1 # Copyright 2011-2012 GRNET S.A. All rights reserved.
3 # Redistribution and use in source and binary forms, with or
4 # without modification, are permitted provided that the following
7 # 1. Redistributions of source code must retain the above
8 # copyright notice, this list of conditions and the following
11 # 2. Redistributions in binary form must reproduce the above
12 # copyright notice, this list of conditions and the following
13 # disclaimer in the documentation and/or other materials
14 # provided with the distribution.
16 # THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
17 # OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18 # WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
20 # CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21 # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22 # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23 # USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24 # AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
26 # ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27 # POSSIBILITY OF SUCH DAMAGE.
29 # The views and conclusions contained in the software and
30 # documentation are those of the authors and should not be
31 # interpreted as representing official policies, either expressed
32 # or implied, of GRNET S.A.
34 from xml.dom import minidom
36 from django.conf import settings
37 from django.http import HttpResponse
38 from django.template.loader import render_to_string
39 from django.utils import simplejson as json
40 from django.utils.http import parse_etags
41 from django.utils.encoding import smart_str
42 from django.views.decorators.csrf import csrf_exempt
44 from synnefo.lib.astakos import get_user
46 from pithos.api.faults import (Fault, NotModified, BadRequest, Unauthorized, Forbidden, ItemNotFound, Conflict,
47 LengthRequired, PreconditionFailed, RequestEntityTooLarge, RangeNotSatisfiable, UnprocessableEntity)
48 from pithos.api.util import (json_encode_decimal, rename_meta_key, format_header_key, printable_header_dict,
49 get_account_headers, put_account_headers, get_container_headers, put_container_headers, get_object_headers,
50 put_object_headers, update_manifest_meta, update_sharing_meta, update_public_meta,
51 validate_modification_preconditions, validate_matching_preconditions, split_container_object_string,
52 copy_or_move_object, get_int_parameter, get_content_length, get_content_range, socket_read_iterator,
53 SaveToBackendHandler, object_data_response, put_object_block, hashmap_md5, simple_list_response, api_method)
54 from pithos.api.settings import AUTHENTICATION_URL, AUTHENTICATION_USERS, COOKIE_NAME
56 from pithos.backends.base import NotAllowedError, QuotaError
57 from pithos.backends.filter import parse_filters
63 logger = logging.getLogger(__name__)
67 def top_demux(request):
68 get_user(request, AUTHENTICATION_URL, AUTHENTICATION_USERS)
69 if request.method == 'GET':
70 if getattr(request, 'user', None) is not None:
71 return account_list(request)
72 return authenticate(request)
74 return method_not_allowed(request)
77 def account_demux(request, v_account):
78 get_user(request, AUTHENTICATION_URL, AUTHENTICATION_USERS)
79 if request.method == 'HEAD':
80 return account_meta(request, v_account)
81 elif request.method == 'POST':
82 return account_update(request, v_account)
83 elif request.method == 'GET':
84 return container_list(request, v_account)
86 return method_not_allowed(request)
89 def container_demux(request, v_account, v_container):
90 get_user(request, AUTHENTICATION_URL, AUTHENTICATION_USERS)
91 if request.method == 'HEAD':
92 return container_meta(request, v_account, v_container)
93 elif request.method == 'PUT':
94 return container_create(request, v_account, v_container)
95 elif request.method == 'POST':
96 return container_update(request, v_account, v_container)
97 elif request.method == 'DELETE':
98 return container_delete(request, v_account, v_container)
99 elif request.method == 'GET':
100 return object_list(request, v_account, v_container)
102 return method_not_allowed(request)
105 def object_demux(request, v_account, v_container, v_object):
106 # Helper to avoid placing the token in the URL when loading objects from a browser.
108 if request.method in ('HEAD', 'GET') and COOKIE_NAME in request.COOKIES:
109 cookie_value = unquote(request.COOKIES.get('COOKIE_NAME', ''))
110 if cookie_value and '|' in cookie_value:
111 token = cookie_value.split('|', 1)[1]
112 get_user(request, AUTHENTICATION_URL, AUTHENTICATION_USERS, token)
113 if request.method == 'HEAD':
114 return object_meta(request, v_account, v_container, v_object)
115 elif request.method == 'GET':
116 return object_read(request, v_account, v_container, v_object)
117 elif request.method == 'PUT':
118 return object_write(request, v_account, v_container, v_object)
119 elif request.method == 'COPY':
120 return object_copy(request, v_account, v_container, v_object)
121 elif request.method == 'MOVE':
122 return object_move(request, v_account, v_container, v_object)
123 elif request.method == 'POST':
124 if request.META.get('CONTENT_TYPE', '').startswith('multipart/form-data'):
125 return object_write_form(request, v_account, v_container, v_object)
126 return object_update(request, v_account, v_container, v_object)
127 elif request.method == 'DELETE':
128 return object_delete(request, v_account, v_container, v_object)
130 return method_not_allowed(request)
132 @api_method('GET', user_required=False)
133 def authenticate(request):
134 # Normal Response Codes: 204
135 # Error Response Codes: internalServerError (500),
139 x_auth_user = request.META.get('HTTP_X_AUTH_USER')
140 x_auth_key = request.META.get('HTTP_X_AUTH_KEY')
141 if not x_auth_user or not x_auth_key:
142 raise BadRequest('Missing X-Auth-User or X-Auth-Key header')
143 response = HttpResponse(status=204)
145 uri = request.build_absolute_uri()
147 uri = uri[:uri.find('?')]
