srx-lib-azure 0.1.7__py3-none-any.whl → 0.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of srx-lib-azure might be problematic. Click here for more details.
- srx_lib_azure/__init__.py +7 -2
- srx_lib_azure/blob.py +116 -16
- srx_lib_azure/document.py +262 -0
- srx_lib_azure/email.py +55 -4
- srx_lib_azure/table.py +119 -23
- srx_lib_azure-0.2.0.dist-info/METADATA +131 -0
- srx_lib_azure-0.2.0.dist-info/RECORD +8 -0
- srx_lib_azure-0.1.7.dist-info/METADATA +0 -70
- srx_lib_azure-0.1.7.dist-info/RECORD +0 -7
- {srx_lib_azure-0.1.7.dist-info → srx_lib_azure-0.2.0.dist-info}/WHEEL +0 -0
srx_lib_azure/__init__.py
CHANGED
|
@@ -1,6 +1,11 @@
|
|
|
1
1
|
from .blob import AzureBlobService
|
|
2
|
+
from .document import AzureDocumentIntelligenceService
|
|
2
3
|
from .email import EmailService
|
|
3
4
|
from .table import AzureTableService
|
|
4
5
|
|
|
5
|
-
__all__ = [
|
|
6
|
-
|
|
6
|
+
__all__ = [
|
|
7
|
+
"AzureBlobService",
|
|
8
|
+
"AzureDocumentIntelligenceService",
|
|
9
|
+
"AzureTableService",
|
|
10
|
+
"EmailService",
|
|
11
|
+
]
|
srx_lib_azure/blob.py
CHANGED
|
@@ -4,6 +4,11 @@ from datetime import datetime, timedelta, timezone
|
|
|
4
4
|
from typing import Optional, BinaryIO, Tuple
|
|
5
5
|
|
|
6
6
|
from azure.storage.blob import BlobServiceClient, BlobSasPermissions, generate_blob_sas
|
|
7
|
+
from azure.core.exceptions import (
|
|
8
|
+
ResourceNotFoundError,
|
|
9
|
+
ClientAuthenticationError,
|
|
10
|
+
HttpResponseError,
|
|
11
|
+
)
|
|
7
12
|
from fastapi import UploadFile
|
|
8
13
|
|
|
9
14
|
from loguru import logger
|
|
@@ -49,9 +54,7 @@ class AzureBlobService:
|
|
|
49
54
|
return None, None
|
|
50
55
|
try:
|
|
51
56
|
clean = self.connection_string.strip().strip('"').strip("'")
|
|
52
|
-
parts = dict(
|
|
53
|
-
seg.split("=", 1) for seg in clean.split(";") if "=" in seg
|
|
54
|
-
)
|
|
57
|
+
parts = dict(seg.split("=", 1) for seg in clean.split(";") if "=" in seg)
|
|
55
58
|
account_name = parts.get("AccountName")
|
|
56
59
|
account_key = parts.get("AccountKey") or self.account_key
|
|
57
60
|
return account_name, account_key
|
|
@@ -93,9 +96,20 @@ class AzureBlobService:
|
|
|
93
96
|
if self.base_blob_url:
|
|
94
97
|
base_url = self.base_blob_url.strip().strip('"').strip("'").rstrip("/")
|
|
95
98
|
return f"{base_url}/{blob_name}?{sas}"
|
|
96
|
-
return
|
|
99
|
+
return (
|
|
100
|
+
f"https://{account_name}.blob.core.windows.net/{self.container_name}/{blob_name}?{sas}"
|
|
101
|
+
)
|
|
97
102
|
|
|
98
103
|
async def upload_file(self, file: UploadFile, blob_path: str) -> Optional[str]:
|
|
104
|
+
"""Upload a file to Azure Blob Storage and return a SAS URL.
|
|
105
|
+
|
|
106
|
+
Args:
|
|
107
|
+
file: File to upload
|
|
108
|
+
blob_path: Destination path in the container
|
|
109
|
+
|
|
110
|
+
Returns:
|
|
111
|
+
SAS URL if successful, None on error
|
|
112
|
+
"""
|
|
99
113
|
if not self.connection_string:
|
|
100
114
|
logger.error("Azure Storage connection string not configured")
|
|
101
115
|
return None
|
|
@@ -105,13 +119,37 @@ class AzureBlobService:
|
|
|
105
119
|
container = client.get_container_client(self.container_name)
|
|
106
120
|
content = await file.read()
|
|
107
121
|
blob_client = container.get_blob_client(blob_path)
|
|
108
|
-
blob_client.upload_blob(
|
|
122
|
+
blob_client.upload_blob(
|
|
123
|
+
content,
|
|
124
|
+
overwrite=True,
|
|
125
|
+
content_type=file.content_type or "application/octet-stream",
|
|
126
|
+
)
|
|
109
127
|
return self._generate_sas_url(blob_path)
|
|
128
|
+
except ClientAuthenticationError as e:
|
|
129
|
+
logger.error(f"Authentication failed uploading {file.filename}: {e}")
|
|
130
|
+
return None
|
|
131
|
+
except HttpResponseError as e:
|
|
132
|
+
logger.error(
|
|
133
|
+
f"Azure service error uploading {file.filename}: {e.status_code} - {e.message}"
|
|
134
|
+
)
|
|
135
|
+
return None
|
|
110
136
|
except Exception as e:
|
|
111
|
-
logger.error(f"
|
|
137
|
+
logger.error(f"Unexpected error uploading {file.filename}: {e}")
|
|
112
138
|
return None
|
|
113
139
|
|
|
114
|
-
async def upload_stream(
|
|
140
|
+
async def upload_stream(
|
|
141
|
+
self, stream: BinaryIO, blob_path: str, content_type: str = "application/octet-stream"
|
|
142
|
+
) -> Optional[str]:
|
|
143
|
+
"""Upload a binary stream to Azure Blob Storage and return a SAS URL.
|
|
144
|
+
|
|
145
|
+
Args:
|
|
146
|
+
stream: Binary stream to upload
|
|
147
|
+
blob_path: Destination path in the container
|
|
148
|
+
content_type: MIME type of the content
|
|
149
|
+
|
|
150
|
+
Returns:
|
|
151
|
+
SAS URL if successful, None on error
|
|
152
|
+
"""
|
|
115
153
|
if not self.connection_string:
|
|
116
154
|
logger.error("Azure Storage connection string not configured")
|
|
117
155
|
return None
|
|
@@ -122,12 +160,27 @@ class AzureBlobService:
|
|
|
122
160
|
blob_client = container.get_blob_client(blob_path)
|
|
123
161
|
blob_client.upload_blob(stream, overwrite=True, content_type=content_type)
|
|
124
162
|
return self._generate_sas_url(blob_path)
|
|
163
|
+
except ClientAuthenticationError as e:
|
|
164
|
+
logger.error(f"Authentication failed uploading stream to {blob_path}: {e}")
|
|
165
|
+
return None
|
|
166
|
+
except HttpResponseError as e:
|
|
167
|
+
logger.error(
|
|
168
|
+
f"Azure service error uploading stream to {blob_path}: {e.status_code} - {e.message}"
|
|
169
|
+
)
|
|
170
|
+
return None
|
|
125
171
|
except Exception as e:
|
|
126
|
-
logger.error(f"
|
|
172
|
+
logger.error(f"Unexpected error uploading stream to {blob_path}: {e}")
|
|
127
173
|
return None
|
|
128
174
|
|
|
129
175
|
async def download_file(self, blob_path: str) -> Optional[bytes]:
|
|
130
|
-
"""Download a blob's content as bytes.
