1 # Copyright 2011 GRNET S.A. All rights reserved.
3 # Redistribution and use in source and binary forms, with or
4 # without modification, are permitted provided that the following
7 # 1. Redistributions of source code must retain the above
8 # copyright notice, this list of conditions and the following
11 # 2. Redistributions in binary form must reproduce the above
12 # copyright notice, this list of conditions and the following
13 # disclaimer in the documentation and/or other materials
14 # provided with the distribution.
16 # THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
17 # OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18 # WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
20 # CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21 # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22 # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23 # USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24 # AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
26 # ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27 # POSSIBILITY OF SUCH DAMAGE.
29 # The views and conclusions contained in the software and
30 # documentation are those of the authors and should not be
31 # interpreted as representing official policies, either expressed
32 # or implied, of GRNET S.A.
43 from base import NotAllowedError, BaseBackend
46 logger = logging.getLogger(__name__)
49 class SimpleBackend(BaseBackend):
52 Uses SQLite for storage.
55 # TODO: Automatic/manual clean-up after a time interval.
57 def __init__(self, db):
58 self.hash_algorithm = 'sha1'
59 self.block_size = 128 * 1024 # 128KB
61 self.default_policy = {'quota': 0, 'versioning': 'auto'}
63 basepath = os.path.split(db)[0]
64 if basepath and not os.path.exists(basepath):
67 self.con = sqlite3.connect(db, check_same_thread=False)
68 sql = '''create table if not exists versions (
69 version_id integer primary key,
72 tstamp datetime default current_timestamp,
73 size integer default 0,
74 hide integer default 0)'''
76 sql = '''create table if not exists metadata (
77 version_id integer, key text, value text, primary key (version_id, key))'''
79 sql = '''create table if not exists blocks (
80 block_id text, data blob, primary key (block_id))'''
82 sql = '''create table if not exists hashmaps (
83 version_id integer, pos integer, block_id text, primary key (version_id, pos))'''
85 sql = '''create table if not exists groups (
86 account text, name text, users text, primary key (account, name))'''
88 sql = '''create table if not exists policy (
89 name text, key text, value text, primary key (name, key))'''
91 sql = '''create table if not exists permissions (
92 name text, read text, write text, primary key (name))'''
94 sql = '''create table if not exists public (
95 name text, primary key (name))'''
99 def get_account_meta(self, user, account, until=None):
100 """Return a dictionary with the account metadata."""
102 logger.debug("get_account_meta: %s %s", account, until)
104 raise NotAllowedError
106 version_id, mtime = self._get_accountinfo(account, until)
110 count, bytes, tstamp = self._get_pathstats(account, until)
116 modified = self._get_pathstats(account)[2] # Overall last modification
121 sql = 'select count(name) from (%s) where name glob ? and not name glob ?'
122 sql = sql % self._sql_until(until)
123 c = self.con.execute(sql, (account + '/*', account + '/*/*'))
127 meta = self._get_metadata(account, version_id)
128 meta.update({'name': account, 'count': count, 'bytes': bytes})
130 meta.update({'modified': modified})
131 if until is not None:
132 meta.update({'until_timestamp': tstamp})
135 def update_account_meta(self, user, account, meta, replace=False):
136 """Update the metadata associated with the account."""
138 logger.debug("update_account_meta: %s %s %s", account, meta, replace)
140 raise NotAllowedError
141 self._put_metadata(user, account, meta, replace)
143 def get_account_groups(self, user, account):
144 """Return a dictionary with the user groups defined for this account."""
146 logger.debug("get_account_groups: %s", account)
148 raise NotAllowedError
149 return self._get_groups(account)
151 def update_account_groups(self, user, account, groups, replace=False):
152 """Update the groups associated with the account."""
154 logger.debug("update_account_groups: %s %s %s", account, groups, replace)
156 raise NotAllowedError
157 for k, v in groups.iteritems():
158 if True in [False or ',' in x for x in v]:
159 raise ValueError('Bad characters in groups')
161 sql = 'delete from groups where account = ?'
