Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add file Tags for AzureBlob FileStorage provider. #15662

Open
mariojsnunes opened this issue Apr 5, 2024 · 4 comments
Open

Add file Tags for AzureBlob FileStorage provider. #15662

mariojsnunes opened this issue Apr 5, 2024 · 4 comments

Comments

@mariojsnunes
Copy link
Contributor

Is your feature request related to a problem? Please describe.

The practical use case is to access Azure Blob Storage Malware scanning results.
https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-malware-scan

Describe the solution you'd like

For now I'd like to just understand if this feature would make sense for OrchardCore, of if I should go ahead with a custom implementation.

@sebastienros
Copy link
Member

Would configuring tags per extension work for you? That could then be defined in a custom section of the options for the Azure storage provider.

@sebastienros sebastienros added this to the 1.x milestone Apr 11, 2024
@mariojsnunes
Copy link
Contributor Author

mariojsnunes commented Apr 12, 2024

Would configuring tags per extension work for you? That could then be defined in a custom section of the options for the Azure storage provider.

Hmm, I'm unsure how that would work. I don't need to configure tags, just to read them.
The method for fetching tags could be an extension method yes. And other methods like set/delete could be added too.

@sebastienros
Copy link
Member

I get where I was confused, the malware service is actually tagging the blobs. So you want to be able to read the tags from a blob? How would that show up in the current interfaces? Or if it's custom to the blob storage implementation, how can it be used by OC? It it's very specific then maybe users can just use the current azure sdk directly.

@mariojsnunes
Copy link
Contributor Author

For my use-case, I'd just want to have a background task where we do something to blobs where malware was found.
If this isn't something useful for OC, using the azure sdk directly is fine, so this can be closed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants