[$subPriv]; } } return array_values(array_unique($collected2)); } /** * Principal property search * * This method can search for principals matching certain values in * properties. * * This method will return a list of properties for the matched properties. * * @param array $searchProperties The properties to search on. This is a * key-value list. The keys are property * names, and the values the strings to * match them on. * @param array $requestedProperties This is the list of properties to * return for every match. * @param string $collectionUri The principal collection to search on. * If this is ommitted, the standard * principal collection-set will be used. * @return array This method returns an array structure similar to * Sabre\DAV\Server::getPropertiesForPath. Returned * properties are index by a HTTP status code. * */ public function principalSearch(array $searchProperties, array $requestedProperties, $collectionUri = null) { if (!is_null($collectionUri)) { $uris = array($collectionUri); } else { $uris = $this->principalCollectionSet; } $lookupResults = array(); foreach($uris as $uri) { $principalCollection = $this->server->tree->getNodeForPath($uri); if (!$principalCollection instanceof IPrincipalCollection) { // Not a principal collection, we're simply going to ignore // this. continue; } $results = $principalCollection->searchPrincipals($searchProperties); foreach($results as $result) { $lookupResults[] = rtrim($uri,'/') . '/' . $result; } } $matches = array(); foreach($lookupResults as $lookupResult) { list($matches[]) = $this->server->getPropertiesForPath($lookupResult, $requestedProperties, 0); } return $matches; } /** * Sets up the plugin * * This method is automatically called by the server class. * * @param DAV\Server $server * @return void */ public function initialize(DAV\Server $server) { $this->server = $server; $server->subscribeEvent('beforeGetProperties',array($this,'beforeGetProperties')); $server->subscribeEvent('beforeMethod', array($this,'beforeMethod'),20); $server->subscribeEvent('beforeBind', array($this,'beforeBind'),20); $server->subscribeEvent('beforeUnbind', array($this,'beforeUnbind'),20); $server->subscribeEvent('updateProperties',array($this,'updateProperties')); $server->subscribeEvent('beforeUnlock', array($this,'beforeUnlock'),20); $server->subscribeEvent('report',array($this,'report')); $server->subscribeEvent('unknownMethod', array($this, 'unknownMethod')); array_push($server->protectedProperties, '{DAV:}alternate-URI-set', '{DAV:}principal-URL', '{DAV:}group-membership', '{DAV:}principal-collection-set', '{DAV:}current-user-principal', '{DAV:}supported-privilege-set', '{DAV:}current-user-privilege-set', '{DAV:}acl', '{DAV:}acl-restrictions', '{DAV:}inherited-acl-set', '{DAV:}owner', '{DAV:}group' ); // Automatically mapping nodes implementing IPrincipal to the // {DAV:}principal resourcetype. $server->resourceTypeMapping['Sabre\\DAVACL\\IPrincipal'] = '{DAV:}principal'; // Mapping the group-member-set property to the HrefList property // class. $server->propertyMap['{DAV:}group-member-set'] = 'Sabre\\DAV\\Property\\HrefList'; } /* {{{ Event handlers */ /** * Triggered before any method is handled * * @param string $method * @param string $uri * @return void */ public function beforeMethod($method, $uri) { $exists = $this->server->tree->nodeExists($uri); // If the node doesn't exists, none of these checks apply if (!$exists) return; switch($method) { case 'GET' : case 'HEAD' : case 'OPTIONS' : // For these 3 we only need to know if the node is readable. $this->checkPrivileges($uri,'{DAV:}read'); break; case 'PUT' : case 'LOCK' : case 'UNLOCK' : // This method requires the write-content priv if the node // already exists, and bind on the parent if the node is being // created. // The bind privilege is handled in the beforeBind event. $this->checkPrivileges($uri,'{DAV:}write-content'); break; case 'PROPPATCH' : $this->checkPrivileges($uri,'{DAV:}write-properties'); break; case 'ACL' : $this->checkPrivileges($uri,'{DAV:}write-acl'); break; case 'COPY' : case 'MOVE' : // Copy requires read privileges on the entire source tree. // If the target exists write-content normally needs to be // checked, however, we're deleting the node beforehand and // creating a new one after, so this is handled by the // beforeUnbind event. // // The creation of the new node is handled by the beforeBind // event. // // If MOVE is used beforeUnbind will also be used to check if // the sourcenode can be deleted. $this->checkPrivileges($uri,'{DAV:}read',self::R_RECURSIVE); break; } } /** * Triggered before a new node is created. * * This allows us to check permissions for any operation that creates a * new node, such as PUT, MKCOL, MKCALENDAR, LOCK, COPY and MOVE. * * @param string $uri * @return void */ public function beforeBind($uri) { list($parentUri,$nodeName) = DAV\URLUtil::splitPath($uri); $this->checkPrivileges($parentUri,'{DAV:}bind'); } /** * Triggered before a node is deleted * * This allows us to check permissions for any operation that will delete * an existing node. * * @param string $uri * @return void */ public function beforeUnbind($uri) { list($parentUri,$nodeName) = DAV\URLUtil::splitPath($uri); $this->checkPrivileges($parentUri,'{DAV:}unbind',self::R_RECURSIVEPARENTS); } /** * Triggered before a node is unlocked. * * @param string $uri * @param DAV\Locks\LockInfo $lock * @TODO: not yet implemented * @return void */ public function beforeUnlock($uri, DAV\Locks\LockInfo $lock) { } /** * Triggered before properties are looked up in specific nodes. * * @param string $uri * @param DAV\INode $node * @param array $requestedProperties * @param array $returnedProperties * @TODO really should be broken into multiple methods, or even a class. * @return bool */ public function beforeGetProperties($uri, DAV\INode $node, &$requestedProperties, &$returnedProperties) { // Checking the read permission if (!$this->checkPrivileges($uri,'{DAV:}read',self::R_PARENT,false)) { // User is not allowed to read properties if ($this->hideNodesFromListings) { return false; } // Marking all requested properties as '403'. foreach($requestedProperties as $key=>$requestedProperty) { unset($requestedProperties[$key]); $returnedProperties[403][$requestedProperty] = null; } return; } /* Adding principal properties */ if ($node instanceof IPrincipal) { if (false !== ($index = array_search('{DAV:}alternate-URI-set', $requestedProperties))) { unset($requestedProperties[$index]); $returnedProperties[200]['{DAV:}alternate-URI-set'] = new DAV\Property\HrefList($node->getAlternateUriSet()); } if (false !== ($index = array_search('{DAV:}principal-URL', $requestedProperties))) { unset($requestedProperties[$index]); $returnedProperties[200]['{DAV:}principal-URL'] = new DAV\Property\Href($node->getPrincipalUrl() . '/'); } if (false !== ($index = array_search('{DAV:}group-member-set', $requestedProperties))) { unset($requestedProperties[$index]); $returnedProperties[200]['{DAV:}group-member-set'] = new DAV\Property\HrefList($node->getGroupMemberSet()); } if (false !== ($index = array_search('{DAV:}group-membership', $requestedProperties))) { unset($requestedProperties[$index]); $returnedProperties[200]['{DAV:}group-membership'] = new DAV\Property\HrefList($node->getGroupMembership()); } if (false !== ($index = array_search('{DAV:}displayname', $requestedProperties))) { $returnedProperties[200]['{DAV:}displayname'] = $node->getDisplayName(); } } if (false !== ($index = array_search('{DAV:}principal-collection-set', $requestedProperties))) { unset($requestedProperties[$index]); $val = $this->principalCollectionSet; // Ensuring all collections end with a slash foreach($val as $k=>$v) $val[$k] = $v . '/'; $returnedProperties[200]['{DAV:}principal-collection-set'] = new DAV\Property\HrefList($val); } if (false !== ($index = array_search('{DAV:}current-user-principal', $requestedProperties))) { unset($requestedProperties[$index]); if ($url = $this->getCurrentUserPrincipal()) { $returnedProperties[200]['{DAV:}current-user-principal'] = new Property\Principal(Property\Principal::HREF, $url . '/'); } else { $returnedProperties[200]['{DAV:}current-user-principal'] = new Property\Principal(Property\Principal::UNAUTHENTICATED); } } if (false !== ($index = array_search('{DAV:}supported-privilege-set', $requestedProperties))) { unset($requestedProperties[$index]); $returnedProperties[200]['{DAV:}supported-privilege-set'] = new Property\SupportedPrivilegeSet($this->getSupportedPrivilegeSet($node)); } if (false !== ($index = array_search('{DAV:}current-user-privilege-set', $requestedProperties))) { if (!$this->checkPrivileges($uri, '{DAV:}read-current-user-privilege-set', self::R_PARENT, false)) { $returnedProperties[403]['{DAV:}current-user-privilege-set'] = null; unset($requestedProperties[$index]); } else { $val = $this->getCurrentUserPrivilegeSet($node); if (!is_null($val)) { unset($requestedProperties[$index]); $returnedProperties[200]['{DAV:}current-user-privilege-set'] = new Property\CurrentUserPrivilegeSet($val); } } } /* The ACL property contains all the permissions */ if (false !== ($index = array_search('{DAV:}acl', $requestedProperties))) { if (!$this->checkPrivileges($uri, '{DAV:}read-acl', self::R_PARENT, false)) { unset($requestedProperties[$index]); $returnedProperties[403]['{DAV:}acl'] = null; } else { $acl = $this->getACL($node); if (!is_null($acl)) { unset($requestedProperties[$index]); $returnedProperties[200]['{DAV:}acl'] = new Property\Acl($this->getACL($node)); } } } /* The acl-restrictions property contains information on how privileges * must behave. */ if (false !== ($index = array_search('{DAV:}acl-restrictions', $requestedProperties))) { unset($requestedProperties[$index]); $returnedProperties[200]['{DAV:}acl-restrictions'] = new Property\AclRestrictions(); } /* Adding ACL properties */ if ($node instanceof IACL) { if (false !== ($index = array_search('{DAV:}owner', $requestedProperties))) { unset($requestedProperties[$index]); $returnedProperties[200]['{DAV:}owner'] = new DAV\Property\Href($node->getOwner() . '/'); } } } /** * This method intercepts PROPPATCH methods and make sure the * group-member-set is updated correctly. * * @param array $propertyDelta * @param array $result * @param DAV\INode $node * @return bool */ public function updateProperties(&$propertyDelta, &$result, DAV\INode $node) { if (!array_key_exists('{DAV:}group-member-set', $propertyDelta)) return; if (is_null($propertyDelta['{DAV:}group-member-set'])) { $memberSet = array(); } elseif ($propertyDelta['{DAV:}group-member-set'] instanceof DAV\Property\HrefList) { $memberSet = array_map( array($this->server,'calculateUri'), $propertyDelta['{DAV:}group-member-set']->getHrefs() ); } else { throw new DAV\Exception('The group-member-set property MUST be an instance of Sabre\DAV\Property\HrefList or null'); } if (!($node instanceof IPrincipal)) { $result[403]['{DAV:}group-member-set'] = null; unset($propertyDelta['{DAV:}group-member-set']); // Returning false will stop the updateProperties process return false; } $node->setGroupMemberSet($memberSet); // We must also clear our cache, just in case $this->principalMembershipCache = array(); $result[200]['{DAV:}group-member-set'] = null; unset($propertyDelta['{DAV:}group-member-set']); } /** * This method handles HTTP REPORT requests * * @param string $reportName * @param \DOMNode $dom * @return bool */ public function report($reportName, $dom) { switch($reportName) { case '{DAV:}principal-property-search' : $this->principalPropertySearchReport($dom); return false; case '{DAV:}principal-search-property-set' : $this->principalSearchPropertySetReport($dom); return false; case '{DAV:}expand-property' : $this->expandPropertyReport($dom); return false; } } /** * This event is triggered for any HTTP method that is not known by the * webserver. * * @param string $method * @param string $uri * @return bool */ public function unknownMethod($method, $uri) { if ($method!=='ACL') return; $this->httpACL($uri); return false; } /** * This method is responsible for handling the 'ACL' event. * * @param string $uri * @return void */ public function httpACL($uri) { $body = $this->server->httpRequest->getBody(true); $dom = DAV\XMLUtil::loadDOMDocument($body); $newAcl = Property\Acl::unserialize($dom->firstChild) ->getPrivileges(); // Normalizing urls foreach($newAcl as $k=>$newAce) { $newAcl[$k]['principal'] = $this->server->calculateUri($newAce['principal']); } $node = $this->server->tree->getNodeForPath($uri); if (!($node instanceof IACL)) { throw new DAV\Exception\MethodNotAllowed('This node does not support the ACL method'); } $oldAcl = $this->getACL($node); $supportedPrivileges = $this->getFlatPrivilegeSet($node); /* Checking if protected principals from the existing principal set are not overwritten. */ foreach($oldAcl as $oldAce) { if (!isset($oldAce['protected']) || !$oldAce['protected']) continue; $found = false; foreach($newAcl as $newAce) { if ( $newAce['privilege'] === $oldAce['privilege'] && $newAce['principal'] === $oldAce['principal'] && $newAce['protected'] ) $found = true; } if (!$found) throw new Exception\AceConflict('This resource contained a protected {DAV:}ace, but this privilege did not occur in the ACL request'); } foreach($newAcl as $newAce) { // Do we recognize the privilege if (!isset($supportedPrivileges[$newAce['privilege']])) { throw new Exception\NotSupportedPrivilege('The privilege you specified (' . $newAce['privilege'] . ') is not recognized by this server'); } if ($supportedPrivileges[$newAce['privilege']]['abstract']) { throw new Exception\NoAbstract('The privilege you specified (' . $newAce['privilege'] . ') is an abstract privilege'); } // Looking up the principal try { $principal = $this->server->tree->getNodeForPath($newAce['principal']); } catch (DAV\Exception\NotFound $e) { throw new Exception\NotRecognizedPrincipal('The specified principal (' . $newAce['principal'] . ') does not exist'); } if (!($principal instanceof IPrincipal)) { throw new Exception\NotRecognizedPrincipal('The specified uri (' . $newAce['principal'] . ') is not a principal'); } } $node->setACL($newAcl); } /* }}} */ /* Reports {{{ */ /** * The expand-property report is defined in RFC3253 section 3-8. * * This report is very similar to a standard PROPFIND. The difference is * that it has the additional ability to look at properties containing a * {DAV:}href element, follow that property and grab additional elements * there. * * Other rfc's, such as ACL rely on this report, so it made sense to put * it in this plugin. * * @param \DOMElement $dom * @return void */ protected function expandPropertyReport($dom) { $requestedProperties = $this->parseExpandPropertyReportRequest($dom->firstChild->firstChild); $depth = $this->server->getHTTPDepth(0); $requestUri = $this->server->getRequestUri(); $result = $this->expandProperties($requestUri,$requestedProperties,$depth); $dom = new \DOMDocument('1.0','utf-8'); $dom->formatOutput = true; $multiStatus = $dom->createElement('d:multistatus'); $dom->appendChild($multiStatus); // Adding in default namespaces foreach($this->server->xmlNamespaces as $namespace=>$prefix) { $multiStatus->setAttribute('xmlns:' . $prefix,$namespace); } foreach($result as $response) { $response->serialize($this->server, $multiStatus); } $xml = $dom->saveXML(); $this->server->httpResponse->setHeader('Content-Type','application/xml; charset=utf-8'); $this->server->httpResponse->sendStatus(207); $this->server->httpResponse->sendBody($xml); } /** * This method is used by expandPropertyReport to parse * out the entire HTTP request. * * @param \DOMElement $node * @return array */ protected function parseExpandPropertyReportRequest($node) { $requestedProperties = array(); do { if (DAV\XMLUtil::toClarkNotation($node)!=='{DAV:}property') continue; if ($node->firstChild) { $children = $this->parseExpandPropertyReportRequest($node->firstChild); } else { $children = array(); } $namespace = $node->getAttribute('namespace'); if (!$namespace) $namespace = 'DAV:'; $propName = '{'.$namespace.'}' . $node->getAttribute('name'); $requestedProperties[$propName] = $children; } while ($node = $node->nextSibling); return $requestedProperties; } /** * This method expands all the properties and returns * a list with property values * * @param array $path * @param array $requestedProperties the list of required properties * @param int $depth * @return array */ protected function expandProperties($path, array $requestedProperties, $depth) { $foundProperties = $this->server->getPropertiesForPath($path, array_keys($requestedProperties), $depth); $result = array(); foreach($foundProperties as $node) { foreach($requestedProperties as $propertyName=>$childRequestedProperties) { // We're only traversing if sub-properties were requested if(count($childRequestedProperties)===0) continue; // We only have to do the expansion if the property was found // and it contains an href element. if (!array_key_exists($propertyName,$node[200])) continue; if ($node[200][$propertyName] instanceof DAV\Property\IHref) { $hrefs = array($node[200][$propertyName]->getHref()); } elseif ($node[200][$propertyName] instanceof DAV\Property\HrefList) { $hrefs = $node[200][$propertyName]->getHrefs(); } $childProps = array(); foreach($hrefs as $href) { $childProps = array_merge($childProps, $this->expandProperties($href, $childRequestedProperties, 0)); } $node[200][$propertyName] = new DAV\Property\ResponseList($childProps); } $result[] = new DAV\Property\Response($node['href'], $node); } return $result; } /** * principalSearchPropertySetReport * * This method responsible for handing the * {DAV:}principal-search-property-set report. This report returns a list * of properties the client may search on, using the * {DAV:}principal-property-search report. * * @param \DOMDocument $dom * @return void */ protected function principalSearchPropertySetReport(\DOMDocument $dom) { $httpDepth = $this->server->getHTTPDepth(0); if ($httpDepth!==0) { throw new DAV\Exception\BadRequest('This report is only defined when Depth: 0'); } if ($dom->firstChild->hasChildNodes()) throw new DAV\Exception\BadRequest('The principal-search-property-set report element is not allowed to have child elements'); $dom = new \DOMDocument('1.0','utf-8'); $dom->formatOutput = true; $root = $dom->createElement('d:principal-search-property-set'); $dom->appendChild($root); // Adding in default namespaces foreach($this->server->xmlNamespaces as $namespace=>$prefix) { $root->setAttribute('xmlns:' . $prefix,$namespace); } $nsList = $this->server->xmlNamespaces; foreach($this->principalSearchPropertySet as $propertyName=>$description) { $psp = $dom->createElement('d:principal-search-property'); $root->appendChild($psp); $prop = $dom->createElement('d:prop'); $psp->appendChild($prop); $propName = null; preg_match('/^{([^}]*)}(.*)$/',$propertyName,$propName); $currentProperty = $dom->createElement($nsList[$propName[1]] . ':' . $propName[2]); $prop->appendChild($currentProperty); $descriptionElem = $dom->createElement('d:description'); $descriptionElem->setAttribute('xml:lang','en'); $descriptionElem->appendChild($dom->createTextNode($description)); $psp->appendChild($descriptionElem); } $this->server->httpResponse->setHeader('Content-Type','application/xml; charset=utf-8'); $this->server->httpResponse->sendStatus(200); $this->server->httpResponse->sendBody($dom->saveXML()); } /** * principalPropertySearchReport * * This method is responsible for handing the * {DAV:}principal-property-search report. This report can be used for * clients to search for groups of principals, based on the value of one * or more properties. * * @param \DOMDocument $dom * @return void */ protected function principalPropertySearchReport(\DOMDocument $dom) { list($searchProperties, $requestedProperties, $applyToPrincipalCollectionSet) = $this->parsePrincipalPropertySearchReportRequest($dom); $uri = null; if (!$applyToPrincipalCollectionSet) { $uri = $this->server->getRequestUri(); } $result = $this->principalSearch($searchProperties, $requestedProperties, $uri); $prefer = $this->server->getHTTPPRefer(); $this->server->httpResponse->sendStatus(207); $this->server->httpResponse->setHeader('Content-Type','application/xml; charset=utf-8'); $this->server->httpResponse->setHeader('Vary','Brief,Prefer'); $this->server->httpResponse->sendBody($this->server->generateMultiStatus($result, $prefer['return-minimal'])); } /** * parsePrincipalPropertySearchReportRequest * * This method parses the request body from a * {DAV:}principal-property-search report. * * This method returns an array with two elements: * 1. an array with properties to search on, and their values * 2. a list of propertyvalues that should be returned for the request. * * @param \DOMDocument $dom * @return array */ protected function parsePrincipalPropertySearchReportRequest($dom) { $httpDepth = $this->server->getHTTPDepth(0); if ($httpDepth!==0) { throw new DAV\Exception\BadRequest('This report is only defined when Depth: 0'); } $searchProperties = array(); $applyToPrincipalCollectionSet = false; // Parsing the search request foreach($dom->firstChild->childNodes as $searchNode) { if (DAV\XMLUtil::toClarkNotation($searchNode) == '{DAV:}apply-to-principal-collection-set') { $applyToPrincipalCollectionSet = true; } if (DAV\XMLUtil::toClarkNotation($searchNode)!=='{DAV:}property-search') continue; $propertyName = null; $propertyValue = null; foreach($searchNode->childNodes as $childNode) { switch(DAV\XMLUtil::toClarkNotation($childNode)) { case '{DAV:}prop' : $property = DAV\XMLUtil::parseProperties($searchNode); reset($property); $propertyName = key($property); break; case '{DAV:}match' : $propertyValue = $childNode->textContent; break; } } if (is_null($propertyName) || is_null($propertyValue)) throw new DAV\Exception\BadRequest('Invalid search request. propertyname: ' . $propertyName . '. propertvvalue: ' . $propertyValue); $searchProperties[$propertyName] = $propertyValue; } return array($searchProperties, array_keys(DAV\XMLUtil::parseProperties($dom->firstChild)), $applyToPrincipalCollectionSet); } /* }}} */ } sabre-dav-1.8.12/lib/Sabre/DAVACL/Principal.php000066400000000000000000000153051246001162500206360ustar00rootroot00000000000000principalBackend = $principalBackend; $this->principalProperties = $principalProperties; } /** * Returns the full principal url * * @return string */ public function getPrincipalUrl() { return $this->principalProperties['uri']; } /** * Returns a list of alternative urls for a principal * * This can for example be an email address, or ldap url. * * @return array */ public function getAlternateUriSet() { $uris = array(); if (isset($this->principalProperties['{DAV:}alternate-URI-set'])) { $uris = $this->principalProperties['{DAV:}alternate-URI-set']; } if (isset($this->principalProperties['{http://sabredav.org/ns}email-address'])) { $uris[] = 'mailto:' . $this->principalProperties['{http://sabredav.org/ns}email-address']; } return array_unique($uris); } /** * Returns the list of group members * * If this principal is a group, this function should return * all member principal uri's for the group. * * @return array */ public function getGroupMemberSet() { return $this->principalBackend->getGroupMemberSet($this->principalProperties['uri']); } /** * Returns the list of groups this principal is member of * * If this principal is a member of a (list of) groups, this function * should return a list of principal uri's for it's members. * * @return array */ public function getGroupMembership() { return $this->principalBackend->getGroupMemberShip($this->principalProperties['uri']); } /** * Sets a list of group members * * If this principal is a group, this method sets all the group members. * The list of members is always overwritten, never appended to. * * This method should throw an exception if the members could not be set. * * @param array $groupMembers * @return void */ public function setGroupMemberSet(array $groupMembers) { $this->principalBackend->setGroupMemberSet($this->principalProperties['uri'], $groupMembers); } /** * Returns this principals name. * * @return string */ public function getName() { $uri = $this->principalProperties['uri']; list(, $name) = DAV\URLUtil::splitPath($uri); return $name; } /** * Returns the name of the user * * @return string */ public function getDisplayName() { if (isset($this->principalProperties['{DAV:}displayname'])) { return $this->principalProperties['{DAV:}displayname']; } else { return $this->getName(); } } /** * Returns a list of properties * * @param array $requestedProperties * @return array */ public function getProperties($requestedProperties) { $newProperties = array(); foreach($requestedProperties as $propName) { if (isset($this->principalProperties[$propName])) { $newProperties[$propName] = $this->principalProperties[$propName]; } } return $newProperties; } /** * Updates this principals properties. * * @param array $mutations * @see Sabre\DAV\IProperties::updateProperties * @return bool|array */ public function updateProperties($mutations) { return $this->principalBackend->updatePrincipal($this->principalProperties['uri'], $mutations); } /** * Returns the owner principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getOwner() { return $this->principalProperties['uri']; } /** * Returns a group principal * * This must be a url to a principal, or null if there's no owner * * @return string|null */ public function getGroup() { return null; } /** * Returns a list of ACE's for this node. * * Each ACE has the following properties: * * 'privilege', a string such as {DAV:}read or {DAV:}write. These are * currently the only supported privileges * * 'principal', a url to the principal who owns the node * * 'protected' (optional), indicating that this ACE is not allowed to * be updated. * * @return array */ public function getACL() { return array( array( 'privilege' => '{DAV:}read', 'principal' => $this->getPrincipalUrl(), 'protected' => true, ), ); } /** * Updates the ACL * * This method will receive a list of new ACE's. * * @param array $acl * @return void */ public function setACL(array $acl) { throw new DAV\Exception\MethodNotAllowed('Updating ACLs is not allowed here'); } /** * Returns the list of supported privileges for this node. * * The returned data structure is a list of nested privileges. * See Sabre\DAVACL\Plugin::getDefaultSupportedPrivilegeSet for a simple * standard structure. * * If null is returned from this method, the default privilege set is used, * which is fine for most common usecases. * * @return array|null */ public function getSupportedPrivilegeSet() { return null; } } sabre-dav-1.8.12/lib/Sabre/DAVACL/PrincipalBackend/000077500000000000000000000000001246001162500213715ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/DAVACL/PrincipalBackend/AbstractBackend.php000066400000000000000000000010071246001162500251130ustar00rootroot00000000000000 array( * '{DAV:}prop1' => null, * ), * 201 => array( * '{DAV:}prop2' => null, * ), * 403 => array( * '{DAV:}prop3' => null, * ), * 424 => array( * '{DAV:}prop4' => null, * ), * ); * * In this previous example prop1 was successfully updated or deleted, and * prop2 was succesfully created. * * prop3 failed to update due to '403 Forbidden' and because of this prop4 * also could not be updated with '424 Failed dependency'. * * This last example was actually incorrect. While 200 and 201 could appear * in 1 response, if there's any error (403) the other properties should * always fail with 423 (failed dependency). * * But anyway, if you don't want to scratch your head over this, just * return true or false. * * @param string $path * @param array $mutations * @return array|bool */ function updatePrincipal($path, $mutations); /** * This method is used to search for principals matching a set of * properties. * * This search is specifically used by RFC3744's principal-property-search * REPORT. You should at least allow searching on * http://sabredav.org/ns}email-address. * * The actual search should be a unicode-non-case-sensitive search. The * keys in searchProperties are the WebDAV property names, while the values * are the property values to search on. * * If multiple properties are being searched on, the search should be * AND'ed. * * This method should simply return an array with full principal uri's. * * If somebody attempted to search on a property the backend does not * support, you should simply return 0 results. * * You can also just return 0 results if you choose to not support * searching at all, but keep in mind that this may stop certain features * from working. * * @param string $prefixPath * @param array $searchProperties * @return array */ function searchPrincipals($prefixPath, array $searchProperties); /** * Returns the list of members for a group-principal * * @param string $principal * @return array */ function getGroupMemberSet($principal); /** * Returns the list of groups a principal is a member of * * @param string $principal * @return array */ function getGroupMembership($principal); /** * Updates the list of group members for a group principal. * * The principals should be passed as a list of uri's. * * @param string $principal * @param array $members * @return void */ function setGroupMemberSet($principal, array $members); } sabre-dav-1.8.12/lib/Sabre/DAVACL/PrincipalBackend/PDO.php000066400000000000000000000312111246001162500225220ustar00rootroot00000000000000 array( 'dbField' => 'displayname', ), /** * This property is actually used by the CardDAV plugin, where it gets * mapped to {http://calendarserver.orgi/ns/}me-card. * * The reason we don't straight-up use that property, is because * me-card is defined as a property on the users' addressbook * collection. */ '{http://sabredav.org/ns}vcard-url' => array( 'dbField' => 'vcardurl', ), /** * This is the users' primary email-address. */ '{http://sabredav.org/ns}email-address' => array( 'dbField' => 'email', ), ); /** * Sets up the backend. * * @param PDO $pdo * @param string $tableName * @param string $groupMembersTableName */ public function __construct(\PDO $pdo, $tableName = 'principals', $groupMembersTableName = 'groupmembers') { $this->pdo = $pdo; $this->tableName = $tableName; $this->groupMembersTableName = $groupMembersTableName; } /** * Returns a list of principals based on a prefix. * * This prefix will often contain something like 'principals'. You are only * expected to return principals that are in this base path. * * You are expected to return at least a 'uri' for every user, you can * return any additional properties if you wish so. Common properties are: * {DAV:}displayname * {http://sabredav.org/ns}email-address - This is a custom SabreDAV * field that's actualy injected in a number of other properties. If * you have an email address, use this property. * * @param string $prefixPath * @return array */ public function getPrincipalsByPrefix($prefixPath) { $fields = array( 'uri', ); foreach($this->fieldMap as $key=>$value) { $fields[] = $value['dbField']; } $result = $this->pdo->query('SELECT '.implode(',', $fields).' FROM '. $this->tableName); $principals = array(); while($row = $result->fetch(\PDO::FETCH_ASSOC)) { // Checking if the principal is in the prefix list($rowPrefix) = DAV\URLUtil::splitPath($row['uri']); if ($rowPrefix !== $prefixPath) continue; $principal = array( 'uri' => $row['uri'], ); foreach($this->fieldMap as $key=>$value) { if ($row[$value['dbField']]) { $principal[$key] = $row[$value['dbField']]; } } $principals[] = $principal; } return $principals; } /** * Returns a specific principal, specified by it's path. * The returned structure should be the exact same as from * getPrincipalsByPrefix. * * @param string $path * @return array */ public function getPrincipalByPath($path) { $fields = array( 'id', 'uri', ); foreach($this->fieldMap as $key=>$value) { $fields[] = $value['dbField']; } $stmt = $this->pdo->prepare('SELECT '.implode(',', $fields).' FROM '. $this->tableName . ' WHERE uri = ?'); $stmt->execute(array($path)); $row = $stmt->fetch(\PDO::FETCH_ASSOC); if (!$row) return; $principal = array( 'id' => $row['id'], 'uri' => $row['uri'], ); foreach($this->fieldMap as $key=>$value) { if ($row[$value['dbField']]) { $principal[$key] = $row[$value['dbField']]; } } return $principal; } /** * Updates one ore more webdav properties on a principal. * * The list of mutations is supplied as an array. Each key in the array is * a propertyname, such as {DAV:}displayname. * * Each value is the actual value to be updated. If a value is null, it * must be deleted. * * This method should be atomic. It must either completely succeed, or * completely fail. Success and failure can simply be returned as 'true' or * 'false'. * * It is also possible to return detailed failure information. In that case * an array such as this should be returned: * * array( * 200 => array( * '{DAV:}prop1' => null, * ), * 201 => array( * '{DAV:}prop2' => null, * ), * 403 => array( * '{DAV:}prop3' => null, * ), * 424 => array( * '{DAV:}prop4' => null, * ), * ); * * In this previous example prop1 was successfully updated or deleted, and * prop2 was succesfully created. * * prop3 failed to update due to '403 Forbidden' and because of this prop4 * also could not be updated with '424 Failed dependency'. * * This last example was actually incorrect. While 200 and 201 could appear * in 1 response, if there's any error (403) the other properties should * always fail with 423 (failed dependency). * * But anyway, if you don't want to scratch your head over this, just * return true or false. * * @param string $path * @param array $mutations * @return array|bool */ public function updatePrincipal($path, $mutations) { $updateAble = array(); foreach($mutations as $key=>$value) { // We are not aware of this field, we must fail. if (!isset($this->fieldMap[$key])) { $response = array( 403 => array( $key => null, ), 424 => array(), ); // Adding the rest to the response as a 424 foreach($mutations as $subKey=>$subValue) { if ($subKey !== $key) { $response[424][$subKey] = null; } } return $response; } $updateAble[$this->fieldMap[$key]['dbField']] = $value; } // No fields to update $query = "UPDATE " . $this->tableName . " SET "; $first = true; foreach($updateAble as $key => $value) { if (!$first) { $query.= ', '; } $first = false; $query.= "$key = :$key "; } $query.='WHERE uri = :uri'; $stmt = $this->pdo->prepare($query); $updateAble['uri'] = $path; $stmt->execute($updateAble); return true; } /** * This method is used to search for principals matching a set of * properties. * * This search is specifically used by RFC3744's principal-property-search * REPORT. You should at least allow searching on * http://sabredav.org/ns}email-address. * * The actual search should be a unicode-non-case-sensitive search. The * keys in searchProperties are the WebDAV property names, while the values * are the property values to search on. * * If multiple properties are being searched on, the search should be * AND'ed. * * This method should simply return an array with full principal uri's. * * If somebody attempted to search on a property the backend does not * support, you should simply return 0 results. * * You can also just return 0 results if you choose to not support * searching at all, but keep in mind that this may stop certain features * from working. * * @param string $prefixPath * @param array $searchProperties * @return array */ public function searchPrincipals($prefixPath, array $searchProperties) { $query = 'SELECT uri FROM ' . $this->tableName . ' WHERE 1=1 '; $values = array(); foreach($searchProperties as $property => $value) { switch($property) { case '{DAV:}displayname' : $query.=' AND displayname LIKE ?'; $values[] = '%' . $value . '%'; break; case '{http://sabredav.org/ns}email-address' : $query.=' AND email LIKE ?'; $values[] = '%' . $value . '%'; break; default : // Unsupported property return array(); } } $stmt = $this->pdo->prepare($query); $stmt->execute($values); $principals = array(); while($row = $stmt->fetch(\PDO::FETCH_ASSOC)) { // Checking if the principal is in the prefix list($rowPrefix) = DAV\URLUtil::splitPath($row['uri']); if ($rowPrefix !== $prefixPath) continue; $principals[] = $row['uri']; } return $principals; } /** * Returns the list of members for a group-principal * * @param string $principal * @return array */ public function getGroupMemberSet($principal) { $principal = $this->getPrincipalByPath($principal); if (!$principal) throw new DAV\Exception('Principal not found'); $stmt = $this->pdo->prepare('SELECT principals.uri as uri FROM '.$this->groupMembersTableName.' AS groupmembers LEFT JOIN '.$this->tableName.' AS principals ON groupmembers.member_id = principals.id WHERE groupmembers.principal_id = ?'); $stmt->execute(array($principal['id'])); $result = array(); while ($row = $stmt->fetch(\PDO::FETCH_ASSOC)) { $result[] = $row['uri']; } return $result; } /** * Returns the list of groups a principal is a member of * * @param string $principal * @return array */ public function getGroupMembership($principal) { $principal = $this->getPrincipalByPath($principal); if (!$principal) throw new DAV\Exception('Principal not found'); $stmt = $this->pdo->prepare('SELECT principals.uri as uri FROM '.$this->groupMembersTableName.' AS groupmembers LEFT JOIN '.$this->tableName.' AS principals ON groupmembers.principal_id = principals.id WHERE groupmembers.member_id = ?'); $stmt->execute(array($principal['id'])); $result = array(); while ($row = $stmt->fetch(\PDO::FETCH_ASSOC)) { $result[] = $row['uri']; } return $result; } /** * Updates the list of group members for a group principal. * * The principals should be passed as a list of uri's. * * @param string $principal * @param array $members * @return void */ public function setGroupMemberSet($principal, array $members) { // Grabbing the list of principal id's. $stmt = $this->pdo->prepare('SELECT id, uri FROM '.$this->tableName.' WHERE uri IN (? ' . str_repeat(', ? ', count($members)) . ');'); $stmt->execute(array_merge(array($principal), $members)); $memberIds = array(); $principalId = null; while($row = $stmt->fetch(\PDO::FETCH_ASSOC)) { if ($row['uri'] == $principal) { $principalId = $row['id']; } else { $memberIds[] = $row['id']; } } if (!$principalId) throw new DAV\Exception('Principal not found'); // Wiping out old members $stmt = $this->pdo->prepare('DELETE FROM '.$this->groupMembersTableName.' WHERE principal_id = ?;'); $stmt->execute(array($principalId)); foreach($memberIds as $memberId) { $stmt = $this->pdo->prepare('INSERT INTO '.$this->groupMembersTableName.' (principal_id, member_id) VALUES (?, ?);'); $stmt->execute(array($principalId, $memberId)); } } } sabre-dav-1.8.12/lib/Sabre/DAVACL/PrincipalCollection.php000066400000000000000000000015671246001162500226570ustar00rootroot00000000000000principalBackend, $principal); } } sabre-dav-1.8.12/lib/Sabre/DAVACL/Property/000077500000000000000000000000001246001162500200245ustar00rootroot00000000000000sabre-dav-1.8.12/lib/Sabre/DAVACL/Property/Acl.php000066400000000000000000000143511246001162500212400ustar00rootroot00000000000000privileges = $privileges; $this->prefixBaseUrl = $prefixBaseUrl; } /** * Returns the list of privileges for this property * * @return array */ public function getPrivileges() { return $this->privileges; } /** * Serializes the property into a DOMElement * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serialize(DAV\Server $server,\DOMElement $node) { $doc = $node->ownerDocument; foreach($this->privileges as $ace) { $this->serializeAce($doc, $node, $ace, $server); } } /** * Unserializes the {DAV:}acl xml element. * * @param \DOMElement $dom * @return Acl */ static public function unserialize(\DOMElement $dom) { $privileges = array(); $xaces = $dom->getElementsByTagNameNS('urn:DAV','ace'); for($ii=0; $ii < $xaces->length; $ii++) { $xace = $xaces->item($ii); $principal = $xace->getElementsByTagNameNS('urn:DAV','principal'); if ($principal->length !== 1) { throw new DAV\Exception\BadRequest('Each {DAV:}ace element must have one {DAV:}principal element'); } $principal = Principal::unserialize($principal->item(0)); switch($principal->getType()) { case Principal::HREF : $principal = $principal->getHref(); break; case Principal::AUTHENTICATED : $principal = '{DAV:}authenticated'; break; case Principal::UNAUTHENTICATED : $principal = '{DAV:}unauthenticated'; break; case Principal::ALL : $principal = '{DAV:}all'; break; } $protected = false; if ($xace->getElementsByTagNameNS('urn:DAV','protected')->length > 0) { $protected = true; } $grants = $xace->getElementsByTagNameNS('urn:DAV','grant'); if ($grants->length < 1) { throw new DAV\Exception\NotImplemented('Every {DAV:}ace element must have a {DAV:}grant element. {DAV:}deny is not yet supported'); } $grant = $grants->item(0); $xprivs = $grant->getElementsByTagNameNS('urn:DAV','privilege'); for($jj=0; $jj<$xprivs->length; $jj++) { $xpriv = $xprivs->item($jj); $privilegeName = null; for ($kk=0;$kk<$xpriv->childNodes->length;$kk++) { $childNode = $xpriv->childNodes->item($kk); if ($t = DAV\XMLUtil::toClarkNotation($childNode)) { $privilegeName = $t; break; } } if (is_null($privilegeName)) { throw new DAV\Exception\BadRequest('{DAV:}privilege elements must have a privilege element contained within them.'); } $privileges[] = array( 'principal' => $principal, 'protected' => $protected, 'privilege' => $privilegeName, ); } } return new self($privileges); } /** * Serializes a single access control entry. * * @param \DOMDocument $doc * @param \DOMElement $node * @param array $ace * @param DAV\Server $server * @return void */ private function serializeAce($doc,$node,$ace, DAV\Server $server) { $xace = $doc->createElementNS('DAV:','d:ace'); $node->appendChild($xace); $principal = $doc->createElementNS('DAV:','d:principal'); $xace->appendChild($principal); switch($ace['principal']) { case '{DAV:}authenticated' : $principal->appendChild($doc->createElementNS('DAV:','d:authenticated')); break; case '{DAV:}unauthenticated' : $principal->appendChild($doc->createElementNS('DAV:','d:unauthenticated')); break; case '{DAV:}all' : $principal->appendChild($doc->createElementNS('DAV:','d:all')); break; default: $principal->appendChild($doc->createElementNS('DAV:','d:href',($this->prefixBaseUrl?$server->getBaseUri():'') . $ace['principal'] . '/')); } $grant = $doc->createElementNS('DAV:','d:grant'); $xace->appendChild($grant); $privParts = null; preg_match('/^{([^}]*)}(.*)$/',$ace['privilege'],$privParts); $xprivilege = $doc->createElementNS('DAV:','d:privilege'); $grant->appendChild($xprivilege); $xprivilege->appendChild($doc->createElementNS($privParts[1],'d:'.$privParts[2])); if (isset($ace['protected']) && $ace['protected']) $xace->appendChild($doc->createElement('d:protected')); } } sabre-dav-1.8.12/lib/Sabre/DAVACL/Property/AclRestrictions.php000066400000000000000000000014601246001162500236460ustar00rootroot00000000000000ownerDocument; $elem->appendChild($doc->createElementNS('DAV:','d:grant-only')); $elem->appendChild($doc->createElementNS('DAV:','d:no-invert')); } } sabre-dav-1.8.12/lib/Sabre/DAVACL/Property/CurrentUserPrivilegeSet.php000066400000000000000000000053261246001162500253470ustar00rootroot00000000000000privileges = $privileges; } /** * Serializes the property in the DOM * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serialize(DAV\Server $server,\DOMElement $node) { $doc = $node->ownerDocument; foreach($this->privileges as $privName) { $this->serializePriv($doc,$node,$privName); } } /** * Returns true or false, whether the specified principal appears in the * list. * * @return bool */ public function has($privilegeName) { return in_array($privilegeName, $this->privileges); } /** * Serializes one privilege * * @param \DOMDocument $doc * @param \DOMElement $node * @param string $privName * @return void */ protected function serializePriv($doc,$node,$privName) { $xp = $doc->createElementNS('DAV:','d:privilege'); $node->appendChild($xp); $privParts = null; preg_match('/^{([^}]*)}(.*)$/',$privName,$privParts); $xp->appendChild($doc->createElementNS($privParts[1],'d:'.$privParts[2])); } /** * Unserializes the {DAV:}current-user-privilege-set element. * * @param DOMElement $node * @return CurrentUserPrivilegeSet */ static public function unserialize(\DOMElement $node) { $result = array(); $xprivs = $node->getElementsByTagNameNS('urn:DAV','privilege'); for($jj=0; $jj<$xprivs->length; $jj++) { $xpriv = $xprivs->item($jj); $privilegeName = null; for ($kk=0;$kk<$xpriv->childNodes->length;$kk++) { $childNode = $xpriv->childNodes->item($kk); if ($t = DAV\XMLUtil::toClarkNotation($childNode)) { $privilegeName = $t; break; } } $result[] = $privilegeName; } return new self($result); } } sabre-dav-1.8.12/lib/Sabre/DAVACL/Property/Principal.php000066400000000000000000000076311246001162500224650ustar00rootroot00000000000000type = $type; if ($type===self::HREF && is_null($href)) { throw new DAV\Exception('The href argument must be specified for the HREF principal type.'); } $this->href = $href; } /** * Returns the principal type * * @return int */ public function getType() { return $this->type; } /** * Returns the principal uri. * * @return string */ public function getHref() { return $this->href; } /** * Serializes the property into a DOMElement. * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serialize(DAV\Server $server, \DOMElement $node) { $prefix = $server->xmlNamespaces['DAV:']; switch($this->type) { case self::UNAUTHENTICATED : $node->appendChild( $node->ownerDocument->createElement($prefix . ':unauthenticated') ); break; case self::AUTHENTICATED : $node->appendChild( $node->ownerDocument->createElement($prefix . ':authenticated') ); break; case self::HREF : $href = $node->ownerDocument->createElement($prefix . ':href'); $href->nodeValue = $server->getBaseUri() . DAV\URLUtil::encodePath($this->href); $node->appendChild($href); break; } } /** * Deserializes a DOM element into a property object. * * @param \DOMElement $dom * @return Principal */ static public function unserialize(\DOMElement $dom) { $parent = $dom->firstChild; while(!DAV\XMLUtil::toClarkNotation($parent)) { $parent = $parent->nextSibling; } switch(DAV\XMLUtil::toClarkNotation($parent)) { case '{DAV:}unauthenticated' : return new self(self::UNAUTHENTICATED); case '{DAV:}authenticated' : return new self(self::AUTHENTICATED); case '{DAV:}href': return new self(self::HREF, $parent->textContent); case '{DAV:}all': return new self(self::ALL); default : throw new DAV\Exception\BadRequest('Unexpected element (' . DAV\XMLUtil::toClarkNotation($parent) . '). Could not deserialize'); } } } sabre-dav-1.8.12/lib/Sabre/DAVACL/Property/SupportedPrivilegeSet.php000066400000000000000000000045611246001162500250530ustar00rootroot00000000000000privileges = $privileges; } /** * Serializes the property into a domdocument. * * @param DAV\Server $server * @param \DOMElement $node * @return void */ public function serialize(DAV\Server $server,\DOMElement $node) { $doc = $node->ownerDocument; $this->serializePriv($doc, $node, $this->privileges); } /** * Serializes a property * * This is a recursive function. * * @param \DOMDocument $doc * @param \DOMElement $node * @param array $privilege * @return void */ private function serializePriv($doc,$node,$privilege) { $xsp = $doc->createElementNS('DAV:','d:supported-privilege'); $node->appendChild($xsp); $xp = $doc->createElementNS('DAV:','d:privilege'); $xsp->appendChild($xp); $privParts = null; preg_match('/^{([^}]*)}(.*)$/',$privilege['privilege'],$privParts); $xp->appendChild($doc->createElementNS($privParts[1],'d:'.$privParts[2])); if (isset($privilege['abstract']) && $privilege['abstract']) { $xsp->appendChild($doc->createElementNS('DAV:','d:abstract')); } if (isset($privilege['description'])) { $xsp->appendChild($doc->createElementNS('DAV:','d:description',$privilege['description'])); } if (isset($privilege['aggregates'])) { foreach($privilege['aggregates'] as $subPrivilege) { $this->serializePriv($doc,$xsp,$subPrivilege); } } } } sabre-dav-1.8.12/lib/Sabre/DAVACL/Version.php000066400000000000000000000007031246001162500203360ustar00rootroot00000000000000httpRequest->getHeader('Authorization'); $authHeader = explode(' ',$authHeader); if ($authHeader[0]!='AWS' || !isset($authHeader[1])) { $this->errorCode = self::ERR_NOAWSHEADER; return false; } list($this->accessKey,$this->signature) = explode(':',$authHeader[1]); return true; } /** * Returns the username for the request * * @return string */ public function getAccessKey() { return $this->accessKey; } /** * Validates the signature based on the secretKey * * @param string $secretKey * @return bool */ public function validate($secretKey) { $contentMD5 = $this->httpRequest->getHeader('Content-MD5'); if ($contentMD5) { // We need to validate the integrity of the request $body = $this->httpRequest->getBody(true); $this->httpRequest->setBody($body,true); if ($contentMD5!=base64_encode(md5($body,true))) { // content-md5 header did not match md5 signature of body $this->errorCode = self::ERR_MD5CHECKSUMWRONG; return false; } } if (!$requestDate = $this->httpRequest->getHeader('x-amz-date')) $requestDate = $this->httpRequest->getHeader('Date'); if (!$this->validateRFC2616Date($requestDate)) return false; $amzHeaders = $this->getAmzHeaders(); $signature = base64_encode( $this->hmacsha1($secretKey, $this->httpRequest->getMethod() . "\n" . $contentMD5 . "\n" . $this->httpRequest->getHeader('Content-type') . "\n" . $requestDate . "\n" . $amzHeaders . $this->httpRequest->getURI() ) ); if ($this->signature != $signature) { $this->errorCode = self::ERR_INVALIDSIGNATURE; return false; } return true; } /** * Returns an HTTP 401 header, forcing login * * This should be called when username and password are incorrect, or not supplied at all * * @return void */ public function requireLogin() { $this->httpResponse->setHeader('WWW-Authenticate','AWS'); $this->httpResponse->sendStatus(401); } /** * Makes sure the supplied value is a valid RFC2616 date. * * If we would just use strtotime to get a valid timestamp, we have no way of checking if a * user just supplied the word 'now' for the date header. * * This function also makes sure the Date header is within 15 minutes of the operating * system date, to prevent replay attacks. * * @param string $dateHeader * @return bool */ protected function validateRFC2616Date($dateHeader) { $date = Util::parseHTTPDate($dateHeader); // Unknown format if (!$date) { $this->errorCode = self::ERR_INVALIDDATEFORMAT; return false; } $min = new \DateTime('-15 minutes'); $max = new \DateTime('+15 minutes'); // We allow 15 minutes around the current date/time if ($date > $max || $date < $min) { $this->errorCode = self::ERR_REQUESTTIMESKEWED; return false; } return $date; } /** * Returns a list of AMZ headers * * @return string */ protected function getAmzHeaders() { $amzHeaders = array(); $headers = $this->httpRequest->getHeaders(); foreach($headers as $headerName => $headerValue) { if (strpos(strtolower($headerName),'x-amz-')===0) { $amzHeaders[strtolower($headerName)] = str_replace(array("\r\n"),array(' '),$headerValue) . "\n"; } } ksort($amzHeaders); $headerStr = ''; foreach($amzHeaders as $h=>$v) { $headerStr.=$h.':'.$v; } return $headerStr; } /** * Generates an HMAC-SHA1 signature * * @param string $key * @param string $message * @return string */ private function hmacsha1($key, $message) { $blocksize=64; if (strlen($key)>$blocksize) $key=pack('H*', sha1($key)); $key=str_pad($key,$blocksize,chr(0x00)); $ipad=str_repeat(chr(0x36),$blocksize); $opad=str_repeat(chr(0x5c),$blocksize); $hmac = pack('H*',sha1(($key^$opad).pack('H*',sha1(($key^$ipad).$message)))); return $hmac; } } sabre-dav-1.8.12/lib/Sabre/HTTP/AbstractAuth.php000066400000000000000000000040471246001162500211300ustar00rootroot00000000000000httpResponse = new Response(); $this->httpRequest = new Request(); } /** * Sets an alternative HTTP response object * * @param Response $response * @return void */ public function setHTTPResponse(Response $response) { $this->httpResponse = $response; } /** * Sets an alternative HTTP request object * * @param Request $request * @return void */ public function setHTTPRequest(Request $request) { $this->httpRequest = $request; } /** * Sets the realm * * The realm is often displayed in authentication dialog boxes * Commonly an application name displayed here * * @param string $realm * @return void */ public function setRealm($realm) { $this->realm = $realm; } /** * Returns the realm * * @return string */ public function getRealm() { return $this->realm; } /** * Returns an HTTP 401 header, forcing login * * This should be called when username and password are incorrect, or not supplied at all * * @return void */ abstract public function requireLogin(); } sabre-dav-1.8.12/lib/Sabre/HTTP/BasicAuth.php000066400000000000000000000033641246001162500204070ustar00rootroot00000000000000httpRequest->getRawServerValue('PHP_AUTH_USER'))!==null && ($pass = $this->httpRequest->getRawServerValue('PHP_AUTH_PW'))!==null) { return array($user,$pass); } // Most other webservers $auth = $this->httpRequest->getHeader('Authorization'); // Apache could prefix environment variables with REDIRECT_ when urls // are passed through mod_rewrite if (!$auth) { $auth = $this->httpRequest->getRawServerValue('REDIRECT_HTTP_AUTHORIZATION'); } if (!$auth) return false; if (strpos(strtolower($auth),'basic')!==0) return false; return explode(':', base64_decode(substr($auth, 6)),2); } /** * Returns an HTTP 401 header, forcing login * * This should be called when username and password are incorrect, or not supplied at all * * @return void */ public function requireLogin() { $this->httpResponse->setHeader('WWW-Authenticate','Basic realm="' . $this->realm . '"'); $this->httpResponse->sendStatus(401); } } sabre-dav-1.8.12/lib/Sabre/HTTP/DigestAuth.php000066400000000000000000000147721246001162500206120ustar00rootroot00000000000000nonce = uniqid(); $this->opaque = md5($this->realm); parent::__construct(); } /** * Gathers all information from the headers * * This method needs to be called prior to anything else. * * @return void */ public function init() { $digest = $this->getDigest(); $this->digestParts = $this->parseDigest($digest); } /** * Sets the quality of protection value. * * Possible values are: * Sabre\HTTP\DigestAuth::QOP_AUTH * Sabre\HTTP\DigestAuth::QOP_AUTHINT * * Multiple values can be specified using logical OR. * * QOP_AUTHINT ensures integrity of the request body, but this is not * supported by most HTTP clients. QOP_AUTHINT also requires the entire * request body to be md5'ed, which can put strains on CPU and memory. * * @param int $qop * @return void */ public function setQOP($qop) { $this->qop = $qop; } /** * Validates the user. * * The A1 parameter should be md5($username . ':' . $realm . ':' . $password); * * @param string $A1 * @return bool */ public function validateA1($A1) { $this->A1 = $A1; return $this->validate(); } /** * Validates authentication through a password. The actual password must be provided here. * It is strongly recommended not store the password in plain-text and use validateA1 instead. * * @param string $password * @return bool */ public function validatePassword($password) { $this->A1 = md5($this->digestParts['username'] . ':' . $this->realm . ':' . $password); return $this->validate(); } /** * Returns the username for the request * * @return string */ public function getUsername() { return $this->digestParts['username']; } /** * Validates the digest challenge * * @return bool */ protected function validate() { $A2 = $this->httpRequest->getMethod() . ':' . $this->digestParts['uri']; if ($this->digestParts['qop']=='auth-int') { // Making sure we support this qop value if (!($this->qop & self::QOP_AUTHINT)) return false; // We need to add an md5 of the entire request body to the A2 part of the hash $body = $this->httpRequest->getBody(true); $this->httpRequest->setBody($body,true); $A2 .= ':' . md5($body); } else { // We need to make sure we support this qop value if (!($this->qop & self::QOP_AUTH)) return false; } $A2 = md5($A2); $validResponse = md5("{$this->A1}:{$this->digestParts['nonce']}:{$this->digestParts['nc']}:{$this->digestParts['cnonce']}:{$this->digestParts['qop']}:{$A2}"); return $this->digestParts['response']==$validResponse; } /** * Returns an HTTP 401 header, forcing login * * This should be called when username and password are incorrect, or not supplied at all * * @return void */ public function requireLogin() { $qop = ''; switch($this->qop) { case self::QOP_AUTH : $qop = 'auth'; break; case self::QOP_AUTHINT : $qop = 'auth-int'; break; case self::QOP_AUTH | self::QOP_AUTHINT : $qop = 'auth,auth-int'; break; } $this->httpResponse->setHeader('WWW-Authenticate','Digest realm="' . $this->realm . '",qop="'.$qop.'",nonce="' . $this->nonce . '",opaque="' . $this->opaque . '"'); $this->httpResponse->sendStatus(401); } /** * This method returns the full digest string. * * It should be compatibile with mod_php format and other webservers. * * If the header could not be found, null will be returned * * @return mixed */ public function getDigest() { // mod_php $digest = $this->httpRequest->getRawServerValue('PHP_AUTH_DIGEST'); if ($digest) return $digest; // most other servers $digest = $this->httpRequest->getHeader('Authorization'); // Apache could prefix environment variables with REDIRECT_ when urls // are passed through mod_rewrite if (!$digest) { $digest = $this->httpRequest->getRawServerValue('REDIRECT_HTTP_AUTHORIZATION'); } if ($digest && strpos(strtolower($digest),'digest')===0) { return substr($digest,7); } else { return null; } } /** * Parses the different pieces of the digest string into an array. * * This method returns false if an incomplete digest was supplied * * @param string $digest * @return mixed */ protected function parseDigest($digest) { // protect against missing data $needed_parts = array('nonce'=>1, 'nc'=>1, 'cnonce'=>1, 'qop'=>1, 'username'=>1, 'uri'=>1, 'response'=>1); $data = array(); preg_match_all('@(\w+)=(?:(?:")([^"]+)"|([^\s,$]+))@', $digest, $matches, PREG_SET_ORDER); foreach ($matches as $m) { $data[$m[1]] = $m[2] ? $m[2] : $m[3]; unset($needed_parts[$m[1]]); } return $needed_parts ? false : $data; } } sabre-dav-1.8.12/lib/Sabre/HTTP/Request.php000066400000000000000000000155361246001162500202000ustar00rootroot00000000000000_SERVER = $serverData; else $this->_SERVER =& $_SERVER; if ($postData) $this->_POST = $postData; else $this->_POST =& $_POST; } /** * Returns the value for a specific http header. * * This method returns null if the header did not exist. * * @param string $name * @return string */ public function getHeader($name) { $name = strtoupper(str_replace(array('-'),array('_'),$name)); if (isset($this->_SERVER['HTTP_' . $name])) { return $this->_SERVER['HTTP_' . $name]; } // There's a few headers that seem to end up in the top-level // server array. switch($name) { case 'CONTENT_TYPE' : case 'CONTENT_LENGTH' : if (isset($this->_SERVER[$name])) { return $this->_SERVER[$name]; } break; } return; } /** * Returns all (known) HTTP headers. * * All headers are converted to lower-case, and additionally all underscores * are automatically converted to dashes * * @return array */ public function getHeaders() { $hdrs = array(); foreach($this->_SERVER as $key=>$value) { switch($key) { case 'CONTENT_LENGTH' : case 'CONTENT_TYPE' : $hdrs[strtolower(str_replace('_','-',$key))] = $value; break; default : if (strpos($key,'HTTP_')===0) { $hdrs[substr(strtolower(str_replace('_','-',$key)),5)] = $value; } break; } } return $hdrs; } /** * Returns the HTTP request method * * This is for example POST or GET * * @return string */ public function getMethod() { return $this->_SERVER['REQUEST_METHOD']; } /** * Returns the requested uri * * @return string */ public function getUri() { return $this->_SERVER['REQUEST_URI']; } /** * Will return protocol + the hostname + the uri * * @return string */ public function getAbsoluteUri() { // Checking if the request was made through HTTPS. The last in line is for IIS $protocol = isset($this->_SERVER['HTTPS']) && ($this->_SERVER['HTTPS']) && ($this->_SERVER['HTTPS']!='off'); return ($protocol?'https':'http') . '://' . $this->getHeader('Host') . $this->getUri(); } /** * Returns everything after the ? from the current url * * @return string */ public function getQueryString() { return isset($this->_SERVER['QUERY_STRING'])?$this->_SERVER['QUERY_STRING']:''; } /** * Returns the HTTP request body body * * This method returns a readable stream resource. * If the asString parameter is set to true, a string is sent instead. * * @param bool $asString * @return resource */ public function getBody($asString = false) { if (is_null($this->body)) { if (!is_null(self::$defaultInputStream)) { $this->body = self::$defaultInputStream; } else { $this->body = fopen('php://input','r'); self::$defaultInputStream = $this->body; } } if ($asString) { $body = stream_get_contents($this->body); return $body; } else { return $this->body; } } /** * Sets the contents of the HTTP request body * * This method can either accept a string, or a readable stream resource. * * If the setAsDefaultInputStream is set to true, it means for this run of the * script the supplied body will be used instead of php://input. * * @param mixed $body * @param bool $setAsDefaultInputStream * @return void */ public function setBody($body,$setAsDefaultInputStream = false) { if(is_resource($body)) { $this->body = $body; } else { $stream = fopen('php://temp','r+'); fputs($stream,$body); rewind($stream); // String is assumed $this->body = $stream; } if ($setAsDefaultInputStream) { self::$defaultInputStream = $this->body; } } /** * Returns PHP's _POST variable. * * The reason this is in a method is so it can be subclassed and * overridden. * * @return array */ public function getPostVars() { return $this->_POST; } /** * Returns a specific item from the _SERVER array. * * Do not rely on this feature, it is for internal use only. * * @param string $field * @return string */ public function getRawServerValue($field) { return isset($this->_SERVER[$field])?