162 self.con.execute(sql, (account,))
163 for k, v in groups.iteritems():
166 sql = 'delete from groups where account = ? and name = ?'
167 self.con.execute(sql, (account, k))
169 sql = 'insert or replace into groups (account, name, users) values (?, ?, ?)'
170 self.con.execute(sql, (account, k, ','.join(v)))
173 def delete_account(self, user, account):
174 """Delete the account with the given name."""
176 logger.debug("delete_account: %s", account)
178 raise NotAllowedError
179 count, bytes, tstamp = self._get_pathstats(account)
181 raise IndexError('Account is not empty')
182 self._del_path(account) # Point of no return.
184 def list_containers(self, user, account, marker=None, limit=10000, until=None):
185 """Return a list of containers existing under an account."""
187 logger.debug("list_containers: %s %s %s %s", account, marker, limit, until)
189 raise NotAllowedError
190 return self._list_objects(account, '', '/', marker, limit, False, [], until)
192 def get_container_meta(self, user, account, container, until=None):
193 """Return a dictionary with the container metadata."""
195 logger.debug("get_container_meta: %s %s %s", account, container, until)
197 raise NotAllowedError
198 path, version_id, mtime = self._get_containerinfo(account, container, until)
199 count, bytes, tstamp = self._get_pathstats(path, until)
205 modified = self._get_pathstats(path)[2] # Overall last modification
209 meta = self._get_metadata(path, version_id)
210 meta.update({'name': container, 'count': count, 'bytes': bytes, 'modified': modified})
211 if until is not None:
212 meta.update({'until_timestamp': tstamp})
215 def update_container_meta(self, user, account, container, meta, replace=False):
216 """Update the metadata associated with the container."""
218 logger.debug("update_container_meta: %s %s %s %s", account, container, meta, replace)
220 raise NotAllowedError
221 path, version_id, mtime = self._get_containerinfo(account, container)
222 self._put_metadata(user, path, meta, replace)
224 def get_container_policy(self, user, account, container):
225 """Return a dictionary with the container policy."""
227 logger.debug("get_container_policy: %s %s", account, container)
229 raise NotAllowedError
230 path = self._get_containerinfo(account, container)[0]
231 return self._get_policy(path)
233 def update_container_policy(self, user, account, container, policy, replace=False):
234 """Update the policy associated with the account."""
236 logger.debug("update_container_policy: %s %s %s %s", account, container, policy, replace)
238 raise NotAllowedError
239 path = self._get_containerinfo(account, container)[0]
240 self._check_policy(policy)
242 for k, v in self.default_policy.iteritems():
245 for k, v in policy.iteritems():
246 sql = 'insert or replace into policy (name, key, value) values (?, ?, ?)'
247 self.con.execute(sql, (path, k, v))
250 def put_container(self, user, account, container, policy=None):
251 """Create a new container with the given name."""
253 logger.debug("put_container: %s %s %s", account, container, policy)
255 raise NotAllowedError
257 path, version_id, mtime = self._get_containerinfo(account, container)
261 raise NameError('Container already exists')
263 self._check_policy(policy)
264 path = os.path.join(account, container)
265 version_id = self._put_version(path, user)
266 for k, v in self.default_policy.iteritems():
269 for k, v in policy.iteritems():
270 sql = 'insert or replace into policy (name, key, value) values (?, ?, ?)'
271 self.con.execute(sql, (path, k, v))
274 def delete_container(self, user, account, container):
275 """Delete the container with the given name."""
277 logger.debug("delete_container: %s %s", account, container)
279 raise NotAllowedError
280 path, version_id, mtime = self._get_containerinfo(account, container)
281 count, bytes, tstamp = self._get_pathstats(path)
283 raise IndexError('Container is not empty')
284 self._del_path(path) # Point of no return.
