| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508 |
- /*
- * Copyright 2019, gRPC Authors All rights reserved.
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
- import Foundation
- import NIO
- import NIOHTTP2
- import NIOSSL
- import NIOTLS
- import Logging
- /// Provides a single, managed connection to a server.
- ///
- /// The connection to the server is provided by a single channel which will attempt to reconnect
- /// to the server if the connection is dropped. This connection is guaranteed to always use the same
- /// event loop.
- ///
- /// The connection is initially setup with a handler to verify that TLS was established
- /// successfully (assuming TLS is being used).
- ///
- /// ┌──────────────────────────┐
- /// │ DelegatingErrorHandler │
- /// └──────────▲───────────────┘
- /// HTTP2Frame│
- /// ┌──────────┴───────────────┐
- /// │ SettingsObservingHandler │
- /// └──────────▲───────────────┘
- /// HTTP2Frame│
- /// │ ⠇ ⠇ ⠇ ⠇
- /// │ ┌┴─▼┐ ┌┴─▼┐
- /// │ │ | │ | HTTP/2 streams
- /// │ └▲─┬┘ └▲─┬┘
- /// │ │ │ │ │ HTTP2Frame
- /// ┌─┴────────────────┴─▼───┴─▼┐
- /// │ HTTP2StreamMultiplexer |
- /// └─▲───────────────────────┬─┘
- /// HTTP2Frame│ │HTTP2Frame
- /// ┌─┴───────────────────────▼─┐
- /// │ NIOHTTP2Handler │
- /// └─▲───────────────────────┬─┘
- /// ByteBuffer│ │ByteBuffer
- /// ┌─┴───────────────────────▼─┐
- /// │ TLSVerificationHandler │
- /// └─▲───────────────────────┬─┘
- /// ByteBuffer│ │ByteBuffer
- /// ┌─┴───────────────────────▼─┐
- /// │ NIOSSLHandler │
- /// └─▲───────────────────────┬─┘
- /// ByteBuffer│ │ByteBuffer
- /// │ ▼
- ///
- /// The `TLSVerificationHandler` observes the outcome of the SSL handshake and determines
- /// whether a `ClientConnection` should be returned to the user. In either eventuality, the
- /// handler removes itself from the pipeline once TLS has been verified. There is also a handler
- /// after the multiplexer for observing the initial settings frame, after which it determines that
- /// the connection state is `.ready` and removes itself from the channel. Finally there is a
- /// delegated error handler which uses the error delegate associated with this connection
- /// (see `DelegatingErrorHandler`).
- ///
- /// See `BaseClientCall` for a description of the pipelines associated with each HTTP/2 stream.
- public class ClientConnection {
- private let connectionManager: ConnectionManager
- private func getChannel() -> EventLoopFuture<Channel> {
- switch self.configuration.callStartBehavior.wrapped {
- case .waitsForConnectivity:
- return self.connectionManager.getChannel()
- case .fastFailure:
- return self.connectionManager.getOptimisticChannel()
- }
- }
- /// HTTP multiplexer from the `channel` handling gRPC calls.
- internal var multiplexer: EventLoopFuture<HTTP2StreamMultiplexer> {
- return self.getChannel().flatMap {
- $0.pipeline.handler(type: HTTP2StreamMultiplexer.self)
- }
- }
- /// The configuration for this client.
- internal let configuration: Configuration
- internal let scheme: String
- internal let authority: String
- /// A monitor for the connectivity state.
- public var connectivity: ConnectivityStateMonitor {
- return self.connectionManager.monitor
- }
- /// The `EventLoop` this connection is using.
- public var eventLoop: EventLoop {
- return self.connectionManager.eventLoop
- }
- /// Creates a new connection from the given configuration. Prefer using
- /// `ClientConnection.secure(group:)` to build a connection secured with TLS or
- /// `ClientConnection.insecure(group:)` to build a plaintext connection.
- ///
- /// - Important: Users should prefer using `ClientConnection.secure(group:)` to build a connection
- /// with TLS, or `ClientConnection.insecure(group:)` to build a connection without TLS.
- public init(configuration: Configuration) {
- self.configuration = configuration
- self.scheme = configuration.tls == nil ? "http" : "https"
- self.authority = configuration.target.host
- self.connectionManager = ConnectionManager(
- configuration: configuration,
- logger: Logger(subsystem: .clientChannel)
- )
- }
- /// Closes the connection to the server.
- public func close() -> EventLoopFuture<Void> {
- return self.connectionManager.shutdown()
- }
- private func loggerWithRequestID(_ requestID: String) -> Logger {
- var logger = self.connectionManager.logger
- logger[metadataKey: MetadataKey.requestID] = "\(requestID)"
- return logger
- }
- private func makeRequestHead(path: String, options: CallOptions, requestID: String) -> _GRPCRequestHead {
- return _GRPCRequestHead(
- scheme: self.scheme,
- path: path,
- host: self.authority,
- requestID: requestID,
- options: options
- )
- }
- }
- // Note: documentation is inherited.
