Statistics
| Branch: | Tag: | Revision:

root / snf-pithos-app / pithos / api / functions.py @ 02b8c298

History | View | Annotate | Download (51 kB)

1
# Copyright 2011-2012 GRNET S.A. All rights reserved.
2
#
3
# Redistribution and use in source and binary forms, with or
4
# without modification, are permitted provided that the following
5
# conditions are met:
6
#
7
#   1. Redistributions of source code must retain the above
8
#      copyright notice, this list of conditions and the following
9
#      disclaimer.
10
#
11
#   2. Redistributions in binary form must reproduce the above
12
#      copyright notice, this list of conditions and the following
13
#      disclaimer in the documentation and/or other materials
14
#      provided with the distribution.
15
#
16
# THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
17
# OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
20
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24
# AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
26
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27
# POSSIBILITY OF SUCH DAMAGE.
28
#
29
# The views and conclusions contained in the software and
30
# documentation are those of the authors and should not be
31
# interpreted as representing official policies, either expressed
32
# or implied, of GRNET S.A.
33

    
34
from xml.dom import minidom
35
from urllib import unquote
36

    
37
from django.conf import settings
38
from django.http import HttpResponse
39
from django.template.loader import render_to_string
40
from django.utils import simplejson as json
41
from django.utils.http import parse_etags
42
from django.utils.encoding import smart_str
43
from django.views.decorators.csrf import csrf_exempt
44

    
45
from synnefo.lib.astakos import get_user
46

    
47
from pithos.api.faults import (
48
    Fault, NotModified, BadRequest, Unauthorized, Forbidden, ItemNotFound, Conflict,
49
    LengthRequired, PreconditionFailed, RequestEntityTooLarge, RangeNotSatisfiable, UnprocessableEntity)
50
from pithos.api.util import (
51
    json_encode_decimal, rename_meta_key, format_header_key, printable_header_dict,
52
    get_account_headers, put_account_headers, get_container_headers, put_container_headers, get_object_headers,
53
    put_object_headers, update_manifest_meta, update_sharing_meta, update_public_meta,
54
    validate_modification_preconditions, validate_matching_preconditions, split_container_object_string,
55
    copy_or_move_object, get_int_parameter, get_content_length, get_content_range, socket_read_iterator,
56
    SaveToBackendHandler, object_data_response, put_object_block, hashmap_md5, simple_list_response, api_method)
57
from pithos.api.settings import UPDATE_MD5
58

    
59
from pithos.backends.base import NotAllowedError, QuotaError, ContainerNotEmpty, ItemNotExists, VersionNotExists, ContainerExists
60

    
61
from pithos.backends.filter import parse_filters
62

    
63
import logging
64
import hashlib
65

    
66

    
67
logger = logging.getLogger(__name__)
68

    
69

    
70
@csrf_exempt
71
def top_demux(request):
72
    if request.method == 'GET':
73
        try:
74
            request.GET['X-Auth-Token']
75
        except KeyError:
76
            try:
77
                request.META['HTTP_X_AUTH_TOKEN']
78
            except KeyError:
79
                return authenticate(request)
80
        return account_list(request)
81
    else:
82
        return method_not_allowed(request)
83

    
84

    
85
@csrf_exempt
86
def account_demux(request, v_account):
87
    if request.method == 'HEAD':
88
        return account_meta(request, v_account)
89
    elif request.method == 'POST':
90
        return account_update(request, v_account)
91
    elif request.method == 'GET':
92
        return container_list(request, v_account)
93
    else:
94
        return method_not_allowed(request)
95

    
96

    
97
@csrf_exempt
98
def container_demux(request, v_account, v_container):
99
    if request.method == 'HEAD':
100
        return container_meta(request, v_account, v_container)
101
    elif request.method == 'PUT':
102
        return container_create(request, v_account, v_container)
103
    elif request.method == 'POST':
104
        return container_update(request, v_account, v_container)
105
    elif request.method == 'DELETE':
106
        return container_delete(request, v_account, v_container)
107
    elif request.method == 'GET':
108
        return object_list(request, v_account, v_container)
109
    else:
110
        return method_not_allowed(request)
111

    
112

    
113
@csrf_exempt
114
def object_demux(request, v_account, v_container, v_object):
115
    # Helper to avoid placing the token in the URL when loading objects from a browser.
116
    if request.method == 'HEAD':
117
        return object_meta(request, v_account, v_container, v_object)
118
    elif request.method == 'GET':
119
        return object_read(request, v_account, v_container, v_object)
120
    elif request.method == 'PUT':
121
        return object_write(request, v_account, v_container, v_object)
122
    elif request.method == 'COPY':
123
        return object_copy(request, v_account, v_container, v_object)
124
    elif request.method == 'MOVE':
125
        return object_move(request, v_account, v_container, v_object)
126
    elif request.method == 'POST':
127
        if request.META.get('CONTENT_TYPE', '').startswith('multipart/form-data'):
128
            return object_write_form(request, v_account, v_container, v_object)
129
        return object_update(request, v_account, v_container, v_object)
130
    elif request.method == 'DELETE':
131
        return object_delete(request, v_account, v_container, v_object)
132
    else:
133
        return method_not_allowed(request)
134

    
135

    
136
@api_method('GET', user_required=False)
137
def authenticate(request):
138
    # Normal Response Codes: 204
139
    # Error Response Codes: internalServerError (500),
140
    #                       forbidden (403),
141
    #                       badRequest (400)
142

    
143
    x_auth_user = request.META.get('HTTP_X_AUTH_USER')
144
    x_auth_key = request.META.get('HTTP_X_AUTH_KEY')
145
    if not x_auth_user or not x_auth_key:
146
        raise BadRequest('Missing X-Auth-User or X-Auth-Key header')
147
    response = HttpResponse(status=204)
148

    
149
    uri = request.build_absolute_uri()
150
    if '?' in uri:
151
        uri = uri[:uri.find('?')]
152

    
153
    response['X-Auth-Token'] = x_auth_key
154
    response['X-Storage-Url'] = uri + ('' if uri.endswith('/')
155
                                       else '/') + x_auth_user
156
    return response
157

    
158

    
159
@api_method('GET', format_allowed=True)
160
def account_list(request):
161
    # Normal Response Codes: 200, 204
162
    # Error Response Codes: internalServerError (500),
163
    #                       badRequest (400)
164
    response = HttpResponse()
165

