| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334 |
- /*
- * Copyright 2024, gRPC Authors All rights reserved.
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
- public import GRPCCore
- public import GRPCNIOTransportCore // should be @usableFromInline
- public import NIOCore // has to be public because of EventLoopGroup param in init
- public import NIOPosix // has to be public because of default argument value in init
- private import NIOSSL
- @available(gRPCSwiftNIOTransport 2.0, *)
- extension HTTP2ClientTransport {
- /// A `ClientTransport` using HTTP/2 built on top of `NIOPosix`.
- ///
- /// This transport builds on top of SwiftNIO's Posix networking layer and is suitable for use
- /// on Linux and Darwin based platforms (macOS, iOS, etc.). However, it's *strongly* recommended
- /// that if you are targeting Darwin platforms then you should use the `NIOTS` variant of
- /// the `HTTP2ClientTransport`.
- ///
- /// To use this transport you need to provide a 'target' to connect to which will be resolved
- /// by an appropriate resolver from the resolver registry. By default the resolver registry can
- /// resolve DNS targets, IPv4 and IPv6 targets, Unix domain socket targets, and Virtual Socket
- /// targets. If you use a custom target you must also provide an appropriately configured
- /// registry.
- ///
- /// You can control various aspects of connection creation, management, security and RPC behavior via
- /// the ``Config``. Load balancing policies and other RPC specific behavior can be configured via
- /// the `ServiceConfig` (if it isn't provided by a resolver).
- ///
- /// Beyond creating the transport you don't need to interact with it directly, instead, pass it
- /// to a `GRPCClient`:
- ///
- /// ```swift
- /// try await withThrowingDiscardingTaskGroup { group in
- /// let transport = try HTTP2ClientTransport.Posix(
- /// target: .ipv4(host: "example.com"),
- /// transportSecurity: .plaintext
- /// )
- /// let client = GRPCClient(transport: transport)
- /// group.addTask {
- /// try await client.run()
- /// }
- ///
- /// // ...
- /// }
- /// ```
- public struct Posix: ClientTransport {
- public typealias Bytes = GRPCNIOTransportBytes
- private let channel: GRPCChannel
- /// Creates a new NIOPosix-based HTTP/2 client transport.
- ///
- /// - Parameters:
- /// - target: A target to resolve.
- /// - transportSecurity: The configuration for securing network traffic.
- /// - config: Configuration for the transport.
- /// - resolverRegistry: A registry of resolver factories.
- /// - serviceConfig: Service config controlling how the transport should establish and
- /// load-balance connections.
- /// - eventLoopGroup: The underlying NIO `EventLoopGroup` to run connections on. This must
- /// be a `MultiThreadedEventLoopGroup` or an `EventLoop` from
- /// a `MultiThreadedEventLoopGroup`.
- /// - Throws: When no suitable resolver could be found for the `target`.
- public init(
- target: any ResolvableTarget,
- transportSecurity: TransportSecurity,
- config: Config = .defaults,
- resolverRegistry: NameResolverRegistry = .defaults,
- serviceConfig: ServiceConfig = ServiceConfig(),
- eventLoopGroup: any EventLoopGroup = .singletonMultiThreadedEventLoopGroup
- ) throws {
- guard let resolver = resolverRegistry.makeResolver(for: target) else {
- throw RuntimeError(
- code: .transportError,
- message: """
- No suitable resolvers to resolve '\(target)'. You must make sure that the resolver \
- registry has a suitable name resolver factory registered for the given target.
- """
- )
- }
- self.channel = GRPCChannel(
- resolver: resolver,
- connector: try Connector(
- eventLoopGroup: eventLoopGroup,
- config: config,
- transportSecurity: transportSecurity
- ),
- config: GRPCChannel.Config(posix: config),
- defaultServiceConfig: serviceConfig
- )
- }
- public var retryThrottle: RetryThrottle? {
- self.channel.retryThrottle
- }
- public func connect() async throws {
- await self.channel.connect()
- }
- public func config(forMethod descriptor: MethodDescriptor) -> MethodConfig? {
- self.channel.config(forMethod: descriptor)
- }
- public func beginGracefulShutdown() {
- self.channel.beginGracefulShutdown()
- }
- public func withStream<T: Sendable>(
- descriptor: MethodDescriptor,
- options: CallOptions,
- _ closure: (RPCStream<Inbound, Outbound>, ClientContext) async throws -> T
- ) async throws -> T {
- try await self.channel.withStream(descriptor: descriptor, options: options, closure)
- }
- }
- }
- @available(gRPCSwiftNIOTransport 2.0, *)
- extension HTTP2ClientTransport.Posix {
- struct Connector: HTTP2Connector {
- private let config: HTTP2ClientTransport.Posix.Config
- private let eventLoopGroup: any EventLoopGroup
- private let sslContext: NIOSSLContext?
- private let isPlainText: Bool
- private let customVerificationCallback:
- (
- @Sendable (
- [NIOSSLCertificate], EventLoopPromise<NIOSSLVerificationResultWithMetadata>
- ) -> Void
- )?
- init(
- eventLoopGroup: any EventLoopGroup,
- config: HTTP2ClientTransport.Posix.Config,
- transportSecurity: HTTP2ClientTransport.Posix.TransportSecurity
- ) throws {
- self.eventLoopGroup = eventLoopGroup
- self.config = config
- switch transportSecurity.wrapped {
- case .plaintext:
- self.sslContext = nil
- self.isPlainText = true
- self.customVerificationCallback = nil
- case .tls(let tlsConfig):
- do {
- self.sslContext = try NIOSSLContext(configuration: TLSConfiguration(tlsConfig))
- self.isPlainText = false
- self.customVerificationCallback = tlsConfig.customVerificationCallback
- } catch {
- throw RuntimeError(
- code: .transportError,
- message: "Couldn't create SSL context, check your TLS configuration.",
- cause: error
- )
- }
- }
- }
- func establishConnection(
- to address: GRPCNIOTransportCore.SocketAddress,
- sniServerHostname: String?
