Statistics
| Branch: | Tag: | Revision:

root / snf-pithos-app / pithos / api / functions.py @ 8a0c7040

History | View | Annotate | Download (55.6 kB)

1
# Copyright 2011-2012 GRNET S.A. All rights reserved.
2
#
3
# Redistribution and use in source and binary forms, with or
4
# without modification, are permitted provided that the following
5
# conditions are met:
6
#
7
#   1. Redistributions of source code must retain the above
8
#      copyright notice, this list of conditions and the following
9
#      disclaimer.
10
#
11
#   2. Redistributions in binary form must reproduce the above
12
#      copyright notice, this list of conditions and the following
13
#      disclaimer in the documentation and/or other materials
14
#      provided with the distribution.
15
#
16
# THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
17
# OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
20
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24
# AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
26
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27
# POSSIBILITY OF SUCH DAMAGE.
28
#
29
# The views and conclusions contained in the software and
30
# documentation are those of the authors and should not be
31
# interpreted as representing official policies, either expressed
32
# or implied, of GRNET S.A.
33

    
34
from xml.dom import minidom
35
from urllib import unquote
36

    
37
from django.conf import settings
38
from django.http import HttpResponse
39
from django.template.loader import render_to_string
40
from django.utils import simplejson as json
41
from django.utils.http import parse_etags
42
from django.utils.encoding import smart_str
43
from django.views.decorators.csrf import csrf_exempt
44

    
45
from synnefo.lib.astakos import get_user, get_uuids as _get_uuids
46

    
47
from pithos.api.faults import (
48
    Fault, NotModified, BadRequest, Unauthorized, Forbidden, ItemNotFound,
49
    Conflict, LengthRequired, PreconditionFailed, RequestEntityTooLarge,
50
    RangeNotSatisfiable, UnprocessableEntity)
51
from pithos.api.util import (
52
    json_encode_decimal, rename_meta_key, format_header_key,
53
    printable_header_dict, get_account_headers, put_account_headers,
54
    get_container_headers, put_container_headers, get_object_headers,
55
    put_object_headers, update_manifest_meta, update_sharing_meta,
56
    update_public_meta, validate_modification_preconditions,
57
    validate_matching_preconditions, split_container_object_string,
58
    copy_or_move_object, get_int_parameter, get_content_length,
59
    get_content_range, socket_read_iterator, SaveToBackendHandler,
60
    object_data_response, put_object_block, hashmap_md5, simple_list_response,
61
    api_method, is_uuid,
62
    retrieve_uuid, retrieve_displayname, retrieve_uuids, retrieve_displaynames
63
)
64

    
65
from pithos.api.settings import (UPDATE_MD5, TRANSLATE_UUIDS,
66
                                 SERVICE_TOKEN, AUTHENTICATION_URL,
67
                                 AUTHENTICATION_USERS)
68

    
69
from pithos.backends.base import (
70
    NotAllowedError, QuotaError, ContainerNotEmpty, ItemNotExists,
71
    VersionNotExists, ContainerExists)
72

    
73
from pithos.backends.filter import parse_filters
74

    
75
import logging
76
import hashlib
77

    
78
logger = logging.getLogger(__name__)
79

    
80
def get_uuids(names):
81
    try:
82
        uuids = _get_uuids(SERVICE_TOKEN, names,
83
                           url=AUTHENTICATION_URL.replace(
84
                                            'im/authenticate',
85
                                            'service/api/user_catalogs'),
86
                           override_users=AUTHENTICATION_USERS)
87
    except Exception, e:
88
        logger.exception(e)
89
        return {}
90

    
91
    return uuids
92

    
93

    
94
@csrf_exempt
95
def top_demux(request):
96
    if request.method == 'GET':
97
        try:
98
            request.GET['X-Auth-Token']
99
        except KeyError:
100
            try:
101
                request.META['HTTP_X_AUTH_TOKEN']
102
            except KeyError:
103
                return authenticate(request)
104
        return account_list(request)
105
    else:
106
        return method_not_allowed(request)
107

    
108

    
109
@csrf_exempt
110
def account_demux(request, v_account):
111
    if TRANSLATE_UUIDS:
112
        if not is_uuid(v_account):
113
            uuids = get_uuids([v_account])
114
            if not uuids or not v_account in uuids:
115
                return HttpResponse(status=404)
116
            v_account = uuids[v_account]
117

    
118
    if request.method == 'HEAD':
119
        return account_meta(request, v_account)
120
    elif request.method == 'POST':
121
        return account_update(request, v_account)
122
    elif request.method == 'GET':
123
        return container_list(request, v_account)
124
    else:
125
        return method_not_allowed(request)
126

    
127

    
128
@csrf_exempt
129
def container_demux(request, v_account, v_container):
130
    if TRANSLATE_UUIDS:
131
        if not is_uuid(v_account):
132
            uuids = get_uuids([v_account])
133
            if not uuids or not v_account in uuids:
134
                return HttpResponse(status=404)
135
            v_account = uuids[v_account]
136

    
137
    if request.method == 'HEAD':
138
        return container_meta(request, v_account, v_container)
139
    elif request.method == 'PUT':
140
        return container_create(request, v_account, v_container)
141
    elif request.method == 'POST':
142
        return container_update(request, v_account, v_container)
143
    elif request.method == 'DELETE':
144
        return container_delete(request, v_account, v_container)
145
    elif request.method == 'GET':
146
        return object_list(request, v_account, v_container)
147
    else:
148
        return method_not_allowed(request)
149

    
150

    
151
@csrf_exempt
152
def object_demux(request, v_account, v_container, v_object):
153
    # Helper to avoid placing the token in the URL when loading objects from a browser.
154
    if TRANSLATE_UUIDS:
155
        if not is_uuid(v_account):
156
            uuids = get_uuids([v_account])
157
            if not uuids or not v_account in uuids:
158
                return HttpResponse(status=404)
159
            v_account = uuids[v_account]
160

    
161
    if request.method == 'HEAD':
162
        return object_meta(request, v_account, v_container, v_object)
163
    elif request.method == 'GET':
164
        return object_read(request, v_account, v_container, v_object)
165
    elif request.method == 'PUT':
166
        return object_write(request, v_account, v_container, v_object)
167
    elif request.method == 'COPY':
168
        return object_copy(request, v_account, v_container, v_object)
169
    elif request.method == 'MOVE':
170
        return object_move(request, v_account, v_container, v_object)
171
    elif request.method == 'POST':
172
        if request.META.get('CONTENT_TYPE', '').startswith('multipart/form-data'):
173
            return object_write_form(request, v_account, v_container, v_object)
174
        return object_update(request, v_account, v_container, v_object)
175
    elif request.method == 'DELETE':
176
        return object_delete(request, v_account, v_container, v_object)
177
    else:
178
        return method_not_allowed(request)
179

    
180

    
181
@api_method('GET', user_required=False)
182
def authenticate(request):
183
    # Normal Response Codes: 204
184
    # Error Response Codes: internalServerError (500),
185
    #                       forbidden (403),
186
    #                       badRequest (400)
187