149 response['X-Auth-Token'] = x_auth_key
150 response['X-Storage-Url'] = uri + ('' if uri.endswith('/') else '/') + x_auth_user
153 @api_method('GET', format_allowed=True)
154 def account_list(request):
155 # Normal Response Codes: 200, 204
156 # Error Response Codes: internalServerError (500),
159 response = HttpResponse()
161 marker = request.GET.get('marker')
162 limit = get_int_parameter(request.GET.get('limit'))
166 accounts = request.backend.list_accounts(request.user_uniq, marker, limit)
168 if request.serialization == 'text':
169 if len(accounts) == 0:
170 # The cloudfiles python bindings expect 200 if json/xml.
171 response.status_code = 204
173 response.status_code = 200
174 response.content = '\n'.join(accounts) + '\n'
179 if x == request.user_uniq:
182 meta = request.backend.get_account_meta(request.user_uniq, x, 'pithos', include_user_defined=False)
183 groups = request.backend.get_account_groups(request.user_uniq, x)
184 except NotAllowedError:
185 raise Forbidden('Not allowed')
187 rename_meta_key(meta, 'modified', 'last_modified')
188 rename_meta_key(meta, 'until_timestamp', 'x_account_until_timestamp')
190 meta['X-Account-Group'] = printable_header_dict(dict([(k, ','.join(v)) for k, v in groups.iteritems()]))
191 account_meta.append(printable_header_dict(meta))
192 if request.serialization == 'xml':
193 data = render_to_string('accounts.xml', {'accounts': account_meta})
194 elif request.serialization == 'json':
195 data = json.dumps(account_meta)
196 response.status_code = 200
197 response.content = data
201 def account_meta(request, v_account):
202 # Normal Response Codes: 204
203 # Error Response Codes: internalServerError (500),
207 until = get_int_parameter(request.GET.get('until'))
209 meta = request.backend.get_account_meta(request.user_uniq, v_account, 'pithos', until)
210 groups = request.backend.get_account_groups(request.user_uniq, v_account)
211 policy = request.backend.get_account_policy(request.user_uniq, v_account)
212 except NotAllowedError:
213 raise Forbidden('Not allowed')
215 validate_modification_preconditions(request, meta)
217 response = HttpResponse(status=204)
218 put_account_headers(response, meta, groups, policy)
222 def account_update(request, v_account):
223 # Normal Response Codes: 202
224 # Error Response Codes: internalServerError (500),
228 meta, groups = get_account_headers(request)
230 if 'update' in request.GET:
234 request.backend.update_account_groups(request.user_uniq, v_account,
236 except NotAllowedError:
237 raise Forbidden('Not allowed')
239 raise BadRequest('Invalid groups header')
242 request.backend.update_account_meta(request.user_uniq, v_account,
243 'pithos', meta, replace)
244 except NotAllowedError:
245 raise Forbidden('Not allowed')
246 return HttpResponse(status=202)
248 @api_method('GET', format_allowed=True)
249 def container_list(request, v_account):
250 # Normal Response Codes: 200, 204
251 # Error Response Codes: internalServerError (500),
252 # itemNotFound (404),
256 until = get_int_parameter(request.GET.get('until'))
258 meta = request.backend.get_account_meta(request.user_uniq, v_account, 'pithos', until)
259 groups = request.backend.get_account_groups(request.user_uniq, v_account)
260 policy = request.backend.get_account_policy(request.user_uniq, v_account)
261 except NotAllowedError:
262 raise Forbidden('Not allowed')
264 validate_modification_preconditions(request, meta)
266 response = HttpResponse()
267 put_account_headers(response, meta, groups, policy)
269 marker = request.GET.get('marker')
270 limit = get_int_parameter(request.GET.get('limit'))
275 if 'shared' in request.GET:
279 containers = request.backend.list_containers(request.user_uniq, v_account,
280 marker, limit, shared, until)
281 except NotAllowedError:
282 raise Forbidden('Not allowed')
286 if request.serialization == 'text':
287 if len(containers) == 0:
288 # The cloudfiles python bindings expect 200 if json/xml.