- ) async throws -> HTTP2Connection {
- let (channel, multiplexer) = try await ClientBootstrap(
- group: self.eventLoopGroup
- ).connect(to: address) { channel in
- channel.eventLoop.makeCompletedFuture {
- if let sslContext = self.sslContext {
- if let customVerificationCallback = self.customVerificationCallback {
- try channel.pipeline.syncOperations.addHandler(
- NIOSSLClientHandler(
- context: sslContext,
- serverHostname: sniServerHostname,
- customVerificationCallbackWithMetadata: customVerificationCallback
- )
- )
- } else {
- try channel.pipeline.syncOperations.addHandler(
- NIOSSLClientHandler(
- context: sslContext,
- serverHostname: sniServerHostname
- )
- )
- }
- }
- return try channel.pipeline.syncOperations.configureGRPCClientPipeline(
- channel: channel,
- config: GRPCChannel.Config(posix: self.config)
- )
- }.runInitializerIfSet(
- self.config.channelDebuggingCallbacks.onCreateTCPConnection,
- on: channel
- )
- }
- return HTTP2Connection(
- channel: channel,
- multiplexer: multiplexer,
- isPlaintext: self.isPlainText,
- onCreateHTTP2Stream: self.config.channelDebuggingCallbacks.onCreateHTTP2Stream
- )
- }
- }
- }
- @available(gRPCSwiftNIOTransport 2.0, *)
- extension HTTP2ClientTransport.Posix {
- public struct Config: Sendable {
- /// Configuration for HTTP/2 connections.
- public var http2: HTTP2ClientTransport.Config.HTTP2
- /// Configuration for backoff used when establishing a connection.
- public var backoff: HTTP2ClientTransport.Config.Backoff
- /// Configuration for connection management.
- public var connection: HTTP2ClientTransport.Config.Connection
- /// Compression configuration.
- public var compression: HTTP2ClientTransport.Config.Compression
- /// Channel callbacks for debugging.
- public var channelDebuggingCallbacks: HTTP2ClientTransport.Config.ChannelDebuggingCallbacks
- /// Creates a new connection configuration.
- ///
- /// - Parameters:
- /// - http2: HTTP2 configuration.
- /// - backoff: Backoff configuration.
- /// - connection: Connection configuration.
- /// - compression: Compression configuration.
- /// - channelDebuggingCallbacks: Channel callbacks for debugging.
- ///
- /// - SeeAlso: ``defaults(configure:)`` and ``defaults``.
- public init(
- http2: HTTP2ClientTransport.Config.HTTP2,
- backoff: HTTP2ClientTransport.Config.Backoff,
- connection: HTTP2ClientTransport.Config.Connection,
- compression: HTTP2ClientTransport.Config.Compression,
- channelDebuggingCallbacks: HTTP2ClientTransport.Config.ChannelDebuggingCallbacks
- ) {
- self.http2 = http2
- self.connection = connection
- self.backoff = backoff
- self.compression = compression
- self.channelDebuggingCallbacks = channelDebuggingCallbacks
- }
- /// Default configuration.
- public static var defaults: Self {
- Self.defaults()
- }
- /// Default values.
- ///
- /// - Parameters:
- /// - configure: A closure which allows you to modify the defaults before returning them.
- public static func defaults(
- configure: (_ config: inout Self) -> Void = { _ in }
- ) -> Self {
- var config = Self(
- http2: .defaults,
- backoff: .defaults,
- connection: .defaults,
- compression: .defaults,
- channelDebuggingCallbacks: .defaults
- )
- configure(&config)
- return config
- }
- }
- }
- @available(gRPCSwiftNIOTransport 2.0, *)
- extension GRPCChannel.Config {
- init(posix: HTTP2ClientTransport.Posix.Config) {
- self.init(
- http2: posix.http2,
- backoff: posix.backoff,
- connection: posix.connection,
- compression: posix.compression
- )
- }
- }
- @available(gRPCSwiftNIOTransport 2.0, *)
- extension ClientTransport where Self == HTTP2ClientTransport.Posix {
- /// Creates a new Posix based HTTP/2 client transport.
- ///
- /// - Parameters:
- /// - target: A target to resolve.
- /// - transportSecurity: The configuration for securing network traffic.
- /// - config: Configuration for the transport.
- /// - resolverRegistry: A registry of resolver factories.
- /// - serviceConfig: Service config controlling how the transport should establish and
- /// load-balance connections.
- /// - eventLoopGroup: The underlying NIO `EventLoopGroup` to run connections on. This must
- /// be a `MultiThreadedEventLoopGroup` or an `EventLoop` from
- /// a `MultiThreadedEventLoopGroup`.
- /// - Throws: When no suitable resolver could be found for the `target`.
- public static func http2NIOPosix(
- target: any ResolvableTarget,
- transportSecurity: HTTP2ClientTransport.Posix.TransportSecurity,
- config: HTTP2ClientTransport.Posix.Config = .defaults,
- resolverRegistry: NameResolverRegistry = .defaults,
- serviceConfig: ServiceConfig = ServiceConfig(),
- eventLoopGroup: any EventLoopGroup = .singletonMultiThreadedEventLoopGroup
- ) throws -> Self {
- return try HTTP2ClientTransport.Posix(
- target: target,
- transportSecurity: transportSecurity,
- config: config,
- resolverRegistry: resolverRegistry,
- serviceConfig: serviceConfig,
- eventLoopGroup: eventLoopGroup
- )
- }
- }
|