if not limit:
limit = 10000
- accounts = request.backend.list_accounts(request.user_uniq, marker, limit)
+ accounts = request.backend.list_accounts(request.userid, marker, limit)
if request.serialization == 'text':
if len(accounts) == 0:
account_meta = []
for x in accounts:
- if x == request.user_uniq:
+ if x == request.userid:
continue
try:
- meta = request.backend.get_account_meta(request.user_uniq, x, 'pithos', include_user_defined=False)
- groups = request.backend.get_account_groups(request.user_uniq, x)
+ meta = request.backend.get_account_meta(request.userid, x, 'pithos', include_user_defined=False)
+ groups = request.backend.get_account_groups(request.userid, x)
except NotAllowedError:
raise Forbidden('Not allowed')
else:
until = get_int_parameter(request.GET.get('until'))
try:
- meta = request.backend.get_account_meta(request.user_uniq, v_account, 'pithos', until)
- groups = request.backend.get_account_groups(request.user_uniq, v_account)
- policy = request.backend.get_account_policy(request.user_uniq, v_account)
+ meta = request.backend.get_account_meta(request.userid, v_account, 'pithos', until)
+ groups = request.backend.get_account_groups(request.userid, v_account)
+ policy = request.backend.get_account_policy(request.userid, v_account)
except NotAllowedError:
raise Forbidden('Not allowed')
replace = False
if groups:
try:
- request.backend.update_account_groups(request.user_uniq, v_account,
+ request.backend.update_account_groups(request.userid, v_account,
groups, replace)
except NotAllowedError:
raise Forbidden('Not allowed')
raise BadRequest('Invalid groups header')
if meta or replace:
try:
- request.backend.update_account_meta(request.user_uniq, v_account,
+ request.backend.update_account_meta(request.userid, v_account,
'pithos', meta, replace)
except NotAllowedError:
raise Forbidden('Not allowed')
until = get_int_parameter(request.GET.get('until'))
try:
- meta = request.backend.get_account_meta(request.user_uniq, v_account, 'pithos', until)
- groups = request.backend.get_account_groups(request.user_uniq, v_account)
- policy = request.backend.get_account_policy(request.user_uniq, v_account)
+ meta = request.backend.get_account_meta(request.userid, v_account, 'pithos', until)
+ groups = request.backend.get_account_groups(request.userid, v_account)
+ policy = request.backend.get_account_policy(request.userid, v_account)
except NotAllowedError:
raise Forbidden('Not allowed')
shared = True
try:
- containers = request.backend.list_containers(request.user_uniq, v_account,
+ containers = request.backend.list_containers(request.userid, v_account,
marker, limit, shared, until)
except NotAllowedError:
raise Forbidden('Not allowed')
container_meta = []
for x in containers:
try:
- meta = request.backend.get_container_meta(request.user_uniq, v_account,
+ meta = request.backend.get_container_meta(request.userid, v_account,
x, 'pithos', until, include_user_defined=False)
- policy = request.backend.get_container_policy(request.user_uniq,
+ policy = request.backend.get_container_policy(request.userid,
v_account, x)
except NotAllowedError:
raise Forbidden('Not allowed')
until = get_int_parameter(request.GET.get('until'))
try:
- meta = request.backend.get_container_meta(request.user_uniq, v_account,
+ meta = request.backend.get_container_meta(request.userid, v_account,
v_container, 'pithos', until)
- meta['object_meta'] = request.backend.list_container_meta(request.user_uniq,
+ meta['object_meta'] = request.backend.list_container_meta(request.userid,
v_account, v_container, 'pithos', until)
- policy = request.backend.get_container_policy(request.user_uniq, v_account,
+ policy = request.backend.get_container_policy(request.userid, v_account,
v_container)
except NotAllowedError:
raise Forbidden('Not allowed')
meta, policy = get_container_headers(request)
try:
- request.backend.put_container(request.user_uniq, v_account, v_container, policy)
+ request.backend.put_container(request.userid, v_account, v_container, policy)
ret = 201
