use crate::azure::client::{AzureClient, AzureConfig};
use crate::azure::credential::{
AzureAccessKey, AzureCliCredential, ClientSecretOAuthProvider, ImdsManagedIdentityProvider,
WorkloadIdentityOAuthProvider,
};
use crate::azure::{AzureCredential, AzureCredentialProvider, MicrosoftAzure, STORE};
use crate::client::TokenCredentialProvider;
use crate::config::ConfigValue;
use crate::{ClientConfigKey, ClientOptions, Result, RetryConfig, StaticCredentialProvider};
use percent_encoding::percent_decode_str;
use serde::{Deserialize, Serialize};
use snafu::{OptionExt, ResultExt, Snafu};
use std::str::FromStr;
use std::sync::Arc;
use url::Url;
const EMULATOR_ACCOUNT: &str = "devstoreaccount1";
const EMULATOR_ACCOUNT_KEY: &str =
"Eby8vdM02xNOcqFlqUwJPLlmEtlCDXJ1OUzFT50uSRZ6IFsuFq2UVErCz4I6tq/K1SZFPTOtr/KBHBeksoGMGw==";
const MSI_ENDPOINT_ENV_KEY: &str = "IDENTITY_ENDPOINT";
#[derive(Debug, Snafu)]
#[allow(missing_docs)]
enum Error {
#[snafu(display("Unable parse source url. Url: {}, Error: {}", url, source))]
UnableToParseUrl {
source: url::ParseError,
url: String,
},
#[snafu(display(
"Unable parse emulator url {}={}, Error: {}",
env_name,
env_value,
source
))]
UnableToParseEmulatorUrl {
env_name: String,
env_value: String,
source: url::ParseError,
},
#[snafu(display("Account must be specified"))]
MissingAccount {},
#[snafu(display("Container name must be specified"))]
MissingContainerName {},
#[snafu(display(
"Unknown url scheme cannot be parsed into storage location: {}",
scheme
))]
UnknownUrlScheme { scheme: String },
#[snafu(display("URL did not match any known pattern for scheme: {}", url))]
UrlNotRecognised { url: String },
#[snafu(display("Failed parsing an SAS key"))]
DecodeSasKey { source: std::str::Utf8Error },
#[snafu(display("Missing component in SAS query pair"))]
MissingSasComponent {},
#[snafu(display("Configuration key: '{}' is not known.", key))]
UnknownConfigurationKey { key: String },
}
impl From<Error> for crate::Error {
fn from(source: Error) -> Self {
match source {
Error::UnknownConfigurationKey { key } => {
Self::UnknownConfigurationKey { store: STORE, key }
}
_ => Self::Generic {
store: STORE,
source: Box::new(source),
},
}
}
}
#[derive(Default, Clone)]
pub struct MicrosoftAzureBuilder {
account_name: Option<String>,
access_key: Option<String>,
container_name: Option<String>,
bearer_token: Option<String>,
client_id: Option<String>,
client_secret: Option<String>,
tenant_id: Option<String>,
sas_query_pairs: Option<Vec<(String, String)>>,
sas_key: Option<String>,
authority_host: Option<String>,
url: Option<String>,
use_emulator: ConfigValue<bool>,
endpoint: Option<String>,
msi_endpoint: Option<String>,
object_id: Option<String>,
msi_resource_id: Option<String>,
federated_token_file: Option<String>,
use_azure_cli: ConfigValue<bool>,
retry_config: RetryConfig,
client_options: ClientOptions,
credentials: Option<AzureCredentialProvider>,
skip_signature: ConfigValue<bool>,
use_fabric_endpoint: ConfigValue<bool>,
disable_tagging: ConfigValue<bool>,
}
#[derive(PartialEq, Eq, Hash, Clone, Debug, Copy, Deserialize, Serialize)]
#[non_exhaustive]
pub enum AzureConfigKey {
AccountName,
AccessKey,
ClientId,
ClientSecret,
AuthorityId,
SasKey,
Token,
UseEmulator,
Endpoint,
UseFabricEndpoint,
MsiEndpoint,
ObjectId,
MsiResourceId,
FederatedTokenFile,
UseAzureCli,
SkipSignature,
ContainerName,
DisableTagging,
Client(ClientConfigKey),
}
impl AsRef<str> for AzureConfigKey {
fn as_ref(&self) -> &str {
match self {
Self::AccountName => "azure_storage_account_name",
Self::AccessKey => "azure_storage_account_key",