$this->_SERVER[$field]:null; } /** * Returns the HTTP version specified within the request. * * @return string */ public function getHTTPVersion() { $protocol = $this->getRawServerValue('SERVER_PROTOCOL'); if ($protocol==='HTTP/1.0') { return '1.0'; } else { return '1.1'; } } } sabre-dav-1.8.12/lib/Sabre/HTTP/Response.php000066400000000000000000000120441246001162500203350ustar00rootroot00000000000000 'Continue', 101 => 'Switching Protocols', 102 => 'Processing', 200 => 'OK', 201 => 'Created', 202 => 'Accepted', 203 => 'Non-Authorative Information', 204 => 'No Content', 205 => 'Reset Content', 206 => 'Partial Content', 207 => 'Multi-Status', // RFC 4918 208 => 'Already Reported', // RFC 5842 226 => 'IM Used', // RFC 3229 300 => 'Multiple Choices', 301 => 'Moved Permanently', 302 => 'Found', 303 => 'See Other', 304 => 'Not Modified', 305 => 'Use Proxy', 306 => 'Reserved', 307 => 'Temporary Redirect', 400 => 'Bad request', 401 => 'Unauthorized', 402 => 'Payment Required', 403 => 'Forbidden', 404 => 'Not Found', 405 => 'Method Not Allowed', 406 => 'Not Acceptable', 407 => 'Proxy Authentication Required', 408 => 'Request Timeout', 409 => 'Conflict', 410 => 'Gone', 411 => 'Length Required', 412 => 'Precondition failed', 413 => 'Request Entity Too Large', 414 => 'Request-URI Too Long', 415 => 'Unsupported Media Type', 416 => 'Requested Range Not Satisfiable', 417 => 'Expectation Failed', 418 => 'I\'m a teapot', // RFC 2324 422 => 'Unprocessable Entity', // RFC 4918 423 => 'Locked', // RFC 4918 424 => 'Failed Dependency', // RFC 4918 426 => 'Upgrade required', 428 => 'Precondition required', // draft-nottingham-http-new-status 429 => 'Too Many Requests', // draft-nottingham-http-new-status 431 => 'Request Header Fields Too Large', // draft-nottingham-http-new-status 500 => 'Internal Server Error', 501 => 'Not Implemented', 502 => 'Bad Gateway', 503 => 'Service Unavailable', 504 => 'Gateway Timeout', 505 => 'HTTP Version not supported', 506 => 'Variant Also Negotiates', 507 => 'Insufficient Storage', // RFC 4918 508 => 'Loop Detected', // RFC 5842 509 => 'Bandwidth Limit Exceeded', // non-standard 510 => 'Not extended', 511 => 'Network Authentication Required', // draft-nottingham-http-new-status ); return 'HTTP/' . $httpVersion . ' ' . $code . ' ' . $msg[$code]; } // @codeCoverageIgnoreStart // We cannot reasonably test header() related methods. /** * Sends an HTTP status header to the client. * * @param int $code HTTP status code * @return bool */ public function sendStatus($code) { if (!headers_sent()) return header($this->getStatusMessage($code, $this->defaultHttpVersion)); else return false; } /** * Sets an HTTP header for the response * * @param string $name * @param string $value * @param bool $replace * @return bool */ public function setHeader($name, $value, $replace = true) { $value = str_replace(array("\r","\n"),array('\r','\n'),$value); if (!headers_sent()) return header($name . ': ' . $value, $replace); else return false; } // @codeCoverageIgnoreEnd /** * Sets a bunch of HTTP Headers * * headersnames are specified as keys, value in the array value * * @param array $headers * @return void */ public function setHeaders(array $headers) { foreach($headers as $key=>$value) $this->setHeader($key, $value); } /** * Sends the entire response body * * This method can accept either an open filestream, or a string. * * @param mixed $body * @return void */ public function sendBody($body) { if (is_resource($body)) { file_put_contents('php://output', $body); } else { // We assume a string echo $body; } } } sabre-dav-1.8.12/lib/Sabre/HTTP/Util.php000066400000000000000000000053411246001162500174560ustar00rootroot00000000000000= 0) return new \DateTime('@' . $realDate, new \DateTimeZone('UTC')); } /** * Transforms a DateTime object to HTTP's most common date format. * * We're serializing it as the RFC 1123 date, which, for HTTP must be * specified as GMT. * * @param \DateTime $dateTime * @return string */ static function toHTTPDate(\DateTime $dateTime) { // We need to clone it, as we don't want to affect the existing // DateTime. $dateTime = clone $dateTime; $dateTime->setTimeZone(new \DateTimeZone('GMT')); return $dateTime->format('D, d M Y H:i:s \G\M\T'); } } sabre-dav-1.8.12/lib/Sabre/HTTP/Version.php000066400000000000000000000007041246001162500201640ustar00rootroot00000000000000pdo); $this->assertTrue($backend instanceof PDO); } /** * @depends testConstruct */ function testGetCalendarsForUserNoCalendars() { $backend = new PDO($this->pdo); $calendars = $backend->getCalendarsForUser('principals/user2'); $this->assertEquals(array(),$calendars); } /** * @depends testConstruct */ function testCreateCalendarAndFetch() { $backend = new PDO($this->pdo); $returnedId = $backend->createCalendar('principals/user2','somerandomid',array( '{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set' => new CalDAV\Property\SupportedCalendarComponentSet(array('VEVENT')), '{DAV:}displayname' => 'Hello!', '{urn:ietf:params:xml:ns:caldav}schedule-calendar-transp' => new CalDAV\Property\ScheduleCalendarTransp('transparent'), )); $calendars = $backend->getCalendarsForUser('principals/user2'); $elementCheck = array( 'id' => $returnedId, 'uri' => 'somerandomid', '{DAV:}displayname' => 'Hello!', '{urn:ietf:params:xml:ns:caldav}calendar-description' => '', '{urn:ietf:params:xml:ns:caldav}schedule-calendar-transp' => new CalDAV\Property\ScheduleCalendarTransp('transparent'), ); $this->assertInternalType('array',$calendars); $this->assertEquals(1,count($calendars)); foreach($elementCheck as $name=>$value) { $this->assertArrayHasKey($name, $calendars[0]); $this->assertEquals($value,$calendars[0][$name]); } } /** * @depends testConstruct */ function testUpdateCalendarAndFetch() { $backend = new PDO($this->pdo); //Creating a new calendar $newId = $backend->createCalendar('principals/user2','somerandomid',array()); // Updating the calendar $result = $backend->updateCalendar($newId,array( '{DAV:}displayname' => 'myCalendar', '{urn:ietf:params:xml:ns:caldav}schedule-calendar-transp' => new CalDAV\Property\ScheduleCalendarTransp('transparent'), )); // Verifying the result of the update $this->assertEquals(true, $result); // Fetching all calendars from this user $calendars = $backend->getCalendarsForUser('principals/user2'); // Checking if all the information is still correct $elementCheck = array( 'id' => $newId, 'uri' => 'somerandomid', '{DAV:}displayname' => 'myCalendar', '{urn:ietf:params:xml:ns:caldav}calendar-description' => '', '{urn:ietf:params:xml:ns:caldav}calendar-timezone' => '', '{http://calendarserver.org/ns/}getctag' => '2', '{urn:ietf:params:xml:ns:caldav}schedule-calendar-transp' => new CalDAV\Property\ScheduleCalendarTransp('transparent'), ); $this->assertInternalType('array',$calendars); $this->assertEquals(1,count($calendars)); foreach($elementCheck as $name=>$value) { $this->assertArrayHasKey($name, $calendars[0]); $this->assertEquals($value,$calendars[0][$name]); } } /** * @depends testUpdateCalendarAndFetch */ function testUpdateCalendarUnknownProperty() { $backend = new PDO($this->pdo); //Creating a new calendar $newId = $backend->createCalendar('principals/user2','somerandomid',array()); // Updating the calendar $result = $backend->updateCalendar($newId,array( '{DAV:}displayname' => 'myCalendar', '{DAV:}yourmom' => 'wittycomment', )); // Verifying the result of the update $this->assertEquals(array( '403' => array('{DAV:}yourmom' => null), '424' => array('{DAV:}displayname' => null), ), $result); } /** * @depends testCreateCalendarAndFetch */ function testDeleteCalendar() { $backend = new PDO($this->pdo); $returnedId = $backend->createCalendar('principals/user2','somerandomid',array( '{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set' => new CalDAV\Property\SupportedCalendarComponentSet(array('VEVENT')), '{DAV:}displayname' => 'Hello!', )); $backend->deleteCalendar($returnedId); $calendars = $backend->getCalendarsForUser('principals/user2'); $this->assertEquals(array(),$calendars); } /** * @depends testCreateCalendarAndFetch * @expectedException \Sabre\DAV\Exception */ function testCreateCalendarIncorrectComponentSet() {; $backend = new PDO($this->pdo); //Creating a new calendar $newId = $backend->createCalendar('principals/user2','somerandomid',array( '{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set' => 'blabla', )); } function testCreateCalendarObject() { $backend = new PDO($this->pdo); $returnedId = $backend->createCalendar('principals/user2','somerandomid',array()); $object = "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART;VALUE=DATE:20120101\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"; $backend->createCalendarObject($returnedId, 'random-id', $object); $result = $this->pdo->query('SELECT etag, size, calendardata, firstoccurence, lastoccurence, componenttype FROM calendarobjects WHERE uri = "random-id"'); $this->assertEquals(array( 'etag' => md5($object), 'size' => strlen($object), 'calendardata' => $object, 'firstoccurence' => strtotime('20120101'), 'lastoccurence' => strtotime('20120101')+(3600*24), 'componenttype' => 'VEVENT', ), $result->fetch(\PDO::FETCH_ASSOC)); } /** * @expectedException Sabre\DAV\Exception\BadRequest * @depends testCreateCalendarObject */ function testCreateCalendarObjectNoComponent() { $backend = new PDO($this->pdo); $returnedId = $backend->createCalendar('principals/user2','somerandomid',array()); $object = "BEGIN:VCALENDAR\r\nBEGIN:VTIMEZONE\r\nEND:VTIMEZONE\r\nEND:VCALENDAR\r\n"; $backend->createCalendarObject($returnedId, 'random-id', $object); } /** * @depends testCreateCalendarObject */ function testCreateCalendarObjectDuration() { $backend = new PDO($this->pdo); $returnedId = $backend->createCalendar('principals/user2','somerandomid',array()); $object = "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART;VALUE=DATE:20120101\r\nDURATION:P2D\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"; $backend->createCalendarObject($returnedId, 'random-id', $object); $result = $this->pdo->query('SELECT etag, size, calendardata, firstoccurence, lastoccurence, componenttype FROM calendarobjects WHERE uri = "random-id"'); $this->assertEquals(array( 'etag' => md5($object), 'size' => strlen($object), 'calendardata' => $object, 'firstoccurence' => strtotime('20120101'), 'lastoccurence' => strtotime('20120101')+(3600*48), 'componenttype' => 'VEVENT', ), $result->fetch(\PDO::FETCH_ASSOC)); } /** * @depends testCreateCalendarObject */ function testCreateCalendarObjectNoDTEND() { $backend = new PDO($this->pdo); $returnedId = $backend->createCalendar('principals/user2','somerandomid',array()); $object = "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART;VALUE=DATE-TIME:20120101T100000Z\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"; $backend->createCalendarObject($returnedId, 'random-id', $object); $result = $this->pdo->query('SELECT etag, size, calendardata, firstoccurence, lastoccurence, componenttype FROM calendarobjects WHERE uri = "random-id"'); $this->assertEquals(array( 'etag' => md5($object), 'size' => strlen($object), 'calendardata' => $object, 'firstoccurence' => strtotime('2012-01-01 10:00:00'), 'lastoccurence' => strtotime('2012-01-01 10:00:00'), 'componenttype' => 'VEVENT', ), $result->fetch(\PDO::FETCH_ASSOC)); } /** * @depends testCreateCalendarObject */ function testCreateCalendarObjectInfiniteReccurence() { $backend = new PDO($this->pdo); $returnedId = $backend->createCalendar('principals/user2','somerandomid',array()); $object = "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART;VALUE=DATE-TIME:20120101T100000Z\r\nRRULE:FREQ=DAILY\r\nUID:foo\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"; $backend->createCalendarObject($returnedId, 'random-id', $object); $result = $this->pdo->query('SELECT etag, size, calendardata, firstoccurence, lastoccurence, componenttype FROM calendarobjects WHERE uri = "random-id"'); $this->assertEquals(array( 'etag' => md5($object), 'size' => strlen($object), 'calendardata' => $object, 'firstoccurence' => strtotime('2012-01-01 10:00:00'), 'lastoccurence' => strtotime(PDO::MAX_DATE), 'componenttype' => 'VEVENT', ), $result->fetch(\PDO::FETCH_ASSOC)); } /** * @depends testCreateCalendarObject */ function testCreateCalendarObjectEndingReccurence() { $backend = new PDO($this->pdo); $returnedId = $backend->createCalendar('principals/user2','somerandomid',array()); $object = "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART;VALUE=DATE-TIME:20120101T100000Z\r\nDTEND;VALUE=DATE-TIME:20120101T110000Z\r\nUID:foo\r\nRRULE:FREQ=DAILY;COUNT=1000\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"; $backend->createCalendarObject($returnedId, 'random-id', $object); $result = $this->pdo->query('SELECT etag, size, calendardata, firstoccurence, lastoccurence, componenttype FROM calendarobjects WHERE uri = "random-id"'); $this->assertEquals(array( 'etag' => md5($object), 'size' => strlen($object), 'calendardata' => $object, 'firstoccurence' => strtotime('2012-01-01 10:00:00'), 'lastoccurence' => strtotime('2012-01-01 11:00:00') + (3600 * 24 * 999), 'componenttype' => 'VEVENT', ), $result->fetch(\PDO::FETCH_ASSOC)); } /** * @depends testCreateCalendarObject */ function testCreateCalendarObjectTask() { $backend = new PDO($this->pdo); $returnedId = $backend->createCalendar('principals/user2','somerandomid',array()); $object = "BEGIN:VCALENDAR\r\nBEGIN:VTODO\r\nDUE;VALUE=DATE-TIME:20120101T100000Z\r\nEND:VTODO\r\nEND:VCALENDAR\r\n"; $backend->createCalendarObject($returnedId, 'random-id', $object); $result = $this->pdo->query('SELECT etag, size, calendardata, firstoccurence, lastoccurence, componenttype FROM calendarobjects WHERE uri = "random-id"'); $this->assertEquals(array( 'etag' => md5($object), 'size' => strlen($object), 'calendardata' => $object, 'firstoccurence' => null, 'lastoccurence' => null, 'componenttype' => 'VTODO', ), $result->fetch(\PDO::FETCH_ASSOC)); } /** * @depends testCreateCalendarObject */ function testGetCalendarObjects() { $backend = new PDO($this->pdo); $returnedId = $backend->createCalendar('principals/user2','somerandomid',array()); $object = "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART;VALUE=DATE:20120101\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"; $backend->createCalendarObject($returnedId, 'random-id', $object); $data = $backend->getCalendarObjects($returnedId,'random-id'); $this->assertEquals(1, count($data)); $data = $data[0]; $this->assertEquals($returnedId, $data['calendarid']); $this->assertEquals('random-id', $data['uri']); $this->assertEquals(strlen($object),$data['size']); } /** * @depends testCreateCalendarObject */ function testUpdateCalendarObject() { $backend = new PDO($this->pdo); $returnedId = $backend->createCalendar('principals/user2','somerandomid',array()); $object = "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART;VALUE=DATE:20120101\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"; $object2 = "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART;VALUE=DATE:20130101\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"; $backend->createCalendarObject($returnedId, 'random-id', $object); $backend->updateCalendarObject($returnedId, 'random-id', $object2); $data = $backend->getCalendarObject($returnedId,'random-id'); $this->assertEquals($object2, $data['calendardata']); $this->assertEquals($returnedId, $data['calendarid']); $this->assertEquals('random-id', $data['uri']); } /** * @depends testCreateCalendarObject */ function testDeleteCalendarObject() { $backend = new PDO($this->pdo); $returnedId = $backend->createCalendar('principals/user2','somerandomid',array()); $object = "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART;VALUE=DATE:20120101\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"; $backend->createCalendarObject($returnedId, 'random-id', $object); $backend->deleteCalendarObject($returnedId, 'random-id'); $data = $backend->getCalendarObject($returnedId,'random-id'); $this->assertNull($data); } function testCalendarQueryNoResult() { $abstract = new PDO($this->pdo); $filters = array( 'name' => 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VJOURNAL', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, ), ), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, ); $this->assertEquals(array( ), $abstract->calendarQuery(1, $filters)); } function testCalendarQueryTodo() { $backend = new PDO($this->pdo); $backend->createCalendarObject(1, "todo", "BEGIN:VCALENDAR\r\nBEGIN:VTODO\r\nEND:VTODO\r\nEND:VCALENDAR\r\n"); $backend->createCalendarObject(1, "event", "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART:20120101\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"); $filters = array( 'name' => 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VTODO', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, ), ), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, ); $this->assertEquals(array( "todo", ), $backend->calendarQuery(1, $filters)); } function testCalendarQueryTodoNotMatch() { $backend = new PDO($this->pdo); $backend->createCalendarObject(1, "todo", "BEGIN:VCALENDAR\r\nBEGIN:VTODO\r\nEND:VTODO\r\nEND:VCALENDAR\r\n"); $backend->createCalendarObject(1, "event", "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART:20120101\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"); $filters = array( 'name' => 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VTODO', 'comp-filters' => array(), 'prop-filters' => array( array( 'name' => 'summary', 'text-match' => null, 'time-range' => null, 'param-filters' => array(), 'is-not-defined' => false, ), ), 'is-not-defined' => false, 'time-range' => null, ), ), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, ); $this->assertEquals(array( ), $backend->calendarQuery(1, $filters)); } function testCalendarQueryNoFilter() { $backend = new PDO($this->pdo); $backend->createCalendarObject(1, "todo", "BEGIN:VCALENDAR\r\nBEGIN:VTODO\r\nEND:VTODO\r\nEND:VCALENDAR\r\n"); $backend->createCalendarObject(1, "event", "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART:20120101\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"); $filters = array( 'name' => 'VCALENDAR', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, ); $result = $backend->calendarQuery(1, $filters); $this->assertTrue(in_array('todo', $result)); $this->assertTrue(in_array('event', $result)); } function testCalendarQueryTimeRange() { $backend = new PDO($this->pdo); $backend->createCalendarObject(1, "todo", "BEGIN:VCALENDAR\r\nBEGIN:VTODO\r\nEND:VTODO\r\nEND:VCALENDAR\r\n"); $backend->createCalendarObject(1, "event", "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART;VALUE=DATE:20120101\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"); $backend->createCalendarObject(1, "event2", "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART;VALUE=DATE:20120103\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"); $filters = array( 'name' => 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => new \DateTime('20120103'), 'end' => new \DateTime('20120104'), ), ), ), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, ); $this->assertEquals(array( "event2", ), $backend->calendarQuery(1, $filters)); } function testCalendarQueryTimeRangeNoEnd() { $backend = new PDO($this->pdo); $backend->createCalendarObject(1, "todo", "BEGIN:VCALENDAR\r\nBEGIN:VTODO\r\nEND:VTODO\r\nEND:VCALENDAR\r\n"); $backend->createCalendarObject(1, "event", "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART:20120101\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"); $backend->createCalendarObject(1, "event2", "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nDTSTART:20120103\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"); $filters = array( 'name' => 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => new \DateTime('20120102'), 'end' => null, ), ), ), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, ); $this->assertEquals(array( "event2", ), $backend->calendarQuery(1, $filters)); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Backend/AbstractTest.php000066400000000000000000000047111246001162500233420ustar00rootroot00000000000000assertEquals(false, $abstract->updateCalendar('randomid', array('{DAV:}displayname' => 'anything'))); } function testCalendarQuery() { $abstract = new AbstractMock(); $filters = array( 'name' => 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, ), ), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, ); $this->assertEquals(array( 'event1.ics', ), $abstract->calendarQuery(1, $filters)); } } class AbstractMock extends AbstractBackend { function getCalendarsForUser($principalUri) { } function createCalendar($principalUri,$calendarUri,array $properties) { } function deleteCalendar($calendarId) { } function getCalendarObjects($calendarId) { return array( array( 'id' => 1, 'calendarid' => 1, 'uri' => 'event1.ics', ), array( 'id' => 2, 'calendarid' => 1, 'uri' => 'task1.ics', ), ); } function getCalendarObject($calendarId,$objectUri) { switch($objectUri) { case 'event1.ics' : return array( 'id' => 1, 'calendarid' => 1, 'uri' => 'event1.ics', 'calendardata' => "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n", ); case 'task1.ics' : return array( 'id' => 1, 'calendarid' => 1, 'uri' => 'event1.ics', 'calendardata' => "BEGIN:VCALENDAR\r\nBEGIN:VTODO\r\nEND:VTODO\r\nEND:VCALENDAR\r\n", ); } } function createCalendarObject($calendarId,$objectUri,$calendarData) { } function updateCalendarObject($calendarId,$objectUri,$calendarData) { } function deleteCalendarObject($calendarId,$objectUri) { } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Backend/Mock.php000066400000000000000000000275671246001162500216460ustar00rootroot00000000000000calendars = $calendars; $this->calendarData = $calendarData; $this->notifications = $notifications; } /** * Returns a list of calendars for a principal. * * Every project is an array with the following keys: * * id, a unique id that will be used by other functions to modify the * calendar. This can be the same as the uri or a database key. * * uri, which the basename of the uri with which the calendar is * accessed. * * principalUri. The owner of the calendar. Almost always the same as * principalUri passed to this method. * * Furthermore it can contain webdav properties in clark notation. A very * common one is '{DAV:}displayname'. * * @param string $principalUri * @return array */ function getCalendarsForUser($principalUri) { $r = array(); foreach($this->calendars as $row) { if ($row['principaluri'] == $principalUri) { $r[] = $row; } } return $r; } /** * Creates a new calendar for a principal. * * If the creation was a success, an id must be returned that can be used to reference * this calendar in other methods, such as updateCalendar. * * This function must return a server-wide unique id that can be used * later to reference the calendar. * * @param string $principalUri * @param string $calendarUri * @param array $properties * @return string|int */ function createCalendar($principalUri,$calendarUri,array $properties) { $id = DAV\UUIDUtil::getUUID(); $this->calendars[] = array_merge(array( 'id' => $id, 'principaluri' => $principalUri, 'uri' => $calendarUri, '{' . CalDAV\Plugin::NS_CALDAV . '}supported-calendar-component-set' => new CalDAV\Property\SupportedCalendarComponentSet(array('VEVENT','VTODO')), ), $properties); return $id; } /** * Updates properties on this node, * * The properties array uses the propertyName in clark-notation as key, * and the array value for the property value. In the case a property * should be deleted, the property value will be null. * * This method must be atomic. If one property cannot be changed, the * entire operation must fail. * * If the operation was successful, true can be returned. * If the operation failed, false can be returned. * * Deletion of a non-existent property is always successful. * * Lastly, it is optional to return detailed information about any * failures. In this case an array should be returned with the following * structure: * * array( * 403 => array( * '{DAV:}displayname' => null, * ), * 424 => array( * '{DAV:}owner' => null, * ) * ) * * In this example it was forbidden to update {DAV:}displayname. * (403 Forbidden), which in turn also caused {DAV:}owner to fail * (424 Failed Dependency) because the request needs to be atomic. * * @param string $calendarId * @param array $properties * @return bool|array */ public function updateCalendar($calendarId, array $properties) { return false; } /** * Delete a calendar and all it's objects * * @param string $calendarId * @return void */ public function deleteCalendar($calendarId) { foreach($this->calendars as $k=>$calendar) { if ($calendar['id'] === $calendarId) { unset($this->calendars[$k]); } } } /** * Returns all calendar objects within a calendar object. * * Every item contains an array with the following keys: * * id - unique identifier which will be used for subsequent updates * * calendardata - The iCalendar-compatible calendar data * * uri - a unique key which will be used to construct the uri. This can be any arbitrary string. * * lastmodified - a timestamp of the last modification time * * etag - An arbitrary string, surrounded by double-quotes. (e.g.: * ' "abcdef"') * * calendarid - The calendarid as it was passed to this function. * * Note that the etag is optional, but it's highly encouraged to return for * speed reasons. * * The calendardata is also optional. If it's not returned * 'getCalendarObject' will be called later, which *is* expected to return * calendardata. * * @param string $calendarId * @return array */ public function getCalendarObjects($calendarId) { if (!isset($this->calendarData[$calendarId])) return array(); $objects = $this->calendarData[$calendarId]; foreach($objects as $uri => &$object) { $object['calendarid'] = $calendarId; $object['uri'] = $uri; } return $objects; } /** * Returns information from a single calendar object, based on it's object * uri. * * The returned array must have the same keys as getCalendarObjects. The * 'calendardata' object is required here though, while it's not required * for getCalendarObjects. * * @param string $calendarId * @param string $objectUri * @return array */ function getCalendarObject($calendarId,$objectUri) { if (!isset($this->calendarData[$calendarId][$objectUri])) { throw new DAV\Exception\NotFound('Object could not be found'); } $object = $this->calendarData[$calendarId][$objectUri]; $object['calendarid'] = $calendarId; $object['uri'] = $objectUri; return $object; } /** * Creates a new calendar object. * * @param string $calendarId * @param string $objectUri * @param string $calendarData * @return void */ function createCalendarObject($calendarId,$objectUri,$calendarData) { $this->calendarData[$calendarId][$objectUri] = array( 'calendardata' => $calendarData, 'calendarid' => $calendarId, 'uri' => $objectUri, ); } /** * Updates an existing calendarobject, based on it's uri. * * @param string $calendarId * @param string $objectUri * @param string $calendarData * @return void */ function updateCalendarObject($calendarId,$objectUri,$calendarData) { $this->calendarData[$calendarId][$objectUri] = array( 'calendardata' => $calendarData, 'calendarid' => $calendarId, 'uri' => $objectUri, ); } /** * Deletes an existing calendar object. * * @param string $calendarId * @param string $objectUri * @return void */ function deleteCalendarObject($calendarId,$objectUri) { throw new Exception('Not implemented'); } /** * Returns a list of notifications for a given principal url. * * The returned array should only consist of implementations of * Sabre\CalDAV\Notifications\INotificationType. * * @param string $principalUri * @return array */ public function getNotificationsForPrincipal($principalUri) { if (isset($this->notifications[$principalUri])) { return $this->notifications[$principalUri]; } return array(); } /** * This deletes a specific notifcation. * * This may be called by a client once it deems a notification handled. * * @param string $principalUri * @param Sabre\CalDAV\Notifications\INotificationType $notification * @return void */ public function deleteNotification($principalUri, CalDAV\Notifications\INotificationType $notification) { foreach($this->notifications[$principalUri] as $key=>$value) { if ($notification === $value) { unset($this->notifications[$principalUri][$key]); } } } /** * Updates the list of shares. * * The first array is a list of people that are to be added to the * calendar. * * Every element in the add array has the following properties: * * href - A url. Usually a mailto: address * * commonName - Usually a first and last name, or false * * summary - A description of the share, can also be false * * readOnly - A boolean value * * Every element in the remove array is just the address string. * * Note that if the calendar is currently marked as 'not shared' by and * this method is called, the calendar should be 'upgraded' to a shared * calendar. * * @param mixed $calendarId * @param array $add * @param array $remove * @return void */ public function updateShares($calendarId, array $add, array $remove) { if (!isset($this->shares[$calendarId])) { $this->shares[$calendarId] = array(); } foreach($add as $val) { $val['status'] = CalDAV\SharingPlugin::STATUS_NORESPONSE; $this->shares[$calendarId][] = $val; } foreach($this->shares[$calendarId] as $k=>$share) { if (in_array($share['href'], $remove)) { unset($this->shares[$calendarId][$k]); } } // Re-numbering keys $this->shares[$calendarId] = array_values($this->shares[$calendarId]); } /** * Returns the list of people whom this calendar is shared with. * * Every element in this array should have the following properties: * * href - Often a mailto: address * * commonName - Optional, for example a first + last name * * status - See the Sabre\CalDAV\SharingPlugin::STATUS_ constants. * * readOnly - boolean * * summary - Optional, a description for the share * * @param mixed $calendarId * @return array */ public function getShares($calendarId) { if (!isset($this->shares[$calendarId])) { return array(); } return $this->shares[$calendarId]; } /** * This method is called when a user replied to a request to share. * * @param string href The sharee who is replying (often a mailto: address) * @param int status One of the SharingPlugin::STATUS_* constants * @param string $calendarUri The url to the calendar thats being shared * @param string $inReplyTo The unique id this message is a response to * @param string $summary A description of the reply * @return void */ public function shareReply($href, $status, $calendarUri, $inReplyTo, $summary = null) { // This operation basically doesn't do anything yet if ($status === CalDAV\SharingPlugin::STATUS_ACCEPTED) { return 'calendars/blabla/calendar'; } } /** * Publishes a calendar * * @param mixed $calendarId * @param bool $value * @return void */ public function setPublishStatus($calendarId, $value) { foreach($this->calendars as $k=>$cal) { if ($cal['id'] === $calendarId) { if (!$value) { unset($cal['{http://calendarserver.org/ns/}publish-url']); } else { $cal['{http://calendarserver.org/ns/}publish-url'] = 'http://example.org/public/ ' . $calendarId . '.ics'; } return; } } throw new DAV\Exception('Calendar with id "' . $calendarId . '" not found'); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Backend/PDOMySQLTest.php000066400000000000000000000016771246001162500231170ustar00rootroot00000000000000markTestSkipped('MySQL driver is not available, or not properly configured'); $pdo = \Sabre\TestUtil::getMySQLDB(); if (!$pdo) $this->markTestSkipped('Could not connect to mysql database'); $pdo->query('DROP TABLE IF EXISTS calendarobjects, calendars'); $queries = explode( ';', file_get_contents(__DIR__ . '/../../../../examples/sql/mysql.calendars.sql') ); foreach($queries as $query) { $query = trim($query," \r\n\t"); if ($query) $pdo->exec($query); } $this->pdo = $pdo; } function teardown() { $this->pdo = null; } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Backend/PDOSqliteTest.php000066400000000000000000000007031246001162500234000ustar00rootroot00000000000000markTestSkipped('SQLite driver is not available'); $this->pdo = CalDAV\TestUtil::getSQLiteDB(); } function teardown() { $this->pdo = null; unlink(SABRE_TEMPDIR . '/testdb.sqlite'); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/CalendarObjectTest.php000066400000000000000000000211121246001162500231020ustar00rootroot00000000000000markTestSkipped('SQLite driver is not available'); $this->backend = TestUtil::getBackend(); $calendars = $this->backend->getCalendarsForUser('principals/user1'); $this->assertEquals(2,count($calendars)); $this->calendar = new Calendar($this->backend, $calendars[0]); } function teardown() { unset($this->calendar); unset($this->backend); } function testSetup() { $children = $this->calendar->getChildren(); $this->assertTrue($children[0] instanceof CalendarObject); $this->assertInternalType('string',$children[0]->getName()); $this->assertInternalType('string',$children[0]->get()); $this->assertInternalType('string',$children[0]->getETag()); $this->assertEquals('text/calendar; charset=utf-8', $children[0]->getContentType()); } /** * @expectedException InvalidArgumentException */ function testInvalidArg1() { $obj = new CalendarObject( new Backend\Mock(array(),array()), array(), array() ); } /** * @expectedException InvalidArgumentException */ function testInvalidArg2() { $obj = new CalendarObject( new Backend\Mock(array(),array()), array(), array('calendarid' => '1') ); } /** * @depends testSetup */ function testPut() { $children = $this->calendar->getChildren(); $this->assertTrue($children[0] instanceof CalendarObject); $newData = TestUtil::getTestCalendarData(); $children[0]->put($newData); $this->assertEquals($newData, $children[0]->get()); } /** * @depends testSetup */ function testPutStream() { $children = $this->calendar->getChildren(); $this->assertTrue($children[0] instanceof CalendarObject); $newData = TestUtil::getTestCalendarData(); $stream = fopen('php://temp','r+'); fwrite($stream, $newData); rewind($stream); $children[0]->put($stream); $this->assertEquals($newData, $children[0]->get()); } /** * @depends testSetup */ function testDelete() { $children = $this->calendar->getChildren(); $this->assertTrue($children[0] instanceof CalendarObject); $obj = $children[0]; $obj->delete(); $children2 = $this->calendar->getChildren(); $this->assertEquals(count($children)-1, count($children2)); } /** * @depends testSetup */ function testGetLastModified() { $children = $this->calendar->getChildren(); $this->assertTrue($children[0] instanceof CalendarObject); $obj = $children[0]; $lastMod = $obj->getLastModified(); $this->assertTrue(is_int($lastMod) || ctype_digit($lastMod)); } /** * @depends testSetup */ function testGetSize() { $children = $this->calendar->getChildren(); $this->assertTrue($children[0] instanceof CalendarObject); $obj = $children[0]; $size = $obj->getSize(); $this->assertInternalType('int', $size); } function testGetOwner() { $children = $this->calendar->getChildren(); $this->assertTrue($children[0] instanceof CalendarObject); $obj = $children[0]; $this->assertEquals('principals/user1', $obj->getOwner()); } function testGetGroup() { $children = $this->calendar->getChildren(); $this->assertTrue($children[0] instanceof CalendarObject); $obj = $children[0]; $this->assertNull($obj->getGroup()); } function testGetACL() { $expected = array( array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user1', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => 'principals/user1', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user1/calendar-proxy-write', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => 'principals/user1/calendar-proxy-write', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user1/calendar-proxy-read', 'protected' => true, ), ); $children = $this->calendar->getChildren(); $this->assertTrue($children[0] instanceof CalendarObject); $obj = $children[0]; $this->assertEquals($expected, $obj->getACL()); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testSetACL() { $children = $this->calendar->getChildren(); $this->assertTrue($children[0] instanceof CalendarObject); $obj = $children[0]; $obj->setACL(array()); } function testGet() { $children = $this->calendar->getChildren(); $this->assertTrue($children[0] instanceof CalendarObject); $obj = $children[0]; $expected = "BEGIN:VCALENDAR VERSION:2.0 PRODID:-//Apple Inc.//iCal 4.0.1//EN CALSCALE:GREGORIAN BEGIN:VTIMEZONE TZID:Asia/Seoul BEGIN:DAYLIGHT TZOFFSETFROM:+0900 RRULE:FREQ=YEARLY;UNTIL=19880507T150000Z;BYMONTH=5;BYDAY=2SU DTSTART:19870510T000000 TZNAME:GMT+09:00 TZOFFSETTO:+1000 END:DAYLIGHT BEGIN:STANDARD TZOFFSETFROM:+1000 DTSTART:19881009T000000 TZNAME:GMT+09:00 TZOFFSETTO:+0900 END:STANDARD END:VTIMEZONE BEGIN:VEVENT CREATED:20100225T154229Z UID:39A6B5ED-DD51-4AFE-A683-C35EE3749627 TRANSP:TRANSPARENT SUMMARY:Something here DTSTAMP:20100228T130202Z DTSTART;TZID=Asia/Seoul:20100223T060000 DTEND;TZID=Asia/Seoul:20100223T070000 ATTENDEE;PARTSTAT=NEEDS-ACTION:mailto:lisa@example.com SEQUENCE:2 END:VEVENT END:VCALENDAR"; $this->assertEquals($expected, $obj->get()); } function testGetRefetch() { $backend = new Backend\Mock(array(), array( 1 => array( 'foo' => array( 'calendardata' => 'foo', 'uri' => 'foo' ), ) )); $obj = new CalendarObject($backend, array(), array('calendarid' => 1, 'uri' => 'foo')); $this->assertEquals('foo', $obj->get()); } function testGetEtag1() { $objectInfo = array( 'calendardata' => 'foo', 'uri' => 'foo', 'etag' => 'bar', 'calendarid' => 1 ); $backend = new Backend\Mock(array(), array()); $obj = new CalendarObject($backend, array(), $objectInfo); $this->assertEquals('bar', $obj->getETag()); } function testGetEtag2() { $objectInfo = array( 'calendardata' => 'foo', 'uri' => 'foo', 'calendarid' => 1 ); $backend = new Backend\Mock(array(), array()); $obj = new CalendarObject($backend, array(), $objectInfo); $this->assertEquals('"' . md5('foo') . '"', $obj->getETag()); } function testGetSupportedPrivilegesSet() { $objectInfo = array( 'calendardata' => 'foo', 'uri' => 'foo', 'calendarid' => 1 ); $backend = new Backend\Mock(array(), array()); $obj = new CalendarObject($backend, array(), $objectInfo); $this->assertNull($obj->getSupportedPrivilegeSet()); } function testGetSize1() { $objectInfo = array( 'calendardata' => 'foo', 'uri' => 'foo', 'calendarid' => 1 ); $backend = new Backend\Mock(array(), array()); $obj = new CalendarObject($backend, array(), $objectInfo); $this->assertEquals(3, $obj->getSize()); } function testGetSize2() { $objectInfo = array( 'uri' => 'foo', 'calendarid' => 1, 'size' => 4, ); $backend = new Backend\Mock(array(), array()); $obj = new CalendarObject($backend, array(), $objectInfo); $this->assertEquals(4, $obj->getSize()); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/CalendarQueryParserTest.php000066400000000000000000000400741246001162500241660ustar00rootroot00000000000000 ' . implode("\n", $xml) . ' '; $dom = DAV\XMLUtil::loadDOMDocument($xml); $q = new CalendarQueryParser($dom); $q->parse(); return $q->filters; } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testNoFilter() { $xml = array(); $this->parse($xml); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testTwoCompFilter() { $xml = array( '', ' ', ' ', '' ); $this->parse($xml); } function testBasicFilter() { $xml = array( '', ' ', '' ); $result = $this->parse($xml); $expected = array( 'name' => 'VCALENDAR', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => false ); $this->assertEquals( $expected, $result ); } function testCompIsNotDefined() { $xml = array( '', ' ', ' ', ' ', ' ', ' ', '' ); $result = $this->parse($xml); $expected = array( 'name' => 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => true, 'time-range' => false ), ), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => false ); $this->assertEquals( $expected, $result ); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testCompTimeRangeOnVCALENDAR() { $xml = array( '', ' ', ' ', ' ', '' ); $result = $this->parse($xml); } function testCompTimeRange() { $xml = array( '', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', '' ); $result = $this->parse($xml); $expected = array( 'name' => 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => new \DateTime('2011-01-01 00:00:00', new \DateTimeZone('GMT')), 'end' => new \DateTime('2011-12-31 23:59:59', new \DateTimeZone('GMT')), ), ), array( 'name' => 'VTODO', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => new \DateTime('2011-01-01 00:00:00', new \DateTimeZone('GMT')), 'end' => null, ), ), array( 'name' => 'VJOURNAL', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => null, 'end' => new \DateTime('2011-12-31 23:59:59', new \DateTimeZone('GMT')), ), ), ), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => false ); $this->assertEquals( $expected, $result ); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testCompTimeRangeBadRange() { $xml = array( '', ' ', ' ', ' ', ' ', ' ', '' ); $this->parse($xml); } function testProp() { $xml = array( '', ' ', ' ', ' ', ' vacation', ' ', ' ', ' ', '' ); $result = $this->parse($xml); $expected = array( 'name' => 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VEVENT', 'is-not-defined' => false, 'comp-filters' => array(), 'prop-filters' => array( array( 'name' => 'SUMMARY', 'is-not-defined' => false, 'param-filters' => array(), 'text-match' => array( 'negate-condition' => false, 'collation' => 'i;ascii-casemap', 'value' => 'vacation', ), 'time-range' => null, ), ), 'time-range' => null, ), ), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => false ); $this->assertEquals( $expected, $result ); } function testComplex() { $xml = array( '', ' ', ' ', ' ', ' vacation', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' DATE', ' ', ' ', ' ', ' ', '' ); $result = $this->parse($xml); $expected = array( 'name' => 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VEVENT', 'is-not-defined' => false, 'comp-filters' => array(), 'prop-filters' => array( array( 'name' => 'SUMMARY', 'is-not-defined' => false, 'param-filters' => array(), 'text-match' => array( 'negate-condition' => false, 'collation' => 'i;unicode-casemap', 'value' => 'vacation', ), 'time-range' => null, ), array( 'name' => 'DTSTAMP', 'is-not-defined' => false, 'param-filters' => array(), 'text-match' => null, 'time-range' => array( 'start' => new \DateTime('2011-07-04 00:00:00', new \DateTimeZone('GMT')), 'end' => null, ), ), array( 'name' => 'ORGANIZER', 'is-not-defined' => true, 'param-filters' => array(), 'text-match' => null, 'time-range' => null, ), array( 'name' => 'DTSTART', 'is-not-defined' => false, 'param-filters' => array( array( 'name' => 'VALUE', 'is-not-defined' => false, 'text-match' => array( 'negate-condition' => true, 'value' => 'DATE', 'collation' => 'i;ascii-casemap', ), ), ), 'text-match' => null, 'time-range' => null, ), ), 'time-range' => null, ), ), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => false ); $this->assertEquals( $expected, $result ); } function testOther1() { // This body was exactly sent to us from the sabredav mailing list. Checking if this parses correctly. $body = << BLA; $dom = DAV\XMLUtil::loadDOMDocument($body); $q = new CalendarQueryParser($dom); $q->parse(); $this->assertEquals(array( '{urn:ietf:params:xml:ns:caldav}calendar-data', '{DAV:}getetag', ), $q->requestedProperties); $expectedFilters = array( 'name' => 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'time-range' => array( 'start' => new \DateTime('2009-01-01 00:00:00', new \DateTimeZone('UTC')), 'end' => new \DateTime('2012-12-02 00:00:00', new \DateTimeZone('UTC')), ), 'is-not-defined' => false, ), ), 'prop-filters' => array(), 'time-range' => null, 'is-not-defined' => false, ); $this->assertEquals($expectedFilters, $q->filters); } function testExpand() { $xml = array( '', ' ', ' ', ' ', '', '', ' ', '' ); $xml = ' ' . implode("\n", $xml) . ' '; $dom = DAV\XMLUtil::loadDOMDocument($xml); $q = new CalendarQueryParser($dom); $q->parse(); $expected = array( 'name' => 'VCALENDAR', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => false ); $this->assertEquals( $expected, $q->filters ); $this->assertEquals(array( '{urn:ietf:params:xml:ns:caldav}calendar-data', ), $q->requestedProperties); $this->assertEquals( array( 'start' => new \DateTime('2011-01-01 00:00:00', new \DateTimeZone('UTC')), 'end' => new \DateTime('2012-01-01 00:00:00', new \DateTimeZone('UTC')), ), $q->expand ); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testExpandNoStart() { $xml = array( '', ' ', ' ', ' ', '', '', ' ', '' ); $xml = ' ' . implode("\n", $xml) . ' '; $dom = DAV\XMLUtil::loadDOMDocument($xml); $q = new CalendarQueryParser($dom); $q->parse(); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testExpandNoEnd() { $xml = array( '', ' ', ' ', ' ', '', '', ' ', '' ); $xml = ' ' . implode("\n", $xml) . ' '; $dom = DAV\XMLUtil::loadDOMDocument($xml); $q = new CalendarQueryParser($dom); $q->parse(); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testExpandBadTimes() { $xml = array( '', ' ', ' ', ' ', '', '', ' ', '' ); $xml = ' ' . implode("\n", $xml) . ' '; $dom = DAV\XMLUtil::loadDOMDocument($xml); $q = new CalendarQueryParser($dom); $q->parse(); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/CalendarQueryVAlarmTest.php000066400000000000000000000074611246001162500241170ustar00rootroot00000000000000createComponent('VEVENT'); $vevent->RRULE = 'FREQ=MONTHLY'; $vevent->DTSTART = '20120101T120000Z'; $vevent->UID = 'bla'; $valarm = $vcalendar->createComponent('VALARM'); $valarm->TRIGGER = '-P15D'; $vevent->add($valarm); $vcalendar->add($vevent); $filter = array( 'name' => 'VCALENDAR', 'is-not-defined' => false, 'time-range' => null, 'prop-filters' => array(), 'comp-filters' => array( array( 'name' => 'VEVENT', 'is-not-defined' => false, 'time-range' => null, 'prop-filters' => array(), 'comp-filters' => array( array( 'name' => 'VALARM', 'is-not-defined' => false, 'prop-filters' => array(), 'comp-filters' => array(), 'time-range' => array( 'start' => new \DateTime('2012-05-10'), 'end' => new \DateTime('2012-05-20'), ), ), ), ), ), ); $validator = new CalendarQueryValidator(); $this->assertTrue($validator->validate($vcalendar, $filter)); $vcalendar = new VObject\Component\VCalendar(); // A limited recurrence rule, should return false $vevent = $vcalendar->createComponent('VEVENT'); $vevent->RRULE = 'FREQ=MONTHLY;COUNT=1'; $vevent->DTSTART = '20120101T120000Z'; $vevent->UID = 'bla'; $valarm = $vcalendar->createComponent('VALARM'); $valarm->TRIGGER = '-P15D'; $vevent->add($valarm); $vcalendar->add($vevent); $this->assertFalse($validator->validate($vcalendar, $filter)); } function testAlarmWayBefore() { $vcalendar = new VObject\Component\VCalendar(); $vevent = $vcalendar->createComponent('VEVENT'); $vevent->DTSTART = '20120101T120000Z'; $vevent->UID = 'bla'; $valarm = $vcalendar->createComponent('VALARM'); $valarm->TRIGGER = '-P2W1D'; $vevent->add($valarm); $vcalendar->add($vevent); $filter = array( 'name' => 'VCALENDAR', 'is-not-defined' => false, 'time-range' => null, 'prop-filters' => array(), 'comp-filters' => array( array( 'name' => 'VEVENT', 'is-not-defined' => false, 'time-range' => null, 'prop-filters' => array(), 'comp-filters' => array( array( 'name' => 'VALARM', 'is-not-defined' => false, 'prop-filters' => array(), 'comp-filters' => array(), 'time-range' => array( 'start' => new \DateTime('2011-12-10'), 'end' => new \DateTime('2011-12-20'), ), ), ), ), ), ); $validator = new CalendarQueryValidator(); $this->assertTrue($validator->validate($vcalendar, $filter)); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/CalendarQueryValidatorTest.php000066400000000000000000000516521246001162500246630ustar00rootroot00000000000000 'VCALENDAR', 'comp-filters' => array($filters), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, ); $vObject = VObject\Reader::read($icalObject); switch($outcome) { case 0 : $this->assertFalse($validator->validate($vObject, $filters)); break; case 1 : $this->assertTrue($validator->validate($vObject, $filters)); break; case -1 : try { $validator->validate($vObject, $filters); } catch (DAV\Exception $e) { // Success } catch (\LogicException $e) { // Success } break; } } function provider() { $blob1 = << 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, ); $filter2 = $filter1; $filter2['name'] = 'VTODO'; $filter3 = $filter1; $filter3['is-not-defined'] = true; $filter4 = $filter1; $filter4['name'] = 'VTODO'; $filter4['is-not-defined'] = true; $filter5 = $filter1; $filter5['comp-filters'] = array( array( 'name' => 'VALARM', 'is-not-defined' => false, 'comp-filters' => array(), 'prop-filters' => array(), 'time-range' => null, ), ); $filter6 = $filter1; $filter6['prop-filters'] = array( array( 'name' => 'SUMMARY', 'is-not-defined' => false, 'param-filters' => array(), 'time-range' => null, 'text-match' => null, ), ); $filter7 = $filter6; $filter7['prop-filters'][0]['name'] = 'DESCRIPTION'; $filter8 = $filter6; $filter8['prop-filters'][0]['is-not-defined'] = true; $filter9 = $filter7; $filter9['prop-filters'][0]['is-not-defined'] = true; $filter10 = $filter5; $filter10['prop-filters'] = $filter6['prop-filters']; // Param filters $filter11 = $filter1; $filter11['prop-filters'] = array( array( 'name' => 'DTSTART', 'is-not-defined' => false, 'param-filters' => array( array( 'name' => 'VALUE', 'is-not-defined' => false, 'text-match' => null, ), ), 'time-range' => null, 'text-match' => null, ), ); $filter12 = $filter11; $filter12['prop-filters'][0]['param-filters'][0]['name'] = 'TZID'; $filter13 = $filter11; $filter13['prop-filters'][0]['param-filters'][0]['is-not-defined'] = true; $filter14 = $filter12; $filter14['prop-filters'][0]['param-filters'][0]['is-not-defined'] = true; // Param text filter $filter15 = $filter11; $filter15['prop-filters'][0]['param-filters'][0]['text-match'] = array( 'collation' => 'i;ascii-casemap', 'value' => 'dAtE', 'negate-condition' => false, ); $filter16 = $filter15; $filter16['prop-filters'][0]['param-filters'][0]['text-match']['collation'] = 'i;octet'; $filter17 = $filter15; $filter17['prop-filters'][0]['param-filters'][0]['text-match']['negate-condition'] = true; $filter18 = $filter15; $filter18['prop-filters'][0]['param-filters'][0]['text-match']['negate-condition'] = true; $filter18['prop-filters'][0]['param-filters'][0]['text-match']['collation'] = 'i;octet'; // prop + text $filter19 = $filter5; $filter19['comp-filters'][0]['prop-filters'] = array( array( 'name' => 'action', 'is-not-defined' => false, 'time-range' => null, 'param-filters' => array(), 'text-match' => array( 'collation' => 'i;ascii-casemap', 'value' => 'display', 'negate-condition' => false, ), ), ); // Time range $filter20 = array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => new \DateTime('2011-01-01 10:00:00', new \DateTimeZone('GMT')), 'end' => new \DateTime('2011-01-01 13:00:00', new \DateTimeZone('GMT')), ), ); // Time range, no end date $filter21 = $filter20; $filter21['time-range']['end'] = null; // Time range, no start date $filter22 = $filter20; $filter22['time-range']['start'] = null; // Time range, other dates $filter23 = $filter20; $filter23['time-range'] = array( 'start' => new \DateTime('2011-02-01 10:00:00', new \DateTimeZone('GMT')), 'end' => new \DateTime('2011-02-01 13:00:00', new \DateTimeZone('GMT')), ); // Time range $filter24 = array( 'name' => 'VTODO', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => new \DateTime('2011-01-01 12:45:00', new \DateTimeZone('GMT')), 'end' => new \DateTime('2011-01-01 13:15:00', new \DateTimeZone('GMT')), ), ); // Time range, other dates (1 month in the future) $filter25 = $filter24; $filter25['time-range'] = array( 'start' => new \DateTime('2011-02-01 10:00:00', new \DateTimeZone('GMT')), 'end' => new \DateTime('2011-02-01 13:00:00', new \DateTimeZone('GMT')), ); $filter26 = $filter24; $filter26['time-range'] = array( 'start' => new \DateTime('2011-01-01 11:45:00', new \DateTimeZone('GMT')), 'end' => new \DateTime('2011-01-01 12:15:00', new \DateTimeZone('GMT')), ); // Time range for VJOURNAL $filter27 = array( 'name' => 'VJOURNAL', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => new \DateTime('2011-01-01 12:45:00', new \DateTimeZone('GMT')), 'end' => new \DateTime('2011-01-01 13:15:00', new \DateTimeZone('GMT')), ), ); $filter28 = $filter27; $filter28['time-range'] = array( 'start' => new \DateTime('2011-01-01 11:45:00', new \DateTimeZone('GMT')), 'end' => new \DateTime('2011-01-01 12:15:00', new \DateTimeZone('GMT')), ); // Time range for VFREEBUSY $filter29 = array( 'name' => 'VFREEBUSY', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => new \DateTime('2011-01-01 12:45:00', new \DateTimeZone('GMT')), 'end' => new \DateTime('2011-01-01 13:15:00', new \DateTimeZone('GMT')), ), ); // Time range filter on property $filter30 = array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array( array( 'name' => 'DTSTART', 'is-not-defined' => false, 'param-filters' => array(), 'time-range' => array( 'start' => new \DateTime('2011-01-01 10:00:00', new \DateTimeZone('GMT')), 'end' => new \DateTime('2011-01-01 13:00:00', new \DateTimeZone('GMT')), ), 'text-match' => null, ), ), 'is-not-defined' => false, 'time-range' => null, ); // Time range for alarm $filter31 = array( 'name' => 'VEVENT', 'prop-filters' => array(), 'comp-filters' => array( array( 'name' => 'VALARM', 'is-not-defined' => false, 'comp-filters' => array(), 'prop-filters' => array(), 'time-range' => array( 'start' => new \DateTime('2011-01-01 10:45:00', new \DateTimeZone('GMT')), 'end' => new \DateTime('2011-01-01 11:15:00', new \DateTimeZone('GMT')), ), 'text-match' => null, ), ), 'is-not-defined' => false, 'time-range' => null, ); $filter32 = $filter31; $filter32['comp-filters'][0]['time-range'] = array( 'start' => new \DateTime('2011-01-01 11:45:00', new \DateTimeZone('GMT')), 'end' => new \DateTime('2011-01-01 12:15:00', new \DateTimeZone('GMT')), ); $filter33 = $filter31; $filter33['name'] = 'VTODO'; $filter34 = $filter32; $filter34['name'] = 'VTODO'; $filter35 = $filter31; $filter35['name'] = 'VJOURNAL'; $filter36 = $filter32; $filter36['name'] = 'VJOURNAL'; // Time range filter on non-datetime property $filter37 = array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array( array( 'name' => 'SUMMARY', 'is-not-defined' => false, 'param-filters' => array(), 'time-range' => array( 'start' => new \DateTime('2011-01-01 10:00:00', new \DateTimeZone('GMT')), 'end' => new \DateTime('2011-01-01 13:00:00', new \DateTimeZone('GMT')), ), 'text-match' => null, ), ), 'is-not-defined' => false, 'time-range' => null, ); $filter38 = array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => new \DateTime('2012-07-01 00:00:00', new \DateTimeZone('UTC')), 'end' => new \DateTime('2012-08-01 00:00:00', new \DateTimeZone('UTC')), ) ); $filter39 = array( 'name' => 'VEVENT', 'comp-filters' => array( array( 'name' => 'VALARM', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => new \DateTime('2012-09-01 00:00:00', new \DateTimeZone('UTC')), 'end' => new \DateTime('2012-10-01 00:00:00', new \DateTimeZone('UTC')), ) ), ), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, ); return array( // Component check array($blob1, $filter1, 1), array($blob1, $filter2, 0), array($blob1, $filter3, 0), array($blob1, $filter4, 1), // Subcomponent check (4) array($blob1, $filter5, 0), array($blob2, $filter5, 1), // Property checki (6) array($blob1, $filter6, 1), array($blob1, $filter7, 0), array($blob1, $filter8, 0), array($blob1, $filter9, 1), // Subcomponent + property (10) array($blob2, $filter10, 1), // Param filter (11) array($blob3, $filter11, 1), array($blob3, $filter12, 0), array($blob3, $filter13, 0), array($blob3, $filter14, 1), // Param + text (15) array($blob3, $filter15, 1), array($blob3, $filter16, 0), array($blob3, $filter17, 0), array($blob3, $filter18, 1), // Prop + text (19) array($blob2, $filter19, 1), // Incorrect object (vcard) (20) array($blob4, $filter1, -1), // Time-range for event (21) array($blob5, $filter20, 1), array($blob6, $filter20, 1), array($blob7, $filter20, 1), array($blob8, $filter20, 1), array($blob5, $filter21, 1), array($blob5, $filter22, 1), array($blob5, $filter23, 0), array($blob6, $filter23, 0), array($blob7, $filter23, 0), array($blob8, $filter23, 0), // Time-range for todo (31) array($blob9, $filter24, 1), array($blob9, $filter25, 0), array($blob9, $filter26, 1), array($blob10, $filter24, 1), array($blob10, $filter25, 0), array($blob10, $filter26, 1), array($blob11, $filter24, 0), array($blob11, $filter25, 0), array($blob11, $filter26, 1), array($blob12, $filter24, 1), array($blob12, $filter25, 0), array($blob12, $filter26, 0), array($blob13, $filter24, 1), array($blob13, $filter25, 0), array($blob13, $filter26, 1), array($blob14, $filter24, 1), array($blob14, $filter25, 0), array($blob14, $filter26, 0), array($blob15, $filter24, 1), array($blob15, $filter25, 1), array($blob15, $filter26, 1), array($blob16, $filter24, 1), array($blob16, $filter25, 1), array($blob16, $filter26, 1), // Time-range for journals (55) array($blob17, $filter27, 0), array($blob17, $filter28, 0), array($blob18, $filter27, 0), array($blob18, $filter28, 1), array($blob19, $filter27, 1), array($blob19, $filter28, 1), // Time-range for free-busy (61) array($blob20, $filter29, -1), // Time-range on property (62) array($blob5, $filter30, 1), array($blob3, $filter37, -1), array($blob3, $filter30, 0), // Time-range on alarm in vevent (65) array($blob21, $filter31, 1), array($blob21, $filter32, 0), array($blob22, $filter31, 1), array($blob22, $filter32, 0), array($blob23, $filter31, 1), array($blob23, $filter32, 0), array($blob24, $filter31, 1), array($blob24, $filter32, 0), array($blob25, $filter31, 1), array($blob25, $filter32, 0), array($blob26, $filter31, 1), array($blob26, $filter32, 0), // Time-range on alarm for vtodo (77) array($blob27, $filter33, 1), array($blob27, $filter34, 0), // Time-range on alarm for vjournal (79) array($blob28, $filter35, -1), array($blob28, $filter36, -1), // Time-range on alarm with duration (81) array($blob29, $filter31, 1), array($blob29, $filter32, 0), array($blob30, $filter31, 0), array($blob30, $filter32, 0), // Time-range with RRULE (85) array($blob31, $filter20, 1), array($blob32, $filter20, 0), // Bug reported on mailing list, related to all-day events (87) //array($blob33, $filter38, 1), // Event in timerange, but filtered alarm is in the far future (88). array($blob34, $filter39, 0), ); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/CalendarTest.php000066400000000000000000000143321246001162500217610ustar00rootroot00000000000000markTestSkipped('SQLite driver is not available'); $this->backend = TestUtil::getBackend(); $this->calendars = $this->backend->getCalendarsForUser('principals/user1'); $this->assertEquals(2, count($this->calendars)); $this->calendar = new Calendar($this->backend, $this->calendars[0]); } function teardown() { unset($this->backend); } function testSimple() { $this->assertEquals($this->calendars[0]['uri'], $this->calendar->getName()); } /** * @depends testSimple */ function testUpdateProperties() { $result = $this->calendar->updateProperties(array( '{DAV:}displayname' => 'NewName', )); $this->assertEquals(true, $result); $calendars2 = $this->backend->getCalendarsForUser('principals/user1'); $this->assertEquals('NewName',$calendars2[0]['{DAV:}displayname']); } /** * @depends testSimple */ function testGetProperties() { $question = array( '{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set', '{urn:ietf:params:xml:ns:caldav}supported-calendar-data', '{urn:ietf:params:xml:ns:caldav}supported-collation-set', '{DAV:}owner', ); $result = $this->calendar->getProperties($question); foreach($question as $q) $this->assertArrayHasKey($q,$result); $this->assertEquals(array('VEVENT','VTODO'), $result['{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set']->getValue()); $this->assertTrue($result['{urn:ietf:params:xml:ns:caldav}supported-collation-set'] instanceof Property\SupportedCollationSet); $this->assertTrue($result['{DAV:}owner'] instanceof DAVACL\Property\Principal); $this->assertEquals('principals/user1', $result['{DAV:}owner']->getHref()); } /** * @expectedException Sabre\DAV\Exception\NotFound * @depends testSimple */ function testGetChildNotFound() { $this->calendar->getChild('randomname'); } /** * @depends testSimple */ function testGetChildren() { $children = $this->calendar->getChildren(); $this->assertEquals(1,count($children)); $this->assertTrue($children[0] instanceof CalendarObject); } /** * @depends testGetChildren */ function testChildExists() { $this->assertFalse($this->calendar->childExists('foo')); $children = $this->calendar->getChildren(); $this->assertTrue($this->calendar->childExists($children[0]->getName())); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testCreateDirectory() { $this->calendar->createDirectory('hello'); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testSetName() { $this->calendar->setName('hello'); } function testGetLastModified() { $this->assertNull($this->calendar->getLastModified()); } function testCreateFile() { $file = fopen('php://memory','r+'); fwrite($file,TestUtil::getTestCalendarData()); rewind($file); $this->calendar->createFile('hello',$file); $file = $this->calendar->getChild('hello'); $this->assertTrue($file instanceof CalendarObject); } function testCreateFileNoSupportedComponents() { $file = fopen('php://memory','r+'); fwrite($file,TestUtil::getTestCalendarData()); rewind($file); $calendar = new Calendar($this->backend, $this->calendars[1]); $calendar->createFile('hello',$file); $file = $calendar->getChild('hello'); $this->assertTrue($file instanceof CalendarObject); } function testDelete() { $this->calendar->delete(); $calendars = $this->backend->getCalendarsForUser('principals/user1'); $this->assertEquals(1, count($calendars)); } function testGetOwner() { $this->assertEquals('principals/user1',$this->calendar->getOwner()); } function testGetGroup() { $this->assertNull($this->calendar->getGroup()); } function testGetACL() { $expected = array( array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user1', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => 'principals/user1', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user1/calendar-proxy-write', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => 'principals/user1/calendar-proxy-write', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user1/calendar-proxy-read', 'protected' => true, ), array( 'privilege' => '{' . Plugin::NS_CALDAV . '}read-free-busy', 'principal' => '{DAV:}authenticated', 'protected' => true, ), ); $this->assertEquals($expected, $this->calendar->getACL()); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testSetACL() { $this->calendar->setACL(array()); } function testGetSupportedPrivilegesSet() { $result = $this->calendar->getSupportedPrivilegeSet(); $this->assertEquals( '{' . Plugin::NS_CALDAV . '}read-free-busy', $result['aggregates'][0]['aggregates'][2]['privilege'] ); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/ExpandEventsDTSTARTandDTENDTest.php000066400000000000000000000066111246001162500251650ustar00rootroot00000000000000 1, 'name' => 'Calendar', 'principaluri' => 'principals/user1', 'uri' => 'calendar1', ) ); protected $caldavCalendarObjects = array( 1 => array( 'event.ics' => array( 'calendardata' => 'BEGIN:VCALENDAR VERSION:2.0 BEGIN:VEVENT UID:foobar DTEND;TZID=Europe/Berlin:20120207T191500 RRULE:FREQ=DAILY;INTERVAL=1;COUNT=3 SUMMARY:RecurringEvents 3 times DTSTART;TZID=Europe/Berlin:20120207T181500 END:VEVENT BEGIN:VEVENT CREATED:20120207T111900Z UID:foobar DTEND;TZID=Europe/Berlin:20120208T191500 SUMMARY:RecurringEvents 3 times OVERWRITTEN DTSTART;TZID=Europe/Berlin:20120208T181500 RECURRENCE-ID;TZID=Europe/Berlin:20120208T181500 END:VEVENT END:VCALENDAR ', ), ), ); function testExpand() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_CONTENT_TYPE' => 'application/xml', 'REQUEST_URI' => '/calendars/user1/calendar1', 'HTTP_DEPTH' => '1', )); $request->setBody(' '); $response = $this->request($request); // Everts super awesome xml parser. $body = substr( $response->body, $start = strpos($response->body, 'BEGIN:VCALENDAR'), strpos($response->body, 'END:VCALENDAR') - $start + 13 ); $body = str_replace(' ','',$body); $vObject = VObject\Reader::read($body); // check if DTSTARTs and DTENDs are correct foreach ($vObject->VEVENT as $vevent) { /** @var $vevent Sabre\VObject\Component\VEvent */ foreach ($vevent->children as $child) { /** @var $child Sabre\VObject\Property */ if ($child->name == 'DTSTART') { // DTSTART has to be one of three valid values $this->assertContains($child->getValue(), array('20120207T171500Z', '20120208T171500Z', '20120209T171500Z'), 'DTSTART is not a valid value: '.$child->getValue()); } elseif ($child->name == 'DTEND') { // DTEND has to be one of three valid values $this->assertContains($child->getValue(), array('20120207T181500Z', '20120208T181500Z', '20120209T181500Z'), 'DTEND is not a valid value: '.$child->getValue()); } } } } } sabre-dav-1.8.12/tests/Sabre/CalDAV/ExpandEventsDTSTARTandDTENDbyDayTest.php000066400000000000000000000063241246001162500261570ustar00rootroot00000000000000 1, 'name' => 'Calendar', 'principaluri' => 'principals/user1', 'uri' => 'calendar1', ) ); protected $caldavCalendarObjects = array( 1 => array( 'event.ics' => array( 'calendardata' => 'BEGIN:VCALENDAR VERSION:2.0 BEGIN:VEVENT UID:foobar DTEND;TZID=Europe/Berlin:20120207T191500 RRULE:FREQ=WEEKLY;INTERVAL=1;BYDAY=TU,TH SUMMARY:RecurringEvents on tuesday and thursday DTSTART;TZID=Europe/Berlin:20120207T181500 END:VEVENT END:VCALENDAR ', ), ), ); function testExpandRecurringByDayEvent() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_CONTENT_TYPE' => 'application/xml', 'REQUEST_URI' => '/calendars/user1/calendar1', 'HTTP_DEPTH' => '1', )); $request->setBody(' '); $response = $this->request($request); // Everts super awesome xml parser. $body = substr( $response->body, $start = strpos($response->body, 'BEGIN:VCALENDAR'), strpos($response->body, 'END:VCALENDAR') - $start + 13 ); $body = str_replace(' ','',$body); $vObject = VObject\Reader::read($body); $this->assertEquals(2, count($vObject->VEVENT)); // check if DTSTARTs and DTENDs are correct foreach ($vObject->VEVENT as $vevent) { /** @var $vevent Sabre\VObject\Component\VEvent */ foreach ($vevent->children as $child) { /** @var $child Sabre\VObject\Property */ if ($child->name == 'DTSTART') { // DTSTART has to be one of two valid values $this->assertContains($child->getValue(), array('20120214T171500Z', '20120216T171500Z'), 'DTSTART is not a valid value: '.$child->getValue()); } elseif ($child->name == 'DTEND') { // DTEND has to be one of two valid values $this->assertContains($child->getValue(), array('20120214T181500Z', '20120216T181500Z'), 'DTEND is not a valid value: '.$child->getValue()); } } } } } sabre-dav-1.8.12/tests/Sabre/CalDAV/ExpandEventsDoubleEventsTest.php000066400000000000000000000054731246001162500252020ustar00rootroot00000000000000 1, 'name' => 'Calendar', 'principaluri' => 'principals/user1', 'uri' => 'calendar1', ) ); protected $caldavCalendarObjects = array( 1 => array( 'event.ics' => array( 'calendardata' => 'BEGIN:VCALENDAR VERSION:2.0 BEGIN:VEVENT UID:foobar DTEND;TZID=Europe/Berlin:20120207T191500 RRULE:FREQ=DAILY;INTERVAL=1;COUNT=3 SUMMARY:RecurringEvents 3 times DTSTART;TZID=Europe/Berlin:20120207T181500 END:VEVENT BEGIN:VEVENT CREATED:20120207T111900Z UID:foobar DTEND;TZID=Europe/Berlin:20120208T191500 SUMMARY:RecurringEvents 3 times OVERWRITTEN DTSTART;TZID=Europe/Berlin:20120208T181500 RECURRENCE-ID;TZID=Europe/Berlin:20120208T181500 END:VEVENT END:VCALENDAR ', ), ), ); function testExpand() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_CONTENT_TYPE' => 'application/xml', 'REQUEST_URI' => '/calendars/user1/calendar1', 'HTTP_DEPTH' => '1', )); $request->setBody(' '); $response = $this->request($request); // Everts super awesome xml parser. $body = substr( $response->body, $start = strpos($response->body, 'BEGIN:VCALENDAR'), strpos($response->body, 'END:VCALENDAR') - $start + 13 ); $body = str_replace(' ','',$body); $vObject = VObject\Reader::read($body); // We only expect 3 events $this->assertEquals(3, count($vObject->VEVENT),'We got 6 events instead of 3. Output: ' . $body); // TZID should be gone $this->assertFalse(isset($vObject->VEVENT->DTSTART['TZID'])); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/FreeBusyReportTest.php000066400000000000000000000100421246001162500231620ustar00rootroot00000000000000 array( 'obj1' => array( 'calendarid' => 1, 'uri' => 'event1.ics', 'calendardata' => $obj1, ), 'obj2' => array( 'calendarid' => 1, 'uri' => 'event2.ics', 'calendardata' => $obj2 ) ), ); $caldavBackend = new Backend\Mock(array(), $calendarData); $calendar = new Calendar($caldavBackend, array( 'id' => 1, 'uri' => 'calendar', 'principaluri' => 'principals/user1', )); $this->server = new DAV\Server(array($calendar)); $request = new HTTP\Request(array( 'REQUEST_URI' => '/calendar', )); $this->server->httpRequest = $request; $this->server->httpResponse = new HTTP\ResponseMock(); $this->plugin = new Plugin(); $this->server->addPlugin($this->plugin); $this->server->addPlugin(new DAVACL\Plugin()); } function testFreeBusyReport() { $reportXML = << XML; $dom = DAV\XMLUtil::loadDOMDocument($reportXML); $this->plugin->report('{urn:ietf:params:xml:ns:caldav}free-busy-query', $dom); $this->assertEquals('HTTP/1.1 200 OK', $this->server->httpResponse->status); $this->assertEquals('text/calendar', $this->server->httpResponse->headers['Content-Type']); $this->assertTrue(strpos($this->server->httpResponse->body,'BEGIN:VFREEBUSY')!==false); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testFreeBusyReportNoTimeRange() { $reportXML = << XML; $dom = DAV\XMLUtil::loadDOMDocument($reportXML); $this->plugin->report('{urn:ietf:params:xml:ns:caldav}free-busy-query', $dom); } /** * @expectedException Sabre\DAV\Exception\NotImplemented */ function testFreeBusyReportWrongNode() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/', )); $this->server->httpRequest = $request; $reportXML = << XML; $dom = DAV\XMLUtil::loadDOMDocument($reportXML); $this->plugin->report('{urn:ietf:params:xml:ns:caldav}free-busy-query', $dom); } /** * @expectedException Sabre\DAV\Exception */ function testFreeBusyReportNoACLPlugin() { $this->server = new DAV\Server(); $this->plugin = new Plugin(); $this->server->addPlugin($this->plugin); $reportXML = << XML; $dom = DAV\XMLUtil::loadDOMDocument($reportXML); $this->plugin->report('{urn:ietf:params:xml:ns:caldav}free-busy-query', $dom); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/FreeBusyRequestTest.php000066400000000000000000000154451246001162500233530ustar00rootroot00000000000000 'principals/user2', 'id' => 1, 'uri' => 'calendar1', ), ); $calendarobjects = array( 1 => array( '1.ics' => array( 'uri' => '1.ics', 'calendardata' => 'BEGIN:VCALENDAR BEGIN:VEVENT DTSTART:20110101T130000 DURATION:PT1H END:VEVENT END:VCALENDAR', 'calendarid' => 1, )) ); $principalBackend = new DAVACL\PrincipalBackend\Mock(); $caldavBackend = new Backend\Mock($calendars, $calendarobjects); $tree = array( new DAVACL\PrincipalCollection($principalBackend), new CalendarRootNode($principalBackend, $caldavBackend), ); $this->request = new HTTP\Request(array( 'CONTENT_TYPE' => 'text/calendar', )); $this->response = new HTTP\ResponseMock(); $this->server = new DAV\Server($tree); $this->server->httpRequest = $this->request; $this->server->httpResponse = $this->response; $this->aclPlugin = new DAVACL\Plugin(); $this->server->addPlugin($this->aclPlugin); $authBackend = new DAV\Auth\Backend\Mock(); $authBackend->setCurrentUser('user1'); $this->authPlugin = new DAV\Auth\Plugin($authBackend,'SabreDAV'); $this->server->addPlugin($this->authPlugin); $this->plugin = new Plugin(); $this->server->addPlugin($this->plugin); } function testWrongMethod() { $this->assertNull( $this->plugin->unknownMethod('PUT','calendars/user1/outbox') ); } function testWrongContentType() { $this->server->httpRequest = new HTTP\Request(array( 'CONTENT_TYPE' => 'text/plain', )); $this->assertNull( $this->plugin->unknownMethod('POST','calendars/user1/outbox') ); } function testNotFound() { $this->assertNull( $this->plugin->unknownMethod('POST','calendars/user1/blabla') ); } function testNotOutbox() { $this->assertNull( $this->plugin->unknownMethod('POST','calendars/user1/inbox') ); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testNoItipMethod() { $body = <<request->setBody($body); $this->plugin->unknownMethod('POST','calendars/user1/outbox'); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testNoVFreeBusy() { $body = <<request->setBody($body); $this->plugin->unknownMethod('POST','calendars/user1/outbox'); } /** * @expectedException Sabre\DAV\Exception\Forbidden */ function testIncorrectOrganizer() { $body = <<request->setBody($body); $this->plugin->unknownMethod('POST','calendars/user1/outbox'); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testNoAttendees() { $body = <<request->setBody($body); $this->plugin->unknownMethod('POST','calendars/user1/outbox'); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testNoDTStart() { $body = <<request->setBody($body); $this->plugin->unknownMethod('POST','calendars/user1/outbox'); } function testSucceed() { $body = <<aclPlugin->adminPrincipals[] = 'principals/user1'; $this->request->setBody($body); $this->assertFalse($this->plugin->unknownMethod('POST','calendars/user1/outbox')); $this->assertEquals('HTTP/1.1 200 OK' , $this->response->status); $this->assertEquals(array( 'Content-Type' => 'application/xml', ), $this->response->headers); $strings = array( 'mailto:user2.sabredav@sabredav.org', 'mailto:user3.sabredav@sabredav.org', '2.0;Success', '3.7;Could not find principal', 'FREEBUSY;FBTYPE=BUSY:20110101T130000Z/20110101T140000Z', ); foreach($strings as $string) { $this->assertTrue( strpos($this->response->body, $string)!==false, 'The response body did not contain: ' . $string .'Full response: ' . $this->response->body ); } } function testNoPrivilege() { $body = <<request->setBody($body); $this->assertFalse($this->plugin->unknownMethod('POST','calendars/user1/outbox')); $this->assertEquals('HTTP/1.1 200 OK' , $this->response->status); $this->assertEquals(array( 'Content-Type' => 'application/xml', ), $this->response->headers); $strings = array( 'mailto:user2.sabredav@sabredav.org', '3.7;No calendar-home-set property found', ); foreach($strings as $string) { $this->assertTrue( strpos($this->response->body, $string)!==false, 'The response body did not contain: ' . $string .'Full response: ' . $this->response->body ); } } } sabre-dav-1.8.12/tests/Sabre/CalDAV/GetEventsByTimerangeTest.php000066400000000000000000000051631246001162500243050ustar00rootroot00000000000000 1, 'name' => 'Calendar', 'principaluri' => 'principals/user1', 'uri' => 'calendar1', ) ); protected $caldavCalendarObjects = array( 1 => array( 'event.ics' => array( 'calendardata' => 'BEGIN:VCALENDAR VERSION:2.0 BEGIN:VEVENT CREATED:20120313T142342Z UID:171EBEFC-C951-499D-B234-7BA7D677B45D DTEND;TZID=Europe/Berlin:20120227T000000 TRANSP:OPAQUE SUMMARY:Monday 0h DTSTART;TZID=Europe/Berlin:20120227T000000 DTSTAMP:20120313T142416Z SEQUENCE:4 END:VEVENT END:VCALENDAR ', ), ), ); function testQueryTimerange() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_CONTENT_TYPE' => 'application/xml', 'REQUEST_URI' => '/calendars/user1/calendar1', 'HTTP_DEPTH' => '1', )); $request->setBody(' '); $response = $this->request($request); if (strpos($response->body, 'BEGIN:VCALENDAR') === false) { $this->fail('Got no events instead of 1. Output: '.$response->body); } // Everts super awesome xml parser. $body = substr( $response->body, $start = strpos($response->body, 'BEGIN:VCALENDAR'), strpos($response->body, 'END:VCALENDAR') - $start + 13 ); $body = str_replace(' ','',$body); $vObject = VObject\Reader::read($body); // We expect 1 event $this->assertEquals(1, count($vObject->VEVENT), 'We got 0 events instead of 1. Output: ' . $body); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/ICSExportPluginTest.php000066400000000000000000000145071246001162500232530ustar00rootroot00000000000000addPlugin($p); } function testBeforeMethod() { if (!SABRE_HASSQLITE) $this->markTestSkipped('SQLite driver is not available'); $cbackend = TestUtil::getBackend(); $props = array( 'uri'=>'UUID-123467', 'principaluri' => 'admin', 'id' => 1, ); $tree = array( new Calendar($cbackend,$props), ); $p = new ICSExportPlugin(); $s = new DAV\Server($tree); $s->addPlugin($p); $s->addPlugin(new Plugin()); $h = new HTTP\Request(array( 'QUERY_STRING' => 'export', )); $s->httpRequest = $h; $s->httpResponse = new HTTP\ResponseMock(); $this->assertFalse($p->beforeMethod('GET','UUID-123467?export')); $this->assertEquals('HTTP/1.1 200 OK',$s->httpResponse->status); $this->assertEquals(array( 'Content-Type' => 'text/calendar', ), $s->httpResponse->headers); $obj = VObject\Reader::read($s->httpResponse->body); $this->assertEquals(5,count($obj->children())); $this->assertEquals(1,count($obj->VERSION)); $this->assertEquals(1,count($obj->CALSCALE)); $this->assertEquals(1,count($obj->PRODID)); $this->assertTrue(strpos((string)$obj->PRODID, DAV\Version::VERSION)!==false); $this->assertEquals(1,count($obj->VTIMEZONE)); $this->assertEquals(1,count($obj->VEVENT)); } function testBeforeMethodNoVersion() { if (!SABRE_HASSQLITE) $this->markTestSkipped('SQLite driver is not available'); $cbackend = TestUtil::getBackend(); $props = array( 'uri'=>'UUID-123467', 'principaluri' => 'admin', 'id' => 1, ); $tree = array( new Calendar($cbackend,$props), ); $p = new ICSExportPlugin(); $s = new DAV\Server($tree); $s->addPlugin($p); $s->addPlugin(new Plugin()); $h = new HTTP\Request(array( 'QUERY_STRING' => 'export', )); $s->httpRequest = $h; $s->httpResponse = new HTTP\ResponseMock(); DAV\Server::$exposeVersion = false; $this->assertFalse($p->beforeMethod('GET','UUID-123467?export')); DAV\Server::$exposeVersion = true; $this->assertEquals('HTTP/1.1 200 OK',$s->httpResponse->status); $this->assertEquals(array( 'Content-Type' => 'text/calendar', ), $s->httpResponse->headers); $obj = VObject\Reader::read($s->httpResponse->body); $this->assertEquals(5,count($obj->children())); $this->assertEquals(1,count($obj->VERSION)); $this->assertEquals(1,count($obj->CALSCALE)); $this->assertEquals(1,count($obj->PRODID)); $this->assertFalse(strpos((string)$obj->PRODID, DAV\Version::VERSION)!