Files
cgrates/ees/nats.go
ionutboangiu b1d68b6cfe Upgrade NATS driver version and implementation
Upgraded NATS server version in ansible role.

upgraded go.mod nats version due to an issue caused by version mismatch
between driver and server (uncertain).

Increased amount of sleep in tests after starting a NATS server with
jetstream enabled from 50ms to 100ms.

## *NatsER.Serve

- Replaced ChanQueueSubscribe with QueueSubscribe for Core NATS consumer
to handle the message processing directly.

- Since QueueSubscribe is now used regardless of jetstream status, the
message handler has been assigned to a separate variable that can be
reused.

-  The message handler is now dealing with the message processing
directly, therefore the select case listening for the channel which is
feeding NATS messages can be removed together with the channel itself
and the select. Currently, the goroutine within Serve only has to block
until the rdrExit chan is closed.

- Moved the resource check inside the handler right before starting the
message processing goroutine.

## ers.getProcessedOptions

- Renamed function from getProcessOptions to getProcessedOptions.

- Initially, the EventExporterOpts struct was always initialized to be
non-nil which meant exporting processed messages by the reader was
always enabled by force. Function has been updated to initialize it
only once when the first Processed option that was set is found.

- Created init function for all types of opts structs to avoid
repetition.

## *NatsEE.parseOpts

- Renamed function from parseOpt to parseOpts.

- Updated function to return early in case of nil opts struct to reduce
nesting.

- The nested jetstream status and maxwait conditions nil verification
have been merged into one condition.

- Handled the error coming from GetNatsOpts function.

- NATS Subject assignment has been removed. It was redundant, since it
had already been set from before this function was called.

## *NatsEE.Connect

- Updated function to return early in case of non-nil nats.Conn value
to reduce nesting.

## *NatsEE.ExportEvent

- Use defer to release resources and RUnlock.

## *NatsEE.Close

- Use defer to Unlock.

- Update function to return early in case of nil nats.Conn value to
reduce nesting.

## ees.GetNatsOpts

- Chose switch over if else when parsing client certificate and keys
opts.

- Updated function to return the errors directly instead of assigning
them to a separate variable right before returning.

## ers.GetNatsOpts

- Passed the NATSROpts struct directly to the function.

- Chose switch over if else when parsing client certificate and keys
opts.

- Updated function to return the errors directly instead of assigning
them to a separate variable right before returning.

Removed tab from commented natsJetStreamMaxWaitProcessed option
value in config_defaults.go under ers section.

Removed redundant NATS prefix from config.NATSROpts type field names.

Added function in ers/lib_test.go to create a config file in /tmp
based on a config string.

