Added tests for nats with different authentication methods

This commit is contained in:
Trial97
2021-06-28 17:11:59 +03:00
committed by Dan Christian Bogos
parent 5d90aa85a8
commit dba911b603

View File

@@ -22,7 +22,9 @@ package ers
import (
"fmt"
"os"
"os/exec"
"path"
"reflect"
"runtime"
"testing"
@@ -34,61 +36,54 @@ import (
"github.com/nats-io/nats.go"
)
func TestNatsERJetStream(t *testing.T) {
// start the nats-server
exec.Command("pkill", "nats-server")
cmd := exec.Command("nats-server", "-js")
if err := cmd.Start(); err != nil {
t.Fatal(err) // most probably not installed
}
time.Sleep(50 * time.Millisecond)
defer cmd.Process.Kill()
//
cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(`{
"ers": { // EventReaderService
"enabled": true, // starts the EventReader service: <true|false>
"sessions_conns":["*localhost"],
"readers": [
{
"id": "nats",
"type": "*nats_json_map",
"run_delay": "-1",
"concurrent_requests": 1024,
"source_path": "nats://localhost:4222",
"processed_path": "",
"tenant": "cgrates.org",
"filters": [],
"flags": [],
"fields":[
{"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"},
],
"opts": {
"natsJetStream": true,
"natsSubjectProcessed": "processed_cdrs",
func testCheckNatsData(t *testing.T, randomCGRID, expData string, ch chan *nats.Msg) {
select {
case err := <-rdrErr:
t.Fatal(err)
case ev := <-rdrEvents:
if ev.rdrCfg.ID != "nats" {
t.Fatalf("Expected 'nats' received `%s`", ev.rdrCfg.ID)
}
expected := &utils.CGREvent{
Tenant: "cgrates.org",
ID: ev.cgrEvent.ID,
Time: ev.cgrEvent.Time,
Event: map[string]interface{}{
"CGRID": randomCGRID,
},
APIOpts: map[string]interface{}{},
}
if !reflect.DeepEqual(ev.cgrEvent, expected) {
t.Fatalf("Expected %s ,received %s", utils.ToJSON(expected), utils.ToJSON(ev.cgrEvent))
}
select {
case msg := <-ch:
if expData != string(msg.Data) {
t.Errorf("Expected %q ,received %q", expData, string(msg.Data))
}
},
],
},
}`)
utils.Logger.SetLogLevel(7)
if err != nil {
t.Fatal(err)
}
if err := cfg.CheckConfigSanity(); err != nil {
t.Fatal(err)
case <-time.After(10 * time.Second):
t.Fatal("Timeout2")
}
case <-time.After(10 * time.Second):
t.Fatal("Timeout")
}
}
func testCheckNatsJetStream(t *testing.T, cfg *config.CGRConfig) {
rdrEvents = make(chan *erEvent, 1)
rdrErr = make(chan error, 1)
rdrExit = make(chan struct{}, 1)
var err error
if rdr, err = NewNatsER(cfg, 1, rdrEvents, make(chan *erEvent, 1),
rdrErr, new(engine.FilterS), rdrExit); err != nil {
t.Fatal(err)
}
nc, err := nats.Connect(rdr.Config().SourcePath, nats.Timeout(time.Second),
nats.DrainTimeout(time.Second))
nop, err := engine.GetNatsOpts(rdr.Config().Opts, "testExp", time.Second)
if err != nil {
t.Fatal(err)
}
nc, err := nats.Connect(rdr.Config().SourcePath, nop...)
