use std::collections::HashMap;
use std::fmt::Debug;
use std::fmt::Formatter;
use std::sync::Arc;
use base64::prelude::BASE64_STANDARD;
use base64::Engine;
use http::Response;
use http::StatusCode;
use log::debug;
use reqsign::AzureStorageConfig;
use reqsign::AzureStorageLoader;
use reqsign::AzureStorageSigner;
use sha2::Digest;
use sha2::Sha256;
use super::core::constants::X_MS_META_PREFIX;
use super::core::AzblobCore;
use super::delete::AzblobDeleter;
use super::error::parse_error;
use super::lister::AzblobLister;
use super::writer::AzblobWriter;
use super::writer::AzblobWriters;
use crate::raw::*;
use crate::services::AzblobConfig;
use crate::*;
const KNOWN_AZBLOB_ENDPOINT_SUFFIX: &[&str] = &[
"blob.core.windows.net",
"blob.core.usgovcloudapi.net",
"blob.core.chinacloudapi.cn",
];
const AZBLOB_BATCH_LIMIT: usize = 256;
impl Configurator for AzblobConfig {
type Builder = AzblobBuilder;
fn into_builder(self) -> Self::Builder {
AzblobBuilder {
config: self,
http_client: None,
}
}
}
#[doc = include_str!("docs.md")]
#[derive(Default, Clone)]
pub struct AzblobBuilder {
config: AzblobConfig,
http_client: Option<HttpClient>,
}
impl Debug for AzblobBuilder {
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
let mut ds = f.debug_struct("AzblobBuilder");
ds.field("config", &self.config);
ds.finish()
}
}
impl AzblobBuilder {
pub fn root(mut self, root: &str) -> Self {
self.config.root = if root.is_empty() {
None
} else {
Some(root.to_string())
};
self
}
pub fn container(mut self, container: &str) -> Self {
self.config.container = container.to_string();
self
}
pub fn endpoint(mut self, endpoint: &str) -> Self {
if !endpoint.is_empty() {
self.config.endpoint = Some(endpoint.trim_end_matches('/').to_string());
}
self
}
pub fn account_name(mut self, account_name: &str) -> Self {
if !account_name.is_empty() {
self.config.account_name = Some(account_name.to_string());
}
self
}
pub fn account_key(mut self, account_key: &str) -> Self {
if !account_key.is_empty() {
self.config.account_key = Some(account_key.to_string());
}
self
}
pub fn encryption_key(mut self, v: &str) -> Self {
if !v.is_empty() {
self.config.encryption_key = Some(v.to_string());
}
self
}
pub fn encryption_key_sha256(mut self, v: &str) -> Self {
if !v.is_empty() {
self.config.encryption_key_sha256 = Some(v.to_string());
}
self
}
pub fn encryption_algorithm(mut self, v: &str) -> Self {
if !v.is_empty() {
self.config.encryption_algorithm = Some(v.to_string());
}
self
}
pub fn server_side_encryption_with_customer_key(mut self, key: &[u8]) -> Self {
self.config.encryption_algorithm = Some("AES256".to_string());
self.config.encryption_key = Some(BASE64_STANDARD.encode(key));
self.config.encryption_key_sha256 =
Some(BASE64_STANDARD.encode(Sha256::digest(key).as_slice()));
self
}
pub fn sas_token(mut self, sas_token: &str) -> Self {
if !sas_token.is_empty() {
self.config.sas_token = Some(sas_token.to_string());
}
self
}
pub fn http_client(mut self, client: HttpClient) -> Self {
self.http_client = Some(client);
self
}
pub fn batch_max_operations(mut self, batch_max_operations: usize) -> Self {
self.config.batch_max_operations = Some(batch_max_operations);
self
}
pub fn from_connection_string(conn: &str) -> Result<Self> {
let conn = conn.trim().replace('\n', "");
let mut conn_map: HashMap<_, _> = HashMap::default();
for v in conn.split(';') {
let entry: Vec<_> = v.splitn(2, '=').collect();
if entry.len() != 2 {
continue;
}
conn_map.insert(entry[0], entry[1]);
}
let mut builder = AzblobBuilder::default();
if let Some(sas_token) = conn_map.get("SharedAccessSignature") {
builder = builder.sas_token(sas_token);
} else {
let account_name = conn_map.get("AccountName").ok_or_else(|| {
Error::new(
ErrorKind::ConfigInvalid,
"connection string must have AccountName",
)
.with_operation("Builder::from_connection_string")
})?;
builder = builder.account_name(account_name);
let account_key = conn_map.get("AccountKey").ok_or_else(|| {
Error::new(
ErrorKind::ConfigInvalid,
"connection string must have AccountKey",
)
.with_operation("Builder::from_connection_string")
})?;
builder = builder.account_key(account_key);
}
if let Some(v) = conn_map.get("BlobEndpoint") {
builder = builder.endpoint(v);
} else if let Some(v) = conn_map.get("EndpointSuffix") {
let protocol = conn_map.get("DefaultEndpointsProtocol").unwrap_or(&"https");
let account_name = builder
.config
.account_name
.as_ref()
.ok_or_else(|| {
Error::new(
ErrorKind::ConfigInvalid,
"connection string must have AccountName",
)
.with_operation("Builder::from_connection_string")
})?