    
188
    x_auth_user = request.META.get('HTTP_X_AUTH_USER')
189
    x_auth_key = request.META.get('HTTP_X_AUTH_KEY')
190
    if not x_auth_user or not x_auth_key:
191
        raise BadRequest('Missing X-Auth-User or X-Auth-Key header')
192
    response = HttpResponse(status=204)
193

    
194
    uri = request.build_absolute_uri()
195
    if '?' in uri:
196
        uri = uri[:uri.find('?')]
197

    
198
    response['X-Auth-Token'] = x_auth_key
199
    response['X-Storage-Url'] = uri + ('' if uri.endswith('/')
200
                                       else '/') + x_auth_user
201
    return response
202

    
203

    
204
@api_method('GET', format_allowed=True, request_usage=True)
205
def account_list(request):
206
    # Normal Response Codes: 200, 204
207
    # Error Response Codes: internalServerError (500),
208
    #                       badRequest (400)
209
    response = HttpResponse()
210

    
211
    marker = request.GET.get('marker')
212
    limit = get_int_parameter(request.GET.get('limit'))
213
    if not limit:
214
        limit = 10000
215

    
216
    accounts = request.backend.list_accounts(request.user_uniq, marker, limit)
217

    
218
    if request.serialization == 'text':
219
        if TRANSLATE_UUIDS:
220
            accounts = retrieve_displaynames(
221
                    getattr(request, 'token', None), accounts)
222
        if len(accounts) == 0:
223
            # The cloudfiles python bindings expect 200 if json/xml.
224
            response.status_code = 204
225
            return response
226
        response.status_code = 200
227
        response.content = '\n'.join(accounts) + '\n'
228
        return response
229

    
230
    account_meta = []
231
    for x in accounts:
232
        if x == request.user_uniq:
233
            continue
234
        try:
235
            meta = request.backend.get_account_meta(
236
                request.user_uniq, x, 'pithos', include_user_defined=False,
237
                external_quota=request.user_usage)
238
            groups = request.backend.get_account_groups(request.user_uniq, x)
239
        except NotAllowedError:
240
            raise Forbidden('Not allowed')
241
        else:
242
            rename_meta_key(meta, 'modified', 'last_modified')
243
            rename_meta_key(
244
                meta, 'until_timestamp', 'x_account_until_timestamp')
245
            if groups:
246
                meta['X-Account-Group'] = printable_header_dict(
247
                    dict([(k, ','.join(v)) for k, v in groups.iteritems()]))
248
            account_meta.append(printable_header_dict(meta))
249

    
250
    if TRANSLATE_UUIDS:
251
        uuids = list(d['name'] for d in account_meta)
252
        catalog = retrieve_displaynames(
253
                getattr(request, 'token', None), uuids, return_dict=True)
254
        for meta in account_meta:
255
            meta['name'] = catalog.get(meta.get('name'))
256

    
257
    if request.serialization == 'xml':
258
        data = render_to_string('accounts.xml', {'accounts': account_meta})
259
    elif request.serialization == 'json':
260
        data = json.dumps(account_meta)
261
    response.status_code = 200
262
    response.content = data
263
    return response
264

    
265

    
266
@api_method('HEAD', request_usage=True)
267
def account_meta(request, v_account):
268
    # Normal Response Codes: 204
269
    # Error Response Codes: internalServerError (500),
270
    #                       forbidden (403),
271
    #                       badRequest (400)
272

    
273
    until = get_int_parameter(request.GET.get('until'))
274
    try:
275
        meta = request.backend.get_account_meta(
276
            request.user_uniq, v_account, 'pithos', until,
277
            external_quota=request.user_usage)
278
        groups = request.backend.get_account_groups(
279
            request.user_uniq, v_account)
280

    
281
        if TRANSLATE_UUIDS:
282
            for k in groups:
283
                groups[k] = retrieve_displaynames(
284
                        getattr(request, 'token', None), groups[k])
285
        policy = request.backend.get_account_policy(
286
            request.user_uniq, v_account, external_quota=request.user_usage)
287
    except NotAllowedError:
288
        raise Forbidden('Not allowed')
289

    
290
    validate_modification_preconditions(request, meta)
291

    
292
    response = HttpResponse(status=204)
293
    put_account_headers(response, meta, groups, policy)
294
    return response
295

    
296

    
297
@api_method('POST')
298
def account_update(request, v_account):
299
    # Normal Response Codes: 202
300
    # Error Response Codes: internalServerError (500),
301
    #                       forbidden (403),
302
    #                       badRequest (400)
303

    
304
    meta, groups = get_account_headers(request)
305
    for k in groups:
306
        if TRANSLATE_UUIDS:
307
            try:
308
                groups[k] = retrieve_uuids(
309
                        getattr(request, 'token', None),
310
                        groups[k],
311
                        fail_silently=False)
312
            except ItemNotExists, e:
313
                raise BadRequest(
314
                        'Bad X-Account-Group header value: %s' % e)
315
        else:
316
            try:
317
                retrieve_displaynames(
318
                    getattr(request, 'token', None),
319
                    groups[k],
320
                    fail_silently=False)
321
            except ItemNotExists, e:
322
                raise BadRequest(
323
                        'Bad X-Account-Group header value: %s'  % e)
324
    replace = True
325
    if 'update' in request.GET:
326
        replace = False
327
    if groups:
328
        try:
329
            request.backend.update_account_groups(request.user_uniq, v_account,
330
                                                  groups, replace)
331
        except NotAllowedError:
332
            raise Forbidden('Not allowed')
333
        except ValueError:
334
            raise BadRequest('Invalid groups header')
335
    if meta or replace:
336
        try:
337
            request.backend.update_account_meta(request.user_uniq, v_account,
338
                                                'pithos', meta, replace)
339
        except NotAllowedError:
340
            raise Forbidden('Not allowed')
341
    return HttpResponse(status=202)
342

    
343

    
344
@api_method('GET', format_allowed=True, request_usage=True)
345
def container_list(request, v_account):
346
    # Normal Response Codes: 200, 204
347
    # Error Response Codes: internalServerError (500),
348
    #                       itemNotFound (404),
349
    #                       forbidden (403),
350
    #                       badRequest (400)
351

    
352
    until = get_int_parameter(request.GET.get('until'))
353
    try:
354
        meta = request.backend.get_account_meta(
355
            request.user_uniq, v_account, 'pithos', until,
356
            external_quota=request.user_usage)
357
        groups = request.backend.get_account_groups(
358
            request.user_uniq, v_account)
359
        policy = request.backend.get_account_policy(
360
            request.user_uniq, v_account, external_quota = request.user_usage)
361
    except NotAllowedError:
362
        raise Forbidden('Not allowed')
363

    
364
    validate_modification_preconditions(request, meta)
365

    
366
    response = HttpResponse()
367
    put_account_headers(response, meta, groups, policy)
368

    
369
    marker = request.GET.get('marker')
370
    limit = get_int_parameter(request.GET.get('limit'))
371
    if not limit:
372
        limit = 10000
373

