From dba911b603164df25823ef9e004808c8ab0bd84a Mon Sep 17 00:00:00 2001 From: Trial97 Date: Mon, 28 Jun 2021 17:11:59 +0300 Subject: [PATCH] Added tests for nats with different authentication methods --- ers/nats_it_test.go | 776 ++++++++++++++++++++++++++++++++++++-------- 1 file changed, 634 insertions(+), 142 deletions(-) diff --git a/ers/nats_it_test.go b/ers/nats_it_test.go index 27184e4b1..46ee34055 100644 --- a/ers/nats_it_test.go +++ b/ers/nats_it_test.go @@ -22,7 +22,9 @@ package ers import ( "fmt" + "os" "os/exec" + "path" "reflect" "runtime" "testing" @@ -34,61 +36,54 @@ import ( "github.com/nats-io/nats.go" ) -func TestNatsERJetStream(t *testing.T) { - // start the nats-server - exec.Command("pkill", "nats-server") - - cmd := exec.Command("nats-server", "-js") - if err := cmd.Start(); err != nil { - t.Fatal(err) // most probably not installed - } - time.Sleep(50 * time.Millisecond) - defer cmd.Process.Kill() - // - - cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(`{ -"ers": { // EventReaderService - "enabled": true, // starts the EventReader service: - "sessions_conns":["*localhost"], - "readers": [ - { - "id": "nats", - "type": "*nats_json_map", - "run_delay": "-1", - "concurrent_requests": 1024, - "source_path": "nats://localhost:4222", - "processed_path": "", - "tenant": "cgrates.org", - "filters": [], - "flags": [], - "fields":[ - {"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"}, - ], - "opts": { - "natsJetStream": true, - "natsSubjectProcessed": "processed_cdrs", +func testCheckNatsData(t *testing.T, randomCGRID, expData string, ch chan *nats.Msg) { + select { + case err := <-rdrErr: + t.Fatal(err) + case ev := <-rdrEvents: + if ev.rdrCfg.ID != "nats" { + t.Fatalf("Expected 'nats' received `%s`", ev.rdrCfg.ID) + } + expected := &utils.CGREvent{ + Tenant: "cgrates.org", + ID: ev.cgrEvent.ID, + Time: ev.cgrEvent.Time, + Event: map[string]interface{}{ + "CGRID": randomCGRID, + }, + APIOpts: map[string]interface{}{}, + } + if !reflect.DeepEqual(ev.cgrEvent, expected) { + t.Fatalf("Expected %s ,received %s", utils.ToJSON(expected), utils.ToJSON(ev.cgrEvent)) + } + select { + case msg := <-ch: + if expData != string(msg.Data) { + t.Errorf("Expected %q ,received %q", expData, string(msg.Data)) } - }, - ], -}, -}`) - utils.Logger.SetLogLevel(7) - if err != nil { - t.Fatal(err) - } - if err := cfg.CheckConfigSanity(); err != nil { - t.Fatal(err) + case <-time.After(10 * time.Second): + t.Fatal("Timeout2") + } + case <-time.After(10 * time.Second): + t.Fatal("Timeout") } +} + +func testCheckNatsJetStream(t *testing.T, cfg *config.CGRConfig) { rdrEvents = make(chan *erEvent, 1) rdrErr = make(chan error, 1) rdrExit = make(chan struct{}, 1) - + var err error if rdr, err = NewNatsER(cfg, 1, rdrEvents, make(chan *erEvent, 1), rdrErr, new(engine.FilterS), rdrExit); err != nil { t.Fatal(err) } - nc, err := nats.Connect(rdr.Config().SourcePath, nats.Timeout(time.Second), - nats.DrainTimeout(time.Second)) + + nop, err := engine.GetNatsOpts(rdr.Config().Opts, "testExp", time.Second) + if err != nil { + t.Fatal(err) + } + nc, err := nats.Connect(rdr.Config().SourcePath, nop...) if err != nil { t.Fatal(err) } @@ -155,40 +150,103 @@ func TestNatsERJetStream(t *testing.T) { nc.FlushTimeout(time.Second) nc.Flush() - select { - case err = <-rdrErr: - t.Fatal(err) - case ev := <-rdrEvents: - if ev.rdrCfg.ID != "nats" { - t.Fatalf("Expected 'nats' received `%s`", ev.rdrCfg.ID) - } - expected := &utils.CGREvent{ - Tenant: "cgrates.org", - ID: ev.cgrEvent.ID, - Time: ev.cgrEvent.Time, - Event: map[string]interface{}{ - "CGRID": randomCGRID, - }, - APIOpts: map[string]interface{}{}, - } - if !reflect.DeepEqual(ev.cgrEvent, expected) { - t.Fatalf("Expected %s ,received %s", utils.ToJSON(expected), utils.ToJSON(ev.cgrEvent)) - } - select { - case msg := <-ch: - if expData != string(msg.Data) { - t.Errorf("Expected %q ,received %q", expData, string(msg.Data)) - } - case <-time.After(10 * time.Second): - t.Fatal("Timeout") - } - case <-time.After(10 * time.Second): - t.Fatal("Timeout") - } + testCheckNatsData(t, randomCGRID, expData, ch) } close(rdrExit) } +func testCheckNatsNormal(t *testing.T, cfg *config.CGRConfig) { + rdrEvents = make(chan *erEvent, 1) + rdrErr = make(chan error, 1) + rdrExit = make(chan struct{}, 1) + + var err error + if rdr, err = NewNatsER(cfg, 1, rdrEvents, make(chan *erEvent, 1), + rdrErr, new(engine.FilterS), rdrExit); err != nil { + t.Fatal(err) + } + + nop, err := engine.GetNatsOpts(rdr.Config().Opts, "testExp", time.Second) + if err != nil { + t.Fatal(err) + } + nc, err := nats.Connect(rdr.Config().SourcePath, nop...) + if err != nil { + t.Fatal(err) + } + ch := make(chan *nats.Msg, 3) + _, err = nc.ChanQueueSubscribe("processed_cdrs", "test3", ch) + if err != nil { + t.Fatal(err) + } + + defer nc.Drain() + go rdr.Serve() + runtime.Gosched() + time.Sleep(100 * time.Millisecond) + for i := 0; i < 3; i++ { + randomCGRID := utils.UUIDSha1Prefix() + expData := fmt.Sprintf(`{"CGRID": "%s"}`, randomCGRID) + if err = nc.Publish(utils.DefaultQueueID, []byte(expData)); err != nil { + t.Fatal(err) + } + + nc.FlushTimeout(time.Second) + nc.Flush() + + testCheckNatsData(t, randomCGRID, expData, ch) + } + close(rdrExit) +} + +func TestNatsERJetStream(t *testing.T) { + // start the nats-server + exec.Command("pkill", "nats-server") + + cmd := exec.Command("nats-server", "-js") + if err := cmd.Start(); err != nil { + t.Fatal(err) // most probably not installed + } + time.Sleep(50 * time.Millisecond) + defer cmd.Process.Kill() + // + + cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(`{ +"ers": { // EventReaderService + "enabled": true, // starts the EventReader service: + "sessions_conns":["*localhost"], + "readers": [ + { + "id": "nats", + "type": "*nats_json_map", + "run_delay": "-1", + "concurrent_requests": 