289 response.status_code = 204
291 response.status_code = 200
292 response.content = '\n'.join(containers) + '\n'
298 meta = request.backend.get_container_meta(request.user_uniq, v_account,
299 x, 'pithos', until, include_user_defined=False)
300 policy = request.backend.get_container_policy(request.user_uniq,
302 except NotAllowedError:
303 raise Forbidden('Not allowed')
307 rename_meta_key(meta, 'modified', 'last_modified')
308 rename_meta_key(meta, 'until_timestamp', 'x_container_until_timestamp')
310 meta['X-Container-Policy'] = printable_header_dict(dict([(k, v) for k, v in policy.iteritems()]))
311 container_meta.append(printable_header_dict(meta))
312 if request.serialization == 'xml':
313 data = render_to_string('containers.xml', {'account': v_account, 'containers': container_meta})
314 elif request.serialization == 'json':
315 data = json.dumps(container_meta)
316 response.status_code = 200
317 response.content = data
321 def container_meta(request, v_account, v_container):
322 # Normal Response Codes: 204
323 # Error Response Codes: internalServerError (500),
324 # itemNotFound (404),
328 until = get_int_parameter(request.GET.get('until'))
330 meta = request.backend.get_container_meta(request.user_uniq, v_account,
331 v_container, 'pithos', until)
332 meta['object_meta'] = request.backend.list_container_meta(request.user_uniq,
333 v_account, v_container, 'pithos', until)
334 policy = request.backend.get_container_policy(request.user_uniq, v_account,
336 except NotAllowedError:
337 raise Forbidden('Not allowed')
339 raise ItemNotFound('Container does not exist')
341 validate_modification_preconditions(request, meta)
343 response = HttpResponse(status=204)
344 put_container_headers(request, response, meta, policy)
348 def container_create(request, v_account, v_container):
349 # Normal Response Codes: 201, 202
350 # Error Response Codes: internalServerError (500),
351 # itemNotFound (404),
355 meta, policy = get_container_headers(request)
358 request.backend.put_container(request.user_uniq, v_account, v_container, policy)
360 except NotAllowedError:
361 raise Forbidden('Not allowed')
363 raise BadRequest('Invalid policy header')
367 if ret == 202 and policy:
369 request.backend.update_container_policy(request.user_uniq, v_account,
370 v_container, policy, replace=False)
371 except NotAllowedError:
372 raise Forbidden('Not allowed')
374 raise ItemNotFound('Container does not exist')
376 raise BadRequest('Invalid policy header')
379 request.backend.update_container_meta(request.user_uniq, v_account,
380 v_container, 'pithos', meta, replace=False)
381 except NotAllowedError:
382 raise Forbidden('Not allowed')
384 raise ItemNotFound('Container does not exist')
386 return HttpResponse(status=ret)
388 @api_method('POST', format_allowed=True)
389 def container_update(request, v_account, v_container):
390 # Normal Response Codes: 202
391 # Error Response Codes: internalServerError (500),
392 # itemNotFound (404),
396 meta, policy = get_container_headers(request)
398 if 'update' in request.GET:
402 request.backend.update_container_policy(request.user_uniq, v_account,
403 v_container, policy, replace)
404 except NotAllowedError:
405 raise Forbidden('Not allowed')
407 raise ItemNotFound('Container does not exist')
409 raise BadRequest('Invalid policy header')
412 request.backend.update_container_meta(request.user_uniq, v_account,
413 v_container, 'pithos', meta, replace)
414 except NotAllowedError:
415 raise Forbidden('Not allowed')
417 raise ItemNotFound('Container does not exist')
420 if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
421 content_length = get_int_parameter(request.META.get('CONTENT_LENGTH', 0))
422 content_type = request.META.get('CONTENT_TYPE')
424 if content_type and content_type == 'application/octet-stream' and content_length != 0:
425 for data in socket_read_iterator(request, content_length,
426 request.backend.block_size):
427 # TODO: Raise 408 (Request Timeout) if this takes too long.
