mirror of
https://github.com/cgrates/cgrates.git
synced 2026-02-11 10:06:24 +05:00
306 lines
8.4 KiB
Go
306 lines
8.4 KiB
Go
/*
|
|
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
|
|
Copyright (C) ITsysCOM GmbH
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Affero General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
along with this program. If not, see <https://www.gnu.org/licenses/>
|
|
*/
|
|
|
|
package ers
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"encoding/json"
|
|
"fmt"
|
|
"os"
|
|
"time"
|
|
|
|
"github.com/cgrates/birpc/context"
|
|
"github.com/cgrates/cgrates/agents"
|
|
"github.com/cgrates/cgrates/config"
|
|
"github.com/cgrates/cgrates/engine"
|
|
"github.com/cgrates/cgrates/utils"
|
|
"github.com/nats-io/nats.go"
|
|
"github.com/nats-io/nats.go/jetstream"
|
|
)
|
|
|
|
// NewNatsER return a new amqp event reader
|
|
func NewNatsER(cfg *config.CGRConfig, cfgIdx int,
|
|
rdrEvents, partialEvents chan *erEvent, rdrErr chan error,
|
|
fltrS *engine.FilterS, rdrExit chan struct{}) (EventReader, error) {
|
|
rdr := &NatsER{
|
|
cgrCfg: cfg,
|
|
cfgIdx: cfgIdx,
|
|
fltrS: fltrS,
|
|
rdrEvents: rdrEvents,
|
|
partialEvents: partialEvents,
|
|
rdrExit: rdrExit,
|
|
rdrErr: rdrErr,
|
|
}
|
|
if concReq := rdr.Config().ConcurrentReqs; concReq != -1 {
|
|
rdr.cap = make(chan struct{}, concReq)
|
|
}
|
|
if err := rdr.processOpts(); err != nil {
|
|
return nil, err
|
|
}
|
|
return rdr, nil
|
|
}
|
|
|
|
// NatsER implements EventReader interface for amqp message
|
|
type NatsER struct {
|
|
// sync.RWMutex
|
|
cgrCfg *config.CGRConfig
|
|
cfgIdx int // index of config instance within ERsCfg.Readers
|
|
fltrS *engine.FilterS
|
|
|
|
rdrEvents chan *erEvent // channel to dispatch the events created to
|
|
partialEvents chan *erEvent // channel to dispatch the partial events created to
|
|
rdrExit chan struct{}
|
|
rdrErr chan error
|
|
cap chan struct{}
|
|
|
|
subject string
|
|
queueID string
|
|
jetStream bool
|
|
consumerName string
|
|
streamName string
|
|
opts []nats.Option
|
|
}
|
|
|
|
// Config returns the curent configuration
|
|
func (rdr *NatsER) Config() *config.EventReaderCfg {
|
|
return rdr.cgrCfg.ERsCfg().Readers[rdr.cfgIdx]
|
|
}
|
|
|
|
// Serve will subscribe to a NATS subject and process incoming messages until the rdrExit channel
|
|
// will be closed.
|
|
func (rdr *NatsER) Serve() error {
|
|
|
|
// Establish a connection to the nats server.
|
|
nc, err := nats.Connect(rdr.Config().SourcePath, rdr.opts...)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
// Define the message handler. Its content will get executed for every received message.
|
|
handleMessage := func(msgData []byte) {
|
|
// If the rdr.cap channel buffer is empty, block until a resource is available. Otherwise
|
|
// allocate one resource and start processing the message.
|
|
if rdr.Config().ConcurrentReqs != -1 {
|
|
rdr.cap <- struct{}{}
|
|
}
|
|
go func() {
|
|
handlerErr := rdr.processMessage(msgData)
|
|
if handlerErr != nil {
|
|
utils.Logger.Warning(
|
|
fmt.Sprintf("<%s> processing message %s error: %s",
|
|
utils.ERs, string(msgData), handlerErr.Error()))
|
|
}
|
|
|
|
// Release the resource back to rdr.cap channel.
|
|
if rdr.Config().ConcurrentReqs != -1 {
|
|
<-rdr.cap
|
|
}
|
|
|
|
}()
|
|
}
|
|
|
|
go func() {
|
|
time.Sleep(rdr.Config().StartDelay)
|
|
|
|
defer func() {
|
|
if err != nil {
|
|
utils.Logger.Warning(
|
|
fmt.Sprintf("<%s> reader <%s> got error: <%v>",
|
|
utils.ERs, rdr.Config().ID, err))
|
|
}
|
|
}()
|
|
|
|
// Subscribe to the appropriate NATS subject.
|
|
if !rdr.jetStream {
|
|
_, err = nc.QueueSubscribe(rdr.subject, rdr.queueID, func(msg *nats.Msg) {
|
|
handleMessage(msg.Data)
|
|
})
|
|
if err != nil {
|
|
nc.Drain()
|
|
rdr.rdrErr <- err
|
|
return
|
|
}
|
|
} else {
|
|
var js jetstream.JetStream
|
|
js, err = jetstream.New(nc)
|
|
if err != nil {
|
|
nc.Drain()
|
|
rdr.rdrErr <- err
|
|
return
|
|
}
|
|
ctx := context.TODO()
|
|
if jsMaxWait := rdr.Config().Opts.NATS.JetStreamMaxWait; jsMaxWait != nil {
|
|
var cancel context.CancelFunc
|
|
ctx, cancel = context.WithTimeout(ctx, *jsMaxWait)
|
|
defer cancel()
|
|
}
|
|
|
|
var cons jetstream.Consumer
|
|
cons, err = js.CreateOrUpdateConsumer(ctx, rdr.streamName, jetstream.ConsumerConfig{
|
|
FilterSubject: rdr.subject,
|
|
Durable: rdr.consumerName,
|
|
AckPolicy: jetstream.AckAllPolicy,
|
|
})
|
|
if err != nil {
|
|
nc.Drain()
|
|
rdr.rdrErr <- err
|
|
return
|
|
}
|
|
|
|
_, err = cons.Consume(func(msg jetstream.Msg) {
|
|
handleMessage(msg.Data())
|
|
})
|
|
if err != nil {
|
|
nc.Drain()
|
|
rdr.rdrErr <- err
|
|
}
|
|
}
|
|
}()
|
|
|
|
go func() {
|
|
// Wait for exit signal.
|
|
<-rdr.rdrExit
|
|
utils.Logger.Info(
|
|
fmt.Sprintf("<%s> stop monitoring nats path <%s>",
|
|
utils.ERs, rdr.Config().SourcePath))
|
|
nc.Drain()
|
|
}()
|
|
|
|
return nil
|
|
}
|
|
|
|
func (rdr *NatsER) processMessage(msg []byte) (err error) {
|
|
var decodedMessage map[string]any
|
|
if err = json.Unmarshal(msg, &decodedMessage); err != nil {
|
|
return
|
|
}
|
|
|
|
reqVars := &utils.DataNode{Type: utils.NMMapType, Map: map[string]*utils.DataNode{utils.MetaReaderID: utils.NewLeafNode(rdr.cgrCfg.ERsCfg().Readers[rdr.cfgIdx].ID)}}
|
|
|
|
agReq := agents.NewAgentRequest(
|
|
utils.MapStorage(decodedMessage), reqVars,
|
|
nil, nil, nil, rdr.Config().Tenant,
|
|
rdr.cgrCfg.GeneralCfg().DefaultTenant,
|
|
utils.FirstNonEmpty(rdr.Config().Timezone,
|
|
rdr.cgrCfg.GeneralCfg().DefaultTimezone),
|
|
rdr.fltrS, nil) // create an AgentRequest
|
|
var pass bool
|
|
if pass, err = rdr.fltrS.Pass(agReq.Tenant, rdr.Config().Filters,
|
|
agReq); err != nil || !pass {
|
|
return
|
|
}
|
|
if err = agReq.SetFields(rdr.Config().Fields); err != nil {
|
|
return
|
|
}
|
|
cgrEv := utils.NMAsCGREvent(agReq.CGRRequest, agReq.Tenant, utils.NestingSep, agReq.Opts)
|
|
rdrEv := rdr.rdrEvents
|
|
if _, isPartial := cgrEv.APIOpts[utils.PartialOpt]; isPartial {
|
|
rdrEv = rdr.partialEvents
|
