|
|
|
/*
|
|
|
|
* MinIO Cloud Storage, (C) 2018 MinIO, Inc.
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package target
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
|
|
|
"net/url"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
|
|
|
|
"github.com/minio/minio/pkg/event"
|
|
|
|
xnet "github.com/minio/minio/pkg/net"
|
|
|
|
"github.com/nats-io/nats.go"
|
|
|
|
"github.com/nats-io/stan.go"
|
|
|
|
)
|
|
|
|
|
|
|
|
// NATS related constants
|
|
|
|
const (
|
|
|
|
NATSAddress = "address"
|
|
|
|
NATSSubject = "subject"
|
|
|
|
NATSUsername = "username"
|
|
|
|
NATSPassword = "password"
|
|
|
|
NATSToken = "token"
|
|
|
|
NATSTLS = "tls"
|
|
|
|
NATSTLSSkipVerify = "tls_skip_verify"
|
|
|
|
NATSPingInterval = "ping_interval"
|
|
|
|
NATSQueueDir = "queue_dir"
|
|
|
|
NATSQueueLimit = "queue_limit"
|
|
|
|
NATSCertAuthority = "cert_authority"
|
|
|
|
NATSClientCert = "client_cert"
|
|
|
|
NATSClientKey = "client_key"
|
|
|
|
|
|
|
|
// Streaming constants
|
|
|
|
NATSStreaming = "streaming"
|
|
|
|
NATSStreamingClusterID = "streaming_cluster_id"
|
|
|
|
NATSStreamingAsync = "streaming_async"
|
|
|
|
NATSStreamingMaxPubAcksInFlight = "streaming_max_pub_acks_in_flight"
|
|
|
|
|
|
|
|
EnvNATSEnable = "MINIO_NOTIFY_NATS_ENABLE"
|
|
|
|
EnvNATSAddress = "MINIO_NOTIFY_NATS_ADDRESS"
|
|
|
|
EnvNATSSubject = "MINIO_NOTIFY_NATS_SUBJECT"
|
|
|
|
EnvNATSUsername = "MINIO_NOTIFY_NATS_USERNAME"
|
|
|
|
EnvNATSPassword = "MINIO_NOTIFY_NATS_PASSWORD"
|
|
|
|
EnvNATSToken = "MINIO_NOTIFY_NATS_TOKEN"
|
|
|
|
EnvNATSTLS = "MINIO_NOTIFY_NATS_TLS"
|
|
|
|
EnvNATSTLSSkipVerify = "MINIO_NOTIFY_NATS_TLS_SKIP_VERIFY"
|
|
|
|
EnvNATSPingInterval = "MINIO_NOTIFY_NATS_PING_INTERVAL"
|
|
|
|
EnvNATSQueueDir = "MINIO_NOTIFY_NATS_QUEUE_DIR"
|
|
|
|
EnvNATSQueueLimit = "MINIO_NOTIFY_NATS_QUEUE_LIMIT"
|
|
|
|
EnvNATSCertAuthority = "MINIO_NOTIFY_NATS_CERT_AUTHORITY"
|
|
|
|
EnvNATSClientCert = "MINIO_NOTIFY_NATS_CLIENT_CERT"
|
|
|
|
EnvNATSClientKey = "MINIO_NOTIFY_NATS_CLIENT_KEY"
|
|
|
|
|
|
|
|
// Streaming constants
|
|
|
|
EnvNATSStreaming = "MINIO_NOTIFY_NATS_STREAMING"
|
|
|
|
EnvNATSStreamingClusterID = "MINIO_NOTIFY_NATS_STREAMING_CLUSTER_ID"
|
|
|
|
EnvNATSStreamingAsync = "MINIO_NOTIFY_NATS_STREAMING_ASYNC"
|
|
|
|
EnvNATSStreamingMaxPubAcksInFlight = "MINIO_NOTIFY_NATS_STREAMING_MAX_PUB_ACKS_IN_FLIGHT"
|
|
|
|
)
|
|
|
|
|
|
|
|
// NATSArgs - NATS target arguments.