.clone();
builder = builder.endpoint(&format!("{protocol}://{account_name}.blob.{v}"));
}
Ok(builder)
}
}
impl Builder for AzblobBuilder {
const SCHEME: Scheme = Scheme::Azblob;
type Config = AzblobConfig;
fn build(self) -> Result<impl Access> {
debug!("backend build started: {:?}", &self);
let root = normalize_root(&self.config.root.unwrap_or_default());
debug!("backend use root {}", root);
let container = match self.config.container.is_empty() {
false => Ok(&self.config.container),
true => Err(Error::new(ErrorKind::ConfigInvalid, "container is empty")
.with_operation("Builder::build")
.with_context("service", Scheme::Azblob)),
}?;
debug!("backend use container {}", &container);
let endpoint = match &self.config.endpoint {
Some(endpoint) => Ok(endpoint.clone()),
None => Err(Error::new(ErrorKind::ConfigInvalid, "endpoint is empty")
.with_operation("Builder::build")
.with_context("service", Scheme::Azblob)),
}?;
debug!("backend use endpoint {}", &container);
let client = if let Some(client) = self.http_client {
client
} else {
HttpClient::new().map_err(|err| {
err.with_operation("Builder::build")
.with_context("service", Scheme::Azblob)
})?
};
let mut config_loader = AzureStorageConfig::default().from_env();
if let Some(v) = self
.config
.account_name
.clone()
.or_else(|| infer_storage_name_from_endpoint(endpoint.as_str()))
{
config_loader.account_name = Some(v);
}
if let Some(v) = self.config.account_key.clone() {
config_loader.account_key = Some(v);
}
if let Some(v) = self.config.sas_token.clone() {
config_loader.sas_token = Some(v);
}
let encryption_key =
match &self.config.encryption_key {
None => None,
Some(v) => Some(build_header_value(v).map_err(|err| {
err.with_context("key", "server_side_encryption_customer_key")
})?),
};
let encryption_key_sha256 = match &self.config.encryption_key_sha256 {
None => None,
Some(v) => Some(build_header_value(v).map_err(|err| {
err.with_context("key", "server_side_encryption_customer_key_sha256")
})?),
};
let encryption_algorithm = match &self.config.encryption_algorithm {
None => None,
Some(v) => {
if v == "AES256" {
Some(build_header_value(v).map_err(|err| {
err.with_context("key", "server_side_encryption_customer_algorithm")
})?)
} else {
return Err(Error::new(
ErrorKind::ConfigInvalid,
"encryption_algorithm value must be AES256",
));
}
}
};
let cred_loader = AzureStorageLoader::new(config_loader);
let signer = AzureStorageSigner::new();
Ok(AzblobBackend {
core: Arc::new(AzblobCore {
root,
endpoint,
encryption_key,
encryption_key_sha256,
encryption_algorithm,
container: self.config.container.clone(),
client,
loader: cred_loader,
signer,
}),
has_sas_token: self.config.sas_token.is_some(),
})
}
}
fn infer_storage_name_from_endpoint(endpoint: &str) -> Option<String> {
let endpoint: &str = endpoint
.strip_prefix("http://")
.or_else(|| endpoint.strip_prefix("https://"))
.unwrap_or(endpoint);
let mut parts = endpoint.splitn(2, '.');
let storage_name = parts.next();
let endpoint_suffix = parts
.next()
.unwrap_or_default()
.trim_end_matches('/')
.to_lowercase();
if KNOWN_AZBLOB_ENDPOINT_SUFFIX
.iter()
.any(|s| *s == endpoint_suffix.as_str())
{
storage_name.map(|s| s.to_string())
} else {
None
}
}
#[derive(Debug, Clone)]
pub struct AzblobBackend {
core: Arc<AzblobCore>,
has_sas_token: bool,
}
impl Access for AzblobBackend {
type Reader = HttpBody;
type Writer = AzblobWriters;
type Lister = oio::PageLister<AzblobLister>;
