Statistics
| Branch: | Tag: | Revision:

root / pithos / api / functions.py @ 371d907a

History | View | Annotate | Download (51.4 kB)

1
# Copyright 2011-2012 GRNET S.A. All rights reserved.
2
# 
3
# Redistribution and use in source and binary forms, with or
4
# without modification, are permitted provided that the following
5
# conditions are met:
6
# 
7
#   1. Redistributions of source code must retain the above
8
#      copyright notice, this list of conditions and the following
9
#      disclaimer.
10
# 
11
#   2. Redistributions in binary form must reproduce the above
12
#      copyright notice, this list of conditions and the following
13
#      disclaimer in the documentation and/or other materials
14
#      provided with the distribution.
15
# 
16
# THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
17
# OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
20
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24
# AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
26
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27
# POSSIBILITY OF SUCH DAMAGE.
28
# 
29
# The views and conclusions contained in the software and
30
# documentation are those of the authors and should not be
31
# interpreted as representing official policies, either expressed
32
# or implied, of GRNET S.A.
33

    
34
from xml.dom import minidom
35

    
36
from django.conf import settings
37
from django.http import HttpResponse
38
from django.template.loader import render_to_string
39
from django.utils import simplejson as json
40
from django.utils.http import parse_etags
41
from django.utils.encoding import smart_str
42
from django.views.decorators.csrf import csrf_exempt
43

    
44
from pithos.lib.filter import parse_filters
45

    
46
from pithos.api.faults import (Fault, NotModified, BadRequest, Unauthorized, Forbidden, ItemNotFound, Conflict,
47
    LengthRequired, PreconditionFailed, RequestEntityTooLarge, RangeNotSatisfiable, UnprocessableEntity)
48
from pithos.api.util import (json_encode_decimal, rename_meta_key, format_header_key, printable_header_dict,
49
    get_account_headers, put_account_headers, get_container_headers, put_container_headers, get_object_headers,
50
    put_object_headers, update_manifest_meta, update_sharing_meta, update_public_meta,
51
    validate_modification_preconditions, validate_matching_preconditions, split_container_object_string,
52
    copy_or_move_object, get_int_parameter, get_content_length, get_content_range, socket_read_iterator,
53
    SaveToBackendHandler, object_data_response, put_object_block, hashmap_md5, simple_list_response, api_method)
54
from pithos.backends.base import NotAllowedError, QuotaError
55

    
56
import logging
57
import hashlib
58

    
59

    
60
logger = logging.getLogger(__name__)
61

    
62

    
63
@csrf_exempt
64
def top_demux(request):
65
    if request.method == 'GET':
66
        if getattr(request, 'user', None) is not None:
67
            return account_list(request)
68
        return authenticate(request)
69
    else:
70
        return method_not_allowed(request)
71

    
72
@csrf_exempt
73
def account_demux(request, v_account):
74
    if request.method == 'HEAD':
75
        return account_meta(request, v_account)
76
    elif request.method == 'POST':
77
        return account_update(request, v_account)
78
    elif request.method == 'GET':
79
        return container_list(request, v_account)
80
    else:
81
        return method_not_allowed(request)
82

    
83
@csrf_exempt
84
def container_demux(request, v_account, v_container):
85
    if request.method == 'HEAD':
86
        return container_meta(request, v_account, v_container)
87
    elif request.method == 'PUT':
88
        return container_create(request, v_account, v_container)
89
    elif request.method == 'POST':
90
        return container_update(request, v_account, v_container)
91
    elif request.method == 'DELETE':
92
        return container_delete(request, v_account, v_container)
93
    elif request.method == 'GET':
94
        return object_list(request, v_account, v_container)
95
    else:
96
        return method_not_allowed(request)
97

    
98
@csrf_exempt
99
def object_demux(request, v_account, v_container, v_object):
100
    if request.method == 'HEAD':
101
        return object_meta(request, v_account, v_container, v_object)
102
    elif request.method == 'GET':
103
        return object_read(request, v_account, v_container, v_object)
104
    elif request.method == 'PUT':
105
        return object_write(request, v_account, v_container, v_object)
106
    elif request.method == 'COPY':
107
        return object_copy(request, v_account, v_container, v_object)
108
    elif request.method == 'MOVE':
109
        return object_move(request, v_account, v_container, v_object)
110
    elif request.method == 'POST':
111
        if request.META.get('CONTENT_TYPE', '').startswith('multipart/form-data'):
112
            return object_write_form(request, v_account, v_container, v_object)
113
        return object_update(request, v_account, v_container, v_object)
114
    elif request.method == 'DELETE':
115
        return object_delete(request, v_account, v_container, v_object)
116
    else:
117
        return method_not_allowed(request)
118

    
119
@api_method('GET', user_required=False)
120
def authenticate(request):
121
    # Normal Response Codes: 204
122
    # Error Response Codes: internalServerError (500),
123
    #                       forbidden (403),
124
    #                       badRequest (400)
125
    
126
    x_auth_user = request.META.get('HTTP_X_AUTH_USER')
127
    x_auth_key = request.META.get('HTTP_X_AUTH_KEY')
128
    if not x_auth_user or not x_auth_key:
129
        raise BadRequest('Missing X-Auth-User or X-Auth-Key header')
130
    response = HttpResponse(status=204)
131
    
132
    uri = request.build_absolute_uri()
133
    if '?' in uri:
134
        uri = uri[:uri.find('?')]
135
    
136
    response['X-Auth-Token'] = x_auth_key
137
    response['X-Storage-Url'] = uri + ('' if uri.endswith('/') else '/') + x_auth_user
138
    return response
139

    
140
@api_method('GET', format_allowed=True)
141
def account_list(request):
142
    # Normal Response Codes: 200, 204
143
    # Error Response Codes: internalServerError (500),
144
    #                       badRequest (400)
145
    
146
    response = HttpResponse()
147
    
148
    marker = request.GET.get('marker')
149
    limit = get_int_parameter(request.GET.get('limit'))
150
    if not limit:
151
        limit = 10000
152
    
153
    accounts = request.backend.list_accounts(request.user_uniq, marker, limit)
154
    
155
    if request.serialization == 'text':
156
        if len(accounts) == 0:
157
            # The cloudfiles python bindings expect 200 if json/xml.
158
            response.status_code = 204
159
            return response
160
        response.status_code = 200
161
        response.content = '\n'.join(accounts) + '\n'
162
        return response
163
    