    
166
    marker = request.GET.get('marker')
167
    limit = get_int_parameter(request.GET.get('limit'))
168
    if not limit:
169
        limit = 10000
170

    
171
    accounts = request.backend.list_accounts(request.user_uniq, marker, limit)
172

    
173
    if request.serialization == 'text':
174
        if len(accounts) == 0:
175
            # The cloudfiles python bindings expect 200 if json/xml.
176
            response.status_code = 204
177
            return response
178
        response.status_code = 200
179
        response.content = '\n'.join(accounts) + '\n'
180
        return response
181

    
182
    account_meta = []
183
    for x in accounts:
184
        if x == request.user_uniq:
185
            continue
186
        try:
187
            meta = request.backend.get_account_meta(
188
                request.user_uniq, x, 'pithos', include_user_defined=False)
189
            groups = request.backend.get_account_groups(request.user_uniq, x)
190
        except NotAllowedError:
191
            raise Forbidden('Not allowed')
192
        else:
193
            rename_meta_key(meta, 'modified', 'last_modified')
194
            rename_meta_key(
195
                meta, 'until_timestamp', 'x_account_until_timestamp')
196
            if groups:
197
                meta['X-Account-Group'] = printable_header_dict(
198
                    dict([(k, ','.join(v)) for k, v in groups.iteritems()]))
199
            account_meta.append(printable_header_dict(meta))
200
    if request.serialization == 'xml':
201
        data = render_to_string('accounts.xml', {'accounts': account_meta})
202
    elif request.serialization == 'json':
203
        data = json.dumps(account_meta)
204
    response.status_code = 200
205
    response.content = data
206
    return response
207

    
208

    
209
@api_method('HEAD')
210
def account_meta(request, v_account):
211
    # Normal Response Codes: 204
212
    # Error Response Codes: internalServerError (500),
213
    #                       forbidden (403),
214
    #                       badRequest (400)
215

    
216
    until = get_int_parameter(request.GET.get('until'))
217
    try:
218
        meta = request.backend.get_account_meta(
219
            request.user_uniq, v_account, 'pithos', until)
220
        groups = request.backend.get_account_groups(
221
            request.user_uniq, v_account)
222
        policy = request.backend.get_account_policy(
223
            request.user_uniq, v_account)
224
    except NotAllowedError:
225
        raise Forbidden('Not allowed')
226

    
227
    validate_modification_preconditions(request, meta)
228

    
229
    response = HttpResponse(status=204)
230
    put_account_headers(response, meta, groups, policy)
231
    return response
232

    
233

    
234
@api_method('POST')
235
def account_update(request, v_account):
236
    # Normal Response Codes: 202
237
    # Error Response Codes: internalServerError (500),
238
    #                       forbidden (403),
239
    #                       badRequest (400)
240

    
241
    meta, groups = get_account_headers(request)
242
    replace = True
243
    if 'update' in request.GET:
244
        replace = False
245
    if groups:
246
        try:
247
            request.backend.update_account_groups(request.user_uniq, v_account,
248
                                                  groups, replace)
249
        except NotAllowedError:
250
            raise Forbidden('Not allowed')
251
        except ValueError:
252
            raise BadRequest('Invalid groups header')
253
    if meta or replace:
254
        try:
255
            request.backend.update_account_meta(request.user_uniq, v_account,
256
                                                'pithos', meta, replace)
257
        except NotAllowedError:
258
            raise Forbidden('Not allowed')
259
    return HttpResponse(status=202)
260

    
261

    
262
@api_method('GET', format_allowed=True)
263
def container_list(request, v_account):
264
    # Normal Response Codes: 200, 204
265
    # Error Response Codes: internalServerError (500),
266
    #                       itemNotFound (404),
267
    #                       forbidden (403),
268
    #                       badRequest (400)
269

    
270
    until = get_int_parameter(request.GET.get('until'))
271
    try:
272
        meta = request.backend.get_account_meta(
273
            request.user_uniq, v_account, 'pithos', until)
274
        groups = request.backend.get_account_groups(
275
            request.user_uniq, v_account)
276
        policy = request.backend.get_account_policy(
277
            request.user_uniq, v_account)
278
    except NotAllowedError:
279
        raise Forbidden('Not allowed')
280

    
281
    validate_modification_preconditions(request, meta)
282

    
283
    response = HttpResponse()
284
    put_account_headers(response, meta, groups, policy)
285

    
286
    marker = request.GET.get('marker')
287
    limit = get_int_parameter(request.GET.get('limit'))
288
    if not limit:
289
        limit = 10000
290

    
291
    shared = False
292
    if 'shared' in request.GET:
293
        shared = True
294
    public = False
295
    if 'public' in request.GET:
296
        public = True
297

    
298
    try:
299
        containers = request.backend.list_containers(
300
            request.user_uniq, v_account,
301
            marker, limit, shared, until, public)
302
    except NotAllowedError:
303
        raise Forbidden('Not allowed')
304
    except NameError:
305
        containers = []
306

    
307
    if request.serialization == 'text':
308
        if len(containers) == 0:
309
            # The cloudfiles python bindings expect 200 if json/xml.
310
            response.status_code = 204
311
            return response
312
        response.status_code = 200
313
        response.content = '\n'.join(containers) + '\n'
314
        return response
315

    
316
    container_meta = []
317
    for x in containers:
318
        try:
319
            meta = request.backend.get_container_meta(
320
                request.user_uniq, v_account,
321
                x, 'pithos', until, include_user_defined=False)
322
            policy = request.backend.get_container_policy(request.user_uniq,
323
                                                          v_account, x)
324
        except NotAllowedError:
325
            raise Forbidden('Not allowed')
326
        except NameError:
327
            pass
328
        else:
329
            rename_meta_key(meta, 'modified', 'last_modified')
330
            rename_meta_key(
331
                meta, 'until_timestamp', 'x_container_until_timestamp')
332
            if policy:
333
                meta['X-Container-Policy'] = printable_header_dict(
334
                    dict([(k, v) for k, v in policy.iteritems()]))
335
            container_meta.append(printable_header_dict(meta))
336
    if request.serialization == 'xml':
337
        data = render_to_string('containers.xml', {'account':
338
                                v_account, 'containers': container_meta})
339
    elif request.serialization == 'json':
340
        data = json.dumps(container_meta)
341
    response.status_code = 200
342
    response.content = data
343
    return response
344

