| // Licensed to the Apache Software Foundation (ASF) under one |
| // or more contributor license agreements. See the NOTICE file |
| // distributed with this work for additional information |
| // regarding copyright ownership. The ASF licenses this file |
| // to you under the Apache License, Version 2.0 (the |
| // "License"); you may not use this file except in compliance |
| // with the License. You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, |
| // software distributed under the License is distributed on an |
| // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| // KIND, either express or implied. See the License for the |
| // specific language governing permissions and limitations |
| // under the License. |
| |
| use std::fmt::Debug; |
| use std::sync::Arc; |
| |
| use http::Response; |
| use http::StatusCode; |
| use log::debug; |
| use reqsign_azure_storage::DefaultCredentialProvider; |
| use reqsign_azure_storage::RequestSigner; |
| use reqsign_azure_storage::StaticCredentialProvider; |
| use reqsign_core::Context; |
| use reqsign_core::Env as _; |
| use reqsign_core::OsEnv; |
| use reqsign_core::Signer; |
| use reqsign_core::StaticEnv; |
| use reqsign_file_read_tokio::TokioFileRead; |
| |
| use super::AZFILE_SCHEME; |
| use super::config::AzfileConfig; |
| use super::core::AzfileCore; |
| use super::core::X_MS_META_PREFIX; |
| use super::deleter::AzfileDeleter; |
| use super::error::parse_error; |
| use super::lister::AzfileLister; |
| use super::writer::AzfileWriter; |
| use super::writer::AzfileWriters; |
| use opendal_core::raw::*; |
| use opendal_core::*; |
| use opendal_service_azure_common::{ |
| AzureStorageConfig as AzureConnectionConfig, AzureStorageService, |
| azure_account_name_from_endpoint, azure_config_from_connection_string, |
| }; |
| |
| impl From<AzureConnectionConfig> for AzfileConfig { |
| fn from(config: AzureConnectionConfig) -> Self { |
| AzfileConfig { |
| account_name: config.account_name, |
| account_key: config.account_key, |
| sas_token: config.sas_token, |
| endpoint: config.endpoint, |
| root: None, // root is not part of AzureStorageConfig |
| share_name: String::new(), // share_name is not part of AzureStorageConfig |
| } |
| } |
| } |
| |
| /// Azure File services support. |
| #[doc = include_str!("docs.md")] |
| #[derive(Default)] |
| pub struct AzfileBuilder { |
| pub(super) config: AzfileConfig, |
| } |
| |
| impl Debug for AzfileBuilder { |
| fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { |
| f.debug_struct("AzfileBuilder") |
| .field("config", &self.config) |
| .finish_non_exhaustive() |
| } |
| } |
| |
| impl AzfileBuilder { |
| /// Set root of this backend. |
| /// |
| /// All operations will happen under this root. |
| pub fn root(mut self, root: &str) -> Self { |
| self.config.root = if root.is_empty() { |
| None |
| } else { |
| Some(root.to_string()) |
| }; |
| |
| self |
| } |
| |
| /// Set endpoint of this backend. |
| pub fn endpoint(mut self, endpoint: &str) -> Self { |
| if !endpoint.is_empty() { |
| // Trim trailing `/` so that we can accept `http://127.0.0.1:9000/` |
| self.config.endpoint = Some(endpoint.trim_end_matches('/').to_string()); |
| } |
| |
| self |
| } |
| |
| /// Set account_name of this backend. |
| /// |
| /// - If account_name is set, we will take user's input first. |
| /// - If not, we will try to load it from environment. |
| pub fn account_name(mut self, account_name: &str) -> Self { |
| if !account_name.is_empty() { |
| self.config.account_name = Some(account_name.to_string()); |
| } |
| |
| self |
| } |
| |
| /// Set account_key of this backend. |
| /// |
| /// - If account_key is set, we will take user's input first. |
| /// - If not, we will try to load it from environment. |
| pub fn account_key(mut self, account_key: &str) -> Self { |
| if !account_key.is_empty() { |
| self.config.account_key = Some(account_key.to_string()); |
| } |
| |
| self |
| } |
| |
