Statistics
| Branch: | Tag: | Revision:

root / snf-pithos-app / pithos / api / functions.py @ 4d15c94e

History | View | Annotate | Download (50.5 kB)

1
# Copyright 2011-2012 GRNET S.A. All rights reserved.
2
# 
3
# Redistribution and use in source and binary forms, with or
4
# without modification, are permitted provided that the following
5
# conditions are met:
6
# 
7
#   1. Redistributions of source code must retain the above
8
#      copyright notice, this list of conditions and the following
9
#      disclaimer.
10
# 
11
#   2. Redistributions in binary form must reproduce the above
12
#      copyright notice, this list of conditions and the following
13
#      disclaimer in the documentation and/or other materials
14
#      provided with the distribution.
15
# 
16
# THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
17
# OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
20
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24
# AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
26
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27
# POSSIBILITY OF SUCH DAMAGE.
28
# 
29
# The views and conclusions contained in the software and
30
# documentation are those of the authors and should not be
31
# interpreted as representing official policies, either expressed
32
# or implied, of GRNET S.A.
33

    
34
from xml.dom import minidom
35
from urllib import unquote
36

    
37
from django.conf import settings
38
from django.http import HttpResponse
39
from django.template.loader import render_to_string
40
from django.utils import simplejson as json
41
from django.utils.http import parse_etags
42
from django.utils.encoding import smart_str
43
from django.views.decorators.csrf import csrf_exempt
44

    
45
from synnefo.lib.astakos import get_user
46

    
47
from pithos.api.faults import (Fault, NotModified, BadRequest, Unauthorized, Forbidden, ItemNotFound, Conflict,
48
    LengthRequired, PreconditionFailed, RequestEntityTooLarge, RangeNotSatisfiable, UnprocessableEntity)
49
from pithos.api.util import (json_encode_decimal, rename_meta_key, format_header_key, printable_header_dict,
50
    get_account_headers, put_account_headers, get_container_headers, put_container_headers, get_object_headers,
51
    put_object_headers, update_manifest_meta, update_sharing_meta, update_public_meta,
52
    validate_modification_preconditions, validate_matching_preconditions, split_container_object_string,
53
    copy_or_move_object, get_int_parameter, get_content_length, get_content_range, socket_read_iterator,
54
    SaveToBackendHandler, object_data_response, put_object_block, hashmap_md5, simple_list_response, api_method)
55
from pithos.api.settings import UPDATE_MD5
56

    
57
from pithos.backends.base import NotAllowedError, QuotaError
58
from pithos.backends.filter import parse_filters
59

    
60
import logging
61
import hashlib
62

    
63

    
64
logger = logging.getLogger(__name__)
65

    
66

    
67
@csrf_exempt
68
def top_demux(request):
69
    if request.method == 'GET':
70
        return account_list(request)
71
    else:
72
        return method_not_allowed(request)
73

    
74
@csrf_exempt
75
def account_demux(request, v_account):
76
    if request.method == 'HEAD':
77
        return account_meta(request, v_account)
78
    elif request.method == 'POST':
79
        return account_update(request, v_account)
80
    elif request.method == 'GET':
81
        return container_list(request, v_account)
82
    else:
83
        return method_not_allowed(request)
84

    
85
@csrf_exempt
86
def container_demux(request, v_account, v_container):
87
    if request.method == 'HEAD':
88
        return container_meta(request, v_account, v_container)
89
    elif request.method == 'PUT':
90
        return container_create(request, v_account, v_container)
91
    elif request.method == 'POST':
92
        return container_update(request, v_account, v_container)
93
    elif request.method == 'DELETE':
94
        return container_delete(request, v_account, v_container)
95
    elif request.method == 'GET':
96
        return object_list(request, v_account, v_container)
97
    else:
98
        return method_not_allowed(request)
99

    
100
@csrf_exempt
101
def object_demux(request, v_account, v_container, v_object):
102
    # Helper to avoid placing the token in the URL when loading objects from a browser.
103
    if request.method == 'HEAD':
104
        return object_meta(request, v_account, v_container, v_object)
105
    elif request.method == 'GET':
106
        return object_read(request, v_account, v_container, v_object)
107
    elif request.method == 'PUT':
108
        return object_write(request, v_account, v_container, v_object)
109
    elif request.method == 'COPY':
110
        return object_copy(request, v_account, v_container, v_object)
111
    elif request.method == 'MOVE':
112
        return object_move(request, v_account, v_container, v_object)
113
    elif request.method == 'POST':
114
        if request.META.get('CONTENT_TYPE', '').startswith('multipart/form-data'):
115
            return object_write_form(request, v_account, v_container, v_object)
116
        return object_update(request, v_account, v_container, v_object)
117
    elif request.method == 'DELETE':
118
        return object_delete(request, v_account, v_container, v_object)
119
    else:
120
        return method_not_allowed(request)
121

    
122
@api_method('GET', user_required=False)
123
def authenticate(request):
124
    # Normal Response Codes: 204
125
    # Error Response Codes: internalServerError (500),
126
    #                       forbidden (403),
127
    #                       badRequest (400)
128
    
129
    x_auth_user = request.META.get('HTTP_X_AUTH_USER')
130
    x_auth_key = request.META.get('HTTP_X_AUTH_KEY')
131
    if not x_auth_user or not x_auth_key:
132
        raise BadRequest('Missing X-Auth-User or X-Auth-Key header')
133
    response = HttpResponse(status=204)
134
    
135
    uri = request.build_absolute_uri()
136
    if '?' in uri:
137
        uri = uri[:uri.find('?')]
138
    
139
    response['X-Auth-Token'] = x_auth_key
140
    response['X-Storage-Url'] = uri + ('' if uri.endswith('/') else '/') + x_auth_user
141
    return response
142

    
143
@api_method('GET', format_allowed=True)
144
def account_list(request):
145
    # Normal Response Codes: 200, 204
146
    # Error Response Codes: internalServerError (500),
147
    #                       badRequest (400)
148
    if getattr(request, 'user', None) is None:
149
        return authenticate(request)
150
    
