Statistics
| Branch: | Tag: | Revision:

root / snf-pithos-app / pithos / api / functions.py @ e3ff6830

History | View | Annotate | Download (57.9 kB)

1
# Copyright 2011-2012 GRNET S.A. All rights reserved.
2
#
3
# Redistribution and use in source and binary forms, with or
4
# without modification, are permitted provided that the following
5
# conditions are met:
6
#
7
#   1. Redistributions of source code must retain the above
8
#      copyright notice, this list of conditions and the following
9
#      disclaimer.
10
#
11
#   2. Redistributions in binary form must reproduce the above
12
#      copyright notice, this list of conditions and the following
13
#      disclaimer in the documentation and/or other materials
14
#      provided with the distribution.
15
#
16
# THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
17
# OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
20
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24
# AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
26
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27
# POSSIBILITY OF SUCH DAMAGE.
28
#
29
# The views and conclusions contained in the software and
30
# documentation are those of the authors and should not be
31
# interpreted as representing official policies, either expressed
32
# or implied, of GRNET S.A.
33

    
34
from xml.dom import minidom
35

    
36
from django.http import HttpResponse
37
from django.template.loader import render_to_string
38
from django.utils import simplejson as json
39
from django.utils.http import parse_etags
40
from django.utils.encoding import smart_str
41
from django.views.decorators.csrf import csrf_exempt
42

    
43
from astakosclient import AstakosClient
44

    
45
from snf_django.lib import api
46
from snf_django.lib.api import faults
47

    
48
from pithos.api.util import (
49
    json_encode_decimal, rename_meta_key, format_header_key,
50
    printable_header_dict, get_account_headers, put_account_headers,
51
    get_container_headers, put_container_headers, get_object_headers,
52
    put_object_headers, update_manifest_meta, update_sharing_meta,
53
    update_public_meta, validate_modification_preconditions,
54
    validate_matching_preconditions, split_container_object_string,
55
    copy_or_move_object, get_int_parameter, get_content_length,
56
    get_content_range, socket_read_iterator, SaveToBackendHandler,
57
    object_data_response, put_object_block, hashmap_md5, simple_list_response,
58
    api_method, is_uuid,
59
    retrieve_uuid, retrieve_uuids, retrieve_displaynames,
60
    get_pithos_usage
61
)
62

    
63
from pithos.api.settings import (UPDATE_MD5, TRANSLATE_UUIDS,
64
                                 SERVICE_TOKEN, ASTAKOS_BASE_URL)
65

    
66
from pithos.backends.base import (
67
    NotAllowedError, QuotaError, ContainerNotEmpty, ItemNotExists,
68
    VersionNotExists, ContainerExists)
69

    
70
from pithos.backends.filter import parse_filters
71

    
72
import hashlib
73

    
74
import logging
75
logger = logging.getLogger(__name__)
76

    
77

    
78
def get_uuids(names):
79
    try:
80
        astakos = AstakosClient(ASTAKOS_BASE_URL, retry=2,
81
                                use_pool=True, logger=logger)
82
        uuids = astakos.service_get_uuids(SERVICE_TOKEN, names)
83
    except Exception, e:
84
        logger.exception(e)
85
        return {}
86

    
87
    return uuids
88

    
89

    
90
@csrf_exempt
91
def top_demux(request):
92
    if request.method == 'GET':
93
        try:
94
            request.GET['X-Auth-Token']
95
        except KeyError:
96
            try:
97
                request.META['HTTP_X_AUTH_TOKEN']
98
            except KeyError:
99
                return authenticate(request)
100
        return account_list(request)
101
    else:
102
        return api.method_not_allowed(request)
103

    
104

    
105
@csrf_exempt
106
def account_demux(request, v_account):
107
    if TRANSLATE_UUIDS:
108
        if not is_uuid(v_account):
109
            uuids = get_uuids([v_account])
110
            if not uuids or not v_account in uuids:
111
                return HttpResponse(status=404)
112
            v_account = uuids[v_account]
113

    
114
    if request.method == 'HEAD':
115
        return account_meta(request, v_account)
116
    elif request.method == 'POST':
117
        return account_update(request, v_account)
118
    elif request.method == 'GET':
119
        return container_list(request, v_account)
120
    else:
121
        return api.method_not_allowed(request)
122

    
123

    
124
@csrf_exempt
125
def container_demux(request, v_account, v_container):
126
    if TRANSLATE_UUIDS:
127
        if not is_uuid(v_account):
128
            uuids = get_uuids([v_account])
129
            if not uuids or not v_account in uuids:
130
                return HttpResponse(status=404)
131
            v_account = uuids[v_account]
132

    
133
    if request.method == 'HEAD':
134
        return container_meta(request, v_account, v_container)
135
    elif request.method == 'PUT':
136
        return container_create(request, v_account, v_container)
137
    elif request.method == 'POST':
138
        return container_update(request, v_account, v_container)
139
    elif request.method == 'DELETE':
140
        return container_delete(request, v_account, v_container)
141
    elif request.method == 'GET':
142
        return object_list(request, v_account, v_container)
143
    else:
144
        return api.method_not_allowed(request)
145

    
146

    
147
@csrf_exempt
148
def object_demux(request, v_account, v_container, v_object):
149
    # Helper to avoid placing the token in the URL
150
    # when loading objects from a browser.
151
    if TRANSLATE_UUIDS:
152
        if not is_uuid(v_account):
153
            uuids = get_uuids([v_account])
154
            if not uuids or not v_account in uuids:
155
                return HttpResponse(status=404)
156
            v_account = uuids[v_account]
157

    
158
    if request.method == 'HEAD':
159
        return object_meta(request, v_account, v_container, v_object)
160
    elif request.method == 'GET':
161
        return object_read(request, v_account, v_container, v_object)
162
    elif request.method == 'PUT':
163
        return object_write(request, v_account, v_container, v_object)
164
    elif request.method == 'COPY':
165
        return object_copy(request, v_account, v_container, v_object)
166
    elif request.method == 'MOVE':
167
        return object_move(request, v_account, v_container, v_object)
168
    elif request.method == 'POST':
169
        if request.META.get(
170
                'CONTENT_TYPE', '').startswith('multipart/form-data'):
171
            return object_write_form(request, v_account, v_container, v_object)
172
        return object_update(request, v_account, v_container, v_object)
173
    elif request.method == 'DELETE':
174
        return object_delete(request, v_account, v_container, v_object)
175
    else:
176
        return api.method_not_allowed(request)
177

    
178

    
179
@api_method('GET', user_required=False, logger=logger)
180
def authenticate(request):
181
    # Normal Response Codes: 204
182
    # Error Response Codes: internalServerError (500),
183
    #                       forbidden (403),
184
    #                       badRequest (400)
185

    
186
    x_auth_user = request.META.get('HTTP_X_AUTH_USER')
187
    x_auth_key = request.META.get('HTTP_X_AUTH_KEY')
188
    if not x_auth_user or not x_auth_key:
189
        raise faults.BadRequest('Missing X-Auth-User or X-Auth-Key header')
190
    response = HttpResponse(status=204)
191

    
192
    uri = request.build_absolute_uri()
193
    if '?' in uri:
194
        uri = uri[:uri.find('?')]
195