1024, + "source_path": "nats://localhost:4222", + "processed_path": "", + "tenant": "cgrates.org", + "filters": [], + "flags": [], + "fields":[ + {"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"}, + ], + "opts": { + "natsJetStream": true, + "natsJetStreamProcessed": true, + "natsSubjectProcessed": "processed_cdrs", + } + }, + ], +}, +}`) + if err != nil { + t.Fatal(err) + } + if err := cfg.CheckConfigSanity(); err != nil { + t.Fatal(err) + } + testCheckNatsJetStream(t, cfg) +} + func TestNatsER(t *testing.T) { // start the nats-server exec.Command("pkill", "nats-server") @@ -197,7 +255,7 @@ func TestNatsER(t *testing.T) { if err := cmd.Start(); err != nil { t.Fatal(err) // most probably not installed } - time.Sleep(10 * time.Millisecond) + time.Sleep(50 * time.Millisecond) defer cmd.Process.Kill() // @@ -232,69 +290,503 @@ func TestNatsER(t *testing.T) { if err := cfg.CheckConfigSanity(); err != nil { t.Fatal(err) } - rdrEvents = make(chan *erEvent, 1) - rdrErr = make(chan error, 1) - rdrExit = make(chan struct{}, 1) - - if rdr, err = NewNatsER(cfg, 1, rdrEvents, make(chan *erEvent, 1), - rdrErr, new(engine.FilterS), rdrExit); err != nil { - t.Fatal(err) - } - nc, err := nats.Connect(rdr.Config().SourcePath, nats.Timeout(time.Second), - nats.DrainTimeout(time.Second)) - if err != nil { - t.Fatal(err) - } - ch := make(chan *nats.Msg, 3) - _, err = nc.ChanQueueSubscribe("processed_cdrs", "test3", ch) - if err != nil { - t.Fatal(err) - } - - defer nc.Drain() - go rdr.Serve() - runtime.Gosched() - time.Sleep(100 * time.Millisecond) - for i := 0; i < 3; i++ { - randomCGRID := utils.UUIDSha1Prefix() - expData := fmt.Sprintf(`{"CGRID": "%s"}`, randomCGRID) - if err = nc.Publish(utils.DefaultQueueID, []byte(expData)); err != nil { - t.Fatal(err) - } - - nc.FlushTimeout(time.Second) - nc.Flush() - - select { - case err = <-rdrErr: - t.Fatal(err) - case ev := <-rdrEvents: - if ev.rdrCfg.ID != "nats" { - t.Fatalf("Expected 'nats' received `%s`", ev.rdrCfg.ID) - } - expected := &utils.CGREvent{ - Tenant: "cgrates.org", - ID: ev.cgrEvent.ID, - Time: ev.cgrEvent.Time, - Event: map[string]interface{}{ - "CGRID": randomCGRID, - }, - APIOpts: map[string]interface{}{}, - } - if !reflect.DeepEqual(ev.cgrEvent, expected) { - t.Fatalf("Expected %s ,received %s", utils.ToJSON(expected), utils.ToJSON(ev.cgrEvent)) - } - select { - case msg := <-ch: - if expData != string(msg.Data) { - t.Errorf("Expected %q ,received %q", expData, string(msg.Data)) - } - case <-time.After(10 * time.Second): - t.Fatal("Timeout") - } - case <-time.After(10 * time.Second): - t.Fatal("Timeout") - } - } - close(rdrExit) + testCheckNatsNormal(t, cfg) +} + +func TestNatsERJetStreamUser(t *testing.T) { + // start the nats-server + exec.Command("pkill", "nats-server") + + cmd := exec.Command("nats-server", "-js", "--user", "user", "--pass", "password") + if err := cmd.Start(); err != nil { + t.Fatal(err) // most probably not installed + } + time.Sleep(50 * time.Millisecond) + defer cmd.Process.Kill() + // + + cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(`{ +"ers": { // EventReaderService + "enabled": true, // starts the EventReader service: + "sessions_conns":["*localhost"], + "readers": [ + { + "id": "nats", + "type": "*nats_json_map", + "run_delay": "-1", + "concurrent_requests": 1024, + "source_path": "nats://user:password@localhost:4222", + "processed_path": "", + "tenant": "cgrates.org", + "filters": [], + "flags": [], + "fields":[ + {"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"}, + ], + "opts": { + "natsJetStream": true, + "natsJetStreamProcessed": true, + "natsSubjectProcessed": "processed_cdrs", + } + }, + ], +}, +}`) + if err != nil { + t.Fatal(err) + } + if err := cfg.CheckConfigSanity(); err != nil { + t.Fatal(err) + } + testCheckNatsJetStream(t, cfg) +} + +func TestNatsERUser(t *testing.T) { + // start the nats-server + exec.Command("pkill", "nats-server") + + cmd := exec.Command("nats-server", "--user", "user", "--pass", "password") + if err := cmd.Start(); err != nil { + t.Fatal(err) // most probably not installed + } + time.Sleep(50 * time.Millisecond) + defer cmd.Process.Kill() + // + + cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(`{ +"ers": { // EventReaderService + "enabled": true, // starts the EventReader service: + "sessions_conns":["*localhost"], + "readers": [ + { + "id": "nats", + "type": "*nats_json_map", + "run_delay": "-1", + "concurrent_requests": 1024, + "source_path": "nats://user:password@localhost:4222", + "processed_path": "", + "tenant": "cgrates.org", + "filters": [], + "flags": [], + "fields":[ + {"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"}, + ], + "opts": { + "natsSubjectProcessed": "processed_cdrs", + } + }, + ], +}, +}`) + if err != nil { + t.Fatal(err) + } + if err := cfg.CheckConfigSanity(); err != nil { + t.Fatal(err) + } + testCheckNatsNormal(t, cfg) +} + +func TestNatsERJetStreamToken(t *testing.T) { + // start the nats-server + exec.Command("pkill", "nats-server") + + cmd := exec.Command("nats-server", "-js", "--auth", "token") + if err := cmd.Start(); err != nil { + t.Fatal(err) // most probably not installed + } + time.Sleep(50 * time.Millisecond) + defer cmd.Process.Kill() + // + + cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(`{ +"ers": { // EventReaderService + "enabled": true, // starts the EventReader service: + "sessions_conns":["*localhost"], + "readers": [ + { + "id": "nats", + "type": "*nats_json_map", + "run_delay": "-1", + "concurrent_requests": 1024, + "source_path": "nats://token@localhost:4222", + "processed_path": "", + "tenant": "cgrates.org", + "filters": [], + "flags": [], + "fields":[ + {"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"}, + ], + "opts": { + "natsJetStream": true, + "natsJetStreamProcessed": true, + "natsSubjectProcessed": "processed_cdrs", + } + }, + ], +}, +}`) + if err != nil { + t.Fatal(err) + } + if err := cfg.CheckConfigSanity(); err != nil { + t.Fatal(err) + } + testCheckNatsJetStream(t, cfg) +} + +func TestNatsERToken(t *testing.T) { + // start the nats-server + exec.Command("pkill", "nats-server") + + cmd := exec.Command("nats-server", "--auth", "token") + if err := cmd.Start(); err != nil { + t.Fatal(err) // most probably not installed + } + time.Sleep(50 * time.Millisecond) + defer cmd.Process.Kill() + // + + cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(`{ +"ers": { // EventReaderService + "enabled": true, // starts the EventReader service: + "sessions_conns":["*localhost"], + "readers": [ + { + "id": "nats", + "type": "*nats_json_map", + "run_delay": "-1", + "concurrent_requests": 1024, + "source_path": "nats://token@localhost:4222", + "processed_path": "", + "tenant": "cgrates.org", + "filters": [], + "flags": [], + "fields":[ + {"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"}, + ], + "opts": { + "natsSubjectProcessed": "processed_cdrs", + } + }, + ], +}, +}`) + if err != nil { + t.Fatal(err) + } + if err := cfg.CheckConfigSanity(); err != nil { + t.Fatal(err) + } + testCheckNatsNormal(t, cfg) +} + +func TestNatsERNkey(t *testing.T) { + // prepare + basePath := "/tmp/nkey" + if err := os.MkdirAll(basePath, 0755); err != nil { + t.Fatal(err) + } + + defer os.RemoveAll(basePath) + seedFilePath := path.Join(basePath, "seed.txt") + if err := os.WriteFile(seedFilePath, []byte("SUAOUIE5CU47NCO22GHFEZXGCRCJDVTHDLMIP4L7UQNCR5SW4FZICI7O3Q"), 0664); err != nil { + t.Fatal(err) + } + natsCfgPath := path.Join(basePath, "nats.cfg") + if err := os.WriteFile(natsCfgPath, []byte(`authorization: { + users: [ + { nkey: UBSNABLSM4Y2KY4ZFWPDOB4NVNYCGVD5YB7ROC4EGSDR7Z7V57PXAIQY } + ] + } +`), 0664); err != nil { + t.Fatal(err) + } + // start the nats-server + exec.Command("pkill", "nats-server") + + cmd := exec.Command("nats-server", "-c", natsCfgPath) + if err := cmd.Start(); err != nil { + t.Fatal(err) // most probably not installed + } + time.Sleep(50 * time.Millisecond) + defer cmd.Process.Kill() + // + + cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(fmt.Sprintf(`{ +"ers": { // EventReaderService + "enabled": true, // starts the EventReader service: + "sessions_conns":["*localhost"], + "readers": [ + { + "id": "nats", + "type": "*nats_json_map", + "run_delay": "-1", + "concurrent_requests": 1024, + "source_path": "nats://localhost:4222", + "processed_path": "", + "tenant": "cgrates.org", + "filters": [], + "flags": [], + "fields":[ + {"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"}, + ], + "opts": { + "natsSubjectProcessed": "processed_cdrs", + "natsSeedFile": %q, + "natsSeedFileProcessed": %q, + } + }, + ], +}, +}`, seedFilePath, seedFilePath)) + if err != nil { + t.Fatal(err) + } + if err := cfg.CheckConfigSanity(); err != nil { + t.Fatal(err) + } + testCheckNatsNormal(t, cfg) +} + +func TestNatsERJetStreamNKey(t *testing.T) { + // prepare + basePath := "/tmp/nkey" + if err := os.MkdirAll(basePath, 0755); err != nil { + t.Fatal(err) + } + + defer os.RemoveAll(basePath) + seedFilePath := path.Join(basePath, "seed.txt") + if err := os.WriteFile(seedFilePath, []byte("SUAOUIE5CU47NCO22GHFEZXGCRCJDVTHDLMIP4L7UQNCR5SW4FZICI7O3Q"), 0664); err != nil { + t.Fatal(err) + } + natsCfgPath := path.Join(basePath, "nats.cfg") + if err := os.WriteFile(natsCfgPath, []byte(`authorization: { +users: [ + { nkey: UBSNABLSM4Y2KY4ZFWPDOB4NVNYCGVD5YB7ROC4EGSDR7Z7V57PXAIQY } +] +} +`), 0664); err != nil { + t.Fatal(err) + } + // start the nats-server + exec.Command("pkill", "nats-server") + + cmd := exec.Command("nats-server", "-c", natsCfgPath, "-js") + if err := cmd.Start(); err != nil { + t.Fatal(err) // most probably not installed + } + time.Sleep(50 * time.Millisecond) + defer cmd.Process.Kill() + // + + cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(fmt.Sprintf(`{ +"ers": { // EventReaderService + "enabled": true, // starts the EventReader service: + "sessions_conns":["*localhost"], + "readers": [ + { + "id": "nats", + "type": "*nats_json_map", + "run_delay": "-1", + "concurrent_requests": 1024, + "source_path": "nats://localhost:4222", + "processed_path": "", + "tenant": "cgrates.org", + "filters": [], + "flags": [], + "fields":[ + {"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"}, + ], + "opts": { + "natsJetStream": true, + "natsSeedFile": %q, + "natsJetStreamProcessed": true, + "natsSubjectProcessed": "processed_cdrs", + "natsSeedFileProcessed": %q, + } + }, + ], +}, +}`, seedFilePath, seedFilePath)) + if err != nil { + t.Fatal(err) + } + if err := cfg.CheckConfigSanity(); err != nil { + t.Fatal(err) + } + testCheckNatsJetStream(t, cfg) +} + +func TestNatsERJWT(t *testing.T) { + // prepare + basePath := "/tmp/nkey" + if err := os.MkdirAll(basePath, 0755); err != nil { + t.Fatal(err) + } + + defer os.RemoveAll(basePath) + seedFilePath := path.Join(basePath, "jwt.txt") + if err := os.WriteFile(seedFilePath, []byte(`-----BEGIN NATS USER JWT----- +eyJ0eXAiOiJKV1QiLCJhbGciOiJlZDI1NTE5LW5rZXkifQ.eyJqdGkiOiJETFRGNFpLVVdNNFRPRkVNQko0UEUzTVFFVlhIUkJJN0xZNDdZNEMzNTNMWlJKSU5CUkJRIiwiaWF0IjoxNjI0ODg1NzMwLCJpc3MiOiJBQVlKRFZMWkdXTjdZM0ZCUENWWENSVlFaREZNWUdIVTRZWExHU1hYN1UyNTRLSDVTQzNSNVFLTSIsIm5hbWUiOiJ1c2VyIiwic3ViIjoiVUQzQkdXSUJQVTNDV0w0SE9VVTRWSkVRV1RVQVNBRUc2T0ozWEhNM0VFSk5BMlBBM1VWTllUWk4iLCJuYXRzIjp7InB1YiI6e30sInN1YiI6e30sInN1YnMiOi0xLCJkYXRhIjotMSwicGF5bG9hZCI6LTEsInR5cGUiOiJ1c2VyIiwidmVyc2lvbiI6Mn19.YmFL5nRMkEOXe77sQJPPRv_vwi89tzhVVl0AVjE4sXWyoWIHiCepNw28DbpJ0p_MlT8Qf0SY2cjAhIm-Qi7lDw +------END NATS USER JWT------ + +************************* IMPORTANT ************************* +NKEY Seed printed below can be used to sign and prove identity. +NKEYs are sensitive