Merge pull request #9564 from thalesmg/kafka-source-ee50

feat: implement kafka consumer (ee5.0)
This commit is contained in:
Thales Macedo Garitezi 2023-03-17 09:04:53 -03:00 committed by GitHub
commit cf1cce011b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
38 changed files with 3656 additions and 368 deletions

View File

@ -10,32 +10,34 @@ services:
networks: networks:
emqx_bridge: emqx_bridge:
ssl_cert_gen: ssl_cert_gen:
image: fredrikhgrelland/alpine-jdk11-openssl # see https://github.com/emqx/docker-images
image: ghcr.io/emqx/certgen:latest
container_name: ssl_cert_gen container_name: ssl_cert_gen
user: "${DOCKER_USER:-root}"
volumes: volumes:
- emqx-shared-secret:/var/lib/secret - /tmp/emqx-ci/emqx-shared-secret:/var/lib/secret
- ./kafka/generate-certs.sh:/bin/generate-certs.sh
entrypoint: /bin/sh
command: /bin/generate-certs.sh
kdc: kdc:
hostname: kdc.emqx.net hostname: kdc.emqx.net
image: ghcr.io/emqx/emqx-builder/5.0-28:1.13.4-24.3.4.2-2-ubuntu20.04 image: ghcr.io/emqx/emqx-builder/5.0-28:1.13.4-24.3.4.2-2-ubuntu20.04
container_name: kdc.emqx.net container_name: kdc.emqx.net
expose:
- 88 # kdc
- 749 # admin server
# ports:
# - 88:88
# - 749:749
networks: networks:
emqx_bridge: emqx_bridge:
volumes: volumes:
- emqx-shared-secret:/var/lib/secret - /tmp/emqx-ci/emqx-shared-secret:/var/lib/secret
- ./kerberos/krb5.conf:/etc/kdc/krb5.conf - ./kerberos/krb5.conf:/etc/kdc/krb5.conf
- ./kerberos/krb5.conf:/etc/krb5.conf - ./kerberos/krb5.conf:/etc/krb5.conf
- ./kerberos/run.sh:/usr/bin/run.sh - ./kerberos/run.sh:/usr/bin/run.sh
command: run.sh command: run.sh
kafka_1: kafka_1:
image: wurstmeister/kafka:2.13-2.7.0 image: wurstmeister/kafka:2.13-2.8.1
ports: # ports:
- "9092:9092" # - "9192-9195:9192-9195"
- "9093:9093"
- "9094:9094"
- "9095:9095"
container_name: kafka-1.emqx.net container_name: kafka-1.emqx.net
hostname: kafka-1.emqx.net hostname: kafka-1.emqx.net
depends_on: depends_on:
@ -48,9 +50,9 @@ services:
environment: environment:
KAFKA_BROKER_ID: 1 KAFKA_BROKER_ID: 1
KAFKA_ZOOKEEPER_CONNECT: zookeeper:2181 KAFKA_ZOOKEEPER_CONNECT: zookeeper:2181
KAFKA_LISTENERS: PLAINTEXT://:9092,SASL_PLAINTEXT://:9093,SSL://:9094,SASL_SSL://:9095 KAFKA_LISTENERS: PLAINTEXT://:9092,SASL_PLAINTEXT://:9093,SSL://:9094,SASL_SSL://:9095,LOCAL_PLAINTEXT://:9192,LOCAL_SASL_PLAINTEXT://:9193,LOCAL_SSL://:9194,LOCAL_SASL_SSL://:9195,TOXIPROXY_PLAINTEXT://:9292,TOXIPROXY_SASL_PLAINTEXT://:9293,TOXIPROXY_SSL://:9294,TOXIPROXY_SASL_SSL://:9295
KAFKA_ADVERTISED_LISTENERS: PLAINTEXT://kafka-1.emqx.net:9092,SASL_PLAINTEXT://kafka-1.emqx.net:9093,SSL://kafka-1.emqx.net:9094,SASL_SSL://kafka-1.emqx.net:9095 KAFKA_ADVERTISED_LISTENERS: PLAINTEXT://kafka-1.emqx.net:9092,SASL_PLAINTEXT://kafka-1.emqx.net:9093,SSL://kafka-1.emqx.net:9094,SASL_SSL://kafka-1.emqx.net:9095,LOCAL_PLAINTEXT://localhost:9192,LOCAL_SASL_PLAINTEXT://localhost:9193,LOCAL_SSL://localhost:9194,LOCAL_SASL_SSL://localhost:9195,TOXIPROXY_PLAINTEXT://toxiproxy.emqx.net:9292,TOXIPROXY_SASL_PLAINTEXT://toxiproxy.emqx.net:9293,TOXIPROXY_SSL://toxiproxy.emqx.net:9294,TOXIPROXY_SASL_SSL://toxiproxy.emqx.net:9295
KAFKA_LISTENER_SECURITY_PROTOCOL_MAP: PLAINTEXT:PLAINTEXT,SASL_PLAINTEXT:SASL_PLAINTEXT,SSL:SSL,SASL_SSL:SASL_SSL KAFKA_LISTENER_SECURITY_PROTOCOL_MAP: PLAINTEXT:PLAINTEXT,SASL_PLAINTEXT:SASL_PLAINTEXT,SSL:SSL,SASL_SSL:SASL_SSL,LOCAL_PLAINTEXT:PLAINTEXT,LOCAL_SASL_PLAINTEXT:SASL_PLAINTEXT,LOCAL_SSL:SSL,LOCAL_SASL_SSL:SASL_SSL,TOXIPROXY_PLAINTEXT:PLAINTEXT,TOXIPROXY_SASL_PLAINTEXT:SASL_PLAINTEXT,TOXIPROXY_SSL:SSL,TOXIPROXY_SASL_SSL:SASL_SSL
KAFKA_INTER_BROKER_LISTENER_NAME: PLAINTEXT KAFKA_INTER_BROKER_LISTENER_NAME: PLAINTEXT
KAFKA_SASL_ENABLED_MECHANISMS: PLAIN,SCRAM-SHA-256,SCRAM-SHA-512,GSSAPI KAFKA_SASL_ENABLED_MECHANISMS: PLAIN,SCRAM-SHA-256,SCRAM-SHA-512,GSSAPI
KAFKA_SASL_KERBEROS_SERVICE_NAME: kafka KAFKA_SASL_KERBEROS_SERVICE_NAME: kafka
@ -58,6 +60,7 @@ services:
KAFKA_OPTS: "-Djava.security.auth.login.config=/etc/kafka/jaas.conf" KAFKA_OPTS: "-Djava.security.auth.login.config=/etc/kafka/jaas.conf"
KAFKA_ALLOW_EVERYONE_IF_NO_ACL_FOUND: "true" KAFKA_ALLOW_EVERYONE_IF_NO_ACL_FOUND: "true"
KAFKA_CREATE_TOPICS_NG: test-topic-one-partition:1:1,test-topic-two-partitions:2:1,test-topic-three-partitions:3:1, KAFKA_CREATE_TOPICS_NG: test-topic-one-partition:1:1,test-topic-two-partitions:2:1,test-topic-three-partitions:3:1,
KAFKA_AUTO_CREATE_TOPICS_ENABLE: "true"
KAFKA_AUTHORIZER_CLASS_NAME: kafka.security.auth.SimpleAclAuthorizer KAFKA_AUTHORIZER_CLASS_NAME: kafka.security.auth.SimpleAclAuthorizer
KAFKA_SSL_TRUSTSTORE_LOCATION: /var/lib/secret/kafka.truststore.jks KAFKA_SSL_TRUSTSTORE_LOCATION: /var/lib/secret/kafka.truststore.jks
KAFKA_SSL_TRUSTSTORE_PASSWORD: password KAFKA_SSL_TRUSTSTORE_PASSWORD: password
@ -67,7 +70,7 @@ services:
networks: networks:
emqx_bridge: emqx_bridge:
volumes: volumes:
- emqx-shared-secret:/var/lib/secret - /tmp/emqx-ci/emqx-shared-secret:/var/lib/secret
- ./kafka/jaas.conf:/etc/kafka/jaas.conf - ./kafka/jaas.conf:/etc/kafka/jaas.conf
- ./kafka/kafka-entrypoint.sh:/bin/kafka-entrypoint.sh - ./kafka/kafka-entrypoint.sh:/bin/kafka-entrypoint.sh
- ./kerberos/krb5.conf:/etc/kdc/krb5.conf - ./kerberos/krb5.conf:/etc/kdc/krb5.conf

View File

@ -6,7 +6,10 @@ services:
image: ghcr.io/shopify/toxiproxy:2.5.0 image: ghcr.io/shopify/toxiproxy:2.5.0
restart: always restart: always
networks: networks:
- emqx_bridge emqx_bridge:
aliases:
- toxiproxy
- toxiproxy.emqx.net
volumes: volumes:
- "./toxiproxy.json:/config/toxiproxy.json" - "./toxiproxy.json:/config/toxiproxy.json"
ports: ports:

View File

@ -18,12 +18,12 @@ services:
- emqx_bridge - emqx_bridge
volumes: volumes:
- ../..:/emqx - ../..:/emqx
- emqx-shared-secret:/var/lib/secret - /tmp/emqx-ci/emqx-shared-secret:/var/lib/secret
- ./kerberos/krb5.conf:/etc/kdc/krb5.conf - ./kerberos/krb5.conf:/etc/kdc/krb5.conf
- ./kerberos/krb5.conf:/etc/krb5.conf - ./kerberos/krb5.conf:/etc/krb5.conf
working_dir: /emqx working_dir: /emqx
tty: true tty: true
user: "${UID_GID}" user: "${DOCKER_USER:-root}"
networks: networks:
emqx_bridge: emqx_bridge:
@ -37,6 +37,3 @@ networks:
gateway: 172.100.239.1 gateway: 172.100.239.1
- subnet: 2001:3200:3200::/64 - subnet: 2001:3200:3200::/64
gateway: 2001:3200:3200::1 gateway: 2001:3200:3200::1
volumes: # add this section
emqx-shared-secret: # does not need anything underneath this

View File

@ -1,46 +0,0 @@
#!/usr/bin/bash
set -euo pipefail
set -x
# Source https://github.com/zmstone/docker-kafka/blob/master/generate-certs.sh
HOST="*."
DAYS=3650
PASS="password"
cd /var/lib/secret/
# Delete old files
(rm ca.key ca.crt server.key server.csr server.crt client.key client.csr client.crt server.p12 kafka.keystore.jks kafka.truststore.jks 2>/dev/null || true)
ls
echo '== Generate self-signed server and client certificates'
echo '= generate CA'
openssl req -new -x509 -keyout ca.key -out ca.crt -days $DAYS -nodes -subj "/C=SE/ST=Stockholm/L=Stockholm/O=brod/OU=test/CN=$HOST"
echo '= generate server certificate request'
openssl req -newkey rsa:2048 -sha256 -keyout server.key -out server.csr -days "$DAYS" -nodes -subj "/C=SE/ST=Stockholm/L=Stockholm/O=brod/OU=test/CN=$HOST"
echo '= sign server certificate'
openssl x509 -req -CA ca.crt -CAkey ca.key -in server.csr -out server.crt -days "$DAYS" -CAcreateserial
echo '= generate client certificate request'
openssl req -newkey rsa:2048 -sha256 -keyout client.key -out client.csr -days "$DAYS" -nodes -subj "/C=SE/ST=Stockholm/L=Stockholm/O=brod/OU=test/CN=$HOST"
echo '== sign client certificate'
openssl x509 -req -CA ca.crt -CAkey ca.key -in client.csr -out client.crt -days $DAYS -CAserial ca.srl
echo '= Convert self-signed certificate to PKCS#12 format'
openssl pkcs12 -export -name "$HOST" -in server.crt -inkey server.key -out server.p12 -CAfile ca.crt -passout pass:"$PASS"
echo '= Import PKCS#12 into a java keystore'
echo $PASS | keytool -importkeystore -destkeystore kafka.keystore.jks -srckeystore server.p12 -srcstoretype pkcs12 -alias "$HOST" -storepass "$PASS"
echo '= Import CA into java truststore'
echo yes | keytool -keystore kafka.truststore.jks -alias CARoot -import -file ca.crt -storepass "$PASS"

View File

@ -17,6 +17,7 @@ timeout $TIMEOUT bash -c 'until [ -f /var/lib/secret/kafka.keytab ]; do sleep 1;
echo "+++++++ Wait until SSL certs are generated ++++++++" echo "+++++++ Wait until SSL certs are generated ++++++++"
timeout $TIMEOUT bash -c 'until [ -f /var/lib/secret/kafka.truststore.jks ]; do sleep 1; done' timeout $TIMEOUT bash -c 'until [ -f /var/lib/secret/kafka.truststore.jks ]; do sleep 1; done'
keytool -list -v -keystore /var/lib/secret/kafka.keystore.jks -storepass password
sleep 3 sleep 3

View File

@ -53,5 +53,29 @@
"listen": "0.0.0.0:8000", "listen": "0.0.0.0:8000",
"upstream": "dynamo:8000", "upstream": "dynamo:8000",
"enabled": true "enabled": true
},
{
"name": "kafka_plain",
"listen": "0.0.0.0:9292",
"upstream": "kafka-1.emqx.net:9292",
"enabled": true
},
{
"name": "kafka_sasl_plain",
"listen": "0.0.0.0:9293",
"upstream": "kafka-1.emqx.net:9293",
"enabled": true
},
{
"name": "kafka_ssl",
"listen": "0.0.0.0:9294",
"upstream": "kafka-1.emqx.net:9294",
"enabled": true
},
{
"name": "kafka_sasl_ssl",
"listen": "0.0.0.0:9295",
"upstream": "kafka-1.emqx.net:9295",
"enabled": true
} }
] ]

View File

@ -107,7 +107,7 @@ endef
$(foreach app,$(APPS),$(eval $(call gen-app-prop-target,$(app)))) $(foreach app,$(APPS),$(eval $(call gen-app-prop-target,$(app))))
.PHONY: ct-suite .PHONY: ct-suite
ct-suite: $(REBAR) ct-suite: $(REBAR) merge-config
ifneq ($(TESTCASE),) ifneq ($(TESTCASE),)
ifneq ($(GROUP),) ifneq ($(GROUP),)
$(REBAR) ct -v --readable=$(CT_READABLE) --name $(CT_NODE_NAME) --suite $(SUITE) --case $(TESTCASE) --group $(GROUP) $(REBAR) ct -v --readable=$(CT_READABLE) --name $(CT_NODE_NAME) --suite $(SUITE) --case $(TESTCASE) --group $(GROUP)

View File

@ -33,7 +33,7 @@
{emqx_http_lib, {git, "https://github.com/emqx/emqx_http_lib.git", {tag, "0.5.2"}}}, {emqx_http_lib, {git, "https://github.com/emqx/emqx_http_lib.git", {tag, "0.5.2"}}},
{pbkdf2, {git, "https://github.com/emqx/erlang-pbkdf2.git", {tag, "2.0.4"}}}, {pbkdf2, {git, "https://github.com/emqx/erlang-pbkdf2.git", {tag, "2.0.4"}}},
{recon, {git, "https://github.com/ferd/recon", {tag, "2.5.1"}}}, {recon, {git, "https://github.com/ferd/recon", {tag, "2.5.1"}}},
{snabbkaffe, {git, "https://github.com/kafka4beam/snabbkaffe.git", {tag, "1.0.0"}}} {snabbkaffe, {git, "https://github.com/kafka4beam/snabbkaffe.git", {tag, "1.0.7"}}}
]}. ]}.
{plugins, [{rebar3_proper, "0.12.1"}]}. {plugins, [{rebar3_proper, "0.12.1"}]}.

