Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GH-41095: [C++][FS][Azure] Add support for CopyFile with hierarchical namespace support #41276

Merged
merged 4 commits into from
Apr 22, 2024

Conversation

kou
Copy link
Member

@kou kou commented Apr 18, 2024

Rationale for this change

We need to add SAS (Shared Access Signatures) token for source URL.

What changes are included in this PR?

Generate SAS token for source URL.

Are these changes tested?

Yes.

Are there any user-facing changes?

Yes.

…chical namespace support

We need to add SAS (Shared Access Signatures) token for source URL.
Copy link

⚠️ GitHub issue #41095 has been automatically assigned in GitHub to PR creator.

@kou kou requested a review from felipecrv April 18, 2024 07:26
@github-actions github-actions bot added the awaiting committer review Awaiting committer review label Apr 18, 2024
if (storage_shared_key_credential_) {
return builder->GenerateSasToken(*storage_shared_key_credential_);
} else {
// This part isn't tested. This may not work.
Copy link
Member Author

@kou kou Apr 18, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Tom-Newton It seems that we can't use GetUserDelegationKey() with account key credential. We may need to use other authentication to test GetUserDelegationKey(). Do you know how to configure other authentication...?

(I think that we can defer this case to a separated issue.)

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm pretty sure its possible to create a SAS token from an account key but it probably isn't called delegated anymore.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes. We can create a SAS token from an account key. The above builder->GenerateSasToken(*storage_shared_key_credential_) does it.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry I misunderstood the intention (I haven't found time to review this).

Configuring other auths in testing might be a bit difficult. For Azurite I think the first challenge is configuring https, which I have struggled with before. Beyond that I think there are 2 viable options offered by Azure:

  1. Service principal
    1. Username and password for a service account
    2. Surprisingly complicated to create
  2. Azure CLI
    1. Authenticates as your user
    2. Requires installing the Azure CLI and running az login, then completing the login in your browser.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks.
I tried az login and ConfigureDefaultCredential() but some operations such as CreateDir() was blocked...
It seems that we need to implement GH-39344 to test this part.

I'll open a new issue for this part and defer this part in this PR.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I tried az login and ConfigureDefaultCredential() but some operations such as CreateDir() was blocked...
It seems that we need to implement #39344 to test this part.

This seems a bit suspicious. Default credential does include CLI auth...

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's look at this in #41315.

@github-actions github-actions bot added awaiting changes Awaiting changes and removed awaiting committer review Awaiting committer review labels Apr 18, 2024
@github-actions github-actions bot added awaiting change review Awaiting change review awaiting changes Awaiting changes and removed awaiting changes Awaiting changes awaiting change review Awaiting change review labels Apr 18, 2024
@github-actions github-actions bot added awaiting merge Awaiting merge awaiting changes Awaiting changes and removed awaiting changes Awaiting changes awaiting merge Awaiting merge labels Apr 19, 2024
@github-actions github-actions bot added awaiting change review Awaiting change review awaiting changes Awaiting changes and removed awaiting changes Awaiting changes awaiting change review Awaiting change review labels Apr 21, 2024
@kou
Copy link
Member Author

kou commented Apr 22, 2024

I'll merge this.

@kou kou merged commit 25bb627 into apache:main Apr 22, 2024
37 checks passed
@kou kou deleted the cpp-azurefs-hns-copy branch April 22, 2024 00:56
@kou kou removed the awaiting change review Awaiting change review label Apr 22, 2024
@github-actions github-actions bot added the awaiting changes Awaiting changes label Apr 22, 2024
Copy link

After merging your PR, Conbench analyzed the 7 benchmarking runs that have been run so far on merge-commit 25bb627.

There were no benchmark performance regressions. 🎉

The full Conbench report has more details. It also includes information about 3 possible false positives for unstable benchmarks that are known to sometimes produce them.

tolleybot pushed a commit to tmct/arrow that referenced this pull request May 2, 2024
…chical namespace support (apache#41276)

### Rationale for this change

We need to add SAS (Shared Access Signatures) token for source URL.

### What changes are included in this PR?

Generate SAS token for source URL.

### Are these changes tested?

Yes.

### Are there any user-facing changes?

Yes.
* GitHub Issue: apache#41095

Authored-by: Sutou Kouhei <[email protected]>
Signed-off-by: Sutou Kouhei <[email protected]>
tolleybot pushed a commit to tmct/arrow that referenced this pull request May 4, 2024
…chical namespace support (apache#41276)

### Rationale for this change

We need to add SAS (Shared Access Signatures) token for source URL.

### What changes are included in this PR?

Generate SAS token for source URL.

### Are these changes tested?

Yes.

### Are there any user-facing changes?

Yes.
* GitHub Issue: apache#41095

Authored-by: Sutou Kouhei <[email protected]>
Signed-off-by: Sutou Kouhei <[email protected]>
rok pushed a commit to tmct/arrow that referenced this pull request May 8, 2024
…chical namespace support (apache#41276)

### Rationale for this change

We need to add SAS (Shared Access Signatures) token for source URL.

### What changes are included in this PR?

Generate SAS token for source URL.

### Are these changes tested?

Yes.

### Are there any user-facing changes?

Yes.
* GitHub Issue: apache#41095

Authored-by: Sutou Kouhei <[email protected]>
Signed-off-by: Sutou Kouhei <[email protected]>
rok pushed a commit to tmct/arrow that referenced this pull request May 8, 2024
…chical namespace support (apache#41276)

### Rationale for this change

We need to add SAS (Shared Access Signatures) token for source URL.

### What changes are included in this PR?

Generate SAS token for source URL.

### Are these changes tested?

Yes.

### Are there any user-facing changes?

Yes.
* GitHub Issue: apache#41095

Authored-by: Sutou Kouhei <[email protected]>
Signed-off-by: Sutou Kouhei <[email protected]>
vibhatha pushed a commit to vibhatha/arrow that referenced this pull request May 25, 2024
…chical namespace support (apache#41276)

### Rationale for this change

We need to add SAS (Shared Access Signatures) token for source URL.

### What changes are included in this PR?

Generate SAS token for source URL.

### Are these changes tested?

Yes.

### Are there any user-facing changes?

Yes.
* GitHub Issue: apache#41095

Authored-by: Sutou Kouhei <[email protected]>
Signed-off-by: Sutou Kouhei <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants