Statistics
| Branch: | Tag: | Revision:

root / snf-pithos-app / pithos / api / functions.py @ 63de12cf

History | View | Annotate | Download (58.3 kB)

1
# Copyright 2011-2012 GRNET S.A. All rights reserved.
2
#
3
# Redistribution and use in source and binary forms, with or
4
# without modification, are permitted provided that the following
5
# conditions are met:
6
#
7
#   1. Redistributions of source code must retain the above
8
#      copyright notice, this list of conditions and the following
9
#      disclaimer.
10
#
11
#   2. Redistributions in binary form must reproduce the above
12
#      copyright notice, this list of conditions and the following
13
#      disclaimer in the documentation and/or other materials
14
#      provided with the distribution.
15
#
16
# THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
17
# OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
20
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24
# AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
26
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27
# POSSIBILITY OF SUCH DAMAGE.
28
#
29
# The views and conclusions contained in the software and
30
# documentation are those of the authors and should not be
31
# interpreted as representing official policies, either expressed
32
# or implied, of GRNET S.A.
33

    
34
from xml.dom import minidom
35

    
36
from django.http import HttpResponse
37
from django.template.loader import render_to_string
38
from django.utils import simplejson as json
39
from django.utils.http import parse_etags
40
from django.utils.encoding import smart_str
41
from django.views.decorators.csrf import csrf_exempt
42

    
43
from astakosclient import AstakosClient
44

    
45
from snf_django.lib import api
46
from snf_django.lib.api import faults
47

    
48
from pithos.api.util import (
49
    json_encode_decimal, rename_meta_key, format_header_key,
50
    printable_header_dict, get_account_headers, put_account_headers,
51
    get_container_headers, put_container_headers, get_object_headers,
52
    put_object_headers, update_manifest_meta, update_sharing_meta,
53
    update_public_meta, validate_modification_preconditions,
54
    validate_matching_preconditions, split_container_object_string,
55
    copy_or_move_object, get_int_parameter, get_content_length,
56
    get_content_range, socket_read_iterator, SaveToBackendHandler,
57
    object_data_response, put_object_block, hashmap_md5, simple_list_response,
58
    api_method, is_uuid,
59
    retrieve_uuid, retrieve_uuids, retrieve_displaynames,
60
    get_pithos_usage
61
)
62

    
63
from pithos.api.settings import (UPDATE_MD5, TRANSLATE_UUIDS,
64
                                 SERVICE_TOKEN, ASTAKOS_BASE_URL)
65

    
66
from pithos.backends.base import (
67
    NotAllowedError, QuotaError, ContainerNotEmpty, ItemNotExists,
68
    VersionNotExists, ContainerExists)
69

    
70
from pithos.backends.filter import parse_filters
71

    
72
import hashlib
73

    
74
import logging
75
logger = logging.getLogger(__name__)
76

    
77

    
78
def get_uuids(names):
79
    try:
80
        astakos = AstakosClient(ASTAKOS_BASE_URL, retry=2,
81
                                use_pool=True, logger=logger)
82
        uuids = astakos.service_get_uuids(SERVICE_TOKEN, names)
83
    except Exception, e:
84
        logger.exception(e)
85
        return {}
86

    
87
    return uuids
88

    
89

    
90
@csrf_exempt
91
def top_demux(request):
92
    if request.method == 'GET':
93
        try:
94
            request.GET['X-Auth-Token']
95
        except KeyError:
96
            try:
97
                request.META['HTTP_X_AUTH_TOKEN']
98
            except KeyError:
99
                return authenticate(request)
100
        return account_list(request)
101
    else:
102
        return api.method_not_allowed(request)
103

    
104

    
105
@csrf_exempt
106
def account_demux(request, v_account):
107
    if TRANSLATE_UUIDS:
108
        if not is_uuid(v_account):
109
            uuids = get_uuids([v_account])
110
            if not uuids or not v_account in uuids:
111
                return HttpResponse(status=404)
112
            v_account = uuids[v_account]
113

    
114
    if request.method == 'HEAD':
115
        return account_meta(request, v_account)
116
    elif request.method == 'POST':
117
        return account_update(request, v_account)
118
    elif request.method == 'GET':
119
        return container_list(request, v_account)
120
    else:
121
        return api.method_not_allowed(request)
122

    
123

    
124
@csrf_exempt
125
def container_demux(request, v_account, v_container):
126
    if TRANSLATE_UUIDS:
127
        if not is_uuid(v_account):
128
            uuids = get_uuids([v_account])
129
            if not uuids or not v_account in uuids:
130
                return HttpResponse(status=404)
131
            v_account = uuids[v_account]
132

    
133
    if request.method == 'HEAD':
134
        return container_meta(request, v_account, v_container)
135
    elif request.method == 'PUT':
136
        return container_create(request, v_account, v_container)
137
    elif request.method == 'POST':
138
        return container_update(request, v_account, v_container)
139
    elif request.method == 'DELETE':
140
        return container_delete(request, v_account, v_container)
141
    elif request.method == 'GET':
142
        return object_list(request, v_account, v_container)
143
    else:
144
        return api.method_not_allowed(request)
145

    
146

    
147
@csrf_exempt
148
def object_demux(request, v_account, v_container, v_object):
149
    # Helper to avoid placing the token in the URL
150
    # when loading objects from a browser.
151
    if TRANSLATE_UUIDS:
152
        if not is_uuid(v_account):
153
            uuids = get_uuids([v_account])
154
            if not uuids or not v_account in uuids:
155
                return HttpResponse(status=404)
156
            v_account = uuids[v_account]
157

    
158
    if request.method == 'HEAD':
159
        return object_meta(request, v_account, v_container, v_object)
160
    elif request.method == 'GET':
161
        return object_read(request, v_account, v_container, v_object)
162
    elif request.method == 'PUT':
163
        return object_write(request, v_account, v_container, v_object)
164
    elif request.method == 'COPY':
165
        return object_copy(request, v_account, v_container, v_object)
166
    elif request.method == 'MOVE':
167
        return object_move(request, v_account, v_container, v_object)
168
    elif request.method == 'POST':
169
        if request.META.get(
170
                'CONTENT_TYPE', '').startswith('multipart/form-data'):
171
            return object_write_form(request, v_account, v_container, v_object)
172
        return object_update(request, v_account, v_container, v_object)
173
    elif request.method == 'DELETE':
174
        return object_delete(request, v_account, v_container, v_object)
175
    else:
176
        return api.method_not_allowed(request)
177

    
178

    
179
@api_method('GET', user_required=False, logger=logger)
180
def authenticate(request):
181
    # Normal Response Codes: 204
182
    # Error Response Codes: internalServerError (500),
183
    #                       forbidden (403),
184
    #                       badRequest (400)
185

    
186
    x_auth_user = request.META.get('HTTP_X_AUTH_USER')
187
    x_auth_key = request.META.get('HTTP_X_AUTH_KEY')
188
    if not x_auth_user or not x_auth_key:
189
        raise faults.BadRequest('Missing X-Auth-User or X-Auth-Key header')
190
    response = HttpResponse(status=204)
191

    
192
    uri = request.build_absolute_uri()
193
    if '?' in uri:
194
        uri = uri[:uri.find('?')]
195

    
196
    response['X-Auth-Token'] = x_auth_key
197
    response['X-Storage-Url'] = uri + ('' if uri.endswith('/')
198
                                       else '/') + x_auth_user
199
    return response
200