|
|
176
|
+
"""Download a blob's content as bytes.
|
|
177
|
+
|
|
178
|
+
Returns:
|
|
179
|
+
bytes if successful, None if blob doesn't exist
|
|
180
|
+
|
|
181
|
+
Raises:
|
|
182
|
+
RuntimeError: For connection/auth errors (caller should handle)
|
|
183
|
+
"""
|
|
131
184
|
if not self.connection_string:
|
|
132
185
|
logger.error("Azure Storage connection string not configured")
|
|
133
186
|
return None
|
|
@@ -139,9 +192,24 @@ class AzureBlobService:
|
|
|
139
192
|
content = download_stream.readall()
|
|
140
193
|
logger.info(f"Successfully downloaded {blob_path}")
|
|
141
194
|
return content
|
|
142
|
-
except
|
|
143
|
-
|
|
195
|
+
except ResourceNotFoundError:
|
|
196
|
+
# Blob doesn't exist - this is expected in many scenarios
|
|
197
|
+
logger.info(f"Blob not found: {blob_path}")
|
|
144
198
|
return None
|
|
199
|
+
except ClientAuthenticationError as e:
|
|
200
|
+
# Auth errors should not be retried - they need credential fixes
|
|
201
|
+
logger.error(f"Authentication failed for {blob_path}: {e}")
|
|
202
|
+
raise RuntimeError(f"Azure authentication failed: {e}") from e
|
|
203
|
+
except HttpResponseError as e:
|
|
204
|
+
# Other Azure service errors (rate limits, service issues, etc.)
|
|
205
|
+
logger.error(
|
|
206
|
+
f"Azure service error downloading {blob_path}: {e.status_code} - {e.message}"
|
|
207
|
+
)
|
|
208
|
+
raise RuntimeError(f"Azure Blob download failed for {blob_path}: {e.message}") from e
|
|
209
|
+
except Exception as e:
|
|
210
|
+
# Catch-all for unexpected errors (network, etc.)
|
|
211
|
+
logger.error(f"Unexpected error downloading {blob_path}: {e}")
|
|
212
|
+
raise RuntimeError(f"Unexpected error downloading {blob_path}: {e}") from e
|
|
145
213
|
|
|
146
214
|
async def download_to_temp_file(self, blob_path: str) -> Optional[str]:
|
|
147
215
|
"""Download a blob to a temporary file and return its path."""
|
|
@@ -149,7 +217,9 @@ class AzureBlobService:
|
|
|
149
217
|
if content is None:
|
|
150
218
|
return None
|
|
151
219
|
try:
|
|
152
|
-
with tempfile.NamedTemporaryFile(
|
|
220
|
+
with tempfile.NamedTemporaryFile(
|
|
221
|
+
delete=False, suffix=os.path.splitext(blob_path)[1]
|
|
222
|
+
) as tf:
|
|
153
223
|
tf.write(content)
|
|
154
224
|
path = tf.name
|
|
155
225
|
logger.info(f"Downloaded {blob_path} to temporary file: {path}")
|
|
@@ -172,7 +242,14 @@ class AzureBlobService:
|
|
|
172
242
|
return None
|
|
173
243
|
|
|
174
244
|
async def delete_file(self, blob_path: str) -> bool:
|
|
175
|
-
"""Delete a blob and return True on success.
|
|
245
|
+
"""Delete a blob and return True on success.
|
|
246
|
+
|
|
247
|
+
Args:
|
|
248
|
+
blob_path: Path to the blob to delete
|
|
249
|
+
|
|
250
|
+
Returns:
|
|
251
|
+
True if deleted successfully or blob doesn't exist, False on error
|
|
252
|
+
"""
|
|
176
253
|
if not self.connection_string:
|
|
177
254
|
logger.error("Azure Storage connection string not configured")
|
|
178
255
|
return False
|
|
@@ -183,12 +260,29 @@ class AzureBlobService:
|
|
|
183
260
|
blob_client.delete_blob()
|
|
184
261
|
logger.info(f"Successfully deleted {blob_path}")
|
|
185
262
|
return True
|
|
263
|
+
except ResourceNotFoundError:
|
|
264
|
+
# Blob already doesn't exist - this is still success
|
|
265
|
+
logger.info(f"Blob {blob_path} already deleted or doesn't exist")
|
|
266
|
+
return True
|
|
267
|
+
except ClientAuthenticationError as e:
|
|
268
|
+
logger.error(f"Authentication failed when deleting {blob_path}: {e}")
|
|
269
|
+
return False
|
|
270
|
+
except HttpResponseError as e:
|
|
271
|
+
logger.error(f"Azure service error deleting {blob_path}: {e.status_code} - {e.message}")
|
|
272
|
+
return False
|
|
186
273
|
except Exception as e:
|
|
187
|
-
logger.error(f"
|
|
274
|
+
logger.error(f"Unexpected error deleting {blob_path}: {e}")
|
|
188
275
|
return False
|
|
189
276
|
|
|
190
277
|
async def file_exists(self, blob_path: str) -> bool:
|
|
191
|
-
"""Check if a blob exists in the container.
|
|
278
|
+
"""Check if a blob exists in the container.
|
|
279
|
+
|
|
280
|
+
Args:
|
|
281
|
+
blob_path: Path to the blob to check
|
|
282
|
+
|
|
283
|
+
Returns:
|
|
284
|
+
True if blob exists, False otherwise (including on errors)
|
|
285
|
+
"""
|
|
192
286
|
if not self.connection_string:
|
|
193
287
|
logger.error("Azure Storage connection string not configured")
|
|
194
288
|
return False
|
|
@@ -197,6 +291,12 @@ class AzureBlobService:
|
|
|
197
291
|
container = client.get_container_client(self.container_name)
|
|
198
292
|
blob_client = container.get_blob_client(blob_path)
|
|
199
293
|
return blob_client.exists()
|
|
294
|
+
except ClientAuthenticationError as e:
|
|
295
|
+
logger.error(f"Authentication failed checking {blob_path}: {e}")
|
|
296
|
+
return False
|
|
297
|
+
except HttpResponseError as e:
|
|
298
|
+
logger.error(f"Azure service error checking {blob_path}: {e.status_code} - {e.message}")
|
|
299
|
+
return False
|
|
200
300
|
except Exception as e:
|
|
201
|
-
logger.error(f"
|
|
301
|
+
logger.error(f"Unexpected error checking existence of {blob_path}: {e}")
|
|
202
302
|
return False
|
|
@@ -0,0 +1,262 @@
|
|
|
1
|
+
import os
|
|
2
|
+
import io
|
|
3
|
+
import asyncio
|
|
4
|
+
from typing import Dict, Any, Optional
|
|
5
|
+
|
|
6
|
+
from loguru import logger
|
|
7
|
+
|
|
8
|
+
try:
|
|
9
|
+
from azure.ai.documentintelligence import DocumentIntelligenceClient
|
|
10
|
+
from azure.ai.documentintelligence.models import AnalyzeDocumentRequest, AnalyzeResult
|
|
11
|
+
from azure.core.credentials import AzureKeyCredential
|
|
12
|
+
from azure.core.exceptions import (
|
|
13
|
+
ClientAuthenticationError,
|
|
14
|
+
HttpResponseError,
|
|
15
|
+
ServiceRequestError,
|
|
16
|
+
)
|
|
17
|
+
except Exception: # pragma: no cover - optional dependency at import time
|
|
18
|
+
DocumentIntelligenceClient = None # type: ignore
|
|
19
|
+
AnalyzeDocumentRequest = None # type: ignore
|
|
20
|
+
AnalyzeResult = None # type: ignore
|
|
21
|
+
AzureKeyCredential = None # type: ignore
|
|
22
|
+
ClientAuthenticationError = None # type: ignore
|
|
23
|
+
HttpResponseError = None # type: ignore
|
|
24
|
+
ServiceRequestError = None # type: ignore
|
|
25
|
+
|
|
26
|
+
|
|
27
|
+
class AzureDocumentIntelligenceService:
|
|
28
|
+
"""Wrapper for Azure Document Intelligence (OCR/Document Analysis).