    
196
    response['X-Auth-Token'] = x_auth_key
197
    response['X-Storage-Url'] = uri + ('' if uri.endswith('/')
198
                                       else '/') + x_auth_user
199
    return response
200

    
201

    
202
@api_method('GET', format_allowed=True, user_required=True, logger=logger)
203
def account_list(request):
204
    # Normal Response Codes: 200, 204
205
    # Error Response Codes: internalServerError (500),
206
    #                       badRequest (400)
207
    response = HttpResponse()
208

    
209
    marker = request.GET.get('marker')
210
    limit = get_int_parameter(request.GET.get('limit'))
211
    if not limit:
212
        limit = 10000
213

    
214
    accounts = request.backend.list_accounts(request.user_uniq, marker, limit)
215

    
216
    if request.serialization == 'text':
217
        if TRANSLATE_UUIDS:
218
            accounts = retrieve_displaynames(
219
                getattr(request, 'token', None), accounts)
220
        if len(accounts) == 0:
221
            # The cloudfiles python bindings expect 200 if json/xml.
222
            response.status_code = 204
223
            return response
224
        response.status_code = 200
225
        response.content = '\n'.join(accounts) + '\n'
226
        return response
227

    
228
    account_meta = []
229
    for x in accounts:
230
        if x == request.user_uniq:
231
            continue
232
        usage = get_pithos_usage(request.x_auth_token)
233
        try:
234
            meta = request.backend.get_account_meta(
235
                request.user_uniq, x, 'pithos', include_user_defined=False,
236
                external_quota=usage)
237
            groups = request.backend.get_account_groups(request.user_uniq, x)
238
        except NotAllowedError:
239
            raise faults.Forbidden('Not allowed')
240
        else:
241
            rename_meta_key(meta, 'modified', 'last_modified')
242
            rename_meta_key(
243
                meta, 'until_timestamp', 'x_account_until_timestamp')
244
            if groups:
245
                meta['X-Account-Group'] = printable_header_dict(
246
                    dict([(k, ','.join(v)) for k, v in groups.iteritems()]))
247
            account_meta.append(printable_header_dict(meta))
248

    
249
    if TRANSLATE_UUIDS:
250
        uuids = list(d['name'] for d in account_meta)
251
        catalog = retrieve_displaynames(
252
            getattr(request, 'token', None), uuids, return_dict=True)
253
        for meta in account_meta:
254
            meta['name'] = catalog.get(meta.get('name'))
255

    
256
    if request.serialization == 'xml':
257
        data = render_to_string('accounts.xml', {'accounts': account_meta})
258
    elif request.serialization == 'json':
259
        data = json.dumps(account_meta)
260
    response.status_code = 200
261
    response.content = data
262
    return response
263

    
264

    
265
@api_method('HEAD', user_required=True, logger=logger)
266
def account_meta(request, v_account):
267
    # Normal Response Codes: 204
268
    # Error Response Codes: internalServerError (500),
269
    #                       forbidden (403),
270
    #                       badRequest (400)
271

    
272
    until = get_int_parameter(request.GET.get('until'))
273
    usage = get_pithos_usage(request.x_auth_token)
274
    try:
275
        meta = request.backend.get_account_meta(
276
            request.user_uniq, v_account, 'pithos', until,
277
            external_quota=usage)
278
        groups = request.backend.get_account_groups(
279
            request.user_uniq, v_account)
280

    
281
        if TRANSLATE_UUIDS:
282
            for k in groups:
283
                groups[k] = retrieve_displaynames(
284
                    getattr(request, 'token', None), groups[k])
285
        policy = request.backend.get_account_policy(
286
            request.user_uniq, v_account, external_quota=usage)
287
    except NotAllowedError:
288
        raise faults.Forbidden('Not allowed')
289

    
290
    validate_modification_preconditions(request, meta)
291

    
292
    response = HttpResponse(status=204)
293
    put_account_headers(response, meta, groups, policy)
294
    return response
295

    
296

    
297
@api_method('POST', user_required=True, logger=logger)
298
def account_update(request, v_account):
299
    # Normal Response Codes: 202
300
    # Error Response Codes: internalServerError (500),
301
    #                       forbidden (403),
302
    #                       badRequest (400)
303

    
304
    meta, groups = get_account_headers(request)
305
    for k in groups:
306
        if TRANSLATE_UUIDS:
307
            try:
308
                groups[k] = retrieve_uuids(
309
                    getattr(request, 'token', None),
310
                    groups[k],
311
                    fail_silently=False)
312
            except ItemNotExists, e:
313
                raise faults.BadRequest(
314
                    'Bad X-Account-Group header value: %s' % e)
315
        else:
316
            try:
317
                retrieve_displaynames(
318
                    getattr(request, 'token', None),
319
                    groups[k],
320
                    fail_silently=False)
321
            except ItemNotExists, e:
322
                raise faults.BadRequest(
323
                    'Bad X-Account-Group header value: %s' % e)
324
    replace = True
325
    if 'update' in request.GET:
326
        replace = False
327
    if groups:
328
        try:
329
            request.backend.update_account_groups(request.user_uniq, v_account,
330
                                                  groups, replace)
331
        except NotAllowedError:
332
            raise faults.Forbidden('Not allowed')
333
        except ValueError:
334
            raise faults.BadRequest('Invalid groups header')
335
    if meta or replace:
336
        try:
337
            request.backend.update_account_meta(request.user_uniq, v_account,
338
                                                'pithos', meta, replace)
339
        except NotAllowedError:
340
            raise faults.Forbidden('Not allowed')
341
    return HttpResponse(status=202)
342

    
343

    
344
@api_method('GET', format_allowed=True, user_required=True, logger=logger)
345
def container_list(request, v_account):
346
    # Normal Response Codes: 200, 204
347
    # Error Response Codes: internalServerError (500),
348
    #                       itemNotFound (404),
349
    #                       forbidden (403),
350
    #                       badRequest (400)
351

    
352
    until = get_int_parameter(request.GET.get('until'))
353
    usage = get_pithos_usage(request.x_auth_token)
354
    try:
355
        meta = request.backend.get_account_meta(
356
            request.user_uniq, v_account, 'pithos', until,
357
            external_quota=usage)
358
        groups = request.backend.get_account_groups(
359
            request.user_uniq, v_account)
360
        policy = request.backend.get_account_policy(
361
            request.user_uniq, v_account, external_quota=usage)
362
    except NotAllowedError:
363
        raise faults.Forbidden('Not allowed')
364

    
365
    validate_modification_preconditions(request, meta)
366

    
367
    response = HttpResponse()
368
    put_account_headers(response, meta, groups, policy)
369

    
370
    marker = request.GET.get('marker')
371
    limit = get_int_parameter(request.GET.get('limit'))
372
    if not limit:
373
        limit = 10000
374

    
375
    shared = False
376
    if 'shared' in request.GET:
377
        shared = True
378
    public = False
379
    if request.user_uniq == v_account and 'public' in request.GET:
380
        public = True
381

    
382
    try:
383
        containers = request.backend.list_containers(
384
            request.user_uniq, v_account,
385
            marker, limit, shared, until, public)
386
    except NotAllowedError:
387
        raise faults.Forbidden('Not allowed')
388
    except NameError:
389
        containers = []
390

    
391
    if request.serialization == 'text':
392
        if len(containers) == 0:
393
            # The cloudfiles python bindings expect 200 if json/xml.
394
            response.status_code = 204
395
            return response
396
        response.status_code = 200
397
        response.content = '\n'.join(containers) + '\n'
398
        return response
399