|
|
|
|
type NATSArgs struct {
|
|
|
|
Enable bool `json:"enable"`
|
|
|
|
Address xnet.Host `json:"address"`
|
|
|
|
Subject string `json:"subject"`
|
|
|
|
Username string `json:"username"`
|
|
|
|
Password string `json:"password"`
|
|
|
|
Token string `json:"token"`
|
|
|
|
TLS bool `json:"tls"`
|
|
|
|
TLSSkipVerify bool `json:"tlsSkipVerify"`
|
|
|
|
Secure bool `json:"secure"`
|
|
|
|
CertAuthority string `json:"certAuthority"`
|
|
|
|
ClientCert string `json:"clientCert"`
|
|
|
|
ClientKey string `json:"clientKey"`
|
|
|
|
PingInterval int64 `json:"pingInterval"`
|
|
|
|
QueueDir string `json:"queueDir"`
|
|
|
|
QueueLimit uint64 `json:"queueLimit"`
|
|
|
|
Streaming struct {
|
|
|
|
Enable bool `json:"enable"`
|
|
|
|
ClusterID string `json:"clusterID"`
|
|
|
|
Async bool `json:"async"`
|
|
|
|
MaxPubAcksInflight int `json:"maxPubAcksInflight"`
|
|
|
|
} `json:"streaming"`
|
|
|
|
|
|
|
|
RootCAs *x509.CertPool `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate NATSArgs fields
|
|
|
|
func (n NATSArgs) Validate() error {
|
|
|
|
if !n.Enable {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if n.Address.IsEmpty() {
|
|
|
|
return errors.New("empty address")
|
|
|
|
}
|
|
|
|
|
|
|
|
if n.Subject == "" {
|
|
|
|
return errors.New("empty subject")
|
|
|
|
}
|
|
|
|
|
|
|
|
if n.ClientCert != "" && n.ClientKey == "" || n.ClientCert == "" && n.ClientKey != "" {
|
|
|
|
return errors.New("cert and key must be specified as a pair")
|
|
|
|
}
|
|
|
|
|
|
|
|
if n.Username != "" && n.Password == "" || n.Username == "" && n.Password != "" {
|
|
|
|
return errors.New("username and password must be specified as a pair")
|
|
|
|
}
|
|
|
|
|
|
|
|
if n.Streaming.Enable {
|
|
|
|
if n.Streaming.ClusterID == "" {
|
|
|
|
return errors.New("empty cluster id")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if n.QueueDir != "" {
|
|
|
|
if !filepath.IsAbs(n.QueueDir) {
|
|
|
|
return errors.New("queueDir path should be absolute")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if n.QueueLimit > 10000 {
|
|
|
|
return errors.New("queueLimit should not exceed 10000")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// To obtain a nats connection from args.
|
|
|
|
func (n NATSArgs) connectNats() (*nats.Conn, error) {
|
|
|
|
connOpts := []nats.Option{nats.Name("Minio Notification")}
|
|
|
|
if n.Username != "" && n.Password != "" {
|
|
|
|
connOpts = append(connOpts, nats.UserInfo(n.Username, n.Password))
|
|
|
|
}
|
|
|
|
if n.Token != "" {
|
|
|
|
connOpts = append(connOpts, nats.Token(n.Token))
|
|
|
|
}
|
|
|
|
if n.Secure || n.TLS && n.TLSSkipVerify {
|
|
|
|
connOpts = append(connOpts, nats.Secure(nil))
|
|
|
|
} else if n.TLS {
|
|
|
|
connOpts = append(connOpts, nats.Secure(&tls.Config{RootCAs: n.RootCAs}))
|
|
|
|
}
|
|
|
|
if n.CertAuthority != "" {
|
|
|
|
connOpts = append(connOpts, nats.RootCAs(n.CertAuthority))
|
|
|
|
}
|
|
|
|
if n.ClientCert != "" && n.ClientKey != "" {
|
|
|
|
connOpts = append(connOpts, nats.ClientCert(n.ClientCert, n.ClientKey))
|
|
|
|
}
|
|
|
|
return nats.Connect(n.Address.String(), connOpts...)