View File

@ -37,6 +37,7 @@
deps_path/2, deps_path/2,
flush/0, flush/0,
flush/1, flush/1,
load/1,
render_and_load_app_config/1, render_and_load_app_config/1,
render_and_load_app_config/2 render_and_load_app_config/2
]). ]).
@ -66,14 +67,16 @@
emqx_cluster/2, emqx_cluster/2,
start_epmd/0, start_epmd/0,
start_slave/2, start_slave/2,
stop_slave/1 stop_slave/1,
listener_port/2
]). ]).
-export([clear_screen/0]). -export([clear_screen/0]).
-export([with_mock/4]). -export([with_mock/4]).
-export([ -export([
on_exit/1, on_exit/1,
call_janitor/0 call_janitor/0,
call_janitor/1
]). ]).
%% Toxiproxy API %% Toxiproxy API
@ -587,6 +590,12 @@ ensure_quic_listener(Name, UdpPort, ExtraSettings) ->
%% Whether to execute `emqx_config:init_load(SchemaMod)` %% Whether to execute `emqx_config:init_load(SchemaMod)`
%% default: true %% default: true
load_schema => boolean(), load_schema => boolean(),
%% If we want to exercise the scenario where a node joins an
%% existing cluster where there has already been some
%% configuration changes (via cluster rpc), then we need to enable
%% autocluster so that the joining node will restart the
%% `emqx_conf' app and correctly catch up the config.
start_autocluster => boolean(),
%% Eval by emqx_config:put/2 %% Eval by emqx_config:put/2
conf => [{KeyPath :: list(), Val :: term()}], conf => [{KeyPath :: list(), Val :: term()}],
%% Fast option to config listener port %% Fast option to config listener port
@ -637,25 +646,53 @@ emqx_cluster(Specs0, CommonOpts) ->
%% Lower level starting API %% Lower level starting API
-spec start_slave(shortname(), node_opts()) -> nodename(). -spec start_slave(shortname(), node_opts()) -> nodename().
start_slave(Name, Opts) -> start_slave(Name, Opts) when is_list(Opts) ->
{ok, Node} = ct_slave:start( start_slave(Name, maps:from_list(Opts));
list_to_atom(atom_to_list(Name) ++ "@" ++ host()), start_slave(Name, Opts) when is_map(Opts) ->
[ SlaveMod = maps:get(peer_mod, Opts, ct_slave),
{kill_if_fail, true}, Node = node_name(Name),
{monitor_master, true}, DoStart =
{init_timeout, 10000}, fun() ->
{startup_timeout, 10000}, case SlaveMod of
{erl_flags, erl_flags()} ct_slave ->
] ct_slave:start(
), Node,
[
{kill_if_fail, true},
{monitor_master, true},
{init_timeout, 10000},
{startup_timeout, 10000},
{erl_flags, erl_flags()}
]
);
slave ->
slave:start_link(host(), Name, ebin_path())
end
end,
case DoStart() of
{ok, _} ->
ok;
{error, started_not_connected, _} ->
ok;
Other ->
throw(Other)
end,
pong = net_adm:ping(Node), pong = net_adm:ping(Node),
put_peer_mod(Node, SlaveMod),
setup_node(Node, Opts), setup_node(Node, Opts),
ok = snabbkaffe:forward_trace(Node),
Node. Node.
%% Node stopping %% Node stopping
stop_slave(Node) -> stop_slave(Node0) ->
ct_slave:stop(Node). Node = node_name(Node0),
SlaveMod = get_peer_mod(Node),
erase_peer_mod(Node),
case SlaveMod:stop(Node) of
ok -> ok;
{ok, _} -> ok;
{error, not_started, _} -> ok
end.
%% EPMD starting %% EPMD starting
start_epmd() -> start_epmd() ->
@ -693,9 +730,27 @@ setup_node(Node, Opts) when is_map(Opts) ->
{Type, listener_port(BasePort, Type)} {Type, listener_port(BasePort, Type)}
|| Type <- [tcp, ssl, ws, wss] || Type <- [tcp, ssl, ws, wss]
]), ]),
%% we need a fresh data dir for each peer node to avoid unintended
%% successes due to sharing of data in the cluster.
PrivDataDir = maps:get(priv_data_dir, Opts, "/tmp"),
%% If we want to exercise the scenario where a node joins an
%% existing cluster where there has already been some
%% configuration changes (via cluster rpc), then we need to enable
%% autocluster so that the joining node will restart the
%% `emqx_conf' app and correctly catch up the config.
StartAutocluster = maps:get(start_autocluster, Opts, false),
%% Load env before doing anything to avoid overriding %% Load env before doing anything to avoid overriding
[ok = rpc:call(Node, application, load, [App]) || App <- LoadApps], lists:foreach(fun(App) -> rpc:call(Node, ?MODULE, load, [App]) end, LoadApps),
%% Ensure a clean mnesia directory for each run to avoid
%% inter-test flakiness.
MnesiaDataDir = filename:join([
PrivDataDir,
node(),
integer_to_list(erlang:unique_integer()),
"mnesia"
]),
erpc:call(Node, application, set_env, [mnesia, dir, MnesiaDataDir]),
%% Needs to be set explicitly because ekka:start() (which calls `gen`) is called without Handler %% Needs to be set explicitly because ekka:start() (which calls `gen`) is called without Handler
%% in emqx_common_test_helpers:start_apps(...) %% in emqx_common_test_helpers:start_apps(...)
@ -721,7 +776,19 @@ setup_node(Node, Opts) when is_map(Opts) ->
%% Otherwise, configuration gets loaded and all preset env in EnvHandler is lost %% Otherwise, configuration gets loaded and all preset env in EnvHandler is lost
LoadSchema andalso LoadSchema andalso
begin begin
%% to avoid sharing data between executions and/or
%% nodes. these variables might notbe in the
%% config file (e.g.: emqx_ee_conf_schema).
NodeDataDir = filename:join([
PrivDataDir,
node(),
integer_to_list(erlang:unique_integer())
]),
os:putenv("EMQX_NODE__DATA_DIR", NodeDataDir),
os:putenv("EMQX_NODE__COOKIE", atom_to_list(erlang:get_cookie())),
emqx_config:init_load(SchemaMod), emqx_config:init_load(SchemaMod),
os:unsetenv("EMQX_NODE__DATA_DIR"),
os:unsetenv("EMQX_NODE__COOKIE"),
application:set_env(emqx, init_config_load_done, true) application:set_env(emqx, init_config_load_done, true)
end, end,
@ -748,6 +815,8 @@ setup_node(Node, Opts) when is_map(Opts) ->
undefined -> undefined ->
ok; ok;
_ -> _ ->
StartAutocluster andalso
(ok = rpc:call(Node, emqx_machine_boot, start_autocluster, [])),
case rpc:call(Node, ekka, join, [JoinTo]) of case rpc:call(Node, ekka, join, [JoinTo]) of
ok -> ok ->
ok; ok;
@ -762,8 +831,27 @@ setup_node(Node, Opts) when is_map(Opts) ->
%% Helpers %% Helpers
put_peer_mod(Node, SlaveMod) ->
put({?MODULE, Node}, SlaveMod),
ok.
get_peer_mod(Node) ->
case get({?MODULE, Node}) of
undefined -> ct_slave;
SlaveMod -> SlaveMod
end.
erase_peer_mod(Node) ->
erase({?MODULE, Node}).
node_name(Name) -> node_name(Name) ->
list_to_atom(lists:concat([Name, "@", host()])). case string:tokens(atom_to_list(Name), "@") of
[_Name, _Host] ->
%% the name already has a @
Name;
_ ->
list_to_atom(atom_to_list(Name) ++ "@" ++ host())
end.
gen_node_name(Num) -> gen_node_name(Num) ->
list_to_atom("autocluster_node" ++ integer_to_list(Num)). list_to_atom("autocluster_node" ++ integer_to_list(Num)).
@ -804,6 +892,9 @@ base_port(Number) ->
gen_rpc_port(BasePort) -> gen_rpc_port(BasePort) ->
BasePort - 1. BasePort - 1.
listener_port(Opts, Type) when is_map(Opts) ->
BasePort = maps:get(base_port, Opts),
listener_port(BasePort, Type);
listener_port(BasePort, tcp) -> listener_port(BasePort, tcp) ->
BasePort; BasePort;
listener_port(BasePort, ssl) -> listener_port(BasePort, ssl) ->
@ -988,8 +1079,11 @@ latency_up_proxy(off, Name, ProxyHost, ProxyPort) ->
%% stop the janitor gracefully to ensure proper cleanup order and less %% stop the janitor gracefully to ensure proper cleanup order and less
%% noise in the logs. %% noise in the logs.
call_janitor() -> call_janitor() ->
call_janitor(15_000).
call_janitor(Timeout) ->
Janitor = get_or_spawn_janitor(), Janitor = get_or_spawn_janitor(),
exit(Janitor, normal), ok = emqx_test_janitor:stop(Janitor, Timeout),
ok. ok.
get_or_spawn_janitor() -> get_or_spawn_janitor() ->

View File

@ -30,6 +30,8 @@
%% API %% API
-export([ -export([
start_link/0, start_link/0,
stop/1,
stop/2,
push_on_exit_callback/2 push_on_exit_callback/2
]). ]).
@ -40,6 +42,12 @@
start_link() -> start_link() ->
gen_server:start_link(?MODULE, self(), []). gen_server:start_link(?MODULE, self(), []).
stop(Server) ->
stop(Server, 15_000).
stop(Server, Timeout) ->
gen_server:call(Server, terminate, Timeout).
push_on_exit_callback(Server, Callback) when is_function(Callback, 0) -> push_on_exit_callback(Server, Callback) when is_function(Callback, 0) ->
gen_server:call(Server, {push, Callback}). gen_server:call(Server, {push, Callback}).
@ -52,10 +60,13 @@ init(Parent) ->
{ok, #{callbacks => [], owner => Parent}}. {ok, #{callbacks => [], owner => Parent}}.
terminate(_Reason, #{callbacks := Callbacks}) -> terminate(_Reason, #{callbacks := Callbacks}) ->
lists:foreach(fun(Fun) -> Fun() end, Callbacks). lists:foreach(fun(Fun) -> catch Fun() end, Callbacks).
handle_call({push, Callback}, _From, State = #{callbacks := Callbacks}) -> handle_call({push, Callback}, _From, State = #{callbacks := Callbacks}) ->
{reply, ok, State#{callbacks := [Callback | Callbacks]}}; {reply, ok, State#{callbacks := [Callback | Callbacks]}};
handle_call(terminate, _From, State = #{callbacks := Callbacks}) ->
lists:foreach(fun(Fun) -> Fun() end, Callbacks),
{stop, normal, ok, State};
handle_call(_Req, _From, State) -> handle_call(_Req, _From, State) ->
{reply, error, State}. {reply, error, State}.

View File

@ -1,5 +1,7 @@
{erl_opts, [debug_info]}. {erl_opts, [debug_info]}.
{deps, [{emqx, {path, "../emqx"}}]}. {deps, [ {emqx, {path, "../emqx"}}
, {emqx_resource, {path, "../../apps/emqx_resource"}}
]}.
{shell, [ {shell, [
% {config, "config/sys.config"}, % {config, "config/sys.config"},

View File

@ -2,7 +2,7 @@
{application, emqx_bridge, [ {application, emqx_bridge, [
{description, "EMQX bridges"}, {description, "EMQX bridges"},
{vsn, "0.1.13"}, {vsn, "0.1.13"},
{registered, []}, {registered, [emqx_bridge_sup]},
{mod, {emqx_bridge_app, []}}, {mod, {emqx_bridge_app, []}},
{applications, [ {applications, [
kernel, kernel,

View File

@ -55,6 +55,10 @@
T == gcp_pubsub; T == gcp_pubsub;
T == influxdb_api_v1; T == influxdb_api_v1;
T == influxdb_api_v2; T == influxdb_api_v2;
%% TODO: rename this to `kafka_producer' after alias support is
%% added to hocon; keeping this as just `kafka' for backwards
%% compatibility.
T == kafka;
T == redis_single; T == redis_single;
T == redis_sentinel; T == redis_sentinel;
T == redis_cluster; T == redis_cluster;
@ -137,12 +141,12 @@ load_hook(Bridges) ->
maps:to_list(Bridges) maps:to_list(Bridges)
). ).
do_load_hook(Type, #{local_topic := _}) when ?EGRESS_DIR_BRIDGES(Type) -> do_load_hook(Type, #{local_topic := LocalTopic}) when
?EGRESS_DIR_BRIDGES(Type) andalso is_binary(LocalTopic)
->
emqx_hooks:put('message.publish', {?MODULE, on_message_publish, []}, ?HP_BRIDGE); emqx_hooks:put('message.publish', {?MODULE, on_message_publish, []}, ?HP_BRIDGE);
do_load_hook(mqtt, #{egress := #{local := #{topic := _}}}) -> do_load_hook(mqtt, #{egress := #{local := #{topic := _}}}) ->
emqx_hooks:put('message.publish', {?MODULE, on_message_publish, []}, ?HP_BRIDGE); emqx_hooks:put('message.publish', {?MODULE, on_message_publish, []}, ?HP_BRIDGE);
do_load_hook(kafka, #{producer := #{mqtt := #{topic := _}}}) ->
emqx_hooks:put('message.publish', {?MODULE, on_message_publish, []}, ?HP_BRIDGE);
do_load_hook(_Type, _Conf) -> do_load_hook(_Type, _Conf) ->
ok. ok.
@ -223,6 +227,7 @@ post_config_update(_, _Req, NewConf, OldConf, _AppEnv) ->
]), ]),
ok = unload_hook(), ok = unload_hook(),
ok = load_hook(NewConf), ok = load_hook(NewConf),
?tp(bridge_post_config_update_done, #{}),
Result. Result.
list() -> list() ->
@ -407,8 +412,8 @@ get_matched_bridge_id(BType, Conf, Topic, BName, Acc) when ?EGRESS_DIR_BRIDGES(B
end; end;
get_matched_bridge_id(mqtt, #{egress := #{local := #{topic := Filter}}}, Topic, BName, Acc) -> get_matched_bridge_id(mqtt, #{egress := #{local := #{topic := Filter}}}, Topic, BName, Acc) ->
do_get_matched_bridge_id(Topic, Filter, mqtt, BName, Acc); do_get_matched_bridge_id(Topic, Filter, mqtt, BName, Acc);
get_matched_bridge_id(kafka, #{producer := #{mqtt := #{topic := Filter}}}, Topic, BName, Acc) -> get_matched_bridge_id(_BType, _Conf, _Topic, _BName, Acc) ->
do_get_matched_bridge_id(Topic, Filter, kafka, BName, Acc). Acc.
do_get_matched_bridge_id(Topic, Filter, BType, BName, Acc) -> do_get_matched_bridge_id(Topic, Filter, BType, BName, Acc) ->
case emqx_topic:match(Topic, Filter) of case emqx_topic:match(Topic, Filter) of

View File

@ -16,6 +16,7 @@
-module(emqx_bridge_resource). -module(emqx_bridge_resource).
-include_lib("emqx/include/logger.hrl"). -include_lib("emqx/include/logger.hrl").
-include_lib("emqx_resource/include/emqx_resource.hrl").
-export([ -export([
bridge_to_resource_type/1, bridge_to_resource_type/1,
@ -45,7 +46,12 @@
]). ]).
%% bi-directional bridge with producer/consumer or ingress/egress configs %% bi-directional bridge with producer/consumer or ingress/egress configs
-define(IS_BI_DIR_BRIDGE(TYPE), TYPE =:= <<"mqtt">>; TYPE =:= <<"kafka">>). -define(IS_BI_DIR_BRIDGE(TYPE),
(TYPE) =:= <<"mqtt">>
).
-define(IS_INGRESS_BRIDGE(TYPE),
(TYPE) =:= <<"kafka_consumer">> orelse ?IS_BI_DIR_BRIDGE(TYPE)
).
-if(?EMQX_RELEASE_EDITION == ee). -if(?EMQX_RELEASE_EDITION == ee).
bridge_to_resource_type(<<"mqtt">>) -> emqx_connector_mqtt; bridge_to_resource_type(<<"mqtt">>) -> emqx_connector_mqtt;
@ -219,7 +225,7 @@ recreate(Type, Name, Conf, Opts) ->
). ).
create_dry_run(Type, Conf0) -> create_dry_run(Type, Conf0) ->
TmpPath0 = iolist_to_binary(["bridges-create-dry-run:", emqx_misc:gen_id(8)]), TmpPath0 = iolist_to_binary([?TEST_ID_PREFIX, emqx_misc:gen_id(8)]),
TmpPath = emqx_misc:safe_filename(TmpPath0), TmpPath = emqx_misc:safe_filename(TmpPath0),
Conf = emqx_map_lib:safe_atom_key_map(Conf0), Conf = emqx_map_lib:safe_atom_key_map(Conf0),
case emqx_connector_ssl:convert_certs(TmpPath, Conf) of case emqx_connector_ssl:convert_certs(TmpPath, Conf) of
@ -297,12 +303,16 @@ parse_confs(
max_retries => Retry max_retries => Retry
} }
}; };
parse_confs(Type, Name, Conf) when ?IS_BI_DIR_BRIDGE(Type) -> parse_confs(Type, Name, Conf) when ?IS_INGRESS_BRIDGE(Type) ->
%% For some drivers that can be used as data-sources, we need to provide a %% For some drivers that can be used as data-sources, we need to provide a
%% hookpoint. The underlying driver will run `emqx_hooks:run/3` when it %% hookpoint. The underlying driver will run `emqx_hooks:run/3` when it
%% receives a message from the external database. %% receives a message from the external database.
BId = bridge_id(Type, Name), BId = bridge_id(Type, Name),
Conf#{hookpoint => <<"$bridges/", BId/binary>>, bridge_name => Name}; Conf#{hookpoint => <<"$bridges/", BId/binary>>, bridge_name => Name};
%% TODO: rename this to `kafka_producer' after alias support is added
%% to hocon; keeping this as just `kafka' for backwards compatibility.
parse_confs(<<"kafka">> = _Type, Name, Conf) ->
Conf#{bridge_name => Name};
parse_confs(_Type, _Name, Conf) -> parse_confs(_Type, _Name, Conf) ->
Conf. Conf.