164
    account_meta = []
165
    for x in accounts:
166
        if x == request.user_uniq:
167
            continue
168
        try:
169
            meta = request.backend.get_account_meta(request.user_uniq, x, 'pithos')
170
            groups = request.backend.get_account_groups(request.user_uniq, x)
171
        except NotAllowedError:
172
            raise Forbidden('Not allowed')
173
        else:
174
            rename_meta_key(meta, 'modified', 'last_modified')
175
            rename_meta_key(meta, 'until_timestamp', 'x_account_until_timestamp')
176
            m = dict([(k[15:], v) for k, v in meta.iteritems() if k.startswith('X-Account-Meta-')])
177
            for k in m:
178
                del(meta['X-Account-Meta-' + k])
179
            if m:
180
                meta['X-Account-Meta'] = printable_header_dict(m)
181
            if groups:
182
                meta['X-Account-Group'] = printable_header_dict(dict([(k, ','.join(v)) for k, v in groups.iteritems()]))
183
            account_meta.append(printable_header_dict(meta))
184
    if request.serialization == 'xml':
185
        data = render_to_string('accounts.xml', {'accounts': account_meta})
186
    elif request.serialization  == 'json':
187
        data = json.dumps(account_meta)
188
    response.status_code = 200
189
    response.content = data
190
    return response
191

    
192
@api_method('HEAD')
193
def account_meta(request, v_account):
194
    # Normal Response Codes: 204
195
    # Error Response Codes: internalServerError (500),
196
    #                       forbidden (403),
197
    #                       badRequest (400)
198
    
199
    until = get_int_parameter(request.GET.get('until'))
200
    try:
201
        meta = request.backend.get_account_meta(request.user_uniq, v_account, 'pithos', until)
202
        groups = request.backend.get_account_groups(request.user_uniq, v_account)
203
        policy = request.backend.get_account_policy(request.user_uniq, v_account)
204
    except NotAllowedError:
205
        raise Forbidden('Not allowed')
206
    
207
    validate_modification_preconditions(request, meta)
208
    
209
    response = HttpResponse(status=204)
210
    put_account_headers(response, meta, groups, policy)
211
    return response
212

    
213
@api_method('POST')
214
def account_update(request, v_account):
215
    # Normal Response Codes: 202
216
    # Error Response Codes: internalServerError (500),
217
    #                       forbidden (403),
218
    #                       badRequest (400)
219
    
220
    meta, groups = get_account_headers(request)
221
    replace = True
222
    if 'update' in request.GET:
223
        replace = False
224
    if groups:
225
        try:
226
            request.backend.update_account_groups(request.user_uniq, v_account,
227
                                                    groups, replace)
228
        except NotAllowedError:
229
            raise Forbidden('Not allowed')
230
        except ValueError:
231
            raise BadRequest('Invalid groups header')
232
    if meta or replace:
233
        try:
234
            request.backend.update_account_meta(request.user_uniq, v_account,
235
                                                'pithos', meta, replace)
236
        except NotAllowedError:
237
            raise Forbidden('Not allowed')
238
    return HttpResponse(status=202)
239

    
240
@api_method('GET', format_allowed=True)
241
def container_list(request, v_account):
242
    # Normal Response Codes: 200, 204
243
    # Error Response Codes: internalServerError (500),
244
    #                       itemNotFound (404),
245
    #                       forbidden (403),
246
    #                       badRequest (400)
247
    
248
    until = get_int_parameter(request.GET.get('until'))
249
    try:
250
        meta = request.backend.get_account_meta(request.user_uniq, v_account, 'pithos', until)
251
        groups = request.backend.get_account_groups(request.user_uniq, v_account)
252
        policy = request.backend.get_account_policy(request.user_uniq, v_account)
253
    except NotAllowedError:
254
        raise Forbidden('Not allowed')
255
    
256
    validate_modification_preconditions(request, meta)
257
    
258
    response = HttpResponse()
259
    put_account_headers(response, meta, groups, policy)
260
    
261
    marker = request.GET.get('marker')
262
    limit = get_int_parameter(request.GET.get('limit'))
263
    if not limit:
264
        limit = 10000
265
    
266
    shared = False
267
    if 'shared' in request.GET:
268
        shared = True
269
    
270
    try:
271
        containers = request.backend.list_containers(request.user_uniq, v_account,
272
                                                marker, limit, shared, until)
273
    except NotAllowedError:
274
        raise Forbidden('Not allowed')
275
    except NameError:
276
        containers = []
277
    
278
    if request.serialization == 'text':
279
        if len(containers) == 0:
280
            # The cloudfiles python bindings expect 200 if json/xml.
281
            response.status_code = 204
282
            return response
283
        response.status_code = 200
284
        response.content = '\n'.join(containers) + '\n'
285
        return response
286
    
287
    container_meta = []
288
    for x in containers:
289
        try:
290
            meta = request.backend.get_container_meta(request.user_uniq, v_account,
291
                                                        x, 'pithos', until)
292
            policy = request.backend.get_container_policy(request.user_uniq,
293
                                                            v_account, x)
294
        except NotAllowedError:
295
            raise Forbidden('Not allowed')
296
        except NameError:
297
            pass
298
        else:
299
            rename_meta_key(meta, 'modified', 'last_modified')
300
            rename_meta_key(meta, 'until_timestamp', 'x_container_until_timestamp')
301
            m = dict([(k[17:], v) for k, v in meta.iteritems() if k.startswith('X-Container-Meta-')])
302
            for k in m:
303
                del(meta['X-Container-Meta-' + k])
304
            if m:
305
                meta['X-Container-Meta'] = printable_header_dict(m)
306
            if policy:
307
                meta['X-Container-Policy'] = printable_header_dict(dict([(k, v) for k, v in policy.iteritems()]))
308
            container_meta.append(printable_header_dict(meta))
309
    if request.serialization == 'xml':
310
        data = render_to_string('containers.xml', {'account': v_account, 'containers': container_meta})
311
    elif request.serialization  == 'json':
312
        data = json.dumps(container_meta)
313
    response.status_code = 200
314
    response.content = data
315
    return response
316