    
400
    container_meta = []
401
    for x in containers:
402
        try:
403
            meta = request.backend.get_container_meta(
404
                request.user_uniq, v_account,
405
                x, 'pithos', until, include_user_defined=False)
406
            policy = request.backend.get_container_policy(request.user_uniq,
407
                                                          v_account, x)
408
        except NotAllowedError:
409
            raise faults.Forbidden('Not allowed')
410
        except NameError:
411
            pass
412
        else:
413
            rename_meta_key(meta, 'modified', 'last_modified')
414
            rename_meta_key(
415
                meta, 'until_timestamp', 'x_container_until_timestamp')
416
            if policy:
417
                meta['X-Container-Policy'] = printable_header_dict(
418
                    dict([(k, v) for k, v in policy.iteritems()]))
419
            container_meta.append(printable_header_dict(meta))
420
    if request.serialization == 'xml':
421
        data = render_to_string('containers.xml', {'account':
422
                                v_account, 'containers': container_meta})
423
    elif request.serialization == 'json':
424
        data = json.dumps(container_meta)
425
    response.status_code = 200
426
    response.content = data
427
    return response
428

    
429

    
430
@api_method('HEAD', user_required=True, logger=logger)
431
def container_meta(request, v_account, v_container):
432
    # Normal Response Codes: 204
433
    # Error Response Codes: internalServerError (500),
434
    #                       itemNotFound (404),
435
    #                       forbidden (403),
436
    #                       badRequest (400)
437

    
438
    until = get_int_parameter(request.GET.get('until'))
439
    try:
440
        meta = request.backend.get_container_meta(request.user_uniq, v_account,
441
                                                  v_container, 'pithos', until)
442
        meta['object_meta'] = \
443
            request.backend.list_container_meta(request.user_uniq,
444
                                                v_account, v_container,
445
                                                'pithos', until)
446
        policy = request.backend.get_container_policy(
447
            request.user_uniq, v_account,
448
            v_container)
449
    except NotAllowedError:
450
        raise faults.Forbidden('Not allowed')
451
    except ItemNotExists:
452
        raise faults.ItemNotFound('Container does not exist')
453

    
454
    validate_modification_preconditions(request, meta)
455

    
456
    response = HttpResponse(status=204)
457
    put_container_headers(request, response, meta, policy)
458
    return response
459

    
460

    
461
@api_method('PUT', user_required=True, logger=logger)
462
def container_create(request, v_account, v_container):
463
    # Normal Response Codes: 201, 202
464
    # Error Response Codes: internalServerError (500),
465
    #                       itemNotFound (404),
466
    #                       forbidden (403),
467
    #                       badRequest (400)
468

    
469
    meta, policy = get_container_headers(request)
470

    
471
    try:
472
        request.backend.put_container(
473
            request.user_uniq, v_account, v_container, policy)
474
        ret = 201
475
    except NotAllowedError:
476
        raise faults.Forbidden('Not allowed')
477
    except ValueError:
478
        raise faults.BadRequest('Invalid policy header')
479
    except ContainerExists:
480
        ret = 202
481

    
482
    if ret == 202 and policy:
483
        try:
484
            request.backend.update_container_policy(
485
                request.user_uniq, v_account,
486
                v_container, policy, replace=False)
487
        except NotAllowedError:
488
            raise faults.Forbidden('Not allowed')
489
        except ItemNotExists:
490
            raise faults.ItemNotFound('Container does not exist')
491
        except ValueError:
492
            raise faults.BadRequest('Invalid policy header')
493
    if meta:
494
        try:
495
            request.backend.update_container_meta(request.user_uniq, v_account,
496
                                                  v_container, 'pithos',
497
                                                  meta, replace=False)
498
        except NotAllowedError:
499
            raise faults.Forbidden('Not allowed')
500
        except ItemNotExists:
501
            raise faults.ItemNotFound('Container does not exist')
502

    
503
    return HttpResponse(status=ret)
504

    
505

    
506
@api_method('POST', format_allowed=True, user_required=True, logger=logger)
507
def container_update(request, v_account, v_container):
508
    # Normal Response Codes: 202
509
    # Error Response Codes: internalServerError (500),
510
    #                       itemNotFound (404),
511
    #                       forbidden (403),
512
    #                       badRequest (400)
513

    
514
    meta, policy = get_container_headers(request)
515
    replace = True
516
    if 'update' in request.GET:
517
        replace = False
518
    if policy:
519
        try:
520
            request.backend.update_container_policy(
521
                request.user_uniq, v_account,
522
                v_container, policy, replace)
523
        except NotAllowedError:
524
            raise faults.Forbidden('Not allowed')
525
        except ItemNotExists:
526
            raise faults.ItemNotFound('Container does not exist')
527
        except ValueError:
528
            raise faults.BadRequest('Invalid policy header')
529
    if meta or replace:
530
        try:
531
            request.backend.update_container_meta(request.user_uniq, v_account,
532
                                                  v_container, 'pithos',
533
                                                  meta, replace)
534
        except NotAllowedError:
535
            raise faults.Forbidden('Not allowed')
536
        except ItemNotExists:
537
            raise faults.ItemNotFound('Container does not exist')
538

    
539
    content_length = -1
540
    if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
541
        content_length = get_int_parameter(
542
            request.META.get('CONTENT_LENGTH', 0))
543
    content_type = request.META.get('CONTENT_TYPE')
544
    hashmap = []
545
    if (content_type
546
            and content_type == 'application/octet-stream'
547
            and content_length != 0):
548
        for data in socket_read_iterator(request, content_length,
549
                                         request.backend.block_size):
550
            # TODO: Raise 408 (Request Timeout) if this takes too long.
551
            # TODO: Raise 499 (Client Disconnect) if a length is defined
552
            #       and we stop before getting this much data.
553
            hashmap.append(request.backend.put_block(data))
554

    
555
    response = HttpResponse(status=202)
556
    if hashmap:
557
        response.content = simple_list_response(request, hashmap)
558
    return response
559

    
560

    
561
@api_method('DELETE', user_required=True, logger=logger)
562
def container_delete(request, v_account, v_container):
563
    # Normal Response Codes: 204
564
    # Error Response Codes: internalServerError (500),
565
    #                       conflict (409),
566
    #                       itemNotFound (404),
567
    #                       forbidden (403),
568
    #                       badRequest (400)
569
    #                       requestentitytoolarge (413)
570

    
571
    until = get_int_parameter(request.GET.get('until'))
572

    
573
    delimiter = request.GET.get('delimiter')
574

    
575
    try:
576
        request.backend.delete_container(
577
            request.user_uniq, v_account, v_container,
578
            until, delimiter=delimiter)
579
    except NotAllowedError:
580
        raise faults.Forbidden('Not allowed')
581
    except ItemNotExists:
582
        raise faults.ItemNotFound('Container does not exist')
583
    except ContainerNotEmpty:
584
        raise faults.Conflict('Container is not empty')
585
    except QuotaError, e:
586
        raise faults.RequestEntityTooLarge('Quota error: %s' % e)
587
    return HttpResponse(status=204)
588