|
|
29
|
+
|
|
30
|
+
Does not raise on missing configuration to keep the library optional.
|
|
31
|
+
If not configured, analysis calls return error responses with descriptive messages.
|
|
32
|
+
"""
|
|
33
|
+
|
|
34
|
+
def __init__(
|
|
35
|
+
self,
|
|
36
|
+
*,
|
|
37
|
+
endpoint: Optional[str] = None,
|
|
38
|
+
key: Optional[str] = None,
|
|
39
|
+
warn_if_unconfigured: bool = False,
|
|
40
|
+
):
|
|
41
|
+
"""Initialize Document Intelligence service.
|
|
42
|
+
|
|
43
|
+
Args:
|
|
44
|
+
endpoint: Azure Document Intelligence endpoint URL
|
|
45
|
+
key: Azure Document Intelligence API key
|
|
46
|
+
warn_if_unconfigured: Whether to log a warning if not configured
|
|
47
|
+
"""
|
|
48
|
+
self.endpoint = endpoint or os.getenv("AZURE_DOCUMENT_INTELLIGENCE_ENDPOINT")
|
|
49
|
+
self.key = key or os.getenv("AZURE_DOCUMENT_INTELLIGENCE_KEY")
|
|
50
|
+
|
|
51
|
+
if not self.endpoint or not self.key or DocumentIntelligenceClient is None:
|
|
52
|
+
self.client = None
|
|
53
|
+
if warn_if_unconfigured:
|
|
54
|
+
logger.warning(
|
|
55
|
+
"AzureDocumentIntelligenceService not configured "
|
|
56
|
+
"(missing endpoint/key or azure-ai-documentintelligence SDK). "
|
|
57
|
+
"Calls will return error responses."
|
|
58
|
+
)
|
|
59
|
+
else:
|
|
60
|
+
try:
|
|
61
|
+
self.client = DocumentIntelligenceClient(
|
|
62
|
+
endpoint=self.endpoint, credential=AzureKeyCredential(self.key)
|
|
63
|
+
)
|
|
64
|
+
except Exception as e:
|
|
65
|
+
self.client = None
|
|
66
|
+
logger.warning("DocumentIntelligenceClient initialization failed: %s", e)
|
|
67
|
+
|
|
68
|
+
async def analyze_document_from_url(
|
|
69
|
+
self, url: str, model_id: str = "prebuilt-read"
|
|
70
|
+
) -> Dict[str, Any]:
|
|
71
|
+
"""Analyze a document from a URL using Azure Document Intelligence.
|
|
72
|
+
|
|
73
|
+
Args:
|
|
74
|
+
url: URL of the document to analyze (must be accessible to Azure)
|
|
75
|
+
model_id: Model to use (default: "prebuilt-read" for OCR)
|
|
76
|
+
Other options: "prebuilt-layout", "prebuilt-invoice", etc.
|
|
77
|
+
|
|
78
|
+
Returns:
|
|
79
|
+
Dict with analysis results:
|
|
80
|
+
- success (bool): Whether analysis succeeded
|
|
81
|
+
- content (str | None): Extracted text content
|
|
82
|
+
- pages (list[dict] | None): Page information
|
|
83
|
+
- page_count (int | None): Total number of pages
|
|
84
|
+
- confidence (float | None): Average OCR confidence (0-1)
|
|
85
|
+
- model_id (str | None): Model used
|
|
86
|
+
- metadata (dict | None): Additional metadata
|
|
87
|
+
- error (str | None): Error message if failed
|
|
88
|
+
"""
|
|
89
|
+
if not self.client:
|
|
90
|
+
logger.warning("Document analysis from URL skipped: service not configured")
|
|
91
|
+
return {
|
|
92
|
+
"success": False,
|
|
93
|
+
"error": "Document Intelligence service not configured",
|
|
94
|
+
}
|
|
95
|
+
|
|
96
|
+
try:
|
|
97
|
+
logger.info(f"Starting document analysis from URL: {url} (model: {model_id})")
|
|
98
|
+
|
|
99
|
+
# Run the blocking operation in a thread pool
|
|
100
|
+
poller = await asyncio.to_thread(
|
|
101
|
+
self.client.begin_analyze_document,
|
|
102
|
+
model_id,
|
|
103
|
+
AnalyzeDocumentRequest(url_source=url),
|
|
104
|
+
)
|
|
105
|
+
|
|
106
|
+
# Wait for the result
|
|
107
|
+
result: AnalyzeResult = await asyncio.to_thread(poller.result)
|
|
108
|
+
|
|
109
|
+
logger.info(
|
|
110
|
+
f"Document analysis completed (model: {model_id}, pages: {len(result.pages or [])})"
|
|
111
|
+
)
|
|
112
|
+
|
|
113
|
+
return self._format_result(result, model_id)
|
|
114
|
+
|
|
115
|
+
except ClientAuthenticationError as e:
|
|
116
|
+
logger.error(f"Authentication failed for document analysis: {e}")
|
|
117
|
+
return {"success": False, "error": f"Authentication failed: {e}"}
|
|
118
|
+
except HttpResponseError as e:
|
|
119
|
+
logger.error(f"Azure service error analyzing document: {e.status_code} - {e.message}")
|
|
120
|
+
return {
|
|
121
|
+
"success": False,
|
|
122
|
+
"error": f"Azure service error ({e.status_code}): {e.message}",
|
|
123
|
+
}
|
|
124
|
+
except ServiceRequestError as e:
|
|
125
|
+
logger.error(f"Network error analyzing document: {e}")
|
|
126
|
+
return {"success": False, "error": f"Network error: {e}"}
|
|
127
|
+
except Exception as e:
|
|
128
|
+
logger.error(f"Unexpected error analyzing document from URL: {e}")
|
|
129
|
+
return {"success": False, "error": f"Unexpected error: {e}"}
|
|
130
|
+
|
|
131
|
+
async def analyze_document_from_bytes(
|
|
132
|
+
self, file_content: bytes, model_id: str = "prebuilt-read"
|
|
133
|
+
) -> Dict[str, Any]:
|
|
134
|
+
"""Analyze a document from bytes using Azure Document Intelligence.
