@@ -23,21 +23,21 @@ import (
23
23
)
24
24
25
25
type Client struct {
26
- // These Clients are only initialized if an Access Key isn't provided
26
+ environment environments.Environment
27
+ storageAccountName string
28
+
29
+ // Storage ARM client is used for looking up the blob endpoint, or/and listing access key (if not specified).
27
30
storageAccountsClient * storageaccounts.StorageAccountsClient
31
+ // This is only non-nil if the config has specified to lookup the blob endpoint
32
+ accountDetail * AccountDetails
28
33
29
34
// Caching
30
35
containersClient * containers.Client
31
36
blobsClient * blobs.Client
32
37
33
- environment environments.Environment
34
- storageAccountName string
35
-
36
- accountDetail * AccountDetails
37
-
38
- accessKey string
39
- sasToken string
40
- // azureAdStorageAuth is only here if we're using AzureAD Authentication but is an Authorizer for Storage
38
+ // Only one of them shall be specified
39
+ accessKey string
40
+ sasToken string
41
41
azureAdStorageAuth auth.Authorizer
42
42
}
43
43
@@ -47,54 +47,71 @@ func buildClient(ctx context.Context, config BackendConfig) (*Client, error) {
47
47
storageAccountName : config .StorageAccountName ,
48
48
}
49
49
50
- // if we have an Access Key - we don't need the other clients
51
- if config .AccessKey != "" {
50
+ var armAuthRequired bool
51
+ switch {
52
+ case config .AccessKey != "" :
52
53
client .accessKey = config .AccessKey
53
- return & client , nil
54
- }
55
-
56
- // likewise with a SAS token
57
- if config .SasToken != "" {
54
+ case config .SasToken != "" :
58
55
sasToken := config .SasToken
59
56
if strings .TrimSpace (sasToken ) == "" {
60
57
return nil , fmt .Errorf ("sasToken cannot be empty" )
61
58
}
62
59
client .sasToken = strings .TrimPrefix (sasToken , "?" )
63
-
64
- return & client , nil
65
- }
66
-
67
- if config .UseAzureADAuthentication {
60
+ case config .UseAzureADAuthentication :
68
61
var err error
69
62
client .azureAdStorageAuth , err = auth .NewAuthorizerFromCredentials (ctx , * config .AuthConfig , config .AuthConfig .Environment .Storage )
70
63
if err != nil {
71
64
return nil , fmt .Errorf ("unable to build authorizer for Storage API: %+v" , err )
72
65
}
66
+ default :
67
+ // AAD authentication (ARM scope) is required only when no auth method is specified, which falls back to listing the access key via ARM API.
68
+ armAuthRequired = true
73
69
}
74
70
75
- resourceManagerAuth , err := auth . NewAuthorizerFromCredentials ( ctx , * config .AuthConfig , config . AuthConfig . Environment . ResourceManager )
76
- if err != nil {
77
- return nil , fmt . Errorf ( "unable to build authorizer for Resource Manager API: %+v" , err )
71
+ // If ` config.LookupBlobEndpoint` is true, we need to authenticate with ARM to lookup the blob endpoint
72
+ if config . LookupBlobEndpoint {
73
+ armAuthRequired = true
78
74
}
79
75
80
- client . storageAccountsClient , err = storageaccounts . NewStorageAccountsClientWithBaseURI ( config . AuthConfig . Environment . ResourceManager )
81
- if err != nil {
82
- return nil , fmt . Errorf ( "building Storage Accounts client: %+v" , err )
83
- }
84
- client . configureClient ( client . storageAccountsClient . Client , resourceManagerAuth )
76
+ if armAuthRequired {
77
+ resourceManagerAuth , err := auth . NewAuthorizerFromCredentials ( ctx , * config . AuthConfig , config . AuthConfig . Environment . ResourceManager )
78
+ if err != nil {
79
+ return nil , fmt . Errorf ( "unable to build authorizer for Resource Manager API: %+v" , err )
80
+ }
85
81
86
- // Populating the storage account detail
87
- storageAccountId := commonids .NewStorageAccountID (config .SubscriptionID , config .ResourceGroupName , client .storageAccountName )
88
- resp , err := client .storageAccountsClient .GetProperties (ctx , storageAccountId , storageaccounts .DefaultGetPropertiesOperationOptions ())
89
- if err != nil {
90
- return nil , fmt .Errorf ("retrieving %s: %+v" , storageAccountId , err )
91
- }
92
- if resp .Model == nil {
93
- return nil , fmt .Errorf ("retrieving %s: model was nil" , storageAccountId )
94
- }
95
- client .accountDetail , err = populateAccountDetails (storageAccountId , * resp .Model )
96
- if err != nil {
97
- return nil , fmt .Errorf ("populating details for %s: %+v" , storageAccountId , err )
82
+ // When using Azure CLI to auth, the user can leave the "subscription_id" unspecified. In this case the subscription id is inferred from
83
+ // the Azure CLI default subscription.