    
589

    
590
@api_method('GET', format_allowed=True, user_required=True, logger=logger)
591
def object_list(request, v_account, v_container):
592
    # Normal Response Codes: 200, 204
593
    # Error Response Codes: internalServerError (500),
594
    #                       itemNotFound (404),
595
    #                       forbidden (403),
596
    #                       badRequest (400)
597

    
598
    until = get_int_parameter(request.GET.get('until'))
599
    try:
600
        meta = request.backend.get_container_meta(request.user_uniq, v_account,
601
                                                  v_container, 'pithos', until)
602
        meta['object_meta'] = \
603
            request.backend.list_container_meta(request.user_uniq,
604
                                                v_account, v_container,
605
                                                'pithos', until)
606
        policy = request.backend.get_container_policy(
607
            request.user_uniq, v_account,
608
            v_container)
609
    except NotAllowedError:
610
        raise faults.Forbidden('Not allowed')
611
    except ItemNotExists:
612
        raise faults.ItemNotFound('Container does not exist')
613

    
614
    validate_modification_preconditions(request, meta)
615

    
616
    response = HttpResponse()
617
    put_container_headers(request, response, meta, policy)
618

    
619
    path = request.GET.get('path')
620
    prefix = request.GET.get('prefix')
621
    delimiter = request.GET.get('delimiter')
622

    
623
    # Path overrides prefix and delimiter.
624
    virtual = True
625
    if path:
626
        prefix = path
627
        delimiter = '/'
628
        virtual = False
629

    
630
    # Naming policy.
631
    if prefix and delimiter and not prefix.endswith(delimiter):
632
        prefix = prefix + delimiter
633
    if not prefix:
634
        prefix = ''
635
    prefix = prefix.lstrip('/')
636

    
637
    marker = request.GET.get('marker')
638
    limit = get_int_parameter(request.GET.get('limit'))
639
    if not limit:
640
        limit = 10000
641

    
642
    keys = request.GET.get('meta')
643
    if keys:
644
        keys = [smart_str(x.strip()) for x in keys.split(',')
645
                if x.strip() != '']
646
        included, excluded, opers = parse_filters(keys)
647
        keys = []
648
        keys += [format_header_key('X-Object-Meta-' + x) for x in included]
649
        keys += ['!' + format_header_key('X-Object-Meta-' + x)
650
                 for x in excluded]
651
        keys += ['%s%s%s' % (format_header_key(
652
            'X-Object-Meta-' + k), o, v) for k, o, v in opers]
653
    else:
654
        keys = []
655

    
656
    shared = False
657
    if 'shared' in request.GET:
658
        shared = True
659

    
660
    public_requested = 'public' in request.GET
661
    public_granted = public_requested and request.user_uniq == v_account
662

    
663
    if request.serialization == 'text':
664
        try:
665
            objects = request.backend.list_objects(
666
                request.user_uniq, v_account,
667
                v_container, prefix, delimiter, marker,
668
                limit, virtual, 'pithos', keys, shared,
669
                until, None, public_granted)
670
        except NotAllowedError:
671
            raise faults.Forbidden('Not allowed')
672
        except ItemNotExists:
673
            raise faults.ItemNotFound('Container does not exist')
674

    
675
        if len(objects) == 0:
676
            # The cloudfiles python bindings expect 200 if json/xml.
677
            response.status_code = 204
678
            return response
679
        response.status_code = 200
680
        response.content = '\n'.join([x[0] for x in objects]) + '\n'
681
        return response
682

    
683
    try:
684
        objects = request.backend.list_object_meta(
685
            request.user_uniq, v_account,
686
            v_container, prefix, delimiter, marker,
687
            limit, virtual, 'pithos', keys, shared, until, None, public_granted)
688
        object_permissions = {}
689
        object_public = {}
690
        if until is None:
691
            name = '/'.join((v_account, v_container, ''))
692
            name_idx = len(name)
693
            for x in request.backend.list_object_permissions(
694
                    request.user_uniq, v_account, v_container, prefix):
695

    
696
                # filter out objects which are not under the container
697
                if name != x[:name_idx]:
698
                    continue
699

    
700
                object = x[name_idx:]
701
                object_permissions[object] = \
702
                    request.backend.get_object_permissions(
703
                        request.user_uniq, v_account, v_container, object)
704

    
705
            if public_granted:
706
                for k, v in request.backend.list_object_public(
707
                        request.user_uniq, v_account,
708
                        v_container, prefix).iteritems():
709
                    object_public[k[name_idx:]] = v
710
    except NotAllowedError:
711
        raise faults.Forbidden('Not allowed')
712
    except ItemNotExists:
713
        raise faults.ItemNotFound('Container does not exist')
714

    
715
    object_meta = []
716
    for meta in objects:
717
        if TRANSLATE_UUIDS:
718
            modified_by = meta.get('modified_by')
719
            if modified_by:
720
                l = retrieve_displaynames(
721
                    getattr(request, 'token', None), [meta['modified_by']])
722
                if l is not None and len(l) == 1:
723
                    meta['modified_by'] = l[0]
724

    
725
        if len(meta) == 1:
726
            # Virtual objects/directories.
727
            object_meta.append(meta)
728
        else:
729
            rename_meta_key(
730
                meta, 'hash', 'x_object_hash')  # Will be replaced by checksum.
731
            rename_meta_key(meta, 'checksum', 'hash')
732
            rename_meta_key(meta, 'type', 'content_type')
733
            rename_meta_key(meta, 'uuid', 'x_object_uuid')
734
            if until is not None and 'modified' in meta:
735
                del(meta['modified'])
736
            else:
737
                rename_meta_key(meta, 'modified', 'last_modified')
738
            rename_meta_key(meta, 'modified_by', 'x_object_modified_by')
739
            rename_meta_key(meta, 'version', 'x_object_version')
740
            rename_meta_key(
741
                meta, 'version_timestamp', 'x_object_version_timestamp')
742
            permissions = object_permissions.get(meta['name'], None)
743
            if permissions:
744
                update_sharing_meta(request, permissions, v_account,
745
                                    v_container, meta['name'], meta)
746
            public_url = object_public.get(meta['name'], None)
747
            if public_granted:
748
                update_public_meta(public_url, meta)
749
            object_meta.append(printable_header_dict(meta))
750

    
751
    if request.serialization == 'xml':
752
        data = render_to_string(
753
            'objects.xml', {'container': v_container, 'objects': object_meta})
754
    elif request.serialization == 'json':
755
        data = json.dumps(object_meta, default=json_encode_decimal)
756
    response.status_code = 200
757
    response.content = data
758
    return response
759

    
760

    
761
@api_method('HEAD', user_required=True, logger=logger)
762
def object_meta(request, v_account, v_container, v_object):
763
    # Normal Response Codes: 204
764
    # Error Response Codes: internalServerError (500),
765
    #                       itemNotFound (404),
766
    #                       forbidden (403),
767
    #                       badRequest (400)
768

    
769
    version = request.GET.get('version')
770
    try:
771
        meta = request.backend.get_object_meta(request.user_uniq, v_account,
772
                                               v_container, v_object,
773
                                               'pithos', version)
774
        if version is None:
775
            permissions = request.backend.get_object_permissions(
776
                request.user_uniq,
777
                v_account, v_container, v_object)
778
            public = request.backend.get_object_public(
779
                request.user_uniq, v_account,
780
                v_container, v_object)
781
        else:
782
            permissions = None
783
            public = None
784
    except NotAllowedError:
785
        raise faults.Forbidden('Not allowed')
786
    except ItemNotExists:
787
        raise faults.ItemNotFound('Object does not exist')
788
    except VersionNotExists:
789
        raise faults.ItemNotFound('Version does not exist')
790