and should be treated as secrets. + +-----BEGIN USER NKEY SEED----- +SUADIH32XQYWC2MI2YGM4AUQ3NMKZSZ5V2BZXQ237XXMLO7FFHDF5CTUDE +------END USER NKEY SEED------ + +*************************************************************`), 0664); err != nil { + t.Fatal(err) + } + natsCfgPath := path.Join(basePath, "nats.cfg") + if err := os.WriteFile(natsCfgPath, []byte(`// Operator "memory" +operator: eyJ0eXAiOiJKV1QiLCJhbGciOiJlZDI1NTE5LW5rZXkifQ.eyJqdGkiOiJFRk5ERUdSNU1aUEw1VElQTFVKMlNMTFdZV0VDU0NJSEhVU1lISE5IR1BZVUpaWE5XUlNRIiwiaWF0IjoxNjI0ODc1NzYwLCJpc3MiOiJPQ0VSUlQ2WFNEQ1dBWTNFWVNTTjQ2UUxGQko3RFJHNTIzU1hIMkg0UjQ3WFZVWFYyUlJCSVNMSyIsIm5hbWUiOiJtZW1vcnkiLCJzdWIiOiJPQ0VSUlQ2WFNEQ1dBWTNFWVNTTjQ2UUxGQko3RFJHNTIzU1hIMkg0UjQ3WFZVWFYyUlJCSVNMSyIsIm5hdHMiOnsidHlwZSI6Im9wZXJhdG9yIiwidmVyc2lvbiI6Mn19.MZfwcw5j6zY8SfFQppGIa3VjYYZK2_n1kV16Nk5jVCgwS8dKWzRQK_XjFYWwQ15Cq9YY73jcTA6LO0DmQGsdBA + +resolver: MEMORY + +resolver_preload: { + // Account "account" + AAYJDVLZGWN7Y3FBPCVXCRVQZDFMYGHU4YXLGSXX7U254KH5SC3R5QKM: eyJ0eXAiOiJKV1QiLCJhbGciOiJlZDI1NTE5LW5rZXkifQ.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.unslgXhO_ui9NpYkq5CuEmaU0rz5B1dbxr0bM98kXi2E-TB7RnTXPRGJpqTX16DKCdYhklfIVnI0zPMWHkaJCg + +} +`), 0664); err != nil { + t.Fatal(err) + } + // start the nats-server + exec.Command("pkill", "nats-server") + + cmd := exec.Command("nats-server", "-c", natsCfgPath) + if err := cmd.Start(); err != nil { + t.Fatal(err) // most probably not installed + } + time.Sleep(50 * time.Millisecond) + defer cmd.Process.Kill() + // + + cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(fmt.Sprintf(`{ +"ers": { // EventReaderService + "enabled": true, // starts the EventReader service: + "sessions_conns":["*localhost"], + "readers": [ + { + "id": "nats", + "type": "*nats_json_map", + "run_delay": "-1", + "concurrent_requests": 1024, + "source_path": "nats://localhost:4222", + "processed_path": "", + "tenant": "cgrates.org", + "filters": [], + "flags": [], + "fields":[ + {"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"}, + ], + "opts": { + "natsSubjectProcessed": "processed_cdrs", + "natsJWTFile": %q, + "natsJWTFileProcessed": %q, + } + }, + ], +}, +}`, seedFilePath, seedFilePath)) + if err != nil { + t.Fatal(err) + } + if err := cfg.CheckConfigSanity(); err != nil { + t.Fatal(err) + } + testCheckNatsNormal(t, cfg) +} + +func TestNatsERJetStreamJWT(t *testing.T) { + // prepare + basePath := "/tmp/nkey" + if err := os.MkdirAll(basePath, 0755); err != nil { + t.Fatal(err) + } + + defer os.RemoveAll(basePath) + seedFilePath := path.Join(basePath, "jwt.txt") + if err := os.WriteFile(seedFilePath, []byte(`-----BEGIN NATS USER