    
374
    shared = False
375
    if 'shared' in request.GET:
376
        shared = True
377
    public = False
378
    if request.user_uniq == v_account and 'public' in request.GET:
379
        public = True
380

    
381
    try:
382
        containers = request.backend.list_containers(
383
            request.user_uniq, v_account,
384
            marker, limit, shared, until, public)
385
    except NotAllowedError:
386
        raise Forbidden('Not allowed')
387
    except NameError:
388
        containers = []
389

    
390
    if request.serialization == 'text':
391
        if len(containers) == 0:
392
            # The cloudfiles python bindings expect 200 if json/xml.
393
            response.status_code = 204
394
            return response
395
        response.status_code = 200
396
        response.content = '\n'.join(containers) + '\n'
397
        return response
398

    
399
    container_meta = []
400
    for x in containers:
401
        try:
402
            meta = request.backend.get_container_meta(
403
                request.user_uniq, v_account,
404
                x, 'pithos', until, include_user_defined=False)
405
            policy = request.backend.get_container_policy(request.user_uniq,
406
                                                          v_account, x)
407
        except NotAllowedError:
408
            raise Forbidden('Not allowed')
409
        except NameError:
410
            pass
411
        else:
412
            rename_meta_key(meta, 'modified', 'last_modified')
413
            rename_meta_key(
414
                meta, 'until_timestamp', 'x_container_until_timestamp')
415
            if policy:
416
                meta['X-Container-Policy'] = printable_header_dict(
417
                    dict([(k, v) for k, v in policy.iteritems()]))
418
            container_meta.append(printable_header_dict(meta))
419
    if request.serialization == 'xml':
420
        data = render_to_string('containers.xml', {'account':
421
                                v_account, 'containers': container_meta})
422
    elif request.serialization == 'json':
423
        data = json.dumps(container_meta)
424
    response.status_code = 200
425
    response.content = data
426
    return response
427

    
428

    
429
@api_method('HEAD')
430
def container_meta(request, v_account, v_container):
431
    # Normal Response Codes: 204
432
    # Error Response Codes: internalServerError (500),
433
    #                       itemNotFound (404),
434
    #                       forbidden (403),
435
    #                       badRequest (400)
436

    
437
    until = get_int_parameter(request.GET.get('until'))
438
    try:
439
        meta = request.backend.get_container_meta(request.user_uniq, v_account,
440
                                                  v_container, 'pithos', until)
441
        meta['object_meta'] = request.backend.list_container_meta(request.user_uniq,
442
                                                                  v_account, v_container, 'pithos', until)
443
        policy = request.backend.get_container_policy(
444
            request.user_uniq, v_account,
445
            v_container)
446
    except NotAllowedError:
447
        raise Forbidden('Not allowed')
448
    except ItemNotExists:
449
        raise ItemNotFound('Container does not exist')
450

    
451
    validate_modification_preconditions(request, meta)
452

    
453
    response = HttpResponse(status=204)
454
    put_container_headers(request, response, meta, policy)
455
    return response
456

    
457

    
458
@api_method('PUT')
459
def container_create(request, v_account, v_container):
460
    # Normal Response Codes: 201, 202
461
    # Error Response Codes: internalServerError (500),
462
    #                       itemNotFound (404),
463
    #                       forbidden (403),
464
    #                       badRequest (400)
465

    
466
    meta, policy = get_container_headers(request)
467

    
468
    try:
469
        request.backend.put_container(
470
            request.user_uniq, v_account, v_container, policy)
471
        ret = 201
472
    except NotAllowedError:
473
        raise Forbidden('Not allowed')
474
    except ValueError:
475
        raise BadRequest('Invalid policy header')
476
    except ContainerExists:
477
        ret = 202
478

    
479
    if ret == 202 and policy:
480
        try:
481
            request.backend.update_container_policy(
482
                request.user_uniq, v_account,
483
                v_container, policy, replace=False)
484
        except NotAllowedError:
485
            raise Forbidden('Not allowed')
486
        except ItemNotExists:
487
            raise ItemNotFound('Container does not exist')
488
        except ValueError:
489
            raise BadRequest('Invalid policy header')
490
    if meta:
491
        try:
492
            request.backend.update_container_meta(request.user_uniq, v_account,
493
                                                  v_container, 'pithos', meta, replace=False)
494
        except NotAllowedError:
495
            raise Forbidden('Not allowed')
496
        except ItemNotExists:
497
            raise ItemNotFound('Container does not exist')
498

    
499
    return HttpResponse(status=ret)
500

    
501

    
502
@api_method('POST', format_allowed=True)
503
def container_update(request, v_account, v_container):
504
    # Normal Response Codes: 202
505
    # Error Response Codes: internalServerError (500),
506
    #                       itemNotFound (404),
507
    #                       forbidden (403),
508
    #                       badRequest (400)
509

    
510
    meta, policy = get_container_headers(request)
511
    replace = True
512
    if 'update' in request.GET:
513
        replace = False
514
    if policy:
515
        try:
516
            request.backend.update_container_policy(
517
                request.user_uniq, v_account,
518
                v_container, policy, replace)
519
        except NotAllowedError:
520
            raise Forbidden('Not allowed')
521
        except ItemNotExists:
522
            raise ItemNotFound('Container does not exist')
523
        except ValueError:
524
            raise BadRequest('Invalid policy header')
525
    if meta or replace:
526
        try:
527
            request.backend.update_container_meta(request.user_uniq, v_account,
528
                                                  v_container, 'pithos', meta, replace)
529
        except NotAllowedError:
530
            raise Forbidden('Not allowed')
531
        except ItemNotExists:
532
            raise ItemNotFound('Container does not exist')
533

    
534
    content_length = -1
535
    if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
536
        content_length = get_int_parameter(
537
            request.META.get('CONTENT_LENGTH', 0))
538
    content_type = request.META.get('CONTENT_TYPE')
539
    hashmap = []
540
    if content_type and content_type == 'application/octet-stream' and content_length != 0:
541
        for data in socket_read_iterator(request, content_length,
542
                                         request.backend.block_size):
543
            # TODO: Raise 408 (Request Timeout) if this takes too long.
544
            # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
545
            hashmap.append(request.backend.put_block(data))
546

    
547
    response = HttpResponse(status=202)
548
    if hashmap:
549
        response.content = simple_list_response(request, hashmap)
550
    return response
551

    
552

    
553
@api_method('DELETE')
554
def container_delete(request, v_account, v_container):
555
    # Normal Response Codes: 204
556
    # Error Response Codes: internalServerError (500),
557
    #                       conflict (409),
558
    #                       itemNotFound (404),
559
    #                       forbidden (403),
560
    #                       badRequest (400)
561
    #                       requestentitytoolarge (413)
562

    
563
    until = get_int_parameter(request.GET.get('until'))
564

    
565
    delimiter = request.GET.get('delimiter')
566

    
567
    try:
568
        request.backend.delete_container(
569
            request.user_uniq, v_account, v_container,
570
            until, delimiter=delimiter)
571
    except NotAllowedError:
572
        raise Forbidden('Not allowed')
573
    except ItemNotExists:
574
        raise ItemNotFound('Container does not exist')
575
    except ContainerNotEmpty:
576
        raise Conflict('Container is not empty')
577
    except QuotaError, e:
578
        raise RequestEntityTooLarge('Quota error: %s' % e)
579
    return HttpResponse(status=204)
580

    
581

    
582
@api_method('GET', format_allowed=True)
583
def object_list(request, v_account, v_container):
584
    # Normal Response Codes: 200, 204
585
    # Error Response Codes: internalServerError (500),
586
    #                       itemNotFound (404),
587
    #                       forbidden (403),
588
    #                       badRequest (400)
589

    
590
    until = get_int_parameter(request.GET.get('until'))
591
    try:
592
        meta = request.backend.get_container_meta(request.user_uniq, v_account,
593
                                                  v_container, 'pithos', until)
594
        meta['object_meta'] = request.backend.list_container_meta(request.user_uniq,
595
                                                                  v_account, v_container, 'pithos', until)
596
        policy = request.backend.get_container_policy(
597
            request.user_uniq, v_account,
598
            v_container)
599
    except NotAllowedError:
600
        raise Forbidden('Not allowed')
601
    except ItemNotExists:
602
        raise ItemNotFound('Container does not exist')
603

    
604
    validate_modification_preconditions(request, meta)
605

    
606
    response = HttpResponse()
607
    put_container_headers(request, response, meta, policy)
608

    
609
    path = request.GET.get('path')
610
    prefix = request.GET.get('prefix')
611
    delimiter = request.GET.get('delimiter')
612

    
613
    # Path overrides prefix and delimiter.
614
    virtual = True
615
    if path:
616
        prefix = path
617
        delimiter = '/'
618
        virtual = False
619

    
620
    # Naming policy.
621
    if prefix and delimiter and not prefix.endswith(delimiter):
622
        prefix = prefix + delimiter
623
    if not prefix:
624
        prefix = ''
625
    prefix = prefix.lstrip('/')
626

    
627
    marker = request.GET.get('marker')
628
    limit = get_int_parameter(request.GET.get('limit'))
629
    if not limit:
630
        limit = 10000
631

    
632
    keys = request.GET.get('meta')
633
    if keys:
634
        keys = [smart_str(x.strip()) for x in keys.split(',')
635
                if x.strip() != '']
636
        included, excluded, opers = parse_filters(keys)
637
        keys = []
638
        keys += [format_header_key('X-Object-Meta-' + x) for x in included]
639
        keys += ['!' + format_header_key('X-Object-Meta-' + x)
640
                 for x in excluded]
641
        keys += ['%s%s%s' % (format_header_key(
642
            'X-Object-Meta-' + k), o, v) for k, o, v in opers]
643
    else:
644
        keys = []
645

    
646
    shared = False
647
    if 'shared' in request.GET:
648
        shared = True
649

    
650
    public_requested = 'public' in request.GET
651
    public_granted = public_requested and request.user_uniq == v_account
652

    
653
    if request.serialization == 'text':
654
        try:
655
            objects = request.backend.list_objects(
656
                request.user_uniq, v_account,
657
                v_container, prefix, delimiter, marker,
658
                limit, virtual, 'pithos', keys, shared,
659
                until, None, public_granted)
660
        except NotAllowedError:
661
            raise Forbidden('Not allowed')
662
        except ItemNotExists:
663
            raise ItemNotFound('Container does not exist')
664

    
665
        if len(objects) == 0:
666
            # The cloudfiles python bindings expect 200 if json/xml.
667
            response.status_code = 204
668
            return response
669
        response.status_code = 200
670
        response.content = '\n'.join([x[0] for x in objects]) + '\n'
671
        return response
672

    
673
    try:
674
        objects = request.backend.list_object_meta(
675
            request.user_uniq, v_account,
676
            v_container, prefix, delimiter, marker,
677
            limit, virtual, 'pithos', keys, shared, until, None, public_granted)
678
        object_permissions = {}
679
        object_public = {}
680
        if until is None:
681
            name = '/'.join((v_account, v_container, ''))
682
            name_idx = len(name)
683
            for x in request.backend.list_object_permissions(request.user_uniq,
684
                                                             v_account, v_container, prefix):
685

    
686
                # filter out objects which are not under the container
687
                if name != x[:name_idx]:
688
                    continue
689

    
690
                object = x[name_idx:]
691
                object_permissions[object] = request.backend.get_object_permissions(
692
                    request.user_uniq, v_account, v_container, object)
693

    
694
            if public_granted:
695
                for k, v in request.backend.list_object_public(
696
                        request.user_uniq, v_account,
697
                        v_container, prefix).iteritems():
698
                    object_public[k[name_idx:]] = v
699
    except NotAllowedError:
700
        raise Forbidden('Not allowed')
701
    except ItemNotExists:
702
        raise ItemNotFound('Container does not exist')
703

    
704
    object_meta = []
705
    for meta in objects:
706
        if TRANSLATE_UUIDS:
707
            modified_by = meta.get('modified_by')
708
            if modified_by:
709
                l = retrieve_displaynames(
710
                        getattr(request, 'token', None), [meta['modified_by']])
711
                if l is not None and len(l) == 1:
712
                    meta['modified_by'] = l[0]
713

    
714
        if len(meta) == 1:
715
            # Virtual objects/directories.
716
            object_meta.append(meta)
717
        else:
718
            rename_meta_key(
719
                meta, 'hash', 'x_object_hash')  # Will be replaced by checksum.
720
            rename_meta_key(meta, 'checksum', 'hash')
721
            rename_meta_key(meta, 'type', 'content_type')
722
            rename_meta_key(meta, 'uuid', 'x_object_uuid')
723
            if until is not None and 'modified' in meta:
724
                del(meta['modified'])
725
            else:
726
                rename_meta_key(meta, 'modified', 'last_modified')
727
            rename_meta_key(meta, 'modified_by', 'x_object_modified_by')
728
            rename_meta_key(meta, 'version', 'x_object_version')
729
            rename_meta_key(
730
                meta, 'version_timestamp', 'x_object_version_timestamp')
731
            permissions = object_permissions.get(meta['name'], None)
732
            if permissions:
733
                update_sharing_meta(request, permissions, v_account,
734
                                    v_container, meta['name'], meta)
735
            public_url = object_public.get(meta['name'], None)
736
            if public_granted:
737
                update_public_meta(public_url, meta)
738
            object_meta.append(printable_header_dict(meta))
739

    
740
    if request.serialization == 'xml':
741
        data = render_to_string(
742
            'objects.xml', {'container': v_container, 'objects': object_meta})
743
    elif request.serialization == 'json':
744
        data = json.dumps(object_meta, default=json_encode_decimal)
745
    response.status_code = 200
746
    response.content = data
747
    return response
748