if err != nil {
t.Fatal(err)
}
@@ -155,40 +150,103 @@ func TestNatsERJetStream(t *testing.T) {
nc.FlushTimeout(time.Second)
nc.Flush()
select {
case err = <-rdrErr:
t.Fatal(err)
case ev := <-rdrEvents:
if ev.rdrCfg.ID != "nats" {
t.Fatalf("Expected 'nats' received `%s`", ev.rdrCfg.ID)
}
expected := &utils.CGREvent{
Tenant: "cgrates.org",
ID: ev.cgrEvent.ID,
Time: ev.cgrEvent.Time,
Event: map[string]interface{}{
"CGRID": randomCGRID,
},
APIOpts: map[string]interface{}{},
}
if !reflect.DeepEqual(ev.cgrEvent, expected) {
t.Fatalf("Expected %s ,received %s", utils.ToJSON(expected), utils.ToJSON(ev.cgrEvent))
}
select {
case msg := <-ch:
if expData != string(msg.Data) {
t.Errorf("Expected %q ,received %q", expData, string(msg.Data))
}
case <-time.After(10 * time.Second):
t.Fatal("Timeout")
}
case <-time.After(10 * time.Second):
t.Fatal("Timeout")
}
testCheckNatsData(t, randomCGRID, expData, ch)
}
close(rdrExit)
}
func testCheckNatsNormal(t *testing.T, cfg *config.CGRConfig) {
rdrEvents = make(chan *erEvent, 1)
rdrErr = make(chan error, 1)
rdrExit = make(chan struct{}, 1)
var err error
if rdr, err = NewNatsER(cfg, 1, rdrEvents, make(chan *erEvent, 1),
rdrErr, new(engine.FilterS), rdrExit); err != nil {
t.Fatal(err)
}
nop, err := engine.GetNatsOpts(rdr.Config().Opts, "testExp", time.Second)
if err != nil {
t.Fatal(err)
}
nc, err := nats.Connect(rdr.Config().SourcePath, nop...)
if err != nil {
t.Fatal(err)
}
ch := make(chan *nats.Msg, 3)
_, err = nc.ChanQueueSubscribe("processed_cdrs", "test3", ch)
if err != nil {
t.Fatal(err)
}
defer nc.Drain()
go rdr.Serve()
runtime.Gosched()
time.Sleep(100 * time.Millisecond)
for i := 0; i < 3; i++ {
randomCGRID := utils.UUIDSha1Prefix()
expData := fmt.Sprintf(`{"CGRID": "%s"}`, randomCGRID)
if err = nc.Publish(utils.DefaultQueueID, []byte(expData)); err != nil {
t.Fatal(err)
}
nc.FlushTimeout(time.Second)
nc.Flush()
testCheckNatsData(t, randomCGRID, expData, ch)
}
close(rdrExit)
}
func TestNatsERJetStream(t *testing.T) {
// start the nats-server
exec.Command("pkill", "nats-server")
cmd := exec.Command("nats-server", "-js")
if err := cmd.Start(); err != nil {
t.Fatal(err) // most probably not installed
}
time.Sleep(50 * time.Millisecond)
defer cmd.Process.Kill()
//
cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(`{
"ers": { // EventReaderService
"enabled": true, // starts the EventReader service: <true|false>
"sessions_conns":["*localhost"],
"readers": [
{
"id": "nats",
"type": "*nats_json_map",
"run_delay": "-1",
"concurrent_requests": 1024,
"source_path": "nats://localhost:4222",
"processed_path": "",
"tenant": "cgrates.org",
"filters": [],
"flags": [],
"fields":[
{"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"},
],
"opts": {
"natsJetStream": true,
"natsJetStreamProcessed": true,
"natsSubjectProcessed": "processed_cdrs",
}
},
],
},
}`)
if err != nil {
t.Fatal(err)
}
if err := cfg.CheckConfigSanity(); err != nil {
t.Fatal(err)
}
testCheckNatsJetStream(t, cfg)
}
func TestNatsER(t *testing.T) {
// start the nats-server
exec.Command("pkill", "nats-server")
@@ -197,7 +255,7 @@ func TestNatsER(t *testing.T) {
if err := cmd.Start(); err != nil {
t.Fatal(err) // most probably not installed
}
time.Sleep(10 * time.Millisecond)
time.Sleep(50 * time.Millisecond)
defer cmd.Process.Kill()
//
@@ -232,69 +290,503 @@ func TestNatsER(t *testing.T) {
