Copyright © 2010 Caringo, Inc.
All rights reserved
v
Version 5.0
December 2010
13.3. Example: Creating Bucket Owners
.........................................................................
51
13.4. Examples of Creating Buckets and Named Objects
.................................................
51
14. Managing Security for Domain Managers
..........................................................................
54
14.1. What Domain Managers Need to Know
..................................................................
54
14.2. About Domain Manager Tasks and Responsibilities
.................................................
54
14.3. Examples of Updating Domain and Administrator User Lists
.....................................
54
14.3.1. Updating the Domain Realm
.......................................................................
55
14.3.2. Updating the Domain Manager Realm
.........................................................
56
14.3.3. Updating a Realm Using PUT
.....................................................................
57
15. Using the Content-MD5 Metadata Header
.........................................................................
59
16. Using Lifepoint Metadata Headers
....................................................................................
60
16.1. About Storage Policies
..........................................................................................
60
16.2. A Simple Lifecycle Example
...................................................................................
60
16.3. Lifepoint/Lifecycle Specification
..............................................................................
61
16.4. Constraint Types
...................................................................................................
61
16.4.1. Replication
.................................................................................................
62
16.4.2. Deletion
.....................................................................................................
62
17. Using the Allow Metadata Header
.....................................................................................
64
17.1. Overview of the Allow Header
................................................................................
64
17.2. Administrative Override
..........................................................................................
64
18. Using Caching Metadata Headers
.....................................................................................
66
18.1. About Caching Headers
.........................................................................................
66
18.2. Using HTTP/1.0 Caching Headers
..........................................................................
66
18.2.1. Last-Modified
..............................................................................................
66
18.2.2. If-Modified-Since
.........................................................................................
66
18.2.3. If-Unmodified-Since
.....................................................................................
66
18.2.4. Expires
.......................................................................................................
67
18.3. Using HTTP/1.1 Caching Headers
..........................................................................
67
18.3.1. ETag
..........................................................................................................
67
18.3.2. If-Match
......................................................................................................
67
18.3.3. If-None-Match
.............................................................................................
68
18.3.4. If-Range
.....................................................................................................
68
19. Using Custom Metadata Headers
.....................................................................................
70
20. Basic Content Integrity Assurance
.....................................................................................
71
20.1. Integrity Seals
.......................................................................................................
71
20.2. Validating Reads
...................................................................................................
71
20.3. Application Initiated Hash Upgrading
......................................................................
72
A. Content Header Metadata
..................................................................................................
73
B. Sample Code and Client Library Behaviors with 100-Continue
..............................................
75
C. Open Source Software
......................................................................................................
76