View File

@ -34,5 +34,3 @@ init([]) ->
}, },
ChildSpecs = [], ChildSpecs = [],
{ok, {SupFlags, ChildSpecs}}. {ok, {SupFlags, ChildSpecs}}.
%% internal functions

View File

@ -38,7 +38,6 @@ init_per_suite(_Config) ->
ok = emqx_common_test_helpers:start_apps([emqx_conf, emqx_bridge]), ok = emqx_common_test_helpers:start_apps([emqx_conf, emqx_bridge]),
ok = emqx_connector_test_helpers:start_apps([emqx_resource]), ok = emqx_connector_test_helpers:start_apps([emqx_resource]),
{ok, _} = application:ensure_all_started(emqx_connector), {ok, _} = application:ensure_all_started(emqx_connector),
snabbkaffe:fix_ct_logging(),
[]. [].
end_per_suite(_Config) -> end_per_suite(_Config) ->

View File

@ -204,7 +204,7 @@ do_multicall(M, F, A, RequiredSyncs, Timeout) ->
query(TnxId) -> query(TnxId) ->
transaction(fun ?MODULE:trans_query/1, [TnxId]). transaction(fun ?MODULE:trans_query/1, [TnxId]).
-spec reset() -> reset. -spec reset() -> ok.
reset() -> gen_server:call(?MODULE, reset). reset() -> gen_server:call(?MODULE, reset).
-spec status() -> {'atomic', [map()]} | {'aborted', Reason :: term()}. -spec status() -> {'atomic', [map()]} | {'aborted', Reason :: term()}.

View File

@ -25,7 +25,6 @@ all() ->
emqx_common_test_helpers:all(?MODULE). emqx_common_test_helpers:all(?MODULE).
t_copy_conf_override_on_restarts(_Config) -> t_copy_conf_override_on_restarts(_Config) ->
net_kernel:start(['master@127.0.0.1', longnames]),
ct:timetrap({seconds, 120}), ct:timetrap({seconds, 120}),
snabbkaffe:fix_ct_logging(), snabbkaffe:fix_ct_logging(),
Cluster = cluster([core, core, core]), Cluster = cluster([core, core, core]),
@ -165,11 +164,10 @@ cluster(Specs) ->
{env, Env}, {env, Env},
{apps, [emqx_conf]}, {apps, [emqx_conf]},
{load_schema, false}, {load_schema, false},
{join_to, false}, {join_to, true},
{env_handler, fun {env_handler, fun
(emqx) -> (emqx) ->
application:set_env(emqx, boot_modules, []), application:set_env(emqx, boot_modules, []),
io:format("~p~p~n", [node(), application:get_all_env(emqx)]),
ok; ok;
(_) -> (_) ->
ok ok

View File

@ -559,8 +559,8 @@ group_t_copy_plugin_to_a_new_node({'end', Config}) ->
ok = rpc:call(CopyToNode, emqx_config, delete_override_conf_files, []), ok = rpc:call(CopyToNode, emqx_config, delete_override_conf_files, []),
rpc:call(CopyToNode, ekka, leave, []), rpc:call(CopyToNode, ekka, leave, []),
rpc:call(CopyFromNode, ekka, leave, []), rpc:call(CopyFromNode, ekka, leave, []),
{ok, _} = emqx_common_test_helpers:stop_slave(CopyToNode), ok = emqx_common_test_helpers:stop_slave(CopyToNode),
{ok, _} = emqx_common_test_helpers:stop_slave(CopyFromNode), ok = emqx_common_test_helpers:stop_slave(CopyFromNode),
ok = file:del_dir_r(proplists:get_value(to_install_dir, Config)), ok = file:del_dir_r(proplists:get_value(to_install_dir, Config)),
ok = file:del_dir_r(proplists:get_value(from_install_dir, Config)); ok = file:del_dir_r(proplists:get_value(from_install_dir, Config));
group_t_copy_plugin_to_a_new_node(Config) -> group_t_copy_plugin_to_a_new_node(Config) ->

View File

@ -119,5 +119,5 @@
-define(AUTO_RESTART_INTERVAL, 60000). -define(AUTO_RESTART_INTERVAL, 60000).
-define(AUTO_RESTART_INTERVAL_RAW, <<"60s">>). -define(AUTO_RESTART_INTERVAL_RAW, <<"60s">>).
-define(TEST_ID_PREFIX, "_test_:"). -define(TEST_ID_PREFIX, "_probe_:").
-define(RES_METRICS, resource_metrics). -define(RES_METRICS, resource_metrics).

View File

@ -0,0 +1,2 @@
Implemented Kafka Consumer bridge.
Now it's possible to consume messages from Kafka and publish them to MQTT topics.

View File

@ -0,0 +1,2 @@
实现了 Kafka 消费者桥接。
现在可以从 Kafka 消费消息并将其发布到 MQTT 主题。

View File

@ -39,6 +39,16 @@ emqx_ee_bridge_kafka {
zh: "桥接名字" zh: "桥接名字"
} }
} }
kafka_producer {
desc {
en: "Kafka Producer configuration."
zh: "Kafka Producer 配置。"
}
label {
en: "Kafka Producer"
zh: "Kafka Producer"
}
}
producer_opts { producer_opts {
desc { desc {
en: "Local MQTT data source and Kafka bridge configs." en: "Local MQTT data source and Kafka bridge configs."
@ -49,20 +59,10 @@ emqx_ee_bridge_kafka {
zh: "MQTT 到 Kafka" zh: "MQTT 到 Kafka"
} }
} }
producer_mqtt_opts {
desc {
en: "MQTT data source. Optional when used as a rule-engine action."
zh: "需要桥接到 MQTT 源主题。"
}
label {
en: "MQTT Source Topic"
zh: "MQTT 源主题"
}
}
mqtt_topic { mqtt_topic {
desc { desc {
en: "MQTT topic or topic as data source (bridge input)." en: "MQTT topic or topic as data source (bridge input). Should not configure this if the bridge is used as a rule action."
zh: "指定 MQTT 主题作为桥接的数据源" zh: "指定 MQTT 主题作为桥接的数据源。 若该桥接用于规则的动作,则必须将该配置项删除。"
} }
label { label {
en: "Source MQTT Topic" en: "Source MQTT Topic"
@ -218,7 +218,7 @@ emqx_ee_bridge_kafka {
} }
socket_nodelay { socket_nodelay {
desc { desc {
en: "When set to 'true', TCP buffer sent as soon as possible. " en: "When set to 'true', TCP buffer is sent as soon as possible. "
"Otherwise, the OS kernel may buffer small TCP packets for a while (40 ms by default)." "Otherwise, the OS kernel may buffer small TCP packets for a while (40 ms by default)."
zh: "设置true让系统内核立即发送。否则当需要发送的内容很少时可能会有一定延迟默认 40 毫秒)。" zh: "设置true让系统内核立即发送。否则当需要发送的内容很少时可能会有一定延迟默认 40 毫秒)。"
} }
@ -473,4 +473,177 @@ emqx_ee_bridge_kafka {
zh: "GSSAPI/Kerberos" zh: "GSSAPI/Kerberos"
} }
} }
kafka_consumer {
desc {
en: "Kafka Consumer configuration."
zh: "Kafka 消费者配置。"
}
label {
en: "Kafka Consumer"
zh: "Kafka 消费者"
}
}
consumer_opts {
desc {
en: "Local MQTT publish and Kafka consumer configs."
zh: "本地 MQTT 转发 和 Kafka 消费者配置。"
}
label {
en: "MQTT to Kafka"
zh: "MQTT 到 Kafka"
}
}
consumer_kafka_opts {
desc {
en: "Kafka consumer configs."
zh: "Kafka消费者配置。"
}
label {
en: "Kafka Consumer"
zh: "Kafka 消费者"
}
}
consumer_mqtt_opts {
desc {
en: "Local MQTT message publish."
zh: "本地 MQTT 消息转发。"
}
label {
en: "MQTT publish"
zh: "MQTT 转发"
}
}
consumer_mqtt_topic {
desc {
en: "Local topic to which consumed Kafka messages should be published to."
zh: "设置 Kafka 消息向哪个本地 MQTT 主题转发消息。"
}
label {
en: "MQTT Topic"
zh: "MQTT主题"
}
}
consumer_mqtt_qos {
desc {
en: "MQTT QoS used to publish messages consumed from Kafka."
zh: "转发 MQTT 消息时使用的 QoS。"
}
label {
en: "QoS"
zh: "QoS"
}
}
consumer_mqtt_payload {
desc {
en: "The template for transforming the incoming Kafka message."
" By default, it will use JSON format to serialize"
" inputs from the Kafka message. Such fields are:\n"
"<code>headers</code>: an object containing string key-value pairs.\n"
"<code>key</code>: Kafka message key (uses the chosen key encoding).\n"
"<code>offset</code>: offset for the message.\n"
"<code>topic</code>: Kafka topic.\n"
"<code>ts</code>: message timestamp.\n"
"<code>ts_type</code>: message timestamp type, which is one of"
" <code>create</code>, <code>append</code> or <code>undefined</code>.\n"
"<code>value</code>: Kafka message value (uses the chosen value encoding).\n"
zh: "用于转换收到的 Kafka 消息的模板。 "
"默认情况下,它将使用 JSON 格式来序列化来自 Kafka 的所有字段。 "
"这些字段包括:"
"<code>headers</code>:一个包含字符串键值对的 JSON 对象。\n"
"<code>key</code>Kafka 消息的键(使用选择的编码方式编码)。\n"
"<code>offset</code>:消息的偏移量。\n"
"<code>topic</code>Kafka 主题。\n"
"<code>ts</code>: 消息的时间戳。\n"
"<code>ts_type</code>:消息的时间戳类型,值可能是:"
" <code>create</code> <code>append</code> 或 <code>undefined</code>。\n"
"<code>value</code>: Kafka 消息值(使用选择的编码方式编码)。\n"
}
label {
en: "MQTT Payload Template"
zh: "MQTT Payload Template"
}
}
consumer_kafka_topic {
desc {
en: "Kafka topic to consume from."
zh: "指定从哪个 Kafka 主题消费消息。"
}
label {
en: "Kafka topic"
zh: "Kafka 主题 "
}
}
consumer_max_batch_bytes {
desc {
en: "Maximum bytes to fetch in a batch of messages."
"Please note that if the configured value is smaller than the message size in Kafka, it may negatively impact the fetch performance."
zh: "在一批消息中要取的最大字节数。"
"如果该配置小于 Kafka 中消息到大小,则可能会影响消费性能。"
}
label {
en: "Max Bytes"
zh: "最大字节数"
}
}
consumer_max_rejoin_attempts {
desc {
en: "Maximum number of times allowed for a member to re-join the group. If the consumer group can not reach balance after this configured number of attempts, the consumer group member will restart after a delay."
zh: "允许一个成员重新加入小组的最大次数。如果超过改配置次数后仍不能成功加入消费组,则会在延迟一段时间后再重试。"
}
label {
en: "Max Rejoin Attempts"
zh: "最大的重新加入尝试"
}
}
consumer_offset_reset_policy {
desc {
en: "Defines how the consumers should reset the start offset when "
"a topic partition has and invalid or no initial offset."
zh: "定义当一个主题分区的初始偏移量无效或没有初始偏移量时,"
"消费者应如何重置开始偏移量。"
}
label {
en: "Offset Reset Policy"
zh: "偏移重置策略"
}
}
consumer_offset_commit_interval_seconds {
desc {
en: "Defines the time interval between two offset commit requests sent for each consumer group."
zh: "指定 Kafka 消费组偏移量提交的时间间隔。"
}
label {
en: "Offset Commit Interval"
zh: "偏移承诺间隔"
}
}
consumer_topic_mapping {
desc {
en: "Defines the mapping between Kafka topics and MQTT topics. Must contain at least one item."
zh: "指定 Kafka 主题和 MQTT 主题之间的映射。 必须至少包含一个项目。"
}
label {
en: "Topic Mapping"
zh: "主题映射关系"
}
}
consumer_encoding_mode {
desc {
en: "Defines how the key or value from the Kafka message is"
" dealt with before being forwarded via MQTT.\n"
"<code>none</code> Uses the key or value from the Kafka message unchanged."
" Note: in this case, then the key or value must be a valid UTF-8 string.\n"
"<code>base64</code> Uses base-64 encoding on the received key or value."
zh: "定义了在通过MQTT转发之前如何处理Kafka消息的键或值。"
"<code>none</code> 使用Kafka消息中的键或值不改变。"
" 注意在这种情况下那么键或值必须是一个有效的UTF-8字符串。\n"
"<code>base64</code> 对收到的密钥或值使用base-64编码。"
}
label {
en: "Encoding Mode"
zh: "编码模式"
}
}
} }

View File

@ -2,7 +2,7 @@
{deps, [ {wolff, {git, "https://github.com/kafka4beam/wolff.git", {tag, "1.7.5"}}} {deps, [ {wolff, {git, "https://github.com/kafka4beam/wolff.git", {tag, "1.7.5"}}}
, {kafka_protocol, {git, "https://github.com/kafka4beam/kafka_protocol.git", {tag, "4.1.2"}}} , {kafka_protocol, {git, "https://github.com/kafka4beam/kafka_protocol.git", {tag, "4.1.2"}}}
, {brod_gssapi, {git, "https://github.com/kafka4beam/brod_gssapi.git", {tag, "v0.1.0-rc1"}}} , {brod_gssapi, {git, "https://github.com/kafka4beam/brod_gssapi.git", {tag, "v0.1.0-rc1"}}}
, {brod, {git, "https://github.com/kafka4beam/brod.git", {tag, "3.16.7"}}} , {brod, {git, "https://github.com/kafka4beam/brod.git", {tag, "3.16.8"}}}
, {emqx_connector, {path, "../../apps/emqx_connector"}} , {emqx_connector, {path, "../../apps/emqx_connector"}}
, {emqx_resource, {path, "../../apps/emqx_resource"}} , {emqx_resource, {path, "../../apps/emqx_resource"}}
, {emqx_bridge, {path, "../../apps/emqx_bridge"}} , {emqx_bridge, {path, "../../apps/emqx_bridge"}}

View File

@ -1,7 +1,7 @@
{application, emqx_ee_bridge, [ {application, emqx_ee_bridge, [
{description, "EMQX Enterprise data bridges"}, {description, "EMQX Enterprise data bridges"},
{vsn, "0.1.7"}, {vsn, "0.1.7"},
{registered, []}, {registered, [emqx_ee_bridge_kafka_consumer_sup]},
{applications, [ {applications, [
kernel, kernel,
stdlib, stdlib,

View File

@ -15,7 +15,8 @@
api_schemas(Method) -> api_schemas(Method) ->
[ [
ref(emqx_ee_bridge_gcp_pubsub, Method), ref(emqx_ee_bridge_gcp_pubsub, Method),
ref(emqx_ee_bridge_kafka, Method), ref(emqx_ee_bridge_kafka, Method ++ "_consumer"),
ref(emqx_ee_bridge_kafka, Method ++ "_producer"),
ref(emqx_ee_bridge_mysql, Method), ref(emqx_ee_bridge_mysql, Method),
ref(emqx_ee_bridge_pgsql, Method), ref(emqx_ee_bridge_pgsql, Method),
ref(emqx_ee_bridge_mongodb, Method ++ "_rs"), ref(emqx_ee_bridge_mongodb, Method ++ "_rs"),
@ -64,7 +65,10 @@ examples(Method) ->
lists:foldl(Fun, #{}, schema_modules()). lists:foldl(Fun, #{}, schema_modules()).
resource_type(Type) when is_binary(Type) -> resource_type(binary_to_atom(Type, utf8)); resource_type(Type) when is_binary(Type) -> resource_type(binary_to_atom(Type, utf8));
resource_type(kafka) -> emqx_bridge_impl_kafka; resource_type(kafka_consumer) -> emqx_bridge_impl_kafka_consumer;
%% TODO: rename this to `kafka_producer' after alias support is added
%% to hocon; keeping this as just `kafka' for backwards compatibility.
resource_type(kafka) -> emqx_bridge_impl_kafka_producer;
resource_type(hstreamdb) -> emqx_ee_connector_hstreamdb; resource_type(hstreamdb) -> emqx_ee_connector_hstreamdb;
resource_type(gcp_pubsub) -> emqx_ee_connector_gcp_pubsub; resource_type(gcp_pubsub) -> emqx_ee_connector_gcp_pubsub;
resource_type(mongodb_rs) -> emqx_ee_connector_mongodb; resource_type(mongodb_rs) -> emqx_ee_connector_mongodb;
@ -85,14 +89,6 @@ resource_type(dynamo) -> emqx_ee_connector_dynamo.
fields(bridges) -> fields(bridges) ->
[ [
{kafka,
mk(
hoconsc:map(name, ref(emqx_ee_bridge_kafka, "config")),
#{
desc => <<"Kafka Bridge Config">>,
required => false
}
)},
{hstreamdb, {hstreamdb,
mk( mk(
hoconsc:map(name, ref(emqx_ee_bridge_hstreamdb, "config")), hoconsc:map(name, ref(emqx_ee_bridge_hstreamdb, "config")),
@ -133,8 +129,8 @@ fields(bridges) ->
required => false required => false
} }
)} )}
] ++ mongodb_structs() ++ influxdb_structs() ++ redis_structs() ++ pgsql_structs() ++ ] ++ kafka_structs() ++ mongodb_structs() ++ influxdb_structs() ++ redis_structs() ++
clickhouse_structs(). pgsql_structs() ++ clickhouse_structs().
mongodb_structs() -> mongodb_structs() ->
[ [
@ -149,6 +145,27 @@ mongodb_structs() ->
|| Type <- [mongodb_rs, mongodb_sharded, mongodb_single] || Type <- [mongodb_rs, mongodb_sharded, mongodb_single]
]. ].
kafka_structs() ->
[
%% TODO: rename this to `kafka_producer' after alias support
%% is added to hocon; keeping this as just `kafka' for
%% backwards compatibility.
{kafka,
mk(
hoconsc:map(name, ref(emqx_ee_bridge_kafka, kafka_producer)),
#{
desc => <<"Kafka Producer Bridge Config">>,
required => false,
converter => fun emqx_ee_bridge_kafka:kafka_producer_converter/2
}
)},
{kafka_consumer,
mk(
hoconsc:map(name, ref(emqx_ee_bridge_kafka, kafka_consumer)),
#{desc => <<"Kafka Consumer Bridge Config">>, required => false}
)}
].
influxdb_structs() -> influxdb_structs() ->
[ [
{Protocol, {Protocol,