    
201

    
202
@api_method('GET', format_allowed=True, user_required=True, logger=logger)
203
def account_list(request):
204
    # Normal Response Codes: 200, 204
205
    # Error Response Codes: internalServerError (500),
206
    #                       badRequest (400)
207
    response = HttpResponse()
208

    
209
    marker = request.GET.get('marker')
210
    limit = get_int_parameter(request.GET.get('limit'))
211
    if not limit:
212
        limit = 10000
213

    
214
    accounts = request.backend.list_accounts(request.user_uniq, marker, limit)
215

    
216
    if request.serialization == 'text':
217
        if TRANSLATE_UUIDS:
218
            accounts = retrieve_displaynames(
219
                getattr(request, 'token', None), accounts)
220
        if len(accounts) == 0:
221
            # The cloudfiles python bindings expect 200 if json/xml.
222
            response.status_code = 204
223
            return response
224
        response.status_code = 200
225
        response.content = '\n'.join(accounts) + '\n'
226
        return response
227

    
228
    account_meta = []
229
    for x in accounts:
230
        if x == request.user_uniq:
231
            continue
232
        usage = get_pithos_usage(request.x_auth_token)
233
        try:
234
            meta = request.backend.get_account_meta(
235
                request.user_uniq, x, 'pithos', include_user_defined=False,
236
                external_quota=usage)
237
            groups = request.backend.get_account_groups(request.user_uniq, x)
238
        except NotAllowedError:
239
            raise faults.Forbidden('Not allowed')
240
        else:
241
            rename_meta_key(meta, 'modified', 'last_modified')
242
            rename_meta_key(
243
                meta, 'until_timestamp', 'x_account_until_timestamp')
244
            if groups:
245
                meta['X-Account-Group'] = printable_header_dict(
246
                    dict([(k, ','.join(v)) for k, v in groups.iteritems()]))
247
            account_meta.append(printable_header_dict(meta))
248

    
249
    if TRANSLATE_UUIDS:
250
        uuids = list(d['name'] for d in account_meta)
251
        catalog = retrieve_displaynames(
252
            getattr(request, 'token', None), uuids, return_dict=True)
253
        for meta in account_meta:
254
            meta['name'] = catalog.get(meta.get('name'))
255

    
256
    if request.serialization == 'xml':
257
        data = render_to_string('accounts.xml', {'accounts': account_meta})
258
    elif request.serialization == 'json':
259
        data = json.dumps(account_meta)
260
    response.status_code = 200
261
    response.content = data
262
    return response
263

    
264

    
265
@api_method('HEAD', user_required=True, logger=logger)
266
def account_meta(request, v_account):
267
    # Normal Response Codes: 204
268
    # Error Response Codes: internalServerError (500),
269
    #                       forbidden (403),
270
    #                       badRequest (400)
271

    
272
    until = get_int_parameter(request.GET.get('until'))
273
    usage = get_pithos_usage(request.x_auth_token)
274
    try:
275
        meta = request.backend.get_account_meta(
276
            request.user_uniq, v_account, 'pithos', until,
277
            external_quota=usage)
278
        groups = request.backend.get_account_groups(
279
            request.user_uniq, v_account)
280

    
281
        if TRANSLATE_UUIDS:
282
            for k in groups:
283
                groups[k] = retrieve_displaynames(
284
                    getattr(request, 'token', None), groups[k])
285
        policy = request.backend.get_account_policy(
286
            request.user_uniq, v_account, external_quota=usage)
287
    except NotAllowedError:
288
        raise faults.Forbidden('Not allowed')
289

    
290
    validate_modification_preconditions(request, meta)
291

    
292
    response = HttpResponse(status=204)
293
    put_account_headers(response, meta, groups, policy)
294
    return response
295

    
296

    
297
@api_method('POST', user_required=True, logger=logger)
298
def account_update(request, v_account):
299
    # Normal Response Codes: 202
300
    # Error Response Codes: internalServerError (500),
301
    #                       forbidden (403),
302
    #                       badRequest (400)
303

    
304
    meta, groups = get_account_headers(request)
305
    for k in groups:
306
        if TRANSLATE_UUIDS:
307
            try:
308
                groups[k] = retrieve_uuids(
309
                    getattr(request, 'token', None),
310
                    groups[k],
311
                    fail_silently=False)
312
            except ItemNotExists, e:
313
                raise faults.BadRequest(
314
                    'Bad X-Account-Group header value: %s' % e)
315
        else:
316
            try:
317
                retrieve_displaynames(
318
                    getattr(request, 'token', None),
319
                    groups[k],
320
                    fail_silently=False)
321
            except ItemNotExists, e:
322
                raise faults.BadRequest(
323
                    'Bad X-Account-Group header value: %s' % e)
324
    replace = True
325
    if 'update' in request.GET:
326
        replace = False
327
    if groups:
328
        try:
329
            request.backend.update_account_groups(request.user_uniq, v_account,
330
                                                  groups, replace)
331
        except NotAllowedError:
332
            raise faults.Forbidden('Not allowed')
333
        except ValueError:
334
            raise faults.BadRequest('Invalid groups header')
335
    if meta or replace:
336
        try:
337
            request.backend.update_account_meta(request.user_uniq, v_account,
338
                                                'pithos', meta, replace)
339
        except NotAllowedError:
340
            raise faults.Forbidden('Not allowed')
341
    return HttpResponse(status=202)
342

    
343

    
344
@api_method('GET', format_allowed=True, user_required=True, logger=logger,
345
            default_serialization="text")
346
def container_list(request, v_account):
347
    # Normal Response Codes: 200, 204
348
    # Error Response Codes: internalServerError (500),
349
    #                       itemNotFound (404),
350
    #                       forbidden (403),
351
    #                       badRequest (400)
352

    
353
    until = get_int_parameter(request.GET.get('until'))
354
    usage = get_pithos_usage(request.x_auth_token)
355
    try:
356
        meta = request.backend.get_account_meta(
357
            request.user_uniq, v_account, 'pithos', until,
358
            external_quota=usage)
359
        groups = request.backend.get_account_groups(
360
            request.user_uniq, v_account)
361
        policy = request.backend.get_account_policy(
362
            request.user_uniq, v_account, external_quota=usage)
363
    except NotAllowedError:
364
        raise faults.Forbidden('Not allowed')
365

    
366
    validate_modification_preconditions(request, meta)
367

    
368
    response = HttpResponse()
369
    put_account_headers(response, meta, groups, policy)
370

    
371
    marker = request.GET.get('marker')
372
    limit = get_int_parameter(request.GET.get('limit'))
373
    if not limit:
374
        limit = 10000
375

    
376
    shared = False
377
    if 'shared' in request.GET:
378
        shared = True
379
    public = False
380
    if request.user_uniq == v_account and 'public' in request.GET:
381
        public = True
382

    
383
    try:
384
        containers = request.backend.list_containers(
385
            request.user_uniq, v_account,
386
            marker, limit, shared, until, public)
387
    except NotAllowedError:
388
        raise faults.Forbidden('Not allowed')
389
    except NameError:
390
        containers = []
391

    
392
    if request.serialization == 'text':
393
        if len(containers) == 0:
394
            # The cloudfiles python bindings expect 200 if json/xml.
395
            response.status_code = 204
396
            return response
397
        response.status_code = 200
398
        response.content = '\n'.join(containers) + '\n'
399
        return response
400

