mirror of https://github.com/tidwall/tile38.git
507 lines
11 KiB
Go
507 lines
11 KiB
Go
package endpoint
|
|
|
|
import (
|
|
"errors"
|
|
"net/url"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
)
|
|
|
|
var errExpired = errors.New("expired")
|
|
|
|
// EndpointProtocol is the type of protocol that the endpoint represents.
|
|
type EndpointProtocol string
|
|
|
|
const (
|
|
HTTP = EndpointProtocol("http") // HTTP
|
|
Disque = EndpointProtocol("disque") // Disque
|
|
GRPC = EndpointProtocol("grpc") // GRPC
|
|
Redis = EndpointProtocol("redis") // Redis
|
|
Kafka = EndpointProtocol("kafka") // Kafka
|
|
MQTT = EndpointProtocol("mqtt") // MQTT
|
|
AMQP = EndpointProtocol("amqp") // AMQP
|
|
SQS = EndpointProtocol("sqs") // SQS
|
|
)
|
|
|
|
// Endpoint represents an endpoint.
|
|
type Endpoint struct {
|
|
Protocol EndpointProtocol
|
|
Original string
|
|
GRPC struct {
|
|
Host string
|
|
Port int
|
|
}
|
|
Disque struct {
|
|
Host string
|
|
Port int
|
|
QueueName string
|
|
Options struct {
|
|
Replicate int
|
|
}
|
|
}
|
|
Redis struct {
|
|
Host string
|
|
Port int
|
|
Channel string
|
|
}
|
|
Kafka struct {
|
|
Host string
|
|
Port int
|
|
QueueName string
|
|
}
|
|
AMQP struct {
|
|
URI string
|
|
SSL bool
|
|
QueueName string
|
|
RouteKey string
|
|
}
|
|
MQTT struct {
|
|
Host string
|
|
Port int
|
|
QueueName string
|
|
Qos byte
|
|
Retained bool
|
|
}
|
|
|
|
SQS struct {
|
|
QueueID string
|
|
Region string
|
|
CredPath string
|
|
CredProfile string
|
|
QueueName string
|
|
}
|
|
}
|
|
|
|
type EndpointConn interface {
|
|
Expired() bool
|
|
Send(val string) error
|
|
}
|
|
|
|
type EndpointManager struct {
|
|
mu sync.RWMutex // this is intentionally exposed
|
|
conns map[string]EndpointConn
|
|
}
|
|
|
|
func NewEndpointManager() *EndpointManager {
|
|
epc := &EndpointManager{
|
|
conns: make(map[string]EndpointConn),
|
|
}
|
|
go epc.Run()
|
|
return epc
|
|
}
|
|
|
|
// Manage connection at enpoints
|
|
// If some connection expired we should delete it
|
|
func (epc *EndpointManager) Run() {
|
|
for {
|
|
time.Sleep(time.Second)
|
|
func() {
|
|
epc.mu.Lock()
|
|
defer epc.mu.Unlock()
|
|
for endpoint, conn := range epc.conns {
|
|
if conn.Expired() {
|
|
delete(epc.conns, endpoint)
|
|
}
|
|
}
|
|
}()
|
|
}
|
|
}
|
|
|
|
// Get finds an endpoint based on its url. If the enpoint does not
|
|
// exist a new only is created.