View File

@ -30,27 +30,102 @@
host_opts/0 host_opts/0
]). ]).
-export([kafka_producer_converter/2]).
%% ------------------------------------------------------------------------------------------------- %% -------------------------------------------------------------------------------------------------
%% api %% api
conn_bridge_examples(Method) -> conn_bridge_examples(Method) ->
[ [
#{ #{
%% TODO: rename this to `kafka_producer' after alias
%% support is added to hocon; keeping this as just `kafka'
%% for backwards compatibility.
<<"kafka">> => #{ <<"kafka">> => #{
summary => <<"Kafka Bridge">>, summary => <<"Kafka Producer Bridge">>,
value => values(Method) value => values({Method, producer})
}
},
#{
<<"kafka_consumer">> => #{
summary => <<"Kafka Consumer Bridge">>,
value => values({Method, consumer})
} }
} }
]. ].
values(get) -> values({get, KafkaType}) ->
maps:merge(values(post), ?METRICS_EXAMPLE); maps:merge(values({post, KafkaType}), ?METRICS_EXAMPLE);
values(post) -> values({post, KafkaType}) ->
maps:merge(values(common_config), values(KafkaType));
values({put, KafkaType}) ->
values({post, KafkaType});
values(common_config) ->
#{ #{
bootstrap_hosts => <<"localhost:9092">> authentication => #{
mechanism => <<"plain">>,
username => <<"username">>,
password => <<"password">>
},
bootstrap_hosts => <<"localhost:9092">>,
connect_timeout => <<"5s">>,
enable => true,
metadata_request_timeout => <<"4s">>,
min_metadata_refresh_interval => <<"3s">>,
socket_opts => #{
sndbuf => <<"1024KB">>,
recbuf => <<"1024KB">>,
nodelay => true
}
}; };
values(put) -> values(producer) ->
values(post). #{
kafka => #{
topic => <<"kafka-topic">>,
message => #{
key => <<"${.clientid}">>,
value => <<"${.}">>,
timestamp => <<"${.timestamp}">>
},
max_batch_bytes => <<"896KB">>,
compression => <<"no_compression">>,
partition_strategy => <<"random">>,
required_acks => <<"all_isr">>,
partition_count_refresh_interval => <<"60s">>,
max_inflight => 10,
buffer => #{
mode => <<"hybrid">>,
per_partition_limit => <<"2GB">>,
segment_bytes => <<"100MB">>,
memory_overload_protection => true
}
},
local_topic => <<"mqtt/local/topic">>
};
values(consumer) ->
#{
kafka => #{
max_batch_bytes => <<"896KB">>,
offset_reset_policy => <<"reset_to_latest">>,
offset_commit_interval_seconds => 5
},
key_encoding_mode => <<"none">>,
topic_mapping => [
#{
kafka_topic => <<"kafka-topic-1">>,
mqtt_topic => <<"mqtt/topic/1">>,
qos => 1,
payload_template => <<"${.}">>
},
#{
kafka_topic => <<"kafka-topic-2">>,
mqtt_topic => <<"mqtt/topic/2">>,
qos => 2,
payload_template => <<"v = ${.value}">>
}
],
value_encoding_mode => <<"none">>
}.
%% ------------------------------------------------------------------------------------------------- %% -------------------------------------------------------------------------------------------------
%% Hocon Schema Definitions %% Hocon Schema Definitions
@ -60,14 +135,22 @@ host_opts() ->
namespace() -> "bridge_kafka". namespace() -> "bridge_kafka".
roots() -> ["config"]. roots() -> ["config_consumer", "config_producer"].
fields("post") -> fields("post_" ++ Type) ->
[type_field(), name_field() | fields("config")]; [type_field(), name_field() | fields("config_" ++ Type)];
fields("put") -> fields("put_" ++ Type) ->
fields("config"); fields("config_" ++ Type);
fields("get") -> fields("get_" ++ Type) ->
emqx_bridge_schema:status_fields() ++ fields("post"); emqx_bridge_schema:status_fields() ++ fields("post_" ++ Type);
fields("config_producer") ->
fields(kafka_producer);
fields("config_consumer") ->
fields(kafka_consumer);
fields(kafka_producer) ->
fields("config") ++ fields(producer_opts);
fields(kafka_consumer) ->
fields("config") ++ fields(consumer_opts);
fields("config") -> fields("config") ->
[ [
{enable, mk(boolean(), #{desc => ?DESC("config_enable"), default => true})}, {enable, mk(boolean(), #{desc => ?DESC("config_enable"), default => true})},
@ -104,8 +187,6 @@ fields("config") ->
mk(hoconsc:union([none, ref(auth_username_password), ref(auth_gssapi_kerberos)]), #{ mk(hoconsc:union([none, ref(auth_username_password), ref(auth_gssapi_kerberos)]), #{
default => none, desc => ?DESC("authentication") default => none, desc => ?DESC("authentication")
})}, })},
{producer, mk(hoconsc:union([none, ref(producer_opts)]), #{desc => ?DESC(producer_opts)})},
%{consumer, mk(hoconsc:union([none, ref(consumer_opts)]), #{desc => ?DESC(consumer_opts)})},
{socket_opts, mk(ref(socket_opts), #{required => false, desc => ?DESC(socket_opts)})} {socket_opts, mk(ref(socket_opts), #{required => false, desc => ?DESC(socket_opts)})}
] ++ emqx_connector_schema_lib:ssl_fields(); ] ++ emqx_connector_schema_lib:ssl_fields();
fields(auth_username_password) -> fields(auth_username_password) ->
@ -156,15 +237,16 @@ fields(socket_opts) ->
]; ];
fields(producer_opts) -> fields(producer_opts) ->
[ [
{mqtt, mk(ref(producer_mqtt_opts), #{desc => ?DESC(producer_mqtt_opts)})}, %% Note: there's an implicit convention in `emqx_bridge' that,
%% for egress bridges with this config, the published messages
%% will be forwarded to such bridges.
{local_topic, mk(binary(), #{required => false, desc => ?DESC(mqtt_topic)})},
{kafka, {kafka,
mk(ref(producer_kafka_opts), #{ mk(ref(producer_kafka_opts), #{
required => true, required => true,
desc => ?DESC(producer_kafka_opts) desc => ?DESC(producer_kafka_opts)
})} })}
]; ];
fields(producer_mqtt_opts) ->
[{topic, mk(binary(), #{desc => ?DESC(mqtt_topic)})}];
fields(producer_kafka_opts) -> fields(producer_kafka_opts) ->
[ [
{topic, mk(string(), #{required => true, desc => ?DESC(kafka_topic)})}, {topic, mk(string(), #{required => true, desc => ?DESC(kafka_topic)})},
@ -241,28 +323,72 @@ fields(producer_buffer) ->
default => false, default => false,
desc => ?DESC(buffer_memory_overload_protection) desc => ?DESC(buffer_memory_overload_protection)
})} })}
];
fields(consumer_opts) ->
[
{kafka,
mk(ref(consumer_kafka_opts), #{required => false, desc => ?DESC(consumer_kafka_opts)})},
{topic_mapping,
mk(
hoconsc:array(ref(consumer_topic_mapping)),
#{
required => true,
desc => ?DESC(consumer_topic_mapping),
validator => fun consumer_topic_mapping_validator/1
}
)},
{key_encoding_mode,
mk(enum([none, base64]), #{
default => none, desc => ?DESC(consumer_encoding_mode)
})},
{value_encoding_mode,
mk(enum([none, base64]), #{
default => none, desc => ?DESC(consumer_encoding_mode)
})}
];
fields(consumer_topic_mapping) ->
[
{kafka_topic, mk(binary(), #{required => true, desc => ?DESC(consumer_kafka_topic)})},
{mqtt_topic, mk(binary(), #{required => true, desc => ?DESC(consumer_mqtt_topic)})},
{qos, mk(emqx_schema:qos(), #{default => 0, desc => ?DESC(consumer_mqtt_qos)})},
{payload_template,
mk(
string(),
#{default => <<"${.}">>, desc => ?DESC(consumer_mqtt_payload)}
)}
];
fields(consumer_kafka_opts) ->
[
{max_batch_bytes,
mk(emqx_schema:bytesize(), #{
default => "896KB", desc => ?DESC(consumer_max_batch_bytes)
})},
{max_rejoin_attempts,
mk(non_neg_integer(), #{
hidden => true,
default => 5,
desc => ?DESC(consumer_max_rejoin_attempts)
})},
{offset_reset_policy,
mk(
enum([reset_to_latest, reset_to_earliest, reset_by_subscriber]),
#{default => reset_to_latest, desc => ?DESC(consumer_offset_reset_policy)}
)},
{offset_commit_interval_seconds,
mk(
pos_integer(),
#{default => 5, desc => ?DESC(consumer_offset_commit_interval_seconds)}
)}
]. ].
% fields(consumer_opts) ->
% [
% {kafka, mk(ref(consumer_kafka_opts), #{required => true, desc => ?DESC(consumer_kafka_opts)})},
% {mqtt, mk(ref(consumer_mqtt_opts), #{required => true, desc => ?DESC(consumer_mqtt_opts)})}
% ];
% fields(consumer_mqtt_opts) ->
% [ {topic, mk(string(), #{desc => ?DESC(consumer_mqtt_topic)})}
% ];
% fields(consumer_mqtt_opts) ->
% [ {topic, mk(string(), #{desc => ?DESC(consumer_mqtt_topic)})}
% ];
% fields(consumer_kafka_opts) ->
% [ {topic, mk(string(), #{desc => ?DESC(consumer_kafka_topic)})}
% ].
desc("config") -> desc("config") ->
?DESC("desc_config"); ?DESC("desc_config");
desc(Method) when Method =:= "get"; Method =:= "put"; Method =:= "post" -> desc("get_" ++ Type) when Type =:= "consumer"; Type =:= "producer" ->
["Configuration for Kafka using `", string:to_upper(Method), "` method."]; ["Configuration for Kafka using `GET` method."];
desc("put_" ++ Type) when Type =:= "consumer"; Type =:= "producer" ->
["Configuration for Kafka using `PUT` method."];
desc("post_" ++ Type) when Type =:= "consumer"; Type =:= "producer" ->
["Configuration for Kafka using `POST` method."];
desc(Name) -> desc(Name) ->
lists:member(Name, struct_names()) orelse throw({missing_desc, Name}), lists:member(Name, struct_names()) orelse throw({missing_desc, Name}),
?DESC(Name). ?DESC(Name).
@ -272,20 +398,61 @@ struct_names() ->
auth_gssapi_kerberos, auth_gssapi_kerberos,
auth_username_password, auth_username_password,
kafka_message, kafka_message,
kafka_producer,
kafka_consumer,
producer_buffer, producer_buffer,
producer_kafka_opts, producer_kafka_opts,
producer_mqtt_opts,
socket_opts, socket_opts,
producer_opts producer_opts,
consumer_opts,
consumer_kafka_opts,
consumer_topic_mapping
]. ].
%% ------------------------------------------------------------------------------------------------- %% -------------------------------------------------------------------------------------------------
%% internal %% internal
type_field() -> type_field() ->
{type, mk(enum([kafka]), #{required => true, desc => ?DESC("desc_type")})}. {type,
%% TODO: rename `kafka' to `kafka_producer' after alias
%% support is added to hocon; keeping this as just `kafka' for
%% backwards compatibility.
mk(enum([kafka_consumer, kafka]), #{required => true, desc => ?DESC("desc_type")})}.
name_field() -> name_field() ->
{name, mk(binary(), #{required => true, desc => ?DESC("desc_name")})}. {name, mk(binary(), #{required => true, desc => ?DESC("desc_name")})}.
ref(Name) -> ref(Name) ->
hoconsc:ref(?MODULE, Name). hoconsc:ref(?MODULE, Name).
kafka_producer_converter(undefined, _HoconOpts) ->
undefined;
kafka_producer_converter(
#{<<"producer">> := OldOpts0, <<"bootstrap_hosts">> := _} = Config0, _HoconOpts
) ->
%% old schema
MQTTOpts = maps:get(<<"mqtt">>, OldOpts0, #{}),
LocalTopic = maps:get(<<"topic">>, MQTTOpts, undefined),
KafkaOpts = maps:get(<<"kafka">>, OldOpts0),
Config = maps:without([<<"producer">>], Config0),
case LocalTopic =:= undefined of
true ->
Config#{<<"kafka">> => KafkaOpts};
false ->
Config#{<<"kafka">> => KafkaOpts, <<"local_topic">> => LocalTopic}
end;
kafka_producer_converter(Config, _HoconOpts) ->
%% new schema
Config.
consumer_topic_mapping_validator(_TopicMapping = []) ->
{error, "There must be at least one Kafka-MQTT topic mapping"};
consumer_topic_mapping_validator(TopicMapping = [_ | _]) ->
NumEntries = length(TopicMapping),
KafkaTopics = [KT || #{<<"kafka_topic">> := KT} <- TopicMapping],
DistinctKafkaTopics = length(lists:usort(KafkaTopics)),
case DistinctKafkaTopics =:= NumEntries of
true ->
ok;
false ->
{error, "Kafka topics must not be repeated in a bridge"}
end.

View File

@ -4,34 +4,38 @@
%% Kafka connection configuration %% Kafka connection configuration
-module(emqx_bridge_impl_kafka). -module(emqx_bridge_impl_kafka).
-behaviour(emqx_resource).
%% callbacks of behaviour emqx_resource
-export([ -export([
callback_mode/0, hosts/1,
on_start/2, make_client_id/2,
on_stop/2, sasl/1
on_query/3,
on_query_async/4,
on_get_status/2,
is_buffer_supported/0
]). ]).
is_buffer_supported() -> true. %% Parse comma separated host:port list into a [{Host,Port}] list
hosts(Hosts) when is_binary(Hosts) ->
hosts(binary_to_list(Hosts));
hosts(Hosts) when is_list(Hosts) ->
kpro:parse_endpoints(Hosts).
callback_mode() -> async_if_possible. %% Client ID is better to be unique to make it easier for Kafka side trouble shooting.
make_client_id(KafkaType0, BridgeName0) ->
KafkaType = to_bin(KafkaType0),
BridgeName = to_bin(BridgeName0),
iolist_to_binary([KafkaType, ":", BridgeName, ":", atom_to_list(node())]).
on_start(InstId, Config) -> sasl(none) ->
emqx_bridge_impl_kafka_producer:on_start(InstId, Config). undefined;
sasl(#{mechanism := Mechanism, username := Username, password := Password}) ->
{Mechanism, Username, emqx_secret:wrap(Password)};
sasl(#{
kerberos_principal := Principal,
kerberos_keytab_file := KeyTabFile
}) ->
{callback, brod_gssapi, {gssapi, KeyTabFile, Principal}}.
on_stop(InstId, State) -> to_bin(A) when is_atom(A) ->
emqx_bridge_impl_kafka_producer:on_stop(InstId, State). atom_to_binary(A);
to_bin(L) when is_list(L) ->
on_query(InstId, Req, State) -> list_to_binary(L);
emqx_bridge_impl_kafka_producer:on_query(InstId, Req, State). to_bin(B) when is_binary(B) ->
B.
on_query_async(InstId, Req, ReplyFn, State) ->
emqx_bridge_impl_kafka_producer:on_query_async(InstId, Req, ReplyFn, State).
on_get_status(InstId, State) ->
emqx_bridge_impl_kafka_producer:on_get_status(InstId, State).