Self::ClientId => "azure_storage_client_id",
Self::ClientSecret => "azure_storage_client_secret",
Self::AuthorityId => "azure_storage_tenant_id",
Self::SasKey => "azure_storage_sas_key",
Self::Token => "azure_storage_token",
Self::UseEmulator => "azure_storage_use_emulator",
Self::UseFabricEndpoint => "azure_use_fabric_endpoint",
Self::Endpoint => "azure_storage_endpoint",
Self::MsiEndpoint => "azure_msi_endpoint",
Self::ObjectId => "azure_object_id",
Self::MsiResourceId => "azure_msi_resource_id",
Self::FederatedTokenFile => "azure_federated_token_file",
Self::UseAzureCli => "azure_use_azure_cli",
Self::SkipSignature => "azure_skip_signature",
Self::ContainerName => "azure_container_name",
Self::DisableTagging => "azure_disable_tagging",
Self::Client(key) => key.as_ref(),
}
}
}
impl FromStr for AzureConfigKey {
type Err = crate::Error;
fn from_str(s: &str) -> Result<Self, Self::Err> {
match s {
"azure_storage_account_key"
| "azure_storage_access_key"
| "azure_storage_master_key"
| "master_key"
| "account_key"
| "access_key" => Ok(Self::AccessKey),
"azure_storage_account_name" | "account_name" => Ok(Self::AccountName),
"azure_storage_client_id" | "azure_client_id" | "client_id" => Ok(Self::ClientId),
"azure_storage_client_secret" | "azure_client_secret" | "client_secret" => {
Ok(Self::ClientSecret)
}
"azure_storage_tenant_id"
| "azure_storage_authority_id"
| "azure_tenant_id"
| "azure_authority_id"
| "tenant_id"
| "authority_id" => Ok(Self::AuthorityId),
"azure_storage_sas_key" | "azure_storage_sas_token" | "sas_key" | "sas_token" => {
Ok(Self::SasKey)
}
"azure_storage_token" | "bearer_token" | "token" => Ok(Self::Token),
"azure_storage_use_emulator" | "use_emulator" => Ok(Self::UseEmulator),
"azure_storage_endpoint" | "azure_endpoint" | "endpoint" => Ok(Self::Endpoint),
"azure_msi_endpoint"
| "azure_identity_endpoint"
| "identity_endpoint"
| "msi_endpoint" => Ok(Self::MsiEndpoint),
"azure_object_id" | "object_id" => Ok(Self::ObjectId),
"azure_msi_resource_id" | "msi_resource_id" => Ok(Self::MsiResourceId),
"azure_federated_token_file" | "federated_token_file" => Ok(Self::FederatedTokenFile),
"azure_use_fabric_endpoint" | "use_fabric_endpoint" => Ok(Self::UseFabricEndpoint),
"azure_use_azure_cli" | "use_azure_cli" => Ok(Self::UseAzureCli),
"azure_skip_signature" | "skip_signature" => Ok(Self::SkipSignature),
"azure_container_name" | "container_name" => Ok(Self::ContainerName),
"azure_disable_tagging" | "disable_tagging" => Ok(Self::DisableTagging),
"azure_allow_http" => Ok(Self::Client(ClientConfigKey::AllowHttp)),
_ => match s.parse() {
Ok(key) => Ok(Self::Client(key)),
Err(_) => Err(Error::UnknownConfigurationKey { key: s.into() }.into()),
},
}
}
}
impl std::fmt::Debug for MicrosoftAzureBuilder {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
write!(
f,
"MicrosoftAzureBuilder {{ account: {:?}, container_name: {:?} }}",
self.account_name, self.container_name
)
}
}
impl MicrosoftAzureBuilder {
pub fn new() -> Self {
Default::default()
}
pub fn from_env() -> Self {
let mut builder = Self::default();
for (os_key, os_value) in std::env::vars_os() {
if let (Some(key), Some(value)) = (os_key.to_str(), os_value.to_str()) {
if key.starts_with("AZURE_") {
if let Ok(config_key) = key.to_ascii_lowercase().parse() {
builder = builder.with_config(config_key, value);
}
}
}
}
if let Ok(text) = std::env::var(MSI_ENDPOINT_ENV_KEY) {
builder = builder.with_msi_endpoint(text);
}
builder
}
pub fn with_url(mut self, url: impl Into<String>) -> Self {
self.url = Some(url.into());
self
}
pub fn with_config(mut self, key: AzureConfigKey, value: impl Into<String>) -> Self {
