component/azstorage/utils.go (434 lines of code) (raw):

/* _____ _____ _____ ____ ______ _____ ------ | | | | | | | | | | | | | | | | | | | | | | | | | | | --- | | | | |-----| |---- | | |-----| |----- ------ | | | | | | | | | | | | | | ____| |_____ | ____| | ____| | |_____| _____| |_____ |_____ Licensed under the MIT License <http://opensource.org/licenses/MIT>. Copyright © 2020-2025 Microsoft Corporation. All rights reserved. Author : <blobfusedev@microsoft.com> Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE */ package azstorage import ( "encoding/json" "errors" "fmt" "net" "net/http" "net/url" "os" "path/filepath" "strings" "time" "github.com/Azure/azure-sdk-for-go/sdk/azcore" "github.com/Azure/azure-sdk-for-go/sdk/azcore/cloud" azlog "github.com/Azure/azure-sdk-for-go/sdk/azcore/log" "github.com/Azure/azure-sdk-for-go/sdk/azcore/policy" "github.com/Azure/azure-sdk-for-go/sdk/storage/azblob/blob" "github.com/Azure/azure-sdk-for-go/sdk/storage/azblob/bloberror" "github.com/Azure/azure-sdk-for-go/sdk/storage/azblob/service" serviceBfs "github.com/Azure/azure-sdk-for-go/sdk/storage/azdatalake/service" "github.com/Azure/azure-storage-fuse/v2/common" "github.com/Azure/azure-storage-fuse/v2/common/log" "github.com/Azure/azure-storage-fuse/v2/internal" "github.com/Azure/azure-sdk-for-go/sdk/storage/azdatalake/datalakeerror" ) // ----------- Helper to create pipeline options --------------- var UserAgent = func() string { return "Azure-Storage-Fuse/" + common.Blobfuse2Version } const ( Timeout time.Duration = 30 * time.Second KeepAlive time.Duration = 30 * time.Second DualStack bool = true MaxIdleConns int = 0 // No limit MaxIdleConnsPerHost int = 200 MaxConnsPerHost int = 300 IdleConnTimeout time.Duration = 90 * time.Second TLSHandshakeTimeout time.Duration = 10 * time.Second ExpectContinueTimeout time.Duration = 1 * time.Second DisableKeepAlives bool = false DisableCompression bool = false MaxResponseHeaderBytes int64 = 0 ) // getAzStorageClientOptions : Create client options based on the config func getAzStorageClientOptions(conf *AzStorageConfig) (azcore.ClientOptions, error) { retryOptions := policy.RetryOptions{ MaxRetries: conf.maxRetries, // Try at most 3 times to perform the operation (set to 1 to disable retries) TryTimeout: time.Second * time.Duration(conf.maxTimeout), // Maximum time allowed for any single try RetryDelay: time.Second * time.Duration(conf.backoffTime), // Backoff amount for each retry (exponential or linear) MaxRetryDelay: time.Second * time.Duration(conf.maxRetryDelay), // Max delay between retries } telemetryValue := conf.telemetry if telemetryValue != "" { telemetryValue += " " } telemetryValue += UserAgent() + " (" + common.GetCurrentDistro() + ")" telemetryPolicy := newBlobfuseTelemetryPolicy(telemetryValue) logOptions := getSDKLogOptions() transportOptions, err := newBlobfuse2HttpClient(conf) if err != nil { log.Err("utils::getAzStorageClientOptions : Failed to create transport client [%s]", err.Error()) } perCallPolicies := []policy.Policy{telemetryPolicy} serviceApiVersion := os.Getenv("AZURE_STORAGE_SERVICE_API_VERSION") if serviceApiVersion != "" { // We need to override the service version perCallPolicies = append(perCallPolicies, newServiceVersionPolicy(serviceApiVersion)) } return azcore.ClientOptions{ Retry: retryOptions, Logging: logOptions, PerCallPolicies: perCallPolicies, Transport: transportOptions, }, err } // getAzBlobServiceClientOptions : Create azblob service client options based on the config func getAzBlobServiceClientOptions(conf *AzStorageConfig) (*service.ClientOptions, error) { opts, err := getAzStorageClientOptions(conf) return &service.ClientOptions{ ClientOptions: opts, }, err } // getAzDatalakeServiceClientOptions : Create azdatalake service client options based on the config func getAzDatalakeServiceClientOptions(conf *AzStorageConfig) (*serviceBfs.ClientOptions, error) { opts, err := getAzStorageClientOptions(conf) return &serviceBfs.ClientOptions{ ClientOptions: opts, }, err } // getLogOptions : to configure the SDK logging policy func getSDKLogOptions() policy.LogOptions { if