151
    response = HttpResponse()
152
    
153
    marker = request.GET.get('marker')
154
    limit = get_int_parameter(request.GET.get('limit'))
155
    if not limit:
156
        limit = 10000
157
    
158
    accounts = request.backend.list_accounts(request.user_uniq, marker, limit)
159
    
160
    if request.serialization == 'text':
161
        if len(accounts) == 0:
162
            # The cloudfiles python bindings expect 200 if json/xml.
163
            response.status_code = 204
164
            return response
165
        response.status_code = 200
166
        response.content = '\n'.join(accounts) + '\n'
167
        return response
168
    
169
    account_meta = []
170
    for x in accounts:
171
        if x == request.user_uniq:
172
            continue
173
        try:
174
            meta = request.backend.get_account_meta(request.user_uniq, x, 'pithos', include_user_defined=False)
175
            groups = request.backend.get_account_groups(request.user_uniq, x)
176
        except NotAllowedError:
177
            raise Forbidden('Not allowed')
178
        else:
179
            rename_meta_key(meta, 'modified', 'last_modified')
180
            rename_meta_key(meta, 'until_timestamp', 'x_account_until_timestamp')
181
            if groups:
182
                meta['X-Account-Group'] = printable_header_dict(dict([(k, ','.join(v)) for k, v in groups.iteritems()]))
183
            account_meta.append(printable_header_dict(meta))
184
    if request.serialization == 'xml':
185
        data = render_to_string('accounts.xml', {'accounts': account_meta})
186
    elif request.serialization  == 'json':
187
        data = json.dumps(account_meta)
188
    response.status_code = 200
189
    response.content = data
190
    return response
191

    
192
@api_method('HEAD')
193
def account_meta(request, v_account):
194
    # Normal Response Codes: 204
195
    # Error Response Codes: internalServerError (500),
196
    #                       forbidden (403),
197
    #                       badRequest (400)
198
    
199
    until = get_int_parameter(request.GET.get('until'))
200
    try:
201
        meta = request.backend.get_account_meta(request.user_uniq, v_account, 'pithos', until)
202
        groups = request.backend.get_account_groups(request.user_uniq, v_account)
203
        policy = request.backend.get_account_policy(request.user_uniq, v_account)
204
    except NotAllowedError:
205
        raise Forbidden('Not allowed')
206
    
207
    validate_modification_preconditions(request, meta)
208
    
209
    response = HttpResponse(status=204)
210
    put_account_headers(response, meta, groups, policy)
211
    return response
212

    
213
@api_method('POST')
214
def account_update(request, v_account):
215
    # Normal Response Codes: 202
216
    # Error Response Codes: internalServerError (500),
217
    #                       forbidden (403),
218
    #                       badRequest (400)
219
    
220
    meta, groups = get_account_headers(request)
221
    replace = True
222
    if 'update' in request.GET:
223
        replace = False
224
    if groups:
225
        try:
226
            request.backend.update_account_groups(request.user_uniq, v_account,
227
                                                    groups, replace)
228
        except NotAllowedError:
229
            raise Forbidden('Not allowed')
230
        except ValueError:
231
            raise BadRequest('Invalid groups header')
232
    if meta or replace:
233
        try:
234
            request.backend.update_account_meta(request.user_uniq, v_account,
235
                                                'pithos', meta, replace)
236
        except NotAllowedError:
237
            raise Forbidden('Not allowed')
238
    return HttpResponse(status=202)
239

    
240
@api_method('GET', format_allowed=True)
241
def container_list(request, v_account):
242
    # Normal Response Codes: 200, 204
243
    # Error Response Codes: internalServerError (500),
244
    #                       itemNotFound (404),
245
    #                       forbidden (403),
246
    #                       badRequest (400)
247
    
248
    until = get_int_parameter(request.GET.get('until'))
249
    try:
250
        meta = request.backend.get_account_meta(request.user_uniq, v_account, 'pithos', until)
251
        groups = request.backend.get_account_groups(request.user_uniq, v_account)
252
        policy = request.backend.get_account_policy(request.user_uniq, v_account)
253
    except NotAllowedError:
254
        raise Forbidden('Not allowed')
255
    
256
    validate_modification_preconditions(request, meta)
257
    
258
    response = HttpResponse()
259
    put_account_headers(response, meta, groups, policy)
260
    
261
    marker = request.GET.get('marker')
262
    limit = get_int_parameter(request.GET.get('limit'))
263
    if not limit:
264
        limit = 10000
265
    
266
    shared = False
267
    if 'shared' in request.GET:
268
        shared = True
269
    public = False
270
    if 'public' in request.GET:
271
        public = True
272
    
273
    try:
274
        containers = request.backend.list_containers(request.user_uniq, v_account,
275
                                                marker, limit, shared, until, public)
276
    except NotAllowedError:
277
        raise Forbidden('Not allowed')
278
    except NameError:
279
        containers = []
280
    
281
    if request.serialization == 'text':
282
        if len(containers) == 0:
283
            # The cloudfiles python bindings expect 200 if json/xml.
284
            response.status_code = 204
285
            return response
286
        response.status_code = 200
287
        response.content = '\n'.join(containers) + '\n'
288
        return response
289
    
290
    container_meta = []
291
    for x in containers:
292
        try:
293
            meta = request.backend.get_container_meta(request.user_uniq, v_account,
294
                                                        x, 'pithos', until, include_user_defined=False)
295
            policy = request.backend.get_container_policy(request.user_uniq,
296
                                                            v_account, x)
297
        except NotAllowedError:
298
            raise Forbidden('Not allowed')
299
        except NameError:
300
            pass
301
        else:
302
            rename_meta_key(meta, 'modified', 'last_modified')
303
            rename_meta_key(meta, 'until_timestamp', 'x_container_until_timestamp')
304
            if policy:
305
                meta['X-Container-Policy'] = printable_header_dict(dict([(k, v) for k, v in policy.iteritems()]))
306
            container_meta.append(printable_header_dict(meta))
307
    if request.serialization == 'xml':
308
        data = render_to_string('containers.xml', {'account': v_account, 'containers': container_meta})
309
    elif request.serialization  == 'json':
310
        data = json.dumps(container_meta)
311
    response.status_code = 200
312
    response.content = data
313
    return response
314

