Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Require AccessToken from top level API calls #10

Merged
merged 3 commits into from
Oct 28, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 11 additions & 0 deletions azure-blob-storage/azure-blob-storage.cabal
Original file line number Diff line number Diff line change
Expand Up @@ -76,3 +76,14 @@ library
, unordered-containers
hs-source-dirs: src
default-language: Haskell2010

executable example
main-is: Main.hs
hs-source-dirs: example
ghc-options: -Wall
default-language: Haskell2010
build-depends:
base >= 4.7 && < 5
, directory
, azure-auth
, azure-blob-storage
23 changes: 23 additions & 0 deletions azure-blob-storage/example/Main.hs
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
{-# LANGUAGE OverloadedStrings #-}

module Main where

import System.Directory (doesFileExist)

import Azure.Auth (defaultAzureCredential)
import Azure.Blob.GetBlob (GetBlob (..), getBlobObject)
import Azure.Blob.Types (AccountName (..), BlobName (..), ContainerName (..))
import Azure.Types (newEmptyToken)

main :: IO ()
main = do
tok <- newEmptyToken
cred <- defaultAzureCredential Nothing "https://storage.azure.com" tok
-- In order to run this, you need to replace @AccountName@, @ContainerName@ and @BlobName@
-- with appropriate values in your resource group. These are just dummy values.
let account = AccountName "OneRepublic"
container = ContainerName "Native"
blob = BlobName "counting_stars.jpeg"
getBlobPayload = GetBlob account container blob cred
getBlobObject getBlobPayload "/tmp/counting_stars.jpeg"
doesFileExist "/tmp/counting_stars.jpeg" >>= print
15 changes: 7 additions & 8 deletions azure-blob-storage/src/Azure/Blob/DeleteBlob.hs
Original file line number Diff line number Diff line change
Expand Up @@ -11,9 +11,6 @@ module Azure.Blob.DeleteBlob
, DeleteBlob (..)
) where

import Azure.Auth (defaultAzureCredential)
import Azure.Blob.Types (AccountName (..), BlobName (..), ContainerName (..))
import Azure.Blob.Utils (blobStorageResourceUrl, mkBlobHostUrl)
import Data.Data (Proxy (..))
import Data.Text (Text)
import GHC.Generics (Generic)
Expand All @@ -22,14 +19,17 @@ import Servant.API
import Servant.Client (BaseUrl (..), ClientM, Scheme (..), client, mkClientEnv, runClientM)
import UnliftIO (MonadIO (..), throwString)

import qualified Azure.Types as Auth
import Azure.Blob.Types (AccountName (..), BlobName (..), ContainerName (..))
import Azure.Blob.Utils (mkBlobHostUrl)
import Azure.Types (AccessToken (..))

import qualified Data.Text as Text

data DeleteBlob = DeleteBlob
{ accountName :: !AccountName
, containerName :: !ContainerName
, blobName :: !BlobName
, tokenStore :: !Auth.Token
, accessToken :: !AccessToken
}
deriving stock (Eq, Generic)

Expand Down Expand Up @@ -72,13 +72,12 @@ callDeleteBlobClient ::
(ContainerName -> BlobName -> Text -> Text -> ClientM NoContent) ->
DeleteBlob ->
IO (Either Text ())
callDeleteBlobClient action DeleteBlob{accountName, containerName, blobName, tokenStore} = do
Auth.AccessToken{atAccessToken} <- liftIO $ defaultAzureCredential Nothing blobStorageResourceUrl tokenStore
callDeleteBlobClient action DeleteBlob{accountName, containerName, blobName, accessToken} = do
manager <- liftIO newTlsManager
res <-
liftIO $
runClientM
(action containerName blobName ("Bearer " <> atAccessToken) "2020-04-08")
(action containerName blobName ("Bearer " <> atAccessToken accessToken) "2020-04-08")
(mkClientEnv manager $ BaseUrl Https (mkBlobHostUrl accountName) 443 "")
pure $ case res of
Left err -> do
Expand Down
21 changes: 13 additions & 8 deletions azure-blob-storage/src/Azure/Blob/GetBlob.hs
Original file line number Diff line number Diff line change
Expand Up @@ -12,9 +12,6 @@ module Azure.Blob.GetBlob
, GetBlob (..)
) where