    
345

    
346
@api_method('HEAD')
347
def container_meta(request, v_account, v_container):
348
    # Normal Response Codes: 204
349
    # Error Response Codes: internalServerError (500),
350
    #                       itemNotFound (404),
351
    #                       forbidden (403),
352
    #                       badRequest (400)
353

    
354
    until = get_int_parameter(request.GET.get('until'))
355
    try:
356
        meta = request.backend.get_container_meta(request.user_uniq, v_account,
357
                                                  v_container, 'pithos', until)
358
        meta['object_meta'] = request.backend.list_container_meta(request.user_uniq,
359
                                                                  v_account, v_container, 'pithos', until)
360
        policy = request.backend.get_container_policy(
361
            request.user_uniq, v_account,
362
            v_container)
363
    except NotAllowedError:
364
        raise Forbidden('Not allowed')
365
    except ItemNotExists:
366
        raise ItemNotFound('Container does not exist')
367

    
368
    validate_modification_preconditions(request, meta)
369

    
370
    response = HttpResponse(status=204)
371
    put_container_headers(request, response, meta, policy)
372
    return response
373

    
374

    
375
@api_method('PUT')
376
def container_create(request, v_account, v_container):
377
    # Normal Response Codes: 201, 202
378
    # Error Response Codes: internalServerError (500),
379
    #                       itemNotFound (404),
380
    #                       forbidden (403),
381
    #                       badRequest (400)
382

    
383
    meta, policy = get_container_headers(request)
384

    
385
    try:
386
        request.backend.put_container(
387
            request.user_uniq, v_account, v_container, policy)
388
        ret = 201
389
    except NotAllowedError:
390
        raise Forbidden('Not allowed')
391
    except ValueError:
392
        raise BadRequest('Invalid policy header')
393
    except ContainerExists:
394
        ret = 202
395

    
396
    if ret == 202 and policy:
397
        try:
398
            request.backend.update_container_policy(
399
                request.user_uniq, v_account,
400
                v_container, policy, replace=False)
401
        except NotAllowedError:
402
            raise Forbidden('Not allowed')
403
        except ItemNotExists:
404
            raise ItemNotFound('Container does not exist')
405
        except ValueError:
406
            raise BadRequest('Invalid policy header')
407
    if meta:
408
        try:
409
            request.backend.update_container_meta(request.user_uniq, v_account,
410
                                                  v_container, 'pithos', meta, replace=False)
411
        except NotAllowedError:
412
            raise Forbidden('Not allowed')
413
        except ItemNotExists:
414
            raise ItemNotFound('Container does not exist')
415

    
416
    return HttpResponse(status=ret)
417

    
418

    
419
@api_method('POST', format_allowed=True)
420
def container_update(request, v_account, v_container):
421
    # Normal Response Codes: 202
422
    # Error Response Codes: internalServerError (500),
423
    #                       itemNotFound (404),
424
    #                       forbidden (403),
425
    #                       badRequest (400)
426

    
427
    meta, policy = get_container_headers(request)
428
    replace = True
429
    if 'update' in request.GET:
430
        replace = False
431
    if policy:
432
        try:
433
            request.backend.update_container_policy(
434
                request.user_uniq, v_account,
435
                v_container, policy, replace)
436
        except NotAllowedError:
437
            raise Forbidden('Not allowed')
438
        except ItemNotExists:
439
            raise ItemNotFound('Container does not exist')
440
        except ValueError:
441
            raise BadRequest('Invalid policy header')
442
    if meta or replace:
443
        try:
444
            request.backend.update_container_meta(request.user_uniq, v_account,
445
                                                  v_container, 'pithos', meta, replace)
446
        except NotAllowedError:
447
            raise Forbidden('Not allowed')
448
        except ItemNotExists:
449
            raise ItemNotFound('Container does not exist')
450

    
451
    content_length = -1
452
    if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
453
        content_length = get_int_parameter(
454
            request.META.get('CONTENT_LENGTH', 0))
455
    content_type = request.META.get('CONTENT_TYPE')
456
    hashmap = []
457
    if content_type and content_type == 'application/octet-stream' and content_length != 0:
458
        for data in socket_read_iterator(request, content_length,
459
                                         request.backend.block_size):
460
            # TODO: Raise 408 (Request Timeout) if this takes too long.
461
            # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
462
            hashmap.append(request.backend.put_block(data))
463

    
464
    response = HttpResponse(status=202)
465
    if hashmap:
466
        response.content = simple_list_response(request, hashmap)
467
    return response
468

    
469

    
470
@api_method('DELETE')
471
def container_delete(request, v_account, v_container):
472
    # Normal Response Codes: 204
473
    # Error Response Codes: internalServerError (500),
474
    #                       conflict (409),
475
    #                       itemNotFound (404),
476
    #                       forbidden (403),
477
    #                       badRequest (400)
478

    
479
    until = get_int_parameter(request.GET.get('until'))
480

    
481
    delimiter = request.GET.get('delimiter')
482

    
483
    try:
484
        request.backend.delete_container(
485
            request.user_uniq, v_account, v_container,
486
            until, delimiter=delimiter)
487
    except NotAllowedError:
488
        raise Forbidden('Not allowed')
489
    except ItemNotExists:
490
        raise ItemNotFound('Container does not exist')
491
    except ContainerNotEmpty:
492
        raise Conflict('Container is not empty')
493
    return HttpResponse(status=204)
494

    
495

    
496
@api_method('GET', format_allowed=True)
497
def object_list(request, v_account, v_container):
498
    # Normal Response Codes: 200, 204
499
    # Error Response Codes: internalServerError (500),
500
    #                       itemNotFound (404),
501
    #                       forbidden (403),
502
    #                       badRequest (400)
503

    
504
    until = get_int_parameter(request.GET.get('until'))
505
    try:
506
        meta = request.backend.get_container_meta(request.user_uniq, v_account,
507
                                                  v_container, 'pithos', until)
508
        meta['object_meta'] = request.backend.list_container_meta(request.user_uniq,
509
                                                                  v_account, v_container, 'pithos', until)
510
        policy = request.backend.get_container_policy(
511
            request.user_uniq, v_account,
512
            v_container)
513
    except NotAllowedError:
514
        raise Forbidden('Not allowed')
515
    except ItemNotExists:
516
        raise ItemNotFound('Container does not exist')
517