|
|
135
|
+
|
|
136
|
+
Args:
|
|
137
|
+
file_content: Document content as bytes (PDF, image, etc.)
|
|
138
|
+
model_id: Model to use (default: "prebuilt-read" for OCR)
|
|
139
|
+
|
|
140
|
+
Returns:
|
|
141
|
+
Dict with analysis results (same format as analyze_document_from_url)
|
|
142
|
+
"""
|
|
143
|
+
if not self.client:
|
|
144
|
+
logger.warning("Document analysis from bytes skipped: service not configured")
|
|
145
|
+
return {
|
|
146
|
+
"success": False,
|
|
147
|
+
"error": "Document Intelligence service not configured",
|
|
148
|
+
}
|
|
149
|
+
|
|
150
|
+
try:
|
|
151
|
+
logger.info(
|
|
152
|
+
f"Starting document analysis from bytes (size: {len(file_content)} bytes, model: {model_id})"
|
|
153
|
+
)
|
|
154
|
+
|
|
155
|
+
# Create a file-like object from bytes
|
|
156
|
+
file_stream = io.BytesIO(file_content)
|
|
157
|
+
|
|
158
|
+
# Run the blocking operation in a thread pool
|
|
159
|
+
poller = await asyncio.to_thread(
|
|
160
|
+
self.client.begin_analyze_document,
|
|
161
|
+
model_id,
|
|
162
|
+
body=file_stream,
|
|
163
|
+
)
|
|
164
|
+
|
|
165
|
+
# Wait for the result
|
|
166
|
+
result: AnalyzeResult = await asyncio.to_thread(poller.result)
|
|
167
|
+
|
|
168
|
+
logger.info(
|
|
169
|
+
f"Document analysis completed (model: {model_id}, pages: {len(result.pages or [])})"
|
|
170
|
+
)
|
|
171
|
+
|
|
172
|
+
return self._format_result(result, model_id)
|
|
173
|
+
|
|
174
|
+
except ClientAuthenticationError as e:
|
|
175
|
+
logger.error(f"Authentication failed for document analysis: {e}")
|
|
176
|
+
return {"success": False, "error": f"Authentication failed: {e}"}
|
|
177
|
+
except HttpResponseError as e:
|
|
178
|
+
logger.error(f"Azure service error analyzing document: {e.status_code} - {e.message}")
|
|
179
|
+
return {
|
|
180
|
+
"success": False,
|
|
181
|
+
"error": f"Azure service error ({e.status_code}): {e.message}",
|
|
182
|
+
}
|
|
183
|
+
except ServiceRequestError as e:
|
|
184
|
+
logger.error(f"Network error analyzing document: {e}")
|
|
185
|
+
return {"success": False, "error": f"Network error: {e}"}
|
|
186
|
+
except Exception as e:
|
|
187
|
+
logger.error(f"Unexpected error analyzing document from bytes: {e}")
|
|
188
|
+
return {"success": False, "error": f"Unexpected error: {e}"}
|
|
189
|
+
|
|
190
|
+
def _format_result(self, result: AnalyzeResult, model_id: str) -> Dict[str, Any]:
|
|
191
|
+
"""Format the AnalyzeResult into a dict response.
|
|
192
|
+
|
|
193
|
+
Args:
|
|
194
|
+
result: Azure Document Intelligence AnalyzeResult
|
|
195
|
+
model_id: Model ID used for analysis
|
|
196
|
+
|
|
197
|
+
Returns:
|
|
198
|
+
Formatted dict with extracted content and metadata
|
|
199
|
+
"""
|
|
200
|
+
# Extract all text content
|
|
201
|
+
content_parts: list[str] = []
|
|
202
|
+
pages_info: list[Dict[str, Any]] = []
|
|
203
|
+
total_confidence = 0.0
|
|
204
|
+
confidence_count = 0
|
|
205
|
+
|
|
206
|
+
if result.pages:
|
|
207
|
+
for page in result.pages:
|
|
208
|
+
# Collect page info
|
|
209
|
+
page_info = {
|
|
210
|
+
"page_number": page.page_number,
|
|
211
|
+
"width": page.width,
|
|
212
|
+
"height": page.height,
|
|
213
|
+
"unit": page.unit,
|
|
214
|
+
"lines_count": len(page.lines or []),
|
|
215
|
+
"words_count": len(page.words or []),
|
|
216
|
+
}
|
|
217
|
+
pages_info.append(page_info)
|
|
218
|
+
|
|
219
|
+
# Extract text from lines
|
|
220
|
+
if page.lines:
|
|
221
|
+
for line in page.lines:
|
|
222
|
+
content_parts.append(line.content)
|
|
223
|
+
# Track confidence if available
|
|
224
|
+
if hasattr(line, "confidence") and line.confidence is not None:
|
|
225
|
+
total_confidence += line.confidence
|
|
226
|
+
confidence_count += 1
|
|
227
|
+
|
|
228
|
+
# Combine all content with newlines
|
|
229
|
+
full_content = "\n".join(content_parts)
|
|
230
|
+
|
|
231
|
+
# Calculate average confidence
|
|
232
|
+
avg_confidence = total_confidence / confidence_count if confidence_count > 0 else None
|
|
233
|
+
|
|
234
|
+
# Build metadata
|
|
235
|
+
metadata: Dict[str, Any] = {
|
|
236
|
+
"content_format": (
|
|
237
|
+
result.content_format if hasattr(result, "content_format") else None
|
|
238
|
+
),
|
|
239
|
+
"api_version": result.api_version if hasattr(result, "api_version") else None,
|
|
240
|
+
}
|
|
241
|
+
|
|
242
|
+
# Add languages if detected
|
|
243
|
+
if hasattr(result, "languages") and result.languages:
|
|
244
|
+
metadata["languages"] = [
|
|
245
|
+
{"locale": lang.locale, "confidence": lang.confidence} for lang in result.languages
|
|
246
|
+
]
|
|
247
|
+
|
|
248
|
+
# Add styles if detected (e.g., handwriting)
|
|
249
|
+
if hasattr(result, "styles") and result.styles:
|
|
250
|
+
metadata["has_handwriting"] = any(
|
|
251
|
+
style.is_handwritten for style in result.styles if hasattr(style, "is_handwritten")
|
|
252
|
+
)
|
|
253
|
+
|
|
254
|
+
return {
|
|
255
|
+
"success": True,
|
|
256
|
+
"content": full_content if full_content else None,
|
|
257
|
+
"pages": pages_info if pages_info else None,
|
|
258
|
+
"page_count": len(pages_info) if pages_info else None,
|
|
259
|
+
"confidence": avg_confidence,
|
|
260
|
+
"model_id": model_id,
|
|
261
|
+
"metadata": metadata,
|
|
262
|
+
}
|
srx_lib_azure/email.py
CHANGED
|
@@ -4,8 +4,16 @@ from typing import Dict, Any
|
|
|
4
4
|
|
|
5
5
|
try:
|
|
6
6
|
from azure.communication.email.aio import EmailClient
|
|
7
|
+
from azure.core.exceptions import (
|
|
8
|
+
ClientAuthenticationError,
|
|
9
|
+
HttpResponseError,
|
|
10
|
+
ServiceRequestError,
|
|
11
|
+
)
|
|
7
12
|
except Exception: # pragma: no cover - optional dependency at import time
|
|
8
13
|
EmailClient = None # type: ignore
|
|
14
|
+
ClientAuthenticationError = None # type: ignore
|
|
15
|
+
HttpResponseError = None # type: ignore
|
|
16
|
+
ServiceRequestError = None # type: ignore
|
|
9
17
|
|
|
10
18
|
logger = logging.getLogger(__name__)
|
|
11
19
|
|
|
@@ -39,10 +47,27 @@ class EmailService:
|
|
|
39
47
|
self.email_client = None
|
|
40
48
|
logger.warning("EmailService initialization failed: %s", e)
|
|
41
49
|
|
|
42
|
-
async def send_notification(
|
|
50
|
+
async def send_notification(
|
|
51
|
+
self, recipient: str, subject: str, body: str, html: bool = False
|
|
52
|
+
) -> Dict[str, Any]:
|
|
53
|
+
"""Send an email notification via Azure Communication Services.