except NotAllowedError:
raise Forbidden('Not allowed')
if ret == 202 and policy:
try:
- request.backend.update_container_policy(request.user_uniq, v_account,
+ request.backend.update_container_policy(request.userid, v_account,
v_container, policy, replace=False)
except NotAllowedError:
raise Forbidden('Not allowed')
raise BadRequest('Invalid policy header')
if meta:
try:
- request.backend.update_container_meta(request.user_uniq, v_account,
+ request.backend.update_container_meta(request.userid, v_account,
v_container, 'pithos', meta, replace=False)
except NotAllowedError:
raise Forbidden('Not allowed')
replace = False
if policy:
try:
- request.backend.update_container_policy(request.user_uniq, v_account,
+ request.backend.update_container_policy(request.userid, v_account,
v_container, policy, replace)
except NotAllowedError:
raise Forbidden('Not allowed')
raise BadRequest('Invalid policy header')
if meta or replace:
try:
- request.backend.update_container_meta(request.user_uniq, v_account,
+ request.backend.update_container_meta(request.userid, v_account,
v_container, 'pithos', meta, replace)
except NotAllowedError:
raise Forbidden('Not allowed')
until = get_int_parameter(request.GET.get('until'))
try:
- request.backend.delete_container(request.user_uniq, v_account, v_container,
+ request.backend.delete_container(request.userid, v_account, v_container,
until)
except NotAllowedError:
raise Forbidden('Not allowed')
until = get_int_parameter(request.GET.get('until'))
try:
- meta = request.backend.get_container_meta(request.user_uniq, v_account,
+ meta = request.backend.get_container_meta(request.userid, v_account,
v_container, 'pithos', until)
- meta['object_meta'] = request.backend.list_container_meta(request.user_uniq,
+ meta['object_meta'] = request.backend.list_container_meta(request.userid,
v_account, v_container, 'pithos', until)
- policy = request.backend.get_container_policy(request.user_uniq, v_account,
+ policy = request.backend.get_container_policy(request.userid, v_account,
v_container)
except NotAllowedError:
raise Forbidden('Not allowed')
if request.serialization == 'text':
try:
- objects = request.backend.list_objects(request.user_uniq, v_account,
+ objects = request.backend.list_objects(request.userid, v_account,
v_container, prefix, delimiter, marker,
limit, virtual, 'pithos', keys, shared, until)
except NotAllowedError:
return response
try:
- objects = request.backend.list_object_meta(request.user_uniq, v_account,
+ objects = request.backend.list_object_meta(request.userid, v_account,
v_container, prefix, delimiter, marker,
limit, virtual, 'pithos', keys, shared, until)
object_permissions = {}
object_public = {}
if until is None:
name_idx = len('/'.join((v_account, v_container, '')))
- for x in request.backend.list_object_permissions(request.user_uniq,
+ for x in request.backend.list_object_permissions(request.userid,
v_account, v_container, prefix):
object = x[name_idx:]
object_permissions[object] = request.backend.get_object_permissions(
- request.user_uniq, v_account, v_container, object)
- for k, v in request.backend.list_object_public(request.user_uniq,
+ request.userid, v_account, v_container, object)
+ for k, v in request.backend.list_object_public(request.userid,
v_account, v_container, prefix).iteritems():
object_public[k[name_idx:]] = v
except NotAllowedError:
version = request.GET.get('version')
try:
- meta = request.backend.get_object_meta(request.user_uniq, v_account,
+ meta = request.backend.get_object_meta(request.userid, v_account,
v_container, v_object, 'pithos', version)
if version is None:
- permissions = request.backend.get_object_permissions(request.user_uniq,
+ permissions = request.backend.get_object_permissions(request.userid,
v_account, v_container, v_object)
- public = request.backend.get_object_public(request.user_uniq, v_account,
+ public = request.backend.get_object_public(request.userid, v_account,
v_container, v_object)
else:
permissions = None
raise BadRequest('No format specified for version list.')