View File

@ -0,0 +1,499 @@
%%--------------------------------------------------------------------
%% Copyright (c) 2022-2023 EMQ Technologies Co., Ltd. All Rights Reserved.
%%--------------------------------------------------------------------
-module(emqx_bridge_impl_kafka_consumer).
-behaviour(emqx_resource).
%% `emqx_resource' API
-export([
callback_mode/0,
is_buffer_supported/0,
on_start/2,
on_stop/2,
on_get_status/2
]).
%% `brod_group_consumer' API
-export([
init/2,
handle_message/2
]).
-ifdef(TEST).
-export([consumer_group_id/1]).
-endif.
-include_lib("emqx/include/logger.hrl").
-include_lib("snabbkaffe/include/snabbkaffe.hrl").
%% needed for the #kafka_message record definition
-include_lib("brod/include/brod.hrl").
-include_lib("emqx_resource/include/emqx_resource.hrl").
-type config() :: #{
authentication := term(),
bootstrap_hosts := binary(),
bridge_name := atom(),
kafka := #{
max_batch_bytes := emqx_schema:bytesize(),
max_rejoin_attempts := non_neg_integer(),
offset_commit_interval_seconds := pos_integer(),
offset_reset_policy := offset_reset_policy(),
topic := binary()
},
topic_mapping := nonempty_list(
#{
kafka_topic := kafka_topic(),
mqtt_topic := emqx_types:topic(),
qos := emqx_types:qos(),
payload_template := string()
}
),
ssl := _,
any() => term()
}.
-type subscriber_id() :: emqx_ee_bridge_kafka_consumer_sup:child_id().
-type kafka_topic() :: brod:topic().
-type state() :: #{
kafka_topics := nonempty_list(kafka_topic()),
subscriber_id := subscriber_id(),
kafka_client_id := brod:client_id()
}.
-type offset_reset_policy() :: reset_to_latest | reset_to_earliest | reset_by_subscriber.
%% -type mqtt_payload() :: full_message | message_value.
-type encoding_mode() :: none | base64.
-type consumer_init_data() :: #{
hookpoint := binary(),
key_encoding_mode := encoding_mode(),
resource_id := resource_id(),
topic_mapping := #{
kafka_topic() := #{
payload_template := emqx_plugin_libs_rule:tmpl_token(),
mqtt_topic => emqx_types:topic(),
qos => emqx_types:qos()
}
},
value_encoding_mode := encoding_mode()
}.
-type consumer_state() :: #{
hookpoint := binary(),
kafka_topic := binary(),
key_encoding_mode := encoding_mode(),
resource_id := resource_id(),
topic_mapping := #{
kafka_topic() := #{
payload_template := emqx_plugin_libs_rule:tmpl_token(),
mqtt_topic => emqx_types:topic(),
qos => emqx_types:qos()
}
},
value_encoding_mode := encoding_mode()
}.
-type subscriber_init_info() :: #{
topic => brod:topic(),
parition => brod:partition(),
group_id => brod:group_id(),
commit_fun => brod_group_subscriber_v2:commit_fun()
}.
%%-------------------------------------------------------------------------------------
%% `emqx_resource' API
%%-------------------------------------------------------------------------------------
callback_mode() ->
async_if_possible.
%% there are no queries to be made to this bridge, so we say that
%% buffer is supported so we don't spawn unused resource buffer
%% workers.
is_buffer_supported() ->
true.
-spec on_start(manager_id(), config()) -> {ok, state()}.
on_start(InstanceId, Config) ->
#{
authentication := Auth,
bootstrap_hosts := BootstrapHosts0,
bridge_name := BridgeName,
hookpoint := _,
kafka := #{
max_batch_bytes := _,
max_rejoin_attempts := _,
offset_commit_interval_seconds := _,
offset_reset_policy := _
},
ssl := SSL,
topic_mapping := _
} = Config,
BootstrapHosts = emqx_bridge_impl_kafka:hosts(BootstrapHosts0),
KafkaType = kafka_consumer,
%% Note: this is distinct per node.
ClientID = make_client_id(InstanceId, KafkaType, BridgeName),
ClientOpts0 =
case Auth of
none -> [];
Auth -> [{sasl, emqx_bridge_impl_kafka:sasl(Auth)}]
end,
ClientOpts = add_ssl_opts(ClientOpts0, SSL),
case brod:start_client(BootstrapHosts, ClientID, ClientOpts) of
ok ->
?tp(
kafka_consumer_client_started,
#{client_id => ClientID, instance_id => InstanceId}
),
?SLOG(info, #{
msg => "kafka_consumer_client_started",
instance_id => InstanceId,
kafka_hosts => BootstrapHosts
});
{error, Reason} ->
?SLOG(error, #{
msg => "failed_to_start_kafka_consumer_client",
instance_id => InstanceId,
kafka_hosts => BootstrapHosts,
reason => emqx_misc:redact(Reason)
}),
throw(failed_to_start_kafka_client)
end,
start_consumer(Config, InstanceId, ClientID).
-spec on_stop(manager_id(), state()) -> ok.
on_stop(_InstanceID, State) ->
#{
subscriber_id := SubscriberId,
kafka_client_id := ClientID
} = State,
stop_subscriber(SubscriberId),
stop_client(ClientID),
ok.
-spec on_get_status(manager_id(), state()) -> connected | disconnected.
on_get_status(_InstanceID, State) ->
#{
subscriber_id := SubscriberId,
kafka_client_id := ClientID,
kafka_topics := KafkaTopics
} = State,
do_get_status(ClientID, KafkaTopics, SubscriberId).
%%-------------------------------------------------------------------------------------
%% `brod_group_subscriber' API
%%-------------------------------------------------------------------------------------
-spec init(subscriber_init_info(), consumer_init_data()) -> {ok, consumer_state()}.
init(GroupData, State0) ->
?tp(kafka_consumer_subscriber_init, #{group_data => GroupData, state => State0}),
#{topic := KafkaTopic} = GroupData,
State = State0#{kafka_topic => KafkaTopic},
{ok, State}.
-spec handle_message(#kafka_message{}, consumer_state()) -> {ok, commit, consumer_state()}.
handle_message(Message, State) ->
?tp_span(
kafka_consumer_handle_message,
#{message => Message, state => State},
do_handle_message(Message, State)
).
do_handle_message(Message, State) ->
#{
hookpoint := Hookpoint,
kafka_topic := KafkaTopic,
key_encoding_mode := KeyEncodingMode,
resource_id := ResourceId,
topic_mapping := TopicMapping,
value_encoding_mode := ValueEncodingMode
} = State,
#{
mqtt_topic := MQTTTopic,
qos := MQTTQoS,
payload_template := PayloadTemplate
} = maps:get(KafkaTopic, TopicMapping),
FullMessage = #{
headers => maps:from_list(Message#kafka_message.headers),
key => encode(Message#kafka_message.key, KeyEncodingMode),
offset => Message#kafka_message.offset,
topic => KafkaTopic,
ts => Message#kafka_message.ts,
ts_type => Message#kafka_message.ts_type,
value => encode(Message#kafka_message.value, ValueEncodingMode)
},
Payload = render(FullMessage, PayloadTemplate),
MQTTMessage = emqx_message:make(ResourceId, MQTTQoS, MQTTTopic, Payload),
_ = emqx:publish(MQTTMessage),
emqx:run_hook(Hookpoint, [FullMessage]),
emqx_resource_metrics:received_inc(ResourceId),
%% note: just `ack' does not commit the offset to the
%% kafka consumer group.
{ok, commit, State}.
%%-------------------------------------------------------------------------------------
%% Helper fns
%%-------------------------------------------------------------------------------------
add_ssl_opts(ClientOpts, #{enable := false}) ->
ClientOpts;
add_ssl_opts(ClientOpts, SSL) ->
[{ssl, emqx_tls_lib:to_client_opts(SSL)} | ClientOpts].
-spec make_subscriber_id(atom() | binary()) -> emqx_ee_bridge_kafka_consumer_sup:child_id().
make_subscriber_id(BridgeName) ->
BridgeNameBin = to_bin(BridgeName),
<<"kafka_subscriber:", BridgeNameBin/binary>>.
ensure_consumer_supervisor_started() ->
Mod = emqx_ee_bridge_kafka_consumer_sup,
ChildSpec =
#{
id => Mod,
start => {Mod, start_link, []},
restart => permanent,
shutdown => infinity,
type => supervisor,
modules => [Mod]
},
case supervisor:start_child(emqx_bridge_sup, ChildSpec) of
{ok, _Pid} ->
ok;
{error, already_present} ->
ok;
{error, {already_started, _Pid}} ->
ok
end.
-spec start_consumer(config(), manager_id(), brod:client_id()) -> {ok, state()}.
start_consumer(Config, InstanceId, ClientID) ->
#{
bootstrap_hosts := BootstrapHosts0,
bridge_name := BridgeName,
hookpoint := Hookpoint,
kafka := #{
max_batch_bytes := MaxBatchBytes,
max_rejoin_attempts := MaxRejoinAttempts,
offset_commit_interval_seconds := OffsetCommitInterval,
offset_reset_policy := OffsetResetPolicy
},
key_encoding_mode := KeyEncodingMode,
topic_mapping := TopicMapping0,
value_encoding_mode := ValueEncodingMode
} = Config,
ok = ensure_consumer_supervisor_started(),
TopicMapping = convert_topic_mapping(TopicMapping0),
InitialState = #{
key_encoding_mode => KeyEncodingMode,
hookpoint => Hookpoint,
resource_id => emqx_bridge_resource:resource_id(kafka_consumer, BridgeName),
topic_mapping => TopicMapping,
value_encoding_mode => ValueEncodingMode
},
%% note: the group id should be the same for all nodes in the
%% cluster, so that the load gets distributed between all
%% consumers and we don't repeat messages in the same cluster.
GroupID = consumer_group_id(BridgeName),
ConsumerConfig = [
{max_bytes, MaxBatchBytes},
{offset_reset_policy, OffsetResetPolicy}
],
GroupConfig = [
{max_rejoin_attempts, MaxRejoinAttempts},
{offset_commit_interval_seconds, OffsetCommitInterval}
],
KafkaTopics = maps:keys(TopicMapping),
GroupSubscriberConfig =
#{
client => ClientID,
group_id => GroupID,
topics => KafkaTopics,
cb_module => ?MODULE,
init_data => InitialState,
message_type => message,
consumer_config => ConsumerConfig,
group_config => GroupConfig
},
%% Below, we spawn a single `brod_group_consumer_v2' worker, with
%% no option for a pool of those. This is because that worker
%% spawns one worker for each assigned topic-partition
%% automatically, so we should not spawn duplicate workers.
SubscriberId = make_subscriber_id(BridgeName),
case emqx_ee_bridge_kafka_consumer_sup:start_child(SubscriberId, GroupSubscriberConfig) of
{ok, _ConsumerPid} ->
?tp(
kafka_consumer_subscriber_started,
#{instance_id => InstanceId, subscriber_id => SubscriberId}
),
{ok, #{
subscriber_id => SubscriberId,
kafka_client_id => ClientID,
kafka_topics => KafkaTopics
}};
{error, Reason2} ->
?SLOG(error, #{
msg => "failed_to_start_kafka_consumer",
instance_id => InstanceId,
kafka_hosts => emqx_bridge_impl_kafka:hosts(BootstrapHosts0),
reason => emqx_misc:redact(Reason2)
}),
stop_client(ClientID),
throw(failed_to_start_kafka_consumer)
end.
-spec stop_subscriber(emqx_ee_bridge_kafka_consumer_sup:child_id()) -> ok.
stop_subscriber(SubscriberId) ->
_ = log_when_error(
fun() ->
emqx_ee_bridge_kafka_consumer_sup:ensure_child_deleted(SubscriberId)
end,
#{
msg => "failed_to_delete_kafka_subscriber",
subscriber_id => SubscriberId
}
),
ok.
-spec stop_client(brod:client_id()) -> ok.
stop_client(ClientID) ->
_ = log_when_error(
fun() ->
brod:stop_client(ClientID)
end,
#{
msg => "failed_to_delete_kafka_consumer_client",
client_id => ClientID
}
),
ok.
do_get_status(ClientID, [KafkaTopic | RestTopics], SubscriberId) ->
case brod:get_partitions_count(ClientID, KafkaTopic) of
{ok, NPartitions} ->
case do_get_status(ClientID, KafkaTopic, SubscriberId, NPartitions) of
connected -> do_get_status(ClientID, RestTopics, SubscriberId);
disconnected -> disconnected
end;
_ ->
disconnected
end;
do_get_status(_ClientID, _KafkaTopics = [], _SubscriberId) ->
connected.
-spec do_get_status(brod:client_id(), binary(), subscriber_id(), pos_integer()) ->
connected | disconnected.
do_get_status(ClientID, KafkaTopic, SubscriberId, NPartitions) ->
Results =
lists:map(
fun(N) ->
brod_client:get_leader_connection(ClientID, KafkaTopic, N)
end,
lists:seq(0, NPartitions - 1)
),
AllLeadersOk =
length(Results) > 0 andalso
lists:all(
fun
({ok, _}) ->
true;
(_) ->
false
end,
Results
),
WorkersAlive = are_subscriber_workers_alive(SubscriberId),
case AllLeadersOk andalso WorkersAlive of
true ->
connected;
false ->
disconnected
end.
are_subscriber_workers_alive(SubscriberId) ->
Children = supervisor:which_children(emqx_ee_bridge_kafka_consumer_sup),
case lists:keyfind(SubscriberId, 1, Children) of
false ->
false;
{_, Pid, _, _} ->
Workers = brod_group_subscriber_v2:get_workers(Pid),
%% we can't enforce the number of partitions on a single
%% node, as the group might be spread across an emqx
%% cluster.
lists:all(fun is_process_alive/1, maps:values(Workers))
end.
log_when_error(Fun, Log) ->
try
Fun()
catch
C:E ->
?SLOG(error, Log#{
exception => C,
reason => E
})
end.
-spec consumer_group_id(atom() | binary()) -> binary().
consumer_group_id(BridgeName0) ->
BridgeName = to_bin(BridgeName0),
<<"emqx-kafka-consumer-", BridgeName/binary>>.
-spec is_dry_run(manager_id()) -> boolean().
is_dry_run(InstanceId) ->
TestIdStart = string:find(InstanceId, ?TEST_ID_PREFIX),
case TestIdStart of
nomatch ->
false;
_ ->
string:equal(TestIdStart, InstanceId)
end.
-spec make_client_id(manager_id(), kafka_consumer, atom() | binary()) -> atom().
make_client_id(InstanceId, KafkaType, KafkaName) ->
case is_dry_run(InstanceId) of
false ->
ClientID0 = emqx_bridge_impl_kafka:make_client_id(KafkaType, KafkaName),
binary_to_atom(ClientID0);
true ->
%% It is a dry run and we don't want to leak too many
%% atoms.
probing_brod_consumers
end.
convert_topic_mapping(TopicMappingList) ->
lists:foldl(
fun(Fields, Acc) ->
#{
kafka_topic := KafkaTopic,
mqtt_topic := MQTTTopic,
qos := QoS,
payload_template := PayloadTemplate0
} = Fields,
PayloadTemplate = emqx_plugin_libs_rule:preproc_tmpl(PayloadTemplate0),
Acc#{
KafkaTopic => #{
payload_template => PayloadTemplate,
mqtt_topic => MQTTTopic,
qos => QoS
}
}
end,
#{},
TopicMappingList
).
render(FullMessage, PayloadTemplate) ->
Opts = #{
return => full_binary,
var_trans => fun
(undefined) ->
<<>>;
(X) ->
emqx_plugin_libs_rule:bin(X)
end
},
emqx_plugin_libs_rule:proc_tmpl(PayloadTemplate, FullMessage, Opts).
encode(Value, none) ->
Value;
encode(Value, base64) ->
base64:encode(Value).
to_bin(B) when is_binary(B) -> B;
to_bin(A) when is_atom(A) -> atom_to_binary(A, utf8).