match key {
AzureConfigKey::AccessKey => self.access_key = Some(value.into()),
AzureConfigKey::AccountName => self.account_name = Some(value.into()),
AzureConfigKey::ClientId => self.client_id = Some(value.into()),
AzureConfigKey::ClientSecret => self.client_secret = Some(value.into()),
AzureConfigKey::AuthorityId => self.tenant_id = Some(value.into()),
AzureConfigKey::SasKey => self.sas_key = Some(value.into()),
AzureConfigKey::Token => self.bearer_token = Some(value.into()),
AzureConfigKey::MsiEndpoint => self.msi_endpoint = Some(value.into()),
AzureConfigKey::ObjectId => self.object_id = Some(value.into()),
AzureConfigKey::MsiResourceId => self.msi_resource_id = Some(value.into()),
AzureConfigKey::FederatedTokenFile => self.federated_token_file = Some(value.into()),
AzureConfigKey::UseAzureCli => self.use_azure_cli.parse(value),
AzureConfigKey::SkipSignature => self.skip_signature.parse(value),
AzureConfigKey::UseEmulator => self.use_emulator.parse(value),
AzureConfigKey::Endpoint => self.endpoint = Some(value.into()),
AzureConfigKey::UseFabricEndpoint => self.use_fabric_endpoint.parse(value),
AzureConfigKey::Client(key) => {
self.client_options = self.client_options.with_config(key, value)
}
AzureConfigKey::ContainerName => self.container_name = Some(value.into()),
AzureConfigKey::DisableTagging => self.disable_tagging.parse(value),
};
self
}
pub fn get_config_value(&self, key: &AzureConfigKey) -> Option<String> {
match key {
AzureConfigKey::AccountName => self.account_name.clone(),
AzureConfigKey::AccessKey => self.access_key.clone(),
AzureConfigKey::ClientId => self.client_id.clone(),
AzureConfigKey::ClientSecret => self.client_secret.clone(),
AzureConfigKey::AuthorityId => self.tenant_id.clone(),
AzureConfigKey::SasKey => self.sas_key.clone(),
AzureConfigKey::Token => self.bearer_token.clone(),
AzureConfigKey::UseEmulator => Some(self.use_emulator.to_string()),
AzureConfigKey::UseFabricEndpoint => Some(self.use_fabric_endpoint.to_string()),
AzureConfigKey::Endpoint => self.endpoint.clone(),
AzureConfigKey::MsiEndpoint => self.msi_endpoint.clone(),
AzureConfigKey::ObjectId => self.object_id.clone(),
AzureConfigKey::MsiResourceId => self.msi_resource_id.clone(),
AzureConfigKey::FederatedTokenFile => self.federated_token_file.clone(),
AzureConfigKey::UseAzureCli => Some(self.use_azure_cli.to_string()),
AzureConfigKey::SkipSignature => Some(self.skip_signature.to_string()),
AzureConfigKey::Client(key) => self.client_options.get_config_value(key),
AzureConfigKey::ContainerName => self.container_name.clone(),
AzureConfigKey::DisableTagging => Some(self.disable_tagging.to_string()),
}
}
fn parse_url(&mut self, url: &str) -> Result<()> {
let parsed = Url::parse(url).context(UnableToParseUrlSnafu { url })?;
let host = parsed.host_str().context(UrlNotRecognisedSnafu { url })?;
let validate = |s: &str| match s.contains('.') {
true => Err(UrlNotRecognisedSnafu { url }.build()),
false => Ok(s.to_string()),
};
match parsed.scheme() {
"az" | "adl" | "azure" => self.container_name = Some(validate(host)?),
"abfs" | "abfss" => {
if parsed.username().is_empty() {
self.container_name = Some(validate(host)?);
} else if let Some(a) = host.strip_suffix(".dfs.core.windows.net") {
self.container_name = Some(validate(parsed.username())?);
self.account_name = Some(validate(a)?);
} else if let Some(a) = host.strip_suffix(".dfs.fabric.microsoft.com") {
self.container_name = Some(validate(parsed.username())?);
self.account_name = Some(validate(a)?);
self.use_fabric_endpoint = true.into();
} else {