|
}
|
|
rdrEv <- &erEvent{
|
|
cgrEvent: cgrEv,
|
|
rdrCfg: rdr.Config(),
|
|
}
|
|
return
|
|
}
|
|
|
|
func (rdr *NatsER) processOpts() (err error) {
|
|
if rdr.Config().Opts.NATS.Subject != nil {
|
|
rdr.subject = *rdr.Config().Opts.NATS.Subject
|
|
}
|
|
|
|
rdr.queueID = rdr.cgrCfg.GeneralCfg().NodeID
|
|
if rdr.Config().Opts.NATS.QueueID != nil {
|
|
rdr.queueID = *rdr.Config().Opts.NATS.QueueID
|
|
}
|
|
|
|
rdr.consumerName = utils.CGRateSLwr
|
|
if rdr.Config().Opts.NATS.ConsumerName != nil {
|
|
rdr.consumerName = *rdr.Config().Opts.NATS.ConsumerName
|
|
}
|
|
|
|
if rdr.Config().Opts.NATS.StreamName != nil {
|
|
rdr.streamName = *rdr.Config().Opts.NATS.StreamName
|
|
}
|
|
|
|
if rdr.Config().Opts.NATS.JetStream != nil {
|
|
rdr.jetStream = *rdr.Config().Opts.NATS.JetStream
|
|
}
|
|
rdr.opts, err = GetNatsOpts(rdr.Config().Opts.NATS,
|
|
rdr.cgrCfg.GeneralCfg().NodeID,
|
|
rdr.cgrCfg.GeneralCfg().ConnectTimeout)
|
|
return
|
|
}
|
|
|
|
func GetNatsOpts(opts *config.NATSROpts, nodeID string, connTimeout time.Duration) (nop []nats.Option, err error) {
|
|
natsOpts := make([]nats.Option, 0, 7)
|
|
natsOpts = append(natsOpts, nats.Name(utils.CGRateSLwr+nodeID),
|
|
nats.Timeout(connTimeout),
|
|
nats.DrainTimeout(time.Second))
|
|
if opts.JWTFile != nil {
|
|
keys := make([]string, 0, 1)
|
|
if opts.SeedFile != nil {
|
|
keys = append(keys, *opts.SeedFile)
|
|
}
|
|
natsOpts = append(natsOpts, nats.UserCredentials(*opts.JWTFile, keys...))
|
|
}
|
|
if opts.SeedFile != nil {
|
|
opt, err := nats.NkeyOptionFromSeed(*opts.SeedFile)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
natsOpts = append(natsOpts, opt)
|
|
}
|
|
|
|
switch {
|
|
case opts.ClientCertificate != nil && opts.ClientKey != nil:
|
|
natsOpts = append(natsOpts, nats.ClientCert(*opts.ClientCertificate, *opts.ClientKey))
|
|
case opts.ClientCertificate != nil:
|
|
return nil, fmt.Errorf("has certificate but no key")
|
|
case opts.ClientKey != nil:
|
|
return nil, fmt.Errorf("has key but no certificate")
|
|
}
|
|
|
|
if opts.CertificateAuthority != nil {
|
|
natsOpts = append(natsOpts,
|
|
func(o *nats.Options) error {
|
|
pool, err := x509.SystemCertPool()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
rootPEM, err := os.ReadFile(*opts.CertificateAuthority)
|
|
if err != nil || rootPEM == nil {
|
|
return fmt.Errorf("nats: error loading or parsing rootCA file: %v", err)
|
|
}
|
|
ok := pool.AppendCertsFromPEM(rootPEM)
|
|
if !ok {
|
|
return fmt.Errorf("nats: failed to parse root certificate from %q",
|
|
*opts.CertificateAuthority)
|
|
}
|
|
if o.TLSConfig == nil {
|
|
o.TLSConfig = &tls.Config{MinVersion: tls.VersionTLS12}
|
|
}
|
|
o.TLSConfig.RootCAs = pool
|
|
o.Secure = true
|
|
return nil
|
|
})
|
|
}
|
|
return natsOpts, nil
|
|
}
|