- extension ClientConnection: GRPCChannel {
- public func makeUnaryCall<Request: GRPCPayload, Response: GRPCPayload>(
- path: String,
- request: Request,
- callOptions: CallOptions
- ) -> UnaryCall<Request, Response> where Request : GRPCPayload, Response : GRPCPayload {
- let requestID = callOptions.requestIDProvider.requestID()
- let logger = self.loggerWithRequestID(requestID)
- logger.debug("starting rpc", metadata: ["path": "\(path)"])
- let call = UnaryCall<Request, Response>.makeOnHTTP2Stream(
- multiplexer: self.multiplexer,
- callOptions: callOptions,
- errorDelegate: self.configuration.errorDelegate,
- logger: logger
- )
- call.send(self.makeRequestHead(path: path, options: callOptions, requestID: requestID), request: request)
- return call
- }
- public func makeClientStreamingCall<Request: GRPCPayload, Response: GRPCPayload>(
- path: String,
- callOptions: CallOptions
- ) -> ClientStreamingCall<Request, Response> {
- let requestID = callOptions.requestIDProvider.requestID()
- let logger = self.loggerWithRequestID(requestID)
- logger.debug("starting rpc", metadata: ["path": "\(path)"])
- let call = ClientStreamingCall<Request, Response>.makeOnHTTP2Stream(
- multiplexer: self.multiplexer,
- callOptions: callOptions,
- errorDelegate: self.configuration.errorDelegate,
- logger: logger
- )
- call.sendHead(self.makeRequestHead(path: path, options: callOptions, requestID: requestID))
- return call
- }
- public func makeServerStreamingCall<Request: GRPCPayload, Response: GRPCPayload>(
- path: String,
- request: Request,
- callOptions: CallOptions,
- handler: @escaping (Response) -> Void
- ) -> ServerStreamingCall<Request, Response> {
- let requestID = callOptions.requestIDProvider.requestID()
- let logger = self.loggerWithRequestID(requestID)
- logger.debug("starting rpc", metadata: ["path": "\(path)"])
- let call = ServerStreamingCall<Request, Response>.makeOnHTTP2Stream(
- multiplexer: multiplexer,
- callOptions: callOptions,
- errorDelegate: self.configuration.errorDelegate,
- logger: logger,
- responseHandler: handler
- )
- call.send(self.makeRequestHead(path: path, options: callOptions, requestID: requestID), request: request)
- return call
- }
- public func makeBidirectionalStreamingCall<Request: GRPCPayload, Response: GRPCPayload>(
- path: String,
- callOptions: CallOptions,
- handler: @escaping (Response) -> Void
- ) -> BidirectionalStreamingCall<Request, Response> {
- let requestID = callOptions.requestIDProvider.requestID()
- let logger = self.loggerWithRequestID(requestID)
- logger.debug("starting rpc", metadata: ["path": "\(path)"])
- let call = BidirectionalStreamingCall<Request, Response>.makeOnHTTP2Stream(
- multiplexer: multiplexer,
- callOptions: callOptions,
- errorDelegate: self.configuration.errorDelegate,
- logger: logger,
- responseHandler: handler
- )
- call.sendHead(self.makeRequestHead(path: path, options: callOptions, requestID: requestID))
- return call
- }
- }
- // MARK: - Configuration structures
- /// A target to connect to.
- public struct ConnectionTarget {
- internal enum Wrapped {
- case hostAndPort(String, Int)
- case unixDomainSocket(String)
- case socketAddress(SocketAddress)
- }
- internal var wrapped: Wrapped
- private init(_ wrapped: Wrapped) {
- self.wrapped = wrapped
- }
- /// The host and port.
- public static func hostAndPort(_ host: String, _ port: Int) -> ConnectionTarget {
- return ConnectionTarget(.hostAndPort(host, port))
- }
- /// The path of a Unix domain socket.
- public static func unixDomainSocket(_ path: String) -> ConnectionTarget {
- return ConnectionTarget(.unixDomainSocket(path))
- }
- /// A NIO socket address.
- public static func socketAddress(_ address: SocketAddress) -> ConnectionTarget {
- return ConnectionTarget(.socketAddress(address))
- }
- var host: String {
- switch self.wrapped {
- case .hostAndPort(let host, _):
- return host
- case .socketAddress(.v4(let address)):
- return address.host
- case .socketAddress(.v6(let address)):
- return address.host
- case .unixDomainSocket, .socketAddress(.unixDomainSocket):
- return "localhost"
- }
- }
- }
- /// The connectivity behavior to use when starting an RPC.