if err := cfg.CheckConfigSanity(); err != nil {
t.Fatal(err)
}
rdrEvents = make(chan *erEvent, 1)
rdrErr = make(chan error, 1)
rdrExit = make(chan struct{}, 1)
if rdr, err = NewNatsER(cfg, 1, rdrEvents, make(chan *erEvent, 1),
rdrErr, new(engine.FilterS), rdrExit); err != nil {
t.Fatal(err)
}
nc, err := nats.Connect(rdr.Config().SourcePath, nats.Timeout(time.Second),
nats.DrainTimeout(time.Second))
if err != nil {
t.Fatal(err)
}
ch := make(chan *nats.Msg, 3)
_, err = nc.ChanQueueSubscribe("processed_cdrs", "test3", ch)
if err != nil {
t.Fatal(err)
}
defer nc.Drain()
go rdr.Serve()
runtime.Gosched()
time.Sleep(100 * time.Millisecond)
for i := 0; i < 3; i++ {
randomCGRID := utils.UUIDSha1Prefix()
expData := fmt.Sprintf(`{"CGRID": "%s"}`, randomCGRID)
if err = nc.Publish(utils.DefaultQueueID, []byte(expData)); err != nil {
t.Fatal(err)
}
nc.FlushTimeout(time.Second)
nc.Flush()
select {
case err = <-rdrErr:
t.Fatal(err)
case ev := <-rdrEvents:
if ev.rdrCfg.ID != "nats" {
t.Fatalf("Expected 'nats' received `%s`", ev.rdrCfg.ID)
}
expected := &utils.CGREvent{
Tenant: "cgrates.org",
ID: ev.cgrEvent.ID,
Time: ev.cgrEvent.Time,
Event: map[string]interface{}{
"CGRID": randomCGRID,
},
APIOpts: map[string]interface{}{},
}
if !reflect.DeepEqual(ev.cgrEvent, expected) {
t.Fatalf("Expected %s ,received %s", utils.ToJSON(expected), utils.ToJSON(ev.cgrEvent))
}
select {
case msg := <-ch:
if expData != string(msg.Data) {
t.Errorf("Expected %q ,received %q", expData, string(msg.Data))
}
case <-time.After(10 * time.Second):
t.Fatal("Timeout")
}
case <-time.After(10 * time.Second):
t.Fatal("Timeout")
}
}
close(rdrExit)
testCheckNatsNormal(t, cfg)
}
func TestNatsERJetStreamUser(t *testing.T) {
// start the nats-server
exec.Command("pkill", "nats-server")
cmd := exec.Command("nats-server", "-js", "--user", "user", "--pass", "password")
if err := cmd.Start(); err != nil {
t.Fatal(err) // most probably not installed
}
time.Sleep(50 * time.Millisecond)
defer cmd.Process.Kill()
//
cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(`{
"ers": { // EventReaderService
"enabled": true, // starts the EventReader service: <true|false>
"sessions_conns":["*localhost"],
"readers": [
{
"id": "nats",
"type": "*nats_json_map",
"run_delay": "-1",
"concurrent_requests": 1024,
"source_path": "nats://user:password@localhost:4222",
"processed_path": "",
"tenant": "cgrates.org",
"filters": [],
"flags": [],
"fields":[
{"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"},
],
"opts": {
"natsJetStream": true,
"natsJetStreamProcessed": true,
"natsSubjectProcessed": "processed_cdrs",
}
},
],
},
}`)
if err != nil {
t.Fatal(err)
}
if err := cfg.CheckConfigSanity(); err != nil {
t.Fatal(err)
}
testCheckNatsJetStream(t, cfg)
}
func TestNatsERUser(t *testing.T) {
// start the nats-server
exec.Command("pkill", "nats-server")
cmd := exec.Command("nats-server", "--user", "user", "--pass", "password")
if err := cmd.Start(); err != nil {
t.Fatal(err) // most probably not installed
}
time.Sleep(50 * time.Millisecond)
defer cmd.Process.Kill()
//
cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(`{
"ers": { // EventReaderService
"enabled": true, // starts the EventReader service: <true|false>
"sessions_conns":["*localhost"],
"readers": [
{
"id": "nats",
"type": "*nats_json_map",
"run_delay": "-1",
"concurrent_requests": 1024,
"source_path": "nats://user:password@localhost:4222",