import Azure.Auth (defaultAzureCredential)
import Azure.Blob.Types (AccountName (..), BlobName (..), ContainerName (..))
import Azure.Blob.Utils (blobStorageResourceUrl, mkBlobHostUrl)
import Data.ByteString (ByteString, fromStrict, toStrict)
import Data.Data (Proxy (..))
import Data.List.NonEmpty (NonEmpty ((:|)))
Expand All @@ -26,7 +23,10 @@ import Servant.API
import Servant.Client (BaseUrl (..), ClientM, Scheme (..), client, mkClientEnv, runClientM)
import UnliftIO (MonadIO (..), throwString)

import qualified Azure.Types as Auth
import Azure.Blob.Types (AccountName (..), BlobName (..), ContainerName (..))
import Azure.Blob.Utils (mkBlobHostUrl)
import Azure.Types (AccessToken (..))

import qualified Data.ByteString.Lazy as LBS
import qualified Data.Text as Text
import qualified Network.HTTP.Media as M
Expand All @@ -35,10 +35,15 @@ data GetBlob = GetBlob
{ accountName :: !AccountName
, containerName :: !ContainerName
, blobName :: !BlobName
, tokenStore :: !Auth.Token
, accessToken :: !AccessToken
}
deriving stock (Eq, Generic)

{- | Fetch a blob from blob storage

Errors will be thrown in IO. For variant where error is
caught in a @Left@ branch, see @getBlobObjectEither@
-}
getBlobObject ::
MonadIO m =>
GetBlob ->
Expand All @@ -52,6 +57,7 @@ getBlobObject getBlobReq fp = do
Right r ->
pure r

-- | Fetch a blob from blob storage
getBlobObjectEither ::
MonadIO m =>
GetBlob ->
Expand Down Expand Up @@ -104,13 +110,12 @@ callGetBlobClient ::
(ContainerName -> BlobName -> Text -> Text -> ClientM ByteString) ->
GetBlob ->
IO (Either Text ByteString)
callGetBlobClient action GetBlob{accountName, containerName, blobName, tokenStore} = do
Auth.AccessToken{atAccessToken} <- liftIO $ defaultAzureCredential Nothing blobStorageResourceUrl tokenStore
callGetBlobClient action GetBlob{accountName, containerName, blobName, accessToken} = do
manager <- liftIO newTlsManager
res <-
liftIO $
runClientM
(action containerName blobName ("Bearer " <> atAccessToken) "2020-04-08")
(action containerName blobName ("Bearer " <> atAccessToken accessToken) "2020-04-08")
(mkClientEnv manager $ BaseUrl Https (mkBlobHostUrl accountName) 443 "")
pure $ case res of
Left err -> do
Expand Down
15 changes: 7 additions & 8 deletions azure-blob-storage/src/Azure/Blob/PutBlob.hs
Original file line number Diff line number Diff line change
Expand Up @@ -10,9 +10,6 @@ module Azure.Blob.PutBlob
, PutBlob (..)
) where

import Azure.Auth (defaultAzureCredential)
import Azure.Blob.Types (AccountName (..), BlobName (..), BlobType (..), ContainerName (..))
import Azure.Blob.Utils (blobStorageResourceUrl, mkBlobHostUrl)
import Data.ByteString (ByteString)
import Data.Data (Proxy (..))
import Data.Text (Text)
Expand All @@ -22,7 +19,10 @@ import Servant.API
import Servant.Client (BaseUrl (..), ClientM, Scheme (..), client, mkClientEnv, runClientM)
import UnliftIO (MonadIO (..), throwString)

import qualified Azure.Types as Auth
import Azure.Blob.Types (AccountName (..), BlobName (..), BlobType (..), ContainerName (..), blobTypeToText)
import Azure.Blob.Utils (mkBlobHostUrl)
import Azure.Types (AccessToken (..))