type Deleter = oio::BatchDeleter<AzblobDeleter>;
type BlockingReader = ();
type BlockingWriter = ();
type BlockingLister = ();
type BlockingDeleter = ();
fn info(&self) -> Arc<AccessorInfo> {
let mut am = AccessorInfo::default();
am.set_scheme(Scheme::Azblob)
.set_root(&self.core.root)
.set_name(&self.core.container)
.set_native_capability(Capability {
stat: true,
stat_with_if_match: true,
stat_with_if_none_match: true,
read: true,
read_with_if_match: true,
read_with_if_none_match: true,
read_with_override_content_disposition: true,
write: true,
write_can_append: true,
write_can_empty: true,
write_can_multi: true,
write_with_cache_control: true,
write_with_content_type: true,
write_with_if_not_exists: true,
write_with_if_none_match: true,
write_with_user_metadata: true,
delete: true,
delete_max_size: Some(AZBLOB_BATCH_LIMIT),
copy: true,
list: true,
list_with_recursive: true,
presign: self.has_sas_token,
presign_stat: self.has_sas_token,
presign_read: self.has_sas_token,
presign_write: self.has_sas_token,
shared: true,
..Default::default()
});
am.into()
}
async fn stat(&self, path: &str, args: OpStat) -> Result<RpStat> {
let resp = self.core.azblob_get_blob_properties(path, &args).await?;
let status = resp.status();
match status {
StatusCode::OK => {
let headers = resp.headers();
let mut meta = parse_into_metadata(path, headers)?;
let user_meta = parse_prefixed_headers(headers, X_MS_META_PREFIX);
if !user_meta.is_empty() {
meta.with_user_metadata(user_meta);
}
Ok(RpStat::new(meta))
}
_ => Err(parse_error(resp)),
}
}
async fn read(&self, path: &str, args: OpRead) -> Result<(RpRead, Self::Reader)> {
let resp = self.core.azblob_get_blob(path, args.range(), &args).await?;
let status = resp.status();
match status {
StatusCode::OK | StatusCode::PARTIAL_CONTENT => Ok((RpRead::new(), resp.into_body())),
_ => {
let (part, mut body) = resp.into_parts();
let buf = body.to_buffer().await?;
Err(parse_error(Response::from_parts(part, buf)))
}
}
}
async fn write(&self, path: &str, args: OpWrite) -> Result<(RpWrite, Self::Writer)> {
let w = AzblobWriter::new(self.core.clone(), args.clone(), path.to_string());
let w = if args.append() {
AzblobWriters::Two(oio::AppendWriter::new(w))
} else {
AzblobWriters::One(oio::BlockWriter::new(
w,
args.executor().cloned(),
args.concurrent(),
))
};
Ok((RpWrite::default(), w))
}
async fn delete(&self) -> Result<(RpDelete, Self::Deleter)> {
Ok((
RpDelete::default(),
oio::BatchDeleter::new(AzblobDeleter::new(self.core.clone())),
))
}
async fn list(&self, path: &str, args: OpList) -> Result<(RpList, Self::Lister)> {
let l = AzblobLister::new(
self.core.clone(),
path.to_string(),
args.recursive(),
args.limit(),
);
Ok((RpList::default(), oio::PageLister::new(l)))
}
async fn copy(&self, from: &str, to: &str, _args: OpCopy) -> Result<RpCopy> {
let resp = self.core.azblob_copy_blob(from, to).await?;
let status = resp.status();
match status {
StatusCode::ACCEPTED => Ok(RpCopy::default()),
_ => Err(parse_error(resp)),
}
}
async fn presign(&self, path: &str, args: OpPresign) -> Result<RpPresign> {
let mut req = match args.operation() {
PresignOperation::Stat(v) => self.core.azblob_head_blob_request(path, v)?,
PresignOperation::Read(v) => {
self.core
.azblob_get_blob_request(path, BytesRange::default(), v)?
}
PresignOperation::Write(_) => {
self.core
.azblob_put_blob_request(path, None, &OpWrite::default(), Buffer::new())?