return Err(UrlNotRecognisedSnafu { url }.build().into());
}
}
"https" => match host.split_once('.') {
Some((a, "dfs.core.windows.net")) | Some((a, "blob.core.windows.net")) => {
self.account_name = Some(validate(a)?);
if let Some(container) = parsed.path_segments().unwrap().next() {
self.container_name = Some(validate(container)?);
}
}
Some((a, "dfs.fabric.microsoft.com")) | Some((a, "blob.fabric.microsoft.com")) => {
self.account_name = Some(validate(a)?);
if let Some(workspace) = parsed.path_segments().unwrap().next() {
if !workspace.is_empty() {
self.container_name = Some(workspace.to_string())
}
}
self.use_fabric_endpoint = true.into();
}
_ => return Err(UrlNotRecognisedSnafu { url }.build().into()),
},
scheme => return Err(UnknownUrlSchemeSnafu { scheme }.build().into()),
}
Ok(())
}
pub fn with_account(mut self, account: impl Into<String>) -> Self {
self.account_name = Some(account.into());
self
}
pub fn with_container_name(mut self, container_name: impl Into<String>) -> Self {
self.container_name = Some(container_name.into());
self
}
pub fn with_access_key(mut self, access_key: impl Into<String>) -> Self {
self.access_key = Some(access_key.into());
self
}
pub fn with_bearer_token_authorization(mut self, bearer_token: impl Into<String>) -> Self {
self.bearer_token = Some(bearer_token.into());
self
}
pub fn with_client_secret_authorization(
mut self,
client_id: impl Into<String>,
client_secret: impl Into<String>,
tenant_id: impl Into<String>,
) -> Self {
self.client_id = Some(client_id.into());
self.client_secret = Some(client_secret.into());
self.tenant_id = Some(tenant_id.into());
self
}
pub fn with_client_id(mut self, client_id: impl Into<String>) -> Self {
self.client_id = Some(client_id.into());
self
}
pub fn with_client_secret(mut self, client_secret: impl Into<String>) -> Self {
self.client_secret = Some(client_secret.into());
self
}
pub fn with_tenant_id(mut self, tenant_id: impl Into<String>) -> Self {
self.tenant_id = Some(tenant_id.into());
self
}
pub fn with_sas_authorization(mut self, query_pairs: impl Into<Vec<(String, String)>>) -> Self {
self.sas_query_pairs = Some(query_pairs.into());
self
}
pub fn with_credentials(mut self, credentials: AzureCredentialProvider) -> Self {
self.credentials = Some(credentials);
self
}
pub fn with_use_emulator(mut self, use_emulator: bool) -> Self {
self.use_emulator = use_emulator.into();
self
}
pub fn with_endpoint(mut self, endpoint: String) -> Self {
self.endpoint = Some(endpoint);
self
}
pub fn with_use_fabric_endpoint(mut self, use_fabric_endpoint: bool) -> Self {
self.use_fabric_endpoint = use_fabric_endpoint.into();
self
}
pub fn with_allow_http(mut self, allow_http: bool) -> Self {
self.client_options = self.client_options.with_allow_http(allow_http);
self
}
pub fn with_authority_host(mut self, authority_host: impl Into<String>) -> Self {
self.authority_host = Some(authority_host.into());
self
}
pub fn with_retry(mut self, retry_config: RetryConfig) -> Self {
self.retry_config = retry_config;
self
}
pub fn with_proxy_url(mut self, proxy_url: impl Into<String>) -> Self {
self.client_options = self.client_options.with_proxy_url(proxy_url);
self
}
pub fn with_proxy_ca_certificate(mut self, proxy_ca_certificate: impl Into<String>) -> Self {
self.client_options = self
.client_options
.with_proxy_ca_certificate(proxy_ca_certificate);
self
}
pub fn with_proxy_excludes(mut self, proxy_excludes: impl Into<String>) -> Self {
self.client_options = self.client_options.with_proxy_excludes(proxy_excludes);
self
}
pub fn with_client_options(mut self, options: ClientOptions) -> Self {
