2015-11-13 16:47:04 +00:00
|
|
|
/*
|
2016-06-03 00:25:58 +00:00
|
|
|
Copyright 2016 The Kubernetes Authors.
|
2015-11-13 16:47:04 +00:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package azure_file
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"os"
|
2017-07-31 02:38:11 +00:00
|
|
|
"runtime"
|
2015-11-13 16:47:04 +00:00
|
|
|
|
2017-11-30 08:44:35 +00:00
|
|
|
"github.com/golang/glog"
|
2017-06-22 18:24:23 +00:00
|
|
|
"k8s.io/api/core/v1"
|
2017-11-30 08:44:35 +00:00
|
|
|
"k8s.io/apimachinery/pkg/api/resource"
|
2017-01-17 03:38:19 +00:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
2017-01-11 14:09:48 +00:00
|
|
|
"k8s.io/apimachinery/pkg/types"
|
2017-11-30 08:44:35 +00:00
|
|
|
"k8s.io/kubernetes/pkg/cloudprovider"
|
|
|
|
"k8s.io/kubernetes/pkg/cloudprovider/providers/azure"
|
2015-11-13 16:47:04 +00:00
|
|
|
"k8s.io/kubernetes/pkg/util/mount"
|
2016-05-19 01:13:04 +00:00
|
|
|
kstrings "k8s.io/kubernetes/pkg/util/strings"
|
2015-11-13 16:47:04 +00:00
|
|
|
"k8s.io/kubernetes/pkg/volume"
|
2016-12-20 00:40:55 +00:00
|
|
|
"k8s.io/kubernetes/pkg/volume/util"
|
2015-11-13 16:47:04 +00:00
|
|
|
)
|
|
|
|
|
2017-07-17 07:19:26 +00:00
|
|
|
// ProbeVolumePlugins is the primary endpoint for volume plugins
|
2015-11-13 16:47:04 +00:00
|
|
|
func ProbeVolumePlugins() []volume.VolumePlugin {
|
|
|
|
return []volume.VolumePlugin{&azureFilePlugin{nil}}
|
|
|
|
}
|
|
|
|
|
|
|
|
type azureFilePlugin struct {
|
|
|
|
host volume.VolumeHost
|
|
|
|
}
|
|
|
|
|
|
|
|
var _ volume.VolumePlugin = &azureFilePlugin{}
|
|
|
|
var _ volume.PersistentVolumePlugin = &azureFilePlugin{}
|
2017-11-30 08:44:35 +00:00
|
|
|
var _ volume.ExpandableVolumePlugin = &azureFilePlugin{}
|
2015-11-13 16:47:04 +00:00
|
|
|
|
|
|
|
const (
|
|
|
|
azureFilePluginName = "kubernetes.io/azure-file"
|
|
|
|
)
|
|
|
|
|
2016-05-19 01:13:04 +00:00
|
|
|
func getPath(uid types.UID, volName string, host volume.VolumeHost) string {
|
|
|
|
return host.GetPodVolumeDir(uid, kstrings.EscapeQualifiedNameForDisk(azureFilePluginName), volName)
|
|
|
|
}
|
|
|
|
|
2015-11-13 16:47:04 +00:00
|
|
|
func (plugin *azureFilePlugin) Init(host volume.VolumeHost) error {
|
|
|
|
plugin.host = host
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-05-30 22:48:21 +00:00
|
|
|
func (plugin *azureFilePlugin) GetPluginName() string {
|
2015-11-13 16:47:04 +00:00
|
|
|
return azureFilePluginName
|
|
|
|
}
|
|
|
|
|
2016-05-30 22:48:21 +00:00
|
|
|
func (plugin *azureFilePlugin) GetVolumeName(spec *volume.Spec) (string, error) {
|
2017-06-16 15:23:22 +00:00
|
|
|
share, _, err := getVolumeSource(spec)
|
2016-05-30 02:22:22 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
2016-05-30 22:48:21 +00:00
|
|
|
}
|
|
|
|
|
2017-06-16 15:23:22 +00:00
|
|
|
return share, nil
|
2016-05-30 22:48:21 +00:00
|
|
|
}
|
|
|
|
|
2015-11-13 16:47:04 +00:00
|
|
|
func (plugin *azureFilePlugin) CanSupport(spec *volume.Spec) bool {
|
|
|
|
//TODO: check if mount.cifs is there
|
|
|
|
return (spec.PersistentVolume != nil && spec.PersistentVolume.Spec.AzureFile != nil) ||
|
|
|
|
(spec.Volume != nil && spec.Volume.AzureFile != nil)
|
|
|
|
}
|
|
|
|
|
2016-05-30 02:22:22 +00:00
|
|
|
func (plugin *azureFilePlugin) RequiresRemount() bool {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2017-02-21 18:19:48 +00:00
|
|
|
