Merge pull request #12182 from SergeTupchiy/EMQX-11596-convert-otel-exporter-certs
EMQX-11596 convert otel exporter certs
This commit is contained in:
commit
c5123e8cf7
|
@ -25,8 +25,6 @@
|
|||
|
||||
-callback end_trace_send(emqx_types:packet() | [emqx_types:packet()]) -> ok.
|
||||
|
||||
-callback event(EventName :: term(), Attributes :: term()) -> ok.
|
||||
|
||||
-type channel_info() :: #{atom() => _}.
|
||||
|
||||
-export([
|
||||
|
@ -35,9 +33,7 @@
|
|||
unregister_provider/1,
|
||||
trace_process_publish/3,
|
||||
start_trace_send/2,
|
||||
end_trace_send/1,
|
||||
event/1,
|
||||
event/2
|
||||
end_trace_send/1
|
||||
]).
|
||||
|
||||
-export_type([channel_info/0]).
|
||||
|
@ -79,6 +75,7 @@ unregister_provider(Module) ->
|
|||
-spec provider() -> module() | undefined.
|
||||
provider() ->
|
||||
persistent_term:get(?PROVIDER, undefined).
|
||||
|
||||
%%--------------------------------------------------------------------
|
||||
%% trace API
|
||||
%%--------------------------------------------------------------------
|
||||
|
@ -99,13 +96,6 @@ start_trace_send(Delivers, ChannelInfo) ->
|
|||
end_trace_send(Packets) ->
|
||||
?with_provider(?FUNCTION_NAME(Packets), ok).
|
||||
|
||||
event(Name) ->
|
||||
event(Name, #{}).
|
||||
|
||||
-spec event(term(), term()) -> ok.
|
||||
event(Name, Attributes) ->
|
||||
?with_provider(?FUNCTION_NAME(Name, Attributes), ok).
|
||||
|
||||
%%--------------------------------------------------------------------
|
||||
%% Internal functions
|
||||
%%--------------------------------------------------------------------
|
||||
|
|
|
@ -17,14 +17,17 @@
|
|||
|
||||
-behaviour(emqx_config_handler).
|
||||
|
||||
-include_lib("emqx/include/logger.hrl").
|
||||
|
||||
-define(OPTL, [opentelemetry]).
|
||||
-define(CERTS_PATH, filename:join(["opentelemetry", "exporter"])).
|
||||
|
||||
-define(OTEL_EXPORTER, opentelemetry_exporter).
|
||||
-define(OTEL_LOG_HANDLER, otel_log_handler).
|
||||
-define(OTEL_LOG_HANDLER_ID, opentelemetry_handler).
|
||||
|
||||
-export([add_handler/0, remove_handler/0]).
|
||||
-export([post_config_update/5]).
|
||||
-export([pre_config_update/3, post_config_update/5]).
|
||||
-export([update/1]).
|
||||
-export([add_otel_log_handler/0, remove_otel_log_handler/0]).
|
||||
-export([otel_exporter/1]).
|
||||
|
@ -51,6 +54,11 @@ remove_handler() ->
|
|||
ok = emqx_config_handler:remove_handler(?OPTL),
|
||||
ok.
|
||||
|
||||
pre_config_update(?OPTL, RawConf, RawConf) ->
|
||||
{ok, RawConf};
|
||||
pre_config_update(?OPTL, NewRawConf, _RawConf) ->
|
||||
{ok, convert_certs(NewRawConf)}.
|
||||
|
||||
post_config_update(?OPTL, _Req, Old, Old, _AppEnvs) ->
|
||||
ok;
|
||||
post_config_update(?OPTL, _Req, New, Old, AppEnvs) ->
|
||||
|
@ -85,6 +93,31 @@ otel_exporter(ExporterConf) ->
|
|||
|
||||
%% Internal functions
|
||||
|
||||
convert_certs(#{<<"exporter">> := ExporterConf} = NewRawConf) ->
|
||||
NewRawConf#{<<"exporter">> => convert_exporter_certs(ExporterConf)};
|
||||
convert_certs(#{exporter := ExporterConf} = NewRawConf) ->
|
||||
NewRawConf#{exporter => convert_exporter_certs(ExporterConf)};
|
||||
convert_certs(NewRawConf) ->
|
||||
NewRawConf.
|
||||
|
||||
convert_exporter_certs(#{<<"ssl_options">> := SSLOpts} = ExporterConf) ->
|
||||
ExporterConf#{<<"ssl_options">> => do_convert_certs(SSLOpts)};
|
||||
convert_exporter_certs(#{ssl_options := SSLOpts} = ExporterConf) ->
|
||||
ExporterConf#{ssl_options => do_convert_certs(SSLOpts)};
|
||||
convert_exporter_certs(ExporterConf) ->
|
||||
ExporterConf.