428 # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
429 hashmap.append(request.backend.put_block(data))
431 response = HttpResponse(status=202)
433 response.content = simple_list_response(request, hashmap)
436 @api_method('DELETE')
437 def container_delete(request, v_account, v_container):
438 # Normal Response Codes: 204
439 # Error Response Codes: internalServerError (500),
441 # itemNotFound (404),
445 until = get_int_parameter(request.GET.get('until'))
447 request.backend.delete_container(request.user_uniq, v_account, v_container,
449 except NotAllowedError:
450 raise Forbidden('Not allowed')
452 raise ItemNotFound('Container does not exist')
454 raise Conflict('Container is not empty')
455 return HttpResponse(status=204)
457 @api_method('GET', format_allowed=True)
458 def object_list(request, v_account, v_container):
459 # Normal Response Codes: 200, 204
460 # Error Response Codes: internalServerError (500),
461 # itemNotFound (404),
465 until = get_int_parameter(request.GET.get('until'))
467 meta = request.backend.get_container_meta(request.user_uniq, v_account,
468 v_container, 'pithos', until)
469 meta['object_meta'] = request.backend.list_container_meta(request.user_uniq,
470 v_account, v_container, 'pithos', until)
471 policy = request.backend.get_container_policy(request.user_uniq, v_account,
473 except NotAllowedError:
474 raise Forbidden('Not allowed')
476 raise ItemNotFound('Container does not exist')
478 validate_modification_preconditions(request, meta)
480 response = HttpResponse()
481 put_container_headers(request, response, meta, policy)
483 path = request.GET.get('path')
484 prefix = request.GET.get('prefix')
485 delimiter = request.GET.get('delimiter')
487 # Path overrides prefix and delimiter.
495 if prefix and delimiter:
496 prefix = prefix + delimiter
499 prefix = prefix.lstrip('/')
501 marker = request.GET.get('marker')
502 limit = get_int_parameter(request.GET.get('limit'))
506 keys = request.GET.get('meta')
508 keys = [smart_str(x.strip()) for x in keys.split(',') if x.strip() != '']
509 included, excluded, opers = parse_filters(keys)
511 keys += [format_header_key('X-Object-Meta-' + x) for x in included]
512 keys += ['!'+format_header_key('X-Object-Meta-' + x) for x in excluded]
513 keys += ['%s%s%s' % (format_header_key('X-Object-Meta-' + k), o, v) for k, o, v in opers]
518 if 'shared' in request.GET:
521 if request.serialization == 'text':
523 objects = request.backend.list_objects(request.user_uniq, v_account,
524 v_container, prefix, delimiter, marker,
525 limit, virtual, 'pithos', keys, shared, until)
526 except NotAllowedError:
527 raise Forbidden('Not allowed')
529 raise ItemNotFound('Container does not exist')
531 if len(objects) == 0:
532 # The cloudfiles python bindings expect 200 if json/xml.
533 response.status_code = 204
535 response.status_code = 200
536 response.content = '\n'.join([x[0] for x in objects]) + '\n'
540 objects = request.backend.list_object_meta(request.user_uniq, v_account,
541 v_container, prefix, delimiter, marker,
542 limit, virtual, 'pithos', keys, shared, until)
543 object_permissions = {}
546 name_idx = len('/'.join((v_account, v_container, '')))
547 for x in request.backend.list_object_permissions(request.user_uniq,
548 v_account, v_container, prefix):
549 object = x[name_idx:]
550 object_permissions[object] = request.backend.get_object_permissions(
551 request.user_uniq, v_account, v_container, object)
552 for k, v in request.backend.list_object_public(request.user_uniq,
553 v_account, v_container, prefix).iteritems():
554 object_public[k[name_idx:]] = v
555 except NotAllowedError:
556 raise Forbidden('Not allowed')
558 raise ItemNotFound('Container does not exist')
563 # Virtual objects/directories.
564 object_meta.append(meta)
566 rename_meta_key(meta, 'hash', 'x_object_hash') # Will be replaced by checksum.
567 rename_meta_key(meta, 'checksum', 'hash')
568 rename_meta_key(meta, 'type', 'content_type')
569 rename_meta_key(meta, 'uuid', 'x_object_uuid')
570 if until is not None and 'modified' in meta:
571 del(meta['modified'])
573 rename_meta_key(meta, 'modified', 'last_modified')
574 rename_meta_key(meta, 'modified_by', 'x_object_modified_by')
575 rename_meta_key(meta, 'version', 'x_object_version')
576 rename_meta_key(meta, 'version_timestamp', 'x_object_version_timestamp')
577 permissions = object_permissions.get(meta['name'], None)
579 update_sharing_meta(request, permissions, v_account, v_container, meta['name'], meta)
580 public = object_public.get(meta['name'], None)
582 update_public_meta(public, meta)
583 object_meta.append(printable_header_dict(meta))
584 if request.serialization == 'xml':
585 data = render_to_string('objects.xml', {'container': v_container, 'objects': object_meta})
586 elif request.serialization == 'json':
587 data = json.dumps(object_meta, default=json_encode_decimal)
588 response.status_code = 200
589 response.content = data
593 def object_meta(request, v_account, v_container, v_object):
594 # Normal Response Codes: 204
595 # Error Response Codes: internalServerError (500),
596 # itemNotFound (404),
600 version = request.GET.get('version')
602 meta = request.backend.get_object_meta(request.user_uniq, v_account,
603 v_container, v_object, 'pithos', version)
605 permissions = request.backend.get_object_permissions(request.user_uniq,
606 v_account, v_container, v_object)
607 public = request.backend.get_object_public(request.user_uniq, v_account,
608 v_container, v_object)
612 except NotAllowedError:
613 raise Forbidden('Not allowed')
615 raise ItemNotFound('Object does not exist')
617 raise ItemNotFound('Version does not exist')
619 update_manifest_meta(request, v_account, meta)
620 update_sharing_meta(request, permissions, v_account, v_container, v_object, meta)
621 update_public_meta(public, meta)
623 # Evaluate conditions.