self.client_options = options;
self
}
pub fn with_msi_endpoint(mut self, msi_endpoint: impl Into<String>) -> Self {
self.msi_endpoint = Some(msi_endpoint.into());
self
}
pub fn with_federated_token_file(mut self, federated_token_file: impl Into<String>) -> Self {
self.federated_token_file = Some(federated_token_file.into());
self
}
pub fn with_use_azure_cli(mut self, use_azure_cli: bool) -> Self {
self.use_azure_cli = use_azure_cli.into();
self
}
pub fn with_skip_signature(mut self, skip_signature: bool) -> Self {
self.skip_signature = skip_signature.into();
self
}
pub fn with_disable_tagging(mut self, ignore: bool) -> Self {
self.disable_tagging = ignore.into();
self
}
pub fn build(mut self) -> Result<MicrosoftAzure> {
if let Some(url) = self.url.take() {
self.parse_url(&url)?;
}
let container = self.container_name.ok_or(Error::MissingContainerName {})?;
let static_creds = |credential: AzureCredential| -> AzureCredentialProvider {
Arc::new(StaticCredentialProvider::new(credential))
};
let (is_emulator, storage_url, auth, account) = if self.use_emulator.get()? {
let account_name = self
.account_name
.unwrap_or_else(|| EMULATOR_ACCOUNT.to_string());
let url = url_from_env("AZURITE_BLOB_STORAGE_URL", "http://127.0.0.1:10000")?;
let credential = if let Some(k) = self.access_key {
AzureCredential::AccessKey(AzureAccessKey::try_new(&k)?)
} else if let Some(bearer_token) = self.bearer_token {
AzureCredential::BearerToken(bearer_token)
} else if let Some(query_pairs) = self.sas_query_pairs {
AzureCredential::SASToken(query_pairs)
} else if let Some(sas) = self.sas_key {
AzureCredential::SASToken(split_sas(&sas)?)
} else {
AzureCredential::AccessKey(AzureAccessKey::try_new(EMULATOR_ACCOUNT_KEY)?)
};
self.client_options = self.client_options.with_allow_http(true);
(true, url, static_creds(credential), account_name)
} else {
let account_name = self.account_name.ok_or(Error::MissingAccount {})?;
let account_url = match self.endpoint {
Some(account_url) => account_url,
None => match self.use_fabric_endpoint.get()? {
true => {
format!("https://{}.blob.fabric.microsoft.com", &account_name)
}
false => format!("https://{}.blob.core.windows.net", &account_name),
},
};
let url =
Url::parse(&account_url).context(UnableToParseUrlSnafu { url: account_url })?;
let credential = if let Some(credential) = self.credentials {
credential
} else if let Some(bearer_token) = self.bearer_token {
static_creds(AzureCredential::BearerToken(bearer_token))
} else if let Some(access_key) = self.access_key {
let key = AzureAccessKey::try_new(&access_key)?;
static_creds(AzureCredential::AccessKey(key))
} else if let (Some(client_id), Some(tenant_id), Some(federated_token_file)) =
(&self.client_id, &self.tenant_id, self.federated_token_file)
{
let client_credential = WorkloadIdentityOAuthProvider::new(
client_id,
federated_token_file,
tenant_id,
self.authority_host,
);
Arc::new(TokenCredentialProvider::new(
client_credential,
self.client_options.client()?,
self.retry_config.clone(),
)) as _
} else if let (Some(client_id), Some(client_secret), Some(tenant_id)) =
(&self.client_id, self.client_secret, &self.tenant_id)
{
let client_credential = ClientSecretOAuthProvider::new(
client_id.clone(),
client_secret,
tenant_id,
self.authority_host,
);
Arc::new(TokenCredentialProvider::new(
client_credential,
self.client_options.client()?,
self.retry_config.clone(),
)) as _
} else if let Some(query_pairs) = self.sas_query_pairs {
static_creds(AzureCredential::SASToken(query_pairs))
} else if let Some(sas) = self.sas_key {
static_creds(AzureCredential::SASToken(split_sas(&sas)?))
