@azure/storage-blob 12.31.0 → 12.32.0-beta.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (443) hide show
  1. package/dist/browser/BatchUtils.d.ts +1 -1
  2. package/dist/browser/BatchUtils.d.ts.map +1 -0
  3. package/dist/browser/BatchUtils.js +1 -1
  4. package/dist/browser/BatchUtils.js.map +1 -0
  5. package/dist/browser/BlobDownloadResponse.d.ts +5 -2
  6. package/dist/browser/BlobDownloadResponse.d.ts.map +1 -0
  7. package/dist/browser/BlobDownloadResponse.js +9 -5
  8. package/dist/browser/BlobDownloadResponse.js.map +1 -0
  9. package/dist/browser/BlobQueryResponse.d.ts +1 -1
  10. package/dist/browser/BlobQueryResponse.d.ts.map +1 -0
  11. package/dist/browser/BlobQueryResponse.js +1 -1
  12. package/dist/browser/BlobQueryResponse.js.map +1 -0
  13. package/dist/browser/BlobServiceClient.d.ts +36 -5
  14. package/dist/browser/BlobServiceClient.d.ts.map +1 -1
  15. package/dist/browser/BlobServiceClient.js +29 -17
  16. package/dist/browser/BlobServiceClient.js.map +1 -1
  17. package/dist/browser/Clients.d.ts +68 -14
  18. package/dist/browser/Clients.d.ts.map +1 -1
  19. package/dist/browser/Clients.js +97 -28
  20. package/dist/browser/Clients.js.map +1 -1
  21. package/dist/browser/ContainerClient.d.ts +6 -4
  22. package/dist/browser/ContainerClient.d.ts.map +1 -1
  23. package/dist/browser/ContainerClient.js +8 -6
  24. package/dist/browser/ContainerClient.js.map +1 -1
  25. package/dist/browser/Pipeline.d.ts +2 -3
  26. package/dist/browser/Pipeline.d.ts.map +1 -1
  27. package/dist/browser/Pipeline.js.map +1 -1
  28. package/dist/browser/generated/src/models/index.d.ts +59 -4
  29. package/dist/browser/generated/src/models/index.d.ts.map +1 -1
  30. package/dist/browser/generated/src/models/index.js +2 -2
  31. package/dist/browser/generated/src/models/index.js.map +1 -1
  32. package/dist/browser/generated/src/models/mappers.d.ts.map +1 -1
  33. package/dist/browser/generated/src/models/mappers.js +65 -0
  34. package/dist/browser/generated/src/models/mappers.js.map +1 -1
  35. package/dist/browser/generated/src/models/parameters.d.ts +7 -0
  36. package/dist/browser/generated/src/models/parameters.d.ts.map +1 -1
  37. package/dist/browser/generated/src/models/parameters.js +71 -1
  38. package/dist/browser/generated/src/models/parameters.js.map +1 -1
  39. package/dist/browser/generated/src/operations/appendBlob.js +5 -0
  40. package/dist/browser/generated/src/operations/appendBlob.js.map +1 -1
  41. package/dist/browser/generated/src/operations/blob.js +3 -0
  42. package/dist/browser/generated/src/operations/blob.js.map +1 -1
  43. package/dist/browser/generated/src/operations/blockBlob.js +10 -0
  44. package/dist/browser/generated/src/operations/blockBlob.js.map +1 -1
  45. package/dist/browser/generated/src/operations/pageBlob.js +5 -0
  46. package/dist/browser/generated/src/operations/pageBlob.js.map +1 -1
  47. package/dist/browser/generated/src/storageClient.js +2 -2
  48. package/dist/browser/generated/src/storageClient.js.map +1 -1
  49. package/dist/browser/generatedModels.d.ts +4 -4
  50. package/dist/browser/generatedModels.d.ts.map +1 -1
  51. package/dist/browser/generatedModels.js.map +1 -1
  52. package/dist/browser/index.d.ts +9 -9
  53. package/dist/browser/index.d.ts.map +1 -0
  54. package/dist/browser/index.js +1 -2
  55. package/dist/browser/index.js.map +1 -0
  56. package/dist/browser/internal-avro/index.d.ts +9 -2
  57. package/dist/browser/internal-avro/index.d.ts.map +1 -0
  58. package/dist/browser/internal-avro/index.js +14 -1
  59. package/dist/browser/internal-avro/index.js.map +1 -0
  60. package/dist/browser/models.d.ts +43 -0
  61. package/dist/browser/models.d.ts.map +1 -1
  62. package/dist/browser/models.js.map +1 -1
  63. package/dist/browser/sas/BlobSASSignatureValues.d.ts +11 -1
  64. package/dist/browser/sas/BlobSASSignatureValues.d.ts.map +1 -1
  65. package/dist/browser/sas/BlobSASSignatureValues.js +133 -2
  66. package/dist/browser/sas/BlobSASSignatureValues.js.map +1 -1
  67. package/dist/browser/sas/SASQueryParameters.d.ts +23 -2
  68. package/dist/browser/sas/SASQueryParameters.d.ts.map +1 -1
  69. package/dist/browser/sas/SASQueryParameters.js +34 -2
  70. package/dist/browser/sas/SASQueryParameters.js.map +1 -1
  71. package/dist/browser/utils/RetriableReadableStream.d.ts.map +1 -1
  72. package/dist/browser/utils/RetriableReadableStream.js +1 -0
  73. package/dist/browser/utils/RetriableReadableStream.js.map +1 -1
  74. package/dist/browser/utils/constants.d.ts.map +1 -1
  75. package/dist/browser/utils/constants.js +2 -2
  76. package/dist/browser/utils/constants.js.map +1 -1
  77. package/dist/browser/utils/utils.common.d.ts +16 -1
  78. package/dist/browser/utils/utils.common.d.ts.map +1 -1
  79. package/dist/browser/utils/utils.common.js +26 -0
  80. package/dist/browser/utils/utils.common.js.map +1 -1
  81. package/dist/browser/utils/utils.d.ts +12 -6
  82. package/dist/browser/utils/utils.d.ts.map +1 -0
  83. package/dist/browser/utils/utils.js +11 -11
  84. package/dist/browser/utils/utils.js.map +1 -0
  85. package/dist/commonjs/BatchResponse.js +15 -5
  86. package/dist/commonjs/BatchResponse.js.map +7 -1
  87. package/dist/commonjs/BatchResponseParser.js +127 -136
  88. package/dist/commonjs/BatchResponseParser.js.map +7 -1
  89. package/dist/commonjs/BatchUtils.js +38 -15
  90. package/dist/commonjs/BatchUtils.js.map +7 -1
  91. package/dist/commonjs/BlobBatch.js +280 -258
  92. package/dist/commonjs/BlobBatch.js.map +7 -1
  93. package/dist/commonjs/BlobBatchClient.js +188 -169
  94. package/dist/commonjs/BlobBatchClient.js.map +7 -1
  95. package/dist/commonjs/BlobDownloadResponse.d.ts +2 -1
  96. package/dist/commonjs/BlobDownloadResponse.d.ts.map +1 -1
  97. package/dist/commonjs/BlobDownloadResponse.js +487 -467
  98. package/dist/commonjs/BlobDownloadResponse.js.map +7 -1
  99. package/dist/commonjs/BlobLeaseClient.js +226 -196
  100. package/dist/commonjs/BlobLeaseClient.js.map +7 -1
  101. package/dist/commonjs/BlobQueryResponse.common.js +378 -365
  102. package/dist/commonjs/BlobQueryResponse.common.js.map +7 -1
  103. package/dist/commonjs/BlobQueryResponse.js +387 -371
  104. package/dist/commonjs/BlobQueryResponse.js.map +7 -1
  105. package/dist/commonjs/BlobServiceClient.d.ts +36 -5
  106. package/dist/commonjs/BlobServiceClient.d.ts.map +1 -1
  107. package/dist/commonjs/BlobServiceClient.js +784 -684
  108. package/dist/commonjs/BlobServiceClient.js.map +7 -1
  109. package/dist/commonjs/Clients.d.ts +68 -14
  110. package/dist/commonjs/Clients.d.ts.map +1 -1
  111. package/dist/commonjs/Clients.js +3120 -2804
  112. package/dist/commonjs/Clients.js.map +7 -1
  113. package/dist/commonjs/ContainerClient.d.ts +6 -4
  114. package/dist/commonjs/ContainerClient.d.ts.map +1 -1
  115. package/dist/commonjs/ContainerClient.js +1348 -1253
  116. package/dist/commonjs/ContainerClient.js.map +7 -1
  117. package/dist/commonjs/PageBlobRangeResponse.js +45 -31
  118. package/dist/commonjs/PageBlobRangeResponse.js.map +7 -1
  119. package/dist/commonjs/Pipeline.d.ts +2 -3
  120. package/dist/commonjs/Pipeline.d.ts.map +1 -1
  121. package/dist/commonjs/Pipeline.js +244 -244
  122. package/dist/commonjs/Pipeline.js.map +7 -1
  123. package/dist/commonjs/Range.js +35 -22
  124. package/dist/commonjs/Range.js.map +7 -1
  125. package/dist/commonjs/StorageClient.js +67 -54
  126. package/dist/commonjs/StorageClient.js.map +7 -1
  127. package/dist/commonjs/StorageContextClient.js +34 -19
  128. package/dist/commonjs/StorageContextClient.js.map +7 -1
  129. package/dist/commonjs/generated/src/index.js +32 -16
  130. package/dist/commonjs/generated/src/index.js.map +7 -1
  131. package/dist/commonjs/generated/src/models/index.d.ts +59 -4
  132. package/dist/commonjs/generated/src/models/index.d.ts.map +1 -1
  133. package/dist/commonjs/generated/src/models/index.js +164 -267
  134. package/dist/commonjs/generated/src/models/index.js.map +7 -1
  135. package/dist/commonjs/generated/src/models/mappers.d.ts.map +1 -1
  136. package/dist/commonjs/generated/src/models/mappers.js +8767 -8334
  137. package/dist/commonjs/generated/src/models/mappers.js.map +7 -1
  138. package/dist/commonjs/generated/src/models/parameters.d.ts +7 -0
  139. package/dist/commonjs/generated/src/models/parameters.d.ts.map +1 -1
  140. package/dist/commonjs/generated/src/models/parameters.js +2074 -1679
  141. package/dist/commonjs/generated/src/models/parameters.js.map +7 -1
  142. package/dist/commonjs/generated/src/operations/appendBlob.js +253 -214
  143. package/dist/commonjs/generated/src/operations/appendBlob.js.map +7 -1
  144. package/dist/commonjs/generated/src/operations/blob.js +1043 -961
  145. package/dist/commonjs/generated/src/operations/blob.js.map +7 -1
  146. package/dist/commonjs/generated/src/operations/blockBlob.js +406 -353
  147. package/dist/commonjs/generated/src/operations/blockBlob.js.map +7 -1
  148. package/dist/commonjs/generated/src/operations/container.js +735 -665
  149. package/dist/commonjs/generated/src/operations/container.js.map +7 -1
  150. package/dist/commonjs/generated/src/operations/index.js +31 -17
  151. package/dist/commonjs/generated/src/operations/index.js.map +7 -1
  152. package/dist/commonjs/generated/src/operations/pageBlob.js +491 -434
  153. package/dist/commonjs/generated/src/operations/pageBlob.js.map +7 -1
  154. package/dist/commonjs/generated/src/operations/service.js +352 -303
  155. package/dist/commonjs/generated/src/operations/service.js.map +7 -1
  156. package/dist/commonjs/generated/src/operationsInterfaces/appendBlob.js +15 -10
  157. package/dist/commonjs/generated/src/operationsInterfaces/appendBlob.js.map +7 -1
  158. package/dist/commonjs/generated/src/operationsInterfaces/blob.js +15 -10
  159. package/dist/commonjs/generated/src/operationsInterfaces/blob.js.map +7 -1
  160. package/dist/commonjs/generated/src/operationsInterfaces/blockBlob.js +15 -10
  161. package/dist/commonjs/generated/src/operationsInterfaces/blockBlob.js.map +7 -1
  162. package/dist/commonjs/generated/src/operationsInterfaces/container.js +15 -10
  163. package/dist/commonjs/generated/src/operationsInterfaces/container.js.map +7 -1
  164. package/dist/commonjs/generated/src/operationsInterfaces/index.js +31 -17
  165. package/dist/commonjs/generated/src/operationsInterfaces/index.js.map +7 -1
  166. package/dist/commonjs/generated/src/operationsInterfaces/pageBlob.js +15 -10
  167. package/dist/commonjs/generated/src/operationsInterfaces/pageBlob.js.map +7 -1
  168. package/dist/commonjs/generated/src/operationsInterfaces/service.js +15 -10
  169. package/dist/commonjs/generated/src/operationsInterfaces/service.js.map +7 -1
  170. package/dist/commonjs/generated/src/storageClient.js +81 -63
  171. package/dist/commonjs/generated/src/storageClient.js.map +7 -1
  172. package/dist/commonjs/generatedModels.d.ts +4 -4
  173. package/dist/commonjs/generatedModels.d.ts.map +1 -1
  174. package/dist/commonjs/generatedModels.js +30 -11
  175. package/dist/commonjs/generatedModels.js.map +7 -1
  176. package/dist/commonjs/index.d.ts +14 -14
  177. package/dist/commonjs/index.d.ts.map +1 -1
  178. package/dist/commonjs/index.js +106 -52
  179. package/dist/commonjs/index.js.map +7 -1
  180. package/dist/commonjs/internal-avro/AvroConstants.js +36 -10
  181. package/dist/commonjs/internal-avro/AvroConstants.js.map +7 -1
  182. package/dist/commonjs/internal-avro/AvroParser.js +307 -297
  183. package/dist/commonjs/internal-avro/AvroParser.js.map +7 -1
  184. package/dist/commonjs/internal-avro/AvroReadable.js +26 -7
  185. package/dist/commonjs/internal-avro/AvroReadable.js.map +7 -1
  186. package/dist/commonjs/internal-avro/AvroReadableFromBlob.js +69 -50
  187. package/dist/commonjs/internal-avro/AvroReadableFromBlob.js.map +7 -1
  188. package/dist/commonjs/internal-avro/AvroReadableFromStream.js +96 -84
  189. package/dist/commonjs/internal-avro/AvroReadableFromStream.js.map +7 -1
  190. package/dist/commonjs/internal-avro/AvroReader.js +118 -110
  191. package/dist/commonjs/internal-avro/AvroReader.js.map +7 -1
  192. package/dist/commonjs/internal-avro/index.d.ts +1 -1