    
749

    
750
@api_method('HEAD')
751
def object_meta(request, v_account, v_container, v_object):
752
    # Normal Response Codes: 204
753
    # Error Response Codes: internalServerError (500),
754
    #                       itemNotFound (404),
755
    #                       forbidden (403),
756
    #                       badRequest (400)
757

    
758
    version = request.GET.get('version')
759
    try:
760
        meta = request.backend.get_object_meta(request.user_uniq, v_account,
761
                                               v_container, v_object, 'pithos', version)
762
        if version is None:
763
            permissions = request.backend.get_object_permissions(
764
                request.user_uniq,
765
                v_account, v_container, v_object)
766
            public = request.backend.get_object_public(
767
                request.user_uniq, v_account,
768
                v_container, v_object)
769
        else:
770
            permissions = None
771
            public = None
772
    except NotAllowedError:
773
        raise Forbidden('Not allowed')
774
    except ItemNotExists:
775
        raise ItemNotFound('Object does not exist')
776
    except VersionNotExists:
777
        raise ItemNotFound('Version does not exist')
778

    
779
    update_manifest_meta(request, v_account, meta)
780
    update_sharing_meta(
781
        request, permissions, v_account, v_container, v_object, meta)
782
    if request.user_uniq == v_account:
783
        update_public_meta(public, meta)
784

    
785
    # Evaluate conditions.
786
    validate_modification_preconditions(request, meta)
787
    try:
788
        validate_matching_preconditions(request, meta)
789
    except NotModified:
790
        response = HttpResponse(status=304)
791
        response['ETag'] = meta['checksum']
792
        return response
793

    
794
    response = HttpResponse(status=200)
795
    put_object_headers(response, meta, token=getattr(request, 'token', None))
796
    return response
797

    
798

    
799
@api_method('GET', format_allowed=True)
800
def object_read(request, v_account, v_container, v_object):
801
    # Normal Response Codes: 200, 206
802
    # Error Response Codes: internalServerError (500),
803
    #                       rangeNotSatisfiable (416),
804
    #                       preconditionFailed (412),
805
    #                       itemNotFound (404),
806
    #                       forbidden (403),
807
    #                       badRequest (400),
808
    #                       notModified (304)
809

    
810
    version = request.GET.get('version')
811

    
812
    # Reply with the version list. Do this first, as the object may be deleted.
813
    if version == 'list':
814
        if request.serialization == 'text':
815
            raise BadRequest('No format specified for version list.')
816

    
817
        try:
818
            v = request.backend.list_versions(request.user_uniq, v_account,
819
                                              v_container, v_object)
820
        except NotAllowedError:
821
            raise Forbidden('Not allowed')
822
        except ItemNotExists:
823
            raise ItemNotFound('Object does not exist')
824
        d = {'versions': v}
825
        if request.serialization == 'xml':
826
            d['object'] = v_object
827
            data = render_to_string('versions.xml', d)
828
        elif request.serialization == 'json':
829
            data = json.dumps(d, default=json_encode_decimal)
830

    
831
        response = HttpResponse(data, status=200)
832
        response['Content-Length'] = len(data)
833
        return response
834

    
835
    try:
836
        meta = request.backend.get_object_meta(request.user_uniq, v_account,
837
                                               v_container, v_object, 'pithos', version)
838
        if version is None:
839
            permissions = request.backend.get_object_permissions(
840
                request.user_uniq,
841
                v_account, v_container, v_object)
842
            public = request.backend.get_object_public(
843
                request.user_uniq, v_account,
844
                v_container, v_object)
845
        else:
846
            permissions = None
847
            public = None
848
    except NotAllowedError:
849
        raise Forbidden('Not allowed')
850
    except ItemNotExists:
851
        raise ItemNotFound('Object does not exist')
852
    except VersionNotExists:
853
        raise ItemNotFound('Version does not exist')
854

    
855
    update_manifest_meta(request, v_account, meta)
856
    update_sharing_meta(
857
        request, permissions, v_account, v_container, v_object, meta)
858
    if request.user_uniq == v_account:
859
        update_public_meta(public, meta)
860

    
861
    # Evaluate conditions.
862
    validate_modification_preconditions(request, meta)
863
    try:
864
        validate_matching_preconditions(request, meta)
865
    except NotModified:
866
        response = HttpResponse(status=304)
867
        response['ETag'] = meta['checksum']
868
        return response
869

    
870
    hashmap_reply = False
871
    if 'hashmap' in request.GET and request.serialization != 'text':
872
        hashmap_reply = True
873

    
874
    sizes = []
875
    hashmaps = []
876
    if 'X-Object-Manifest' in meta and not hashmap_reply:
877
        try:
878
            src_container, src_name = split_container_object_string(
879
                '/' + meta['X-Object-Manifest'])
880
            objects = request.backend.list_objects(
881
                request.user_uniq, v_account,
882
                src_container, prefix=src_name, virtual=False)
883
        except NotAllowedError:
884
            raise Forbidden('Not allowed')
885
        except ValueError:
886
            raise BadRequest('Invalid X-Object-Manifest header')
887
        except ItemNotExists:
888
            raise ItemNotFound('Container does not exist')
889

    
890
        try:
891
            for x in objects:
892
                s, h = request.backend.get_object_hashmap(request.user_uniq,
893
                                                          v_account, src_container, x[0], x[1])
894
                sizes.append(s)
895
                hashmaps.append(h)
896
        except NotAllowedError:
897
            raise Forbidden('Not allowed')
898
        except ItemNotExists:
899
            raise ItemNotFound('Object does not exist')
900
        except VersionNotExists:
901
            raise ItemNotFound('Version does not exist')
902
    else:
903
        try:
904
            s, h = request.backend.get_object_hashmap(
905
                request.user_uniq, v_account,
906
                v_container, v_object, version)
907
            sizes.append(s)
908
            hashmaps.append(h)
909
        except NotAllowedError:
910
            raise Forbidden('Not allowed')
911
        except ItemNotExists:
912
            raise ItemNotFound('Object does not exist')
913
        except VersionNotExists:
914
            raise ItemNotFound('Version does not exist')
915

    
916
    # Reply with the hashmap.
917
    if hashmap_reply:
918
        size = sum(sizes)
919
        hashmap = sum(hashmaps, [])
920
        d = {
921
            'block_size': request.backend.block_size,
922
            'block_hash': request.backend.hash_algorithm,
923
            'bytes': size,
924
            'hashes': hashmap}
925
        if request.serialization == 'xml':
926
            d['object'] = v_object
927
            data = render_to_string('hashes.xml', d)
928
        elif request.serialization == 'json':
929
            data = json.dumps(d)
930

    
931
        response = HttpResponse(data, status=200)
932
        put_object_headers(
933
                response, meta, token=getattr(request, 'token', None))
934
        response['Content-Length'] = len(data)
935
        return response
936

    
937
    request.serialization = 'text'  # Unset.
938
    return object_data_response(request, sizes, hashmaps, meta)
939

    
940

    
941
@api_method('PUT', format_allowed=True)
942
def object_write(request, v_account, v_container, v_object):
943
    # Normal Response Codes: 201
944
    # Error Response Codes: internalServerError (500),
945
    #                       unprocessableEntity (422),
946
    #                       lengthRequired (411),
947
    #                       conflict (409),
948
    #                       itemNotFound (404),
949
    #                       forbidden (403),
950
    #                       badRequest (400)
951
    #                       requestentitytoolarge (413)
952

    
953
    # Evaluate conditions.
954
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
955
        try:
956
            meta = request.backend.get_object_meta(
957
                request.user_uniq, v_account,
958
                v_container, v_object, 'pithos')
959
        except NotAllowedError:
960
            raise Forbidden('Not allowed')
961
        except NameError:
962
            meta = {}
963
        validate_matching_preconditions(request, meta)
964

    
965
    copy_from = request.META.get('HTTP_X_COPY_FROM')
966
    move_from = request.META.get('HTTP_X_MOVE_FROM')
967
    if copy_from or move_from:
968
        delimiter = request.GET.get('delimiter')
969
        content_length = get_content_length(request)  # Required by the API.
970

    
971
        src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
972

    
973
        if not src_account:
974
            src_account = request.user_uniq
975
        else:
976
            if TRANSLATE_UUIDS:
977
                try:
978
                    src_account = retrieve_uuid(getattr(request, 'token', None),
979
                                                src_account)
980
                except ItemNotExists:
981
                    ItemNotFound('Invalid source account')
982

    
983
        if move_from:
984
            try:
985
                src_container, src_name = split_container_object_string(
986
                    move_from)
987
            except ValueError:
988
                raise BadRequest('Invalid X-Move-From header')
989
            version_id = copy_or_move_object(
990
                request, src_account, src_container, src_name,
991
                v_account, v_container, v_object, move=True, delimiter=delimiter)
992
        else:
993
            try:
994
                src_container, src_name = split_container_object_string(
995
                    copy_from)
996
            except ValueError:
997
                raise BadRequest('Invalid X-Copy-From header')
998
            version_id = copy_or_move_object(
999
                request, src_account, src_container, src_name,
1000
                v_account, v_container, v_object, move=False, delimiter=delimiter)
1001
        response = HttpResponse(status=201)
1002
        response['X-Object-Version'] = version_id
1003
        return response
1004

    
1005
    content_type, meta, permissions, public = get_object_headers(request)
1006
    content_length = -1
1007
    if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
1008
        content_length = get_content_length(request)
1009
    # Should be BadRequest, but API says otherwise.
1010
    if content_type is None:
1011
        raise LengthRequired('Missing Content-Type header')
1012

    
1013
    if 'hashmap' in request.GET:
1014
        if request.serialization not in ('json', 'xml'):
1015
            raise BadRequest('Invalid hashmap format')
1016

    
1017
        data = ''
1018
        for block in socket_read_iterator(request, content_length,
1019
                                          request.backend.block_size):
1020
            data = '%s%s' % (data, block)
1021

    
1022
        if request.serialization == 'json':
1023
            d = json.loads(data)
1024
            if not hasattr(d, '__getitem__'):
1025
                raise BadRequest('Invalid data formating')
1026
            try:
1027
                hashmap = d['hashes']
1028
                size = int(d['bytes'])
1029
            except:
1030
                raise BadRequest('Invalid data formatting')
1031
        elif request.serialization == 'xml':
1032
            try:
1033
                xml = minidom.parseString(data)
1034
                obj = xml.getElementsByTagName('object')[0]
1035
                size = int(obj.attributes['bytes'].value)
1036

    
1037
                hashes = xml.getElementsByTagName('hash')
1038
                hashmap = []
1039
                for hash in hashes:
1040
                    hashmap.append(hash.firstChild.data)
1041
            except:
1042
                raise BadRequest('Invalid data formatting')
1043

    
1044
        checksum = ''  # Do not set to None (will copy previous value).
1045
    else:
1046
        md5 = hashlib.md5()
1047
        size = 0
1048
        hashmap = []
1049
        for data in socket_read_iterator(request, content_length,
1050
                                         request.backend.block_size):
1051
            # TODO: Raise 408 (Request Timeout) if this takes too long.
1052
            # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
1053
            size += len(data)
1054
            hashmap.append(request.backend.put_block(data))
1055
            md5.update(data)
1056

    
1057
        checksum = md5.hexdigest().lower()
1058
        etag = request.META.get('HTTP_ETAG')
1059
        if etag and parse_etags(etag)[0].lower() != checksum:
1060
            raise UnprocessableEntity('Object ETag does not match')
1061

    
1062
    try:
1063
        version_id = request.backend.update_object_hashmap(request.user_uniq,
1064
                                                           v_account, v_container, v_object, size, content_type,
1065
                                                           hashmap, checksum, 'pithos', meta, True, permissions)
1066
    except NotAllowedError:
1067
        raise Forbidden('Not allowed')
1068
    except IndexError, e:
1069
        raise Conflict(simple_list_response(request, e.data))
1070
    except ItemNotExists:
1071
        raise ItemNotFound('Container does not exist')
1072
    except ValueError:
1073
        raise BadRequest('Invalid sharing header')
1074
    except QuotaError, e:
1075
        raise RequestEntityTooLarge('Quota error: %s' % e)
1076
    if not checksum and UPDATE_MD5:
1077
        # Update the MD5 after the hashmap, as there may be missing hashes.
1078
        checksum = hashmap_md5(request.backend, hashmap, size)
1079
        try:
1080
            request.backend.update_object_checksum(request.user_uniq,
1081
                                                   v_account, v_container, v_object, version_id, checksum)
1082
        except NotAllowedError:
1083
            raise Forbidden('Not allowed')
1084
    if public is not None:
1085
        try:
1086
            request.backend.update_object_public(request.user_uniq, v_account,
1087
                                                 v_container, v_object, public)
1088
        except NotAllowedError:
1089
            raise Forbidden('Not allowed')
1090
        except ItemNotExists:
1091
            raise ItemNotFound('Object does not exist')
1092

    
1093
    response = HttpResponse(status=201)
1094
    if checksum:
1095
        response['ETag'] = checksum
1096
    response['X-Object-Version'] = version_id
1097
    return response
1098

    
1099

    
1100
@api_method('POST')
1101
def object_write_form(request, v_account, v_container, v_object):
1102
    # Normal Response Codes: 201
1103
    # Error Response Codes: internalServerError (500),
1104
    #                       itemNotFound (404),
1105
    #                       forbidden (403),
1106
    #                       badRequest (400)
1107
    #                       requestentitytoolarge (413)
1108

    
1109
    request.upload_handlers = [SaveToBackendHandler(request)]
1110
    if 'X-Object-Data' not in request.FILES:
1111
        raise BadRequest('Missing X-Object-Data field')
1112
    file = request.FILES['X-Object-Data']
1113

    
1114
    checksum = file.etag
1115
    try:
1116
        version_id = request.backend.update_object_hashmap(request.user_uniq,
1117
                                                           v_account, v_container, v_object, file.size, file.content_type,
1118
                                                           file.hashmap, checksum, 'pithos', {}, True)
1119
    except NotAllowedError:
1120
        raise Forbidden('Not allowed')
1121
    except ItemNotExists:
1122
        raise ItemNotFound('Container does not exist')
1123
    except QuotaError, e:
1124
        raise RequestEntityTooLarge('Quota error: %s' % e)
1125

    
1126
    response = HttpResponse(status=201)
1127
    response['ETag'] = checksum
1128
    response['X-Object-Version'] = version_id
1129
    response.content = checksum
1130
    return response
1131

    
1132

    
1133
@api_method('COPY', format_allowed=True)
1134
def object_copy(request, v_account, v_container, v_object):
1135
    # Normal Response Codes: 201
1136
    # Error Response Codes: internalServerError (500),
1137
    #                       itemNotFound (404),
1138
    #                       forbidden (403),
1139
    #                       badRequest (400)
1140
    #                       requestentitytoolarge (413)
1141

    
1142
    dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
1143
    if not dest_account:
1144
        dest_account = request.user_uniq
1145
    dest_path = request.META.get('HTTP_DESTINATION')
1146
    if not dest_path:
1147
        raise BadRequest('Missing Destination header')
1148
    try:
1149
        dest_container, dest_name = split_container_object_string(dest_path)
1150
    except ValueError:
1151
        raise BadRequest('Invalid Destination header')
1152

    
1153
    # Evaluate conditions.
1154
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
1155
        src_version = request.META.get('HTTP_X_SOURCE_VERSION')
1156
        try:
1157
            meta = request.backend.get_object_meta(
1158
                request.user_uniq, v_account,
1159
                v_container, v_object, 'pithos', src_version)
1160
        except NotAllowedError:
1161
            raise Forbidden('Not allowed')
1162
        except (ItemNotExists, VersionNotExists):
1163
            raise ItemNotFound('Container or object does not exist')
1164
        validate_matching_preconditions(request, meta)
1165

    
1166
    delimiter = request.GET.get('delimiter')
1167

    
1168
    version_id = copy_or_move_object(request, v_account, v_container, v_object,
1169
                                     dest_account, dest_container, dest_name, move=False, delimiter=delimiter)
1170
    response = HttpResponse(status=201)
1171
    response['X-Object-Version'] = version_id
1172
    return response
1173

    
1174

    
1175
@api_method('MOVE', format_allowed=True)
1176
def object_move(request, v_account, v_container, v_object):
1177
    # Normal Response Codes: 201
1178
    # Error Response Codes: internalServerError (500),
1179
    #                       itemNotFound (404),
1180
    #                       forbidden (403),
1181
    #                       badRequest (400)
1182
    #                       requestentitytoolarge (413)
1183

    
1184
    dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
1185
    if not dest_account:
1186
        dest_account = request.user_uniq
1187
    dest_path = request.META.get('HTTP_DESTINATION')
1188
    if not dest_path:
1189
        raise BadRequest('Missing Destination header')
1190
    try:
1191
        dest_container, dest_name = split_container_object_string(dest_path)
1192
    except ValueError:
1193
        raise BadRequest('Invalid Destination header')
1194

    
1195
    # Evaluate conditions.
1196
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
1197
        try:
1198
            meta = request.backend.get_object_meta(
1199
                request.user_uniq, v_account,
1200
                v_container, v_object, 'pithos')
1201
        except NotAllowedError:
1202
            raise Forbidden('Not allowed')
1203
        except ItemNotExists:
1204
            raise ItemNotFound('Container or object does not exist')
1205
        validate_matching_preconditions(request, meta)
1206

    
1207
    delimiter = request.GET.get('delimiter')
1208

    
1209
    version_id = copy_or_move_object(request, v_account, v_container, v_object,
1210
                                     dest_account, dest_container, dest_name, move=True, delimiter=delimiter)
1211
    response = HttpResponse(status=201)
1212
    response['X-Object-Version'] = version_id
1213
    return response
1214

    
1215

    
1216
@api_method('POST', format_allowed=True)
1217
def object_update(request, v_account, v_container, v_object):
1218
    # Normal Response Codes: 202, 204
1219
    # Error Response Codes: internalServerError (500),
1220
    #                       conflict (409),
1221
    #                       itemNotFound (404),
1222
    #                       forbidden (403),
1223
    #                       badRequest (400)
1224

    
1225
    content_type, meta, permissions, public = get_object_headers(request)
1226

    
1227
    try:
1228
        prev_meta = request.backend.get_object_meta(
1229
            request.user_uniq, v_account,
1230
            v_container, v_object, 'pithos')
1231
    except NotAllowedError:
1232
        raise Forbidden('Not allowed')
1233
    except ItemNotExists:
1234
        raise ItemNotFound('Object does not exist')
1235

    
1236
    # Evaluate conditions.
1237
    if request.META.get('HTTP_IF_MATCH') or request.META.get('HTTP_IF_NONE_MATCH'):
1238
        validate_matching_preconditions(request, prev_meta)
1239

    
1240
    replace = True
1241
    if 'update' in request.GET:
1242
        replace = False
1243

    
1244
    # A Content-Type or X-Source-Object header indicates data updates.
1245
    src_object = request.META.get('HTTP_X_SOURCE_OBJECT')
1246
    if (not content_type or content_type != 'application/octet-stream') and not src_object:
1247
        response = HttpResponse(status=202)
1248

    
1249
        # Do permissions first, as it may fail easier.
1250
        if permissions is not None:
1251
            try:
1252
                request.backend.update_object_permissions(request.user_uniq,
1253
                                                          v_account, v_container, v_object, permissions)
1254
            except NotAllowedError:
1255
                raise Forbidden('Not allowed')
1256
            except ItemNotExists:
1257
                raise ItemNotFound('Object does not exist')
1258
            except ValueError:
1259
                raise BadRequest('Invalid sharing header')
1260
        if public is not None:
1261
            try:
1262
                request.backend.update_object_public(
1263
                    request.user_uniq, v_account,
1264
                    v_container, v_object, public)
1265
            except NotAllowedError:
1266
                raise Forbidden('Not allowed')
1267
            except ItemNotExists:
1268
                raise ItemNotFound('Object does not exist')
1269
        if meta or replace:
1270
            try:
1271
                version_id = request.backend.update_object_meta(
1272
                    request.user_uniq,
1273
                    v_account, v_container, v_object, 'pithos', meta, replace)
1274
            except NotAllowedError:
1275
                raise Forbidden('Not allowed')
1276
            except ItemNotExists:
1277
                raise ItemNotFound('Object does not exist')
1278
            response['X-Object-Version'] = version_id
1279