84
+ if config .SubscriptionID == "" {
85
+ if cachedAuth , ok := resourceManagerAuth .(* auth.CachedAuthorizer ); ok {
86
+ if cliAuth , ok := cachedAuth .Source .(* auth.AzureCliAuthorizer ); ok && cliAuth .DefaultSubscriptionID != "" {
87
+ config .SubscriptionID = cliAuth .DefaultSubscriptionID
88
+ }
89
+ }
90
+ }
91
+ if config .SubscriptionID == "" {
92
+ return nil , fmt .Errorf ("subscription id not specified" )
93
+ }
94
+
95
+ // Setup the SA client.
96
+ client .storageAccountsClient , err = storageaccounts .NewStorageAccountsClientWithBaseURI (config .AuthConfig .Environment .ResourceManager )
97
+ if err != nil {
98
+ return nil , fmt .Errorf ("building Storage Accounts client: %+v" , err )
99
+ }
100
+ client .configureClient (client .storageAccountsClient .Client , resourceManagerAuth )
101
+
102
+ // Populating the storage account detail
103
+ storageAccountId := commonids .NewStorageAccountID (config .SubscriptionID , config .ResourceGroupName , client .storageAccountName )
104
+ resp , err := client .storageAccountsClient .GetProperties (ctx , storageAccountId , storageaccounts .DefaultGetPropertiesOperationOptions ())
105
+ if err != nil {
106
+ return nil , fmt .Errorf ("retrieving %s: %+v" , storageAccountId , err )
107
+ }
108
+ if resp .Model == nil {
109
+ return nil , fmt .Errorf ("retrieving %s: model was nil" , storageAccountId )
110
+ }
111
+ client .accountDetail , err = populateAccountDetails (storageAccountId , * resp .Model )
112
+ if err != nil {
113
+ return nil , fmt .Errorf ("populating details for %s: %+v" , storageAccountId , err )
114
+ }
98
115
}
99
116
100
117
return & client , nil
@@ -111,16 +128,29 @@ func (c *Client) getBlobClient(ctx context.Context) (bc *blobs.Client, err error
111
128
}
112
129
}()
113
130
114
- if c .sasToken != "" {
115
- log .Printf ("[DEBUG] Building the Blob Client from a SAS Token" )
116
- baseURL , err := naiveStorageAccountBlobBaseURL (c .environment , c .storageAccountName )
131
+ var baseUri string
132
+ if c .accountDetail != nil {
133
+ // Use the actual blob endpoint if available
134
+ pBaseUri , err := c .accountDetail .DataPlaneEndpoint (EndpointTypeBlob )
117
135
if err != nil {
118
- return nil , fmt . Errorf ( "build storage account blob base URL: %v" , err )
136
+ return nil , err
119
137
}
120
- blobsClient , err := blobs .NewWithBaseUri (baseURL )
138
+ baseUri = * pBaseUri
139
+ } else {
140
+ baseUri , err = naiveStorageAccountBlobBaseURL (c .environment , c .storageAccountName )
121
141
if err != nil {
122
- return nil , fmt . Errorf ( "new blob client: %v" , err )
142
+ return nil , err
123
143
}
144
+ }
145
+
146
+ blobsClient , err := blobs .NewWithBaseUri (baseUri )
147
+ if err != nil {
148
+ return nil , fmt .Errorf ("new blob client: %v" , err )
149
+ }
150
+
151
+ switch {
152
+ case c .sasToken != "" :
153
+ log .Printf ("[DEBUG] Building the Blob Client from a SAS Token" )
124
154
c .configureClient (blobsClient .Client , nil )
125
155
blobsClient .Client .AppendRequestMiddleware (func (r * http.Request ) (* http.Request , error ) {
126
156
if r .URL .RawQuery == "" {
@@ -131,59 +161,35 @@ func (c *Client) getBlobClient(ctx context.Context) (bc *blobs.Client, err error
131
161
return r , nil
132
162
})
133
163
return blobsClient , nil
134
- }
135
164
136
- if c .accessKey != "" {
165
+ case c .accessKey != "" :
137
166
log .Printf ("[DEBUG] Building the Blob Client from an Access Key" )
138
- baseURL , err := naiveStorageAccountBlobBaseURL (c .environment , c .storageAccountName )
139
- if err != nil {
140
- return nil , fmt .Errorf ("build storage account blob base URL: %v" , err )
141
- }
142
- blobsClient , err := blobs .NewWithBaseUri (baseURL )
143
- if err != nil {
144
- return nil , fmt .Errorf ("new blob client: %v" , err )
145
- }
146
- c .configureClient (blobsClient .Client , nil )
147
-
148
167
authorizer , err := auth .NewSharedKeyAuthorizer (c .storageAccountName , c .accessKey , auth .SharedKey )
149
168
if err != nil {
150
169
return nil , fmt .Errorf ("new shared key authorizer: %v" , err )
151
170
}
152
171
c .configureClient (blobsClient .Client , authorizer )
153
-
154
172
return blobsClient , nil
155
- }
156
173
157
- // Neither shared access key nor sas token specified, then we have the storage account details populated.