==false); $this->assertEquals(1,count($obj->VTIMEZONE)); $this->assertEquals(1,count($obj->VEVENT)); } function testBeforeMethodNoGET() { $p = new ICSExportPlugin(); $s = new DAV\Server(); $s->addPlugin($p); $this->assertNull($p->beforeMethod('POST','UUID-123467?export')); } function testBeforeMethodNoExport() { $p = new ICSExportPlugin(); $s = new DAV\Server(); $s->addPlugin($p); $this->assertNull($p->beforeMethod('GET','UUID-123467')); } /** * @expectedException Sabre\DAVACL\Exception\NeedPrivileges */ function testACLIntegrationBlocked() { if (!SABRE_HASSQLITE) $this->markTestSkipped('SQLite driver is not available'); $cbackend = TestUtil::getBackend(); $props = array( 'uri'=>'UUID-123467', 'principaluri' => 'admin', 'id' => 1, ); $tree = array( new Calendar($cbackend,$props), ); $p = new ICSExportPlugin(); $s = new DAV\Server($tree); $s->addPlugin($p); $s->addPlugin(new Plugin()); $s->addPlugin(new DAVACL\Plugin()); $h = new HTTP\Request(array( 'QUERY_STRING' => 'export', )); $s->httpRequest = $h; $s->httpResponse = new HTTP\ResponseMock(); $p->beforeMethod('GET','UUID-123467?export'); } function testACLIntegrationNotBlocked() { if (!SABRE_HASSQLITE) $this->markTestSkipped('SQLite driver is not available'); $cbackend = TestUtil::getBackend(); $pbackend = new DAVACL\PrincipalBackend\Mock(); $props = array( 'uri'=>'UUID-123467', 'principaluri' => 'admin', 'id' => 1, ); $tree = array( new Calendar($cbackend,$props), new DAVACL\PrincipalCollection($pbackend), ); $p = new ICSExportPlugin(); $s = new DAV\Server($tree); $s->addPlugin($p); $s->addPlugin(new Plugin()); $s->addPlugin(new DAVACL\Plugin()); $s->addPlugin(new DAV\Auth\Plugin(new DAV\Auth\Backend\Mock(),'SabreDAV')); // Forcing login $s->getPlugin('acl')->adminPrincipals = array('principals/admin'); $h = new HTTP\Request(array( 'QUERY_STRING' => 'export', 'REQUEST_URI' => '/UUID-123467', 'REQUEST_METHOD' => 'GET', )); $s->httpRequest = $h; $s->httpResponse = new HTTP\ResponseMock(); $s->exec(); $this->assertEquals('HTTP/1.1 200 OK',$s->httpResponse->status,'Invalid status received. Response body: '. $s->httpResponse->body); $this->assertEquals(array( 'Content-Type' => 'text/calendar', ), $s->httpResponse->headers); $obj = VObject\Reader::read($s->httpResponse->body); $this->assertEquals(5,count($obj->children())); $this->assertEquals(1,count($obj->VERSION)); $this->assertEquals(1,count($obj->CALSCALE)); $this->assertEquals(1,count($obj->PRODID)); $this->assertEquals(1,count($obj->VTIMEZONE)); $this->assertEquals(1,count($obj->VEVENT)); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Issue166Test.php000066400000000000000000000030201246001162500215650ustar00rootroot00000000000000 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => new \DateTime('2011-12-01'), 'end' => new \DateTime('2012-02-01'), ), ), ), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => null, ); $input = VObject\Reader::read($input); $this->assertTrue($validator->validate($input,$filters)); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Issue172Test.php000066400000000000000000000077571246001162500216070ustar00rootroot00000000000000 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => new \DateTime('2012-01-18 21:00:00 GMT-08:00'), 'end' => new \DateTime('2012-01-18 21:00:00 GMT-08:00'), ), ), ), 'prop-filters' => array(), ); $input = VObject\Reader::read($input); $this->assertTrue($validator->validate($input,$filters)); } // Pacific Standard Time, translates to America/Los_Angeles (GMT-8 in January) function testOutlookTimezoneName() { $input = << 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => new \DateTime('2012-01-13 10:30:00 GMT-08:00'), 'end' => new \DateTime('2012-01-13 10:30:00 GMT-08:00'), ), ), ), 'prop-filters' => array(), ); $input = VObject\Reader::read($input); $this->assertTrue($validator->validate($input,$filters)); } // X-LIC-LOCATION, translates to America/Los_Angeles (GMT-8 in January) function testLibICalLocationName() { $input = << 'VCALENDAR', 'comp-filters' => array( array( 'name' => 'VEVENT', 'comp-filters' => array(), 'prop-filters' => array(), 'is-not-defined' => false, 'time-range' => array( 'start' => new \DateTime('2012-01-13 10:30:00 GMT-08:00'), 'end' => new \DateTime('2012-01-13 10:30:00 GMT-08:00'), ), ), ), 'prop-filters' => array(), ); $input = VObject\Reader::read($input); $this->assertTrue($validator->validate($input,$filters)); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Issue203Test.php000066400000000000000000000077251246001162500215750ustar00rootroot00000000000000 1, 'name' => 'Calendar', 'principaluri' => 'principals/user1', 'uri' => 'calendar1', ) ); protected $caldavCalendarObjects = array( 1 => array( 'event.ics' => array( 'calendardata' => 'BEGIN:VCALENDAR VERSION:2.0 BEGIN:VEVENT UID:20120330T155305CEST-6585fBUVgV DTSTAMP:20120330T135305Z DTSTART;TZID=Europe/Berlin:20120326T155200 DTEND;TZID=Europe/Berlin:20120326T165200 RRULE:FREQ=DAILY;COUNT=2;INTERVAL=1 SUMMARY:original summary TRANSP:OPAQUE END:VEVENT BEGIN:VEVENT UID:20120330T155305CEST-6585fBUVgV DTSTAMP:20120330T135352Z DESCRIPTION: DTSTART;TZID=Europe/Berlin:20120328T155200 DTEND;TZID=Europe/Berlin:20120328T165200 RECURRENCE-ID;TZID=Europe/Berlin:20120327T155200 SEQUENCE:1 SUMMARY:overwritten summary TRANSP:OPAQUE END:VEVENT END:VCALENDAR ', ), ), ); function testIssue203() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_CONTENT_TYPE' => 'application/xml', 'REQUEST_URI' => '/calendars/user1/calendar1', 'HTTP_DEPTH' => '1', )); $request->setBody(' '); $response = $this->request($request); // Everts super awesome xml parser. $body = substr( $response->body, $start = strpos($response->body, 'BEGIN:VCALENDAR'), strpos($response->body, 'END:VCALENDAR') - $start + 13 ); $body = str_replace(' ','',$body); $vObject = VObject\Reader::read($body); $this->assertEquals(2, count($vObject->VEVENT)); $expectedEvents = array( array( 'DTSTART' => '20120326T135200Z', 'DTEND' => '20120326T145200Z', 'SUMMARY' => 'original summary', ), array( 'DTSTART' => '20120328T135200Z', 'DTEND' => '20120328T145200Z', 'SUMMARY' => 'overwritten summary', 'RECURRENCE-ID' => '20120327T135200Z', ) ); // try to match agains $expectedEvents array foreach ($expectedEvents as $expectedEvent) { $matching = false; foreach ($vObject->VEVENT as $vevent) { /** @var $vevent Sabre\VObject\Component\VEvent */ foreach ($vevent->children as $child) { /** @var $child Sabre\VObject\Property */ if (isset($expectedEvent[$child->name])) { if ($expectedEvent[$child->name] != $child->getValue()) { continue 2; } } } $matching = true; break; } $this->assertTrue($matching, 'Did not find the following event in the response: '.var_export($expectedEvent, true)); } } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Issue205Test.php000066400000000000000000000053451246001162500215730ustar00rootroot00000000000000 1, 'name' => 'Calendar', 'principaluri' => 'principals/user1', 'uri' => 'calendar1', ) ); protected $caldavCalendarObjects = array( 1 => array( 'event.ics' => array( 'calendardata' => 'BEGIN:VCALENDAR VERSION:2.0 BEGIN:VEVENT UID:20120330T155305CEST-6585fBUVgV DTSTAMP:20120330T135305Z DTSTART;TZID=Europe/Berlin:20120326T155200 DTEND;TZID=Europe/Berlin:20120326T165200 SUMMARY:original summary TRANSP:OPAQUE BEGIN:VALARM ACTION:AUDIO ATTACH;VALUE=URI:Basso TRIGGER:PT0S END:VALARM END:VEVENT END:VCALENDAR ', ), ), ); function testIssue205() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_CONTENT_TYPE' => 'application/xml', 'REQUEST_URI' => '/calendars/user1/calendar1', 'HTTP_DEPTH' => '1', )); $request->setBody(' '); $response = $this->request($request); $this->assertFalse(strpos($response->body, 'Exception'), 'Exception occurred: ' . $response->body); $this->assertFalse(strpos($response->body, 'Unknown or bad format'), 'DateTime unknown format Exception: ' . $response->body); // Everts super awesome xml parser. $body = substr( $response->body, $start = strpos($response->body, 'BEGIN:VCALENDAR'), strpos($response->body, 'END:VCALENDAR') - $start + 13 ); $body = str_replace(' ','',$body); $vObject = VObject\Reader::read($body); $this->assertEquals(1, count($vObject->VEVENT)); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Issue211Test.php000066400000000000000000000045221246001162500215640ustar00rootroot00000000000000 1, 'name' => 'Calendar', 'principaluri' => 'principals/user1', 'uri' => 'calendar1', ) ); protected $caldavCalendarObjects = array( 1 => array( 'event.ics' => array( 'calendardata' => 'BEGIN:VCALENDAR VERSION:2.0 BEGIN:VEVENT UID:20120418T172519CEST-3510gh1hVw DTSTAMP:20120418T152519Z DTSTART;VALUE=DATE:20120330 DTEND;VALUE=DATE:20120531 EXDATE;TZID=Europe/Berlin:20120330T000000 RRULE:FREQ=YEARLY;INTERVAL=1 SEQUENCE:1 SUMMARY:Birthday TRANSP:TRANSPARENT BEGIN:VALARM ACTION:EMAIL ATTENDEE:MAILTO:xxx@domain.de DESCRIPTION:Dies ist eine Kalender Erinnerung SUMMARY:Kalender Alarm Erinnerung TRIGGER;VALUE=DATE-TIME:20120329T060000Z END:VALARM END:VEVENT END:VCALENDAR ', ), ), ); function testIssue211() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_CONTENT_TYPE' => 'application/xml', 'REQUEST_URI' => '/calendars/user1/calendar1', 'HTTP_DEPTH' => '1', )); $request->setBody(' '); $response = $this->request($request); // if this assert is reached, the endless loop is gone // There should be no matching events $this->assertFalse(strpos('BEGIN:VEVENT', $response->body)); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Issue220Test.php000066400000000000000000000054231246001162500215650ustar00rootroot00000000000000 1, 'name' => 'Calendar', 'principaluri' => 'principals/user1', 'uri' => 'calendar1', ) ); protected $caldavCalendarObjects = array( 1 => array( 'event.ics' => array( 'calendardata' => 'BEGIN:VCALENDAR VERSION:2.0 BEGIN:VEVENT DTSTART;TZID=Europe/Berlin:20120601T180000 SUMMARY:Brot backen RRULE:FREQ=DAILY;INTERVAL=1;WKST=MO TRANSP:OPAQUE DURATION:PT20M LAST-MODIFIED:20120601T064634Z CREATED:20120601T064634Z DTSTAMP:20120601T064634Z UID:b64f14c5-dccc-4eda-947f-bdb1f763fbcd BEGIN:VALARM TRIGGER;VALUE=DURATION:-PT5M ACTION:DISPLAY DESCRIPTION:Default Event Notification X-WR-ALARMUID:cd952c1b-b3d6-41fb-b0a6-ec3a1a5bdd58 END:VALARM END:VEVENT BEGIN:VEVENT DTSTART;TZID=Europe/Berlin:20120606T180000 SUMMARY:Brot backen TRANSP:OPAQUE STATUS:CANCELLED DTEND;TZID=Europe/Berlin:20120606T182000 LAST-MODIFIED:20120605T094310Z SEQUENCE:1 RECURRENCE-ID:20120606T160000Z UID:b64f14c5-dccc-4eda-947f-bdb1f763fbcd END:VEVENT END:VCALENDAR ', ), ), ); function testIssue220() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_CONTENT_TYPE' => 'application/xml', 'REQUEST_URI' => '/calendars/user1/calendar1', 'HTTP_DEPTH' => '1', )); $request->setBody(' '); $response = $this->request($request); $this->assertFalse(strpos($response->body, 'PHPUnit_Framework_Error_Warning'), 'Error Warning occurred: ' . $response->body); $this->assertFalse(strpos($response->body, 'Invalid argument supplied for foreach()'), 'Invalid argument supplied for foreach(): ' . $response->body); $this->assertEquals('HTTP/1.1 207 Multi-Status', $response->status); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Issue228Test.php000066400000000000000000000040061246001162500215710ustar00rootroot00000000000000 1, 'name' => 'Calendar', 'principaluri' => 'principals/user1', 'uri' => 'calendar1', ) ); protected $caldavCalendarObjects = array( 1 => array( 'event.ics' => array( 'calendardata' => 'BEGIN:VCALENDAR VERSION:2.0 BEGIN:VEVENT UID:20120730T113415CEST-6804EGphkd@xxxxxx.de DTSTAMP:20120730T093415Z DTSTART;VALUE=DATE:20120729 DTEND;VALUE=DATE:20120730 SUMMARY:sunday event TRANSP:TRANSPARENT END:VEVENT END:VCALENDAR ', ), ), ); function testIssue228() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_CONTENT_TYPE' => 'application/xml', 'REQUEST_URI' => '/calendars/user1/calendar1', 'HTTP_DEPTH' => '1', )); $request->setBody(' '); $response = $this->request($request); // We must check if absolutely nothing was returned from this query. $this->assertFalse(strpos($response->body, 'BEGIN:VCALENDAR')); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Notifications/000077500000000000000000000000001246001162500215055ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/CalDAV/Notifications/CollectionTest.php000066400000000000000000000037631246001162500251620ustar00rootroot00000000000000principalUri = 'principals/user1'; $this->notification = new Notification\SystemStatus(1,'"1"'); $this->caldavBackend = new CalDAV\Backend\Mock(array(),array(), array( 'principals/user1' => array( $this->notification ) )); return new Collection($this->caldavBackend, $this->principalUri); } function testGetChildren() { $col = $this->getInstance(); $this->assertEquals('notifications', $col->getName()); $this->assertEquals(array( new Node($this->caldavBackend, $this->principalUri, $this->notification) ), $col->getChildren()); } function testGetOwner() { $col = $this->getInstance(); $this->assertEquals('principals/user1', $col->getOwner()); } function testGetGroup() { $col = $this->getInstance(); $this->assertNull($col->getGroup()); } function testGetACL() { $col = $this->getInstance(); $expected = array( array( 'privilege' => '{DAV:}read', 'principal' => $this->principalUri, 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => $this->principalUri, 'protected' => true, ), ); $this->assertEquals($expected, $col->getACL()); } /** * @expectedException Sabre\DAV\Exception\NotImplemented */ function testSetACL() { $col = $this->getInstance(); $col->setACL(array()); } function testGetSupportedPrivilegeSet() { $col = $this->getInstance(); $this->assertNull($col->getSupportedPrivilegeSet()); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Notifications/NodeTest.php000066400000000000000000000043311246001162500237440ustar00rootroot00000000000000systemStatus = new Notification\SystemStatus(1,'"1"'); $this->caldavBackend = new CalDAV\Backend\Mock(array(),array(), array( 'principals/user1' => array( $this->systemStatus ) )); $node = new Node($this->caldavBackend, 'principals/user1', $this->systemStatus); return $node; } function testGetId() { $node = $this->getInstance(); $this->assertEquals($this->systemStatus->getId() . '.xml', $node->getName()); } function testGetEtag() { $node = $this->getInstance(); $this->assertEquals('"1"', $node->getETag()); } function testGetNotificationType() { $node = $this->getInstance(); $this->assertEquals($this->systemStatus, $node->getNotificationType()); } function testDelete() { $node = $this->getInstance(); $node->delete(); $this->assertEquals(array(), $this->caldavBackend->getNotificationsForPrincipal('principals/user1')); } function testGetGroup() { $node = $this->getInstance(); $this->assertNull($node->getGroup()); } function testGetACL() { $node = $this->getInstance(); $expected = array( array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user1', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => 'principals/user1', 'protected' => true, ), ); $this->assertEquals($expected, $node->getACL()); } /** * @expectedException Sabre\DAV\Exception\NotImplemented */ function testSetACL() { $node = $this->getInstance(); $node->setACL(array()); } function testGetSupportedPrivilegeSet() { $node = $this->getInstance(); $this->assertNull($node->getSupportedPrivilegeSet()); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Notifications/Notification/000077500000000000000000000000001246001162500241335ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/CalDAV/Notifications/Notification/InviteReplyTest.php000066400000000000000000000072471246001162500277700ustar00rootroot00000000000000assertEquals('foo', $notification->getId()); $this->assertEquals('"1"', $notification->getETag()); $simpleExpected = '' . "\n" . '' . "\n"; $dom = new \DOMDocument('1.0','UTF-8'); $elem = $dom->createElement('cs:root'); $elem->setAttribute('xmlns:cs',CalDAV\Plugin::NS_CALENDARSERVER); $dom->appendChild($elem); $notification->serialize(new DAV\Server(), $elem); $this->assertEquals($simpleExpected, $dom->saveXML()); $dom = new \DOMDocument('1.0','UTF-8'); $dom->formatOutput = true; $elem = $dom->createElement('cs:root'); $elem->setAttribute('xmlns:cs',CalDAV\Plugin::NS_CALENDARSERVER); $elem->setAttribute('xmlns:d','DAV:'); $dom->appendChild($elem); $notification->serializeBody(new DAV\Server(), $elem); $this->assertEquals($expected, $dom->saveXML()); } function dataProvider() { $dtStamp = new \DateTime('2012-01-01 00:00:00 GMT'); return array( array( array( 'id' => 'foo', 'dtStamp' => $dtStamp, 'etag' => '"1"', 'inReplyTo' => 'bar', 'href' => 'mailto:foo@example.org', 'type' => CalDAV\SharingPlugin::STATUS_ACCEPTED, 'hostUrl' => 'calendar' ), << 20120101T000000Z foo bar mailto:foo@example.org /calendar FOO ), array( array( 'id' => 'foo', 'dtStamp' => $dtStamp, 'etag' => '"1"', 'inReplyTo' => 'bar', 'href' => 'mailto:foo@example.org', 'type' => CalDAV\SharingPlugin::STATUS_DECLINED, 'hostUrl' => 'calendar', 'summary' => 'Summary!' ), << 20120101T000000Z foo bar mailto:foo@example.org /calendar Summary! FOO ), ); } /** * @expectedException InvalidArgumentException */ function testMissingArg() { new InviteReply(array()); } /** * @expectedException InvalidArgumentException */ function testUnknownArg() { new InviteReply(array( 'foo-i-will-break' => true, 'id' => 1, 'etag' => '"bla"', 'href' => 'abc', 'dtStamp' => 'def', 'inReplyTo' => 'qrs', 'type' => 'ghi', 'hostUrl' => 'jkl', )); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Notifications/Notification/InviteTest.php000066400000000000000000000157401246001162500267510ustar00rootroot00000000000000assertEquals('foo', $notification->getId()); $this->assertEquals('"1"', $notification->getETag()); $simpleExpected = '' . "\n" . '' . "\n"; $dom = new \DOMDocument('1.0','UTF-8'); $elem = $dom->createElement('cs:root'); $elem->setAttribute('xmlns:cs',CalDAV\Plugin::NS_CALENDARSERVER); $dom->appendChild($elem); $notification->serialize(new DAV\Server(), $elem); $this->assertEquals($simpleExpected, $dom->saveXML()); $dom = new \DOMDocument('1.0','UTF-8'); $dom->formatOutput = true; $elem = $dom->createElement('cs:root'); $elem->setAttribute('xmlns:cs',CalDAV\Plugin::NS_CALENDARSERVER); $elem->setAttribute('xmlns:d','DAV:'); $elem->setAttribute('xmlns:cal',CalDAV\Plugin::NS_CALDAV); $dom->appendChild($elem); $notification->serializeBody(new DAV\Server(), $elem); $this->assertEquals($expected, $dom->saveXML()); } function dataProvider() { $dtStamp = new \DateTime('2012-01-01 00:00:00', new \DateTimeZone('GMT')); return array( array( array( 'id' => 'foo', 'dtStamp' => $dtStamp, 'etag' => '"1"', 'href' => 'mailto:foo@example.org', 'type' => CalDAV\SharingPlugin::STATUS_ACCEPTED, 'readOnly' => true, 'hostUrl' => 'calendar', 'organizer' => 'principal/user1', 'commonName' => 'John Doe', 'summary' => 'Awesome stuff!' ), << 20120101T000000Z foo mailto:foo@example.org /calendar John Doe /principal/user1 John Doe Awesome stuff! FOO ), array( array( 'id' => 'foo', 'dtStamp' => $dtStamp, 'etag' => '"1"', 'href' => 'mailto:foo@example.org', 'type' => CalDAV\SharingPlugin::STATUS_DECLINED, 'readOnly' => true, 'hostUrl' => 'calendar', 'organizer' => 'principal/user1', 'commonName' => 'John Doe', ), << 20120101T000000Z foo mailto:foo@example.org /calendar John Doe /principal/user1 John Doe FOO ), array( array( 'id' => 'foo', 'dtStamp' => $dtStamp, 'etag' => '"1"', 'href' => 'mailto:foo@example.org', 'type' => CalDAV\SharingPlugin::STATUS_NORESPONSE, 'readOnly' => true, 'hostUrl' => 'calendar', 'organizer' => 'principal/user1', 'firstName' => 'Foo', 'lastName' => 'Bar', ), << 20120101T000000Z foo mailto:foo@example.org /calendar Foo Bar /principal/user1 Foo Bar FOO ), array( array( 'id' => 'foo', 'dtStamp' => $dtStamp, 'etag' => '"1"', 'href' => 'mailto:foo@example.org', 'type' => CalDAV\SharingPlugin::STATUS_DELETED, 'readOnly' => false, 'hostUrl' => 'calendar', 'organizer' => 'mailto:user1@fruux.com', 'supportedComponents' => new CalDAV\Property\SupportedCalendarComponentSet(array('VEVENT','VTODO')), ), << 20120101T000000Z foo mailto:foo@example.org /calendar mailto:user1@fruux.com FOO ), ); } /** * @expectedException InvalidArgumentException */ function testMissingArg() { new Invite(array()); } /** * @expectedException InvalidArgumentException */ function testUnknownArg() { new Invite(array( 'foo-i-will-break' => true, 'id' => 1, 'etag' => '"bla"', 'href' => 'abc', 'dtStamp' => 'def', 'type' => 'ghi', 'readOnly' => true, 'hostUrl' => 'jkl', 'organizer' => 'mno', )); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Notifications/Notification/SystemStatusTest.php000066400000000000000000000050141246001162500301740ustar00rootroot00000000000000assertEquals('foo', $notification->getId()); $this->assertEquals('"1"', $notification->getETag()); $dom = new \DOMDocument('1.0','UTF-8'); $elem = $dom->createElement('cs:root'); $elem->setAttribute('xmlns:cs',CalDAV\Plugin::NS_CALENDARSERVER); $dom->appendChild($elem); $notification->serialize(new DAV\Server(), $elem); $this->assertEquals($expected1, $dom->saveXML()); $dom = new \DOMDocument('1.0','UTF-8'); $elem = $dom->createElement('cs:root'); $elem->setAttribute('xmlns:cs',CalDAV\Plugin::NS_CALENDARSERVER); $dom->appendChild($elem); $notification->serializeBody(new DAV\Server(), $elem); $this->assertEquals($expected2, $dom->saveXML()); } function dataProvider() { return array( array( new SystemStatus('foo', '"1"'), '' . "\n" . '' . "\n", '' . "\n" . '' . "\n", ), array( new SystemStatus('foo', '"1"', SystemStatus::TYPE_MEDIUM,'bar'), '' . "\n" . '' . "\n", '' . "\n" . 'bar' . "\n", ), array( new SystemStatus('foo', '"1"', SystemStatus::TYPE_LOW,null,'http://example.org/'), '' . "\n" . '' . "\n", '' . "\n" . 'http://example.org/' . "\n", ) ); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/OutboxPostTest.php000066400000000000000000000407611246001162500224030ustar00rootroot00000000000000 'POST', 'REQUEST_URI' => '/notfound', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $this->assertHTTPStatus(501, $req); } function testPostPassThruNotTextCalendar() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/admin/outbox', )); $this->assertHTTPStatus(501, $req); } function testPostPassThruNoOutBox() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $this->assertHTTPStatus(501, $req); } function testNoOriginator() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/admin/outbox', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'METHOD:REQUEST', 'BEGIN:VEVENT', 'END:VEVENT', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $this->assertHTTPStatus(400, $req); } function testNoRecipient() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/admin/outbox', 'HTTP_ORIGINATOR' => 'mailto:orig@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'METHOD:REQUEST', 'BEGIN:VEVENT', 'END:VEVENT', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $this->assertHTTPStatus(400, $req); } function testBadOriginator() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/admin/outbox', 'HTTP_ORIGINATOR' => 'nomailto:orig@example.org', 'HTTP_RECIPIENT' => 'mailto:user1@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'METHOD:REQUEST', 'BEGIN:VEVENT', 'END:VEVENT', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $this->assertHTTPStatus(403, $req); } function testBadRecipient() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/admin/outbox', 'HTTP_ORIGINATOR' => 'mailto:orig@example.org', 'HTTP_RECIPIENT' => 'http://user1@example.org, mailto:user2@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'METHOD:REQUEST', 'BEGIN:VEVENT', 'END:VEVENT', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $this->assertHTTPStatus(400, $req); } function testIncorrectOriginator() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/admin/outbox', 'HTTP_ORIGINATOR' => 'mailto:orig@example.org', 'HTTP_RECIPIENT' => 'mailto:user1@example.org, mailto:user2@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'METHOD:REQUEST', 'BEGIN:VEVENT', 'END:VEVENT', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $this->assertHTTPStatus(403, $req); } function testInvalidIcalBody() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/outbox', 'HTTP_ORIGINATOR' => 'mailto:user1.sabredav@sabredav.org', 'HTTP_RECIPIENT' => 'mailto:user2@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $req->setBody('foo'); $this->assertHTTPStatus(400, $req); } function testNoVEVENT() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/outbox', 'HTTP_ORIGINATOR' => 'mailto:user1.sabredav@sabredav.org', 'HTTP_RECIPIENT' => 'mailto:user2@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'BEGIN:VTIMEZONE', 'END:VTIMEZONE', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $this->assertHTTPStatus(400, $req); } function testNoMETHOD() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/outbox', 'HTTP_ORIGINATOR' => 'mailto:user1.sabredav@sabredav.org', 'HTTP_RECIPIENT' => 'mailto:user2@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'BEGIN:VEVENT', 'END:VEVENT', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $this->assertHTTPStatus(400, $req); } function testUnsupportedMethod() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/outbox', 'HTTP_ORIGINATOR' => 'mailto:user1.sabredav@sabredav.org', 'HTTP_RECIPIENT' => 'mailto:user2@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'METHOD:PUBLISH', 'BEGIN:VEVENT', 'END:VEVENT', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $this->assertHTTPStatus(501, $req); } function testNoIMIPHandler() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/outbox', 'HTTP_ORIGINATOR' => 'mailto:user1.sabredav@sabredav.org', 'HTTP_RECIPIENT' => 'mailto:user2@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'METHOD:REQUEST', 'BEGIN:VEVENT', 'END:VEVENT', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $response = $this->request($req); $this->assertEquals('HTTP/1.1 200 OK', $response->status); $this->assertEquals(array( 'Content-Type' => 'application/xml', ), $response->headers); // Lazily checking the body for a few expected values. $this->assertTrue(strpos($response->body, '5.2;')!==false); $this->assertTrue(strpos($response->body,'user2@example.org')!==false); } function testSuccessRequest() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/outbox', 'HTTP_ORIGINATOR' => 'mailto:user1.sabredav@sabredav.org', 'HTTP_RECIPIENT' => 'mailto:user2@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'METHOD:REQUEST', 'BEGIN:VEVENT', 'SUMMARY:An invitation', 'END:VEVENT', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $handler = new Schedule\IMip\Mock('server@example.org'); $this->caldavPlugin->setIMIPhandler($handler); $response = $this->request($req); $this->assertEquals('HTTP/1.1 200 OK', $response->status); $this->assertEquals(array( 'Content-Type' => 'application/xml', ), $response->headers); // Lazily checking the body for a few expected values. $this->assertTrue(strpos($response->body, '2.0;')!==false); $this->assertTrue(strpos($response->body,'user2@example.org')!==false); $this->assertEquals(array( array( 'to' => 'user2@example.org', 'subject' => 'Invitation for: An invitation', 'body' => implode("\r\n", $body) . "\r\n", 'headers' => array( 'Reply-To: user1.sabredav@sabredav.org', 'From: server@example.org', 'Content-Type: text/calendar; method=REQUEST; charset=utf-8', 'X-Sabre-Version: ' . DAV\Version::VERSION . '-' . DAV\Version::STABILITY, ), ) ), $handler->getSentEmails()); } function testSuccessRequestUseRelativePrincipal() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/outbox', 'HTTP_ORIGINATOR' => '/principals/user1/', 'HTTP_RECIPIENT' => 'mailto:user2@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'METHOD:REQUEST', 'BEGIN:VEVENT', 'SUMMARY:An invitation', 'ORGANIZER:mailto:user1.sabredav@sabredav.org', 'END:VEVENT', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $handler = new Schedule\IMip\Mock('server@example.org'); $this->caldavPlugin->setIMIPhandler($handler); $response = $this->request($req); $this->assertEquals('HTTP/1.1 200 OK', $response->status, 'Full body: ' . $response->body); $this->assertEquals(array( 'Content-Type' => 'application/xml', ), $response->headers); // Lazily checking the body for a few expected values. $this->assertTrue(strpos($response->body, '2.0;')!==false); $this->assertTrue(strpos($response->body,'user2@example.org')!==false); $this->assertEquals(array( array( 'to' => 'user2@example.org', 'subject' => 'Invitation for: An invitation', 'body' => implode("\r\n", $body) . "\r\n", 'headers' => array( 'Reply-To: user1.sabredav@sabredav.org', 'From: server@example.org', 'Content-Type: text/calendar; method=REQUEST; charset=utf-8', 'X-Sabre-Version: ' . DAV\Version::VERSION . '-' . DAV\Version::STABILITY, ), ) ), $handler->getSentEmails()); } function testSuccessRequestUpperCased() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/outbox', 'HTTP_ORIGINATOR' => 'MAILTO:user1.sabredav@sabredav.org', 'HTTP_RECIPIENT' => 'MAILTO:user2@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'METHOD:REQUEST', 'BEGIN:VEVENT', 'SUMMARY:An invitation', 'END:VEVENT', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $handler = new Schedule\IMip\Mock('server@example.org'); $this->caldavPlugin->setIMIPhandler($handler); $response = $this->request($req); $this->assertEquals('HTTP/1.1 200 OK', $response->status); $this->assertEquals(array( 'Content-Type' => 'application/xml', ), $response->headers); // Lazily checking the body for a few expected values. $this->assertTrue(strpos($response->body, '2.0;')!==false); $this->assertTrue(strpos($response->body,'user2@example.org')!==false); $this->assertEquals(array( array( 'to' => 'user2@example.org', 'subject' => 'Invitation for: An invitation', 'body' => implode("\r\n", $body) . "\r\n", 'headers' => array( 'Reply-To: user1.sabredav@sabredav.org', 'From: server@example.org', 'Content-Type: text/calendar; method=REQUEST; charset=utf-8', 'X-Sabre-Version: ' . DAV\Version::VERSION . '-' . DAV\Version::STABILITY, ), ) ), $handler->getSentEmails()); } function testSuccessReply() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/outbox', 'HTTP_ORIGINATOR' => 'mailto:user1.sabredav@sabredav.org', 'HTTP_RECIPIENT' => 'mailto:user2@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'METHOD:REPLY', 'BEGIN:VEVENT', 'SUMMARY:An invitation', 'END:VEVENT', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $handler = new Schedule\IMip\Mock('server@example.org'); $this->caldavPlugin->setIMIPhandler($handler); $this->assertHTTPStatus(200, $req); $this->assertEquals(array( array( 'to' => 'user2@example.org', 'subject' => 'Response for: An invitation', 'body' => implode("\r\n", $body) . "\r\n", 'headers' => array( 'Reply-To: user1.sabredav@sabredav.org', 'From: server@example.org', 'Content-Type: text/calendar; method=REPLY; charset=utf-8', 'X-Sabre-Version: ' . DAV\Version::VERSION . '-' . DAV\Version::STABILITY, ), ) ), $handler->getSentEmails()); } function testSuccessCancel() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/outbox', 'HTTP_ORIGINATOR' => 'mailto:user1.sabredav@sabredav.org', 'HTTP_RECIPIENT' => 'mailto:user2@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'METHOD:CANCEL', 'BEGIN:VEVENT', 'SUMMARY:An invitation', 'END:VEVENT', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $handler = new Schedule\IMip\Mock('server@example.org'); $this->caldavPlugin->setIMIPhandler($handler); $this->assertHTTPStatus(200, $req); $this->assertEquals(array( array( 'to' => 'user2@example.org', 'subject' => 'Cancelled event: An invitation', 'body' => implode("\r\n", $body) . "\r\n", 'headers' => array( 'Reply-To: user1.sabredav@sabredav.org', 'From: server@example.org', 'Content-Type: text/calendar; method=CANCEL; charset=utf-8', 'X-Sabre-Version: ' . DAV\Version::VERSION . '-' . DAV\Version::STABILITY, ), ) ), $handler->getSentEmails()); } function testUseRelativePrincipalNoFallback() { $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/outbox', 'HTTP_ORIGINATOR' => '/principals/user1/', 'HTTP_RECIPIENT' => 'mailto:user2@example.org', 'HTTP_CONTENT_TYPE' => 'text/calendar', )); $body = array( 'BEGIN:VCALENDAR', 'METHOD:REQUEST', 'BEGIN:VEVENT', 'SUMMARY:An invitation', 'ORGANIZER:rrrrrr', 'END:VEVENT', 'END:VCALENDAR', ); $req->setBody(implode("\r\n",$body)); $handler = new Schedule\IMip\Mock('server@example.org'); $this->caldavPlugin->setIMIPhandler($handler); $response = $this->request($req); $this->assertEquals('HTTP/1.1 403 Forbidden', $response->status, 'Full body: ' . $response->body); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/PluginTest.php000066400000000000000000001143571246001162500215160ustar00rootroot00000000000000caldavBackend = new Backend\Mock(array( array( 'id' => 1, 'uri' => 'UUID-123467', 'principaluri' => 'principals/user1', '{DAV:}displayname' => 'user1 calendar', '{urn:ietf:params:xml:ns:caldav}calendar-description' => 'Calendar description', '{http://apple.com/ns/ical/}calendar-order' => '1', '{http://apple.com/ns/ical/}calendar-color' => '#FF0000', '{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set' => new Property\SupportedCalendarComponentSet(array('VEVENT','VTODO')), ), array( 'id' => 2, 'uri' => 'UUID-123468', 'principaluri' => 'principals/user1', '{DAV:}displayname' => 'user1 calendar2', '{urn:ietf:params:xml:ns:caldav}calendar-description' => 'Calendar description', '{http://apple.com/ns/ical/}calendar-order' => '1', '{http://apple.com/ns/ical/}calendar-color' => '#FF0000', '{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set' => new Property\SupportedCalendarComponentSet(array('VEVENT','VTODO')), ) ), array( 1 => array( 'UUID-2345' => array( 'calendardata' => TestUtil::getTestCalendarData(), ) ) )); $principalBackend = new DAVACL\PrincipalBackend\Mock(); $principalBackend->setGroupMemberSet('principals/admin/calendar-proxy-read',array('principals/user1')); $principalBackend->setGroupMemberSet('principals/admin/calendar-proxy-write',array('principals/user1')); $principalBackend->addPrincipal(array( 'uri' => 'principals/admin/calendar-proxy-read', )); $principalBackend->addPrincipal(array( 'uri' => 'principals/admin/calendar-proxy-write', )); $calendars = new CalendarRootNode($principalBackend,$this->caldavBackend); $principals = new Principal\Collection($principalBackend); $root = new DAV\SimpleCollection('root'); $root->addChild($calendars); $root->addChild($principals); $objectTree = new DAV\ObjectTree($root); $this->server = new DAV\Server($objectTree); $this->server->debugExceptions = true; $this->server->setBaseUri('/'); $this->plugin = new Plugin(); $this->server->addPlugin($this->plugin); // Adding ACL plugin $this->server->addPlugin(new DAVACL\Plugin()); // Adding Auth plugin, and ensuring that we are logged in. $authBackend = new DAV\Auth\Backend\Mock(); $authBackend->defaultUser = 'user1'; $authPlugin = new DAV\Auth\Plugin($authBackend, 'SabreDAV'); $this->server->addPlugin($authPlugin); $authPlugin->beforeMethod('GET', '/'); $this->response = new HTTP\ResponseMock(); $this->server->httpResponse = $this->response; } function testSimple() { $this->assertEquals(array('MKCALENDAR'), $this->plugin->getHTTPMethods('calendars/user1/randomnewcalendar')); $this->assertEquals(array('calendar-access','calendar-proxy'), $this->plugin->getFeatures()); $this->assertArrayHasKey('urn:ietf:params:xml:ns:caldav', $this->server->xmlNamespaces); } function testUnknownMethodPassThrough() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'MKBREAKFAST', 'REQUEST_URI' => '/', )); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 501 Not Implemented', $this->response->status,'Incorrect status returned. Full response body:' . $this->response->body); } function testReportPassThrough() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_CONTENT_TYPE' => 'application/xml', 'REQUEST_URI' => '/', )); $request->setBody(''); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 403 Forbidden', $this->response->status); } function testMkCalendarBadLocation() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'MKCALENDAR', 'REQUEST_URI' => '/blabla', )); $body = ' Lisa\'s Events Calendar restricted to events. '; $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 403 Forbidden', $this->response->status); } function testMkCalendarNoParentNode() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'MKCALENDAR', 'REQUEST_URI' => '/doesntexist/calendar', )); $body = ' Lisa\'s Events Calendar restricted to events. '; $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 409 Conflict', $this->response->status); } function testMkCalendarExistingCalendar() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'MKCALENDAR', 'REQUEST_URI' => '/calendars/user1/UUID-123467', )); $body = ' Lisa\'s Events Calendar restricted to events. '; $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 405 Method Not Allowed', $this->response->status); } function testMkCalendarSucceed() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'MKCALENDAR', 'REQUEST_URI' => '/calendars/user1/NEWCALENDAR', )); $timezone = 'BEGIN:VCALENDAR PRODID:-//Example Corp.//CalDAV Client//EN VERSION:2.0 BEGIN:VTIMEZONE TZID:US-Eastern LAST-MODIFIED:19870101T000000Z BEGIN:STANDARD DTSTART:19671029T020000 RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10 TZOFFSETFROM:-0400 TZOFFSETTO:-0500 TZNAME:Eastern Standard Time (US & Canada) END:STANDARD BEGIN:DAYLIGHT DTSTART:19870405T020000 RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4 TZOFFSETFROM:-0500 TZOFFSETTO:-0400 TZNAME:Eastern Daylight Time (US & Canada) END:DAYLIGHT END:VTIMEZONE END:VCALENDAR'; $body = ' Lisa\'s Events Calendar restricted to events. '; $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 201 Created', $this->response->status,'Invalid response code received. Full response body: ' .$this->response->body); $calendars = $this->caldavBackend->getCalendarsForUser('principals/user1'); $this->assertEquals(3, count($calendars)); $newCalendar = null; foreach($calendars as $calendar) { if ($calendar['uri'] === 'NEWCALENDAR') { $newCalendar = $calendar; break; } } $this->assertInternalType('array',$newCalendar); $keys = array( 'uri' => 'NEWCALENDAR', 'id' => null, '{urn:ietf:params:xml:ns:caldav}calendar-description' => 'Calendar restricted to events.', '{urn:ietf:params:xml:ns:caldav}calendar-timezone' => $timezone, '{DAV:}displayname' => 'Lisa\'s Events', '{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set' => null, ); foreach($keys as $key=>$value) { $this->assertArrayHasKey($key, $newCalendar); if (is_null($value)) continue; $this->assertEquals($value, $newCalendar[$key]); } $sccs = '{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set'; $this->assertTrue($newCalendar[$sccs] instanceof Property\SupportedCalendarComponentSet); $this->assertEquals(array('VEVENT'),$newCalendar[$sccs]->getValue()); } function testMkCalendarEmptyBodySucceed() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'MKCALENDAR', 'REQUEST_URI' => '/calendars/user1/NEWCALENDAR', )); $request->setBody(''); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 201 Created', $this->response->status,'Invalid response code received. Full response body: ' .$this->response->body); $calendars = $this->caldavBackend->getCalendarsForUser('principals/user1'); $this->assertEquals(3, count($calendars)); $newCalendar = null; foreach($calendars as $calendar) { if ($calendar['uri'] === 'NEWCALENDAR') { $newCalendar = $calendar; break; } } $this->assertInternalType('array',$newCalendar); $keys = array( 'uri' => 'NEWCALENDAR', 'id' => null, '{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set' => null, ); foreach($keys as $key=>$value) { $this->assertArrayHasKey($key, $newCalendar); if (is_null($value)) continue; $this->assertEquals($value, $newCalendar[$key]); } $sccs = '{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set'; $this->assertTrue($newCalendar[$sccs] instanceof Property\SupportedCalendarComponentSet); $this->assertEquals(array('VEVENT','VTODO'),$newCalendar[$sccs]->getValue()); } function testPrincipalProperties() { $httpRequest = new HTTP\Request(array( 'HTTP_HOST' => 'sabredav.org', )); $this->server->httpRequest = $httpRequest; $props = $this->server->getPropertiesForPath('/principals/user1',array( '{urn:ietf:params:xml:ns:caldav}calendar-home-set', '{urn:ietf:params:xml:ns:caldav}schedule-outbox-URL', '{urn:ietf:params:xml:ns:caldav}calendar-user-address-set', '{' . Plugin::NS_CALENDARSERVER . '}calendar-proxy-read-for', '{' . Plugin::NS_CALENDARSERVER . '}calendar-proxy-write-for', '{' . Plugin::NS_CALENDARSERVER . '}notification-URL', )); $this->assertArrayHasKey(0,$props); $this->assertArrayHasKey(200,$props[0]); $this->assertArrayHasKey('{urn:ietf:params:xml:ns:caldav}calendar-home-set',$props[0][200]); $prop = $props[0][200]['{urn:ietf:params:xml:ns:caldav}calendar-home-set']; $this->assertTrue($prop instanceof DAV\Property\Href); $this->assertEquals('calendars/user1/',$prop->getHref()); $this->assertArrayHasKey('{urn:ietf:params:xml:ns:caldav}schedule-outbox-URL',$props[0][200]); $prop = $props[0][200]['{urn:ietf:params:xml:ns:caldav}schedule-outbox-URL']; $this->assertTrue($prop instanceof DAV\Property\Href); $this->assertEquals('calendars/user1/outbox',$prop->getHref()); $this->assertArrayHasKey('{'.Plugin::NS_CALENDARSERVER .'}notification-URL',$props[0][200]); $prop = $props[0][200]['{'.Plugin::NS_CALENDARSERVER .'}notification-URL']; $this->assertTrue($prop instanceof DAV\Property\Href); $this->assertEquals('calendars/user1/notifications/',$prop->getHref()); $this->assertArrayHasKey('{urn:ietf:params:xml:ns:caldav}calendar-user-address-set',$props[0][200]); $prop = $props[0][200]['{urn:ietf:params:xml:ns:caldav}calendar-user-address-set']; $this->assertTrue($prop instanceof DAV\Property\HrefList); $this->assertEquals(array('mailto:user1.sabredav@sabredav.org','/principals/user1/'),$prop->getHrefs()); $this->assertArrayHasKey('{http://calendarserver.org/ns/}calendar-proxy-read-for', $props[0][200]); $prop = $props[0][200]['{http://calendarserver.org/ns/}calendar-proxy-read-for']; $this->assertInstanceOf('Sabre\\DAV\\Property\\HrefList', $prop); $this->assertEquals(array('principals/admin'), $prop->getHrefs()); $this->assertArrayHasKey('{http://calendarserver.org/ns/}calendar-proxy-write-for', $props[0][200]); $prop = $props[0][200]['{http://calendarserver.org/ns/}calendar-proxy-write-for']; $this->assertInstanceOf('Sabre\\DAV\\Property\\HrefList', $prop); $this->assertEquals(array('principals/admin'), $prop->getHrefs()); } function testSupportedReportSetPropertyNonCalendar() { $props = $this->server->getPropertiesForPath('/calendars/user1',array( '{DAV:}supported-report-set', )); $this->assertArrayHasKey(0,$props); $this->assertArrayHasKey(200,$props[0]); $this->assertArrayHasKey('{DAV:}supported-report-set',$props[0][200]); $prop = $props[0][200]['{DAV:}supported-report-set']; $this->assertInstanceOf('\\Sabre\\DAV\\Property\\SupportedReportSet', $prop); $value = array( '{DAV:}expand-property', '{DAV:}principal-property-search', '{DAV:}principal-search-property-set' ); $this->assertEquals($value,$prop->getValue()); } /** * @depends testSupportedReportSetPropertyNonCalendar */ function testSupportedReportSetProperty() { $props = $this->server->getPropertiesForPath('/calendars/user1/UUID-123467',array( '{DAV:}supported-report-set', )); $this->assertArrayHasKey(0,$props); $this->assertArrayHasKey(200,$props[0]); $this->assertArrayHasKey('{DAV:}supported-report-set',$props[0][200]); $prop = $props[0][200]['{DAV:}supported-report-set']; $this->assertTrue($prop instanceof \Sabre\DAV\Property\SupportedReportSet); $value = array( '{urn:ietf:params:xml:ns:caldav}calendar-multiget', '{urn:ietf:params:xml:ns:caldav}calendar-query', '{urn:ietf:params:xml:ns:caldav}free-busy-query', '{DAV:}expand-property', '{DAV:}principal-property-search', '{DAV:}principal-search-property-set' ); $this->assertEquals($value,$prop->getValue()); } /** * @depends testSupportedReportSetProperty */ function testCalendarMultiGetReport() { $body = '' . '' . '' . ' ' . ' ' . '' . '/calendars/user1/UUID-123467/UUID-2345' . ''; $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'REQUEST_URI' => '/calendars/user1', 'HTTP_DEPTH' => '1', )); $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status',$this->response->status,'Invalid HTTP status received. Full response body: ' . $this->response->body); $xml = simplexml_load_string(DAV\XMLUtil::convertDAVNamespace($this->response->body)); $xml->registerXPathNamespace('d','urn:DAV'); $xml->registerXPathNamespace('c','urn:ietf:params:xml:ns:caldav'); $check = array( '/d:multistatus', '/d:multistatus/d:response', '/d:multistatus/d:response/d:href', '/d:multistatus/d:response/d:propstat', '/d:multistatus/d:response/d:propstat/d:prop', '/d:multistatus/d:response/d:propstat/d:prop/d:getetag', '/d:multistatus/d:response/d:propstat/d:prop/c:calendar-data', '/d:multistatus/d:response/d:propstat/d:status' => 'HTTP/1.1 200 OK', ); foreach($check as $v1=>$v2) { $xpath = is_int($v1)?$v2:$v1; $result = $xml->xpath($xpath); $this->assertEquals(1,count($result)); if (!is_int($v1)) $this->assertEquals($v2,(string)$result[0]); } // The response object should have a reference to the Asia/Seoul // timezone. $this->assertTrue(strpos($this->response->body,'Asia/Seoul')!==false); } /** * @depends testCalendarMultiGetReport */ function testCalendarMultiGetReportExpand() { $body = '' . '' . '' . ' ' . ' ' . ' ' . ' ' . '' . '/calendars/user1/UUID-123467/UUID-2345' . ''; $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'REQUEST_URI' => '/calendars/user1', 'HTTP_DEPTH' => '1', )); $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status',$this->response->status,'Invalid HTTP status received. Full response body: ' . $this->response->body); $xml = simplexml_load_string(DAV\XMLUtil::convertDAVNamespace($this->response->body)); $xml->registerXPathNamespace('d','urn:DAV'); $xml->registerXPathNamespace('c','urn:ietf:params:xml:ns:caldav'); $check = array( '/d:multistatus', '/d:multistatus/d:response', '/d:multistatus/d:response/d:href', '/d:multistatus/d:response/d:propstat', '/d:multistatus/d:response/d:propstat/d:prop', '/d:multistatus/d:response/d:propstat/d:prop/d:getetag', '/d:multistatus/d:response/d:propstat/d:prop/c:calendar-data', '/d:multistatus/d:response/d:propstat/d:status' => 'HTTP/1.1 200 OK', ); foreach($check as $v1=>$v2) { $xpath = is_int($v1)?$v2:$v1; $result = $xml->xpath($xpath); $this->assertEquals(1,count($result)); if (!is_int($v1)) $this->assertEquals($v2,(string)$result[0]); } // The response object should no longer hold references to timezones. $this->assertTrue(strpos($this->response->body,'Asia/Seoul')===false); } /** * @depends testSupportedReportSetProperty * @depends testCalendarMultiGetReport */ function testCalendarQueryReport() { $body = '' . '' . '' . ' ' . ' ' . ' ' . ' ' . '' . '' . ' ' . ' ' . ' ' . '' . ''; $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'REQUEST_URI' => '/calendars/user1/UUID-123467', 'HTTP_DEPTH' => '1', )); $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status',$this->response->status,'Received an unexpected status. Full response body: ' . $this->response->body); $xml = simplexml_load_string(DAV\XMLUtil::convertDAVNamespace($this->response->body)); $xml->registerXPathNamespace('d','urn:DAV'); $xml->registerXPathNamespace('c','urn:ietf:params:xml:ns:caldav'); $check = array( '/d:multistatus', '/d:multistatus/d:response', '/d:multistatus/d:response/d:href', '/d:multistatus/d:response/d:propstat', '/d:multistatus/d:response/d:propstat/d:prop', '/d:multistatus/d:response/d:propstat/d:prop/d:getetag', '/d:multistatus/d:response/d:propstat/d:prop/c:calendar-data', '/d:multistatus/d:response/d:propstat/d:status' => 'HTTP/1.1 200 OK', ); foreach($check as $v1=>$v2) { $xpath = is_int($v1)?$v2:$v1; $result = $xml->xpath($xpath); $this->assertEquals(1,count($result), 'We expected 1 ' . $xpath . ' elements. We\'ve found ' . count($result) . '. Full result: ' . $this->response->body); if (!is_int($v1)) $this->assertEquals($v2,(string)$result[0]); } } /** * @depends testCalendarQueryReport */ function testCalendarQueryReportNoCalData() { $body = '' . '' . '' . ' ' . '' . '' . ' ' . ' ' . ' ' . '' . ''; $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'REQUEST_URI' => '/calendars/user1//UUID-123467', 'HTTP_DEPTH' => '1', )); $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status',$this->response->status,'Received an unexpected status. Full response body: ' . $this->response->body); $xml = simplexml_load_string(DAV\XMLUtil::convertDAVNamespace($this->response->body)); $xml->registerXPathNamespace('d','urn:DAV'); $xml->registerXPathNamespace('c','urn:ietf:params:xml:ns:caldav'); $check = array( '/d:multistatus', '/d:multistatus/d:response', '/d:multistatus/d:response/d:href', '/d:multistatus/d:response/d:propstat', '/d:multistatus/d:response/d:propstat/d:prop', '/d:multistatus/d:response/d:propstat/d:prop/d:getetag', '/d:multistatus/d:response/d:propstat/d:status' => 'HTTP/1.1 200 OK', ); foreach($check as $v1=>$v2) { $xpath = is_int($v1)?$v2:$v1; $result = $xml->xpath($xpath); $this->assertEquals(1,count($result), 'We expected 1 ' . $xpath . ' elements. We\'ve found ' . count($result) . '. Full result: ' . $this->response->body); if (!is_int($v1)) $this->assertEquals($v2,(string)$result[0]); } } /** * @depends testCalendarQueryReport */ function testCalendarQueryReportNoFilters() { $body = '' . '' . '' . ' ' . ' ' . '' . ''; $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'REQUEST_URI' => '/calendars/user1//UUID-123467', )); $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 400 Bad request',$this->response->status,'Received an unexpected status. Full response body: ' . $this->response->body); } /** * @depends testSupportedReportSetProperty * @depends testCalendarMultiGetReport */ function testCalendarQueryReport1Object() { $body = '' . '' . '' . ' ' . ' ' . ' ' . ' ' . '' . '' . ' ' . ' ' . ' ' . '' . ''; $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'REQUEST_URI' => '/calendars/user1/UUID-123467/UUID-2345', 'HTTP_DEPTH' => '0', )); $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status',$this->response->status,'Received an unexpected status. Full response body: ' . $this->response->body); $xml = simplexml_load_string(DAV\XMLUtil::convertDAVNamespace($this->response->body)); $xml->registerXPathNamespace('d','urn:DAV'); $xml->registerXPathNamespace('c','urn:ietf:params:xml:ns:caldav'); $check = array( '/d:multistatus', '/d:multistatus/d:response', '/d:multistatus/d:response/d:href', '/d:multistatus/d:response/d:propstat', '/d:multistatus/d:response/d:propstat/d:prop', '/d:multistatus/d:response/d:propstat/d:prop/d:getetag', '/d:multistatus/d:response/d:propstat/d:prop/c:calendar-data', '/d:multistatus/d:response/d:propstat/d:status' => 'HTTP/1.1 200 OK', ); foreach($check as $v1=>$v2) { $xpath = is_int($v1)?$v2:$v1; $result = $xml->xpath($xpath); $this->assertEquals(1,count($result), 'We expected 1 ' . $xpath . ' elements. We\'ve found ' . count($result) . '. Full result: ' . $this->response->body); if (!is_int($v1)) $this->assertEquals($v2,(string)$result[0]); } } /** * @depends testSupportedReportSetProperty * @depends testCalendarMultiGetReport */ function testCalendarQueryReport1ObjectNoCalData() { $body = '' . '' . '' . ' ' . '' . '' . ' ' . ' ' . ' ' . '' . ''; $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'REQUEST_URI' => '/calendars/user1/UUID-123467/UUID-2345', 'HTTP_DEPTH' => '0', )); $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status',$this->response->status,'Received an unexpected status. Full response body: ' . $this->response->body); $xml = simplexml_load_string(DAV\XMLUtil::convertDAVNamespace($this->response->body)); $xml->registerXPathNamespace('d','urn:DAV'); $xml->registerXPathNamespace('c','urn:ietf:params:xml:ns:caldav'); $check = array( '/d:multistatus', '/d:multistatus/d:response', '/d:multistatus/d:response/d:href', '/d:multistatus/d:response/d:propstat', '/d:multistatus/d:response/d:propstat/d:prop', '/d:multistatus/d:response/d:propstat/d:prop/d:getetag', '/d:multistatus/d:response/d:propstat/d:status' => 'HTTP/1.1 200 OK', ); foreach($check as $v1=>$v2) { $xpath = is_int($v1)?$v2:$v1; $result = $xml->xpath($xpath); $this->assertEquals(1,count($result), 'We expected 1 ' . $xpath . ' elements. We\'ve found ' . count($result) . '. Full result: ' . $this->response->body); if (!is_int($v1)) $this->assertEquals($v2,(string)$result[0]); } } function testHTMLActionsPanel() { $output = ''; $r = $this->server->broadcastEvent('onHTMLActionsPanel', array($this->server->tree->getNodeForPath('calendars/user1'), &$output)); $this->assertFalse($r); $this->assertTrue(!!strpos($output,'Display name')); } function testBrowserPostAction() { $r = $this->server->broadcastEvent('onBrowserPostAction', array('calendars/user1', 'mkcalendar', array( 'name' => 'NEWCALENDAR', '{DAV:}displayname' => 'foo', ))); $this->assertFalse($r); $calendars = $this->caldavBackend->getCalendarsForUser('principals/user1'); $this->assertEquals(3, count($calendars)); $newCalendar = null; foreach($calendars as $calendar) { if ($calendar['uri'] === 'NEWCALENDAR') { $newCalendar = $calendar; break; } } if (!$newCalendar) $this->fail('Could not find newly created calendar'); } /** * @depends testCalendarMultiGetReport */ function testCalendarMultiGetReportNoEnd() { $body = '' . '' . '' . ' ' . ' ' . ' ' . ' ' . '' . '/calendars/user1/UUID-123467/UUID-2345' . ''; $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'REQUEST_URI' => '/calendars/user1', 'HTTP_DEPTH' => '1', )); $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 400 Bad request',$this->response->status,'Invalid HTTP status received. Full response body: ' . $this->response->body); } /** * @depends testCalendarMultiGetReport */ function testCalendarMultiGetReportNoStart() { $body = '' . '' . '' . ' ' . ' ' . ' ' . ' ' . '' . '/calendars/user1/UUID-123467/UUID-2345' . ''; $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'REQUEST_URI' => '/calendars/user1', 'HTTP_DEPTH' => '1', )); $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 400 Bad request',$this->response->status,'Invalid HTTP status received. Full response body: ' . $this->response->body); } /** * @depends testCalendarMultiGetReport */ function testCalendarMultiGetReportEndBeforeStart() { $body = '' . '' . '' . ' ' . ' ' . ' ' . ' ' . '' . '/calendars/user1/UUID-123467/UUID-2345' . ''; $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'REQUEST_URI' => '/calendars/user1', 'HTTP_DEPTH' => '1', )); $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 400 Bad request',$this->response->status,'Invalid HTTP status received. Full response body: ' . $this->response->body); } function testNotificationProperties() { $request = array( '{' . Plugin::NS_CALENDARSERVER . '}notificationtype', ); $result = array(); $notification = new Notifications\Node( $this->caldavBackend, 'principals/user1', new Notifications\Notification\SystemStatus('foo','"1"') ); $this->plugin->beforeGetProperties('foo', $notification, $request, $result); $this->assertEquals( array( 200 => array( '{' . Plugin::NS_CALENDARSERVER . '}notificationtype' => $notification->getNotificationType() ) ), $result); } function testNotificationGet() { $notification = new Notifications\Node( $this->caldavBackend, 'principals/user1', new Notifications\Notification\SystemStatus('foo','"1"') ); $server = new DAV\Server(array($notification)); $caldav = new Plugin(); $server->httpRequest = new HTTP\Request(array( 'REQUEST_URI' => '/foo.xml', )); $httpResponse = new HTTP\ResponseMock(); $server->httpResponse = $httpResponse; $server->addPlugin($caldav); $caldav->beforeMethod('GET','foo.xml'); $this->assertEquals('HTTP/1.1 200 OK', $httpResponse->status); $this->assertEquals(array( 'Content-Type' => 'application/xml', 'ETag' => '"1"', ), $httpResponse->headers); $expected = ' '; $this->assertEquals($expected, $httpResponse->body); } function testGETPassthrough() { $server = new DAV\Server(); $caldav = new Plugin(); $httpResponse = new HTTP\ResponseMock(); $server->httpResponse = $httpResponse; $server->addPlugin($caldav); $caldav->beforeMethod('GET','foo'); $this->assertNull($caldav->beforeMethod('GET','foozz')); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Principal/000077500000000000000000000000001246001162500206155ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/CalDAV/Principal/CollectionTest.php000066400000000000000000000006621246001162500242650ustar00rootroot00000000000000getChildForPrincipal(array( 'uri' => 'principals/admin', )); $this->assertInstanceOf('Sabre\\CalDAV\\Principal\\User', $r); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Principal/ProxyReadTest.php000066400000000000000000000040501246001162500241020ustar00rootroot00000000000000 'principal/user', )); $this->backend = $backend; return $principal; } function testGetName() { $i = $this->getInstance(); $this->assertEquals('calendar-proxy-read', $i->getName()); } function testGetDisplayName() { $i = $this->getInstance(); $this->assertEquals('calendar-proxy-read', $i->getDisplayName()); } function testGetLastModified() { $i = $this->getInstance(); $this->assertNull($i->getLastModified()); } /** * @expectedException Sabre\DAV\Exception\Forbidden */ function testDelete() { $i = $this->getInstance(); $i->delete(); } /** * @expectedException Sabre\DAV\Exception\Forbidden */ function testSetName() { $i = $this->getInstance(); $i->setName('foo'); } function testGetAlternateUriSet() { $i = $this->getInstance(); $this->assertEquals(array(), $i->getAlternateUriSet()); } function testGetPrincipalUri() { $i = $this->getInstance(); $this->assertEquals('principal/user/calendar-proxy-read', $i->getPrincipalUrl()); } function testGetGroupMemberSet() { $i = $this->getInstance(); $this->assertEquals(array(), $i->getGroupMemberSet()); } function testGetGroupMembership() { $i = $this->getInstance(); $this->assertEquals(array(), $i->getGroupMembership()); } function testSetGroupMemberSet() { $i = $this->getInstance(); $i->setGroupMemberSet(array('principals/foo')); $expected = array( $i->getPrincipalUrl() => array('principals/foo') ); $this->assertEquals($expected, $this->backend->groupMembers); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Principal/ProxyWriteTest.php000066400000000000000000000015021246001162500243200ustar00rootroot00000000000000 'principal/user', )); $this->backend = $backend; return $principal; } function testGetName() { $i = $this->getInstance(); $this->assertEquals('calendar-proxy-write', $i->getName()); } function testGetDisplayName() { $i = $this->getInstance(); $this->assertEquals('calendar-proxy-write', $i->getDisplayName()); } function testGetPrincipalUri() { $i = $this->getInstance(); $this->assertEquals('principal/user/calendar-proxy-write', $i->getPrincipalUrl()); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Principal/UserTest.php000066400000000000000000000060571246001162500231140ustar00rootroot00000000000000addPrincipal(array( 'uri' => 'principals/user/calendar-proxy-read', )); $backend->addPrincipal(array( 'uri' => 'principals/user/calendar-proxy-write', )); $backend->addPrincipal(array( 'uri' => 'principals/user/random', )); return new User($backend, array( 'uri' => 'principals/user', )); } /** * @expectedException Sabre\DAV\Exception\Forbidden */ function testCreateFile() { $u = $this->getInstance(); $u->createFile('test'); } /** * @expectedException Sabre\DAV\Exception\Forbidden */ function testCreateDirectory() { $u = $this->getInstance(); $u->createDirectory('test'); } function testGetChildProxyRead() { $u = $this->getInstance(); $child = $u->getChild('calendar-proxy-read'); $this->assertInstanceOf('Sabre\\CalDAV\\Principal\\ProxyRead', $child); } function testGetChildProxyWrite() { $u = $this->getInstance(); $child = $u->getChild('calendar-proxy-write'); $this->assertInstanceOf('Sabre\\CalDAV\\Principal\\ProxyWrite', $child); } /** * @expectedException Sabre\DAV\Exception\NotFound */ function testGetChildNotFound() { $u = $this->getInstance(); $child = $u->getChild('foo'); } /** * @expectedException Sabre\DAV\Exception\NotFound */ function testGetChildNotFound2() { $u = $this->getInstance(); $child = $u->getChild('random'); } function testGetChildren() { $u = $this->getInstance(); $children = $u->getChildren(); $this->assertEquals(2, count($children)); $this->assertInstanceOf('Sabre\\CalDAV\\Principal\\ProxyRead', $children[0]); $this->assertInstanceOf('Sabre\\CalDAV\\Principal\\ProxyWrite', $children[1]); } function testChildExist() { $u = $this->getInstance(); $this->assertTrue($u->childExists('calendar-proxy-read')); $this->assertTrue($u->childExists('calendar-proxy-write')); $this->assertFalse($u->childExists('foo')); } function testGetACL() { $expected = array( array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user/calendar-proxy-read', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user/calendar-proxy-write', 'protected' => true, ), ); $u = $this->getInstance(); $this->assertEquals($expected, $u->getACL()); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Property/000077500000000000000000000000001246001162500205205ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/CalDAV/Property/AllowedSharingModesTest.php000066400000000000000000000020251246001162500257630ustar00rootroot00000000000000createElement('d:root'); $root->setAttribute('xmlns:d','DAV:'); $root->setAttribute('xmlns:cal',CalDAV\Plugin::NS_CALDAV); $root->setAttribute('xmlns:cs',CalDAV\Plugin::NS_CALENDARSERVER); $doc->appendChild($root); $server = new DAV\Server(); $property->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . '' . '' . ' ', $xml); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Property/InviteTest.php000066400000000000000000000130141246001162500233260ustar00rootroot00000000000000 'mailto:user1@example.org', 'status' => CalDAV\SharingPlugin::STATUS_ACCEPTED, 'readOnly' => false, ), array( 'href' => 'mailto:user2@example.org', 'commonName' => 'John Doe', 'status' => CalDAV\SharingPlugin::STATUS_DECLINED, 'readOnly' => true, ), array( 'href' => 'mailto:user3@example.org', 'commonName' => 'Joe Shmoe', 'status' => CalDAV\SharingPlugin::STATUS_NORESPONSE, 'readOnly' => true, 'summary' => 'Something, something', ), array( 'href' => 'mailto:user4@example.org', 'commonName' => 'Hoe Boe', 'status' => CalDAV\SharingPlugin::STATUS_INVALID, 'readOnly' => true, ), ), array( 'href' => 'mailto:thedoctor@example.org', 'commonName' => 'The Doctor', 'firstName' => 'The', 'lastName' => 'Doctor', )); $doc = new \DOMDocument(); $doc->formatOutput = true; $root = $doc->createElement('d:root'); $root->setAttribute('xmlns:d','DAV:'); $root->setAttribute('xmlns:cal',CalDAV\Plugin::NS_CALDAV); $root->setAttribute('xmlns:cs',CalDAV\Plugin::NS_CALENDARSERVER); $doc->appendChild($root); $server = new DAV\Server(); $property->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' mailto:thedoctor@example.org The Doctor The Doctor mailto:user1@example.org mailto:user2@example.org John Doe mailto:user3@example.org Joe Shmoe Something, something mailto:user4@example.org Hoe Boe ', $xml); } /** * @depends testSerialize */ public function testUnserialize() { $input = array( array( 'href' => 'mailto:user1@example.org', 'status' => CalDAV\SharingPlugin::STATUS_ACCEPTED, 'readOnly' => false, 'commonName' => '', 'summary' => '', ), array( 'href' => 'mailto:user2@example.org', 'commonName' => 'John Doe', 'status' => CalDAV\SharingPlugin::STATUS_DECLINED, 'readOnly' => true, 'summary' => '', ), array( 'href' => 'mailto:user3@example.org', 'commonName' => 'Joe Shmoe', 'status' => CalDAV\SharingPlugin::STATUS_NORESPONSE, 'readOnly' => true, 'summary' => 'Something, something', ), array( 'href' => 'mailto:user4@example.org', 'commonName' => 'Hoe Boe', 'status' => CalDAV\SharingPlugin::STATUS_INVALID, 'readOnly' => true, 'summary' => '', ), ); // Creating the xml $doc = new \DOMDocument(); $doc->formatOutput = true; $root = $doc->createElement('d:root'); $root->setAttribute('xmlns:d','DAV:'); $root->setAttribute('xmlns:cal',CalDAV\Plugin::NS_CALDAV); $root->setAttribute('xmlns:cs',CalDAV\Plugin::NS_CALENDARSERVER); $doc->appendChild($root); $server = new DAV\Server(); $inputProperty = new Invite($input); $inputProperty->serialize($server, $root); $xml = $doc->saveXML(); // Parsing it again $doc2 = DAV\XMLUtil::loadDOMDocument($xml); $outputProperty = Invite::unserialize($doc2->firstChild); $this->assertEquals($input, $outputProperty->getValue()); } /** * @expectedException Sabre\DAV\Exception */ function testUnserializeNoStatus() { $xml = ' mailto:user1@example.org '; $doc2 = DAV\XMLUtil::loadDOMDocument($xml); $outputProperty = Invite::unserialize($doc2->firstChild); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Property/ScheduleCalendarTranspTest.php000066400000000000000000000042001246001162500264430ustar00rootroot00000000000000assertEquals('transparent', $sccs->getValue()); } /** * @expectedException InvalidArgumentException */ function testBadArg() { $sccs = new ScheduleCalendarTransp('foo'); } function values() { return array( array('transparent'), array('opaque'), ); } /** * @depends testSimple * @dataProvider values */ function testSerialize($value) { $property = new ScheduleCalendarTransp($value); $doc = new \DOMDocument(); $root = $doc->createElement('d:root'); $root->setAttribute('xmlns:d','DAV:'); $root->setAttribute('xmlns:cal',CalDAV\Plugin::NS_CALDAV); $doc->appendChild($root); $server = new DAV\Server(); $property->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . '' . ' ', $xml); } /** * @depends testSimple * @dataProvider values */ function testUnserializer($value) { $xml = ' ' . '' . ''; $dom = DAV\XMLUtil::loadDOMDocument($xml); $property = ScheduleCalendarTransp::unserialize($dom->firstChild); $this->assertTrue($property instanceof ScheduleCalendarTransp); $this->assertEquals($value, $property->getValue()); } /** * @depends testSimple */ function testUnserializerBadData() { $xml = ' ' . '' . ''; $dom = DAV\XMLUtil::loadDOMDocument($xml); $this->assertNull(ScheduleCalendarTransp::unserialize($dom->firstChild)); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Property/SupportedCalendarComponentSetTest.php000066400000000000000000000032011246001162500300430ustar00rootroot00000000000000assertEquals(array('VEVENT'), $sccs->getValue()); } /** * @depends testSimple */ function testSerialize() { $property = new SupportedCalendarComponentSet(array('VEVENT','VJOURNAL')); $doc = new \DOMDocument(); $root = $doc->createElement('d:root'); $root->setAttribute('xmlns:d','DAV:'); $root->setAttribute('xmlns:cal',\Sabre\CalDAV\Plugin::NS_CALDAV); $doc->appendChild($root); $server = new \Sabre\DAV\Server(); $property->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . '' . '' . ' ', $xml); } /** * @depends testSimple */ function testUnserializer() { $xml = ' ' . '' . '' . ''; $dom = \Sabre\DAV\XMLUtil::loadDOMDocument($xml); $property = SupportedCalendarComponentSet::unserialize($dom->firstChild); $this->assertTrue($property instanceof SupportedCalendarComponentSet); $this->assertEquals(array( 'VEVENT', 'VJOURNAL', ), $property->getValue()); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Property/SupportedCalendarDataTest.php000066400000000000000000000016341246001162500263060ustar00rootroot00000000000000createElement('d:root'); $root->setAttribute('xmlns:d','DAV:'); $root->setAttribute('xmlns:cal',CalDAV\Plugin::NS_CALDAV); $doc->appendChild($root); $server = new DAV\Server(); $property->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . '' . ' ', $xml); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Property/SupportedCollationSetTest.php000066400000000000000000000020461246001162500264010ustar00rootroot00000000000000createElement('d:root'); $root->setAttribute('xmlns:d','DAV:'); $root->setAttribute('xmlns:cal',CalDAV\Plugin::NS_CALDAV); $doc->appendChild($root); $server = new DAV\Server(); $property->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . 'i;ascii-casemap' . 'i;octet' . 'i;unicode-casemap' . ' ', $xml); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Schedule/000077500000000000000000000000001246001162500204305ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/CalDAV/Schedule/IMip/000077500000000000000000000000001246001162500212665ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/CalDAV/Schedule/IMip/Mock.php000066400000000000000000000023711246001162500226730ustar00rootroot00000000000000emails[] = array( 'to' => $to, 'subject' => $subject, 'body' => $body, 'headers' => $headers, ); } public function getSentEmails() { return $this->emails; } } sabre-dav-1.8.12/tests/Sabre/CalDAV/Schedule/OutboxTest.php000066400000000000000000000036371246001162500232720ustar00rootroot00000000000000assertEquals('outbox', $outbox->getName()); $this->assertEquals(array(), $outbox->getChildren()); $this->assertEquals('principals/user1', $outbox->getOwner()); $this->assertEquals(null, $outbox->getGroup()); $this->assertEquals(array( array( 'privilege' => '{' . CalDAV\Plugin::NS_CALDAV . '}schedule-query-freebusy', 'principal' => 'principals/user1', 'protected' => true, ), array( 'privilege' => '{' . CalDAV\Plugin::NS_CALDAV . '}schedule-post-vevent', 'principal' => 'principals/user1', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user1', 'protected' => true, ), ), $outbox->getACL()); $ok = false; try { $outbox->setACL(array()); } catch (DAV\Exception\MethodNotAllowed $e) { $ok = true; } if (!