|
||||
|
||||
do_convert_certs(SSLOpts) ->
|
||||
case emqx_tls_lib:ensure_ssl_files(?CERTS_PATH, SSLOpts) of
|
||||
{ok, undefined} ->
|
||||
SSLOpts;
|
||||
{ok, SSLOpts1} ->
|
||||
SSLOpts1;
|
||||
{error, Reason} ->
|
||||
?SLOG(error, Reason#{msg => "bad_ssl_config", name => "opentelemetry_exporter"}),
|
||||
throw({bad_ssl_config, Reason})
|
||||
end.
|
||||
|
||||
ensure_otel_metrics(
|
||||
#{metrics := MetricsConf, exporter := Exporter},
|
||||
#{metrics := MetricsConf, exporter := Exporter}
|
||||
|
|
|
@ -28,8 +28,7 @@
|
|||
-export([
|
||||
trace_process_publish/3,
|
||||
start_trace_send/2,
|
||||
end_trace_send/1,
|
||||
event/2
|
||||
end_trace_send/1
|
||||
]).
|
||||
|
||||
-include_lib("emqx/include/emqx.hrl").
|
||||
|
@ -37,7 +36,6 @@
|
|||
-include_lib("opentelemetry_api/include/otel_tracer.hrl").
|
||||
|
||||
-define(EMQX_OTEL_CTX, otel_ctx).
|
||||
-define(IS_ENABLED, emqx_enable).
|
||||
-define(USER_PROPERTY, 'User-Property').
|
||||
|
||||
-define(TRACE_ALL_KEY, {?MODULE, trace_all}).
|
||||
|
@ -103,12 +101,11 @@ trace_process_publish(Packet, ChannelInfo, ProcessFun) ->
|
|||
false ->
|
||||
ProcessFun(Packet);
|
||||
RootCtx ->
|
||||
RootCtx1 = otel_ctx:set_value(RootCtx, ?IS_ENABLED, true),
|
||||
Attrs = maps:merge(packet_attributes(Packet), channel_attributes(ChannelInfo)),
|
||||
SpanCtx = otel_tracer:start_span(RootCtx1, ?current_tracer, process_message, #{
|
||||
SpanCtx = otel_tracer:start_span(RootCtx, ?current_tracer, process_message, #{
|
||||
attributes => Attrs
|
||||
}),
|
||||
Ctx = otel_tracer:set_current_span(RootCtx1, SpanCtx),
|
||||
Ctx = otel_tracer:set_current_span(RootCtx, SpanCtx),
|
||||
%% put ctx to packet, so it can be further propagated
|
||||
Packet1 = put_ctx_to_packet(Ctx, Packet),
|
||||
_ = otel_ctx:attach(Ctx),
|
||||
|
@ -159,17 +156,6 @@ end_trace_send(Packets) ->
|
|||
packets_list(Packets)
|
||||
).
|
||||
|
||||
%% NOTE: adds an event only within an active span (Otel Ctx must be set in the calling process dict)
|
||||
-spec event(opentelemetry:event_name(), opentelemetry:attributes_map()) -> ok.
|
||||
event(Name, Attributes) ->
|
||||
case otel_ctx:get_value(?IS_ENABLED, false) of
|
||||
true ->
|
||||
?add_event(Name, Attributes),
|
||||
ok;
|
||||
false ->
|
||||
ok
|
||||
end.
|
||||
|
||||
%%--------------------------------------------------------------------
|
||||
%% Internal functions
|
||||
%%--------------------------------------------------------------------
|
||||
|
|
|
@ -25,6 +25,29 @@
|
|||
-define(OTEL_API_PATH, emqx_mgmt_api_test_util:api_path(["opentelemetry"])).
|
||||
-define(CONF_PATH, [opentelemetry]).