158
- // This detail can be used to get the "most" correct blob endpoint comparing to the naive construction.
159
- baseUri , err := c .accountDetail .DataPlaneEndpoint (EndpointTypeBlob )
160
- if err != nil {
161
- return nil , err
162
- }
163
- blobsClient , err := blobs .NewWithBaseUri (* baseUri )
164
- if err != nil {
165
- return nil , fmt .Errorf ("new blob client: %v" , err )
166
- }
167
-
168
- if c .azureAdStorageAuth != nil {
174
+ case c .azureAdStorageAuth != nil :
169
175
log .Printf ("[DEBUG] Building the Blob Client from AAD auth" )
170
176
c .configureClient (blobsClient .Client , c .azureAdStorageAuth )
171
177
return blobsClient , nil
172
- }
173
-
174
- log .Printf ("[DEBUG] Building the Blob Client from an Access Token (using user credentials)" )
175
- key , err := c .accountDetail .AccountKey (ctx , c .storageAccountsClient )
176
- if err != nil {
177
- return nil , fmt .Errorf ("retrieving key for Storage Account %q: %s" , c .storageAccountName , err )
178
- }
179
178
180
- authorizer , err := auth .NewSharedKeyAuthorizer (c .storageAccountName , * key , auth .SharedKey )
181
- if err != nil {
182
- return nil , fmt .Errorf ("new shared key authorizer: %v" , err )
179
+ default :
180
+ // Neither shared access key, sas token, or AAD Auth were specified so we have to call the management plane API to get the key.
181
+ log .Printf ("[DEBUG] Building the Blob Client from an Access Key (key is listed using client credentials)" )
182
+ key , err := c .accountDetail .AccountKey (ctx , c .storageAccountsClient )
183
+ if err != nil {
184
+ return nil , fmt .Errorf ("retrieving key for Storage Account %q: %s" , c .storageAccountName , err )
185
+ }
186
+ authorizer , err := auth .NewSharedKeyAuthorizer (c .storageAccountName , * key , auth .SharedKey )
187
+ if err != nil {
188
+ return nil , fmt .Errorf ("new shared key authorizer: %v" , err )
189
+ }
190
+ c .configureClient (blobsClient .Client , authorizer )
191
+ return blobsClient , nil
183
192
}
184
- c .configureClient (blobsClient .Client , authorizer )
185
-
186
- return blobsClient , nil
187
193
}
188
194
189
195
func (c * Client ) getContainersClient (ctx context.Context ) (cc * containers.Client , err error ) {
@@ -197,16 +203,29 @@ func (c *Client) getContainersClient(ctx context.Context) (cc *containers.Client
197
203
}
198
204
}()
199
205
200
- if c .sasToken != "" {
201
- log .Printf ("[DEBUG] Building the Container Client from a SAS Token" )
202
- baseURL , err := naiveStorageAccountBlobBaseURL (c .environment , c .storageAccountName )
206
+ var baseUri string
207
+ if c .accountDetail != nil {
208
+ // Use the actual blob endpoint if available
209
+ pBaseUri , err := c .accountDetail .DataPlaneEndpoint (EndpointTypeBlob )
203
210
if err != nil {
204
- return nil , fmt . Errorf ( "build storage account blob base URL: %v" , err )
211
+ return nil , err
205
212
}
206
- containersClient , err := containers .NewWithBaseUri (baseURL )
213
+ baseUri = * pBaseUri
214
+ } else {
215
+ baseUri , err = naiveStorageAccountBlobBaseURL (c .environment , c .storageAccountName )
207
216
if err != nil {
208
- return nil , fmt . Errorf ( "new container client: %v" , err )
217
+ return nil , err
209
218
}
219
+ }
220
+
221
+ containersClient , err := containers .NewWithBaseUri (baseUri )
222
+ if err != nil {
223
+ return nil , fmt .Errorf ("new container client: %v" , err )
224
+ }
225
+
226
+ switch {
227
+ case c .sasToken != "" :
228
+ log .Printf ("[DEBUG] Building the Container Client from a SAS Token" )
210
229
c .configureClient (containersClient .Client , nil )
211
230