|
|
54
|
+
|
|
55
|
+
Args:
|
|
56
|
+
recipient: Email address of the recipient
|
|
57
|
+
subject: Email subject line
|
|
58
|
+
body: Email body content
|
|
59
|
+
html: If True, send as HTML; otherwise plain text
|
|
60
|
+
|
|
61
|
+
Returns:
|
|
62
|
+
Dict with status, message, and optional message_id
|
|
63
|
+
- status: "success" | "error" | "skipped"
|
|
64
|
+
- message: Human-readable message
|
|
65
|
+
- message_id: Azure message ID (only on success)
|
|
66
|
+
"""
|
|
43
67
|
if not self.email_client or not self.sender_address:
|
|
44
68
|
logger.warning("Email skipped: service not configured")
|
|
45
69
|
return {"status": "skipped", "message": "Email service not configured"}
|
|
70
|
+
|
|
46
71
|
message = {
|
|
47
72
|
"content": {"subject": subject},
|
|
48
73
|
"recipients": {"to": [{"address": recipient}]},
|
|
@@ -52,15 +77,41 @@ class EmailService:
|
|
|
52
77
|
message["content"]["html"] = body
|
|
53
78
|
else:
|
|
54
79
|
message["content"]["plainText"] = body
|
|
80
|
+
|
|
55
81
|
try:
|
|
56
82
|
poller = await self.email_client.begin_send(message)
|
|
57
83
|
result = await poller.result()
|
|
58
84
|
message_id = result.get("id")
|
|
59
85
|
if message_id:
|
|
60
86
|
logger.info("Email sent to %s with Message ID: %s", recipient, message_id)
|
|
61
|
-
return {
|
|
87
|
+
return {
|
|
88
|
+
"status": "success",
|
|
89
|
+
"message": "Email sent successfully",
|
|
90
|
+
"message_id": message_id,
|
|
91
|
+
}
|
|
62
92
|
logger.error("Failed to send email. Result: %s", result)
|
|
63
93
|
return {"status": "error", "message": f"Failed to send email: {result}"}
|
|
94
|
+
except ClientAuthenticationError as e:
|
|
95
|
+
# Auth errors should not be retried - they need credential fixes
|
|
96
|
+
logger.error("Authentication failed sending email to %s: %s", recipient, e)
|
|
97
|
+
return {"status": "error", "message": f"Authentication failed: {e}"}
|
|
98
|
+
except HttpResponseError as e:
|
|
99
|
+
# Azure service errors (rate limits, invalid recipient, etc.)
|
|
100
|
+
logger.error(
|
|
101
|
+
"Azure service error sending email to %s: %s - %s",
|
|
102
|
+
recipient,
|
|
103
|
+
e.status_code,
|
|
104
|
+
e.message,
|
|
105
|
+
)
|
|
106
|
+
return {
|
|
107
|
+
"status": "error",
|
|
108
|
+
"message": f"Azure service error ({e.status_code}): {e.message}",
|
|
109
|
+
}
|
|
110
|
+
except ServiceRequestError as e:
|
|
111
|
+
# Network/connection errors - may be retryable
|
|
112
|
+
logger.error("Network error sending email to %s: %s", recipient, e)
|
|
113
|
+
return {"status": "error", "message": f"Network error: {e}"}
|
|
64
114
|
except Exception as e:
|
|
65
|
-
|
|
66
|
-
|
|
115
|
+
# Catch-all for unexpected errors
|
|
116
|
+
logger.error("Unexpected error sending email to %s: %s", recipient, e)
|
|
117
|
+
return {"status": "error", "message": f"Unexpected error: {e}"}
|
srx_lib_azure/table.py
CHANGED
|
@@ -9,8 +9,18 @@ from loguru import logger
|
|
|
9
9
|
|
|
10
10
|
try:
|
|
11
11
|
from azure.data.tables import TableServiceClient
|
|
12
|
+
from azure.core.exceptions import (
|
|
13
|
+
ResourceNotFoundError,
|
|
14
|
+
ResourceExistsError,
|
|
15
|
+
ClientAuthenticationError,
|
|
16
|
+
HttpResponseError,
|
|
17
|
+
)
|
|
12
18
|
except Exception: # pragma: no cover
|
|
13
19
|
TableServiceClient = None # type: ignore
|
|
20
|
+
ResourceNotFoundError = None # type: ignore
|
|
21
|
+
ResourceExistsError = None # type: ignore
|
|
22
|
+
ClientAuthenticationError = None # type: ignore
|
|
23
|
+
HttpResponseError = None # type: ignore
|
|
14
24
|
|
|
15
25
|
|
|
16
26
|
def _now_iso() -> str:
|
|
@@ -62,15 +72,25 @@ class AzureTableService:
|
|
|
62
72
|
table_name: Name of the table to delete
|
|
63
73
|
|
|
64
74
|
Returns:
|
|
65
|
-
True if deleted successfully, False
|
|
75
|
+
True if deleted successfully or table doesn't exist, False on other errors
|
|
66
76
|
"""
|
|
67
77
|
client = self._get_client()
|
|
68
78
|
try:
|
|
69
79
|
client.delete_table(table_name=table_name)
|
|
70
80
|
logger.info("Deleted table: %s", table_name)
|
|
71
81
|
return True
|
|
82
|
+
except ResourceNotFoundError:
|
|
83
|
+
# Table already deleted or doesn't exist - this is still success
|
|
84
|
+
logger.info(f"Table {table_name} already deleted or doesn't exist")
|
|
85
|
+
return True
|
|
86
|
+
except ClientAuthenticationError as exc:
|
|
87
|
+
logger.error("Authentication failed deleting table %s: %s", table_name, exc)
|
|
88
|
+
return False
|
|
89
|
+
except HttpResponseError as exc:
|
|
90
|
+
logger.error("Azure service error deleting table %s: %s", table_name, exc.message)
|
|
91
|
+
return False
|
|
72
92
|
except Exception as exc:
|
|
73
|
-
logger.error("
|
|
93
|
+
logger.error("Unexpected error deleting table %s: %s", table_name, exc)
|
|
74
94
|
return False
|
|
75
95
|
|
|
76
96
|
def table_exists(self, table_name: str) -> bool:
|
|
@@ -85,38 +105,105 @@ class AzureTableService:
|
|
|
85
105
|
return table_name in self.list_tables()
|
|
86
106
|
|
|
87
107
|
def put_entity(self, table_name: str, entity: Dict[str, Any]) -> Dict[str, Any]:
|
|
108
|
+
"""Insert a new entity into a table.