import qualified Data.Text as Text

{- | Adds a blob to a container.
Expand All @@ -33,7 +33,7 @@ data PutBlob = PutBlob
{ accountName :: !AccountName
, containerName :: !ContainerName
, blobName :: !BlobName
, tokenStore :: !Auth.Token
, accessToken :: !AccessToken
, body :: !ByteString -- TODO: Add chunked upload
}
deriving stock (Eq, Generic)
Expand Down Expand Up @@ -86,13 +86,12 @@ callPutBlobClient ::
(ContainerName -> BlobName -> Text -> Text -> Text -> ByteString -> ClientM NoContent) ->
PutBlob ->
IO (Either Text ())
callPutBlobClient action PutBlob{accountName, containerName, blobName, tokenStore, body} = do
Auth.AccessToken{atAccessToken} <- liftIO $ defaultAzureCredential Nothing blobStorageResourceUrl tokenStore
callPutBlobClient action PutBlob{..} = do
manager <- liftIO newTlsManager
res <-
liftIO $
runClientM
(action containerName blobName ("Bearer " <> atAccessToken) "2020-04-08" (Text.pack $ show BlockBlob) body)
(action containerName blobName ("Bearer " <> atAccessToken accessToken) "2020-04-08" (blobTypeToText BlockBlob) body)
(mkClientEnv manager $ BaseUrl Https (mkBlobHostUrl accountName) 443 "")
pure $ case res of
Left err ->
Expand Down
50 changes: 33 additions & 17 deletions azure-blob-storage/src/Azure/Blob/SharedAccessSignature.hs
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,14 @@ module Azure.Blob.SharedAccessSignature
, generateSasEither
) where

import Azure.Auth (defaultAzureCredential)
import Crypto.Hash.SHA256 (hmac)
import Data.Text (Text)
import Data.Text.Encoding (decodeUtf8, encodeUtf8)
import Data.Time (UTCTime (..), addUTCTime, formatTime, getCurrentTime)
import Data.Time.Format (defaultTimeLocale)
import Network.HTTP.Types.URI (urlEncode)
import UnliftIO (MonadIO (..), throwString)

import Azure.Blob.Types
( AccountName (..)
, BlobName (..)
Expand All @@ -21,47 +28,56 @@ import Azure.Blob.Types
, sasResourceToText
)
import Azure.Blob.UserDelegationKey (callGetUserDelegationKeyApi, getUserDelegationKeyApi)
import Azure.Blob.Utils (blobStorageResourceUrl)
import Crypto.Hash.SHA256 (hmac)
import Data.Text (Text)
import Data.Text.Encoding (decodeUtf8, encodeUtf8)
import Data.Time (UTCTime (..), addUTCTime, formatTime, getCurrentTime)
import Data.Time.Format (defaultTimeLocale)
import Network.HTTP.Types.URI (urlEncode)
import UnliftIO (MonadIO (..), throwString)
import Azure.Types (AccessToken (..))

import qualified Azure.Types as Auth
import qualified Data.ByteString.Base64 as B64
import qualified Data.ByteString.Char8 as C8
import qualified Data.Text as Text

{- | Generates a Shared Access Token.

Errors will be thrown in IO. For variant where error is
caught in a @Left@ branch, see @generateSasEither@
-}
generateSas ::
MonadIO m =>
-- | Name of the Blob storage account
AccountName ->
-- | Name of the Blob container
ContainerName ->
-- | Name of the blob itself
BlobName ->
-- | Time in seconds for which the Shared Access Token should be valid for
SasTokenExpiry ->
Auth.Token ->
-- | Access Token for making requests
AccessToken ->
m Url
generateSas accountName containerName blobName expiry tokenStore = do
eUrl <- liftIO $ generateSasEither accountName containerName blobName expiry tokenStore
generateSas accountName containerName blobName expiry accessToken = do
eUrl <- liftIO $ generateSasEither accountName containerName blobName expiry accessToken
case eUrl of
Left err ->
throwString $ show err
Right url ->
pure url

-- TODO: We need to add support for empty fields here. Eg: signedAuthorizedUserObjectId
{- | Generates a Shared Access Token.

