Copyright © 2010 Caringo, Inc.
All rights reserved
iv
Version 5.0
December 2010
5.3.3. Other Normal READ Responses
...................................................................
25
5.4. Error Responses to READ
.......................................................................................
25
6. SCSP WRITE
....................................................................................................................
27
6.1. Introduction to WRITE
.............................................................................................
27
6.1.1. About the Expect: 100-continue Header and WRITE
.......................................
28
6.1.2. About Replicate On Write
.............................................................................
28
6.2. Named Object WRITE Details
..................................................................................
28
6.3. Unnamed Object WRITE Details
..............................................................................
28
6.4. Normal Responses to WRITE
..................................................................................
28
6.5. Error Responses to WRITE
.....................................................................................
29
7. SCSP DELETE
..................................................................................................................
31
7.1. Introduction to DELETE
...........................................................................................
31
7.2. Unnamed Object DELETE Details
............................................................................
32
7.3. Named Object DELETE Details
...............................................................................
32
7.4. Normal Responses to DELETE
................................................................................
32
7.5. Error Responses to DELETE
...................................................................................
33
8. SCSP UPDATE
.................................................................................................................
34
8.1. Introduction to UPDATE
..........................................................................................
34
8.2. Unnamed Object UPDATE Details
...........................................................................
34
8.3. Normal Responses to UPDATE
...............................................................................
35
9. SCSP COPY
.....................................................................................................................
36
9.1. Introduction to COPY
..............................................................................................
36
9.2. Unnamed Object COPY Details
...............................................................................
36
9.3. Normal Responses to COPY
...................................................................................
36
10. SCSP APPEND
...............................................................................................................
37
10.1. Introduction to APPEND
........................................................................................
37
10.2. Unnamed Object APPEND Details
.........................................................................
38
10.3. Normal Responses to APPEND
.............................................................................
38
11. SCSP INFO
.....................................................................................................................
39
11.1. Introduction to INFO
..............................................................................................
39
11.1.1. Getting Replica Counts
...............................................................................
39
11.1.2. Getting Node Status and Cluster Capacity
...................................................
39
11.2. Unnamed Object INFO Details
...............................................................................
40
11.3. Normal Responses to INFO
...................................................................................
40
11.3.1. Normal INFO Responses for Named and Unnamed Objects
..........................
40
11.3.2. Normal INFO Responses for Named Objects
................................................
41
11.3.3. Normal INFO Responses for Unnamed Objects
............................................
42
11.4. Error Responses to INFO
......................................................................................
42
12. Introduction to Object Security
..........................................................................................
43
12.1. About Security Roles
.............................................................................................
43
12.2. Security Realm Overview
.......................................................................................
44
12.2.1. Common Security Terminology
....................................................................
44
12.2.2. About Security Realms
...............................................................................
44
12.2.3. About Realm Caching and Security
.............................................................
44
12.3. About Authorization Header Syntax
........................................................................
45
12.3.1. About Realm Names
...................................................................................
46
12.4. Authorization Specification Examples
......................................................................
46
12.5. About Authorization Header Evaluation
...................................................................
47
12.6. Creating Realms
...................................................................................................
48
12.7. Updating the Realm on a Bucket
............................................................................
49
12.8. Administrative Override and Security
......................................................................
49
13. Managing Security for Application Developers
...................................................................
50
13.1. What Application Developers Need to Know
...........................................................
50
13.2. About Bucket Authorization
....................................................................................
50