    
317
@api_method('HEAD')
318
def container_meta(request, v_account, v_container):
319
    # Normal Response Codes: 204
320
    # Error Response Codes: internalServerError (500),
321
    #                       itemNotFound (404),
322
    #                       forbidden (403),
323
    #                       badRequest (400)
324
    
325
    until = get_int_parameter(request.GET.get('until'))
326
    try:
327
        meta = request.backend.get_container_meta(request.user_uniq, v_account,
328
                                                    v_container, 'pithos', until)
329
        meta['object_meta'] = request.backend.list_container_meta(request.user_uniq,
330
                                                v_account, v_container, 'pithos', until)
331
        policy = request.backend.get_container_policy(request.user_uniq, v_account,
332
                                                        v_container)
333
    except NotAllowedError:
334
        raise Forbidden('Not allowed')
335
    except NameError:
336
        raise ItemNotFound('Container does not exist')
337
    
338
    validate_modification_preconditions(request, meta)
339
    
340
    response = HttpResponse(status=204)
341
    put_container_headers(request, response, meta, policy)
342
    return response
343

    
344
@api_method('PUT')
345
def container_create(request, v_account, v_container):
346
    # Normal Response Codes: 201, 202
347
    # Error Response Codes: internalServerError (500),
348
    #                       itemNotFound (404),
349
    #                       forbidden (403),
350
    #                       badRequest (400)
351
    
352
    meta, policy = get_container_headers(request)
353
    
354
    try:
355
        request.backend.put_container(request.user_uniq, v_account, v_container, policy)
356
        ret = 201
357
    except NotAllowedError:
358
        raise Forbidden('Not allowed')
359
    except ValueError:
360
        raise BadRequest('Invalid policy header')
361
    except NameError:
362
        ret = 202
363
    
364
    if ret == 202 and policy:
365
        try:
366
            request.backend.update_container_policy(request.user_uniq, v_account,
367
                                            v_container, policy, replace=False)
368
        except NotAllowedError:
369
            raise Forbidden('Not allowed')
370
        except NameError:
371
            raise ItemNotFound('Container does not exist')
372
        except ValueError:
373
            raise BadRequest('Invalid policy header')
374
    if meta:
375
        try:
376
            request.backend.update_container_meta(request.user_uniq, v_account,
377
                                            v_container, 'pithos', meta, replace=False)
378
        except NotAllowedError:
379
            raise Forbidden('Not allowed')
380
        except NameError:
381
            raise ItemNotFound('Container does not exist')
382
    
383
    return HttpResponse(status=ret)
384

    
385
@api_method('POST', format_allowed=True)
386
def container_update(request, v_account, v_container):
387
    # Normal Response Codes: 202
388
    # Error Response Codes: internalServerError (500),
389
    #                       itemNotFound (404),
390
    #                       forbidden (403),
391
    #                       badRequest (400)
392
    
393
    meta, policy = get_container_headers(request)
394
    replace = True
395
    if 'update' in request.GET:
396
        replace = False
397
    if policy:
398
        try:
399
            request.backend.update_container_policy(request.user_uniq, v_account,
400
                                                v_container, policy, replace)
401
        except NotAllowedError:
402
            raise Forbidden('Not allowed')
403
        except NameError:
404
            raise ItemNotFound('Container does not exist')
405
        except ValueError:
406
            raise BadRequest('Invalid policy header')
407
    if meta or replace:
408
        try:
409
            request.backend.update_container_meta(request.user_uniq, v_account,
410
                                                    v_container, 'pithos', meta, replace)
411
        except NotAllowedError:
412
            raise Forbidden('Not allowed')
413
        except NameError:
414
            raise ItemNotFound('Container does not exist')
415
    
416
    content_length = -1
417
    if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
418
        content_length = get_int_parameter(request.META.get('CONTENT_LENGTH', 0))
419
    content_type = request.META.get('CONTENT_TYPE')
420
    hashmap = []
421
    if content_type and content_type == 'application/octet-stream' and content_length != 0:
422
        for data in socket_read_iterator(request, content_length,
423
                                            request.backend.block_size):
424
            # TODO: Raise 408 (Request Timeout) if this takes too long.
425
            # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
426
            hashmap.append(request.backend.put_block(data))
427
    
428
    response = HttpResponse(status=202)
429
    if hashmap:
430
        response.content = simple_list_response(request, hashmap)
431
    return response
432

    
433
@api_method('DELETE')
434
def container_delete(request, v_account, v_container):
435
    # Normal Response Codes: 204
436
    # Error Response Codes: internalServerError (500),
437
    #                       conflict (409),
438
    #                       itemNotFound (404),
439
    #                       forbidden (403),
440
    #                       badRequest (400)
441
    
442
    until = get_int_parameter(request.GET.get('until'))
443
    try:
444
        request.backend.delete_container(request.user_uniq, v_account, v_container,
445
                                            until)
446
    except NotAllowedError:
447
        raise Forbidden('Not allowed')
448
    except NameError:
449
        raise ItemNotFound('Container does not exist')
450
    except IndexError:
451
        raise Conflict('Container is not empty')
452
    return HttpResponse(status=204)
453

    
454
@api_method('GET', format_allowed=True)
455
def object_list(request, v_account, v_container):
456
    # Normal Response Codes: 200, 204
457
    # Error Response Codes: internalServerError (500),
458
    #                       itemNotFound (404),
459
    #                       forbidden (403),
460
    #                       badRequest (400)
461
    
462
    until = get_int_parameter(request.GET.get('until'))
463
    try:
464
        meta = request.backend.get_container_meta(request.user_uniq, v_account,
465
                                                    v_container, 'pithos', until)
466
        meta['object_meta'] = request.backend.list_container_meta(request.user_uniq,
467
                                                v_account, v_container, 'pithos', until)
468
        policy = request.backend.get_container_policy(request.user_uniq, v_account,
469
                                                        v_container)
470
    except NotAllowedError:
471
        raise Forbidden('Not allowed')
472
    except NameError:
473
        raise ItemNotFound('Container does not exist')
474
    
475
    validate_modification_preconditions(request, meta)
476
    
477
    response = HttpResponse()
478
    put_container_headers(request, response, meta, policy)
479
    
480
    path = request.GET.get('path')
481
    prefix = request.GET.get('prefix')
482
    delimiter = request.GET.get('delimiter')
483
    
