def setBucket(user, bucket, accessControlPolicy): if not user: raise ForbiddenException.AccessDeniedException() try: Bucket.setBucket(userid = user, bucket = bucket) except ConflictException.BucketAlreadyOwnedByYouException: pass BucketLogging.logBucketEvent(user, bucket, 'set') BucketACP.setBucketACP(bucket, accessControlPolicy) BucketLogging.logBucketEvent(user, bucket, 'set_acp')
def getBucket(user, bucket, prefix, marker, maxKeys, delimiter): if not BucketACP.checkUserPermission(user, bucket, 'read'): raise ForbiddenException.AccessDeniedException() BucketLogging.logBucketEvent(user, bucket, 'get') return Bucket.getBucket(bucket=bucket, prefix=prefix, marker=marker, maxKeys=maxKeys, delimiter=delimiter)
def destroyBucket(user, bucket): if not BucketACP.checkUserPermission(user, bucket, 'destroy'): raise ForbiddenException.AccessDeniedException() Bucket.destroyBucket(bucket) BucketLogging.logBucketEvent(user, bucket, 'delete')
def getBucket(userId, bucket, prefix, marker, maxKeys, delimiter): if not checkUserPermission(user, bucket, 'read'): '''not allowed, throw error''' return Bucket.getBucket(bucket, prefix, marker, maxKeys, delimiter)
def setBucket(userId, bucket, accessControlList): if not checkUserPermission(user, bucket, 'write'): '''not allowed, throw error''' Bucket.setBucket(userId, bucket) if accessControlList: BucketACP.setBucketACP(bucket, accessControlList)