    
315
@api_method('HEAD')
316
def container_meta(request, v_account, v_container):
317
    # Normal Response Codes: 204
318
    # Error Response Codes: internalServerError (500),
319
    #                       itemNotFound (404),
320
    #                       forbidden (403),
321
    #                       badRequest (400)
322
    
323
    until = get_int_parameter(request.GET.get('until'))
324
    try:
325
        meta = request.backend.get_container_meta(request.user_uniq, v_account,
326
                                                    v_container, 'pithos', until)
327
        meta['object_meta'] = request.backend.list_container_meta(request.user_uniq,
328
                                                v_account, v_container, 'pithos', until)
329
        policy = request.backend.get_container_policy(request.user_uniq, v_account,
330
                                                        v_container)
331
    except NotAllowedError:
332
        raise Forbidden('Not allowed')
333
    except NameError:
334
        raise ItemNotFound('Container does not exist')
335
    
336
    validate_modification_preconditions(request, meta)
337
    
338
    response = HttpResponse(status=204)
339
    put_container_headers(request, response, meta, policy)
340
    return response
341

    
342
@api_method('PUT')
343
def container_create(request, v_account, v_container):
344
    # Normal Response Codes: 201, 202
345
    # Error Response Codes: internalServerError (500),
346
    #                       itemNotFound (404),
347
    #                       forbidden (403),
348
    #                       badRequest (400)
349
    
350
    meta, policy = get_container_headers(request)
351
    
352
    try:
353
        request.backend.put_container(request.user_uniq, v_account, v_container, policy)
354
        ret = 201
355
    except NotAllowedError:
356
        raise Forbidden('Not allowed')
357
    except ValueError:
358
        raise BadRequest('Invalid policy header')
359
    except NameError:
360
        ret = 202
361
    
362
    if ret == 202 and policy:
363
        try:
364
            request.backend.update_container_policy(request.user_uniq, v_account,
365
                                            v_container, policy, replace=False)
366
        except NotAllowedError:
367
            raise Forbidden('Not allowed')
368
        except NameError:
369
            raise ItemNotFound('Container does not exist')
370
        except ValueError:
371
            raise BadRequest('Invalid policy header')
372
    if meta:
373
        try:
374
            request.backend.update_container_meta(request.user_uniq, v_account,
375
                                            v_container, 'pithos', meta, replace=False)
376
        except NotAllowedError:
377
            raise Forbidden('Not allowed')
378
        except NameError:
379
            raise ItemNotFound('Container does not exist')
380
    
381
    return HttpResponse(status=ret)
382

    
383
@api_method('POST', format_allowed=True)
384
def container_update(request, v_account, v_container):
385
    # Normal Response Codes: 202
386
    # Error Response Codes: internalServerError (500),
387
    #                       itemNotFound (404),
388
    #                       forbidden (403),
389
    #                       badRequest (400)
390
    
391
    meta, policy = get_container_headers(request)
392
    replace = True
393
    if 'update' in request.GET:
394
        replace = False
395
    if policy:
396
        try:
397
            request.backend.update_container_policy(request.user_uniq, v_account,
398
                                                v_container, policy, replace)
399
        except NotAllowedError:
400
            raise Forbidden('Not allowed')
401
        except NameError:
402
            raise ItemNotFound('Container does not exist')
403
        except ValueError:
404
            raise BadRequest('Invalid policy header')
405
    if meta or replace:
406
        try:
407
            request.backend.update_container_meta(request.user_uniq, v_account,
408
                                                    v_container, 'pithos', meta, replace)
409
        except NotAllowedError:
410
            raise Forbidden('Not allowed')
411
        except NameError:
412
            raise ItemNotFound('Container does not exist')
413
    
414
    content_length = -1
415
    if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
416
        content_length = get_int_parameter(request.META.get('CONTENT_LENGTH', 0))
417
    content_type = request.META.get('CONTENT_TYPE')
418
    hashmap = []
419
    if content_type and content_type == 'application/octet-stream' and content_length != 0:
420
        for data in socket_read_iterator(request, content_length,
421
                                            request.backend.block_size):
422
            # TODO: Raise 408 (Request Timeout) if this takes too long.
423
            # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
424
            hashmap.append(request.backend.put_block(data))
425
    
426
    response = HttpResponse(status=202)
427
    if hashmap:
428
        response.content = simple_list_response(request, hashmap)
429
    return response
430

    
431
@api_method('DELETE')
432
def container_delete(request, v_account, v_container):
433
    # Normal Response Codes: 204
434
    # Error Response Codes: internalServerError (500),
435
    #                       conflict (409),
436
    #                       itemNotFound (404),
437
    #                       forbidden (403),
438
    #                       badRequest (400)
439
    
440
    until = get_int_parameter(request.GET.get('until'))
441
    try:
442
        request.backend.delete_container(request.user_uniq, v_account, v_container,
443
                                            until)
444
    except NotAllowedError:
445
        raise Forbidden('Not allowed')
446
    except NameError:
447
        raise ItemNotFound('Container does not exist')
448
    except IndexError:
449
        raise Conflict('Container is not empty')
450
    return HttpResponse(status=204)
451

    
452
@api_method('GET', format_allowed=True)
453
def object_list(request, v_account, v_container):
454
    # Normal Response Codes: 200, 204
455
    # Error Response Codes: internalServerError (500),
456
    #                       itemNotFound (404),
457
    #                       forbidden (403),
458
    #                       badRequest (400)
459
    
460
    until = get_int_parameter(request.GET.get('until'))
461
    try:
462
        meta = request.backend.get_container_meta(request.user_uniq, v_account,
463
                                                    v_container, 'pithos', until)
464
        meta['object_meta'] = request.backend.list_container_meta(request.user_uniq,
465
                                                v_account, v_container, 'pithos', until)
466
        policy = request.backend.get_container_policy(request.user_uniq, v_account,
467
                                                        v_container)
468
    except NotAllowedError:
469
        raise Forbidden('Not allowed')
470
    except NameError:
471
        raise ItemNotFound('Container does not exist')
472
    