| /// Set file share name of this backend. |
| /// |
| /// # Notes |
| /// You can find more about from: <https://learn.microsoft.com/en-us/rest/api/storageservices/operations-on-shares--file-service> |
| pub fn share_name(mut self, share_name: &str) -> Self { |
| if !share_name.is_empty() { |
| self.config.share_name = share_name.to_string(); |
| } |
| |
| self |
| } |
| |
| /// Create a new `AfileBuilder` instance from an [Azure Storage connection string][1]. |
| /// |
| /// [1]: https://learn.microsoft.com/en-us/azure/storage/common/storage-configure-connection-string |
| /// |
| /// # Example |
| /// ``` |
| /// use opendal_core::Builder; |
| /// use opendal_service_azfile::Azfile; |
| /// |
| /// let conn_str = "AccountName=example;DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net"; |
| /// |
| /// let mut config = Azfile::from_connection_string(&conn_str) |
| /// .unwrap() |
| /// // Add additional configuration if needed |
| /// .share_name("myShare") |
| /// .build() |
| /// .unwrap(); |
| /// ``` |
| pub fn from_connection_string(conn_str: &str) -> Result<Self> { |
| let config = azure_config_from_connection_string(conn_str, AzureStorageService::File)?; |
| |
| Ok(AzfileConfig::from(config).into_builder()) |
| } |
| } |
| |
| impl Builder for AzfileBuilder { |
| type Config = AzfileConfig; |
| |
| fn build(self) -> Result<impl Access> { |
| debug!("backend build started: {:?}", &self); |
| |
| let root = normalize_root(&self.config.root.unwrap_or_default()); |
| debug!("backend use root {root}"); |
| |
| let endpoint = match &self.config.endpoint { |
| Some(endpoint) => Ok(endpoint.clone()), |
| None => Err(Error::new(ErrorKind::ConfigInvalid, "endpoint is empty") |
| .with_operation("Builder::build") |
| .with_context("service", AZFILE_SCHEME)), |
| }?; |
| debug!("backend use endpoint {}", &endpoint); |
| |
| let account_name_option = self |
| .config |
| .account_name |
| .clone() |
| .or_else(|| azure_account_name_from_endpoint(endpoint.as_str())); |
| |
| let account_name = match account_name_option { |
| Some(account_name) => Ok(account_name), |
| None => Err( |
| Error::new(ErrorKind::ConfigInvalid, "account_name is empty") |
| .with_operation("Builder::build") |
| .with_context("service", AZFILE_SCHEME), |
| ), |
| }?; |
| |
| let mut envs = std::collections::HashMap::new(); |
| envs.insert("AZBLOB_ACCOUNT_NAME".to_string(), account_name.clone()); |
| envs.insert( |
| "AZURE_STORAGE_ACCOUNT_NAME".to_string(), |
| account_name.clone(), |
| ); |
| |
| if let Some(v) = &self.config.account_key { |
| envs.insert("AZBLOB_ACCOUNT_KEY".to_string(), v.clone()); |
| envs.insert("AZURE_STORAGE_ACCOUNT_KEY".to_string(), v.clone()); |
| } |
| if let Some(v) = &self.config.sas_token { |
| envs.insert("AZURE_STORAGE_SAS_TOKEN".to_string(), v.clone()); |
| } |
| |
| let os_env = OsEnv; |
| let info = Arc::new(AccessorInfo::default()); |
| |
| let ctx = Context::new() |
| .with_file_read(TokioFileRead) |
| .with_http_send(AccessorInfoHttpSend::new(info.clone())) |
| .with_env(StaticEnv { |
| home_dir: os_env.home_dir(), |
| envs, |
| }); |
| |
| let mut credential = DefaultCredentialProvider::new(); |
| if let Some(account_key) = self.config.account_key.as_deref() { |
| credential = credential.push_front(StaticCredentialProvider::new_shared_key( |
| &account_name, |
| account_key, |
| )); |
| } |
| if let Some(sas_token) = self.config.sas_token.as_deref() { |
| credential = credential.push_front(StaticCredentialProvider::new_sas_token(sas_token)); |
| } |
| |
| let signer = Signer::new(ctx, credential, RequestSigner::new()); |
| Ok(AzfileBackend { |
| core: Arc::new(AzfileCore { |
| info: { |
| info.set_scheme(AZFILE_SCHEME) |
| .set_root(&root) |
| .set_native_capability(Capability { |
| stat: true, |
| |
| read: true, |
| |
| write: true, |
| write_with_user_metadata: true, |
| |
| create_dir: true, |
| delete: true, |
| rename: true, |
| |
| list: true, |
| |
| shared: true, |
| |
| ..Default::default() |
| }); |
| |
| info.clone() |
| }, |
| root, |
| endpoint, |
| signer, |
| share_name: self.config.share_name.clone(), |
| }), |
| }) |
| } |
| } |
| |
| /// Backend for azfile services. |
| #[derive(Debug, Clone)] |
| pub struct AzfileBackend { |
| core: Arc<AzfileCore>, |
| } |
| |
| impl Access for AzfileBackend { |
| type Reader = HttpBody; |
| type Writer = AzfileWriters; |
| type Lister = oio::PageLister<AzfileLister>; |
| type Deleter = oio::OneShotDeleter<AzfileDeleter>; |
| |
| fn info(&self) -> Arc<AccessorInfo> { |
| self.core.info.clone() |
| } |
| |
| async fn create_dir(&self, path: &str, _: OpCreateDir) -> Result<RpCreateDir> { |
| self.core.ensure_parent_dir_exists(path).await?; |
| let resp = self.core.azfile_create_dir(path).await?; |
| let status = resp.status(); |
| |
| match status { |
| StatusCode::CREATED => Ok(RpCreateDir::default()), |
| _ => { |
| // we cannot just check status code because 409 Conflict has two meaning: |
| // 1. If a directory by the same name is being deleted when Create Directory is called, the server returns status code 409 (Conflict) |
| // 2. If a directory or file with the same name already exists, the operation fails with status code 409 (Conflict). |
| // but we just need case 2 (already exists) |
| // ref: https://learn.microsoft.com/en-us/rest/api/storageservices/create-directory |
| if resp |
| .headers() |
| .get("x-ms-error-code") |
| .map(|value| value.to_str().unwrap_or("")) |
| .unwrap_or_else(|| "") |
| == "ResourceAlreadyExists" |
| { |
| Ok(RpCreateDir::default()) |
| } else { |
| Err(parse_error(resp)) |
| } |
| } |
| } |
| } |
| |
| async fn stat(&self, path: &str, _: OpStat) -> Result<RpStat> { |
| let resp = if path.ends_with('/') { |
| self.core.azfile_get_directory_properties(path).await? |
| } else { |
| self.core.azfile_get_file_properties(path).await? |
| }; |
| |
| let status = resp.status(); |
| match status { |
| StatusCode::OK => { |
| let headers = resp.headers(); |
| let mut meta = parse_into_metadata(path, headers)?; |
| let user_meta = parse_prefixed_headers(headers, X_MS_META_PREFIX); |
| if !user_meta.is_empty() { |
| meta = meta.with_user_metadata(user_meta); |
| } |
| Ok(RpStat::new(meta)) |
| } |
| _ => Err(parse_error(resp)), |
| } |
| } |
| |
| async fn read(&self, path: &str, args: OpRead) -> Result<(RpRead, Self::Reader)> { |
| let resp = self.core.azfile_read(path, args.range()).await?; |
| |
| let status = resp.status(); |
| match status { |
| StatusCode::OK | StatusCode::PARTIAL_CONTENT => Ok((RpRead::new(), resp.into_body())), |
| _ => { |
| let (part, mut body) = resp.into_parts(); |
| let buf = body.to_buffer().await?; |
| Err(parse_error(Response::from_parts(part, buf))) |
| } |
| } |
| } |
| |
| async fn write(&self, path: &str, args: OpWrite) -> Result<(RpWrite, Self::Writer)> { |
| self.core.ensure_parent_dir_exists(path).await?; |
| let w = AzfileWriter::new(self.core.clone(), args.clone(), path.to_string()); |
| let w = if args.append() { |
| AzfileWriters::Two(oio::AppendWriter::new(w)) |
| } else { |
| AzfileWriters::One(oio::OneShotWriter::new(w)) |
| }; |
| Ok((RpWrite::default(), w)) |
| } |
| |
| async fn delete(&self) -> Result<(RpDelete, Self::Deleter)> { |
| Ok(( |
| RpDelete::default(), |
| oio::OneShotDeleter::new(AzfileDeleter::new(self.core.clone())), |
| )) |
| } |
| |
| async fn list(&self, path: &str, args: OpList) -> Result<(RpList, Self::Lister)> { |
| let l = AzfileLister::new(self.core.clone(), path.to_string(), args.limit()); |
| |
| Ok((RpList::default(), oio::PageLister::new(l))) |
| } |
| |
| async fn rename(&self, from: &str, to: &str, _: OpRename) -> Result<RpRename> { |
| self.core.ensure_parent_dir_exists(to).await?; |
| let resp = self.core.azfile_rename(from, to).await?; |
| let status = resp.status(); |
| match status { |
| StatusCode::OK => Ok(RpRename::default()), |
| _ => Err(parse_error(resp)), |
| } |
| } |
| } |