grpc/service/service.go
Adphi 939c060513
service: fix alpn certificate usage
Signed-off-by: Adphi <philippe.adrien.nousse@gmail.com>
2024-12-21 14:44:56 +01:00

530 lines
12 KiB
Go

package service
import (
"context"
"crypto/tls"
"fmt"
"net"
"net/http"
"os"
"os/signal"
"reflect"
"strings"
"sync"
"syscall"
"time"
"github.com/fullstorydev/grpchan/inprocgrpc"
"github.com/google/uuid"
grpcmiddleware "github.com/grpc-ecosystem/go-grpc-middleware"
"github.com/justinas/alice"
"github.com/pires/go-proxyproto"
"github.com/rs/cors"
"github.com/soheilhy/cmux"
"go.uber.org/multierr"
"golang.org/x/net/http2"
"golang.org/x/net/http2/h2c"
"golang.org/x/sync/errgroup"
"google.golang.org/grpc"
"google.golang.org/grpc/health"
"google.golang.org/grpc/health/grpc_health_v1"
greflect "google.golang.org/grpc/reflection"
"go.linka.cloud/grpc-toolkit/internal/injectlogger"
"go.linka.cloud/grpc-toolkit/logger"
"go.linka.cloud/grpc-toolkit/registry"
"go.linka.cloud/grpc-toolkit/registry/noop"
)
type Service interface {
greflect.GRPCServer
Options() Options
Start() error
Serve(lis net.Listener) error
Stop() error
Close() error
}
func New(opts ...Option) (Service, error) {
return newService(opts...)
}
type service struct {
opts *options
cancel context.CancelFunc
server *grpc.Server
mu sync.Mutex
running bool
// inproc Channel is used to serve grpc gateway
inproc *inprocgrpc.Channel
services map[string]*serviceInfo
healthServer *health.Server
id string
regSvc *registry.Service
o sync.Once
closed chan struct{}
}
func newService(opts ...Option) (*service, error) {
s := &service{
opts: NewOptions(),
id: uuid.New().String(),
inproc: &inprocgrpc.Channel{},
services: make(map[string]*serviceInfo),
}
s.mu.Lock()
defer s.mu.Unlock()
for _, f := range opts {
f(s.opts)
}
s.opts.ctx, s.cancel = context.WithCancel(s.opts.ctx)
md := md(s.opts)
if md != nil {
s.opts.unaryServerInterceptors = append([]grpc.UnaryServerInterceptor{
md.UnaryServerInterceptor(),
injectlogger.New(s.opts.ctx).UnaryServerInterceptor()},
s.opts.unaryServerInterceptors...,
)
s.opts.unaryClientInterceptors = append([]grpc.UnaryClientInterceptor{
md.UnaryClientInterceptor(),
injectlogger.New(s.opts.ctx).UnaryClientInterceptor()},
s.opts.unaryClientInterceptors...,
)
s.opts.streamServerInterceptors = append([]grpc.StreamServerInterceptor{
md.StreamServerInterceptor(),
injectlogger.New(s.opts.ctx).StreamServerInterceptor()},
s.opts.streamServerInterceptors...,
)
s.opts.streamClientInterceptors = append([]grpc.StreamClientInterceptor{
md.StreamClientInterceptor(),
injectlogger.New(s.opts.ctx).StreamClientInterceptor()},
s.opts.streamClientInterceptors...,
)
}
if s.opts.error != nil {
return nil, s.opts.error
}
go func() {
for {
select {
case <-s.opts.ctx.Done():
s.Stop()
return
}
}
}()
if s.opts.registry == nil {
s.opts.registry = noop.New()
}
if err := s.opts.parseTLSConfig(); err != nil {
return nil, err
}
ui := grpcmiddleware.ChainUnaryServer(s.opts.unaryServerInterceptors...)
s.inproc = s.inproc.WithServerUnaryInterceptor(ui)
si := grpcmiddleware.ChainStreamServer(s.opts.streamServerInterceptors...)
s.inproc = s.inproc.WithServerStreamInterceptor(si)
gopts := []grpc.ServerOption{
grpc.StreamInterceptor(si),
grpc.UnaryInterceptor(ui),
}
s.server = grpc.NewServer(append(gopts, s.opts.serverOpts...)...)