"processed_path": "",
"tenant": "cgrates.org",
"filters": [],
"flags": [],
"fields":[
{"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"},
],
"opts": {
"natsSubjectProcessed": "processed_cdrs",
}
},
],
},
}`)
if err != nil {
t.Fatal(err)
}
if err := cfg.CheckConfigSanity(); err != nil {
t.Fatal(err)
}
testCheckNatsNormal(t, cfg)
}
func TestNatsERJetStreamToken(t *testing.T) {
// start the nats-server
exec.Command("pkill", "nats-server")
cmd := exec.Command("nats-server", "-js", "--auth", "token")
if err := cmd.Start(); err != nil {
t.Fatal(err) // most probably not installed
}
time.Sleep(50 * time.Millisecond)
defer cmd.Process.Kill()
//
cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(`{
"ers": { // EventReaderService
"enabled": true, // starts the EventReader service: <true|false>
"sessions_conns":["*localhost"],
"readers": [
{
"id": "nats",
"type": "*nats_json_map",
"run_delay": "-1",
"concurrent_requests": 1024,
"source_path": "nats://token@localhost:4222",
"processed_path": "",
"tenant": "cgrates.org",
"filters": [],
"flags": [],
"fields":[
{"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"},
],
"opts": {
"natsJetStream": true,
"natsJetStreamProcessed": true,
"natsSubjectProcessed": "processed_cdrs",
}
},
],
},
}`)
if err != nil {
t.Fatal(err)
}
if err := cfg.CheckConfigSanity(); err != nil {
t.Fatal(err)
}
testCheckNatsJetStream(t, cfg)
}
func TestNatsERToken(t *testing.T) {
// start the nats-server
exec.Command("pkill", "nats-server")
cmd := exec.Command("nats-server", "--auth", "token")
if err := cmd.Start(); err != nil {
t.Fatal(err) // most probably not installed
}
time.Sleep(50 * time.Millisecond)
defer cmd.Process.Kill()
//
cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(`{
"ers": { // EventReaderService
"enabled": true, // starts the EventReader service: <true|false>
"sessions_conns":["*localhost"],
"readers": [
{
"id": "nats",
"type": "*nats_json_map",
"run_delay": "-1",
"concurrent_requests": 1024,
"source_path": "nats://token@localhost:4222",
"processed_path": "",
"tenant": "cgrates.org",
"filters": [],
"flags": [],
"fields":[
{"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"},
],
"opts": {
"natsSubjectProcessed": "processed_cdrs",
}
},
],
},
}`)
if err != nil {
t.Fatal(err)
}
if err := cfg.CheckConfigSanity(); err != nil {
t.Fatal(err)
}
testCheckNatsNormal(t, cfg)
}
func TestNatsERNkey(t *testing.T) {
// prepare
basePath := "/tmp/nkey"
if err := os.MkdirAll(basePath, 0755); err != nil {
t.Fatal(err)
}
defer os.RemoveAll(basePath)
seedFilePath := path.Join(basePath, "seed.txt")
if err := os.WriteFile(seedFilePath, []byte("SUAOUIE5CU47NCO22GHFEZXGCRCJDVTHDLMIP4L7UQNCR5SW4FZICI7O3Q"), 0664); err != nil {
t.Fatal(err)
}
natsCfgPath := path.Join(basePath, "nats.cfg")
if err := os.WriteFile(natsCfgPath, []byte(`authorization: {
users: [
{ nkey: UBSNABLSM4Y2KY4ZFWPDOB4NVNYCGVD5YB7ROC4EGSDR7Z7V57PXAIQY }
]
}
`), 0664); err != nil {
t.Fatal(err)
}
// start the nats-server
exec.Command("pkill", "nats-server")
cmd := exec.Command("nats-server", "-c", natsCfgPath)
if err := cmd.Start(); err != nil {
t.Fatal(err) // most probably not installed
}
time.Sleep(50 * time.Millisecond)
defer cmd.Process.Kill()
//
cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(fmt.Sprintf(`{
"ers": { // EventReaderService