624 validate_modification_preconditions(request, meta)
626 validate_matching_preconditions(request, meta)
628 response = HttpResponse(status=304)
629 response['ETag'] = meta['checksum']
632 response = HttpResponse(status=200)
633 put_object_headers(response, meta)
636 @api_method('GET', format_allowed=True)
637 def object_read(request, v_account, v_container, v_object):
638 # Normal Response Codes: 200, 206
639 # Error Response Codes: internalServerError (500),
640 # rangeNotSatisfiable (416),
641 # preconditionFailed (412),
642 # itemNotFound (404),
647 version = request.GET.get('version')
649 # Reply with the version list. Do this first, as the object may be deleted.
650 if version == 'list':
651 if request.serialization == 'text':
652 raise BadRequest('No format specified for version list.')
655 v = request.backend.list_versions(request.user_uniq, v_account,
656 v_container, v_object)
657 except NotAllowedError:
658 raise Forbidden('Not allowed')
660 if request.serialization == 'xml':
661 d['object'] = v_object
662 data = render_to_string('versions.xml', d)
663 elif request.serialization == 'json':
664 data = json.dumps(d, default=json_encode_decimal)
666 response = HttpResponse(data, status=200)
667 response['Content-Length'] = len(data)
671 meta = request.backend.get_object_meta(request.user_uniq, v_account,
672 v_container, v_object, 'pithos', version)
674 permissions = request.backend.get_object_permissions(request.user_uniq,
675 v_account, v_container, v_object)
676 public = request.backend.get_object_public(request.user_uniq, v_account,
677 v_container, v_object)
681 except NotAllowedError:
682 raise Forbidden('Not allowed')
684 raise ItemNotFound('Object does not exist')
686 raise ItemNotFound('Version does not exist')
688 update_manifest_meta(request, v_account, meta)
689 update_sharing_meta(request, permissions, v_account, v_container, v_object, meta)
690 update_public_meta(public, meta)
692 # Evaluate conditions.
693 validate_modification_preconditions(request, meta)
695 validate_matching_preconditions(request, meta)
697 response = HttpResponse(status=304)
698 response['ETag'] = meta['checksum']
701 hashmap_reply = False
702 if 'hashmap' in request.GET and request.serialization != 'text':
707 if 'X-Object-Manifest' in meta and not hashmap_reply:
709 src_container, src_name = split_container_object_string('/' + meta['X-Object-Manifest'])
710 objects = request.backend.list_objects(request.user_uniq, v_account,
711 src_container, prefix=src_name, virtual=False)
712 except NotAllowedError:
713 raise Forbidden('Not allowed')
715 raise BadRequest('Invalid X-Object-Manifest header')
717 raise ItemNotFound('Container does not exist')
721 s, h = request.backend.get_object_hashmap(request.user_uniq,
722 v_account, src_container, x[0], x[1])
725 except NotAllowedError:
726 raise Forbidden('Not allowed')
728 raise ItemNotFound('Object does not exist')
730 raise ItemNotFound('Version does not exist')
733 s, h = request.backend.get_object_hashmap(request.user_uniq, v_account,
734 v_container, v_object, version)
737 except NotAllowedError:
738 raise Forbidden('Not allowed')
740 raise ItemNotFound('Object does not exist')
742 raise ItemNotFound('Version does not exist')
744 # Reply with the hashmap.
747 hashmap = sum(hashmaps, [])
749 'block_size': request.backend.block_size,
750 'block_hash': request.backend.hash_algorithm,
753 if request.serialization == 'xml':
754 d['object'] = v_object
755 data = render_to_string('hashes.xml', d)
756 elif request.serialization == 'json':
759 response = HttpResponse(data, status=200)
760 put_object_headers(response, meta)
761 response['Content-Length'] = len(data)
764 request.serialization = 'text' # Unset.
765 return object_data_response(request, sizes, hashmaps, meta)
767 @api_method('PUT', format_allowed=True)
768 def object_write(request, v_account, v_container, v_object):
769 # Normal Response Codes: 201
770 # Error Response Codes: internalServerError (500),
771 # unprocessableEntity (422),
772 # lengthRequired (411),
774 # itemNotFound (404),
778 # Evaluate conditions.