func (plugin *azureFilePlugin) SupportsMountOption() bool {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2017-02-13 04:40:30 +00:00
|
|
|
func (plugin *azureFilePlugin) SupportsBulkVolumeVerification() bool {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2016-11-18 20:58:56 +00:00
|
|
|
func (plugin *azureFilePlugin) GetAccessModes() []v1.PersistentVolumeAccessMode {
|
|
|
|
return []v1.PersistentVolumeAccessMode{
|
|
|
|
v1.ReadWriteOnce,
|
|
|
|
v1.ReadOnlyMany,
|
|
|
|
v1.ReadWriteMany,
|
2015-11-13 16:47:04 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-18 20:58:56 +00:00
|
|
|
func (plugin *azureFilePlugin) NewMounter(spec *volume.Spec, pod *v1.Pod, _ volume.VolumeOptions) (volume.Mounter, error) {
|
2017-08-14 10:16:26 +00:00
|
|
|
return plugin.newMounterInternal(spec, pod, &azureSvc{}, plugin.host.GetMounter(plugin.GetPluginName()))
|
2015-11-13 16:47:04 +00:00
|
|
|
}
|
|
|
|
|
2016-11-18 20:58:56 +00:00
|
|
|
func (plugin *azureFilePlugin) newMounterInternal(spec *volume.Spec, pod *v1.Pod, util azureUtil, mounter mount.Interface) (volume.Mounter, error) {
|
2017-06-16 15:23:22 +00:00
|
|
|
share, readOnly, err := getVolumeSource(spec)
|
2016-05-30 02:22:22 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2015-11-13 16:47:04 +00:00
|
|
|
}
|
2017-06-16 15:23:22 +00:00
|
|
|
secretName, secretNamespace, err := getSecretNameAndNamespace(spec, pod.Namespace)
|
2016-03-23 05:12:21 +00:00
|
|
|
return &azureFileMounter{
|
2015-11-13 16:47:04 +00:00
|
|
|
azureFile: &azureFile{
|
2016-05-19 01:13:04 +00:00
|
|
|
volName: spec.Name(),
|
|
|
|
mounter: mounter,
|
|
|
|
pod: pod,
|
|
|
|
plugin: plugin,
|
|
|
|
MetricsProvider: volume.NewMetricsStatFS(getPath(pod.UID, spec.Name(), plugin.host)),
|
2015-11-13 16:47:04 +00:00
|
|
|
},
|
2017-06-16 15:23:22 +00:00
|
|
|
util: util,
|
|
|
|
secretNamespace: secretNamespace,
|
|
|
|
secretName: secretName,
|
|
|
|
shareName: share,
|
|
|
|
readOnly: readOnly,
|
|
|
|
mountOptions: volume.MountOptionFromSpec(spec),
|
2015-11-13 16:47:04 +00:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2016-03-23 05:12:21 +00:00
|
|
|
func (plugin *azureFilePlugin) NewUnmounter(volName string, podUID types.UID) (volume.Unmounter, error) {
|
2017-08-14 10:16:26 +00:00
|
|
|
return plugin.newUnmounterInternal(volName, podUID, plugin.host.GetMounter(plugin.GetPluginName()))
|
2015-11-13 16:47:04 +00:00
|
|
|
}
|
|
|
|
|
2016-03-23 05:12:21 +00:00
|
|
|
func (plugin *azureFilePlugin) newUnmounterInternal(volName string, podUID types.UID, mounter mount.Interface) (volume.Unmounter, error) {
|
|
|
|
return &azureFileUnmounter{&azureFile{
|
2016-05-19 01:13:04 +00:00
|
|
|
volName: volName,
|
|
|
|
mounter: mounter,
|
2017-01-17 03:38:19 +00:00
|
|
|
pod: &v1.Pod{ObjectMeta: metav1.ObjectMeta{UID: podUID}},
|
2016-05-19 01:13:04 +00:00
|
|
|
plugin: plugin,
|
|
|
|
MetricsProvider: volume.NewMetricsStatFS(getPath(podUID, volName, plugin.host)),
|
2015-11-13 16:47:04 +00:00
|
|
|
}}, nil
|
|
|
|
}
|
|
|
|
|
2017-11-30 08:44:35 +00:00
|
|
|
func (plugin *azureFilePlugin) RequiresFSResize() bool {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (plugin *azureFilePlugin) ExpandVolumeDevice(
|
|
|
|
spec *volume.Spec,
|
|
|
|
newSize resource.Quantity,
|
|
|
|
oldSize resource.Quantity) (resource.Quantity, error) {
|
|
|
|
|
|
|
|
if spec.PersistentVolume != nil || spec.PersistentVolume.Spec.AzureFile == nil {