    
401
    container_meta = []
402
    for x in containers:
403
        try:
404
            meta = request.backend.get_container_meta(
405
                request.user_uniq, v_account,
406
                x, 'pithos', until, include_user_defined=False)
407
            policy = request.backend.get_container_policy(request.user_uniq,
408
                                                          v_account, x)
409
        except NotAllowedError:
410
            raise faults.Forbidden('Not allowed')
411
        except NameError:
412
            pass
413
        else:
414
            rename_meta_key(meta, 'modified', 'last_modified')
415
            rename_meta_key(
416
                meta, 'until_timestamp', 'x_container_until_timestamp')
417
            if policy:
418
                meta['X-Container-Policy'] = printable_header_dict(
419
                    dict([(k, v) for k, v in policy.iteritems()]))
420
            container_meta.append(printable_header_dict(meta))
421
    if request.serialization == 'xml':
422
        data = render_to_string('containers.xml', {'account':
423
                                v_account, 'containers': container_meta})
424
    elif request.serialization == 'json':
425
        data = json.dumps(container_meta)
426
    response.status_code = 200
427
    response.content = data
428
    return response
429

    
430

    
431
@api_method('HEAD', user_required=True, logger=logger)
432
def container_meta(request, v_account, v_container):
433
    # Normal Response Codes: 204
434
    # Error Response Codes: internalServerError (500),
435
    #                       itemNotFound (404),
436
    #                       forbidden (403),
437
    #                       badRequest (400)
438

    
439
    until = get_int_parameter(request.GET.get('until'))
440
    try:
441
        meta = request.backend.get_container_meta(request.user_uniq, v_account,
442
                                                  v_container, 'pithos', until)
443
        meta['object_meta'] = \
444
            request.backend.list_container_meta(request.user_uniq,
445
                                                v_account, v_container,
446
                                                'pithos', until)
447
        policy = request.backend.get_container_policy(
448
            request.user_uniq, v_account,
449
            v_container)
450
    except NotAllowedError:
451
        raise faults.Forbidden('Not allowed')
452
    except ItemNotExists:
453
        raise faults.ItemNotFound('Container does not exist')
454

    
455
    validate_modification_preconditions(request, meta)
456

    
457
    response = HttpResponse(status=204)
458
    put_container_headers(request, response, meta, policy)
459
    return response
460

    
461

    
462
@api_method('PUT', user_required=True, logger=logger)
463
def container_create(request, v_account, v_container):
464
    # Normal Response Codes: 201, 202
465
    # Error Response Codes: internalServerError (500),
466
    #                       itemNotFound (404),
467
    #                       forbidden (403),
468
    #                       badRequest (400)
469

    
470
    meta, policy = get_container_headers(request)
471

    
472
    try:
473
        request.backend.put_container(
474
            request.user_uniq, v_account, v_container, policy)
475
        ret = 201
476
    except NotAllowedError:
477
        raise faults.Forbidden('Not allowed')
478
    except ValueError:
479
        raise faults.BadRequest('Invalid policy header')
480
    except ContainerExists:
481
        ret = 202
482

    
483
    if ret == 202 and policy:
484
        try:
485
            request.backend.update_container_policy(
486
                request.user_uniq, v_account,
487
                v_container, policy, replace=False)
488
        except NotAllowedError:
489
            raise faults.Forbidden('Not allowed')
490
        except ItemNotExists:
491
            raise faults.ItemNotFound('Container does not exist')
492
        except ValueError:
493
            raise faults.BadRequest('Invalid policy header')
494
    if meta:
495
        try:
496
            request.backend.update_container_meta(request.user_uniq, v_account,
497
                                                  v_container, 'pithos',
498
                                                  meta, replace=False)
499
        except NotAllowedError:
500
            raise faults.Forbidden('Not allowed')
501
        except ItemNotExists:
502
            raise faults.ItemNotFound('Container does not exist')
503

    
504
    return HttpResponse(status=ret)
505

    
506

    
507
@api_method('POST', format_allowed=True, user_required=True, logger=logger)
508
def container_update(request, v_account, v_container):
509
    # Normal Response Codes: 202
510
    # Error Response Codes: internalServerError (500),
511
    #                       itemNotFound (404),
512
    #                       forbidden (403),
513
    #                       badRequest (400)
514

    
515
    meta, policy = get_container_headers(request)
516
    replace = True
517
    if 'update' in request.GET:
518
        replace = False
519
    if policy:
520
        try:
521
            request.backend.update_container_policy(
522
                request.user_uniq, v_account,
523
                v_container, policy, replace)
524
        except NotAllowedError:
525
            raise faults.Forbidden('Not allowed')
526
        except ItemNotExists:
527
            raise faults.ItemNotFound('Container does not exist')
528
        except ValueError:
529
            raise faults.BadRequest('Invalid policy header')
530
    if meta or replace:
531
        try:
532
            request.backend.update_container_meta(request.user_uniq, v_account,
533
                                                  v_container, 'pithos',
534
                                                  meta, replace)
535
        except NotAllowedError:
536
            raise faults.Forbidden('Not allowed')
537
        except ItemNotExists:
538
            raise faults.ItemNotFound('Container does not exist')
539

    
540
    content_length = -1
541
    if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
542
        content_length = get_int_parameter(
543
            request.META.get('CONTENT_LENGTH', 0))
544
    content_type = request.META.get('CONTENT_TYPE')
545
    hashmap = []
546
    if (content_type
547
            and content_type == 'application/octet-stream'
548
            and content_length != 0):
549
        for data in socket_read_iterator(request, content_length,
550
                                         request.backend.block_size):
551
            # TODO: Raise 408 (Request Timeout) if this takes too long.
552
            # TODO: Raise 499 (Client Disconnect) if a length is defined
553
            #       and we stop before getting this much data.
554
            hashmap.append(request.backend.put_block(data))
555

    
556
    response = HttpResponse(status=202)
557
    if hashmap:
558
        response.content = simple_list_response(request, hashmap)
559
    return response
560

    
561

    
562
@api_method('DELETE', user_required=True, logger=logger)
563
def container_delete(request, v_account, v_container):
564
    # Normal Response Codes: 204
565
    # Error Response Codes: internalServerError (500),
566
    #                       conflict (409),
567
    #                       itemNotFound (404),
568
    #                       forbidden (403),
569
    #                       badRequest (400)
570
    #                       requestentitytoolarge (413)
571

    
572
    until = get_int_parameter(request.GET.get('until'))
573

    
574
    delimiter = request.GET.get('delimiter')
575

    
576
    try:
577
        request.backend.delete_container(
578
            request.user_uniq, v_account, v_container,
579
            until, delimiter=delimiter)
580
    except NotAllowedError:
581
        raise faults.Forbidden('Not allowed')
582
    except ItemNotExists:
583
        raise faults.ItemNotFound('Container does not exist')
584
    except ContainerNotEmpty:
585
        raise faults.Conflict('Container is not empty')
586
    except QuotaError, e:
587
        raise faults.RequestEntityTooLarge('Quota error: %s' % e)
588
    return HttpResponse(status=204)
589

    
590

    
591
@api_method('GET', format_allowed=True, user_required=True, logger=logger,
592
            default_serialization="text")
593
def object_list(request, v_account, v_container):
594
    # Normal Response Codes: 200, 204
595
    # Error Response Codes: internalServerError (500),
596
    #                       itemNotFound (404),
597
    #                       forbidden (403),
598
    #                       badRequest (400)
599

    
600
    until = get_int_parameter(request.GET.get('until'))
601
    try:
602
        meta = request.backend.get_container_meta(request.user_uniq, v_account,
603
                                                  v_container, 'pithos', until)
604
        meta['object_meta'] = \
605
            request.backend.list_container_meta(request.user_uniq,
606
                                                v_account, v_container,
607
                                                'pithos', until)
608
        policy = request.backend.get_container_policy(
609
            request.user_uniq, v_account,
610
            v_container)
611
    except NotAllowedError:
612
        raise faults.Forbidden('Not allowed')
613
    except ItemNotExists:
614
        raise faults.ItemNotFound('Container does not exist')
615

    
616
    validate_modification_preconditions(request, meta)
617

    
618
    response = HttpResponse()
619
    put_container_headers(request, response, meta, policy)
620

    
621
    path = request.GET.get('path')
622
    prefix = request.GET.get('prefix')
623
    delimiter = request.GET.get('delimiter')
624

    
625
    # Path overrides prefix and delimiter.
626
    virtual = True
627
    if path:
628
        prefix = path
629
        delimiter = '/'
630
        virtual = False
631

    
632
    # Naming policy.
633
    if prefix and delimiter and not prefix.endswith(delimiter):
634
        prefix = prefix + delimiter
635
    if not prefix:
636
        prefix = ''
637
    prefix = prefix.lstrip('/')
638

    
639
    marker = request.GET.get('marker')
640
    limit = get_int_parameter(request.GET.get('limit'))
641
    if not limit:
642
        limit = 10000
643

    
644
    keys = request.GET.get('meta')
645
    if keys:
646
        keys = [smart_str(x.strip()) for x in keys.split(',')
647
                if x.strip() != '']
648
        included, excluded, opers = parse_filters(keys)
649
        keys = []
650
        keys += [format_header_key('X-Object-Meta-' + x) for x in included]
651
        keys += ['!' + format_header_key('X-Object-Meta-' + x)
652
                 for x in excluded]
653
        keys += ['%s%s%s' % (format_header_key(
654
            'X-Object-Meta-' + k), o, v) for k, o, v in opers]
655
    else:
656
        keys = []
657

    
658
    shared = False
659
    if 'shared' in request.GET:
660
        shared = True
661

    
662
    public_requested = 'public' in request.GET
663
    public_granted = public_requested and request.user_uniq == v_account
664

    
665
    if request.serialization == 'text':
666
        try:
667
            objects = request.backend.list_objects(
668
                request.user_uniq, v_account,
669
                v_container, prefix, delimiter, marker,
670
                limit, virtual, 'pithos', keys, shared,
671
                until, None, public_granted)
672
        except NotAllowedError:
673
            raise faults.Forbidden('Not allowed')
674
        except ItemNotExists:
675
            raise faults.ItemNotFound('Container does not exist')
676

    
677
        if len(objects) == 0:
678
            # The cloudfiles python bindings expect 200 if json/xml.
679
            response.status_code = 204
680
            return response
681
        response.status_code = 200
682
        response.content = '\n'.join([x[0] for x in objects]) + '\n'
683
        return response
684

    
685
    try:
686
        objects = request.backend.list_object_meta(
687
            request.user_uniq, v_account,
688
            v_container, prefix, delimiter, marker,
689
            limit, virtual, 'pithos', keys, shared, until, None, public_granted)
690
        object_permissions = {}
691
        object_public = {}
692
        if until is None:
693
            name = '/'.join((v_account, v_container, ''))
694
            name_idx = len(name)
695
            for x in request.backend.list_object_permissions(
696
                    request.user_uniq, v_account, v_container, prefix):
697

    
698
                # filter out objects which are not under the container
699
                if name != x[:name_idx]:
700
                    continue
701

    
702
                object = x[name_idx:]
703
                object_permissions[object] = \
704
                    request.backend.get_object_permissions(
705
                        request.user_uniq, v_account, v_container, object)
706

    
707
            if request.user_uniq == v_account:
708
                # Bring public information only if the request user
709
                # is the object owner
710
                for k, v in request.backend.list_object_public(
711
                        request.user_uniq, v_account,
712
                        v_container, prefix).iteritems():
713
                    object_public[k[name_idx:]] = v
714
    except NotAllowedError:
715
        raise faults.Forbidden('Not allowed')
716
    except ItemNotExists:
717
        raise faults.ItemNotFound('Container does not exist')
718

    
719
    object_meta = []
720
    for meta in objects:
721
        if TRANSLATE_UUIDS:
722
            modified_by = meta.get('modified_by')
723
            if modified_by:
724
                l = retrieve_displaynames(
725
                    getattr(request, 'token', None), [meta['modified_by']])
726
                if l is not None and len(l) == 1:
727
                    meta['modified_by'] = l[0]
728

    
729
        if len(meta) == 1:
730
            # Virtual objects/directories.
731
            object_meta.append(meta)
732
        else:
733
            rename_meta_key(
734
                meta, 'hash', 'x_object_hash')  # Will be replaced by checksum.
735
            rename_meta_key(meta, 'checksum', 'hash')
736
            rename_meta_key(meta, 'type', 'content_type')
737
            rename_meta_key(meta, 'uuid', 'x_object_uuid')
738
            if until is not None and 'modified' in meta:
739
                del(meta['modified'])
740
            else:
741
                rename_meta_key(meta, 'modified', 'last_modified')
742
            rename_meta_key(meta, 'modified_by', 'x_object_modified_by')
743
            rename_meta_key(meta, 'version', 'x_object_version')
744
            rename_meta_key(
745
                meta, 'version_timestamp', 'x_object_version_timestamp')
746
            permissions = object_permissions.get(meta['name'], None)
747
            if permissions:
748
                update_sharing_meta(request, permissions, v_account,
749
                                    v_container, meta['name'], meta)
750
            public_url = object_public.get(meta['name'], None)
751
            if request.user_uniq == v_account:
752
                # Return public information only if the request user
753
                # is the object owner
754
                update_public_meta(public_url, meta)
755
            object_meta.append(printable_header_dict(meta))
756

    
757
    if request.serialization == 'xml':
758
        data = render_to_string(
759
            'objects.xml', {'container': v_container, 'objects': object_meta})
760
    elif request.serialization == 'json':
761
        data = json.dumps(object_meta, default=json_encode_decimal)
762
    response.status_code = 200
763
    response.content = data
764
    return response
765

    
766

    
767
@api_method('HEAD', user_required=True, logger=logger)
768
def object_meta(request, v_account, v_container, v_object):
769
    # Normal Response Codes: 204
770
    # Error Response Codes: internalServerError (500),
771
    #                       itemNotFound (404),
772
    #                       forbidden (403),
773
    #                       badRequest (400)
774

    
775
    version = request.GET.get('version')
776
    try:
777
        meta = request.backend.get_object_meta(request.user_uniq, v_account,
778
                                               v_container, v_object,
779
                                               'pithos', version)
780
        if version is None:
781
            permissions = request.backend.get_object_permissions(
782
                request.user_uniq,
783
                v_account, v_container, v_object)
784
            public = request.backend.get_object_public(
785
                request.user_uniq, v_account,
786
                v_container, v_object)
787
        else:
788
            permissions = None
789
            public = None
790
    except NotAllowedError:
791
        raise faults.Forbidden('Not allowed')
792
    except ItemNotExists:
793
        raise faults.ItemNotFound('Object does not exist')
794
    except VersionNotExists:
795
        raise faults.ItemNotFound('Version does not exist')
796

    
797
    update_manifest_meta(request, v_account, meta)
798
    update_sharing_meta(
799
        request, permissions, v_account, v_container, v_object, meta)
800
    if request.user_uniq == v_account:
801
        update_public_meta(public, meta)
802

    
803
    # Evaluate conditions.
804
    validate_modification_preconditions(request, meta)
805
    try:
806
        validate_matching_preconditions(request, meta)
807
    except faults.NotModified:
808
        response = HttpResponse(status=304)
809
        response['ETag'] = meta['checksum']
810
        return response
811

    
812
    response = HttpResponse(status=200)
813
    put_object_headers(response, meta, token=getattr(request, 'token', None))
814
    return response
815

    
816

    
817
@api_method('GET', format_allowed=True, user_required=True, logger=logger)
818
def object_read(request, v_account, v_container, v_object):
819
    return _object_read(request, v_account, v_container, v_object)
820

    
821

    
822
def _object_read(request, v_account, v_container, v_object):
823
    # Normal Response Codes: 200, 206
824
    # Error Response Codes: internalServerError (500),
825
    #                       rangeNotSatisfiable (416),
826
    #                       preconditionFailed (412),
827
    #                       itemNotFound (404),
828
    #                       forbidden (403),
829
    #                       badRequest (400),
830
    #                       notModified (304)
831

    
832
    version = request.GET.get('version')
833

    
834
    # Reply with the version list. Do this first, as the object may be deleted.
835
    if version == 'list':
836
        if request.serialization == 'text':
837
            raise faults.BadRequest('No format specified for version list.')
838

    
839
        try:
840
            v = request.backend.list_versions(request.user_uniq, v_account,
841
                                              v_container, v_object)
842
        except NotAllowedError:
843
            raise faults.Forbidden('Not allowed')
844
        except ItemNotExists:
845
            raise faults.ItemNotFound('Object does not exist')
846
        d = {'versions': v}
847
        if request.serialization == 'xml':
848
            d['object'] = v_object
849
            data = render_to_string('versions.xml', d)
850
        elif request.serialization == 'json':
851
            data = json.dumps(d, default=json_encode_decimal)
852

    
853
        response = HttpResponse(data, status=200)
854
        response['Content-Length'] = len(data)
855
        return response
856

    
857
    try:
858
        meta = request.backend.get_object_meta(request.user_uniq, v_account,
859
                                               v_container, v_object,
860
                                               'pithos', version)
861
        if version is None:
862
            permissions = request.backend.get_object_permissions(
863
                request.user_uniq,
864
                v_account, v_container, v_object)
865
            public = request.backend.get_object_public(
866
                request.user_uniq, v_account,
867
                v_container, v_object)
868
        else:
869
            permissions = None
870
            public = None
871
    except NotAllowedError:
872
        raise faults.Forbidden('Not allowed')
873
    except ItemNotExists:
874
        raise faults.ItemNotFound('Object does not exist')
875
    except VersionNotExists:
876
        raise faults.ItemNotFound('Version does not exist')
877

    
878
    update_manifest_meta(request, v_account, meta)
879
    update_sharing_meta(
880
        request, permissions, v_account, v_container, v_object, meta)
881
    if request.user_uniq == v_account:
882
        update_public_meta(public, meta)
883

    
884
    # Evaluate conditions.
885
    validate_modification_preconditions(request, meta)
886
    try:
887
        validate_matching_preconditions(request, meta)
888
    except faults.NotModified:
889
        response = HttpResponse(status=304)
890
        response['ETag'] = meta['checksum']
891
        return response
892

    
893
    hashmap_reply = False
894
    if 'hashmap' in request.GET and request.serialization != 'text':
895
        hashmap_reply = True
896

    
897
    sizes = []
898
    hashmaps = []
899
    if 'X-Object-Manifest' in meta and not hashmap_reply:
900
        try:
901
            src_container, src_name = split_container_object_string(
902
                '/' + meta['X-Object-Manifest'])
903
            objects = request.backend.list_objects(
904
                request.user_uniq, v_account,
905
                src_container, prefix=src_name, virtual=False)
906
        except NotAllowedError:
907
            raise faults.Forbidden('Not allowed')
908
        except ValueError:
909
            raise faults.BadRequest('Invalid X-Object-Manifest header')
910
        except ItemNotExists:
911
            raise faults.ItemNotFound('Container does not exist')
912

    
913
        try:
914
            for x in objects:
915
                s, h = \
916
                    request.backend.get_object_hashmap(request.user_uniq,
917
                                                       v_account, src_container,
918
                                                       x[0], x[1])
919
                sizes.append(s)
920
                hashmaps.append(h)
921
        except NotAllowedError:
922
            raise faults.Forbidden('Not allowed')
923
        except ItemNotExists:
924
            raise faults.ItemNotFound('Object does not exist')
925
        except VersionNotExists:
926
            raise faults.ItemNotFound('Version does not exist')
927
    else:
928
        try:
929
            s, h = request.backend.get_object_hashmap(
930
                request.user_uniq, v_account,
931
                v_container, v_object, version)
932
            sizes.append(s)
933
            hashmaps.append(h)
934
        except NotAllowedError:
935
            raise faults.Forbidden('Not allowed')
936
        except ItemNotExists:
937
            raise faults.ItemNotFound('Object does not exist')
938
        except VersionNotExists:
939
            raise faults.ItemNotFound('Version does not exist')
940

    
941
    # Reply with the hashmap.
942
    if hashmap_reply:
943
        size = sum(sizes)
944
        hashmap = sum(hashmaps, [])
945
        d = {
946
            'block_size': request.backend.block_size,
947
            'block_hash': request.backend.hash_algorithm,
948
            'bytes': size,
949
            'hashes': hashmap}
950
        if request.serialization == 'xml':
951
            d['object'] = v_object
952
            data = render_to_string('hashes.xml', d)
953
        elif request.serialization == 'json':
954
            data = json.dumps(d)
955

    
956
        response = HttpResponse(data, status=200)
957
        put_object_headers(
958
            response, meta, token=getattr(request, 'token', None))
959
        response['Content-Length'] = len(data)
960
        return response
961

    
962
    request.serialization = 'text'  # Unset.
963
    return object_data_response(request, sizes, hashmaps, meta)
964

    
965

    
966
@api_method('PUT', format_allowed=True, user_required=True, logger=logger)
967
def object_write(request, v_account, v_container, v_object):
968
    # Normal Response Codes: 201
969
    # Error Response Codes: internalServerError (500),
970
    #                       unprocessableEntity (422),
971
    #                       lengthRequired (411),
972
    #                       conflict (409),
973
    #                       itemNotFound (404),
974
    #                       forbidden (403),
975
    #                       badRequest (400)
976
    #                       requestentitytoolarge (413)
977

