package internal import ( "context" "crypto/tls" "crypto/x509" "errors" "fmt" "io/ioutil" "log" "strings" "time" "github.com/tal-tech/go-zero/zrpc/internal/balancer/p2c" "github.com/tal-tech/go-zero/zrpc/internal/clientinterceptors" "github.com/tal-tech/go-zero/zrpc/internal/resolver" "google.golang.org/grpc" "google.golang.org/grpc/credentials" ) const ( dialTimeout = time.Second * 3 separator = '/' ) func init() { resolver.RegisterResolver() } type ( // Client interface wraps the Conn method. Client interface { Conn() *grpc.ClientConn } // A ClientOptions is a client options. ClientOptions struct { Timeout time.Duration Secure bool Retry bool DialOptions []grpc.DialOption } // ClientOption defines the method to customize a ClientOptions. ClientOption func(options *ClientOptions) client struct { conn *grpc.ClientConn } ) // NewClient returns a Client. func NewClient(target string, opts ...ClientOption) (Client, error) { var cli client opts = append([]ClientOption{WithDialOption(grpc.WithBalancerName(p2c.Name))}, opts...) if err := cli.dial(target, opts...); err != nil { return nil, err } return &cli, nil } func (c *client) Conn() *grpc.ClientConn { return c.conn } func (c *client) buildDialOptions(opts ...ClientOption) []grpc.DialOption { var cliOpts ClientOptions for _, opt := range opts { opt(&cliOpts) } var options []grpc.DialOption if !cliOpts.Secure { options = append([]grpc.DialOption(nil), grpc.WithInsecure()) } options = append(options, grpc.WithBlock(), WithUnaryClientInterceptors( clientinterceptors.UnaryTracingInterceptor, clientinterceptors.DurationInterceptor, clientinterceptors.PrometheusInterceptor, clientinterceptors.BreakerInterceptor, clientinterceptors.TimeoutInterceptor(cliOpts.Timeout), clientinterceptors.RetryInterceptor(cliOpts.Retry), ), WithStreamClientInterceptors( clientinterceptors.StreamTracingInterceptor, ), ) return append(options, cliOpts.DialOptions...) } func (c *client) dial(server string, opts ...ClientOption) error { options := c.buildDialOptions(opts...) timeCtx, cancel := context.WithTimeout(context.Background(), dialTimeout) defer cancel() conn, err := grpc.DialContext(timeCtx, server, options...) if err != nil { service := server if errors.Is(err, context.DeadlineExceeded) { pos := strings.LastIndexByte(server, separator) // len(server) - 1 is the index of last char if 0 < pos && pos < len(server)-1 { service = server[pos+1:] } } return fmt.Errorf("rpc dial: %s, error: %s, make sure rpc service %q is already started", server, err.Error(), service) } c.conn = conn return nil } // WithDialOption returns a func to customize a ClientOptions with given dial option. func WithDialOption(opt grpc.DialOption) ClientOption { return func(options *ClientOptions) { options.DialOptions = append(options.DialOptions, opt) } } // WithTimeout returns a func to customize a ClientOptions with given timeout. func WithTimeout(timeout time.Duration) ClientOption { return func(options *ClientOptions) { options.Timeout = timeout } } // WithRetry returns a func to customize a ClientOptions with auto retry. func WithRetry() ClientOption { return func(options *ClientOptions) { options.Retry = true } } // WithUnaryClientInterceptor returns a func to customize a ClientOptions with given interceptor. func WithUnaryClientInterceptor(interceptor grpc.UnaryClientInterceptor) ClientOption { return func(options *ClientOptions) { options.DialOptions = append(options.DialOptions, WithUnaryClientInterceptors(interceptor)) } } // WithTlsClientFromUnilateral return a func to customize a ClientOptions Verify with Unilateralism authentication. func WithTlsClientFromUnilateral(crt, domainName string) ClientOption { return func(options *ClientOptions) { c, err := credentials.NewClientTLSFromFile(crt, domainName) if err != nil { log.Fatalf("credentials.NewClientTLSFromFile err: %v", err) } options.Secure = true options.DialOptions = append(options.DialOptions, grpc.WithTransportCredentials(c)) } } // WithTlsClientFromMutual return a func to customize a ClientOptions Verify with mutual authentication. func WithTlsClientFromMutual(crtFile, keyFile, caFile string) ClientOption { return func(options *ClientOptions) { cert, err := tls.LoadX509KeyPair(crtFile, keyFile) if err != nil { log.Fatalf("tls.LoadX509KeyPair err: %v", err) } certPool := x509.NewCertPool() ca, err := ioutil.ReadFile(caFile) if err != nil { log.Fatalf("credentials: failed to ReadFile CA certificates err: %v", err) } if !certPool.AppendCertsFromPEM(ca) { log.Fatalf("credentials: failed to append certificates err: %v", err) } config := &tls.Config{ Certificates: []tls.Certificate{cert}, RootCAs: certPool, } options.Secure = true options.DialOptions = append(options.DialOptions, grpc.WithTransportCredentials(credentials.NewTLS(config))) } }