    
518
    validate_modification_preconditions(request, meta)
519

    
520
    response = HttpResponse()
521
    put_container_headers(request, response, meta, policy)
522

    
523
    path = request.GET.get('path')
524
    prefix = request.GET.get('prefix')
525
    delimiter = request.GET.get('delimiter')
526

    
527
    # Path overrides prefix and delimiter.
528
    virtual = True
529
    if path:
530
        prefix = path
531
        delimiter = '/'
532
        virtual = False
533

    
534
    # Naming policy.
535
    if prefix and delimiter and not prefix.endswith(delimiter):
536
        prefix = prefix + delimiter
537
    if not prefix:
538
        prefix = ''
539
    prefix = prefix.lstrip('/')
540

    
541
    marker = request.GET.get('marker')
542
    limit = get_int_parameter(request.GET.get('limit'))
543
    if not limit:
544
        limit = 10000
545

    
546
    keys = request.GET.get('meta')
547
    if keys:
548
        keys = [smart_str(x.strip()) for x in keys.split(',')
549
                if x.strip() != '']
550
        included, excluded, opers = parse_filters(keys)
551
        keys = []
552
        keys += [format_header_key('X-Object-Meta-' + x) for x in included]
553
        keys += ['!' + format_header_key('X-Object-Meta-' + x)
554
                 for x in excluded]
555
        keys += ['%s%s%s' % (format_header_key(
556
            'X-Object-Meta-' + k), o, v) for k, o, v in opers]
557
    else:
558
        keys = []
559

    
560
    shared = False
561
    if 'shared' in request.GET:
562
        shared = True
563
    public = False
564
    if 'public' in request.GET:
565
        public = True
566

    
567
    if request.serialization == 'text':
568
        try:
569
            objects = request.backend.list_objects(
570
                request.user_uniq, v_account,
571
                v_container, prefix, delimiter, marker,
572
                limit, virtual, 'pithos', keys, shared,
573
                until, None, public)
574
        except NotAllowedError:
575
            raise Forbidden('Not allowed')
576
        except ItemNotExists:
577
            raise ItemNotFound('Container does not exist')
578

    
579
        if len(objects) == 0:
580
            # The cloudfiles python bindings expect 200 if json/xml.
581
            response.status_code = 204
582
            return response
583
        response.status_code = 200
584
        response.content = '\n'.join([x[0] for x in objects]) + '\n'
585
        return response
586

    
587
    try:
588
        objects = request.backend.list_object_meta(
589
            request.user_uniq, v_account,
590
            v_container, prefix, delimiter, marker,
591
            limit, virtual, 'pithos', keys, shared, until, None, public)
592
        object_permissions = {}
593
        object_public = {}
594
        if until is None:
595
            name_idx = len('/'.join((v_account, v_container, '')))
596
            for x in request.backend.list_object_permissions(request.user_uniq,
597
                                                             v_account, v_container, prefix):
598
                object = x[name_idx:]
599
                object_permissions[object] = request.backend.get_object_permissions(
600
                    request.user_uniq, v_account, v_container, object)
601
            for k, v in request.backend.list_object_public(request.user_uniq,
602
                                                           v_account, v_container, prefix).iteritems():
603
                object_public[k[name_idx:]] = v
604
    except NotAllowedError:
605
        raise Forbidden('Not allowed')
606
    except ItemNotExists:
607
        raise ItemNotFound('Container does not exist')
608

    
609
    object_meta = []
610
    for meta in objects:
611
        if len(meta) == 1:
612
            # Virtual objects/directories.
613
            object_meta.append(meta)
614
        else:
615
            rename_meta_key(
616
                meta, 'hash', 'x_object_hash')  # Will be replaced by checksum.
617
            rename_meta_key(meta, 'checksum', 'hash')
618
            rename_meta_key(meta, 'type', 'content_type')
619
            rename_meta_key(meta, 'uuid', 'x_object_uuid')
620
            if until is not None and 'modified' in meta:
621
                del(meta['modified'])
622
            else:
623
                rename_meta_key(meta, 'modified', 'last_modified')
624
            rename_meta_key(meta, 'modified_by', 'x_object_modified_by')
625
            rename_meta_key(meta, 'version', 'x_object_version')
626
            rename_meta_key(
627
                meta, 'version_timestamp', 'x_object_version_timestamp')
628
            permissions = object_permissions.get(meta['name'], None)
629
            if permissions:
630
                update_sharing_meta(request, permissions, v_account,
631
                                    v_container, meta['name'], meta)
632
            public = object_public.get(meta['name'], None)
633
            if public:
634
                update_public_meta(public, meta)
635
            object_meta.append(printable_header_dict(meta))
636
    if request.serialization == 'xml':
637
        data = render_to_string(
638
            'objects.xml', {'container': v_container, 'objects': object_meta})
639
    elif request.serialization == 'json':
640
        data = json.dumps(object_meta, default=json_encode_decimal)
641
    response.status_code = 200
642
    response.content = data
643
    return response
644

    
645

    
646
@api_method('HEAD')
647
def object_meta(request, v_account, v_container, v_object):
648
    # Normal Response Codes: 204
649
    # Error Response Codes: internalServerError (500),
650
    #                       itemNotFound (404),
651
    #                       forbidden (403),
652
    #                       badRequest (400)
653

    
654
    version = request.GET.get('version')
655
    try:
656
        meta = request.backend.get_object_meta(request.user_uniq, v_account,
657
                                               v_container, v_object, 'pithos', version)
658
        if version is None:
659
            permissions = request.backend.get_object_permissions(
660
                request.user_uniq,
661
                v_account, v_container, v_object)
662
            public = request.backend.get_object_public(
663
                request.user_uniq, v_account,
664
                v_container, v_object)
665
        else:
666
            permissions = None
667
            public = None
668
    except NotAllowedError:
669
        raise Forbidden('Not allowed')
670
    except ItemNotExists:
671
        raise ItemNotFound('Object does not exist')
672
    except VersionNotExists:
673
        raise ItemNotFound('Version does not exist')
674

    
675
    update_manifest_meta(request, v_account, meta)
676
    update_sharing_meta(
677
        request, permissions, v_account, v_container, v_object, meta)
678
    update_public_meta(public, meta)
679

