Dell DX6004S DX Object Storage Application Guide - Page 4

Normal INFO Responses for Named and Unnamed Objects

Page 4 highlights

5.3.3. Other Normal READ Responses 25 5.4. Error Responses to READ 25 6. SCSP WRITE ...27 6.1. Introduction to WRITE 27 6.1.1. About the Expect: 100-continue Header and WRITE 28 6.1.2. About Replicate On Write 28 6.2. Named Object WRITE Details 28 6.3. Unnamed Object WRITE Details 28 6.4. Normal Responses to WRITE 28 6.5. Error Responses to WRITE 29 7. SCSP DELETE ...31 7.1. Introduction to DELETE 31 7.2. Unnamed Object DELETE Details 32 7.3. Named Object DELETE Details 32 7.4. Normal Responses to DELETE 32 7.5. Error Responses to DELETE 33 8. SCSP UPDATE ...34 8.1. Introduction to UPDATE 34 8.2. Unnamed Object UPDATE Details 34 8.3. Normal Responses to UPDATE 35 9. SCSP COPY ...36 9.1. Introduction to COPY 36 9.2. Unnamed Object COPY Details 36 9.3. Normal Responses to COPY 36 10. SCSP APPEND ...37 10.1. Introduction to APPEND 37 10.2. Unnamed Object APPEND Details 38 10.3. Normal Responses to APPEND 38 11. SCSP INFO ...39 11.1. Introduction to INFO 39 11.1.1. Getting Replica Counts 39 11.1.2. Getting Node Status and Cluster Capacity 39 11.2. Unnamed Object INFO Details 40 11.3. Normal Responses to INFO 40 11.3.1. Normal INFO Responses for Named and Unnamed Objects 40 11.3.2. Normal INFO Responses for Named Objects 41 11.3.3. Normal INFO Responses for Unnamed Objects 42 11.4. Error Responses to INFO 42 12. Introduction to Object Security 43 12.1. About Security Roles 43 12.2. Security Realm Overview 44 12.2.1. Common Security Terminology 44 12.2.2. About Security Realms 44 12.2.3. About Realm Caching and Security 44 12.3. About Authorization Header Syntax 45 12.3.1. About Realm Names 46 12.4. Authorization Specification Examples 46 12.5. About Authorization Header Evaluation 47 12.6. Creating Realms 48 12.7. Updating the Realm on a Bucket 49 12.8. Administrative Override and Security 49 13. Managing Security for Application Developers 50 13.1. What Application Developers Need to Know 50 13.2. About Bucket Authorization 50 Copyright © 2010 Caringo, Inc. All rights reserved iv Version 5.0 December 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81

Copyright © 2010 Caringo, Inc.
All rights reserved
iv
Version 5.0
December 2010
5.3.3. Other Normal READ Responses
...................................................................
25
5.4. Error Responses to READ
.......................................................................................
25
6. SCSP WRITE
....................................................................................................................
27
6.1. Introduction to WRITE
.............................................................................................
27
6.1.1. About the Expect: 100-continue Header and WRITE
.......................................
28
6.1.2. About Replicate On Write
.............................................................................
28
6.2. Named Object WRITE Details
..................................................................................
28
6.3. Unnamed Object WRITE Details
..............................................................................
28
6.4. Normal Responses to WRITE
..................................................................................
28
6.5. Error Responses to WRITE
.....................................................................................
29
7. SCSP DELETE
..................................................................................................................
31
7.1. Introduction to DELETE
...........................................................................................
31
7.2. Unnamed Object DELETE Details
............................................................................
32
7.3. Named Object DELETE Details
...............................................................................
32
7.4. Normal Responses to DELETE
................................................................................
32
7.5. Error Responses to DELETE
...................................................................................
33
8. SCSP UPDATE
.................................................................................................................
34
8.1. Introduction to UPDATE
..........................................................................................
34
8.2. Unnamed Object UPDATE Details
...........................................................................
34
8.3. Normal Responses to UPDATE
...............................................................................
35
9. SCSP COPY
.....................................................................................................................
36
9.1. Introduction to COPY
..............................................................................................
36
9.2. Unnamed Object COPY Details
...............................................................................
36
9.3. Normal Responses to COPY
...................................................................................
36
10. SCSP APPEND
...............................................................................................................
37
10.1. Introduction to APPEND
........................................................................................
37
10.2. Unnamed Object APPEND Details
.........................................................................
38
10.3. Normal Responses to APPEND
.............................................................................
38
11. SCSP INFO
.....................................................................................................................
39
11.1. Introduction to INFO
..............................................................................................
39
11.1.1. Getting Replica Counts
...............................................................................
39
11.1.2. Getting Node Status and Cluster Capacity
...................................................
39
11.2. Unnamed Object INFO Details
...............................................................................
40
11.3. Normal Responses to INFO
...................................................................................
40
11.3.1. Normal INFO Responses for Named and Unnamed Objects
..........................
40
11.3.2. Normal INFO Responses for Named Objects
................................................
41
11.3.3. Normal INFO Responses for Unnamed Objects
............................................
42
11.4. Error Responses to INFO
......................................................................................
42
12. Introduction to Object Security
..........................................................................................
43
12.1. About Security Roles
.............................................................................................
43
12.2. Security Realm Overview
.......................................................................................
44
12.2.1. Common Security Terminology
....................................................................
44
12.2.2. About Security Realms
...............................................................................
44
12.2.3. About Realm Caching and Security
.............................................................
44
12.3. About Authorization Header Syntax
........................................................................
45
12.3.1. About Realm Names
...................................................................................
46
12.4. Authorization Specification Examples
......................................................................
46
12.5. About Authorization Header Evaluation
...................................................................
47
12.6. Creating Realms
...................................................................................................
48
12.7. Updating the Realm on a Bucket
............................................................................
49
12.8. Administrative Override and Security
......................................................................
49
13. Managing Security for Application Developers
...................................................................
50
13.1. What Application Developers Need to Know
...........................................................
50
13.2. About Bucket Authorization
....................................................................................
50