Skip to content

Commit 34f127b

Browse files
author
Paulo Gomes
authored
Merge pull request #906 from somtochiama/sas-docs
List objects when checking if bucket exists to allow use of container-level SAS token
2 parents f4de0a4 + 874714a commit 34f127b

File tree

3 files changed

+110
-15
lines changed

3 files changed

+110
-15
lines changed

docs/spec/v1beta2/buckets.md

+14-2
Original file line numberDiff line numberDiff line change
@@ -537,8 +537,20 @@ The leading question mark is optional.
537537
The query values from the `sasKey` data field in the Secrets gets merged with the ones in the `spec.endpoint` of the `Bucket`.
538538
If the same key is present in the both of them, the value in the `sasKey` takes precedence.
539539

540-
Note that the Azure SAS Token has an expiry date and it should be updated before it expires so that Flux can
541-
continue to access Azure Storage.
540+
**Note:** The SAS token has an expiry date and it must be updated before it expires to allow Flux to
541+
continue to access Azure Storage. It is allowed to use an account-level or container-level SAS token.
542+
543+
The minimum permissions for an account-level SAS token are:
544+
545+
- Allowed services: `Blob`
546+
- Allowed resource types: `Container`, `Object`
547+
- Allowed permissions: `Read`, `List`
548+
549+
The minimum permissions for a container-level SAS token are:
550+
551+
- Allowed permissions: `Read`, `List`
552+
553+
Refer to the [Azure documentation](https://learn.microsoft.com/en-us/rest/api/storageservices/create-account-sas#blob-service) for a full overview on permissions.
542554

543555
#### GCP
544556

pkg/azure/blob.go

+17-6
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ import (
2929

3030
"github.com/Azure/azure-sdk-for-go/sdk/azcore"
3131
"github.com/Azure/azure-sdk-for-go/sdk/azcore/cloud"
32+
"github.com/Azure/azure-sdk-for-go/sdk/azcore/to"
3233
"github.com/Azure/azure-sdk-for-go/sdk/azidentity"
3334
_ "github.com/Azure/azure-sdk-for-go/sdk/azidentity"
3435
"github.com/Azure/azure-sdk-for-go/sdk/storage/azblob"
@@ -180,14 +181,24 @@ func (c *BlobClient) BucketExists(ctx context.Context, bucketName string) (bool,
180181
if err != nil {
181182
return false, err
182183
}
183-
_, err = container.GetProperties(ctx, nil)
184-
if err != nil {
185-
var stgErr *azblob.StorageError
186-
if errors.As(err, &stgErr) {
187-
if stgErr.ErrorCode == azblob.StorageErrorCodeContainerNotFound {
184+
185+
items := container.ListBlobsFlat(&azblob.ContainerListBlobsFlatOptions{
186+
MaxResults: to.Ptr(int32(1)),
187+
})
188+
// We call next page only once since we just want to see if we get an error
189+
items.NextPage(ctx)
190+
if err := items.Err(); err != nil {
191+
var respErr *azcore.ResponseError
192+
if errors.As(err, &respErr) {
193+
if respErr.ErrorCode == string(*azblob.StorageErrorCodeContainerNotFound.ToPtr()) {
188194
return false, nil
189195
}
190-
err = stgErr
196+
err = respErr
197+
198+
// For a container-level SASToken, we get an AuthenticationFailed when the bucket doesn't exist
199+
if respErr.ErrorCode == string(azblob.StorageErrorCodeAuthenticationFailed) {
200+
return false, fmt.Errorf("Bucket name may be incorrect, it does not exist or caller does not have enough permissions: %w", err)
201+
}
191202
}
192203
return false, err
193204
}

pkg/azure/blob_integration_test.go

+79-7
Original file line numberDiff line numberDiff line change
@@ -194,14 +194,12 @@ func TestBlobClientSASKey_FGetObject(t *testing.T) {
194194
localPath := filepath.Join(tempDir, testFile)
195195

196196
// use the shared key client to create a SAS key for the account
197-
sasKey, err := client.GetSASToken(azblob.AccountSASResourceTypes{Object: true, Container: true},
197+
sasKey, err := client.GetSASURL(azblob.AccountSASResourceTypes{Object: true, Container: true},
198198
azblob.AccountSASPermissions{List: true, Read: true},
199-
azblob.AccountSASServices{Blob: true},
200199
time.Now(),
201200
time.Now().Add(48*time.Hour))
202201
g.Expect(err).ToNot(HaveOccurred())
203202
g.Expect(sasKey).ToNot(BeEmpty())
204-
205203
// the sdk returns the full SAS url e.g test.blob.core.windows.net/?<actual-sas-token>
206204
sasKey = strings.TrimPrefix(sasKey, testBucket.Spec.Endpoint+"/")
207205
testSASKeySecret := corev1.Secret{
@@ -213,9 +211,14 @@ func TestBlobClientSASKey_FGetObject(t *testing.T) {
213211
sasKeyClient, err := NewClient(testBucket.DeepCopy(), testSASKeySecret.DeepCopy())
214212
g.Expect(err).ToNot(HaveOccurred())
215213

