mirror of
https://github.com/linka-cloud/grpc.git
synced 2024-11-22 19:06:26 +00:00
274 lines
7.1 KiB
Go
274 lines
7.1 KiB
Go
package main
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"errors"
|
|
"io"
|
|
"net"
|
|
"net/http"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
"github.com/prometheus/client_golang/prometheus/promhttp"
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/uptrace/opentelemetry-go-extra/otellogrus"
|
|
"go.opentelemetry.io/otel"
|
|
"go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc"
|
|
"go.opentelemetry.io/otel/propagation"
|
|
"go.opentelemetry.io/otel/sdk/resource"
|
|
sdktrace "go.opentelemetry.io/otel/sdk/trace"
|
|
semconv "go.opentelemetry.io/otel/semconv/v1.17.0"
|
|
"golang.org/x/net/http2"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/health/grpc_health_v1"
|
|
"google.golang.org/grpc/metadata"
|
|
|
|
"go.linka.cloud/grpc-tookit/example/pb"
|
|
"go.linka.cloud/grpc-toolkit/client"
|
|
"go.linka.cloud/grpc-toolkit/interceptors/auth"
|
|
"go.linka.cloud/grpc-toolkit/interceptors/tracing"
|
|
"go.linka.cloud/grpc-toolkit/logger"
|
|
"go.linka.cloud/grpc-toolkit/service"
|
|
)
|
|
|
|
func run(ctx context.Context, opts ...service.Option) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
|
|
name := "greeter"
|
|
version := "v0.0.1"
|
|
secure := true
|
|
|
|
log := logger.New().WithFields("service", name).WithReportCaller(true)
|
|
log.Logger().AddHook(otellogrus.NewHook(otellogrus.WithLevels(
|
|
logger.PanicLevel,
|
|
logger.FatalLevel,
|
|
logger.ErrorLevel,
|
|
logger.WarnLevel,
|
|
logger.InfoLevel,
|
|
)))
|
|
ctx = logger.Set(ctx, log)
|
|
done := make(chan struct{})
|
|
ready := make(chan struct{})
|
|
|
|
exporter, err := otlptracegrpc.New(ctx, otlptracegrpc.WithInsecure(), otlptracegrpc.WithEndpoint("192.168.10.212:4317"))
|
|
if err != nil {
|
|
logrus.Fatal(err)
|
|
}
|
|
defer exporter.Shutdown(ctx)
|
|
|
|
r, err := resource.New(
|
|
ctx,
|
|
resource.WithFromEnv(),
|
|
resource.WithTelemetrySDK(),
|
|
resource.WithHost(),
|
|
resource.WithSchemaURL(semconv.SchemaURL),
|
|
resource.WithAttributes(
|
|
semconv.ServiceName("example"),
|
|
semconv.ServiceVersion("v1.0.0"),
|
|
semconv.DeploymentEnvironment("tests"),
|
|
),
|
|
)
|
|
|
|
tp := sdktrace.NewTracerProvider(
|
|
sdktrace.WithResource(r),
|
|
// sdktrace.WithBatcher(exporter),
|
|
sdktrace.WithSyncer(exporter),
|
|
sdktrace.WithSampler(sdktrace.AlwaysSample()),
|
|
)
|
|
defer func() {
|
|
if err := tp.Shutdown(ctx); err != nil {
|
|
log.Error(err)
|
|
}
|
|
}()
|
|
|
|
// exporter, err := stdout.New(stdout.WithPrettyPrint())
|
|
// if err != nil {
|
|
// log.WithError(err).Fatal("failed to create otel exporter")
|
|
// }
|
|
// tp := sdktrace.NewTracerProvider(
|
|
// sdktrace.WithSampler(sdktrace.AlwaysSample()),
|
|
// // enable in production
|
|
// // sdktrace.WithBatcher(exporter),
|
|
// // enable in development
|
|
// sdktrace.WithSyncer(exporter),
|
|
// )
|
|
|
|
otel.SetTracerProvider(tp)
|
|
otel.SetTextMapPropagator(propagation.NewCompositeTextMapPropagator(propagation.TraceContext{}, propagation.Baggage{}))
|
|
defer func() { _ = exporter.Shutdown(context.Background()) }()
|
|
|
|
address := "0.0.0.0:9991"
|
|
|
|
var svc service.Service
|
|
opts = append(opts,
|
|
service.WithContext(ctx),
|
|
service.WithName(name),
|
|
service.WithVersion(version),
|
|
service.WithAddress(address),
|
|
service.WithSecure(secure),
|
|
service.WithAfterStart(func() error {
|
|
log.Info("Server listening on", svc.Options().Address())
|
|
close(ready)
|
|
return nil
|
|
}),
|
|
service.WithAfterStop(func() error {
|
|
log.Info("Stopping server")
|
|
close(done)
|
|
return nil
|
|
}),
|
|
)
|
|
svc, err = newService(ctx, opts...)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
go func() {
|
|
if err := svc.Start(); err != nil {
|
|
panic(err)
|
|
}
|
|
}()
|
|
go func() {
|
|
http.Handle("/metrics", promhttp.HandlerFor(
|
|
prometheus.DefaultGatherer,
|
|
promhttp.HandlerOpts{
|
|
// Opt into OpenMetrics e.g. to support exemplars.