    
680
    # Evaluate conditions.
681
    validate_modification_preconditions(request, meta)
682
    try:
683
        validate_matching_preconditions(request, meta)
684
    except NotModified:
685
        response = HttpResponse(status=304)
686
        response['ETag'] = meta['checksum']
687
        return response
688

    
689
    response = HttpResponse(status=200)
690
    put_object_headers(response, meta)
691
    return response
692

    
693

    
694
@api_method('GET', format_allowed=True)
695
def object_read(request, v_account, v_container, v_object):
696
    # Normal Response Codes: 200, 206
697
    # Error Response Codes: internalServerError (500),
698
    #                       rangeNotSatisfiable (416),
699
    #                       preconditionFailed (412),
700
    #                       itemNotFound (404),
701
    #                       forbidden (403),
702
    #                       badRequest (400),
703
    #                       notModified (304)
704

    
705
    version = request.GET.get('version')
706

    
707
    # Reply with the version list. Do this first, as the object may be deleted.
708
    if version == 'list':
709
        if request.serialization == 'text':
710
            raise BadRequest('No format specified for version list.')
711

    
712
        try:
713
            v = request.backend.list_versions(request.user_uniq, v_account,
714
                                              v_container, v_object)
715
        except NotAllowedError:
716
            raise Forbidden('Not allowed')
717
        except ItemNotExists:
718
            raise ItemNotFound('Object does not exist')
719
        d = {'versions': v}
720
        if request.serialization == 'xml':
721
            d['object'] = v_object
722
            data = render_to_string('versions.xml', d)
723
        elif request.serialization == 'json':
724
            data = json.dumps(d, default=json_encode_decimal)
725

    
726
        response = HttpResponse(data, status=200)
727
        response['Content-Length'] = len(data)
728
        return response
729

    
730
    try:
731
        meta = request.backend.get_object_meta(request.user_uniq, v_account,
732
                                               v_container, v_object, 'pithos', version)
733
        if version is None:
734
            permissions = request.backend.get_object_permissions(
735
                request.user_uniq,
736
                v_account, v_container, v_object)
737
            public = request.backend.get_object_public(
738
                request.user_uniq, v_account,
739
                v_container, v_object)
740
        else:
741
            permissions = None
742
            public = None
743
    except NotAllowedError:
744
        raise Forbidden('Not allowed')
745
    except ItemNotExists:
746
        raise ItemNotFound('Object does not exist')
747
    except VersionNotExists:
748
        raise ItemNotFound('Version does not exist')
749

    
750
    update_manifest_meta(request, v_account, meta)
751
    update_sharing_meta(
752
        request, permissions, v_account, v_container, v_object, meta)
753
    update_public_meta(public, meta)
754

    
755
    # Evaluate conditions.
756
    validate_modification_preconditions(request, meta)
757
    try:
758
        validate_matching_preconditions(request, meta)
759
    except NotModified:
760
        response = HttpResponse(status=304)
761
        response['ETag'] = meta['checksum']
762
        return response
763

    
764
    hashmap_reply = False
765
    if 'hashmap' in request.GET and request.serialization != 'text':
766
        hashmap_reply = True
767

    
768
    sizes = []
769
    hashmaps = []
770
    if 'X-Object-Manifest' in meta and not hashmap_reply:
771
        try:
772
            src_container, src_name = split_container_object_string(
773
                '/' + meta['X-Object-Manifest'])
774
            objects = request.backend.list_objects(
775
                request.user_uniq, v_account,
776
                src_container, prefix=src_name, virtual=False)
777
        except NotAllowedError:
778
            raise Forbidden('Not allowed')
779
        except ValueError:
780
            raise BadRequest('Invalid X-Object-Manifest header')
781
        except ItemNotExists:
782
            raise ItemNotFound('Container does not exist')
783

    
784
        try:
785
            for x in objects:
786
                s, h = request.backend.get_object_hashmap(request.user_uniq,
787
                                                          v_account, src_container, x[0], x[1])
788
                sizes.append(s)
789
                hashmaps.append(h)
790
        except NotAllowedError:
791
            raise Forbidden('Not allowed')
792
        except ItemNotExists:
793
            raise ItemNotFound('Object does not exist')
794
        except VersionNotExists:
795
            raise ItemNotFound('Version does not exist')
796
    else:
797
        try:
798
            s, h = request.backend.get_object_hashmap(
799
                request.user_uniq, v_account,
800
                v_container, v_object, version)
801
            sizes.append(s)
802
            hashmaps.append(h)
803
        except NotAllowedError:
804
            raise Forbidden('Not allowed')
805
        except ItemNotExists:
806
            raise ItemNotFound('Object does not exist')
807
        except VersionNotExists:
808
            raise ItemNotFound('Version does not exist')
809

    
810
    # Reply with the hashmap.
811
    if hashmap_reply:
812
        size = sum(sizes)
813
        hashmap = sum(hashmaps, [])
814
        d = {
815
            'block_size': request.backend.block_size,
816
            'block_hash': request.backend.hash_algorithm,
817
            'bytes': size,
818
            'hashes': hashmap}
819
        if request.serialization == 'xml':
820
            d['object'] = v_object
821
            data = render_to_string('hashes.xml', d)
822
        elif request.serialization == 'json':
823
            data = json.dumps(d)
824

    
825
        response = HttpResponse(data, status=200)
826
        put_object_headers(response, meta)
827
        response['Content-Length'] = len(data)
828
        return response
829

    
830
    request.serialization = 'text'  # Unset.
831
    return object_data_response(request, sizes, hashmaps, meta)
832

    
833

    
834
@api_method('PUT', format_allowed=True)
835
def object_write(request, v_account, v_container, v_object):
836
    # Normal Response Codes: 201
837
    # Error Response Codes: internalServerError (500),
838
    #                       unprocessableEntity (422),
839
    #                       lengthRequired (411),
840
    #                       conflict (409),
841
    #                       itemNotFound (404),
842
    #                       forbidden (403),
843
    #                       badRequest (400)
844

    
845
    # Evaluate conditions.
846
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
847
        try:
848
            meta = request.backend.get_object_meta(
849
                request.user_uniq, v_account,
850
                v_container, v_object, 'pithos')
851
        except NotAllowedError:
852
            raise Forbidden('Not allowed')
853
        except NameError:
854
            meta = {}
855
        validate_matching_preconditions(request, meta)
856