216-
// Test if blob exists using sasKey.
214+
// Test if bucket and blob exists using sasKey.
217215
ctx, timeout = context.WithTimeout(context.Background(), testTimeout)
218216
defer timeout()
217+
218+
ok, err := sasKeyClient.BucketExists(ctx, testContainer)
219+
g.Expect(err).ToNot(HaveOccurred())
220+
g.Expect(ok).To(BeTrue())
221+
219222
_, err = sasKeyClient.FGetObject(ctx, testContainer, testFile, localPath)
220223

221224
g.Expect(err).ToNot(HaveOccurred())
@@ -224,6 +227,68 @@ func TestBlobClientSASKey_FGetObject(t *testing.T) {
224227
g.Expect(f).To(Equal([]byte(testFileData)))
225228
}
226229

230+
func TestBlobClientContainerSASKey_BucketExists(t *testing.T) {
231+
g := NewWithT(t)
232+
233+
// create a client with the shared key
234+
client, err := NewClient(testBucket.DeepCopy(), testSecret.DeepCopy())
235+
g.Expect(err).ToNot(HaveOccurred())
236+
g.Expect(client).ToNot(BeNil())
237+
238+
g.Expect(client.CanGetAccountSASToken()).To(BeTrue())
239+
240+
// Generate test container name.
241+
testContainer := generateString(testContainerGenerateName)
242+
243+
// Create test container.
244+
ctx, timeout := context.WithTimeout(context.Background(), testTimeout)
245+
defer timeout()
246+
g.Expect(createContainer(ctx, client, testContainer)).To(Succeed())
247+
t.Cleanup(func() {
248+
g.Expect(deleteContainer(context.Background(), client, testContainer)).To(Succeed())
249+
})
250+
251+
// Create test blob.
252+
ctx, timeout = context.WithTimeout(context.Background(), testTimeout)
253+
defer timeout()
254+
g.Expect(createBlob(ctx, client, testContainer, testFile, testFileData))
255+
256+
// use the container client to create a container-level SAS key for the account
257+
containerClient, err := client.NewContainerClient(testContainer)
258+
g.Expect(err).ToNot(HaveOccurred())
259+
// sasKey
260+
sasKey, err := containerClient.GetSASURL(azblob.ContainerSASPermissions{Read: true, List: true},
261+
time.Now(),
262+
time.Now().Add(48*time.Hour))
263+
g.Expect(err).ToNot(HaveOccurred())
264+
g.Expect(sasKey).ToNot(BeEmpty())
265+
// the sdk returns the full SAS url e.g test.blob.core.windows.net/<container-name>?<actual-sas-token>
266+
sasKey = strings.TrimPrefix(sasKey, testBucket.Spec.Endpoint+"/"+testContainer)
267+
testSASKeySecret := corev1.Secret{
268+
Data: map[string][]byte{
269+
sasKeyField: []byte(sasKey),
270+
},
271+
}
272+
273+
sasKeyClient, err := NewClient(testBucket.DeepCopy(), testSASKeySecret.DeepCopy())
274+
g.Expect(err).ToNot(HaveOccurred())
275+
276+
ctx, timeout = context.WithTimeout(context.Background(), testTimeout)
277+
defer timeout()
278+
279+
// Test if bucket and blob exists using sasKey.
280+
ok, err := sasKeyClient.BucketExists(ctx, testContainer)
281+
g.Expect(err).ToNot(HaveOccurred())
282+
g.Expect(ok).To(BeTrue())
283+
284+
// BucketExists returns an error if the bucket doesn't exist with container level SAS
285+
// since the error code is AuthenticationFailed.
286+
ok, err = sasKeyClient.BucketExists(ctx, "non-existent")
287+
g.Expect(err).To(HaveOccurred())
288+
g.Expect(err.Error()).To(ContainSubstring("Bucket name may be incorrect, it does not exist"))
289+
g.Expect(ok).To(BeFalse())
290+
}
291+
227292
func TestBlobClient_FGetObject_NotFoundErr(t *testing.T) {
228293
g := NewWithT(t)
229294

@@ -340,8 +405,15 @@ func createContainer(ctx context.Context, client *BlobClient, name string) error
340405
}
341406

342407
func createBlob(ctx context.Context, client *BlobClient, containerName, name, data string) error {
343-
container := client.NewContainerClient(containerName)
344-
blob := container.NewAppendBlobClient(name)
408+
container, err := client.NewContainerClient(containerName)
409+
if err != nil {
410+
return err
411+
}
412+
413+
blob, err := container.NewAppendBlobClient(name)
414+
if err != nil {
415+
return err
416+
}
345417

346418
ctx, timeout := context.WithTimeout(context.Background(), testTimeout)
347419
defer timeout()
@@ -350,7 +422,7 @@ func createBlob(ctx context.Context, client *BlobClient, containerName, name, da
350422
}
351423

352424
hash := md5.Sum([]byte(data))
353-
if _, err := blob.AppendBlock(ctx, streaming.NopCloser(strings.NewReader(data)), &azblob.AppendBlockOptions{
425+
if _, err := blob.AppendBlock(ctx, streaming.NopCloser(strings.NewReader(data)), &azblob.AppendBlobAppendBlockOptions{
354426
TransactionalContentMD5: hash[:16],
355427
}); err != nil {
356428
return err

0 commit comments

Comments
 (0)