|
|
|
|
return oldSize, fmt.Errorf("invalid PV spec")
|
|
|
|
}
|
|
|
|
shareName := spec.PersistentVolume.Spec.AzureFile.ShareName
|
|
|
|
azure, err := getAzureCloudProvider(plugin.host.GetCloudProvider())
|
|
|
|
if err != nil {
|
|
|
|
return oldSize, err
|
|
|
|
}
|
|
|
|
|
|
|
|
secretName, secretNamespace, err := getSecretNameAndNamespace(spec, spec.PersistentVolume.Spec.ClaimRef.Namespace)
|
|
|
|
if err != nil {
|
|
|
|
return oldSize, err
|
|
|
|
}
|
|
|
|
|
|
|
|
accountName, accountKey, err := (&azureSvc{}).GetAzureCredentials(plugin.host, secretNamespace, secretName)
|
|
|
|
if err != nil {
|
|
|
|
return oldSize, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := azure.ResizeFileShare(accountName, accountKey, shareName, int(volume.RoundUpToGiB(newSize))); err != nil {
|
|
|
|
return oldSize, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return newSize, nil
|
|
|
|
}
|
|
|
|
|
2016-06-23 19:46:21 +00:00
|
|
|
func (plugin *azureFilePlugin) ConstructVolumeSpec(volName, mountPath string) (*volume.Spec, error) {
|
2016-11-18 20:58:56 +00:00
|
|
|
azureVolume := &v1.Volume{
|
2016-06-23 19:46:21 +00:00
|
|
|
Name: volName,
|
2016-11-18 20:58:56 +00:00
|
|
|
VolumeSource: v1.VolumeSource{
|
|
|
|
AzureFile: &v1.AzureFileVolumeSource{
|
2016-06-23 19:46:21 +00:00
|
|
|
SecretName: volName,
|
|
|
|
ShareName: volName,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return volume.NewSpecFromVolume(azureVolume), nil
|
|
|
|
}
|
|
|
|
|
2015-11-13 16:47:04 +00:00
|
|
|
// azureFile volumes represent mount of an AzureFile share.
|
|
|
|
type azureFile struct {
|
|
|
|
volName string
|
2017-02-22 18:58:34 +00:00
|
|
|
podUID types.UID
|
2016-11-18 20:58:56 +00:00
|
|
|
pod *v1.Pod
|
2015-11-13 16:47:04 +00:00
|
|
|
mounter mount.Interface
|
|
|
|
plugin *azureFilePlugin
|
2016-05-19 01:13:04 +00:00
|
|
|
volume.MetricsProvider
|
2015-11-13 16:47:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (azureFileVolume *azureFile) GetPath() string {
|
2016-05-19 01:13:04 +00:00
|
|
|
return getPath(azureFileVolume.pod.UID, azureFileVolume.volName, azureFileVolume.plugin.host)
|
2015-11-13 16:47:04 +00:00
|
|
|
}
|
|
|
|
|
2016-03-23 05:12:21 +00:00
|
|
|
type azureFileMounter struct {
|
2015-11-13 16:47:04 +00:00
|
|
|
*azureFile
|
2017-06-16 15:23:22 +00:00
|
|
|
util azureUtil
|
|
|
|
secretName string
|
|
|
|
secretNamespace string
|
|
|
|
shareName string
|
|
|
|
readOnly bool
|
|
|
|
mountOptions []string
|
2015-11-13 16:47:04 +00:00
|
|
|
}
|
|
|
|
|
2016-03-23 05:12:21 +00:00
|
|
|
var _ volume.Mounter = &azureFileMounter{}
|
2015-11-13 16:47:04 +00:00
|
|
|
|
2016-03-23 05:12:21 +00:00
|
|
|
func (b *azureFileMounter) GetAttributes() volume.Attributes {
|
2015-11-13 16:47:04 +00:00
|
|
|
return volume.Attributes{
|
|
|
|
ReadOnly: b.readOnly,
|
|
|
|
Managed: !b.readOnly,
|
|
|
|
SupportsSELinux: false,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-03 19:15:52 +00:00
|
|
|
// Checks prior to mount operations to verify that the required components (binaries, etc.)
|
|
|
|
// to mount the volume are available on the underlying node.
|
|
|
|
// If not, it returns an error
|
|
|
|
func (b *azureFileMounter) CanMount() error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-11-13 16:47:04 +00:00
|
|
|
// SetUp attaches the disk and bind mounts to the volume path.