|
|
|
|
}
|
|
|
|
|
|
|
|
// To obtain a streaming connection from args.
|
|
|
|
func (n NATSArgs) connectStan() (stan.Conn, error) {
|
|
|
|
scheme := "nats"
|
|
|
|
if n.Secure {
|
|
|
|
scheme = "tls"
|
|
|
|
}
|
|
|
|
|
|
|
|
var addressURL string
|
|
|
|
if n.Username != "" && n.Password != "" {
|
|
|
|
addressURL = scheme + "://" + n.Username + ":" + n.Password + "@" + n.Address.String()
|
|
|
|
} else if n.Token != "" {
|
|
|
|
addressURL = scheme + "://" + n.Token + "@" + n.Address.String()
|
|
|
|
} else {
|
|
|
|
addressURL = scheme + "://" + n.Address.String()
|
|
|
|
}
|
|
|
|
|
|
|
|
clientID, err := getNewUUID()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
connOpts := []stan.Option{stan.NatsURL(addressURL)}
|
|
|
|
if n.Streaming.MaxPubAcksInflight > 0 {
|
|
|
|
connOpts = append(connOpts, stan.MaxPubAcksInflight(n.Streaming.MaxPubAcksInflight))
|
|
|
|
}
|
|
|
|
|
|
|
|
return stan.Connect(n.Streaming.ClusterID, clientID, connOpts...)
|
|
|
|
}
|
|
|
|
|
|
|
|
// NATSTarget - NATS target.
|
|
|
|
type NATSTarget struct {
|
|
|
|
id event.TargetID
|
|
|
|
args NATSArgs
|
|
|
|
natsConn *nats.Conn
|
|
|
|
stanConn stan.Conn
|
|
|
|
store Store
|
|
|
|
loggerOnce func(ctx context.Context, err error, id interface{}, errKind ...interface{})
|
|
|
|
}
|
|
|
|
|
|
|
|
// ID - returns target ID.
|
|
|
|
func (target *NATSTarget) ID() event.TargetID {
|
|
|
|
return target.id
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsActive - Return true if target is up and active
|
|
|
|
func (target *NATSTarget) IsActive() (bool, error) {
|
|
|
|
var connErr error
|
|
|
|
if target.args.Streaming.Enable {
|
|
|
|
if target.stanConn == nil || target.stanConn.NatsConn() == nil {
|
|
|
|
target.stanConn, connErr = target.args.connectStan()
|
|
|
|
} else {
|
|
|
|
if !target.stanConn.NatsConn().IsConnected() {
|
|
|
|
return false, errNotConnected
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if target.natsConn == nil {
|
|
|
|
target.natsConn, connErr = target.args.connectNats()
|
|
|
|
} else {
|
|
|
|
if !target.natsConn.IsConnected() {
|
|
|
|
return false, errNotConnected
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if connErr != nil {
|
|
|
|
if connErr.Error() == nats.ErrNoServers.Error() {
|
|
|
|
return false, errNotConnected
|
|
|
|
}
|
|
|
|
return false, connErr
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Save - saves the events to the store which will be replayed when the Nats connection is active.
|
|
|
|
func (target *NATSTarget) Save(eventData event.Event) error {
|
|
|
|
if target.store != nil {
|
|
|
|
return target.store.Put(eventData)
|
|
|
|
}
|
|
|
|
_, err := target.IsActive()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return target.send(eventData)
|
|
|
|
}
|
|
|
|
|
|
|
|
// send - sends an event to the Nats.