View File

@ -22,44 +22,39 @@
-include_lib("emqx/include/logger.hrl"). -include_lib("emqx/include/logger.hrl").
%% TODO: rename this to `kafka_producer' after alias support is added
%% to hocon; keeping this as just `kafka' for backwards compatibility.
-define(BRIDGE_TYPE, kafka).
callback_mode() -> async_if_possible. callback_mode() -> async_if_possible.
%% @doc Config schema is defined in emqx_ee_bridge_kafka. %% @doc Config schema is defined in emqx_ee_bridge_kafka.
on_start(InstId, Config) -> on_start(InstId, Config) ->
#{ #{
bridge_name := BridgeName, authentication := Auth,
bootstrap_hosts := Hosts0, bootstrap_hosts := Hosts0,
bridge_name := BridgeName,
connect_timeout := ConnTimeout, connect_timeout := ConnTimeout,
kafka := KafkaConfig = #{message := MessageTemplate, topic := KafkaTopic},
metadata_request_timeout := MetaReqTimeout, metadata_request_timeout := MetaReqTimeout,
min_metadata_refresh_interval := MinMetaRefreshInterval, min_metadata_refresh_interval := MinMetaRefreshInterval,
socket_opts := SocketOpts, socket_opts := SocketOpts,
authentication := Auth,
ssl := SSL ssl := SSL
} = Config, } = Config,
%% TODO: change this to `kafka_producer` after refactoring for kafka_consumer BridgeType = ?BRIDGE_TYPE,
BridgeType = kafka, ResourceId = emqx_bridge_resource:resource_id(BridgeType, BridgeName),
ResourceID = emqx_bridge_resource:resource_id(BridgeType, BridgeName), _ = maybe_install_wolff_telemetry_handlers(ResourceId),
_ = maybe_install_wolff_telemetry_handlers(ResourceID), Hosts = emqx_bridge_impl_kafka:hosts(Hosts0),
%% it's a bug if producer config is not found ClientId = emqx_bridge_impl_kafka:make_client_id(BridgeType, BridgeName),
%% the caller should not try to start a producer if
%% there is no producer config
ProducerConfigWrapper = get_required(producer, Config, no_kafka_producer_config),
ProducerConfig = get_required(kafka, ProducerConfigWrapper, no_kafka_producer_parameters),
MessageTemplate = get_required(message, ProducerConfig, no_kafka_message_template),
Hosts = hosts(Hosts0),
ClientId = make_client_id(BridgeName),
ClientConfig = #{ ClientConfig = #{
min_metadata_refresh_interval => MinMetaRefreshInterval, min_metadata_refresh_interval => MinMetaRefreshInterval,
connect_timeout => ConnTimeout, connect_timeout => ConnTimeout,
client_id => ClientId, client_id => ClientId,
request_timeout => MetaReqTimeout, request_timeout => MetaReqTimeout,
extra_sock_opts => socket_opts(SocketOpts), extra_sock_opts => socket_opts(SocketOpts),
sasl => sasl(Auth), sasl => emqx_bridge_impl_kafka:sasl(Auth),
ssl => ssl(SSL) ssl => ssl(SSL)
}, },
#{
topic := KafkaTopic
} = ProducerConfig,
case wolff:ensure_supervised_client(ClientId, Hosts, ClientConfig) of case wolff:ensure_supervised_client(ClientId, Hosts, ClientConfig) of
{ok, _} -> {ok, _} ->
?SLOG(info, #{ ?SLOG(info, #{
@ -85,7 +80,7 @@ on_start(InstId, Config) ->
_ -> _ ->
string:equal(TestIdStart, InstId) string:equal(TestIdStart, InstId)
end, end,
WolffProducerConfig = producers_config(BridgeName, ClientId, ProducerConfig, IsDryRun), WolffProducerConfig = producers_config(BridgeName, ClientId, KafkaConfig, IsDryRun),
case wolff:ensure_supervised_producers(ClientId, KafkaTopic, WolffProducerConfig) of case wolff:ensure_supervised_producers(ClientId, KafkaTopic, WolffProducerConfig) of
{ok, Producers} -> {ok, Producers} ->
{ok, #{ {ok, #{
@ -93,7 +88,7 @@ on_start(InstId, Config) ->
client_id => ClientId, client_id => ClientId,
kafka_topic => KafkaTopic, kafka_topic => KafkaTopic,
producers => Producers, producers => Producers,
resource_id => ResourceID resource_id => ResourceId
}}; }};
{error, Reason2} -> {error, Reason2} ->
?SLOG(error, #{ ?SLOG(error, #{
@ -265,12 +260,6 @@ do_get_status(Client, KafkaTopic) ->
disconnected disconnected
end. end.
%% Parse comma separated host:port list into a [{Host,Port}] list
hosts(Hosts) when is_binary(Hosts) ->
hosts(binary_to_list(Hosts));
hosts(Hosts) when is_list(Hosts) ->
kpro:parse_endpoints(Hosts).
%% Extra socket options, such as sndbuf size etc. %% Extra socket options, such as sndbuf size etc.
socket_opts(Opts) when is_map(Opts) -> socket_opts(Opts) when is_map(Opts) ->
socket_opts(maps:to_list(Opts)); socket_opts(maps:to_list(Opts));
@ -298,16 +287,6 @@ adjust_socket_buffer(Bytes, Opts) ->
[{buffer, max(Bytes1, Bytes)} | Acc1] [{buffer, max(Bytes1, Bytes)} | Acc1]
end. end.
sasl(none) ->
undefined;
sasl(#{mechanism := Mechanism, username := Username, password := Password}) ->
{Mechanism, Username, emqx_secret:wrap(Password)};
sasl(#{
kerberos_principal := Principal,
kerberos_keytab_file := KeyTabFile
}) ->
{callback, brod_gssapi, {gssapi, KeyTabFile, Principal}}.
ssl(#{enable := true} = SSL) -> ssl(#{enable := true} = SSL) ->
emqx_tls_lib:to_client_opts(SSL); emqx_tls_lib:to_client_opts(SSL);
ssl(_) -> ssl(_) ->
@ -339,8 +318,7 @@ producers_config(BridgeName, ClientId, Input, IsDryRun) ->
disk -> {false, replayq_dir(ClientId)}; disk -> {false, replayq_dir(ClientId)};
hybrid -> {true, replayq_dir(ClientId)} hybrid -> {true, replayq_dir(ClientId)}
end, end,
%% TODO: change this once we add kafka source BridgeType = ?BRIDGE_TYPE,
BridgeType = kafka,
ResourceID = emqx_bridge_resource:resource_id(BridgeType, BridgeName), ResourceID = emqx_bridge_resource:resource_id(BridgeType, BridgeName),
#{ #{
name => make_producer_name(BridgeName, IsDryRun), name => make_producer_name(BridgeName, IsDryRun),
@ -366,12 +344,6 @@ partitioner(key_dispatch) -> first_key_dispatch.
replayq_dir(ClientId) -> replayq_dir(ClientId) ->
filename:join([emqx:data_dir(), "kafka", ClientId]). filename:join([emqx:data_dir(), "kafka", ClientId]).
%% Client ID is better to be unique to make it easier for Kafka side trouble shooting.
make_client_id(BridgeName) when is_atom(BridgeName) ->
make_client_id(atom_to_list(BridgeName));
make_client_id(BridgeName) ->
iolist_to_binary([BridgeName, ":", atom_to_list(node())]).
%% Producer name must be an atom which will be used as a ETS table name for %% Producer name must be an atom which will be used as a ETS table name for
%% partition worker lookup. %% partition worker lookup.
make_producer_name(BridgeName, IsDryRun) when is_atom(BridgeName) -> make_producer_name(BridgeName, IsDryRun) when is_atom(BridgeName) ->
@ -400,11 +372,6 @@ with_log_at_error(Fun, Log) ->
}) })
end. end.
get_required(Field, Config, Throw) ->
Value = maps:get(Field, Config, none),
Value =:= none andalso throw(Throw),
Value.
%% we *must* match the bridge id in the event metadata with that in %% we *must* match the bridge id in the event metadata with that in
%% the handler config; otherwise, multiple kafka producer bridges will %% the handler config; otherwise, multiple kafka producer bridges will
%% install multiple handlers to the same wolff events, multiplying the %% install multiple handlers to the same wolff events, multiplying the

View File

@ -0,0 +1,79 @@
%%--------------------------------------------------------------------
%% Copyright (c) 2022-2023 EMQ Technologies Co., Ltd. All Rights Reserved.
%%--------------------------------------------------------------------
-module(emqx_ee_bridge_kafka_consumer_sup).
-behaviour(supervisor).
%% `supervisor' API
-export([init/1]).
%% API
-export([
start_link/0,
child_spec/2,
start_child/2,
ensure_child_deleted/1
]).
-type child_id() :: binary().
-export_type([child_id/0]).
%%--------------------------------------------------------------------------------------------
%% API
%%--------------------------------------------------------------------------------------------
start_link() ->
supervisor:start_link({local, ?MODULE}, ?MODULE, []).
-spec child_spec(child_id(), map()) -> supervisor:child_spec().
child_spec(Id, GroupSubscriberConfig) ->
Mod = brod_group_subscriber_v2,
#{
id => Id,
start => {Mod, start_link, [GroupSubscriberConfig]},
restart => permanent,
shutdown => 10_000,
type => worker,
modules => [Mod]
}.
-spec start_child(child_id(), map()) -> {ok, pid()} | {error, term()}.
start_child(Id, GroupSubscriberConfig) ->
ChildSpec = child_spec(Id, GroupSubscriberConfig),
case supervisor:start_child(?MODULE, ChildSpec) of
{ok, Pid} ->
{ok, Pid};
{ok, Pid, _Info} ->
{ok, Pid};
{error, already_present} ->
supervisor:restart_child(?MODULE, Id);
{error, {already_started, Pid}} ->
{ok, Pid};
{error, Error} ->
{error, Error}
end.
-spec ensure_child_deleted(child_id()) -> ok.
ensure_child_deleted(Id) ->
case supervisor:terminate_child(?MODULE, Id) of
ok ->
ok = supervisor:delete_child(?MODULE, Id),
ok;
{error, not_found} ->
ok
end.
%%--------------------------------------------------------------------------------------------
%% `supervisor' API
%%--------------------------------------------------------------------------------------------
init([]) ->
SupFlags = #{
strategy => one_for_one,
intensity => 100,
period => 10
},
ChildSpecs = [],
{ok, {SupFlags, ChildSpecs}}.