779 if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
781 meta = request.backend.get_object_meta(request.user_uniq, v_account,
782 v_container, v_object, 'pithos')
783 except NotAllowedError:
784 raise Forbidden('Not allowed')
787 validate_matching_preconditions(request, meta)
789 copy_from = request.META.get('HTTP_X_COPY_FROM')
790 move_from = request.META.get('HTTP_X_MOVE_FROM')
791 if copy_from or move_from:
792 content_length = get_content_length(request) # Required by the API.
794 src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
796 src_account = request.user_uniq
799 src_container, src_name = split_container_object_string(move_from)
801 raise BadRequest('Invalid X-Move-From header')
802 version_id = copy_or_move_object(request, src_account, src_container, src_name,
803 v_account, v_container, v_object, move=True)
806 src_container, src_name = split_container_object_string(copy_from)
808 raise BadRequest('Invalid X-Copy-From header')
809 version_id = copy_or_move_object(request, src_account, src_container, src_name,
810 v_account, v_container, v_object, move=False)
811 response = HttpResponse(status=201)
812 response['X-Object-Version'] = version_id
815 content_type, meta, permissions, public = get_object_headers(request)
817 if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
818 content_length = get_content_length(request)
819 # Should be BadRequest, but API says otherwise.
821 raise LengthRequired('Missing Content-Type header')
823 if 'hashmap' in request.GET:
824 if request.serialization not in ('json', 'xml'):
825 raise BadRequest('Invalid hashmap format')
828 for block in socket_read_iterator(request, content_length,
829 request.backend.block_size):
830 data = '%s%s' % (data, block)
832 if request.serialization == 'json':
834 if not hasattr(d, '__getitem__'):
835 raise BadRequest('Invalid data formating')
837 hashmap = d['hashes']
838 size = int(d['bytes'])
840 raise BadRequest('Invalid data formatting')
841 elif request.serialization == 'xml':
843 xml = minidom.parseString(data)
844 obj = xml.getElementsByTagName('object')[0]
845 size = int(obj.attributes['bytes'].value)
847 hashes = xml.getElementsByTagName('hash')
850 hashmap.append(hash.firstChild.data)
852 raise BadRequest('Invalid data formatting')
854 checksum = '' # Do not set to None (will copy previous value).
859 for data in socket_read_iterator(request, content_length,
860 request.backend.block_size):
861 # TODO: Raise 408 (Request Timeout) if this takes too long.
862 # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
864 hashmap.append(request.backend.put_block(data))
867 checksum = md5.hexdigest().lower()
868 etag = request.META.get('HTTP_ETAG')
869 if etag and parse_etags(etag)[0].lower() != checksum:
870 raise UnprocessableEntity('Object ETag does not match')
873 version_id = request.backend.update_object_hashmap(request.user_uniq,
874 v_account, v_container, v_object, size, content_type,
875 hashmap, checksum, 'pithos', meta, True, permissions)
876 except NotAllowedError:
877 raise Forbidden('Not allowed')
878 except IndexError, e:
879 raise Conflict(simple_list_response(request, e.data))
881 raise ItemNotFound('Container does not exist')
883 raise BadRequest('Invalid sharing header')
885 raise RequestEntityTooLarge('Quota exceeded')
887 # Update the MD5 after the hashmap, as there may be missing hashes.
888 checksum = hashmap_md5(request, hashmap, size)
890 version_id = request.backend.update_object_checksum(request.user_uniq,
891 v_account, v_container, v_object, version_id, checksum)
892 except NotAllowedError:
893 raise Forbidden('Not allowed')
894 if public is not None:
896 request.backend.update_object_public(request.user_uniq, v_account,
897 v_container, v_object, public)
898 except NotAllowedError:
899 raise Forbidden('Not allowed')
901 raise ItemNotFound('Object does not exist')
903 response = HttpResponse(status=201)
905 response['ETag'] = checksum
906 response['X-Object-Version'] = version_id
910 def object_write_form(request, v_account, v_container, v_object):
911 # Normal Response Codes: 201
912 # Error Response Codes: internalServerError (500),
913 # itemNotFound (404),
917 request.upload_handlers = [SaveToBackendHandler(request)]
918 if not request.FILES.has_key('X-Object-Data'):
919 raise BadRequest('Missing X-Object-Data field')
920 file = request.FILES['X-Object-Data']
924 version_id = request.backend.update_object_hashmap(request.user_uniq,
925 v_account, v_container, v_object, file.size, file.content_type,
926 file.hashmap, checksum, 'pithos', {}, True)
927 except NotAllowedError:
928 raise Forbidden('Not allowed')
930 raise ItemNotFound('Container does not exist')
932 raise RequestEntityTooLarge('Quota exceeded')
934 response = HttpResponse(status=201)
935 response['ETag'] = checksum
936 response['X-Object-Version'] = version_id
937 response.content = checksum
940 @api_method('COPY', format_allowed=True)
941 def object_copy(request, v_account, v_container, v_object):
942 # Normal Response Codes: 201
943 # Error Response Codes: internalServerError (500),
944 # itemNotFound (404),
948 dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
950 dest_account = request.user_uniq
951 dest_path = request.META.get('HTTP_DESTINATION')
953 raise BadRequest('Missing Destination header')
955 dest_container, dest_name = split_container_object_string(dest_path)
957 raise BadRequest('Invalid Destination header')
959 # Evaluate conditions.