    
1280
        return response
1281

    
1282
    # Single range update. Range must be in Content-Range.
1283
    # Based on: http://code.google.com/p/gears/wiki/ContentRangePostProposal
1284
    # (with the addition that '*' is allowed for the range - will append).
1285
    content_range = request.META.get('HTTP_CONTENT_RANGE')
1286
    if not content_range:
1287
        raise BadRequest('Missing Content-Range header')
1288
    ranges = get_content_range(request)
1289
    if not ranges:
1290
        raise RangeNotSatisfiable('Invalid Content-Range header')
1291

    
1292
    try:
1293
        size, hashmap = request.backend.get_object_hashmap(request.user_uniq,
1294
                                                           v_account, v_container, v_object)
1295
    except NotAllowedError:
1296
        raise Forbidden('Not allowed')
1297
    except ItemNotExists:
1298
        raise ItemNotFound('Object does not exist')
1299

    
1300
    offset, length, total = ranges
1301
    if offset is None:
1302
        offset = size
1303
    elif offset > size:
1304
        raise RangeNotSatisfiable('Supplied offset is beyond object limits')
1305
    if src_object:
1306
        src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
1307
        if not src_account:
1308
            src_account = request.user_uniq
1309
        src_container, src_name = split_container_object_string(src_object)
1310
        src_version = request.META.get('HTTP_X_SOURCE_VERSION')
1311
        try:
1312
            src_size, src_hashmap = request.backend.get_object_hashmap(
1313
                request.user_uniq,
1314
                src_account, src_container, src_name, src_version)
1315
        except NotAllowedError:
1316
            raise Forbidden('Not allowed')
1317
        except ItemNotExists:
1318
            raise ItemNotFound('Source object does not exist')
1319

    
1320
        if length is None:
1321
            length = src_size
1322
        elif length > src_size:
1323
            raise BadRequest('Object length is smaller than range length')
1324
    else:
1325
        # Require either a Content-Length, or 'chunked' Transfer-Encoding.
1326
        content_length = -1
1327
        if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
1328
            content_length = get_content_length(request)
1329

    
1330
        if length is None:
1331
            length = content_length
1332
        else:
1333
            if content_length == -1:
1334
                # TODO: Get up to length bytes in chunks.
1335
                length = content_length
1336
            elif length != content_length:
1337
                raise BadRequest('Content length does not match range length')
1338
    if total is not None and (total != size or offset >= size or (length > 0 and offset + length >= size)):
1339
        raise RangeNotSatisfiable(
1340
            'Supplied range will change provided object limits')
1341

    
1342
    dest_bytes = request.META.get('HTTP_X_OBJECT_BYTES')
1343
    if dest_bytes is not None:
1344
        dest_bytes = get_int_parameter(dest_bytes)
1345
        if dest_bytes is None:
1346
            raise BadRequest('Invalid X-Object-Bytes header')
1347

    
1348
    if src_object:
1349
        if offset % request.backend.block_size == 0:
1350
            # Update the hashes only.
1351
            sbi = 0
1352
            while length > 0:
1353
                bi = int(offset / request.backend.block_size)
1354
                bl = min(length, request.backend.block_size)
1355
                if bi < len(hashmap):
1356
                    if bl == request.backend.block_size:
1357
                        hashmap[bi] = src_hashmap[sbi]
1358
                    else:
1359
                        data = request.backend.get_block(src_hashmap[sbi])
1360
                        hashmap[bi] = request.backend.update_block(hashmap[bi],
1361
                                                                   data[:bl], 0)
1362
                else:
1363
                    hashmap.append(src_hashmap[sbi])
1364
                offset += bl
1365
                length -= bl
1366
                sbi += 1
1367
        else:
1368
            data = ''
1369
            sbi = 0
1370
            while length > 0:
1371
                data += request.backend.get_block(src_hashmap[sbi])
1372
                if length < request.backend.block_size:
1373
                    data = data[:length]
1374
                bytes = put_object_block(request, hashmap, data, offset)
1375
                offset += bytes
1376
                data = data[bytes:]
1377
                length -= bytes
1378
                sbi += 1
1379
    else:
1380
        data = ''
1381
        for d in socket_read_iterator(request, length,
1382
                                      request.backend.block_size):
1383
            # TODO: Raise 408 (Request Timeout) if this takes too long.
1384
            # TODO: Raise 499 (Client Disconnect) if a length is defined and we stop before getting this much data.
1385
            data += d
1386
            bytes = put_object_block(request, hashmap, data, offset)
1387
            offset += bytes
1388
            data = data[bytes:]
1389
        if len(data) > 0:
1390
            put_object_block(request, hashmap, data, offset)
1391

    
1392
    if offset > size:
1393
        size = offset
1394
    if dest_bytes is not None and dest_bytes < size:
1395
        size = dest_bytes
1396
        hashmap = hashmap[:(int((size - 1) / request.backend.block_size) + 1)]
1397
    checksum = hashmap_md5(
1398
        request.backend, hashmap, size) if UPDATE_MD5 else ''
1399
    try:
1400
        version_id = request.backend.update_object_hashmap(request.user_uniq,
1401
                                                           v_account, v_container, v_object, size, prev_meta[
1402
                                                           'type'],
1403
                                                           hashmap, checksum, 'pithos', meta, replace, permissions)
1404
    except NotAllowedError:
1405
        raise Forbidden('Not allowed')
1406
    except ItemNotExists:
1407
        raise ItemNotFound('Container does not exist')
1408
    except ValueError:
1409
        raise BadRequest('Invalid sharing header')
1410
    except QuotaError, e:
1411
        raise RequestEntityTooLarge('Quota error: %s' % e)
1412
    if public is not None:
1413
        try:
1414
            request.backend.update_object_public(request.user_uniq, v_account,
1415
                                                 v_container, v_object, public)
1416
        except NotAllowedError:
1417
            raise Forbidden('Not allowed')
1418
        except ItemNotExists:
1419
            raise ItemNotFound('Object does not exist')
1420

    
1421
    response = HttpResponse(status=204)
1422
    response['ETag'] = checksum
1423
    response['X-Object-Version'] = version_id
1424
    return response
1425

    
1426

    
1427
@api_method('DELETE')
1428
def object_delete(request, v_account, v_container, v_object):
1429
    # Normal Response Codes: 204
1430
    # Error Response Codes: internalServerError (500),
1431
    #                       itemNotFound (404),
1432
    #                       forbidden (403),
1433
    #                       badRequest (400)
1434
    #                       requestentitytoolarge (413)
1435

    
1436
    until = get_int_parameter(request.GET.get('until'))
1437
    delimiter = request.GET.get('delimiter')
1438

    
1439
    try:
1440
        request.backend.delete_object(
1441
            request.user_uniq, v_account, v_container,
1442
            v_object, until, delimiter=delimiter)
1443
    except NotAllowedError:
1444
        raise Forbidden('Not allowed')
1445
    except ItemNotExists:
1446
        raise ItemNotFound('Object does not exist')
1447
    except QuotaError, e:
1448
        raise RequestEntityTooLarge('Quota error: %s' % e)
1449
    return HttpResponse(status=204)
1450

    
1451

    
1452
@api_method()
1453
def method_not_allowed(request):
1454
    raise BadRequest('Method not allowed')