"enabled": true, // starts the EventReader service: <true|false>
"sessions_conns":["*localhost"],
"readers": [
{
"id": "nats",
"type": "*nats_json_map",
"run_delay": "-1",
"concurrent_requests": 1024,
"source_path": "nats://localhost:4222",
"processed_path": "",
"tenant": "cgrates.org",
"filters": [],
"flags": [],
"fields":[
{"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"},
],
"opts": {
"natsSubjectProcessed": "processed_cdrs",
"natsSeedFile": %q,
"natsSeedFileProcessed": %q,
}
},
],
},
}`, seedFilePath, seedFilePath))
if err != nil {
t.Fatal(err)
}
if err := cfg.CheckConfigSanity(); err != nil {
t.Fatal(err)
}
testCheckNatsNormal(t, cfg)
}
func TestNatsERJetStreamNKey(t *testing.T) {
// prepare
basePath := "/tmp/nkey"
if err := os.MkdirAll(basePath, 0755); err != nil {
t.Fatal(err)
}
defer os.RemoveAll(basePath)
seedFilePath := path.Join(basePath, "seed.txt")
if err := os.WriteFile(seedFilePath, []byte("SUAOUIE5CU47NCO22GHFEZXGCRCJDVTHDLMIP4L7UQNCR5SW4FZICI7O3Q"), 0664); err != nil {
t.Fatal(err)
}
natsCfgPath := path.Join(basePath, "nats.cfg")
if err := os.WriteFile(natsCfgPath, []byte(`authorization: {
users: [
{ nkey: UBSNABLSM4Y2KY4ZFWPDOB4NVNYCGVD5YB7ROC4EGSDR7Z7V57PXAIQY }
]
}
`), 0664); err != nil {
t.Fatal(err)
}
// start the nats-server
exec.Command("pkill", "nats-server")
cmd := exec.Command("nats-server", "-c", natsCfgPath, "-js")
if err := cmd.Start(); err != nil {
t.Fatal(err) // most probably not installed
}
time.Sleep(50 * time.Millisecond)
defer cmd.Process.Kill()
//
cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(fmt.Sprintf(`{
"ers": { // EventReaderService
"enabled": true, // starts the EventReader service: <true|false>
"sessions_conns":["*localhost"],
"readers": [
{
"id": "nats",
"type": "*nats_json_map",
"run_delay": "-1",
"concurrent_requests": 1024,
"source_path": "nats://localhost:4222",
"processed_path": "",
"tenant": "cgrates.org",
"filters": [],
"flags": [],
"fields":[
{"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"},
],
"opts": {
"natsJetStream": true,
"natsSeedFile": %q,
"natsJetStreamProcessed": true,
"natsSubjectProcessed": "processed_cdrs",
"natsSeedFileProcessed": %q,
}
},
],
},
}`, seedFilePath, seedFilePath))
if err != nil {
t.Fatal(err)
}
if err := cfg.CheckConfigSanity(); err != nil {
t.Fatal(err)
}
testCheckNatsJetStream(t, cfg)
}
func TestNatsERJWT(t *testing.T) {
// prepare
basePath := "/tmp/nkey"
if err := os.MkdirAll(basePath, 0755); err != nil {
t.Fatal(err)
}
defer os.RemoveAll(basePath)
seedFilePath := path.Join(basePath, "jwt.txt")
if err := os.WriteFile(seedFilePath, []byte(`-----BEGIN NATS USER JWT-----
eyJ0eXAiOiJKV1QiLCJhbGciOiJlZDI1NTE5LW5rZXkifQ.eyJqdGkiOiJETFRGNFpLVVdNNFRPRkVNQko0UEUzTVFFVlhIUkJJN0xZNDdZNEMzNTNMWlJKSU5CUkJRIiwiaWF0IjoxNjI0ODg1NzMwLCJpc3MiOiJBQVlKRFZMWkdXTjdZM0ZCUENWWENSVlFaREZNWUdIVTRZWExHU1hYN1UyNTRLSDVTQzNSNVFLTSIsIm5hbWUiOiJ1c2VyIiwic3ViIjoiVUQzQkdXSUJQVTNDV0w0SE9VVTRWSkVRV1RVQVNBRUc2T0ozWEhNM0VFSk5BMlBBM1VWTllUWk4iLCJuYXRzIjp7InB1YiI6e30sInN1YiI6e30sInN1YnMiOi0xLCJkYXRhIjotMSwicGF5bG9hZCI6LTEsInR5cGUiOiJ1c2VyIiwidmVyc2lvbiI6Mn19.YmFL5nRMkEOXe77sQJPPRv_vwi89tzhVVl0AVjE4sXWyoWIHiCepNw28DbpJ0p_MlT8Qf0SY2cjAhIm-Qi7lDw
------END NATS USER JWT------
************************* IMPORTANT *************************
NKEY Seed printed below can be used to sign and prove identity.
NKEYs are sensitive and should be treated as secrets.