}
};
self.core.sign_query(&mut req).await?;
let (parts, _) = req.into_parts();
Ok(RpPresign::new(PresignedRequest::new(
parts.method,
parts.uri,
parts.headers,
)))
}
}
#[cfg(test)]
mod tests {
use super::infer_storage_name_from_endpoint;
use super::AzblobBuilder;
#[test]
fn test_infer_storage_name_from_endpoint() {
let endpoint = "https://account.blob.core.windows.net";
let storage_name = infer_storage_name_from_endpoint(endpoint);
assert_eq!(storage_name, Some("account".to_string()));
}
#[test]
fn test_infer_storage_name_from_endpoint_with_trailing_slash() {
let endpoint = "https://account.blob.core.windows.net/";
let storage_name = infer_storage_name_from_endpoint(endpoint);
assert_eq!(storage_name, Some("account".to_string()));
}
#[test]
fn test_builder_from_connection_string() {
let builder = AzblobBuilder::from_connection_string(
r#"
DefaultEndpointsProtocol=http;AccountName=devstoreaccount1;
AccountKey=Eby8vdM02xNOcqFlqUwJPLlmEtlCDXJ1OUzFT50uSRZ6IFsuFq2UVErCz4I6tq/K1SZFPTOtr/KBHBeksoGMGw==;
BlobEndpoint=http://127.0.0.1:10000/devstoreaccount1;
QueueEndpoint=http://127.0.0.1:10001/devstoreaccount1;
TableEndpoint=http://127.0.0.1:10002/devstoreaccount1;
"#,
)
.expect("from connection string must succeed");
assert_eq!(
builder.config.endpoint.unwrap(),
"http://127.0.0.1:10000/devstoreaccount1"
);
assert_eq!(builder.config.account_name.unwrap(), "devstoreaccount1");
assert_eq!(builder.config.account_key.unwrap(), "Eby8vdM02xNOcqFlqUwJPLlmEtlCDXJ1OUzFT50uSRZ6IFsuFq2UVErCz4I6tq/K1SZFPTOtr/KBHBeksoGMGw==");
let builder = AzblobBuilder::from_connection_string(
r#"
DefaultEndpointsProtocol=https;
AccountName=storagesample;
AccountKey=account-key;
EndpointSuffix=core.chinacloudapi.cn;
"#,
)
.expect("from connection string must succeed");
assert_eq!(
builder.config.endpoint.unwrap(),
"https://storagesample.blob.core.chinacloudapi.cn"
);
assert_eq!(builder.config.account_name.unwrap(), "storagesample");
assert_eq!(builder.config.account_key.unwrap(), "account-key")
}
#[test]
fn test_sas_from_connection_string() {
let builder = AzblobBuilder::from_connection_string(
r#"
BlobEndpoint=http://127.0.0.1:10000/devstoreaccount1;
QueueEndpoint=http://127.0.0.1:10001/devstoreaccount1;
TableEndpoint=http://127.0.0.1:10002/devstoreaccount1;
SharedAccessSignature=sv=2021-01-01&ss=b&srt=c&sp=rwdlaciytfx&se=2022-01-01T11:00:14Z&st=2022-01-02T03:00:14Z&spr=https&sig=KEllk4N8f7rJfLjQCmikL2fRVt%2B%2Bl73UBkbgH%2FK3VGE%3D
"#,
)
.expect("from connection string must succeed");
assert_eq!(
builder.config.endpoint.unwrap(),
"http://127.0.0.1:10000/devstoreaccount1"
);
assert_eq!(builder.config.sas_token.unwrap(), "sv=2021-01-01&ss=b&srt=c&sp=rwdlaciytfx&se=2022-01-01T11:00:14Z&st=2022-01-02T03:00:14Z&spr=https&sig=KEllk4N8f7rJfLjQCmikL2fRVt%2B%2Bl73UBkbgH%2FK3VGE%3D");
assert_eq!(builder.config.account_name, None);
assert_eq!(builder.config.account_key, None);
}
#[test]
pub fn test_sas_preferred() {
let builder = AzblobBuilder::from_connection_string(
r#"
BlobEndpoint=http://127.0.0.1:10000/devstoreaccount1;
AccountName=storagesample;
AccountKey=account-key;
SharedAccessSignature=sv=2021-01-01&ss=b&srt=c&sp=rwdlaciytfx&se=2022-01-01T11:00:14Z&st=2022-01-02T03:00:14Z&spr=https&sig=KEllk4N8f7rJfLjQCmikL2fRVt%2B%2Bl73UBkbgH%2FK3VGE%3D
"#,
)
.expect("from connection string must succeed");
assert_eq!(builder.config.sas_token.unwrap(), "sv=2021-01-01&ss=b&srt=c&sp=rwdlaciytfx&se=2022-01-01T11:00:14Z&st=2022-01-02T03:00:14Z&spr=https&sig=KEllk4N8f7rJfLjQCmikL2fRVt%2B%2Bl73UBkbgH%2FK3VGE%3D");
assert_eq!(builder.config.account_name, None);
assert_eq!(builder.config.account_key, None);
}
}