azkustodata/cloudinfo.go (88 lines of code) (raw):
package azkustodata
import (
"encoding/json"
"fmt"
kustoErrors "github.com/Azure/azure-kusto-go/azkustodata/errors"
"github.com/Azure/azure-kusto-go/azkustodata/utils"
"io"
"net/http"
"net/url"
"os"
"sync"
)
// abstraction to query metadata and use this information for providing all
// information needed for connection string builder to provide all the requisite information
const (
metadataPath = "/v1/rest/auth/metadata"
defaultAuthEnvVarName = "AadAuthorityUri"
defaultKustoClientAppId = "db662dc1-0cfe-4e1c-a843-19a68e65be58"
defaultPublicLoginUrl = "https://login.microsoftonline.com"
defaultRedirectUri = "https://microsoft/kustoclient"
defaultKustoServiceResourceId = "https://kusto.kusto.windows.net"
defaultFirstPartyAuthorityUrl = "https://login.microsoftonline.com/f8cdef31-a31e-4b4a-93e4-5f571e91255a"
)
// retrieved metadata
type metaResp struct {
AzureAD CloudInfo
}
type CloudInfo struct {
LoginEndpoint string `json:"LoginEndpoint"`
LoginMfaRequired bool `json:"LoginMfaRequired"`
KustoClientAppID string `json:"KustoClientAppId"`
KustoClientRedirectURI string `json:"KustoClientRedirectUri"`
KustoServiceResourceID string `json:"KustoServiceResourceId"`
FirstPartyAuthorityURL string `json:"FirstPartyAuthorityUrl"`
}
var defaultCloudInfo = CloudInfo{
LoginEndpoint: getEnvOrDefault(defaultAuthEnvVarName, defaultPublicLoginUrl),
LoginMfaRequired: false,
KustoClientAppID: defaultKustoClientAppId,
KustoClientRedirectURI: defaultRedirectUri,
KustoServiceResourceID: defaultKustoServiceResourceId,
FirstPartyAuthorityURL: defaultFirstPartyAuthorityUrl,
}
// cache to query it once per instance
var cloudInfoCache sync.Map
func GetMetadata(kustoUri string, httpClient *http.Client) (CloudInfo, error) {
// retrieve &return if exists
once, ok := cloudInfoCache.Load(kustoUri)
if !ok {
once = utils.NewOnce[CloudInfo]()
cloudInfoCache.Store(kustoUri, once)
}
return once.(utils.Once[CloudInfo]).Do(func() (CloudInfo, error) {
u, err := url.Parse(kustoUri)
if err != nil {
return CloudInfo{}, err
}
// Auth metadata is always at the root of the cluster
u.Path = metadataPath
u.RawQuery = ""
// TODO should we make this timeout configurable.
req, err := http.NewRequest("GET", u.String(), nil)
if err != nil {
return CloudInfo{}, kustoErrors.E(kustoErrors.OpCloudInfo, kustoErrors.KHTTPError, err)
}
resp, err := httpClient.Do(req)
if err != nil {
return CloudInfo{}, err
}
// Handle internal server error as a special case and return as an error (to be consistent with other SDK's)
if resp.StatusCode >= 300 && resp.StatusCode != 404 {
return CloudInfo{}, kustoErrors.E(kustoErrors.OpCloudInfo, kustoErrors.KHTTPError, fmt.Errorf("error %s when querying endpoint %s",
resp.Status, u.String()),
)
}
defer resp.Body.Close()
b, err := io.ReadAll(resp.Body)
if err != nil {
return CloudInfo{}, kustoErrors.E(kustoErrors.OpCloudInfo, kustoErrors.KHTTPError, err)
}
// Covers scenarios of 200/OK with no body or a 404 where there is no body
if len(b) == 0 {
return defaultCloudInfo, nil
}
md := metaResp{}
if err := json.Unmarshal(b, &md); err != nil {
return CloudInfo{}, err
}
// this should be set in the map by now
return md.AzureAD, nil
})
}
func getEnvOrDefault(key, fallback string) string {
if value, ok := os.LookupEnv(key); ok {
return value
}
return fallback
}