$ok) { $this->fail('Exception was not emitted'); } } function testGetSupportedPrivilegeSet() { $outbox = new Outbox('principals/user1'); $r = $outbox->getSupportedPrivilegeSet(); $ok = 0; foreach($r['aggregates'] as $priv) { if ($priv['privilege'] == '{' . CalDAV\Plugin::NS_CALDAV . '}schedule-query-freebusy') { $ok++; } if ($priv['privilege'] == '{' . CalDAV\Plugin::NS_CALDAV . '}schedule-post-vevent') { $ok++; } } $this->assertEquals(2, $ok, "We're missing one or more privileges"); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/ShareableCalendarTest.php000066400000000000000000000027041246001162500235700ustar00rootroot00000000000000 1, ); $this->backend = new Backend\Mock( array($props), array(), array() ); $this->backend->updateShares(1, array( array( 'href' => 'mailto:removeme@example.org', 'commonName' => 'To be removed', 'readOnly' => true, ), ), array()); $this->instance = new ShareableCalendar($this->backend, $props); } function testUpdateShares() { $this->instance->updateShares(array( array( 'href' => 'mailto:test@example.org', 'commonName' => 'Foo Bar', 'summary' => 'Booh', 'readOnly' => false, ), ), array('mailto:removeme@example.org')); $this->assertEquals(array(array( 'href' => 'mailto:test@example.org', 'commonName' => 'Foo Bar', 'summary' => 'Booh', 'readOnly' => false, 'status' => SharingPlugin::STATUS_NORESPONSE, )), $this->instance->getShares()); } function testPublish() { $this->instance->setPublishStatus(true); $this->instance->setPublishStatus(false); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/SharedCalendarTest.php000066400000000000000000000067721246001162500231210ustar00rootroot00000000000000 1, '{http://calendarserver.org/ns/}shared-url' => 'calendars/owner/original', '{http://sabredav.org/ns}owner-principal' => 'principals/owner', '{http://sabredav.org/ns}read-only' => false, 'principaluri' => 'principals/sharee', ); } $this->backend = new Backend\Mock( array($props), array(), array() ); $this->backend->updateShares(1, array( array( 'href' => 'mailto:removeme@example.org', 'commonName' => 'To be removed', 'readOnly' => true, ), ), array()); return new SharedCalendar($this->backend, $props); } function testGetSharedUrl() { $this->assertEquals('calendars/owner/original', $this->getInstance()->getSharedUrl()); } function testGetShares() { $this->assertEquals(array(array( 'href' => 'mailto:removeme@example.org', 'commonName' => 'To be removed', 'readOnly' => true, 'status' => SharingPlugin::STATUS_NORESPONSE, )), $this->getInstance()->getShares()); } function testGetOwner() { $this->assertEquals('principals/owner', $this->getInstance()->getOwner()); } function testGetACL() { $expected = array( array( 'privilege' => '{DAV:}read', 'principal' => 'principals/owner', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => 'principals/owner', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => 'principals/owner/calendar-proxy-write', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => 'principals/owner/calendar-proxy-write', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => 'principals/owner/calendar-proxy-read', 'protected' => true, ), array( 'privilege' => '{' . Plugin::NS_CALDAV . '}read-free-busy', 'principal' => '{DAV:}authenticated', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => 'principals/sharee', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => 'principals/sharee', 'protected' => true, ), ); $this->assertEquals($expected, $this->getInstance()->getACL()); } /** * @expectedException InvalidArgumentException */ public function testCreateInstanceMissingArg() { $this->getInstance(array( 'id' => 1, '{http://calendarserver.org/ns/}shared-url' => 'calendars/owner/original', '{http://sabredav.org/ns}read-only' => false, 'principaluri' => 'principals/sharee', )); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/SharingPluginTest.php000066400000000000000000000266261246001162500230330ustar00rootroot00000000000000caldavCalendars = array( array( 'principaluri' => 'principals/user1', 'id' => 1, 'uri' => 'cal1', ), array( 'principaluri' => 'principals/user1', 'id' => 2, 'uri' => 'cal2', '{' . Plugin::NS_CALENDARSERVER . '}shared-url' => 'calendars/user1/cal2', '{http://sabredav.org/ns}owner-principal' => 'principals/user2', '{http://sabredav.org/ns}read-only' => 'true', ), array( 'principaluri' => 'principals/user1', 'id' => 3, 'uri' => 'cal3', ), ); parent::setUp(); // Making the logged in user an admin, for full access: $this->aclPlugin->adminPrincipals[] = 'principals/user1'; $this->aclPlugin->adminPrincipals[] = 'principals/user2'; } function testSimple() { $this->assertInstanceOf('Sabre\\CalDAV\\SharingPlugin', $this->server->getPlugin('caldav-sharing')); } function testGetFeatures() { $this->assertEquals(array('calendarserver-sharing'), $this->caldavSharingPlugin->getFeatures()); } function testBeforeGetShareableCalendar() { // Forcing the server to authenticate: $this->authPlugin->beforeMethod('GET',''); $props = $this->server->getProperties('calendars/user1/cal1', array( '{' . Plugin::NS_CALENDARSERVER . '}invite', '{' . Plugin::NS_CALENDARSERVER . '}allowed-sharing-modes', )); $this->assertInstanceOf('Sabre\\CalDAV\\Property\\Invite', $props['{' . Plugin::NS_CALENDARSERVER . '}invite']); $this->assertInstanceOf('Sabre\\CalDAV\\Property\\AllowedSharingModes', $props['{' . Plugin::NS_CALENDARSERVER . '}allowed-sharing-modes']); } function testBeforeGetSharedCalendar() { $props = $this->server->getProperties('calendars/user1/cal2', array( '{' . Plugin::NS_CALENDARSERVER . '}shared-url', '{' . Plugin::NS_CALENDARSERVER . '}invite', )); $this->assertInstanceOf('Sabre\\CalDAV\\Property\\Invite', $props['{' . Plugin::NS_CALENDARSERVER . '}invite']); $this->assertInstanceOf('Sabre\\DAV\\Property\\IHref', $props['{' . Plugin::NS_CALENDARSERVER . '}shared-url']); } function testUpdateProperties() { $this->caldavBackend->updateShares(1, array( array( 'href' => 'mailto:joe@example.org', ), ), array() ); $result = $this->server->updateProperties('calendars/user1/cal1', array( '{DAV:}resourcetype' => new DAV\Property\ResourceType(array('{DAV:}collection')) )); $this->assertEquals(array( 200 => array( '{DAV:}resourcetype' => null, ), 'href' => 'calendars/user1/cal1', ), $result); $this->assertEquals(0, count($this->caldavBackend->getShares(1))); } function testUpdatePropertiesPassThru() { $result = $this->server->updateProperties('calendars/user1/cal3', array( '{DAV:}foo' => 'bar', )); $this->assertEquals(array( 403 => array( '{DAV:}foo' => null, ), 'href' => 'calendars/user1/cal3', ), $result); } function testUnknownMethodNoPOST() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PATCH', 'REQUEST_URI' => '/', )); $response = $this->request($request); $this->assertEquals('HTTP/1.1 501 Not Implemented', $response->status, $response->body); } function testUnknownMethodNoXML() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/', 'CONTENT_TYPE' => 'text/plain', )); $response = $this->request($request); $this->assertEquals('HTTP/1.1 501 Not Implemented', $response->status, $response->body); } function testUnknownMethodNoNode() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/foo', 'CONTENT_TYPE' => 'text/xml', )); $response = $this->request($request); $this->assertEquals('HTTP/1.1 501 Not Implemented', $response->status, $response->body); } function testShareRequest() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/cal1', 'CONTENT_TYPE' => 'text/xml', )); $xml = << mailto:joe@example.org Joe Shmoe mailto:nancy@example.org RRR; $request->setBody($xml); $response = $this->request($request); $this->assertEquals('HTTP/1.1 200 OK', $response->status, $response->body); $this->assertEquals(array(array( 'href' => 'mailto:joe@example.org', 'commonName' => 'Joe Shmoe', 'readOnly' => false, 'status' => SharingPlugin::STATUS_NORESPONSE, 'summary' => '', )), $this->caldavBackend->getShares(1)); // Verifying that the calendar is now marked shared. $props = $this->server->getProperties('calendars/user1/cal1', array('{DAV:}resourcetype')); $this->assertTrue( $props['{DAV:}resourcetype']->is('{http://calendarserver.org/ns/}shared-owner') ); } function testShareRequestNoShareableCalendar() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/cal2', 'CONTENT_TYPE' => 'text/xml', )); $xml = ' mailto:joe@example.org Joe Shmoe mailto:nancy@example.org '; $request->setBody($xml); $response = $this->request($request); $this->assertEquals('HTTP/1.1 501 Not Implemented', $response->status, $response->body); } function testInviteReply() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1', 'CONTENT_TYPE' => 'text/xml', )); $xml = ' /principals/owner '; $request->setBody($xml); $response = $this->request($request); $this->assertEquals('HTTP/1.1 200 OK', $response->status, $response->body); } function testInviteBadXML() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1', 'CONTENT_TYPE' => 'text/xml', )); $xml = ' '; $request->setBody($xml); $response = $this->request($request); $this->assertEquals('HTTP/1.1 400 Bad request', $response->status, $response->body); } function testInviteWrongUrl() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/cal1', 'CONTENT_TYPE' => 'text/xml', )); $xml = ' /principals/owner '; $request->setBody($xml); $response = $this->request($request); $this->assertEquals('HTTP/1.1 501 Not Implemented', $response->status, $response->body); // If the plugin did not handle this request, it must ensure that the // body is still accessible by other plugins. $this->assertEquals($xml, $request->getBody(true)); } function testPublish() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/cal1', 'CONTENT_TYPE' => 'text/xml', )); $xml = ' '; $request->setBody($xml); $response = $this->request($request); $this->assertEquals('HTTP/1.1 202 Accepted', $response->status, $response->body); } function testUnpublish() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/cal1', 'CONTENT_TYPE' => 'text/xml', )); $xml = ' '; $request->setBody($xml); $response = $this->request($request); $this->assertEquals('HTTP/1.1 200 OK', $response->status, $response->body); } function testPublishWrongUrl() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/cal2', 'CONTENT_TYPE' => 'text/xml', )); $xml = ' '; $request->setBody($xml); $response = $this->request($request); $this->assertEquals('HTTP/1.1 501 Not Implemented', $response->status, $response->body); } function testUnpublishWrongUrl() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/cal2', 'CONTENT_TYPE' => 'text/xml', )); $xml = ' '; $request->setBody($xml); $response = $this->request($request); $this->assertEquals('HTTP/1.1 501 Not Implemented', $response->status, $response->body); } function testUnknownXmlDoc() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'POST', 'REQUEST_URI' => '/calendars/user1/cal2', 'CONTENT_TYPE' => 'text/xml', )); $xml = ' '; $request->setBody($xml); $response = $this->request($request); $this->assertEquals('HTTP/1.1 501 Not Implemented', $response->status, $response->body); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/TestUtil.php000066400000000000000000000144451246001162500211720ustar00rootroot00000000000000setAttribute(\PDO::ATTR_ERRMODE,\PDO::ERRMODE_EXCEPTION); // Yup this is definitely not 'fool proof', but good enough for now. $queries = explode(';', file_get_contents(__DIR__ . '/../../../examples/sql/sqlite.calendars.sql')); foreach($queries as $query) { $pdo->exec($query); } // Inserting events through a backend class. $backend = new Backend\PDO($pdo); $calendarId = $backend->createCalendar( 'principals/user1', 'UUID-123467', array( '{DAV:}displayname' => 'user1 calendar', '{urn:ietf:params:xml:ns:caldav}calendar-description' => 'Calendar description', '{http://apple.com/ns/ical/}calendar-order' => '1', '{http://apple.com/ns/ical/}calendar-color' => '#FF0000', ) ); $backend->createCalendar( 'principals/user1', 'UUID-123468', array( '{DAV:}displayname' => 'user1 calendar2', '{urn:ietf:params:xml:ns:caldav}calendar-description' => 'Calendar description', '{http://apple.com/ns/ical/}calendar-order' => '1', '{http://apple.com/ns/ical/}calendar-color' => '#FF0000', ) ); $backend->createCalendarObject($calendarId, 'UUID-2345', self::getTestCalendarData()); return $pdo; } static function getTestCalendarData($type = 1) { $calendarData = 'BEGIN:VCALENDAR VERSION:2.0 PRODID:-//Apple Inc.//iCal 4.0.1//EN CALSCALE:GREGORIAN BEGIN:VTIMEZONE TZID:Asia/Seoul BEGIN:DAYLIGHT TZOFFSETFROM:+0900 RRULE:FREQ=YEARLY;UNTIL=19880507T150000Z;BYMONTH=5;BYDAY=2SU DTSTART:19870510T000000 TZNAME:GMT+09:00 TZOFFSETTO:+1000 END:DAYLIGHT BEGIN:STANDARD TZOFFSETFROM:+1000 DTSTART:19881009T000000 TZNAME:GMT+09:00 TZOFFSETTO:+0900 END:STANDARD END:VTIMEZONE BEGIN:VEVENT CREATED:20100225T154229Z UID:39A6B5ED-DD51-4AFE-A683-C35EE3749627 TRANSP:TRANSPARENT SUMMARY:Something here DTSTAMP:20100228T130202Z'; switch($type) { case 1 : $calendarData.="\nDTSTART;TZID=Asia/Seoul:20100223T060000\nDTEND;TZID=Asia/Seoul:20100223T070000\n"; break; case 2 : $calendarData.="\nDTSTART:20100223T060000\nDTEND:20100223T070000\n"; break; case 3 : $calendarData.="\nDTSTART;VALUE=DATE:20100223\nDTEND;VALUE=DATE:20100223\n"; break; case 4 : $calendarData.="\nDTSTART;TZID=Asia/Seoul:20100223T060000\nDURATION:PT1H\n"; break; case 5 : $calendarData.="\nDTSTART;TZID=Asia/Seoul:20100223T060000\nDURATION:-P5D\n"; break; case 6 : $calendarData.="\nDTSTART;VALUE=DATE:20100223\n"; break; case 7 : $calendarData.="\nDTSTART;VALUE=DATETIME:20100223T060000\n"; break; // No DTSTART, so intentionally broken case 'X' : $calendarData.="\n"; break; } $calendarData.='ATTENDEE;PARTSTAT=NEEDS-ACTION:mailto:lisa@example.com SEQUENCE:2 END:VEVENT END:VCALENDAR'; return $calendarData; } static function getTestTODO($type = 'due') { switch($type) { case 'due' : $extra = "DUE:20100104T000000Z"; break; case 'due2' : $extra = "DUE:20060104T000000Z"; break; case 'due_date' : $extra = "DUE;VALUE=DATE:20060104"; break; case 'due_tz' : $extra = "DUE;TZID=Asia/Seoul:20060104T000000Z"; break; case 'due_dtstart' : $extra = "DTSTART:20050223T060000Z\nDUE:20060104T000000Z"; break; case 'due_dtstart2' : $extra = "DTSTART:20090223T060000Z\nDUE:20100104T000000Z"; break; case 'dtstart' : $extra = 'DTSTART:20100223T060000Z'; break; case 'dtstart2' : $extra = 'DTSTART:20060223T060000Z'; break; case 'dtstart_date' : $extra = 'DTSTART;VALUE=DATE:20100223'; break; case 'dtstart_tz' : $extra = 'DTSTART;TZID=Asia/Seoul:20100223T060000Z'; break; case 'dtstart_duration' : $extra = "DTSTART:20061023T060000Z\nDURATION:PT1H"; break; case 'dtstart_duration2' : $extra = "DTSTART:20101023T060000Z\nDURATION:PT1H"; break; case 'completed' : $extra = 'COMPLETED:20060601T000000Z'; break; case 'completed2' : $extra = 'COMPLETED:20090601T000000Z'; break; case 'created' : $extra = 'CREATED:20060601T000000Z'; break; case 'created2' : $extra = 'CREATED:20090601T000000Z'; break; case 'completedcreated' : $extra = "CREATED:20060601T000000Z\nCOMPLETED:20070101T000000Z"; break; case 'completedcreated2' : $extra = "CREATED:20090601T000000Z\nCOMPLETED:20100101T000000Z"; break; case 'notime' : $extra = 'X-FILLER:oh hello'; break; default : throw new Exception('Unknown type: ' . $type); } $todo = 'BEGIN:VCALENDAR VERSION:2.0 PRODID:-//Example Corp.//CalDAV Client//EN BEGIN:VTODO DTSTAMP:20060205T235335Z ' . $extra . ' STATUS:NEEDS-ACTION SUMMARY:Task #1 UID:DDDEEB7915FA61233B861457@example.com BEGIN:VALARM ACTION:AUDIO TRIGGER;RELATED=START:-PT10M END:VALARM END:VTODO END:VCALENDAR'; return $todo; } } sabre-dav-1.8.12/tests/Sabre/CalDAV/UserCalendarsSharedCalendarsTest.php000066400000000000000000000045341246001162500257520ustar00rootroot00000000000000 1, 'principaluri' => 'principals/user1', ), array( 'id' => 2, '{http://calendarserver.org/ns/}shared-url' => 'calendars/owner/cal1', '{http://sabredav.org/ns}owner-principal' => 'principal/owner', '{http://sabredav.org/ns}read-only' => false, 'principaluri' => 'principals/user1', ), ); $this->backend = new Backend\Mock( $calendars, array(), array() ); return new UserCalendars($this->backend, array( 'uri' => 'principals/user1' )); } function testSimple() { $instance = $this->getInstance(); $this->assertEquals('user1', $instance->getName()); } function testGetChildren() { $instance = $this->getInstance(); $children = $instance->getChildren(); $this->assertEquals(4, count($children)); // Testing if we got all the objects back. $hasShareable = false; $hasShared = false; $hasOutbox = false; $hasNotifications = false; foreach($children as $child) { if ($child instanceof IShareableCalendar) { $hasShareable = true; } if ($child instanceof ISharedCalendar) { $hasShared = true; } if ($child instanceof Schedule\IOutbox) { $hasOutbox = true; } if ($child instanceof Notifications\ICollection) { $hasNotifications = true; } } if (!$hasShareable) $this->fail('Missing node!'); if (!$hasShared) $this->fail('Missing node!'); if (!$hasOutbox) $this->fail('Missing node!'); if (!$hasNotifications) $this->fail('Missing node!'); } function testShareReply() { $instance = $this->getInstance(); $instance->shareReply('uri', SharingPlugin::STATUS_DECLINED, 'curi', '1'); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/UserCalendarsTest.php000066400000000000000000000114011246001162500227750ustar00rootroot00000000000000markTestSkipped('SQLite driver is not available'); $this->backend = TestUtil::getBackend(); $this->usercalendars = new UserCalendars($this->backend, array( 'uri' => 'principals/user1' )); } function testSimple() { $this->assertEquals('user1',$this->usercalendars->getName()); } /** * @expectedException Sabre\DAV\Exception\NotFound * @depends testSimple */ function testGetChildNotFound() { $this->usercalendars->getChild('randomname'); } function testChildExists() { $this->assertFalse($this->usercalendars->childExists('foo')); $this->assertTrue($this->usercalendars->childExists('UUID-123467')); } function testGetOwner() { $this->assertEquals('principals/user1', $this->usercalendars->getOwner()); } function testGetGroup() { $this->assertNull($this->usercalendars->getGroup()); } function testGetACL() { $expected = array( array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user1', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => 'principals/user1', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user1/calendar-proxy-write', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => 'principals/user1/calendar-proxy-write', 'protected' => true, ), array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user1/calendar-proxy-read', 'protected' => true, ), ); $this->assertEquals($expected, $this->usercalendars->getACL()); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testSetACL() { $this->usercalendars->setACL(array()); } /** * @expectedException Sabre\DAV\Exception\Forbidden * @depends testSimple */ function testSetName() { $this->usercalendars->setName('bla'); } /** * @expectedException Sabre\DAV\Exception\Forbidden * @depends testSimple */ function testDelete() { $this->usercalendars->delete(); } /** * @depends testSimple */ function testGetLastModified() { $this->assertNull($this->usercalendars->getLastModified()); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed * @depends testSimple */ function testCreateFile() { $this->usercalendars->createFile('bla'); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed * @depends testSimple */ function testCreateDirectory() { $this->usercalendars->createDirectory('bla'); } /** * @depends testSimple */ function testCreateExtendedCollection() { $result = $this->usercalendars->createExtendedCollection('newcalendar', array('{DAV:}collection', '{urn:ietf:params:xml:ns:caldav}calendar'), array()); $this->assertNull($result); $cals = $this->backend->getCalendarsForUser('principals/user1'); $this->assertEquals(3,count($cals)); } /** * @expectedException Sabre\DAV\Exception\InvalidResourceType * @depends testSimple */ function testCreateExtendedCollectionBadResourceType() { $this->usercalendars->createExtendedCollection('newcalendar', array('{DAV:}collection','{DAV:}blabla'), array()); } /** * @expectedException Sabre\DAV\Exception\InvalidResourceType * @depends testSimple */ function testCreateExtendedCollectionNotACalendar() { $this->usercalendars->createExtendedCollection('newcalendar', array('{DAV:}collection'), array()); } function testGetSupportedPrivilegesSet() { $this->assertNull($this->usercalendars->getSupportedPrivilegeSet()); } /** * @expectedException Sabre\DAV\Exception\NotImplemented */ function testShareReplyFail() { $this->usercalendars->shareReply('uri', SharingPlugin::STATUS_DECLINED, 'curi', '1'); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/ValidateICalTest.php000066400000000000000000000205171246001162500225340ustar00rootroot00000000000000 'calendar1', 'principaluri' => 'principals/admin', 'uri' => 'calendar1', '{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set' => new Property\SupportedCalendarComponentSet( array('VEVENT','VTODO','VJOURNAL') ), ), array( 'id' => 'calendar2', 'principaluri' => 'principals/admin', 'uri' => 'calendar2', '{urn:ietf:params:xml:ns:caldav}supported-calendar-component-set' => new Property\SupportedCalendarComponentSet( array('VTODO','VJOURNAL') ), ) ); $this->calBackend = new Backend\Mock($calendars,array()); $principalBackend = new DAVACL\PrincipalBackend\Mock(); $tree = array( new CalendarRootNode($principalBackend, $this->calBackend), ); $this->server = new DAV\Server($tree); $this->server->debugExceptions = true; $plugin = new Plugin(); $this->server->addPlugin($plugin); $response = new HTTP\ResponseMock(); $this->server->httpResponse = $response; } function request(HTTP\Request $request) { $this->server->httpRequest = $request; $this->server->exec(); return $this->server->httpResponse; } function testCreateFile() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/calendars/admin/calendar1/blabla.ics', )); $response = $this->request($request); $this->assertEquals('HTTP/1.1 415 Unsupported Media Type', $response->status); } function testCreateFileValid() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/calendars/admin/calendar1/blabla.ics', )); $request->setBody("BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nUID:foo\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"); $response = $this->request($request); $this->assertEquals('HTTP/1.1 201 Created', $response->status, 'Incorrect status returned! Full response body: ' . $response->body); $expected = array( 'uri' => 'blabla.ics', 'calendardata' => "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nUID:foo\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n", 'calendarid' => 'calendar1', ); $this->assertEquals($expected, $this->calBackend->getCalendarObject('calendar1','blabla.ics')); } function testCreateFileNoComponents() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/calendars/admin/calendar1/blabla.ics', )); $request->setBody("BEGIN:VCALENDAR\r\nEND:VCALENDAR\r\n"); $response = $this->request($request); $this->assertEquals('HTTP/1.1 400 Bad request', $response->status, 'Incorrect status returned! Full response body: ' . $response->body); } function testCreateFileNoUID() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/calendars/admin/calendar1/blabla.ics', )); $request->setBody("BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"); $response = $this->request($request); $this->assertEquals('HTTP/1.1 400 Bad request', $response->status, 'Incorrect status returned! Full response body: ' . $response->body); } function testCreateFileVCard() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/calendars/admin/calendar1/blabla.ics', )); $request->setBody("BEGIN:VCARD\r\nEND:VCARD\r\n"); $response = $this->request($request); $this->assertEquals('HTTP/1.1 415 Unsupported Media Type', $response->status, 'Incorrect status returned! Full response body: ' . $response->body); } function testCreateFile2Components() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/calendars/admin/calendar1/blabla.ics', )); $request->setBody("BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nUID:foo\r\nEND:VEVENT\r\nBEGIN:VJOURNAL\r\nUID:foo\r\nEND:VJOURNAL\r\nEND:VCALENDAR\r\n"); $response = $this->request($request); $this->assertEquals('HTTP/1.1 400 Bad request', $response->status, 'Incorrect status returned! Full response body: ' . $response->body); } function testCreateFile2UIDS() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/calendars/admin/calendar1/blabla.ics', )); $request->setBody("BEGIN:VCALENDAR\r\nBEGIN:VTIMEZONE\r\nEND:VTIMEZONE\r\nBEGIN:VEVENT\r\nUID:foo\r\nEND:VEVENT\r\nBEGIN:VEVENT\r\nUID:bar\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"); $response = $this->request($request); $this->assertEquals('HTTP/1.1 400 Bad request', $response->status, 'Incorrect status returned! Full response body: ' . $response->body); } function testCreateFileWrongComponent() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/calendars/admin/calendar1/blabla.ics', )); $request->setBody("BEGIN:VCALENDAR\r\nBEGIN:VTIMEZONE\r\nEND:VTIMEZONE\r\nBEGIN:VFREEBUSY\r\nUID:foo\r\nEND:VFREEBUSY\r\nEND:VCALENDAR\r\n"); $response = $this->request($request); $this->assertEquals('HTTP/1.1 400 Bad request', $response->status, 'Incorrect status returned! Full response body: ' . $response->body); } function testUpdateFile() { $this->calBackend->createCalendarObject('calendar1','blabla.ics','foo'); $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/calendars/admin/calendar1/blabla.ics', )); $response = $this->request($request); $this->assertEquals('HTTP/1.1 415 Unsupported Media Type', $response->status); } function testUpdateFileParsableBody() { $this->calBackend->createCalendarObject('calendar1','blabla.ics','foo'); $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/calendars/admin/calendar1/blabla.ics', )); $body = "BEGIN:VCALENDAR\r\nBEGIN:VEVENT\r\nUID:foo\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"; $request->setBody($body); $response = $this->request($request); $this->assertEquals('HTTP/1.1 204 No Content', $response->status); $expected = array( 'uri' => 'blabla.ics', 'calendardata' => $body, 'calendarid' => 'calendar1', ); $this->assertEquals($expected, $this->calBackend->getCalendarObject('calendar1','blabla.ics')); } function testCreateFileInvalidComponent() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/calendars/admin/calendar2/blabla.ics', )); $request->setBody("BEGIN:VCALENDAR\r\nBEGIN:VTIMEZONE\r\nEND:VTIMEZONE\r\nBEGIN:VEVENT\r\nUID:foo\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"); $response = $this->request($request); $this->assertEquals('HTTP/1.1 403 Forbidden', $response->status, 'Incorrect status returned! Full response body: ' . $response->body); } function testUpdateFileInvalidComponent() { $this->calBackend->createCalendarObject('calendar2','blabla.ics','foo'); $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/calendars/admin/calendar2/blabla.ics', )); $request->setBody("BEGIN:VCALENDAR\r\nBEGIN:VTIMEZONE\r\nEND:VTIMEZONE\r\nBEGIN:VEVENT\r\nUID:foo\r\nEND:VEVENT\r\nEND:VCALENDAR\r\n"); $response = $this->request($request); $this->assertEquals('HTTP/1.1 403 Forbidden', $response->status, 'Incorrect status returned! Full response body: ' . $response->body); } } sabre-dav-1.8.12/tests/Sabre/CalDAV/VersionTest.php000066400000000000000000000005121246001162500216700ustar00rootroot00000000000000assertEquals(-1, version_compare('1.0.0',$v)); $s = Version::STABILITY; $this->assertTrue($s == 'alpha' || $s == 'beta' || $s =='stable'); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/000077500000000000000000000000001246001162500170465ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/CardDAV/AbstractPluginTest.php000066400000000000000000000016141246001162500233430ustar00rootroot00000000000000backend = new Backend\Mock(); $principalBackend = new DAVACL\PrincipalBackend\Mock(); $tree = array( new AddressBookRoot($principalBackend, $this->backend), new DAVACL\PrincipalCollection($principalBackend) ); $this->plugin = new Plugin(); $this->plugin->directories = array('directory'); $this->server = new DAV\Server($tree); $this->server->addPlugin($this->plugin); $this->server->debugExceptions = true; } } sabre-dav-1.8.12/tests/Sabre/CardDAV/AddressBookQueryParserTest.php000066400000000000000000000236651246001162500250360ustar00rootroot00000000000000parse(); return $q; } function testFilterBasic() { $xml = array( '', '', ' ', ' ', ' ', ' ', ' ', ' ', '' ); $q = $this->parse($xml); $this->assertEquals( array('{DAV:}foo'), $q->requestedProperties ); $this->assertEquals( array( array( 'name' => 'NICKNAME', 'test' => 'anyof', 'is-not-defined' => false, 'param-filters' => array(), 'text-matches' => array(), ), ), $q->filters ); $this->assertNull($q->limit); $this->assertEquals('anyof', $q->test); } function testNoFilter() { // This is non-standard, but helps working around a KDE bug $xml = array( '', '', ' ', ' ', ' ', '' ); $q = $this->parse($xml); $this->assertEquals( array('{DAV:}foo'), $q->requestedProperties ); $this->assertEquals( array(), $q->filters ); $this->assertNull($q->limit); $this->assertEquals('anyof', $q->test); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testFilterDoubleFilter() { $xml = array( '', '', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', '' ); $q = $this->parse($xml); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testFilterCorruptTest() { $xml = array( '', '', ' ', ' ', ' ', ' ', ' ', ' ', '' ); $q = $this->parse($xml); } function testPropFilter() { $xml = array( '', '', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' 4', '' ); $q = $this->parse($xml); $this->assertEquals( array( array( 'name' => 'NICKNAME', 'test' => 'anyof', 'is-not-defined' => false, 'param-filters' => array(), 'text-matches' => array(), ), array( 'name' => 'EMAIL', 'test' => 'allof', 'is-not-defined' => false, 'param-filters' => array(), 'text-matches' => array(), ), array( 'name' => 'FN', 'test' => 'anyof', 'is-not-defined' => true, 'param-filters' => array(), 'text-matches' => array(), ), ), $q->filters ); $this->assertEquals(4,$q->limit); $this->assertEquals('allof', $q->test); } function testParamFilter() { $xml = array( '', '', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', ' ', '' ); $q = $this->parse($xml); $this->assertEquals( array( array( 'name' => 'NICKNAME', 'test' => 'anyof', 'is-not-defined' => false, 'param-filters' => array( array( 'name' => 'BLA', 'is-not-defined' => false, 'text-match' => null ), array( 'name' => 'BLA2', 'is-not-defined' => true, 'text-match' => null ), ), 'text-matches' => array(), ), ), $q->filters ); } function testTextMatch() { $xml = array( '', '', ' ', ' ', ' ', ' ', ' ', ' evert', ' evert', ' rene', ' e', ' ', ' foo', ' ', ' ', ' ', '' ); $q = $this->parse($xml); $this->assertEquals( array( array( 'name' => 'NICKNAME', 'test' => 'anyof', 'is-not-defined' => false, 'param-filters' => array( array( 'name' => 'BLA', 'is-not-defined' => false, 'text-match' => array( 'negate-condition' => false, 'collation' => 'i;unicode-casemap', 'match-type' => 'contains', 'value' => 'foo', ), ), ), 'text-matches' => array( array( 'negate-condition' => false, 'collation' => 'i;unicode-casemap', 'match-type' => 'contains', 'value' => 'evert', ), array( 'negate-condition' => false, 'collation' => 'i;octet', 'match-type' => 'contains', 'value' => 'evert', ), array( 'negate-condition' => true, 'collation' => 'i;unicode-casemap', 'match-type' => 'contains', 'value' => 'rene', ), array( 'negate-condition' => false, 'collation' => 'i;unicode-casemap', 'match-type' => 'starts-with', 'value' => 'e', ), ), ), ), $q->filters ); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testBadTextMatch() { $xml = array( '', '', ' ', ' ', ' ', ' ', ' ', ' evert', ' ', ' ', '' ); $q = $this->parse($xml); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/AddressBookQueryTest.php000066400000000000000000000122701246001162500236470ustar00rootroot00000000000000 'REPORT', 'REQUEST_URI' => '/addressbooks/user1/book1', 'HTTP_DEPTH' => '1', )); $request->setBody( ' ' ); $response = new HTTP\ResponseMock(); $this->server->httpRequest = $request; $this->server->httpResponse = $response; $this->server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status', $response->status, 'Incorrect status code. Full response body:' . $response->body); // using the client for parsing $client = new DAV\Client(array('baseUri'=>'/')); $result = $client->parseMultiStatus($response->body); $this->assertEquals(array( '/addressbooks/user1/book1/card1' => array( 200 => array( '{DAV:}getetag' => '"' . md5("BEGIN:VCARD\nVERSION:3.0\nUID:12345\nEND:VCARD") . '"', ), ), '/addressbooks/user1/book1/card2' => array( 404 => array( '{DAV:}getetag' => null, ), ) ), $result); } function testQueryDepth0() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'REQUEST_URI' => '/addressbooks/user1/book1/card1', 'HTTP_DEPTH' => '0', )); $request->setBody( ' ' ); $response = new HTTP\ResponseMock(); $this->server->httpRequest = $request; $this->server->httpResponse = $response; $this->server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status', $response->status, 'Incorrect status code. Full response body:' . $response->body); // using the client for parsing $client = new DAV\Client(array('baseUri'=>'/')); $result = $client->parseMultiStatus($response->body); $this->assertEquals(array( '/addressbooks/user1/book1/card1' => array( 200 => array( '{DAV:}getetag' => '"' . md5("BEGIN:VCARD\nVERSION:3.0\nUID:12345\nEND:VCARD") . '"', ), ), ), $result); } function testQueryNoMatch() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'REQUEST_URI' => '/addressbooks/user1/book1', 'HTTP_DEPTH' => '1', )); $request->setBody( ' ' ); $response = new HTTP\ResponseMock(); $this->server->httpRequest = $request; $this->server->httpResponse = $response; $this->server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status', $response->status, 'Incorrect status code. Full response body:' . $response->body); // using the client for parsing $client = new DAV\Client(array('baseUri'=>'/')); $result = $client->parseMultiStatus($response->body); $this->assertEquals(array(), $result); } function testQueryLimit() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'REQUEST_URI' => '/addressbooks/user1/book1', 'HTTP_DEPTH' => '1', )); $request->setBody( ' 1 ' ); $response = new HTTP\ResponseMock(); $this->server->httpRequest = $request; $this->server->httpResponse = $response; $this->server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status', $response->status, 'Incorrect status code. Full response body:' . $response->body); // using the client for parsing $client = new DAV\Client(array('baseUri'=>'/')); $result = $client->parseMultiStatus($response->body); $this->assertEquals(array( '/addressbooks/user1/book1/card1' => array( 200 => array( '{DAV:}getetag' => '"' . md5("BEGIN:VCARD\nVERSION:3.0\nUID:12345\nEND:VCARD"). '"', ), ), ), $result); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/AddressBookRootTest.php000066400000000000000000000014641246001162500234700ustar00rootroot00000000000000assertEquals('addressbooks', $root->getName()); } function testGetChildForPrincipal() { $pBackend = new DAVACL\PrincipalBackend\Mock(); $cBackend = new Backend\Mock(); $root = new AddressBookRoot($pBackend, $cBackend); $children = $root->getChildren(); $this->assertEquals(3, count($children)); $this->assertInstanceOf('Sabre\\CardDAV\\UserAddressBooks', $children[0]); $this->assertEquals('user1', $children[0]->getName()); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/AddressBookTest.php000066400000000000000000000066131246001162500226250ustar00rootroot00000000000000backend = new Backend\Mock(); $this->ab = new AddressBook( $this->backend, array( 'uri' => 'book1', 'id' => 'foo', '{DAV:}displayname' => 'd-name', 'principaluri' => 'principals/user1', ) ); } function testGetName() { $this->assertEquals('book1', $this->ab->getName()); } function testGetChild() { $card = $this->ab->getChild('card1'); $this->assertInstanceOf('Sabre\\CardDAV\\Card', $card); $this->assertEquals('card1', $card->getName()); } /** * @expectedException Sabre\DAV\Exception\NotFound */ function testGetChildNotFound() { $card = $this->ab->getChild('card3'); } function testGetChildren() { $cards = $this->ab->getChildren(); $this->assertEquals(2, count($cards)); $this->assertEquals('card1', $cards[0]->getName()); $this->assertEquals('card2', $cards[1]->getName()); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testCreateDirectory() { $this->ab->createDirectory('name'); } function testCreateFile() { $file = fopen('php://memory','r+'); fwrite($file,'foo'); rewind($file); $this->ab->createFile('card2',$file); $this->assertEquals('foo', $this->backend->cards['foo']['card2']); } function testDelete() { $this->ab->delete(); $this->assertEquals(array(), $this->backend->addressBooks); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testSetName() { $this->ab->setName('foo'); } function testGetLastModified() { $this->assertNull($this->ab->getLastModified()); } function testUpdateProperties() { $this->assertTrue( $this->ab->updateProperties(array('{DAV:}displayname' => 'barrr')) ); $this->assertEquals('barrr', $this->backend->addressBooks[0]['{DAV:}displayname']); } function testGetProperties() { $props = $this->ab->getProperties(array('{DAV:}displayname')); $this->assertEquals(array( '{DAV:}displayname' => 'd-name', ), $props); } function testACLMethods() { $this->assertEquals('principals/user1', $this->ab->getOwner()); $this->assertNull($this->ab->getGroup()); $this->assertEquals(array( array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user1', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => 'principals/user1', 'protected' => true, ), ), $this->ab->getACL()); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testSetACL() { $this->ab->setACL(array()); } function testGetSupportedPrivilegeSet() { $this->assertNull( $this->ab->getSupportedPrivilegeSet() ); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/Backend/000077500000000000000000000000001246001162500203755ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/CardDAV/Backend/AbstractPDOTest.php000066400000000000000000000164451246001162500240660ustar00rootroot00000000000000backend = new PDO($this->getPDO()); } public function testGetAddressBooksForUser() { $result = $this->backend->getAddressBooksForUser('principals/user1'); $expected = array( array( 'id' => 1, 'uri' => 'book1', 'principaluri' => 'principals/user1', '{DAV:}displayname' => 'book1', '{' . CardDAV\Plugin::NS_CARDDAV . '}addressbook-description' => 'addressbook 1', '{http://calendarserver.org/ns/}getctag' => 1, '{' . CardDAV\Plugin::NS_CARDDAV . '}supported-address-data' => new CardDAV\Property\SupportedAddressData(), ) ); $this->assertEquals($expected, $result); } public function testUpdateAddressBookInvalidProp() { $result = $this->backend->updateAddressBook(1, array( '{DAV:}displayname' => 'updated', '{' . CardDAV\Plugin::NS_CARDDAV . '}addressbook-description' => 'updated', '{DAV:}foo' => 'bar', )); $this->assertFalse($result); $result = $this->backend->getAddressBooksForUser('principals/user1'); $expected = array( array( 'id' => 1, 'uri' => 'book1', 'principaluri' => 'principals/user1', '{DAV:}displayname' => 'book1', '{' . CardDAV\Plugin::NS_CARDDAV . '}addressbook-description' => 'addressbook 1', '{http://calendarserver.org/ns/}getctag' => 1, '{' . CardDAV\Plugin::NS_CARDDAV . '}supported-address-data' => new CardDAV\Property\SupportedAddressData(), ) ); $this->assertEquals($expected, $result); } public function testUpdateAddressBookNoProps() { $result = $this->backend->updateAddressBook(1, array()); $this->assertFalse($result); $result = $this->backend->getAddressBooksForUser('principals/user1'); $expected = array( array( 'id' => 1, 'uri' => 'book1', 'principaluri' => 'principals/user1', '{DAV:}displayname' => 'book1', '{' . CardDAV\Plugin::NS_CARDDAV . '}addressbook-description' => 'addressbook 1', '{http://calendarserver.org/ns/}getctag' => 1, '{' . CardDAV\Plugin::NS_CARDDAV . '}supported-address-data' => new CardDAV\Property\SupportedAddressData(), ) ); $this->assertEquals($expected, $result); } public function testUpdateAddressBookSuccess() { $result = $this->backend->updateAddressBook(1, array( '{DAV:}displayname' => 'updated', '{' . CardDAV\Plugin::NS_CARDDAV . '}addressbook-description' => 'updated', )); $this->assertTrue($result); $result = $this->backend->getAddressBooksForUser('principals/user1'); $expected = array( array( 'id' => 1, 'uri' => 'book1', 'principaluri' => 'principals/user1', '{DAV:}displayname' => 'updated', '{' . CardDAV\Plugin::NS_CARDDAV . '}addressbook-description' => 'updated', '{http://calendarserver.org/ns/}getctag' => 2, '{' . CardDAV\Plugin::NS_CARDDAV . '}supported-address-data' => new CardDAV\Property\SupportedAddressData(), ) ); $this->assertEquals($expected, $result); } public function testDeleteAddressBook() { $this->backend->deleteAddressBook(1); $this->assertEquals(array(), $this->backend->getAddressBooksForUser('principals/user1')); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ public function testCreateAddressBookUnsupportedProp() { $this->backend->createAddressBook('principals/user1','book2', array( '{DAV:}foo' => 'bar', )); } public function testCreateAddressBookSuccess() { $this->backend->createAddressBook('principals/user1','book2', array( '{DAV:}displayname' => 'book2', '{' . CardDAV\Plugin::NS_CARDDAV . '}addressbook-description' => 'addressbook 2', )); $expected = array( array( 'id' => 1, 'uri' => 'book1', 'principaluri' => 'principals/user1', '{DAV:}displayname' => 'book1', '{' . CardDAV\Plugin::NS_CARDDAV . '}addressbook-description' => 'addressbook 1', '{http://calendarserver.org/ns/}getctag' => 1, '{' . CardDAV\Plugin::NS_CARDDAV . '}supported-address-data' => new CardDAV\Property\SupportedAddressData(), ), array( 'id' => 2, 'uri' => 'book2', 'principaluri' => 'principals/user1', '{DAV:}displayname' => 'book2', '{' . CardDAV\Plugin::NS_CARDDAV . '}addressbook-description' => 'addressbook 2', '{http://calendarserver.org/ns/}getctag' => 1, '{' . CardDAV\Plugin::NS_CARDDAV . '}supported-address-data' => new CardDAV\Property\SupportedAddressData(), ) ); $result = $this->backend->getAddressBooksForUser('principals/user1'); $this->assertEquals($expected, $result); } public function testGetCards() { $result = $this->backend->getCards(1); $expected = array( array( 'id' => 1, 'uri' => 'card1', 'carddata' => 'card1', 'lastmodified' => 0, ) ); $this->assertEquals($expected, $result); } public function testGetCard() { $result = $this->backend->getCard(1,'card1'); $expected = array( 'id' => 1, 'uri' => 'card1', 'carddata' => 'card1', 'lastmodified' => 0, ); $this->assertEquals($expected, $result); } /** * @depends testGetCard */ public function testCreateCard() { $result = $this->backend->createCard(1, 'card2', 'data2'); $this->assertEquals('"' . md5('data2') . '"', $result); $result = $this->backend->getCard(1,'card2'); $this->assertEquals(2, $result['id']); $this->assertEquals('card2', $result['uri']); $this->assertEquals('data2', $result['carddata']); } /** * @depends testGetCard */ public function testUpdateCard() { $result = $this->backend->updateCard(1, 'card1', 'newdata'); $this->assertEquals('"' . md5('newdata') . '"', $result); $result = $this->backend->getCard(1,'card1'); $this->assertEquals(1, $result['id']); $this->assertEquals('newdata', $result['carddata']); } /** * @depends testGetCard */ public function testDeleteCard() { $this->backend->deleteCard(1, 'card1'); $result = $this->backend->getCard(1,'card1'); $this->assertFalse($result); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/Backend/Mock.php000066400000000000000000000060321246001162500220000ustar00rootroot00000000000000addressBooks = $addressBooks; $this->cards = $cards; if (is_null($this->addressBooks)) { $this->addressBooks = array( array( 'id' => 'foo', 'uri' => 'book1', 'principaluri' => 'principals/user1', '{DAV:}displayname' => 'd-name', ), ); $card2 = fopen('php://memory','r+'); fwrite($card2,"BEGIN:VCARD\nVERSION:3.0\nUID:45678\nEND:VCARD"); rewind($card2); $this->cards = array( 'foo' => array( 'card1' => "BEGIN:VCARD\nVERSION:3.0\nUID:12345\nEND:VCARD", 'card2' => $card2, ), ); } } function getAddressBooksForUser($principalUri) { $books = array(); foreach($this->addressBooks as $book) { if ($book['principaluri'] === $principalUri) { $books[] = $book; } } return $books; } function updateAddressBook($addressBookId, array $mutations) { foreach($this->addressBooks as &$book) { if ($book['id'] !== $addressBookId) continue; foreach($mutations as $key=>$value) { $book[$key] = $value; } return true; } return false; } function createAddressBook($principalUri, $url, array $properties) { $this->addressBooks[] = array_merge($properties, array( 'id' => $url, 'uri' => $url, 'principaluri' => $principalUri, )); } function deleteAddressBook($addressBookId) { foreach($this->addressBooks as $key=>$value) { if ($value['id'] === $addressBookId) unset($this->addressBooks[$key]); } unset($this->cards[$addressBookId]); } function getCards($addressBookId) { $cards = array(); foreach($this->cards[$addressBookId] as $uri=>$data) { $cards[] = array( 'uri' => $uri, 'carddata' => $data, ); } return $cards; } function getCard($addressBookId, $cardUri) { if (!isset($this->cards[$addressBookId][$cardUri])) { return false; } return array( 'uri' => $cardUri, 'carddata' => $this->cards[$addressBookId][$cardUri], ); } function createCard($addressBookId, $cardUri, $cardData) { $this->cards[$addressBookId][$cardUri] = $cardData; } function updateCard($addressBookId, $cardUri, $cardData) { $this->cards[$addressBookId][$cardUri] = $cardData; } function deleteCard($addressBookId, $cardUri) { unset($this->cards[$addressBookId][$cardUri]); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/Backend/PDOMySQLTest.php000066400000000000000000000025531246001162500232630ustar00rootroot00000000000000markTestSkipped('MySQL driver is not available, or not properly configured'); $pdo = \Sabre\TestUtil::getMySQLDB(); if (!$pdo) $this->markTestSkipped('Could not connect to MySQL database'); $pdo->query("DROP TABLE IF EXISTS addressbooks"); $pdo->query("DROP TABLE IF EXISTS cards"); $pdo->query(" CREATE TABLE addressbooks ( id INT(11) UNSIGNED NOT NULL PRIMARY KEY AUTO_INCREMENT, principaluri VARCHAR(255), displayname VARCHAR(255), uri VARCHAR(100), description TEXT, ctag INT(11) UNSIGNED NOT NULL DEFAULT '1' ); "); $pdo->query(" INSERT INTO addressbooks (principaluri, displayname, uri, description, ctag) VALUES ('principals/user1', 'book1', 'book1', 'addressbook 1', 1); "); $pdo->query(" CREATE TABLE cards ( id INT(11) UNSIGNED NOT NULL PRIMARY KEY AUTO_INCREMENT, addressbookid INT(11) UNSIGNED NOT NULL, carddata TEXT, uri VARCHAR(100), lastmodified INT(11) UNSIGNED ); "); $pdo->query(" INSERT INTO cards (addressbookid, carddata, uri, lastmodified) VALUES (1, 'card1', 'card1', 0); "); return $pdo; } } sabre-dav-1.8.12/tests/Sabre/CardDAV/Backend/PDOSqliteTest.php000066400000000000000000000026371246001162500235620ustar00rootroot00000000000000markTestSkipped('SQLite driver is not available'); $pdo = new \PDO('sqlite:'.SABRE_TEMPDIR.'/pdobackend'); $pdo->setAttribute(\PDO::ATTR_ERRMODE,\PDO::ERRMODE_EXCEPTION); $pdo->query("DROP TABLE IF EXISTS addressbooks"); $pdo->query("DROP TABLE IF EXISTS cards"); $pdo->query(" CREATE TABLE addressbooks ( id integer primary key asc, principaluri text, displayname text, uri text, description text, ctag integer ); "); $pdo->query(" INSERT INTO addressbooks (principaluri, displayname, uri, description, ctag) VALUES ('principals/user1', 'book1', 'book1', 'addressbook 1', 1); "); $pdo->query(" CREATE TABLE cards ( id integer primary key asc, addressbookid integer, carddata text, uri text, lastmodified integer ); "); $pdo->query(" INSERT INTO cards (addressbookid, carddata, uri, lastmodified) VALUES (1, 'card1', 'card1', 0); "); return $pdo; } } sabre-dav-1.8.12/tests/Sabre/CardDAV/CardTest.php000066400000000000000000000100041246001162500212630ustar00rootroot00000000000000backend = new Backend\Mock(); $this->card = new Card( $this->backend, array( 'uri' => 'book1', 'id' => 'foo', 'principaluri' => 'principals/user1', ), array( 'uri' => 'card1', 'addressbookid' => 'foo', 'carddata' => 'card', ) ); } function testGet() { $result = $this->card->get(); $this->assertEquals('card', $result); } function testGet2() { $this->card = new Card( $this->backend, array( 'uri' => 'book1', 'id' => 'foo', 'principaluri' => 'principals/user1', ), array( 'uri' => 'card1', 'addressbookid' => 'foo', ) ); $result = $this->card->get(); $this->assertEquals("BEGIN:VCARD\nVERSION:3.0\nUID:12345\nEND:VCARD", $result); } /** * @depends testGet */ function testPut() { $file = fopen('php://memory','r+'); fwrite($file, 'newdata'); rewind($file); $this->card->put($file); $result = $this->card->get(); $this->assertEquals('newdata', $result); } function testDelete() { $this->card->delete(); $this->assertEquals(1, count($this->backend->cards['foo'])); } function testGetContentType() { $this->assertEquals('text/x-vcard; charset=utf-8', $this->card->getContentType()); } function testGetETag() { $this->assertEquals('"' . md5('card') . '"' , $this->card->getETag()); } function testGetETag2() { $card = new Card( $this->backend, array( 'uri' => 'book1', 'id' => 'foo', 'principaluri' => 'principals/user1', ), array( 'uri' => 'card1', 'addressbookid' => 'foo', 'carddata' => 'card', 'etag' => '"blabla"', ) ); $this->assertEquals('"blabla"' , $card->getETag()); } function testGetLastModified() { $this->assertEquals(null, $this->card->getLastModified()); } function testGetSize() { $this->assertEquals(4, $this->card->getSize()); $this->assertEquals(4, $this->card->getSize()); } function testGetSize2() { $card = new Card( $this->backend, array( 'uri' => 'book1', 'id' => 'foo', 'principaluri' => 'principals/user1', ), array( 'uri' => 'card1', 'addressbookid' => 'foo', 'etag' => '"blabla"', 'size' => 4, ) ); $this->assertEquals(4, $card->getSize()); } function testACLMethods() { $this->assertEquals('principals/user1', $this->card->getOwner()); $this->assertNull($this->card->getGroup()); $this->assertEquals(array( array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user1', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => 'principals/user1', 'protected' => true, ), ), $this->card->getACL()); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testSetACL() { $this->card->setACL(array()); } function testGetSupportedPrivilegeSet() { $this->assertNull( $this->card->getSupportedPrivilegeSet() ); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/IDirectoryTest.php000066400000000000000000000011371246001162500224760ustar00rootroot00000000000000addPlugin($plugin); $props = $server->getProperties('directory', array('{DAV:}resourcetype')); $this->assertTrue($props['{DAV:}resourcetype']->is('{' . Plugin::NS_CARDDAV . '}directory')); } } class DirectoryMock extends DAV\SimpleCollection implements IDirectory { } sabre-dav-1.8.12/tests/Sabre/CardDAV/MultiGetTest.php000066400000000000000000000027751246001162500221640ustar00rootroot00000000000000 'REPORT', 'REQUEST_URI' => '/addressbooks/user1/book1', )); $request->setBody( ' /addressbooks/user1/book1/card1 ' ); $response = new HTTP\ResponseMock(); $this->server->httpRequest = $request; $this->server->httpResponse = $response; $this->server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status', $response->status, 'Incorrect status code. Full response body:' . $response->body); // using the client for parsing $client = new DAV\Client(array('baseUri'=>'/')); $result = $client->parseMultiStatus($response->body); $this->assertEquals(array( '/addressbooks/user1/book1/card1' => array( 200 => array( '{DAV:}getetag' => '"' . md5("BEGIN:VCARD\nVERSION:3.0\nUID:12345\nEND:VCARD") . '"', '{urn:ietf:params:xml:ns:carddav}address-data' => "BEGIN:VCARD\nVERSION:3.0\nUID:12345\nEND:VCARD", ) ) ), $result); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/PluginTest.php000066400000000000000000000106301246001162500216550ustar00rootroot00000000000000assertEquals('card', $this->server->xmlNamespaces[Plugin::NS_CARDDAV]); $this->assertEquals('{' . Plugin::NS_CARDDAV . '}addressbook', $this->server->resourceTypeMapping['Sabre\\CardDAV\\IAddressBook']); $this->assertTrue(in_array('addressbook', $this->plugin->getFeatures())); } function testSupportedReportSet() { $this->assertEquals(array( '{' . Plugin::NS_CARDDAV . '}addressbook-multiget', '{' . Plugin::NS_CARDDAV . '}addressbook-query', ), $this->plugin->getSupportedReportSet('addressbooks/user1/book1')); } function testSupportedReportSetEmpty() { $this->assertEquals(array( ), $this->plugin->getSupportedReportSet('')); } function testAddressBookHomeSet() { $result = $this->server->getProperties('principals/user1', array('{' . Plugin::NS_CARDDAV . '}addressbook-home-set')); $this->assertEquals(1, count($result)); $this->assertTrue(isset($result['{' . Plugin::NS_CARDDAV . '}addressbook-home-set'])); $this->assertEquals('addressbooks/user1/', $result['{' . Plugin::NS_CARDDAV . '}addressbook-home-set']->getHref()); } function testMeCardTest() { $result = $this->server->getProperties( 'addressbooks/user1', array( '{http://calendarserver.org/ns/}me-card', ) ); $this->assertEquals( array( '{http://calendarserver.org/ns/}me-card' => new DAV\Property\Href('addressbooks/user1/book1/vcard1.vcf') ), $result ); } function testDirectoryGateway() { $result = $this->server->getProperties('principals/user1', array('{' . Plugin::NS_CARDDAV . '}directory-gateway')); $this->assertEquals(1, count($result)); $this->assertTrue(isset($result['{' . Plugin::NS_CARDDAV . '}directory-gateway'])); $this->assertEquals(array('directory'), $result['{' . Plugin::NS_CARDDAV . '}directory-gateway']->getHrefs()); } function testReportPassThrough() { $this->assertNull($this->plugin->report('{DAV:}foo', new \DomDocument())); } function testHTMLActionsPanel() { $output = ''; $r = $this->server->broadcastEvent('onHTMLActionsPanel', array($this->server->tree->getNodeForPath('addressbooks/user1'), &$output)); $this->assertFalse($r); $this->assertTrue(!!strpos($output,'Display name')); } function testBrowserPostAction() { $r = $this->server->broadcastEvent('onBrowserPostAction', array('addressbooks/user1', 'mkaddressbook', array( 'name' => 'NEWADDRESSBOOK', '{DAV:}displayname' => 'foo', ))); $this->assertFalse($r); $addressbooks = $this->backend->getAddressBooksforUser('principals/user1'); $this->assertEquals(2, count($addressbooks)); $newAddressBook = null; foreach($addressbooks as $addressbook) { if ($addressbook['uri'] === 'NEWADDRESSBOOK') { $newAddressBook = $addressbook; break; } } if (!$newAddressBook) $this->fail('Could not find newly created addressbook'); } function testUpdatePropertiesMeCard() { $result = $this->server->updateProperties('addressbooks/user1', array( '{http://calendarserver.org/ns/}me-card' => new DAV\Property\Href('/addressbooks/user1/book1/vcard2',true), )); $this->assertEquals( array( 'href' => 'addressbooks/user1', 200 => array( '{http://calendarserver.org/ns/}me-card' => null, ), ), $result ); } function testUpdatePropertiesMeCardBadValue() { $result = $this->server->updateProperties('addressbooks/user1', array( '{http://calendarserver.org/ns/}me-card' => new DAV\Property\HrefList(array()), )); $this->assertEquals( array( 'href' => 'addressbooks/user1', 400 => array( '{http://calendarserver.org/ns/}me-card' => null, ), ), $result ); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/Property/000077500000000000000000000000001246001162500206725ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/CardDAV/Property/SupportedAddressDataTest.php000066400000000000000000000017241246001162500263340ustar00rootroot00000000000000createElementNS(CardDAV\Plugin::NS_CARDDAV, 'card:root'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $server = new DAV\Server(); $property->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . '' . //'' . ' ', $xml); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/SogoStripContentTypeTest.php000066400000000000000000000023241246001162500245460ustar00rootroot00000000000000 1, 'uri' => 'book1', 'principaluri' => 'principals/user1', ), ); protected $carddavCards = array( 1 => array( 'card1.vcf' => "BEGIN:VCARD\nVERSION:3.0\nUID:12345\nEND:VCARD", ), ); function testDontStrip() { $result = $this->server->getProperties('addressbooks/user1/book1/card1.vcf',array('{DAV:}getcontenttype')); $this->assertEquals(array( '{DAV:}getcontenttype' => 'text/x-vcard; charset=utf-8' ), $result); } function testStrip() { $this->server->httpRequest = new HTTP\Request(array( 'HTTP_USER_AGENT' => 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:10.0.2) Gecko/20120216 Thunderbird/10.0.2 Lightning/1.2.1', )); $result = $this->server->getProperties('addressbooks/user1/book1/card1.vcf',array('{DAV:}getcontenttype')); $this->assertEquals(array( '{DAV:}getcontenttype' => 'text/x-vcard' ), $result); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/TestUtil.php000066400000000000000000000035621246001162500213420ustar00rootroot00000000000000setAttribute(PDO::ATTR_ERRMODE,PDO::ERRMODE_EXCEPTION); // Yup this is definitely not 'fool proof', but good enough for now. $queries = explode(';', file_get_contents(__DIR__ . '/../../../examples/sql/sqlite.addressbooks.sql')); foreach($queries as $query) { $pdo->exec($query); } // Inserting events through a backend class. $backend = new Backend\PDO($pdo); $addressbookId = $backend->createAddressBook( 'principals/user1', 'UUID-123467', array( '{DAV:}displayname' => 'user1 addressbook', '{urn:ietf:params:xml:ns:carddav}addressbook-description' => 'AddressBook description', ) ); $backend->createAddressBook( 'principals/user1', 'UUID-123468', array( '{DAV:}displayname' => 'user1 addressbook2', '{urn:ietf:params:xml:ns:carddav}addressbook-description' => 'AddressBook description', ) ); $backend->createCard($addressbookId, 'UUID-2345', self::getTestCardData()); return $pdo; } static function getTestCardData($type = 1) { $addressbookData = 'BEGIN:VCARD VERSION:3.0 PRODID:-//Acme Inc.//RoadRunner 1.0//EN FN:Wile E. Coyote N:Coyote;Wile;Erroll;; ORG:Acme Inc. UID:39A6B5ED-DD51-4AFE-A683-C35EE3749627 REV:2012-06-20T07:00:39+00:00 END:VCARD'; return $addressbookData; } } sabre-dav-1.8.12/tests/Sabre/CardDAV/UserAddressBooksTest.php000066400000000000000000000067571246001162500236600ustar00rootroot00000000000000backend = new Backend\Mock(); $this->s = new UserAddressBooks( $this->backend, 'principals/user1' ); } function testGetName() { $this->assertEquals('user1', $this->s->getName()); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testSetName() { $this->s->setName('user2'); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testDelete() { $this->s->delete(); } function testGetLastModified() { $this->assertNull($this->s->getLastModified()); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testCreateFile() { $this->s->createFile('bla'); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testCreateDirectory() { $this->s->createDirectory('bla'); } function testGetChild() { $child = $this->s->getChild('book1'); $this->assertInstanceOf('Sabre\\CardDAV\\AddressBook', $child); $this->assertEquals('book1', $child->getName()); } /** * @expectedException Sabre\DAV\Exception\NotFound */ function testGetChild404() { $this->s->getChild('book2'); } function testGetChildren() { $children = $this->s->getChildren(); $this->assertEquals(1, count($children)); $this->assertInstanceOf('Sabre\\CardDAV\\AddressBook', $children[0]); $this->assertEquals('book1', $children[0]->getName()); } function testCreateExtendedCollection() { $resourceType = array( '{' . Plugin::NS_CARDDAV . '}addressbook', '{DAV:}collection', ); $this->s->createExtendedCollection('book2', $resourceType, array('{DAV:}displayname' => 'a-book 2')); $this->assertEquals(array( 'id' => 'book2', 'uri' => 'book2', '{DAV:}displayname' => 'a-book 2', 'principaluri' => 'principals/user1', ), $this->backend->addressBooks[1]); } /** * @expectedException Sabre\DAV\Exception\InvalidResourceType */ function testCreateExtendedCollectionInvalid() { $resourceType = array( '{DAV:}collection', ); $this->s->createExtendedCollection('book2', $resourceType, array('{DAV:}displayname' => 'a-book 2')); } function testACLMethods() { $this->assertEquals('principals/user1', $this->s->getOwner()); $this->assertNull($this->s->getGroup()); $this->assertEquals(array( array( 'privilege' => '{DAV:}read', 'principal' => 'principals/user1', 'protected' => true, ), array( 'privilege' => '{DAV:}write', 'principal' => 'principals/user1', 'protected' => true, ), ), $this->s->getACL()); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testSetACL() { $this->s->setACL(array()); } function testGetSupportedPrivilegeSet() { $this->assertNull( $this->s->getSupportedPrivilegeSet() ); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/VCFExportTest.php000066400000000000000000000033071246001162500222420ustar00rootroot00000000000000 'book1', 'uri' => 'book1', 'principaluri' => 'principals/user1', ) ); protected $carddavCards = array( 'book1' => array( "card1" => "BEGIN:VCARD\r\nFN:Person1\r\nEND:VCARD\r\n", "card2" => "BEGIN:VCARD\r\nFN:Person2\r\nEND:VCARD", "card3" => "BEGIN:VCARD\r\nFN:Person3\r\nEND:VCARD\r\n", "card4" => "BEGIN:VCARD\nFN:Person4\nEND:VCARD\n", ) ); function setUp() { parent::setUp(); $this->server->addPlugin( new VCFExportPlugin() ); } function testSimple() { $this->assertInstanceOf('Sabre\\CardDAV\\VCFExportPlugin', $this->server->getPlugin('Sabre\\CardDAV\\VCFExportPlugin')); } function testExport() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/addressbooks/user1/book1?export', 'QUERY_STRING' => 'export', 'REQUEST_METHOD' => 'GET', )); $response = $this->request($request); $this->assertEquals('HTTP/1.1 200 OK', $response->status, $response->body); $expected = "BEGIN:VCARD FN:Person1 END:VCARD BEGIN:VCARD FN:Person2 END:VCARD BEGIN:VCARD FN:Person3 END:VCARD BEGIN:VCARD FN:Person4 END:VCARD "; // We actually expected windows line endings $expected = str_replace("\n","\r\n", $expected); $this->assertEquals($expected, $response->body); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/ValidateFilterTest.php000066400000000000000000000155271246001162500233300ustar00rootroot00000000000000assertTrue($this->plugin->validateFilters($input, $filters, $test), $message); } else { $this->assertFalse($this->plugin->validateFilters($input, $filters, $test), $message); } } function data() { $body1 = << 'title', 'is-not-defined' => false, 'param-filters' => array(), 'text-matches' => array()); // Check if FOO is defined $filter2 = array('name' => 'foo', 'is-not-defined' => false, 'param-filters' => array(), 'text-matches' => array()); // Check if TITLE is not defined $filter3 = array('name' => 'title', 'is-not-defined' => true, 'param-filters' => array(), 'text-matches' => array()); // Check if FOO is not defined $filter4 = array('name' => 'foo', 'is-not-defined' => true, 'param-filters' => array(), 'text-matches' => array()); // Check if TEL[TYPE] is defined $filter5 = array( 'name' => 'tel', 'is-not-defined' => false, 'test' => 'anyof', 'param-filters' => array( array( 'name' => 'type', 'is-not-defined' => false, 'text-match' => null ), ), 'text-matches' => array(), ); // Check if TEL[FOO] is defined $filter6 = $filter5; $filter6['param-filters'][0]['name'] = 'FOO'; // Check if TEL[TYPE] is not defined $filter7 = $filter5; $filter7['param-filters'][0]['is-not-defined'] = true; // Check if TEL[FOO] is not defined $filter8 = $filter5; $filter8['param-filters'][0]['name'] = 'FOO'; $filter8['param-filters'][0]['is-not-defined'] = true; // Combining property filters $filter9 = $filter5; $filter9['param-filters'][] = $filter6['param-filters'][0]; $filter10 = $filter5; $filter10['param-filters'][] = $filter6['param-filters'][0]; $filter10['test'] = 'allof'; // Check if URL contains 'google' $filter11 = array( 'name' => 'url', 'is-not-defined' => false, 'test' => 'anyof', 'param-filters' => array(), 'text-matches' => array( array( 'match-type' => 'contains', 'value' => 'google', 'negate-condition' => false, 'collation' => 'i;octet', ), ), ); // Check if URL contains 'bing' $filter12 = $filter11; $filter12['text-matches'][0]['value'] = 'bing'; // Check if URL does not contain 'google' $filter13 = $filter11; $filter13['text-matches'][0]['negate-condition'] = true; // Check if URL does not contain 'bing' $filter14 = $filter11; $filter14['text-matches'][0]['value'] = 'bing'; $filter14['text-matches'][0]['negate-condition'] = true; // Param filter with text $filter15 = $filter5; $filter15['param-filters'][0]['text-match'] = array( 'match-type' => 'contains', 'value' => 'WORK', 'collation' => 'i;octet', 'negate-condition' => false, ); $filter16 = $filter15; $filter16['param-filters'][0]['text-match']['negate-condition'] = true; // Param filter + text filter $filter17 = $filter5; $filter17['test'] = 'anyof'; $filter17['text-matches'][] = array( 'match-type' => 'contains', 'value' => '444', 'collation' => 'i;octet', 'negate-condition' => false, ); $filter18 = $filter17; $filter18['text-matches'][0]['negate-condition'] = true; $filter18['test'] = 'allof'; return array( // Basic filters array($body1, array($filter1), 'anyof',true), array($body1, array($filter2), 'anyof',false), array($body1, array($filter3), 'anyof',false), array($body1, array($filter4), 'anyof',true), // Combinations array($body1, array($filter1, $filter2), 'anyof',true), array($body1, array($filter1, $filter2), 'allof',false), array($body1, array($filter1, $filter4), 'anyof',true), array($body1, array($filter1, $filter4), 'allof',true), array($body1, array($filter2, $filter3), 'anyof',false), array($body1, array($filter2, $filter3), 'allof',false), // Basic parameters array($body1, array($filter5), 'anyof', true, 'TEL;TYPE is defined, so this should return true'), array($body1, array($filter6), 'anyof', false, 'TEL;FOO is not defined, so this should return false'), array($body1, array($filter7), 'anyof', false, 'TEL;TYPE is defined, so this should return false'), array($body1, array($filter8), 'anyof', true, 'TEL;TYPE is not defined, so this should return true'), // Combined parameters array($body1, array($filter9), 'anyof', true), array($body1, array($filter10), 'anyof', false), // Text-filters array($body1, array($filter11), 'anyof', true), array($body1, array($filter12), 'anyof', false), array($body1, array($filter13), 'anyof', false), array($body1, array($filter14), 'anyof', true), // Param filter with text-match array($body1, array($filter15), 'anyof', true), array($body1, array($filter16), 'anyof', false), // Param filter + text filter array($body1, array($filter17), 'anyof', true), array($body1, array($filter18), 'anyof', false), array($body1, array($filter18), 'anyof', false), ); } } sabre-dav-1.8.12/tests/Sabre/CardDAV/ValidateVCardTest.php000066400000000000000000000106151246001162500230730ustar00rootroot00000000000000 'addressbook1', 'principaluri' => 'principals/admin', 'uri' => 'addressbook1', ) ); $this->cardBackend = new Backend\Mock($addressbooks,array()); $principalBackend = new DAVACL\PrincipalBackend\Mock(); $tree = array( new AddressBookRoot($principalBackend, $this->cardBackend), ); $this->server = new DAV\Server($tree); $this->server->debugExceptions = true; $plugin = new Plugin(); $this->server->addPlugin($plugin); $response = new HTTP\ResponseMock(); $this->server->httpResponse = $response; } function request(HTTP\Request $request) { $this->server->httpRequest = $request; $this->server->exec(); return $this->server->httpResponse; } function testCreateFile() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/addressbooks/admin/addressbook1/blabla.vcf', )); $response = $this->request($request); $this->assertEquals('HTTP/1.1 415 Unsupported Media Type', $response->status); } function testCreateFileValid() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/addressbooks/admin/addressbook1/blabla.vcf', )); $request->setBody("BEGIN:VCARD\r\nUID:foo\r\nEND:VCARD\r\n"); $response = $this->request($request); $this->assertEquals('HTTP/1.1 201 Created', $response->status, 'Incorrect status returned! Full response body: ' . $response->body); $expected = array( 'uri' => 'blabla.vcf', 'carddata' => "BEGIN:VCARD\r\nUID:foo\r\nEND:VCARD\r\n", ); $this->assertEquals($expected, $this->cardBackend->getCard('addressbook1','blabla.vcf')); } function testCreateFileNoUID() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/addressbooks/admin/addressbook1/blabla.vcf', )); $request->setBody("BEGIN:VCARD\r\nEND:VCARD\r\n"); $response = $this->request($request); $this->assertEquals('HTTP/1.1 201 Created', $response->status, 'Incorrect status returned! Full response body: ' . $response->body); $foo = $this->cardBackend->getCard('addressbook1','blabla.vcf'); $this->assertTrue(strpos($foo['carddata'],'UID')!==false); } function testCreateFileVCalendar() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/addressbooks/admin/addressbook1/blabla.vcf', )); $request->setBody("BEGIN:VCALENDAR\r\nEND:VCALENDAR\r\n"); $response = $this->request($request); $this->assertEquals('HTTP/1.1 415 Unsupported Media Type', $response->status, 'Incorrect status returned! Full response body: ' . $response->body); } function testUpdateFile() { $this->cardBackend->createCard('addressbook1','blabla.vcf','foo'); $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/addressbooks/admin/addressbook1/blabla.vcf', )); $response = $this->request($request); $this->assertEquals('HTTP/1.1 415 Unsupported Media Type', $response->status); } function testUpdateFileParsableBody() { $this->cardBackend->createCard('addressbook1','blabla.vcf','foo'); $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/addressbooks/admin/addressbook1/blabla.vcf', )); $body = "BEGIN:VCARD\r\nUID:foo\r\nEND:VCARD\r\n"; $request->setBody($body); $response = $this->request($request); $this->assertEquals('HTTP/1.1 204 No Content', $response->status); $expected = array( 'uri' => 'blabla.vcf', 'carddata' => $body, ); $this->assertEquals($expected, $this->cardBackend->getCard('addressbook1','blabla.vcf')); } } ?> sabre-dav-1.8.12/tests/Sabre/CardDAV/VersionTest.php000066400000000000000000000005111246001162500220410ustar00rootroot00000000000000assertEquals(-1, version_compare('0.1',$v)); $s = Version::STABILITY; $this->assertTrue($s == 'alpha' || $s == 'beta' || $s =='stable'); } } sabre-dav-1.8.12/tests/Sabre/DAV/000077500000000000000000000000001246001162500162545ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAV/AbstractServer.php000066400000000000000000000026571246001162500217310ustar00rootroot00000000000000response = new HTTP\ResponseMock(); $this->server = new Server($this->getRootNode()); $this->server->httpResponse = $this->response; $this->server->debugExceptions = true; $this->deleteTree(SABRE_TEMPDIR,false); file_put_contents(SABRE_TEMPDIR . '/test.txt', 'Test contents'); mkdir(SABRE_TEMPDIR . '/dir'); file_put_contents(SABRE_TEMPDIR . '/dir/child.txt', 'Child contents'); } function tearDown() { $this->deleteTree(SABRE_TEMPDIR,false); } protected function getRootNode() { return new FS\Directory(SABRE_TEMPDIR); } private function deleteTree($path,$deleteRoot = true) { foreach(scandir($path) as $node) { if ($node=='.' || $node=='.svn' || $node=='..') continue; $myPath = $path.'