|
|
|
|
func (target *NATSTarget) send(eventData event.Event) error {
|
|
|
|
objectName, err := url.QueryUnescape(eventData.S3.Object.Key)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
key := eventData.S3.Bucket.Name + "/" + objectName
|
|
|
|
|
|
|
|
data, err := json.Marshal(event.Log{EventName: eventData.EventName, Key: key, Records: []event.Event{eventData}})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if target.stanConn != nil {
|
|
|
|
if target.args.Streaming.Async {
|
|
|
|
_, err = target.stanConn.PublishAsync(target.args.Subject, data, nil)
|
|
|
|
} else {
|
|
|
|
err = target.stanConn.Publish(target.args.Subject, data)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
err = target.natsConn.Publish(target.args.Subject, data)
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send - sends event to Nats.
|
|
|
|
func (target *NATSTarget) Send(eventKey string) error {
|
|
|
|
_, err := target.IsActive()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
eventData, eErr := target.store.Get(eventKey)
|
|
|
|
if eErr != nil {
|
|
|
|
// The last event key in a successful batch will be sent in the channel atmost once by the replayEvents()
|
|
|
|
// Such events will not exist and wouldve been already been sent successfully.
|
|
|
|
if os.IsNotExist(eErr) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return eErr
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := target.send(eventData); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return target.store.Del(eventKey)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close - closes underneath connections to NATS server.
|
|
|
|
func (target *NATSTarget) Close() (err error) {
|
|
|
|
if target.stanConn != nil {
|
|
|
|
// closing the streaming connection does not close the provided NATS connection.
|
|
|
|
if target.stanConn.NatsConn() != nil {
|
|
|
|
target.stanConn.NatsConn().Close()
|
|
|
|
}
|
|
|
|
err = target.stanConn.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
if target.natsConn != nil {
|
|
|
|
target.natsConn.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewNATSTarget - creates new NATS target.
|
|
|
|
func NewNATSTarget(id string, args NATSArgs, doneCh <-chan struct{}, loggerOnce func(ctx context.Context, err error, id interface{}, kind ...interface{}), test bool) (*NATSTarget, error) {
|
|
|
|
var natsConn *nats.Conn
|
|
|
|
var stanConn stan.Conn
|
|
|
|
|
|
|
|
var err error
|
|
|
|
|
|
|
|
var store Store
|
|
|
|
|
|
|
|
target := &NATSTarget{
|
|
|
|
id: event.TargetID{ID: id, Name: "nats"},
|
|
|
|
args: args,
|
|
|
|
loggerOnce: loggerOnce,
|
|
|
|
}
|
|
|
|
|
|
|
|
if args.QueueDir != "" {
|
|
|
|
queueDir := filepath.Join(args.QueueDir, storePrefix+"-nats-"+id)
|
|
|
|
store = NewQueueStore(queueDir, args.QueueLimit)
|
|
|
|
if oErr := store.Open(); oErr != nil {
|
|
|
|
target.loggerOnce(context.Background(), oErr, target.ID())
|
|
|
|
return target, oErr
|
|
|
|
}
|
|
|
|
target.store = store
|
|
|
|
}
|
|
|
|
|
|
|
|
if args.Streaming.Enable {
|
|
|
|
stanConn, err = args.connectStan()
|
|
|
|
target.stanConn = stanConn
|
|
|
|
} else {
|
|
|
|
natsConn, err = args.connectNats()
|
|
|
|
target.natsConn = natsConn
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
if store == nil || err.Error() != nats.ErrNoServers.Error() {
|
|
|
|
target.loggerOnce(context.Background(), err, target.ID())
|
|
|
|
return target, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if target.store != nil && !test {
|
|
|
|
// Replays the events from the store.
|
|
|
|
eventKeyCh := replayEvents(target.store, doneCh, target.loggerOnce, target.ID())
|
|
|
|
// Start replaying events from the store.
|
|
|
|
go sendEvents(target, eventKeyCh, doneCh, target.loggerOnce)
|
|
|
|
}
|
|
|
|
|
|
|
|
return target, nil
|
|
|
|
}
|