285 self._copy_version(user, account, account, True, True) # New account version.
287 def list_objects(self, user, account, container, prefix='', delimiter=None, marker=None, limit=10000, virtual=True, keys=[], until=None):
288 """Return a list of objects existing under a container."""
290 logger.debug("list_objects: %s %s %s %s %s %s %s", account, container, prefix, delimiter, marker, limit, until)
292 raise NotAllowedError
293 path, version_id, mtime = self._get_containerinfo(account, container, until)
294 return self._list_objects(path, prefix, delimiter, marker, limit, virtual, keys, until)
296 def list_object_meta(self, user, account, container, until=None):
297 """Return a list with all the container's object meta keys."""
299 logger.debug("list_object_meta: %s %s %s", account, container, until)
301 raise NotAllowedError
302 path, version_id, mtime = self._get_containerinfo(account, container, until)
303 sql = '''select distinct m.key from (%s) o, metadata m
304 where m.version_id = o.version_id and o.name like ?'''
305 sql = sql % self._sql_until(until)
306 c = self.con.execute(sql, (path + '/%',))
307 return [x[0] for x in c.fetchall()]
309 def get_object_meta(self, user, account, container, name, version=None):
310 """Return a dictionary with the object metadata."""
312 logger.debug("get_object_meta: %s %s %s %s", account, container, name, version)
313 self._can_read(user, account, container, name)
314 path, version_id, muser, mtime, size = self._get_objectinfo(account, container, name, version)
318 modified = self._get_version(path, version)[2] # Overall last modification
320 meta = self._get_metadata(path, version_id)
321 meta.update({'name': name, 'bytes': size})
322 meta.update({'version': version_id, 'version_timestamp': mtime})
323 meta.update({'modified': modified, 'modified_by': muser})
326 def update_object_meta(self, user, account, container, name, meta, replace=False):
327 """Update the metadata associated with the object."""
329 logger.debug("update_object_meta: %s %s %s %s %s", account, container, name, meta, replace)
330 self._can_write(user, account, container, name)
331 path, version_id, muser, mtime, size = self._get_objectinfo(account, container, name)
332 self._put_metadata(user, path, meta, replace)
334 def get_object_permissions(self, user, account, container, name):
335 """Return the path from which this object gets its permissions from,\
336 along with a dictionary containing the permissions."""
338 logger.debug("get_object_permissions: %s %s %s", account, container, name)
339 self._can_read(user, account, container, name)
340 path = self._get_objectinfo(account, container, name)[0]
341 return self._get_permissions(path)
343 def update_object_permissions(self, user, account, container, name, permissions):
344 """Update the permissions associated with the object."""
346 logger.debug("update_object_permissions: %s %s %s %s", account, container, name, permissions)
348 raise NotAllowedError
349 path = self._get_objectinfo(account, container, name)[0]
350 r, w = self._check_permissions(path, permissions)
351 self._put_permissions(path, r, w)
353 def get_object_public(self, user, account, container, name):
354 """Return the public URL of the object if applicable."""
356 logger.debug("get_object_public: %s %s %s", account, container, name)
357 self._can_read(user, account, container, name)
358 path = self._get_objectinfo(account, container, name)[0]
359 if self._get_public(path):
360 return '/public/' + path
363 def update_object_public(self, user, account, container, name, public):
364 """Update the public status of the object."""
366 logger.debug("update_object_public: %s %s %s %s", account, container, name, public)
367 self._can_write(user, account, container, name)
368 path = self._get_objectinfo(account, container, name)[0]
369 self._put_public(path, public)
371 def get_object_hashmap(self, user, account, container, name, version=None):
372 """Return the object's size and a list with partial hashes."""