    
791
    update_manifest_meta(request, v_account, meta)
792
    update_sharing_meta(
793
        request, permissions, v_account, v_container, v_object, meta)
794
    if request.user_uniq == v_account:
795
        update_public_meta(public, meta)
796

    
797
    # Evaluate conditions.
798
    validate_modification_preconditions(request, meta)
799
    try:
800
        validate_matching_preconditions(request, meta)
801
    except faults.NotModified:
802
        response = HttpResponse(status=304)
803
        response['ETag'] = meta['checksum']
804
        return response
805

    
806
    response = HttpResponse(status=200)
807
    put_object_headers(response, meta, token=getattr(request, 'token', None))
808
    return response
809

    
810

    
811
@api_method('GET', format_allowed=True, user_required=True, logger=logger)
812
def object_read(request, v_account, v_container, v_object):
813
    # Normal Response Codes: 200, 206
814
    # Error Response Codes: internalServerError (500),
815
    #                       rangeNotSatisfiable (416),
816
    #                       preconditionFailed (412),
817
    #                       itemNotFound (404),
818
    #                       forbidden (403),
819
    #                       badRequest (400),
820
    #                       notModified (304)
821

    
822
    version = request.GET.get('version')
823

    
824
    # Reply with the version list. Do this first, as the object may be deleted.
825
    if version == 'list':
826
        if request.serialization == 'text':
827
            raise faults.BadRequest('No format specified for version list.')
828

    
829
        try:
830
            v = request.backend.list_versions(request.user_uniq, v_account,
831
                                              v_container, v_object)
832
        except NotAllowedError:
833
            raise faults.Forbidden('Not allowed')
834
        except ItemNotExists:
835
            raise faults.ItemNotFound('Object does not exist')
836
        d = {'versions': v}
837
        if request.serialization == 'xml':
838
            d['object'] = v_object
839
            data = render_to_string('versions.xml', d)
840
        elif request.serialization == 'json':
841
            data = json.dumps(d, default=json_encode_decimal)
842

    
843
        response = HttpResponse(data, status=200)
844
        response['Content-Length'] = len(data)
845
        return response
846

    
847
    try:
848
        meta = request.backend.get_object_meta(request.user_uniq, v_account,
849
                                               v_container, v_object,
850
                                               'pithos', version)
851
        if version is None:
852
            permissions = request.backend.get_object_permissions(
853
                request.user_uniq,
854
                v_account, v_container, v_object)
855
            public = request.backend.get_object_public(
856
                request.user_uniq, v_account,
857
                v_container, v_object)
858
        else:
859
            permissions = None
860
            public = None
861
    except NotAllowedError:
862
        raise faults.Forbidden('Not allowed')
863
    except ItemNotExists:
864
        raise faults.ItemNotFound('Object does not exist')
865
    except VersionNotExists:
866
        raise faults.ItemNotFound('Version does not exist')
867

    
868
    update_manifest_meta(request, v_account, meta)
869
    update_sharing_meta(
870
        request, permissions, v_account, v_container, v_object, meta)
871
    if request.user_uniq == v_account:
872
        update_public_meta(public, meta)
873

    
874
    # Evaluate conditions.
875
    validate_modification_preconditions(request, meta)
876
    try:
877
        validate_matching_preconditions(request, meta)
878
    except faults.NotModified:
879
        response = HttpResponse(status=304)
880
        response['ETag'] = meta['checksum']
881
        return response
882

    
883
    hashmap_reply = False
884
    if 'hashmap' in request.GET and request.serialization != 'text':
885
        hashmap_reply = True
886

    
887
    sizes = []
888
    hashmaps = []
889
    if 'X-Object-Manifest' in meta and not hashmap_reply:
890
        try:
891
            src_container, src_name = split_container_object_string(
892
                '/' + meta['X-Object-Manifest'])
893
            objects = request.backend.list_objects(
894
                request.user_uniq, v_account,
895
                src_container, prefix=src_name, virtual=False)
896
        except NotAllowedError:
897
            raise faults.Forbidden('Not allowed')
898
        except ValueError:
899
            raise faults.BadRequest('Invalid X-Object-Manifest header')
900
        except ItemNotExists:
901
            raise faults.ItemNotFound('Container does not exist')
902

    
903
        try:
904
            for x in objects:
905
                s, h = \
906
                    request.backend.get_object_hashmap(request.user_uniq,
907
                                                       v_account, src_container,
908
                                                       x[0], x[1])
909
                sizes.append(s)
910
                hashmaps.append(h)
911
        except NotAllowedError:
912
            raise faults.Forbidden('Not allowed')
913
        except ItemNotExists:
914
            raise faults.ItemNotFound('Object does not exist')
915
        except VersionNotExists:
916
            raise faults.ItemNotFound('Version does not exist')
917
    else:
918
        try:
919
            s, h = request.backend.get_object_hashmap(
920
                request.user_uniq, v_account,
921
                v_container, v_object, version)
922
            sizes.append(s)
923
            hashmaps.append(h)
924
        except NotAllowedError:
925
            raise faults.Forbidden('Not allowed')
926
        except ItemNotExists:
927
            raise faults.ItemNotFound('Object does not exist')
928
        except VersionNotExists:
929
            raise faults.ItemNotFound('Version does not exist')
930

    
931
    # Reply with the hashmap.
932
    if hashmap_reply:
933
        size = sum(sizes)
934
        hashmap = sum(hashmaps, [])
935
        d = {
936
            'block_size': request.backend.block_size,
937
            'block_hash': request.backend.hash_algorithm,
938
            'bytes': size,
939
            'hashes': hashmap}
940
        if request.serialization == 'xml':
941
            d['object'] = v_object
942
            data = render_to_string('hashes.xml', d)
943
        elif request.serialization == 'json':
944
            data = json.dumps(d)
945

    
946
        response = HttpResponse(data, status=200)
947
        put_object_headers(
948
            response, meta, token=getattr(request, 'token', None))
949
        response['Content-Length'] = len(data)
950
        return response
951

    
952
    request.serialization = 'text'  # Unset.
953
    response.override_serialization = True
954
    return object_data_response(request, sizes, hashmaps, meta)
955

    
956

    
957
@api_method('PUT', format_allowed=True, user_required=True, logger=logger)
958
def object_write(request, v_account, v_container, v_object):
959
    # Normal Response Codes: 201
960
    # Error Response Codes: internalServerError (500),
961
    #                       unprocessableEntity (422),
962
    #                       lengthRequired (411),
963
    #                       conflict (409),
964
    #                       itemNotFound (404),
965
    #                       forbidden (403),
966
    #                       badRequest (400)
967
    #                       requestentitytoolarge (413)
968

    
969
    # Evaluate conditions.
970
    if (request.META.get('HTTP_IF_MATCH')
971
            or request.META.get('HTTP_IF_NONE_MATCH')):
972
        try:
973
            meta = request.backend.get_object_meta(
974
                request.user_uniq, v_account,
975
                v_container, v_object, 'pithos')
976
        except NotAllowedError:
977
            raise faults.Forbidden('Not allowed')
978
        except NameError:
979
            meta = {}
980
        validate_matching_preconditions(request, meta)
981