/'. $node; if (is_file($myPath)) { unlink($myPath); } else { $this->deleteTree($myPath); } } if ($deleteRoot) rmdir($path); } } sabre-dav-1.8.12/tests/Sabre/DAV/Auth/000077500000000000000000000000001246001162500171555ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAV/Auth/Backend/000077500000000000000000000000001246001162500205045ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAV/Auth/Backend/AbstractBasicTest.php000066400000000000000000000042661246001162500245720ustar00rootroot00000000000000httpResponse = $response; $backend = new AbstractBasicMock(); $backend->authenticate($server,'myRealm'); } /** * @expectedException Sabre\DAV\Exception\NotAuthenticated */ public function testAuthenticateUnknownUser() { $response = new HTTP\ResponseMock(); $tree = new DAV\ObjectTree(new DAV\SimpleCollection('bla')); $server = new DAV\Server($tree); $server->httpResponse = $response; $request = new HTTP\Request(array( 'PHP_AUTH_USER' => 'username', 'PHP_AUTH_PW' => 'wrongpassword', )); $server->httpRequest = $request; $backend = new AbstractBasicMock(); $backend->authenticate($server,'myRealm'); } public function testAuthenticate() { $response = new HTTP\ResponseMock(); $tree = new DAV\ObjectTree(new DAV\SimpleCollection('bla')); $server = new DAV\Server($tree); $server->httpResponse = $response; $request = new HTTP\Request(array( 'PHP_AUTH_USER' => 'username', 'PHP_AUTH_PW' => 'password', )); $server->httpRequest = $request; $backend = new AbstractBasicMock(); $this->assertTrue($backend->authenticate($server,'myRealm')); $result = $backend->getCurrentUser(); $this->assertEquals('username', $result); } } class AbstractBasicMock extends AbstractBasic { /** * Validates a username and password * * This method should return true or false depending on if login * succeeded. * * @param string $username * @param string $password * @return bool */ function validateUserPass($username, $password) { return ($username == 'username' && $password == 'password'); } } sabre-dav-1.8.12/tests/Sabre/DAV/Auth/Backend/AbstractDigestTest.php000066400000000000000000000102431246001162500247600ustar00rootroot00000000000000httpResponse = $response; $backend = new AbstractDigestMock(); $backend->authenticate($server,'myRealm'); } /** * @expectedException Sabre\DAV\Exception */ public function testAuthenticateBadGetUserInfoResponse() { $response = new HTTP\ResponseMock(); $server = new DAV\Server(); $server->httpResponse = $response; $header = 'username=null, realm=myRealm, nonce=12345, uri=/, response=HASH, opaque=1, qop=auth, nc=1, cnonce=1'; $request = new HTTP\Request(array( 'PHP_AUTH_DIGEST' => $header, )); $server->httpRequest = $request; $backend = new AbstractDigestMock(); $backend->authenticate($server,'myRealm'); } /** * @expectedException Sabre\DAV\Exception */ public function testAuthenticateBadGetUserInfoResponse2() { $response = new HTTP\ResponseMock(); $server = new DAV\Server(); $server->httpResponse = $response; $header = 'username=array, realm=myRealm, nonce=12345, uri=/, response=HASH, opaque=1, qop=auth, nc=1, cnonce=1'; $request = new HTTP\Request(array( 'PHP_AUTH_DIGEST' => $header, )); $server->httpRequest = $request; $backend = new AbstractDigestMock(); $backend->authenticate($server,'myRealm'); } /** * @expectedException Sabre\DAV\Exception\NotAuthenticated */ public function testAuthenticateUnknownUser() { $response = new HTTP\ResponseMock(); $server = new DAV\Server(); $server->httpResponse = $response; $header = 'username=false, realm=myRealm, nonce=12345, uri=/, response=HASH, opaque=1, qop=auth, nc=1, cnonce=1'; $request = new HTTP\Request(array( 'PHP_AUTH_DIGEST' => $header, )); $server->httpRequest = $request; $backend = new AbstractDigestMock(); $backend->authenticate($server,'myRealm'); } /** * @expectedException Sabre\DAV\Exception\NotAuthenticated */ public function testAuthenticateBadPassword() { $response = new HTTP\ResponseMock(); $server = new DAV\Server(); $server->httpResponse = $response; $header = 'username=user, realm=myRealm, nonce=12345, uri=/, response=HASH, opaque=1, qop=auth, nc=1, cnonce=1'; $request = new HTTP\Request(array( 'PHP_AUTH_DIGEST' => $header, 'REQUEST_METHOD' => 'PUT', )); $server->httpRequest = $request; $backend = new AbstractDigestMock(); $backend->authenticate($server,'myRealm'); } public function testAuthenticate() { $response = new HTTP\ResponseMock(); $server = new DAV\Server(); $server->httpResponse = $response; $digestHash = md5('HELLO:12345:1:1:auth:' . md5('GET:/')); $header = 'username=user, realm=myRealm, nonce=12345, uri=/, response='.$digestHash.', opaque=1, qop=auth, nc=1, cnonce=1'; $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'GET', 'PHP_AUTH_DIGEST' => $header, 'REQUEST_URI' => '/', )); $server->httpRequest = $request; $backend = new AbstractDigestMock(); $this->assertTrue($backend->authenticate($server,'myRealm')); $result = $backend->getCurrentUser(); $this->assertEquals('user', $result); $this->assertEquals('HELLO', $backend->getDigestHash('myRealm', $result)); } } class AbstractDigestMock extends AbstractDigest { function getDigestHash($realm, $userName) { switch($userName) { case 'null' : return null; case 'false' : return false; case 'array' : return array(); case 'user' : return 'HELLO'; } } } sabre-dav-1.8.12/tests/Sabre/DAV/Auth/Backend/AbstractPDOTest.php000066400000000000000000000012161246001162500241630ustar00rootroot00000000000000getPDO(); $backend = new PDO($pdo); $this->assertTrue($backend instanceof PDO); } /** * @depends testConstruct */ function testUserInfo() { $pdo = $this->getPDO(); $backend = new PDO($pdo); $this->assertNull($backend->getDigestHash('realm','blabla')); $expected = 'hash'; $this->assertEquals($expected, $backend->getDigestHash('realm','user')); } } sabre-dav-1.8.12/tests/Sabre/DAV/Auth/Backend/ApacheTest.php000066400000000000000000000015141246001162500232370ustar00rootroot00000000000000authenticate($server,'Realm'); } function testRemoteUser() { $backend = new Apache(); $server = new DAV\Server(); $request = new HTTP\Request(array( 'REMOTE_USER' => 'username', )); $server->httpRequest = $request; $this->assertTrue($backend->authenticate($server, 'Realm')); $userInfo = 'username'; $this->assertEquals($userInfo, $backend->getCurrentUser()); } } sabre-dav-1.8.12/tests/Sabre/DAV/Auth/Backend/FileTest.php000066400000000000000000000017351246001162500227420ustar00rootroot00000000000000assertTrue($file instanceof File); } /** * @expectedException Sabre\DAV\Exception */ function testLoadFileBroken() { file_put_contents(SABRE_TEMPDIR . '/backend','user:realm:hash'); $file = new File(); $file->loadFile(SABRE_TEMPDIR .'/backend'); } function testLoadFile() { file_put_contents(SABRE_TEMPDIR . '/backend','user:realm:' . md5('user:realm:password')); $file = new File(); $file->loadFile(SABRE_TEMPDIR . '/backend'); $this->assertFalse($file->getDigestHash('realm','blabla')); $this->assertEquals(md5('user:realm:password'), $file->getDigesthash('realm','user')); } } sabre-dav-1.8.12/tests/Sabre/DAV/Auth/Backend/Mock.php000066400000000000000000000012311246001162500221030ustar00rootroot00000000000000currentUser = $this->defaultUser; } function setCurrentUser($user) { $this->currentUser = $user; } function getCurrentUser() { return $this->currentUser; } } sabre-dav-1.8.12/tests/Sabre/DAV/Auth/Backend/PDOMySQLTest.php000066400000000000000000000014731246001162500233720ustar00rootroot00000000000000markTestSkipped('MySQL driver is not available, or not properly configured'); $pdo = \Sabre\TestUtil::getMySQLDB(); if (!$pdo) $this->markTestSkipped('Could not connect to MySQL database'); $pdo->query("DROP TABLE IF EXISTS users"); $pdo->query(" create table users ( id integer unsigned not null primary key auto_increment, username varchar(50), digesta1 varchar(32), email varchar(80), displayname varchar(80), unique(username) );"); $pdo->query("INSERT INTO users (username,digesta1,email,displayname) VALUES ('user','hash','user@example.org','User')"); return $pdo; } } sabre-dav-1.8.12/tests/Sabre/DAV/Auth/Backend/PDOSqliteTest.php000066400000000000000000000015421246001162500236630ustar00rootroot00000000000000markTestSkipped('SQLite driver is not available'); $pdo = new \PDO('sqlite:'.SABRE_TEMPDIR.'/pdobackend'); $pdo->setAttribute(\PDO::ATTR_ERRMODE,\PDO::ERRMODE_EXCEPTION); $pdo->query('CREATE TABLE users (username TEXT, digesta1 TEXT, email VARCHAR(80), displayname VARCHAR(80))'); $pdo->query('INSERT INTO users VALUES ("user","hash","user@example.org","User")'); return $pdo; } } sabre-dav-1.8.12/tests/Sabre/DAV/Auth/PluginTest.php000066400000000000000000000045041246001162500217670ustar00rootroot00000000000000assertTrue($plugin instanceof Plugin); $fakeServer->addPlugin($plugin); $this->assertEquals($plugin, $fakeServer->getPlugin('auth')); } /** * @depends testInit */ function testAuthenticate() { $fakeServer = new DAV\Server( new DAV\SimpleCollection('bla')); $plugin = new Plugin(new Backend\Mock(),'realm'); $fakeServer->addPlugin($plugin); $fakeServer->broadCastEvent('beforeMethod',array('GET','/')); } /** * @depends testInit * @expectedException Sabre\DAV\Exception\NotAuthenticated */ function testAuthenticateFail() { $fakeServer = new DAV\Server( new DAV\SimpleCollection('bla')); $plugin = new Plugin(new Backend\Mock(),'failme'); $fakeServer->addPlugin($plugin); $fakeServer->broadCastEvent('beforeMethod',array('GET','/')); } function testReportPassThrough() { $fakeServer = new DAV\Server(new DAV\SimpleCollection('bla')); $plugin = new Plugin(new Backend\Mock(),'realm'); $fakeServer->addPlugin($plugin); $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_CONTENT_TYPE' => 'application/xml', 'REQUEST_URI' => '/', )); $request->setBody(''); $fakeServer->httpRequest = $request; $fakeServer->httpResponse = new HTTP\ResponseMock(); $fakeServer->exec(); $this->assertEquals('HTTP/1.1 403 Forbidden', $fakeServer->httpResponse->status); } /** * @depends testInit */ function testGetCurrentUserPrincipal() { $fakeServer = new DAV\Server( new DAV\SimpleCollection('bla')); $plugin = new Plugin(new Backend\Mock(),'realm'); $fakeServer->addPlugin($plugin); $fakeServer->broadCastEvent('beforeMethod',array('GET','/')); $this->assertEquals('admin', $plugin->getCurrentUser()); } } sabre-dav-1.8.12/tests/Sabre/DAV/BasicNodeTest.php000066400000000000000000000110461246001162500214560ustar00rootroot00000000000000put('hi'); } /** * @expectedException Sabre\DAV\Exception\Forbidden */ public function testGet() { $file = new FileMock(); $file->get(); } public function testGetSize() { $file = new FileMock(); $this->assertEquals(0,$file->getSize()); } public function testGetETag() { $file = new FileMock(); $this->assertNull($file->getETag()); } public function testGetContentType() { $file = new FileMock(); $this->assertNull($file->getContentType()); } /** * @expectedException Sabre\DAV\Exception\Forbidden */ public function testDelete() { $file = new FileMock(); $file->delete(); } /** * @expectedException Sabre\DAV\Exception\Forbidden */ public function testSetName() { $file = new FileMock(); $file->setName('hi'); } public function testGetLastModified() { $file = new FileMock(); // checking if lastmod is within the range of a few seconds $lastMod = $file->getLastModified(); $compareTime = ($lastMod + 1)-time(); $this->assertTrue($compareTime < 3); } public function testGetChild() { $dir = new DirectoryMock(); $file = $dir->getChild('mockfile'); $this->assertTrue($file instanceof FileMock); } public function testChildExists() { $dir = new DirectoryMock(); $this->assertTrue($dir->childExists('mockfile')); } public function testChildExistsFalse() { $dir = new DirectoryMock(); $this->assertFalse($dir->childExists('mockfile2')); } /** * @expectedException Sabre\DAV\Exception\NotFound */ public function testGetChild404() { $dir = new DirectoryMock(); $file = $dir->getChild('blabla'); } /** * @expectedException Sabre\DAV\Exception\Forbidden */ public function testCreateFile() { $dir = new DirectoryMock(); $dir->createFile('hello','data'); } /** * @expectedException Sabre\DAV\Exception\Forbidden */ public function testCreateDirectory() { $dir = new DirectoryMock(); $dir->createDirectory('hello'); } public function testSimpleDirectoryConstruct() { $dir = new SimpleCollection('simpledir',array()); } /** * @depends testSimpleDirectoryConstruct */ public function testSimpleDirectoryConstructChild() { $file = new FileMock(); $dir = new SimpleCollection('simpledir',array($file)); $file2 = $dir->getChild('mockfile'); $this->assertEquals($file,$file2); } /** * @expectedException Sabre\DAV\Exception * @depends testSimpleDirectoryConstruct */ public function testSimpleDirectoryBadParam() { $dir = new SimpleCollection('simpledir',array('string shouldn\'t be here')); } /** * @depends testSimpleDirectoryConstruct */ public function testSimpleDirectoryAddChild() { $file = new FileMock(); $dir = new SimpleCollection('simpledir'); $dir->addChild($file); $file2 = $dir->getChild('mockfile'); $this->assertEquals($file,$file2); } /** * @depends testSimpleDirectoryConstruct * @depends testSimpleDirectoryAddChild */ public function testSimpleDirectoryGetChildren() { $file = new FileMock(); $dir = new SimpleCollection('simpledir'); $dir->addChild($file); $this->assertEquals(array($file),$dir->getChildren()); } /* * @depends testSimpleDirectoryConstruct */ public function testSimpleDirectoryGetName() { $dir = new SimpleCollection('simpledir'); $this->assertEquals('simpledir',$dir->getName()); } /** * @depends testSimpleDirectoryConstruct * @expectedException Sabre\DAV\Exception\NotFound */ public function testSimpleDirectoryGetChild404() { $dir = new SimpleCollection('simpledir'); $dir->getChild('blabla'); } } class DirectoryMock extends Collection { function getName() { return 'mockdir'; } function getChildren() { return array(new FileMock()); } } class FileMock extends File { function getName() { return 'mockfile'; } } sabre-dav-1.8.12/tests/Sabre/DAV/Browser/000077500000000000000000000000001246001162500176775ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAV/Browser/GuessContentTypeTest.php000066400000000000000000000035711246001162500245410ustar00rootroot00000000000000server->getPropertiesForPath('/somefile.jpg',$properties); $this->assertArrayHasKey(0,$result); $this->assertArrayHasKey(404,$result[0]); $this->assertArrayHasKey('{DAV:}getcontenttype',$result[0][404]); } /** * @depends testGetProperties */ function testGetPropertiesPluginEnabled() { $this->server->addPlugin(new GuessContentType()); $properties = array( '{DAV:}getcontenttype', ); $result = $this->server->getPropertiesForPath('/somefile.jpg',$properties); $this->assertArrayHasKey(0,$result); $this->assertArrayHasKey(200,$result[0]); $this->assertArrayHasKey('{DAV:}getcontenttype',$result[0][200]); $this->assertEquals('image/jpeg',$result[0][200]['{DAV:}getcontenttype']); } /** * @depends testGetPropertiesPluginEnabled */ function testGetPropertiesUnknown() { $this->server->addPlugin(new GuessContentType()); $properties = array( '{DAV:}getcontenttype', ); $result = $this->server->getPropertiesForPath('/somefile.hoi',$properties); $this->assertArrayHasKey(0,$result); $this->assertArrayHasKey(404,$result[0]); $this->assertArrayHasKey('{DAV:}getcontenttype',$result[0][404]); } } sabre-dav-1.8.12/tests/Sabre/DAV/Browser/MapGetToPropFindTest.php000066400000000000000000000020011246001162500243630ustar00rootroot00000000000000server->addPlugin(new MapGetToPropFind()); } function testCollectionGet() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'GET', ); $request = new HTTP\Request($serverVars); $request->setBody(''); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', 'DAV' => '1, 3, extended-mkcol', 'Vary' => 'Brief,Prefer', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 207 Multi-Status',$this->response->status,'Incorrect status response received. Full response body: ' . $this->response->body); } } sabre-dav-1.8.12/tests/Sabre/DAV/Browser/PluginTest.php000066400000000000000000000057721246001162500225210ustar00rootroot00000000000000server->addPlugin(new Plugin()); } function testCollectionGet() { $serverVars = array( 'REQUEST_URI' => '/dir', 'REQUEST_METHOD' => 'GET', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $this->assertEquals(array( 'Content-Type' => 'text/html; charset=utf-8', ), $this->response->headers ); $this->assertTrue(strpos($this->response->body, 'Index for dir/') !== false); $this->assertTrue(strpos($this->response->body, '')!==false); } function testNotFound() { $serverVars = array( 'REQUEST_URI' => '/random', 'REQUEST_METHOD' => 'GET', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 404 Not Found',$this->response->status); } function testPostOtherContentType() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'POST', 'CONTENT_TYPE' => 'text/xml', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 501 Not Implemented', $this->response->status); } function testPostNoSabreAction() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'POST', 'CONTENT_TYPE' => 'application/x-www-form-urlencoded', ); $postVars = array(); $request = new HTTP\Request($serverVars,$postVars); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 501 Not Implemented', $this->response->status); } function testPostMkCol() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'POST', 'CONTENT_TYPE' => 'application/x-www-form-urlencoded', ); $postVars = array( 'sabreAction' => 'mkcol', 'name' => 'new_collection', ); $request = new HTTP\Request($serverVars,$postVars); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 302 Found', $this->response->status); $this->assertEquals(array( 'Location' => '/', ), $this->response->headers); $this->assertTrue(is_dir(SABRE_TEMPDIR . '/new_collection')); } } sabre-dav-1.8.12/tests/Sabre/DAV/ClientMock.php000066400000000000000000000007761246001162500210270ustar00rootroot00000000000000url = $url; $this->curlSettings = $curlSettings; return $this->response; } /** * Just making this method public * * @param string $url * @return string */ public function getAbsoluteUrl($url) { return parent::getAbsoluteUrl($url); } } sabre-dav-1.8.12/tests/Sabre/DAV/ClientTest.php000066400000000000000000000637631246001162500210620ustar00rootroot00000000000000 '/', )); } /** * @expectedException InvalidArgumentException */ function testConstructNoBaseUri() { $client = new ClientMock(array()); } function testRequest() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 200 OK", "Content-Type: text/plain", "", "Hello there!" ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 45, 'http_code' => 200, ), 0, "" ); $result = $client->request('POST', 'baz', 'sillybody', array('Content-Type' => 'text/plain')); $this->assertEquals('http://example.org/foo/bar/baz', $client->url); $this->assertEquals(array( CURLOPT_RETURNTRANSFER => true, CURLOPT_FOLLOWLOCATION => true, CURLOPT_MAXREDIRS => 5, CURLOPT_CUSTOMREQUEST => 'POST', CURLOPT_POSTFIELDS => 'sillybody', CURLOPT_HEADER => true, CURLOPT_HTTPHEADER => array('Content-Type: text/plain'), CURLOPT_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, CURLOPT_REDIR_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, ), $client->curlSettings); $this->assertEquals(array( 'statusCode' => 200, 'headers' => array( 'content-type' => 'text/plain', ), 'body' => 'Hello there!' ), $result); } function testRequestProxy() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', 'proxy' => 'http://localhost:8000/', )); $responseBlob = array( "HTTP/1.1 200 OK", "Content-Type: text/plain", "", "Hello there!" ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 45, 'http_code' => 200, ), 0, "" ); $result = $client->request('POST', 'baz', 'sillybody', array('Content-Type' => 'text/plain')); $this->assertEquals('http://example.org/foo/bar/baz', $client->url); $this->assertEquals(array( CURLOPT_RETURNTRANSFER => true, CURLOPT_FOLLOWLOCATION => true, CURLOPT_MAXREDIRS => 5, CURLOPT_CUSTOMREQUEST => 'POST', CURLOPT_POSTFIELDS => 'sillybody', CURLOPT_HEADER => true, CURLOPT_HTTPHEADER => array('Content-Type: text/plain'), CURLOPT_PROXY => 'http://localhost:8000/', CURLOPT_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, CURLOPT_REDIR_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, ), $client->curlSettings); $this->assertEquals(array( 'statusCode' => 200, 'headers' => array( 'content-type' => 'text/plain', ), 'body' => 'Hello there!' ), $result); } function testRequestCAInfo() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 200 OK", "Content-Type: text/plain", "", "Hello there!" ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 45, 'http_code' => 200, ), 0, "" ); $client->addTrustedCertificates('bla'); $result = $client->request('POST', 'baz', 'sillybody', array('Content-Type' => 'text/plain')); $this->assertEquals('http://example.org/foo/bar/baz', $client->url); $this->assertEquals(array( CURLOPT_RETURNTRANSFER => true, CURLOPT_FOLLOWLOCATION => true, CURLOPT_MAXREDIRS => 5, CURLOPT_CUSTOMREQUEST => 'POST', CURLOPT_POSTFIELDS => 'sillybody', CURLOPT_HEADER => true, CURLOPT_CAINFO => 'bla', CURLOPT_HTTPHEADER => array('Content-Type: text/plain'), CURLOPT_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, CURLOPT_REDIR_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, ), $client->curlSettings); } function testRequestSslPeer() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 200 OK", "Content-Type: text/plain", "", "Hello there!" ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 45, 'http_code' => 200, ), 0, "" ); $client->setVerifyPeer(true); $result = $client->request('POST', 'baz', 'sillybody', array('Content-Type' => 'text/plain')); $this->assertEquals('http://example.org/foo/bar/baz', $client->url); $this->assertEquals(array( CURLOPT_RETURNTRANSFER => true, CURLOPT_FOLLOWLOCATION => true, CURLOPT_MAXREDIRS => 5, CURLOPT_CUSTOMREQUEST => 'POST', CURLOPT_POSTFIELDS => 'sillybody', CURLOPT_HEADER => true, CURLOPT_HTTPHEADER => array('Content-Type: text/plain'), CURLOPT_SSL_VERIFYPEER => true, CURLOPT_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, CURLOPT_REDIR_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, ), $client->curlSettings); } function testRequestAuth() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', 'userName' => 'user', 'password' => 'password', )); $responseBlob = array( "HTTP/1.1 200 OK", "Content-Type: text/plain", "", "Hello there!" ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 45, 'http_code' => 200, ), 0, "" ); $result = $client->request('POST', 'baz', 'sillybody', array('Content-Type' => 'text/plain')); $this->assertEquals('http://example.org/foo/bar/baz', $client->url); $this->assertEquals(array( CURLOPT_RETURNTRANSFER => true, CURLOPT_FOLLOWLOCATION => true, CURLOPT_MAXREDIRS => 5, CURLOPT_CUSTOMREQUEST => 'POST', CURLOPT_POSTFIELDS => 'sillybody', CURLOPT_HEADER => true, CURLOPT_HTTPHEADER => array('Content-Type: text/plain'), CURLOPT_HTTPAUTH => CURLAUTH_BASIC | CURLAUTH_DIGEST, CURLOPT_USERPWD => 'user:password', CURLOPT_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, CURLOPT_REDIR_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, ), $client->curlSettings); $this->assertEquals(array( 'statusCode' => 200, 'headers' => array( 'content-type' => 'text/plain', ), 'body' => 'Hello there!' ), $result); } function testRequestAuthBasic() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', 'userName' => 'user', 'password' => 'password', 'authType' => Client::AUTH_BASIC, )); $responseBlob = array( "HTTP/1.1 200 OK", "Content-Type: text/plain", "", "Hello there!" ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 45, 'http_code' => 200, ), 0, "" ); $result = $client->request('POST', 'baz', 'sillybody', array('Content-Type' => 'text/plain')); $this->assertEquals('http://example.org/foo/bar/baz', $client->url); $this->assertEquals(array( CURLOPT_RETURNTRANSFER => true, CURLOPT_FOLLOWLOCATION => true, CURLOPT_MAXREDIRS => 5, CURLOPT_CUSTOMREQUEST => 'POST', CURLOPT_POSTFIELDS => 'sillybody', CURLOPT_HEADER => true, CURLOPT_HTTPHEADER => array('Content-Type: text/plain'), CURLOPT_HTTPAUTH => CURLAUTH_BASIC, CURLOPT_USERPWD => 'user:password', CURLOPT_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, CURLOPT_REDIR_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, ), $client->curlSettings); $this->assertEquals(array( 'statusCode' => 200, 'headers' => array( 'content-type' => 'text/plain', ), 'body' => 'Hello there!' ), $result); } function testRequestAuthDigest() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', 'userName' => 'user', 'password' => 'password', 'authType' => Client::AUTH_DIGEST, )); $responseBlob = array( "HTTP/1.1 200 OK", "Content-Type: text/plain", "", "Hello there!" ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 45, 'http_code' => 200, ), 0, "" ); $result = $client->request('POST', 'baz', 'sillybody', array('Content-Type' => 'text/plain')); $this->assertEquals('http://example.org/foo/bar/baz', $client->url); $this->assertEquals(array( CURLOPT_RETURNTRANSFER => true, CURLOPT_FOLLOWLOCATION => true, CURLOPT_MAXREDIRS => 5, CURLOPT_CUSTOMREQUEST => 'POST', CURLOPT_POSTFIELDS => 'sillybody', CURLOPT_HEADER => true, CURLOPT_HTTPHEADER => array('Content-Type: text/plain'), CURLOPT_HTTPAUTH => CURLAUTH_DIGEST, CURLOPT_USERPWD => 'user:password', CURLOPT_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, CURLOPT_REDIR_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, ), $client->curlSettings); $this->assertEquals(array( 'statusCode' => 200, 'headers' => array( 'content-type' => 'text/plain', ), 'body' => 'Hello there!' ), $result); } function testRequestError() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 200 OK", "Content-Type: text/plain", "", "Hello there!" ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 45, 'http_code' => 200, ), CURLE_COULDNT_CONNECT, "Could not connect, or something" ); $caught = false; try { $client->request('POST', 'baz', 'sillybody', array('Content-Type' => 'text/plain')); } catch (Exception $e) { $caught = true; } if (!$caught) { $this->markTestFailed('Exception was not thrown'); } } function testRequestHTTPError() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 400 Bad Request", "Content-Type: text/plain", "", "Hello there!" ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 45, 'http_code' => 400, ), 0, "" ); $caught = false; try { $client->request('POST', 'baz', 'sillybody', array('Content-Type' => 'text/plain')); } catch (Exception $e) { $caught = true; } if (!$caught) { $this->fail('Exception was not thrown'); } } function testRequestHTTP404() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 404 Not Found", "Content-Type: text/plain", "", "Hello there!" ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 45, 'http_code' => 404, ), 0, "" ); $caught = false; try { $client->request('POST', 'baz', 'sillybody', array('Content-Type' => 'text/plain')); } catch (Exception\NotFound $e) { $caught = true; } if (!$caught) { $this->fail('Exception was not thrown'); } } /** * @dataProvider supportedHTTPCodes */ function testSpecificHTTPErrors($error) { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 $error blabla", "Content-Type: text/plain", "", "Hello there!" ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 42, 'http_code' => $error, ), 0, "" ); try { $client->request('POST', 'baz', 'sillybody', array('Content-Type' => 'text/plain')); $this->fail('Exception was not thrown'); } catch (Exception $e) { $this->assertEquals($e->getHTTPCode(), $error); } } public function supportedHTTPCodes() { return array( array(400), array(401), array(402), array(403), array(404), array(405), array(409), array(412), array(416), array(500), array(501), array(507), ); } function testUnsupportedHTTPError() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 580 blabla", "Content-Type: text/plain", "", "Hello there!" ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 42, 'http_code' => "580" ), 0, "" ); try { $client->request('POST', 'baz', 'sillybody', array('Content-Type' => 'text/plain')); $this->fail('Exception was not thrown'); } catch (Exception $e) { $this->assertEquals(500, $e->getHTTPCode()); } } function testGetAbsoluteUrl() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/', )); $this->assertEquals( 'http://example.org/foo/bar', $client->getAbsoluteUrl('bar') ); $this->assertEquals( 'http://example.org/bar', $client->getAbsoluteUrl('/bar') ); $this->assertEquals( 'http://example.com/bar', $client->getAbsoluteUrl('http://example.com/bar') ); } function testOptions() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 200 OK", "DAV: feature1, feature2", "", ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 40, 'http_code' => 200, ), 0, "" ); $result = $client->options(); $this->assertEquals( array('feature1', 'feature2'), $result ); } function testOptionsNoDav() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 200 OK", "", ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 20, 'http_code' => 200, ), 0, "" ); $result = $client->options(); $this->assertEquals( array(), $result ); } /** * @expectedException InvalidArgumentException */ function testPropFindNoXML() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 200 OK", "", ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 20, 'http_code' => 200, ), 0, "" ); $client->propfind('', array('{DAV:}foo','{DAV:}bar')); } function testPropFind() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 200 OK", "", "", "", " ", " /foo/bar/", " ", " ", " hello", " ", " HTTP/1.1 200 OK", " ", " ", " ", " ", " ", " HTTP/1.1 404 Not Found", " ", " ", "", ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 19, 'http_code' => 200, ), 0, "" ); $result = $client->propfind('', array('{DAV:}foo','{DAV:}bar')); $this->assertEquals(array( '{DAV:}foo' => 'hello', ), $result); $requestBody = array( '', '', ' ', ' ', ' ', ' ', '' ); $requestBody = implode("\n", $requestBody); $this->assertEquals($requestBody, $client->curlSettings[CURLOPT_POSTFIELDS]); } /** * This was reported in Issue 235. * * If no '200 Ok' properties are returned, the client will throw an * E_NOTICE. */ function testPropFindNo200s() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 200 OK", "", "", "", " ", " /foo/bar/", " ", " ", " ", " ", " HTTP/1.1 404 Not Found", " ", " ", "", ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 19, 'http_code' => 200, ), 0, "" ); $result = $client->propfind('', array('{DAV:}foo','{DAV:}bar')); $this->assertEquals(array( ), $result); } function testPropFindDepth1CustomProp() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 200 OK", "", "", "", " ", " /foo/bar/", " ", " ", " hello", " world", " ", " HTTP/1.1 200 OK", " ", " ", "", ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 19, 'http_code' => 200, ), 0, "" ); $result = $client->propfind('', array('{DAV:}foo','{urn:custom}bar'),1); $this->assertEquals(array( "/foo/bar/" => array( '{DAV:}foo' => 'hello', '{urn:custom}bar' => 'world', ), ), $result); $requestBody = array( '', '', ' ', ' ', ' ', ' ', '' ); $requestBody = implode("\n", $requestBody); $this->assertEquals($requestBody, $client->curlSettings[CURLOPT_POSTFIELDS]); } function testPropPatch() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 200 OK", "", ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 20, 'http_code' => 200, ), 0, "" ); $client->proppatch('', array( '{DAV:}foo' => 'newvalue', '{urn:custom}foo' => 'newvalue2', '{DAV:}bar' => null, '{urn:custom}bar' => null, )); $requestBody = array( '', '', '', ' newvalue', '', '', ' newvalue2', '', '', ' ', '', '', ' ', '', '' ); $requestBody = implode("\n", $requestBody); $this->assertEquals($requestBody, $client->curlSettings[CURLOPT_POSTFIELDS]); } function testHEADRequest() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 200 OK", "Content-Type: text/plain", "", "Hello there!" ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 45, 'http_code' => 200, ), 0, "" ); $result = $client->request('HEAD', 'baz'); $this->assertEquals('http://example.org/foo/bar/baz', $client->url); $this->assertEquals(array( CURLOPT_RETURNTRANSFER => true, CURLOPT_FOLLOWLOCATION => true, CURLOPT_MAXREDIRS => 5, CURLOPT_CUSTOMREQUEST => 'HEAD', CURLOPT_NOBODY => true, CURLOPT_HEADER => true, CURLOPT_HTTPHEADER => array(), CURLOPT_POSTFIELDS => null, CURLOPT_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, CURLOPT_REDIR_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, ), $client->curlSettings); } function testPUTRequest() { $client = new ClientMock(array( 'baseUri' => 'http://example.org/foo/bar/', )); $responseBlob = array( "HTTP/1.1 200 OK", "Content-Type: text/plain", "", "Hello there!" ); $client->response = array( implode("\r\n", $responseBlob), array( 'header_size' => 45, 'http_code' => 200, ), 0, "" ); $result = $client->request('PUT', 'bar','newcontent'); $this->assertEquals('http://example.org/foo/bar/bar', $client->url); $this->assertEquals(array( CURLOPT_RETURNTRANSFER => true, CURLOPT_FOLLOWLOCATION => true, CURLOPT_MAXREDIRS => 5, CURLOPT_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, CURLOPT_REDIR_PROTOCOLS => CURLPROTO_HTTP | CURLPROTO_HTTPS, CURLOPT_CUSTOMREQUEST => "PUT", CURLOPT_POSTFIELDS => 'newcontent', CURLOPT_HEADER => true, CURLOPT_HTTPHEADER => array(), ), $client->curlSettings); } } sabre-dav-1.8.12/tests/Sabre/DAV/Exception/000077500000000000000000000000001246001162500202125ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAV/Exception/LockedTest.php000066400000000000000000000027541246001162500227740ustar00rootroot00000000000000formatOutput = true; $root = $dom->createElement('d:root'); $dom->appendChild($root); $root->setAttribute('xmlns:d','DAV:'); $lockInfo = new DAV\Locks\LockInfo(); $lockInfo->uri = '/foo'; $locked = new Locked($lockInfo); $locked->serialize(new DAV\Server(), $root); $output = $dom->saveXML(); $expected = ' /foo '; $this->assertEquals($expected, $output); } function testSerializeAmpersand() { $dom = new DOMDocument('1.0'); $dom->formatOutput = true; $root = $dom->createElement('d:root'); $dom->appendChild($root); $root->setAttribute('xmlns:d','DAV:'); $lockInfo = new DAV\Locks\LockInfo(); $lockInfo->uri = '/foo&bar'; $locked = new Locked($lockInfo); $locked->serialize(new DAV\Server(), $root); $output = $dom->saveXML(); $expected = ' /foo&bar '; $this->assertEquals($expected, $output); } } sabre-dav-1.8.12/tests/Sabre/DAV/Exception/PaymentRequiredTest.php000066400000000000000000000003571246001162500247060ustar00rootroot00000000000000assertEquals(402, $ex->getHTTPCode()); } } sabre-dav-1.8.12/tests/Sabre/DAV/ExceptionTest.php000066400000000000000000000010701246001162500215610ustar00rootroot00000000000000assertEquals(500,$e->getHTTPCode()); } function testExceptionStatuses() { $c = array( 'Sabre\\DAV\\Exception\\NotAuthenticated' => 401, 'Sabre\\DAV\\Exception\\InsufficientStorage' => 507, ); foreach($c as $class=>$status) { $obj = new $class(); $this->assertEquals($status, $obj->getHTTPCode()); } } } sabre-dav-1.8.12/tests/Sabre/DAV/FSExt/000077500000000000000000000000001246001162500172455ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAV/FSExt/FileTest.php000066400000000000000000000037311246001162500215010ustar00rootroot00000000000000put('New contents'); $this->assertEquals('New contents',file_get_contents(SABRE_TEMPDIR . '/file.txt')); $this->assertEquals('"' . md5('New contents') . '"', $result); } function testRange() { $file = new File(SABRE_TEMPDIR . '/file.txt'); $file->put('0000000'); $file->patch('111', 2, 3); $this->assertEquals('0001110',file_get_contents(SABRE_TEMPDIR . '/file.txt')); } function testRangeStream() { $stream = fopen('php://memory','r+'); fwrite($stream, "222"); rewind($stream); $file = new File(SABRE_TEMPDIR . '/file.txt'); $file->put('0000000'); $file->patch($stream, 2, 3); $this->assertEquals('0002220',file_get_contents(SABRE_TEMPDIR . '/file.txt')); } function testGet() { $file = new File(SABRE_TEMPDIR . '/file.txt'); $this->assertEquals('Contents',stream_get_contents($file->get())); } function testDelete() { $file = new File(SABRE_TEMPDIR . '/file.txt'); $file->delete(); $this->assertFalse(file_exists(SABRE_TEMPDIR . '/file.txt')); } function testGetETag() { $file = new File(SABRE_TEMPDIR . '/file.txt'); $this->assertEquals('"' . md5('Contents') . '"',$file->getETag()); } function testGetContentType() { $file = new File(SABRE_TEMPDIR . '/file.txt'); $this->assertNull($file->getContentType()); } function testGetSize() { $file = new File(SABRE_TEMPDIR . '/file.txt'); $this->assertEquals(8,$file->getSize()); } } sabre-dav-1.8.12/tests/Sabre/DAV/FSExt/NodeTest.php000066400000000000000000000124071246001162500215070ustar00rootroot00000000000000 'foo', '{http://sabredav.org/NS/2010}test2' => 'bar', ); $result = $file->updateProperties($properties); $expected = true; $this->assertEquals($expected, $result); $getProperties = $file->getProperties(array_keys($properties)); $this->assertEquals($properties, $getProperties); } /** * @depends testUpdateProperties */ function testUpdatePropertiesAgain() { $file = new File(SABRE_TEMPDIR . '/dir/file.txt'); $mutations = array( '{http://sabredav.org/NS/2010}test1' => 'foo', '{http://sabredav.org/NS/2010}test2' => 'bar', ); $result = $file->updateProperties($mutations); $this->assertEquals(true, $result); $mutations = array( '{http://sabredav.org/NS/2010}test1' => 'foo', '{http://sabredav.org/NS/2010}test3' => 'baz', ); $result = $file->updateProperties($mutations); $this->assertEquals(true, $result); } /** * @depends testUpdateProperties */ function testUpdatePropertiesDelete() { $file = new File(SABRE_TEMPDIR . '/dir/file.txt'); $mutations = array( '{http://sabredav.org/NS/2010}test1' => 'foo', '{http://sabredav.org/NS/2010}test2' => 'bar', ); $result = $file->updateProperties($mutations); $this->assertEquals(true, $result); $mutations = array( '{http://sabredav.org/NS/2010}test1' => null, '{http://sabredav.org/NS/2010}test3' => null ); $result = $file->updateProperties($mutations); $this->assertEquals(true, $result); $properties = $file->getProperties(array('http://sabredav.org/NS/2010}test1','{http://sabredav.org/NS/2010}test2','{http://sabredav.org/NS/2010}test3')); $this->assertEquals(array( '{http://sabredav.org/NS/2010}test2' => 'bar', ), $properties); } /** * @depends testUpdateProperties */ function testUpdatePropertiesMove() { $file = new File(SABRE_TEMPDIR . '/dir/file.txt'); $mutations = array( '{http://sabredav.org/NS/2010}test1' => 'foo', '{http://sabredav.org/NS/2010}test2' => 'bar', ); $result = $file->updateProperties($mutations); $this->assertEquals(true, $result); $properties = $file->getProperties(array('{http://sabredav.org/NS/2010}test1','{http://sabredav.org/NS/2010}test2','{http://sabredav.org/NS/2010}test3')); $this->assertEquals(array( '{http://sabredav.org/NS/2010}test1' => 'foo', '{http://sabredav.org/NS/2010}test2' => 'bar', ), $properties); // Renaming $file->setName('file3.txt'); $this->assertFalse(file_exists(SABRE_TEMPDIR . '/dir/file.txt')); $this->assertTrue(file_exists(SABRE_TEMPDIR . '/dir/file3.txt')); $this->assertEquals('file3.txt',$file->getName()); $newFile = new File(SABRE_TEMPDIR . '/dir/file3.txt'); $this->assertEquals('file3.txt',$newFile->getName()); $properties = $newFile->getProperties(array('{http://sabredav.org/NS/2010}test1','{http://sabredav.org/NS/2010}test2','{http://sabredav.org/NS/2010}test3')); $this->assertEquals(array( '{http://sabredav.org/NS/2010}test1' => 'foo', '{http://sabredav.org/NS/2010}test2' => 'bar', ), $properties); } /** * @depends testUpdatePropertiesMove */ function testUpdatePropertiesDeleteBleed() { $file = new File(SABRE_TEMPDIR . '/dir/file.txt'); $mutations = array( '{http://sabredav.org/NS/2010}test1' => 'foo', '{http://sabredav.org/NS/2010}test2' => 'bar', ); $result = $file->updateProperties($mutations); $this->assertEquals(true, $result); $properties = $file->getProperties(array('{http://sabredav.org/NS/2010}test1','{http://sabredav.org/NS/2010}test2','{http://sabredav.org/NS/2010}test3')); $this->assertEquals(array( '{http://sabredav.org/NS/2010}test1' => 'foo', '{http://sabredav.org/NS/2010}test2' => 'bar', ), $properties); // Deleting $file->delete(); $this->assertFalse(file_exists(SABRE_TEMPDIR . '/dir/file.txt')); // Creating it again file_put_contents(SABRE_TEMPDIR . '/dir/file.txt','New Contents'); $file = new File(SABRE_TEMPDIR . '/dir/file.txt'); $properties = $file->getProperties(array('http://sabredav.org/NS/2010}test1','{http://sabredav.org/NS/2010}test2','{http://sabredav.org/NS/2010}test3')); $this->assertEquals(array(), $properties); } } sabre-dav-1.8.12/tests/Sabre/DAV/FSExt/ServerTest.php000066400000000000000000000153111246001162500220650ustar00rootroot00000000000000tempDir); } function testGet() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'GET', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/octet-stream', 'Content-Length' => 13, 'Last-Modified' => HTTP\Util::toHTTPDate(new \DateTime('@' . filemtime($this->tempDir . '/test.txt'))), 'ETag' => '"' .md5_file($this->tempDir . '/test.txt') . '"', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $this->assertEquals('Test contents', stream_get_contents($this->response->body)); } function testHEAD() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'HEAD', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/octet-stream', 'Content-Length' => 13, 'Last-Modified' => HTTP\Util::toHTTPDate(new \DateTime('@' . filemtime($this->tempDir . '/test.txt'))), 'ETag' => '"' . md5_file($this->tempDir . '/test.txt') . '"', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $this->assertEquals('', $this->response->body); } function testPut() { $serverVars = array( 'REQUEST_URI' => '/testput.txt', 'REQUEST_METHOD' => 'PUT', ); $request = new HTTP\Request($serverVars); $request->setBody('Testing new file'); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Length' => 0, 'ETag' => '"' . md5('Testing new file') . '"', ), $this->response->headers); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); $this->assertEquals('', $this->response->body); $this->assertEquals('Testing new file',file_get_contents($this->tempDir . '/testput.txt')); } function testPutAlreadyExists() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'PUT', 'HTTP_IF_NONE_MATCH' => '*', ); $request = new HTTP\Request($serverVars); $request->setBody('Testing new file'); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); $this->assertEquals('HTTP/1.1 412 Precondition failed',$this->response->status); $this->assertNotEquals('Testing new file',file_get_contents($this->tempDir . '/test.txt')); } function testMkcol() { $serverVars = array( 'REQUEST_URI' => '/testcol', 'REQUEST_METHOD' => 'MKCOL', ); $request = new HTTP\Request($serverVars); $request->setBody(""); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Length' => '0', ),$this->response->headers); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); $this->assertEquals('', $this->response->body); $this->assertTrue(is_dir($this->tempDir . '/testcol')); } function testPutUpdate() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'PUT', ); $request = new HTTP\Request($serverVars); $request->setBody('Testing updated file'); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('0', $this->response->headers['Content-Length']); $this->assertEquals('HTTP/1.1 204 No Content',$this->response->status); $this->assertEquals('', $this->response->body); $this->assertEquals('Testing updated file',file_get_contents($this->tempDir . '/test.txt')); } function testDelete() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'DELETE', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Length' => '0', ),$this->response->headers); $this->assertEquals('HTTP/1.1 204 No Content',$this->response->status); $this->assertEquals('', $this->response->body); $this->assertFalse(file_exists($this->tempDir . '/test.txt')); } function testDeleteDirectory() { $serverVars = array( 'REQUEST_URI' => '/testcol', 'REQUEST_METHOD' => 'DELETE', ); mkdir($this->tempDir.'/testcol'); file_put_contents($this->tempDir.'/testcol/test.txt','Hi! I\'m a file with a short lifespan'); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Length' => '0', ),$this->response->headers); $this->assertEquals('HTTP/1.1 204 No Content',$this->response->status); $this->assertEquals('', $this->response->body); $this->assertFalse(file_exists($this->tempDir . '/col')); } function testOptions() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'OPTIONS', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'DAV' => '1, 3, extended-mkcol', 'MS-Author-Via' => 'DAV', 'Allow' => 'OPTIONS, GET, HEAD, DELETE, PROPFIND, PUT, PROPPATCH, COPY, MOVE, REPORT', 'Accept-Ranges' => 'bytes', 'Content-Length' => '0', 'X-Sabre-Version'=> DAV\Version::VERSION, ),$this->response->headers); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $this->assertEquals('', $this->response->body); } } sabre-dav-1.8.12/tests/Sabre/DAV/HTTPPreferParsingTest.php000066400000000000000000000116371246001162500231040ustar00rootroot00000000000000 'return-asynch', )); $server = new Server(); $server->httpRequest = $httpRequest; $this->assertEquals(array( 'return-asynch' => true, 'return-minimal' => false, 'return-representation' => false, 'strict' => false, 'lenient' => false, 'wait' => null, ), $server->getHTTPPrefer()); } function testParseValue() { $httpRequest = new HTTP\Request(array( 'HTTP_PREFER' => 'wait=10', )); $server = new Server(); $server->httpRequest = $httpRequest; $this->assertEquals(array( 'return-asynch' => false, 'return-minimal' => false, 'return-representation' => false, 'strict' => false, 'lenient' => false, 'wait' => 10, ), $server->getHTTPPrefer()); } function testParseMultiple() { $httpRequest = new HTTP\Request(array( 'HTTP_PREFER' => 'return-minimal, strict,lenient', )); $server = new Server(); $server->httpRequest = $httpRequest; $this->assertEquals(array( 'return-asynch' => false, 'return-minimal' => true, 'return-representation' => false, 'strict' => true, 'lenient' => true, 'wait' => null, ), $server->getHTTPPrefer()); } function testParseWeirdValue() { $httpRequest = new HTTP\Request(array( 'HTTP_PREFER' => 'BOOOH', )); $server = new Server(); $server->httpRequest = $httpRequest; $this->assertEquals(array( 'strict' => false, 'lenient' => false, 'wait' => null, 'return-asynch' => false, 'return-minimal' => false, 'return-representation' => false, ), $server->getHTTPPrefer()); } function testBrief() { $httpRequest = new HTTP\Request(array( 'HTTP_BRIEF' => 't', )); $server = new Server(); $server->httpRequest = $httpRequest; $this->assertEquals(array( 'strict' => false, 'lenient' => false, 'wait' => null, 'return-asynch' => false, 'return-minimal' => true, 'return-representation' => false, ), $server->getHTTPPrefer()); } /** * propfindMinimal * * @return void */ function testpropfindMinimal() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PROPFIND', 'REQUEST_URI' => '/', 'HTTP_PREFER' => 'return-minimal', )); $request->setBody(<< BLA ); $response = $this->request($request); $this->assertTrue(strpos($response->body, 'resourcetype')!==false); $this->assertTrue(strpos($response->body, 'something')===false); } function testproppatchMinimal() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PROPPATCH', 'REQUEST_URI' => '/', 'HTTP_PREFER' => 'return-minimal', )); $request->setBody(<< nope! BLA ); $this->server->subscribeEvent('updateProperties', function(&$props, &$result) { if (isset($props['{DAV:}something'])) { unset($props['{DAV:}something']); $result[200]['{DAV:}something'] = null; } }); $response = $this->request($request); $this->assertEquals(0, strlen($response->body), 'Expected empty body: ' . $response->body); $this->assertEquals('HTTP/1.1 204 No Content', $response->status); } function testproppatchMinimalError() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PROPPATCH', 'REQUEST_URI' => '/', 'HTTP_PREFER' => 'return-minimal', )); $request->setBody(<< nope! BLA ); $response = $this->request($request); $this->assertEquals('HTTP/1.1 207 Multi-Status', $response->status); $this->assertTrue(strpos($response->body, 'something')!==false); $this->assertTrue(strpos($response->body, 'HTTP/1.1 403 Forbidden')!==false); } } sabre-dav-1.8.12/tests/Sabre/DAV/HttpDeleteTest.php000066400000000000000000000065511246001162500216760ustar00rootroot00000000000000tree = new Mock\Collection('root', array( 'file1' => 'foo', 'dir' => array( 'subfile' => 'bar', 'subfile2' => 'baz', ), )); } /** * A successful DELETE */ public function testDelete() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file1', 'REQUEST_METHOD' => 'DELETE', )); $response = $this->request($request); $this->assertEquals( 'HTTP/1.1 204 No Content', $response->status, "Incorrect status code. Response body: " . $response->body ); $this->assertEquals( array( 'Content-Length' => '0', ), $response->headers ); } /** * Deleting a Directory */ public function testDeleteDirectory() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/dir', 'REQUEST_METHOD' => 'DELETE', )); $response = $this->request($request); $this->assertEquals( 'HTTP/1.1 204 No Content', $response->status, "Incorrect status code. Response body: " . $response->body ); $this->assertEquals( array( 'Content-Length' => '0', ), $response->headers ); } /** * DELETE on a node that does not exist */ public function testDeleteNotFound() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file2', 'REQUEST_METHOD' => 'DELETE', )); $response = $this->request($request); $this->assertEquals( 'HTTP/1.1 404 Not Found', $response->status, "Incorrect status code. Response body: " . $response->body ); } /** * DELETE with preconditions */ public function testDeletePreconditions() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file1', 'REQUEST_METHOD' => 'DELETE', 'HTTP_IF_MATCH' => '"' . md5('foo') . '"', )); $response = $this->request($request); $this->assertEquals( 'HTTP/1.1 204 No Content', $response->status, "Incorrect status code. Response body: " . $response->body ); } /** * DELETE with incorrect preconditions */ public function testDeletePreconditionsFailed() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file1', 'REQUEST_METHOD' => 'DELETE', 'HTTP_IF_MATCH' => '"' . md5('bar') . '"', )); $response = $this->request($request); $this->assertEquals( 'HTTP/1.1 412 Precondition failed', $response->status, "Incorrect status code. Response body: " . $response->body ); } } sabre-dav-1.8.12/tests/Sabre/DAV/HttpPutTest.php000066400000000000000000000213351246001162500212410ustar00rootroot00000000000000tree = new Mock\Collection('root', array( 'file1' => 'foo', )); } /** * A successful PUT of a new file. */ public function testPut() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file2', 'REQUEST_METHOD' => 'PUT', )); $request->setBody('hello'); $response = $this->request($request); $this->assertEquals('HTTP/1.1 201 Created', $response->status); $this->assertEquals( 'hello', $this->server->tree->getNodeForPath('file2')->get() ); $this->assertEquals( array( 'Content-Length' => '0', 'ETag' => '"' . md5('hello') . '"' ), $response->headers ); } /** * A successful PUT on an existing file. * * @depends testPut */ public function testPutExisting() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file1', 'REQUEST_METHOD' => 'PUT', )); $request->setBody('bar'); $response = $this->request($request); $this->assertEquals('HTTP/1.1 204 No Content', $response->status); $this->assertEquals( 'bar', $this->server->tree->getNodeForPath('file1')->get() ); $this->assertEquals( array( 'Content-Length' => '0', 'ETag' => '"' . md5('bar') . '"' ), $response->headers ); } /** * PUT on existing file with If-Match: * * * @depends testPutExisting */ public function testPutExistingIfMatchStar() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file1', 'REQUEST_METHOD' => 'PUT', 'HTTP_IF_MATCH' => '*', )); $request->setBody('hello'); $response = $this->request($request); $this->assertEquals('HTTP/1.1 204 No Content', $response->status); $this->assertEquals( 'hello', $this->server->tree->getNodeForPath('file1')->get() ); $this->assertEquals( array( 'Content-Length' => '0', 'ETag' => '"' . md5('hello') . '"' ), $response->headers ); } /** * PUT on existing file with If-Match: with a correct etag * * @depends testPutExisting */ public function testPutExistingIfMatchCorrect() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file1', 'REQUEST_METHOD' => 'PUT', 'HTTP_IF_MATCH' => '"' . md5('foo') . '"', )); $request->setBody('hello'); $response = $this->request($request); $this->assertEquals('HTTP/1.1 204 No Content', $response->status); $this->assertEquals( 'hello', $this->server->tree->getNodeForPath('file1')->get() ); $this->assertEquals( array( 'Content-Length' => '0', 'ETag' => '"' . md5('hello') . '"' ), $response->headers ); } /** * PUT with Content-Range should be rejected. * * @depends testPut */ public function testPutContentRange() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file2', 'REQUEST_METHOD' => 'PUT', 'HTTP_CONTENT_RANGE' => 'bytes/100-200', )); $request->setBody('hello'); $response = $this->request($request); $this->assertEquals('HTTP/1.1 501 Not Implemented', $response->status); } /** * PUT on non-existing file with If-None-Match: * should work. * * @depends testPut */ public function testPutIfNoneMatchStar() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file2', 'REQUEST_METHOD' => 'PUT', 'HTTP_IF_NONE_MATCH' => '*', )); $request->setBody('hello'); $response = $this->request($request); $this->assertEquals('HTTP/1.1 201 Created', $response->status); $this->assertEquals( 'hello', $this->server->tree->getNodeForPath('file2')->get() ); $this->assertEquals( array( 'Content-Length' => '0', 'ETag' => '"' . md5('hello') . '"' ), $response->headers ); } /** * PUT on non-existing file with If-Match: * should fail. * * @depends testPut */ public function testPutIfMatchStar() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file2', 'REQUEST_METHOD' => 'PUT', 'HTTP_IF_MATCH' => '*', )); $request->setBody('hello'); $response = $this->request($request); $this->assertEquals('HTTP/1.1 412 Precondition failed', $response->status); } /** * PUT on existing file with If-None-Match: * should fail. * * @depends testPut */ public function testPutExistingIfNoneMatchStar() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file1', 'REQUEST_METHOD' => 'PUT', 'HTTP_IF_NONE_MATCH' => '*', )); $request->setBody('hello'); $response = $this->request($request); $this->assertEquals('HTTP/1.1 412 Precondition failed', $response->status); } /** * PUT thats created in a non-collection should be rejected. * * @depends testPut */ public function testPutNoParent() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file1/file2', 'REQUEST_METHOD' => 'PUT', )); $request->setBody('hello'); $response = $this->request($request); $this->assertEquals('HTTP/1.1 409 Conflict', $response->status); } /** * Finder may sometimes make a request, which gets its content-body * stripped. We can't always prevent this from happening, but in some cases * we can detected this and return an error instead. * * @depends testPut */ public function testFinderPutSuccess() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file2', 'REQUEST_METHOD' => 'PUT', 'HTTP_X_EXPECTED_ENTITY_LENGTH' => '5', )); $request->setBody('hello'); $response = $this->request($request); $this->assertEquals('HTTP/1.1 201 Created', $response->status); $this->assertEquals( 'hello', $this->server->tree->getNodeForPath('file2')->get() ); $this->assertEquals( array( 'Content-Length' => '0', 'ETag' => '"' . md5('hello') . '"' ), $response->headers ); } /** * Same as the last one, but in this case we're mimicing a failed request. * * @depends testFinderPutSuccess */ public function testFinderPutFail() { $request = new HTTP\Request(array( 'REQUEST_URI' => '/file2', 'REQUEST_METHOD' => 'PUT', 'HTTP_X_EXPECTED_ENTITY_LENGTH' => '5', )); $request->setBody(''); $response = $this->request($request); $this->assertEquals('HTTP/1.1 403 Forbidden', $response->status); } /** * Plugins can intercept PUT. We need to make sure that works. */ public function testPutIntercept() { $this->server->subscribeEvent('beforeBind', array($this, 'beforeBind')); $request = new HTTP\Request(array( 'REQUEST_URI' => '/file2', 'REQUEST_METHOD' => 'PUT', )); $request->setBody('hello'); $response = $this->request($request); $this->assertEquals('HTTP/1.1 418 I\'m a teapot', $response->status); $this->assertFalse( $this->server->tree->nodeExists('file2') ); $this->assertEquals( array( ), $response->headers ); } public function beforeBind() { $this->server->httpResponse->sendStatus(418); return false; } } sabre-dav-1.8.12/tests/Sabre/DAV/Issue33Test.php000066400000000000000000000050451246001162500210670ustar00rootroot00000000000000setBaseUri('/webdav/'); $serverVars = array( 'REQUEST_URI' => '/webdav/bar', 'HTTP_DESTINATION' => 'http://dev2.tribalos.com/webdav/%C3%A0fo%C3%B3', 'HTTP_OVERWRITE' => 'F', ); $request = new HTTP\Request($serverVars); $server->httpRequest = $request; $info = $server->getCopyAndMoveInfo(); $this->assertEquals('%C3%A0fo%C3%B3', urlencode($info['destination'])); $this->assertFalse($info['destinationExists']); $this->assertFalse($info['destinationNode']); } function testTreeMove() { mkdir(SABRE_TEMPDIR . '/issue33'); $dir = new FS\Directory(SABRE_TEMPDIR . '/issue33'); $dir->createDirectory('bar'); $tree = new ObjectTree($dir); $tree->move('bar',urldecode('%C3%A0fo%C3%B3')); $node = $tree->getNodeForPath(urldecode('%C3%A0fo%C3%B3')); $this->assertEquals(urldecode('%C3%A0fo%C3%B3'),$node->getName()); } function testDirName() { $dirname1 = 'bar'; $dirname2 = urlencode('%C3%A0fo%C3%B3');; $this->assertTrue(dirname($dirname1)==dirname($dirname2)); } /** * @depends testTreeMove * @depends testCopyMoveInfo */ function testEverything() { // Request object $serverVars = array( 'REQUEST_METHOD' => 'MOVE', 'REQUEST_URI' => '/webdav/bar', 'HTTP_DESTINATION' => 'http://dev2.tribalos.com/webdav/%C3%A0fo%C3%B3', 'HTTP_OVERWRITE' => 'F', ); $request = new HTTP\Request($serverVars); $request->setBody(''); $response = new HTTP\ResponseMock(); // Server setup mkdir(SABRE_TEMPDIR . '/issue33'); $dir = new FS\Directory(SABRE_TEMPDIR . '/issue33'); $dir->createDirectory('bar'); $tree = new ObjectTree($dir); $server = new Server($tree); $server->setBaseUri('/webdav/'); $server->httpRequest = $request; $server->httpResponse = $response; $server->exec(); $this->assertTrue(file_exists(SABRE_TEMPDIR . '/issue33/' . urldecode('%C3%A0fo%C3%B3'))); } } sabre-dav-1.8.12/tests/Sabre/DAV/Locks/000077500000000000000000000000001246001162500173275ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAV/Locks/Backend/000077500000000000000000000000001246001162500206565ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAV/Locks/Backend/AbstractTest.php000066400000000000000000000114541246001162500237770ustar00rootroot00000000000000getBackend(); $this->assertInstanceOf('Sabre\\DAV\\Locks\\Backend\\AbstractBackend', $backend); } /** * @depends testSetup */ function testGetLocks() { $backend = $this->getBackend(); $lock = new DAV\Locks\LockInfo(); $lock->owner = 'Sinterklaas'; $lock->timeout = 60; $lock->created = time(); $lock->token = 'MY-UNIQUE-TOKEN'; $lock->uri ='someuri'; $this->assertTrue($backend->lock('someuri', $lock)); $locks = $backend->getLocks('someuri', false); $this->assertEquals(1,count($locks)); $this->assertEquals('Sinterklaas',$locks[0]->owner); $this->assertEquals('someuri',$locks[0]->uri); } /** * @depends testGetLocks */ function testGetLocksParent() { $backend = $this->getBackend(); $lock = new DAV\Locks\LockInfo(); $lock->owner = 'Sinterklaas'; $lock->timeout = 60; $lock->created = time(); $lock->depth = DAV\Server::DEPTH_INFINITY; $lock->token = 'MY-UNIQUE-TOKEN'; $this->assertTrue($backend->lock('someuri', $lock)); $locks = $backend->getLocks('someuri/child', false); $this->assertEquals(1,count($locks)); $this->assertEquals('Sinterklaas',$locks[0]->owner); $this->assertEquals('someuri',$locks[0]->uri); } /** * @depends testGetLocks */ function testGetLocksParentDepth0() { $backend = $this->getBackend(); $lock = new DAV\Locks\LockInfo(); $lock->owner = 'Sinterklaas'; $lock->timeout = 60; $lock->created = time(); $lock->depth = 0; $lock->token = 'MY-UNIQUE-TOKEN'; $this->assertTrue($backend->lock('someuri', $lock)); $locks = $backend->getLocks('someuri/child', false); $this->assertEquals(0,count($locks)); } function testGetLocksChildren() { $backend = $this->getBackend(); $lock = new DAV\Locks\LockInfo(); $lock->owner = 'Sinterklaas'; $lock->timeout = 60; $lock->created = time(); $lock->depth = 0; $lock->token = 'MY-UNIQUE-TOKEN'; $this->assertTrue($backend->lock('someuri/child', $lock)); $locks = $backend->getLocks('someuri/child', false); $this->assertEquals(1,count($locks)); $locks = $backend->getLocks('someuri', false); $this->assertEquals(0,count($locks)); $locks = $backend->getLocks('someuri', true); $this->assertEquals(1,count($locks)); } /** * @depends testGetLocks */ function testLockRefresh() { $backend = $this->getBackend(); $lock = new DAV\Locks\LockInfo(); $lock->owner = 'Sinterklaas'; $lock->timeout = 60; $lock->created = time(); $lock->token = 'MY-UNIQUE-TOKEN'; $this->assertTrue($backend->lock('someuri', $lock)); /* Second time */ $lock->owner = 'Santa Clause'; $this->assertTrue($backend->lock('someuri', $lock)); $locks = $backend->getLocks('someuri', false); $this->assertEquals(1,count($locks)); $this->assertEquals('Santa Clause',$locks[0]->owner); $this->assertEquals('someuri',$locks[0]->uri); } /** * @depends testGetLocks */ function testUnlock() { $backend = $this->getBackend(); $lock = new DAV\Locks\LockInfo(); $lock->owner = 'Sinterklaas'; $lock->timeout = 60; $lock->created = time(); $lock->token = 'MY-UNIQUE-TOKEN'; $this->assertTrue($backend->lock('someuri', $lock)); $locks = $backend->getLocks('someuri', false); $this->assertEquals(1,count($locks)); $this->assertTrue($backend->unlock('someuri',$lock)); $locks = $backend->getLocks('someuri', false); $this->assertEquals(0,count($locks)); } /** * @depends testUnlock */ function testUnlockUnknownToken() { $backend = $this->getBackend(); $lock = new DAV\Locks\LockInfo(); $lock->owner = 'Sinterklaas'; $lock->timeout = 60; $lock->created = time(); $lock->token = 'MY-UNIQUE-TOKEN'; $this->assertTrue($backend->lock('someuri', $lock)); $locks = $backend->getLocks('someuri', false); $this->assertEquals(1,count($locks)); $lock->token = 'SOME-OTHER-TOKEN'; $this->assertFalse($backend->unlock('someuri',$lock)); $locks = $backend->getLocks('someuri', false); $this->assertEquals(1,count($locks)); } } sabre-dav-1.8.12/tests/Sabre/DAV/Locks/Backend/FSTest.php000066400000000000000000000010551246001162500225400ustar00rootroot00000000000000markTestSkipped('MySQL driver is not available, or it was not properly configured'); $pdo = \Sabre\TestUtil::getMySQLDB(); if (!$pdo) $this->markTestSkipped('Could not connect to MySQL database'); $pdo->query('DROP TABLE IF EXISTS locks;'); $pdo->query(" CREATE TABLE locks ( id INTEGER UNSIGNED NOT NULL PRIMARY KEY AUTO_INCREMENT, owner VARCHAR(100), timeout INTEGER UNSIGNED, created INTEGER, token VARCHAR(100), scope TINYINT, depth TINYINT, uri text );"); $backend = new PDO($pdo); return $backend; } } sabre-dav-1.8.12/tests/Sabre/DAV/Locks/Backend/PDOTest.php000066400000000000000000000015051246001162500226520ustar00rootroot00000000000000markTestSkipped('SQLite driver is not available'); \Sabre\TestUtil::clearTempDir(); mkdir(SABRE_TEMPDIR . '/pdolocks'); $pdo = new \PDO('sqlite:' . SABRE_TEMPDIR . '/pdolocks/db.sqlite'); $pdo->setAttribute(\PDO::ATTR_ERRMODE,\PDO::ERRMODE_EXCEPTION); $pdo->query('CREATE TABLE locks ( id integer primary key asc, owner text, timeout text, created integer, token text, scope integer, depth integer, uri text)'); $backend = new PDO($pdo); return $backend; } function tearDown() { \Sabre\TestUtil::clearTempDir(); } } sabre-dav-1.8.12/tests/Sabre/DAV/Locks/GetIfConditionsTest.php000066400000000000000000000221151246001162500237310ustar00rootroot00000000000000server->addPlugin($locksPlugin); $this->locksPlugin = $locksPlugin; } function testNoConditions() { $serverVars = array( ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $conditions = $this->locksPlugin->getIfConditions(); $this->assertEquals(array(),$conditions); } function testLockToken() { $serverVars = array( 'HTTP_IF' => '()', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $conditions = $this->locksPlugin->getIfConditions(); $compare = array( array( 'uri' => '', 'tokens' => array( array( 1, 'opaquelocktoken:token1', '', ), ), ), ); $this->assertEquals($compare,$conditions); } function testNotLockToken() { $serverVars = array( 'HTTP_IF' => '(Not )', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $conditions = $this->locksPlugin->getIfConditions(); $compare = array( array( 'uri' => '', 'tokens' => array( array( 0, 'opaquelocktoken:token1', '', ), ), ), ); $this->assertEquals($compare,$conditions); } function testLockTokenUrl() { $serverVars = array( 'HTTP_IF' => ' ()', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $conditions = $this->locksPlugin->getIfConditions(); $compare = array( array( 'uri' => 'http://www.example.com/', 'tokens' => array( array( 1, 'opaquelocktoken:token1', '', ), ), ), ); $this->assertEquals($compare,$conditions); } function test2LockTokens() { $serverVars = array( 'HTTP_IF' => '() (Not )', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $conditions = $this->locksPlugin->getIfConditions(); $compare = array( array( 'uri' => '', 'tokens' => array( array( 1, 'opaquelocktoken:token1', '', ), array( 0, 'opaquelocktoken:token2', '', ), ), ), ); $this->assertEquals($compare,$conditions); } function test2UriLockTokens() { $serverVars = array( 'HTTP_IF' => ' () (Not )', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $conditions = $this->locksPlugin->getIfConditions(); $compare = array( array( 'uri' => 'http://www.example.org/node1', 'tokens' => array( array( 1, 'opaquelocktoken:token1', '', ), ), ), array( 'uri' => 'http://www.example.org/node2', 'tokens' => array( array( 0, 'opaquelocktoken:token2', '', ), ), ), ); $this->assertEquals($compare,$conditions); } function test2UriMultiLockTokens() { $serverVars = array( 'HTTP_IF' => ' () () (Not )', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $conditions = $this->locksPlugin->getIfConditions(); $compare = array( array( 'uri' => 'http://www.example.org/node1', 'tokens' => array( array( 1, 'opaquelocktoken:token1', '', ), array( 1, 'opaquelocktoken:token2', '', ), ), ), array( 'uri' => 'http://www.example.org/node2', 'tokens' => array( array( 0, 'opaquelocktoken:token3', '', ), ), ), ); $this->assertEquals($compare,$conditions); } function testEtag() { $serverVars = array( 'HTTP_IF' => '([etag1])', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $conditions = $this->locksPlugin->getIfConditions(); $compare = array( array( 'uri' => '', 'tokens' => array( array( 1, '', 'etag1', ), ), ), ); $this->assertEquals($compare,$conditions); } function test2Etags() { $serverVars = array( 'HTTP_IF' => ' ([etag1]) ([etag2])', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $conditions = $this->locksPlugin->getIfConditions(); $compare = array( array( 'uri' => 'http://www.example.org/', 'tokens' => array( array( 1, '', 'etag1', ), array( 1, '', 'etag2', ), ), ), ); $this->assertEquals($compare,$conditions); } function testComplexIf() { $serverVars = array( 'HTTP_IF' => ' ( [etag1]) ' . '(Not ) ([etag2]) ' . '() (Not ) ([etag3])', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $conditions = $this->locksPlugin->getIfConditions(); $compare = array( array( 'uri' => 'http://www.example.org/node1', 'tokens' => array( array( 1, 'opaquelocktoken:token1', 'etag1', ), array( 0, 'opaquelocktoken:token2', '', ), array( 1, '', 'etag2', ), ), ), array( 'uri' => 'http://www.example.org/node2', 'tokens' => array( array( 1, 'opaquelocktoken:token3', '', ), array( 0, 'opaquelocktoken:token4', '', ), array( 1, '', 'etag3', ), ), ), ); $this->assertEquals($compare,$conditions); } } sabre-dav-1.8.12/tests/Sabre/DAV/Locks/MSWordTest.php000066400000000000000000000063711246001162500220620ustar00rootroot00000000000000debugExceptions = true; $locksBackend = new Backend\File(SABRE_TEMPDIR . '/locksdb'); $locksPlugin = new Plugin($locksBackend); $server->addPlugin($locksPlugin); $response1 = new HTTP\ResponseMock(); $server->httpRequest = $this->getLockRequest(); $server->httpResponse = $response1; $server->exec(); $this->assertEquals('HTTP/1.1 201 Created', $server->httpResponse->status); $this->assertTrue(isset($server->httpResponse->headers['Lock-Token'])); $lockToken = $server->httpResponse->headers['Lock-Token']; //sleep(10); $response2 = new HTTP\ResponseMock(); $server->httpRequest = $this->getLockRequest2(); $server->httpResponse = $response2; $server->exec(); $this->assertEquals('HTTP/1.1 201 Created', $server->httpResponse->status); $this->assertTrue(isset($server->httpResponse->headers['Lock-Token'])); //sleep(10); $response3 = new HTTP\ResponseMock(); $server->httpRequest = $this->getPutRequest($lockToken); $server->httpResponse = $response3; $server->exec(); $this->assertEquals('HTTP/1.1 204 No Content', $server->httpResponse->status); } function tearDown() { \Sabre\TestUtil::clearTempDir(); } function getLockRequest() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'LOCK', 'HTTP_CONTENT_TYPE' => 'application/xml', 'HTTP_TIMEOUT' => 'Second-3600', 'REQUEST_URI' => '/Nouveau%20Microsoft%20Office%20Excel%20Worksheet.xlsx', )); $request->setBody(' PC-Vista\User '); return $request; } function getLockRequest2() { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'LOCK', 'HTTP_CONTENT_TYPE' => 'application/xml', 'HTTP_TIMEOUT' => 'Second-3600', 'REQUEST_URI' => '/~$Nouveau%20Microsoft%20Office%20Excel%20Worksheet.xlsx', )); $request->setBody(' PC-Vista\User '); return $request; } function getPutRequest($lockToken) { $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/Nouveau%20Microsoft%20Office%20Excel%20Worksheet.xlsx', 'HTTP_IF' => 'If: ('.$lockToken.')', )); $request->setBody('FAKE BODY'); return $request; } } sabre-dav-1.8.12/tests/Sabre/DAV/Locks/PluginTest.php000066400000000000000000001000651246001162500221400ustar00rootroot00000000000000server->addPlugin($locksPlugin); $this->locksPlugin = $locksPlugin; } function testGetFeatures() { $this->assertEquals(array(2),$this->locksPlugin->getFeatures()); } function testGetHTTPMethods() { $this->assertEquals(array('LOCK','UNLOCK'),$this->locksPlugin->getHTTPMethods('')); } function testGetHTTPMethodsNoBackend() { $locksPlugin = new Plugin(); $this->server->addPlugin($locksPlugin); $this->assertEquals(array(),$locksPlugin->getHTTPMethods('')); } function testUnknownMethodPassthough() { $this->assertNull($this->locksPlugin->unknownMethod('BLA','/')); } function testLockNoBody() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(''); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 400 Bad request',$this->response->status); } function testLock() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status,'Got an incorrect status back. Response body: ' . $this->response->body); $body = preg_replace("/xmlns(:[A-Za-z0-9_])?=(\"|\')DAV:(\"|\')/","xmlns\\1=\"urn:DAV\"",$this->response->body); $xml = simplexml_load_string($body); $xml->registerXPathNamespace('d','urn:DAV'); $elements = array( '/d:prop', '/d:prop/d:lockdiscovery', '/d:prop/d:lockdiscovery/d:activelock', '/d:prop/d:lockdiscovery/d:activelock/d:locktype', '/d:prop/d:lockdiscovery/d:activelock/d:lockroot', '/d:prop/d:lockdiscovery/d:activelock/d:lockroot/d:href', '/d:prop/d:lockdiscovery/d:activelock/d:locktype/d:write', '/d:prop/d:lockdiscovery/d:activelock/d:lockscope', '/d:prop/d:lockdiscovery/d:activelock/d:lockscope/d:exclusive', '/d:prop/d:lockdiscovery/d:activelock/d:depth', '/d:prop/d:lockdiscovery/d:activelock/d:owner', '/d:prop/d:lockdiscovery/d:activelock/d:timeout', '/d:prop/d:lockdiscovery/d:activelock/d:locktoken', '/d:prop/d:lockdiscovery/d:activelock/d:locktoken/d:href', ); foreach($elements as $elem) { $data = $xml->xpath($elem); $this->assertEquals(1,count($data),'We expected 1 match for the xpath expression "' . $elem . '". ' . count($data) . ' were found. Full response body: ' . $this->response->body); } $depth = $xml->xpath('/d:prop/d:lockdiscovery/d:activelock/d:depth'); $this->assertEquals('infinity',(string)$depth[0]); $token = $xml->xpath('/d:prop/d:lockdiscovery/d:activelock/d:locktoken/d:href'); $this->assertEquals($this->response->headers['Lock-Token'],'<' . (string)$token[0] . '>','Token in response body didn\'t match token in response header.'); } /** * @depends testLock */ function testDoubleLock() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $this->response = new HTTP\ResponseMock(); $this->server->httpResponse = $this->response; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertEquals('HTTP/1.1 423 Locked',$this->response->status); } /** * @depends testLock */ function testLockRefresh() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $lockToken = $this->response->headers['Lock-Token']; $this->response = new HTTP\ResponseMock(); $this->server->httpResponse = $this->response; $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'LOCK', 'HTTP_IF' => '(' . $lockToken . ')', ); $request = new HTTP\Request($serverVars); $request->setBody(''); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status,'We received an incorrect status code. Full response body: ' . $this->response->body); } /** * @depends testLock */ function testLockNoFile() { $serverVars = array( 'REQUEST_URI' => '/notfound.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); } /** * @depends testLock */ function testUnlockNoToken() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'UNLOCK', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 400 Bad request',$this->response->status); } /** * @depends testLock */ function testUnlockBadToken() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'UNLOCK', 'HTTP_LOCK_TOKEN' => '', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 409 Conflict',$this->response->status,'Got an incorrect status code. Full response body: ' . $this->response->body); } /** * @depends testLock */ function testLockPutNoToken() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'PUT', ); $request = new HTTP\Request($serverVars); $request->setBody('newbody'); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 423 Locked',$this->response->status); } /** * @depends testLock */ function testUnlock() { $request = new HTTP\Request(array()); $this->server->httpRequest = $request; $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->invokeMethod('LOCK','test.txt'); $lockToken = $this->server->httpResponse->headers['Lock-Token']; $serverVars = array( 'HTTP_LOCK_TOKEN' => $lockToken, ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->httpResponse = new HTTP\ResponseMock(); $this->server->invokeMethod('UNLOCK', 'test.txt'); $this->assertEquals('HTTP/1.1 204 No Content',$this->server->httpResponse->status,'Got an incorrect status code. Full response body: ' . $this->response->body); $this->assertEquals(array( 'Content-Length' => '0', ), $this->server->httpResponse->headers ); } /** * @depends testLock */ function testUnlockWindowsBug() { $request = new HTTP\Request(array()); $this->server->httpRequest = $request; $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->invokeMethod('LOCK','test.txt'); $lockToken = $this->server->httpResponse->headers['Lock-Token']; // See Issue 123 $lockToken = trim($lockToken,'<>'); $serverVars = array( 'HTTP_LOCK_TOKEN' => $lockToken, ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->httpResponse = new HTTP\ResponseMock(); $this->server->invokeMethod('UNLOCK', 'test.txt'); $this->assertEquals('HTTP/1.1 204 No Content',$this->server->httpResponse->status,'Got an incorrect status code. Full response body: ' . $this->response->body); $this->assertEquals(array( 'Content-Length' => '0', ), $this->server->httpResponse->headers ); } /** * @depends testLock */ function testLockRetainOwner() { $request = new HTTP\Request(array()); $this->server->httpRequest = $request; $request->setBody(' Evert '); $this->server->invokeMethod('LOCK','test.txt'); $lockToken = $this->server->httpResponse->headers['Lock-Token']; $locks = $this->locksPlugin->getLocks('test.txt'); $this->assertEquals(1,count($locks)); $this->assertEquals('Evert',$locks[0]->owner); } /** * @depends testLock */ function testLockPutBadToken() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'PUT', 'HTTP_IF' => '()', ); $request = new HTTP\Request($serverVars); $request->setBody('newbody'); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 412 Precondition failed',$this->response->status); } /** * @depends testLock */ function testLockDeleteParent() { $serverVars = array( 'REQUEST_URI' => '/dir/child.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $serverVars = array( 'REQUEST_URI' => '/dir', 'REQUEST_METHOD' => 'DELETE', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 423 Locked',$this->response->status); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); } /** * @depends testLock */ function testLockDeleteSucceed() { $serverVars = array( 'REQUEST_URI' => '/dir/child.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $serverVars = array( 'REQUEST_URI' => '/dir/child.txt', 'REQUEST_METHOD' => 'DELETE', 'HTTP_IF' => '(' . $this->response->headers['Lock-Token'] . ')', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 204 No Content',$this->response->status); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); } /** * @depends testLock */ function testLockCopyLockSource() { $serverVars = array( 'REQUEST_URI' => '/dir/child.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $serverVars = array( 'REQUEST_URI' => '/dir/child.txt', 'REQUEST_METHOD' => 'COPY', 'HTTP_DESTINATION' => '/dir/child2.txt', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status,'Copy must succeed if only the source is locked, but not the destination'); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); } /** * @depends testLock */ function testLockCopyLockDestination() { $serverVars = array( 'REQUEST_URI' => '/dir/child2.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); $serverVars = array( 'REQUEST_URI' => '/dir/child.txt', 'REQUEST_METHOD' => 'COPY', 'HTTP_DESTINATION' => '/dir/child2.txt', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 423 Locked',$this->response->status,'Copy must succeed if only the source is locked, but not the destination'); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); } /** * @depends testLock */ function testLockMoveLockSourceLocked() { $serverVars = array( 'REQUEST_URI' => '/dir/child.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $serverVars = array( 'REQUEST_URI' => '/dir/child.txt', 'REQUEST_METHOD' => 'MOVE', 'HTTP_DESTINATION' => '/dir/child2.txt', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 423 Locked',$this->response->status,'Copy must succeed if only the source is locked, but not the destination'); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); } /** * @depends testLock */ function testLockMoveLockSourceSucceed() { $serverVars = array( 'REQUEST_URI' => '/dir/child.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $serverVars = array( 'REQUEST_URI' => '/dir/child.txt', 'REQUEST_METHOD' => 'MOVE', 'HTTP_DESTINATION' => '/dir/child2.txt', 'HTTP_IF' => '(' . $this->response->headers['Lock-Token'] . ')', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status,'A valid lock-token was provided for the source, so this MOVE operation must succeed. Full response body: ' . $this->response->body); } /** * @depends testLock */ function testLockMoveLockDestination() { $serverVars = array( 'REQUEST_URI' => '/dir/child2.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); $serverVars = array( 'REQUEST_URI' => '/dir/child.txt', 'REQUEST_METHOD' => 'MOVE', 'HTTP_DESTINATION' => '/dir/child2.txt', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 423 Locked',$this->response->status,'Copy must succeed if only the source is locked, but not the destination'); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); } /** * @depends testLock */ function testLockMoveLockParent() { $serverVars = array( 'REQUEST_URI' => '/dir', 'REQUEST_METHOD' => 'LOCK', 'HTTP_DEPTH' => 'infinite', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $serverVars = array( 'REQUEST_URI' => '/dir/child.txt', 'REQUEST_METHOD' => 'MOVE', 'HTTP_DESTINATION' => '/dir/child2.txt', 'HTTP_IF' => ' (' . $this->response->headers['Lock-Token'] . ')', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status,'We locked the parent of both the source and destination, but the move didn\'t succeed.'); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); } /** * @depends testLock */ function testLockPutGoodToken() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'PUT', 'HTTP_IF' => '('.$this->response->headers['Lock-Token'].')', ); $request = new HTTP\Request($serverVars); $request->setBody('newbody'); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('HTTP/1.1 204 No Content',$this->response->status); } function testPutWithIncorrectETag() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'PUT', 'HTTP_IF' => '(["etag1"])', ); $request = new HTTP\Request($serverVars); $request->setBody('newbody'); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 412 Precondition failed',$this->response->status); } /** * @depends testPutWithIncorrectETag */ function testPutWithCorrectETag() { // We need an etag-enabled file node. $tree = new DAV\ObjectTree(new DAV\FSExt\Directory(SABRE_TEMPDIR)); $this->server->tree = $tree; $etag = md5(file_get_contents(SABRE_TEMPDIR . '/test.txt')); $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'PUT', 'HTTP_IF' => '(["'.$etag.'"])', ); $request = new HTTP\Request($serverVars); $request->setBody('newbody'); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 204 No Content',$this->response->status, 'Incorrect status received. Full response body:' . $this->response->body); } function testDeleteWithETagOnCollection() { $serverVars = array( 'REQUEST_URI' => '/dir', 'REQUEST_METHOD' => 'DELETE', 'HTTP_IF' => '(["etag1"])', ); $request = new HTTP\Request($serverVars); $request->setBody('newbody'); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 412 Precondition failed',$this->response->status); } function testGetTimeoutHeader() { $request = new HTTP\Request(array( 'HTTP_TIMEOUT' => 'second-100', )); $this->server->httpRequest = $request; $this->assertEquals(100, $this->locksPlugin->getTimeoutHeader()); } function testGetTimeoutHeaderNotSet() { $request = new HTTP\Request(array( )); $this->server->httpRequest = $request; $this->assertEquals(0, $this->locksPlugin->getTimeoutHeader()); } function testGetTimeoutHeaderInfinite() { $request = new HTTP\Request(array( 'HTTP_TIMEOUT' => 'infinite', )); $this->server->httpRequest = $request; $this->assertEquals(LockInfo::TIMEOUT_INFINITE, $this->locksPlugin->getTimeoutHeader()); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testGetTimeoutHeaderInvalid() { $request = new HTTP\Request(array( 'HTTP_TIMEOUT' => 'yourmom', )); $this->server->httpRequest = $request; $this->locksPlugin->getTimeoutHeader(); } } sabre-dav-1.8.12/tests/Sabre/DAV/Mock/000077500000000000000000000000001246001162500171455ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAV/Mock/Collection.php000066400000000000000000000076241246001162500217620ustar00rootroot00000000000000name = $name; $this->children = $children; $this->parent = $parent; } /** * Returns the name of the node. * * This is used to generate the url. * * @return string */ public function getName() { return $this->name; } /** * Creates a new file in the directory * * Data will either be supplied as a stream resource, or in certain cases * as a string. Keep in mind that you may have to support either. * * After successful creation of the file, you may choose to return the ETag * of the new file here. * * The returned ETag must be surrounded by double-quotes (The quotes should * be part of the actual string). * * If you cannot accurately determine the ETag, you should not return it. * If you don't store the file exactly as-is (you're transforming it * somehow) you should also not return an ETag. * * This means that if a subsequent GET to this new file does not exactly * return the same contents of what was submitted here, you are strongly * recommended to omit the ETag. * * @param string $name Name of the file * @param resource|string $data Initial payload * @return null|string */ public function createFile($name, $data = null) { if (is_resource($data)) { $data = stream_get_contents($data); } $this->children[$name] = $data; return '"' . md5($data) . '"'; } /** * Creates a new subdirectory * * @param string $name * @return void */ public function createDirectory($name) { $this->children[$name] = array(); } /** * Returns an array with all the child nodes * * @return \Sabre\DAV\INode[] */ public function getChildren() { $result = array(); foreach($this->children as $key=>$value) { if ($value instanceof DAV\INode) { $result[] = $value; } elseif (is_array($value)) { $result[] = new Collection($key, $value, $this); } else { $result[] = new File($key, $value, $this); } } return $result; } /** * Removes a childnode from this node. * * @param string $name * @return void */ public function deleteChild($name) { foreach($this->children as $key=>$value) { if ($value instanceof DAV\INode) { if ($value->getName() == $name) { unset($this->children[$key]); return; } } elseif ($key === $name) { unset($this->children[$key]); return; } } } /** * Deletes this collection and all its children,. * * @return void */ public function delete() { foreach($this->getChildren() as $child) { $this->deleteChild($child->getName()); } $this->parent->deleteChild($this->getName()); } } sabre-dav-1.8.12/tests/Sabre/DAV/Mock/File.php000066400000000000000000000053471246001162500205460ustar00rootroot00000000000000name = $name; $this->put($contents); $this->parent = $parent; } /** * Returns the name of the node. * * This is used to generate the url. * * @return string */ public function getName() { return $this->name; } /** * Updates the data * * The data argument is a readable stream resource. * * After a succesful put operation, you may choose to return an ETag. The * etag must always be surrounded by double-quotes. These quotes must * appear in the actual string you're returning. * * Clients may use the ETag from a PUT request to later on make sure that * when they update the file, the contents haven't changed in the mean * time. * * If you don't plan to store the file byte-by-byte, and you return a * different object on a subsequent GET you are strongly recommended to not * return an ETag, and just return null. * * @param resource $data * @return string|null */ public function put($data) { if (is_resource($data)) { $data = stream_get_contents($data); } $this->contents = $data; return '"' . md5($data) . '"'; } /** * Returns the data * * This method may either return a string or a readable stream resource * * @return mixed */ public function get() { return $this->contents; } /** * Returns the ETag for a file * * An ETag is a unique identifier representing the current version of the file. If the file changes, the ETag MUST change. * * Return null if the ETag can not effectively be determined * * @return void */ public function getETag() { return '"' . md5($this->contents) . '"'; } /** * Returns the size of the node, in bytes * * @return int */ public function getSize() { return strlen($this->contents); } /** * Delete the node * * @return void */ public function delete() { $this->parent->deleteChild($this->name); } } sabre-dav-1.8.12/tests/Sabre/DAV/Mount/000077500000000000000000000000001246001162500173565ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAV/Mount/PluginTest.php000066400000000000000000000027661246001162500222000ustar00rootroot00000000000000server->addPlugin(new Plugin()); } function testPassThrough() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'GET', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 501 Not Implemented',$this->response->status,'We expected GET to not be implemented for Directories. Response body: ' . $this->response->body); } function testMountResponse() { $serverVars = array( 'REQUEST_URI' => '/?mount', 'REQUEST_METHOD' => 'GET', 'QUERY_STRING' => 'mount', 'HTTP_HOST' => 'example.org', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $xml = simplexml_load_string($this->response->body); $this->assertTrue($xml==true,'Response was not a valid xml document'); $xml->registerXPathNamespace('dm','http://purl.org/NET/webdav/mount'); $url = $xml->xpath('//dm:url'); $this->assertEquals('http://example.org/',(string)$url[0]); } } sabre-dav-1.8.12/tests/Sabre/DAV/ObjectTreeTest.php000066400000000000000000000054561246001162500216650ustar00rootroot00000000000000tree = new ObjectTree($rootNode); } function teardown() { \Sabre\TestUtil::clearTempDir(); } function testGetRootNode() { $root = $this->tree->getNodeForPath(''); $this->assertInstanceOf('Sabre\\DAV\\FSExt\\Directory',$root); } function testGetSubDir() { $root = $this->tree->getNodeForPath('subdir'); $this->assertInstanceOf('Sabre\\DAV\\FSExt\\Directory',$root); } function testCopyFile() { $this->tree->copy('file.txt','file2.txt'); $this->assertTrue(file_exists(SABRE_TEMPDIR.'/root/file2.txt')); $this->assertEquals('contents',file_get_contents(SABRE_TEMPDIR.'/root/file2.txt')); } /** * @depends testCopyFile */ function testCopyDirectory() { $this->tree->copy('subdir','subdir2'); $this->assertTrue(file_exists(SABRE_TEMPDIR.'/root/subdir2')); $this->assertTrue(file_exists(SABRE_TEMPDIR.'/root/subdir2/subfile.txt')); $this->assertEquals('subcontents',file_get_contents(SABRE_TEMPDIR.'/root/subdir2/subfile.txt')); } /** * @depends testCopyFile */ function testMoveFile() { $this->tree->move('file.txt','file2.txt'); $this->assertTrue(file_exists(SABRE_TEMPDIR.'/root/file2.txt')); $this->assertFalse(file_exists(SABRE_TEMPDIR.'/root/file.txt')); $this->assertEquals('contents',file_get_contents(SABRE_TEMPDIR.'/root/file2.txt')); } /** * @depends testMoveFile */ function testMoveFileNewParent() { $this->tree->move('file.txt','subdir/file2.txt'); $this->assertTrue(file_exists(SABRE_TEMPDIR.'/root/subdir/file2.txt')); $this->assertFalse(file_exists(SABRE_TEMPDIR.'/root/file.txt')); $this->assertEquals('contents',file_get_contents(SABRE_TEMPDIR.'/root/subdir/file2.txt')); } /** * @depends testCopyDirectory */ function testMoveDirectory() { $this->tree->move('subdir','subdir2'); $this->assertTrue(file_exists(SABRE_TEMPDIR.'/root/subdir2')); $this->assertTrue(file_exists(SABRE_TEMPDIR.'/root/subdir2/subfile.txt')); $this->assertFalse(file_exists(SABRE_TEMPDIR.'/root/subdir')); $this->assertEquals('subcontents',file_get_contents(SABRE_TEMPDIR.'/root/subdir2/subfile.txt')); } } sabre-dav-1.8.12/tests/Sabre/DAV/PartialUpdate/000077500000000000000000000000001246001162500210135ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAV/PartialUpdate/FileMock.php000066400000000000000000000021001246001162500232060ustar00rootroot00000000000000data = $str; } function putRange($str,$start) { if (is_resource($str)) { $str = stream_get_contents($str); } $this->data = substr($this->data, 0, $start) . $str . substr($this->data, $start + strlen($str)); } function get() { return $this->data; } function getContentType() { return 'text/plain'; } function getSize() { return strlen($this->data); } function getETag() { return '"' . $this->data . '"'; } function delete() { throw new DAV\Exception\MethodNotAllowed(); } function setName($name) { throw new DAV\Exception\MethodNotAllowed(); } function getName() { return 'partial'; } function getLastModified() { return null; } } sabre-dav-1.8.12/tests/Sabre/DAV/PartialUpdate/PluginTest.php000066400000000000000000000103141246001162500236210ustar00rootroot00000000000000node = new FileMock(); $this->tree[] = $this->node; parent::setUp(); $this->plugin = new Plugin(); $this->server->addPlugin($this->plugin); } public function testInit() { $this->assertEquals('partialupdate', $this->plugin->getPluginName()); $this->assertEquals(array('sabredav-partialupdate'), $this->plugin->getFeatures()); $this->assertEquals(array( 'PATCH' ), $this->plugin->getHTTPMethods('partial')); $this->assertEquals(array( ), $this->plugin->getHTTPMethods('')); $this->assertNull($this->plugin->unknownMethod('FOO','partial')); } public function testPatchNoRange() { $this->node->put('00000000'); $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PATCH', 'REQUEST_URI' => '/partial', )); $response = $this->request($request); $this->assertEquals('HTTP/1.1 400 Bad request', $response->status, 'Full response body:' . $response->body); } public function testPatchNotSupported() { $this->node->put('00000000'); $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PATCH', 'REQUEST_URI' => '/', 'X_UPDATE_RANGE' => '3-4', )); $request->setBody( '111' ); $response = $this->request($request); $this->assertEquals('HTTP/1.1 405 Method Not Allowed', $response->status, 'Full response body:' . $response->body); } public function testPatchNoContentType() { $this->node->put('00000000'); $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PATCH', 'REQUEST_URI' => '/partial', 'HTTP_X_UPDATE_RANGE' => 'bytes=3-4', )); $request->setBody( '111' ); $response = $this->request($request); $this->assertEquals('HTTP/1.1 415 Unsupported Media Type', $response->status, 'Full response body:' . $response->body); } public function testPatchBadRange() { $this->node->put('00000000'); $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PATCH', 'REQUEST_URI' => '/partial', 'HTTP_X_UPDATE_RANGE' => 'bytes=3-4', 'HTTP_CONTENT_TYPE' => 'application/x-sabredav-partialupdate', )); $request->setBody( '111' ); $response = $this->request($request); $this->assertEquals('HTTP/1.1 411 Length Required', $response->status, 'Full response body:' . $response->body); } public function testPatchSuccess() { $this->node->put('00000000'); $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PATCH', 'REQUEST_URI' => '/partial', 'HTTP_X_UPDATE_RANGE' => 'bytes=3-5', 'HTTP_CONTENT_TYPE' => 'application/x-sabredav-partialupdate', 'HTTP_CONTENT_LENGTH' => 3, )); $request->setBody( '111' ); $response = $this->request($request); $this->assertEquals('HTTP/1.1 204 No Content', $response->status, 'Full response body:' . $response->body); $this->assertEquals('00011100', $this->node->get()); } public function testPatchNoEndRange() { $this->node->put('00000'); $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'PATCH', 'REQUEST_URI' => '/partial', 'HTTP_X_UPDATE_RANGE' => 'bytes=3-', 'HTTP_CONTENT_TYPE' => 'application/x-sabredav-partialupdate', 'HTTP_CONTENT_LENGTH' => 3, )); $request->setBody( '111' ); $response = $this->request($request); $this->assertEquals('HTTP/1.1 204 No Content', $response->status, 'Full response body:' . $response->body); $this->assertEquals('00111', $this->node->get()); } } sabre-dav-1.8.12/tests/Sabre/DAV/PartialUpdate/SpecificationTest.php000066400000000000000000000050541246001162500251500ustar00rootroot00000000000000debugExceptions = true; $server->addPlugin(new Plugin()); $tree[0]->put('1234567890'); $this->server = $server; } public function tearDown() { \Sabre\TestUtil::clearTempDir(); } /** * @dataProvider data */ public function testUpdateRange($headerValue, $httpStatus, $endResult, $contentLength = 4) { $vars = array( 'REQUEST_METHOD' => 'PATCH', 'HTTP_CONTENT_TYPE' => 'application/x-sabredav-partialupdate', 'HTTP_X_UPDATE_RANGE' => $headerValue, 'REQUEST_URI' => '/foobar.txt', ); if ($contentLength) { $vars['HTTP_CONTENT_LENGTH'] = (string)$contentLength; } $request = new HTTP\Request($vars); $request->setBody('----'); $this->server->httpRequest = $request; $this->server->httpResponse = new HTTP\ResponseMock(); $this->server->exec(); $this->assertEquals($httpStatus, $this->server->httpResponse->status, 'Incorrect http status received: ' . $this->server->httpResponse->body); if (!is_null($endResult)) { $this->assertEquals($endResult, file_get_contents(SABRE_TEMPDIR . '/foobar.txt')); } } public function data() { return array( // Problems array('foo', 'HTTP/1.1 400 Bad request', null), array('bytes=0-3', 'HTTP/1.1 411 Length Required', null, 0), array('bytes=4-1', 'HTTP/1.1 416 Requested Range Not Satisfiable', null), array('bytes=0-3', 'HTTP/1.1 204 No Content', '----567890'), array('bytes=1-4', 'HTTP/1.1 204 No Content', '1----67890'), array('bytes=0-', 'HTTP/1.1 204 No Content', '----567890'), array('bytes=-4', 'HTTP/1.1 204 No Content', '123456----'), array('bytes=-2', 'HTTP/1.1 204 No Content', '12345678----'), array('bytes=2-', 'HTTP/1.1 204 No Content', '12----7890'), array('append', 'HTTP/1.1 204 No Content', '1234567890----'), ); } } sabre-dav-1.8.12/tests/Sabre/DAV/Property/000077500000000000000000000000001246001162500201005ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAV/Property/GetLastModifiedTest.php000066400000000000000000000041041246001162500244540ustar00rootroot00000000000000assertEquals($dt->format(\DateTime::ATOM), $lastMod->getTime()->format(\DateTime::ATOM)); } function testConstructString() { $dt = new \DateTime('2010-03-14 16:35', new \DateTimeZone('UTC')); $lastMod = new GetLastModified('2010-03-14 16:35'); $this->assertEquals($dt->format(\DateTime::ATOM), $lastMod->getTime()->format(\DateTime::ATOM)); } function testConstructInt() { $dt = new \DateTime('2010-03-14 16:35', new \DateTimeZone('UTC')); $lastMod = new GetLastModified((int)$dt->format('U')); $this->assertEquals($dt->format(\DateTime::ATOM), $lastMod->getTime()->format(\DateTime::ATOM)); } function testSerialize() { $dt = new \DateTime('2010-03-14 16:35', new \DateTimeZone('UTC')); $lastMod = new GetLastModified($dt); $doc = new \DOMDocument(); $root = $doc->createElement('d:getlastmodified'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $server = new DAV\Server(); $lastMod->serialize($server, $root); $xml = $doc->saveXML(); /* $this->assertEquals( ' ' . HTTP\Util::toHTTPDate($dt) . ' ', $xml); */ $this->assertEquals( ' ' . HTTP\Util::toHTTPDate($dt) . ' ', $xml); $ok = false; try { GetLastModified::unserialize(DAV\XMLUtil::loadDOMDocument($xml)->firstChild); } catch (DAV\Exception $e) { $ok = true; } if (!$ok) $this->markTestFailed('Unserialize should not be supported'); } } sabre-dav-1.8.12/tests/Sabre/DAV/Property/HrefListTest.php000066400000000000000000000043221246001162500231720ustar00rootroot00000000000000assertEquals(array('foo','bar'),$href->getHrefs()); } function testSerialize() { $href = new HrefList(array('foo','bar')); $this->assertEquals(array('foo','bar'),$href->getHrefs()); $doc = new \DOMDocument(); $root = $doc->createElement('d:anything'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $server = new DAV\Server(); $server->setBaseUri('/bla/'); $href->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' /bla/foo/bla/bar ', $xml); } function testSerializeNoPrefix() { $href = new HrefList(array('foo','bar'), false); $this->assertEquals(array('foo','bar'),$href->getHrefs()); $doc = new \DOMDocument(); $root = $doc->createElement('d:anything'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $server = new DAV\Server(); $server->setBaseUri('/bla/'); $href->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' foobar ', $xml); } function testUnserialize() { $xml = ' /bla/foo/bla/bar '; $dom = new \DOMDocument(); $dom->loadXML($xml); $href = HrefList::unserialize($dom->firstChild); $this->assertEquals(array('/bla/foo','/bla/bar'),$href->getHrefs()); } function testUnserializeIncompatible() { $xml = ' /bla/foo '; $dom = new \DOMDocument(); $dom->loadXML($xml); $href = HrefList::unserialize($dom->firstChild); $this->assertEquals(array(), $href->getHrefs()); } } sabre-dav-1.8.12/tests/Sabre/DAV/Property/HrefTest.php000066400000000000000000000053401246001162500223370ustar00rootroot00000000000000assertEquals('path',$href->getHref()); } function testSerialize() { $href = new Href('path'); $this->assertEquals('path',$href->getHref()); $doc = new \DOMDocument(); $root = $doc->createElement('d:anything'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $server = new DAV\Server(); $server->setBaseUri('/bla/'); $href->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' /bla/path ', $xml); } function testSerializeNoPrefix() { $href = new Href('path',false); $this->assertEquals('path',$href->getHref()); $doc = new \DOMDocument(); $root = $doc->createElement('d:anything'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $server = new DAV\Server(); $server->setBaseUri('/bla/'); $href->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' path ', $xml); } function testUnserialize() { $xml = ' /bla/path '; $dom = new \DOMDocument(); $dom->loadXML($xml); $href = Href::unserialize($dom->firstChild); $this->assertEquals('/bla/path',$href->getHref()); } function testUnserializeIncompatible() { $xml = ' /bla/path '; $dom = new \DOMDocument(); $dom->loadXML($xml); $href = Href::unserialize($dom->firstChild); $this->assertNull($href); } /** * This method tests if hrefs containing & are correctly encoded. */ function testSerializeEntity() { $href = new Href('http://example.org/?a&b', false); $this->assertEquals('http://example.org/?a&b',$href->getHref()); $doc = new \DOMDocument(); $root = $doc->createElement('d:anything'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $server = new DAV\Server(); $server->setBaseUri('/bla/'); $href->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' http://example.org/?a&b ', $xml); } } sabre-dav-1.8.12/tests/Sabre/DAV/Property/ResourceTypeTest.php000066400000000000000000000056541246001162500241140ustar00rootroot00000000000000assertEquals(array('{DAV:}collection'),$resourceType->getValue()); $resourceType = new ResourceType(DAV\Server::NODE_FILE); $this->assertEquals(array(),$resourceType->getValue()); $resourceType = new ResourceType(DAV\Server::NODE_DIRECTORY); $this->assertEquals(array('{DAV:}collection'),$resourceType->getValue()); $resourceType = new ResourceType('{DAV:}principal'); $this->assertEquals(array('{DAV:}principal'),$resourceType->getValue()); } /** * @depends testConstruct */ function testSerialize() { $resourceType = new ResourceType(array('{DAV:}collection','{DAV:}principal')); $doc = new \DOMDocument(); $root = $doc->createElement('d:anything'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $server = new DAV\Server(); $resourceType->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ', $xml); } /** * @depends testSerialize */ function testSerializeCustomNS() { $resourceType = new ResourceType(array('{http://example.org/NS}article')); $doc = new \DOMDocument(); $root = $doc->createElement('d:anything'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $server = new DAV\Server(); $resourceType->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ', $xml); } /** * @depends testConstruct */ function testIs() { $resourceType = new ResourceType(array('{DAV:}collection','{DAV:}principal')); $this->assertTrue($resourceType->is('{DAV:}collection')); $this->assertFalse($resourceType->is('{DAV:}blabla')); } /** * @depends testConstruct */ function testAdd() { $resourceType = new ResourceType(array('{DAV:}collection','{DAV:}principal')); $resourceType->add('{DAV:}foo'); $this->assertEquals(array('{DAV:}collection','{DAV:}principal','{DAV:}foo'), $resourceType->getValue()); } /** * @depends testConstruct */ function testUnserialize() { $xml =' '; $dom = DAV\XMLUtil::loadDOMDocument($xml); $resourceType = ResourceType::unserialize($dom->firstChild); $this->assertEquals(array('{DAV:}collection','{DAV:}principal'),$resourceType->getValue()); } } sabre-dav-1.8.12/tests/Sabre/DAV/Property/ResponseListTest.php000066400000000000000000000006221246001162500241030ustar00rootroot00000000000000 array( '{DAV:}displayname' => 'my file', ), 404 => array( '{DAV:}owner' => null, ) ); $property = new Response('uri',$innerProps); $this->assertEquals('uri',$property->getHref()); $this->assertEquals($innerProps,$property->getResponseProperties()); } /** * @depends testSimple */ function testSerialize() { $innerProps = array( 200 => array( '{DAV:}displayname' => 'my file', ), 404 => array( '{DAV:}owner' => null, ) ); $property = new Response('uri',$innerProps); $doc = new \DOMDocument(); $root = $doc->createElement('d:root'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $server = new DAV\Server(); $property->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . '' . '/uri' . '' . '' . 'my file' . '' . 'HTTP/1.1 200 OK' . '' . '' . '' . '' . '' . 'HTTP/1.1 404 Not Found' . '' . '' . ' ', $xml); } /** * This one is specifically for testing properties with no namespaces, which is legal xml * * @depends testSerialize */ function testSerializeEmptyNamespace() { $innerProps = array( 200 => array( '{}propertyname' => 'value', ), ); $property = new Response('uri',$innerProps); $doc = new \DOMDocument(); $root = $doc->createElement('d:root'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $server = new DAV\Server(); $property->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . '' . '/uri' . '' . '' . 'value' . '' . 'HTTP/1.1 200 OK' . '' . '' . ' ', $xml); } /** * This one is specifically for testing properties with no namespaces, which is legal xml * * @depends testSerialize */ function testSerializeCustomNamespace() { $innerProps = array( 200 => array( '{http://sabredav.org/NS/example}propertyname' => 'value', ), ); $property = new Response('uri',$innerProps); $doc = new \DOMDocument(); $root = $doc->createElement('d:root'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $server = new DAV\Server(); $property->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . '' . '/uri' . '' . '' . 'value' . '' . 'HTTP/1.1 200 OK' . '' . '' . ' ', $xml); } /** * @depends testSerialize */ function testSerializeComplexProperty() { $innerProps = array( 200 => array( '{DAV:}link' => new Href('http://sabredav.org/', false) ), ); $property = new Response('uri',$innerProps); $doc = new \DOMDocument(); $root = $doc->createElement('d:root'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $server = new DAV\Server(); $property->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . '' . '/uri' . '' . '' . 'http://sabredav.org/' . '' . 'HTTP/1.1 200 OK' . '' . '' . ' ', $xml); } /** * @depends testSerialize * @expectedException Sabre\DAV\Exception */ function testSerializeBreak() { $innerProps = array( 200 => array( '{DAV:}link' => new \STDClass() ), ); $property = new Response('uri',$innerProps); $doc = new \DOMDocument(); $root = $doc->createElement('d:root'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $server = new DAV\Server(); $property->serialize($server, $root); } } sabre-dav-1.8.12/tests/Sabre/DAV/Property/SupportedReportSetTest.php000066400000000000000000000113571246001162500253150ustar00rootroot00000000000000 '/', 'REQUEST_METHOD' => 'PROPFIND', 'HTTP_DEPTH' => '0', ); $request = new HTTP\Request($serverVars); $request->setBody($body); $this->server->httpRequest = ($request); $this->server->exec(); } /** * @covers Sabre\DAV\Property\SupportedReportSet */ function testNoReports() { $xml = ' '; $this->sendPROPFIND($xml); $this->assertEquals('HTTP/1.1 207 Multi-Status',$this->response->status,'We expected a multi-status response. Full response body: ' . $this->response->body); $body = preg_replace("/xmlns(:[A-Za-z0-9_])?=(\"|\')DAV:(\"|\')/","xmlns\\1=\"urn:DAV\"",$this->response->body); $xml = simplexml_load_string($body); $xml->registerXPathNamespace('d','urn:DAV'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop'); $this->assertEquals(1,count($data),'We expected 1 \'d:prop\' element'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:supported-report-set'); $this->assertEquals(1,count($data),'We expected 1 \'d:supported-report-set\' element'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:status'); $this->assertEquals(1,count($data),'We expected 1 \'d:status\' element'); $this->assertEquals('HTTP/1.1 200 OK',(string)$data[0],'The status for this property should have been 200'); } /** * @covers Sabre\DAV\Property\SupportedReportSet * @depends testNoReports */ function testCustomReport() { // Intercepting the report property $this->server->subscribeEvent('afterGetProperties',array($this,'addProp')); $xml = ' '; $this->sendPROPFIND($xml); $this->assertEquals('HTTP/1.1 207 Multi-Status',$this->response->status,'We expected a multi-status response. Full response body: ' . $this->response->body); $body = preg_replace("/xmlns(:[A-Za-z0-9_])?=(\"|\')DAV:(\"|\')/","xmlns\\1=\"urn:DAV\"",$this->response->body); $xml = simplexml_load_string($body); $xml->registerXPathNamespace('d','urn:DAV'); $xml->registerXPathNamespace('x','http://www.rooftopsolutions.nl/testnamespace'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop'); $this->assertEquals(1,count($data),'We expected 1 \'d:prop\' element'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:supported-report-set'); $this->assertEquals(1,count($data),'We expected 1 \'d:supported-report-set\' element'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:supported-report-set/d:supported-report'); $this->assertEquals(2,count($data),'We expected 2 \'d:supported-report\' elements'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:supported-report-set/d:supported-report/d:report'); $this->assertEquals(2,count($data),'We expected 2 \'d:report\' elements'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:supported-report-set/d:supported-report/d:report/x:myreport'); $this->assertEquals(1,count($data),'We expected 1 \'x:myreport\' element. Full body: ' . $this->response->body); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:supported-report-set/d:supported-report/d:report/d:anotherreport'); $this->assertEquals(1,count($data),'We expected 1 \'d:anotherreport\' element. Full body: ' . $this->response->body); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:status'); $this->assertEquals(1,count($data),'We expected 1 \'d:status\' element'); $this->assertEquals('HTTP/1.1 200 OK',(string)$data[0],'The status for this property should have been 200'); } /** * This method is used as a callback for afterGetProperties */ function addProp($path, &$properties) { if (isset($properties[200]['{DAV:}supported-report-set'])) { $properties[200]['{DAV:}supported-report-set']->addReport('{http://www.rooftopsolutions.nl/testnamespace}myreport'); $properties[200]['{DAV:}supported-report-set']->addReport('{DAV:}anotherreport'); } } } ?> sabre-dav-1.8.12/tests/Sabre/DAV/ServerCopyMoveTest.php000066400000000000000000000174501246001162500225640ustar00rootroot00000000000000response = new HTTP\ResponseMock(); $dir = new FS\Directory(SABRE_TEMPDIR); $tree = new ObjectTree($dir); $this->server = new Server($tree); $this->server->debugExceptions = true; $this->server->httpResponse = $this->response; file_put_contents(SABRE_TEMPDIR . '/test.txt', 'Test contents'); file_put_contents(SABRE_TEMPDIR . '/test2.txt', 'Test contents2'); mkdir(SABRE_TEMPDIR . '/col'); file_put_contents(SABRE_TEMPDIR . 'col/test.txt', 'Test contents'); } function tearDown() { $cleanUp = array('test.txt','testput.txt','testcol','test2.txt','test3.txt','col/test.txt','col','col2/test.txt','col2'); foreach($cleanUp as $file) { $tmpFile = SABRE_TEMPDIR . '/' . $file; if (file_exists($tmpFile)) { if (is_dir($tmpFile)) { rmdir($tmpFile); } else { unlink($tmpFile); } } } } function testCopyOverWrite() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'COPY', 'HTTP_DESTINATION' => '/test2.txt', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 204 No Content',$this->response->status,'Received an incorrect HTTP status. Full body inspection: ' . $this->response->body); $this->assertEquals(array( 'Content-Length' => '0', ), $this->response->headers ); $this->assertEquals('Test contents',file_get_contents(SABRE_TEMPDIR. '/test2.txt')); } function testCopyToSelf() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'COPY', 'HTTP_DESTINATION' => '/test.txt', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 403 Forbidden',$this->response->status,'Received an incorrect HTTP status. Full body inspection: ' . $this->response->body); $this->assertEquals('Test contents',file_get_contents(SABRE_TEMPDIR. '/test.txt')); } function testMoveToSelf() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'MOVE', 'HTTP_DESTINATION' => '/test.txt', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 403 Forbidden',$this->response->status,'Received an incorrect HTTP status. Full body inspection: ' . $this->response->body); $this->assertEquals('Test contents',file_get_contents(SABRE_TEMPDIR. '/test.txt')); } function testMoveOverWrite() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'MOVE', 'HTTP_DESTINATION' => '/test2.txt', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Length' => 0, ), $this->response->headers ); $this->assertEquals('HTTP/1.1 204 No Content',$this->response->status); $this->assertEquals('Test contents',file_get_contents(SABRE_TEMPDIR . '/test2.txt')); $this->assertFalse(file_exists(SABRE_TEMPDIR . '/test.txt'),'The sourcefile test.txt should no longer exist at this point'); } function testBlockedOverWrite() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'COPY', 'HTTP_DESTINATION' => '/test2.txt', 'HTTP_OVERWRITE' => 'F', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 412 Precondition failed',$this->response->status); $this->assertEquals('Test contents2',file_get_contents(SABRE_TEMPDIR . '/test2.txt')); } function testNonExistantParent() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'COPY', 'HTTP_DESTINATION' => '/testcol2/test2.txt', 'HTTP_OVERWRITE' => 'F', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 409 Conflict',$this->response->status); } function testRandomOverwriteHeader() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'COPY', 'HTTP_DESTINATION' => '/testcol2/test2.txt', 'HTTP_OVERWRITE' => 'SURE!', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 400 Bad request',$this->response->status); } function testCopyDirectory() { $serverVars = array( 'REQUEST_URI' => '/col', 'REQUEST_METHOD' => 'COPY', 'HTTP_DESTINATION' => '/col2', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Length' => '0', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); $this->assertEquals('Test contents',file_get_contents(SABRE_TEMPDIR . '/col2/test.txt')); } function testSimpleCopyFile() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'COPY', 'HTTP_DESTINATION' => '/test3.txt', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Length' => '0', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); $this->assertEquals('Test contents',file_get_contents(SABRE_TEMPDIR . '/test3.txt')); } function testSimpleCopyCollection() { $serverVars = array( 'REQUEST_URI' => '/col', 'REQUEST_METHOD' => 'COPY', 'HTTP_DESTINATION' => '/col2', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status,'Incorrect status received. Full response body: ' . $this->response->body); $this->assertEquals(array( 'Content-Length' => '0', ), $this->response->headers ); $this->assertEquals('Test contents',file_get_contents(SABRE_TEMPDIR . '/col2/test.txt')); } } sabre-dav-1.8.12/tests/Sabre/DAV/ServerEventsTest.php000066400000000000000000000032171246001162500222630ustar00rootroot00000000000000server->subscribeEvent('afterBind',array($this,'afterBindHandler')); $newPath = 'afterBind'; $this->tempPath = ''; $this->server->createFile($newPath,'body'); $this->assertEquals($newPath, $this->tempPath); } function afterBindHandler($path) { $this->tempPath = $path; } function testBeforeBindCancel() { $this->server->subscribeEvent('beforeBind', array($this,'beforeBindCancelHandler')); $this->assertFalse($this->server->createFile('bla','body')); // Also testing put() $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/barbar', )); $this->server->httpRequest = $req; $this->server->exec(); $this->assertEquals('',$this->server->httpResponse->status); } function beforeBindCancelHandler() { return false; } function testException() { $this->server->subscribeEvent('exception', array($this, 'exceptionHandler')); $req = new HTTP\Request(array( 'REQUEST_METHOD' => 'GET', 'REQUEST_URI' => '/not/exisitng', )); $this->server->httpRequest = $req; $this->server->exec(); $this->assertInstanceOf('Sabre\\DAV\\Exception\\NotFound', $this->exception); } function exceptionHandler(Exception $exception) { $this->exception = $exception; } } sabre-dav-1.8.12/tests/Sabre/DAV/ServerMKCOLTest.php000066400000000000000000000242021246001162500216610ustar00rootroot00000000000000 '/testcol', 'REQUEST_METHOD' => 'MKCOL', ); $request = new HTTP\Request($serverVars); $request->setBody(""); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Length' => '0', ),$this->response->headers); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); $this->assertEquals('', $this->response->body); $this->assertTrue(is_dir($this->tempDir . '/testcol')); } /** * @depends testMkcol */ function testMKCOLUnknownBody() { $serverVars = array( 'REQUEST_URI' => '/testcol', 'REQUEST_METHOD' => 'MKCOL', ); $request = new HTTP\Request($serverVars); $request->setBody("Hello"); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); $this->assertEquals('HTTP/1.1 415 Unsupported Media Type',$this->response->status); } /** * @depends testMkcol */ function testMKCOLBrokenXML() { $serverVars = array( 'REQUEST_URI' => '/testcol', 'REQUEST_METHOD' => 'MKCOL', 'HTTP_CONTENT_TYPE' => 'application/xml', ); $request = new HTTP\Request($serverVars); $request->setBody("Hello"); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); $this->assertEquals('HTTP/1.1 400 Bad request',$this->response->status); } /** * @depends testMkcol */ function testMKCOLUnknownXML() { $serverVars = array( 'REQUEST_URI' => '/testcol', 'REQUEST_METHOD' => 'MKCOL', 'HTTP_CONTENT_TYPE' => 'application/xml', ); $request = new HTTP\Request($serverVars); $request->setBody(''); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); $this->assertEquals('HTTP/1.1 415 Unsupported Media Type',$this->response->status); } /** * @depends testMkcol */ function testMKCOLNoResourceType() { $serverVars = array( 'REQUEST_URI' => '/testcol', 'REQUEST_METHOD' => 'MKCOL', 'HTTP_CONTENT_TYPE' => 'application/xml', ); $request = new HTTP\Request($serverVars); $request->setBody(' Evert '); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); $this->assertEquals('HTTP/1.1 400 Bad request',$this->response->status,'Wrong statuscode received. Full response body: ' .$this->response->body); } /** * @depends testMKCOLNoResourceType */ function testMKCOLIncorrectResourceType() { $serverVars = array( 'REQUEST_URI' => '/testcol', 'REQUEST_METHOD' => 'MKCOL', 'HTTP_CONTENT_TYPE' => 'application/xml', ); $request = new HTTP\Request($serverVars); $request->setBody(' '); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); $this->assertEquals('HTTP/1.1 403 Forbidden',$this->response->status,'Wrong statuscode received. Full response body: ' .$this->response->body); } /** * @depends testMKCOLIncorrectResourceType */ function testMKCOLIncorrectResourceType2() { $serverVars = array( 'REQUEST_URI' => '/testcol', 'REQUEST_METHOD' => 'MKCOL', 'HTTP_CONTENT_TYPE' => 'application/xml', ); $request = new HTTP\Request($serverVars); $request->setBody(' '); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); $this->assertEquals('HTTP/1.1 403 Forbidden',$this->response->status,'Wrong statuscode received. Full response body: ' .$this->response->body); } /** * @depends testMKCOLIncorrectResourceType2 */ function testMKCOLSuccess() { $serverVars = array( 'REQUEST_URI' => '/testcol', 'REQUEST_METHOD' => 'MKCOL', 'HTTP_CONTENT_TYPE' => 'application/xml', ); $request = new HTTP\Request($serverVars); $request->setBody(' '); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Length' => '0', ),$this->response->headers); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status,'Wrong statuscode received. Full response body: ' .$this->response->body); } /** * @depends testMKCOLIncorrectResourceType2 */ function testMKCOLWhiteSpaceResourceType() { $serverVars = array( 'REQUEST_URI' => '/testcol', 'REQUEST_METHOD' => 'MKCOL', 'HTTP_CONTENT_TYPE' => 'application/xml', ); $request = new HTTP\Request($serverVars); $request->setBody(' '); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Length' => '0', ),$this->response->headers); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status,'Wrong statuscode received. Full response body: ' .$this->response->body); } /** * @depends testMKCOLIncorrectResourceType2 */ function testMKCOLNoParent() { $serverVars = array( 'REQUEST_URI' => '/testnoparent/409me', 'REQUEST_METHOD' => 'MKCOL', ); $request = new HTTP\Request($serverVars); $request->setBody(''); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); $this->assertEquals('HTTP/1.1 409 Conflict',$this->response->status,'Wrong statuscode received. Full response body: ' .$this->response->body); } /** * @depends testMKCOLIncorrectResourceType2 */ function testMKCOLParentIsNoCollection() { $serverVars = array( 'REQUEST_URI' => '/test.txt/409me', 'REQUEST_METHOD' => 'MKCOL', ); $request = new HTTP\Request($serverVars); $request->setBody(''); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); $this->assertEquals('HTTP/1.1 409 Conflict',$this->response->status,'Wrong statuscode received. Full response body: ' .$this->response->body); } /** * @depends testMKCOLIncorrectResourceType2 */ function testMKCOLAlreadyExists() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'MKCOL', ); $request = new HTTP\Request($serverVars); $request->setBody(''); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', 'Allow' => 'OPTIONS, GET, HEAD, DELETE, PROPFIND, PUT, PROPPATCH, COPY, MOVE, REPORT', ),$this->response->headers); $this->assertEquals('HTTP/1.1 405 Method Not Allowed',$this->response->status,'Wrong statuscode received. Full response body: ' .$this->response->body); } /** * @depends testMKCOLSuccess * @depends testMKCOLAlreadyExists */ function testMKCOLAndProps() { $serverVars = array( 'REQUEST_URI' => '/testcol', 'REQUEST_METHOD' => 'MKCOL', 'HTTP_CONTENT_TYPE' => 'application/xml', ); $request = new HTTP\Request($serverVars); $request->setBody(' my new collection '); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status',$this->response->status,'Wrong statuscode received. Full response body: ' .$this->response->body); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); } } sabre-dav-1.8.12/tests/Sabre/DAV/ServerPluginTest.php000066400000000000000000000043701246001162500222560ustar00rootroot00000000000000server->addPlugin($testPlugin); $this->testPlugin = $testPlugin; } /** * @covers \Sabre\DAV\ServerPlugin */ function testBaseClass() { $p = new ServerPluginMock(); $this->assertEquals(array(),$p->getFeatures()); $this->assertEquals(array(),$p->getHTTPMethods('')); } function testOptions() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'OPTIONS', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'DAV' => '1, 3, extended-mkcol, drinking', 'MS-Author-Via' => 'DAV', 'Allow' => 'OPTIONS, GET, HEAD, DELETE, PROPFIND, PUT, PROPPATCH, COPY, MOVE, REPORT, BEER, WINE', 'Accept-Ranges' => 'bytes', 'Content-Length' => '0', 'X-Sabre-Version' => Version::VERSION, ),$this->response->headers); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $this->assertEquals('', $this->response->body); $this->assertEquals('OPTIONS',$this->testPlugin->beforeMethod); } function testGetPlugin() { $this->assertEquals($this->testPlugin,$this->server->getPlugin(get_class($this->testPlugin))); } function testUnknownPlugin() { $this->assertNull($this->server->getPlugin('SomeRandomClassName')); } function testGetSupportedReportSet() { $this->assertEquals(array(), $this->testPlugin->getSupportedReportSet('/')); } function testGetPlugins() { $this->assertEquals( array(get_class($this->testPlugin) => $this->testPlugin), $this->server->getPlugins() ); } } class ServerPluginMock extends ServerPlugin { function initialize(Server $s) { } } sabre-dav-1.8.12/tests/Sabre/DAV/ServerPreconditionTest.php000066400000000000000000000266261246001162500234650ustar00rootroot00000000000000 '*', 'REQUEST_URI' => '/bar' )); $server->httpRequest = $httpRequest; $server->checkPreconditions(); } /** * @covers \Sabre\DAV\Server::checkPreconditions */ function testIfMatchHasNode() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_MATCH' => '*', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $this->assertTrue($server->checkPreconditions()); } /** * @covers \Sabre\DAV\Server::checkPreconditions * @expectedException Sabre\DAV\Exception\PreconditionFailed */ function testIfMatchWrongEtag() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_MATCH' => '1234', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $server->checkPreconditions(); } /** * @covers \Sabre\DAV\Server::checkPreconditions */ function testIfMatchCorrectEtag() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_MATCH' => '"abc123"', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $this->assertTrue($server->checkPreconditions()); } /** * Evolution sometimes uses \" instead of " for If-Match headers. * * @covers \Sabre\DAV\Server::checkPreconditions * @depends testIfMatchCorrectEtag */ function testIfMatchEvolutionEtag() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_MATCH' => '\\"abc123\\"', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $this->assertTrue($server->checkPreconditions()); } /** * @covers \Sabre\DAV\Server::checkPreconditions */ function testIfMatchMultiple() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_MATCH' => '"hellothere", "abc123"', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $this->assertTrue($server->checkPreconditions()); } /** * @covers \Sabre\DAV\Server::checkPreconditions */ function testIfNoneMatchNoNode() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_NONE_MATCH' => '*', 'REQUEST_URI' => '/bar' )); $server->httpRequest = $httpRequest; $this->assertTrue($server->checkPreconditions()); } /** * @covers \Sabre\DAV\Server::checkPreconditions * @expectedException Sabre\DAV\Exception\PreconditionFailed */ function testIfNoneMatchHasNode() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_NONE_MATCH' => '*', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $server->checkPreconditions(); } /** * @covers \Sabre\DAV\Server::checkPreconditions */ function testIfNoneMatchWrongEtag() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_NONE_MATCH' => '"1234"', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $this->assertTrue($server->checkPreconditions()); } /** * @covers \Sabre\DAV\Server::checkPreconditions */ function testIfNoneMatchWrongEtagMultiple() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_NONE_MATCH' => '"1234", "5678"', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $this->assertTrue($server->checkPreconditions()); } /** * @covers \Sabre\DAV\Server::checkPreconditions * @expectedException Sabre\DAV\Exception\PreconditionFailed */ public function testIfNoneMatchCorrectEtag() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_NONE_MATCH' => '"abc123"', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $server->checkPreconditions(); } /** * @covers \Sabre\DAV\Server::checkPreconditions * @expectedException Sabre\DAV\Exception\PreconditionFailed */ public function testIfNoneMatchCorrectEtagMultiple() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_NONE_MATCH' => '"1234", "abc123"', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $server->checkPreconditions(); } /** * @covers \Sabre\DAV\Server::checkPreconditions */ public function testIfNoneMatchCorrectEtagAsGet() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_NONE_MATCH' => '"abc123"', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $server->httpResponse = new HTTP\ResponseMock(); $this->assertFalse($server->checkPreconditions(true)); $this->assertEquals('HTTP/1.1 304 Not Modified',$server->httpResponse->status); } /** * @covers \Sabre\DAV\Server::checkPreconditions */ public function testIfModifiedSinceUnModified() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_MODIFIED_SINCE' => 'Sun, 06 Nov 1994 08:49:37 GMT', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $server->httpResponse = new HTTP\ResponseMock(); $this->assertFalse($server->checkPreconditions()); $this->assertEquals('HTTP/1.1 304 Not Modified',$server->httpResponse->status); $this->assertEquals(array( 'Last-Modified' => 'Sat, 06 Apr 1985 23:30:00 GMT', ), $server->httpResponse->headers); } /** * @covers \Sabre\DAV\Server::checkPreconditions */ public function testIfModifiedSinceModified() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_MODIFIED_SINCE' => 'Tue, 06 Nov 1984 08:49:37 GMT', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $server->httpResponse = new HTTP\ResponseMock(); $this->assertTrue($server->checkPreconditions()); } /** * @covers \Sabre\DAV\Server::checkPreconditions */ public function testIfModifiedSinceInvalidDate() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_MODIFIED_SINCE' => 'Your mother', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $server->httpResponse = new HTTP\ResponseMock(); // Invalid dates must be ignored, so this should return true $this->assertTrue($server->checkPreconditions()); } /** * @covers \Sabre\DAV\Server::checkPreconditions */ public function testIfModifiedSinceInvalidDate2() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_MODIFIED_SINCE' => 'Sun, 06 Nov 1994 08:49:37 EST', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $server->httpResponse = new HTTP\ResponseMock(); $this->assertTrue($server->checkPreconditions()); } /** * @covers \Sabre\DAV\Server::checkPreconditions */ public function testIfUnmodifiedSinceUnModified() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_UNMODIFIED_SINCE' => 'Sun, 06 Nov 1994 08:49:37 GMT', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $this->assertTrue($server->checkPreconditions()); } /** * @covers \Sabre\DAV\Server::checkPreconditions * @expectedException Sabre\DAV\Exception\PreconditionFailed */ public function testIfUnmodifiedSinceModified() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_UNMODIFIED_SINCE' => 'Tue, 06 Nov 1984 08:49:37 GMT', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $server->httpResponse = new HTTP\ResponseMock(); $server->checkPreconditions(); } /** * @covers \Sabre\DAV\Server::checkPreconditions */ public function testIfUnmodifiedSinceInvalidDate() { $root = new SimpleCollection('root',array(new ServerPreconditionsNode())); $server = new Server($root); $httpRequest = new HTTP\Request(array( 'HTTP_IF_UNMODIFIED_SINCE' => 'Sun, 06 Nov 1984 08:49:37 CET', 'REQUEST_URI' => '/foo' )); $server->httpRequest = $httpRequest; $server->httpResponse = new HTTP\ResponseMock(); $this->assertTrue($server->checkPreconditions()); } } class ServerPreconditionsNode extends File { function getETag() { return '"abc123"'; } function getLastModified() { /* my birthday & time, I believe */ return strtotime('1985-04-07 01:30 +02:00'); } function getName() { return 'foo'; } } sabre-dav-1.8.12/tests/Sabre/DAV/ServerPropsTest.php000066400000000000000000000322411246001162500221210ustar00rootroot00000000000000server->addPlugin(new Locks\Plugin(new Locks\Backend\File(SABRE_TEMPDIR . '/.locksdb'))); } function tearDown() { parent::tearDown(); if (file_exists(SABRE_TEMPDIR.'../.locksdb')) unlink(SABRE_TEMPDIR.'../.locksdb'); } private function sendRequest($body) { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'PROPFIND', 'HTTP_DEPTH' => '0', ); $request = new HTTP\Request($serverVars); $request->setBody($body); $this->server->httpRequest = ($request); $this->server->exec(); } public function testPropFindEmptyBody() { $hasFired = false; $self = $this; // Also testing the beforeGetPropertiesForPath event. $this->server->subscribeEvent('beforeGetPropertiesForPath', function($path, $properties, $depth) use ($self, &$hasFired) { $hasFired = true; $self->assertEquals('', $path); $self->assertEquals(array(), $properties); $self->assertEquals(0, $depth); }); $this->sendRequest(""); $this->assertTrue($hasFired); $this->assertEquals('HTTP/1.1 207 Multi-Status',$this->response->status); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', 'DAV' => '1, 3, extended-mkcol, 2', 'Vary' => 'Brief,Prefer', ), $this->response->headers ); $body = preg_replace("/xmlns(:[A-Za-z0-9_])?=(\"|\')DAV:(\"|\')/","xmlns\\1=\"urn:DAV\"",$this->response->body); $xml = simplexml_load_string($body); $xml->registerXPathNamespace('d','urn:DAV'); list($data) = $xml->xpath('/d:multistatus/d:response/d:href'); $this->assertEquals('/',(string)$data,'href element should have been /'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:resourcetype'); $this->assertEquals(1,count($data)); } function testSupportedLocks() { $xml = ' '; $this->sendRequest($xml); $body = preg_replace("/xmlns(:[A-Za-z0-9_])?=(\"|\')DAV:(\"|\')/","xmlns\\1=\"urn:DAV\"",$this->response->body); $xml = simplexml_load_string($body); $xml->registerXPathNamespace('d','urn:DAV'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:supportedlock/d:lockentry'); $this->assertEquals(2,count($data),'We expected two \'d:lockentry\' tags'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:supportedlock/d:lockentry/d:lockscope'); $this->assertEquals(2,count($data),'We expected two \'d:lockscope\' tags'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:supportedlock/d:lockentry/d:locktype'); $this->assertEquals(2,count($data),'We expected two \'d:locktype\' tags'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:supportedlock/d:lockentry/d:lockscope/d:shared'); $this->assertEquals(1,count($data),'We expected a \'d:shared\' tag'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:supportedlock/d:lockentry/d:lockscope/d:exclusive'); $this->assertEquals(1,count($data),'We expected a \'d:exclusive\' tag'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:supportedlock/d:lockentry/d:locktype/d:write'); $this->assertEquals(2,count($data),'We expected two \'d:write\' tags'); } function testLockDiscovery() { $xml = ' '; $this->sendRequest($xml); $body = preg_replace("/xmlns(:[A-Za-z0-9_])?=(\"|\')DAV:(\"|\')/","xmlns\\1=\"urn:DAV\"",$this->response->body); $xml = simplexml_load_string($body); $xml->registerXPathNamespace('d','urn:DAV'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:lockdiscovery'); $this->assertEquals(1,count($data),'We expected a \'d:lockdiscovery\' tag'); } function testUnknownProperty() { $xml = ' '; $this->sendRequest($xml); $body = preg_replace("/xmlns(:[A-Za-z0-9_])?=(\"|\')DAV:(\"|\')/","xmlns\\1=\"urn:DAV\"",$this->response->body); $xml = simplexml_load_string($body); $xml->registerXPathNamespace('d','urn:DAV'); $pathTests = array( '/d:multistatus', '/d:multistatus/d:response', '/d:multistatus/d:response/d:propstat', '/d:multistatus/d:response/d:propstat/d:status', '/d:multistatus/d:response/d:propstat/d:prop', '/d:multistatus/d:response/d:propstat/d:prop/d:macaroni', ); foreach($pathTests as $test) { $this->assertTrue(count($xml->xpath($test))==true,'We expected the ' . $test . ' element to appear in the response, we got: ' . $body); } $val = $xml->xpath('/d:multistatus/d:response/d:propstat/d:status'); $this->assertEquals(1,count($val),$body); $this->assertEquals('HTTP/1.1 404 Not Found',(string)$val[0]); } /** * @covers Sabre\DAV\Server::parsePropPatchRequest */ public function testParsePropPatchRequest() { $body = ' somevalue removeme '; $result = $this->server->parsePropPatchRequest($body); $this->assertEquals(array( '{http://sabredav.org/NS/test}someprop' => 'somevalue', '{http://sabredav.org/NS/test}someprop2' => null, '{http://sabredav.org/NS/test}someprop3' => null, ), $result); } /** * @covers Sabre\DAV\Server::updateProperties */ public function testUpdateProperties() { $props = array( '{http://sabredav.org/NS/test}someprop' => 'somevalue', ); $result = $this->server->updateProperties('/test2.txt',$props); $this->assertEquals(array( '200' => array('{http://sabredav.org/NS/test}someprop' => null), 'href' => '/test2.txt', ), $result); } /** * @covers Sabre\DAV\Server::updateProperties * @depends testUpdateProperties */ public function testUpdatePropertiesProtected() { $props = array( '{http://sabredav.org/NS/test}someprop' => 'somevalue', '{DAV:}getcontentlength' => 50, ); $result = $this->server->updateProperties('/test2.txt',$props); $this->assertEquals(array( '424' => array('{http://sabredav.org/NS/test}someprop' => null), '403' => array('{DAV:}getcontentlength' => null), 'href' => '/test2.txt', ), $result); } /** * @covers Sabre\DAV\Server::updateProperties * @depends testUpdateProperties */ public function testUpdatePropertiesFail1() { $dir = new PropTestDirMock('updatepropsfalse'); $objectTree = new ObjectTree($dir); $this->server->tree = $objectTree; $props = array( '{http://sabredav.org/NS/test}someprop' => 'somevalue', ); $result = $this->server->updateProperties('/',$props); $this->assertEquals(array( '403' => array('{http://sabredav.org/NS/test}someprop' => null), 'href' => '/', ), $result); } /** * @covers Sabre\DAV\Server::updateProperties * @depends testUpdateProperties */ public function testUpdatePropertiesFail2() { $dir = new PropTestDirMock('updatepropsarray'); $objectTree = new ObjectTree($dir); $this->server->tree = $objectTree; $props = array( '{http://sabredav.org/NS/test}someprop' => 'somevalue', ); $result = $this->server->updateProperties('/',$props); $this->assertEquals(array( '402' => array('{http://sabredav.org/NS/test}someprop' => null), 'href' => '/', ), $result); } /** * @covers Sabre\DAV\Server::updateProperties * @depends testUpdateProperties * @expectedException Sabre\DAV\Exception */ public function testUpdatePropertiesFail3() { $dir = new PropTestDirMock('updatepropsobj'); $objectTree = new ObjectTree($dir); $this->server->tree = $objectTree; $props = array( '{http://sabredav.org/NS/test}someprop' => 'somevalue', ); $result = $this->server->updateProperties('/',$props); } /** * @depends testParsePropPatchRequest * @depends testUpdateProperties * @covers Sabre\DAV\Server::httpPropPatch */ public function testPropPatch() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'PROPPATCH', ); $body = ' somevalue '; $request = new HTTP\Request($serverVars); $request->setBody($body); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', 'Vary' => 'Brief,Prefer', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 207 Multi-Status',$this->response->status,'We got the wrong status. Full XML response: ' . $this->response->body); $body = preg_replace("/xmlns(:[A-Za-z0-9_])?=(\"|\')DAV:(\"|\')/","xmlns\\1=\"urn:DAV\"",$this->response->body); $xml = simplexml_load_string($body); $xml->registerXPathNamespace('d','urn:DAV'); $xml->registerXPathNamespace('bla','http://www.rooftopsolutions.nl/testnamespace'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop'); $this->assertEquals(1,count($data),'We expected one \'d:prop\' element. Response body: ' . $body); $data = $xml->xpath('//bla:someprop'); $this->assertEquals(1,count($data),'We expected one \'s:someprop\' element. Response body: ' . $body); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:status'); $this->assertEquals(1,count($data),'We expected one \'s:status\' element. Response body: ' . $body); $this->assertEquals('HTTP/1.1 200 OK',(string)$data[0]); } /** * @depends testPropPatch */ public function testPropPatchAndFetch() { $this->testPropPatch(); $xml = ' '; $this->sendRequest($xml); $body = preg_replace("/xmlns(:[A-Za-z0-9_])?=(\"|\')DAV:(\"|\')/","xmlns\\1=\"urn:DAV\"",$this->response->body); $xml = simplexml_load_string($body); $xml->registerXPathNamespace('d','urn:DAV'); $xml->registerXPathNamespace('bla','http://www.rooftopsolutions.nl/testnamespace'); $xpath='//bla:someprop'; $result = $xml->xpath($xpath); $this->assertEquals(1,count($result),'We couldn\'t find our new property in the response. Full response body:' . "\n" . $body); $this->assertEquals('somevalue',(string)$result[0],'We couldn\'t find our new property in the response. Full response body:' . "\n" . $body); } } class PropTestDirMock extends SimpleCollection implements IProperties { public $type; function __construct($type) { $this->type =$type; parent::__construct('root'); } function updateProperties($updateProperties) { switch($this->type) { case 'updatepropsfalse' : return false; case 'updatepropsarray' : $r = array(402 => array()); foreach($updateProperties as $k=>$v) $r[402][$k] = null; return $r; case 'updatepropsobj' : return new \STDClass(); } } function getProperties($requestedPropeties) { return array(); } } sabre-dav-1.8.12/tests/Sabre/DAV/ServerRangeTest.php000066400000000000000000000210751246001162500220550ustar00rootroot00000000000000 '/test.txt', 'REQUEST_METHOD' => 'GET', 'HTTP_RANGE' => 'bytes=2-5', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/octet-stream', 'Content-Length' => 4, 'Content-Range' => 'bytes 2-5/13', 'Last-Modified' => HTTP\Util::toHTTPDate(new \DateTime('@' . filemtime($this->tempDir . '/test.txt'))), 'ETag' => '"' . md5(file_get_contents(SABRE_TEMPDIR . '/test.txt')). '"', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 206 Partial Content',$this->response->status); $this->assertEquals('st c', stream_get_contents($this->response->body)); } /** * @depends testRange */ function testStartRange() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'GET', 'HTTP_RANGE' => 'bytes=2-', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/octet-stream', 'Content-Length' => 11, 'Content-Range' => 'bytes 2-12/13', 'Last-Modified' => HTTP\Util::toHTTPDate(new \DateTime('@' . filemtime($this->tempDir . '/test.txt'))), 'ETag' => '"' . md5(file_get_contents(SABRE_TEMPDIR . '/test.txt')) . '"', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 206 Partial Content',$this->response->status); $this->assertEquals('st contents', stream_get_contents($this->response->body)); } /** * @depends testRange */ function testEndRange() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'GET', 'HTTP_RANGE' => 'bytes=-8', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/octet-stream', 'Content-Length' => 8, 'Content-Range' => 'bytes 5-12/13', 'Last-Modified' => HTTP\Util::toHTTPDate(new \DateTime('@' . filemtime($this->tempDir . '/test.txt'))), 'ETag' => '"' . md5(file_get_contents(SABRE_TEMPDIR . '/test.txt')). '"', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 206 Partial Content',$this->response->status); $this->assertEquals('contents', stream_get_contents($this->response->body)); } /** * @depends testRange */ function testTooHighRange() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'GET', 'HTTP_RANGE' => 'bytes=100-200', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 416 Requested Range Not Satisfiable',$this->response->status); } /** * @depends testRange */ function testCrazyRange() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'GET', 'HTTP_RANGE' => 'bytes=8-4', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 416 Requested Range Not Satisfiable',$this->response->status); } /** * @depends testRange * @covers \Sabre\DAV\Server::httpGet */ function testIfRangeEtag() { $node = $this->server->tree->getNodeForPath('test.txt'); $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'GET', 'HTTP_RANGE' => 'bytes=2-5', 'HTTP_IF_RANGE' => $node->getETag(), ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/octet-stream', 'Content-Length' => 4, 'Content-Range' => 'bytes 2-5/13', 'Last-Modified' => HTTP\Util::toHTTPDate(new \DateTime('@' . filemtime($this->tempDir . '/test.txt'))), 'ETag' => '"' . md5(file_get_contents(SABRE_TEMPDIR . '/test.txt')) . '"', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 206 Partial Content',$this->response->status); $this->assertEquals('st c', stream_get_contents($this->response->body)); } /** * @depends testRange * @covers \Sabre\DAV\Server::httpGet */ function testIfRangeEtagIncorrect() { $node = $this->server->tree->getNodeForPath('test.txt'); $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'GET', 'HTTP_RANGE' => 'bytes=2-5', 'HTTP_IF_RANGE' => $node->getETag() . 