    
978
    # Evaluate conditions.
979
    if (request.META.get('HTTP_IF_MATCH')
980
            or request.META.get('HTTP_IF_NONE_MATCH')):
981
        try:
982
            meta = request.backend.get_object_meta(
983
                request.user_uniq, v_account,
984
                v_container, v_object, 'pithos')
985
        except NotAllowedError:
986
            raise faults.Forbidden('Not allowed')
987
        except NameError:
988
            meta = {}
989
        validate_matching_preconditions(request, meta)
990

    
991
    copy_from = request.META.get('HTTP_X_COPY_FROM')
992
    move_from = request.META.get('HTTP_X_MOVE_FROM')
993
    if copy_from or move_from:
994
        delimiter = request.GET.get('delimiter')
995
        content_length = get_content_length(request)  # Required by the API.
996

    
997
        src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
998

    
999
        if not src_account:
1000
            src_account = request.user_uniq
1001
        else:
1002
            if TRANSLATE_UUIDS:
1003
                try:
1004
                    src_account = retrieve_uuid(getattr(request, 'token', None),
1005
                                                src_account)
1006
                except ItemNotExists:
1007
                    faults.ItemNotFound('Invalid source account')
1008

    
1009
        if move_from:
1010
            try:
1011
                src_container, src_name = split_container_object_string(
1012
                    move_from)
1013
            except ValueError:
1014
                raise faults.BadRequest('Invalid X-Move-From header')
1015
            version_id = copy_or_move_object(
1016
                request, src_account, src_container, src_name,
1017
                v_account, v_container, v_object,
1018
                move=True, delimiter=delimiter)
1019
        else:
1020
            try:
1021
                src_container, src_name = split_container_object_string(
1022
                    copy_from)
1023
            except ValueError:
1024
                raise faults.BadRequest('Invalid X-Copy-From header')
1025
            version_id = copy_or_move_object(
1026
                request, src_account, src_container, src_name,
1027
                v_account, v_container, v_object,
1028
                move=False, delimiter=delimiter)
1029
        response = HttpResponse(status=201)
1030
        response['X-Object-Version'] = version_id
1031
        return response
1032

    
1033
    content_type, meta, permissions, public = get_object_headers(request)
1034
    content_length = -1
1035
    if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
1036
        content_length = get_content_length(request)
1037
    # Should be BadRequest, but API says otherwise.
1038
    if content_type is None:
1039
        raise faults.LengthRequired('Missing Content-Type header')
1040

    
1041
    if 'hashmap' in request.GET:
1042
        if request.serialization not in ('json', 'xml'):
1043
            raise faults.BadRequest('Invalid hashmap format')
1044

    
1045
        data = ''
1046
        for block in socket_read_iterator(request, content_length,
1047
                                          request.backend.block_size):
1048
            data = '%s%s' % (data, block)
1049

    
1050
        if request.serialization == 'json':
1051
            d = json.loads(data)
1052
            if not hasattr(d, '__getitem__'):
1053
                raise faults.BadRequest('Invalid data formating')
1054
            try:
1055
                hashmap = d['hashes']
1056
                size = int(d['bytes'])
1057
            except:
1058
                raise faults.BadRequest('Invalid data formatting')
1059
        elif request.serialization == 'xml':
1060
            try:
1061
                xml = minidom.parseString(data)
1062
                obj = xml.getElementsByTagName('object')[0]
1063
                size = int(obj.attributes['bytes'].value)
1064

    
1065
                hashes = xml.getElementsByTagName('hash')
1066
                hashmap = []
1067
                for hash in hashes:
1068
                    hashmap.append(hash.firstChild.data)
1069
            except:
1070
                raise faults.BadRequest('Invalid data formatting')
1071

    
1072
        checksum = ''  # Do not set to None (will copy previous value).
1073
    else:
1074
        md5 = hashlib.md5()
1075
        size = 0
1076
        hashmap = []
1077
        for data in socket_read_iterator(request, content_length,
1078
                                         request.backend.block_size):
1079
            # TODO: Raise 408 (Request Timeout) if this takes too long.
1080
            # TODO: Raise 499 (Client Disconnect) if a length is defined
1081
            #       and we stop before getting this much data.
1082
            size += len(data)
1083
            hashmap.append(request.backend.put_block(data))
1084
            md5.update(data)
1085

    
1086
        checksum = md5.hexdigest().lower()
1087
        etag = request.META.get('HTTP_ETAG')
1088
        if etag and parse_etags(etag)[0].lower() != checksum:
1089
            raise faults.UnprocessableEntity('Object ETag does not match')
1090

    
1091
    try:
1092
        version_id = \
1093
            request.backend.update_object_hashmap(request.user_uniq,
1094
                                                  v_account, v_container,
1095
                                                  v_object, size, content_type,
1096
                                                  hashmap, checksum,
1097
                                                  'pithos', meta, True,
1098
                                                  permissions)
1099
    except NotAllowedError:
1100
        raise faults.Forbidden('Not allowed')
1101
    except IndexError, e:
1102
        missing_blocks = e.data
1103
        response = HttpResponse(status=409)
1104
        response.content = simple_list_response(request, missing_blocks)
1105
        return response
1106
    except ItemNotExists:
1107
        raise faults.ItemNotFound('Container does not exist')
1108
    except ValueError:
1109
        raise faults.BadRequest('Invalid sharing header')
1110
    except QuotaError, e:
1111
        raise faults.RequestEntityTooLarge('Quota error: %s' % e)
1112
    if not checksum and UPDATE_MD5:
1113
        # Update the MD5 after the hashmap, as there may be missing hashes.
1114
        checksum = hashmap_md5(request.backend, hashmap, size)
1115
        try:
1116
            request.backend.update_object_checksum(request.user_uniq,
1117
                                                   v_account, v_container,
1118
                                                   v_object, version_id,
1119
                                                   checksum)
1120
        except NotAllowedError:
1121
            raise faults.Forbidden('Not allowed')
1122
    if public is not None:
1123
        try:
1124
            request.backend.update_object_public(request.user_uniq, v_account,
1125
                                                 v_container, v_object, public)
1126
        except NotAllowedError:
1127
            raise faults.Forbidden('Not allowed')
1128
        except ItemNotExists:
1129
            raise faults.ItemNotFound('Object does not exist')
1130

    
1131
    response = HttpResponse(status=201)
1132
    if checksum:
1133
        response['ETag'] = checksum
1134
    response['X-Object-Version'] = version_id
1135
    return response
1136

    
1137

    
1138
@api_method('POST', user_required=True, logger=logger)
1139
def object_write_form(request, v_account, v_container, v_object):
1140
    # Normal Response Codes: 201
1141
    # Error Response Codes: internalServerError (500),
1142
    #                       itemNotFound (404),
1143
    #                       forbidden (403),
1144
    #                       badRequest (400)
1145
    #                       requestentitytoolarge (413)
1146

    
1147
    request.upload_handlers = [SaveToBackendHandler(request)]
1148
    if 'X-Object-Data' not in request.FILES:
1149
        raise faults.BadRequest('Missing X-Object-Data field')
1150
    file = request.FILES['X-Object-Data']
1151

