Files
cgrates/ees/nats.go
2021-09-07 07:44:10 +02:00

189 lines
5.2 KiB
Go

/*
Real-time Online/Offline Charging System (OerS) for Telecom & ISP environments
Copyright (C) ITsysCOM GmbH
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>
*/
package ees
import (
"crypto/tls"
"crypto/x509"
"fmt"
"io/ioutil"
"sync"
"time"
"github.com/cgrates/birpc/context"
"github.com/cgrates/cgrates/config"
"github.com/cgrates/cgrates/utils"
"github.com/nats-io/nats.go"
)
// NewNatsEE creates a kafka poster
func NewNatsEE(cfg *config.EventExporterCfg, nodeID string, connTimeout time.Duration, dc *utils.SafeMapStorage) (natsPstr *NatsEE, err error) {
natsPstr = &NatsEE{
cfg: cfg,
dc: dc,
subject: utils.DefaultQueueID,
reqs: newConcReq(cfg.ConcurrentRequests),
}
err = natsPstr.parseOpt(cfg.Opts, nodeID, connTimeout)
return
}
// NatsEE is a kafka poster
type NatsEE struct {
subject string // identifier of the CDR queue where we publish
jetStream bool
opts []nats.Option
jsOpts []nats.JSOpt
poster *nats.Conn
posterJS nats.JetStreamContext
cfg *config.EventExporterCfg
dc *utils.SafeMapStorage
reqs *concReq
sync.RWMutex // protect writer
bytePreparing
}
func (pstr *NatsEE) parseOpt(opts map[string]interface{}, nodeID string, connTimeout time.Duration) (err error) {
if useJetStreamVal, has := opts[utils.NatsJetStream]; has {
if pstr.jetStream, err = utils.IfaceAsBool(useJetStreamVal); err != nil {
return
}
}
pstr.subject = utils.DefaultQueueID
if vals, has := opts[utils.NatsSubject]; has {
pstr.subject = utils.IfaceAsString(vals)
}
pstr.opts, err = GetNatsOpts(opts, nodeID, connTimeout)
if pstr.jetStream {
if maxWaitVal, has := opts[utils.NatsJetStreamMaxWait]; has {
var maxWait time.Duration
if maxWait, err = utils.IfaceAsDuration(maxWaitVal); err != nil {
return
}
pstr.jsOpts = []nats.JSOpt{nats.MaxWait(maxWait)}
}
}
return
}
func (pstr *NatsEE) Cfg() *config.EventExporterCfg { return pstr.cfg }
func (pstr *NatsEE) Connect() (err error) {
pstr.Lock()
defer pstr.Unlock()
if pstr.poster == nil {
if pstr.poster, err = nats.Connect(pstr.Cfg().ExportPath, pstr.opts...); err != nil {
return
}
if pstr.jetStream {
pstr.posterJS, err = pstr.poster.JetStream(pstr.jsOpts...)
}
}
return
}
func (pstr *NatsEE) ExportEvent(ctx *context.Context, content interface{}, _ string) (err error) {
pstr.reqs.get()
pstr.RLock()
if pstr.poster == nil {
pstr.RUnlock()
pstr.reqs.done()
return utils.ErrDisconnected
}
if pstr.jetStream {
_, err = pstr.posterJS.Publish(pstr.subject, content.([]byte), nats.Context(ctx))
} else {
err = pstr.poster.Publish(pstr.subject, content.([]byte))
}
pstr.RUnlock()
pstr.reqs.done()
return
}
func (pstr *NatsEE) Close() (err error) {
pstr.Lock()
if pstr.poster != nil {
err = pstr.poster.Drain()
pstr.poster = nil
}
pstr.Unlock()
return
}
func (pstr *NatsEE) GetMetrics() *utils.SafeMapStorage { return pstr.dc }
func GetNatsOpts(opts map[string]interface{}, nodeID string, connTimeout time.Duration) (nop []nats.Option, err error) {
nop = make([]nats.Option, 0, 7)
nop = append(nop, nats.Name(utils.CGRateSLwr+nodeID),
nats.Timeout(connTimeout),
nats.DrainTimeout(time.Second))
if userFile, has := opts[utils.NatsJWTFile]; has {
keys := make([]string, 0, 1)
if keyFile, has := opts[utils.NatsSeedFile]; has {
keys = append(keys, utils.IfaceAsString(keyFile))
}
nop = append(nop, nats.UserCredentials(utils.IfaceAsString(userFile), keys...))
}
if nkeyFile, has := opts[utils.NatsSeedFile]; has {
opt, err := nats.NkeyOptionFromSeed(utils.IfaceAsString(nkeyFile))
if err != nil {
return nil, err
}
nop = append(nop, opt)
}
if certFile, has := opts[utils.NatsClientCertificate]; has {
clientFile, has := opts[utils.NatsClientKey]
if !has {
err = fmt.Errorf("has certificate but no key")
return
}
nop = append(nop, nats.ClientCert(utils.IfaceAsString(certFile), utils.IfaceAsString(clientFile)))
} else if _, has := opts[utils.NatsClientKey]; has {
err = fmt.Errorf("has key but no certificate")
return
}
if caFile, has := opts[utils.NatsCertificateAuthority]; has {
nop = append(nop,
func(o *nats.Options) error {
pool, err := x509.SystemCertPool()
if err != nil {
return err
}
rootPEM, err := ioutil.ReadFile(utils.IfaceAsString(caFile))
if err != nil || rootPEM == nil {
return fmt.Errorf("nats: error loading or parsing rootCA file: %v", err)
}
ok := pool.AppendCertsFromPEM(rootPEM)
if !ok {
return fmt.Errorf("nats: failed to parse root certificate from %q", caFile)
}
if o.TLSConfig == nil {
o.TLSConfig = &tls.Config{MinVersion: tls.VersionTLS12}
}
o.TLSConfig.RootCAs = pool
o.Secure = true
return nil
})
}
return
}