    
857
    copy_from = request.META.get('HTTP_X_COPY_FROM')
858
    move_from = request.META.get('HTTP_X_MOVE_FROM')
859
    if copy_from or move_from:
860
        delimiter = request.GET.get('delimiter')
861
        content_length = get_content_length(request)  # Required by the API.
862

    
863
        src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
864
        if not src_account:
865
            src_account = request.user_uniq
866
        if move_from:
867
            try:
868
                src_container, src_name = split_container_object_string(
869
                    move_from)
870
            except ValueError:
871
                raise BadRequest('Invalid X-Move-From header')
872
            version_id = copy_or_move_object(
873
                request, src_account, src_container, src_name,
874
                v_account, v_container, v_object, move=True, delimiter=delimiter)
875
        else:
876
            try:
877
                src_container, src_name = split_container_object_string(
878
                    copy_from)
879
            except ValueError:
880
                raise BadRequest('Invalid X-Copy-From header')
881
            version_id = copy_or_move_object(
882
                request, src_account, src_container, src_name,
883
                v_account, v_container, v_object, move=False, delimiter=delimiter)
884
        response = HttpResponse(status=201)
885
        response['X-Object-Version'] = version_id
886
        return response
887

    
888
    content_type, meta, permissions, public = get_object_headers(request)
889
    content_length = -1
890
    if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
891
        content_length = get_content_length(request)
892
    # Should be BadRequest, but API says otherwise.
893
    if content_type is None:
894
        raise LengthRequired('Missing Content-Type header')
895

    
896
    if 'hashmap' in request.GET:
897
        if request.serialization not in ('json', 'xml'):
898
            raise BadRequest('Invalid hashmap format')
899

    
900
        data = ''
901
        for block in socket_read_iterator(request, content_length,
902
                                          request.backend.block_size):
903
            data = '%s%s' % (data, block)
904

    
905
        if request.serialization == 'json':
906
            d = json.loads(data)
907
            if not hasattr(d, '__getitem__'):
908
                raise BadRequest('Invalid data formating')
909
            try:
910
                hashmap = d['hashes']
911
                size = int(d['bytes'])
912
            except:
913
                raise BadRequest('Invalid data formatting')
914
        elif request.serialization == 'xml':
915
            try:
916
                xml = minidom.parseString(data)
917
                obj = xml.getElementsByTagName('object')[0]
918
                size = int(obj.attributes['bytes'].value)
919

    
920
                hashes = xml.getElementsByTagName('hash')
921
                hashmap = []
922
                for hash in hashes:
923
                    hashmap.append(hash.firstChild.data)
924
            except:
925
                raise BadRequest('Invalid data formatting')
926

    
927
        checksum = ''  # Do not set to None (will copy previous value).
928
    else:
929
        md5 = hashlib.md5()
930
        size = 0
931
        hashmap = []
932
        for data in socket_read_iterator(request, content_length,
933
                                         request.backend.block_size):
934
            # TODO: Raise 408 (Request Timeout) if this takes too long.
935
            # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
936
            size += len(data)
937
            hashmap.append(request.backend.put_block(data))
938
            md5.update(data)
939

    
940
        checksum = md5.hexdigest().lower()
941
        etag = request.META.get('HTTP_ETAG')
942
        if etag and parse_etags(etag)[0].lower() != checksum:
943
            raise UnprocessableEntity('Object ETag does not match')
944

    
945
    try:
946
        version_id = request.backend.update_object_hashmap(request.user_uniq,
947
                                                           v_account, v_container, v_object, size, content_type,
948
                                                           hashmap, checksum, 'pithos', meta, True, permissions)
949
    except NotAllowedError:
950
        raise Forbidden('Not allowed')
951
    except IndexError, e:
952
        raise Conflict(simple_list_response(request, e.data))
953
    except ItemNotExists:
954
        raise ItemNotFound('Container does not exist')
955
    except ValueError:
956
        raise BadRequest('Invalid sharing header')
957
    except QuotaError:
958
        raise RequestEntityTooLarge('Quota exceeded')
959
    if not checksum and UPDATE_MD5:
960
        # Update the MD5 after the hashmap, as there may be missing hashes.
961
        checksum = hashmap_md5(request.backend, hashmap, size)
962
        try:
963
            request.backend.update_object_checksum(request.user_uniq,
964
                                                   v_account, v_container, v_object, version_id, checksum)
965
        except NotAllowedError:
966
            raise Forbidden('Not allowed')
967
    if public is not None:
968
        try:
969
            request.backend.update_object_public(request.user_uniq, v_account,
970
                                                 v_container, v_object, public)
971
        except NotAllowedError:
972
            raise Forbidden('Not allowed')
973
        except ItemNotExists:
974
            raise ItemNotFound('Object does not exist')
975

    
976
    response = HttpResponse(status=201)
977
    if checksum:
978
        response['ETag'] = checksum
979
    response['X-Object-Version'] = version_id
980
    return response
981

    
982

    
983
@api_method('POST')
984
def object_write_form(request, v_account, v_container, v_object):
985
    # Normal Response Codes: 201
986
    # Error Response Codes: internalServerError (500),
987
    #                       itemNotFound (404),
988
    #                       forbidden (403),
989
    #                       badRequest (400)
990

    
991
    request.upload_handlers = [SaveToBackendHandler(request)]
992
    if 'X-Object-Data' not in request.FILES:
993
        raise BadRequest('Missing X-Object-Data field')
994
    file = request.FILES['X-Object-Data']
995

    
996
    checksum = file.etag
997
    try:
998
        version_id = request.backend.update_object_hashmap(request.user_uniq,
999
                                                           v_account, v_container, v_object, file.size, file.content_type,
1000
                                                           file.hashmap, checksum, 'pithos', {}, True)
1001
    except NotAllowedError:
1002
        raise Forbidden('Not allowed')
1003
    except ItemNotExists:
1004
        raise ItemNotFound('Container does not exist')
1005
    except QuotaError:
1006
        raise RequestEntityTooLarge('Quota exceeded')
1007

    
1008
    response = HttpResponse(status=201)
1009
    response['ETag'] = checksum
1010
    response['X-Object-Version'] = version_id
1011
    response.content = checksum
1012
    return response
1013

    
1014

    
1015
@api_method('COPY', format_allowed=True)
1016
def object_copy(request, v_account, v_container, v_object):
1017
    # Normal Response Codes: 201
1018
    # Error Response Codes: internalServerError (500),
1019
    #                       itemNotFound (404),
1020
    #                       forbidden (403),
1021
    #                       badRequest (400)
1022

