Dell DX6012S DX Object Storage Application Guide - Page 5

B. Sample Code and Client Library Behaviors with 100-Continue

Page 5 highlights

13.3. Example: Creating Bucket Owners 51 13.4. Examples of Creating Buckets and Named Objects 51 14. Managing Security for Domain Managers 54 14.1. What Domain Managers Need to Know 54 14.2. About Domain Manager Tasks and Responsibilities 54 14.3. Examples of Updating Domain and Administrator User Lists 54 14.3.1. Updating the Domain Realm 55 14.3.2. Updating the Domain Manager Realm 56 14.3.3. Updating a Realm Using PUT 57 15. Using the Content-MD5 Metadata Header 59 16. Using Lifepoint Metadata Headers 60 16.1. About Storage Policies 60 16.2. A Simple Lifecycle Example 60 16.3. Lifepoint/Lifecycle Specification 61 16.4. Constraint Types 61 16.4.1. Replication 62 16.4.2. Deletion ...62 17. Using the Allow Metadata Header 64 17.1. Overview of the Allow Header 64 17.2. Administrative Override 64 18. Using Caching Metadata Headers 66 18.1. About Caching Headers 66 18.2. Using HTTP/1.0 Caching Headers 66 18.2.1. Last-Modified 66 18.2.2. If-Modified-Since 66 18.2.3. If-Unmodified-Since 66 18.2.4. Expires ...67 18.3. Using HTTP/1.1 Caching Headers 67 18.3.1. ETag ...67 18.3.2. If-Match ...67 18.3.3. If-None-Match 68 18.3.4. If-Range ...68 19. Using Custom Metadata Headers 70 20. Basic Content Integrity Assurance 71 20.1. Integrity Seals ...71 20.2. Validating Reads 71 20.3. Application Initiated Hash Upgrading 72 A. Content Header Metadata 73 B. Sample Code and Client Library Behaviors with 100-Continue 75 C. Open Source Software ...76 Copyright © 2010 Caringo, Inc. All rights reserved v Version 5.0 December 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81

Copyright © 2010 Caringo, Inc.
All rights reserved
v
Version 5.0
December 2010
13.3. Example: Creating Bucket Owners
.........................................................................
51
13.4. Examples of Creating Buckets and Named Objects
.................................................
51
14. Managing Security for Domain Managers
..........................................................................
54
14.1. What Domain Managers Need to Know
..................................................................
54
14.2. About Domain Manager Tasks and Responsibilities
.................................................
54
14.3. Examples of Updating Domain and Administrator User Lists
.....................................
54
14.3.1. Updating the Domain Realm
.......................................................................
55
14.3.2. Updating the Domain Manager Realm
.........................................................
56
14.3.3. Updating a Realm Using PUT
.....................................................................
57
15. Using the Content-MD5 Metadata Header
.........................................................................
59
16. Using Lifepoint Metadata Headers
....................................................................................
60
16.1. About Storage Policies
..........................................................................................
60
16.2. A Simple Lifecycle Example
...................................................................................
60
16.3. Lifepoint/Lifecycle Specification
..............................................................................
61
16.4. Constraint Types
...................................................................................................
61
16.4.1. Replication
.................................................................................................
62
16.4.2. Deletion
.....................................................................................................
62
17. Using the Allow Metadata Header
.....................................................................................
64
17.1. Overview of the Allow Header
................................................................................
64
17.2. Administrative Override
..........................................................................................
64
18. Using Caching Metadata Headers
.....................................................................................
66
18.1. About Caching Headers
.........................................................................................
66
18.2. Using HTTP/1.0 Caching Headers
..........................................................................
66
18.2.1. Last-Modified
..............................................................................................
66
18.2.2. If-Modified-Since
.........................................................................................
66
18.2.3. If-Unmodified-Since
.....................................................................................
66
18.2.4. Expires
.......................................................................................................
67
18.3. Using HTTP/1.1 Caching Headers
..........................................................................
67
18.3.1. ETag
..........................................................................................................
67
18.3.2. If-Match
......................................................................................................
67
18.3.3. If-None-Match
.............................................................................................
68
18.3.4. If-Range
.....................................................................................................
68
19. Using Custom Metadata Headers
.....................................................................................
70
20. Basic Content Integrity Assurance
.....................................................................................
71
20.1. Integrity Seals
.......................................................................................................
71
20.2. Validating Reads
...................................................................................................
71
20.3. Application Initiated Hash Upgrading
......................................................................
72
A. Content Header Metadata
..................................................................................................
73
B. Sample Code and Client Library Behaviors with 100-Continue
..............................................
75
C. Open Source Software
......................................................................................................
76