- public struct CallStartBehavior: Hashable {
- internal enum Behavior: Hashable {
- case waitsForConnectivity
- case fastFailure
- }
- internal var wrapped: Behavior
- private init(_ wrapped: Behavior) {
- self.wrapped = wrapped
- }
- /// Waits for connectivity (that is, the 'ready' connectivity state) before attempting to start
- /// an RPC. Doing so may involve multiple connection attempts.
- ///
- /// This is the preferred, and default, behaviour.
- public static let waitsForConnectivity = CallStartBehavior(.waitsForConnectivity)
- /// The 'fast failure' behaviour is intended for cases where users would rather their RPC failed
- /// quickly rather than waiting for an active connection. The behaviour depends on the current
- /// connectivity state:
- ///
- /// - Idle: a connection attempt will be started and the RPC will fail if that attempt fails.
- /// - Connecting: a connection attempt is already in progress, the RPC will fail if that attempt
- /// fails.
- /// - Ready: a connection is already active: the RPC will be started using that connection.
- /// - Transient failure: the last connection or connection attempt failed and gRPC is waiting to
- /// connect again. The RPC will fail immediately.
- /// - Shutdown: the connection is shutdown, the RPC will fail immediately.
- public static let fastFailure = CallStartBehavior(.fastFailure)
- }
- extension ClientConnection {
- /// The configuration for a connection.
- public struct Configuration {
- /// The target to connect to.
- public var target: ConnectionTarget
- /// The event loop group to run the connection on.
- public var eventLoopGroup: EventLoopGroup
- /// An error delegate which is called when errors are caught. Provided delegates **must not
- /// maintain a strong reference to this `ClientConnection`**. Doing so will cause a retain
- /// cycle.
- public var errorDelegate: ClientErrorDelegate?
- /// A delegate which is called when the connectivity state is changed.
- public var connectivityStateDelegate: ConnectivityStateDelegate?
- /// The `DispatchQueue` on which to call the connectivity state delegate. If a delegate is
- /// provided but the queue is `nil` then one will be created by gRPC.
- public var connectivityStateDelegateQueue: DispatchQueue?
- /// TLS configuration for this connection. `nil` if TLS is not desired.
- public var tls: TLS?
- /// The connection backoff configuration. If no connection retrying is required then this should
- /// be `nil`.
- public var connectionBackoff: ConnectionBackoff?
- /// The amount of time to wait before closing the connection. The idle timeout will start only
- /// if there are no RPCs in progress and will be cancelled as soon as any RPCs start.
- ///
- /// If a connection becomes idle, starting a new RPC will automatically create a new connection.
- public var connectionIdleTimeout: TimeAmount
- /// The behavior used to determine when an RPC should start. That is, whether it should wait for
- /// an active connection or fail quickly if no connection is currently available.
- public var callStartBehavior: CallStartBehavior
- /// The HTTP/2 flow control target window size.
- public var httpTargetWindowSize: Int
- /// The HTTP protocol used for this connection.
- public var httpProtocol: HTTP2ToHTTP1ClientCodec.HTTPProtocol {
- return self.tls == nil ? .http : .https
- }
- /// Create a `Configuration` with some pre-defined defaults. Prefer using
- /// `ClientConnection.secure(group:)` to build a connection secured with TLS or
- /// `ClientConnection.insecure(group:)` to build a plaintext connection.
- ///
- /// - Parameter target: The target to connect to.
- /// - Parameter eventLoopGroup: The event loop group to run the connection on.
- /// - Parameter errorDelegate: The error delegate, defaulting to a delegate which will log only
- /// on debug builds.
- /// - Parameter connectivityStateDelegate: A connectivity state delegate, defaulting to `nil`.
- /// - Parameter connectivityStateDelegateQueue: A `DispatchQueue` on which to call the
- /// `connectivityStateDelegate`.
- /// - Parameter tlsConfiguration: TLS configuration, defaulting to `nil`.
- /// - Parameter connectionBackoff: The connection backoff configuration to use.
- /// - Parameter callStartBehavior: The behavior used to determine when a call should start in
- /// relation to its underlying connection. Defaults to `waitsForConnectivity`.
- /// - Parameter messageEncoding: Message compression configuration, defaults to no compression.
- /// - Parameter targetWindowSize: The HTTP/2 flow control target window size.