484
    # Path overrides prefix and delimiter.
485
    virtual = True
486
    if path:
487
        prefix = path
488
        delimiter = '/'
489
        virtual = False
490
    
491
    # Naming policy.
492
    if prefix and delimiter:
493
        prefix = prefix + delimiter
494
    if not prefix:
495
        prefix = ''
496
    prefix = prefix.lstrip('/')
497
    
498
    marker = request.GET.get('marker')
499
    limit = get_int_parameter(request.GET.get('limit'))
500
    if not limit:
501
        limit = 10000
502
    
503
    keys = request.GET.get('meta')
504
    if keys:
505
        keys = [smart_str(x.strip()) for x in keys.split(',') if x.strip() != '']
506
        included, excluded, opers = parse_filters(keys)
507
        keys = []
508
        keys += [format_header_key('X-Object-Meta-' + x) for x in included]
509
        keys += ['!'+format_header_key('X-Object-Meta-' + x) for x in excluded]
510
        keys += ['%s%s%s' % (format_header_key('X-Object-Meta-' + k), o, v) for k, o, v in opers]
511
    else:
512
        keys = []
513
    
514
    shared = False
515
    if 'shared' in request.GET:
516
        shared = True
517
    
518
    if request.serialization == 'text':
519
        try:
520
            objects = request.backend.list_objects(request.user_uniq, v_account,
521
                                        v_container, prefix, delimiter, marker,
522
                                        limit, virtual, 'pithos', keys, shared, until)
523
        except NotAllowedError:
524
            raise Forbidden('Not allowed')
525
        except NameError:
526
            raise ItemNotFound('Container does not exist')
527
        
528
        if len(objects) == 0:
529
            # The cloudfiles python bindings expect 200 if json/xml.
530
            response.status_code = 204
531
            return response
532
        response.status_code = 200
533
        response.content = '\n'.join([x[0] for x in objects]) + '\n'
534
        return response
535
    
536
    try:
537
        objects = request.backend.list_object_meta(request.user_uniq, v_account,
538
                                    v_container, prefix, delimiter, marker,
539
                                    limit, virtual, 'pithos', keys, shared, until)
540
    except NotAllowedError:
541
        raise Forbidden('Not allowed')
542
    except NameError:
543
        raise ItemNotFound('Container does not exist')
544
    
545
#     object_meta = []
546
#     for x in objects:
547
#         if x[1] is None:
548
#             # Virtual objects/directories.
549
#             object_meta.append({'subdir': x[0]})
550
#         else:
551
#             try:
552
#                 meta = request.backend.get_object_meta(request.user_uniq, v_account,
553
#                                                         v_container, x[0], 'pithos', x[1])
554
#                 if until is None:
555
#                     permissions = request.backend.get_object_permissions(
556
#                                     request.user_uniq, v_account, v_container, x[0])
557
#                     public = request.backend.get_object_public(request.user_uniq,
558
#                                                 v_account, v_container, x[0])
559
#                 else:
560
#                     permissions = None
561
#                     public = None
562
#             except NotAllowedError:
563
#                 raise Forbidden('Not allowed')
564
#             except NameError:
565
#                 pass
566
#             else:
567
#                 rename_meta_key(meta, 'hash', 'x_object_hash') # Will be replaced by checksum.
568
#                 rename_meta_key(meta, 'checksum', 'hash')
569
#                 rename_meta_key(meta, 'type', 'content_type')
570
#                 rename_meta_key(meta, 'uuid', 'x_object_uuid')
571
#                 rename_meta_key(meta, 'modified', 'last_modified')
572
#                 rename_meta_key(meta, 'modified_by', 'x_object_modified_by')
573
#                 rename_meta_key(meta, 'version', 'x_object_version')
574
#                 rename_meta_key(meta, 'version_timestamp', 'x_object_version_timestamp')
575
#                 m = dict([(k[14:], v) for k, v in meta.iteritems() if k.startswith('X-Object-Meta-')])
576
#                 for k in m:
577
#                     del(meta['X-Object-Meta-' + k])
578
#                 if m:
579
#                     meta['X-Object-Meta'] = printable_header_dict(m)
580
#                 update_sharing_meta(request, permissions, v_account, v_container, x[0], meta)
581
#                 update_public_meta(public, meta)
582
#                 object_meta.append(printable_header_dict(meta))
583
#     if request.serialization == 'xml':
584
#         data = render_to_string('objects.xml', {'container': v_container, 'objects': object_meta})
585
#     elif request.serialization  == 'json':
586
#         data = json.dumps(object_meta, default=json_encode_decimal)
587
#     response.status_code = 200
588
#     response.content = data
589
#     return response
590
    
591
    object_meta = []
592
    for meta in objects:
593
        if len(meta) == 1:
594
            # Virtual objects/directories.
595
            object_meta.append(meta)
596
        else:
597
            rename_meta_key(meta, 'hash', 'x_object_hash') # Will be replaced by checksum.
598
            rename_meta_key(meta, 'checksum', 'hash')
599
            rename_meta_key(meta, 'type', 'content_type')
600
            rename_meta_key(meta, 'uuid', 'x_object_uuid')
601
            if until is not None and 'modified' in meta:
602
                del(meta['modified'])
603
            else:
604
                rename_meta_key(meta, 'modified', 'last_modified')
605
            rename_meta_key(meta, 'modified_by', 'x_object_modified_by')
606
            rename_meta_key(meta, 'version', 'x_object_version')
607
            rename_meta_key(meta, 'version_timestamp', 'x_object_version_timestamp')
608
            object_meta.append(printable_header_dict(meta))
609
    if request.serialization == 'xml':
610
        data = render_to_string('objects.xml', {'container': v_container, 'objects': object_meta})
611
    elif request.serialization  == 'json':
612
        data = json.dumps(object_meta, default=json_encode_decimal)
613
    response.status_code = 200
614
    response.content = data
615
    return response
616

    
617
@api_method('HEAD')
618
def object_meta(request, v_account, v_container, v_object):
619
    # Normal Response Codes: 204
620
    # Error Response Codes: internalServerError (500),
621
    #                       itemNotFound (404),
622
    #                       forbidden (403),
623
    #                       badRequest (400)
624
    