-----BEGIN USER NKEY SEED-----
SUADIH32XQYWC2MI2YGM4AUQ3NMKZSZ5V2BZXQ237XXMLO7FFHDF5CTUDE
------END USER NKEY SEED------
*************************************************************`), 0664); err != nil {
t.Fatal(err)
}
natsCfgPath := path.Join(basePath, "nats.cfg")
if err := os.WriteFile(natsCfgPath, []byte(`// Operator "memory"
operator: eyJ0eXAiOiJKV1QiLCJhbGciOiJlZDI1NTE5LW5rZXkifQ.eyJqdGkiOiJFRk5ERUdSNU1aUEw1VElQTFVKMlNMTFdZV0VDU0NJSEhVU1lISE5IR1BZVUpaWE5XUlNRIiwiaWF0IjoxNjI0ODc1NzYwLCJpc3MiOiJPQ0VSUlQ2WFNEQ1dBWTNFWVNTTjQ2UUxGQko3RFJHNTIzU1hIMkg0UjQ3WFZVWFYyUlJCSVNMSyIsIm5hbWUiOiJtZW1vcnkiLCJzdWIiOiJPQ0VSUlQ2WFNEQ1dBWTNFWVNTTjQ2UUxGQko3RFJHNTIzU1hIMkg0UjQ3WFZVWFYyUlJCSVNMSyIsIm5hdHMiOnsidHlwZSI6Im9wZXJhdG9yIiwidmVyc2lvbiI6Mn19.MZfwcw5j6zY8SfFQppGIa3VjYYZK2_n1kV16Nk5jVCgwS8dKWzRQK_XjFYWwQ15Cq9YY73jcTA6LO0DmQGsdBA
resolver: MEMORY
resolver_preload: {
// Account "account"
AAYJDVLZGWN7Y3FBPCVXCRVQZDFMYGHU4YXLGSXX7U254KH5SC3R5QKM: eyJ0eXAiOiJKV1QiLCJhbGciOiJlZDI1NTE5LW5rZXkifQ.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.unslgXhO_ui9NpYkq5CuEmaU0rz5B1dbxr0bM98kXi2E-TB7RnTXPRGJpqTX16DKCdYhklfIVnI0zPMWHkaJCg
}
`), 0664); err != nil {
t.Fatal(err)
}
// start the nats-server
exec.Command("pkill", "nats-server")
cmd := exec.Command("nats-server", "-c", natsCfgPath)
if err := cmd.Start(); err != nil {
t.Fatal(err) // most probably not installed
}
time.Sleep(50 * time.Millisecond)
defer cmd.Process.Kill()
//
cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(fmt.Sprintf(`{
"ers": { // EventReaderService
"enabled": true, // starts the EventReader service: <true|false>
"sessions_conns":["*localhost"],
"readers": [
{
"id": "nats",
"type": "*nats_json_map",
"run_delay": "-1",
"concurrent_requests": 1024,
"source_path": "nats://localhost:4222",
"processed_path": "",
"tenant": "cgrates.org",
"filters": [],
"flags": [],
"fields":[
{"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"},
],
"opts": {
"natsSubjectProcessed": "processed_cdrs",
"natsJWTFile": %q,
"natsJWTFileProcessed": %q,
}
},
],
},
}`, seedFilePath, seedFilePath))
if err != nil {
t.Fatal(err)
}
if err := cfg.CheckConfigSanity(); err != nil {
t.Fatal(err)
}
testCheckNatsNormal(t, cfg)
}
func TestNatsERJetStreamJWT(t *testing.T) {
// prepare
basePath := "/tmp/nkey"
if err := os.MkdirAll(basePath, 0755); err != nil {
t.Fatal(err)
}
defer os.RemoveAll(basePath)
seedFilePath := path.Join(basePath, "jwt.txt")
if err := os.WriteFile(seedFilePath, []byte(`-----BEGIN NATS USER JWT-----
eyJ0eXAiOiJKV1QiLCJhbGciOiJlZDI1NTE5LW5rZXkifQ.eyJqdGkiOiJETFRGNFpLVVdNNFRPRkVNQko0UEUzTVFFVlhIUkJJN0xZNDdZNEMzNTNMWlJKSU5CUkJRIiwiaWF0IjoxNjI0ODg1NzMwLCJpc3MiOiJBQVlKRFZMWkdXTjdZM0ZCUENWWENSVlFaREZNWUdIVTRZWExHU1hYN1UyNTRLSDVTQzNSNVFLTSIsIm5hbWUiOiJ1c2VyIiwic3ViIjoiVUQzQkdXSUJQVTNDV0w0SE9VVTRWSkVRV1RVQVNBRUc2T0ozWEhNM0VFSk5BMlBBM1VWTllUWk4iLCJuYXRzIjp7InB1YiI6e30sInN1YiI6e30sInN1YnMiOi0xLCJkYXRhIjotMSwicGF5bG9hZCI6LTEsInR5cGUiOiJ1c2VyIiwidmVyc2lvbiI6Mn19.YmFL5nRMkEOXe77sQJPPRv_vwi89tzhVVl0AVjE4sXWyoWIHiCepNw28DbpJ0p_MlT8Qf0SY2cjAhIm-Qi7lDw
------END NATS USER JWT------
************************* IMPORTANT *************************
NKEY Seed printed below can be used to sign and prove identity.