374 logger.debug("get_object_hashmap: %s %s %s %s", account, container, name, version)
375 self._can_read(user, account, container, name)
376 path, version_id, muser, mtime, size = self._get_objectinfo(account, container, name, version)
377 sql = 'select block_id from hashmaps where version_id = ? order by pos asc'
378 c = self.con.execute(sql, (version_id,))
379 hashmap = [x[0] for x in c.fetchall()]
382 def update_object_hashmap(self, user, account, container, name, size, hashmap, meta={}, replace_meta=False, permissions=None):
383 """Create/update an object with the specified size and partial hashes."""
385 logger.debug("update_object_hashmap: %s %s %s %s %s", account, container, name, size, hashmap)
386 if permissions is not None and user != account:
387 raise NotAllowedError
388 self._can_write(user, account, container, name)
390 for i in range(len(hashmap)):
391 sql = 'select count(*) from blocks where block_id = ?'
392 c = self.con.execute(sql, (hashmap[i],))
393 if c.fetchone()[0] == 0:
394 missing.append(hashmap[i])
399 path = self._get_containerinfo(account, container)[0]
400 path = os.path.join(path, name)
401 if permissions is not None:
402 r, w = self._check_permissions(path, permissions)
403 src_version_id, dest_version_id = self._copy_version(user, path, path, not replace_meta, False)
404 sql = 'update versions set size = ? where version_id = ?'
405 self.con.execute(sql, (size, dest_version_id))
406 # TODO: Check for block_id existence.
407 for i in range(len(hashmap)):
408 sql = 'insert or replace into hashmaps (version_id, pos, block_id) values (?, ?, ?)'
409 self.con.execute(sql, (dest_version_id, i, hashmap[i]))
410 for k, v in meta.iteritems():
411 sql = 'insert or replace into metadata (version_id, key, value) values (?, ?, ?)'
412 self.con.execute(sql, (dest_version_id, k, v))
413 if permissions is not None:
414 sql = 'insert or replace into permissions (name, read, write) values (?, ?, ?)'
415 self.con.execute(sql, (path, r, w))
418 def copy_object(self, user, account, src_container, src_name, dest_container, dest_name, dest_meta={}, replace_meta=False, permissions=None, src_version=None):
419 """Copy an object's data and metadata."""
421 logger.debug("copy_object: %s %s %s %s %s %s %s %s %s", account, src_container, src_name, dest_container, dest_name, dest_meta, replace_meta, permissions, src_version)
422 if permissions is not None and user != account:
423 raise NotAllowedError
424 self._can_read(user, account, src_container, src_name)
425 self._can_write(user, account, dest_container, dest_name)
426 self._get_containerinfo(account, src_container)
427 if src_version is None:
428 src_path = self._get_objectinfo(account, src_container, src_name)[0]
430 src_path = os.path.join(account, src_container, src_name)
431 dest_path = self._get_containerinfo(account, dest_container)[0]
432 dest_path = os.path.join(dest_path, dest_name)
433 if permissions is not None:
434 r, w = self._check_permissions(dest_path, permissions)
435 src_version_id, dest_version_id = self._copy_version(user, src_path, dest_path, not replace_meta, True, src_version)
436 for k, v in dest_meta.iteritems():
437 sql = 'insert or replace into metadata (version_id, key, value) values (?, ?, ?)'
438 self.con.execute(sql, (dest_version_id, k, v))
439 if permissions is not None:
440 sql = 'insert or replace into permissions (name, read, write) values (?, ?, ?)'
441 self.con.execute(sql, (dest_path, r, w))
444 def move_object(self, user, account, src_container, src_name, dest_container, dest_name, dest_meta={}, replace_meta=False, permissions=None):
445 """Move an object's data and metadata."""
447 logger.debug("move_object: %s %s %s %s %s %s %s %s", account, src_container, src_name, dest_container, dest_name, dest_meta, replace_meta, permissions)
448 self.copy_object(user, account, src_container, src_name, dest_container, dest_name, dest_meta, replace_meta, permissions, None)
449 self.delete_object(user, account, src_container, src_name)
451 def delete_object(self, user, account, container, name):
452 """Delete an object."""