473
    validate_modification_preconditions(request, meta)
474
    
475
    response = HttpResponse()
476
    put_container_headers(request, response, meta, policy)
477
    
478
    path = request.GET.get('path')
479
    prefix = request.GET.get('prefix')
480
    delimiter = request.GET.get('delimiter')
481
    
482
    # Path overrides prefix and delimiter.
483
    virtual = True
484
    if path:
485
        prefix = path
486
        delimiter = '/'
487
        virtual = False
488
    
489
    # Naming policy.
490
    if prefix and delimiter and not prefix.endswith(delimiter):
491
        prefix = prefix + delimiter
492
    if not prefix:
493
        prefix = ''
494
    prefix = prefix.lstrip('/')
495
    
496
    marker = request.GET.get('marker')
497
    limit = get_int_parameter(request.GET.get('limit'))
498
    if not limit:
499
        limit = 10000
500
    
501
    keys = request.GET.get('meta')
502
    if keys:
503
        keys = [smart_str(x.strip()) for x in keys.split(',') if x.strip() != '']
504
        included, excluded, opers = parse_filters(keys)
505
        keys = []
506
        keys += [format_header_key('X-Object-Meta-' + x) for x in included]
507
        keys += ['!'+format_header_key('X-Object-Meta-' + x) for x in excluded]
508
        keys += ['%s%s%s' % (format_header_key('X-Object-Meta-' + k), o, v) for k, o, v in opers]
509
    else:
510
        keys = []
511
    
512
    shared = False
513
    if 'shared' in request.GET:
514
        shared = True
515
    public = False
516
    if 'public' in request.GET:
517
        public = True
518
    
519
    if request.serialization == 'text':
520
        try:
521
            objects = request.backend.list_objects(request.user_uniq, v_account,
522
                                        v_container, prefix, delimiter, marker,
523
                                        limit, virtual, 'pithos', keys, shared,
524
                                        until, None, public)
525
        except NotAllowedError:
526
            raise Forbidden('Not allowed')
527
        except NameError:
528
            raise ItemNotFound('Container does not exist')
529
        
530
        if len(objects) == 0:
531
            # The cloudfiles python bindings expect 200 if json/xml.
532
            response.status_code = 204
533
            return response
534
        response.status_code = 200
535
        response.content = '\n'.join([x[0] for x in objects]) + '\n'
536
        return response
537

    
538
    try:
539
        objects = request.backend.list_object_meta(request.user_uniq, v_account,
540
                                    v_container, prefix, delimiter, marker,
541
                                    limit, virtual, 'pithos', keys, shared, until, None, public)
542
        object_permissions = {}
543
        object_public = {}
544
        if until is None:
545
            name_idx = len('/'.join((v_account, v_container, '')))
546
            for x in request.backend.list_object_permissions(request.user_uniq,
547
                                    v_account, v_container, prefix):
548
                object = x[name_idx:]
549
                object_permissions[object] = request.backend.get_object_permissions(
550
                                    request.user_uniq, v_account, v_container, object)
551
            for k, v in request.backend.list_object_public(request.user_uniq,
552
                                    v_account, v_container, prefix).iteritems():
553
                object_public[k[name_idx:]] = v
554
    except NotAllowedError:
555
        raise Forbidden('Not allowed')
556
    except NameError:
557
        raise ItemNotFound('Container does not exist')
558
    
559
    object_meta = []
560
    for meta in objects:
561
        if len(meta) == 1:
562
            # Virtual objects/directories.
563
            object_meta.append(meta)
564
        else:
565
            rename_meta_key(meta, 'hash', 'x_object_hash') # Will be replaced by checksum.
566
            rename_meta_key(meta, 'checksum', 'hash')
567
            rename_meta_key(meta, 'type', 'content_type')
568
            rename_meta_key(meta, 'uuid', 'x_object_uuid')
569
            if until is not None and 'modified' in meta:
570
                del(meta['modified'])
571
            else:
572
                rename_meta_key(meta, 'modified', 'last_modified')
573
            rename_meta_key(meta, 'modified_by', 'x_object_modified_by')
574
            rename_meta_key(meta, 'version', 'x_object_version')
575
            rename_meta_key(meta, 'version_timestamp', 'x_object_version_timestamp')
576
            permissions = object_permissions.get(meta['name'], None)
577
            if permissions:
578
                update_sharing_meta(request, permissions, v_account, v_container, meta['name'], meta)
579
            public = object_public.get(meta['name'], None)
580
            if public:
581
                update_public_meta(public, meta)
582
            object_meta.append(printable_header_dict(meta))
583
    if request.serialization == 'xml':
584
        data = render_to_string('objects.xml', {'container': v_container, 'objects': object_meta})
585
    elif request.serialization  == 'json':
586
        data = json.dumps(object_meta, default=json_encode_decimal)
587
    response.status_code = 200
588
    response.content = data
589
    return response
590

    
591
@api_method('HEAD')
592
def object_meta(request, v_account, v_container, v_object):
593
    # Normal Response Codes: 204
594
    # Error Response Codes: internalServerError (500),
595
    #                       itemNotFound (404),
596
    #                       forbidden (403),
597
    #                       badRequest (400)
598
    
599
    version = request.GET.get('version')
600
    try:
601
        meta = request.backend.get_object_meta(request.user_uniq, v_account,
602
                                                v_container, v_object, 'pithos', version)
603
        if version is None:
604
            permissions = request.backend.get_object_permissions(request.user_uniq,
605
                                            v_account, v_container, v_object)
606
            public = request.backend.get_object_public(request.user_uniq, v_account,
607
                                                        v_container, v_object)
608
        else:
609
            permissions = None
610
            public = None
611
    except NotAllowedError:
612
        raise Forbidden('Not allowed')
613
    except NameError:
614
        raise ItemNotFound('Object does not exist')
615
    except IndexError:
616
        raise ItemNotFound('Version does not exist')
617
    
618
    update_manifest_meta(request, v_account, meta)
619
    update_sharing_meta(request, permissions, v_account, v_container, v_object, meta)
620
    update_public_meta(public, meta)
621
    