'blabla', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/octet-stream', 'Content-Length' => 13, 'Last-Modified' => HTTP\Util::toHTTPDate(new \DateTime('@' . filemtime($this->tempDir . '/test.txt'))), 'ETag' => '"' . md5(file_get_contents(SABRE_TEMPDIR . '/test.txt')) . '"', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $this->assertEquals('Test contents', stream_get_contents($this->response->body)); } /** * @depends testRange * @covers \Sabre\DAV\Server::httpGet */ function testIfRangeModificationDate() { $node = $this->server->tree->getNodeForPath('test.txt'); $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'GET', 'HTTP_RANGE' => 'bytes=2-5', 'HTTP_IF_RANGE' => 'tomorrow', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/octet-stream', 'Content-Length' => 4, 'Content-Range' => 'bytes 2-5/13', 'Last-Modified' => HTTP\Util::toHTTPDate(new \DateTime('@' . filemtime($this->tempDir . '/test.txt'))), 'ETag' => '"' . md5(file_get_contents(SABRE_TEMPDIR . '/test.txt')) . '"', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 206 Partial Content',$this->response->status); $this->assertEquals('st c', stream_get_contents($this->response->body)); } /** * @depends testRange * @covers \Sabre\DAV\Server::httpGet */ function testIfRangeModificationDateModified() { $node = $this->server->tree->getNodeForPath('test.txt'); $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'GET', 'HTTP_RANGE' => 'bytes=2-5', 'HTTP_IF_RANGE' => '-2 years', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/octet-stream', 'Content-Length' => 13, 'Last-Modified' => HTTP\Util::toHTTPDate(new \DateTime('@' . filemtime($this->tempDir . '/test.txt'))), 'ETag' => '"' . md5(file_get_contents(SABRE_TEMPDIR . '/test.txt')) . '"', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $this->assertEquals('Test contents', stream_get_contents($this->response->body)); } } sabre-dav-1.8.12/tests/Sabre/DAV/ServerSimpleTest.php000066400000000000000000000410101246001162500222410ustar00rootroot00000000000000assertEquals($nodes[0], $server->tree->getNodeForPath('hello')); } /** * @expectedException Sabre\DAV\Exception */ function testConstructIncorrectObj() { $nodes = array( new SimpleCollection('hello'), new \STDClass(), ); $server = new Server($nodes); } /** * @expectedException Sabre\DAV\Exception */ function testConstructInvalidArg() { $server = new Server(1); } function testGet() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'GET', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/octet-stream', 'Content-Length' => 13, 'Last-Modified' => HTTP\Util::toHTTPDate(new \DateTime('@' . filemtime($this->tempDir . '/test.txt'))), ), $this->response->headers ); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $this->assertEquals('Test contents', stream_get_contents($this->response->body)); } function testGetHttp10() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'GET', 'SERVER_PROTOCOL' => 'HTTP/1.0', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/octet-stream', 'Content-Length' => 13, 'Last-Modified' => HTTP\Util::toHTTPDate(new \DateTime('@' . filemtime($this->tempDir . '/test.txt'))), ), $this->response->headers ); $this->assertEquals('HTTP/1.0 200 OK',$this->response->status); $this->assertEquals('Test contents', stream_get_contents($this->response->body)); } function testGetDoesntExist() { $serverVars = array( 'REQUEST_URI' => '/test.txt_randomblbla', 'REQUEST_METHOD' => 'GET', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 404 Not Found',$this->response->status); } function testGetDoesntExist2() { $serverVars = array( 'REQUEST_URI' => '/test.txt/randomblbla', 'REQUEST_METHOD' => 'GET', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 404 Not Found',$this->response->status); } /** * This test should have the exact same result as testGet. * * The idea is that double slashes // are converted to single ones / * */ function testGetDoubleSlash() { $serverVars = array( 'REQUEST_URI' => '//test.txt', 'REQUEST_METHOD' => 'GET', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/octet-stream', 'Content-Length' => 13, 'Last-Modified' => HTTP\Util::toHTTPDate(new \DateTime('@' . filemtime($this->tempDir . '/test.txt'))), ), $this->response->headers ); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $this->assertEquals('Test contents', stream_get_contents($this->response->body)); } function testHEAD() { $serverVars = array( 'REQUEST_URI' => '/test.txt', 'REQUEST_METHOD' => 'HEAD', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/octet-stream', 'Content-Length' => 13, 'Last-Modified' => HTTP\Util::toHTTPDate(new \DateTime('@' . filemtime($this->tempDir . '/test.txt'))), ), $this->response->headers ); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $this->assertEquals('', $this->response->body); } function testOptions() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'OPTIONS', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'DAV' => '1, 3, extended-mkcol', 'MS-Author-Via' => 'DAV', 'Allow' => 'OPTIONS, GET, HEAD, DELETE, PROPFIND, PUT, PROPPATCH, COPY, MOVE, REPORT', 'Accept-Ranges' => 'bytes', 'Content-Length' => '0', 'X-Sabre-Version' => Version::VERSION, ),$this->response->headers); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $this->assertEquals('', $this->response->body); } function testNonExistantMethod() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'BLABLA', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); $this->assertEquals('HTTP/1.1 501 Not Implemented',$this->response->status); } function testGETOnCollection() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'GET', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); $this->assertEquals('HTTP/1.1 501 Not Implemented',$this->response->status); } function testHEADOnCollection() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'HEAD', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); } function testBaseUri() { $serverVars = array( 'REQUEST_URI' => '/blabla/test.txt', 'REQUEST_METHOD' => 'GET', ); $request = new HTTP\Request($serverVars); $this->server->setBaseUri('/blabla/'); $this->assertEquals('/blabla/',$this->server->getBaseUri()); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/octet-stream', 'Content-Length' => 13, 'Last-Modified' => HTTP\Util::toHTTPDate(new \DateTime('@' . filemtime($this->tempDir . '/test.txt'))), ), $this->response->headers ); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $this->assertEquals('Test contents', stream_get_contents($this->response->body)); } function testBaseUriAddSlash() { $tests = array( '/' => '/', '/foo' => '/foo/', '/foo/' => '/foo/', '/foo/bar' => '/foo/bar/', '/foo/bar/' => '/foo/bar/', ); foreach($tests as $test=>$result) { $this->server->setBaseUri($test); $this->assertEquals($result, $this->server->getBaseUri()); } } function testCalculateUri() { $uris = array( 'http://www.example.org/root/somepath', '/root/somepath', '/root/somepath/', ); $this->server->setBaseUri('/root/'); foreach($uris as $uri) { $this->assertEquals('somepath',$this->server->calculateUri($uri)); } $this->server->setBaseUri('/root'); foreach($uris as $uri) { $this->assertEquals('somepath',$this->server->calculateUri($uri)); } $this->assertEquals('', $this->server->calculateUri('/root')); } function testCalculateUriSpecialChars() { $uris = array( 'http://www.example.org/root/%C3%A0fo%C3%B3', '/root/%C3%A0fo%C3%B3', '/root/%C3%A0fo%C3%B3/' ); $this->server->setBaseUri('/root/'); foreach($uris as $uri) { $this->assertEquals("\xc3\xa0fo\xc3\xb3",$this->server->calculateUri($uri)); } $this->server->setBaseUri('/root'); foreach($uris as $uri) { $this->assertEquals("\xc3\xa0fo\xc3\xb3",$this->server->calculateUri($uri)); } $this->server->setBaseUri('/'); foreach($uris as $uri) { $this->assertEquals("root/\xc3\xa0fo\xc3\xb3",$this->server->calculateUri($uri)); } } function testBaseUriCheck() { $uris = array( 'http://www.example.org/root/somepath', '/root/somepath', '/root/somepath/' ); try { $this->server->setBaseUri('root/'); $this->server->calculateUri('/root/testuri'); $this->fail('Expected an exception'); } catch (Exception\Forbidden $e) { // This was expected } } /** * @covers \Sabre\DAV\Server::guessBaseUri */ function testGuessBaseUri() { $serverVars = array( 'REQUEST_URI' => '/index.php/root', 'PATH_INFO' => '/root', ); $httpRequest = new HTTP\Request($serverVars); $server = new Server(); $server->httpRequest = $httpRequest; $this->assertEquals('/index.php/', $server->guessBaseUri()); } /** * @depends testGuessBaseUri * @covers Sabre\DAV\Server::guessBaseUri */ function testGuessBaseUriPercentEncoding() { $serverVars = array( 'REQUEST_URI' => '/index.php/dir/path2/path%20with%20spaces', 'PATH_INFO' => '/dir/path2/path with spaces', ); $httpRequest = new HTTP\Request($serverVars); $server = new Server(); $server->httpRequest = $httpRequest; $this->assertEquals('/index.php/', $server->guessBaseUri()); } /** * @depends testGuessBaseUri * @covers \Sabre\DAV\Server::guessBaseUri */ /* function testGuessBaseUriPercentEncoding2() { $this->markTestIncomplete('This behaviour is not yet implemented'); $serverVars = array( 'REQUEST_URI' => '/some%20directory+mixed/index.php/dir/path2/path%20with%20spaces', 'PATH_INFO' => '/dir/path2/path with spaces', ); $httpRequest = new HTTP\Request($serverVars); $server = new Server(); $server->httpRequest = $httpRequest; $this->assertEquals('/some%20directory+mixed/index.php/', $server->guessBaseUri()); }*/ function testGuessBaseUri2() { $serverVars = array( 'REQUEST_URI' => '/index.php/root/', 'PATH_INFO' => '/root/', ); $httpRequest = new HTTP\Request($serverVars); $server = new Server(); $server->httpRequest = $httpRequest; $this->assertEquals('/index.php/', $server->guessBaseUri()); } function testGuessBaseUriNoPathInfo() { $serverVars = array( 'REQUEST_URI' => '/index.php/root', ); $httpRequest = new HTTP\Request($serverVars); $server = new Server(); $server->httpRequest = $httpRequest; $this->assertEquals('/', $server->guessBaseUri()); } function testGuessBaseUriNoPathInfo2() { $serverVars = array( 'REQUEST_URI' => '/a/b/c/test.php', ); $httpRequest = new HTTP\Request($serverVars); $server = new Server(); $server->httpRequest = $httpRequest; $this->assertEquals('/', $server->guessBaseUri()); } /** * @covers \Sabre\DAV\Server::guessBaseUri * @depends testGuessBaseUri */ function testGuessBaseUriQueryString() { $serverVars = array( 'REQUEST_URI' => '/index.php/root?query_string=blabla', 'PATH_INFO' => '/root', ); $httpRequest = new HTTP\Request($serverVars); $server = new Server(); $server->httpRequest = $httpRequest; $this->assertEquals('/index.php/', $server->guessBaseUri()); } /** * @covers \Sabre\DAV\Server::guessBaseUri * @depends testGuessBaseUri * @expectedException \Sabre\DAV\Exception */ function testGuessBaseUriBadConfig() { $serverVars = array( 'REQUEST_URI' => '/index.php/root/heyyy', 'PATH_INFO' => '/root', ); $httpRequest = new HTTP\Request($serverVars); $server = new Server(); $server->httpRequest = $httpRequest; $server->guessBaseUri(); } function testTriggerException() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'FOO', ); $httpRequest = new HTTP\Request($serverVars); $this->server->httpRequest = $httpRequest; $this->server->subscribeEvent('beforeMethod',array($this,'exceptionTrigger')); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); $this->assertEquals('HTTP/1.1 500 Internal Server Error',$this->response->status); } function exceptionTrigger() { throw new Exception('Hola'); } function testReportNotFound() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'REPORT', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->httpRequest->setBody(''); $this->server->exec(); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 403 Forbidden',$this->response->status,'We got an incorrect status back. Full response body follows: ' . $this->response->body); } function testReportIntercepted() { $serverVars = array( 'REQUEST_URI' => '/', 'REQUEST_METHOD' => 'REPORT', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->httpRequest->setBody(''); $this->server->subscribeEvent('report',array($this,'reportHandler')); $this->server->exec(); $this->assertEquals(array( 'testheader' => 'testvalue', ), $this->response->headers ); $this->assertEquals('HTTP/1.1 418 I\'m a teapot',$this->response->status,'We got an incorrect status back. Full response body follows: ' . $this->response->body); } function reportHandler($reportName) { if ($reportName=='{http://www.rooftopsolutions.nl/NS}myreport') { $this->server->httpResponse->sendStatus(418); $this->server->httpResponse->setHeader('testheader','testvalue'); return false; } else return; } function testGetPropertiesForChildren() { $result = $this->server->getPropertiesForChildren('',array( '{DAV:}getcontentlength', )); $expected = array( 'test.txt' => array('{DAV:}getcontentlength' => 13), 'dir/' => array(), ); $this->assertEquals($expected,$result); } } sabre-dav-1.8.12/tests/Sabre/DAV/ServerUpdatePropertiesTest.php000066400000000000000000000057671246001162500243320ustar00rootroot00000000000000updateProperties('foo', array( '{DAV:}foo' => 'bar' )); $expected = array( 'href' => 'foo', '403' => array( '{DAV:}foo' => null, ), ); $this->assertEquals($expected, $result); } function testUpdatePropertiesProtected() { $tree = array( new SimpleCollection('foo'), ); $server = new Server($tree); $result = $server->updateProperties('foo', array( '{DAV:}getetag' => 'bla', '{DAV:}foo' => 'bar' )); $expected = array( 'href' => 'foo', '403' => array( '{DAV:}getetag' => null, ), '424' => array( '{DAV:}foo' => null, ), ); $this->assertEquals($expected, $result); } function testUpdatePropertiesEventFail() { $tree = array( new SimpleCollection('foo'), ); $server = new Server($tree); $server->subscribeEvent('updateProperties', array($this,'updatepropfail')); $result = $server->updateProperties('foo', array( '{DAV:}foo' => 'bar', '{DAV:}foo2' => 'bla', )); $expected = array( 'href' => 'foo', '404' => array( '{DAV:}foo' => null, ), '424' => array( '{DAV:}foo2' => null, ), ); $this->assertEquals($expected, $result); } function updatePropFail(&$propertyDelta, &$result, $node) { $result[404] = array( '{DAV:}foo' => null, ); unset($propertyDelta['{DAV:}foo']); return false; } function testUpdatePropertiesEventSuccess() { $tree = array( new SimpleCollection('foo'), ); $server = new Server($tree); $server->subscribeEvent('updateProperties', array($this,'updatepropsuccess')); $result = $server->updateProperties('foo', array( '{DAV:}foo' => 'bar', '{DAV:}foo2' => 'bla', )); $expected = array( 'href' => 'foo', '200' => array( '{DAV:}foo' => null, ), '201' => array( '{DAV:}foo2' => null, ), ); $this->assertEquals($expected, $result); } function updatePropSuccess(&$propertyDelta, &$result, $node) { $result[200] = array( '{DAV:}foo' => null, ); $result[201] = array( '{DAV:}foo2' => null, ); unset($propertyDelta['{DAV:}foo']); unset($propertyDelta['{DAV:}foo2']); return; } } sabre-dav-1.8.12/tests/Sabre/DAV/SimpleFileTest.php000066400000000000000000000010001246001162500216450ustar00rootroot00000000000000assertEquals('filename.txt', $file->getName()); $this->assertEquals('contents', $file->get()); $this->assertEquals('8', $file->getSize()); $this->assertEquals('"' . md5('contents') . '"', $file->getETag()); $this->assertEquals('text/plain', $file->getContentType()); } } sabre-dav-1.8.12/tests/Sabre/DAV/StringUtilTest.php000066400000000000000000000111311246001162500217260ustar00rootroot00000000000000assertEquals($result, StringUtil::textMatch($haystack, $needle, $collation, $matchType)); } function dataset() { return array( array('FOOBAR', 'FOO', 'i;octet', 'contains', true), array('FOOBAR', 'foo', 'i;octet', 'contains', false), array('FÖÖBAR', 'FÖÖ', 'i;octet', 'contains', true), array('FÖÖBAR', 'föö', 'i;octet', 'contains', false), array('FOOBAR', 'FOOBAR', 'i;octet', 'equals', true), array('FOOBAR', 'fooBAR', 'i;octet', 'equals', false), array('FOOBAR', 'FOO', 'i;octet', 'starts-with', true), array('FOOBAR', 'foo', 'i;octet', 'starts-with', false), array('FOOBAR', 'BAR', 'i;octet', 'starts-with', false), array('FOOBAR', 'bar', 'i;octet', 'starts-with', false), array('FOOBAR', 'FOO', 'i;octet', 'ends-with', false), array('FOOBAR', 'foo', 'i;octet', 'ends-with', false), array('FOOBAR', 'BAR', 'i;octet', 'ends-with', true), array('FOOBAR', 'bar', 'i;octet', 'ends-with', false), array('FOOBAR', 'FOO', 'i;ascii-casemap', 'contains', true), array('FOOBAR', 'foo', 'i;ascii-casemap', 'contains', true), array('FÖÖBAR', 'FÖÖ', 'i;ascii-casemap', 'contains', true), array('FÖÖBAR', 'föö', 'i;ascii-casemap', 'contains', false), array('FOOBAR', 'FOOBAR', 'i;ascii-casemap', 'equals', true), array('FOOBAR', 'fooBAR', 'i;ascii-casemap', 'equals', true), array('FOOBAR', 'FOO', 'i;ascii-casemap', 'starts-with', true), array('FOOBAR', 'foo', 'i;ascii-casemap', 'starts-with', true), array('FOOBAR', 'BAR', 'i;ascii-casemap', 'starts-with', false), array('FOOBAR', 'bar', 'i;ascii-casemap', 'starts-with', false), array('FOOBAR', 'FOO', 'i;ascii-casemap', 'ends-with', false), array('FOOBAR', 'foo', 'i;ascii-casemap', 'ends-with', false), array('FOOBAR', 'BAR', 'i;ascii-casemap', 'ends-with', true), array('FOOBAR', 'bar', 'i;ascii-casemap', 'ends-with', true), array('FOOBAR', 'FOO', 'i;unicode-casemap', 'contains', true), array('FOOBAR', 'foo', 'i;unicode-casemap', 'contains', true), array('FÖÖBAR', 'FÖÖ', 'i;unicode-casemap', 'contains', true), array('FÖÖBAR', 'föö', 'i;unicode-casemap', 'contains', true), array('FOOBAR', 'FOOBAR', 'i;unicode-casemap', 'equals', true), array('FOOBAR', 'fooBAR', 'i;unicode-casemap', 'equals', true), array('FOOBAR', 'FOO', 'i;unicode-casemap', 'starts-with', true), array('FOOBAR', 'foo', 'i;unicode-casemap', 'starts-with', true), array('FOOBAR', 'BAR', 'i;unicode-casemap', 'starts-with', false), array('FOOBAR', 'bar', 'i;unicode-casemap', 'starts-with', false), array('FOOBAR', 'FOO', 'i;unicode-casemap', 'ends-with', false), array('FOOBAR', 'foo', 'i;unicode-casemap', 'ends-with', false), array('FOOBAR', 'BAR', 'i;unicode-casemap', 'ends-with', true), array('FOOBAR', 'bar', 'i;unicode-casemap', 'ends-with', true), ); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ public function testBadCollation() { StringUtil::textMatch('foobar','foo','blabla','contains'); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ public function testBadMatchType() { StringUtil::textMatch('foobar','foo','i;octet','booh'); } public function testEnsureUTF8_ascii() { $inputString = "harkema"; $outputString = "harkema"; $this->assertEquals( $outputString, StringUtil::ensureUTF8($inputString) ); } public function testEnsureUTF8_latin1() { $inputString = "m\xfcnster"; $outputString = "münster"; $this->assertEquals( $outputString, StringUtil::ensureUTF8($inputString) ); } public function testEnsureUTF8_utf8() { $inputString = "m\xc3\xbcnster"; $outputString = "münster"; $this->assertEquals( $outputString, StringUtil::ensureUTF8($inputString) ); } } sabre-dav-1.8.12/tests/Sabre/DAV/TemporaryFileFilterTest.php000066400000000000000000000205541246001162500235630ustar00rootroot00000000000000server->addPlugin($plugin); } function testPutNormal() { $serverVars = array( 'REQUEST_URI' => '/testput.txt', 'REQUEST_METHOD' => 'PUT', ); $request = new HTTP\Request($serverVars); $request->setBody('Testing new file'); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('', $this->response->body); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); $this->assertEquals('0', $this->response->headers['Content-Length']); $this->assertEquals('Testing new file',file_get_contents(SABRE_TEMPDIR . '/testput.txt')); } function testPutTemp() { // mimicking an OS/X resource fork $serverVars = array( 'REQUEST_URI' => '/._testput.txt', 'REQUEST_METHOD' => 'PUT', ); $request = new HTTP\Request($serverVars); $request->setBody('Testing new file'); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('', $this->response->body); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); $this->assertEquals(array( 'X-Sabre-Temp' => 'true', ),$this->response->headers); $this->assertFalse(file_exists(SABRE_TEMPDIR . '/._testput.txt'),'._testput.txt should not exist in the regular file structure.'); } function testPutTempIfNoneMatch() { // mimicking an OS/X resource fork $serverVars = array( 'REQUEST_URI' => '/._testput.txt', 'REQUEST_METHOD' => 'PUT', 'HTTP_IF_NONE_MATCH' => '*', ); $request = new HTTP\Request($serverVars); $request->setBody('Testing new file'); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('', $this->response->body); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); $this->assertEquals(array( 'X-Sabre-Temp' => 'true', ),$this->response->headers); $this->assertFalse(file_exists(SABRE_TEMPDIR . '/._testput.txt'),'._testput.txt should not exist in the regular file structure.'); $this->server->exec(); $this->assertEquals('HTTP/1.1 412 Precondition failed',$this->response->status); $this->assertEquals(array( 'X-Sabre-Temp' => 'true', 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); } function testPutGet() { // mimicking an OS/X resource fork $serverVars = array( 'REQUEST_URI' => '/._testput.txt', 'REQUEST_METHOD' => 'PUT', ); $request = new HTTP\Request($serverVars); $request->setBody('Testing new file'); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('', $this->response->body); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); $this->assertEquals(array( 'X-Sabre-Temp' => 'true', ),$this->response->headers); $serverVars = array( 'REQUEST_URI' => '/._testput.txt', 'REQUEST_METHOD' => 'GET', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 200 OK',$this->response->status); $this->assertEquals(array( 'X-Sabre-Temp' => 'true', 'Content-Length' => 16, 'Content-Type' => 'application/octet-stream', ),$this->response->headers); $this->assertEquals('Testing new file',stream_get_contents($this->response->body)); } function testLockNonExistant() { mkdir(SABRE_TEMPDIR . '/locksdir'); $locksBackend = new Locks\Backend\FS(SABRE_TEMPDIR . '/locksdir'); $locksPlugin = new Locks\Plugin($locksBackend); $this->server->addPlugin($locksPlugin); // mimicking an OS/X resource fork $serverVars = array( 'REQUEST_URI' => '/._testlock.txt', 'REQUEST_METHOD' => 'LOCK', ); $request = new HTTP\Request($serverVars); $request->setBody(' http://example.org/~ejw/contact.html '); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); $this->assertEquals('application/xml; charset=utf-8',$this->response->headers['Content-Type']); $this->assertTrue(preg_match('/^$/',$this->response->headers['Lock-Token'])===1,'We did not get a valid Locktoken back (' . $this->response->headers['Lock-Token'] . ')'); $this->assertEquals('true',$this->response->headers['X-Sabre-Temp']); $this->assertFalse(file_exists(SABRE_TEMPDIR . '/._testlock.txt'),'._testlock.txt should not exist in the regular file structure.'); } function testPutDelete() { // mimicking an OS/X resource fork $serverVars = array( 'REQUEST_URI' => '/._testput.txt', 'REQUEST_METHOD' => 'PUT', ); $request = new HTTP\Request($serverVars); $request->setBody('Testing new file'); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('', $this->response->body); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); $this->assertEquals(array( 'X-Sabre-Temp' => 'true', ),$this->response->headers); $serverVars = array( 'REQUEST_URI' => '/._testput.txt', 'REQUEST_METHOD' => 'DELETE', ); $request = new HTTP\Request($serverVars); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 204 No Content',$this->response->status, "Incorrect status code received. Full body:\n". $this->response->body); $this->assertEquals(array( 'X-Sabre-Temp' => 'true', ),$this->response->headers); $this->assertEquals('',$this->response->body); } function testPutPropfind() { // mimicking an OS/X resource fork $serverVars = array( 'REQUEST_URI' => '/._testput.txt', 'REQUEST_METHOD' => 'PUT', ); $request = new HTTP\Request($serverVars); $request->setBody('Testing new file'); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('', $this->response->body); $this->assertEquals('HTTP/1.1 201 Created',$this->response->status); $this->assertEquals(array( 'X-Sabre-Temp' => 'true', ),$this->response->headers); $serverVars = array( 'REQUEST_URI' => '/._testput.txt', 'REQUEST_METHOD' => 'PROPFIND', ); $request = new HTTP\Request($serverVars); $request->setBody(''); $this->server->httpRequest = ($request); $this->server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status',$this->response->status,'Incorrect status code returned. Body: ' . $this->response->body); $this->assertEquals(array( 'X-Sabre-Temp' => 'true', 'Content-Type' => 'application/xml; charset=utf-8', ),$this->response->headers); $body = preg_replace("/xmlns(:[A-Za-z0-9_])?=(\"|\')DAV:(\"|\')/","xmlns\\1=\"urn:DAV\"",$this->response->body); $xml = simplexml_load_string($body); $xml->registerXPathNamespace('d','urn:DAV'); list($data) = $xml->xpath('/d:multistatus/d:response/d:href'); $this->assertEquals('/._testput.txt',(string)$data,'href element should have been /._testput.txt'); $data = $xml->xpath('/d:multistatus/d:response/d:propstat/d:prop/d:resourcetype'); $this->assertEquals(1,count($data)); } } sabre-dav-1.8.12/tests/Sabre/DAV/TestPlugin.php000066400000000000000000000007471246001162500210730ustar00rootroot00000000000000subscribeEvent('beforeMethod',array($this,'beforeMethod')); } function beforeMethod($method) { $this->beforeMethod = $method; return true; } } sabre-dav-1.8.12/tests/Sabre/DAV/Tree/000077500000000000000000000000001246001162500171535ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAV/Tree/FilesystemTest.php000066400000000000000000000043071246001162500226540ustar00rootroot00000000000000getNodeForPath('file.txt'); $this->assertTrue($node instanceof DAV\FS\File); } /** * @expectedException \Sabre\DAV\Exception\NotFound */ function testGetNodeForPath_DoesntExist() { $fs = new Filesystem(SABRE_TEMPDIR); $node = $fs->getNodeForPath('whoop/file.txt'); } function testGetNodeForPath_Directory() { $fs = new Filesystem(SABRE_TEMPDIR); $node = $fs->getNodeForPath('dir'); $this->assertTrue($node instanceof DAV\FS\Directory); $this->assertEquals('dir', $node->getName()); $this->assertInternalType('array', $node->getChildren()); } function testCopy() { $fs = new Filesystem(SABRE_TEMPDIR); $fs->copy('file.txt','file2.txt'); $this->assertTrue(file_exists(SABRE_TEMPDIR . '/file2.txt')); $this->assertEquals('Body',file_get_contents(SABRE_TEMPDIR . '/file2.txt')); } function testCopyDir() { $fs = new Filesystem(SABRE_TEMPDIR); $fs->copy('dir','dir2'); $this->assertTrue(file_exists(SABRE_TEMPDIR . '/dir2')); $this->assertEquals('Body',file_get_contents(SABRE_TEMPDIR . '/dir2/subfile.txt')); } function testMove() { $fs = new Filesystem(SABRE_TEMPDIR); $fs->move('file.txt','file2.txt'); $this->assertTrue(file_exists(SABRE_TEMPDIR . '/file2.txt')); $this->assertTrue(!file_exists(SABRE_TEMPDIR . '/file.txt')); $this->assertEquals('Body',file_get_contents(SABRE_TEMPDIR . '/file2.txt')); } } sabre-dav-1.8.12/tests/Sabre/DAV/TreeTest.php000066400000000000000000000072071246001162500205320ustar00rootroot00000000000000assertTrue($tree->nodeExists('hi')); $this->assertFalse($tree->nodeExists('hello')); } function testCopy() { $tree = new TreeMock(); $tree->copy('hi','hi2'); $this->assertArrayHasKey('hi2', $tree->getNodeForPath('')->newDirectories); $this->assertEquals('foobar', $tree->getNodeForPath('hi/file')->get()); $this->assertEquals(array('test1'=>'value'), $tree->getNodeForPath('hi/file')->getProperties(array())); } function testMove() { $tree = new TreeMock(); $tree->move('hi','hi2'); $this->assertEquals('hi2', $tree->getNodeForPath('hi')->getName()); $this->assertTrue($tree->getNodeForPath('hi')->isRenamed); } function testDeepMove() { $tree = new TreeMock(); $tree->move('hi/sub','hi2'); $this->assertArrayHasKey('hi2', $tree->getNodeForPath('')->newDirectories); $this->assertTrue($tree->getNodeForPath('hi/sub')->isDeleted); } function testDelete() { $tree = new TreeMock(); $tree->delete('hi'); $this->assertTrue($tree->getNodeForPath('hi')->isDeleted); } function testGetChildren() { $tree = new TreeMock(); $children = $tree->getChildren(''); $this->assertEquals(1,count($children)); $this->assertEquals('hi', $children[0]->getName()); } } class TreeMock extends Tree { private $nodes = array(); function __construct() { $this->nodes['hi/sub'] = new TreeDirectoryTester('sub'); $this->nodes['hi/file'] = new TreeFileTester('file'); $this->nodes['hi/file']->properties = array('test1' => 'value'); $this->nodes['hi/file']->data = 'foobar'; $this->nodes['hi'] = new TreeDirectoryTester('hi',array($this->nodes['hi/sub'], $this->nodes['hi/file'])); $this->nodes[''] = new TreeDirectoryTester('hi', array($this->nodes['hi'])); } function getNodeForPath($path) { if (isset($this->nodes[$path])) return $this->nodes[$path]; throw new Exception\NotFound('item not found'); } } class TreeDirectoryTester extends SimpleCollection { public $newDirectories = array(); public $newFiles = array(); public $isDeleted = false; public $isRenamed = false; function createDirectory($name) { $this->newDirectories[$name] = true; } function createFile($name,$data = null) { $this->newFiles[$name] = $data; } function getChild($name) { if (isset($this->newDirectories[$name])) return new TreeDirectoryTester($name); if (isset($this->newFiles[$name])) return new TreeFileTester($name, $this->newFiles[$name]); return parent::getChild($name); } function delete() { $this->isDeleted = true; } function setName($name) { $this->isRenamed = true; $this->name = $name; } } class TreeFileTester extends File implements IProperties { public $name; public $data; public $properties; function __construct($name, $data = null) { $this->name = $name; if (is_null($data)) $data = 'bla'; $this->data = $data; } function getName() { return $this->name; } function get() { return $this->data; } function getProperties($properties) { return $this->properties; } function updateProperties($properties) { $this->properties = $properties; return true; } } sabre-dav-1.8.12/tests/Sabre/DAV/URLUtilTest.php000066400000000000000000000072741246001162500211370ustar00rootroot00000000000000assertEquals( '%00%01%02%03%04%05%06%07%08%09%0a%0b%0c%0d%0e%0f'. '%10%11%12%13%14%15%16%17%18%19%1a%1b%1c%1d%1e%1f'. '%20%21%22%23%24%25%26%27()%2a%2b%2c-./'. '0123456789:%3b%3c%3d%3e%3f'. '%40ABCDEFGHIJKLMNO' . 'PQRSTUVWXYZ%5b%5c%5d%5e_' . '%60abcdefghijklmno' . 'pqrstuvwxyz%7b%7c%7d~%7f', $newStr); $this->assertEquals($str,URLUtil::decodePath($newStr)); } function testEncodePathSegment() { $str = ''; for($i=0;$i<128;$i++) $str.=chr($i); $newStr = URLUtil::encodePathSegment($str); // Note: almost exactly the same as the last test, with the // exception of the encoding of / (ascii code 2f) $this->assertEquals( '%00%01%02%03%04%05%06%07%08%09%0a%0b%0c%0d%0e%0f'. '%10%11%12%13%14%15%16%17%18%19%1a%1b%1c%1d%1e%1f'. '%20%21%22%23%24%25%26%27()%2a%2b%2c-.%2f'. '0123456789:%3b%3c%3d%3e%3f'. '%40ABCDEFGHIJKLMNO' . 'PQRSTUVWXYZ%5b%5c%5d%5e_' . '%60abcdefghijklmno' . 'pqrstuvwxyz%7b%7c%7d~%7f', $newStr); $this->assertEquals($str,URLUtil::decodePathSegment($newStr)); } function testDecode() { $str = 'Hello%20Test+Test2.txt'; $newStr = URLUtil::decodePath($str); $this->assertEquals('Hello Test+Test2.txt',$newStr); } /** * @depends testDecode */ function testDecodeUmlaut() { $str = 'Hello%C3%BC.txt'; $newStr = URLUtil::decodePath($str); $this->assertEquals("Hello\xC3\xBC.txt",$newStr); } /** * @depends testDecodeUmlaut */ function testDecodeUmlautLatin1() { $str = 'Hello%FC.txt'; $newStr = URLUtil::decodePath($str); $this->assertEquals("Hello\xC3\xBC.txt",$newStr); } /** * This testcase was sent by a bug reporter * * @depends testDecode */ function testDecodeAccentsWindows7() { $str = '/webdav/%C3%A0fo%C3%B3'; $newStr = URLUtil::decodePath($str); $this->assertEquals(strtolower($str),URLUtil::encodePath($newStr)); } function testSplitPath() { $strings = array( // input // expected result '/foo/bar' => array('/foo','bar'), '/foo/bar/' => array('/foo','bar'), 'foo/bar/' => array('foo','bar'), 'foo/bar' => array('foo','bar'), 'foo/bar/baz' => array('foo/bar','baz'), 'foo/bar/baz/' => array('foo/bar','baz'), 'foo' => array('','foo'), 'foo/' => array('','foo'), '/foo/' => array('','foo'), '/foo' => array('','foo'), '' => array(null,null), // UTF-8 "/\xC3\xA0fo\xC3\xB3/bar" => array("/\xC3\xA0fo\xC3\xB3",'bar'), "/\xC3\xA0foo/b\xC3\xBCr/" => array("/\xC3\xA0foo","b\xC3\xBCr"), "foo/\xC3\xA0\xC3\xBCr" => array("foo","\xC3\xA0\xC3\xBCr"), ); foreach($strings as $input => $expected) { $output = URLUtil::splitPath($input); $this->assertEquals($expected, $output, 'The expected output for \'' . $input . '\' was incorrect'); } } } sabre-dav-1.8.12/tests/Sabre/DAV/UUIDUtilTest.php000066400000000000000000000011141246001162500212260ustar00rootroot00000000000000assertTrue( UUIDUtil::validateUUID('11111111-2222-3333-4444-555555555555') ); $this->assertFalse( UUIDUtil::validateUUID(' 11111111-2222-3333-4444-555555555555') ); $this->assertTrue( UUIDUtil::validateUUID('ffffffff-2222-3333-4444-555555555555') ); $this->assertFalse( UUIDUtil::validateUUID('fffffffg-2222-3333-4444-555555555555') ); } } sabre-dav-1.8.12/tests/Sabre/DAV/XMLUtilTest.php000066400000000000000000000157401246001162500211320ustar00rootroot00000000000000loadXML('Testdoc'); $this->assertEquals( '{http://www.example.org/}test1', XMLUtil::toClarkNotation($dom->firstChild) ); } function testToClarkNotation2() { $dom = new \DOMDocument(); $dom->loadXML('Testdoc'); $this->assertEquals( '{http://www.example.org/}test1', XMLUtil::toClarkNotation($dom->firstChild) ); } function testToClarkNotationDAVNamespace() { $dom = new \DOMDocument(); $dom->loadXML('Testdoc'); $this->assertEquals( '{DAV:}test1', XMLUtil::toClarkNotation($dom->firstChild) ); } function testToClarkNotationNoElem() { $dom = new \DOMDocument(); $dom->loadXML('Testdoc'); $this->assertNull( XMLUtil::toClarkNotation($dom->firstChild->firstChild) ); } function testConvertDAVNamespace() { $xml='blablabla'; $this->assertEquals( 'blablabla', XMLUtil::convertDAVNamespace($xml) ); } function testConvertDAVNamespace2() { $xml='blablabla'; $this->assertEquals( 'blablabla', XMLUtil::convertDAVNamespace($xml) ); } function testConvertDAVNamespace3() { $xml='blablabla'; $this->assertEquals( 'blablabla', XMLUtil::convertDAVNamespace($xml) ); } function testConvertDAVNamespace4() { $xml='blablabla'; $this->assertEquals( 'blablabla', XMLUtil::convertDAVNamespace($xml) ); } function testConvertDAVNamespaceMixedQuotes() { $xml=''; $dom = XMLUtil::loadDOMDocument($xml); $this->assertTrue($dom instanceof \DOMDocument); } /** * @depends testLoadDOMDocument * @expectedException Sabre\DAV\Exception\BadRequest */ function testLoadDOMDocumentEmpty() { XMLUtil::loadDOMDocument(''); } /** * @expectedException Sabre\DAV\Exception\BadRequest * @depends testConvertDAVNamespace */ function testLoadDOMDocumentInvalid() { $xml='assertEquals('blabla',$dom->firstChild->nodeValue); } function testParseProperties() { $xml=' Calendars '; $dom = XMLUtil::loadDOMDocument($xml); $properties = XMLUtil::parseProperties($dom->firstChild); $this->assertEquals(array( '{DAV:}displayname' => 'Calendars', ), $properties); } /** * @depends testParseProperties */ function testParsePropertiesEmpty() { $xml=' Calendars '; $dom = XMLUtil::loadDOMDocument($xml); $properties = XMLUtil::parseProperties($dom->firstChild); $this->assertEquals(array( '{DAV:}displayname' => 'Calendars', '{http://www.rooftopsolutions.nl/example}example' => null ), $properties); } /** * @depends testParseProperties */ function testParsePropertiesComplex() { $xml=' Calendars Complex value right here '; $dom = XMLUtil::loadDOMDocument($xml); $properties = XMLUtil::parseProperties($dom->firstChild); $this->assertEquals(array( '{DAV:}displayname' => 'Calendars', '{DAV:}someprop' => 'Complex value right here', ), $properties); } /** * @depends testParseProperties */ function testParsePropertiesNoProperties() { $xml=' '; $dom = XMLUtil::loadDOMDocument($xml); $properties = XMLUtil::parseProperties($dom->firstChild); $this->assertEquals(array(), $properties); } function testParsePropertiesMapHref() { $xml=' Calendars http://sabredav.org/ '; $dom = XMLUtil::loadDOMDocument($xml); $properties = XMLUtil::parseProperties($dom->firstChild,array('{DAV:}someprop'=>'Sabre\\DAV\\Property\\Href')); $this->assertEquals(array( '{DAV:}displayname' => 'Calendars', '{DAV:}someprop' => new Property\Href('http://sabredav.org/',false), ), $properties); } function testParseClarkNotation() { $this->assertEquals(array( 'DAV:', 'foo', ), XMLUtil::parseClarkNotation('{DAV:}foo')); $this->assertEquals(array( 'http://example.org/ns/bla', 'bar-soap', ), XMLUtil::parseClarkNotation('{http://example.org/ns/bla}bar-soap')); } /** * @expectedException InvalidArgumentException */ function testParseClarkNotationFail() { XMLUtil::parseClarkNotation('}foo'); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/000077500000000000000000000000001246001162500165745ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAVACL/ACLMethodTest.php000066400000000000000000000211771246001162500217150ustar00rootroot00000000000000addPlugin($acl); $acl->unknownMethod('ACL','test'); } function testCallbackPassthru() { $acl = new Plugin(); $server = new DAV\Server(); $server->addPlugin($acl); $this->assertNull($acl->unknownMethod('FOO','test')); } /** /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ function testNotSupportedByNode() { $tree = array( new DAV\SimpleCollection('test'), ); $acl = new Plugin(); $server = new DAV\Server($tree); $server->httpRequest = new HTTP\Request(); $body = ' '; $server->httpRequest->setBody($body); $server->addPlugin($acl); $acl->httpACL('test'); } function testSuccessSimple() { $tree = array( new MockACLNode('test',array()), ); $acl = new Plugin(); $server = new DAV\Server($tree); $server->httpRequest = new HTTP\Request(); $body = ' '; $server->httpRequest->setBody($body); $server->addPlugin($acl); $this->assertNull($acl->httpACL('test')); } /** * @expectedException Sabre\DAVACL\Exception\NotRecognizedPrincipal */ function testUnrecognizedPrincipal() { $tree = array( new MockACLNode('test',array()), ); $acl = new Plugin(); $server = new DAV\Server($tree); $server->httpRequest = new HTTP\Request(); $body = ' /principals/notfound '; $server->httpRequest->setBody($body); $server->addPlugin($acl); $acl->httpACL('test'); } /** * @expectedException Sabre\DAVACL\Exception\NotRecognizedPrincipal */ function testUnrecognizedPrincipal2() { $tree = array( new MockACLNode('test',array()), new DAV\SimpleCollection('principals',array( new DAV\SimpleCollection('notaprincipal'), )), ); $acl = new Plugin(); $server = new DAV\Server($tree); $server->httpRequest = new HTTP\Request(); $body = ' /principals/notaprincipal '; $server->httpRequest->setBody($body); $server->addPlugin($acl); $acl->httpACL('test'); } /** * @expectedException Sabre\DAVACL\Exception\NotSupportedPrivilege */ function testUnknownPrivilege() { $tree = array( new MockACLNode('test',array()), ); $acl = new Plugin(); $server = new DAV\Server($tree); $server->httpRequest = new HTTP\Request(); $body = ' /principals/notfound '; $server->httpRequest->setBody($body); $server->addPlugin($acl); $acl->httpACL('test'); } /** * @expectedException Sabre\DAVACL\Exception\NoAbstract */ function testAbstractPrivilege() { $tree = array( new MockACLNode('test',array()), ); $acl = new Plugin(); $server = new DAV\Server($tree); $server->httpRequest = new HTTP\Request(); $body = ' /principals/notfound '; $server->httpRequest->setBody($body); $server->addPlugin($acl); $acl->httpACL('test'); } /** * @expectedException Sabre\DAVACL\Exception\AceConflict */ function testUpdateProtectedPrivilege() { $oldACL = array( array( 'principal' => 'principals/notfound', 'privilege' => '{DAV:}write', 'protected' => true, ), ); $tree = array( new MockACLNode('test',$oldACL), ); $acl = new Plugin(); $server = new DAV\Server($tree); $server->httpRequest = new HTTP\Request(); $body = ' /principals/notfound '; $server->httpRequest->setBody($body); $server->addPlugin($acl); $acl->httpACL('test'); } /** * @expectedException Sabre\DAVACL\Exception\AceConflict */ function testUpdateProtectedPrivilege2() { $oldACL = array( array( 'principal' => 'principals/notfound', 'privilege' => '{DAV:}write', 'protected' => true, ), ); $tree = array( new MockACLNode('test',$oldACL), ); $acl = new Plugin(); $server = new DAV\Server($tree); $server->httpRequest = new HTTP\Request(); $body = ' /principals/foo '; $server->httpRequest->setBody($body); $server->addPlugin($acl); $acl->httpACL('test'); } /** * @expectedException Sabre\DAVACL\Exception\AceConflict */ function testUpdateProtectedPrivilege3() { $oldACL = array( array( 'principal' => 'principals/notfound', 'privilege' => '{DAV:}write', 'protected' => true, ), ); $tree = array( new MockACLNode('test',$oldACL), ); $acl = new Plugin(); $server = new DAV\Server($tree); $server->httpRequest = new HTTP\Request(); $body = ' /principals/notfound '; $server->httpRequest->setBody($body); $server->addPlugin($acl); $acl->httpACL('test'); } function testSuccessComplex () { $oldACL = array( array( 'principal' => 'principals/foo', 'privilege' => '{DAV:}write', 'protected' => true, ), array( 'principal' => 'principals/bar', 'privilege' => '{DAV:}read', ), ); $tree = array( $node = new MockACLNode('test',$oldACL), new DAV\SimpleCollection('principals', array( new MockPrincipal('foo','principals/foo'), new MockPrincipal('baz','principals/baz'), )), ); $acl = new Plugin(); $server = new DAV\Server($tree); $server->httpRequest = new HTTP\Request(); $body = ' /principals/foo /principals/baz '; $server->httpRequest->setBody($body); $server->addPlugin($acl); $this->assertFalse($acl->unknownMethod('ACL','test')); $this->assertEquals(array( array( 'principal' => 'principals/foo', 'privilege' => '{DAV:}write', 'protected' => true, ), array( 'principal' => 'principals/baz', 'privilege' => '{DAV:}write', 'protected' => false, ), ), $node->getACL()); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/AllowAccessTest.php000066400000000000000000000060251246001162500223500ustar00rootroot00000000000000server = new DAV\Server($nodes); $aclPlugin = new Plugin(); $aclPlugin->allowAccessToNodesWithoutACL = true; $this->server->addPlugin($aclPlugin); } function testGet() { $this->assertTrue($this->server->broadcastEvent('beforeMethod',array('GET','testdir'))); } function testGetDoesntExist() { $r = $this->server->broadcastEvent('beforeMethod',array('GET','foo')); $this->assertTrue($r); } function testHEAD() { $this->assertTrue($this->server->broadcastEvent('beforeMethod',array('HEAD','testdir'))); } function testOPTIONS() { $this->assertTrue($this->server->broadcastEvent('beforeMethod',array('OPTIONS','testdir'))); } function testPUT() { $this->assertTrue($this->server->broadcastEvent('beforeMethod',array('PUT','testdir'))); } function testACL() { $this->assertTrue($this->server->broadcastEvent('beforeMethod',array('ACL','testdir'))); } function testPROPPATCH() { $this->assertTrue($this->server->broadcastEvent('beforeMethod',array('PROPPATCH','testdir'))); } function testCOPY() { $this->assertTrue($this->server->broadcastEvent('beforeMethod',array('COPY','testdir'))); } function testMOVE() { $this->assertTrue($this->server->broadcastEvent('beforeMethod',array('MOVE','testdir'))); } function testLOCK() { $this->assertTrue($this->server->broadcastEvent('beforeMethod',array('LOCK','testdir'))); } function testBeforeBind() { $this->assertTrue($this->server->broadcastEvent('beforeBind',array('testdir/file'))); } function testBeforeUnbind() { $this->assertTrue($this->server->broadcastEvent('beforeUnbind',array('testdir'))); } function testAfterGetProperties() { $properties = array( 'href' => 'foo', '200' => array( '{DAV:}displayname' => 'foo', '{DAV:}getcontentlength' => 500, ), '404' => array( '{DAV:}bar' => null, ), '403' => array( '{DAV:}owner' => null, ), ); $expected = array( 'href' => 'foo', '200' => array( '{DAV:}displayname' => 'foo', '{DAV:}getcontentlength' => 500, ), '404' => array( '{DAV:}bar' => null, ), '403' => array( '{DAV:}owner' => null, ), ); $r = $this->server->broadcastEvent('afterGetProperties',array('testdir',&$properties)); $this->assertTrue($r); $this->assertEquals($expected, $properties); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/BlockAccessTest.php000066400000000000000000000104161246001162500223230ustar00rootroot00000000000000server = new DAV\Server($nodes); $this->plugin = new Plugin(); $this->plugin->allowAccessToNodesWithoutACL = false; $this->server->addPlugin($this->plugin); } /** * @expectedException Sabre\DAVACL\Exception\NeedPrivileges */ function testGet() { $this->server->broadcastEvent('beforeMethod',array('GET','testdir')); } function testGetDoesntExist() { $r = $this->server->broadcastEvent('beforeMethod',array('GET','foo')); $this->assertTrue($r); } /** * @expectedException Sabre\DAVACL\Exception\NeedPrivileges */ function testHEAD() { $this->server->broadcastEvent('beforeMethod',array('HEAD','testdir')); } /** * @expectedException Sabre\DAVACL\Exception\NeedPrivileges */ function testOPTIONS() { $this->server->broadcastEvent('beforeMethod',array('OPTIONS','testdir')); } /** * @expectedException Sabre\DAVACL\Exception\NeedPrivileges */ function testPUT() { $this->server->broadcastEvent('beforeMethod',array('PUT','testdir')); } /** * @expectedException Sabre\DAVACL\Exception\NeedPrivileges */ function testPROPPATCH() { $this->server->broadcastEvent('beforeMethod',array('PROPPATCH','testdir')); } /** * @expectedException Sabre\DAVACL\Exception\NeedPrivileges */ function testCOPY() { $this->server->broadcastEvent('beforeMethod',array('COPY','testdir')); } /** * @expectedException Sabre\DAVACL\Exception\NeedPrivileges */ function testMOVE() { $this->server->broadcastEvent('beforeMethod',array('MOVE','testdir')); } /** * @expectedException Sabre\DAVACL\Exception\NeedPrivileges */ function testACL() { $this->server->broadcastEvent('beforeMethod',array('ACL','testdir')); } /** * @expectedException Sabre\DAVACL\Exception\NeedPrivileges */ function testLOCK() { $this->server->broadcastEvent('beforeMethod',array('LOCK','testdir')); } /** * @expectedException Sabre\DAVACL\Exception\NeedPrivileges */ function testBeforeBind() { $this->server->broadcastEvent('beforeBind',array('testdir/file')); } /** * @expectedException Sabre\DAVACL\Exception\NeedPrivileges */ function testBeforeUnbind() { $this->server->broadcastEvent('beforeUnbind',array('testdir')); } function testBeforeGetProperties() { $requestedProperties = array( '{DAV:}displayname', '{DAV:}getcontentlength', '{DAV:}bar', '{DAV:}owner', ); $returnedProperties = array(); $arguments = array( 'testdir', new DAV\SimpleCollection('testdir'), &$requestedProperties, &$returnedProperties ); $r = $this->server->broadcastEvent('beforeGetProperties',$arguments); $this->assertTrue($r); $expected = array( '403' => array( '{DAV:}displayname' => null, '{DAV:}getcontentlength' => null, '{DAV:}bar' => null, '{DAV:}owner' => null, ), ); $this->assertEquals($expected, $returnedProperties); $this->assertEquals(array(), $requestedProperties); } function testBeforeGetPropertiesNoListing() { $this->plugin->hideNodesFromListings = true; $requestedProperties = array( '{DAV:}displayname', '{DAV:}getcontentlength', '{DAV:}bar', '{DAV:}owner', ); $returnedProperties = array(); $arguments = array( 'testdir', new DAV\SimpleCollection('testdir'), &$requestedProperties, &$returnedProperties ); $r = $this->server->broadcastEvent('beforeGetProperties',$arguments); $this->assertFalse($r); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/Exception/000077500000000000000000000000001246001162500205325ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAVACL/Exception/AceConflictTest.php000066400000000000000000000017651246001162500242660ustar00rootroot00000000000000createElementNS('DAV:','d:root'); $dom->appendChild($root); $ex->serialize($server, $root); $xpaths = array( '/d:root' => 1, '/d:root/d:no-ace-conflict' => 1, ); // Reloading because PHP DOM sucks $dom2 = new \DOMDocument('1.0', 'utf-8'); $dom2->loadXML($dom->saveXML()); $dxpath = new \DOMXPath($dom2); $dxpath->registerNamespace('d','DAV:'); foreach($xpaths as $xpath=>$count) { $this->assertEquals($count, $dxpath->query($xpath)->length, 'Looking for : ' . $xpath . ', we could only find ' . $dxpath->query($xpath)->length . ' elements, while we expected ' . $count); } } } sabre-dav-1.8.12/tests/Sabre/DAVACL/Exception/NeedPrivilegesExceptionTest.php000066400000000000000000000027151246001162500266740ustar00rootroot00000000000000createElementNS('DAV:','d:root'); $dom->appendChild($root); $ex->serialize($server, $root); $xpaths = array( '/d:root' => 1, '/d:root/d:need-privileges' => 1, '/d:root/d:need-privileges/d:resource' => 2, '/d:root/d:need-privileges/d:resource/d:href' => 2, '/d:root/d:need-privileges/d:resource/d:privilege' => 2, '/d:root/d:need-privileges/d:resource/d:privilege/d:read' => 1, '/d:root/d:need-privileges/d:resource/d:privilege/d:write' => 1, ); // Reloading because PHP DOM sucks $dom2 = new \DOMDocument('1.0', 'utf-8'); $dom2->loadXML($dom->saveXML()); $dxpath = new \DOMXPath($dom2); $dxpath->registerNamespace('d','DAV:'); foreach($xpaths as $xpath=>$count) { $this->assertEquals($count, $dxpath->query($xpath)->length, 'Looking for : ' . $xpath . ', we could only find ' . $dxpath->query($xpath)->length . ' elements, while we expected ' . $count); } } } sabre-dav-1.8.12/tests/Sabre/DAVACL/Exception/NoAbstractTest.php000066400000000000000000000017571246001162500241550ustar00rootroot00000000000000createElementNS('DAV:','d:root'); $dom->appendChild($root); $ex->serialize($server, $root); $xpaths = array( '/d:root' => 1, '/d:root/d:no-abstract' => 1, ); // Reloading because PHP DOM sucks $dom2 = new \DOMDocument('1.0', 'utf-8'); $dom2->loadXML($dom->saveXML()); $dxpath = new \DOMXPath($dom2); $dxpath->registerNamespace('d','DAV:'); foreach($xpaths as $xpath=>$count) { $this->assertEquals($count, $dxpath->query($xpath)->length, 'Looking for : ' . $xpath . ', we could only find ' . $dxpath->query($xpath)->length . ' elements, while we expected ' . $count); } } } sabre-dav-1.8.12/tests/Sabre/DAVACL/Exception/NotRecognizedPrincipalTest.php000066400000000000000000000020201246001162500265110ustar00rootroot00000000000000createElementNS('DAV:','d:root'); $dom->appendChild($root); $ex->serialize($server, $root); $xpaths = array( '/d:root' => 1, '/d:root/d:recognized-principal' => 1, ); // Reloading because PHP DOM sucks $dom2 = new \DOMDocument('1.0', 'utf-8'); $dom2->loadXML($dom->saveXML()); $dxpath = new \DOMXPath($dom2); $dxpath->registerNamespace('d','DAV:'); foreach($xpaths as $xpath=>$count) { $this->assertEquals($count, $dxpath->query($xpath)->length, 'Looking for : ' . $xpath . ', we could only find ' . $dxpath->query($xpath)->length . ' elements, while we expected ' . $count); } } } sabre-dav-1.8.12/tests/Sabre/DAVACL/Exception/NotSupportedPrivilegeTest.php000066400000000000000000000020211246001162500264130ustar00rootroot00000000000000createElementNS('DAV:','d:root'); $dom->appendChild($root); $ex->serialize($server, $root); $xpaths = array( '/d:root' => 1, '/d:root/d:not-supported-privilege' => 1, ); // Reloading because PHP DOM sucks $dom2 = new \DOMDocument('1.0', 'utf-8'); $dom2->loadXML($dom->saveXML()); $dxpath = new \DOMXPath($dom2); $dxpath->registerNamespace('d','DAV:'); foreach($xpaths as $xpath=>$count) { $this->assertEquals($count, $dxpath->query($xpath)->length, 'Looking for : ' . $xpath . ', we could only find ' . $dxpath->query($xpath)->length . ' elements, while we expected ' . $count); } } } sabre-dav-1.8.12/tests/Sabre/DAVACL/ExpandPropertiesTest.php000066400000000000000000000302601246001162500234420ustar00rootroot00000000000000 'foo', '{http://sabredav.org/ns}href' => new DAV\Property\Href('node2'), '{DAV:}displayname' => 'Node 1', )), new MockPropertyNode('node2', array( '{http://sabredav.org/ns}simple' => 'simple', '{http://sabredav.org/ns}hreflist' => new DAV\Property\HrefList(array('node1','node3')), '{DAV:}displayname' => 'Node 2', )), new MockPropertyNode('node3', array( '{http://sabredav.org/ns}simple' => 'simple', '{DAV:}displayname' => 'Node 3', )), ); $fakeServer = new DAV\Server($tree); $fakeServer->debugExceptions = true; $fakeServer->httpResponse = new HTTP\ResponseMock(); $plugin = new Plugin(); $plugin->allowAccessToNodesWithoutACL = true; $this->assertTrue($plugin instanceof Plugin); $fakeServer->addPlugin($plugin); $this->assertEquals($plugin, $fakeServer->getPlugin('acl')); return $fakeServer; } function testSimple() { $xml = ' '; $serverVars = array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_DEPTH' => '0', 'REQUEST_URI' => '/node1', ); $request = new HTTP\Request($serverVars); $request->setBody($xml); $server = $this->getServer(); $server->httpRequest = $request; $server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status', $server->httpResponse->status,'Incorrect status code received. Full body: ' . $server->httpResponse->body); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ), $server->httpResponse->headers); $check = array( '/d:multistatus', '/d:multistatus/d:response' => 1, '/d:multistatus/d:response/d:href' => 1, '/d:multistatus/d:response/d:propstat' => 2, '/d:multistatus/d:response/d:propstat/d:prop' => 2, '/d:multistatus/d:response/d:propstat/d:prop/d:displayname' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:simple' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:href' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:href/d:href' => 1, ); $xml = simplexml_load_string($server->httpResponse->body); $xml->registerXPathNamespace('d','DAV:'); $xml->registerXPathNamespace('s','http://sabredav.org/ns'); foreach($check as $v1=>$v2) { $xpath = is_int($v1)?$v2:$v1; $result = $xml->xpath($xpath); $count = 1; if (!is_int($v1)) $count = $v2; $this->assertEquals($count,count($result), 'we expected ' . $count . ' appearances of ' . $xpath . ' . We found ' . count($result) . '. Full response: ' . $server->httpResponse->body); } } /** * @depends testSimple */ function testExpand() { $xml = ' '; $serverVars = array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_DEPTH' => '0', 'REQUEST_URI' => '/node1', ); $request = new HTTP\Request($serverVars); $request->setBody($xml); $server = $this->getServer(); $server->httpRequest = $request; $server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status', $server->httpResponse->status, 'Incorrect response status received. Full response body: ' . $server->httpResponse->body); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ), $server->httpResponse->headers); $check = array( '/d:multistatus', '/d:multistatus/d:response' => 1, '/d:multistatus/d:response/d:href' => 1, '/d:multistatus/d:response/d:propstat' => 1, '/d:multistatus/d:response/d:propstat/d:prop' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:href' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:href/d:response' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:href/d:response/d:href' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:href/d:response/d:propstat' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:href/d:response/d:propstat/d:prop' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:href/d:response/d:propstat/d:prop/d:displayname' => 1, ); $xml = simplexml_load_string($server->httpResponse->body); $xml->registerXPathNamespace('d','DAV:'); $xml->registerXPathNamespace('s','http://sabredav.org/ns'); foreach($check as $v1=>$v2) { $xpath = is_int($v1)?$v2:$v1; $result = $xml->xpath($xpath); $count = 1; if (!is_int($v1)) $count = $v2; $this->assertEquals($count,count($result), 'we expected ' . $count . ' appearances of ' . $xpath . ' . We found ' . count($result)); } } /** * @depends testSimple */ function testExpandHrefList() { $xml = ' '; $serverVars = array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_DEPTH' => '0', 'REQUEST_URI' => '/node2', ); $request = new HTTP\Request($serverVars); $request->setBody($xml); $server = $this->getServer(); $server->httpRequest = $request; $server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status', $server->httpResponse->status); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ), $server->httpResponse->headers); $check = array( '/d:multistatus', '/d:multistatus/d:response' => 1, '/d:multistatus/d:response/d:href' => 1, '/d:multistatus/d:response/d:propstat' => 1, '/d:multistatus/d:response/d:propstat/d:prop' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response' => 2, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response/d:href' => 2, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response/d:propstat' => 2, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response/d:propstat/d:prop' => 2, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response/d:propstat/d:prop/d:displayname' => 2, ); $xml = simplexml_load_string($server->httpResponse->body); $xml->registerXPathNamespace('d','DAV:'); $xml->registerXPathNamespace('s','http://sabredav.org/ns'); foreach($check as $v1=>$v2) { $xpath = is_int($v1)?$v2:$v1; $result = $xml->xpath($xpath); $count = 1; if (!is_int($v1)) $count = $v2; $this->assertEquals($count,count($result), 'we expected ' . $count . ' appearances of ' . $xpath . ' . We found ' . count($result)); } } /** * @depends testExpand */ function testExpandDeep() { $xml = ' '; $serverVars = array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_DEPTH' => '0', 'REQUEST_URI' => '/node2', ); $request = new HTTP\Request($serverVars); $request->setBody($xml); $server = $this->getServer(); $server->httpRequest = $request; $server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status', $server->httpResponse->status); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ), $server->httpResponse->headers); $check = array( '/d:multistatus', '/d:multistatus/d:response' => 1, '/d:multistatus/d:response/d:href' => 1, '/d:multistatus/d:response/d:propstat' => 1, '/d:multistatus/d:response/d:propstat/d:prop' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response' => 2, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response/d:href' => 2, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response/d:propstat' => 3, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response/d:propstat/d:prop' => 3, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response/d:propstat/d:prop/d:displayname' => 2, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response/d:propstat/d:prop/s:href' => 2, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response/d:propstat/d:prop/s:href/d:response' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response/d:propstat/d:prop/s:href/d:response/d:href' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response/d:propstat/d:prop/s:href/d:response/d:propstat' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response/d:propstat/d:prop/s:href/d:response/d:propstat/d:prop' => 1, '/d:multistatus/d:response/d:propstat/d:prop/s:hreflist/d:response/d:propstat/d:prop/s:href/d:response/d:propstat/d:prop/d:displayname' => 1, ); $xml = simplexml_load_string($server->httpResponse->body); $xml->registerXPathNamespace('d','DAV:'); $xml->registerXPathNamespace('s','http://sabredav.org/ns'); foreach($check as $v1=>$v2) { $xpath = is_int($v1)?