  193. package/dist/commonjs/internal-avro/index.d.ts.map +1 -1
  194. package/dist/commonjs/internal-avro/index.js +33 -12
  195. package/dist/commonjs/internal-avro/index.js.map +7 -1
  196. package/dist/commonjs/internal-avro/utils/utils.common.js +33 -17
  197. package/dist/commonjs/internal-avro/utils/utils.common.js.map +7 -1
  198. package/dist/commonjs/log.js +28 -11
  199. package/dist/commonjs/log.js.map +7 -1
  200. package/dist/commonjs/models.d.ts +43 -0
  201. package/dist/commonjs/models.d.ts.map +1 -1
  202. package/dist/commonjs/models.js +74 -115
  203. package/dist/commonjs/models.js.map +7 -1
  204. package/dist/commonjs/pollers/BlobStartCopyFromUrlPoller.js +116 -126
  205. package/dist/commonjs/pollers/BlobStartCopyFromUrlPoller.js.map +7 -1
  206. package/dist/commonjs/sas/AccountSASPermissions.js +233 -226
  207. package/dist/commonjs/sas/AccountSASPermissions.js.map +7 -1
  208. package/dist/commonjs/sas/AccountSASResourceTypes.js +80 -70
  209. package/dist/commonjs/sas/AccountSASResourceTypes.js.map +7 -1
  210. package/dist/commonjs/sas/AccountSASServices.js +88 -78
  211. package/dist/commonjs/sas/AccountSASServices.js.map +7 -1
  212. package/dist/commonjs/sas/AccountSASSignatureValues.js +119 -100
  213. package/dist/commonjs/sas/AccountSASSignatureValues.js.map +7 -1
  214. package/dist/commonjs/sas/BlobSASPermissions.js +204 -194
  215. package/dist/commonjs/sas/BlobSASPermissions.js.map +7 -1
  216. package/dist/commonjs/sas/BlobSASSignatureValues.d.ts +11 -1
  217. package/dist/commonjs/sas/BlobSASSignatureValues.d.ts.map +1 -1
  218. package/dist/commonjs/sas/BlobSASSignatureValues.js +822 -641
  219. package/dist/commonjs/sas/BlobSASSignatureValues.js.map +7 -1
  220. package/dist/commonjs/sas/ContainerSASPermissions.js +232 -220
  221. package/dist/commonjs/sas/ContainerSASPermissions.js.map +7 -1
  222. package/dist/commonjs/sas/SASQueryParameters.d.ts +23 -2
  223. package/dist/commonjs/sas/SASQueryParameters.d.ts.map +1 -1
  224. package/dist/commonjs/sas/SASQueryParameters.js +423 -361
  225. package/dist/commonjs/sas/SASQueryParameters.js.map +7 -1
  226. package/dist/commonjs/sas/SasIPRange.js +27 -14
  227. package/dist/commonjs/sas/SasIPRange.js.map +7 -1
  228. package/dist/commonjs/tsdoc-metadata.json +1 -1
  229. package/dist/commonjs/utils/Batch.js +134 -127
  230. package/dist/commonjs/utils/Batch.js.map +7 -1
  231. package/dist/commonjs/utils/BlobQuickQueryStream.js +129 -115
  232. package/dist/commonjs/utils/BlobQuickQueryStream.js.map +7 -1
  233. package/dist/commonjs/utils/Mutex.js +78 -64
  234. package/dist/commonjs/utils/Mutex.js.map +7 -1
  235. package/dist/commonjs/utils/RetriableReadableStream.d.ts.map +1 -1
  236. package/dist/commonjs/utils/RetriableReadableStream.js +128 -125
  237. package/dist/commonjs/utils/RetriableReadableStream.js.map +7 -1
  238. package/dist/commonjs/utils/SharedKeyComparator.js +437 -65
  239. package/dist/commonjs/utils/SharedKeyComparator.js.map +7 -1
  240. package/dist/commonjs/utils/constants.d.ts.map +1 -1
  241. package/dist/commonjs/utils/constants.js +290 -223
  242. package/dist/commonjs/utils/constants.js.map +7 -1
  243. package/dist/commonjs/utils/tracing.js +32 -16
  244. package/dist/commonjs/utils/tracing.js.map +7 -1
  245. package/dist/commonjs/utils/utils.common.d.ts +16 -1
  246. package/dist/commonjs/utils/utils.common.d.ts.map +1 -1
  247. package/dist/commonjs/utils/utils.common.js +566 -740
  248. package/dist/commonjs/utils/utils.common.js.map +7 -1
  249. package/dist/commonjs/utils/utils.js +131 -128
  250. package/dist/commonjs/utils/utils.js.map +7 -1
  251. package/dist/esm/BlobDownloadResponse.d.ts +2 -1
  252. package/dist/esm/BlobDownloadResponse.d.ts.map +1 -1
  253. package/dist/esm/BlobDownloadResponse.js +8 -1
  254. package/dist/esm/BlobDownloadResponse.js.map +1 -1
  255. package/dist/esm/BlobServiceClient.d.ts +36 -5
  256. package/dist/esm/BlobServiceClient.d.ts.map +1 -1
  257. package/dist/esm/BlobServiceClient.js +29 -17
  258. package/dist/esm/BlobServiceClient.js.map +1 -1
  259. package/dist/esm/Clients.d.ts +68 -14
  260. package/dist/esm/Clients.d.ts.map +1 -1
  261. package/dist/esm/Clients.js +97 -28
  262. package/dist/esm/Clients.js.map +1 -1
  263. package/dist/esm/ContainerClient.d.ts +6 -4
  264. package/dist/esm/ContainerClient.d.ts.map +1 -1
  265. package/dist/esm/ContainerClient.js +8 -6
  266. package/dist/esm/ContainerClient.js.map +1 -1
  267. package/dist/esm/Pipeline.d.ts +2 -3
  268. package/dist/esm/Pipeline.d.ts.map +1 -1
  269. package/dist/esm/Pipeline.js.map +1 -1
  270. package/dist/esm/generated/src/models/index.d.ts +59 -4
  271. package/dist/esm/generated/src/models/index.d.ts.map +1 -1
  272. package/dist/esm/generated/src/models/index.js +2 -2
  273. package/dist/esm/generated/src/models/index.js.map +1 -1
  274. package/dist/esm/generated/src/models/mappers.d.ts.map +1 -1
  275. package/dist/esm/generated/src/models/mappers.js +65 -0
  276. package/dist/esm/generated/src/models/mappers.js.map +1 -1
  277. package/dist/esm/generated/src/models/parameters.d.ts +7 -0
  278. package/dist/esm/generated/src/models/parameters.d.ts.map +1 -1
  279. package/dist/esm/generated/src/models/parameters.js +71 -1
  280. package/dist/esm/generated/src/models/parameters.js.map +1 -1
  281. package/dist/esm/generated/src/operations/appendBlob.js +5 -0
  282. package/dist/esm/generated/src/operations/appendBlob.js.map +1 -1
  283. package/dist/esm/generated/src/operations/blob.js +3 -0
  284. package/dist/esm/generated/src/operations/blob.js.map +1 -1
  285. package/dist/esm/generated/src/operations/blockBlob.js +10 -0
  286. package/dist/esm/generated/src/operations/blockBlob.js.map +1 -1
  287. package/dist/esm/generated/src/operations/pageBlob.js +5 -0
  288. package/dist/esm/generated/src/operations/pageBlob.js.map +1 -1
  289. package/dist/esm/generated/src/storageClient.js +2 -2
  290. package/dist/esm/generated/src/storageClient.js.map +1 -1
  291. package/dist/esm/generatedModels.d.ts +4 -4
  292. package/dist/esm/generatedModels.d.ts.map +1 -1
  293. package/dist/esm/generatedModels.js.map +1 -1
  294. package/dist/esm/index.d.ts +14 -14
  295. package/dist/esm/index.d.ts.map +1 -1
  296. package/dist/esm/index.js +0 -1
  297. package/dist/esm/index.js.map +1 -1
  298. package/dist/esm/internal-avro/index.d.ts +1 -1
  299. package/dist/esm/internal-avro/index.d.ts.map +1 -1
  300. package/dist/esm/internal-avro/index.js.map +1 -1
  301. package/dist/esm/models.d.ts +43 -0
  302. package/dist/esm/models.d.ts.map +1 -1
  303. package/dist/esm/models.js.map +1 -1
  304. package/dist/esm/sas/BlobSASSignatureValues.d.ts +11 -1
  305. package/dist/esm/sas/BlobSASSignatureValues.d.ts.map +1 -1
  306. package/dist/esm/sas/BlobSASSignatureValues.js +133 -2
  307. package/dist/esm/sas/BlobSASSignatureValues.js.map +1 -1
  308. package/dist/esm/sas/SASQueryParameters.d.ts +23 -2
  309. package/dist/esm/sas/SASQueryParameters.d.ts.map +1 -1
  310. package/dist/esm/sas/SASQueryParameters.js +34 -2
  311. package/dist/esm/sas/SASQueryParameters.js.map +1 -1
  312. package/dist/esm/utils/RetriableReadableStream.d.ts.map +1 -1
  313. package/dist/esm/utils/RetriableReadableStream.js +1 -0
  314. package/dist/esm/utils/RetriableReadableStream.js.map +1 -1
  315. package/dist/esm/utils/constants.d.ts.map +1 -1
  316. package/dist/esm/utils/constants.js +2 -2
  317. package/dist/esm/utils/constants.js.map +1 -1
  318. package/dist/esm/utils/utils.common.d.ts +16 -1
  319. package/dist/esm/utils/utils.common.d.ts.map +1 -1
  320. package/dist/esm/utils/utils.common.js +26 -0
  321. package/dist/esm/utils/utils.common.js.map +1 -1
  322. package/dist/react-native/BlobDownloadResponse.d.ts +5 -2
  323. package/dist/react-native/BlobDownloadResponse.d.ts.map +1 -0
  324. package/dist/react-native/BlobDownloadResponse.js +9 -5
  325. package/dist/react-native/BlobDownloadResponse.js.map +1 -0
  326. package/dist/react-native/BlobQueryResponse.d.ts +1 -1
  327. package/dist/react-native/BlobQueryResponse.d.ts.map +1 -0
  328. package/dist/react-native/BlobQueryResponse.js +1 -1
  329. package/dist/react-native/BlobQueryResponse.js.map +1 -0
  330. package/dist/react-native/BlobServiceClient.d.ts +36 -5
  331. package/dist/react-native/BlobServiceClient.d.ts.map +1 -1
  332. package/dist/react-native/BlobServiceClient.js +29 -17
  333. package/dist/react-native/BlobServiceClient.js.map +1 -1
  334. package/dist/react-native/Clients.d.ts +68 -14
  335. package/dist/react-native/Clients.d.ts.map +1 -1
  336. package/dist/react-native/Clients.js +97 -28
  337. package/dist/react-native/Clients.js.map +1 -1
  338. package/dist/react-native/ContainerClient.d.ts +6 -4
  339. package/dist/react-native/ContainerClient.d.ts.map +1 -1
  340. package/dist/react-native/ContainerClient.js +8 -6
  341. package/dist/react-native/ContainerClient.js.map +1 -1
  342. package/dist/react-native/Pipeline.d.ts +2 -3
  343. package/dist/react-native/Pipeline.d.ts.map +1 -1
  344. package/dist/react-native/Pipeline.js.map +1 -1
  345. package/dist/react-native/generated/src/models/index.d.ts +59 -4
  346. package/dist/react-native/generated/src/models/index.d.ts.map +1 -1
  347. package/dist/react-native/generated/src/models/index.js +2 -2
  348. package/dist/react-native/generated/src/models/index.js.map +1 -1
  349. package/dist/react-native/generated/src/models/mappers.d.ts.map +1 -1
  350. package/dist/react-native/generated/src/models/mappers.js +65 -0
  351. package/dist/react-native/generated/src/models/mappers.js.map +1 -1
  352. package/dist/react-native/generated/src/models/parameters.d.ts +7 -0
  353. package/dist/react-native/generated/src/models/parameters.d.ts.map +1 -1
  354. package/dist/react-native/generated/src/models/parameters.js +71 -1
  355. package/dist/react-native/generated/src/models/parameters.js.map +1 -1
  356. package/dist/react-native/generated/src/operations/appendBlob.js +5 -0
  357. package/dist/react-native/generated/src/operations/appendBlob.js.map +1 -1
  358. package/dist/react-native/generated/src/operations/blob.js +3 -0
  359. package/dist/react-native/generated/src/operations/blob.js.map +1 -1
  360. package/dist/react-native/generated/src/operations/blockBlob.js +10 -0
  361. package/dist/react-native/generated/src/operations/blockBlob.js.map +1 -1
  362. package/dist/react-native/generated/src/operations/pageBlob.js +5 -0
  363. package/dist/react-native/generated/src/operations/pageBlob.js.map +1 -1
  364. package/dist/react-native/generated/src/storageClient.js +2 -2
  365. package/dist/react-native/generated/src/storageClient.js.map +1 -1
  366. package/dist/react-native/generatedModels.d.ts +4 -4
  367. package/dist/react-native/generatedModels.d.ts.map +1 -1
  368. package/dist/react-native/generatedModels.js.map +1 -1
  369. package/dist/react-native/index.d.ts +14 -14
  370. package/dist/react-native/index.d.ts.map +1 -1
  371. package/dist/react-native/index.js +0 -1
  372. package/dist/react-native/index.js.map +1 -1
  373. package/dist/react-native/internal-avro/index.d.ts +1 -1
  374. package/dist/react-native/internal-avro/index.d.ts.map +1 -1
  375. package/dist/react-native/internal-avro/index.js.map +1 -1
  376. package/dist/react-native/models.d.ts +43 -0
  377. package/dist/react-native/models.d.ts.map +1 -1
  378. package/dist/react-native/models.js.map +1 -1
  379. package/dist/react-native/sas/BlobSASSignatureValues.d.ts +11 -1
  380. package/dist/react-native/sas/BlobSASSignatureValues.d.ts.map +1 -1
  381. package/dist/react-native/sas/BlobSASSignatureValues.js +133 -2
  382. package/dist/react-native/sas/BlobSASSignatureValues.js.map +1 -1
  383. package/dist/react-native/sas/SASQueryParameters.d.ts +23 -2
  384. package/dist/react-native/sas/SASQueryParameters.d.ts.map +1 -1
  385. package/dist/react-native/sas/SASQueryParameters.js +34 -2
  386. package/dist/react-native/sas/SASQueryParameters.js.map +1 -1
  387. package/dist/react-native/utils/RetriableReadableStream.d.ts.map +1 -1
  388. package/dist/react-native/utils/RetriableReadableStream.js +1 -0
  389. package/dist/react-native/utils/RetriableReadableStream.js.map +1 -1