|
||||
|
||||
-define(CACERT, <<
|
||||
"-----BEGIN CERTIFICATE-----\n"
|
||||
"MIIDUTCCAjmgAwIBAgIJAPPYCjTmxdt/MA0GCSqGSIb3DQEBCwUAMD8xCzAJBgNV\n"
|
||||
"BAYTAkNOMREwDwYDVQQIDAhoYW5nemhvdTEMMAoGA1UECgwDRU1RMQ8wDQYDVQQD\n"
|
||||
"DAZSb290Q0EwHhcNMjAwNTA4MDgwNjUyWhcNMzAwNTA2MDgwNjUyWjA/MQswCQYD\n"
|
||||
"VQQGEwJDTjERMA8GA1UECAwIaGFuZ3pob3UxDDAKBgNVBAoMA0VNUTEPMA0GA1UE\n"
|
||||
"AwwGUm9vdENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzcgVLex1\n"
|
||||
"EZ9ON64EX8v+wcSjzOZpiEOsAOuSXOEN3wb8FKUxCdsGrsJYB7a5VM/Jot25Mod2\n"
|
||||
"juS3OBMg6r85k2TWjdxUoUs+HiUB/pP/ARaaW6VntpAEokpij/przWMPgJnBF3Ur\n"
|
||||
"MjtbLayH9hGmpQrI5c2vmHQ2reRZnSFbY+2b8SXZ+3lZZgz9+BaQYWdQWfaUWEHZ\n"
|
||||
"uDaNiViVO0OT8DRjCuiDp3yYDj3iLWbTA/gDL6Tf5XuHuEwcOQUrd+h0hyIphO8D\n"
|
||||
"tsrsHZ14j4AWYLk1CPA6pq1HIUvEl2rANx2lVUNv+nt64K/Mr3RnVQd9s8bK+TXQ\n"
|
||||
"KGHd2Lv/PALYuwIDAQABo1AwTjAdBgNVHQ4EFgQUGBmW+iDzxctWAWxmhgdlE8Pj\n"
|
||||
"EbQwHwYDVR0jBBgwFoAUGBmW+iDzxctWAWxmhgdlE8PjEbQwDAYDVR0TBAUwAwEB\n"
|
||||
"/zANBgkqhkiG9w0BAQsFAAOCAQEAGbhRUjpIred4cFAFJ7bbYD9hKu/yzWPWkMRa\n"
|
||||
"ErlCKHmuYsYk+5d16JQhJaFy6MGXfLgo3KV2itl0d+OWNH0U9ULXcglTxy6+njo5\n"
|
||||
"CFqdUBPwN1jxhzo9yteDMKF4+AHIxbvCAJa17qcwUKR5MKNvv09C6pvQDJLzid7y\n"
|
||||
"E2dkgSuggik3oa0427KvctFf8uhOV94RvEDyqvT5+pgNYZ2Yfga9pD/jjpoHEUlo\n"
|
||||
"88IGU8/wJCx3Ds2yc8+oBg/ynxG8f/HmCC1ET6EHHoe2jlo8FpU/SgGtghS1YL30\n"
|
||||
"IWxNsPrUP+XsZpBJy/mvOhE5QXo6Y35zDqqj8tI7AGmAWu22jg==\n"
|
||||
"-----END CERTIFICATE-----"
|
||||
>>).
|
||||
|
||||
all() ->
|
||||
emqx_common_test_helpers:all(?MODULE).
|
||||
|
||||
|
@ -250,3 +273,23 @@ t_put_valid(Config) ->
|
|||
%% alias check
|
||||
?assertEqual(15_321, emqx:get_config(?CONF_PATH ++ [metrics, interval]))
|
||||
).
|
||||
|
||||
t_put_cert(Config) ->
|
||||
Auth = ?config(auth, Config),
|
||||
Path = ?OTEL_API_PATH,
|
||||
SSL = #{<<"enable">> => true, <<"cacertfile">> => ?CACERT},
|
||||
SSLDisabled = #{<<"enable">> => false, <<"cacertfile">> => ?CACERT},
|
||||
Conf = #{<<"exporter">> => #{<<"ssl_options">> => SSL}},
|
||||
Conf1 = #{<<"exporter">> => #{<<"ssl_options">> => SSLDisabled}},
|
||||
{ok, Body} = emqx_mgmt_api_test_util:request_api(put, Path, "", Auth, Conf),
|
||||
#{<<"exporter">> := #{<<"ssl_options">> := #{<<"cacertfile">> := CaFile}}} = emqx_utils_json:decode(
|
||||
Body
|
||||
),
|
||||
ct:pal("CA certfile: ~p", [CaFile]),
|
||||
?assert(filelib:is_file(CaFile)),
|
||||
{ok, Body1} = emqx_mgmt_api_test_util:request_api(put, Path, "", Auth, Conf1),
|
||||
#{<<"exporter">> := #{<<"ssl_options">> := #{<<"cacertfile">> := CaFile1}}} = emqx_utils_json:decode(
|
||||
Body1
|
||||
),
|
||||
ct:pal("CA certfile1: ~p", [CaFile1]),
|
||||
?assertNot(filelib:is_file(CaFile1)).
|
||||
|
|
Loading…
Reference in New Issue