|
|
func (epc *EndpointManager) Validate(url string) error {
|
|
_, err := parseEndpoint(url)
|
|
return err
|
|
}
|
|
|
|
func (epc *EndpointManager) Send(endpoint, val string) error {
|
|
for {
|
|
epc.mu.Lock()
|
|
conn, ok := epc.conns[endpoint]
|
|
if !ok || conn.Expired() {
|
|
ep, err := parseEndpoint(endpoint)
|
|
if err != nil {
|
|
epc.mu.Unlock()
|
|
return err
|
|
}
|
|
switch ep.Protocol {
|
|
default:
|
|
return errors.New("invalid protocol")
|
|
case HTTP:
|
|
conn = newHTTPEndpointConn(ep)
|
|
case Disque:
|
|
conn = newDisqueEndpointConn(ep)
|
|
case GRPC:
|
|
conn = newGRPCEndpointConn(ep)
|
|
case Redis:
|
|
conn = newRedisEndpointConn(ep)
|
|
case Kafka:
|
|
conn = newKafkaEndpointConn(ep)
|
|
case MQTT:
|
|
conn = newMQTTEndpointConn(ep)
|
|
case AMQP:
|
|
conn = newAMQPEndpointConn(ep)
|
|
case SQS:
|
|
conn = newSQSEndpointConn(ep)
|
|
}
|
|
epc.conns[endpoint] = conn
|
|
}
|
|
epc.mu.Unlock()
|
|
err := conn.Send(val)
|
|
if err != nil {
|
|
if err == errExpired {
|
|
// it's possible that the connection has expired in-between
|
|
// the last conn.Expired() check and now. If so, we should
|
|
// just try the send again.
|
|
continue
|
|
}
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func parseEndpoint(s string) (Endpoint, error) {
|
|
var endpoint Endpoint
|
|
endpoint.Original = s
|
|
switch {
|
|
default:
|
|
return endpoint, errors.New("unknown scheme")
|
|
case strings.HasPrefix(s, "http:"):
|
|
endpoint.Protocol = HTTP
|
|
case strings.HasPrefix(s, "https:"):
|
|
endpoint.Protocol = HTTP
|
|
case strings.HasPrefix(s, "disque:"):
|
|
endpoint.Protocol = Disque
|
|
case strings.HasPrefix(s, "grpc:"):
|
|
endpoint.Protocol = GRPC
|
|
case strings.HasPrefix(s, "redis:"):
|
|
endpoint.Protocol = Redis
|
|
case strings.HasPrefix(s, "kafka:"):
|
|
endpoint.Protocol = Kafka
|
|
case strings.HasPrefix(s, "amqp:"):
|
|
endpoint.Protocol = AMQP
|
|
case strings.HasPrefix(s, "amqps:"):
|
|
endpoint.Protocol = AMQP
|
|
case strings.HasPrefix(s, "mqtt:"):
|
|
endpoint.Protocol = MQTT
|
|
case strings.HasPrefix(s, "sqs:"):
|
|
endpoint.Protocol = SQS
|
|
}
|
|
|
|
s = s[strings.Index(s, ":")+1:]
|
|
if !strings.HasPrefix(s, "//") {
|
|
return endpoint, errors.New("missing the two slashes")
|
|
}
|
|
|
|
sqp := strings.Split(s[2:], "?")
|
|
sp := strings.Split(sqp[0], "/")
|
|
s = sp[0]
|
|
if s == "" {
|
|
return endpoint, errors.New("missing host")
|
|
}
|
|
|
|
if endpoint.Protocol == GRPC {
|
|
dp := strings.Split(s, ":")
|
|
switch len(dp) {
|
|
default:
|
|
return endpoint, errors.New("invalid grpc url")
|
|
case 1:
|
|
endpoint.GRPC.Host = dp[0]
|
|
endpoint.GRPC.Port = 80
|
|
case 2:
|
|
endpoint.GRPC.Host = dp[0]
|
|
n, err := strconv.ParseUint(dp[1], 10, 16)
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid grpc url")
|
|
}
|
|
endpoint.GRPC.Port = int(n)
|
|
}
|
|
}
|
|
|
|
if endpoint.Protocol == Redis {
|
|
dp := strings.Split(s, ":")
|
|
switch len(dp) {
|
|
default:
|
|
return endpoint, errors.New("invalid redis url")
|
|
case 1:
|
|
endpoint.Redis.Host = dp[0]
|
|
endpoint.Redis.Port = 6379
|
|
case 2:
|
|
endpoint.Redis.Host = dp[0]
|
|
n, err := strconv.ParseUint(dp[1], 10, 16)
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid redis url port")
|
|
}
|
|