  390. package/dist/react-native/utils/constants.d.ts.map +1 -1
  391. package/dist/react-native/utils/constants.js +2 -2
  392. package/dist/react-native/utils/constants.js.map +1 -1
  393. package/dist/react-native/utils/utils.common.d.ts +16 -1
  394. package/dist/react-native/utils/utils.common.d.ts.map +1 -1
  395. package/dist/react-native/utils/utils.common.js +26 -0
  396. package/dist/react-native/utils/utils.common.js.map +1 -1
  397. package/dist/react-native/utils/utils.d.ts +12 -6
  398. package/dist/react-native/utils/utils.d.ts.map +1 -0
  399. package/dist/react-native/utils/utils.js +11 -11
  400. package/dist/react-native/utils/utils.js.map +1 -0
  401. package/package.json +3 -20
  402. package/dist/browser/BatchUtils-browser.d.mts.map +0 -1
  403. package/dist/browser/BatchUtils-browser.mjs.map +0 -1
  404. package/dist/browser/BlobDownloadResponse-browser.d.mts.map +0 -1
  405. package/dist/browser/BlobDownloadResponse-browser.mjs.map +0 -1
  406. package/dist/browser/BlobQueryResponse-browser.d.mts.map +0 -1
  407. package/dist/browser/BlobQueryResponse-browser.mjs.map +0 -1
  408. package/dist/browser/credentials/StorageSharedKeyCredential-react-native.d.mts +0 -3
  409. package/dist/browser/credentials/StorageSharedKeyCredential-react-native.d.mts.map +0 -1
  410. package/dist/browser/credentials/StorageSharedKeyCredential-react-native.mjs +0 -5
  411. package/dist/browser/credentials/StorageSharedKeyCredential-react-native.mjs.map +0 -1
  412. package/dist/browser/index-browser.d.mts.map +0 -1
  413. package/dist/browser/index-browser.mjs.map +0 -1
  414. package/dist/browser/internal-avro/index-browser.d.mts.map +0 -1
  415. package/dist/browser/internal-avro/index-browser.mjs.map +0 -1
  416. package/dist/browser/policies/StorageSharedKeyCredentialPolicyV2-react-native.d.mts +0 -17
  417. package/dist/browser/policies/StorageSharedKeyCredentialPolicyV2-react-native.d.mts.map +0 -1
  418. package/dist/browser/policies/StorageSharedKeyCredentialPolicyV2-react-native.mjs +0 -18
  419. package/dist/browser/policies/StorageSharedKeyCredentialPolicyV2-react-native.mjs.map +0 -1
  420. package/dist/browser/utils/utils-browser.d.mts.map +0 -1
  421. package/dist/browser/utils/utils-browser.mjs.map +0 -1
  422. package/dist/esm/credentials/StorageSharedKeyCredential-react-native.d.mts +0 -3
  423. package/dist/esm/credentials/StorageSharedKeyCredential-react-native.d.mts.map +0 -1
  424. package/dist/esm/credentials/StorageSharedKeyCredential-react-native.mjs +0 -5
  425. package/dist/esm/credentials/StorageSharedKeyCredential-react-native.mjs.map +0 -1
  426. package/dist/esm/policies/StorageSharedKeyCredentialPolicyV2-react-native.d.mts +0 -17
  427. package/dist/esm/policies/StorageSharedKeyCredentialPolicyV2-react-native.d.mts.map +0 -1
  428. package/dist/esm/policies/StorageSharedKeyCredentialPolicyV2-react-native.mjs +0 -18
  429. package/dist/esm/policies/StorageSharedKeyCredentialPolicyV2-react-native.mjs.map +0 -1
  430. package/dist/react-native/BlobDownloadResponse-react-native.d.mts.map +0 -1
  431. package/dist/react-native/BlobDownloadResponse-react-native.mjs.map +0 -1
  432. package/dist/react-native/BlobQueryResponse-react-native.d.mts.map +0 -1
  433. package/dist/react-native/BlobQueryResponse-react-native.mjs.map +0 -1
  434. package/dist/react-native/credentials/StorageSharedKeyCredential-react-native.d.mts +0 -3
  435. package/dist/react-native/credentials/StorageSharedKeyCredential-react-native.d.mts.map +0 -1
  436. package/dist/react-native/credentials/StorageSharedKeyCredential-react-native.mjs +0 -5
  437. package/dist/react-native/credentials/StorageSharedKeyCredential-react-native.mjs.map +0 -1
  438. package/dist/react-native/policies/StorageSharedKeyCredentialPolicyV2-react-native.d.mts +0 -17
  439. package/dist/react-native/policies/StorageSharedKeyCredentialPolicyV2-react-native.d.mts.map +0 -1
  440. package/dist/react-native/policies/StorageSharedKeyCredentialPolicyV2-react-native.mjs +0 -18
  441. package/dist/react-native/policies/StorageSharedKeyCredentialPolicyV2-react-native.mjs.map +0 -1
  442. package/dist/react-native/utils/utils-react-native.d.mts.map +0 -1
  443. package/dist/react-native/utils/utils-react-native.mjs.map +0 -1
@@ -1,670 +1,851 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.generateBlobSASQueryParameters = generateBlobSASQueryParameters;
4
- exports.generateBlobSASQueryParametersInternal = generateBlobSASQueryParametersInternal;
5
- // Copyright (c) Microsoft Corporation.
6
- // Licensed under the MIT License.
7
- const BlobSASPermissions_js_1 = require("./BlobSASPermissions.js");
8
- const ContainerSASPermissions_js_1 = require("./ContainerSASPermissions.js");
9
- const storage_common_1 = require("@azure/storage-common");
10
- const SasIPRange_js_1 = require("./SasIPRange.js");
11
- const SASQueryParameters_js_1 = require("./SASQueryParameters.js");
12
- const constants_js_1 = require("../utils/constants.js");
13
- const utils_common_js_1 = require("../utils/utils.common.js");
14
- const storage_common_2 = require("@azure/storage-common");
1
+ var __defProp = Object.defineProperty;
2
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
3
+ var __getOwnPropNames = Object.getOwnPropertyNames;
4
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
5
+ var __export = (target, all) => {
6
+ for (var name in all)
7
+ __defProp(target, name, { get: all[name], enumerable: true });
8
+ };
9
+ var __copyProps = (to, from, except, desc) => {
10
+ if (from && typeof from === "object" || typeof from === "function") {
11
+ for (let key of __getOwnPropNames(from))
12
+ if (!__hasOwnProp.call(to, key) && key !== except)
13
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
14
+ }
15
+ return to;
16
+ };
17
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
18
+ var BlobSASSignatureValues_exports = {};
19
+ __export(BlobSASSignatureValues_exports, {
20
+ generateBlobSASQueryParameters: () => generateBlobSASQueryParameters,
21
+ generateBlobSASQueryParametersInternal: () => generateBlobSASQueryParametersInternal
22
+ });
23
+ module.exports = __toCommonJS(BlobSASSignatureValues_exports);
24
+ var import_BlobSASPermissions = require("./BlobSASPermissions.js");
25
+ var import_ContainerSASPermissions = require("./ContainerSASPermissions.js");
26
+ var import_storage_common = require("@azure/storage-common");
27
+ var import_SasIPRange = require("./SasIPRange.js");
28
+ var import_SASQueryParameters = require("./SASQueryParameters.js");
29
+ var import_constants = require("../utils/constants.js");
30
+ var import_utils_common = require("../utils/utils.common.js");
31
+ var import_storage_common2 = require("@azure/storage-common");
15
32
  function generateBlobSASQueryParameters(blobSASSignatureValues, sharedKeyCredentialOrUserDelegationKey, accountName) {
16
- return generateBlobSASQueryParametersInternal(blobSASSignatureValues, sharedKeyCredentialOrUserDelegationKey, accountName).sasQueryParameters;
33
+ return generateBlobSASQueryParametersInternal(
34
+ blobSASSignatureValues,
35
+ sharedKeyCredentialOrUserDelegationKey,
36
+ accountName
37
+ ).sasQueryParameters;
17
38
  }
18
39
  function generateBlobSASQueryParametersInternal(blobSASSignatureValues, sharedKeyCredentialOrUserDelegationKey, accountName) {
19
- const version = blobSASSignatureValues.version ? blobSASSignatureValues.version : constants_js_1.SERVICE_VERSION;
20
- const sharedKeyCredential = sharedKeyCredentialOrUserDelegationKey instanceof storage_common_1.StorageSharedKeyCredential
21
- ? sharedKeyCredentialOrUserDelegationKey
22
- : undefined;
23
- let userDelegationKeyCredential;
24
- if (sharedKeyCredential === undefined && accountName !== undefined) {
25
- userDelegationKeyCredential = new storage_common_2.UserDelegationKeyCredential(accountName, sharedKeyCredentialOrUserDelegationKey);
26
- }
27
- if (sharedKeyCredential === undefined && userDelegationKeyCredential === undefined) {
28
- throw TypeError("Invalid sharedKeyCredential, userDelegationKey or accountName.");
29
- }
30
- // Version 2020-12-06 adds support for encryptionscope in SAS.
31
- if (version >= "2020-12-06") {
32
- if (sharedKeyCredential !== undefined) {
33
- return generateBlobSASQueryParameters20201206(blobSASSignatureValues, sharedKeyCredential);
34
- }
35
- else {
36
- if (version >= "2025-07-05") {
37
- return generateBlobSASQueryParametersUDK20250705(blobSASSignatureValues, userDelegationKeyCredential);
38
- }
39
- else {
40
- return generateBlobSASQueryParametersUDK20201206(blobSASSignatureValues, userDelegationKeyCredential);
41
- }
42
- }
43
- }
44
- // Version 2019-12-12 adds support for the blob tags permission.
45
- // Version 2018-11-09 adds support for the signed resource and signed blob snapshot time fields.
46
- // https://learn.microsoft.com/rest/api/storageservices/constructing-a-service-sas#constructing-the-signature-string
47
- if (version >= "2018-11-09") {
48
- if (sharedKeyCredential !== undefined) {
49
- return generateBlobSASQueryParameters20181109(blobSASSignatureValues, sharedKeyCredential);
50
- }
51
- else {
52
- // Version 2020-02-10 delegation SAS signature construction includes preauthorizedAgentObjectId, agentObjectId, correlationId.
53
- if (version >= "2020-02-10") {
54
- return generateBlobSASQueryParametersUDK20200210(blobSASSignatureValues, userDelegationKeyCredential);
55
- }
56
- else {
57
- return generateBlobSASQueryParametersUDK20181109(blobSASSignatureValues, userDelegationKeyCredential);
58
- }
59
- }
60
- }
61
- if (version >= "2015-04-05") {
62
- if (sharedKeyCredential !== undefined) {
63
- return generateBlobSASQueryParameters20150405(blobSASSignatureValues, sharedKeyCredential);
64
- }
65
- else {
66
- throw new RangeError("'version' must be >= '2018-11-09' when generating user delegation SAS using user delegation key.");
67
- }
68
- }
69
- throw new RangeError("'version' must be >= '2015-04-05'.");
40
+ const version = blobSASSignatureValues.version ? blobSASSignatureValues.version : import_constants.SERVICE_VERSION;
41
+ const sharedKeyCredential = sharedKeyCredentialOrUserDelegationKey instanceof import_storage_common.StorageSharedKeyCredential ? sharedKeyCredentialOrUserDelegationKey : void 0;
42
+ let userDelegationKeyCredential;
43
+ if (sharedKeyCredential === void 0 && accountName !== void 0) {
44
+ userDelegationKeyCredential = new import_storage_common2.UserDelegationKeyCredential(
45
+ accountName,
46
+ sharedKeyCredentialOrUserDelegationKey
47
+ );
48
+ }
49
+ if (sharedKeyCredential === void 0 && userDelegationKeyCredential === void 0) {
50
+ throw TypeError("Invalid sharedKeyCredential, userDelegationKey or accountName.");
51
+ }
52
+ if (version >= "2020-12-06") {
53
+ if (sharedKeyCredential !== void 0) {
54
+ return generateBlobSASQueryParameters20201206(blobSASSignatureValues, sharedKeyCredential);
55
+ } else {
56
+ if (version >= "2026-04-06") {
57
+ return generateBlobSASQueryParametersUDK20260406(
58
+ blobSASSignatureValues,
59
+ userDelegationKeyCredential
60
+ );
61
+ } else if (version >= "2025-07-05") {
62
+ return generateBlobSASQueryParametersUDK20250705(
63
+ blobSASSignatureValues,
64
+ userDelegationKeyCredential
65
+ );
66
+ } else {
67
+ return generateBlobSASQueryParametersUDK20201206(
68
+ blobSASSignatureValues,
69
+ userDelegationKeyCredential
70
+ );
71
+ }
72
+ }
73
+ }
74
+ if (version >= "2018-11-09") {
75
+ if (sharedKeyCredential !== void 0) {
76
+ return generateBlobSASQueryParameters20181109(blobSASSignatureValues, sharedKeyCredential);
77
+ } else {
78
+ if (version >= "2020-02-10") {
79
+ return generateBlobSASQueryParametersUDK20200210(
80
+ blobSASSignatureValues,
81
+ userDelegationKeyCredential
82
+ );
83
+ } else {
84
+ return generateBlobSASQueryParametersUDK20181109(
85
+ blobSASSignatureValues,
86
+ userDelegationKeyCredential
87
+ );
88
+ }
89
+ }
90
+ }
91
+ if (version >= "2015-04-05") {
92
+ if (sharedKeyCredential !== void 0) {
93
+ return generateBlobSASQueryParameters20150405(blobSASSignatureValues, sharedKeyCredential);
94
+ } else {
95
+ throw new RangeError(
96
+ "'version' must be >= '2018-11-09' when generating user delegation SAS using user delegation key."