|
|
EnableOpenMetrics: true,
|
|
},
|
|
))
|
|
if err := http.ListenAndServe(":9992", nil); err != nil {
|
|
panic(err)
|
|
}
|
|
}()
|
|
<-ready
|
|
copts := []client.Option{
|
|
// client.WithName(name),
|
|
// client.WithVersion(version),
|
|
client.WithAddress("localhost:9991"),
|
|
// client.WithRegistry(mdns.NewRegistry()),
|
|
client.WithSecure(secure),
|
|
client.WithInterceptors(tracing.NewClientInterceptors()),
|
|
// client.WithUnaryInterceptors(func(ctx context.Context, method string, req, reply interface{}, cc *grpc.ClientConn, invoker grpc.UnaryInvoker, opts ...grpc.CallOption) error {
|
|
// logger.From(ctx).WithFields("party", "client", "method", method).Info(req)
|
|
// return invoker(ctx, method, req, reply, cc, opts...)
|
|
// }),
|
|
}
|
|
s, err := client.New(copts...)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
g := pb.NewGreeterClient(s)
|
|
h := grpc_health_v1.NewHealthClient(s)
|
|
for i := 0; i < 5; i++ {
|
|
_, err := h.Check(ctx, &grpc_health_v1.HealthCheckRequest{})
|
|
if err != nil {
|
|
log.Error(err)
|
|
} else {
|
|
log.Fatalf("expected error")
|
|
}
|
|
}
|
|
log.Infof("waiting for unban")
|
|
time.Sleep(time.Second)
|
|
s, err = client.New(append(copts, client.WithInterceptors(auth.NewBasicAuthClientIntereptors("admin", "admin")))...)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
g = pb.NewGreeterClient(s)
|
|
h = grpc_health_v1.NewHealthClient(s)
|
|
hres, err := h.Check(ctx, &grpc_health_v1.HealthCheckRequest{Service: "helloworld.Greeter"})
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
log.Infof("status: %v", hres.Status)
|
|
|
|
md := metadata.MD{}
|
|
res, err := g.SayHello(ctx, &pb.HelloRequest{Name: "test"}, grpc.Header(&md))
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
logMetadata(ctx, md)
|
|
log.Infof("received message: %s", res.Message)
|
|
md = metadata.MD{}
|
|
res, err = g.SayHello(ctx, &pb.HelloRequest{}, grpc.Header(&md))
|
|
if err == nil {
|
|
log.Fatal("expected validation error")
|
|
}
|
|
logMetadata(ctx, md)
|
|
stream, err := g.SayHelloStream(ctx, &pb.HelloStreamRequest{Name: "test"}, grpc.Header(&md))
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
if md, err := stream.Header(); err == nil {
|
|
logMetadata(ctx, md)
|
|
}
|
|
for {
|
|
m, err := stream.Recv()
|
|
if errors.Is(err, io.EOF) {
|
|
break
|
|
}
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
log.Infof("received stream message: %s", m.Message)
|
|
}
|
|
scheme := "http://"
|
|
var (
|
|
tlsConfig *tls.Config
|
|
dial func(ctx context.Context, network, addr string, cfg *tls.Config) (net.Conn, error)
|
|
)
|
|
if secure {
|
|
scheme = "https://"
|
|
tlsConfig = &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
}
|
|
} else {
|
|
dial = func(ctx context.Context, network, addr string, cfg *tls.Config) (net.Conn, error) {
|
|
var d net.Dialer
|
|
return d.DialContext(ctx, network, addr)
|
|
}
|
|
}
|
|
httpc := &http.Client{
|
|
Transport: &http2.Transport{
|
|
AllowHTTP: true,
|
|
TLSClientConfig: tlsConfig,
|
|
DialTLSContext: dial,
|
|
},
|
|
}
|
|
req := `{"name":"test"}`
|
|
|
|
do := func(url, contentType string) {
|
|
req, err := http.NewRequest(http.MethodPost, url, strings.NewReader(req))
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
req.Header.Set("content-type", contentType)
|
|
req.Header.Set("authorization", auth.BasicAuth("admin", "admin"))
|
|
resp, err := httpc.Do(req)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
defer resp.Body.Close()
|
|
b, err := io.ReadAll(resp.Body)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
log.Info(string(b))
|
|
}
|
|
do(scheme+address+"/rest/api/v1/greeter/hello", "application/json")
|
|
do(scheme+address+"/grpc/helloworld.Greeter/SayHello", "application/grpc-web+json")
|
|
|
|
if err := readSvcs(ctx, s); err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
cancel()
|
|
<-done
|
|
}
|
|
|
|
func logMetadata(ctx context.Context, md metadata.MD) {
|
|
log := logger.From(ctx)
|
|
for k, v := range md {
|
|
log.Infof("%s: %v", k, v)
|
|
}
|
|
}
|