454 logger.debug("delete_object: %s %s %s", account, container, name)
456 raise NotAllowedError
457 path = self._get_objectinfo(account, container, name)[0]
458 self._put_version(path, user, 0, 1)
459 sql = 'delete from permissions where name = ?'
460 self.con.execute(sql, (path,))
463 def list_versions(self, user, account, container, name):
464 """Return a list of all (version, version_timestamp) tuples for an object."""
466 logger.debug("list_versions: %s %s %s", account, container, name)
467 self._can_read(user, account, container, name)
468 # This will even show deleted versions.
469 path = os.path.join(account, container, name)
470 sql = '''select distinct version_id, strftime('%s', tstamp) from versions where name = ? and hide = 0'''
471 c = self.con.execute(sql, (path,))
472 return [(int(x[0]), int(x[1])) for x in c.fetchall()]
474 def get_block(self, hash):
475 """Return a block's data."""
477 logger.debug("get_block: %s", hash)
478 c = self.con.execute('select data from blocks where block_id = ?', (hash,))
483 raise NameError('Block does not exist')
485 def put_block(self, data):
486 """Create a block and return the hash."""
488 logger.debug("put_block: %s", len(data))
489 h = hashlib.new(self.hash_algorithm)
490 h.update(data.rstrip('\x00'))
492 sql = 'insert or ignore into blocks (block_id, data) values (?, ?)'
493 self.con.execute(sql, (hash, buffer(data)))
497 def update_block(self, hash, data, offset=0):
498 """Update a known block and return the hash."""
500 logger.debug("update_block: %s %s %s", hash, len(data), offset)
501 if offset == 0 and len(data) == self.block_size:
502 return self.put_block(data)
503 src_data = self.get_block(hash)
505 if offset < 0 or offset > bs or offset + len(data) > bs:
506 raise IndexError('Offset or data outside block limits')
507 dest_data = src_data[:offset] + data + src_data[offset + len(data):]
508 return self.put_block(dest_data)
510 def _sql_until(self, until=None):
511 """Return the sql to get the latest versions until the timestamp given."""
513 until = int(time.time())
514 sql = '''select version_id, name, strftime('%s', tstamp) as tstamp, size from versions v
515 where version_id = (select max(version_id) from versions
516 where v.name = name and tstamp <= datetime(%s, 'unixepoch'))
518 return sql % ('%s', until)
520 def _get_pathstats(self, path, until=None):
521 """Return count and sum of size of everything under path and latest timestamp."""
523 sql = 'select count(version_id), total(size), max(tstamp) from (%s) where name like ?'
524 sql = sql % self._sql_until(until)
525 c = self.con.execute(sql, (path + '/%',))
527 tstamp = row[2] if row[2] is not None else 0
528 return int(row[0]), int(row[1]), int(tstamp)
530 def _get_version(self, path, version=None):
532 sql = '''select version_id, user, strftime('%s', tstamp), size, hide from versions where name = ?
533 order by version_id desc limit 1'''
534 c = self.con.execute(sql, (path,))
536 if not row or int(row[4]):
537 raise NameError('Object does not exist')
539 # The database (sqlite) will not complain if the version is not an integer.
540 sql = '''select version_id, user, strftime('%s', tstamp), size from versions where name = ?
541 and version_id = ?'''
542 c = self.con.execute(sql, (path, version))
545 raise IndexError('Version does not exist')
546 return str(row[0]), str(row[1]), int(row[2]), int(row[3])
548 def _put_version(self, path, user, size=0, hide=0):
549 sql = 'insert into versions (name, user, size, hide) values (?, ?, ?, ?)'
550 id = self.con.execute(sql, (path, user, size, hide)).lastrowid
554 def _copy_version(self, user, src_path, dest_path, copy_meta=True, copy_data=True, src_version=None):
555 if src_version is not None:
556 src_version_id, muser, mtime, size = self._get_version(src_path, src_version)
558 # Latest or create from scratch.