log.GetType() == "silent" || log.GetLogLevel() < common.ELogLevel.LOG_DEBUG() { return policy.LogOptions{} } else { // add headers and query params which should be logged and not redacted return policy.LogOptions{ AllowedHeaders: allowedHeaders, AllowedQueryParams: allowedQueryParams, } } } // setSDKLogListener : log the requests and responses. // It is disabled if, // - logging type is silent // - logging level is less than debug func setSDKLogListener() { if log.GetType() == "silent" || log.GetLogLevel() < common.ELogLevel.LOG_DEBUG() { // reset listener azlog.SetListener(nil) } else { azlog.SetListener(func(cls azlog.Event, msg string) { log.Debug("SDK(%s) : %s", cls, msg) }) } } // Create an HTTP Client with configured proxy func newBlobfuse2HttpClient(conf *AzStorageConfig) (*http.Client, error) { var ProxyURL func(req *http.Request) (*url.URL, error) if conf.proxyAddress == "" { ProxyURL = http.ProxyFromEnvironment } else { u, err := url.Parse(conf.proxyAddress) if err != nil { log.Err("utils::newBlobfuse2HttpClient : Failed to parse proxy : %s [%s]", conf.proxyAddress, err.Error()) return nil, err } ProxyURL = http.ProxyURL(u) } return &http.Client{ Transport: &http.Transport{ Proxy: ProxyURL, // We use Dial instead of DialContext as DialContext has been reported to cause slower performance. Dial /*Context*/ : (&net.Dialer{ Timeout: Timeout, KeepAlive: KeepAlive, DualStack: DualStack, }).Dial, /*Context*/ MaxIdleConns: MaxIdleConns, // No limit MaxIdleConnsPerHost: MaxIdleConnsPerHost, MaxConnsPerHost: MaxConnsPerHost, IdleConnTimeout: IdleConnTimeout, TLSHandshakeTimeout: TLSHandshakeTimeout, ExpectContinueTimeout: ExpectContinueTimeout, DisableKeepAlives: DisableKeepAlives, // if content-encoding is set in blob then having transport layer compression will // make things ugly and hence user needs to disable this feature through config DisableCompression: conf.disableCompression, MaxResponseHeaderBytes: MaxResponseHeaderBytes, }, }, nil } // getCloudConfiguration : returns cloud configuration type on the basis of endpoint func getCloudConfiguration(endpoint string) cloud.Configuration { if strings.Contains(endpoint, "core.chinacloudapi.cn") { return cloud.AzureChina } else if strings.Contains(endpoint, "core.usgovcloudapi.net") { return cloud.AzureGovernment } else { return cloud.AzurePublic } } // ----------- Store error code handling --------------- const ( ErrNoErr uint16 = iota ErrUnknown ErrFileNotFound ErrFileAlreadyExists InvalidRange BlobIsUnderLease InvalidPermission ) // For detailed error list refer below link, // https://github.com/Azure/azure-sdk-for-go/blob/main/sdk/storage/azblob/bloberror/error_codes.go // Convert blob storage error to common errors func storeBlobErrToErr(err error) uint16 { var respErr *azcore.ResponseError errors.As(err, &respErr) if respErr != nil { switch (bloberror.Code)(respErr.ErrorCode) { case bloberror.BlobAlreadyExists: return ErrFileAlreadyExists case bloberror.BlobNotFound: return ErrFileNotFound case bloberror.InvalidRange: return InvalidRange case bloberror.LeaseIDMissing: return BlobIsUnderLease case bloberror.InsufficientAccountPermissions, bloberror.AuthorizationPermissionMismatch: return InvalidPermission default: return ErrUnknown } } return ErrNoErr } // Convert datalake storage error to common errors func storeDatalakeErrToErr(err error) uint16 { var respErr *azcore.ResponseError errors.As(err, &respErr) if respErr != nil { switch (datalakeerror.StorageErrorCode)(respErr.ErrorCode) { case datalakeerror.PathAlreadyExists: return ErrFileAlreadyExists case datalakeerror.PathNotFound: return ErrFileNotFound case datalakeerror.SourcePathNotFound: return ErrFileNotFound case datalakeerror.LeaseIDMissing: return BlobIsUnderLease case datalakeerror.AuthorizationPermissionMismatch: return InvalidPermission default: return ErrUnknown } } return ErrNoErr } // ----------- Metadata handling --------------- // // parseMetadata : Parse the metadata of a given path and populate its attributes func parseMetadata(attr *internal.ObjAttr, metadata map[string]*string) { // Save the metadata in attributes so that