    
1152
    checksum = file.etag
1153
    try:
1154
        version_id = \
1155
            request.backend.update_object_hashmap(request.user_uniq,
1156
                                                  v_account, v_container,
1157
                                                  v_object, file.size,
1158
                                                  file.content_type,
1159
                                                  file.hashmap, checksum,
1160
                                                  'pithos', {}, True)
1161
    except NotAllowedError:
1162
        raise faults.Forbidden('Not allowed')
1163
    except ItemNotExists:
1164
        raise faults.ItemNotFound('Container does not exist')
1165
    except QuotaError, e:
1166
        raise faults.RequestEntityTooLarge('Quota error: %s' % e)
1167

    
1168
    response = HttpResponse(status=201)
1169
    response['ETag'] = checksum
1170
    response['X-Object-Version'] = version_id
1171
    response.content = checksum
1172
    return response
1173

    
1174

    
1175
@api_method('COPY', format_allowed=True, user_required=True, logger=logger)
1176
def object_copy(request, v_account, v_container, v_object):
1177
    # Normal Response Codes: 201
1178
    # Error Response Codes: internalServerError (500),
1179
    #                       itemNotFound (404),
1180
    #                       forbidden (403),
1181
    #                       badRequest (400)
1182
    #                       requestentitytoolarge (413)
1183

    
1184
    dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
1185
    if not dest_account:
1186
        dest_account = request.user_uniq
1187
    dest_path = request.META.get('HTTP_DESTINATION')
1188
    if not dest_path:
1189
        raise faults.BadRequest('Missing Destination header')
1190
    try:
1191
        dest_container, dest_name = split_container_object_string(dest_path)
1192
    except ValueError:
1193
        raise faults.BadRequest('Invalid Destination header')
1194

    
1195
    # Evaluate conditions.
1196
    if (request.META.get('HTTP_IF_MATCH')
1197
            or request.META.get('HTTP_IF_NONE_MATCH')):
1198
        src_version = request.META.get('HTTP_X_SOURCE_VERSION')
1199
        try:
1200
            meta = request.backend.get_object_meta(
1201
                request.user_uniq, v_account,
1202
                v_container, v_object, 'pithos', src_version)
1203
        except NotAllowedError:
1204
            raise faults.Forbidden('Not allowed')
1205
        except (ItemNotExists, VersionNotExists):
1206
            raise faults.ItemNotFound('Container or object does not exist')
1207
        validate_matching_preconditions(request, meta)
1208

    
1209
    delimiter = request.GET.get('delimiter')
1210

    
1211
    version_id = copy_or_move_object(request, v_account, v_container, v_object,
1212
                                     dest_account, dest_container, dest_name,
1213
                                     move=False, delimiter=delimiter)
1214
    response = HttpResponse(status=201)
1215
    response['X-Object-Version'] = version_id
1216
    return response
1217

    
1218

    
1219
@api_method('MOVE', format_allowed=True, user_required=True, logger=logger)
1220
def object_move(request, v_account, v_container, v_object):
1221
    # Normal Response Codes: 201
1222
    # Error Response Codes: internalServerError (500),
1223
    #                       itemNotFound (404),
1224
    #                       forbidden (403),
1225
    #                       badRequest (400)
1226
    #                       requestentitytoolarge (413)
1227

    
1228
    dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
1229
    if not dest_account:
1230
        dest_account = request.user_uniq
1231
    dest_path = request.META.get('HTTP_DESTINATION')
1232
    if not dest_path:
1233
        raise faults.BadRequest('Missing Destination header')
1234
    try:
1235
        dest_container, dest_name = split_container_object_string(dest_path)
1236
    except ValueError:
1237
        raise faults.BadRequest('Invalid Destination header')
1238

    
1239
    # Evaluate conditions.
1240
    if (request.META.get('HTTP_IF_MATCH')
1241
            or request.META.get('HTTP_IF_NONE_MATCH')):
1242
        try:
1243
            meta = request.backend.get_object_meta(
1244
                request.user_uniq, v_account,
1245
                v_container, v_object, 'pithos')
1246
        except NotAllowedError:
1247
            raise faults.Forbidden('Not allowed')
1248
        except ItemNotExists:
1249
            raise faults.ItemNotFound('Container or object does not exist')
1250
        validate_matching_preconditions(request, meta)
1251

    
1252
    delimiter = request.GET.get('delimiter')
1253

    
1254
    version_id = copy_or_move_object(request, v_account, v_container, v_object,
1255
                                     dest_account, dest_container, dest_name,
1256
                                     move=True, delimiter=delimiter)
1257
    response = HttpResponse(status=201)
1258
    response['X-Object-Version'] = version_id
1259
    return response
1260

    
1261

    
1262
@api_method('POST', format_allowed=True, user_required=True, logger=logger)
1263
def object_update(request, v_account, v_container, v_object):
1264
    # Normal Response Codes: 202, 204
1265
    # Error Response Codes: internalServerError (500),
1266
    #                       conflict (409),
1267
    #                       itemNotFound (404),
1268
    #                       forbidden (403),
1269
    #                       badRequest (400)
1270

    
1271
    content_type, meta, permissions, public = get_object_headers(request)
1272

    
1273
    try:
1274
        prev_meta = request.backend.get_object_meta(
1275
            request.user_uniq, v_account,
1276
            v_container, v_object, 'pithos')
1277
    except NotAllowedError:
1278
        raise faults.Forbidden('Not allowed')
1279
    except ItemNotExists:
1280
        raise faults.ItemNotFound('Object does not exist')
1281

    
1282
    # Evaluate conditions.
1283
    if (request.META.get('HTTP_IF_MATCH')
1284
            or request.META.get('HTTP_IF_NONE_MATCH')):
1285
        validate_matching_preconditions(request, prev_meta)
1286

    
1287
    replace = True
1288
    if 'update' in request.GET:
1289
        replace = False
1290

    
1291
    # A Content-Type or X-Source-Object header indicates data updates.
1292
    src_object = request.META.get('HTTP_X_SOURCE_OBJECT')
1293
    if ((not content_type or content_type != 'application/octet-stream')
1294
            and not src_object):
1295
        response = HttpResponse(status=202)
1296

    
1297
        # Do permissions first, as it may fail easier.
1298
        if permissions is not None:
1299
            try:
1300
                request.backend.update_object_permissions(request.user_uniq,
1301
                                                          v_account,
1302
                                                          v_container, v_object,
1303
                                                          permissions)
1304
            except NotAllowedError:
1305
                raise faults.Forbidden('Not allowed')
1306
            except ItemNotExists:
1307
                raise faults.ItemNotFound('Object does not exist')
1308
            except ValueError:
1309
                raise faults.BadRequest('Invalid sharing header')
1310
        if public is not None:
1311
            try:
1312
                request.backend.update_object_public(
1313
                    request.user_uniq, v_account,
1314
                    v_container, v_object, public)
1315
            except NotAllowedError:
1316
                raise faults.Forbidden('Not allowed')
1317
            except ItemNotExists:
1318
                raise faults.ItemNotFound('Object does not exist')
1319
        if meta or replace:
1320
            try:
1321
                version_id = request.backend.update_object_meta(
1322
                    request.user_uniq,
1323
                    v_account, v_container, v_object, 'pithos', meta, replace)
1324
            except NotAllowedError:
1325
                raise faults.Forbidden('Not allowed')
1326
            except ItemNotExists:
1327
                raise faults.ItemNotFound('Object does not exist')
1328
            response['X-Object-Version'] = version_id
1329

