292 lines
9.6 KiB
Go
292 lines
9.6 KiB
Go
// Copyright 2015 Google LLC.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
// Package grpc supports network connections to GRPC servers.
|
|
// This package is not intended for use by end developers. Use the
|
|
// google.golang.org/api/option package to configure API clients.
|
|
package grpc
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"log"
|
|
"os"
|
|
"strings"
|
|
|
|
"go.opencensus.io/plugin/ocgrpc"
|
|
"golang.org/x/oauth2"
|
|
"google.golang.org/api/internal"
|
|
"google.golang.org/api/option"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/credentials"
|
|
grpcgoogle "google.golang.org/grpc/credentials/google"
|
|
"google.golang.org/grpc/credentials/oauth"
|
|
|
|
// Install grpclb, which is required for direct path.
|
|
_ "google.golang.org/grpc/balancer/grpclb"
|
|
)
|
|
|
|
// Set at init time by dial_appengine.go. If nil, we're not on App Engine.
|
|
var appengineDialerHook func(context.Context) grpc.DialOption
|
|
|
|
// Set at init time by dial_socketopt.go. If nil, socketopt is not supported.
|
|
var timeoutDialerOption grpc.DialOption
|
|
|
|
// Dial returns a GRPC connection for use communicating with a Google cloud
|
|
// service, configured with the given ClientOptions.
|
|
func Dial(ctx context.Context, opts ...option.ClientOption) (*grpc.ClientConn, error) {
|
|
o, err := processAndValidateOpts(opts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if o.GRPCConnPool != nil {
|
|
return o.GRPCConnPool.Conn(), nil
|
|
}
|
|
// NOTE(cbro): We removed support for option.WithGRPCConnPool (GRPCConnPoolSize)
|
|
// on 2020-02-12 because RoundRobin and WithBalancer are deprecated and we need to remove usages of it.
|
|
//
|
|
// Connection pooling is only done via DialPool.
|
|
return dial(ctx, false, o)
|
|
}
|
|
|
|
// DialInsecure returns an insecure GRPC connection for use communicating
|
|
// with fake or mock Google cloud service implementations, such as emulators.
|
|
// The connection is configured with the given ClientOptions.
|
|
func DialInsecure(ctx context.Context, opts ...option.ClientOption) (*grpc.ClientConn, error) {
|
|
o, err := processAndValidateOpts(opts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return dial(ctx, true, o)
|
|
}
|
|
|
|
// DialPool returns a pool of GRPC connections for the given service.
|
|
// This differs from the connection pooling implementation used by Dial, which uses a custom GRPC load balancer.
|
|
// DialPool should be used instead of Dial when a pool is used by default or a different custom GRPC load balancer is needed.
|
|
// The context and options are shared between each Conn in the pool.
|
|
// The pool size is configured using the WithGRPCConnectionPool option.
|
|
//
|
|
// This API is subject to change as we further refine requirements. It will go away if gRPC stubs accept an interface instead of the concrete ClientConn type. See https://github.com/grpc/grpc-go/issues/1287.
|
|
func DialPool(ctx context.Context, opts ...option.ClientOption) (ConnPool, error) {
|
|
o, err := processAndValidateOpts(opts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if o.GRPCConnPool != nil {
|
|
return o.GRPCConnPool, nil
|
|
}
|
|
poolSize := o.GRPCConnPoolSize
|
|
if o.GRPCConn != nil {
|
|
// WithGRPCConn is technically incompatible with WithGRPCConnectionPool.
|
|
// Always assume pool size is 1 when a grpc.ClientConn is explicitly used.
|
|
poolSize = 1
|
|
}
|
|
o.GRPCConnPoolSize = 0 // we don't *need* to set this to zero, but it's safe to.
|
|
|
|
if poolSize == 0 || poolSize == 1 {
|
|
// Fast path for common case for a connection pool with a single connection.
|
|
conn, err := dial(ctx, false, o)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &singleConnPool{conn}, nil
|
|
}
|
|
|
|
pool := &roundRobinConnPool{}
|
|
for i := 0; i < poolSize; i++ {
|
|
conn, err := dial(ctx, false, o)
|
|
if err != nil {
|
|
defer pool.Close() // NOTE: error from Close is ignored.