    
1023
    dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
1024
    if not dest_account:
1025
        dest_account = request.user_uniq
1026
    dest_path = request.META.get('HTTP_DESTINATION')
1027
    if not dest_path:
1028
        raise BadRequest('Missing Destination header')
1029
    try:
1030
        dest_container, dest_name = split_container_object_string(dest_path)
1031
    except ValueError:
1032
        raise BadRequest('Invalid Destination header')
1033

    
1034
    # Evaluate conditions.
1035
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
1036
        src_version = request.META.get('HTTP_X_SOURCE_VERSION')
1037
        try:
1038
            meta = request.backend.get_object_meta(
1039
                request.user_uniq, v_account,
1040
                v_container, v_object, 'pithos', src_version)
1041
        except NotAllowedError:
1042
            raise Forbidden('Not allowed')
1043
        except (ItemNotExists, VersionNotExists):
1044
            raise ItemNotFound('Container or object does not exist')
1045
        validate_matching_preconditions(request, meta)
1046

    
1047
    delimiter = request.GET.get('delimiter')
1048

    
1049
    version_id = copy_or_move_object(request, v_account, v_container, v_object,
1050
                                     dest_account, dest_container, dest_name, move=False, delimiter=delimiter)
1051
    response = HttpResponse(status=201)
1052
    response['X-Object-Version'] = version_id
1053
    return response
1054

    
1055

    
1056
@api_method('MOVE', format_allowed=True)
1057
def object_move(request, v_account, v_container, v_object):
1058
    # Normal Response Codes: 201
1059
    # Error Response Codes: internalServerError (500),
1060
    #                       itemNotFound (404),
1061
    #                       forbidden (403),
1062
    #                       badRequest (400)
1063

    
1064
    dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
1065
    if not dest_account:
1066
        dest_account = request.user_uniq
1067
    dest_path = request.META.get('HTTP_DESTINATION')
1068
    if not dest_path:
1069
        raise BadRequest('Missing Destination header')
1070
    try:
1071
        dest_container, dest_name = split_container_object_string(dest_path)
1072
    except ValueError:
1073
        raise BadRequest('Invalid Destination header')
1074

    
1075
    # Evaluate conditions.
1076
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
1077
        try:
1078
            meta = request.backend.get_object_meta(
1079
                request.user_uniq, v_account,
1080
                v_container, v_object, 'pithos')
1081
        except NotAllowedError:
1082
            raise Forbidden('Not allowed')
1083
        except ItemNotExists:
1084
            raise ItemNotFound('Container or object does not exist')
1085
        validate_matching_preconditions(request, meta)
1086

    
1087
    delimiter = request.GET.get('delimiter')
1088

    
1089
    version_id = copy_or_move_object(request, v_account, v_container, v_object,
1090
                                     dest_account, dest_container, dest_name, move=True, delimiter=delimiter)
1091
    response = HttpResponse(status=201)
1092
    response['X-Object-Version'] = version_id
1093
    return response
1094

    
1095

    
1096
@api_method('POST', format_allowed=True)
1097
def object_update(request, v_account, v_container, v_object):
1098
    # Normal Response Codes: 202, 204
1099
    # Error Response Codes: internalServerError (500),
1100
    #                       conflict (409),
1101
    #                       itemNotFound (404),
1102
    #                       forbidden (403),
1103
    #                       badRequest (400)
1104

    
1105
    content_type, meta, permissions, public = get_object_headers(request)
1106

    
1107
    try:
1108
        prev_meta = request.backend.get_object_meta(
1109
            request.user_uniq, v_account,
1110
            v_container, v_object, 'pithos')
1111
    except NotAllowedError:
1112
        raise Forbidden('Not allowed')
1113
    except ItemNotExists:
1114
        raise ItemNotFound('Object does not exist')
1115

    
1116
    # Evaluate conditions.
1117
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
1118
        validate_matching_preconditions(request, prev_meta)
1119

    
1120
    replace = True
1121
    if 'update' in request.GET:
1122
        replace = False
1123

    
1124
    # A Content-Type or X-Source-Object header indicates data updates.
1125
    src_object = request.META.get('HTTP_X_SOURCE_OBJECT')
1126
    if (not content_type or content_type != 'application/octet-stream') and not src_object:
1127
        response = HttpResponse(status=202)
1128

    
1129
        # Do permissions first, as it may fail easier.
1130
        if permissions is not None:
1131
            try:
1132
                request.backend.update_object_permissions(request.user_uniq,
1133
                                                          v_account, v_container, v_object, permissions)
1134
            except NotAllowedError:
1135
                raise Forbidden('Not allowed')
1136
            except ItemNotExists:
1137
                raise ItemNotFound('Object does not exist')
1138
            except ValueError:
1139
                raise BadRequest('Invalid sharing header')
1140
        if public is not None:
1141
            try:
1142
                request.backend.update_object_public(
1143
                    request.user_uniq, v_account,
1144
                    v_container, v_object, public)
1145
            except NotAllowedError:
1146
                raise Forbidden('Not allowed')
1147
            except ItemNotExists:
1148
                raise ItemNotFound('Object does not exist')
1149
        if meta or replace:
1150
            try:
1151
                version_id = request.backend.update_object_meta(
1152
                    request.user_uniq,
1153
                    v_account, v_container, v_object, 'pithos', meta, replace)
1154
            except NotAllowedError:
1155
                raise Forbidden('Not allowed')
1156
            except ItemNotExists:
1157
                raise ItemNotFound('Object does not exist')
1158
            response['X-Object-Version'] = version_id
1159

    
1160
        return response
1161

    
1162
    # Single range update. Range must be in Content-Range.
1163
    # Based on: http://code.google.com/p/gears/wiki/ContentRangePostProposal
1164
    # (with the addition that '*' is allowed for the range - will append).
1165
    content_range = request.META.get('HTTP_CONTENT_RANGE')
1166
    if not content_range:
1167
        raise BadRequest('Missing Content-Range header')
1168
    ranges = get_content_range(request)
1169
    if not ranges:
1170
        raise RangeNotSatisfiable('Invalid Content-Range header')
1171