97
+ );
98
+ }
99
+ }
100
+ throw new RangeError("'version' must be >= '2015-04-05'.");
70
101
  }
71
- /**
72
- * ONLY AVAILABLE IN NODE.JS RUNTIME.
73
- * IMPLEMENTATION FOR API VERSION FROM 2015-04-05 AND BEFORE 2018-11-09.
74
- *
75
- * Creates an instance of SASQueryParameters.
76
- *
77
- * Only accepts required settings needed to create a SAS. For optional settings please
78
- * set corresponding properties directly, such as permissions, startsOn and identifier.
79
- *
80
- * WARNING: When identifier is not provided, permissions and expiresOn are required.
81
- * You MUST assign value to identifier or expiresOn & permissions manually if you initial with
82
- * this constructor.
83
- *
84
- * @param blobSASSignatureValues -
85
- * @param sharedKeyCredential -
86
- */
87
102
  function generateBlobSASQueryParameters20150405(blobSASSignatureValues, sharedKeyCredential) {
88
- blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
89
- if (!blobSASSignatureValues.identifier &&
90
- !(blobSASSignatureValues.permissions && blobSASSignatureValues.expiresOn)) {
91
- throw new RangeError("Must provide 'permissions' and 'expiresOn' for Blob SAS generation when 'identifier' is not provided.");
92
- }
93
- let resource = "c";
103
+ blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
104
+ if (!blobSASSignatureValues.identifier && !(blobSASSignatureValues.permissions && blobSASSignatureValues.expiresOn)) {
105
+ throw new RangeError(
106
+ "Must provide 'permissions' and 'expiresOn' for Blob SAS generation when 'identifier' is not provided."
107
+ );
108
+ }
109
+ let resource = "c";
110
+ if (blobSASSignatureValues.blobName) {
111
+ resource = "b";
112
+ }
113
+ let verifiedPermissions;
114
+ if (blobSASSignatureValues.permissions) {
94
115
  if (blobSASSignatureValues.blobName) {
95
- resource = "b";
96
- }
97
- // Calling parse and toString guarantees the proper ordering and throws on invalid characters.
98
- let verifiedPermissions;
99
- if (blobSASSignatureValues.permissions) {
100
- if (blobSASSignatureValues.blobName) {
101
- verifiedPermissions = BlobSASPermissions_js_1.BlobSASPermissions.parse(blobSASSignatureValues.permissions.toString()).toString();
102
- }
103
- else {
104
- verifiedPermissions = ContainerSASPermissions_js_1.ContainerSASPermissions.parse(blobSASSignatureValues.permissions.toString()).toString();
105
- }
106
- }
107
- // Signature is generated on the un-url-encoded values.
108
- const stringToSign = [
109
- verifiedPermissions ? verifiedPermissions : "",
110
- blobSASSignatureValues.startsOn
111
- ? (0, utils_common_js_1.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false)
112
- : "",
113
- blobSASSignatureValues.expiresOn
114
- ? (0, utils_common_js_1.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false)
115
- : "",
116
- getCanonicalName(sharedKeyCredential.accountName, blobSASSignatureValues.containerName, blobSASSignatureValues.blobName),
117
- blobSASSignatureValues.identifier,
118
- blobSASSignatureValues.ipRange ? (0, SasIPRange_js_1.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
119
- blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
120
- blobSASSignatureValues.version,
121
- blobSASSignatureValues.cacheControl ? blobSASSignatureValues.cacheControl : "",
122
- blobSASSignatureValues.contentDisposition ? blobSASSignatureValues.contentDisposition : "",
123
- blobSASSignatureValues.contentEncoding ? blobSASSignatureValues.contentEncoding : "",
124
- blobSASSignatureValues.contentLanguage ? blobSASSignatureValues.contentLanguage : "",
125
- blobSASSignatureValues.contentType ? blobSASSignatureValues.contentType : "",
126
- ].join("\n");
127
- const signature = sharedKeyCredential.computeHMACSHA256(stringToSign);
128
- return {
129
- sasQueryParameters: new SASQueryParameters_js_1.SASQueryParameters(blobSASSignatureValues.version, signature, verifiedPermissions, undefined, undefined, blobSASSignatureValues.protocol, blobSASSignatureValues.startsOn, blobSASSignatureValues.expiresOn, blobSASSignatureValues.ipRange, blobSASSignatureValues.identifier, resource, blobSASSignatureValues.cacheControl, blobSASSignatureValues.contentDisposition, blobSASSignatureValues.contentEncoding, blobSASSignatureValues.contentLanguage, blobSASSignatureValues.contentType),
130
- stringToSign: stringToSign,
131
- };
116
+ verifiedPermissions = import_BlobSASPermissions.BlobSASPermissions.parse(
117
+ blobSASSignatureValues.permissions.toString()
118
+ ).toString();
119
+ } else {
120
+ verifiedPermissions = import_ContainerSASPermissions.ContainerSASPermissions.parse(
121
+ blobSASSignatureValues.permissions.toString()
122
+ ).toString();
123
+ }
124
+ }
125
+ const stringToSign = [
126
+ verifiedPermissions ? verifiedPermissions : "",
127
+ blobSASSignatureValues.startsOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false) : "",
128
+ blobSASSignatureValues.expiresOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false) : "",
129
+ getCanonicalName(
130
+ sharedKeyCredential.accountName,
131
+ blobSASSignatureValues.containerName,
132
+ blobSASSignatureValues.blobName
133
+ ),
134
+ blobSASSignatureValues.identifier,
135
+ blobSASSignatureValues.ipRange ? (0, import_SasIPRange.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
136
+ blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
137
+ blobSASSignatureValues.version,
138
+ blobSASSignatureValues.cacheControl ? blobSASSignatureValues.cacheControl : "",
139
+ blobSASSignatureValues.contentDisposition ? blobSASSignatureValues.contentDisposition : "",
140
+ blobSASSignatureValues.contentEncoding ? blobSASSignatureValues.contentEncoding : "",
141
+ blobSASSignatureValues.contentLanguage ? blobSASSignatureValues.contentLanguage : "",
142
+ blobSASSignatureValues.contentType ? blobSASSignatureValues.contentType : ""
143
+ ].join("\n");
144
+ const signature = sharedKeyCredential.computeHMACSHA256(stringToSign);
145
+ return {
146
+ sasQueryParameters: new import_SASQueryParameters.SASQueryParameters(
147
+ blobSASSignatureValues.version,
148
+ signature,
149
+ verifiedPermissions,
150
+ void 0,
151
+ void 0,
152
+ blobSASSignatureValues.protocol,
153
+ blobSASSignatureValues.startsOn,
154
+ blobSASSignatureValues.expiresOn,
155
+ blobSASSignatureValues.ipRange,
156
+ blobSASSignatureValues.identifier,
157
+ resource,
158
+ blobSASSignatureValues.cacheControl,
159
+ blobSASSignatureValues.contentDisposition,
160
+ blobSASSignatureValues.contentEncoding,
161
+ blobSASSignatureValues.contentLanguage,
162
+ blobSASSignatureValues.contentType
163
+ ),
164
+ stringToSign
165
+ };
132
166
  }
133
- /**
134
- * ONLY AVAILABLE IN NODE.JS RUNTIME.
135
- * IMPLEMENTATION FOR API VERSION FROM 2018-11-09.
136
- *
137
- * Creates an instance of SASQueryParameters.
138
- *
139
- * Only accepts required settings needed to create a SAS. For optional settings please
140
- * set corresponding properties directly, such as permissions, startsOn and identifier.
141
- *
142
- * WARNING: When identifier is not provided, permissions and expiresOn are required.
143
- * You MUST assign value to identifier or expiresOn & permissions manually if you initial with
144
- * this constructor.
145
- *
146
- * @param blobSASSignatureValues -
147
- * @param sharedKeyCredential -
148
- */
149
167
  function generateBlobSASQueryParameters20181109(blobSASSignatureValues, sharedKeyCredential) {
150
- blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
151
- if (!blobSASSignatureValues.identifier &&
152
- !(blobSASSignatureValues.permissions && blobSASSignatureValues.expiresOn)) {
153
- throw new RangeError("Must provide 'permissions' and 'expiresOn' for Blob SAS generation when 'identifier' is not provided.");
154
- }
155
- let resource = "c";
156
- let timestamp = blobSASSignatureValues.snapshotTime;
168
+ blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
169
+ if (!blobSASSignatureValues.identifier && !(blobSASSignatureValues.permissions && blobSASSignatureValues.expiresOn)) {
170
+ throw new RangeError(
171
+ "Must provide 'permissions' and 'expiresOn' for Blob SAS generation when 'identifier' is not provided."
172
+ );
173
+ }
174
+ let resource = "c";
175
+ let timestamp = blobSASSignatureValues.snapshotTime;
176
+ if (blobSASSignatureValues.blobName) {
177
+ resource = "b";
178
+ if (blobSASSignatureValues.snapshotTime) {
179
+ resource = "bs";
180
+ } else if (blobSASSignatureValues.versionId) {
181
+ resource = "bv";
182
+ timestamp = blobSASSignatureValues.versionId;
183
+ }
184
+ }
185
+ let verifiedPermissions;
186
+ if (blobSASSignatureValues.permissions) {
157
187
  if (blobSASSignatureValues.blobName) {
158
- resource = "b";
159
- if (blobSASSignatureValues.snapshotTime) {
160
- resource = "bs";
161
- }
162
- else if (blobSASSignatureValues.versionId) {
163
- resource = "bv";
164
- timestamp = blobSASSignatureValues.versionId;
165
- }
166
- }
167
- // Calling parse and toString guarantees the proper ordering and throws on invalid characters.
168
- let verifiedPermissions;
169
- if (blobSASSignatureValues.permissions) {
170
- if (blobSASSignatureValues.blobName) {
171
- verifiedPermissions = BlobSASPermissions_js_1.BlobSASPermissions.parse(blobSASSignatureValues.permissions.toString()).toString();
172
- }
173
- else {
174
- verifiedPermissions = ContainerSASPermissions_js_1.ContainerSASPermissions.parse(blobSASSignatureValues.permissions.toString()).toString();
175
- }
176
- }
177
- // Signature is generated on the un-url-encoded values.
178
- const stringToSign = [
179
- verifiedPermissions ? verifiedPermissions : "",
180
- blobSASSignatureValues.startsOn
181
- ? (0, utils_common_js_1.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false)
182
- : "",
183
- blobSASSignatureValues.expiresOn
184
- ? (0, utils_common_js_1.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false)
185
- : "",
186
- getCanonicalName(sharedKeyCredential.accountName, blobSASSignatureValues.containerName, blobSASSignatureValues.blobName),
187
- blobSASSignatureValues.identifier,
188
- blobSASSignatureValues.ipRange ? (0, SasIPRange_js_1.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
189
- blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
190
- blobSASSignatureValues.version,
191
- resource,
192
- timestamp,
193
- blobSASSignatureValues.cacheControl ? blobSASSignatureValues.cacheControl : "",
194
- blobSASSignatureValues.contentDisposition ? blobSASSignatureValues.contentDisposition : "",
195
- blobSASSignatureValues.contentEncoding ? blobSASSignatureValues.contentEncoding : "",
196
- blobSASSignatureValues.contentLanguage ? blobSASSignatureValues.contentLanguage : "",
197
- blobSASSignatureValues.contentType ? blobSASSignatureValues.contentType : "",
198
- ].join("\n");
199
- const signature = sharedKeyCredential.computeHMACSHA256(stringToSign);
200
- return {
201
- sasQueryParameters: new SASQueryParameters_js_1.SASQueryParameters(blobSASSignatureValues.version, signature, verifiedPermissions, undefined, undefined, blobSASSignatureValues.protocol, blobSASSignatureValues.startsOn, blobSASSignatureValues.expiresOn, blobSASSignatureValues.ipRange, blobSASSignatureValues.identifier, resource, blobSASSignatureValues.cacheControl, blobSASSignatureValues.contentDisposition, blobSASSignatureValues.contentEncoding, blobSASSignatureValues.contentLanguage, blobSASSignatureValues.contentType),
202
- stringToSign: stringToSign,
203
- };
188
+ verifiedPermissions = import_BlobSASPermissions.BlobSASPermissions.parse(
189
+ blobSASSignatureValues.permissions.toString()
190
+ ).toString();
191
+ } else {
192
+ verifiedPermissions = import_ContainerSASPermissions.ContainerSASPermissions.parse(
193
+ blobSASSignatureValues.permissions.toString()
194
+ ).toString();
195
+ }
196
+ }
197
+ const stringToSign = [
198
+ verifiedPermissions ? verifiedPermissions : "",
199
+ blobSASSignatureValues.startsOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false) : "",
200
+ blobSASSignatureValues.expiresOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false) : "",
201
+ getCanonicalName(
202
+ sharedKeyCredential.accountName,
203
+ blobSASSignatureValues.containerName,
204
+ blobSASSignatureValues.blobName
205
+ ),
206
+ blobSASSignatureValues.identifier,
207
+ blobSASSignatureValues.ipRange ? (0, import_SasIPRange.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
208
+ blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
209
+ blobSASSignatureValues.version,
210
+ resource,
211
+ timestamp,
212
+ blobSASSignatureValues.cacheControl ? blobSASSignatureValues.cacheControl : "",
213
+ blobSASSignatureValues.contentDisposition ? blobSASSignatureValues.contentDisposition : "",
214
+ blobSASSignatureValues.contentEncoding ? blobSASSignatureValues.contentEncoding : "",
215
+ blobSASSignatureValues.contentLanguage ? blobSASSignatureValues.contentLanguage : "",
216
+ blobSASSignatureValues.contentType ? blobSASSignatureValues.contentType : ""
217
+ ].join("\n");
218
+ const signature = sharedKeyCredential.computeHMACSHA256(stringToSign);
219
+ return {
220
+ sasQueryParameters: new import_SASQueryParameters.SASQueryParameters(
221
+ blobSASSignatureValues.version,
222
+ signature,
223
+ verifiedPermissions,
224
+ void 0,
225
+ void 0,
226
+ blobSASSignatureValues.protocol,
227
+ blobSASSignatureValues.startsOn,
228
+ blobSASSignatureValues.expiresOn,
229
+ blobSASSignatureValues.ipRange,
230
+ blobSASSignatureValues.identifier,
231
+ resource,
232
+ blobSASSignatureValues.cacheControl,
233
+ blobSASSignatureValues.contentDisposition,
234
+ blobSASSignatureValues.contentEncoding,
235
+ blobSASSignatureValues.contentLanguage,
236
+ blobSASSignatureValues.contentType
237
+ ),
238
+ stringToSign
239
+ };
204
240
  }
205
- /**
206
- * ONLY AVAILABLE IN NODE.JS RUNTIME.