560 src_version_id, muser, mtime, size = self._get_version(src_path)
562 src_version_id = None
566 dest_version_id = self._put_version(dest_path, user, size)
567 if copy_meta and src_version_id is not None:
568 sql = 'insert into metadata select %s, key, value from metadata where version_id = ?'
569 sql = sql % dest_version_id
570 self.con.execute(sql, (src_version_id,))
571 if copy_data and src_version_id is not None:
572 sql = 'insert into hashmaps select %s, pos, block_id from hashmaps where version_id = ?'
573 sql = sql % dest_version_id
574 self.con.execute(sql, (src_version_id,))
576 return src_version_id, dest_version_id
578 def _get_versioninfo(self, account, container, name, until=None):
579 """Return path, latest version, associated timestamp and size until the timestamp given."""
581 p = (account, container, name)
583 p = p[:p.index(None)]
586 path = os.path.join(*p)
587 sql = '''select version_id, tstamp, size from (%s) where name = ?'''
588 sql = sql % self._sql_until(until)
589 c = self.con.execute(sql, (path,))
592 raise NameError('Path does not exist')
593 return path, str(row[0]), int(row[1]), int(row[2])
595 def _get_accountinfo(self, account, until=None):
597 path, version_id, mtime, size = self._get_versioninfo(account, None, None, until)
598 return version_id, mtime
600 raise NameError('Account does not exist')
602 def _get_containerinfo(self, account, container, until=None):
604 path, version_id, mtime, size = self._get_versioninfo(account, container, None, until)
605 return path, version_id, mtime
607 raise NameError('Container does not exist')
609 def _get_objectinfo(self, account, container, name, version=None):
610 path = os.path.join(account, container, name)
611 version_id, muser, mtime, size = self._get_version(path, version)
612 return path, version_id, muser, mtime, size
614 def _get_metadata(self, path, version):
615 sql = 'select key, value from metadata where version_id = ?'
616 c = self.con.execute(sql, (version,))
617 return dict(c.fetchall())
619 def _put_metadata(self, user, path, meta, replace=False):
620 """Create a new version and store metadata."""
622 src_version_id, dest_version_id = self._copy_version(user, path, path, not replace, True)
623 for k, v in meta.iteritems():
624 if not replace and v == '':
625 sql = 'delete from metadata where version_id = ? and key = ?'
626 self.con.execute(sql, (dest_version_id, k))
628 sql = 'insert or replace into metadata (version_id, key, value) values (?, ?, ?)'
629 self.con.execute(sql, (dest_version_id, k, v))
632 def _get_groups(self, account):
633 sql = 'select name, users from groups where account = ?'
634 c = self.con.execute(sql, (account,))
635 return dict([(x[0], x[1].split(',')) for x in c.fetchall()])
637 def _check_policy(self, policy):
638 for k in policy.keys():
640 policy[k] = self.default_policy.get(k)
641 for k, v in policy.iteritems():
643 q = int(v) # May raise ValueError.
646 elif k == 'versioning':
647 if v not in ['auto', 'manual', 'none']:
652 def _get_policy(self, path):
653 sql = 'select key, value from policy where name = ?'
654 c = self.con.execute(sql, (path,))
655 return dict(c.fetchall())
657 def _is_allowed(self, user, account, container, name, op='read'):
660 path = os.path.join(account, container, name)
661 if op == 'read' and self._get_public(path):
663 perm_path, perms = self._get_permissions(path)
666 for x in ('read', 'write'):
668 for y in perms.get(x, []):
670 g_account, g_name = y.split(':', 1)
671 groups = self._get_groups(g_account)
673 g_perms += groups[g_name]
678 if op == 'read' and user in perms.get('read', []):
680 if user in perms.get('write', []):
684 def _can_read(self, user, account, container, name):
685 if not self._is_allowed(user, account, container, name, 'read'):
686 raise NotAllowedError
688 def _can_write(self, user, account, container, name):
689 if not self._is_allowed(user, account, container, name, 'write'):
690 raise NotAllowedError
692 def _check_permissions(self, path, permissions):
693 # Check for existing permissions.