    
1330
        return response
1331

    
1332
    # Single range update. Range must be in Content-Range.
1333
    # Based on: http://code.google.com/p/gears/wiki/ContentRangePostProposal
1334
    # (with the addition that '*' is allowed for the range - will append).
1335
    content_range = request.META.get('HTTP_CONTENT_RANGE')
1336
    if not content_range:
1337
        raise faults.BadRequest('Missing Content-Range header')
1338
    ranges = get_content_range(request)
1339
    if not ranges:
1340
        raise faults.RangeNotSatisfiable('Invalid Content-Range header')
1341

    
1342
    try:
1343
        size, hashmap = \
1344
            request.backend.get_object_hashmap(request.user_uniq,
1345
                                               v_account, v_container, v_object)
1346
    except NotAllowedError:
1347
        raise faults.Forbidden('Not allowed')
1348
    except ItemNotExists:
1349
        raise faults.ItemNotFound('Object does not exist')
1350

    
1351
    offset, length, total = ranges
1352
    if offset is None:
1353
        offset = size
1354
    elif offset > size:
1355
        raise faults.RangeNotSatisfiable(
1356
            'Supplied offset is beyond object limits')
1357
    if src_object:
1358
        src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
1359
        if not src_account:
1360
            src_account = request.user_uniq
1361
        src_container, src_name = split_container_object_string(src_object)
1362
        src_version = request.META.get('HTTP_X_SOURCE_VERSION')
1363
        try:
1364
            src_size, src_hashmap = request.backend.get_object_hashmap(
1365
                request.user_uniq,
1366
                src_account, src_container, src_name, src_version)
1367
        except NotAllowedError:
1368
            raise faults.Forbidden('Not allowed')
1369
        except ItemNotExists:
1370
            raise faults.ItemNotFound('Source object does not exist')
1371

    
1372
        if length is None:
1373
            length = src_size
1374
        elif length > src_size:
1375
            raise faults.BadRequest(
1376
                'Object length is smaller than range length')
1377
    else:
1378
        # Require either a Content-Length, or 'chunked' Transfer-Encoding.
1379
        content_length = -1
1380
        if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
1381
            content_length = get_content_length(request)
1382

    
1383
        if length is None:
1384
            length = content_length
1385
        else:
1386
            if content_length == -1:
1387
                # TODO: Get up to length bytes in chunks.
1388
                length = content_length
1389
            elif length != content_length:
1390
                raise faults.BadRequest(
1391
                    'Content length does not match range length')
1392
    if (total is not None
1393
            and (total != size or offset >= size
1394
                 or (length > 0 and offset + length >= size))):
1395
        raise faults.RangeNotSatisfiable(
1396
            'Supplied range will change provided object limits')
1397

    
1398
    dest_bytes = request.META.get('HTTP_X_OBJECT_BYTES')
1399
    if dest_bytes is not None:
1400
        dest_bytes = get_int_parameter(dest_bytes)
1401
        if dest_bytes is None:
1402
            raise faults.BadRequest('Invalid X-Object-Bytes header')
1403

    
1404
    if src_object:
1405
        if offset % request.backend.block_size == 0:
1406
            # Update the hashes only.
1407
            sbi = 0
1408
            while length > 0:
1409
                bi = int(offset / request.backend.block_size)
1410
                bl = min(length, request.backend.block_size)
1411
                if bi < len(hashmap):
1412
                    if bl == request.backend.block_size:
1413
                        hashmap[bi] = src_hashmap[sbi]
1414
                    else:
1415
                        data = request.backend.get_block(src_hashmap[sbi])
1416
                        hashmap[bi] = request.backend.update_block(hashmap[bi],
1417
                                                                   data[:bl], 0)
1418
                else:
1419
                    hashmap.append(src_hashmap[sbi])
1420
                offset += bl
1421
                length -= bl
1422
                sbi += 1
1423
        else:
1424
            data = ''
1425
            sbi = 0
1426
            while length > 0:
1427
                data += request.backend.get_block(src_hashmap[sbi])
1428
                if length < request.backend.block_size:
1429
                    data = data[:length]
1430
                bytes = put_object_block(request, hashmap, data, offset)
1431
                offset += bytes
1432
                data = data[bytes:]
1433
                length -= bytes
1434
                sbi += 1
1435
    else:
1436
        data = ''
1437
        for d in socket_read_iterator(request, length,
1438
                                      request.backend.block_size):
1439
            # TODO: Raise 408 (Request Timeout) if this takes too long.
1440
            # TODO: Raise 499 (Client Disconnect) if a length is defined
1441
            #       and we stop before getting this much data.
1442
            data += d
1443
            bytes = put_object_block(request, hashmap, data, offset)
1444
            offset += bytes
1445
            data = data[bytes:]
1446
        if len(data) > 0:
1447
            put_object_block(request, hashmap, data, offset)
1448

    
1449
    if offset > size:
1450
        size = offset
1451
    if dest_bytes is not None and dest_bytes < size:
1452
        size = dest_bytes
1453
        hashmap = hashmap[:(int((size - 1) / request.backend.block_size) + 1)]
1454
    checksum = hashmap_md5(
1455
        request.backend, hashmap, size) if UPDATE_MD5 else ''
1456
    try:
1457
        version_id = \
1458
            request.backend.update_object_hashmap(request.user_uniq,
1459
                                                  v_account, v_container,
1460
                                                  v_object, size,
1461
                                                  prev_meta['type'],
1462
                                                  hashmap, checksum, 'pithos',
1463
                                                  meta, replace, permissions)
1464
    except NotAllowedError:
1465
        raise faults.Forbidden('Not allowed')
1466
    except ItemNotExists:
1467
        raise faults.ItemNotFound('Container does not exist')
1468
    except ValueError:
1469
        raise faults.BadRequest('Invalid sharing header')
1470
    except QuotaError, e:
1471
        raise faults.RequestEntityTooLarge('Quota error: %s' % e)
1472
    if public is not None:
1473
        try:
1474
            request.backend.update_object_public(request.user_uniq, v_account,
1475
                                                 v_container, v_object, public)
1476
        except NotAllowedError:
1477
            raise faults.Forbidden('Not allowed')
1478
        except ItemNotExists:
1479
            raise faults.ItemNotFound('Object does not exist')
1480

    
1481
    response = HttpResponse(status=204)
1482
    response['ETag'] = checksum
1483
    response['X-Object-Version'] = version_id
1484
    return response
1485

    
1486

    
1487
@api_method('DELETE', user_required=True, logger=logger)
1488
def object_delete(request, v_account, v_container, v_object):
1489
    # Normal Response Codes: 204
1490
    # Error Response Codes: internalServerError (500),
1491
    #                       itemNotFound (404),
1492
    #                       forbidden (403),
1493
    #                       badRequest (400)
1494
    #                       requestentitytoolarge (413)
1495

    
1496
    until = get_int_parameter(request.GET.get('until'))
1497
    delimiter = request.GET.get('delimiter')
1498

    
1499
    try:
1500
        request.backend.delete_object(
1501
            request.user_uniq, v_account, v_container,
1502
            v_object, until, delimiter=delimiter)
1503
    except NotAllowedError:
1504
        raise faults.Forbidden('Not allowed')
1505
    except ItemNotExists:
1506
        raise faults.ItemNotFound('Object does not exist')
1507
    except QuotaError, e:
1508
        raise faults.RequestEntityTooLarge('Quota error: %s' % e)
1509
    return HttpResponse(status=204)