|
|
109
|
+
|
|
110
|
+
Args:
|
|
111
|
+
table_name: Name of the table
|
|
112
|
+
entity: Entity dictionary with PartitionKey and RowKey
|
|
113
|
+
|
|
114
|
+
Returns:
|
|
115
|
+
Dict with etag and timestamp
|
|
116
|
+
|
|
117
|
+
Raises:
|
|
118
|
+
RuntimeError: If entity already exists or other errors occur
|
|
119
|
+
"""
|
|
88
120
|
client = self._get_client()
|
|
89
121
|
table = client.get_table_client(table_name)
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
|
|
122
|
+
try:
|
|
123
|
+
res = table.create_entity(entity=entity)
|
|
124
|
+
logger.info(
|
|
125
|
+
"Inserted entity into %s: PK=%s RK=%s",
|
|
126
|
+
table_name,
|
|
127
|
+
entity.get("PartitionKey"),
|
|
128
|
+
entity.get("RowKey"),
|
|
129
|
+
)
|
|
130
|
+
return {"etag": getattr(res, "etag", None), "ts": _now_iso()}
|
|
131
|
+
except ResourceExistsError as e:
|
|
132
|
+
pk, rk = entity.get("PartitionKey"), entity.get("RowKey")
|
|
133
|
+
logger.error(f"Entity already exists in {table_name}: PK={pk} RK={rk}")
|
|
134
|
+
raise RuntimeError(f"Entity already exists: {e}") from e
|
|
135
|
+
except ClientAuthenticationError as e:
|
|
136
|
+
logger.error(f"Authentication failed inserting entity into {table_name}: {e}")
|
|
137
|
+
raise RuntimeError(f"Authentication failed: {e}") from e
|
|
138
|
+
except HttpResponseError as e:
|
|
139
|
+
logger.error(f"Azure service error inserting entity into {table_name}: {e.message}")
|
|
140
|
+
raise RuntimeError(f"Failed to insert entity: {e.message}") from e
|
|
98
141
|
|
|
99
142
|
def upsert_entity(self, table_name: str, entity: Dict[str, Any]) -> Dict[str, Any]:
|
|
143
|
+
"""Insert or update an entity in a table.
|
|
144
|
+
|
|
145
|
+
Args:
|
|
146
|
+
table_name: Name of the table
|
|
147
|
+
entity: Entity dictionary with PartitionKey and RowKey
|
|
148
|
+
|
|
149
|
+
Returns:
|
|
150
|
+
Dict with etag and timestamp
|
|
151
|
+
|
|
152
|
+
Raises:
|
|
153
|
+
RuntimeError: If authentication or service errors occur
|
|
154
|
+
"""
|
|
100
155
|
client = self._get_client()
|
|
101
156
|
table = client.get_table_client(table_name)
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
|
|
157
|
+
try:
|
|
158
|
+
res = table.upsert_entity(entity=entity, mode="merge")
|
|
159
|
+
logger.info(
|
|
160
|
+
"Upserted entity into %s: PK=%s RK=%s",
|
|
161
|
+
table_name,
|
|
162
|
+
entity.get("PartitionKey"),
|
|
163
|
+
entity.get("RowKey"),
|
|
164
|
+
)
|
|
165
|
+
return {"etag": getattr(res, "etag", None), "ts": _now_iso()}
|
|
166
|
+
except ClientAuthenticationError as e:
|
|
167
|
+
logger.error(f"Authentication failed upserting entity into {table_name}: {e}")
|
|
168
|
+
raise RuntimeError(f"Authentication failed: {e}") from e
|
|
169
|
+
except HttpResponseError as e:
|
|
170
|
+
logger.error(f"Azure service error upserting entity into {table_name}: {e.message}")
|
|
171
|
+
raise RuntimeError(f"Failed to upsert entity: {e.message}") from e
|
|
110
172
|
|
|
111
173
|
def delete_entity(self, table_name: str, partition_key: str, row_key: str) -> bool:
|
|
174
|
+
"""Delete an entity from a table.
|
|
175
|
+
|
|
176
|
+
Args:
|
|
177
|
+
table_name: Name of the table
|
|
178
|
+
partition_key: Partition key of the entity
|
|
179
|
+
row_key: Row key of the entity
|
|
180
|
+
|
|
181
|
+
Returns:
|
|
182
|
+
True if deleted successfully or entity doesn't exist, False on other errors
|
|
183
|
+
|
|
184
|
+
Note:
|
|
185
|
+
Azure Tables delete_entity doesn't fail if entity doesn't exist
|
|
186
|
+
"""
|
|
112
187
|
client = self._get_client()
|
|
113
188
|
table = client.get_table_client(table_name)
|
|
114
189
|
try:
|
|
115
190
|
table.delete_entity(partition_key=partition_key, row_key=row_key)
|
|
116
191
|
logger.info("Deleted entity in %s (%s/%s)", table_name, partition_key, row_key)
|
|
117
192
|
return True
|
|
193
|
+
except ResourceNotFoundError:
|
|
194
|
+
# Entity already deleted or doesn't exist - this is still success
|
|
195
|
+
logger.info(
|
|
196
|
+
f"Entity in {table_name} ({partition_key}/{row_key}) already deleted or doesn't exist"
|
|
197
|
+
)
|
|
198
|
+
return True
|
|
199
|
+
except ClientAuthenticationError as exc:
|
|
200
|
+
logger.error("Authentication failed deleting entity in %s: %s", table_name, exc)
|
|
201
|
+
return False
|
|
202
|
+
except HttpResponseError as exc:
|
|
203
|
+
logger.error("Azure service error deleting entity in %s: %s", table_name, exc.message)
|
|
204
|
+
return False
|
|
118
205
|
except Exception as exc:
|
|
119
|
-
logger.error("
|
|
206
|
+
logger.error("Unexpected error deleting entity in %s: %s", table_name, exc)
|
|
120
207
|
return False
|
|
121
208
|
|
|
122
209
|
def get_entity(
|
|
@@ -130,7 +217,7 @@ class AzureTableService:
|
|
|
130
217
|
row_key: Row key of the entity
|
|
131
218
|
|
|
132
219
|
Returns:
|
|
133
|
-
Entity dict if found, None otherwise
|
|
220
|
+
Entity dict if found, None otherwise (including on auth/service errors)
|
|
134
221
|
"""
|
|
135
222
|
client = self._get_client()
|
|
136
223
|
table = client.get_table_client(table_name)
|
|
@@ -138,11 +225,20 @@ class AzureTableService:
|
|
|
138
225
|
entity = table.get_entity(partition_key=partition_key, row_key=row_key)
|
|
139
226
|
logger.info("Retrieved entity from %s: PK=%s RK=%s", table_name, partition_key, row_key)
|
|
140
227
|
return dict(entity)
|
|
141
|
-
except
|
|
142
|
-
logger.
