mirror of
https://github.com/ckaczor/azuredatastudio.git
synced 2026-01-25 17:23:10 -05:00
* Merge from vscode 504f934659740e9d41501cad9f162b54d7745ad9 * delete unused folders * distro * Bump build node version * update chokidar * FIx hygiene errors * distro * Fix extension lint issues * Remove strict-vscode * Add copyright header exemptions * Bump vscode-extension-telemetry to fix webpacking issue with zone.js * distro * Fix failing tests (revert marked.js back to current one until we decide to update) * Skip searchmodel test * Fix mac build * temp debug script loading * Try disabling coverage * log error too * Revert "log error too" This reverts commit af0183e5d4ab458fdf44b88fbfab9908d090526f. * Revert "temp debug script loading" This reverts commit 3d687d541c76db2c5b55626c78ae448d3c25089c. * Add comments explaining coverage disabling * Fix ansi_up loading issue * Merge latest from ads * Use newer option * Fix compile * add debug logging warn * Always log stack * log more * undo debug * Update to use correct base path (+cleanup) * distro * fix compile errors * Remove strict-vscode * Fix sql editors not showing * Show db dropdown input & fix styling * Fix more info in gallery * Fix gallery asset requests * Delete unused workflow * Fix tapable resolutions for smoke test compile error * Fix smoke compile * Disable crash reporting * Disable interactive Co-authored-by: ADS Merger <karlb@microsoft.com>
71 lines
2.8 KiB
TypeScript
71 lines
2.8 KiB
TypeScript
/*---------------------------------------------------------------------------------------------
|
|
* Copyright (c) Microsoft Corporation. All rights reserved.
|
|
* Licensed under the Source EULA. See License.txt in the project root for license information.
|
|
*--------------------------------------------------------------------------------------------*/
|
|
|
|
import * as nls from 'vscode-nls';
|
|
import { SqlOpsDataClient } from 'dataprotocol-client';
|
|
import { ClientCapabilities, StaticFeature } from 'vscode-languageclient';
|
|
import { window } from 'vscode';
|
|
import * as contracts from './contracts';
|
|
import * as azdata from 'azdata';
|
|
|
|
const localize = nls.loadMessageBundle();
|
|
|
|
export class AccountFeature implements StaticFeature {
|
|
|
|
constructor(private _client: SqlOpsDataClient) { }
|
|
|
|
fillClientCapabilities(_capabilities: ClientCapabilities): void { }
|
|
|
|
initialize(): void {
|
|
this._client.onRequest(contracts.SecurityTokenRequest.type, async (request): Promise<contracts.RequestSecurityTokenResponse | undefined> => {
|
|
return this.getToken(request);
|
|
});
|
|
}
|
|
|
|
protected async getToken(request: contracts.RequestSecurityTokenParams): Promise<contracts.RequestSecurityTokenResponse | undefined> {
|
|
const accountList = await azdata.accounts.getAllAccounts();
|
|
let account: azdata.Account | undefined;
|
|
|
|
if (accountList.length < 1) {
|
|
// TODO: Prompt user to add account
|
|
window.showErrorMessage(localize('kusto.missingLinkedAzureAccount', "Azure Data Studio needs to contact Azure Key Vault to access a column master key for Always Encrypted, but no linked Azure account is available. Please add a linked Azure account and retry the query."));
|
|
return undefined;
|
|
} else {
|
|
account = accountList.find(a => a.key.accountId === request.accountId);
|
|
}
|
|
|
|
if (!account) {
|
|
window.showErrorMessage(localize('kusto.accountDoesNotExist', "Account does not exist."));
|
|
return undefined;
|
|
}
|
|
|
|
const unauthorizedMessage = localize('kusto.insufficientlyPrivelagedAzureAccount', "The configured Azure account for {0} does not have sufficient permissions for Azure Key Vault to access a column master key for Always Encrypted.", account.key.accountId);
|
|
|
|
let tenantId: string = '';
|
|
if (request.provider !== 'dstsAuth') {
|
|
const tenant = account.properties.tenants.find((t: { [key: string]: string }) => request.authority.includes(t.id));
|
|
if (!tenant) {
|
|
window.showErrorMessage(unauthorizedMessage);
|
|
return undefined;
|
|
}
|
|
tenantId = tenant.id;
|
|
}
|
|
|
|
const securityToken = await azdata.accounts.getAccountSecurityToken(account, tenantId, azdata.AzureResource.Sql);
|
|
|
|
if (!securityToken?.token) {
|
|
window.showErrorMessage(unauthorizedMessage);
|
|
return undefined;
|
|
}
|
|
|
|
let params: contracts.RequestSecurityTokenResponse = {
|
|
accountKey: JSON.stringify(account.key),
|
|
token: securityToken.token
|
|
};
|
|
|
|
return params;
|
|
}
|
|
}
|