625
    version = request.GET.get('version')
626
    try:
627
        meta = request.backend.get_object_meta(request.user_uniq, v_account,
628
                                                v_container, v_object, 'pithos', version)
629
        if version is None:
630
            permissions = request.backend.get_object_permissions(request.user_uniq,
631
                                            v_account, v_container, v_object)
632
            public = request.backend.get_object_public(request.user_uniq, v_account,
633
                                                        v_container, v_object)
634
        else:
635
            permissions = None
636
            public = None
637
    except NotAllowedError:
638
        raise Forbidden('Not allowed')
639
    except NameError:
640
        raise ItemNotFound('Object does not exist')
641
    except IndexError:
642
        raise ItemNotFound('Version does not exist')
643
    
644
    update_manifest_meta(request, v_account, meta)
645
    update_sharing_meta(request, permissions, v_account, v_container, v_object, meta)
646
    update_public_meta(public, meta)
647
    
648
    # Evaluate conditions.
649
    validate_modification_preconditions(request, meta)
650
    try:
651
        validate_matching_preconditions(request, meta)
652
    except NotModified:
653
        response = HttpResponse(status=304)
654
        response['ETag'] = meta['checksum']
655
        return response
656
    
657
    response = HttpResponse(status=200)
658
    put_object_headers(response, meta)
659
    return response
660

    
661
@api_method('GET', format_allowed=True)
662
def object_read(request, v_account, v_container, v_object):
663
    # Normal Response Codes: 200, 206
664
    # Error Response Codes: internalServerError (500),
665
    #                       rangeNotSatisfiable (416),
666
    #                       preconditionFailed (412),
667
    #                       itemNotFound (404),
668
    #                       forbidden (403),
669
    #                       badRequest (400),
670
    #                       notModified (304)
671
    
672
    version = request.GET.get('version')
673
    
674
    # Reply with the version list. Do this first, as the object may be deleted.
675
    if version == 'list':
676
        if request.serialization == 'text':
677
            raise BadRequest('No format specified for version list.')
678
        
679
        try:
680
            v = request.backend.list_versions(request.user_uniq, v_account,
681
                                                v_container, v_object)
682
        except NotAllowedError:
683
            raise Forbidden('Not allowed')
684
        d = {'versions': v}
685
        if request.serialization == 'xml':
686
            d['object'] = v_object
687
            data = render_to_string('versions.xml', d)
688
        elif request.serialization  == 'json':
689
            data = json.dumps(d, default=json_encode_decimal)
690
        
691
        response = HttpResponse(data, status=200)
692
        response['Content-Length'] = len(data)
693
        return response
694
    
695
    try:
696
        meta = request.backend.get_object_meta(request.user_uniq, v_account,
697
                                                v_container, v_object, 'pithos', version)
698
        if version is None:
699
            permissions = request.backend.get_object_permissions(request.user_uniq,
700
                                            v_account, v_container, v_object)
701
            public = request.backend.get_object_public(request.user_uniq, v_account,
702
                                                        v_container, v_object)
703
        else:
704
            permissions = None
705
            public = None
706
    except NotAllowedError:
707
        raise Forbidden('Not allowed')
708
    except NameError:
709
        raise ItemNotFound('Object does not exist')
710
    except IndexError:
711
        raise ItemNotFound('Version does not exist')
712
    
713
    update_manifest_meta(request, v_account, meta)
714
    update_sharing_meta(request, permissions, v_account, v_container, v_object, meta)
715
    update_public_meta(public, meta)
716
    
717
    # Evaluate conditions.
718
    validate_modification_preconditions(request, meta)
719
    try:
720
        validate_matching_preconditions(request, meta)
721
    except NotModified:
722
        response = HttpResponse(status=304)
723
        response['ETag'] = meta['checksum']
724
        return response
725
    
726
    sizes = []
727
    hashmaps = []
728
    if 'X-Object-Manifest' in meta:
729
        try:
730
            src_container, src_name = split_container_object_string('/' + meta['X-Object-Manifest'])
731
            objects = request.backend.list_objects(request.user_uniq, v_account,
732
                                src_container, prefix=src_name, virtual=False)
733
        except NotAllowedError:
734
            raise Forbidden('Not allowed')
735
        except ValueError:
736
            raise BadRequest('Invalid X-Object-Manifest header')
737
        except NameError:
738
            raise ItemNotFound('Container does not exist')
739
        
740
        try:
741
            for x in objects:
742
                s, h = request.backend.get_object_hashmap(request.user_uniq,
743
                                        v_account, src_container, x[0], x[1])
744
                sizes.append(s)
745
                hashmaps.append(h)
746
        except NotAllowedError:
747
            raise Forbidden('Not allowed')
748
        except NameError:
749
            raise ItemNotFound('Object does not exist')
750
        except IndexError:
751
            raise ItemNotFound('Version does not exist')
752
    else:
753
        try:
754
            s, h = request.backend.get_object_hashmap(request.user_uniq, v_account,
755
                                                v_container, v_object, version)
756
            sizes.append(s)
757
            hashmaps.append(h)
758
        except NotAllowedError:
759
            raise Forbidden('Not allowed')
760
        except NameError:
761
            raise ItemNotFound('Object does not exist')
762
        except IndexError:
763
            raise ItemNotFound('Version does not exist')
764
    
765
    # Reply with the hashmap.
766
    if 'hashmap' in request.GET and request.serialization != 'text':
767
        size = sum(sizes)
768
        hashmap = sum(hashmaps, [])
769
        d = {
770
            'block_size': request.backend.block_size,
771
            'block_hash': request.backend.hash_algorithm,
772
            'bytes': size,
773
            'hashes': hashmap}
774
        if request.serialization == 'xml':
775
            d['object'] = v_object
776
            data = render_to_string('hashes.xml', d)
777
        elif request.serialization  == 'json':
778
            data = json.dumps(d)
779
        
780
        response = HttpResponse(data, status=200)
781
        put_object_headers(response, meta)
782
        response['Content-Length'] = len(data)
783
        return response
784
    
785
    request.serialization = 'text' # Unset.
786
    return object_data_response(request, sizes, hashmaps, meta)
787