if s.opts.reflection {
greflect.Register(s.server)
}
if s.opts.health {
s.healthServer = health.NewServer()
s.registerService(&grpc_health_v1.Health_ServiceDesc, s.healthServer)
}
if err := s.gateway(s.opts.gatewayOpts...); err != nil {
return nil, err
}
if err := s.reactApp(); err != nil {
return nil, err
}
// we do not configure grpc web here as the grpc handlers are not yet registered
return s, nil
}
func (s *service) Options() Options {
return s.opts
}
func (s *service) start() (*errgroup.Group, error) {
s.mu.Lock()
defer s.mu.Unlock()
s.closed = make(chan struct{})
// configure grpc web now that we are ready to go
if err := s.grpcWeb(s.opts.grpcWebOpts...); err != nil {
return nil, err
}
network := "tcp"
if strings.HasPrefix(s.opts.address, "unix://") {
network = "unix"
s.opts.address = strings.TrimPrefix(s.opts.address, "unix://")
}
if s.opts.lis == nil {
lis, err := net.Listen(network, s.opts.address)
if err != nil {
return nil, err
}
if s.opts.tlsConfig != nil {
lis = tls.NewListener(lis, s.opts.tlsConfig)
}
s.opts.lis = lis
s.opts.address = lis.Addr().String()
} else {
s.opts.address = s.opts.lis.Addr().String()
}
if s.opts.proxyProtocol {
p := func(upstream net.Addr) (proxyproto.Policy, error) {
u, _, err := net.SplitHostPort(upstream.String())
if err != nil {
return proxyproto.REJECT, err
}
ip := net.ParseIP(u)
if ip == nil {
return proxyproto.REJECT, fmt.Errorf("proxyproto: invalid IP address")
}
if ip.IsPrivate() || ip.IsLoopback() {
return proxyproto.USE, nil
}
return proxyproto.REJECT, nil
}
if len(s.opts.proxyProtocolAddrs) > 0 {
var err error
p, err = proxyproto.StrictWhiteListPolicy(s.opts.proxyProtocolAddrs)
if err != nil {
return nil, err
}
}
s.opts.lis = &proxyproto.Listener{
Listener: s.opts.lis,
Policy: p,
}
}
for i := range s.opts.beforeStart {
if err := s.opts.beforeStart[i](); err != nil {
return nil, err
}
}
if err := s.register(); err != nil {
return nil, err
}
s.running = true
if reflect.DeepEqual(s.opts.cors, cors.Options{}) {
s.opts.cors = cors.Options{
AllowedHeaders: []string{"*"},
AllowedMethods: []string{
http.MethodGet,
http.MethodPost,
http.MethodPut,
http.MethodPatch,
http.MethodDelete,
http.MethodOptions,
http.MethodHead,
},
AllowedOrigins: []string{"*"},
AllowCredentials: true,
}
}
fn := s.runWithCmux
if s.opts.withoutCmux {
fn = s.runWithoutCmux
}
g, ctx := errgroup.WithContext(s.opts.ctx)
if err := fn(ctx, g); err != nil {
return nil, err
}
if s.healthServer != nil {
for k := range s.services {
s.healthServer.SetServingStatus(k, grpc_health_v1.HealthCheckResponse_SERVING)
}
defer func() {
for k := range s.services {
s.healthServer.SetServingStatus(k, grpc_health_v1.HealthCheckResponse_NOT_SERVING)
}
}()
}
for i := range s.opts.afterStart {
if err := s.opts.afterStart[i](); err != nil {
return nil, err
}
}
return g, nil
}
func (s *service) run() error {
g, err := s.start()
if err != nil {
return err
}
sigs := s.notify()
errs := make(chan error, 1)
go func() {
errs <- g.Wait()
}()
select {
case sig := <-sigs:
fmt.Println()
logger.C(s.opts.ctx).Warnf("received %v", sig)
return s.Close()
case err := <-errs:
if !isMuxError(err) {
logger.C(s.opts.ctx).Error(err)
return err
}
return nil
}
}
func (s *service) runWithoutCmux(ctx context.Context, g *errgroup.Group) error {
if s.opts.mux != nil {
handler := alice.New(s.opts.middlewares...).Then(cors.New(s.opts.cors).Handler(s.opts.mux))
hServer := &http.Server{
Handler: h2c.NewHandler(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if r.ProtoMajor == 2 && r.Header.Get("Content-Type") == "application/grpc" {
s.server.ServeHTTP(w, r)
} else {
handler.ServeHTTP(w, r)
}
}), &http2.Server{}),
}
if err := http2.ConfigureServer(hServer, &http2.Server{}); err != nil {
return err
}
g.Go(func() error {
defer hServer.Shutdown(ctx)
return hServer.Serve(s.opts.lis)
})
} else {
g.Go(func() error {
return s.server.Serve(s.opts.lis)
})
}
return nil
}
func (s *service) runWithCmux(ctx context.Context, g *errgroup.Group) error {
mux := cmux.New(s.opts.lis)
mux.SetReadTimeout(5 * time.Second)
gLis := mux.MatchWithWriters(cmux.HTTP2MatchHeaderFieldSendSettings("content-type", "application/grpc"))