} else if self.use_azure_cli.get()? {
Arc::new(AzureCliCredential::new()) as _
} else {
let msi_credential = ImdsManagedIdentityProvider::new(
self.client_id,
self.object_id,
self.msi_resource_id,
self.msi_endpoint,
);
Arc::new(TokenCredentialProvider::new(
msi_credential,
self.client_options.metadata_client()?,
self.retry_config.clone(),
)) as _
};
(false, url, credential, account_name)
};
let config = AzureConfig {
account,
is_emulator,
skip_signature: self.skip_signature.get()?,
container,
disable_tagging: self.disable_tagging.get()?,
retry_config: self.retry_config,
client_options: self.client_options,
service: storage_url,
credentials: auth,
};
let client = Arc::new(AzureClient::new(config)?);
Ok(MicrosoftAzure { client })
}
}
fn url_from_env(env_name: &str, default_url: &str) -> Result<Url> {
let url = match std::env::var(env_name) {
Ok(env_value) => Url::parse(&env_value).context(UnableToParseEmulatorUrlSnafu {
env_name,
env_value,
})?,
Err(_) => Url::parse(default_url).expect("Failed to parse default URL"),
};
Ok(url)
}
fn split_sas(sas: &str) -> Result<Vec<(String, String)>, Error> {
let sas = percent_decode_str(sas)
.decode_utf8()
.context(DecodeSasKeySnafu {})?;
let kv_str_pairs = sas
.trim_start_matches('?')
.split('&')
.filter(|s| !s.chars().all(char::is_whitespace));
let mut pairs = Vec::new();
for kv_pair_str in kv_str_pairs {
let (k, v) = kv_pair_str
.trim()
.split_once('=')
.ok_or(Error::MissingSasComponent {})?;
pairs.push((k.into(), v.into()))
}
Ok(pairs)
}
#[cfg(test)]
mod tests {
use super::*;
use std::collections::HashMap;
#[test]
fn azure_blob_test_urls() {
let mut builder = MicrosoftAzureBuilder::new();
builder
.parse_url("abfss://file_system@account.dfs.core.windows.net/")
.unwrap();
assert_eq!(builder.account_name, Some("account".to_string()));
assert_eq!(builder.container_name, Some("file_system".to_string()));
assert!(!builder.use_fabric_endpoint.get().unwrap());
let mut builder = MicrosoftAzureBuilder::new();
builder
.parse_url("abfss://file_system@account.dfs.fabric.microsoft.com/")
.unwrap();
assert_eq!(builder.account_name, Some("account".to_string()));
assert_eq!(builder.container_name, Some("file_system".to_string()));
assert!(builder.use_fabric_endpoint.get().unwrap());
let mut builder = MicrosoftAzureBuilder::new();
builder.parse_url("abfs://container/path").unwrap();
assert_eq!(builder.container_name, Some("container".to_string()));
let mut builder = MicrosoftAzureBuilder::new();
builder.parse_url("az://container").unwrap();
assert_eq!(builder.container_name, Some("container".to_string()));
let mut builder = MicrosoftAzureBuilder::new();
builder.parse_url("az://container/path").unwrap();
assert_eq!(builder.container_name, Some("container".to_string()));
let mut builder = MicrosoftAzureBuilder::new();
builder
.parse_url("https://account.dfs.core.windows.net/")
.unwrap();
assert_eq!(builder.account_name, Some("account".to_string()));
assert!(!builder.use_fabric_endpoint.get().unwrap());
let mut builder = MicrosoftAzureBuilder::new();
builder
.parse_url("https://account.blob.core.windows.net/")
.unwrap();
assert_eq!(builder.account_name, Some("account".to_string()));
assert!(!builder.use_fabric_endpoint.get().unwrap());
let mut builder = MicrosoftAzureBuilder::new();