Added integration test for ERs NATS.
2023-09-26 21:29:52 +02:00

196 lines
4.9 KiB
Go

/*
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
Copyright (C) ITsysCOM GmbH
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>
*/
package ees
import (
"crypto/tls"
"crypto/x509"
"fmt"
"os"
"sync"
"time"
"github.com/cgrates/cgrates/config"
"github.com/cgrates/cgrates/utils"
"github.com/nats-io/nats.go"
)
// NewNatsEE creates a kafka poster
func NewNatsEE(cfg *config.EventExporterCfg, nodeID string, connTimeout time.Duration, dc *utils.SafeMapStorage) (natsPstr *NatsEE, err error) {
natsPstr = &NatsEE{
cfg: cfg,
dc: dc,
subject: utils.DefaultQueueID,
reqs: newConcReq(cfg.ConcurrentRequests),
}
err = natsPstr.parseOpts(cfg.Opts, nodeID, connTimeout)
return
}
// NatsEE is a kafka poster
type NatsEE struct {
subject string // identifier of the CDR queue where we publish
jetStream bool
opts []nats.Option
jsOpts []nats.JSOpt
poster *nats.Conn
posterJS nats.JetStreamContext
cfg *config.EventExporterCfg
dc *utils.SafeMapStorage
reqs *concReq
sync.RWMutex // protect writer
bytePreparing
}
func (pstr *NatsEE) parseOpts(opts *config.EventExporterOpts, nodeID string, connTimeout time.Duration) error {
if opts.NATS == nil {
return nil
}
if opts.NATS.JetStream != nil {
pstr.jetStream = *opts.NATS.JetStream
}
if opts.NATS.Subject != nil {
pstr.subject = *opts.NATS.Subject
}
var err error
pstr.opts, err = GetNatsOpts(opts.NATS, nodeID, connTimeout)
if err != nil {
return err
}
if pstr.jetStream && opts.NATS.JetStreamMaxWait != nil {
pstr.jsOpts = []nats.JSOpt{nats.MaxWait(*opts.NATS.JetStreamMaxWait)}
}
return nil
}
func (pstr *NatsEE) Cfg() *config.EventExporterCfg { return pstr.cfg }
func (pstr *NatsEE) Connect() error {
pstr.Lock()
defer pstr.Unlock()
if pstr.poster != nil {
return nil
}
var err error
pstr.poster, err = nats.Connect(pstr.Cfg().ExportPath, pstr.opts...)
if err != nil {
return err
}
if pstr.jetStream {
pstr.posterJS, err = pstr.poster.JetStream(pstr.jsOpts...)
}
return err
}
func (pstr *NatsEE) ExportEvent(content any, _ string) error {
pstr.reqs.get()
defer pstr.reqs.done()
pstr.RLock()
defer pstr.RUnlock()
if pstr.poster == nil {
return utils.ErrDisconnected
}
var err error
if pstr.jetStream {
_, err = pstr.posterJS.Publish(pstr.subject, content.([]byte))
} else {
err = pstr.poster.Publish(pstr.subject, content.([]byte))
}
return err
}
func (pstr *NatsEE) Close() error {
pstr.Lock()
defer pstr.Unlock()
if pstr.poster == nil {
return nil
}
err := pstr.poster.Drain()
pstr.poster = nil
return err
}
func (pstr *NatsEE) GetMetrics() *utils.SafeMapStorage { return pstr.dc }
func GetNatsOpts(opts *config.NATSOpts, nodeID string, connTimeout time.Duration) ([]nats.Option, error) {
natsOpts := make([]nats.Option, 0, 7)
natsOpts = append(natsOpts, nats.Name(utils.CGRateSLwr+nodeID),
nats.Timeout(connTimeout),
nats.DrainTimeout(time.Second))
if opts.JWTFile != nil {
keys := make([]string, 0, 1)
if opts.SeedFile != nil {
keys = append(keys, *opts.SeedFile)
}
natsOpts = append(natsOpts, nats.UserCredentials(*opts.JWTFile, keys...))
}
if opts.SeedFile != nil {
opt, err := nats.NkeyOptionFromSeed(*opts.SeedFile)
if err != nil {
return nil, err
}
natsOpts = append(natsOpts, opt)
}
switch {
case opts.ClientCertificate != nil && opts.ClientKey != nil:
natsOpts = append(natsOpts, nats.ClientCert(*opts.ClientCertificate, *opts.ClientKey))
case opts.ClientCertificate != nil:
return nil, fmt.Errorf("has certificate but no key")
case opts.ClientKey != nil:
return nil, fmt.Errorf("has key but no certificate")
}
if opts.CertificateAuthority != nil {
natsOpts = append(natsOpts,
func(o *nats.Options) error {
pool, err := x509.SystemCertPool()
if err != nil {
return err
}
rootPEM, err := os.ReadFile(*opts.CertificateAuthority)
if err != nil || rootPEM == nil {
return fmt.Errorf("nats: error loading or parsing rootCA file: %v", err)
}
ok := pool.AppendCertsFromPEM(rootPEM)
if !ok {
return fmt.Errorf("nats: failed to parse root certificate from %q",
*opts.CertificateAuthority)
}
if o.TLSConfig == nil {
o.TLSConfig = &tls.Config{MinVersion: tls.VersionTLS12}
}
o.TLSConfig.RootCAs = pool
o.Secure = true
return nil
})
}
return natsOpts, nil
}