|
2017-06-21 07:13:36 +00:00
|
|
|
func (b *azureFileMounter) SetUp(fsGroup *int64) error {
|
2015-11-13 16:47:04 +00:00
|
|
|
return b.SetUpAt(b.GetPath(), fsGroup)
|
|
|
|
}
|
|
|
|
|
2017-06-21 07:13:36 +00:00
|
|
|
func (b *azureFileMounter) SetUpAt(dir string, fsGroup *int64) error {
|
2015-11-13 16:47:04 +00:00
|
|
|
notMnt, err := b.mounter.IsLikelyNotMountPoint(dir)
|
|
|
|
glog.V(4).Infof("AzureFile mount set up: %s %v %v", dir, !notMnt, err)
|
|
|
|
if err != nil && !os.IsNotExist(err) {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if !notMnt {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
var accountKey, accountName string
|
2017-06-16 15:23:22 +00:00
|
|
|
if accountName, accountKey, err = b.util.GetAzureCredentials(b.plugin.host, b.secretNamespace, b.secretName); err != nil {
|
2015-11-13 16:47:04 +00:00
|
|
|
return err
|
|
|
|
}
|
2017-07-04 08:20:10 +00:00
|
|
|
|
2017-07-31 02:38:11 +00:00
|
|
|
mountOptions := []string{}
|
|
|
|
source := ""
|
|
|
|
osSeparator := string(os.PathSeparator)
|
|
|
|
source = fmt.Sprintf("%s%s%s.file.%s%s%s", osSeparator, osSeparator, accountName, getStorageEndpointSuffix(b.plugin.host.GetCloudProvider()), osSeparator, b.shareName)
|
|
|
|
|
|
|
|
if runtime.GOOS == "windows" {
|
2017-09-14 03:38:08 +00:00
|
|
|
mountOptions = []string{fmt.Sprintf("AZURE\\%s", accountName), accountKey}
|
2017-07-31 02:38:11 +00:00
|
|
|
} else {
|
|
|
|
os.MkdirAll(dir, 0700)
|
|
|
|
// parameters suggested by https://azure.microsoft.com/en-us/documentation/articles/storage-how-to-use-files-linux/
|
2017-11-16 07:12:05 +00:00
|
|
|
options := []string{fmt.Sprintf("username=%s,password=%s", accountName, accountKey)}
|
2017-07-31 02:38:11 +00:00
|
|
|
if b.readOnly {
|
|
|
|
options = append(options, "ro")
|
|
|
|
}
|
|
|
|
mountOptions = volume.JoinMountOptions(b.mountOptions, options)
|
2018-01-16 03:38:14 +00:00
|
|
|
mountOptions = appendDefaultMountOptions(mountOptions, fsGroup)
|
2015-11-13 16:47:04 +00:00
|
|
|
}
|
2017-07-31 02:38:11 +00:00
|
|
|
|
2017-02-21 18:19:48 +00:00
|
|
|
err = b.mounter.Mount(source, dir, "cifs", mountOptions)
|
2015-11-13 16:47:04 +00:00
|
|
|
if err != nil {
|
|
|
|
notMnt, mntErr := b.mounter.IsLikelyNotMountPoint(dir)
|
|
|
|
if mntErr != nil {
|
|
|
|
glog.Errorf("IsLikelyNotMountPoint check failed: %v", mntErr)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if !notMnt {
|
|
|
|
if mntErr = b.mounter.Unmount(dir); mntErr != nil {
|
|
|
|
glog.Errorf("Failed to unmount: %v", mntErr)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
notMnt, mntErr := b.mounter.IsLikelyNotMountPoint(dir)
|
|
|
|
if mntErr != nil {
|
|
|
|
glog.Errorf("IsLikelyNotMountPoint check failed: %v", mntErr)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if !notMnt {
|
|
|
|
// This is very odd, we don't expect it. We'll try again next sync loop.