containersClient .Client .AppendRequestMiddleware (func (r * http.Request ) (* http.Request , error ) {
212
231
if r .URL .RawQuery == "" {
@@ -217,59 +236,35 @@ func (c *Client) getContainersClient(ctx context.Context) (cc *containers.Client
217
236
return r , nil
218
237
})
219
238
return containersClient , nil
220
- }
221
239
222
- if c .accessKey != "" {
240
+ case c .accessKey != "" :
223
241
log .Printf ("[DEBUG] Building the Container Client from an Access Key" )
224
- baseURL , err := naiveStorageAccountBlobBaseURL (c .environment , c .storageAccountName )
225
- if err != nil {
226
- return nil , fmt .Errorf ("build storage account blob base URL: %v" , err )
227
- }
228
- containersClient , err := containers .NewWithBaseUri (baseURL )
229
- if err != nil {
230
- return nil , fmt .Errorf ("new container client: %v" , err )
231
- }
232
- c .configureClient (containersClient .Client , nil )
233
-
234
242
authorizer , err := auth .NewSharedKeyAuthorizer (c .storageAccountName , c .accessKey , auth .SharedKey )
235
243
if err != nil {
236
244
return nil , fmt .Errorf ("new shared key authorizer: %v" , err )
237
245
}
238
246
c .configureClient (containersClient .Client , authorizer )
239
-
240
247
return containersClient , nil
241
- }
242
-
243
- // Neither shared access key nor sas token specified, then we have the storage account details populated.
244
- // This detail can be used to get the "most" correct blob endpoint comparing to the naive construction.
245
- baseUri , err := c .accountDetail .DataPlaneEndpoint (EndpointTypeBlob )
246
- if err != nil {
247
- return nil , err
248
- }
249
- containersClient , err := containers .NewWithBaseUri (* baseUri )
250
- if err != nil {
251
- return nil , fmt .Errorf ("new container client: %v" , err )
252
- }
253
248
254
- if c .azureAdStorageAuth != nil {
249
+ case c .azureAdStorageAuth != nil :
255
250
log .Printf ("[DEBUG] Building the Container Client from AAD auth" )
256
251
c .configureClient (containersClient .Client , c .azureAdStorageAuth )
257
252
return containersClient , nil
258
- }
259
-
260
- log .Printf ("[DEBUG] Building the Container Client from an Access Token (using user credentials)" )
261
- key , err := c .accountDetail .AccountKey (ctx , c .storageAccountsClient )
262
- if err != nil {
263
- return nil , fmt .Errorf ("retrieving key for Storage Account %q: %s" , c .storageAccountName , err )
264
- }
265
253
266
- authorizer , err := auth .NewSharedKeyAuthorizer (c .storageAccountName , * key , auth .SharedKey )
267
- if err != nil {
268
- return nil , fmt .Errorf ("new shared key authorizer: %v" , err )
254
+ default :
255
+ // Neither shared access key, sas token, or AAD Auth were specified so we have to call the management plane API to get the key.
256
+ log .Printf ("[DEBUG] Building the Container Client from an Access Key (key is listed using user credentials)" )
257
+ key , err := c .accountDetail .AccountKey (ctx , c .storageAccountsClient )
258
+ if err != nil {
259
+ return nil , fmt .Errorf ("retrieving key for Storage Account %q: %s" , c .storageAccountName , err )
260
+ }
261
+ authorizer , err := auth .NewSharedKeyAuthorizer (c .storageAccountName , * key , auth .SharedKey )
262
+ if err != nil {
263
+ return nil , fmt .Errorf ("new shared key authorizer: %v" , err )
264
+ }
265
+ c .configureClient (containersClient .Client , authorizer )
266
+ return containersClient , nil
269
267
}
270
- c .configureClient (containersClient .Client , authorizer )
271
-
272
- return containersClient , nil
273
268
}
274
269
275
270
func (c * Client ) configureClient (client client.BaseClient , authorizer auth.Authorizer ) {
0 commit comments