try:
- v = request.backend.list_versions(request.user_uniq, v_account,
+ v = request.backend.list_versions(request.userid, v_account,
v_container, v_object)
except NotAllowedError:
raise Forbidden('Not allowed')
return response
try:
- meta = request.backend.get_object_meta(request.user_uniq, v_account,
+ meta = request.backend.get_object_meta(request.userid, v_account,
v_container, v_object, 'pithos', version)
if version is None:
- permissions = request.backend.get_object_permissions(request.user_uniq,
+ permissions = request.backend.get_object_permissions(request.userid,
v_account, v_container, v_object)
- public = request.backend.get_object_public(request.user_uniq, v_account,
+ public = request.backend.get_object_public(request.userid, v_account,
v_container, v_object)
else:
permissions = None
if 'X-Object-Manifest' in meta and not hashmap_reply:
try:
src_container, src_name = split_container_object_string('/' + meta['X-Object-Manifest'])
- objects = request.backend.list_objects(request.user_uniq, v_account,
+ objects = request.backend.list_objects(request.userid, v_account,
src_container, prefix=src_name, virtual=False)
except NotAllowedError:
raise Forbidden('Not allowed')
try:
for x in objects:
- s, h = request.backend.get_object_hashmap(request.user_uniq,
+ s, h = request.backend.get_object_hashmap(request.userid,
v_account, src_container, x[0], x[1])
sizes.append(s)
hashmaps.append(h)
raise ItemNotFound('Version does not exist')
else:
try:
- s, h = request.backend.get_object_hashmap(request.user_uniq, v_account,
+ s, h = request.backend.get_object_hashmap(request.userid, v_account,
v_container, v_object, version)
sizes.append(s)
hashmaps.append(h)
# Evaluate conditions.
if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
try:
- meta = request.backend.get_object_meta(request.user_uniq, v_account,
+ meta = request.backend.get_object_meta(request.userid, v_account,
v_container, v_object, 'pithos')
except NotAllowedError:
raise Forbidden('Not allowed')
src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
if not src_account:
- src_account = request.user_uniq
+ src_account = request.userid
if move_from:
try:
src_container, src_name = split_container_object_string(move_from)
raise UnprocessableEntity('Object ETag does not match')
try:
- version_id = request.backend.update_object_hashmap(request.user_uniq,
+ version_id = request.backend.update_object_hashmap(request.userid,
v_account, v_container, v_object, size, content_type,
hashmap, checksum, 'pithos', meta, True, permissions)
except NotAllowedError:
# Update the MD5 after the hashmap, as there may be missing hashes.
checksum = hashmap_md5(request, hashmap, size)
try:
- version_id = request.backend.update_object_checksum(request.user_uniq,
+ version_id = request.backend.update_object_checksum(request.userid,
v_account, v_container, v_object, version_id, checksum)
except NotAllowedError:
raise Forbidden('Not allowed')
if public is not None:
try:
- request.backend.update_object_public(request.user_uniq, v_account,
+ request.backend.update_object_public(request.userid, v_account,
v_container, v_object, public)
except NotAllowedError:
raise Forbidden('Not allowed')
checksum = file.etag
try:
- version_id = request.backend.update_object_hashmap(request.user_uniq,
+ version_id = request.backend.update_object_hashmap(request.userid,
v_account, v_container, v_object, file.size, file.content_type,
file.hashmap, checksum, 'pithos', {}, True)
except NotAllowedError:
dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
if not dest_account:
- dest_account = request.user_uniq
+ dest_account = request.userid
dest_path = request.META.get('HTTP_DESTINATION')
if not dest_path:
raise BadRequest('Missing Destination header')
if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
src_version = request.META.get('HTTP_X_SOURCE_VERSION')
try:
- meta = request.backend.get_object_meta(request.user_uniq, v_account,
+ meta = request.backend.get_object_meta(request.userid, v_account,
v_container, v_object, 'pithos', src_version)
except NotAllowedError:
raise Forbidden('Not allowed')
dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
if not dest_account:
- dest_account = request.user_uniq
+ dest_account = request.userid
dest_path = request.META.get('HTTP_DESTINATION')
if not dest_path:
raise BadRequest('Missing Destination header')
