配置
leafnodes
Configuration Block
leafnodes
Configuration BlockThe leaf node configuration block is used to configure incoming as well as outgoing leaf node connections. Most properties are for the configuration of incoming connections. The properties remotes
and reconnect
are for outgoing connections.
host
Interface where the server will listen for incoming leafnode connections.
port
Port where the server will listen for incoming leafnode connections (default is 7422).
listen
Combines host
and port
as <host>:<port>
tls
advertise
Hostport <host>:<port>
to advertise how this server can be contacted by leaf nodes. This is useful in cluster setups with NAT.
no_advertise
if true
the server shouldn't be advertised to leaf nodes.
authorization
remotes
reconnect
Interval in seconds at which reconnect attempts to a remote server are made.
Authorization Block
user
Username for the leaf node connection.
password
Password for the user entry.
account
timeout
Maximum number of seconds to wait for leaf node authentication.
users
Users Block
user
Username for the leaf node connection.
password
Password for the user entry.
account
Here are some examples of using basic user/password authentication for leaf nodes (note while this is using accounts it is not using JWTs)
Singleton mode:
With above configuration, if a soliciting server creates a Leafnode connection with url: nats://leaf:secret@host:port
, then the accepting server will bind the leafnode connection to the account "TheAccount". This account need to exist otherwise the connection will be rejected.
Multi-users mode:
With the above, if a server connects using leaf1:secret@host:port
, then the accepting server will bind the connection to account account1
. If using leaf2
user, then the accepting server will bind to connection to account2
.
If username/password (either singleton or multi-users) is defined, then the connecting server MUST provide the proper credentials otherwise the connection will be rejected.
If no username/password is provided, it is still possible to provide the account the connection should be associated with:
With the above, a connection without credentials will be bound to the account "TheAccount".
If other form of credentials are used (jwt, nkey or other), then the server will attempt to authenticate and if successful associate to the account for that specific user. If the user authentication fails (wrong password, no such user, etc..) the connection will be also rejected.
LeafNode remotes
Entry Block
remotes
Entry Blockurl
Leafnode URL (URL protocol should be nats-leaf
).
urls
Leafnode URL array. Supports multiple URLs for discovery, e.g., urls: [ "nats-leaf://host1:7422", "nats-leaf://host2:7422" ]
account
credentials
Credential file for connecting to the leafnode server.
tls
ws_compression
ws_no_masking
Signature Handler
As of NATS Server v.2.9.0, for users embedding the NATS Server, it is possible to replace the use of the credentials file by a signature callback which will sign the nonce
and provide the JWT in the CONNECT
protocol. The RemoteLeafOpts
has a new field:
The callback definition is:
And example of how to use it can be found here
Connecting using WebSocket protocol
Since NATS 2.2.0, Leaf nodes support outbound WebSocket connections by specifying ws
as the scheme component of the remote server URLs:
Note that if a URL has the ws
scheme, all URLs the list must be ws
. You cannot mix and match. Therefore this would be considered an invalid configuration:
Note that the decision to make a TLS connection is not based on wss://
(as opposed to ws://
) but instead in the presence of a TLS configuration in the leafnodes{}
or the specific remote configuration block.
To configure Websocket in the remote server, check the Websocket section.
tls
Configuration Block
tls
Configuration Blockcert_file
TLS certificate file.
key_file
TLS certificate key file.
ca_file
TLS certificate authority file.
insecure
Skip certificate verification.
verify
If true
, require and verify client certificates.
verify_and_map
If true
, require and verify client certificates and use values map certificate values for authentication purposes.
cipher_suites
When set, only the specified TLS cipher suites will be allowed. Values must match golang version used to build the server.
curve_preferences
List of TLS cypher curves to use in order.
timeout
TLS handshake timeout in fractional seconds.
最后更新于