NKEYs are sensitive and should be treated as secrets.
-----BEGIN USER NKEY SEED-----
SUADIH32XQYWC2MI2YGM4AUQ3NMKZSZ5V2BZXQ237XXMLO7FFHDF5CTUDE
------END USER NKEY SEED------
*************************************************************`), 0664); err != nil {
t.Fatal(err)
}
natsCfgPath := path.Join(basePath, "nats.cfg")
if err := os.WriteFile(natsCfgPath, []byte(`// Operator "memory"
operator: eyJ0eXAiOiJKV1QiLCJhbGciOiJlZDI1NTE5LW5rZXkifQ.eyJqdGkiOiJFRk5ERUdSNU1aUEw1VElQTFVKMlNMTFdZV0VDU0NJSEhVU1lISE5IR1BZVUpaWE5XUlNRIiwiaWF0IjoxNjI0ODc1NzYwLCJpc3MiOiJPQ0VSUlQ2WFNEQ1dBWTNFWVNTTjQ2UUxGQko3RFJHNTIzU1hIMkg0UjQ3WFZVWFYyUlJCSVNMSyIsIm5hbWUiOiJtZW1vcnkiLCJzdWIiOiJPQ0VSUlQ2WFNEQ1dBWTNFWVNTTjQ2UUxGQko3RFJHNTIzU1hIMkg0UjQ3WFZVWFYyUlJCSVNMSyIsIm5hdHMiOnsidHlwZSI6Im9wZXJhdG9yIiwidmVyc2lvbiI6Mn19.MZfwcw5j6zY8SfFQppGIa3VjYYZK2_n1kV16Nk5jVCgwS8dKWzRQK_XjFYWwQ15Cq9YY73jcTA6LO0DmQGsdBA
resolver: MEMORY
resolver_preload: {
// Account "account"
AAYJDVLZGWN7Y3FBPCVXCRVQZDFMYGHU4YXLGSXX7U254KH5SC3R5QKM: eyJ0eXAiOiJKV1QiLCJhbGciOiJlZDI1NTE5LW5rZXkifQ.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.unslgXhO_ui9NpYkq5CuEmaU0rz5B1dbxr0bM98kXi2E-TB7RnTXPRGJpqTX16DKCdYhklfIVnI0zPMWHkaJCg
}
`), 0664); err != nil {
t.Fatal(err)
}
// start the nats-server
exec.Command("pkill", "nats-server")
cmd := exec.Command("nats-server", "-c", natsCfgPath, "-js")
if err := cmd.Start(); err != nil {
t.Fatal(err) // most probably not installed
}
time.Sleep(100 * time.Millisecond)
defer cmd.Process.Kill()
//
cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(fmt.Sprintf(`{
"ers": { // EventReaderService
"enabled": true, // starts the EventReader service: <true|false>
"sessions_conns":["*localhost"],
"readers": [
{
"id": "nats",
"type": "*nats_json_map",
"run_delay": "-1",
"concurrent_requests": 1024,
"source_path": "nats://localhost:4222",
"processed_path": "",
"tenant": "cgrates.org",
"filters": [],
"flags": [],
"fields":[
{"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"},
],
"opts": {
"natsJetStream": true,
"natsJWTFile": %q,
"natsJetStreamProcessed": true,
"natsSubjectProcessed": "processed_cdrs",
"natsJWTFileProcessed": %q,
}
},
],
},
}`, seedFilePath, seedFilePath))
if err != nil {
t.Fatal(err)
}
if err := cfg.CheckConfigSanity(); err != nil {
t.Fatal(err)
}
testCheckNatsJetStream(t, cfg)
}