later if someone wants to add anything it can work attr.Metadata = metadata for k, v := range metadata { if v != nil { if strings.ToLower(k) == folderKey && *v == "true" { attr.Flags = internal.NewDirBitMap() attr.Mode = attr.Mode | os.ModeDir } else if strings.ToLower(k) == symlinkKey && *v == "true" { attr.Flags = internal.NewSymlinkBitMap() attr.Mode = attr.Mode | os.ModeSymlink } } } } // ----------- Content-type handling --------------- // ContentTypeMap : Store file extension to content-type mapping var ContentTypes = map[string]string{ ".css": "text/css", ".pdf": "application/pdf", ".xml": "text/xml", ".csv": "text/csv", ".json": "application/json", ".rtf": "application/rtf", ".txt": "text/plain", ".java": "text/plain", ".dat": "text/plain", ".htm": "text/html", ".html": "text/html", ".gif": "image/gif", ".jpeg": "image/jpeg", ".jpg": "image/jpeg", ".png": "image/png", ".bmp": "image/bmp", ".js": "application/javascript", ".mjs": "application/javascript", ".svg": "image/svg+xml", ".wasm": "application/wasm", ".webp": "image/webp", ".wav": "audio/wav", ".mp3": "audio/mpeg", ".mpeg": "video/mpeg", ".aac": "audio/aac", ".avi": "video/x-msvideo", ".m3u8": "application/x-mpegURL", ".ts": "video/MP2T", ".mid": "audio/midiaudio/x-midi", ".3gp": "video/3gpp", ".mp4": "video/mp4", ".doc": "application/msword", ".docx": "application/vnd.openxmlformats-officedocument.wordprocessingml.document", ".ppt": "application/vnd.ms-powerpoint", ".pptx": "application/vnd.openxmlformats-officedocument.presentationml.presentation", ".xls": "application/vnd.ms-excel", ".xlsx": "application/vnd.openxmlformats-officedocument.spreadsheetml.sheet", ".gz": "application/x-gzip", ".jar": "application/java-archive", ".rar": "application/vnd.rar", ".tar": "application/x-tar", ".zip": "application/x-zip-compressed", ".7z": "application/x-7z-compressed", ".3g2": "video/3gpp2", ".usdz": "application/zip", ".sh": "application/x-sh", ".exe": "application/x-msdownload", ".dll": "application/x-msdownload", } // getContentType : Based on the file extension retrieve the content type to be set func getContentType(key string) string { value, found := ContentTypes[strings.ToLower(filepath.Ext(key))] if found { return value } return "application/octet-stream" } func populateContentType(newSet string) error { //nolint var data map[string]string if err := json.Unmarshal([]byte(newSet), &data); err != nil { log.Err("Failed to parse config file : %s [%s]", newSet, err.Error()) return err } // We can simply append the new data to end of the map // however there may be conflicting keys and hence we need to merge manually //ContentTypeMap = append(ContentTypeMap, data) for k, v := range data { ContentTypes[k] = v } return nil } // ----------- Blob access tier type conversion --------------- // // AccessTierMap : Store config to access tier mapping var AccessTiers = map[string]blob.AccessTier{ "hot": blob.AccessTierHot, "cool": blob.AccessTierCool, "cold": blob.AccessTierCold, "archive": blob.AccessTierArchive, "p4": blob.AccessTierP4, "p6": blob.AccessTierP6, "p10": blob.AccessTierP10, "p15": blob.AccessTierP15, "p20": blob.AccessTierP20, "p30": blob.AccessTierP30, "p40": blob.AccessTierP40, "p50": blob.AccessTierP50, "p60": blob.AccessTierP60, "p70": blob.AccessTierP70, "p80": blob.AccessTierP80, "premium": blob.AccessTierPremium, } func getAccessTierType(name string) *blob.AccessTier { if name == "" { return nil } value, found := AccessTiers[strings.ToLower(name)] if found { return &value } return nil } // Called by x method func getACLPermissions(mode os.FileMode) string { // Format for ACL and Permission string is different // ACL:"user::rwx,user:<id>:rwx,group::rwx,mask::rwx,other::rwx" // Permissions:"rwxrwxrwx+" // If we call the set ACL without giving user then all other principals will be removed. var sb strings.Builder writePermission(&sb, mode&(1<<8) != 0, 'r') writePermission(&sb, mode&(1<<7) != 0, 'w') writePermission(&sb, mode&(1<<6) != 0, 'x') writePermission(&sb, mode&(1<<5) != 0, 'r') writePermission(&sb, mode&(1<<4) != 0, 'w') writePermission(&sb, mode&(1<<3) != 0, 