694 sql = '''select name from permissions
695 where name != ? and (name like ? or ? like name || ?)'''
696 c = self.con.execute(sql, (path, path + '%', path, '%'))
699 raise AttributeError('Permissions already set')
701 # Format given permissions.
702 if len(permissions) == 0:
704 r = permissions.get('read', [])
705 w = permissions.get('write', [])
706 if True in [False or ',' in x for x in r]:
707 raise ValueError('Bad characters in read permissions')
708 if True in [False or ',' in x for x in w]:
709 raise ValueError('Bad characters in write permissions')
710 return ','.join(r), ','.join(w)
712 def _get_permissions(self, path):
713 # Check for permissions at path or above.
714 sql = 'select name, read, write from permissions where ? like name || ?'
715 c = self.con.execute(sql, (path, '%'))
723 ret['write'] = w.split(',')
725 ret['read'] = r.split(',')
728 def _put_permissions(self, path, r, w):
729 if r == '' and w == '':
730 sql = 'delete from permissions where name = ?'
731 self.con.execute(sql, (path,))
733 sql = 'insert or replace into permissions (name, read, write) values (?, ?, ?)'
734 self.con.execute(sql, (path, r, w))
737 def _get_public(self, path):
738 sql = 'select name from public where name = ?'
739 c = self.con.execute(sql, (path,))
745 def _put_public(self, path, public):
747 sql = 'delete from public where name = ?'
749 sql = 'insert or replace into public (name) values (?)'
750 self.con.execute(sql, (path,))
753 def _list_objects(self, path, prefix='', delimiter=None, marker=None, limit=10000, virtual=True, keys=[], until=None):
754 cont_prefix = path + '/'
755 if keys and len(keys) > 0:
756 sql = '''select distinct o.name, o.version_id from (%s) o, metadata m where o.name like ? and
757 m.version_id = o.version_id and m.key in (%s) order by o.name'''
758 sql = sql % (self._sql_until(until), ', '.join('?' * len(keys)))
759 param = (cont_prefix + prefix + '%',) + tuple(keys)
761 sql = 'select name, version_id from (%s) where name like ? order by name'
762 sql = sql % self._sql_until(until)
763 param = (cont_prefix + prefix + '%',)
764 c = self.con.execute(sql, param)
765 objects = [(x[0][len(cont_prefix):], x[1]) for x in c.fetchall()]
770 i = pseudo_name.find(delimiter, len(prefix))
772 # If the delimiter is not found, or the name ends
773 # with the delimiter's first occurence.
774 if i == -1 or len(pseudo_name) == i + len(delimiter):
775 pseudo_objects.append(x)
777 # If the delimiter is found, keep up to (and including) the delimiter.
779 pseudo_name = pseudo_name[:i + len(delimiter)]
780 if pseudo_name not in [y[0] for y in pseudo_objects]:
781 if pseudo_name == x[0]:
782 pseudo_objects.append(x)
784 pseudo_objects.append((pseudo_name, None))
785 objects = pseudo_objects
790 start = [x[0] for x in objects].index(marker) + 1
793 if not limit or limit > 10000:
795 return objects[start:start + limit]
797 def _del_path(self, path):
798 sql = '''delete from hashmaps where version_id in
799 (select version_id from versions where name = ?)'''
800 self.con.execute(sql, (path,))
801 sql = '''delete from metadata where version_id in
802 (select version_id from versions where name = ?)'''
803 self.con.execute(sql, (path,))
804 sql = '''delete from versions where name = ?'''
805 self.con.execute(sql, (path,))
806 sql = '''delete from permissions where name like ?'''
807 self.con.execute(sql, (path + '%',)) # Redundant.