- public init(
- target: ConnectionTarget,
- eventLoopGroup: EventLoopGroup,
- errorDelegate: ClientErrorDelegate? = LoggingClientErrorDelegate(),
- connectivityStateDelegate: ConnectivityStateDelegate? = nil,
- connectivityStateDelegateQueue: DispatchQueue? = nil,
- tls: Configuration.TLS? = nil,
- connectionBackoff: ConnectionBackoff? = ConnectionBackoff(),
- connectionIdleTimeout: TimeAmount = .minutes(5),
- callStartBehavior: CallStartBehavior = .waitsForConnectivity,
- httpTargetWindowSize: Int = 65535
- ) {
- self.target = target
- self.eventLoopGroup = eventLoopGroup
- self.errorDelegate = errorDelegate
- self.connectivityStateDelegate = connectivityStateDelegate
- self.connectivityStateDelegateQueue = connectivityStateDelegateQueue
- self.tls = tls
- self.connectionBackoff = connectionBackoff
- self.connectionIdleTimeout = connectionIdleTimeout
- self.callStartBehavior = callStartBehavior
- self.httpTargetWindowSize = httpTargetWindowSize
- }
- }
- }
- // MARK: - Configuration helpers/extensions
- extension ClientBootstrapProtocol {
- /// Connect to the given connection target.
- ///
- /// - Parameter target: The target to connect to.
- func connect(to target: ConnectionTarget) -> EventLoopFuture<Channel> {
- switch target.wrapped {
- case .hostAndPort(let host, let port):
- return self.connect(host: host, port: port)
- case .unixDomainSocket(let path):
- return self.connect(unixDomainSocketPath: path)
- case .socketAddress(let address):
- return self.connect(to: address)
- }
- }
- }
- extension Channel {
- /// Configure the channel with TLS.
- ///
- /// This function adds two handlers to the pipeline: the `NIOSSLClientHandler` to handle TLS, and
- /// the `TLSVerificationHandler` which verifies that a successful handshake was completed.
- ///
- /// - Parameter configuration: The configuration to configure the channel with.
- /// - Parameter serverHostname: The server hostname to use if the hostname should be verified.
- /// - Parameter errorDelegate: The error delegate to use for the TLS verification handler.
- func configureTLS(
- _ configuration: TLSConfiguration,
- serverHostname: String?,
- errorDelegate: ClientErrorDelegate?,
- logger: Logger
- ) -> EventLoopFuture<Void> {
- do {
- let sslClientHandler = try NIOSSLClientHandler(
- context: try NIOSSLContext(configuration: configuration),
- serverHostname: serverHostname
- )
- return self.pipeline.addHandlers(sslClientHandler, TLSVerificationHandler(logger: logger))
- } catch {
- return self.eventLoop.makeFailedFuture(error)
- }
- }
- func configureGRPCClient(
- httpTargetWindowSize: Int,
- tlsConfiguration: TLSConfiguration?,
- tlsServerHostname: String?,
- connectionManager: ConnectionManager,
- connectionIdleTimeout: TimeAmount,
- errorDelegate: ClientErrorDelegate?,
- logger: Logger
- ) -> EventLoopFuture<Void> {
- let tlsConfigured = tlsConfiguration.map {
- self.configureTLS($0, serverHostname: tlsServerHostname, errorDelegate: errorDelegate, logger: logger)
- }
- return (tlsConfigured ?? self.eventLoop.makeSucceededFuture(())).flatMap {
- self.configureHTTP2Pipeline(mode: .client, targetWindowSize: httpTargetWindowSize)
- }.flatMap { _ in
- return self.pipeline.handler(type: NIOHTTP2Handler.self).flatMap { http2Handler in
- self.pipeline.addHandler(
- GRPCIdleHandler(mode: .client(connectionManager), idleTimeout: connectionIdleTimeout),
- position: .after(http2Handler)
- )
- }.flatMap {
- let errorHandler = DelegatingErrorHandler(
- logger: logger,
- delegate: errorDelegate
- )
- return self.pipeline.addHandler(errorHandler)
- }
- }
- }
- func configureGRPCClient(
- errorDelegate: ClientErrorDelegate?,
- logger: Logger
- ) -> EventLoopFuture<Void> {
- return self.configureHTTP2Pipeline(mode: .client).flatMap { _ in
- self.pipeline.addHandler(DelegatingErrorHandler(logger: logger, delegate: errorDelegate))
- }
- }
- }
- extension TimeAmount {
- /// Creates a new `TimeAmount` from the given time interval in seconds.
- ///
- /// - Parameter timeInterval: The amount of time in seconds
- static func seconds(timeInterval: TimeInterval) -> TimeAmount {
- return .nanoseconds(Int64(timeInterval * 1_000_000_000))
- }
- }
- extension String {
- var isIPAddress: Bool {
- // We need some scratch space to let inet_pton write into.
- var ipv4Addr = in_addr()
- var ipv6Addr = in6_addr()
- return self.withCString { ptr in
- return inet_pton(AF_INET, ptr, &ipv4Addr) == 1 ||
- inet_pton(AF_INET6, ptr, &ipv6Addr) == 1
- }
- }
- }
|