622
    # Evaluate conditions.
623
    validate_modification_preconditions(request, meta)
624
    try:
625
        validate_matching_preconditions(request, meta)
626
    except NotModified:
627
        response = HttpResponse(status=304)
628
        response['ETag'] = meta['checksum']
629
        return response
630
    
631
    response = HttpResponse(status=200)
632
    put_object_headers(response, meta)
633
    return response
634

    
635
@api_method('GET', format_allowed=True)
636
def object_read(request, v_account, v_container, v_object):
637
    # Normal Response Codes: 200, 206
638
    # Error Response Codes: internalServerError (500),
639
    #                       rangeNotSatisfiable (416),
640
    #                       preconditionFailed (412),
641
    #                       itemNotFound (404),
642
    #                       forbidden (403),
643
    #                       badRequest (400),
644
    #                       notModified (304)
645
    
646
    version = request.GET.get('version')
647
    
648
    # Reply with the version list. Do this first, as the object may be deleted.
649
    if version == 'list':
650
        if request.serialization == 'text':
651
            raise BadRequest('No format specified for version list.')
652
        
653
        try:
654
            v = request.backend.list_versions(request.user_uniq, v_account,
655
                                                v_container, v_object)
656
        except NotAllowedError:
657
            raise Forbidden('Not allowed')
658
        d = {'versions': v}
659
        if request.serialization == 'xml':
660
            d['object'] = v_object
661
            data = render_to_string('versions.xml', d)
662
        elif request.serialization  == 'json':
663
            data = json.dumps(d, default=json_encode_decimal)
664
        
665
        response = HttpResponse(data, status=200)
666
        response['Content-Length'] = len(data)
667
        return response
668
    
669
    try:
670
        meta = request.backend.get_object_meta(request.user_uniq, v_account,
671
                                                v_container, v_object, 'pithos', version)
672
        if version is None:
673
            permissions = request.backend.get_object_permissions(request.user_uniq,
674
                                            v_account, v_container, v_object)
675
            public = request.backend.get_object_public(request.user_uniq, v_account,
676
                                                        v_container, v_object)
677
        else:
678
            permissions = None
679
            public = None
680
    except NotAllowedError:
681
        raise Forbidden('Not allowed')
682
    except NameError:
683
        raise ItemNotFound('Object does not exist')
684
    except IndexError:
685
        raise ItemNotFound('Version does not exist')
686
    
687
    update_manifest_meta(request, v_account, meta)
688
    update_sharing_meta(request, permissions, v_account, v_container, v_object, meta)
689
    update_public_meta(public, meta)
690
    
691
    # Evaluate conditions.
692
    validate_modification_preconditions(request, meta)
693
    try:
694
        validate_matching_preconditions(request, meta)
695
    except NotModified:
696
        response = HttpResponse(status=304)
697
        response['ETag'] = meta['checksum']
698
        return response
699
    
700
    hashmap_reply = False
701
    if 'hashmap' in request.GET and request.serialization != 'text':
702
        hashmap_reply = True
703
    
704
    sizes = []
705
    hashmaps = []
706
    if 'X-Object-Manifest' in meta and not hashmap_reply:
707
        try:
708
            src_container, src_name = split_container_object_string('/' + meta['X-Object-Manifest'])
709
            objects = request.backend.list_objects(request.user_uniq, v_account,
710
                                src_container, prefix=src_name, virtual=False)
711
        except NotAllowedError:
712
            raise Forbidden('Not allowed')
713
        except ValueError:
714
            raise BadRequest('Invalid X-Object-Manifest header')
715
        except NameError:
716
            raise ItemNotFound('Container does not exist')
717
        
718
        try:
719
            for x in objects:
720
                s, h = request.backend.get_object_hashmap(request.user_uniq,
721
                                        v_account, src_container, x[0], x[1])
722
                sizes.append(s)
723
                hashmaps.append(h)
724
        except NotAllowedError:
725
            raise Forbidden('Not allowed')
726
        except NameError:
727
            raise ItemNotFound('Object does not exist')
728
        except IndexError:
729
            raise ItemNotFound('Version does not exist')
730
    else:
731
        try:
732
            s, h = request.backend.get_object_hashmap(request.user_uniq, v_account,
733
                                                v_container, v_object, version)
734
            sizes.append(s)
735
            hashmaps.append(h)
736
        except NotAllowedError:
737
            raise Forbidden('Not allowed')
738
        except NameError:
739
            raise ItemNotFound('Object does not exist')
740
        except IndexError:
741
            raise ItemNotFound('Version does not exist')
742
    
743
    # Reply with the hashmap.
744
    if hashmap_reply:
745
        size = sum(sizes)
746
        hashmap = sum(hashmaps, [])
747
        d = {
748
            'block_size': request.backend.block_size,
749
            'block_hash': request.backend.hash_algorithm,
750
            'bytes': size,
751
            'hashes': hashmap}
752
        if request.serialization == 'xml':
753
            d['object'] = v_object
754
            data = render_to_string('hashes.xml', d)
755
        elif request.serialization  == 'json':
756
            data = json.dumps(d)
757
        
758
        response = HttpResponse(data, status=200)
759
        put_object_headers(response, meta)
760
        response['Content-Length'] = len(data)
761
        return response
762
    
763
    request.serialization = 'text' # Unset.
764
    return object_data_response(request, sizes, hashmaps, meta)
765

    
766
@api_method('PUT', format_allowed=True)
767
def object_write(request, v_account, v_container, v_object):
768
    # Normal Response Codes: 201
769
    # Error Response Codes: internalServerError (500),
770
    #                       unprocessableEntity (422),
771
    #                       lengthRequired (411),
772
    #                       conflict (409),
773
    #                       itemNotFound (404),
774
    #                       forbidden (403),
775
    #                       badRequest (400)
776
    
777
    # Evaluate conditions.
778
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
779
        try:
780
            meta = request.backend.get_object_meta(request.user_uniq, v_account,
781
                                                        v_container, v_object, 'pithos')
782
        except NotAllowedError:
783
            raise Forbidden('Not allowed')
784
        except NameError:
785
            meta = {}
786
        validate_matching_preconditions(request, meta)
787
    