207
- * IMPLEMENTATION FOR API VERSION FROM 2020-12-06.
208
- *
209
- * Creates an instance of SASQueryParameters.
210
- *
211
- * Only accepts required settings needed to create a SAS. For optional settings please
212
- * set corresponding properties directly, such as permissions, startsOn and identifier.
213
- *
214
- * WARNING: When identifier is not provided, permissions and expiresOn are required.
215
- * You MUST assign value to identifier or expiresOn & permissions manually if you initial with
216
- * this constructor.
217
- *
218
- * @param blobSASSignatureValues -
219
- * @param sharedKeyCredential -
220
- */
221
241
  function generateBlobSASQueryParameters20201206(blobSASSignatureValues, sharedKeyCredential) {
222
- blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
223
- if (!blobSASSignatureValues.identifier &&
224
- !(blobSASSignatureValues.permissions && blobSASSignatureValues.expiresOn)) {
225
- throw new RangeError("Must provide 'permissions' and 'expiresOn' for Blob SAS generation when 'identifier' is not provided.");
226
- }
227
- let resource = "c";
228
- let timestamp = blobSASSignatureValues.snapshotTime;
242
+ blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
243
+ if (!blobSASSignatureValues.identifier && !(blobSASSignatureValues.permissions && blobSASSignatureValues.expiresOn)) {
244
+ throw new RangeError(
245
+ "Must provide 'permissions' and 'expiresOn' for Blob SAS generation when 'identifier' is not provided."
246
+ );
247
+ }
248
+ let resource = "c";
249
+ let timestamp = blobSASSignatureValues.snapshotTime;
250
+ if (blobSASSignatureValues.blobName) {
251
+ resource = "b";
252
+ if (blobSASSignatureValues.snapshotTime) {
253
+ resource = "bs";
254
+ } else if (blobSASSignatureValues.versionId) {
255
+ resource = "bv";
256
+ timestamp = blobSASSignatureValues.versionId;
257
+ }
258
+ }
259
+ let verifiedPermissions;
260
+ if (blobSASSignatureValues.permissions) {
229
261
  if (blobSASSignatureValues.blobName) {
230
- resource = "b";
231
- if (blobSASSignatureValues.snapshotTime) {
232
- resource = "bs";
233
- }
234
- else if (blobSASSignatureValues.versionId) {
235
- resource = "bv";
236
- timestamp = blobSASSignatureValues.versionId;
237
- }
238
- }
239
- // Calling parse and toString guarantees the proper ordering and throws on invalid characters.
240
- let verifiedPermissions;
241
- if (blobSASSignatureValues.permissions) {
242
- if (blobSASSignatureValues.blobName) {
243
- verifiedPermissions = BlobSASPermissions_js_1.BlobSASPermissions.parse(blobSASSignatureValues.permissions.toString()).toString();
244
- }
245
- else {
246
- verifiedPermissions = ContainerSASPermissions_js_1.ContainerSASPermissions.parse(blobSASSignatureValues.permissions.toString()).toString();
247
- }
248
- }
249
- // Signature is generated on the un-url-encoded values.
250
- const stringToSign = [
251
- verifiedPermissions ? verifiedPermissions : "",
252
- blobSASSignatureValues.startsOn
253
- ? (0, utils_common_js_1.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false)
254
- : "",
255
- blobSASSignatureValues.expiresOn
256
- ? (0, utils_common_js_1.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false)
257
- : "",
258
- getCanonicalName(sharedKeyCredential.accountName, blobSASSignatureValues.containerName, blobSASSignatureValues.blobName),
259
- blobSASSignatureValues.identifier,
260
- blobSASSignatureValues.ipRange ? (0, SasIPRange_js_1.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
261
- blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
262
- blobSASSignatureValues.version,
263
- resource,
264
- timestamp,
265
- blobSASSignatureValues.encryptionScope,
266
- blobSASSignatureValues.cacheControl ? blobSASSignatureValues.cacheControl : "",
267
- blobSASSignatureValues.contentDisposition ? blobSASSignatureValues.contentDisposition : "",
268
- blobSASSignatureValues.contentEncoding ? blobSASSignatureValues.contentEncoding : "",
269
- blobSASSignatureValues.contentLanguage ? blobSASSignatureValues.contentLanguage : "",
270
- blobSASSignatureValues.contentType ? blobSASSignatureValues.contentType : "",
271
- ].join("\n");
272
- const signature = sharedKeyCredential.computeHMACSHA256(stringToSign);
273
- return {
274
- sasQueryParameters: new SASQueryParameters_js_1.SASQueryParameters(blobSASSignatureValues.version, signature, verifiedPermissions, undefined, undefined, blobSASSignatureValues.protocol, blobSASSignatureValues.startsOn, blobSASSignatureValues.expiresOn, blobSASSignatureValues.ipRange, blobSASSignatureValues.identifier, resource, blobSASSignatureValues.cacheControl, blobSASSignatureValues.contentDisposition, blobSASSignatureValues.contentEncoding, blobSASSignatureValues.contentLanguage, blobSASSignatureValues.contentType, undefined, undefined, undefined, blobSASSignatureValues.encryptionScope),
275
- stringToSign: stringToSign,
276
- };
262
+ verifiedPermissions = import_BlobSASPermissions.BlobSASPermissions.parse(
263
+ blobSASSignatureValues.permissions.toString()
264
+ ).toString();
265
+ } else {
266
+ verifiedPermissions = import_ContainerSASPermissions.ContainerSASPermissions.parse(
267
+ blobSASSignatureValues.permissions.toString()
268
+ ).toString();
269
+ }
270
+ }
271
+ const stringToSign = [
272
+ verifiedPermissions ? verifiedPermissions : "",
273
+ blobSASSignatureValues.startsOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false) : "",
274
+ blobSASSignatureValues.expiresOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false) : "",
275
+ getCanonicalName(
276
+ sharedKeyCredential.accountName,
277
+ blobSASSignatureValues.containerName,
278
+ blobSASSignatureValues.blobName
279
+ ),
280
+ blobSASSignatureValues.identifier,
281
+ blobSASSignatureValues.ipRange ? (0, import_SasIPRange.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
282
+ blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
283
+ blobSASSignatureValues.version,
284
+ resource,
285
+ timestamp,
286
+ blobSASSignatureValues.encryptionScope,
287
+ blobSASSignatureValues.cacheControl ? blobSASSignatureValues.cacheControl : "",
288
+ blobSASSignatureValues.contentDisposition ? blobSASSignatureValues.contentDisposition : "",
289
+ blobSASSignatureValues.contentEncoding ? blobSASSignatureValues.contentEncoding : "",
290
+ blobSASSignatureValues.contentLanguage ? blobSASSignatureValues.contentLanguage : "",
291
+ blobSASSignatureValues.contentType ? blobSASSignatureValues.contentType : ""
292
+ ].join("\n");
293
+ const signature = sharedKeyCredential.computeHMACSHA256(stringToSign);
294
+ return {
295
+ sasQueryParameters: new import_SASQueryParameters.SASQueryParameters(
296
+ blobSASSignatureValues.version,
297
+ signature,
298
+ verifiedPermissions,
299
+ void 0,
300
+ void 0,
301
+ blobSASSignatureValues.protocol,
302
+ blobSASSignatureValues.startsOn,
303
+ blobSASSignatureValues.expiresOn,
304
+ blobSASSignatureValues.ipRange,
305
+ blobSASSignatureValues.identifier,
306
+ resource,
307
+ blobSASSignatureValues.cacheControl,
308
+ blobSASSignatureValues.contentDisposition,
309
+ blobSASSignatureValues.contentEncoding,
310
+ blobSASSignatureValues.contentLanguage,
311
+ blobSASSignatureValues.contentType,
312
+ void 0,
313
+ void 0,
314
+ void 0,
315
+ blobSASSignatureValues.encryptionScope
316
+ ),
317
+ stringToSign
318
+ };
277
319
  }
278
- /**
279
- * ONLY AVAILABLE IN NODE.JS RUNTIME.
280
- * IMPLEMENTATION FOR API VERSION FROM 2018-11-09.
281
- *
282
- * Creates an instance of SASQueryParameters.
283
- *
284
- * Only accepts required settings needed to create a SAS. For optional settings please
285
- * set corresponding properties directly, such as permissions, startsOn.
286
- *
287
- * WARNING: identifier will be ignored, permissions and expiresOn are required.
288
- *
289
- * @param blobSASSignatureValues -
290
- * @param userDelegationKeyCredential -
291
- */
292
320
  function generateBlobSASQueryParametersUDK20181109(blobSASSignatureValues, userDelegationKeyCredential) {
293
- blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
294
- // Stored access policies are not supported for a user delegation SAS.
295
- if (!blobSASSignatureValues.permissions || !blobSASSignatureValues.expiresOn) {
296
- throw new RangeError("Must provide 'permissions' and 'expiresOn' for Blob SAS generation when generating user delegation SAS.");
297
- }
298
- let resource = "c";
299
- let timestamp = blobSASSignatureValues.snapshotTime;
321
+ blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
322
+ if (!blobSASSignatureValues.permissions || !blobSASSignatureValues.expiresOn) {
323
+ throw new RangeError(
324
+ "Must provide 'permissions' and 'expiresOn' for Blob SAS generation when generating user delegation SAS."
325
+ );
326
+ }
327
+ let resource = "c";
328
+ let timestamp = blobSASSignatureValues.snapshotTime;
329
+ if (blobSASSignatureValues.blobName) {
330
+ resource = "b";
331
+ if (blobSASSignatureValues.snapshotTime) {
332
+ resource = "bs";
333
+ } else if (blobSASSignatureValues.versionId) {
334
+ resource = "bv";
335
+ timestamp = blobSASSignatureValues.versionId;
336
+ }
337
+ }
338
+ let verifiedPermissions;
339
+ if (blobSASSignatureValues.permissions) {
300
340
  if (blobSASSignatureValues.blobName) {
301
- resource = "b";
302
- if (blobSASSignatureValues.snapshotTime) {
303
- resource = "bs";
304
- }
305
- else if (blobSASSignatureValues.versionId) {
306
- resource = "bv";
307
- timestamp = blobSASSignatureValues.versionId;
308
- }
309
- }
310
- // Calling parse and toString guarantees the proper ordering and throws on invalid characters.
311
- let verifiedPermissions;
312
- if (blobSASSignatureValues.permissions) {
313
- if (blobSASSignatureValues.blobName) {
314
- verifiedPermissions = BlobSASPermissions_js_1.BlobSASPermissions.parse(blobSASSignatureValues.permissions.toString()).toString();
315
- }
316
- else {
317
- verifiedPermissions = ContainerSASPermissions_js_1.ContainerSASPermissions.parse(blobSASSignatureValues.permissions.toString()).toString();
318
- }
319
- }
320
- // Signature is generated on the un-url-encoded values.
321
- const stringToSign = [
322
- verifiedPermissions ? verifiedPermissions : "",
323
- blobSASSignatureValues.startsOn
324
- ? (0, utils_common_js_1.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false)
325
- : "",
326
- blobSASSignatureValues.expiresOn
327
- ? (0, utils_common_js_1.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false)
328
- : "",
329
- getCanonicalName(userDelegationKeyCredential.accountName, blobSASSignatureValues.containerName, blobSASSignatureValues.blobName),
330
- userDelegationKeyCredential.userDelegationKey.signedObjectId,
331
- userDelegationKeyCredential.userDelegationKey.signedTenantId,
332
- userDelegationKeyCredential.userDelegationKey.signedStartsOn
333
- ? (0, utils_common_js_1.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedStartsOn, false)
334
- : "",
335
- userDelegationKeyCredential.userDelegationKey.signedExpiresOn
336
- ? (0, utils_common_js_1.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedExpiresOn, false)
337
- : "",
338
- userDelegationKeyCredential.userDelegationKey.signedService,
339
- userDelegationKeyCredential.userDelegationKey.signedVersion,
340
- blobSASSignatureValues.ipRange ? (0, SasIPRange_js_1.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
341
- blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
342
- blobSASSignatureValues.version,
343
- resource,
344
- timestamp,
345
- blobSASSignatureValues.cacheControl,
346
- blobSASSignatureValues.contentDisposition,
347
- blobSASSignatureValues.contentEncoding,
348
- blobSASSignatureValues.contentLanguage,
349
- blobSASSignatureValues.contentType,
350
- ].join("\n");
351
- const signature = userDelegationKeyCredential.computeHMACSHA256(stringToSign);
352
- return {
353
- sasQueryParameters: new SASQueryParameters_js_1.SASQueryParameters(blobSASSignatureValues.version, signature, verifiedPermissions, undefined, undefined, blobSASSignatureValues.protocol, blobSASSignatureValues.startsOn, blobSASSignatureValues.expiresOn, blobSASSignatureValues.ipRange, blobSASSignatureValues.identifier, resource, blobSASSignatureValues.cacheControl, blobSASSignatureValues.contentDisposition, blobSASSignatureValues.contentEncoding, blobSASSignatureValues.contentLanguage, blobSASSignatureValues.contentType, userDelegationKeyCredential.userDelegationKey),
354
- stringToSign: stringToSign,
355
- };
341
+ verifiedPermissions = import_BlobSASPermissions.BlobSASPermissions.parse(
342
+ blobSASSignatureValues.permissions.toString()
343
+ ).toString();
344
+ } else {
345
+ verifiedPermissions = import_ContainerSASPermissions.ContainerSASPermissions.parse(
346
+ blobSASSignatureValues.permissions.toString()
347
+ ).toString();
348
+ }
349
+ }
350
+ const stringToSign = [
351
+ verifiedPermissions ? verifiedPermissions : "",
352
+ blobSASSignatureValues.startsOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false) : "",
353
+ blobSASSignatureValues.expiresOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false) : "",
354
+ getCanonicalName(
355
+ userDelegationKeyCredential.accountName,
356
+ blobSASSignatureValues.containerName,
357
+ blobSASSignatureValues.blobName
358
+ ),
359
+ userDelegationKeyCredential.userDelegationKey.signedObjectId,
360
+ userDelegationKeyCredential.userDelegationKey.signedTenantId,
361
+ userDelegationKeyCredential.userDelegationKey.signedStartsOn ? (0, import_utils_common.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedStartsOn, false) : "",
362
+ userDelegationKeyCredential.userDelegationKey.signedExpiresOn ? (0, import_utils_common.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedExpiresOn, false) : "",
363
+ userDelegationKeyCredential.userDelegationKey.signedService,
364
+ userDelegationKeyCredential.userDelegationKey.signedVersion,
365
+ blobSASSignatureValues.ipRange ? (0, import_SasIPRange.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
366
+ blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
367
+ blobSASSignatureValues.version,
368
+ resource,
369
+ timestamp,
370
+ blobSASSignatureValues.cacheControl,
371
+ blobSASSignatureValues.contentDisposition,
372
+ blobSASSignatureValues.contentEncoding,
373
+ blobSASSignatureValues.contentLanguage,
374
+ blobSASSignatureValues.contentType
375
+ ].join("\n");
376
+ const signature = userDelegationKeyCredential.computeHMACSHA256(stringToSign);
377
+ return {
378
+ sasQueryParameters: new import_SASQueryParameters.SASQueryParameters(
379
+ blobSASSignatureValues.version,
380
+ signature,
381
+ verifiedPermissions,
382
+ void 0,
383
+ void 0,
384
+ blobSASSignatureValues.protocol,
385
+ blobSASSignatureValues.startsOn,
386
+ blobSASSignatureValues.expiresOn,
387
+ blobSASSignatureValues.ipRange,
388
+ blobSASSignatureValues.identifier,
389
+ resource,
390
+ blobSASSignatureValues.cacheControl,
391
+ blobSASSignatureValues.contentDisposition,
392
+ blobSASSignatureValues.contentEncoding,
393
+ blobSASSignatureValues.contentLanguage,
394
+ blobSASSignatureValues.contentType,
395
+ userDelegationKeyCredential.userDelegationKey
396
+ ),
397
+ stringToSign
398
+ };
356
399
  }
357
- /**
358
- * ONLY AVAILABLE IN NODE.JS RUNTIME.