    
788
@api_method('PUT', format_allowed=True)
789
def object_write(request, v_account, v_container, v_object):
790
    # Normal Response Codes: 201
791
    # Error Response Codes: internalServerError (500),
792
    #                       unprocessableEntity (422),
793
    #                       lengthRequired (411),
794
    #                       conflict (409),
795
    #                       itemNotFound (404),
796
    #                       forbidden (403),
797
    #                       badRequest (400)
798
    
799
    # Evaluate conditions.
800
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
801
        try:
802
            meta = request.backend.get_object_meta(request.user_uniq, v_account,
803
                                                        v_container, v_object, 'pithos')
804
        except NotAllowedError:
805
            raise Forbidden('Not allowed')
806
        except NameError:
807
            meta = {}
808
        validate_matching_preconditions(request, meta)
809
    
810
    copy_from = request.META.get('HTTP_X_COPY_FROM')
811
    move_from = request.META.get('HTTP_X_MOVE_FROM')
812
    if copy_from or move_from:
813
        content_length = get_content_length(request) # Required by the API.
814
        
815
        src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
816
        if not src_account:
817
            src_account = request.user_uniq
818
        if move_from:
819
            try:
820
                src_container, src_name = split_container_object_string(move_from)
821
            except ValueError:
822
                raise BadRequest('Invalid X-Move-From header')
823
            version_id = copy_or_move_object(request, src_account, src_container, src_name,
824
                                                v_account, v_container, v_object, move=True)
825
        else:
826
            try:
827
                src_container, src_name = split_container_object_string(copy_from)
828
            except ValueError:
829
                raise BadRequest('Invalid X-Copy-From header')
830
            version_id = copy_or_move_object(request, src_account, src_container, src_name,
831
                                                v_account, v_container, v_object, move=False)
832
        response = HttpResponse(status=201)
833
        response['X-Object-Version'] = version_id
834
        return response
835
    
836
    content_type, meta, permissions, public = get_object_headers(request)
837
    content_length = -1
838
    if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
839
        content_length = get_content_length(request)
840
    # Should be BadRequest, but API says otherwise.
841
    if not content_type:
842
        raise LengthRequired('Missing Content-Type header')
843
    
844
    if 'hashmap' in request.GET:
845
        if request.serialization not in ('json', 'xml'):
846
            raise BadRequest('Invalid hashmap format')
847
        
848
        data = ''
849
        for block in socket_read_iterator(request, content_length,
850
                                            request.backend.block_size):
851
            data = '%s%s' % (data, block)
852
        
853
        if request.serialization == 'json':
854
            d = json.loads(data)
855
            if not hasattr(d, '__getitem__'):
856
                raise BadRequest('Invalid data formating')
857
            try:
858
                hashmap = d['hashes']
859
                size = int(d['bytes'])
860
            except:
861
                raise BadRequest('Invalid data formatting')
862
        elif request.serialization == 'xml':
863
            try:
864
                xml = minidom.parseString(data)
865
                obj = xml.getElementsByTagName('object')[0]
866
                size = int(obj.attributes['bytes'].value)
867
                
868
                hashes = xml.getElementsByTagName('hash')
869
                hashmap = []
870
                for hash in hashes:
871
                    hashmap.append(hash.firstChild.data)
872
            except:
873
                raise BadRequest('Invalid data formatting')
874
        
875
        checksum = '' # Do not set to None (will copy previous value).
876
    else:
877
        md5 = hashlib.md5()
878
        size = 0
879
        hashmap = []
880
        for data in socket_read_iterator(request, content_length,
881
                                            request.backend.block_size):
882
            # TODO: Raise 408 (Request Timeout) if this takes too long.
883
            # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
884
            size += len(data)
885
            hashmap.append(request.backend.put_block(data))
886
            md5.update(data)
887
        
888
        checksum = md5.hexdigest().lower()
889
        etag = request.META.get('HTTP_ETAG')
890
        if etag and parse_etags(etag)[0].lower() != checksum:
891
            raise UnprocessableEntity('Object ETag does not match')
892
    
893
    try:
894
        version_id = request.backend.update_object_hashmap(request.user_uniq,
895
                        v_account, v_container, v_object, size, content_type,
896
                        hashmap, checksum, 'pithos', meta, True, permissions)
897
    except NotAllowedError:
898
        raise Forbidden('Not allowed')
899
    except IndexError, e:
900
        raise Conflict(simple_list_response(request, e.data))
901
    except NameError:
902
        raise ItemNotFound('Container does not exist')
903
    except ValueError:
904
        raise BadRequest('Invalid sharing header')
905
    except QuotaError:
906
        raise RequestEntityTooLarge('Quota exceeded')
907
    if not checksum:
908
        # Update the MD5 after the hashmap, as there may be missing hashes.
909
        checksum = hashmap_md5(request, hashmap, size)
910
        try:
911
            version_id = request.backend.update_object_checksum(request.user_uniq,
912
                            v_account, v_container, v_object, version_id, checksum)
913
        except NotAllowedError:
914
            raise Forbidden('Not allowed')
915
    if public is not None:
916
        try:
917
            request.backend.update_object_public(request.user_uniq, v_account,
918
                                                v_container, v_object, public)
919
        except NotAllowedError:
920
            raise Forbidden('Not allowed')
921
        except NameError:
922
            raise ItemNotFound('Object does not exist')
923
    
924
    response = HttpResponse(status=201)
925
    if checksum:
926
        response['ETag'] = checksum
927
    response['X-Object-Version'] = version_id
928
    return response
929

    
930
@api_method('POST')
931
def object_write_form(request, v_account, v_container, v_object):
932
    # Normal Response Codes: 201
933
    # Error Response Codes: internalServerError (500),
934
    #                       itemNotFound (404),
935
    #                       forbidden (403),
936
    #                       badRequest (400)
937
    
938
    request.upload_handlers = [SaveToBackendHandler(request)]
939
    if not request.FILES.has_key('X-Object-Data'):
940
        raise BadRequest('Missing X-Object-Data field')
941
    file = request.FILES['X-Object-Data']
942
    
943
    checksum = file.etag
944
    try:
945
        version_id = request.backend.update_object_hashmap(request.user_uniq,
946
                        v_account, v_container, v_object, file.size, file.content_type,
947
                        file.hashmap, checksum, 'pithos', {}, True)
948
    except NotAllowedError:
949
        raise Forbidden('Not allowed')
950
    except NameError:
951
        raise ItemNotFound('Container does not exist')
952
    except QuotaError:
953
        raise RequestEntityTooLarge('Quota exceeded')
954
    