788
    copy_from = request.META.get('HTTP_X_COPY_FROM')
789
    move_from = request.META.get('HTTP_X_MOVE_FROM')
790
    if copy_from or move_from:
791
        delimiter = request.GET.get('delimiter')
792
        content_length = get_content_length(request) # Required by the API.
793
        
794
        src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
795
        if not src_account:
796
            src_account = request.user_uniq
797
        if move_from:
798
            try:
799
                src_container, src_name = split_container_object_string(move_from)
800
            except ValueError:
801
                raise BadRequest('Invalid X-Move-From header')
802
            version_id = copy_or_move_object(request, src_account, src_container, src_name,
803
                                                v_account, v_container, v_object, move=True, delimiter=delimiter)
804
        else:
805
            try:
806
                src_container, src_name = split_container_object_string(copy_from)
807
            except ValueError:
808
                raise BadRequest('Invalid X-Copy-From header')
809
            version_id = copy_or_move_object(request, src_account, src_container, src_name,
810
                                                v_account, v_container, v_object, move=False, delimiter=delimiter)
811
        response = HttpResponse(status=201)
812
        response['X-Object-Version'] = version_id
813
        return response
814
    
815
    content_type, meta, permissions, public = get_object_headers(request)
816
    content_length = -1
817
    if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
818
        content_length = get_content_length(request)
819
    # Should be BadRequest, but API says otherwise.
820
    if content_type is None:
821
        raise LengthRequired('Missing Content-Type header')
822
    
823
    if 'hashmap' in request.GET:
824
        if request.serialization not in ('json', 'xml'):
825
            raise BadRequest('Invalid hashmap format')
826
        
827
        data = ''
828
        for block in socket_read_iterator(request, content_length,
829
                                            request.backend.block_size):
830
            data = '%s%s' % (data, block)
831
        
832
        if request.serialization == 'json':
833
            d = json.loads(data)
834
            if not hasattr(d, '__getitem__'):
835
                raise BadRequest('Invalid data formating')
836
            try:
837
                hashmap = d['hashes']
838
                size = int(d['bytes'])
839
            except:
840
                raise BadRequest('Invalid data formatting')
841
        elif request.serialization == 'xml':
842
            try:
843
                xml = minidom.parseString(data)
844
                obj = xml.getElementsByTagName('object')[0]
845
                size = int(obj.attributes['bytes'].value)
846
                
847
                hashes = xml.getElementsByTagName('hash')
848
                hashmap = []
849
                for hash in hashes:
850
                    hashmap.append(hash.firstChild.data)
851
            except:
852
                raise BadRequest('Invalid data formatting')
853
        
854
        checksum = '' # Do not set to None (will copy previous value).
855
    else:
856
        md5 = hashlib.md5()
857
        size = 0
858
        hashmap = []
859
        for data in socket_read_iterator(request, content_length,
860
                                            request.backend.block_size):
861
            # TODO: Raise 408 (Request Timeout) if this takes too long.
862
            # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
863
            size += len(data)
864
            hashmap.append(request.backend.put_block(data))
865
            md5.update(data)
866
        
867
        checksum = md5.hexdigest().lower()
868
        etag = request.META.get('HTTP_ETAG')
869
        if etag and parse_etags(etag)[0].lower() != checksum:
870
            raise UnprocessableEntity('Object ETag does not match')
871
    
872
    try:
873
        version_id = request.backend.update_object_hashmap(request.user_uniq,
874
                        v_account, v_container, v_object, size, content_type,
875
                        hashmap, checksum, 'pithos', meta, True, permissions)
876
    except NotAllowedError:
877
        raise Forbidden('Not allowed')
878
    except IndexError, e:
879
        raise Conflict(simple_list_response(request, e.data))
880
    except NameError:
881
        raise ItemNotFound('Container does not exist')
882
    except ValueError:
883
        raise BadRequest('Invalid sharing header')
884
    except QuotaError:
885
        raise RequestEntityTooLarge('Quota exceeded')
886
    if not checksum and UPDATE_MD5:
887
        # Update the MD5 after the hashmap, as there may be missing hashes.
888
        checksum = hashmap_md5(request.backend, hashmap, size)
889
        try:
890
            request.backend.update_object_checksum(request.user_uniq,
891
              v_account, v_container, v_object, version_id, checksum)
892
        except NotAllowedError:
893
            raise Forbidden('Not allowed')
894
    if public is not None:
895
        try:
896
            request.backend.update_object_public(request.user_uniq, v_account,
897
                                                v_container, v_object, public)
898
        except NotAllowedError:
899
            raise Forbidden('Not allowed')
900
        except NameError:
901
            raise ItemNotFound('Object does not exist')
902
    
903
    response = HttpResponse(status=201)
904
    if checksum:
905
        response['ETag'] = checksum
906
    response['X-Object-Version'] = version_id
907
    return response
908

    
909
@api_method('POST')
910
def object_write_form(request, v_account, v_container, v_object):
911
    # Normal Response Codes: 201
912
    # Error Response Codes: internalServerError (500),
913
    #                       itemNotFound (404),
914
    #                       forbidden (403),
915
    #                       badRequest (400)
916
    
917
    request.upload_handlers = [SaveToBackendHandler(request)]
918
    if not request.FILES.has_key('X-Object-Data'):
919
        raise BadRequest('Missing X-Object-Data field')
920
    file = request.FILES['X-Object-Data']
921
    
922
    checksum = file.etag
923
    try:
924
        version_id = request.backend.update_object_hashmap(request.user_uniq,
925
                        v_account, v_container, v_object, file.size, file.content_type,
926
                        file.hashmap, checksum, 'pithos', {}, True)
927
    except NotAllowedError:
928
        raise Forbidden('Not allowed')
929
    except NameError:
930
        raise ItemNotFound('Container does not exist')
931
    except QuotaError:
932
        raise RequestEntityTooLarge('Quota exceeded')
933
    
934
    response = HttpResponse(status=201)
935
    response['ETag'] = checksum
936
    response['X-Object-Version'] = version_id
937
    response.content = checksum
938
    return response
939

    
940
@api_method('COPY', format_allowed=True)
941
def object_copy(request, v_account, v_container, v_object):
942
    # Normal Response Codes: 201
943
    # Error Response Codes: internalServerError (500),
944
    #                       itemNotFound (404),
945
    #                       forbidden (403),
946
    #                       badRequest (400)
947
    
948
    dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
949
    if not dest_account:
950
        dest_account = request.user_uniq
951
    dest_path = request.META.get('HTTP_DESTINATION')
952
    if not dest_path:
953
        raise BadRequest('Missing Destination header')
954
    try:
955
        dest_container, dest_name = split_container_object_string(dest_path)
956
    except ValueError:
957
        raise BadRequest('Invalid Destination header')
958
    
959
    # Evaluate conditions.
960
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
961
        src_version = request.META.get('HTTP_X_SOURCE_VERSION')
962
        try:
963
            meta = request.backend.get_object_meta(request.user_uniq, v_account,
964
                                            v_container, v_object, 'pithos', src_version)
965
        except NotAllowedError:
966
            raise Forbidden('Not allowed')
967
        except (NameError, IndexError):
968
            raise ItemNotFound('Container or object does not exist')
969
        validate_matching_preconditions(request, meta)
970
    
971
    delimiter = request.GET.get('delimiter')
972
    
973
    version_id = copy_or_move_object(request, v_account, v_container, v_object,
974
                                        dest_account, dest_container, dest_name, move=False, delimiter=delimiter)
975
    response = HttpResponse(status=201)
976
    response['X-Object-Version'] = version_id
977
    return response
978

    
979
@api_method('MOVE', format_allowed=True)
980
def object_move(request, v_account, v_container, v_object):
981
    # Normal Response Codes: 201
982
    # Error Response Codes: internalServerError (500),
983
    #                       itemNotFound (404),
984
    #                       forbidden (403),
985
    #                       badRequest (400)
986
    
987
    dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
988
    if not dest_account:
989
        dest_account = request.user_uniq
990
    dest_path = request.META.get('HTTP_DESTINATION')
991
    if not dest_path:
992
        raise BadRequest('Missing Destination header')
993
    try:
994
        dest_container, dest_name = split_container_object_string(dest_path)
995
    except ValueError:
996
        raise BadRequest('Invalid Destination header')
997
    
998
    # Evaluate conditions.
999
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
1000
        try:
1001
            meta = request.backend.get_object_meta(request.user_uniq, v_account,
1002
                                                    v_container, v_object, 'pithos')
1003
        except NotAllowedError:
1004
            raise Forbidden('Not allowed')
1005
        except NameError:
1006
            raise ItemNotFound('Container or object does not exist')
1007
        validate_matching_preconditions(request, meta)
1008
    
1009
    delimiter = request.GET.get('delimiter')
1010
    
1011
    version_id = copy_or_move_object(request, v_account, v_container, v_object,
1012
                                        dest_account, dest_container, dest_name, move=True, delimiter=delimiter)
1013
    response = HttpResponse(status=201)
1014
    response['X-Object-Version'] = version_id
1015
    return response
1016

    
1017
@api_method('POST', format_allowed=True)
1018
def object_update(request, v_account, v_container, v_object):
1019
    # Normal Response Codes: 202, 204
1020
    # Error Response Codes: internalServerError (500),
1021
    #                       conflict (409),
1022
    #                       itemNotFound (404),
1023
    #                       forbidden (403),
1024
    #                       badRequest (400)
1025
    
1026
    content_type, meta, permissions, public = get_object_headers(request)
1027
    
1028
    try:
1029
        prev_meta = request.backend.get_object_meta(request.user_uniq, v_account,
1030
                                                    v_container, v_object, 'pithos')
1031
    except NotAllowedError:
1032
        raise Forbidden('Not allowed')
1033
    except NameError:
1034
        raise ItemNotFound('Object does not exist')
1035
    
1036
    # Evaluate conditions.
1037
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
1038
        validate_matching_preconditions(request, prev_meta)
1039
    
1040
    replace = True
1041
    if 'update' in request.GET:
1042
        replace = False
1043
    
1044
    # A Content-Type or X-Source-Object header indicates data updates.
1045
    src_object = request.META.get('HTTP_X_SOURCE_OBJECT')
1046
    if (not content_type or content_type != 'application/octet-stream') and not src_object:
1047
        response = HttpResponse(status=202)
1048
        
1049
        # Do permissions first, as it may fail easier.
1050
        if permissions is not None:
1051
            try:
1052
                request.backend.update_object_permissions(request.user_uniq,
1053
                                v_account, v_container, v_object, permissions)
1054
            except NotAllowedError:
1055
                raise Forbidden('Not allowed')
1056
            except NameError:
1057
                raise ItemNotFound('Object does not exist')
1058
            except ValueError:
1059
                raise BadRequest('Invalid sharing header')
1060
        if public is not None:
1061
            try:
1062
                request.backend.update_object_public(request.user_uniq, v_account,
1063
                                                v_container, v_object, public)
1064
            except NotAllowedError:
1065
                raise Forbidden('Not allowed')
1066
            except NameError:
1067
                raise ItemNotFound('Object does not exist')
1068
        if meta or replace:
1069
            try:
1070
                version_id = request.backend.update_object_meta(request.user_uniq,
1071
                                v_account, v_container, v_object, 'pithos', meta, replace)
1072
            except NotAllowedError:
1073
                raise Forbidden('Not allowed')
1074
            except NameError:
1075
                raise ItemNotFound('Object does not exist')        
1076
            response['X-Object-Version'] = version_id
1077
        
1078
        return response
1079
    
1080
    # Single range update. Range must be in Content-Range.
1081
    # Based on: http://code.google.com/p/gears/wiki/ContentRangePostProposal
1082
    # (with the addition that '*' is allowed for the range - will append).
1083
    content_range = request.META.get('HTTP_CONTENT_RANGE')
1084
    if not content_range:
1085
        raise BadRequest('Missing Content-Range header')
1086
    ranges = get_content_range(request)
1087
    if not ranges:
1088
        raise RangeNotSatisfiable('Invalid Content-Range header')
1089
    