endpoint.Redis.Port = int(n)
|
|
}
|
|
|
|
if len(sp) > 1 {
|
|
var err error
|
|
endpoint.Redis.Channel, err = url.QueryUnescape(sp[1])
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid redis channel name")
|
|
}
|
|
}
|
|
}
|
|
|
|
if endpoint.Protocol == Disque {
|
|
dp := strings.Split(s, ":")
|
|
switch len(dp) {
|
|
default:
|
|
return endpoint, errors.New("invalid disque url")
|
|
case 1:
|
|
endpoint.Disque.Host = dp[0]
|
|
endpoint.Disque.Port = 7711
|
|
case 2:
|
|
endpoint.Disque.Host = dp[0]
|
|
n, err := strconv.ParseUint(dp[1], 10, 16)
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid disque url")
|
|
}
|
|
endpoint.Disque.Port = int(n)
|
|
}
|
|
if len(sp) > 1 {
|
|
var err error
|
|
endpoint.Disque.QueueName, err = url.QueryUnescape(sp[1])
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid disque queue name")
|
|
}
|
|
}
|
|
if len(sqp) > 1 {
|
|
m, err := url.ParseQuery(sqp[1])
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid disque url")
|
|
}
|
|
for key, val := range m {
|
|
if len(val) == 0 {
|
|
continue
|
|
}
|
|
switch key {
|
|
case "replicate":
|
|
n, err := strconv.ParseUint(val[0], 10, 8)
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid disque replicate value")
|
|
}
|
|
endpoint.Disque.Options.Replicate = int(n)
|
|
}
|
|
}
|
|
}
|
|
if endpoint.Disque.QueueName == "" {
|
|
return endpoint, errors.New("missing disque queue name")
|
|
}
|
|
}
|
|
|
|
if endpoint.Protocol == Kafka {
|
|
// Parsing connection from URL string
|
|
hp := strings.Split(s, ":")
|
|
switch len(hp) {
|
|
default:
|
|
return endpoint, errors.New("invalid kafka url")
|
|
case 1:
|
|
endpoint.Kafka.Host = hp[0]
|
|
endpoint.Kafka.Port = 9092
|
|
case 2:
|
|
n, err := strconv.ParseUint(hp[1], 10, 16)
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid kafka url port")
|
|
}
|
|
|
|
endpoint.Kafka.Host = hp[0]
|
|
endpoint.Kafka.Port = int(n)
|
|
}
|
|
|
|
// Parsing Kafka queue name
|
|
if len(sp) > 1 {
|
|
var err error
|
|
endpoint.Kafka.QueueName, err = url.QueryUnescape(sp[1])
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid kafka topic name")
|
|
}
|
|
}
|
|
|
|
// Throw error if we not provide any queue name
|
|
if endpoint.Kafka.QueueName == "" {
|
|
return endpoint, errors.New("missing kafka topic name")
|
|
}
|
|
}
|
|
|
|
if endpoint.Protocol == MQTT {
|
|
// Parsing connection from URL string
|
|
hp := strings.Split(s, ":")
|
|
switch len(hp) {
|
|
default:
|
|
return endpoint, errors.New("invalid MQTT url")
|
|
case 1:
|
|
endpoint.MQTT.Host = hp[0]
|
|
endpoint.MQTT.Port = 1883
|
|
case 2:
|
|
n, err := strconv.ParseUint(hp[1], 10, 16)
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid MQTT url port")
|
|
}
|
|
|
|
endpoint.MQTT.Host = hp[0]
|
|
endpoint.MQTT.Port = int(n)
|
|
}
|
|
|
|
// Parsing MQTT queue name
|
|
if len(sp) > 1 {
|
|
var err error
|
|
endpoint.MQTT.QueueName, err = url.QueryUnescape(sp[1])
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid MQTT topic name")
|
|
}
|
|
}
|
|
|
|
// Parsing additional params
|
|
if len(sqp) > 1 {
|
|
m, err := url.ParseQuery(sqp[1])
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid MQTT url")
|
|
}
|
|
for key, val := range m {
|
|
if len(val) == 0 {
|
|
continue
|
|
}
|
|
switch key {
|
|
case "qos":
|
|