960 if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
961 src_version = request.META.get('HTTP_X_SOURCE_VERSION')
963 meta = request.backend.get_object_meta(request.user_uniq, v_account,
964 v_container, v_object, 'pithos', src_version)
965 except NotAllowedError:
966 raise Forbidden('Not allowed')
967 except (NameError, IndexError):
968 raise ItemNotFound('Container or object does not exist')
969 validate_matching_preconditions(request, meta)
971 version_id = copy_or_move_object(request, v_account, v_container, v_object,
972 dest_account, dest_container, dest_name, move=False)
973 response = HttpResponse(status=201)
974 response['X-Object-Version'] = version_id
977 @api_method('MOVE', format_allowed=True)
978 def object_move(request, v_account, v_container, v_object):
979 # Normal Response Codes: 201
980 # Error Response Codes: internalServerError (500),
981 # itemNotFound (404),
985 dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
987 dest_account = request.user_uniq
988 dest_path = request.META.get('HTTP_DESTINATION')
990 raise BadRequest('Missing Destination header')
992 dest_container, dest_name = split_container_object_string(dest_path)
994 raise BadRequest('Invalid Destination header')
996 # Evaluate conditions.
997 if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
999 meta = request.backend.get_object_meta(request.user_uniq, v_account,
1000 v_container, v_object, 'pithos')
1001 except NotAllowedError:
1002 raise Forbidden('Not allowed')
1004 raise ItemNotFound('Container or object does not exist')
1005 validate_matching_preconditions(request, meta)
1007 version_id = copy_or_move_object(request, v_account, v_container, v_object,
1008 dest_account, dest_container, dest_name, move=True)
1009 response = HttpResponse(status=201)
1010 response['X-Object-Version'] = version_id
1013 @api_method('POST', format_allowed=True)
1014 def object_update(request, v_account, v_container, v_object):
1015 # Normal Response Codes: 202, 204
1016 # Error Response Codes: internalServerError (500),
1018 # itemNotFound (404),
1022 content_type, meta, permissions, public = get_object_headers(request)
1025 prev_meta = request.backend.get_object_meta(request.user_uniq, v_account,
1026 v_container, v_object, 'pithos')
1027 except NotAllowedError:
1028 raise Forbidden('Not allowed')
1030 raise ItemNotFound('Object does not exist')
1032 # Evaluate conditions.
1033 if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
1034 validate_matching_preconditions(request, prev_meta)
1037 if 'update' in request.GET:
1040 # A Content-Type or X-Source-Object header indicates data updates.
1041 src_object = request.META.get('HTTP_X_SOURCE_OBJECT')
1042 if (not content_type or content_type != 'application/octet-stream') and not src_object:
1043 response = HttpResponse(status=202)
1045 # Do permissions first, as it may fail easier.
1046 if permissions is not None:
1048 request.backend.update_object_permissions(request.user_uniq,
1049 v_account, v_container, v_object, permissions)
1050 except NotAllowedError:
1051 raise Forbidden('Not allowed')
1053 raise ItemNotFound('Object does not exist')
1055 raise BadRequest('Invalid sharing header')
1056 if public is not None:
1058 request.backend.update_object_public(request.user_uniq, v_account,
1059 v_container, v_object, public)
1060 except NotAllowedError:
1061 raise Forbidden('Not allowed')
1063 raise ItemNotFound('Object does not exist')
1066 version_id = request.backend.update_object_meta(request.user_uniq,
1067 v_account, v_container, v_object, 'pithos', meta, replace)
1068 except NotAllowedError:
1069 raise Forbidden('Not allowed')
1071 raise ItemNotFound('Object does not exist')
1072 response['X-Object-Version'] = version_id
1076 # Single range update. Range must be in Content-Range.
1077 # Based on: http://code.google.com/p/gears/wiki/ContentRangePostProposal
1078 # (with the addition that '*' is allowed for the range - will append).