955
    response = HttpResponse(status=201)
956
    response['ETag'] = checksum
957
    response['X-Object-Version'] = version_id
958
    response.content = checksum
959
    return response
960

    
961
@api_method('COPY', format_allowed=True)
962
def object_copy(request, v_account, v_container, v_object):
963
    # Normal Response Codes: 201
964
    # Error Response Codes: internalServerError (500),
965
    #                       itemNotFound (404),
966
    #                       forbidden (403),
967
    #                       badRequest (400)
968
    
969
    dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
970
    if not dest_account:
971
        dest_account = request.user_uniq
972
    dest_path = request.META.get('HTTP_DESTINATION')
973
    if not dest_path:
974
        raise BadRequest('Missing Destination header')
975
    try:
976
        dest_container, dest_name = split_container_object_string(dest_path)
977
    except ValueError:
978
        raise BadRequest('Invalid Destination header')
979
    
980
    # Evaluate conditions.
981
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
982
        src_version = request.META.get('HTTP_X_SOURCE_VERSION')
983
        try:
984
            meta = request.backend.get_object_meta(request.user_uniq, v_account,
985
                                            v_container, v_object, 'pithos', src_version)
986
        except NotAllowedError:
987
            raise Forbidden('Not allowed')
988
        except (NameError, IndexError):
989
            raise ItemNotFound('Container or object does not exist')
990
        validate_matching_preconditions(request, meta)
991
    
992
    version_id = copy_or_move_object(request, v_account, v_container, v_object,
993
                                        dest_account, dest_container, dest_name, move=False)
994
    response = HttpResponse(status=201)
995
    response['X-Object-Version'] = version_id
996
    return response
997

    
998
@api_method('MOVE', format_allowed=True)
999
def object_move(request, v_account, v_container, v_object):
1000
    # Normal Response Codes: 201
1001
    # Error Response Codes: internalServerError (500),
1002
    #                       itemNotFound (404),
1003
    #                       forbidden (403),
1004
    #                       badRequest (400)
1005
    
1006
    dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
1007
    if not dest_account:
1008
        dest_account = request.user_uniq
1009
    dest_path = request.META.get('HTTP_DESTINATION')
1010
    if not dest_path:
1011
        raise BadRequest('Missing Destination header')
1012
    try:
1013
        dest_container, dest_name = split_container_object_string(dest_path)
1014
    except ValueError:
1015
        raise BadRequest('Invalid Destination header')
1016
    
1017
    # Evaluate conditions.
1018
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
1019
        try:
1020
            meta = request.backend.get_object_meta(request.user_uniq, v_account,
1021
                                                    v_container, v_object, 'pithos')
1022
        except NotAllowedError:
1023
            raise Forbidden('Not allowed')
1024
        except NameError:
1025
            raise ItemNotFound('Container or object does not exist')
1026
        validate_matching_preconditions(request, meta)
1027
    
1028
    version_id = copy_or_move_object(request, v_account, v_container, v_object,
1029
                                        dest_account, dest_container, dest_name, move=True)
1030
    response = HttpResponse(status=201)
1031
    response['X-Object-Version'] = version_id
1032
    return response
1033

    
1034
@api_method('POST', format_allowed=True)
1035
def object_update(request, v_account, v_container, v_object):
1036
    # Normal Response Codes: 202, 204
1037
    # Error Response Codes: internalServerError (500),
1038
    #                       conflict (409),
1039
    #                       itemNotFound (404),
1040
    #                       forbidden (403),
1041
    #                       badRequest (400)
1042
    
1043
    content_type, meta, permissions, public = get_object_headers(request)
1044
    
1045
    try:
1046
        prev_meta = request.backend.get_object_meta(request.user_uniq, v_account,
1047
                                                    v_container, v_object, 'pithos')
1048
    except NotAllowedError:
1049
        raise Forbidden('Not allowed')
1050
    except NameError:
1051
        raise ItemNotFound('Object does not exist')
1052
    
1053
    # Evaluate conditions.
1054
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
1055
        validate_matching_preconditions(request, prev_meta)
1056
    
1057
    replace = True
1058
    if 'update' in request.GET:
1059
        replace = False
1060
    
1061
    # A Content-Type or X-Source-Object header indicates data updates.
1062
    src_object = request.META.get('HTTP_X_SOURCE_OBJECT')
1063
    if (not content_type or content_type != 'application/octet-stream') and not src_object:
1064
        response = HttpResponse(status=202)
1065
        
1066
        # Do permissions first, as it may fail easier.
1067
        if permissions is not None:
1068
            try:
1069
                request.backend.update_object_permissions(request.user_uniq,
1070
                                v_account, v_container, v_object, permissions)
1071
            except NotAllowedError:
1072
                raise Forbidden('Not allowed')
1073
            except NameError:
1074
                raise ItemNotFound('Object does not exist')
1075
            except ValueError:
1076
                raise BadRequest('Invalid sharing header')
1077
        if public is not None:
1078
            try:
1079
                request.backend.update_object_public(request.user_uniq, v_account,
1080
                                                v_container, v_object, public)
1081
            except NotAllowedError:
1082
                raise Forbidden('Not allowed')
1083
            except NameError:
1084
                raise ItemNotFound('Object does not exist')
1085
        if meta or replace:
1086
            try:
1087
                version_id = request.backend.update_object_meta(request.user_uniq,
1088
                                v_account, v_container, v_object, 'pithos', meta, replace)
1089
            except NotAllowedError:
1090
                raise Forbidden('Not allowed')
1091
            except NameError:
1092
                raise ItemNotFound('Object does not exist')        
1093
            response['X-Object-Version'] = version_id
1094
        
1095
        return response
1096
    
1097
    # Single range update. Range must be in Content-Range.
1098
    # Based on: http://code.google.com/p/gears/wiki/ContentRangePostProposal
1099
    # (with the addition that '*' is allowed for the range - will append).
1100
    content_range = request.META.get('HTTP_CONTENT_RANGE')
1101
    if not content_range:
1102
        raise BadRequest('Missing Content-Range header')
1103
    ranges = get_content_range(request)
1104
    if not ranges:
1105
        raise RangeNotSatisfiable('Invalid Content-Range header')
1106
    