$v2:$v1; $result = $xml->xpath($xpath); $count = 1; if (!is_int($v1)) $count = $v2; $this->assertEquals($count,count($result), 'we expected ' . $count . ' appearances of ' . $xpath . ' . We found ' . count($result)); } } } class MockPropertyNode implements DAV\INode, DAV\IProperties { function __construct($name, array $properties) { $this->name = $name; $this->properties = $properties; } function getName() { return $this->name; } function getProperties($requestedProperties) { $returnedProperties = array(); foreach($requestedProperties as $requestedProperty) { if (isset($this->properties[$requestedProperty])) { $returnedProperties[$requestedProperty] = $this->properties[$requestedProperty]; } } return $returnedProperties; } function delete() { throw new DAV\Exception('Not implemented'); } function setName($name) { throw new DAV\Exception('Not implemented'); } function getLastModified() { return null; } function updateProperties($properties) { throw new DAV\Exception('Not implemented'); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/MockACLNode.php000066400000000000000000000012151246001162500213230ustar00rootroot00000000000000name = $name; $this->acl = $acl; } function getName() { return $this->name; } function getOwner() { return null; } function getGroup() { return null; } function getACL() { return $this->acl; } function setACL(array $acl) { $this->acl = $acl; } function getSupportedPrivilegeSet() { return null; } } sabre-dav-1.8.12/tests/Sabre/DAVACL/MockPrincipal.php000066400000000000000000000021261246001162500220410ustar00rootroot00000000000000name = $name; $this->principalUrl = $principalUrl; $this->groupMembership = $groupMembership; $this->groupMemberSet = $groupMemberSet; } function getName() { return $this->name; } function getDisplayName() { return $this->getName(); } function getAlternateUriSet() { return array(); } function getPrincipalUrl() { return $this->principalUrl; } function getGroupMemberSet() { return $this->groupMemberSet; } function getGroupMemberShip() { return $this->groupMembership; } function setGroupMemberSet(array $groupMemberSet) { $this->groupMemberSet = $groupMemberSet; } } sabre-dav-1.8.12/tests/Sabre/DAVACL/PluginAdminTest.php000066400000000000000000000041271246001162500223600ustar00rootroot00000000000000addPlugin($plugin); $plugin = new Plugin(); $fakeServer->addPlugin($plugin); $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'OPTIONS', 'HTTP_DEPTH' => 1, 'REQUEST_URI' => '/adminonly', )); $response = new HTTP\ResponseMock(); $fakeServer->httpRequest = $request; $fakeServer->httpResponse = $response; $fakeServer->exec(); $this->assertEquals('HTTP/1.1 403 Forbidden', $response->status); } /** * @depends testNoAdminAccess */ function testAdminAccess() { $principalBackend = new PrincipalBackend\Mock(); $tree = array( new MockACLNode('adminonly', array()), new PrincipalCollection($principalBackend), ); $fakeServer = new DAV\Server($tree); $plugin = new DAV\Auth\Plugin(new DAV\Auth\Backend\Mock(),'realm'); $fakeServer->addPlugin($plugin); $plugin = new Plugin(); $plugin->adminPrincipals = array( 'principals/admin', ); $fakeServer->addPlugin($plugin); $request = new HTTP\Request(array( 'REQUEST_METHOD' => 'OPTIONS', 'HTTP_DEPTH' => 1, 'REQUEST_URI' => '/adminonly', )); $response = new HTTP\ResponseMock(); $fakeServer->httpRequest = $request; $fakeServer->httpResponse = $response; $fakeServer->exec(); $this->assertEquals('HTTP/1.1 200 OK', $response->status); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/PluginPropertiesTest.php000066400000000000000000000353061246001162500234670ustar00rootroot00000000000000principalCollectionSet = array( 'principals1', 'principals2', ); $requestedProperties = array( '{DAV:}principal-collection-set', ); $returnedProperties = array( 200 => array(), 404 => array(), ); $server = new DAV\Server(); $server->addPlugin($plugin); $this->assertNull($plugin->beforeGetProperties('', new DAV\SimpleCollection('root'), $requestedProperties, $returnedProperties)); $this->assertEquals(1,count($returnedProperties[200])); $this->assertArrayHasKey('{DAV:}principal-collection-set',$returnedProperties[200]); $this->assertInstanceOf('Sabre\\DAV\\Property\\HrefList', $returnedProperties[200]['{DAV:}principal-collection-set']); $expected = array( 'principals1/', 'principals2/', ); $this->assertEquals($expected, $returnedProperties[200]['{DAV:}principal-collection-set']->getHrefs()); } function testCurrentUserPrincipal() { $fakeServer = new DAV\Server(); $plugin = new DAV\Auth\Plugin(new DAV\Auth\Backend\Mock(),'realm'); $fakeServer->addPlugin($plugin); $plugin = new Plugin(); $fakeServer->addPlugin($plugin); $requestedProperties = array( '{DAV:}current-user-principal', ); $returnedProperties = array( 200 => array(), 404 => array(), ); $this->assertNull($plugin->beforeGetProperties('', new DAV\SimpleCollection('root'), $requestedProperties, $returnedProperties)); $this->assertEquals(1,count($returnedProperties[200])); $this->assertArrayHasKey('{DAV:}current-user-principal',$returnedProperties[200]); $this->assertInstanceOf('Sabre\DAVACL\Property\Principal', $returnedProperties[200]['{DAV:}current-user-principal']); $this->assertEquals(Property\Principal::UNAUTHENTICATED, $returnedProperties[200]['{DAV:}current-user-principal']->getType()); // This will force the login $fakeServer->broadCastEvent('beforeMethod',array('GET','')); $requestedProperties = array( '{DAV:}current-user-principal', ); $returnedProperties = array( 200 => array(), 404 => array(), ); $this->assertNull($plugin->beforeGetProperties('', new DAV\SimpleCollection('root'), $requestedProperties, $returnedProperties)); $this->assertEquals(1,count($returnedProperties[200])); $this->assertArrayHasKey('{DAV:}current-user-principal',$returnedProperties[200]); $this->assertInstanceOf('Sabre\DAVACL\Property\Principal', $returnedProperties[200]['{DAV:}current-user-principal']); $this->assertEquals(Property\Principal::HREF, $returnedProperties[200]['{DAV:}current-user-principal']->getType()); $this->assertEquals('principals/admin/', $returnedProperties[200]['{DAV:}current-user-principal']->getHref()); } function testSupportedPrivilegeSet() { $plugin = new Plugin(); $server = new DAV\Server(); $server->addPlugin($plugin); $requestedProperties = array( '{DAV:}supported-privilege-set', ); $returnedProperties = array( 200 => array(), 404 => array(), ); $this->assertNull($plugin->beforeGetProperties('', new DAV\SimpleCollection('root'), $requestedProperties, $returnedProperties)); $this->assertEquals(1,count($returnedProperties[200])); $this->assertArrayHasKey('{DAV:}supported-privilege-set',$returnedProperties[200]); $this->assertInstanceOf('Sabre\\DAVACL\\Property\\SupportedPrivilegeSet', $returnedProperties[200]['{DAV:}supported-privilege-set']); $server = new DAV\Server(); $prop = $returnedProperties[200]['{DAV:}supported-privilege-set']; $dom = new \DOMDocument('1.0', 'utf-8'); $root = $dom->createElement('d:root'); $root->setAttribute('xmlns:d','DAV:'); $dom->appendChild($root); $prop->serialize($server, $root); $xpaths = array( '/d:root' => 1, '/d:root/d:supported-privilege' => 1, '/d:root/d:supported-privilege/d:privilege' => 1, '/d:root/d:supported-privilege/d:privilege/d:all' => 1, '/d:root/d:supported-privilege/d:abstract' => 1, '/d:root/d:supported-privilege/d:supported-privilege' => 2, '/d:root/d:supported-privilege/d:supported-privilege/d:privilege' => 2, '/d:root/d:supported-privilege/d:supported-privilege/d:privilege/d:read' => 1, '/d:root/d:supported-privilege/d:supported-privilege/d:privilege/d:write' => 1, '/d:root/d:supported-privilege/d:supported-privilege/d:supported-privilege' => 8, '/d:root/d:supported-privilege/d:supported-privilege/d:supported-privilege/d:privilege' => 8, '/d:root/d:supported-privilege/d:supported-privilege/d:supported-privilege/d:privilege/d:read-acl' => 1, '/d:root/d:supported-privilege/d:supported-privilege/d:supported-privilege/d:privilege/d:read-current-user-privilege-set' => 1, '/d:root/d:supported-privilege/d:supported-privilege/d:supported-privilege/d:privilege/d:write-content' => 1, '/d:root/d:supported-privilege/d:supported-privilege/d:supported-privilege/d:privilege/d:write-properties' => 1, '/d:root/d:supported-privilege/d:supported-privilege/d:supported-privilege/d:privilege/d:write-acl' => 1, '/d:root/d:supported-privilege/d:supported-privilege/d:supported-privilege/d:privilege/d:bind' => 1, '/d:root/d:supported-privilege/d:supported-privilege/d:supported-privilege/d:privilege/d:unbind' => 1, '/d:root/d:supported-privilege/d:supported-privilege/d:supported-privilege/d:privilege/d:unlock' => 1, '/d:root/d:supported-privilege/d:supported-privilege/d:supported-privilege/d:abstract' => 8, ); // reloading because php dom sucks $dom2 = new \DOMDocument('1.0', 'utf-8'); $dom2->loadXML($dom->saveXML()); $dxpath = new \DOMXPath($dom2); $dxpath->registerNamespace('d','DAV:'); foreach($xpaths as $xpath=>$count) { $this->assertEquals($count, $dxpath->query($xpath)->length, 'Looking for : ' . $xpath . ', we could only find ' . $dxpath->query($xpath)->length . ' elements, while we expected ' . $count); } } function testACL() { $plugin = new Plugin(); $nodes = array( new MockACLNode('foo', array( array( 'principal' => 'principals/admin', 'privilege' => '{DAV:}read', ) )), new DAV\SimpleCollection('principals', array( $principal = new MockPrincipal('admin','principals/admin'), )), ); $server = new DAV\Server($nodes); $server->addPlugin($plugin); $authPlugin = new DAV\Auth\Plugin(new DAV\Auth\Backend\Mock(),'realm'); $server->addPlugin($authPlugin); // Force login $authPlugin->beforeMethod('BLA','foo'); $requestedProperties = array( '{DAV:}acl', ); $returnedProperties = array( 200 => array(), 404 => array(), ); $this->assertNull($plugin->beforeGetProperties('foo', $nodes[0], $requestedProperties, $returnedProperties)); $this->assertEquals(1,count($returnedProperties[200]),'The {DAV:}acl property did not return from the list. Full list: ' . print_r($returnedProperties,true)); $this->assertArrayHasKey('{DAV:}acl',$returnedProperties[200]); $this->assertInstanceOf('Sabre\\DAVACL\\Property\\ACL', $returnedProperties[200]['{DAV:}acl']); } function testACLRestrictions() { $plugin = new Plugin(); $nodes = array( new MockACLNode('foo', array( array( 'principal' => 'principals/admin', 'privilege' => '{DAV:}read', ) )), new DAV\SimpleCollection('principals', array( $principal = new MockPrincipal('admin','principals/admin'), )), ); $server = new DAV\Server($nodes); $server->addPlugin($plugin); $authPlugin = new DAV\Auth\Plugin(new DAV\Auth\Backend\Mock(),'realm'); $server->addPlugin($authPlugin); // Force login $authPlugin->beforeMethod('BLA','foo'); $requestedProperties = array( '{DAV:}acl-restrictions', ); $returnedProperties = array( 200 => array(), 404 => array(), ); $this->assertNull($plugin->beforeGetProperties('foo', $nodes[0], $requestedProperties, $returnedProperties)); $this->assertEquals(1,count($returnedProperties[200]),'The {DAV:}acl-restrictions property did not return from the list. Full list: ' . print_r($returnedProperties,true)); $this->assertArrayHasKey('{DAV:}acl-restrictions',$returnedProperties[200]); $this->assertInstanceOf('Sabre\\DAVACL\\Property\\ACLRestrictions', $returnedProperties[200]['{DAV:}acl-restrictions']); } function testAlternateUriSet() { $tree = array( new DAV\SimpleCollection('principals', array( $principal = new MockPrincipal('user','principals/user'), )), ); $fakeServer = new DAV\Server($tree); //$plugin = new DAV\Auth\Plugin(new DAV\Auth\MockBackend(),'realm'); //$fakeServer->addPlugin($plugin); $plugin = new Plugin(); $fakeServer->addPlugin($plugin); $requestedProperties = array( '{DAV:}alternate-URI-set', ); $returnedProperties = array(); $result = $plugin->beforeGetProperties('principals/user',$principal,$requestedProperties,$returnedProperties); $this->assertNull($result); $this->assertTrue(isset($returnedProperties[200])); $this->assertTrue(isset($returnedProperties[200]['{DAV:}alternate-URI-set'])); $this->assertInstanceOf('Sabre\\DAV\\Property\\HrefList', $returnedProperties[200]['{DAV:}alternate-URI-set']); $this->assertEquals(array(), $returnedProperties[200]['{DAV:}alternate-URI-set']->getHrefs()); } function testPrincipalURL() { $tree = array( new DAV\SimpleCollection('principals', array( $principal = new MockPrincipal('user','principals/user'), )), ); $fakeServer = new DAV\Server($tree); //$plugin = new DAV\Auth\Plugin(new DAV\Auth\MockBackend(),'realm'); //$fakeServer->addPlugin($plugin); $plugin = new Plugin(); $fakeServer->addPlugin($plugin); $requestedProperties = array( '{DAV:}principal-URL', ); $returnedProperties = array(); $result = $plugin->beforeGetProperties('principals/user',$principal,$requestedProperties,$returnedProperties); $this->assertNull($result); $this->assertTrue(isset($returnedProperties[200])); $this->assertTrue(isset($returnedProperties[200]['{DAV:}principal-URL'])); $this->assertInstanceOf('Sabre\\DAV\\Property\\Href', $returnedProperties[200]['{DAV:}principal-URL']); $this->assertEquals('principals/user/', $returnedProperties[200]['{DAV:}principal-URL']->getHref()); } function testGroupMemberSet() { $tree = array( new DAV\SimpleCollection('principals', array( $principal = new MockPrincipal('user','principals/user'), )), ); $fakeServer = new DAV\Server($tree); //$plugin = new DAV\Auth\Plugin(new DAV\Auth\MockBackend(),'realm'); //$fakeServer->addPlugin($plugin); $plugin = new Plugin(); $fakeServer->addPlugin($plugin); $requestedProperties = array( '{DAV:}group-member-set', ); $returnedProperties = array(); $result = $plugin->beforeGetProperties('principals/user',$principal,$requestedProperties,$returnedProperties); $this->assertNull($result); $this->assertTrue(isset($returnedProperties[200])); $this->assertTrue(isset($returnedProperties[200]['{DAV:}group-member-set'])); $this->assertInstanceOf('Sabre\\DAV\\Property\\HrefList', $returnedProperties[200]['{DAV:}group-member-set']); $this->assertEquals(array(), $returnedProperties[200]['{DAV:}group-member-set']->getHrefs()); } function testGroupMemberShip() { $tree = array( new DAV\SimpleCollection('principals', array( $principal = new MockPrincipal('user','principals/user'), )), ); $fakeServer = new DAV\Server($tree); //$plugin = new DAV\Auth\Plugin(new DAV\Auth\MockBackend(),'realm'); //$fakeServer->addPlugin($plugin); $plugin = new Plugin(); $fakeServer->addPlugin($plugin); $requestedProperties = array( '{DAV:}group-membership', ); $returnedProperties = array(); $result = $plugin->beforeGetProperties('principals/user',$principal,$requestedProperties,$returnedProperties); $this->assertNull($result); $this->assertTrue(isset($returnedProperties[200])); $this->assertTrue(isset($returnedProperties[200]['{DAV:}group-membership'])); $this->assertInstanceOf('Sabre\\DAV\\Property\\HrefList', $returnedProperties[200]['{DAV:}group-membership']); $this->assertEquals(array(), $returnedProperties[200]['{DAV:}group-membership']->getHrefs()); } function testGetDisplayName() { $tree = array( new DAV\SimpleCollection('principals', array( $principal = new MockPrincipal('user','principals/user'), )), ); $fakeServer = new DAV\Server($tree); //$plugin = new DAV\Auth\Plugin(new DAV\Auth\MockBackend(),'realm'); //$fakeServer->addPlugin($plugin); $plugin = new Plugin(); $fakeServer->addPlugin($plugin); $requestedProperties = array( '{DAV:}displayname', ); $returnedProperties = array(); $result = $plugin->beforeGetProperties('principals/user',$principal,$requestedProperties,$returnedProperties); $this->assertNull($result); $this->assertTrue(isset($returnedProperties[200])); $this->assertTrue(isset($returnedProperties[200]['{DAV:}displayname'])); $this->assertEquals('user', $returnedProperties[200]['{DAV:}displayname']); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/PluginUpdatePropertiesTest.php000066400000000000000000000060341246001162500246260ustar00rootroot00000000000000addPlugin(new Plugin()); $result = $server->updateProperties('foo', array( '{DAV:}foo' => 'bar', )); $expected = array( 'href' => 'foo', '403' => array( '{DAV:}foo' => null, ), ); $this->assertEquals($expected, $result); } public function testRemoveGroupMembers() { $tree = array( new MockPrincipal('foo','foo'), ); $server = new DAV\Server($tree); $server->addPlugin(new Plugin()); $result = $server->updateProperties('foo', array( '{DAV:}group-member-set' => null, )); $expected = array( 'href' => 'foo', '200' => array( '{DAV:}group-member-set' => null, ), ); $this->assertEquals($expected, $result); $this->assertEquals(array(),$tree[0]->getGroupMemberSet()); } public function testSetGroupMembers() { $tree = array( new MockPrincipal('foo','foo'), ); $server = new DAV\Server($tree); $server->addPlugin(new Plugin()); $result = $server->updateProperties('foo', array( '{DAV:}group-member-set' => new DAV\Property\HrefList(array('/bar','/baz'), true), )); $expected = array( 'href' => 'foo', '200' => array( '{DAV:}group-member-set' => null, ), ); $this->assertEquals($expected, $result); $this->assertEquals(array('bar','baz'),$tree[0]->getGroupMemberSet()); } /** * @expectedException Sabre\DAV\Exception */ public function testSetBadValue() { $tree = array( new MockPrincipal('foo','foo'), ); $server = new DAV\Server($tree); $server->addPlugin(new Plugin()); $result = $server->updateProperties('foo', array( '{DAV:}group-member-set' => new \StdClass(), )); } public function testSetBadNode() { $tree = array( new DAV\SimpleCollection('foo'), ); $server = new DAV\Server($tree); $server->addPlugin(new Plugin()); $result = $server->updateProperties('foo', array( '{DAV:}group-member-set' => new DAV\Property\HrefList(array('/bar','/baz'),false), '{DAV:}bar' => 'baz', )); $expected = array( 'href' => 'foo', '403' => array( '{DAV:}group-member-set' => null, ), '424' => array( '{DAV:}bar' => null, ), ); $this->assertEquals($expected, $result); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/PrincipalBackend/000077500000000000000000000000001246001162500217655ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAVACL/PrincipalBackend/AbstractPDOTest.php000066400000000000000000000122141246001162500254440ustar00rootroot00000000000000getPDO(); $backend = new PDO($pdo); $this->assertTrue($backend instanceof PDO); } /** * @depends testConstruct */ function testGetPrincipalsByPrefix() { $pdo = $this->getPDO(); $backend = new PDO($pdo); $expected = array( array( 'uri' => 'principals/user', '{http://sabredav.org/ns}email-address' => 'user@example.org', '{DAV:}displayname' => 'User', ), array( 'uri' => 'principals/group', '{http://sabredav.org/ns}email-address' => 'group@example.org', '{DAV:}displayname' => 'Group', ), ); $this->assertEquals($expected, $backend->getPrincipalsByPrefix('principals')); $this->assertEquals(array(), $backend->getPrincipalsByPrefix('foo')); } /** * @depends testConstruct */ function testGetPrincipalByPath() { $pdo = $this->getPDO(); $backend = new PDO($pdo); $expected = array( 'id' => 1, 'uri' => 'principals/user', '{http://sabredav.org/ns}email-address' => 'user@example.org', '{DAV:}displayname' => 'User', ); $this->assertEquals($expected, $backend->getPrincipalByPath('principals/user')); $this->assertEquals(null, $backend->getPrincipalByPath('foo')); } function testGetGroupMemberSet() { $pdo = $this->getPDO(); $backend = new PDO($pdo); $expected = array('principals/user'); $this->assertEquals($expected,$backend->getGroupMemberSet('principals/group')); } function testGetGroupMembership() { $pdo = $this->getPDO(); $backend = new PDO($pdo); $expected = array('principals/group'); $this->assertEquals($expected,$backend->getGroupMembership('principals/user')); } function testSetGroupMemberSet() { $pdo = $this->getPDO(); // Start situation $backend = new PDO($pdo); $this->assertEquals(array('principals/user'), $backend->getGroupMemberSet('principals/group')); // Removing all principals $backend->setGroupMemberSet('principals/group', array()); $this->assertEquals(array(), $backend->getGroupMemberSet('principals/group')); // Adding principals again $backend->setGroupMemberSet('principals/group', array('principals/user')); $this->assertEquals(array('principals/user'), $backend->getGroupMemberSet('principals/group')); } function testSearchPrincipals() { $pdo = $this->getPDO(); $backend = new PDO($pdo); $result = $backend->searchPrincipals('principals', array('{DAV:}blabla' => 'foo')); $this->assertEquals(array(), $result); $result = $backend->searchPrincipals('principals', array('{DAV:}displayname' => 'ou')); $this->assertEquals(array('principals/group'), $result); $result = $backend->searchPrincipals('principals', array('{DAV:}displayname' => 'UsEr', '{http://sabredav.org/ns}email-address' => 'USER@EXAMPLE')); $this->assertEquals(array('principals/user'), $result); $result = $backend->searchPrincipals('mom', array('{DAV:}displayname' => 'UsEr', '{http://sabredav.org/ns}email-address' => 'USER@EXAMPLE')); $this->assertEquals(array(), $result); } function testUpdatePrincipal() { $pdo = $this->getPDO(); $backend = new PDO($pdo); $result = $backend->updatePrincipal('principals/user', array( '{DAV:}displayname' => 'pietje', '{http://sabredav.org/ns}vcard-url' => 'blabla', )); $this->assertTrue($result); $this->assertEquals(array( 'id' => 1, 'uri' => 'principals/user', '{DAV:}displayname' => 'pietje', '{http://sabredav.org/ns}vcard-url' => 'blabla', '{http://sabredav.org/ns}email-address' => 'user@example.org', ), $backend->getPrincipalByPath('principals/user')); } function testUpdatePrincipalUnknownField() { $pdo = $this->getPDO(); $backend = new PDO($pdo); $result = $backend->updatePrincipal('principals/user', array( '{DAV:}displayname' => 'pietje', '{http://sabredav.org/ns}vcard-url' => 'blabla', '{DAV:}unknown' => 'foo', )); $this->assertEquals(array( 424 => array( '{DAV:}displayname' => null, '{http://sabredav.org/ns}vcard-url' => null, ), 403 => array( '{DAV:}unknown' => null, ), ), $result); $this->assertEquals(array( 'id' => '1', 'uri' => 'principals/user', '{DAV:}displayname' => 'User', '{http://sabredav.org/ns}email-address' => 'user@example.org', ), $backend->getPrincipalByPath('principals/user')); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/PrincipalBackend/Mock.php000066400000000000000000000114511246001162500233710ustar00rootroot00000000000000principals = array( array( 'uri' => 'principals/user1', '{DAV:}displayname' => 'User 1', '{http://sabredav.org/ns}email-address' => 'user1.sabredav@sabredav.org', '{http://sabredav.org/ns}vcard-url' => 'addressbooks/user1/book1/vcard1.vcf', ), array( 'uri' => 'principals/admin', '{DAV:}displayname' => 'Admin', ), array( 'uri' => 'principals/user2', '{DAV:}displayname' => 'User 2', '{http://sabredav.org/ns}email-address' => 'user2.sabredav@sabredav.org', ), ); } function getPrincipalsByPrefix($prefix) { $prefix = trim($prefix,'/') . '/'; $return = array(); foreach($this->principals as $principal) { if (strpos($principal['uri'], $prefix)!==0) continue; $return[] = $principal; } return $return; } function addPrincipal(array $principal) { $this->principals[] = $principal; } function getPrincipalByPath($path) { foreach($this->getPrincipalsByPrefix('principals') as $principal) { if ($principal['uri'] === $path) return $principal; } } function searchPrincipals($prefixPath, array $searchProperties) { $matches = array(); foreach($this->getPrincipalsByPrefix($prefixPath) as $principal) { foreach($searchProperties as $key=>$value) { if (!isset($principal[$key])) { continue 2; } if (mb_stripos($principal[$key],$value, 0, 'UTF-8')===false) { continue 2; } } $matches[] = $principal['uri']; } return $matches; } function getGroupMemberSet($path) { return isset($this->groupMembers[$path]) ? $this->groupMembers[$path] : array(); } function getGroupMembership($path) { $membership = array(); foreach($this->groupMembers as $group=>$members) { if (in_array($path, $members)) $membership[] = $group; } return $membership; } function setGroupMemberSet($path, array $members) { $this->groupMembers[$path] = $members; } /** * Updates one ore more webdav properties on a principal. * * The list of mutations is supplied as an array. Each key in the array is * a propertyname, such as {DAV:}displayname. * * Each value is the actual value to be updated. If a value is null, it * must be deleted. * * This method should be atomic. It must either completely succeed, or * completely fail. Success and failure can simply be returned as 'true' or * 'false'. * * It is also possible to return detailed failure information. In that case * an array such as this should be returned: * * array( * 200 => array( * '{DAV:}prop1' => null, * ), * 201 => array( * '{DAV:}prop2' => null, * ), * 403 => array( * '{DAV:}prop3' => null, * ), * 424 => array( * '{DAV:}prop4' => null, * ), * ); * * In this previous example prop1 was successfully updated or deleted, and * prop2 was succesfully created. * * prop3 failed to update due to '403 Forbidden' and because of this prop4 * also could not be updated with '424 Failed dependency'. * * This last example was actually incorrect. While 200 and 201 could appear * in 1 response, if there's any error (403) the other properties should * always fail with 423 (failed dependency). * * But anyway, if you don't want to scratch your head over this, just * return true or false. * * @param string $path * @param array $mutations * @return array|bool */ public function updatePrincipal($path, $mutations) { $value = null; foreach($this->principals as $principalIndex=>$value) { if ($value['uri'] === $path) { $principal = $value; break; } } if (!$principal) return false; foreach($mutations as $prop=>$value) { if (is_null($value) && isset($principal[$prop])) { unset($principal[$prop]); } else { $principal[$prop] = $value; } } $this->principals[$principalIndex] = $principal; return true; } } sabre-dav-1.8.12/tests/Sabre/DAVACL/PrincipalBackend/PDOMySQLTest.php000066400000000000000000000026771246001162500246620ustar00rootroot00000000000000markTestSkipped('MySQL driver is not available, or not properly configured'); $pdo = \Sabre\TestUtil::getMySQLDB(); if (!$pdo) $this->markTestSkipped('Could not connect to MySQL database'); $pdo->query("DROP TABLE IF EXISTS principals"); $pdo->query(" create table principals ( id integer unsigned not null primary key auto_increment, uri varchar(50), email varchar(80), displayname VARCHAR(80), vcardurl VARCHAR(80), unique(uri) );"); $pdo->query("INSERT INTO principals (uri,email,displayname) VALUES ('principals/user','user@example.org','User')"); $pdo->query("INSERT INTO principals (uri,email,displayname) VALUES ('principals/group','group@example.org','Group')"); $pdo->query("DROP TABLE IF EXISTS groupmembers"); $pdo->query("CREATE TABLE groupmembers ( id INTEGER UNSIGNED NOT NULL PRIMARY KEY AUTO_INCREMENT, principal_id INTEGER UNSIGNED NOT NULL, member_id INTEGER UNSIGNED NOT NULL, UNIQUE(principal_id, member_id) );"); $pdo->query("INSERT INTO groupmembers (principal_id,member_id) VALUES (2,1)"); return $pdo; } } sabre-dav-1.8.12/tests/Sabre/DAVACL/PrincipalBackend/PDOSqliteTest.php000066400000000000000000000025421246001162500251450ustar00rootroot00000000000000markTestSkipped('SQLite driver is not available'); $pdo = new \PDO('sqlite:'.SABRE_TEMPDIR.'/pdobackend'); $pdo->setAttribute(\PDO::ATTR_ERRMODE,\PDO::ERRMODE_EXCEPTION); $pdo->query('CREATE TABLE principals (id INTEGER PRIMARY KEY ASC, uri TEXT, email VARCHAR(80), displayname VARCHAR(80), vcardurl VARCHAR(80))'); $pdo->query('INSERT INTO principals VALUES (1, "principals/user","user@example.org","User",null)'); $pdo->query('INSERT INTO principals VALUES (2, "principals/group","group@example.org","Group",null)'); $pdo->query("CREATE TABLE groupmembers ( id INTEGER PRIMARY KEY ASC, principal_id INT, member_id INT, UNIQUE(principal_id, member_id) );"); $pdo->query("INSERT INTO groupmembers (principal_id,member_id) VALUES (2,1)"); return $pdo; } } sabre-dav-1.8.12/tests/Sabre/DAVACL/PrincipalCollectionTest.php000066400000000000000000000021411246001162500241000ustar00rootroot00000000000000assertTrue($pc instanceof PrincipalCollection); $this->assertEquals('principals',$pc->getName()); } /** * @depends testBasic */ public function testGetChildren() { $backend = new PrincipalBackend\Mock(); $pc = new PrincipalCollection($backend); $children = $pc->getChildren(); $this->assertTrue(is_array($children)); foreach($children as $child) { $this->assertTrue($child instanceof IPrincipal); } } /** * @depends testBasic * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ public function testGetChildrenDisable() { $backend = new PrincipalBackend\Mock(); $pc = new PrincipalCollection($backend); $pc->disableListing = true; $children = $pc->getChildren(); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/PrincipalPropertySearchTest.php000066400000000000000000000151271246001162500247670ustar00rootroot00000000000000addChild($principals); $fakeServer = new DAV\Server(new DAV\ObjectTree($dir)); $fakeServer->httpResponse = new HTTP\ResponseMock(); $fakeServer->debugExceptions = true; $plugin = new MockPlugin($backend,'realm'); $plugin->allowAccessToNodesWithoutACL = true; $this->assertTrue($plugin instanceof Plugin); $fakeServer->addPlugin($plugin); $this->assertEquals($plugin, $fakeServer->getPlugin('acl')); return $fakeServer; } function testDepth1() { $xml = ' user '; $serverVars = array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_DEPTH' => '1', 'REQUEST_URI' => '/principals', ); $request = new HTTP\Request($serverVars); $request->setBody($xml); $server = $this->getServer(); $server->httpRequest = $request; $server->exec(); $this->assertEquals('HTTP/1.1 400 Bad request', $server->httpResponse->status); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ), $server->httpResponse->headers); } function testUnknownSearchField() { $xml = ' user '; $serverVars = array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_DEPTH' => '0', 'REQUEST_URI' => '/principals', ); $request = new HTTP\Request($serverVars); $request->setBody($xml); $server = $this->getServer(); $server->httpRequest = $request; $server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status', $server->httpResponse->status); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', 'Vary' => 'Brief,Prefer', ), $server->httpResponse->headers); } function testCorrect() { $xml = ' user '; $serverVars = array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_DEPTH' => '0', 'REQUEST_URI' => '/', ); $request = new HTTP\Request($serverVars); $request->setBody($xml); $server = $this->getServer(); $server->httpRequest = $request; $server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status', $server->httpResponse->status, $server->httpResponse->body); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', 'Vary' => 'Brief,Prefer', ), $server->httpResponse->headers); $check = array( '/d:multistatus', '/d:multistatus/d:response' => 2, '/d:multistatus/d:response/d:href' => 2, '/d:multistatus/d:response/d:propstat' => 4, '/d:multistatus/d:response/d:propstat/d:prop' => 4, '/d:multistatus/d:response/d:propstat/d:prop/d:displayname' => 2, '/d:multistatus/d:response/d:propstat/d:prop/d:getcontentlength' => 2, '/d:multistatus/d:response/d:propstat/d:status' => 4, ); $xml = simplexml_load_string($server->httpResponse->body); $xml->registerXPathNamespace('d','DAV:'); foreach($check as $v1=>$v2) { $xpath = is_int($v1)?$v2:$v1; $result = $xml->xpath($xpath); $count = 1; if (!is_int($v1)) $count = $v2; $this->assertEquals($count,count($result), 'we expected ' . $count . ' appearances of ' . $xpath . ' . We found ' . count($result) . '. Full response body: ' . $server->httpResponse->body); } } function testWrongUri() { $xml = ' user '; $serverVars = array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_DEPTH' => '0', 'REQUEST_URI' => '/', ); $request = new HTTP\Request($serverVars); $request->setBody($xml); $server = $this->getServer(); $server->httpRequest = $request; $server->exec(); $this->assertEquals('HTTP/1.1 207 Multi-Status', $server->httpResponse->status, $server->httpResponse->body); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', 'Vary' => 'Brief,Prefer', ), $server->httpResponse->headers); $check = array( '/d:multistatus', '/d:multistatus/d:response' => 0, ); $xml = simplexml_load_string($server->httpResponse->body); $xml->registerXPathNamespace('d','DAV:'); foreach($check as $v1=>$v2) { $xpath = is_int($v1)?$v2:$v1; $result = $xml->xpath($xpath); $count = 1; if (!is_int($v1)) $count = $v2; $this->assertEquals($count,count($result), 'we expected ' . $count . ' appearances of ' . $xpath . ' . We found ' . count($result) . '. Full response body: ' . $server->httpResponse->body); } } } class MockPlugin extends Plugin { function getCurrentUserPrivilegeSet($node) { return array( '{DAV:}read', '{DAV:}write', ); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/PrincipalSearchPropertySetTest.php000066400000000000000000000101311246001162500254310ustar00rootroot00000000000000addChild($principals); $fakeServer = new DAV\Server(new DAV\ObjectTree($dir)); $fakeServer->httpResponse = new HTTP\ResponseMock(); $plugin = new Plugin($backend,'realm'); $this->assertTrue($plugin instanceof Plugin); $fakeServer->addPlugin($plugin); $this->assertEquals($plugin, $fakeServer->getPlugin('acl')); return $fakeServer; } function testDepth1() { $xml = ' '; $serverVars = array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_DEPTH' => '1', 'REQUEST_URI' => '/principals', ); $request = new HTTP\Request($serverVars); $request->setBody($xml); $server = $this->getServer(); $server->httpRequest = $request; $server->exec(); $this->assertEquals('HTTP/1.1 400 Bad request', $server->httpResponse->status); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ), $server->httpResponse->headers); } function testDepthIncorrectXML() { $xml = ' '; $serverVars = array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_DEPTH' => '0', 'REQUEST_URI' => '/principals', ); $request = new HTTP\Request($serverVars); $request->setBody($xml); $server = $this->getServer(); $server->httpRequest = $request; $server->exec(); $this->assertEquals('HTTP/1.1 400 Bad request', $server->httpResponse->status, $server->httpResponse->body); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ), $server->httpResponse->headers); } function testCorrect() { $xml = ' '; $serverVars = array( 'REQUEST_METHOD' => 'REPORT', 'HTTP_DEPTH' => '0', 'REQUEST_URI' => '/principals', ); $request = new HTTP\Request($serverVars); $request->setBody($xml); $server = $this->getServer(); $server->httpRequest = $request; $server->exec(); $this->assertEquals('HTTP/1.1 200 OK', $server->httpResponse->status, $server->httpResponse->body); $this->assertEquals(array( 'Content-Type' => 'application/xml; charset=utf-8', ), $server->httpResponse->headers); $check = array( '/d:principal-search-property-set', '/d:principal-search-property-set/d:principal-search-property' => 2, '/d:principal-search-property-set/d:principal-search-property/d:prop' => 2, '/d:principal-search-property-set/d:principal-search-property/d:prop/d:displayname' => 1, '/d:principal-search-property-set/d:principal-search-property/d:prop/s:email-address' => 1, '/d:principal-search-property-set/d:principal-search-property/d:description' => 2, ); $xml = simplexml_load_string($server->httpResponse->body); $xml->registerXPathNamespace('d','DAV:'); $xml->registerXPathNamespace('s','http://sabredav.org/ns'); foreach($check as $v1=>$v2) { $xpath = is_int($v1)?$v2:$v1; $result = $xml->xpath($xpath); $count = 1; if (!is_int($v1)) $count = $v2; $this->assertEquals($count,count($result), 'we expected ' . $count . ' appearances of ' . $xpath . ' . We found ' . count($result) . '. Full response body: ' . $server->httpResponse->body); } } } sabre-dav-1.8.12/tests/Sabre/DAVACL/PrincipalTest.php000066400000000000000000000145611246001162500220750ustar00rootroot00000000000000 'principals/admin')); $this->assertTrue($principal instanceof Principal); } /** * @expectedException Sabre\DAV\Exception */ public function testConstructNoUri() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array()); } public function testGetName() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array('uri' => 'principals/admin')); $this->assertEquals('admin',$principal->getName()); } public function testGetDisplayName() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array('uri' => 'principals/admin')); $this->assertEquals('admin',$principal->getDisplayname()); $principal = new Principal($principalBackend, array( 'uri' => 'principals/admin', '{DAV:}displayname' => 'Mr. Admin' )); $this->assertEquals('Mr. Admin',$principal->getDisplayname()); } public function testGetProperties() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array( 'uri' => 'principals/admin', '{DAV:}displayname' => 'Mr. Admin', '{http://www.example.org/custom}custom' => 'Custom', '{http://sabredav.org/ns}email-address' => 'admin@example.org', )); $keys = array( '{DAV:}displayname', '{http://www.example.org/custom}custom', '{http://sabredav.org/ns}email-address', ); $props = $principal->getProperties($keys); foreach($keys as $key) $this->assertArrayHasKey($key,$props); $this->assertEquals('Mr. Admin',$props['{DAV:}displayname']); $this->assertEquals('admin@example.org', $props['{http://sabredav.org/ns}email-address']); } public function testUpdateProperties() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array('uri' => 'principals/admin')); $result = $principal->updateProperties(array('{DAV:}yourmom'=>'test')); $this->assertEquals(true,$result); } public function testGetPrincipalUrl() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array('uri' => 'principals/admin')); $this->assertEquals('principals/admin',$principal->getPrincipalUrl()); } public function testGetAlternateUriSet() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array( 'uri' => 'principals/admin', '{DAV:}displayname' => 'Mr. Admin', '{http://www.example.org/custom}custom' => 'Custom', '{http://sabredav.org/ns}email-address' => 'admin@example.org', '{DAV:}alternate-URI-set' => array( 'mailto:admin+1@example.org', 'mailto:admin+2@example.org', 'mailto:admin@example.org', ), )); $expected = array( 'mailto:admin+1@example.org', 'mailto:admin+2@example.org', 'mailto:admin@example.org', ); $this->assertEquals($expected,$principal->getAlternateUriSet()); } public function testGetAlternateUriSetEmpty() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array( 'uri' => 'principals/admin', )); $expected = array(); $this->assertEquals($expected,$principal->getAlternateUriSet()); } public function testGetGroupMemberSet() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array('uri' => 'principals/admin')); $this->assertEquals(array(),$principal->getGroupMemberSet()); } public function testGetGroupMembership() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array('uri' => 'principals/admin')); $this->assertEquals(array(),$principal->getGroupMembership()); } public function testSetGroupMemberSet() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array('uri' => 'principals/admin')); $principal->setGroupMemberSet(array('principals/foo')); $this->assertEquals(array( 'principals/admin' => array('principals/foo'), ), $principalBackend->groupMembers); } public function testGetOwner() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array('uri' => 'principals/admin')); $this->assertEquals('principals/admin',$principal->getOwner()); } public function testGetGroup() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array('uri' => 'principals/admin')); $this->assertNull($principal->getGroup()); } public function testGetACl() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array('uri' => 'principals/admin')); $this->assertEquals(array( array( 'privilege' => '{DAV:}read', 'principal' => 'principals/admin', 'protected' => true, ) ),$principal->getACL()); } /** * @expectedException Sabre\DAV\Exception\MethodNotAllowed */ public function testSetACl() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array('uri' => 'principals/admin')); $principal->setACL(array()); } public function testGetSupportedPrivilegeSet() { $principalBackend = new PrincipalBackend\Mock(); $principal = new Principal($principalBackend, array('uri' => 'principals/admin')); $this->assertNull($principal->getSupportedPrivilegeSet()); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/Property/000077500000000000000000000000001246001162500204205ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/DAVACL/Property/ACLRestrictionsTest.php000066400000000000000000000012401246001162500247760ustar00rootroot00000000000000createElementNS('DAV:','d:root'); $dom->appendChild($root); $acl = new AclRestrictions(); $acl->serialize(new DAV\Server(), $root); $xml = $dom->saveXML(); $expected = ' '; $this->assertEquals($expected, $xml); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/Property/ACLTest.php000066400000000000000000000162101246001162500223700ustar00rootroot00000000000000createElementNS('DAV:','d:root'); $dom->appendChild($root); $acl = new Acl(array()); $acl->serialize(new DAV\Server(), $root); $xml = $dom->saveXML(); $expected = ' '; $this->assertEquals($expected, $xml); } function testSerialize() { $dom = new \DOMDocument('1.0'); $root = $dom->createElementNS('DAV:','d:root'); $dom->appendChild($root); $privileges = array( array( 'principal' => 'principals/evert', 'privilege' => '{DAV:}write', 'uri' => 'articles', ), array( 'principal' => 'principals/foo', 'privilege' => '{DAV:}read', 'uri' => 'articles', 'protected' => true, ), ); $acl = new Acl($privileges); $acl->serialize(new DAV\Server(), $root); $dom->formatOutput = true; $xml = $dom->saveXML(); $expected = ' /principals/evert/ /principals/foo/ '; $this->assertEquals($expected, $xml); } function testSerializeSpecialPrincipals() { $dom = new \DOMDocument('1.0'); $root = $dom->createElementNS('DAV:','d:root'); $dom->appendChild($root); $privileges = array( array( 'principal' => '{DAV:}authenticated', 'privilege' => '{DAV:}write', 'uri' => 'articles', ), array( 'principal' => '{DAV:}unauthenticated', 'privilege' => '{DAV:}write', 'uri' => 'articles', ), array( 'principal' => '{DAV:}all', 'privilege' => '{DAV:}write', 'uri' => 'articles', ), ); $acl = new Acl($privileges); $acl->serialize(new DAV\Server(), $root); $dom->formatOutput = true; $xml = $dom->saveXML(); $expected = ' '; $this->assertEquals($expected, $xml); } function testUnserialize() { $source = ' /principals/evert/ /principals/foo/ '; $dom = DAV\XMLUtil::loadDOMDocument($source); $result = Acl::unserialize($dom->firstChild); $this->assertInstanceOf('Sabre\\DAVACL\\Property\\ACL', $result); $expected = array( array( 'principal' => '/principals/evert/', 'protected' => false, 'privilege' => '{DAV:}write', ), array( 'principal' => '/principals/foo/', 'protected' => true, 'privilege' => '{DAV:}read', ), ); $this->assertEquals($expected, $result->getPrivileges()); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testUnserializeNoPrincipal() { $source = ' '; $dom = DAV\XMLUtil::loadDOMDocument($source); Acl::unserialize($dom->firstChild); } function testUnserializeOtherPrincipal() { $source = ' '; $dom = DAV\XMLUtil::loadDOMDocument($source); $result = Acl::unserialize($dom->firstChild); $this->assertInstanceOf('Sabre\\DAVACL\\Property\\Acl', $result); $expected = array( array( 'principal' => '{DAV:}authenticated', 'protected' => false, 'privilege' => '{DAV:}write', ), array( 'principal' => '{DAV:}unauthenticated', 'protected' => false, 'privilege' => '{DAV:}write', ), array( 'principal' => '{DAV:}all', 'protected' => false, 'privilege' => '{DAV:}write', ), ); $this->assertEquals($expected, $result->getPrivileges()); } /** * @expectedException Sabre\DAV\Exception\NotImplemented */ function testUnserializeDeny() { $source = ' /principals/evert '; $dom = DAV\XMLUtil::loadDOMDocument($source); Acl::unserialize($dom->firstChild); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testUnserializeMissingPriv() { $source = ' /principals/evert '; $dom = DAV\XMLUtil::loadDOMDocument($source); Acl::unserialize($dom->firstChild); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/Property/CurrentUserPrivilegeSetTest.php000066400000000000000000000034111246001162500265740ustar00rootroot00000000000000createElementNS('DAV:','d:root'); $dom->appendChild($root); $prop->serialize($server, $root); $xpaths = array( '/d:root' => 1, '/d:root/d:privilege' => 2, '/d:root/d:privilege/d:read' => 1, '/d:root/d:privilege/d:write' => 1, ); // Reloading because PHP DOM sucks $dom2 = new \DOMDocument('1.0', 'utf-8'); $dom2->loadXML($dom->saveXML()); $dxpath = new \DOMXPath($dom2); $dxpath->registerNamespace('d','DAV:'); foreach($xpaths as $xpath=>$count) { $this->assertEquals($count, $dxpath->query($xpath)->length, 'Looking for : ' . $xpath . ', we could only find ' . $dxpath->query($xpath)->length . ' elements, while we expected ' . $count); } } function testUnserialize() { $source = ' '; $dom = DAV\XMLUtil::loadDOMDocument($source); $result = CurrentUserPrivilegeSet::unserialize($dom->firstChild, array()); $this->assertTrue($result->has('{DAV:}read')); $this->assertTrue($result->has('{DAV:}write-properties')); $this->assertFalse($result->has('{DAV:}bind')); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/Property/PrincipalTest.php000066400000000000000000000105501246001162500237130ustar00rootroot00000000000000assertEquals(Principal::UNAUTHENTICATED, $principal->getType()); $this->assertNull($principal->getHref()); $principal = new Principal(Principal::AUTHENTICATED); $this->assertEquals(Principal::AUTHENTICATED, $principal->getType()); $this->assertNull($principal->getHref()); $principal = new Principal(Principal::HREF,'admin'); $this->assertEquals(Principal::HREF, $principal->getType()); $this->assertEquals('admin',$principal->getHref()); } /** * @depends testSimple * @expectedException Sabre\DAV\Exception */ function testNoHref() { $principal = new Principal(Principal::HREF); } /** * @depends testSimple */ function testSerializeUnAuthenticated() { $prin = new Principal(Principal::UNAUTHENTICATED); $doc = new \DOMDocument(); $root = $doc->createElement('d:principal'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $objectTree = new DAV\ObjectTree(new DAV\SimpleCollection('rootdir')); $server = new DAV\Server($objectTree); $prin->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . '' . ' ', $xml); } /** * @depends testSerializeUnAuthenticated */ function testSerializeAuthenticated() { $prin = new Principal(Principal::AUTHENTICATED); $doc = new \DOMDocument(); $root = $doc->createElement('d:principal'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $objectTree = new DAV\ObjectTree(new DAV\SimpleCollection('rootdir')); $server = new DAV\Server($objectTree); $prin->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . '' . ' ', $xml); } /** * @depends testSerializeUnAuthenticated */ function testSerializeHref() { $prin = new Principal(Principal::HREF,'principals/admin'); $doc = new \DOMDocument(); $root = $doc->createElement('d:principal'); $root->setAttribute('xmlns:d','DAV:'); $doc->appendChild($root); $objectTree = new DAV\ObjectTree(new DAV\SimpleCollection('rootdir')); $server = new DAV\Server($objectTree); $prin->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . '/principals/admin' . ' ', $xml); } function testUnserializeHref() { $xml = ' ' . '/principals/admin' . ''; $dom = DAV\XMLUtil::loadDOMDocument($xml); $principal = Principal::unserialize($dom->firstChild); $this->assertEquals(Principal::HREF, $principal->getType()); $this->assertEquals('/principals/admin', $principal->getHref()); } function testUnserializeAuthenticated() { $xml = ' ' . ' ' . ''; $dom = DAV\XMLUtil::loadDOMDocument($xml); $principal = Principal::unserialize($dom->firstChild); $this->assertEquals(Principal::AUTHENTICATED, $principal->getType()); } function testUnserializeUnauthenticated() { $xml = ' ' . ' ' . ''; $dom = DAV\XMLUtil::loadDOMDocument($xml); $principal = Principal::unserialize($dom->firstChild); $this->assertEquals(Principal::UNAUTHENTICATED, $principal->getType()); } /** * @expectedException Sabre\DAV\Exception\BadRequest */ function testUnserializeUnknown() { $xml = ' ' . ' ' . ''; $dom = DAV\XMLUtil::loadDOMDocument($xml); Principal::unserialize($dom->firstChild); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/Property/SupportedPrivilegeSetTest.php000066400000000000000000000043311246001162500263020ustar00rootroot00000000000000 '{DAV:}all', )); } /** * @depends testSimple */ function testSerializeSimple() { $prop = new SupportedPrivilegeSet(array( 'privilege' => '{DAV:}all', )); $doc = new \DOMDocument(); $root = $doc->createElementNS('DAV:', 'd:supported-privilege-set'); $doc->appendChild($root); $server = new DAV\Server(); $prop->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . '' . '' . '' . '' . '' . ' ', $xml); } /** * @depends testSimple */ function testSerializeAggregate() { $prop = new SupportedPrivilegeSet(array( 'privilege' => '{DAV:}all', 'abstract' => true, 'aggregates' => array( array( 'privilege' => '{DAV:}read', ), array( 'privilege' => '{DAV:}write', 'description' => 'booh', ), ), )); $doc = new \DOMDocument(); $root = $doc->createElementNS('DAV:', 'd:supported-privilege-set'); $doc->appendChild($root); $server = new DAV\Server(); $prop->serialize($server, $root); $xml = $doc->saveXML(); $this->assertEquals( ' ' . '' . '' . '' . '' . '' . '' . '' . '' . '' . '' . '' . '' . '' . '' . 'booh' . '' . '' . ' ', $xml); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/SimplePluginTest.php000066400000000000000000000222041246001162500225550ustar00rootroot00000000000000assertEquals('acl',$aclPlugin->getPluginName()); $this->assertEquals( array('access-control', 'calendarserver-principal-property-search'), $aclPlugin->getFeatures() ); $this->assertEquals( array( '{DAV:}expand-property', '{DAV:}principal-property-search', '{DAV:}principal-search-property-set' ), $aclPlugin->getSupportedReportSet('')); $this->assertEquals(array('ACL'), $aclPlugin->getMethods('')); } function testGetFlatPrivilegeSet() { $expected = array( '{DAV:}all' => array( 'privilege' => '{DAV:}all', 'abstract' => true, 'aggregates' => array( '{DAV:}read', '{DAV:}write', ), 'concrete' => null, ), '{DAV:}read' => array( 'privilege' => '{DAV:}read', 'abstract' => false, 'aggregates' => array( '{DAV:}read-acl', '{DAV:}read-current-user-privilege-set', ), 'concrete' => '{DAV:}read', ), '{DAV:}read-acl' => array( 'privilege' => '{DAV:}read-acl', 'abstract' => true, 'aggregates' => array(), 'concrete' => '{DAV:}read', ), '{DAV:}read-current-user-privilege-set' => array( 'privilege' => '{DAV:}read-current-user-privilege-set', 'abstract' => true, 'aggregates' => array(), 'concrete' => '{DAV:}read', ), '{DAV:}write' => array( 'privilege' => '{DAV:}write', 'abstract' => false, 'aggregates' => array( '{DAV:}write-acl', '{DAV:}write-properties', '{DAV:}write-content', '{DAV:}bind', '{DAV:}unbind', '{DAV:}unlock', ), 'concrete' => '{DAV:}write', ), '{DAV:}write-acl' => array( 'privilege' => '{DAV:}write-acl', 'abstract' => true, 'aggregates' => array(), 'concrete' => '{DAV:}write', ), '{DAV:}write-properties' => array( 'privilege' => '{DAV:}write-properties', 'abstract' => true, 'aggregates' => array(), 'concrete' => '{DAV:}write', ), '{DAV:}write-content' => array( 'privilege' => '{DAV:}write-content', 'abstract' => true, 'aggregates' => array(), 'concrete' => '{DAV:}write', ), '{DAV:}unlock' => array( 'privilege' => '{DAV:}unlock', 'abstract' => true, 'aggregates' => array(), 'concrete' => '{DAV:}write', ), '{DAV:}bind' => array( 'privilege' => '{DAV:}bind', 'abstract' => true, 'aggregates' => array(), 'concrete' => '{DAV:}write', ), '{DAV:}unbind' => array( 'privilege' => '{DAV:}unbind', 'abstract' => true, 'aggregates' => array(), 'concrete' => '{DAV:}write', ), ); $plugin = new Plugin(); $server = new DAV\Server(); $server->addPlugin($plugin); $this->assertEquals($expected, $plugin->getFlatPrivilegeSet('')); } function testCurrentUserPrincipalsNotLoggedIn() { $acl = new Plugin(); $server = new DAV\Server(); $server->addPlugin($acl); $this->assertEquals(array(),$acl->getCurrentUserPrincipals()); } function testCurrentUserPrincipalsSimple() { $tree = array( new DAV\SimpleCollection('principals', array( new MockPrincipal('admin','principals/admin'), )) ); $acl = new Plugin(); $server = new DAV\Server($tree); $server->addPlugin($acl); $auth = new DAV\Auth\Plugin(new DAV\Auth\Backend\Mock(),'SabreDAV'); $server->addPlugin($auth); //forcing login $auth->beforeMethod('GET','/'); $this->assertEquals(array('principals/admin'),$acl->getCurrentUserPrincipals()); } function testCurrentUserPrincipalsGroups() { $tree = array( new DAV\SimpleCollection('principals', array( new MockPrincipal('admin','principals/admin',array('principals/administrators', 'principals/everyone')), new MockPrincipal('administrators','principals/administrators',array('principals/groups'), array('principals/admin')), new MockPrincipal('everyone','principals/everyone',array(), array('principals/admin')), new MockPrincipal('groups','principals/groups',array(), array('principals/administrators')), )) ); $acl = new Plugin(); $server = new DAV\Server($tree); $server->addPlugin($acl); $auth = new DAV\Auth\Plugin(new DAV\Auth\Backend\Mock(),'SabreDAV'); $server->addPlugin($auth); //forcing login $auth->beforeMethod('GET','/'); $expected = array( 'principals/admin', 'principals/administrators', 'principals/everyone', 'principals/groups', ); $this->assertEquals($expected,$acl->getCurrentUserPrincipals()); // The second one should trigger the cache and be identical $this->assertEquals($expected,$acl->getCurrentUserPrincipals()); } function testGetACL() { $acl = array( array( 'principal' => 'principals/admin', 'privilege' => '{DAV:}read', ), array( 'principal' => 'principals/admin', 'privilege' => '{DAV:}write', ), ); $tree = array( new MockACLNode('foo',$acl), ); $server = new DAV\Server($tree); $aclPlugin = new Plugin(); $server->addPlugin($aclPlugin); $this->assertEquals($acl,$aclPlugin->getACL('foo')); } function testGetCurrentUserPrivilegeSet() { $acl = array( array( 'principal' => 'principals/admin', 'privilege' => '{DAV:}read', ), array( 'principal' => 'principals/user1', 'privilege' => '{DAV:}read', ), array( 'principal' => 'principals/admin', 'privilege' => '{DAV:}write', ), ); $tree = array( new MockACLNode('foo',$acl), new DAV\SimpleCollection('principals', array( new MockPrincipal('admin','principals/admin'), )), ); $server = new DAV\Server($tree); $aclPlugin = new Plugin(); $server->addPlugin($aclPlugin); $auth = new DAV\Auth\Plugin(new DAV\Auth\Backend\Mock(),'SabreDAV'); $server->addPlugin($auth); //forcing login $auth->beforeMethod('GET','/'); $expected = array( '{DAV:}write', '{DAV:}write-acl', '{DAV:}write-properties', '{DAV:}write-content', '{DAV:}bind', '{DAV:}unbind', '{DAV:}unlock', '{DAV:}read', '{DAV:}read-acl', '{DAV:}read-current-user-privilege-set', ); $this->assertEquals($expected,$aclPlugin->getCurrentUserPrivilegeSet('foo')); } function testCheckPrivileges() { $acl = array( array( 'principal' => 'principals/admin', 'privilege' => '{DAV:}read', ), array( 'principal' => 'principals/user1', 'privilege' => '{DAV:}read', ), array( 'principal' => 'principals/admin', 'privilege' => '{DAV:}write', ), ); $tree = array( new MockACLNode('foo',$acl), new DAV\SimpleCollection('principals', array( new MockPrincipal('admin','principals/admin'), )), ); $server = new DAV\Server($tree); $aclPlugin = new Plugin(); $server->addPlugin($aclPlugin); $auth = new DAV\Auth\Plugin(new DAV\Auth\Backend\Mock(),'SabreDAV'); $server->addPlugin($auth); //forcing login //$auth->beforeMethod('GET','/'); $this->assertFalse($aclPlugin->checkPrivileges('foo', array('{DAV:}read'), Plugin::R_PARENT, false)); } } sabre-dav-1.8.12/tests/Sabre/DAVACL/VersionTest.php000066400000000000000000000005121246001162500215700ustar00rootroot00000000000000assertEquals(-1, version_compare('1.0.0',$v)); $s = Version::STABILITY; $this->assertTrue($s == 'alpha' || $s == 'beta' || $s =='stable'); } } sabre-dav-1.8.12/tests/Sabre/DAVServerTest.php000066400000000000000000000120621246001162500210150ustar00rootroot00000000000000setUpBackends(); $this->setUpTree(); $this->server = new DAV\Server($this->tree); $this->server->debugExceptions = true; if ($this->setupCalDAV) { $this->caldavPlugin = new CalDAV\Plugin(); $this->server->addPlugin($this->caldavPlugin); } if ($this->setupCalDAVSharing) { $this->caldavSharingPlugin = new CalDAV\SharingPlugin(); $this->server->addPlugin($this->caldavSharingPlugin); } if ($this->setupCardDAV) { $this->carddavPlugin = new CardDAV\Plugin(); $this->server->addPlugin($this->carddavPlugin); } if ($this->setupACL) { $this->aclPlugin = new DAVACL\Plugin(); $this->server->addPlugin($this->aclPlugin); } if ($this->autoLogin) { $authBackend = new DAV\Auth\Backend\Mock(); $authBackend->defaultUser = $this->autoLogin; $this->authPlugin = new DAV\Auth\Plugin($authBackend, 'SabreDAV'); $this->server->addPlugin($this->authPlugin); // This will trigger the actual login procedure $this->authPlugin->beforeMethod('OPTIONS','/'); } } /** * Makes a request, and returns a response object. * * You can either pass an instance of Sabre\HTTP\Request, or an array, * which will then be used as the _SERVER array. * * @param array|\Sabre\HTTP\Request $request * @return \Sabre\HTTP\Response */ function request($request) { if (is_array($request)) { $request = new HTTP\Request($request); } $this->server->httpRequest = $request; $this->server->httpResponse = new HTTP\ResponseMock(); $this->server->exec(); return $this->server->httpResponse; } function setUpTree() { if ($this->setupCalDAV) { $this->tree[] = new CalDAV\CalendarRootNode( $this->principalBackend, $this->caldavBackend ); } if ($this->setupCardDAV) { $this->tree[] = new CardDAV\AddressBookRoot( $this->principalBackend, $this->carddavBackend ); } if ($this->setupCardDAV || $this->setupCalDAV) { $this->tree[] = new DAVACL\PrincipalCollection( $this->principalBackend ); } } function setUpBackends() { if ($this->setupCalDAV && is_null($this->caldavBackend)) { $this->caldavBackend = new CalDAV\Backend\Mock($this->caldavCalendars, $this->caldavCalendarObjects); } if ($this->setupCardDAV && is_null($this->carddavBackend)) { $this->carddavBackend = new CardDAV\Backend\Mock($this->carddavAddressBooks, $this->carddavCards); } if ($this->setupCardDAV || $this->setupCalDAV) { $this->principalBackend = new DAVACL\PrincipalBackend\Mock(); } } function assertHTTPStatus($expectedStatus, HTTP\Request $req) { $resp = $this->request($req); $this->assertEquals($resp->getStatusMessage($expectedStatus), $resp->status,'Incorrect HTTP status received: ' . $resp->body); } } sabre-dav-1.8.12/tests/Sabre/HTTP/000077500000000000000000000000001246001162500164215ustar00rootroot00000000000000sabre-dav-1.8.12/tests/Sabre/HTTP/AWSAuthTest.php000066400000000000000000000155551246001162500212610ustar00rootroot00000000000000response = new ResponseMock(); $this->auth = new AWSAuth(); $this->auth->setRealm(self::REALM); $this->auth->setHTTPResponse($this->response); } public function testNoHeader() { $request = new Request(array( 'REQUEST_METHOD' => 'GET', )); $this->auth->setHTTPRequest($request); $result = $this->auth->init(); $this->assertFalse($result,'No AWS Authorization header was supplied, so we should have gotten false'); $this->assertEquals(AWSAuth::ERR_NOAWSHEADER,$this->auth->errorCode); } public function testIncorrectContentMD5() { $accessKey = 'accessKey'; $secretKey = 'secretKey'; $request = new Request(array( 'REQUEST_METHOD' => 'GET', 'HTTP_AUTHORIZATION' => "AWS $accessKey:sig", 'HTTP_CONTENT_MD5' => 'garbage', 'REQUEST_URI' => '/', )); $this->auth->setHTTPRequest($request); $this->auth->init(); $result = $this->auth->validate($secretKey); $this->assertFalse($result); $this->assertEquals(AWSAuth::ERR_MD5CHECKSUMWRONG,$this->auth->errorCode); } public function testNoDate() { $accessKey = 'accessKey'; $secretKey = 'secretKey'; $content = 'thisisthebody'; $contentMD5 = base64_encode(md5($content,true)); $request = new Request(array( 'REQUEST_METHOD' => 'POST', 'HTTP_AUTHORIZATION' => "AWS $accessKey:sig", 'HTTP_CONTENT_MD5' => $contentMD5, )); $request->setBody($content); $this->auth->setHTTPRequest($request); $this->auth->init(); $result = $this->auth->validate($secretKey); $this->assertFalse($result); $this->assertEquals(AWSAuth::ERR_INVALIDDATEFORMAT,$this->auth->errorCode); } public function testFutureDate() { $accessKey = 'accessKey'; $secretKey = 'secretKey'; $content = 'thisisthebody'; $contentMD5 = base64_encode(md5($content,true)); $date = new \DateTime('@' . (time() + (60*20))); $date->setTimeZone(new \DateTimeZone('GMT')); $date = $date->format('D, d M Y H:i:s \\G\\M\\T'); $request = new Request(array( 'REQUEST_METHOD' => 'POST', 'HTTP_AUTHORIZATION' => "AWS $accessKey:sig", 'HTTP_CONTENT_MD5' => $contentMD5, 'HTTP_DATE' => $date, )); $request->setBody($content); $this->auth->setHTTPRequest($request); $this->auth->init(); $result = $this->auth->validate($secretKey); $this->assertFalse($result); $this->assertEquals(AWSAuth::ERR_REQUESTTIMESKEWED,$this->auth->errorCode); } public function testPastDate() { $accessKey = 'accessKey'; $secretKey = 'secretKey'; $content = 'thisisthebody'; $contentMD5 = base64_encode(md5($content,true)); $date = new \DateTime('@' . (time() - (60*20))); $date->setTimeZone(new \DateTimeZone('GMT')); $date = $date->format('D, d M Y H:i:s \\G\\M\\T'); $request = new Request(array( 'REQUEST_METHOD' => 'POST', 'HTTP_AUTHORIZATION' => "AWS $accessKey:sig", 'HTTP_CONTENT_MD5' => $contentMD5, 'HTTP_X_AMZ_DATE' => $date, )); $request->setBody($content); $this->auth->setHTTPRequest($request); $this->auth->init(); $result = $this->auth->validate($secretKey); $this->assertFalse($result); $this->assertEquals(AWSAuth::ERR_REQUESTTIMESKEWED,$this->auth->errorCode); } public function testIncorrectSignature() { $accessKey = 'accessKey'; $secretKey = 'secretKey'; $content = 'thisisthebody'; $contentMD5 = base64_encode(md5($content,true)); $date = new \DateTime('now'); $date->setTimeZone(new \DateTimeZone('GMT')); $date = $date->format('D, d M Y H:i:s \\G\\M\\T'); $request = new Request(array( 'REQUEST_METHOD' => 'POST', 'HTTP_AUTHORIZATION' => "AWS $accessKey:sig", 'HTTP_CONTENT_MD5' => $contentMD5, 'HTTP_X_AMZ_DATE' => $date, 'REQUEST_URI' => '/', )); $request->setBody($content); $this->auth->setHTTPRequest($request); $this->auth->init(); $result = $this->auth->validate($secretKey); $this->assertFalse($result); $this->assertEquals(AWSAuth::ERR_INVALIDSIGNATURE,$this->auth->errorCode); } public function testValidRequest() { $accessKey = 'accessKey'; $secretKey = 'secretKey'; $content = 'thisisthebody'; $contentMD5 = base64_encode(md5($content,true)); $date = new \DateTime('now'); $date->setTimeZone(new \DateTimeZone('GMT')); $date = $date->format('D, d M Y H:i:s \\G\\M\\T'); $sig = base64_encode($this->hmacsha1($secretKey, "POST\n$contentMD5\n\n$date\nx-amz-date:$date\n/evert" )); $request = new Request(array( 'REQUEST_METHOD' => 'POST', 'HTTP_AUTHORIZATION' => "AWS $accessKey:$sig", 'HTTP_CONTENT_MD5' => $contentMD5, 'HTTP_X_AMZ_DATE' => $date, 'REQUEST_URI' => '/evert', )); $request->setBody($content); $this->auth->setHTTPRequest($request); $this->auth->init(); $result = $this->auth->validate($secretKey); $this->assertTrue($result,'Signature did not validate, got errorcode ' . $this->auth->errorCode); $this->assertEquals($accessKey,$this->auth->getAccessKey()); } public function test401() { $this->auth->requireLogin(); $test = preg_match('/^AWS$/',$this->response->headers['WWW-Authenticate'],$matches); $this->assertTrue($test==true,'The WWW-Authenticate response didn\'t match our pattern'); } /** * Generates an HMAC-SHA1 signature * * @param string $key * @param string $message * @return string */ private function hmacsha1($key, $message) { $blocksize=64; if (strlen($key)>$blocksize) $key=pack('H*', sha1($key)); $key=str_pad($key,$blocksize,chr(0x00)); $ipad=str_repeat(chr(0x36),$blocksize); $opad=str_repeat(chr(0x5c),$blocksize); $hmac = pack('H*',sha1(($key^$opad).pack('H*',sha1(($key^$ipad).$message)))); return $hmac; } } sabre-dav-1.8.12/tests/Sabre/HTTP/BasicAuthTest.php000066400000000000000000000067201246001162500216420ustar00rootroot00000000000000response = new ResponseMock(); $this->basicAuth = new BasicAuth(); $this->basicAuth->setHTTPResponse($this->response); } function testGetUserPassApache() { $server = array( 'PHP_AUTH_USER' => 'admin', 'PHP_AUTH_PW' => '1234', ); $request = new Request($server); $this->basicAuth->setHTTPRequest($request); $userPass = $this->basicAuth->getUserPass(); $this->assertEquals( array('admin','1234'), $userPass, 'We did not get the username and password we expected' ); } function testGetUserPassPasswordEmpty() { $server = array( 'PHP_AUTH_USER' => 'admin', 'PHP_AUTH_PW' => '', ); $request = new Request($server); $this->basicAuth->setHTTPRequest($request); $userPass = $this->basicAuth->getUserPass(); $this->assertEquals( array('admin',''), $userPass, 'We did not get the username and password we expected' ); } function testGetUserPassIIS() { $server = array( 'HTTP_AUTHORIZATION' => 'Basic ' . base64_encode('admin:1234'), ); $request = new Request($server); $this->basicAuth->setHTTPRequest($request); $userPass = $this->basicAuth->getUserPass(); $this->assertEquals( array('admin','1234'), $userPass, 'We did not get the username and password we expected' ); } function testGetUserPassWithColon() { $server = array( 'HTTP_AUTHORIZATION' => 'Basic ' . base64_encode('admin:1234:5678'), ); $request = new Request($server); $this->basicAuth->setHTTPRequest($request); $userPass = $this->basicAuth->getUserPass(); $this->assertEquals( array('admin','1234:5678'), $userPass, 'We did not get the username and password we expected' ); } function testGetUserPassApacheEdgeCase() { $server = array( 'REDIRECT_HTTP_AUTHORIZATION' => 'Basic ' . base64_encode('admin:1234'), ); $request = new Request($server); $this->basicAuth->setHTTPRequest($request); $userPass = $this->basicAuth->getUserPass(); $this->assertEquals( array('admin','1234'), $userPass, 'We did not get the username and password we expected' ); } function testGetUserPassNothing() { $this->assertEquals( false, $this->basicAuth->getUserPass() ); } function testRequireLogin() { $this->basicAuth->requireLogin(); $this->assertEquals('SabreDAV',$this->basicAuth->getRealm()); $this->assertEquals( 'HTTP/1.1 401 Unauthorized', $this->response->status, 'We expected a 401 status to be set' ); $this->assertEquals( 'Basic realm="SabreDAV"', $this->response->headers['WWW-Authenticate'], 'The WWW-Autenticate header was not set!' ); } } sabre-dav-1.8.12/tests/Sabre/HTTP/DigestAuthTest.php000066400000000000000000000167661246001162500220530ustar00rootroot00000000000000response = new ResponseMock(); $this->auth = new DigestAuth(); $this->auth->setRealm(self::REALM); $this->auth->setHTTPResponse($this->response); } public function testDigest() { list($nonce,$opaque) = $this->getServerTokens(); $username = 'admin'; $password = 12345; $nc = '00002'; $cnonce = uniqid(); $digestHash = md5( md5($username . ':' . self::REALM . ':' . $password) . ':' . $nonce . ':' . $nc . ':' . $cnonce . ':' . 'auth:' . md5('GET' . ':' . '/') ); $request = new Request(array( 'REQUEST_METHOD' => 'GET', 'PHP_AUTH_DIGEST' => 'username="'.$username.'", realm="' . self::REALM . '", nonce="' . $nonce . '", uri="/", response="' . $digestHash . '", opaque="' . $opaque . '", qop=auth,nc='.$nc.',cnonce="' . $cnonce . '"', )); $this->auth->setHTTPRequest($request); $this->auth->init(); $this->assertEquals($username,$this->auth->getUserName()); $this->assertEquals(self::REALM,$this->auth->getRealm()); $this->assertTrue($this->auth->validateA1(md5($username . ':' . self::REALM . ':' . $password)),'Authentication is deemed invalid through validateA1'); $this->assertTrue($this->auth->validatePassword($password),'Authentication is deemed invalid through validatePassword'); } public function testDigestCGIFormat() { list($nonce,$opaque) = $this->getServerTokens(); $username = 'admin'; $password = 12345; $nc = '00002'; $cnonce = uniqid(); $digestHash = md5( md5($username . ':' . self::REALM . ':' . $password) . ':' . $nonce . ':' . $nc . ':' . $cnonce . ':' . 'auth:' . md5('GET' . ':' . '/') ); $request = new Request(array( 'REQUEST_METHOD' => 'GET', 'HTTP_AUTHORIZATION' => 'Digest username="'.$username.'", realm="' . self::REALM . '", nonce="' . $nonce . '", uri="/", response="' . $digestHash . '", opaque="' . $opaque . '", qop=auth,nc='.$nc.',cnonce="' . $cnonce . '"', )); $this->auth->setHTTPRequest($request); $this->auth->init(); $this->assertTrue($this->auth->validateA1(md5($username . ':' . self::REALM . ':' . $password)),'Authentication is deemed invalid through validateA1'); $this->assertTrue($this->auth->validatePassword($password),'Authentication is deemed invalid through validatePassword'); } public function testDigestApacheEdgeCase() { list($nonce,$opaque) = $this->getServerTokens(); $username = 'admin'; $password = 12345; $nc = '00002'; $cnonce = uniqid(); $digestHash = md5( md5($username . ':' . self::REALM . ':' . $password) . ':' . $nonce . ':' . $nc . ':' . $cnonce . ':' . 'auth:' . md5('GET' . ':' . '/') ); $request = new Request(array( 'REQUEST_METHOD' => 'GET', 'REDIRECT_HTTP_AUTHORIZATION' => 'Digest username="'.$username.'", realm="' . self::REALM . '", nonce="' . $nonce . '", uri="/", response="' . $digestHash . '", opaque="' . $opaque . '", qop=auth,nc='.$nc.',cnonce="' . $cnonce . '"', )); $this->auth->setHTTPRequest($request); $this->auth->init(); $this->assertTrue($this->auth->validateA1(md5($username . ':' . self::REALM . ':' . $password)),'Authentication is deemed invalid through validateA1'); $this->assertTrue($this->auth->validatePassword($password),'Authentication is deemed invalid through validatePassword'); } public function testInvalidDigest() { list($nonce,$opaque) = $this->getServerTokens(); $username = 'admin'; $password = 12345; $nc = '00002'; $cnonce = uniqid(); $digestHash = md5( md5($username . ':' . self::REALM . ':' . $password) . ':' . $nonce . ':' . $nc . ':' . $cnonce . ':' . 'auth:' . md5('GET' . ':' . '/') ); $request = new Request(array( 'REQUEST_METHOD' => 'GET', 'PHP_AUTH_DIGEST' => 'username="'.$username.'", realm="' . self::REALM . '", nonce="' . $nonce . '", uri="/", response="' . $digestHash . '", opaque="' . $opaque . '", qop=auth,nc='.$nc.',cnonce="' . $cnonce . '"', )); $this->auth->setHTTPRequest($request); $this->auth->init(); $this->assertFalse($this->auth->validateA1(md5($username . ':' . self::REALM . ':' . ($password . 'randomness'))),'Authentication is deemed invalid through validateA1'); } public function testInvalidDigest2() { $request = new Request(array( 'REQUEST_METHOD' => 'GET', 'HTTP_AUTHORIZATION' => 'basic blablabla', )); $this->auth->setHTTPRequest($request); $this->auth->init(); $this->assertFalse($this->auth->validateA1(md5('user:realm:password'))); } public function testDigestAuthInt() { $this->auth->setQOP(DigestAuth::QOP_AUTHINT | DigestAuth::QOP_AUTH); list($nonce,$opaque) = $this->getServerTokens(DigestAuth::QOP_AUTHINT| DigestAuth::QOP_AUTH); $username = 'admin'; $password = 12345; $nc = '00003'; $cnonce = uniqid(); $digestHash = md5( md5($username . ':' . self::REALM . ':' . $password) . ':' . $nonce . ':' . $nc . ':' . $cnonce . ':' . 'auth-int:' . md5('POST' . ':' . '/' . ':' . md5('body')) ); $request = new Request(array( 'REQUEST_METHOD' => 'POST', 'PHP_AUTH_DIGEST' => 'username="'.$username.'", realm="' . self::REALM . '", nonce="' . $nonce . '", uri="/", response="' . $digestHash . '", opaque="' . $opaque . '", qop=auth-int,nc='.$nc.',cnonce="' . $cnonce . '"', )); $request->setBody('body'); $this->auth->setHTTPRequest($request); $this->auth->init(); $this->assertTrue($this->auth->validateA1(md5($username . ':' . self::REALM . ':' . $password)),'Authentication is deemed invalid through validateA1'); } private function getServerTokens($qop = DigestAuth::QOP_AUTH) { $this->auth->requireLogin(); switch($qop) { case DigestAuth::QOP_AUTH : $qopstr='auth'; break; case DigestAuth::QOP_AUTHINT : $qopstr='auth-int'; break; default : $qopstr='auth,auth-int'; break; } $test = preg_match('/Digest realm="'.self::REALM.'",qop="'.$qopstr.'",nonce="([0-9a-f]*)",opaque="([0-9a-f]*)"/', $this->response->headers['WWW-Authenticate'],$matches); $this->assertTrue($test==true,'The WWW-Authenticate response didn\'t match our pattern. We received: ' . $this->response->headers['WWW-Authenticate']); $nonce = $matches[1]; $opaque = $matches[2]; // Reset our environment $this->setUp(); $this->auth->setQOP($qop); return array($nonce,$opaque); } } sabre-dav-1.8.12/tests/Sabre/HTTP/RequestTest.php000066400000000000000000000065641246001162500214350ustar00rootroot00000000000000 'www.example.org', 'REQUEST_METHOD' => 'PUT', 'REQUEST_URI' => '/testuri/', 'CONTENT_TYPE' => 'text/xml', ); $this->request = new Request($server); } function testGetHeader() { $this->assertEquals('www.example.org', $this->request->getHeader('Host')); $this->assertEquals('text/xml', $this->request->getHeader('Content-Type')); } function testGetNonExistantHeader() { $this->assertNull($this->request->getHeader('doesntexist')); $this->assertNull($this->request->getHeader('Content-Length')); } function testGetHeaders() { $expected = array( 'host' => 'www.example.org', 'content-type' => 'text/xml', ); $this->assertEquals($expected, $this->request->getHeaders()); } function testGetMethod() { $this->assertEquals('PUT', $this->request->getMethod(), 'It seems as if we didn\'t get a valid HTTP Request method back'); } function testGetUri() { $this->assertEquals('/testuri/', $this->request->getUri(), 'We got an invalid uri back'); } function testSetGetBody() { $h = fopen('php://memory','r+'); fwrite($h,'testing'); rewind($h); $this->request->setBody($h); $this->assertEquals('testing',$this->request->getBody(true),'We didn\'t get our testbody back'); } function testSetGetBodyStream() { $h = fopen('php://memory','r+'); fwrite($h,'testing'); rewind($h); $this->request->setBody($h); $this->assertEquals('testing',stream_get_contents($this->request->getBody()),'We didn\'t get our testbody back'); } function testDefaultInputStream() { $h = fopen('php://memory','r+'); fwrite($h,'testing'); rewind($h); $previousValue = Request::$defaultInputStream; Request::$defaultInputStream = $h; $this->assertEquals('testing',$this->request->getBody(true),'We didn\'t get our testbody back'); Request::$defaultInputStream = $previousValue; } function testGetAbsoluteUri() { $s = array( 'HTTP_HOST' => 'sabredav.org', 'REQUEST_URI' => '/foo' ); $r = new Request($s); $this->assertEquals('http://sabredav.org/foo', $r->getAbsoluteUri()); $s = array( 'HTTP_HOST' => 'sabredav.org', 'REQUEST_URI' => '/foo', 'HTTPS' => 'on', ); $r = new Request($s); $this->assertEquals('https://sabredav.org/foo', $r->getAbsoluteUri()); } function testGetQueryString() { $s = array( 'QUERY_STRING' => 'bla', ); $r = new Request($s); $this->assertEquals('bla', $r->getQueryString()); $s = array(); $r = new Request($s); $this->assertEquals('', $r->getQueryString()); } function testGetPostVars() { $post = array( 'bla' => 'foo', ); $r = new Request(array(),$post); $this->assertEquals($post, $r->getPostVars('bla')); } } sabre-dav-1.8.12/tests/Sabre/HTTP/ResponseMock.php000066400000000000000000000007031246001162500215420ustar00rootroot00000000000000headers[$name] = $value; } function sendStatus($code) { $this->status = $this->getStatusMessage($code, $this->defaultHttpVersion); } function sendBody($body) { $this->body = $body; } } sabre-dav-1.8.12/tests/Sabre/HTTP/ResponseTest.php000066400000000000000000000027041246001162500215730ustar00rootroot00000000000000response = new ResponseMock(); } function testGetStatusMessage() { $msg = $this->response->getStatusMessage(200); $this->assertEquals('HTTP/1.1 200 OK',$msg); } function testSetHeader() { $this->response->setHeader('Content-Type','text/html'); $this->assertEquals('text/html', $this->response->headers['Content-Type']); } function testSetHeaders() { $this->response->setHeaders(array('Content-Type'=>'text/html')); $this->assertEquals('text/html', $this->response->headers['Content-Type']); } function testSendStatus() { $this->response->sendStatus(404); $this->assertEquals('HTTP/1.1 404 Not Found', $this->response->status); } function testSendBody() { ob_start(); $response = new Response(); $response->sendBody('hello'); $this->assertEquals('hello',ob_get_clean()); } function testSendBodyStream() { ob_start(); $stream = fopen('php://memory','r+'); fwrite($stream,'hello'); rewind($stream); $response = new Response(); $response->sendBody($stream); $this->assertEquals('hello',ob_get_clean()); } } sabre-dav-1.8.12/tests/Sabre/HTTP/UtilTest.php000066400000000000000000000035271246001162500207160ustar00rootroot00000000000000assertEquals($expected, $result->format('U')); } $result = Util::parseHTTPDate('Wed Oct 6 10:26:00 2010'); $this->assertEquals(1286360760, $result->format('U')); } function testParseHTTPDateFail() { $times = array( //random string 'NOW', // not-GMT timezone 'Wednesday, 13-Oct-10 10:26:00 UTC', // No space before the 6 'Wed Oct 6 10:26:00 2010', ); foreach($times as $time) { $this->assertFalse(Util::parseHTTPDate($time), 'We used the string: ' . $time); } } function testTimezones() { $default = date_default_timezone_get(); date_default_timezone_set('Europe/Amsterdam'); $this->testParseHTTPDate(); date_default_timezone_set($default); } function testToHTTPDate() { $dt = new \DateTime('2011-12-10 12:00:00 +0200'); $this->assertEquals( 'Sat, 10 Dec 2011 10:00:00 GMT', Util::toHTTPDate($dt) ); } function testStrtotimeFail() { // Strtotime may return -1 when the date cannot be parsed. // We are simulating this situation by testing a date that actually // results in -1. (because I have found no other way to break this // code) $time = 'Wed, 13 Oct 1960 10:26:00 GMT'; $this->assertNull(Util::parseHTTPDate($time)); } } sabre-dav-1.8.12/tests/Sabre/HTTP/VersionTest.php000066400000000000000000000005101246001162500214130ustar00rootroot00000000000000assertEquals(-1, version_compare('1.0.0',$v)); $s = Version::STABILITY; $this->assertTrue($s == 'alpha' || $s == 'beta' || $s =='stable'); } } sabre-dav-1.8.12/tests/Sabre/TestUtil.php000066400000000000000000000017471246001162500201410ustar00rootroot00000000000000setAttribute(\PDO::ATTR_ERRMODE,\PDO::ERRMODE_EXCEPTION); return $pdo; } catch (\PDOException $e) { return null; } } } sabre-dav-1.8.12/tests/bootstrap.php000066400000000000000000000015441246001162500173400ustar00rootroot00000000000000=5.3.1", "sabre/vobject" : "~3.3.0", "ext-dom": "*", "ext-pcre": "*", "ext-spl": "*", "ext-simplexml": "*", "ext-mbstring" : "*", "ext-ctype" : "*", "ext-date" : "*", "ext-iconv" : "*", "ext-libxml" : "*" }, "require-dev" : { "phpunit/phpunit" : "~4.0.0", "phing/phing" : "~2.7.0" }, "provide" : { "evert/sabredav" : "1.7.*" }, "suggest" : { "ext-apc" : "*", "ext-curl" : "*", "ext-pdo" : "*" }, "autoload": { "psr-0": { "Sabre": "lib/" } }, "support" : { "forum" : "https://groups.google.com/group/sabredav-discuss", "source" : "https://github.com/evert/sabredav" }, "config" : { "bin-dir" : "./bin" } } sabre-dav-1.8.12/tests/phpunit.xml000066400000000000000000000014571246001162500170260ustar00rootroot00000000000000 Sabre/ ../lib/ ../lib/Sabre/autoload.php ../lib/Sabre/CalDAV/includes.php ../lib/Sabre/CardDAV/includes.php ../lib/Sabre/DAVACL/includes.php ../lib/Sabre/HTTP/includes.php ../lib/Sabre/DAV/includes.php ../lib/Sabre/VObject/includes.php