|
|
143
|
-
|
|
228
|
+
except ResourceNotFoundError:
|
|
229
|
+
logger.info("Entity not found in %s (%s/%s)", table_name, partition_key, row_key)
|
|
230
|
+
return None
|
|
231
|
+
except ClientAuthenticationError as exc:
|
|
232
|
+
logger.error("Authentication failed retrieving entity from %s: %s", table_name, exc)
|
|
233
|
+
return None
|
|
234
|
+
except HttpResponseError as exc:
|
|
235
|
+
logger.error(
|
|
236
|
+
"Azure service error retrieving entity from %s: %s", table_name, exc.message
|
|
144
237
|
)
|
|
145
238
|
return None
|
|
239
|
+
except Exception as exc:
|
|
240
|
+
logger.error("Unexpected error retrieving entity from %s: %s", table_name, exc)
|
|
241
|
+
return None
|
|
146
242
|
|
|
147
243
|
def entity_exists(self, table_name: str, partition_key: str, row_key: str) -> bool:
|
|
148
244
|
"""Check if an entity exists without retrieving it.
|
|
@@ -0,0 +1,131 @@
|
|
|
1
|
+
Metadata-Version: 2.4
|
|
2
|
+
Name: srx-lib-azure
|
|
3
|
+
Version: 0.2.0
|
|
4
|
+
Summary: Azure helpers for SRX services: Blob, Email, Table, Document Intelligence
|
|
5
|
+
Author-email: SRX <dev@srx.id>
|
|
6
|
+
Requires-Python: >=3.12
|
|
7
|
+
Requires-Dist: azure-ai-documentintelligence>=1.0.0
|
|
8
|
+
Requires-Dist: azure-communication-email>=1.0.0
|
|
9
|
+
Requires-Dist: azure-data-tables>=12.7.0
|
|
10
|
+
Requires-Dist: azure-storage-blob>=12.22.0
|
|
11
|
+
Requires-Dist: loguru>=0.7.2
|
|
12
|
+
Provides-Extra: all
|
|
13
|
+
Requires-Dist: azure-ai-documentintelligence>=1.0.0; extra == 'all'
|
|
14
|
+
Provides-Extra: document
|
|
15
|
+
Requires-Dist: azure-ai-documentintelligence>=1.0.0; extra == 'document'
|
|
16
|
+
Description-Content-Type: text/markdown
|
|
17
|
+
|
|
18
|
+
# srx-lib-azure
|
|
19
|
+
|
|
20
|
+
Lightweight wrappers over Azure SDKs used across SRX services.
|
|
21
|
+
|
|
22
|
+
What it includes:
|
|
23
|
+
- **Blob**: upload/download helpers, SAS URL generation
|
|
24
|
+
- **Email** (Azure Communication Services): simple async sender
|
|
25
|
+
- **Table**: simple CRUD helpers
|
|
26
|
+
- **Document Intelligence** (OCR): document analysis from URLs or bytes
|
|
27
|
+
|
|
28
|
+
## Install
|
|
29
|
+
|
|
30
|
+
PyPI (public):
|
|
31
|
+
|
|
32
|
+
- `pip install srx-lib-azure`
|
|
33
|
+
|
|
34
|
+
uv (pyproject):
|
|
35
|
+
```
|
|
36
|
+
[project]
|
|
37
|
+
dependencies = ["srx-lib-azure>=0.1.0"]
|
|
38
|
+
```
|
|
39
|
+
|
|
40
|
+
## Usage
|
|
41
|
+
|
|
42
|
+
Blob:
|
|
43
|
+
```
|
|
44
|
+
from srx_lib_azure.blob import AzureBlobService
|
|
45
|
+
blob = AzureBlobService()
|
|
46
|
+
url = await blob.upload_file(upload_file, "documents/report.pdf")
|
|
47
|
+
```
|
|
48
|
+
|
|
49
|
+
Email:
|
|
50
|
+
```
|
|
51
|
+
from srx_lib_azure.email import EmailService
|
|
52
|
+
svc = EmailService()
|
|
53
|
+
await svc.send_notification("user@example.com", "Subject", "Hello", html=False)
|
|
54
|
+
```
|
|
55
|
+
|
|
56
|
+
Table:
|
|
57
|
+
```
|
|
58
|
+
from srx_lib_azure.table import AzureTableService
|
|
59
|
+
store = AzureTableService()
|
|
60
|
+
store.ensure_table("events")
|
|
61
|
+
store.upsert_entity("events", {"PartitionKey":"p","RowKey":"r","EventType":"x"})
|
|
62
|
+
```
|
|
63
|
+
|
|
64
|
+
Document Intelligence (OCR):
|
|
65
|
+
```python
|
|
66
|
+
from srx_lib_azure import AzureDocumentIntelligenceService
|
|
67
|
+
|
|
68
|
+
# Initialize with endpoint and key
|
|
69
|
+
doc_service = AzureDocumentIntelligenceService(
|
|
70
|
+
endpoint="https://your-resource.cognitiveservices.azure.com/",
|
|
71
|
+
key="your-api-key"
|
|
72
|
+
)
|
|
73
|
+
|
|
74
|
+
# Analyze document from URL
|
|
75
|
+
result = await doc_service.analyze_document_from_url(
|
|
76
|
+
url="https://example.com/document.pdf",
|
|
77
|
+
model_id="prebuilt-read" # or "prebuilt-layout", "prebuilt-invoice", etc.
|
|
78
|
+
)
|
|
79
|
+
|
|
80
|
+
# Analyze document from bytes
|
|
81
|
+
with open("document.pdf", "rb") as f:
|
|
82
|
+
content = f.read()
|
|
83
|
+
result = await doc_service.analyze_document_from_bytes(
|
|
84
|
+
file_content=content,
|
|
85
|
+
model_id="prebuilt-read"
|
|
86
|
+
)
|
|
87
|
+
|
|
88
|
+
# Result structure:
|
|
89
|
+
# {
|
|
90
|
+
# "success": True/False,
|
|
91
|
+
# "content": "extracted text...",
|
|
92
|
+
# "pages": [{"page_number": 1, "width": 8.5, ...}, ...],
|
|
93
|
+
# "page_count": 10,
|
|
94
|
+
# "confidence": 0.98,
|
|
95
|
+
# "model_id": "prebuilt-read",
|
|
96
|
+
# "metadata": {...},
|
|
97
|
+
# "error": None # or error message if failed
|
|
98
|
+
# }
|
|
99
|
+
```
|
|
100
|
+
|
|
101
|
+
## Environment Variables
|
|
102
|
+
|
|
103
|
+
- **Blob & Table**: `AZURE_STORAGE_CONNECTION_STRING` (required)
|
|
104
|
+
- **Email (ACS)**: `ACS_CONNECTION_STRING`, `EMAIL_SENDER`
|
|
105
|
+
- **Document Intelligence**: `AZURE_DOCUMENT_INTELLIGENCE_ENDPOINT`, `AZURE_DOCUMENT_INTELLIGENCE_KEY`
|
|
106
|
+
- **Optional**: `AZURE_STORAGE_ACCOUNT_KEY`, `AZURE_BLOB_URL`, `AZURE_SAS_TOKEN`
|
|
107
|
+
|
|
108
|
+
## Optional Dependencies
|
|
109
|
+
|
|
110
|
+
All services are optional and won't break if their dependencies aren't installed:
|
|
111
|
+
|
|
112
|
+
```bash
|
|
113
|
+
# Base installation (includes all services by default)
|
|
114
|
+
pip install srx-lib-azure
|
|
115
|
+
|
|
116
|
+
# Or install only what you need - document intelligence is optional
|
|
117
|
+
pip install srx-lib-azure[document] # Adds Document Intelligence support
|
|
118
|
+
|
|
119
|
+
# Install with all optional dependencies
|
|
120
|
+
pip install srx-lib-azure[all]
|
|
121
|
+
```
|
|
122
|
+
|
|
123
|
+
If you import a service without its required Azure SDK, it will log a warning but won't crash.