hList := mux.Match(cmux.Any())
if s.opts.mux != nil {
hServer := &http.Server{
Handler: alice.New(s.opts.middlewares...).Then(cors.New(s.opts.cors).Handler(s.opts.mux)),
}
g.Go(func() error {
defer hServer.Shutdown(ctx)
return hServer.Serve(hList)
})
}
g.Go(func() error {
return s.server.Serve(gLis)
})
g.Go(func() error {
return ignoreMuxError(mux.Serve())
})
return nil
}
func (s *service) Serve(lis net.Listener) error {
s.mu.Lock()
s.opts.lis = lis
s.mu.Unlock()
return s.run()
}
func (s *service) Start() error {
return s.run()
}
func (s *service) Stop() error {
var err error
s.o.Do(func() {
err = s.stop()
})
return err
}
func (s *service) stop() error {
log := logger.C(s.opts.ctx)
s.mu.Lock()
defer s.mu.Unlock()
if !s.running {
return nil
}
for i := range s.opts.beforeStop {
if err := s.opts.beforeStop[i](); err != nil {
return err
}
}
if err := s.opts.registry.Deregister(s.regSvc); err != nil {
log.Errorf("failed to deregister service: %v", err)
}
defer close(s.closed)
t := time.NewTimer(5 * time.Second)
defer t.Stop()
sigs := s.notify()
done := make(chan struct{})
go func() {
defer close(done)
// TODO(adphi): find a better solution
defer func() {
// catch: Drain() is not implemented
recover()
}()
log.Warn("shutting down gracefully")
s.server.GracefulStop()
}()
select {
case <-t.C:
log.Warnf("timeout waiting for server to stop")
s.server.Stop()
case sig := <-sigs:
fmt.Println()
log.Warnf("received %v", sig)
log.Warn("forcing shutdown")
s.server.Stop()
case <-done:
}
s.running = false
s.cancel()
for i := range s.opts.afterStop {
if err := s.opts.afterStop[i](); err != nil {
return err
}
}
log.Info("server stopped")
return nil
}
func (s *service) RegisterService(desc *grpc.ServiceDesc, impl interface{}) {
s.mu.Lock()
defer s.mu.Unlock()
s.registerService(desc, impl)
}
// serviceInfo wraps information about a service. It is very similar to
// ServiceDesc and is constructed from it for internal purposes.
type serviceInfo struct {
// Contains the implementation for the methods in this service.
serviceImpl interface{}
methods map[string]*grpc.MethodDesc
streams map[string]*grpc.StreamDesc
mdata interface{}
}
func (s *service) registerService(sd *grpc.ServiceDesc, ss interface{}) {
s.server.RegisterService(sd, ss)
s.inproc.RegisterService(sd, ss)
if _, ok := s.services[sd.ServiceName]; ok {
logger.C(s.opts.ctx).Fatalf("grpc: Service.RegisterService found duplicate service registration for %q", sd.ServiceName)
}
info := &serviceInfo{
serviceImpl: ss,
methods: make(map[string]*grpc.MethodDesc),
streams: make(map[string]*grpc.StreamDesc),
mdata: sd.Metadata,
}
for i := range sd.Methods {
d := &sd.Methods[i]
info.methods[d.MethodName] = d
}
for i := range sd.Streams {
d := &sd.Streams[i]
info.streams[d.StreamName] = d
}
s.services[sd.ServiceName] = info
}
func (s *service) GetServiceInfo() map[string]grpc.ServiceInfo {
ret := make(map[string]grpc.ServiceInfo)
for n, srv := range s.services {
methods := make([]grpc.MethodInfo, 0, len(srv.methods)+len(srv.streams))
for m := range srv.methods {
methods = append(methods, grpc.MethodInfo{
Name: m,
IsClientStream: false,
IsServerStream: false,
})
}
for m, d := range srv.streams {
methods = append(methods, grpc.MethodInfo{
Name: m,
IsClientStream: d.ClientStreams,
IsServerStream: d.ServerStreams,
})
}
ret[n] = grpc.ServiceInfo{
Methods: methods,
Metadata: srv.mdata,
}
}
return ret
}
func (s *service) Close() error {
err := multierr.Combine(s.Stop())
<-s.closed
return err
}
func (s *service) notify() <-chan os.Signal {
sigs := make(chan os.Signal, 2)
signal.Notify(sigs, os.Interrupt, syscall.SIGTERM, syscall.SIGINT, syscall.SIGQUIT)
return sigs
}
func (s *service) lazyMux() ServeMux {
if s.opts.mux == nil {
s.opts.mux = http.NewServeMux()
}
return s.opts.mux
}
func ignoreMuxError(err error) error {
if !isMuxError(err) {
return err
}
return nil
}
func isMuxError(err error) bool {
if err == nil {
return false
}
if strings.Contains(err.Error(), "use of closed network connection") ||
strings.Contains(err.Error(), "mux: server closed") {
return true
}
return false
}