|
|
return nil, err
|
|
}
|
|
pool.conns = append(pool.conns, conn)
|
|
}
|
|
return pool, nil
|
|
}
|
|
|
|
func dial(ctx context.Context, insecure bool, o *internal.DialSettings) (*grpc.ClientConn, error) {
|
|
if o.HTTPClient != nil {
|
|
return nil, errors.New("unsupported HTTP client specified")
|
|
}
|
|
if o.GRPCConn != nil {
|
|
return o.GRPCConn, nil
|
|
}
|
|
var grpcOpts []grpc.DialOption
|
|
if insecure {
|
|
grpcOpts = []grpc.DialOption{grpc.WithInsecure()}
|
|
} else if !o.NoAuth {
|
|
if o.APIKey != "" {
|
|
log.Print("API keys are not supported for gRPC APIs. Remove the WithAPIKey option from your client-creating call.")
|
|
}
|
|
creds, err := internal.Creds(ctx, o)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if o.QuotaProject == "" {
|
|
o.QuotaProject = internal.QuotaProjectFromCreds(creds)
|
|
}
|
|
|
|
// Attempt Direct Path only if:
|
|
// * The endpoint is a host:port (or dns:///host:port).
|
|
// * Credentials are obtained via GCE metadata server, using the default
|
|
// service account.
|
|
// * Opted in via GOOGLE_CLOUD_ENABLE_DIRECT_PATH environment variable.
|
|
// For example, GOOGLE_CLOUD_ENABLE_DIRECT_PATH=spanner,pubsub
|
|
if isDirectPathEnabled(o.Endpoint) && isTokenSourceDirectPathCompatible(creds.TokenSource) {
|
|
if !strings.HasPrefix(o.Endpoint, "dns:///") {
|
|
o.Endpoint = "dns:///" + o.Endpoint
|
|
}
|
|
grpcOpts = []grpc.DialOption{
|
|
grpc.WithCredentialsBundle(
|
|
grpcgoogle.NewComputeEngineCredentials(),
|
|
),
|
|
// For now all DirectPath go clients will be using the following lb config, but in future
|
|
// when different services need different configs, then we should change this to a
|
|
// per-service config.
|
|
grpc.WithDisableServiceConfig(),
|
|
grpc.WithDefaultServiceConfig(`{"loadBalancingConfig":[{"grpclb":{"childPolicy":[{"pick_first":{}}]}}]}`),
|
|
}
|
|
// TODO(cbro): add support for system parameters (quota project, request reason) via chained interceptor.
|
|
} else {
|
|
grpcOpts = []grpc.DialOption{
|
|
grpc.WithPerRPCCredentials(grpcTokenSource{
|
|
TokenSource: oauth.TokenSource{creds.TokenSource},
|
|
quotaProject: o.QuotaProject,
|
|
requestReason: o.RequestReason,
|
|
}),
|
|
grpc.WithTransportCredentials(credentials.NewClientTLSFromCert(nil, "")),
|
|
}
|
|
}
|
|
}
|
|
|
|
if appengineDialerHook != nil {
|
|
// Use the Socket API on App Engine.
|
|
// appengine dialer will override socketopt dialer
|
|
grpcOpts = append(grpcOpts, appengineDialerHook(ctx))
|
|
}
|
|
|
|
// Add tracing, but before the other options, so that clients can override the
|
|
// gRPC stats handler.
|
|
// This assumes that gRPC options are processed in order, left to right.
|
|
grpcOpts = addOCStatsHandler(grpcOpts, o)
|
|
grpcOpts = append(grpcOpts, o.GRPCDialOpts...)
|
|
if o.UserAgent != "" {
|
|
grpcOpts = append(grpcOpts, grpc.WithUserAgent(o.UserAgent))
|
|
}
|
|
|
|
// TODO(weiranf): This socketopt dialer will be used by default at some
|
|
// point when isDirectPathEnabled will default to true, we guard it by
|
|
// the Directpath env var for now once we can introspect user defined
|
|
// dialer (https://github.com/grpc/grpc-go/issues/2795).