n, err := strconv.ParseUint(val[0], 10, 8)
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid MQTT qos value")
|
|
}
|
|
endpoint.MQTT.Qos = byte(n)
|
|
case "retained":
|
|
n, err := strconv.ParseUint(val[0], 10, 8)
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid MQTT retained value")
|
|
}
|
|
|
|
if n != 1 && n != 0 {
|
|
return endpoint, errors.New("invalid MQTT retained, should be [0, 1]")
|
|
}
|
|
|
|
if n == 1 {
|
|
endpoint.MQTT.Retained = true
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Throw error if we not provide any queue name
|
|
if endpoint.MQTT.QueueName == "" {
|
|
return endpoint, errors.New("missing MQTT topic name")
|
|
}
|
|
}
|
|
// Basic SQS connection strings in HOOKS interface
|
|
// sqs://<region>:<queue_id>/<queue_name>/?params=value
|
|
//
|
|
// params are:
|
|
//
|
|
// credpath - path where aws credentials are located
|
|
// credprofile - credential profile
|
|
if endpoint.Protocol == SQS {
|
|
// Parsing connection from URL string
|
|
hp := strings.Split(s, ":")
|
|
switch len(hp) {
|
|
default:
|
|
return endpoint, errors.New("invalid SQS url")
|
|
case 2:
|
|
endpoint.SQS.Region = hp[0]
|
|
endpoint.SQS.QueueID = hp[1]
|
|
}
|
|
|
|
// Parsing SQS queue name
|
|
if len(sp) > 1 {
|
|
var err error
|
|
endpoint.SQS.QueueName, err = url.QueryUnescape(sp[1])
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid SQS queue name")
|
|
}
|
|
}
|
|
|
|
// Parsing additional params
|
|
if len(sqp) > 1 {
|
|
m, err := url.ParseQuery(sqp[1])
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid SQS url")
|
|
}
|
|
for key, val := range m {
|
|
if len(val) == 0 {
|
|
continue
|
|
}
|
|
switch key {
|
|
case "credpath":
|
|
endpoint.SQS.CredPath = val[0]
|
|
case "credprofile":
|
|
endpoint.SQS.CredProfile = val[0]
|
|
}
|
|
}
|
|
}
|
|
|
|
// Throw error if we not provide any queue name
|
|
if endpoint.SQS.QueueName == "" {
|
|
return endpoint, errors.New("missing SQS queue name")
|
|
}
|
|
}
|
|
|
|
// Basic AMQP connection strings in HOOKS interface
|
|
// amqp://guest:guest@localhost:5672/<queue_name>/?params=value
|
|
//
|
|
// Default params are:
|
|
//
|
|
// Mandatory - false
|
|
// Immeditate - false
|
|
// Durable - true
|
|
// Routing-Key - tile38
|
|
//
|
|
// - "route" - [string] routing key
|
|
//
|
|
if endpoint.Protocol == AMQP {
|
|
// Bind connection information
|
|
endpoint.AMQP.URI = s
|
|
|
|
// Bind queue name
|
|
if len(sp) > 1 {
|
|
var err error
|
|
endpoint.AMQP.QueueName, err = url.QueryUnescape(sp[1])
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid AMQP queue name")
|
|
}
|
|
}
|
|
|
|
// Parsing additional attributes
|
|
if len(sqp) > 1 {
|
|
m, err := url.ParseQuery(sqp[1])
|
|
if err != nil {
|
|
return endpoint, errors.New("invalid AMQP url")
|
|
}
|
|
for key, val := range m {
|
|
if len(val) == 0 {
|
|
continue
|
|
}
|
|
switch key {
|
|
case "route":
|
|
endpoint.AMQP.RouteKey = val[0]
|
|
}
|
|
}
|
|
}
|
|
|
|
if strings.HasPrefix(endpoint.Original, "amqps:") {
|
|
endpoint.AMQP.SSL = true
|
|
}
|
|
|
|
if endpoint.AMQP.QueueName == "" {
|
|
return endpoint, errors.New("missing AMQP queue name")
|
|
}
|
|
|
|
if endpoint.AMQP.RouteKey == "" {
|
|
endpoint.AMQP.RouteKey = "tile38"
|
|
}
|
|
}
|
|
|
|
return endpoint, nil
|
|
}
|