|
|
|
|
glog.Errorf("%s is still mounted, despite call to unmount(). Will try again next sync loop.", dir)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
os.Remove(dir)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-03-23 05:12:21 +00:00
|
|
|
var _ volume.Unmounter = &azureFileUnmounter{}
|
2015-11-13 16:47:04 +00:00
|
|
|
|
2016-03-23 05:12:21 +00:00
|
|
|
type azureFileUnmounter struct {
|
2015-11-13 16:47:04 +00:00
|
|
|
*azureFile
|
|
|
|
}
|
|
|
|
|
2016-03-23 05:12:21 +00:00
|
|
|
func (c *azureFileUnmounter) TearDown() error {
|
2015-11-13 16:47:04 +00:00
|
|
|
return c.TearDownAt(c.GetPath())
|
|
|
|
}
|
|
|
|
|
2016-03-23 05:12:21 +00:00
|
|
|
func (c *azureFileUnmounter) TearDownAt(dir string) error {
|
2016-12-20 00:40:55 +00:00
|
|
|
return util.UnmountPath(dir, c.mounter)
|
2015-11-13 16:47:04 +00:00
|
|
|
}
|
2016-05-30 22:48:21 +00:00
|
|
|
|
2017-06-16 15:23:22 +00:00
|
|
|
func getVolumeSource(spec *volume.Spec) (string, bool, error) {
|
2016-05-30 22:48:21 +00:00
|
|
|
if spec.Volume != nil && spec.Volume.AzureFile != nil {
|
2017-06-16 15:23:22 +00:00
|
|
|
share := spec.Volume.AzureFile.ShareName
|
|
|
|
readOnly := spec.Volume.AzureFile.ReadOnly
|
|
|
|
return share, readOnly, nil
|
2016-05-30 02:22:22 +00:00
|
|
|
} else if spec.PersistentVolume != nil &&
|
|
|
|
spec.PersistentVolume.Spec.AzureFile != nil {
|
2017-06-16 15:23:22 +00:00
|
|
|
share := spec.PersistentVolume.Spec.AzureFile.ShareName
|
|
|
|
readOnly := spec.ReadOnly
|
|
|
|
return share, readOnly, nil
|
|
|
|
}
|
|
|
|
return "", false, fmt.Errorf("Spec does not reference an AzureFile volume type")
|
|
|
|
}
|
|
|
|
|
|
|
|
func getSecretNameAndNamespace(spec *volume.Spec, defaultNamespace string) (string, string, error) {
|
|
|
|
secretName := ""
|
|
|
|
secretNamespace := ""
|
|
|
|
if spec.Volume != nil && spec.Volume.AzureFile != nil {
|
|
|
|
secretName = spec.Volume.AzureFile.SecretName
|
|
|
|
secretNamespace = defaultNamespace
|
|
|
|
|
|
|
|
} else if spec.PersistentVolume != nil &&
|
|
|
|
spec.PersistentVolume.Spec.AzureFile != nil {
|
|
|
|
secretNamespace = defaultNamespace
|
|
|
|
if spec.PersistentVolume.Spec.AzureFile.SecretNamespace != nil {
|
|
|
|
secretNamespace = *spec.PersistentVolume.Spec.AzureFile.SecretNamespace
|
|
|
|
}
|
|
|
|
secretName = spec.PersistentVolume.Spec.AzureFile.SecretName
|
|
|
|
} else {
|
|
|
|
return "", "", fmt.Errorf("Spec does not reference an AzureFile volume type")
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(secretNamespace) == 0 {
|
|
|
|
return "", "", fmt.Errorf("invalid Azure volume: nil namespace")
|
2016-05-30 22:48:21 +00:00
|
|
|
}
|
2017-06-16 15:23:22 +00:00
|
|
|
return secretName, secretNamespace, nil
|
2016-05-30 22:48:21 +00:00
|
|
|
|
|
|
|
}
|
2017-07-04 08:20:10 +00:00
|
|
|
|
|
|
|
func getAzureCloud(cloudProvider cloudprovider.Interface) (*azure.Cloud, error) {
|
|
|
|
azure, ok := cloudProvider.(*azure.Cloud)
|
|
|
|
if !ok || azure == nil {
|
|
|
|
return nil, fmt.Errorf("Failed to get Azure Cloud Provider. GetCloudProvider returned %v instead", cloudProvider)
|
|
|
|
}
|
|
|
|
|
|
|
|
return azure, nil
|
|
|
|
}
|
2017-07-17 07:05:03 +00:00
|
|
|
|
|
|
|
func getStorageEndpointSuffix(cloudprovider cloudprovider.Interface) string {
|
|
|
|
const publicCloudStorageEndpointSuffix = "core.windows.net"
|
|
|
|
azure, err := getAzureCloud(cloudprovider)
|
2017-07-17 11:41:06 +00:00
|
|
|
if err != nil {
|
2017-07-17 07:05:03 +00:00
|
|
|
glog.Warningf("No Azure cloud provider found. Using the Azure public cloud endpoint: %s", publicCloudStorageEndpointSuffix)
|
|
|
|
return publicCloudStorageEndpointSuffix
|
|
|
|
}
|
|
|
|
return azure.Environment.StorageEndpointSuffix
|
|
|
|
}
|