359
- * IMPLEMENTATION FOR API VERSION FROM 2020-02-10.
360
- *
361
- * Creates an instance of SASQueryParameters.
362
- *
363
- * Only accepts required settings needed to create a SAS. For optional settings please
364
- * set corresponding properties directly, such as permissions, startsOn.
365
- *
366
- * WARNING: identifier will be ignored, permissions and expiresOn are required.
367
- *
368
- * @param blobSASSignatureValues -
369
- * @param userDelegationKeyCredential -
370
- */
371
400
  function generateBlobSASQueryParametersUDK20200210(blobSASSignatureValues, userDelegationKeyCredential) {
372
- blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
373
- // Stored access policies are not supported for a user delegation SAS.
374
- if (!blobSASSignatureValues.permissions || !blobSASSignatureValues.expiresOn) {
375
- throw new RangeError("Must provide 'permissions' and 'expiresOn' for Blob SAS generation when generating user delegation SAS.");
376
- }
377
- let resource = "c";
378
- let timestamp = blobSASSignatureValues.snapshotTime;
401
+ blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
402
+ if (!blobSASSignatureValues.permissions || !blobSASSignatureValues.expiresOn) {
403
+ throw new RangeError(
404
+ "Must provide 'permissions' and 'expiresOn' for Blob SAS generation when generating user delegation SAS."
405
+ );
406
+ }
407
+ let resource = "c";
408
+ let timestamp = blobSASSignatureValues.snapshotTime;
409
+ if (blobSASSignatureValues.blobName) {
410
+ resource = "b";
411
+ if (blobSASSignatureValues.snapshotTime) {
412
+ resource = "bs";
413
+ } else if (blobSASSignatureValues.versionId) {
414
+ resource = "bv";
415
+ timestamp = blobSASSignatureValues.versionId;
416
+ }
417
+ }
418
+ let verifiedPermissions;
419
+ if (blobSASSignatureValues.permissions) {
379
420
  if (blobSASSignatureValues.blobName) {
380
- resource = "b";
381
- if (blobSASSignatureValues.snapshotTime) {
382
- resource = "bs";
383
- }
384
- else if (blobSASSignatureValues.versionId) {
385
- resource = "bv";
386
- timestamp = blobSASSignatureValues.versionId;
387
- }
388
- }
389
- // Calling parse and toString guarantees the proper ordering and throws on invalid characters.
390
- let verifiedPermissions;
391
- if (blobSASSignatureValues.permissions) {
392
- if (blobSASSignatureValues.blobName) {
393
- verifiedPermissions = BlobSASPermissions_js_1.BlobSASPermissions.parse(blobSASSignatureValues.permissions.toString()).toString();
394
- }
395
- else {
396
- verifiedPermissions = ContainerSASPermissions_js_1.ContainerSASPermissions.parse(blobSASSignatureValues.permissions.toString()).toString();
397
- }
398
- }
399
- // Signature is generated on the un-url-encoded values.
400
- const stringToSign = [
401
- verifiedPermissions ? verifiedPermissions : "",
402
- blobSASSignatureValues.startsOn
403
- ? (0, utils_common_js_1.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false)
404
- : "",
405
- blobSASSignatureValues.expiresOn
406
- ? (0, utils_common_js_1.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false)
407
- : "",
408
- getCanonicalName(userDelegationKeyCredential.accountName, blobSASSignatureValues.containerName, blobSASSignatureValues.blobName),
409
- userDelegationKeyCredential.userDelegationKey.signedObjectId,
410
- userDelegationKeyCredential.userDelegationKey.signedTenantId,
411
- userDelegationKeyCredential.userDelegationKey.signedStartsOn
412
- ? (0, utils_common_js_1.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedStartsOn, false)
413
- : "",
414
- userDelegationKeyCredential.userDelegationKey.signedExpiresOn
415
- ? (0, utils_common_js_1.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedExpiresOn, false)
416
- : "",
417
- userDelegationKeyCredential.userDelegationKey.signedService,
418
- userDelegationKeyCredential.userDelegationKey.signedVersion,
419
- blobSASSignatureValues.preauthorizedAgentObjectId,
420
- undefined, // agentObjectId
421
- blobSASSignatureValues.correlationId,
422
- blobSASSignatureValues.ipRange ? (0, SasIPRange_js_1.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
423
- blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
424
- blobSASSignatureValues.version,
425
- resource,
426
- timestamp,
427
- blobSASSignatureValues.cacheControl,
428
- blobSASSignatureValues.contentDisposition,
429
- blobSASSignatureValues.contentEncoding,
430
- blobSASSignatureValues.contentLanguage,
431
- blobSASSignatureValues.contentType,
432
- ].join("\n");
433
- const signature = userDelegationKeyCredential.computeHMACSHA256(stringToSign);
434
- return {
435
- sasQueryParameters: new SASQueryParameters_js_1.SASQueryParameters(blobSASSignatureValues.version, signature, verifiedPermissions, undefined, undefined, blobSASSignatureValues.protocol, blobSASSignatureValues.startsOn, blobSASSignatureValues.expiresOn, blobSASSignatureValues.ipRange, blobSASSignatureValues.identifier, resource, blobSASSignatureValues.cacheControl, blobSASSignatureValues.contentDisposition, blobSASSignatureValues.contentEncoding, blobSASSignatureValues.contentLanguage, blobSASSignatureValues.contentType, userDelegationKeyCredential.userDelegationKey, blobSASSignatureValues.preauthorizedAgentObjectId, blobSASSignatureValues.correlationId),
436
- stringToSign: stringToSign,
437
- };
421
+ verifiedPermissions = import_BlobSASPermissions.BlobSASPermissions.parse(
422
+ blobSASSignatureValues.permissions.toString()
423
+ ).toString();
424
+ } else {
425
+ verifiedPermissions = import_ContainerSASPermissions.ContainerSASPermissions.parse(
426
+ blobSASSignatureValues.permissions.toString()
427
+ ).toString();
428
+ }
429
+ }
430
+ const stringToSign = [
431
+ verifiedPermissions ? verifiedPermissions : "",
432
+ blobSASSignatureValues.startsOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false) : "",
433
+ blobSASSignatureValues.expiresOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false) : "",
434
+ getCanonicalName(
435
+ userDelegationKeyCredential.accountName,
436
+ blobSASSignatureValues.containerName,
437
+ blobSASSignatureValues.blobName
438
+ ),
439
+ userDelegationKeyCredential.userDelegationKey.signedObjectId,
440
+ userDelegationKeyCredential.userDelegationKey.signedTenantId,
441
+ userDelegationKeyCredential.userDelegationKey.signedStartsOn ? (0, import_utils_common.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedStartsOn, false) : "",
442
+ userDelegationKeyCredential.userDelegationKey.signedExpiresOn ? (0, import_utils_common.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedExpiresOn, false) : "",
443
+ userDelegationKeyCredential.userDelegationKey.signedService,
444
+ userDelegationKeyCredential.userDelegationKey.signedVersion,
445
+ blobSASSignatureValues.preauthorizedAgentObjectId,
446
+ void 0,
447
+ // agentObjectId
448
+ blobSASSignatureValues.correlationId,
449
+ blobSASSignatureValues.ipRange ? (0, import_SasIPRange.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
450
+ blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
451
+ blobSASSignatureValues.version,
452
+ resource,
453
+ timestamp,
454
+ blobSASSignatureValues.cacheControl,
455
+ blobSASSignatureValues.contentDisposition,
456
+ blobSASSignatureValues.contentEncoding,
457
+ blobSASSignatureValues.contentLanguage,
458
+ blobSASSignatureValues.contentType
459
+ ].join("\n");
460
+ const signature = userDelegationKeyCredential.computeHMACSHA256(stringToSign);
461
+ return {
462
+ sasQueryParameters: new import_SASQueryParameters.SASQueryParameters(
463
+ blobSASSignatureValues.version,
464
+ signature,
465
+ verifiedPermissions,
466
+ void 0,
467
+ void 0,
468
+ blobSASSignatureValues.protocol,
469
+ blobSASSignatureValues.startsOn,
470
+ blobSASSignatureValues.expiresOn,
471
+ blobSASSignatureValues.ipRange,
472
+ blobSASSignatureValues.identifier,
473
+ resource,
474
+ blobSASSignatureValues.cacheControl,
475
+ blobSASSignatureValues.contentDisposition,
476
+ blobSASSignatureValues.contentEncoding,
477
+ blobSASSignatureValues.contentLanguage,
478
+ blobSASSignatureValues.contentType,
479
+ userDelegationKeyCredential.userDelegationKey,
480
+ blobSASSignatureValues.preauthorizedAgentObjectId,
481
+ blobSASSignatureValues.correlationId
482
+ ),
483
+ stringToSign
484
+ };
438
485
  }
439
- /**
440
- * ONLY AVAILABLE IN NODE.JS RUNTIME.
441
- * IMPLEMENTATION FOR API VERSION FROM 2020-12-06.
442
- *
443
- * Creates an instance of SASQueryParameters.
444
- *
445
- * Only accepts required settings needed to create a SAS. For optional settings please
446
- * set corresponding properties directly, such as permissions, startsOn.
447
- *
448
- * WARNING: identifier will be ignored, permissions and expiresOn are required.
449
- *
450
- * @param blobSASSignatureValues -
451
- * @param userDelegationKeyCredential -
452
- */
453
486
  function generateBlobSASQueryParametersUDK20201206(blobSASSignatureValues, userDelegationKeyCredential) {
454
- blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
455
- // Stored access policies are not supported for a user delegation SAS.
456
- if (!blobSASSignatureValues.permissions || !blobSASSignatureValues.expiresOn) {
457
- throw new RangeError("Must provide 'permissions' and 'expiresOn' for Blob SAS generation when generating user delegation SAS.");
458
- }
459
- let resource = "c";
460
- let timestamp = blobSASSignatureValues.snapshotTime;
487
+ blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
488
+ if (!blobSASSignatureValues.permissions || !blobSASSignatureValues.expiresOn) {
489
+ throw new RangeError(
490
+ "Must provide 'permissions' and 'expiresOn' for Blob SAS generation when generating user delegation SAS."
491
+ );
492
+ }
493
+ let resource = "c";
494
+ let timestamp = blobSASSignatureValues.snapshotTime;
495
+ if (blobSASSignatureValues.blobName) {
496
+ resource = "b";
497
+ if (blobSASSignatureValues.snapshotTime) {
498
+ resource = "bs";
499
+ } else if (blobSASSignatureValues.versionId) {
500
+ resource = "bv";
501
+ timestamp = blobSASSignatureValues.versionId;
502
+ }
503
+ }
504
+ let verifiedPermissions;
505
+ if (blobSASSignatureValues.permissions) {
461
506
  if (blobSASSignatureValues.blobName) {
462
- resource = "b";
463
- if (blobSASSignatureValues.snapshotTime) {
464
- resource = "bs";
465
- }
466
- else if (blobSASSignatureValues.versionId) {
467
- resource = "bv";
468
- timestamp = blobSASSignatureValues.versionId;
469
- }
470
- }
471
- // Calling parse and toString guarantees the proper ordering and throws on invalid characters.
472
- let verifiedPermissions;
473
- if (blobSASSignatureValues.permissions) {
474
- if (blobSASSignatureValues.blobName) {
475
- verifiedPermissions = BlobSASPermissions_js_1.BlobSASPermissions.parse(blobSASSignatureValues.permissions.toString()).toString();
476
- }
477
- else {
478
- verifiedPermissions = ContainerSASPermissions_js_1.ContainerSASPermissions.parse(blobSASSignatureValues.permissions.toString()).toString();
479
- }
480
- }
481
- // Signature is generated on the un-url-encoded values.