'x') writePermission(&sb, mode&(1<<2) != 0, 'r') writePermission(&sb, mode&(1<<1) != 0, 'w') writePermission(&sb, mode&(1<<0) != 0, 'x') return sb.String() } func writePermission(sb *strings.Builder, permitted bool, permission rune) { if permitted { sb.WriteRune(permission) } else { sb.WriteRune('-') } } // Called by x method // How to interpret the mask and name user acl : https://learn.microsoft.com/en-us/azure/storage/blobs/data-lake-storage-access-control func getFileModeFromACL(objid string, acl string, owner string) (os.FileMode, error) { var mode os.FileMode = 0 if acl == "" { return mode, fmt.Errorf("empty permissions from the service") } extractPermission := func(acl string, key string) string { idx := strings.Index(acl, key) + len(key) return acl[idx : idx+3] } extractNamedUserACL := func(acl string, objid string) string { key := fmt.Sprintf("user:%s:", objid) idx := strings.Index(acl, key) + len(key) if idx == -1 { return "---" } userACL := acl[idx : idx+3] mask := extractPermission(acl, "mask::") permissions := "" for i, c := range userACL { if userACL[i] == mask[i] { permissions += string(c) } else { permissions += "-" } } return permissions } // Sample string : user::rwx,user:objid1:r--,user:objid2:r--,group::r--,mask::r-x,other::rwx: permissions := "" if owner == objid { // Owner of this blob is the authenticated object id so extract the user permissions from the ACL directly permissions = extractPermission(acl, "user::") } else { // Owner of this blob is not the authenticated object id, search object id exists in the ACL permissions = extractNamedUserACL(acl, objid) } permissions += extractPermission(acl, "group::") permissions += extractPermission(acl, "other::") return getFileMode(permissions) } // Called by x method func getFileMode(permissions string) (os.FileMode, error) { var mode os.FileMode = 0 if permissions == "" { return mode, nil } // Expect service to return a 9 char string with r, w, x, or - const rwx = "rwxrwxrwx" if len(rwx) > len(permissions) { log.Err("utils::getFileMode : Unexpected length of permissions from the service %d: %s", len(permissions), permissions) return 0, fmt.Errorf("unexpected length of permissions from the service %d: %s", len(permissions), permissions) } else if len(rwx) < len(permissions) { log.Debug("utils::getFileMode : Unexpected permissions from the service: %s", permissions) } for i, c := range rwx { if permissions[i] == byte(c) { mode |= 1 << uint(9-1-i) } else if permissions[i] != byte('-') { log.Debug("utils::getFileMode : Unexpected permissions from the service at character %d: %s", i, permissions) } } return mode, nil } // removePrefixPath removes the given prefixPath from the beginning of path, // if it exists, and returns the resulting string without leading slashes. func removePrefixPath(prefixPath, path string) string { if prefixPath == "" { return path } path = strings.TrimPrefix(path, prefixPath) if path[0] == '/' { return path[1:] } return path } func sanitizeSASKey(key string) string { if key == "" { return key } if key[0] != '?' { return ("?" + key) } return key } func autoDetectAuthMode(opt AzStorageOptions) string { if opt.ApplicationID != "" || opt.ResourceID != "" || opt.ObjectID != "" { return "msi" } else if opt.AccountKey != "" { return "key" } else if opt.SaSKey != "" { return "sas" } else if opt.ClientID != "" || opt.ClientSecret != "" || opt.TenantID != "" { return "spn" } return "msi" } func removeLeadingSlashes(s string) string { for strings.HasPrefix(s, "/") { s = strings.TrimLeft(s, "/") } return s } func modifyLMTandEtag(attr *internal.ObjAttr, lmt *time.Time, ETag string) { if attr != nil { attr.Atime = *lmt attr.Mtime = *lmt attr.Ctime = *lmt attr.ETag = ETag } } func sanitizeEtag(ETag *azcore.ETag) string { if ETag != nil { return strings.Trim(string(*ETag), `"`) } return "" } // func parseBlobTags(tags *container.BlobTags) map[string]string { // if tags == nil { // return nil // } // blobtags := make(map[string]string) // for _, tag := range tags.BlobTagSet { // if tag != nil { // if tag.Key != nil { // blobtags[*tag.Key] = *tag.Value // } // } // } // return blobtags // }