    
982
    copy_from = request.META.get('HTTP_X_COPY_FROM')
983
    move_from = request.META.get('HTTP_X_MOVE_FROM')
984
    if copy_from or move_from:
985
        delimiter = request.GET.get('delimiter')
986
        content_length = get_content_length(request)  # Required by the API.
987

    
988
        src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
989

    
990
        if not src_account:
991
            src_account = request.user_uniq
992
        else:
993
            if TRANSLATE_UUIDS:
994
                try:
995
                    src_account = retrieve_uuid(getattr(request, 'token', None),
996
                                                src_account)
997
                except ItemNotExists:
998
                    faults.ItemNotFound('Invalid source account')
999

    
1000
        if move_from:
1001
            try:
1002
                src_container, src_name = split_container_object_string(
1003
                    move_from)
1004
            except ValueError:
1005
                raise faults.BadRequest('Invalid X-Move-From header')
1006
            version_id = copy_or_move_object(
1007
                request, src_account, src_container, src_name,
1008
                v_account, v_container, v_object,
1009
                move=True, delimiter=delimiter)
1010
        else:
1011
            try:
1012
                src_container, src_name = split_container_object_string(
1013
                    copy_from)
1014
            except ValueError:
1015
                raise faults.BadRequest('Invalid X-Copy-From header')
1016
            version_id = copy_or_move_object(
1017
                request, src_account, src_container, src_name,
1018
                v_account, v_container, v_object,
1019
                move=False, delimiter=delimiter)
1020
        response = HttpResponse(status=201)
1021
        response['X-Object-Version'] = version_id
1022
        return response
1023

    
1024
    content_type, meta, permissions, public = get_object_headers(request)
1025
    content_length = -1
1026
    if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
1027
        content_length = get_content_length(request)
1028
    # Should be BadRequest, but API says otherwise.
1029
    if content_type is None:
1030
        raise faults.LengthRequired('Missing Content-Type header')
1031

    
1032
    if 'hashmap' in request.GET:
1033
        if request.serialization not in ('json', 'xml'):
1034
            raise faults.BadRequest('Invalid hashmap format')
1035

    
1036
        data = ''
1037
        for block in socket_read_iterator(request, content_length,
1038
                                          request.backend.block_size):
1039
            data = '%s%s' % (data, block)
1040

    
1041
        if request.serialization == 'json':
1042
            d = json.loads(data)
1043
            if not hasattr(d, '__getitem__'):
1044
                raise faults.BadRequest('Invalid data formating')
1045
            try:
1046
                hashmap = d['hashes']
1047
                size = int(d['bytes'])
1048
            except:
1049
                raise faults.BadRequest('Invalid data formatting')
1050
        elif request.serialization == 'xml':
1051
            try:
1052
                xml = minidom.parseString(data)
1053
                obj = xml.getElementsByTagName('object')[0]
1054
                size = int(obj.attributes['bytes'].value)
1055

    
1056
                hashes = xml.getElementsByTagName('hash')
1057
                hashmap = []
1058
                for hash in hashes:
1059
                    hashmap.append(hash.firstChild.data)
1060
            except:
1061
                raise faults.BadRequest('Invalid data formatting')
1062

    
1063
        checksum = ''  # Do not set to None (will copy previous value).
1064
    else:
1065
        md5 = hashlib.md5()
1066
        size = 0
1067
        hashmap = []
1068
        for data in socket_read_iterator(request, content_length,
1069
                                         request.backend.block_size):
1070
            # TODO: Raise 408 (Request Timeout) if this takes too long.
1071
            # TODO: Raise 499 (Client Disconnect) if a length is defined
1072
            #       and we stop before getting this much data.
1073
            size += len(data)
1074
            hashmap.append(request.backend.put_block(data))
1075
            md5.update(data)
1076

    
1077
        checksum = md5.hexdigest().lower()
1078
        etag = request.META.get('HTTP_ETAG')
1079
        if etag and parse_etags(etag)[0].lower() != checksum:
1080
            raise faults.UnprocessableEntity('Object ETag does not match')
1081

    
1082
    try:
1083
        version_id = \
1084
            request.backend.update_object_hashmap(request.user_uniq,
1085
                                                  v_account, v_container,
1086
                                                  v_object, size, content_type,
1087
                                                  hashmap, checksum,
1088
                                                  'pithos', meta, True,
1089
                                                  permissions)
1090
    except NotAllowedError:
1091
        raise faults.Forbidden('Not allowed')
1092
    except IndexError, e:
1093
        missing_blocks = e.data
1094
        response = HttpResponse(status=409)
1095
        response.content = simple_list_response(request, missing_blocks)
1096
        return response
1097
    except ItemNotExists:
1098
        raise faults.ItemNotFound('Container does not exist')
1099
    except ValueError:
1100
        raise faults.BadRequest('Invalid sharing header')
1101
    except QuotaError, e:
1102
        raise faults.RequestEntityTooLarge('Quota error: %s' % e)
1103
    if not checksum and UPDATE_MD5:
1104
        # Update the MD5 after the hashmap, as there may be missing hashes.
1105
        checksum = hashmap_md5(request.backend, hashmap, size)
1106
        try:
1107
            request.backend.update_object_checksum(request.user_uniq,
1108
                                                   v_account, v_container,
1109
                                                   v_object, version_id,
1110
                                                   checksum)
1111
        except NotAllowedError:
1112
            raise faults.Forbidden('Not allowed')
1113
    if public is not None:
1114
        try:
1115
            request.backend.update_object_public(request.user_uniq, v_account,
1116
                                                 v_container, v_object, public)
1117
        except NotAllowedError:
1118
            raise faults.Forbidden('Not allowed')
1119
        except ItemNotExists:
1120
            raise faults.ItemNotFound('Object does not exist')
1121

    
1122
    response = HttpResponse(status=201)
1123
    if checksum:
1124
        response['ETag'] = checksum
1125
    response['X-Object-Version'] = version_id
1126
    return response
1127

    
1128

    
1129
@api_method('POST', user_required=True, logger=logger)
1130
def object_write_form(request, v_account, v_container, v_object):
1131
    # Normal Response Codes: 201
1132
    # Error Response Codes: internalServerError (500),
1133
    #                       itemNotFound (404),
1134
    #                       forbidden (403),
1135
    #                       badRequest (400)
1136
    #                       requestentitytoolarge (413)
1137

    
1138
    request.upload_handlers = [SaveToBackendHandler(request)]
1139
    if 'X-Object-Data' not in request.FILES:
1140
        raise faults.BadRequest('Missing X-Object-Data field')
1141
    file = request.FILES['X-Object-Data']
1142

    
1143
    checksum = file.etag
1144
    try:
1145
        version_id = \
1146
            request.backend.update_object_hashmap(request.user_uniq,
1147
                                                  v_account, v_container,
1148
                                                  v_object, file.size,
1149
                                                  file.content_type,
1150
                                                  file.hashmap, checksum,
1151
                                                  'pithos', {}, True)
1152
    except NotAllowedError:
1153
        raise faults.Forbidden('Not allowed')
1154
    except ItemNotExists:
1155
        raise faults.ItemNotFound('Container does not exist')
1156
    except QuotaError, e:
1157
        raise faults.RequestEntityTooLarge('Quota error: %s' % e)
1158