    
1172
    try:
1173
        size, hashmap = request.backend.get_object_hashmap(request.user_uniq,
1174
                                                           v_account, v_container, v_object)
1175
    except NotAllowedError:
1176
        raise Forbidden('Not allowed')
1177
    except ItemNotExists:
1178
        raise ItemNotFound('Object does not exist')
1179

    
1180
    offset, length, total = ranges
1181
    if offset is None:
1182
        offset = size
1183
    elif offset > size:
1184
        raise RangeNotSatisfiable('Supplied offset is beyond object limits')
1185
    if src_object:
1186
        src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
1187
        if not src_account:
1188
            src_account = request.user_uniq
1189
        src_container, src_name = split_container_object_string(src_object)
1190
        src_version = request.META.get('HTTP_X_SOURCE_VERSION')
1191
        try:
1192
            src_size, src_hashmap = request.backend.get_object_hashmap(
1193
                request.user_uniq,
1194
                src_account, src_container, src_name, src_version)
1195
        except NotAllowedError:
1196
            raise Forbidden('Not allowed')
1197
        except ItemNotExists:
1198
            raise ItemNotFound('Source object does not exist')
1199

    
1200
        if length is None:
1201
            length = src_size
1202
        elif length > src_size:
1203
            raise BadRequest('Object length is smaller than range length')
1204
    else:
1205
        # Require either a Content-Length, or 'chunked' Transfer-Encoding.
1206
        content_length = -1
1207
        if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
1208
            content_length = get_content_length(request)
1209

    
1210
        if length is None:
1211
            length = content_length
1212
        else:
1213
            if content_length == -1:
1214
                # TODO: Get up to length bytes in chunks.
1215
                length = content_length
1216
            elif length != content_length:
1217
                raise BadRequest('Content length does not match range length')
1218
    if total is not None and (total != size or offset >= size or (length > 0 and offset + length >= size)):
1219
        raise RangeNotSatisfiable(
1220
            'Supplied range will change provided object limits')
1221

    
1222
    dest_bytes = request.META.get('HTTP_X_OBJECT_BYTES')
1223
    if dest_bytes is not None:
1224
        dest_bytes = get_int_parameter(dest_bytes)
1225
        if dest_bytes is None:
1226
            raise BadRequest('Invalid X-Object-Bytes header')
1227

    
1228
    if src_object:
1229
        if offset % request.backend.block_size == 0:
1230
            # Update the hashes only.
1231
            sbi = 0
1232
            while length > 0:
1233
                bi = int(offset / request.backend.block_size)
1234
                bl = min(length, request.backend.block_size)
1235
                if bi < len(hashmap):
1236
                    if bl == request.backend.block_size:
1237
                        hashmap[bi] = src_hashmap[sbi]
1238
                    else:
1239
                        data = request.backend.get_block(src_hashmap[sbi])
1240
                        hashmap[bi] = request.backend.update_block(hashmap[bi],
1241
                                                                   data[:bl], 0)
1242
                else:
1243
                    hashmap.append(src_hashmap[sbi])
1244
                offset += bl
1245
                length -= bl
1246
                sbi += 1
1247
        else:
1248
            data = ''
1249
            sbi = 0
1250
            while length > 0:
1251
                data += request.backend.get_block(src_hashmap[sbi])
1252
                if length < request.backend.block_size:
1253
                    data = data[:length]
1254
                bytes = put_object_block(request, hashmap, data, offset)
1255
                offset += bytes
1256
                data = data[bytes:]
1257
                length -= bytes
1258
                sbi += 1
1259
    else:
1260
        data = ''
1261
        for d in socket_read_iterator(request, length,
1262
                                      request.backend.block_size):
1263
            # TODO: Raise 408 (Request Timeout) if this takes too long.
1264
            # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
1265
            data += d
1266
            bytes = put_object_block(request, hashmap, data, offset)
1267
            offset += bytes
1268
            data = data[bytes:]
1269
        if len(data) > 0:
1270
            put_object_block(request, hashmap, data, offset)
1271

    
1272
    if offset > size:
1273
        size = offset
1274
    if dest_bytes is not None and dest_bytes < size:
1275
        size = dest_bytes
1276
        hashmap = hashmap[:(int((size - 1) / request.backend.block_size) + 1)]
1277
    checksum = hashmap_md5(
1278
        request.backend, hashmap, size) if UPDATE_MD5 else ''
1279
    try:
1280
        version_id = request.backend.update_object_hashmap(request.user_uniq,
1281
                                                           v_account, v_container, v_object, size, prev_meta[
1282
                                                           'type'],
1283
                                                           hashmap, checksum, 'pithos', meta, replace, permissions)
1284
    except NotAllowedError:
1285
        raise Forbidden('Not allowed')
1286
    except ItemNotExists:
1287
        raise ItemNotFound('Container does not exist')
1288
    except ValueError:
1289
        raise BadRequest('Invalid sharing header')
1290
    except QuotaError:
1291
        raise RequestEntityTooLarge('Quota exceeded')
1292
    if public is not None:
1293
        try:
1294
            request.backend.update_object_public(request.user_uniq, v_account,
1295
                                                 v_container, v_object, public)
1296
        except NotAllowedError:
1297
            raise Forbidden('Not allowed')
1298
        except ItemNotExists:
1299
            raise ItemNotFound('Object does not exist')
1300

    
1301
    response = HttpResponse(status=204)
1302
    response['ETag'] = checksum
1303
    response['X-Object-Version'] = version_id
1304
    return response
1305

    
1306

    
1307
@api_method('DELETE')
1308
def object_delete(request, v_account, v_container, v_object):
1309
    # Normal Response Codes: 204
1310
    # Error Response Codes: internalServerError (500),
1311
    #                       itemNotFound (404),
1312
    #                       forbidden (403),
1313
    #                       badRequest (400)
1314

    
1315
    until = get_int_parameter(request.GET.get('until'))
1316
    delimiter = request.GET.get('delimiter')
1317

    
1318
    try:
1319
        request.backend.delete_object(
1320
            request.user_uniq, v_account, v_container,
1321
            v_object, until, delimiter=delimiter)
1322
    except NotAllowedError:
1323
        raise Forbidden('Not allowed')
1324
    except ItemNotExists:
1325
        raise ItemNotFound('Object does not exist')
1326
    return HttpResponse(status=204)
1327

    
1328

    
1329
@api_method()
1330
def method_not_allowed(request):
1331
    raise BadRequest('Method not allowed')