File diff suppressed because it is too large Load Diff

View File

@ -11,7 +11,7 @@
-include_lib("common_test/include/ct.hrl"). -include_lib("common_test/include/ct.hrl").
-include_lib("brod/include/brod.hrl"). -include_lib("brod/include/brod.hrl").
-define(PRODUCER, emqx_bridge_impl_kafka). -define(PRODUCER, emqx_bridge_impl_kafka_producer).
%%------------------------------------------------------------------------------ %%------------------------------------------------------------------------------
%% Things for REST API tests %% Things for REST API tests
@ -30,16 +30,15 @@
-include_lib("emqx/include/emqx.hrl"). -include_lib("emqx/include/emqx.hrl").
-include("emqx_dashboard.hrl"). -include("emqx_dashboard.hrl").
-define(CONTENT_TYPE, "application/x-www-form-urlencoded").
-define(HOST, "http://127.0.0.1:18083"). -define(HOST, "http://127.0.0.1:18083").
%% -define(API_VERSION, "v5"). %% -define(API_VERSION, "v5").
-define(BASE_PATH, "/api/v5"). -define(BASE_PATH, "/api/v5").
-define(APP_DASHBOARD, emqx_dashboard). %% TODO: rename this to `kafka_producer' after alias support is added
-define(APP_MANAGEMENT, emqx_management). %% to hocon; keeping this as just `kafka' for backwards compatibility.
-define(BRIDGE_TYPE, "kafka").
%%------------------------------------------------------------------------------ %%------------------------------------------------------------------------------
%% CT boilerplate %% CT boilerplate
@ -71,6 +70,10 @@ wait_until_kafka_is_up(Attempts) ->
end. end.
init_per_suite(Config) -> init_per_suite(Config) ->
%% ensure loaded
_ = application:load(emqx_ee_bridge),
_ = emqx_ee_bridge:module_info(),
application:load(emqx_bridge),
ok = emqx_common_test_helpers:start_apps([emqx_conf]), ok = emqx_common_test_helpers:start_apps([emqx_conf]),
ok = emqx_connector_test_helpers:start_apps([emqx_resource, emqx_bridge, emqx_rule_engine]), ok = emqx_connector_test_helpers:start_apps([emqx_resource, emqx_bridge, emqx_rule_engine]),
{ok, _} = application:ensure_all_started(emqx_connector), {ok, _} = application:ensure_all_started(emqx_connector),
@ -102,6 +105,13 @@ init_per_group(GroupName, Config) ->
end_per_group(_, _) -> end_per_group(_, _) ->
ok. ok.
init_per_testcase(_TestCase, Config) ->
Config.
end_per_testcase(_TestCase, _Config) ->
delete_all_bridges(),
ok.
set_special_configs(emqx_management) -> set_special_configs(emqx_management) ->
Listeners = #{http => #{port => 8081}}, Listeners = #{http => #{port => 8081}},
Config = #{ Config = #{
@ -222,7 +232,7 @@ kafka_bridge_rest_api_all_auth_methods(UseSSL) ->
ok. ok.
kafka_bridge_rest_api_helper(Config) -> kafka_bridge_rest_api_helper(Config) ->
BridgeType = "kafka", BridgeType = ?BRIDGE_TYPE,
BridgeName = "my_kafka_bridge", BridgeName = "my_kafka_bridge",
BridgeID = emqx_bridge_resource:bridge_id( BridgeID = emqx_bridge_resource:bridge_id(
erlang:list_to_binary(BridgeType), erlang:list_to_binary(BridgeType),
@ -233,6 +243,7 @@ kafka_bridge_rest_api_helper(Config) ->
erlang:list_to_binary(BridgeName) erlang:list_to_binary(BridgeName)
), ),
UrlEscColon = "%3A", UrlEscColon = "%3A",
BridgesProbeParts = ["bridges_probe"],
BridgeIdUrlEnc = BridgeType ++ UrlEscColon ++ BridgeName, BridgeIdUrlEnc = BridgeType ++ UrlEscColon ++ BridgeName,
BridgesParts = ["bridges"], BridgesParts = ["bridges"],
BridgesPartsIdDeleteAlsoActions = ["bridges", BridgeIdUrlEnc ++ "?also_delete_dep_actions"], BridgesPartsIdDeleteAlsoActions = ["bridges", BridgeIdUrlEnc ++ "?also_delete_dep_actions"],
@ -266,24 +277,18 @@ kafka_bridge_rest_api_helper(Config) ->
%% Create new Kafka bridge %% Create new Kafka bridge
KafkaTopic = "test-topic-one-partition", KafkaTopic = "test-topic-one-partition",
CreateBodyTmp = #{ CreateBodyTmp = #{
<<"type">> => <<"kafka">>, <<"type">> => <<?BRIDGE_TYPE>>,
<<"name">> => <<"my_kafka_bridge">>, <<"name">> => <<"my_kafka_bridge">>,
<<"bootstrap_hosts">> => iolist_to_binary(maps:get(<<"bootstrap_hosts">>, Config)), <<"bootstrap_hosts">> => iolist_to_binary(maps:get(<<"bootstrap_hosts">>, Config)),
<<"enable">> => true, <<"enable">> => true,
<<"authentication">> => maps:get(<<"authentication">>, Config), <<"authentication">> => maps:get(<<"authentication">>, Config),
<<"producer">> => #{ <<"local_topic">> => <<"t/#">>,
<<"mqtt">> => #{ <<"kafka">> => #{
topic => <<"t/#">> <<"topic">> => iolist_to_binary(KafkaTopic),
}, <<"buffer">> => #{<<"memory_overload_protection">> => <<"false">>},
<<"kafka">> => #{ <<"message">> => #{
<<"topic">> => iolist_to_binary(KafkaTopic), <<"key">> => <<"${clientid}">>,
<<"buffer">> => #{ <<"value">> => <<"${.payload}">>
<<"memory_overload_protection">> => <<"false">>
},
<<"message">> => #{
<<"key">> => <<"${clientid}">>,
<<"value">> => <<"${.payload}">>
}
} }
} }
}, },
@ -295,6 +300,13 @@ kafka_bridge_rest_api_helper(Config) ->
{ok, 201, _Data} = show(http_post(BridgesParts, show(CreateBody))), {ok, 201, _Data} = show(http_post(BridgesParts, show(CreateBody))),
%% Check that the new bridge is in the list of bridges %% Check that the new bridge is in the list of bridges
true = MyKafkaBridgeExists(), true = MyKafkaBridgeExists(),
%% Probe should work
{ok, 204, _} = http_post(BridgesProbeParts, CreateBody),
%% no extra atoms should be created when probing
AtomsBefore = erlang:system_info(atom_count),
{ok, 204, _} = http_post(BridgesProbeParts, CreateBody),
AtomsAfter = erlang:system_info(atom_count),
?assertEqual(AtomsBefore, AtomsAfter),
%% Create a rule that uses the bridge %% Create a rule that uses the bridge
{ok, 201, _Rule} = http_post( {ok, 201, _Rule} = http_post(
["rules"], ["rules"],
@ -355,6 +367,7 @@ kafka_bridge_rest_api_helper(Config) ->
%% Cleanup %% Cleanup
{ok, 204, _} = show(http_delete(BridgesPartsIdDeleteAlsoActions)), {ok, 204, _} = show(http_delete(BridgesPartsIdDeleteAlsoActions)),
false = MyKafkaBridgeExists(), false = MyKafkaBridgeExists(),
delete_all_bridges(),
ok. ok.
%%------------------------------------------------------------------------------ %%------------------------------------------------------------------------------
@ -371,9 +384,10 @@ t_failed_creation_then_fix(Config) ->
ValidAuthSettings = valid_sasl_plain_settings(), ValidAuthSettings = valid_sasl_plain_settings(),
WrongAuthSettings = ValidAuthSettings#{"password" := "wrong"}, WrongAuthSettings = ValidAuthSettings#{"password" := "wrong"},
Hash = erlang:phash2([HostsString, ?FUNCTION_NAME]), Hash = erlang:phash2([HostsString, ?FUNCTION_NAME]),
Type = ?BRIDGE_TYPE,
Name = "kafka_bridge_name_" ++ erlang:integer_to_list(Hash), Name = "kafka_bridge_name_" ++ erlang:integer_to_list(Hash),
ResourceId = emqx_bridge_resource:resource_id("kafka", Name), ResourceId = emqx_bridge_resource:resource_id(Type, Name),
BridgeId = emqx_bridge_resource:bridge_id("kafka", Name), BridgeId = emqx_bridge_resource:bridge_id(Type, Name),
KafkaTopic = "test-topic-one-partition", KafkaTopic = "test-topic-one-partition",
WrongConf = config(#{ WrongConf = config(#{
"authentication" => WrongAuthSettings, "authentication" => WrongAuthSettings,
@ -397,18 +411,20 @@ t_failed_creation_then_fix(Config) ->
"ssl" => #{} "ssl" => #{}
}), }),
%% creates, but fails to start producers %% creates, but fails to start producers
%% FIXME: change to kafka_producer after config refactoring {ok, #{config := WrongConfigAtom1}} = emqx_bridge:create(
?assertMatch(ok, emqx_bridge_resource:create(kafka, erlang:list_to_atom(Name), WrongConf, #{})), Type, erlang:list_to_atom(Name), WrongConf
?assertThrow(failed_to_start_kafka_producer, ?PRODUCER:on_start(ResourceId, WrongConf)), ),
WrongConfigAtom = WrongConfigAtom1#{bridge_name => Name},
?assertThrow(failed_to_start_kafka_producer, ?PRODUCER:on_start(ResourceId, WrongConfigAtom)),
%% before throwing, it should cleanup the client process. %% before throwing, it should cleanup the client process.
?assertEqual([], supervisor:which_children(wolff_client_sup)), ?assertEqual([], supervisor:which_children(wolff_client_sup)),
%% FIXME: change to kafka_producer after config refactoring
%% must succeed with correct config %% must succeed with correct config
?assertMatch(ok, emqx_bridge_resource:create(kafka, erlang:list_to_atom(Name), ValidConf, #{})), {ok, #{config := ValidConfigAtom1}} = emqx_bridge:create(
{ok, State} = ?PRODUCER:on_start(ResourceId, ValidConf), Type, erlang:list_to_atom(Name), ValidConf
%% To make sure we get unique value ),
timer:sleep(1), ValidConfigAtom = ValidConfigAtom1#{bridge_name => Name},
Time = erlang:monotonic_time(), {ok, State} = ?PRODUCER:on_start(ResourceId, ValidConfigAtom),
Time = erlang:unique_integer(),
BinTime = integer_to_binary(Time), BinTime = integer_to_binary(Time),
Msg = #{ Msg = #{
clientid => BinTime, clientid => BinTime,
@ -423,6 +439,7 @@ t_failed_creation_then_fix(Config) ->
%% TODO: refactor those into init/end per testcase %% TODO: refactor those into init/end per testcase
ok = ?PRODUCER:on_stop(ResourceId, State), ok = ?PRODUCER:on_stop(ResourceId, State),
ok = emqx_bridge_resource:remove(BridgeId), ok = emqx_bridge_resource:remove(BridgeId),
delete_all_bridges(),
ok. ok.
%%------------------------------------------------------------------------------ %%------------------------------------------------------------------------------
@ -487,6 +504,7 @@ publish_helper(
}, },
Conf0 Conf0
) -> ) ->
delete_all_bridges(),
HostsString = HostsString =
case {AuthSettings, SSLSettings} of case {AuthSettings, SSLSettings} of
{"none", Map} when map_size(Map) =:= 0 -> {"none", Map} when map_size(Map) =:= 0 ->
@ -500,8 +518,8 @@ publish_helper(
end, end,
Hash = erlang:phash2([HostsString, AuthSettings, SSLSettings]), Hash = erlang:phash2([HostsString, AuthSettings, SSLSettings]),
Name = "kafka_bridge_name_" ++ erlang:integer_to_list(Hash), Name = "kafka_bridge_name_" ++ erlang:integer_to_list(Hash),
InstId = emqx_bridge_resource:resource_id("kafka", Name), Type = ?BRIDGE_TYPE,
BridgeId = emqx_bridge_resource:bridge_id("kafka", Name), InstId = emqx_bridge_resource:resource_id(Type, Name),
KafkaTopic = "test-topic-one-partition", KafkaTopic = "test-topic-one-partition",
Conf = config( Conf = config(
#{ #{
@ -509,30 +527,38 @@ publish_helper(
"kafka_hosts_string" => HostsString, "kafka_hosts_string" => HostsString,
"kafka_topic" => KafkaTopic, "kafka_topic" => KafkaTopic,
"instance_id" => InstId, "instance_id" => InstId,
"local_topic" => <<"mqtt/local">>,
"ssl" => SSLSettings "ssl" => SSLSettings
}, },
Conf0 Conf0
), ),
{ok, _} = emqx_bridge:create(
emqx_bridge_resource:create(kafka, erlang:list_to_atom(Name), Conf, #{}), <<?BRIDGE_TYPE>>, list_to_binary(Name), Conf
%% To make sure we get unique value ),
timer:sleep(1), Time = erlang:unique_integer(),
Time = erlang:monotonic_time(),
BinTime = integer_to_binary(Time), BinTime = integer_to_binary(Time),
Partition = 0,
Msg = #{ Msg = #{
clientid => BinTime, clientid => BinTime,
payload => <<"payload">>, payload => <<"payload">>,
timestamp => Time timestamp => Time
}, },
{ok, Offset} = resolve_kafka_offset(kafka_hosts(), KafkaTopic, 0), {ok, Offset0} = resolve_kafka_offset(kafka_hosts(), KafkaTopic, Partition),
ct:pal("base offset before testing ~p", [Offset]), ct:pal("base offset before testing ~p", [Offset0]),
StartRes = ?PRODUCER:on_start(InstId, Conf), {ok, _Group, #{state := State}} = emqx_resource:get_instance(InstId),
{ok, State} = StartRes,
ok = send(CtConfig, InstId, Msg, State), ok = send(CtConfig, InstId, Msg, State),
{ok, {_, [KafkaMsg]}} = brod:fetch(kafka_hosts(), KafkaTopic, 0, Offset), {ok, {_, [KafkaMsg0]}} = brod:fetch(kafka_hosts(), KafkaTopic, Partition, Offset0),
?assertMatch(#kafka_message{key = BinTime}, KafkaMsg), ?assertMatch(#kafka_message{key = BinTime}, KafkaMsg0),
ok = ?PRODUCER:on_stop(InstId, State),
ok = emqx_bridge_resource:remove(BridgeId), %% test that it forwards from local mqtt topic as well
{ok, Offset1} = resolve_kafka_offset(kafka_hosts(), KafkaTopic, Partition),
ct:pal("base offset before testing (2) ~p", [Offset1]),
emqx:publish(emqx_message:make(<<"mqtt/local">>, <<"payload">>)),
ct:sleep(2_000),
{ok, {_, [KafkaMsg1]}} = brod:fetch(kafka_hosts(), KafkaTopic, Partition, Offset1),
?assertMatch(#kafka_message{value = <<"payload">>}, KafkaMsg1),
delete_all_bridges(),
ok. ok.
default_config() -> default_config() ->
@ -545,18 +571,24 @@ config(Args0, More) ->
Args1 = maps:merge(default_config(), Args0), Args1 = maps:merge(default_config(), Args0),
Args = maps:merge(Args1, More), Args = maps:merge(Args1, More),
ConfText = hocon_config(Args), ConfText = hocon_config(Args),
ct:pal("Running tests with conf:\n~s", [ConfText]), {ok, Conf} = hocon:binary(ConfText, #{format => map}),
{ok, Conf} = hocon:binary(ConfText), ct:pal("Running tests with conf:\n~p", [Conf]),
#{config := Parsed} = hocon_tconf:check_plain(
emqx_ee_bridge_kafka,
#{<<"config">> => Conf},
#{atom_key => true}
),
InstId = maps:get("instance_id", Args), InstId = maps:get("instance_id", Args),
<<"bridge:", BridgeId/binary>> = InstId, <<"bridge:", BridgeId/binary>> = InstId,
Parsed#{bridge_name => erlang:element(2, emqx_bridge_resource:parse_bridge_id(BridgeId))}. {Type, Name} = emqx_bridge_resource:parse_bridge_id(BridgeId),
TypeBin = atom_to_binary(Type),
hocon_tconf:check_plain(
emqx_bridge_schema,
Conf,
#{atom_key => false, required => false}
),
#{<<"bridges">> := #{TypeBin := #{Name := Parsed}}} = Conf,
Parsed.
hocon_config(Args) -> hocon_config(Args) ->
InstId = maps:get("instance_id", Args),
<<"bridge:", BridgeId/binary>> = InstId,
{_Type, Name} = emqx_bridge_resource:parse_bridge_id(BridgeId),
AuthConf = maps:get("authentication", Args), AuthConf = maps:get("authentication", Args),
AuthTemplate = iolist_to_binary(hocon_config_template_authentication(AuthConf)), AuthTemplate = iolist_to_binary(hocon_config_template_authentication(AuthConf)),
AuthConfRendered = bbmustache:render(AuthTemplate, AuthConf), AuthConfRendered = bbmustache:render(AuthTemplate, AuthConf),
@ -567,6 +599,7 @@ hocon_config(Args) ->
iolist_to_binary(hocon_config_template()), iolist_to_binary(hocon_config_template()),
Args#{ Args#{
"authentication" => AuthConfRendered, "authentication" => AuthConfRendered,
"bridge_name" => Name,
"ssl" => SSLConfRendered "ssl" => SSLConfRendered
} }
), ),
@ -574,23 +607,34 @@ hocon_config(Args) ->
%% erlfmt-ignore %% erlfmt-ignore
hocon_config_template() -> hocon_config_template() ->
%% TODO: rename the type to `kafka_producer' after alias support is
%% added to hocon; keeping this as just `kafka' for backwards
%% compatibility.
""" """
bootstrap_hosts = \"{{ kafka_hosts_string }}\" bridges.kafka.{{ bridge_name }} {
enable = true bootstrap_hosts = \"{{ kafka_hosts_string }}\"
authentication = {{{ authentication }}} enable = true
ssl = {{{ ssl }}} authentication = {{{ authentication }}}
producer = { ssl = {{{ ssl }}}
mqtt { local_topic = \"{{ local_topic }}\"
topic = \"t/#\" kafka = {
message = {
key = \"${clientid}\"
value = \"${.payload}\"
timestamp = \"${timestamp}\"
} }
kafka = { buffer = {
topic = \"{{ kafka_topic }}\" memory_overload_protection = false
message = {key = \"${clientid}\", value = \"${.payload}\"}
partition_strategy = {{ partition_strategy }}
buffer = {
memory_overload_protection = false
}
} }
partition_strategy = {{ partition_strategy }}
topic = \"{{ kafka_topic }}\"
}
metadata_request_timeout = 5s
min_metadata_refresh_interval = 3s
socket_opts {
nodelay = true
}
connect_timeout = 5s
} }
""". """.
@ -631,22 +675,42 @@ hocon_config_template_ssl(_) ->
""". """.
kafka_hosts_string() -> kafka_hosts_string() ->
"kafka-1.emqx.net:9092,". KafkaHost = os:getenv("KAFKA_PLAIN_HOST", "kafka-1.emqx.net"),
KafkaPort = os:getenv("KAFKA_PLAIN_PORT", "9092"),
KafkaHost ++ ":" ++ KafkaPort ++ ",".
kafka_hosts_string_sasl() -> kafka_hosts_string_sasl() ->
"kafka-1.emqx.net:9093,". KafkaHost = os:getenv("KAFKA_SASL_PLAIN_HOST", "kafka-1.emqx.net"),
KafkaPort = os:getenv("KAFKA_SASL_PLAIN_PORT", "9093"),
KafkaHost ++ ":" ++ KafkaPort ++ ",".
kafka_hosts_string_ssl() -> kafka_hosts_string_ssl() ->
"kafka-1.emqx.net:9094,". KafkaHost = os:getenv("KAFKA_SSL_HOST", "kafka-1.emqx.net"),
KafkaPort = os:getenv("KAFKA_SSL_PORT", "9094"),
KafkaHost ++ ":" ++ KafkaPort ++ ",".
kafka_hosts_string_ssl_sasl() -> kafka_hosts_string_ssl_sasl() ->
"kafka-1.emqx.net:9095,". KafkaHost = os:getenv("KAFKA_SASL_SSL_HOST", "kafka-1.emqx.net"),
KafkaPort = os:getenv("KAFKA_SASL_SSL_PORT", "9095"),
KafkaHost ++ ":" ++ KafkaPort ++ ",".
shared_secret_path() ->
os:getenv("CI_SHARED_SECRET_PATH", "/var/lib/secret").
shared_secret(client_keyfile) ->
filename:join([shared_secret_path(), "client.key"]);
shared_secret(client_certfile) ->
filename:join([shared_secret_path(), "client.crt"]);
shared_secret(client_cacertfile) ->
filename:join([shared_secret_path(), "ca.crt"]);
shared_secret(rig_keytab) ->
filename:join([shared_secret_path(), "rig.keytab"]).
valid_ssl_settings() -> valid_ssl_settings() ->
#{ #{
"cacertfile" => <<"/var/lib/secret/ca.crt">>, "cacertfile" => shared_secret(client_cacertfile),
"certfile" => <<"/var/lib/secret/client.crt">>, "certfile" => shared_secret(client_certfile),
"keyfile" => <<"/var/lib/secret/client.key">>, "keyfile" => shared_secret(client_keyfile),
"enable" => <<"true">> "enable" => <<"true">>
}. }.
@ -670,7 +734,7 @@ valid_sasl_scram512_settings() ->
valid_sasl_kerberos_settings() -> valid_sasl_kerberos_settings() ->
#{ #{
"kerberos_principal" => "rig@KDC.EMQX.NET", "kerberos_principal" => "rig@KDC.EMQX.NET",
"kerberos_keytab_file" => "/var/lib/secret/rig.keytab" "kerberos_keytab_file" => shared_secret(rig_keytab)
}. }.
kafka_hosts() -> kafka_hosts() ->
@ -732,3 +796,17 @@ api_path(Parts) ->
json(Data) -> json(Data) ->
{ok, Jsx} = emqx_json:safe_decode(Data, [return_maps]), {ok, Jsx} = emqx_json:safe_decode(Data, [return_maps]),
Jsx. Jsx.
delete_all_bridges() ->
lists:foreach(
fun(#{name := Name, type := Type}) ->
emqx_bridge:remove(Type, Name)
end,
emqx_bridge:list()
),
%% at some point during the tests, sometimes `emqx_bridge:list()'
%% returns an empty list, but `emqx:get_config([bridges])' returns
%% a bunch of orphan test bridges...
lists:foreach(fun emqx_resource:remove/1, emqx_resource:list_instances()),
emqx_config:put([bridges], #{}),
ok.