JWT----- +eyJ0eXAiOiJKV1QiLCJhbGciOiJlZDI1NTE5LW5rZXkifQ.eyJqdGkiOiJETFRGNFpLVVdNNFRPRkVNQko0UEUzTVFFVlhIUkJJN0xZNDdZNEMzNTNMWlJKSU5CUkJRIiwiaWF0IjoxNjI0ODg1NzMwLCJpc3MiOiJBQVlKRFZMWkdXTjdZM0ZCUENWWENSVlFaREZNWUdIVTRZWExHU1hYN1UyNTRLSDVTQzNSNVFLTSIsIm5hbWUiOiJ1c2VyIiwic3ViIjoiVUQzQkdXSUJQVTNDV0w0SE9VVTRWSkVRV1RVQVNBRUc2T0ozWEhNM0VFSk5BMlBBM1VWTllUWk4iLCJuYXRzIjp7InB1YiI6e30sInN1YiI6e30sInN1YnMiOi0xLCJkYXRhIjotMSwicGF5bG9hZCI6LTEsInR5cGUiOiJ1c2VyIiwidmVyc2lvbiI6Mn19.YmFL5nRMkEOXe77sQJPPRv_vwi89tzhVVl0AVjE4sXWyoWIHiCepNw28DbpJ0p_MlT8Qf0SY2cjAhIm-Qi7lDw +------END NATS USER JWT------ + +************************* IMPORTANT ************************* +NKEY Seed printed below can be used to sign and prove identity. +NKEYs are sensitive and should be treated as secrets. + +-----BEGIN USER NKEY SEED----- +SUADIH32XQYWC2MI2YGM4AUQ3NMKZSZ5V2BZXQ237XXMLO7FFHDF5CTUDE +------END USER NKEY SEED------ + +*************************************************************`), 0664); err != nil { + t.Fatal(err) + } + natsCfgPath := path.Join(basePath, "nats.cfg") + if err := os.WriteFile(natsCfgPath, []byte(`// Operator "memory" +operator: eyJ0eXAiOiJKV1QiLCJhbGciOiJlZDI1NTE5LW5rZXkifQ.eyJqdGkiOiJFRk5ERUdSNU1aUEw1VElQTFVKMlNMTFdZV0VDU0NJSEhVU1lISE5IR1BZVUpaWE5XUlNRIiwiaWF0IjoxNjI0ODc1NzYwLCJpc3MiOiJPQ0VSUlQ2WFNEQ1dBWTNFWVNTTjQ2UUxGQko3RFJHNTIzU1hIMkg0UjQ3WFZVWFYyUlJCSVNMSyIsIm5hbWUiOiJtZW1vcnkiLCJzdWIiOiJPQ0VSUlQ2WFNEQ1dBWTNFWVNTTjQ2UUxGQko3RFJHNTIzU1hIMkg0UjQ3WFZVWFYyUlJCSVNMSyIsIm5hdHMiOnsidHlwZSI6Im9wZXJhdG9yIiwidmVyc2lvbiI6Mn19.MZfwcw5j6zY8SfFQppGIa3VjYYZK2_n1kV16Nk5jVCgwS8dKWzRQK_XjFYWwQ15Cq9YY73jcTA6LO0DmQGsdBA + +resolver: MEMORY + +resolver_preload: { + // Account "account" + AAYJDVLZGWN7Y3FBPCVXCRVQZDFMYGHU4YXLGSXX7U254KH5SC3R5QKM: eyJ0eXAiOiJKV1QiLCJhbGciOiJlZDI1NTE5LW5rZXkifQ.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.unslgXhO_ui9NpYkq5CuEmaU0rz5B1dbxr0bM98kXi2E-TB7RnTXPRGJpqTX16DKCdYhklfIVnI0zPMWHkaJCg + +} +`), 0664); err != nil { + t.Fatal(err) + } + // start the nats-server + exec.Command("pkill", "nats-server") + + cmd := exec.Command("nats-server", "-c", natsCfgPath, "-js") + if err := cmd.Start(); err != nil { + t.Fatal(err) // most probably not installed + } + time.Sleep(100 * time.Millisecond) + defer cmd.Process.Kill() + // + + cfg, err := config.NewCGRConfigFromJSONStringWithDefaults(fmt.Sprintf(`{ +"ers": { // EventReaderService + "enabled": true, // starts the EventReader service: + "sessions_conns":["*localhost"], + "readers": [ + { + "id": "nats", + "type": "*nats_json_map", + "run_delay": "-1", + "concurrent_requests": 1024, + "source_path": "nats://localhost:4222", + "processed_path": "", + "tenant": "cgrates.org", + "filters": [], + "flags": [], + "fields":[ + {"tag": "CGRID", "type": "*composed", "value": "~*req.CGRID", "path": "*cgreq.CGRID"}, + ], + "opts": { + "natsJetStream": true, + "natsJWTFile": %q, + "natsJetStreamProcessed": true, + "natsSubjectProcessed": "processed_cdrs", + "natsJWTFileProcessed": %q, + } + }, + ], +}, +}`, seedFilePath, seedFilePath)) + if err != nil { + t.Fatal(err) + } + if err := cfg.CheckConfigSanity(); err != nil { + t.Fatal(err) + } + testCheckNatsJetStream(t, cfg) }