|
|
124
|
+
|
|
125
|
+
## Release
|
|
126
|
+
|
|
127
|
+
Tag `vX.Y.Z` to publish to GitHub Packages via Actions.
|
|
128
|
+
|
|
129
|
+
## License
|
|
130
|
+
|
|
131
|
+
Proprietary © SRX
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
srx_lib_azure/__init__.py,sha256=I2nQgMpTptWYHMqHfSYYv3cuC5wkeeYpawQ31zVN5mQ,283
|
|
2
|
+
srx_lib_azure/blob.py,sha256=pAOIPAImhIChMCoxQhe79N11vLF24yAlw0R8gcnitvA,12730
|
|
3
|
+
srx_lib_azure/document.py,sha256=gAVIJRRwtDscAYAUKH7XiAqdCSmoZ-TpzivWS12XQXM,10551
|
|
4
|
+
srx_lib_azure/email.py,sha256=qZWZUjoUMocivU-S7Qa4mJV8aj4jtQPfy868wnPgPlA,4837
|
|
5
|
+
srx_lib_azure/table.py,sha256=-RPMlZ2gzXi-6bJSkGFuV5XyIp8-3pdwulI-IEZUs1Y,18607
|
|
6
|
+
srx_lib_azure-0.2.0.dist-info/METADATA,sha256=l0KQ0OTRlwZsDD8Z6lzGiJYTzbfYp5mB5Pg6x7LrUZI,3584
|
|
7
|
+
srx_lib_azure-0.2.0.dist-info/WHEEL,sha256=qtCwoSJWgHk21S1Kb4ihdzI2rlJ1ZKaIurTj_ngOhyQ,87
|
|
8
|
+
srx_lib_azure-0.2.0.dist-info/RECORD,,
|
|
@@ -1,70 +0,0 @@
|
|
|
1
|
-
Metadata-Version: 2.4
|
|
2
|
-
Name: srx-lib-azure
|
|
3
|
-
Version: 0.1.7
|
|
4
|
-
Summary: Azure helpers for SRX services: Blob, Email, Table
|
|
5
|
-
Author-email: SRX <dev@srx.id>
|
|
6
|
-
Requires-Python: >=3.12
|
|
7
|
-
Requires-Dist: azure-communication-email>=1.0.0
|
|
8
|
-
Requires-Dist: azure-data-tables>=12.7.0
|
|
9
|
-
Requires-Dist: azure-storage-blob>=12.22.0
|
|
10
|
-
Requires-Dist: loguru>=0.7.2
|
|
11
|
-
Description-Content-Type: text/markdown
|
|
12
|
-
|
|
13
|
-
# srx-lib-azure
|
|
14
|
-
|
|
15
|
-
Lightweight wrappers over Azure SDKs used across SRX services.
|
|
16
|
-
|
|
17
|
-
What it includes:
|
|
18
|
-
- Blob: upload/download helpers, SAS URL generation
|
|
19
|
-
- Email (Azure Communication Services): simple async sender
|
|
20
|
-
- Table: simple CRUD helpers
|
|
21
|
-
|
|
22
|
-
## Install
|
|
23
|
-
|
|
24
|
-
PyPI (public):
|
|
25
|
-
|
|
26
|
-
- `pip install srx-lib-azure`
|
|
27
|
-
|
|
28
|
-
uv (pyproject):
|
|
29
|
-
```
|
|
30
|
-
[project]
|
|
31
|
-
dependencies = ["srx-lib-azure>=0.1.0"]
|
|
32
|
-
```
|
|
33
|
-
|
|
34
|
-
## Usage
|
|
35
|
-
|
|
36
|
-
Blob:
|
|
37
|
-
```
|
|
38
|
-
from srx_lib_azure.blob import AzureBlobService
|
|
39
|
-
blob = AzureBlobService()
|
|
40
|
-
url = await blob.upload_file(upload_file, "documents/report.pdf")
|
|
41
|
-
```
|
|
42
|
-
|
|
43
|
-
Email:
|
|
44
|
-
```
|
|
45
|
-
from srx_lib_azure.email import EmailService
|
|
46
|
-
svc = EmailService()
|
|
47
|
-
await svc.send_notification("user@example.com", "Subject", "Hello", html=False)
|
|
48
|
-
```
|
|
49
|
-
|
|
50
|
-
Table:
|
|
51
|
-
```
|
|
52
|
-
from srx_lib_azure.table import AzureTableService
|
|
53
|
-
store = AzureTableService()
|
|
54
|
-
store.ensure_table("events")
|
|
55
|
-
store.upsert_entity("events", {"PartitionKey":"p","RowKey":"r","EventType":"x"})
|
|
56
|
-
```
|
|
57
|
-
|
|
58
|
-
## Environment Variables
|
|
59
|
-
|
|
60
|
-
- Blob & Table: `AZURE_STORAGE_CONNECTION_STRING` (required)
|
|
61
|
-
- Email (ACS): `ACS_CONNECTION_STRING`, `EMAIL_SENDER`
|
|
62
|
-
- Optional: `AZURE_STORAGE_ACCOUNT_KEY`, `AZURE_BLOB_URL`, `AZURE_SAS_TOKEN`
|
|
63
|
-
|
|
64
|
-
## Release
|
|
65
|
-
|
|
66
|
-
Tag `vX.Y.Z` to publish to GitHub Packages via Actions.
|
|
67
|
-
|
|
68
|
-
## License
|
|
69
|
-
|
|
70
|
-
Proprietary © SRX
|
|
@@ -1,7 +0,0 @@
|
|
|
1
|
-
srx_lib_azure/__init__.py,sha256=K0UCmkKw7HWJMshp6Xv3SxD4y26r7bdcPtb_2aRc2rs,174
|
|
2
|
-
srx_lib_azure/blob.py,sha256=3g5r3cOOdTAN283PBEU__p5gLYQ97LE_KEeNc2mVnLg,8889
|
|
3
|
-
srx_lib_azure/email.py,sha256=2J5zlgJMhx7pMINwN4kW23PmdwL1JyU9xFsSl5gAAM4,2831
|
|
4
|
-
srx_lib_azure/table.py,sha256=0qb1t84wEkpif3t1KybasZYffgTGQQ5ULfjfk2mjy54,14262
|
|
5
|
-
srx_lib_azure-0.1.7.dist-info/METADATA,sha256=bjyMw1i1lMXVw7Q6cbv_yYz9snHpH6pckSPTFR_JZyQ,1600
|
|
6
|
-
srx_lib_azure-0.1.7.dist-info/WHEEL,sha256=qtCwoSJWgHk21S1Kb4ihdzI2rlJ1ZKaIurTj_ngOhyQ,87
|
|
7
|
-
srx_lib_azure-0.1.7.dist-info/RECORD,,
|
|
File without changes
|