View File

@ -1105,13 +1105,13 @@ do_econnrefused_or_timeout_test(Config, Error) ->
?assertMatch( ?assertMatch(
#{ #{
dropped := Dropped, dropped := Dropped,
failed := 0, failed := Failed,
inflight := Inflight, inflight := Inflight,
matched := Matched, matched := Matched,
queuing := Queueing, queuing := Queueing,
retried := 0, retried := 0,
success := 0 success := 0
} when Matched >= 1 andalso Inflight + Queueing + Dropped =< 2, } when Matched >= 1 andalso Inflight + Queueing + Dropped + Failed =< 2,
CurrentMetrics CurrentMetrics
); );
{timeout, async} -> {timeout, async} ->

View File

@ -0,0 +1,287 @@
%%--------------------------------------------------------------------
%% Copyright (c) 2023 EMQ Technologies Co., Ltd. All Rights Reserved.
%%--------------------------------------------------------------------
-module(emqx_ee_bridge_kafka_tests).
-include_lib("eunit/include/eunit.hrl").
%%===========================================================================
%% Test cases
%%===========================================================================
kafka_producer_test() ->
Conf1 = parse(kafka_producer_old_hocon(_WithLocalTopic0 = false)),
Conf2 = parse(kafka_producer_old_hocon(_WithLocalTopic1 = true)),
Conf3 = parse(kafka_producer_new_hocon()),
?assertMatch(
#{
<<"bridges">> :=
#{
<<"kafka">> :=
#{
<<"myproducer">> :=
#{<<"kafka">> := #{}}
}
}
},
check(Conf1)
),
?assertNotMatch(
#{
<<"bridges">> :=
#{
<<"kafka">> :=
#{
<<"myproducer">> :=
#{<<"local_topic">> := _}
}
}
},
check(Conf1)
),
?assertMatch(
#{
<<"bridges">> :=
#{
<<"kafka">> :=
#{
<<"myproducer">> :=
#{
<<"kafka">> := #{},
<<"local_topic">> := <<"mqtt/local">>
}
}
}
},
check(Conf2)
),
?assertMatch(
#{
<<"bridges">> :=
#{
<<"kafka">> :=
#{
<<"myproducer">> :=
#{
<<"kafka">> := #{},
<<"local_topic">> := <<"mqtt/local">>
}
}
}
},
check(Conf3)
),
ok.
kafka_consumer_test() ->
Conf1 = parse(kafka_consumer_hocon()),
?assertMatch(
#{
<<"bridges">> :=
#{
<<"kafka_consumer">> :=
#{
<<"my_consumer">> := _
}
}
},
check(Conf1)
),
%% Bad: can't repeat kafka topics.
BadConf1 = emqx_map_lib:deep_put(
[<<"bridges">>, <<"kafka_consumer">>, <<"my_consumer">>, <<"topic_mapping">>],
Conf1,
[
#{
<<"kafka_topic">> => <<"t1">>,
<<"mqtt_topic">> => <<"mqtt/t1">>,
<<"qos">> => 1,
<<"payload_template">> => <<"${.}">>
},
#{
<<"kafka_topic">> => <<"t1">>,
<<"mqtt_topic">> => <<"mqtt/t2">>,
<<"qos">> => 2,
<<"payload_template">> => <<"v = ${.value}">>
}
]
),
?assertThrow(
{_, [
#{
path := "bridges.kafka_consumer.my_consumer.topic_mapping",
reason := "Kafka topics must not be repeated in a bridge"
}
]},
check(BadConf1)
),
%% Bad: there must be at least 1 mapping.
BadConf2 = emqx_map_lib:deep_put(
[<<"bridges">>, <<"kafka_consumer">>, <<"my_consumer">>, <<"topic_mapping">>],
Conf1,
[]
),
?assertThrow(
{_, [
#{
path := "bridges.kafka_consumer.my_consumer.topic_mapping",
reason := "There must be at least one Kafka-MQTT topic mapping"
}
]},
check(BadConf2)
),
ok.
%%===========================================================================
%% Helper functions
%%===========================================================================
parse(Hocon) ->
{ok, Conf} = hocon:binary(Hocon),
Conf.
check(Conf) when is_map(Conf) ->
hocon_tconf:check_plain(emqx_bridge_schema, Conf).
%%===========================================================================
%% Data section
%%===========================================================================
%% erlfmt-ignore
kafka_producer_old_hocon(_WithLocalTopic = true) ->
kafka_producer_old_hocon("mqtt {topic = \"mqtt/local\"}\n");
kafka_producer_old_hocon(_WithLocalTopic = false) ->
kafka_producer_old_hocon("mqtt {}\n");
kafka_producer_old_hocon(MQTTConfig) when is_list(MQTTConfig) ->
"""
bridges.kafka {
myproducer {
authentication = \"none\"
bootstrap_hosts = \"toxiproxy:9292\"
connect_timeout = \"5s\"
metadata_request_timeout = \"5s\"
min_metadata_refresh_interval = \"3s\"
producer {
kafka {
buffer {
memory_overload_protection = false
mode = \"memory\"
per_partition_limit = \"2GB\"
segment_bytes = \"100MB\"
}
compression = \"no_compression\"
max_batch_bytes = \"896KB\"
max_inflight = 10
message {
key = \"${.clientid}\"
timestamp = \"${.timestamp}\"
value = \"${.}\"
}
partition_count_refresh_interval = \"60s\"
partition_strategy = \"random\"
required_acks = \"all_isr\"
topic = \"test-topic-two-partitions\"
}
""" ++ MQTTConfig ++
"""
}
socket_opts {
nodelay = true
recbuf = \"1024KB\"
sndbuf = \"1024KB\"
}
ssl {enable = false, verify = \"verify_peer\"}
}
}
""".
kafka_producer_new_hocon() ->
""
"\n"
"bridges.kafka {\n"
" myproducer {\n"
" authentication = \"none\"\n"
" bootstrap_hosts = \"toxiproxy:9292\"\n"
" connect_timeout = \"5s\"\n"
" metadata_request_timeout = \"5s\"\n"
" min_metadata_refresh_interval = \"3s\"\n"
" kafka {\n"
" buffer {\n"
" memory_overload_protection = false\n"
" mode = \"memory\"\n"
" per_partition_limit = \"2GB\"\n"
" segment_bytes = \"100MB\"\n"
" }\n"
" compression = \"no_compression\"\n"
" max_batch_bytes = \"896KB\"\n"
" max_inflight = 10\n"
" message {\n"
" key = \"${.clientid}\"\n"
" timestamp = \"${.timestamp}\"\n"
" value = \"${.}\"\n"
" }\n"
" partition_count_refresh_interval = \"60s\"\n"
" partition_strategy = \"random\"\n"
" required_acks = \"all_isr\"\n"
" topic = \"test-topic-two-partitions\"\n"
" }\n"
" local_topic = \"mqtt/local\"\n"
" socket_opts {\n"
" nodelay = true\n"
" recbuf = \"1024KB\"\n"
" sndbuf = \"1024KB\"\n"
" }\n"
" ssl {enable = false, verify = \"verify_peer\"}\n"
" }\n"
"}\n"
"".
%% erlfmt-ignore
kafka_consumer_hocon() ->
"""
bridges.kafka_consumer.my_consumer {
enable = true
bootstrap_hosts = \"kafka-1.emqx.net:9292\"
connect_timeout = 5s
min_metadata_refresh_interval = 3s
metadata_request_timeout = 5s
authentication = {
mechanism = plain
username = emqxuser
password = password
}
kafka {
max_batch_bytes = 896KB
max_rejoin_attempts = 5
offset_commit_interval_seconds = 3
offset_reset_policy = reset_to_latest
}
topic_mapping = [
{
kafka_topic = \"kafka-topic-1\"
mqtt_topic = \"mqtt/topic/1\"
qos = 1
payload_template = \"${.}\"
},
{
kafka_topic = \"kafka-topic-2\"
mqtt_topic = \"mqtt/topic/2\"
qos = 2
payload_template = \"v = ${.value}\"
}
]
key_encoding_mode = none
value_encoding_mode = none
ssl {
enable = false
verify = verify_none
server_name_indication = \"auto\"
}
}
""".

View File

@ -68,7 +68,7 @@ defmodule EMQXUmbrella.MixProject do
{:telemetry, "1.1.0"}, {:telemetry, "1.1.0"},
# in conflict by emqtt and hocon # in conflict by emqtt and hocon
{:getopt, "1.0.2", override: true}, {:getopt, "1.0.2", override: true},
{:snabbkaffe, github: "kafka4beam/snabbkaffe", tag: "1.0.0", override: true}, {:snabbkaffe, github: "kafka4beam/snabbkaffe", tag: "1.0.7", override: true},
{:hocon, github: "emqx/hocon", tag: "0.37.0", override: true}, {:hocon, github: "emqx/hocon", tag: "0.37.0", override: true},
{:emqx_http_lib, github: "emqx/emqx_http_lib", tag: "0.5.2", override: true}, {:emqx_http_lib, github: "emqx/emqx_http_lib", tag: "0.5.2", override: true},
{:esasl, github: "emqx/esasl", tag: "0.2.0"}, {:esasl, github: "emqx/esasl", tag: "0.2.0"},
@ -135,7 +135,7 @@ defmodule EMQXUmbrella.MixProject do
{:wolff, github: "kafka4beam/wolff", tag: "1.7.5"}, {:wolff, github: "kafka4beam/wolff", tag: "1.7.5"},
{:kafka_protocol, github: "kafka4beam/kafka_protocol", tag: "4.1.2", override: true}, {:kafka_protocol, github: "kafka4beam/kafka_protocol", tag: "4.1.2", override: true},
{:brod_gssapi, github: "kafka4beam/brod_gssapi", tag: "v0.1.0-rc1"}, {:brod_gssapi, github: "kafka4beam/brod_gssapi", tag: "v0.1.0-rc1"},
{:brod, github: "kafka4beam/brod", tag: "3.16.7"}, {:brod, github: "kafka4beam/brod", tag: "3.16.8"},
{:snappyer, "1.2.8", override: true}, {:snappyer, "1.2.8", override: true},
{:supervisor3, "1.1.11", override: true} {:supervisor3, "1.1.11", override: true}
] ]

View File

@ -68,7 +68,7 @@
, {observer_cli, "1.7.1"} % NOTE: depends on recon 2.5.x , {observer_cli, "1.7.1"} % NOTE: depends on recon 2.5.x
, {system_monitor, {git, "https://github.com/ieQu1/system_monitor", {tag, "3.0.3"}}} , {system_monitor, {git, "https://github.com/ieQu1/system_monitor", {tag, "3.0.3"}}}
, {getopt, "1.0.2"} , {getopt, "1.0.2"}
, {snabbkaffe, {git, "https://github.com/kafka4beam/snabbkaffe.git", {tag, "1.0.0"}}} , {snabbkaffe, {git, "https://github.com/kafka4beam/snabbkaffe.git", {tag, "1.0.7"}}}
, {hocon, {git, "https://github.com/emqx/hocon.git", {tag, "0.37.0"}}} , {hocon, {git, "https://github.com/emqx/hocon.git", {tag, "0.37.0"}}}
, {emqx_http_lib, {git, "https://github.com/emqx/emqx_http_lib.git", {tag, "0.5.2"}}} , {emqx_http_lib, {git, "https://github.com/emqx/emqx_http_lib.git", {tag, "0.5.2"}}}
, {esasl, {git, "https://github.com/emqx/esasl", {tag, "0.2.0"}}} , {esasl, {git, "https://github.com/emqx/esasl", {tag, "0.2.0"}}}

View File

@ -21,11 +21,16 @@ help() {
echo " otherwise it runs the entire app's CT" echo " otherwise it runs the entire app's CT"
} }
if command -v docker-compose; then set +e
if docker compose version; then
DC='docker compose'
elif command -v docker-compose; then
DC='docker-compose' DC='docker-compose'
else else
DC='docker compose' echo 'Neither "docker compose" or "docker-compose" are available, stop.'
exit 1
fi fi
set -e
WHICH_APP='novalue' WHICH_APP='novalue'
CONSOLE='no' CONSOLE='no'
@ -154,14 +159,11 @@ for dep in ${CT_DEPS}; do
'.ci/docker-compose-file/docker-compose-pgsql-tls.yaml' ) '.ci/docker-compose-file/docker-compose-pgsql-tls.yaml' )
;; ;;
kafka) kafka)
# Kafka container generates root owned ssl files
# the files are shared with EMQX (with a docker volume)
NEED_ROOT=yes
FILES+=( '.ci/docker-compose-file/docker-compose-kafka.yaml' ) FILES+=( '.ci/docker-compose-file/docker-compose-kafka.yaml' )
;; ;;
tdengine) tdengine)
FILES+=( '.ci/docker-compose-file/docker-compose-tdengine-restful.yaml' ) FILES+=( '.ci/docker-compose-file/docker-compose-tdengine-restful.yaml' )
;; ;;
clickhouse) clickhouse)
FILES+=( '.ci/docker-compose-file/docker-compose-clickhouse.yaml' ) FILES+=( '.ci/docker-compose-file/docker-compose-clickhouse.yaml' )
;; ;;
@ -180,47 +182,43 @@ F_OPTIONS=""
for file in "${FILES[@]}"; do for file in "${FILES[@]}"; do
F_OPTIONS="$F_OPTIONS -f $file" F_OPTIONS="$F_OPTIONS -f $file"
done done
ORIG_UID_GID="$UID:$UID"
if [[ "${NEED_ROOT:-}" == 'yes' ]]; then
export UID_GID='root:root'
else
# Passing $UID to docker-compose to be used in erlang container
# as owner of the main process to avoid git repo permissions issue.
# Permissions issue happens because we are mounting local filesystem
# where files are owned by $UID to docker container where it's using
# root (UID=0) by default, and git is not happy about it.
export UID_GID="$ORIG_UID_GID"
fi
# /emqx is where the source dir is mounted to the Erlang container DOCKER_USER="$(id -u)"
# in .ci/docker-compose-file/docker-compose.yaml export DOCKER_USER
TTY='' TTY=''
if [[ -t 1 ]]; then if [[ -t 1 ]]; then
TTY='-t' TTY='-t'
fi fi
function restore_ownership { # ensure directory with secrets is created by current user before running compose
if [[ -n ${EMQX_TEST_DO_NOT_RUN_SUDO+x} ]] || ! sudo chown -R "$ORIG_UID_GID" . >/dev/null 2>&1; then mkdir -p /tmp/emqx-ci/emqx-shared-secret
docker exec -i $TTY -u root:root "$ERLANG_CONTAINER" bash -c "chown -R $ORIG_UID_GID /emqx" >/dev/null 2>&1 || true
fi
}
restore_ownership
trap restore_ownership EXIT
if [ "$STOP" = 'no' ]; then if [ "$STOP" = 'no' ]; then
# some left-over log file has to be deleted before a new docker-compose up # some left-over log file has to be deleted before a new docker-compose up
rm -f '.ci/docker-compose-file/redis/*.log' rm -f '.ci/docker-compose-file/redis/*.log'
set +e
# shellcheck disable=2086 # no quotes for F_OPTIONS # shellcheck disable=2086 # no quotes for F_OPTIONS
$DC $F_OPTIONS up -d --build --remove-orphans $DC $F_OPTIONS up -d --build --remove-orphans
RESULT=$?
if [ $RESULT -ne 0 ]; then
mkdir -p _build/test/logs
LOG='_build/test/logs/docker-compose.log'
echo "Dumping docker-compose log to $LOG"
# shellcheck disable=2086 # no quotes for F_OPTIONS
$DC $F_OPTIONS logs --no-color --timestamps > "$LOG"
exit 1
fi
set -e
fi fi
echo "Fixing file owners and permissions for $UID_GID" # rebar, mix and hex cache directory need to be writable by $DOCKER_USER
# rebar and hex cache directory need to be writable by $UID docker exec -i $TTY -u root:root "$ERLANG_CONTAINER" bash -c "mkdir -p /.cache /.hex /.mix && chown $DOCKER_USER /.cache /.hex /.mix"
docker exec -i $TTY -u root:root "$ERLANG_CONTAINER" bash -c "mkdir -p /.cache && chown $UID_GID /.cache && chown -R $UID_GID /emqx/.git /emqx/.ci /emqx/_build/default/lib" # need to initialize .erlang.cookie manually here because / is not writable by $DOCKER_USER
# need to initialize .erlang.cookie manually here because / is not writable by $UID docker exec -i $TTY -u root:root "$ERLANG_CONTAINER" bash -c "openssl rand -base64 16 > /.erlang.cookie && chown $DOCKER_USER /.erlang.cookie && chmod 0400 /.erlang.cookie"
docker exec -i $TTY -u root:root "$ERLANG_CONTAINER" bash -c "openssl rand -base64 16 > /.erlang.cookie && chown $UID_GID /.erlang.cookie && chmod 0400 /.erlang.cookie" # the user must exist inside the container for `whoami` to work
docker exec -i $TTY -u root:root "$ERLANG_CONTAINER" bash -c "useradd --uid $DOCKER_USER -M -d / emqx" || true
docker exec -i $TTY -u root:root "$ERLANG_CONTAINER" bash -c "chown -R $DOCKER_USER /var/lib/secret" || true
if [ "$ONLY_UP" = 'yes' ]; then if [ "$ONLY_UP" = 'yes' ]; then
exit 0 exit 0
@ -242,8 +240,7 @@ else
docker exec -e IS_CI="$IS_CI" -e PROFILE="$PROFILE" -i $TTY "$ERLANG_CONTAINER" bash -c "./rebar3 ct $REBAR3CT" docker exec -e IS_CI="$IS_CI" -e PROFILE="$PROFILE" -i $TTY "$ERLANG_CONTAINER" bash -c "./rebar3 ct $REBAR3CT"
fi fi
RESULT=$? RESULT=$?
restore_ownership if [ "$RESULT" -ne 0 ]; then
if [ $RESULT -ne 0 ]; then
LOG='_build/test/logs/docker-compose.log' LOG='_build/test/logs/docker-compose.log'
echo "Dumping docker-compose log to $LOG" echo "Dumping docker-compose log to $LOG"
# shellcheck disable=2086 # no quotes for F_OPTIONS # shellcheck disable=2086 # no quotes for F_OPTIONS
@ -253,5 +250,5 @@ else
# shellcheck disable=2086 # no quotes for F_OPTIONS # shellcheck disable=2086 # no quotes for F_OPTIONS
$DC $F_OPTIONS down $DC $F_OPTIONS down
fi fi
exit $RESULT exit "$RESULT"
fi fi