# Evaluate conditions.
if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
try:
- meta = request.backend.get_object_meta(request.user_uniq, v_account,
+ meta = request.backend.get_object_meta(request.userid, v_account,
v_container, v_object, 'pithos')
except NotAllowedError:
raise Forbidden('Not allowed')
content_type, meta, permissions, public = get_object_headers(request)
try:
- prev_meta = request.backend.get_object_meta(request.user_uniq, v_account,
+ prev_meta = request.backend.get_object_meta(request.userid, v_account,
v_container, v_object, 'pithos')
except NotAllowedError:
raise Forbidden('Not allowed')
# Do permissions first, as it may fail easier.
if permissions is not None:
try:
- request.backend.update_object_permissions(request.user_uniq,
+ request.backend.update_object_permissions(request.userid,
v_account, v_container, v_object, permissions)
except NotAllowedError:
raise Forbidden('Not allowed')
raise BadRequest('Invalid sharing header')
if public is not None:
try:
- request.backend.update_object_public(request.user_uniq, v_account,
+ request.backend.update_object_public(request.userid, v_account,
v_container, v_object, public)
except NotAllowedError:
raise Forbidden('Not allowed')
raise ItemNotFound('Object does not exist')
if meta or replace:
try:
- version_id = request.backend.update_object_meta(request.user_uniq,
+ version_id = request.backend.update_object_meta(request.userid,
v_account, v_container, v_object, 'pithos', meta, replace)
except NotAllowedError:
raise Forbidden('Not allowed')
raise RangeNotSatisfiable('Invalid Content-Range header')
try:
- size, hashmap = request.backend.get_object_hashmap(request.user_uniq,
+ size, hashmap = request.backend.get_object_hashmap(request.userid,
v_account, v_container, v_object)
except NotAllowedError:
raise Forbidden('Not allowed')
if src_object:
src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
if not src_account:
- src_account = request.user_uniq
+ src_account = request.userid
src_container, src_name = split_container_object_string(src_object)
src_version = request.META.get('HTTP_X_SOURCE_VERSION')
try:
- src_size, src_hashmap = request.backend.get_object_hashmap(request.user_uniq,
+ src_size, src_hashmap = request.backend.get_object_hashmap(request.userid,
src_account, src_container, src_name, src_version)
except NotAllowedError:
raise Forbidden('Not allowed')
hashmap = hashmap[:(int((size - 1) / request.backend.block_size) + 1)]
checksum = hashmap_md5(request, hashmap, size)
try:
- version_id = request.backend.update_object_hashmap(request.user_uniq,
+ version_id = request.backend.update_object_hashmap(request.userid,
v_account, v_container, v_object, size, prev_meta['type'],
hashmap, checksum, 'pithos', meta, replace, permissions)
except NotAllowedError:
raise RequestEntityTooLarge('Quota exceeded')
if public is not None:
try:
- request.backend.update_object_public(request.user_uniq, v_account,
+ request.backend.update_object_public(request.userid, v_account,
v_container, v_object, public)
except NotAllowedError:
raise Forbidden('Not allowed')
until = get_int_parameter(request.GET.get('until'))
try:
- request.backend.delete_object(request.user_uniq, v_account, v_container,
+ request.backend.delete_object(request.userid, v_account, v_container,
v_object, until)
except NotAllowedError:
raise Forbidden('Not allowed')