|
|
if timeoutDialerOption != nil && isDirectPathEnabled(o.Endpoint) {
|
|
grpcOpts = append(grpcOpts, timeoutDialerOption)
|
|
}
|
|
|
|
return grpc.DialContext(ctx, o.Endpoint, grpcOpts...)
|
|
}
|
|
|
|
func addOCStatsHandler(opts []grpc.DialOption, settings *internal.DialSettings) []grpc.DialOption {
|
|
if settings.TelemetryDisabled {
|
|
return opts
|
|
}
|
|
return append(opts, grpc.WithStatsHandler(&ocgrpc.ClientHandler{}))
|
|
}
|
|
|
|
// grpcTokenSource supplies PerRPCCredentials from an oauth.TokenSource.
|
|
type grpcTokenSource struct {
|
|
oauth.TokenSource
|
|
|
|
// Additional metadata attached as headers.
|
|
quotaProject string
|
|
requestReason string
|
|
}
|
|
|
|
// GetRequestMetadata gets the request metadata as a map from a grpcTokenSource.
|
|
func (ts grpcTokenSource) GetRequestMetadata(ctx context.Context, uri ...string) (
|
|
map[string]string, error) {
|
|
metadata, err := ts.TokenSource.GetRequestMetadata(ctx, uri...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Attach system parameter
|
|
if ts.quotaProject != "" {
|
|
metadata["X-goog-user-project"] = ts.quotaProject
|
|
}
|
|
if ts.requestReason != "" {
|
|
metadata["X-goog-request-reason"] = ts.requestReason
|
|
}
|
|
return metadata, nil
|
|
}
|
|
|
|
func isTokenSourceDirectPathCompatible(ts oauth2.TokenSource) bool {
|
|
if ts == nil {
|
|
return false
|
|
}
|
|
tok, err := ts.Token()
|
|
if err != nil {
|
|
return false
|
|
}
|
|
if tok == nil {
|
|
return false
|
|
}
|
|
if source, _ := tok.Extra("oauth2.google.tokenSource").(string); source != "compute-metadata" {
|
|
return false
|
|
}
|
|
if acct, _ := tok.Extra("oauth2.google.serviceAccount").(string); acct != "default" {
|
|
return false
|
|
}
|
|
return true
|
|
}
|
|
|
|
func isDirectPathEnabled(endpoint string) bool {
|
|
// Only host:port is supported, not other schemes (e.g., "tcp://" or "unix://").
|
|
// Also don't try direct path if the user has chosen an alternate name resolver
|
|
// (i.e., via ":///" prefix).
|
|
//
|
|
// TODO(cbro): once gRPC has introspectible options, check the user hasn't
|
|
// provided a custom dialer in gRPC options.
|
|
if strings.Contains(endpoint, "://") && !strings.HasPrefix(endpoint, "dns:///") {
|
|
return false
|
|
}
|
|
|
|
// Only try direct path if the user has opted in via the environment variable.
|
|
whitelist := strings.Split(os.Getenv("GOOGLE_CLOUD_ENABLE_DIRECT_PATH"), ",")
|
|
for _, api := range whitelist {
|
|
// Ignore empty string since an empty env variable splits into [""]
|
|
if api != "" && strings.Contains(endpoint, api) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func processAndValidateOpts(opts []option.ClientOption) (*internal.DialSettings, error) {
|
|
var o internal.DialSettings
|
|
for _, opt := range opts {
|
|
opt.Apply(&o)
|
|
}
|
|
if err := o.Validate(); err != nil {
|
|
return nil, err
|
|
}
|
|
return &o, nil
|
|
}
|
|
|
|
type connPoolOption struct{ ConnPool }
|
|
|
|
// WithConnPool returns a ClientOption that specifies the ConnPool
|
|
// connection to use as the basis of communications.
|
|
//
|
|
// This is only to be used by Google client libraries internally, for example
|
|
// when creating a longrunning API client that shares the same connection pool
|
|
// as a service client.
|
|
func WithConnPool(p ConnPool) option.ClientOption {
|
|
return connPoolOption{p}
|
|
}
|
|
|
|
func (o connPoolOption) Apply(s *internal.DialSettings) {
|
|
s.GRPCConnPool = o.ConnPool
|
|
}
|