1107
    try:
1108
        size, hashmap = request.backend.get_object_hashmap(request.user_uniq,
1109
                                            v_account, v_container, v_object)
1110
    except NotAllowedError:
1111
        raise Forbidden('Not allowed')
1112
    except NameError:
1113
        raise ItemNotFound('Object does not exist')
1114
    
1115
    offset, length, total = ranges
1116
    if offset is None:
1117
        offset = size
1118
    elif offset > size:
1119
        raise RangeNotSatisfiable('Supplied offset is beyond object limits')
1120
    if src_object:
1121
        src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
1122
        if not src_account:
1123
            src_account = request.user_uniq
1124
        src_container, src_name = split_container_object_string(src_object)
1125
        src_version = request.META.get('HTTP_X_SOURCE_VERSION')
1126
        try:
1127
            src_size, src_hashmap = request.backend.get_object_hashmap(request.user_uniq,
1128
                                        src_account, src_container, src_name, src_version)
1129
        except NotAllowedError:
1130
            raise Forbidden('Not allowed')
1131
        except NameError:
1132
            raise ItemNotFound('Source object does not exist')
1133
        
1134
        if length is None:
1135
            length = src_size
1136
        elif length > src_size:
1137
            raise BadRequest('Object length is smaller than range length')
1138
    else:
1139
        # Require either a Content-Length, or 'chunked' Transfer-Encoding.
1140
        content_length = -1
1141
        if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
1142
            content_length = get_content_length(request)
1143
        
1144
        if length is None:
1145
            length = content_length
1146
        else:
1147
            if content_length == -1:
1148
                # TODO: Get up to length bytes in chunks.
1149
                length = content_length
1150
            elif length != content_length:
1151
                raise BadRequest('Content length does not match range length')
1152
    if total is not None and (total != size or offset >= size or (length > 0 and offset + length >= size)):
1153
        raise RangeNotSatisfiable('Supplied range will change provided object limits')
1154
    
1155
    dest_bytes = request.META.get('HTTP_X_OBJECT_BYTES')
1156
    if dest_bytes is not None:
1157
        dest_bytes = get_int_parameter(dest_bytes)
1158
        if dest_bytes is None:
1159
            raise BadRequest('Invalid X-Object-Bytes header')
1160
    
1161
    if src_object:
1162
        if offset % request.backend.block_size == 0:
1163
            # Update the hashes only.
1164
            sbi = 0
1165
            while length > 0:
1166
                bi = int(offset / request.backend.block_size)
1167
                bl = min(length, request.backend.block_size)
1168
                if bi < len(hashmap):
1169
                    if bl == request.backend.block_size:
1170
                        hashmap[bi] = src_hashmap[sbi]
1171
                    else:
1172
                        data = request.backend.get_block(src_hashmap[sbi])
1173
                        hashmap[bi] = request.backend.update_block(hashmap[bi],
1174
                                                                data[:bl], 0)
1175
                else:
1176
                    hashmap.append(src_hashmap[sbi])
1177
                offset += bl
1178
                length -= bl
1179
                sbi += 1
1180
        else:
1181
            data = ''
1182
            sbi = 0
1183
            while length > 0:
1184
                data += request.backend.get_block(src_hashmap[sbi])
1185
                if length < request.backend.block_size:
1186
                    data = data[:length]
1187
                bytes = put_object_block(request, hashmap, data, offset)
1188
                offset += bytes
1189
                data = data[bytes:]
1190
                length -= bytes
1191
                sbi += 1
1192
    else:
1193
        data = ''
1194
        for d in socket_read_iterator(request, length,
1195
                                        request.backend.block_size):
1196
            # TODO: Raise 408 (Request Timeout) if this takes too long.
1197
            # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
1198
            data += d
1199
            bytes = put_object_block(request, hashmap, data, offset)
1200
            offset += bytes
1201
            data = data[bytes:]
1202
        if len(data) > 0:
1203
            put_object_block(request, hashmap, data, offset)
1204
    
1205
    if offset > size:
1206
        size = offset
1207
    if dest_bytes is not None and dest_bytes < size:
1208
        size = dest_bytes
1209
        hashmap = hashmap[:(int((size - 1) / request.backend.block_size) + 1)]
1210
    checksum = hashmap_md5(request, hashmap, size)
1211
    try:
1212
        version_id = request.backend.update_object_hashmap(request.user_uniq,
1213
                        v_account, v_container, v_object, size, prev_meta['type'],
1214
                        hashmap, checksum, 'pithos', meta, replace, permissions)
1215
    except NotAllowedError:
1216
        raise Forbidden('Not allowed')
1217
    except NameError:
1218
        raise ItemNotFound('Container does not exist')
1219
    except ValueError:
1220
        raise BadRequest('Invalid sharing header')
1221
    except QuotaError:
1222
        raise RequestEntityTooLarge('Quota exceeded')
1223
    if public is not None:
1224
        try:
1225
            request.backend.update_object_public(request.user_uniq, v_account,
1226
                                                v_container, v_object, public)
1227
        except NotAllowedError:
1228
            raise Forbidden('Not allowed')
1229
        except NameError:
1230
            raise ItemNotFound('Object does not exist')
1231
    
1232
    response = HttpResponse(status=204)
1233
    response['ETag'] = checksum
1234
    response['X-Object-Version'] = version_id
1235
    return response
1236

    
1237
@api_method('DELETE')
1238
def object_delete(request, v_account, v_container, v_object):
1239
    # Normal Response Codes: 204
1240
    # Error Response Codes: internalServerError (500),
1241
    #                       itemNotFound (404),
1242
    #                       forbidden (403),
1243
    #                       badRequest (400)
1244
    
1245
    until = get_int_parameter(request.GET.get('until'))
1246
    try:
1247
        request.backend.delete_object(request.user_uniq, v_account, v_container,
1248
                                        v_object, until)
1249
    except NotAllowedError:
1250
        raise Forbidden('Not allowed')
1251
    except NameError:
1252
        raise ItemNotFound('Object does not exist')
1253
    return HttpResponse(status=204)
1254

    
1255
@api_method()
1256
def method_not_allowed(request):
1257
    raise BadRequest('Method not allowed')