482
- const stringToSign = [
483
- verifiedPermissions ? verifiedPermissions : "",
484
- blobSASSignatureValues.startsOn
485
- ? (0, utils_common_js_1.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false)
486
- : "",
487
- blobSASSignatureValues.expiresOn
488
- ? (0, utils_common_js_1.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false)
489
- : "",
490
- getCanonicalName(userDelegationKeyCredential.accountName, blobSASSignatureValues.containerName, blobSASSignatureValues.blobName),
491
- userDelegationKeyCredential.userDelegationKey.signedObjectId,
492
- userDelegationKeyCredential.userDelegationKey.signedTenantId,
493
- userDelegationKeyCredential.userDelegationKey.signedStartsOn
494
- ? (0, utils_common_js_1.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedStartsOn, false)
495
- : "",
496
- userDelegationKeyCredential.userDelegationKey.signedExpiresOn
497
- ? (0, utils_common_js_1.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedExpiresOn, false)
498
- : "",
499
- userDelegationKeyCredential.userDelegationKey.signedService,
500
- userDelegationKeyCredential.userDelegationKey.signedVersion,
501
- blobSASSignatureValues.preauthorizedAgentObjectId,
502
- undefined, // agentObjectId
503
- blobSASSignatureValues.correlationId,
504
- blobSASSignatureValues.ipRange ? (0, SasIPRange_js_1.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
505
- blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
506
- blobSASSignatureValues.version,
507
- resource,
508
- timestamp,
509
- blobSASSignatureValues.encryptionScope,
510
- blobSASSignatureValues.cacheControl,
511
- blobSASSignatureValues.contentDisposition,
512
- blobSASSignatureValues.contentEncoding,
513
- blobSASSignatureValues.contentLanguage,
514
- blobSASSignatureValues.contentType,
515
- ].join("\n");
516
- const signature = userDelegationKeyCredential.computeHMACSHA256(stringToSign);
517
- return {
518
- sasQueryParameters: new SASQueryParameters_js_1.SASQueryParameters(blobSASSignatureValues.version, signature, verifiedPermissions, undefined, undefined, blobSASSignatureValues.protocol, blobSASSignatureValues.startsOn, blobSASSignatureValues.expiresOn, blobSASSignatureValues.ipRange, blobSASSignatureValues.identifier, resource, blobSASSignatureValues.cacheControl, blobSASSignatureValues.contentDisposition, blobSASSignatureValues.contentEncoding, blobSASSignatureValues.contentLanguage, blobSASSignatureValues.contentType, userDelegationKeyCredential.userDelegationKey, blobSASSignatureValues.preauthorizedAgentObjectId, blobSASSignatureValues.correlationId, blobSASSignatureValues.encryptionScope),
519
- stringToSign: stringToSign,
520
- };
507
+ verifiedPermissions = import_BlobSASPermissions.BlobSASPermissions.parse(
508
+ blobSASSignatureValues.permissions.toString()
509
+ ).toString();
510
+ } else {
511
+ verifiedPermissions = import_ContainerSASPermissions.ContainerSASPermissions.parse(
512
+ blobSASSignatureValues.permissions.toString()
513
+ ).toString();
514
+ }
515
+ }
516
+ const stringToSign = [
517
+ verifiedPermissions ? verifiedPermissions : "",
518
+ blobSASSignatureValues.startsOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false) : "",
519
+ blobSASSignatureValues.expiresOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false) : "",
520
+ getCanonicalName(
521
+ userDelegationKeyCredential.accountName,
522
+ blobSASSignatureValues.containerName,
523
+ blobSASSignatureValues.blobName
524
+ ),
525
+ userDelegationKeyCredential.userDelegationKey.signedObjectId,
526
+ userDelegationKeyCredential.userDelegationKey.signedTenantId,
527
+ userDelegationKeyCredential.userDelegationKey.signedStartsOn ? (0, import_utils_common.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedStartsOn, false) : "",
528
+ userDelegationKeyCredential.userDelegationKey.signedExpiresOn ? (0, import_utils_common.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedExpiresOn, false) : "",
529
+ userDelegationKeyCredential.userDelegationKey.signedService,
530
+ userDelegationKeyCredential.userDelegationKey.signedVersion,
531
+ blobSASSignatureValues.preauthorizedAgentObjectId,
532
+ void 0,
533
+ // agentObjectId
534
+ blobSASSignatureValues.correlationId,
535
+ blobSASSignatureValues.ipRange ? (0, import_SasIPRange.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
536
+ blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
537
+ blobSASSignatureValues.version,
538
+ resource,
539
+ timestamp,
540
+ blobSASSignatureValues.encryptionScope,
541
+ blobSASSignatureValues.cacheControl,
542
+ blobSASSignatureValues.contentDisposition,
543
+ blobSASSignatureValues.contentEncoding,
544
+ blobSASSignatureValues.contentLanguage,
545
+ blobSASSignatureValues.contentType
546
+ ].join("\n");
547
+ const signature = userDelegationKeyCredential.computeHMACSHA256(stringToSign);
548
+ return {
549
+ sasQueryParameters: new import_SASQueryParameters.SASQueryParameters(
550
+ blobSASSignatureValues.version,
551
+ signature,
552
+ verifiedPermissions,
553
+ void 0,
554
+ void 0,
555
+ blobSASSignatureValues.protocol,
556
+ blobSASSignatureValues.startsOn,
557
+ blobSASSignatureValues.expiresOn,
558
+ blobSASSignatureValues.ipRange,
559
+ blobSASSignatureValues.identifier,
560
+ resource,
561
+ blobSASSignatureValues.cacheControl,
562
+ blobSASSignatureValues.contentDisposition,
563
+ blobSASSignatureValues.contentEncoding,
564
+ blobSASSignatureValues.contentLanguage,
565
+ blobSASSignatureValues.contentType,
566
+ userDelegationKeyCredential.userDelegationKey,
567
+ blobSASSignatureValues.preauthorizedAgentObjectId,
568
+ blobSASSignatureValues.correlationId,
569
+ blobSASSignatureValues.encryptionScope
570
+ ),
571
+ stringToSign
572
+ };
521
573
  }
522
- /**
523
- * ONLY AVAILABLE IN NODE.JS RUNTIME.
524
- * IMPLEMENTATION FOR API VERSION FROM 2020-12-06.
525
- *
526
- * Creates an instance of SASQueryParameters.
527
- *
528
- * Only accepts required settings needed to create a SAS. For optional settings please
529
- * set corresponding properties directly, such as permissions, startsOn.
530
- *
531
- * WARNING: identifier will be ignored, permissions and expiresOn are required.
532
- *
533
- * @param blobSASSignatureValues -
534
- * @param userDelegationKeyCredential -
535
- */
536
574
  function generateBlobSASQueryParametersUDK20250705(blobSASSignatureValues, userDelegationKeyCredential) {
537
- blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
538
- // Stored access policies are not supported for a user delegation SAS.
539
- if (!blobSASSignatureValues.permissions || !blobSASSignatureValues.expiresOn) {
540
- throw new RangeError("Must provide 'permissions' and 'expiresOn' for Blob SAS generation when generating user delegation SAS.");
541
- }
542
- let resource = "c";
543
- let timestamp = blobSASSignatureValues.snapshotTime;
575
+ blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
576
+ if (!blobSASSignatureValues.permissions || !blobSASSignatureValues.expiresOn) {
577
+ throw new RangeError(
578
+ "Must provide 'permissions' and 'expiresOn' for Blob SAS generation when generating user delegation SAS."
579
+ );
580
+ }
581
+ let resource = "c";
582
+ let timestamp = blobSASSignatureValues.snapshotTime;
583
+ if (blobSASSignatureValues.blobName) {
584
+ resource = "b";
585
+ if (blobSASSignatureValues.snapshotTime) {
586
+ resource = "bs";
587
+ } else if (blobSASSignatureValues.versionId) {
588
+ resource = "bv";
589
+ timestamp = blobSASSignatureValues.versionId;
590
+ }
591
+ }
592
+ let verifiedPermissions;
593
+ if (blobSASSignatureValues.permissions) {
544
594
  if (blobSASSignatureValues.blobName) {
545
- resource = "b";
546
- if (blobSASSignatureValues.snapshotTime) {
547
- resource = "bs";
548
- }
549
- else if (blobSASSignatureValues.versionId) {
550
- resource = "bv";
551
- timestamp = blobSASSignatureValues.versionId;
552
- }
553
- }
554
- // Calling parse and toString guarantees the proper ordering and throws on invalid characters.
555
- let verifiedPermissions;
556
- if (blobSASSignatureValues.permissions) {
557
- if (blobSASSignatureValues.blobName) {
558
- verifiedPermissions = BlobSASPermissions_js_1.BlobSASPermissions.parse(blobSASSignatureValues.permissions.toString()).toString();
559
- }
560
- else {
561
- verifiedPermissions = ContainerSASPermissions_js_1.ContainerSASPermissions.parse(blobSASSignatureValues.permissions.toString()).toString();
562
- }
563
- }
564
- // Signature is generated on the un-url-encoded values.
565
- const stringToSign = [
566
- verifiedPermissions ? verifiedPermissions : "",
567
- blobSASSignatureValues.startsOn
568
- ? (0, utils_common_js_1.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false)
569
- : "",
570
- blobSASSignatureValues.expiresOn
571
- ? (0, utils_common_js_1.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false)
572
- : "",
573
- getCanonicalName(userDelegationKeyCredential.accountName, blobSASSignatureValues.containerName, blobSASSignatureValues.blobName),
574
- userDelegationKeyCredential.userDelegationKey.signedObjectId,
575
- userDelegationKeyCredential.userDelegationKey.signedTenantId,
576
- userDelegationKeyCredential.userDelegationKey.signedStartsOn
577
- ? (0, utils_common_js_1.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedStartsOn, false)
578
- : "",
579
- userDelegationKeyCredential.userDelegationKey.signedExpiresOn
580
- ? (0, utils_common_js_1.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedExpiresOn, false)
581
- : "",
582
- userDelegationKeyCredential.userDelegationKey.signedService,
583
- userDelegationKeyCredential.userDelegationKey.signedVersion,
584
- blobSASSignatureValues.preauthorizedAgentObjectId,
585
- undefined, // agentObjectId
586
- blobSASSignatureValues.correlationId,
587
- undefined, // SignedKeyDelegatedUserTenantId, will be added in a future release.
588
- blobSASSignatureValues.delegatedUserObjectId,
589
- blobSASSignatureValues.ipRange ? (0, SasIPRange_js_1.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
590
- blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
591
- blobSASSignatureValues.version,
592
- resource,
593
- timestamp,
594
- blobSASSignatureValues.encryptionScope,
595
- blobSASSignatureValues.cacheControl,
596
- blobSASSignatureValues.contentDisposition,
597
- blobSASSignatureValues.contentEncoding,
598
- blobSASSignatureValues.contentLanguage,
599
- blobSASSignatureValues.contentType,
600
- ].join("\n");
601
- const signature = userDelegationKeyCredential.computeHMACSHA256(stringToSign);
602
- return {
603
- sasQueryParameters: new SASQueryParameters_js_1.SASQueryParameters(blobSASSignatureValues.version, signature, verifiedPermissions, undefined, undefined, blobSASSignatureValues.protocol, blobSASSignatureValues.startsOn, blobSASSignatureValues.expiresOn, blobSASSignatureValues.ipRange, blobSASSignatureValues.identifier, resource, blobSASSignatureValues.cacheControl, blobSASSignatureValues.contentDisposition, blobSASSignatureValues.contentEncoding, blobSASSignatureValues.contentLanguage, blobSASSignatureValues.contentType, userDelegationKeyCredential.userDelegationKey, blobSASSignatureValues.preauthorizedAgentObjectId, blobSASSignatureValues.correlationId, blobSASSignatureValues.encryptionScope, blobSASSignatureValues.delegatedUserObjectId),
604
- stringToSign: stringToSign,
605
- };
595
+ verifiedPermissions = import_BlobSASPermissions.BlobSASPermissions.parse(
596
+ blobSASSignatureValues.permissions.toString()
597
+ ).toString();
598
+ } else {
599
+ verifiedPermissions = import_ContainerSASPermissions.ContainerSASPermissions.parse(
600
+ blobSASSignatureValues.permissions.toString()
601
+ ).toString();
602
+ }
603
+ }
604
+ const stringToSign = [
605
+ verifiedPermissions ? verifiedPermissions : "",
606
+ blobSASSignatureValues.startsOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false) : "",
607
+ blobSASSignatureValues.expiresOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false) : "",
608
+ getCanonicalName(
609
+ userDelegationKeyCredential.accountName,
610
+ blobSASSignatureValues.containerName,
611
+ blobSASSignatureValues.blobName
612
+ ),
613
+ userDelegationKeyCredential.userDelegationKey.signedObjectId,
614
+ userDelegationKeyCredential.userDelegationKey.signedTenantId,
615
+ userDelegationKeyCredential.userDelegationKey.signedStartsOn ? (0, import_utils_common.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedStartsOn, false) : "",
616
+ userDelegationKeyCredential.userDelegationKey.signedExpiresOn ? (0, import_utils_common.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedExpiresOn, false) : "",
617
+ userDelegationKeyCredential.userDelegationKey.signedService,
618
+ userDelegationKeyCredential.userDelegationKey.signedVersion,
619
+ blobSASSignatureValues.preauthorizedAgentObjectId,
620
+ void 0,
621
+ // agentObjectId
622
+ blobSASSignatureValues.correlationId,
623
+ userDelegationKeyCredential.userDelegationKey.signedDelegatedUserTenantId,
624
+ // SignedKeyDelegatedUserTenantId, will be added in a future release.
625
+ blobSASSignatureValues.delegatedUserObjectId,
626
+ blobSASSignatureValues.ipRange ? (0, import_SasIPRange.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
627
+ blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
628
+ blobSASSignatureValues.version,
629
+ resource,
630
+ timestamp,
631
+ blobSASSignatureValues.encryptionScope,
632
+ blobSASSignatureValues.cacheControl,
633
+ blobSASSignatureValues.contentDisposition,
634
+ blobSASSignatureValues.contentEncoding,
635
+ blobSASSignatureValues.contentLanguage,
636
+ blobSASSignatureValues.contentType
637
+ ].join("\n");
638
+ const signature = userDelegationKeyCredential.computeHMACSHA256(stringToSign);
639
+ return {
640
+ sasQueryParameters: new import_SASQueryParameters.SASQueryParameters(
641
+ blobSASSignatureValues.version,
642
+ signature,
643
+ verifiedPermissions,
644
+ void 0,
645
+ void 0,
646
+ blobSASSignatureValues.protocol,
647
+ blobSASSignatureValues.startsOn,
648
+ blobSASSignatureValues.expiresOn,
649
+ blobSASSignatureValues.ipRange,
650
+ blobSASSignatureValues.identifier,
651
+ resource,
652
+ blobSASSignatureValues.cacheControl,
653
+ blobSASSignatureValues.contentDisposition,
654
+ blobSASSignatureValues.contentEncoding,
655
+ blobSASSignatureValues.contentLanguage,
656
+ blobSASSignatureValues.contentType,
657
+ userDelegationKeyCredential.userDelegationKey,
658
+ blobSASSignatureValues.preauthorizedAgentObjectId,
659
+ blobSASSignatureValues.correlationId,
660
+ blobSASSignatureValues.encryptionScope,
661
+ blobSASSignatureValues.delegatedUserObjectId
662
+ ),
663
+ stringToSign
664
+ };
665
+ }
666
+ function generateBlobSASQueryParametersUDK20260406(blobSASSignatureValues, userDelegationKeyCredential) {
667
+ blobSASSignatureValues = SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues);
668
+ if (!blobSASSignatureValues.permissions || !blobSASSignatureValues.expiresOn) {
669
+ throw new RangeError(
670
+ "Must provide 'permissions' and 'expiresOn' for Blob SAS generation when generating user delegation SAS."
671
+ );
672
+ }
673
+ let resource = "c";
674
+ let timestamp = blobSASSignatureValues.snapshotTime;
675
+ if (blobSASSignatureValues.blobName) {
676
+ resource = "b";
677
+ if (blobSASSignatureValues.snapshotTime) {
678
+ resource = "bs";
679
+ } else if (blobSASSignatureValues.versionId) {
680
+ resource = "bv";
681
+ timestamp = blobSASSignatureValues.versionId;
682
+ }
683
+ }
684
+ let verifiedPermissions;
685
+ if (blobSASSignatureValues.permissions) {
686
+ if (blobSASSignatureValues.blobName) {
687
+ verifiedPermissions = import_BlobSASPermissions.BlobSASPermissions.parse(
688
+ blobSASSignatureValues.permissions.toString()
689
+ ).toString();
690
+ } else {
691
+ verifiedPermissions = import_ContainerSASPermissions.ContainerSASPermissions.parse(
692
+ blobSASSignatureValues.permissions.toString()
693
+ ).toString();
694
+ }
695
+ }
696
+ const stringToSign = [
697
+ verifiedPermissions ? verifiedPermissions : "",
698
+ blobSASSignatureValues.startsOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.startsOn, false) : "",
699
+ blobSASSignatureValues.expiresOn ? (0, import_utils_common.truncatedISO8061Date)(blobSASSignatureValues.expiresOn, false) : "",
700
+ getCanonicalName(
701
+ userDelegationKeyCredential.accountName,
702
+ blobSASSignatureValues.containerName,
703
+ blobSASSignatureValues.blobName
704
+ ),
705
+ userDelegationKeyCredential.userDelegationKey.signedObjectId,
706
+ userDelegationKeyCredential.userDelegationKey.signedTenantId,
707
+ userDelegationKeyCredential.userDelegationKey.signedStartsOn ? (0, import_utils_common.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedStartsOn, false) : "",
708
+ userDelegationKeyCredential.userDelegationKey.signedExpiresOn ? (0, import_utils_common.truncatedISO8061Date)(userDelegationKeyCredential.userDelegationKey.signedExpiresOn, false) : "",
709
+ userDelegationKeyCredential.userDelegationKey.signedService,
710
+ userDelegationKeyCredential.userDelegationKey.signedVersion,
711
+ blobSASSignatureValues.preauthorizedAgentObjectId,
712
+ void 0,
713
+ // agentObjectId
714
+ blobSASSignatureValues.correlationId,
715
+ userDelegationKeyCredential.userDelegationKey.signedDelegatedUserTenantId,
716
+ // SignedKeyDelegatedUserTenantId, will be added in a future release.
717
+ blobSASSignatureValues.delegatedUserObjectId,
718
+ blobSASSignatureValues.ipRange ? (0, import_SasIPRange.ipRangeToString)(blobSASSignatureValues.ipRange) : "",
719
+ blobSASSignatureValues.protocol ? blobSASSignatureValues.protocol : "",
720
+ blobSASSignatureValues.version,
721
+ resource,
722
+ timestamp,
723
+ blobSASSignatureValues.encryptionScope,
724
+ formatRequestHeadersForSasSigning(blobSASSignatureValues.requestHeaders),
725
+ formatRequestQueryParametersForSasSigning(blobSASSignatureValues.requestQueryParameters),
726
+ blobSASSignatureValues.cacheControl,
727
+ blobSASSignatureValues.contentDisposition,
728
+ blobSASSignatureValues.contentEncoding,
729
+ blobSASSignatureValues.contentLanguage,
730
+ blobSASSignatureValues.contentType
731
+ ].join("\n");
732
+ const signature = userDelegationKeyCredential.computeHMACSHA256(stringToSign);
733
+ return {
734
+ sasQueryParameters: new import_SASQueryParameters.SASQueryParameters(
735
+ blobSASSignatureValues.version,
736
+ signature,
737
+ verifiedPermissions,
738
+ void 0,
739
+ void 0,
740
+ blobSASSignatureValues.protocol,
741
+ blobSASSignatureValues.startsOn,
742
+ blobSASSignatureValues.expiresOn,
743
+ blobSASSignatureValues.ipRange,
744
+ blobSASSignatureValues.identifier,
745
+ resource,
746
+ blobSASSignatureValues.cacheControl,
747
+ blobSASSignatureValues.contentDisposition,
748
+ blobSASSignatureValues.contentEncoding,
749
+ blobSASSignatureValues.contentLanguage,
750
+ blobSASSignatureValues.contentType,
751
+ userDelegationKeyCredential.userDelegationKey,
752
+ blobSASSignatureValues.preauthorizedAgentObjectId,
753
+ blobSASSignatureValues.correlationId,
754
+ blobSASSignatureValues.encryptionScope,
755
+ blobSASSignatureValues.delegatedUserObjectId,
756
+ getKeysOfRequestHeaders(blobSASSignatureValues.requestHeaders),
757
+ getKeysOfRequestHeaders(blobSASSignatureValues.requestQueryParameters)
758
+ ),
759
+ stringToSign
760
+ };
761
+ }
762
+ function formatRequestHeadersForSasSigning(requestHeaders) {
763
+ if (requestHeaders === void 0) {
764
+ return void 0;
765
+ }
766
+ let canonicalValue = "";
767
+ Object.keys(requestHeaders).forEach(function(key) {
768
+ canonicalValue = canonicalValue + key + ":" + requestHeaders[key] + "\n";
769
+ });
770
+ return canonicalValue;
771
+ }
772
+ function formatRequestQueryParametersForSasSigning(queryParameters) {
773
+ if (queryParameters === void 0) {
774
+ return void 0;
775
+ }
776
+ let canonicalValue = "";
777
+ Object.keys(queryParameters).forEach(function(key) {
778
+ canonicalValue = canonicalValue + "\n" + key + ":" + queryParameters[key];
779
+ });
780
+ return canonicalValue;
781
+ }
782
+ function getKeysOfRequestHeaders(requestHeaders) {
783
+ if (requestHeaders === void 0) {
784
+ return void 0;
785
+ }
786
+ let requestKeys = "";
787
+ let index = 0;
788
+ Object.keys(requestHeaders).forEach(function(key) {
789
+ if (index !== 0) {
790
+ requestKeys = requestKeys + ",";
791
+ }
792
+ requestKeys = requestKeys + key;
793
+ ++index;
794
+ });
795
+ return requestKeys;
606
796
  }
607
797
  function getCanonicalName(accountName, containerName, blobName) {
608
- // Container: "/blob/account/containerName"
609
- // Blob: "/blob/account/containerName/blobName"
610
- const elements = [`/blob/${accountName}/${containerName}`];
611
- if (blobName) {
612
- elements.push(`/${blobName}`);
613
- }
614
- return elements.join("");
798
+ const elements = [`/blob/${accountName}/${containerName}`];
799
+ if (blobName) {
800
+ elements.push(`/${blobName}`);
801
+ }
802
+ return elements.join("");
615
803
  }
616
804
  function SASSignatureValuesSanityCheckAndAutofill(blobSASSignatureValues) {
617
- const version = blobSASSignatureValues.version ? blobSASSignatureValues.version : constants_js_1.SERVICE_VERSION;
618
- if (blobSASSignatureValues.snapshotTime && version < "2018-11-09") {
619
- throw RangeError("'version' must be >= '2018-11-09' when providing 'snapshotTime'.");
620
- }
621
- if (blobSASSignatureValues.blobName === undefined && blobSASSignatureValues.snapshotTime) {
622
- throw RangeError("Must provide 'blobName' when providing 'snapshotTime'.");
623
- }
624
- if (blobSASSignatureValues.versionId && version < "2019-10-10") {
625
- throw RangeError("'version' must be >= '2019-10-10' when providing 'versionId'.");
626
- }
627
- if (blobSASSignatureValues.blobName === undefined && blobSASSignatureValues.versionId) {
628
- throw RangeError("Must provide 'blobName' when providing 'versionId'.");
629
- }
630
- if (blobSASSignatureValues.permissions &&
631
- blobSASSignatureValues.permissions.setImmutabilityPolicy &&
632
- version < "2020-08-04") {
633
- throw RangeError("'version' must be >= '2020-08-04' when provided 'i' permission.");
634
- }
635
- if (blobSASSignatureValues.permissions &&
636
- blobSASSignatureValues.permissions.deleteVersion &&
637
- version < "2019-10-10") {
638
- throw RangeError("'version' must be >= '2019-10-10' when providing 'x' permission.");
639
- }
640
- if (blobSASSignatureValues.permissions &&
641
- blobSASSignatureValues.permissions.permanentDelete &&
642
- version < "2019-10-10") {
643
- throw RangeError("'version' must be >= '2019-10-10' when providing 'y' permission.");
644
- }
645
- if (blobSASSignatureValues.permissions &&
646
- blobSASSignatureValues.permissions.tag &&
647
- version < "2019-12-12") {
648
- throw RangeError("'version' must be >= '2019-12-12' when providing 't' permission.");
649
- }
650
- if (version < "2020-02-10" &&
651
- blobSASSignatureValues.permissions &&
652
- (blobSASSignatureValues.permissions.move || blobSASSignatureValues.permissions.execute)) {
653
- throw RangeError("'version' must be >= '2020-02-10' when providing the 'm' or 'e' permission.");
654
- }
655
- if (version < "2021-04-10" &&
656
- blobSASSignatureValues.permissions &&
657
- blobSASSignatureValues.permissions.filterByTags) {
658
- throw RangeError("'version' must be >= '2021-04-10' when providing the 'f' permission.");
659
- }
660
- if (version < "2020-02-10" &&
661
- (blobSASSignatureValues.preauthorizedAgentObjectId || blobSASSignatureValues.correlationId)) {
662
- throw RangeError("'version' must be >= '2020-02-10' when providing 'preauthorizedAgentObjectId' or 'correlationId'.");
663
- }
664
- if (blobSASSignatureValues.encryptionScope && version < "2020-12-06") {
665
- throw RangeError("'version' must be >= '2020-12-06' when provided 'encryptionScope' in SAS.");
666
- }
667
- blobSASSignatureValues.version = version;
668
- return blobSASSignatureValues;
805
+ const version = blobSASSignatureValues.version ? blobSASSignatureValues.version : import_constants.SERVICE_VERSION;
806
+ if (blobSASSignatureValues.snapshotTime && version < "2018-11-09") {
807
+ throw RangeError("'version' must be >= '2018-11-09' when providing 'snapshotTime'.");
808
+ }
809
+ if (blobSASSignatureValues.blobName === void 0 && blobSASSignatureValues.snapshotTime) {
810
+ throw RangeError("Must provide 'blobName' when providing 'snapshotTime'.");
811
+ }
812
+ if (blobSASSignatureValues.versionId && version < "2019-10-10") {
813
+ throw RangeError("'version' must be >= '2019-10-10' when providing 'versionId'.");
814
+ }
815
+ if (blobSASSignatureValues.blobName === void 0 && blobSASSignatureValues.versionId) {
816
+ throw RangeError("Must provide 'blobName' when providing 'versionId'.");
817
+ }
818
+ if (blobSASSignatureValues.permissions && blobSASSignatureValues.permissions.setImmutabilityPolicy && version < "2020-08-04") {
819
+ throw RangeError("'version' must be >= '2020-08-04' when provided 'i' permission.");
820
+ }
821
+ if (blobSASSignatureValues.permissions && blobSASSignatureValues.permissions.deleteVersion && version < "2019-10-10") {
822
+ throw RangeError("'version' must be >= '2019-10-10' when providing 'x' permission.");
823
+ }
824
+ if (blobSASSignatureValues.permissions && blobSASSignatureValues.permissions.permanentDelete && version < "2019-10-10") {
825
+ throw RangeError("'version' must be >= '2019-10-10' when providing 'y' permission.");
826
+ }
827
+ if (blobSASSignatureValues.permissions && blobSASSignatureValues.permissions.tag && version < "2019-12-12") {
828
+ throw RangeError("'version' must be >= '2019-12-12' when providing 't' permission.");
829
+ }
830
+ if (version < "2020-02-10" && blobSASSignatureValues.permissions && (blobSASSignatureValues.permissions.move || blobSASSignatureValues.permissions.execute)) {
831
+ throw RangeError("'version' must be >= '2020-02-10' when providing the 'm' or 'e' permission.");
832
+ }
833
+ if (version < "2021-04-10" && blobSASSignatureValues.permissions && blobSASSignatureValues.permissions.filterByTags) {
834
+ throw RangeError("'version' must be >= '2021-04-10' when providing the 'f' permission.");
835
+ }
836
+ if (version < "2020-02-10" && (blobSASSignatureValues.preauthorizedAgentObjectId || blobSASSignatureValues.correlationId)) {
837
+ throw RangeError(
838
+ "'version' must be >= '2020-02-10' when providing 'preauthorizedAgentObjectId' or 'correlationId'."
839
+ );
840
+ }
841
+ if (blobSASSignatureValues.encryptionScope && version < "2020-12-06") {
842
+ throw RangeError("'version' must be >= '2020-12-06' when provided 'encryptionScope' in SAS.");
843
+ }
844
+ blobSASSignatureValues.version = version;
845
+ return blobSASSignatureValues;
669
846
  }
670
- //# sourceMappingURL=BlobSASSignatureValues.js.map
847
+ // Annotate the CommonJS export names for ESM import in node:
848
+ 0 && (module.exports = {
849
+ generateBlobSASQueryParameters,
850
+ generateBlobSASQueryParametersInternal
851
+ });