    
1159
    response = HttpResponse(status=201)
1160
    response['ETag'] = checksum
1161
    response['X-Object-Version'] = version_id
1162
    response.content = checksum
1163
    return response
1164

    
1165

    
1166
@api_method('COPY', format_allowed=True, user_required=True, logger=logger)
1167
def object_copy(request, v_account, v_container, v_object):
1168
    # Normal Response Codes: 201
1169
    # Error Response Codes: internalServerError (500),
1170
    #                       itemNotFound (404),
1171
    #                       forbidden (403),
1172
    #                       badRequest (400)
1173
    #                       requestentitytoolarge (413)
1174

    
1175
    dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
1176
    if not dest_account:
1177
        dest_account = request.user_uniq
1178
    dest_path = request.META.get('HTTP_DESTINATION')
1179
    if not dest_path:
1180
        raise faults.BadRequest('Missing Destination header')
1181
    try:
1182
        dest_container, dest_name = split_container_object_string(dest_path)
1183
    except ValueError:
1184
        raise faults.BadRequest('Invalid Destination header')
1185

    
1186
    # Evaluate conditions.
1187
    if (request.META.get('HTTP_IF_MATCH')
1188
            or request.META.get('HTTP_IF_NONE_MATCH')):
1189
        src_version = request.META.get('HTTP_X_SOURCE_VERSION')
1190
        try:
1191
            meta = request.backend.get_object_meta(
1192
                request.user_uniq, v_account,
1193
                v_container, v_object, 'pithos', src_version)
1194
        except NotAllowedError:
1195
            raise faults.Forbidden('Not allowed')
1196
        except (ItemNotExists, VersionNotExists):
1197
            raise faults.ItemNotFound('Container or object does not exist')
1198
        validate_matching_preconditions(request, meta)
1199

    
1200
    delimiter = request.GET.get('delimiter')
1201

    
1202
    version_id = copy_or_move_object(request, v_account, v_container, v_object,
1203
                                     dest_account, dest_container, dest_name,
1204
                                     move=False, delimiter=delimiter)
1205
    response = HttpResponse(status=201)
1206
    response['X-Object-Version'] = version_id
1207
    return response
1208

    
1209

    
1210
@api_method('MOVE', format_allowed=True, user_required=True, logger=logger)
1211
def object_move(request, v_account, v_container, v_object):
1212
    # Normal Response Codes: 201
1213
    # Error Response Codes: internalServerError (500),
1214
    #                       itemNotFound (404),
1215
    #                       forbidden (403),
1216
    #                       badRequest (400)
1217
    #                       requestentitytoolarge (413)
1218

    
1219
    dest_account = request.META.get('HTTP_DESTINATION_ACCOUNT')
1220
    if not dest_account:
1221
        dest_account = request.user_uniq
1222
    dest_path = request.META.get('HTTP_DESTINATION')
1223
    if not dest_path:
1224
        raise faults.BadRequest('Missing Destination header')
1225
    try:
1226
        dest_container, dest_name = split_container_object_string(dest_path)
1227
    except ValueError:
1228
        raise faults.BadRequest('Invalid Destination header')
1229

    
1230
    # Evaluate conditions.
1231
    if (request.META.get('HTTP_IF_MATCH')
1232
            or request.META.get('HTTP_IF_NONE_MATCH')):
1233
        try:
1234
            meta = request.backend.get_object_meta(
1235
                request.user_uniq, v_account,
1236
                v_container, v_object, 'pithos')
1237
        except NotAllowedError:
1238
            raise faults.Forbidden('Not allowed')
1239
        except ItemNotExists:
1240
            raise faults.ItemNotFound('Container or object does not exist')
1241
        validate_matching_preconditions(request, meta)
1242

    
1243
    delimiter = request.GET.get('delimiter')
1244

    
1245
    version_id = copy_or_move_object(request, v_account, v_container, v_object,
1246
                                     dest_account, dest_container, dest_name,
1247
                                     move=True, delimiter=delimiter)
1248
    response = HttpResponse(status=201)
1249
    response['X-Object-Version'] = version_id
1250
    return response
1251

    
1252

    
1253
@api_method('POST', format_allowed=True, user_required=True, logger=logger)
1254
def object_update(request, v_account, v_container, v_object):
1255
    # Normal Response Codes: 202, 204
1256
    # Error Response Codes: internalServerError (500),
1257
    #                       conflict (409),
1258
    #                       itemNotFound (404),
1259
    #                       forbidden (403),
1260
    #                       badRequest (400)
1261

    
1262
    content_type, meta, permissions, public = get_object_headers(request)
1263

    
1264
    try:
1265
        prev_meta = request.backend.get_object_meta(
1266
            request.user_uniq, v_account,
1267
            v_container, v_object, 'pithos')
1268
    except NotAllowedError:
1269
        raise faults.Forbidden('Not allowed')
1270
    except ItemNotExists:
1271
        raise faults.ItemNotFound('Object does not exist')
1272

    
1273
    # Evaluate conditions.
1274
    if (request.META.get('HTTP_IF_MATCH')
1275
            or request.META.get('HTTP_IF_NONE_MATCH')):
1276
        validate_matching_preconditions(request, prev_meta)
1277

    
1278
    replace = True
1279
    if 'update' in request.GET:
1280
        replace = False
1281

    
1282
    # A Content-Type or X-Source-Object header indicates data updates.
1283
    src_object = request.META.get('HTTP_X_SOURCE_OBJECT')
1284
    if ((not content_type or content_type != 'application/octet-stream')
1285
            and not src_object):
1286
        response = HttpResponse(status=202)
1287

    
1288
        # Do permissions first, as it may fail easier.
1289
        if permissions is not None:
1290
            try:
1291
                request.backend.update_object_permissions(request.user_uniq,
1292
                                                          v_account,
1293
                                                          v_container, v_object,
1294
                                                          permissions)
1295
            except NotAllowedError:
1296
                raise faults.Forbidden('Not allowed')
1297
            except ItemNotExists:
1298
                raise faults.ItemNotFound('Object does not exist')
1299
            except ValueError:
1300
                raise faults.BadRequest('Invalid sharing header')
1301
        if public is not None:
1302
            try:
1303
                request.backend.update_object_public(
1304
                    request.user_uniq, v_account,
1305
                    v_container, v_object, public)
1306
            except NotAllowedError:
1307
                raise faults.Forbidden('Not allowed')
1308
            except ItemNotExists:
1309
                raise faults.ItemNotFound('Object does not exist')
1310
        if meta or replace:
1311
            try:
1312
                version_id = request.backend.update_object_meta(
1313
                    request.user_uniq,
1314
                    v_account, v_container, v_object, 'pithos', meta, replace)
1315
            except NotAllowedError:
1316
                raise faults.Forbidden('Not allowed')
1317
            except ItemNotExists:
1318
                raise faults.ItemNotFound('Object does not exist')
1319
            response['X-Object-Version'] = version_id
1320

    
1321
        return response
1322

    
1323
    # Single range update. Range must be in Content-Range.
1324
    # Based on: http://code.google.com/p/gears/wiki/ContentRangePostProposal
1325
    # (with the addition that '*' is allowed for the range - will append).
1326
    content_range = request.META.get('HTTP_CONTENT_RANGE')
1327
    if not content_range:
1328
        raise faults.BadRequest('Missing Content-Range header')
1329
    ranges = get_content_range(request)
1330
    if not ranges:
1331
        raise faults.RangeNotSatisfiable('Invalid Content-Range header')
1332