1079 content_range = request.META.get('HTTP_CONTENT_RANGE')
1080 if not content_range:
1081 raise BadRequest('Missing Content-Range header')
1082 ranges = get_content_range(request)
1084 raise RangeNotSatisfiable('Invalid Content-Range header')
1087 size, hashmap = request.backend.get_object_hashmap(request.user_uniq,
1088 v_account, v_container, v_object)
1089 except NotAllowedError:
1090 raise Forbidden('Not allowed')
1092 raise ItemNotFound('Object does not exist')
1094 offset, length, total = ranges
1098 raise RangeNotSatisfiable('Supplied offset is beyond object limits')
1100 src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
1102 src_account = request.user_uniq
1103 src_container, src_name = split_container_object_string(src_object)
1104 src_version = request.META.get('HTTP_X_SOURCE_VERSION')
1106 src_size, src_hashmap = request.backend.get_object_hashmap(request.user_uniq,
1107 src_account, src_container, src_name, src_version)
1108 except NotAllowedError:
1109 raise Forbidden('Not allowed')
1111 raise ItemNotFound('Source object does not exist')
1115 elif length > src_size:
1116 raise BadRequest('Object length is smaller than range length')
1118 # Require either a Content-Length, or 'chunked' Transfer-Encoding.
1120 if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
1121 content_length = get_content_length(request)
1124 length = content_length
1126 if content_length == -1:
1127 # TODO: Get up to length bytes in chunks.
1128 length = content_length
1129 elif length != content_length:
1130 raise BadRequest('Content length does not match range length')
1131 if total is not None and (total != size or offset >= size or (length > 0 and offset + length >= size)):
1132 raise RangeNotSatisfiable('Supplied range will change provided object limits')
1134 dest_bytes = request.META.get('HTTP_X_OBJECT_BYTES')
1135 if dest_bytes is not None:
1136 dest_bytes = get_int_parameter(dest_bytes)
1137 if dest_bytes is None:
1138 raise BadRequest('Invalid X-Object-Bytes header')
1141 if offset % request.backend.block_size == 0:
1142 # Update the hashes only.
1145 bi = int(offset / request.backend.block_size)
1146 bl = min(length, request.backend.block_size)
1147 if bi < len(hashmap):
1148 if bl == request.backend.block_size:
1149 hashmap[bi] = src_hashmap[sbi]
1151 data = request.backend.get_block(src_hashmap[sbi])
1152 hashmap[bi] = request.backend.update_block(hashmap[bi],
1155 hashmap.append(src_hashmap[sbi])
1163 data += request.backend.get_block(src_hashmap[sbi])
1164 if length < request.backend.block_size:
1165 data = data[:length]
1166 bytes = put_object_block(request, hashmap, data, offset)
1173 for d in socket_read_iterator(request, length,
1174 request.backend.block_size):
1175 # TODO: Raise 408 (Request Timeout) if this takes too long.
1176 # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
1178 bytes = put_object_block(request, hashmap, data, offset)
1182 put_object_block(request, hashmap, data, offset)
1186 if dest_bytes is not None and dest_bytes < size:
1188 hashmap = hashmap[:(int((size - 1) / request.backend.block_size) + 1)]
1189 checksum = hashmap_md5(request, hashmap, size)
1191 version_id = request.backend.update_object_hashmap(request.user_uniq,
1192 v_account, v_container, v_object, size, prev_meta['type'],
1193 hashmap, checksum, 'pithos', meta, replace, permissions)
1194 except NotAllowedError:
1195 raise Forbidden('Not allowed')
1197 raise ItemNotFound('Container does not exist')
1199 raise BadRequest('Invalid sharing header')
1201 raise RequestEntityTooLarge('Quota exceeded')
1202 if public is not None:
1204 request.backend.update_object_public(request.user_uniq, v_account,
1205 v_container, v_object, public)
1206 except NotAllowedError:
1207 raise Forbidden('Not allowed')
1209 raise ItemNotFound('Object does not exist')
1211 response = HttpResponse(status=204)
1212 response['ETag'] = checksum
1213 response['X-Object-Version'] = version_id
1216 @api_method('DELETE')
1217 def object_delete(request, v_account, v_container, v_object):
1218 # Normal Response Codes: 204
1219 # Error Response Codes: internalServerError (500),
1220 # itemNotFound (404),
1224 until = get_int_parameter(request.GET.get('until'))
1226 request.backend.delete_object(request.user_uniq, v_account, v_container,
1228 except NotAllowedError:
1229 raise Forbidden('Not allowed')
1231 raise ItemNotFound('Object does not exist')
1232 return HttpResponse(status=204)
1235 def method_not_allowed(request):
1236 raise BadRequest('Method not allowed')