TODO: We need to add support for empty fields here. Eg: signedAuthorizedUserObjectId
-}
generateSasEither ::
MonadIO m =>
-- | Name of the Blob storage account
AccountName ->
-- | Name of the Blob container
ContainerName ->
-- | Name of the blob itself
BlobName ->
-- | Time in seconds for which the Shared Access Token should be valid for
SasTokenExpiry ->
Auth.Token ->
-- | Access Token for making requests
AccessToken ->
m (Either Text Url)
generateSasEither accountName containerName blobName (SasTokenExpiry expiry) tokenStore = do
accessToken <- liftIO $ defaultAzureCredential Nothing blobStorageResourceUrl tokenStore
generateSasEither accountName containerName blobName (SasTokenExpiry expiry) accessToken = do
now <- liftIO getCurrentTime
let isoStartTime = formatToAzureTime now
isoExpiryTime = formatToAzureTime (addUTCTime (fromIntegral expiry) now)
Expand Down
10 changes: 9 additions & 1 deletion azure-blob-storage/src/Azure/Blob/Types.hs
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ module Azure.Blob.Types
, sasPermissionsToText
, SasResource (..)
, sasResourceToText
, blobTypeToText
) where

import Data.Aeson (ToJSON (..), object, (.=))
Expand Down Expand Up @@ -47,6 +48,13 @@ data BlobType
| AppendBlob
deriving stock (Eq, Show, Generic)

blobTypeToText :: BlobType -> Text
blobTypeToText = \case
BlockBlob -> "BlockBlob"
PageBlob -> "PageBlob"
AppendBlob -> "AppendBlob"
{-# INLINE blobTypeToText #-}

{- | The fields are supposed to be ISO format strings
TODO: make these UTCTime formats
-}
Expand Down Expand Up @@ -100,7 +108,7 @@ newtype Url = Url
}
deriving stock (Eq, Show, Generic)

-- | For an azure action to be turned into a signed url
-- | Represents how long a SAS token should be valid for in seconds.
newtype SasTokenExpiry = SasTokenExpiry
{ unSasTokenExpiry :: Int
}
Expand Down
19 changes: 10 additions & 9 deletions azure-blob-storage/src/Azure/Blob/UserDelegationKey.hs
Original file line number Diff line number Diff line change
Expand Up @@ -9,12 +9,6 @@ module Azure.Blob.UserDelegationKey
, getUserDelegationKeyApi
) where

import Azure.Blob.Types
( AccountName (..)
, UserDelegationRequest (..)
, UserDelegationResponse (..)
)
import Azure.Blob.Utils (mkBlobHostUrl)
import Data.Data (Proxy (..))
import Data.Text (Text)
import Network.HTTP.Client.TLS (newTlsManager)
Expand All @@ -23,7 +17,14 @@ import Servant.Client (BaseUrl (..), ClientM, Scheme (..), client, mkClientEnv,
import Servant.XML (XML)
import UnliftIO (MonadIO (..))

import qualified Azure.Types as Auth
import Azure.Blob.Types
( AccountName (..)
, UserDelegationRequest (..)
, UserDelegationResponse (..)
)
import Azure.Blob.Utils (mkBlobHostUrl)
import Azure.Types (AccessToken (..))

import qualified Data.Text as Text

-- These type aliases always hold static values.
Expand All @@ -49,10 +50,10 @@ getUserDelegationKeyApi = client (Proxy @GetUserDelegationKeyApi)
callGetUserDelegationKeyApi ::
(Restype -> Comp -> Text -> Text -> UserDelegationRequest -> ClientM UserDelegationResponse) ->
AccountName ->
Auth.AccessToken ->
AccessToken ->
UserDelegationRequest ->
IO (Either Text UserDelegationResponse)
callGetUserDelegationKeyApi action accountName Auth.AccessToken{atAccessToken} req = do
callGetUserDelegationKeyApi action accountName AccessToken{atAccessToken} req = do
manager <- liftIO newTlsManager
res <-
liftIO $
Expand Down
2 changes: 1 addition & 1 deletion azure-key-vault/example/Main.hs
Original file line number Diff line number Diff line change
Expand Up @@ -2,10 +2,10 @@

module Main where

import Azure.Auth (defaultAzureCredential)
import Azure.Secret (getSecret)
import Azure.Secret.Types (KeyVaultHost (..), SecretName (..))
import Azure.Types (newEmptyToken)
import Azure.Auth (defaultAzureCredential)

main :: IO ()
main = do
Expand Down
Loading