1090
    try:
1091
        size, hashmap = request.backend.get_object_hashmap(request.user_uniq,
1092
                                            v_account, v_container, v_object)
1093
    except NotAllowedError:
1094
        raise Forbidden('Not allowed')
1095
    except NameError:
1096
        raise ItemNotFound('Object does not exist')
1097
    
1098
    offset, length, total = ranges
1099
    if offset is None:
1100
        offset = size
1101
    elif offset > size:
1102
        raise RangeNotSatisfiable('Supplied offset is beyond object limits')
1103
    if src_object:
1104
        src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
1105
        if not src_account:
1106
            src_account = request.user_uniq
1107
        src_container, src_name = split_container_object_string(src_object)
1108
        src_version = request.META.get('HTTP_X_SOURCE_VERSION')
1109
        try:
1110
            src_size, src_hashmap = request.backend.get_object_hashmap(request.user_uniq,
1111
                                        src_account, src_container, src_name, src_version)
1112
        except NotAllowedError:
1113
            raise Forbidden('Not allowed')
1114
        except NameError:
1115
            raise ItemNotFound('Source object does not exist')
1116
        
1117
        if length is None:
1118
            length = src_size
1119
        elif length > src_size:
1120
            raise BadRequest('Object length is smaller than range length')
1121
    else:
1122
        # Require either a Content-Length, or 'chunked' Transfer-Encoding.
1123
        content_length = -1
1124
        if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
1125
            content_length = get_content_length(request)
1126
        
1127
        if length is None:
1128
            length = content_length
1129
        else:
1130
            if content_length == -1:
1131
                # TODO: Get up to length bytes in chunks.
1132
                length = content_length
1133
            elif length != content_length:
1134
                raise BadRequest('Content length does not match range length')
1135
    if total is not None and (total != size or offset >= size or (length > 0 and offset + length >= size)):
1136
        raise RangeNotSatisfiable('Supplied range will change provided object limits')
1137
    
1138
    dest_bytes = request.META.get('HTTP_X_OBJECT_BYTES')
1139
    if dest_bytes is not None:
1140
        dest_bytes = get_int_parameter(dest_bytes)
1141
        if dest_bytes is None:
1142
            raise BadRequest('Invalid X-Object-Bytes header')
1143
    
1144
    if src_object:
1145
        if offset % request.backend.block_size == 0:
1146
            # Update the hashes only.
1147
            sbi = 0
1148
            while length > 0:
1149
                bi = int(offset / request.backend.block_size)
1150
                bl = min(length, request.backend.block_size)
1151
                if bi < len(hashmap):
1152
                    if bl == request.backend.block_size:
1153
                        hashmap[bi] = src_hashmap[sbi]
1154
                    else:
1155
                        data = request.backend.get_block(src_hashmap[sbi])
1156
                        hashmap[bi] = request.backend.update_block(hashmap[bi],
1157
                                                                data[:bl], 0)
1158
                else:
1159
                    hashmap.append(src_hashmap[sbi])
1160
                offset += bl
1161
                length -= bl
1162
                sbi += 1
1163
        else:
1164
            data = ''
1165
            sbi = 0
1166
            while length > 0:
1167
                data += request.backend.get_block(src_hashmap[sbi])
1168
                if length < request.backend.block_size:
1169
                    data = data[:length]
1170
                bytes = put_object_block(request, hashmap, data, offset)
1171
                offset += bytes
1172
                data = data[bytes:]
1173
                length -= bytes
1174
                sbi += 1
1175
    else:
1176
        data = ''
1177
        for d in socket_read_iterator(request, length,
1178
                                        request.backend.block_size):
1179
            # TODO: Raise 408 (Request Timeout) if this takes too long.
1180
            # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
1181
            data += d
1182
            bytes = put_object_block(request, hashmap, data, offset)
1183
            offset += bytes
1184
            data = data[bytes:]
1185
        if len(data) > 0:
1186
            put_object_block(request, hashmap, data, offset)
1187
    
1188
    if offset > size:
1189
        size = offset
1190
    if dest_bytes is not None and dest_bytes < size:
1191
        size = dest_bytes
1192
        hashmap = hashmap[:(int((size - 1) / request.backend.block_size) + 1)]
1193
    checksum = hashmap_md5(request.backend, hashmap, size) if UPDATE_MD5 else ''
1194
    try:
1195
        version_id = request.backend.update_object_hashmap(request.user_uniq,
1196
                        v_account, v_container, v_object, size, prev_meta['type'],
1197
                        hashmap, checksum, 'pithos', meta, replace, permissions)
1198
    except NotAllowedError:
1199
        raise Forbidden('Not allowed')
1200
    except NameError:
1201
        raise ItemNotFound('Container does not exist')
1202
    except ValueError:
1203
        raise BadRequest('Invalid sharing header')
1204
    except QuotaError:
1205
        raise RequestEntityTooLarge('Quota exceeded')
1206
    if public is not None:
1207
        try:
1208
            request.backend.update_object_public(request.user_uniq, v_account,
1209
                                                v_container, v_object, public)
1210
        except NotAllowedError:
1211
            raise Forbidden('Not allowed')
1212
        except NameError:
1213
            raise ItemNotFound('Object does not exist')
1214
    
1215
    response = HttpResponse(status=204)
1216
    response['ETag'] = checksum
1217
    response['X-Object-Version'] = version_id
1218
    return response
1219

    
1220
@api_method('DELETE')
1221
def object_delete(request, v_account, v_container, v_object):
1222
    # Normal Response Codes: 204
1223
    # Error Response Codes: internalServerError (500),
1224
    #                       itemNotFound (404),
1225
    #                       forbidden (403),
1226
    #                       badRequest (400)
1227
    
1228
    until = get_int_parameter(request.GET.get('until'))
1229
    delimiter = request.GET.get('delimiter')
1230
    
1231
    try:
1232
        request.backend.delete_object(request.user_uniq, v_account, v_container,
1233
                                        v_object, until, delimiter=delimiter)
1234
    except NotAllowedError:
1235
        raise Forbidden('Not allowed')
1236
    except NameError:
1237
        raise ItemNotFound('Object does not exist')
1238
    return HttpResponse(status=204)
1239

    
1240
@api_method()
1241
def method_not_allowed(request):
1242
    raise BadRequest('Method not allowed')