builder
.parse_url("https://account.blob.core.windows.net/container")
.unwrap();
assert_eq!(builder.account_name, Some("account".to_string()));
assert_eq!(builder.container_name, Some("container".to_string()));
assert!(!builder.use_fabric_endpoint.get().unwrap());
let mut builder = MicrosoftAzureBuilder::new();
builder
.parse_url("https://account.dfs.fabric.microsoft.com/")
.unwrap();
assert_eq!(builder.account_name, Some("account".to_string()));
assert_eq!(builder.container_name, None);
assert!(builder.use_fabric_endpoint.get().unwrap());
let mut builder = MicrosoftAzureBuilder::new();
builder
.parse_url("https://account.dfs.fabric.microsoft.com/container")
.unwrap();
assert_eq!(builder.account_name, Some("account".to_string()));
assert_eq!(builder.container_name.as_deref(), Some("container"));
assert!(builder.use_fabric_endpoint.get().unwrap());
let mut builder = MicrosoftAzureBuilder::new();
builder
.parse_url("https://account.blob.fabric.microsoft.com/")
.unwrap();
assert_eq!(builder.account_name, Some("account".to_string()));
assert_eq!(builder.container_name, None);
assert!(builder.use_fabric_endpoint.get().unwrap());
let mut builder = MicrosoftAzureBuilder::new();
builder
.parse_url("https://account.blob.fabric.microsoft.com/container")
.unwrap();
assert_eq!(builder.account_name, Some("account".to_string()));
assert_eq!(builder.container_name.as_deref(), Some("container"));
assert!(builder.use_fabric_endpoint.get().unwrap());
let err_cases = [
"mailto://account.blob.core.windows.net/",
"az://blob.mydomain/",
"abfs://container.foo/path",
"abfss://file_system@account.foo.dfs.core.windows.net/",
"abfss://file_system.bar@account.dfs.core.windows.net/",
"https://blob.mydomain/",
"https://blob.foo.dfs.core.windows.net/",
];
let mut builder = MicrosoftAzureBuilder::new();
for case in err_cases {
builder.parse_url(case).unwrap_err();
}
}
#[test]
fn azure_test_config_from_map() {
let azure_client_id = "object_store:fake_access_key_id";
let azure_storage_account_name = "object_store:fake_secret_key";
let azure_storage_token = "object_store:fake_default_region";
let options = HashMap::from([
("azure_client_id", azure_client_id),
("azure_storage_account_name", azure_storage_account_name),
("azure_storage_token", azure_storage_token),
]);
let builder = options
.into_iter()
.fold(MicrosoftAzureBuilder::new(), |builder, (key, value)| {
builder.with_config(key.parse().unwrap(), value)
});
assert_eq!(builder.client_id.unwrap(), azure_client_id);
assert_eq!(builder.account_name.unwrap(), azure_storage_account_name);
assert_eq!(builder.bearer_token.unwrap(), azure_storage_token);
}
#[test]
fn azure_test_split_sas() {
let raw_sas = "?sv=2021-10-04&st=2023-01-04T17%3A48%3A57Z&se=2023-01-04T18%3A15%3A00Z&sr=c&sp=rcwl&sig=C7%2BZeEOWbrxPA3R0Cw%2Fw1EZz0%2B4KBvQexeKZKe%2BB6h0%3D";
let expected = vec![
("sv".to_string(), "2021-10-04".to_string()),
("st".to_string(), "2023-01-04T17:48:57Z".to_string()),
("se".to_string(), "2023-01-04T18:15:00Z".to_string()),
("sr".to_string(), "c".to_string()),
("sp".to_string(), "rcwl".to_string()),
(
"sig".to_string(),
"C7+ZeEOWbrxPA3R0Cw/w1EZz0+4KBvQexeKZKe+B6h0=".to_string(),
),
];
let pairs = split_sas(raw_sas).unwrap();
assert_eq!(expected, pairs);
}
}