    
1333
    try:
1334
        size, hashmap = \
1335
            request.backend.get_object_hashmap(request.user_uniq,
1336
                                               v_account, v_container, v_object)
1337
    except NotAllowedError:
1338
        raise faults.Forbidden('Not allowed')
1339
    except ItemNotExists:
1340
        raise faults.ItemNotFound('Object does not exist')
1341

    
1342
    offset, length, total = ranges
1343
    if offset is None:
1344
        offset = size
1345
    elif offset > size:
1346
        raise faults.RangeNotSatisfiable(
1347
            'Supplied offset is beyond object limits')
1348
    if src_object:
1349
        src_account = request.META.get('HTTP_X_SOURCE_ACCOUNT')
1350
        if not src_account:
1351
            src_account = request.user_uniq
1352
        src_container, src_name = split_container_object_string(src_object)
1353
        src_version = request.META.get('HTTP_X_SOURCE_VERSION')
1354
        try:
1355
            src_size, src_hashmap = request.backend.get_object_hashmap(
1356
                request.user_uniq,
1357
                src_account, src_container, src_name, src_version)
1358
        except NotAllowedError:
1359
            raise faults.Forbidden('Not allowed')
1360
        except ItemNotExists:
1361
            raise faults.ItemNotFound('Source object does not exist')
1362

    
1363
        if length is None:
1364
            length = src_size
1365
        elif length > src_size:
1366
            raise faults.BadRequest(
1367
                'Object length is smaller than range length')
1368
    else:
1369
        # Require either a Content-Length, or 'chunked' Transfer-Encoding.
1370
        content_length = -1
1371
        if request.META.get('HTTP_TRANSFER_ENCODING') != 'chunked':
1372
            content_length = get_content_length(request)
1373

    
1374
        if length is None:
1375
            length = content_length
1376
        else:
1377
            if content_length == -1:
1378
                # TODO: Get up to length bytes in chunks.
1379
                length = content_length
1380
            elif length != content_length:
1381
                raise faults.BadRequest(
1382
                    'Content length does not match range length')
1383
    if (total is not None
1384
            and (total != size or offset >= size
1385
                 or (length > 0 and offset + length >= size))):
1386
        raise faults.RangeNotSatisfiable(
1387
            'Supplied range will change provided object limits')
1388

    
1389
    dest_bytes = request.META.get('HTTP_X_OBJECT_BYTES')
1390
    if dest_bytes is not None:
1391
        dest_bytes = get_int_parameter(dest_bytes)
1392
        if dest_bytes is None:
1393
            raise faults.BadRequest('Invalid X-Object-Bytes header')
1394

    
1395
    if src_object:
1396
        if offset % request.backend.block_size == 0:
1397
            # Update the hashes only.
1398
            sbi = 0
1399
            while length > 0:
1400
                bi = int(offset / request.backend.block_size)
1401
                bl = min(length, request.backend.block_size)
1402
                if bi < len(hashmap):
1403
                    if bl == request.backend.block_size:
1404
                        hashmap[bi] = src_hashmap[sbi]
1405
                    else:
1406
                        data = request.backend.get_block(src_hashmap[sbi])
1407
                        hashmap[bi] = request.backend.update_block(hashmap[bi],
1408
                                                                   data[:bl], 0)
1409
                else:
1410
                    hashmap.append(src_hashmap[sbi])
1411
                offset += bl
1412
                length -= bl
1413
                sbi += 1
1414
        else:
1415
            data = ''
1416
            sbi = 0
1417
            while length > 0:
1418
                data += request.backend.get_block(src_hashmap[sbi])
1419
                if length < request.backend.block_size:
1420
                    data = data[:length]
1421
                bytes = put_object_block(request, hashmap, data, offset)
1422
                offset += bytes
1423
                data = data[bytes:]
1424
                length -= bytes
1425
                sbi += 1
1426
    else:
1427
        data = ''
1428
        for d in socket_read_iterator(request, length,
1429
                                      request.backend.block_size):
1430
            # TODO: Raise 408 (Request Timeout) if this takes too long.
1431
            # TODO: Raise 499 (Client Disconnect) if a length is defined
1432
            #       and we stop before getting this much data.
1433
            data += d
1434
            bytes = put_object_block(request, hashmap, data, offset)
1435
            offset += bytes
1436
            data = data[bytes:]
1437
        if len(data) > 0:
1438
            put_object_block(request, hashmap, data, offset)
1439

    
1440
    if offset > size:
1441
        size = offset
1442
    if dest_bytes is not None and dest_bytes < size:
1443
        size = dest_bytes
1444
        hashmap = hashmap[:(int((size - 1) / request.backend.block_size) + 1)]
1445
    checksum = hashmap_md5(
1446
        request.backend, hashmap, size) if UPDATE_MD5 else ''
1447
    try:
1448
        version_id = \
1449
            request.backend.update_object_hashmap(request.user_uniq,
1450
                                                  v_account, v_container,
1451
                                                  v_object, size,
1452
                                                  prev_meta['type'],
1453
                                                  hashmap, checksum, 'pithos',
1454
                                                  meta, replace, permissions)
1455
    except NotAllowedError:
1456
        raise faults.Forbidden('Not allowed')
1457
    except ItemNotExists:
1458
        raise faults.ItemNotFound('Container does not exist')
1459
    except ValueError:
1460
        raise faults.BadRequest('Invalid sharing header')
1461
    except QuotaError, e:
1462
        raise faults.RequestEntityTooLarge('Quota error: %s' % e)
1463
    if public is not None:
1464
        try:
1465
            request.backend.update_object_public(request.user_uniq, v_account,
1466
                                                 v_container, v_object, public)
1467
        except NotAllowedError:
1468
            raise faults.Forbidden('Not allowed')
1469
        except ItemNotExists:
1470
            raise faults.ItemNotFound('Object does not exist')
1471

    
1472
    response = HttpResponse(status=204)
1473
    response['ETag'] = checksum
1474
    response['X-Object-Version'] = version_id
1475
    return response
1476

    
1477

    
1478
@api_method('DELETE', user_required=True, logger=logger)
1479
def object_delete(request, v_account, v_container, v_object):
1480
    # Normal Response Codes: 204
1481
    # Error Response Codes: internalServerError (500),
1482
    #                       itemNotFound (404),
1483
    #                       forbidden (403),
1484
    #                       badRequest (400)
1485
    #                       requestentitytoolarge (413)
1486

    
1487
    until = get_int_parameter(request.GET.get('until'))
1488
    delimiter = request.GET.get('delimiter')
1489

    
1490
    try:
1491
        request.backend.delete_object(
1492
            request.user_uniq, v_account, v_container,
1493
            v_object, until, delimiter=delimiter)
1494
    except NotAllowedError:
1495
        raise faults.Forbidden('Not allowed')
1496
    except ItemNotExists:
1497
        raise faults.ItemNotFound('Object does not exist')
1498
    except QuotaError, e:
1499
        raise faults.RequestEntityTooLarge('Quota error: %s' % e)
1500
    return HttpResponse(status=204)