2022-07-13 15:33:48 +00:00
|
|
|
package external
|
2022-03-22 12:40:24 +00:00
|
|
|
|
|
|
|
import (
|
2022-08-24 16:31:38 +00:00
|
|
|
"time"
|
|
|
|
|
2022-03-22 12:40:24 +00:00
|
|
|
middleware "github.com/grpc-ecosystem/go-grpc-middleware"
|
|
|
|
recovery "github.com/grpc-ecosystem/go-grpc-middleware/recovery"
|
|
|
|
"google.golang.org/grpc"
|
|
|
|
"google.golang.org/grpc/credentials"
|
2022-07-18 23:12:03 +00:00
|
|
|
"google.golang.org/grpc/keepalive"
|
2022-03-22 12:40:24 +00:00
|
|
|
|
2022-07-13 15:33:48 +00:00
|
|
|
agentmiddleware "github.com/hashicorp/consul/agent/grpc-middleware"
|
2022-03-22 12:40:24 +00:00
|
|
|
"github.com/hashicorp/consul/tlsutil"
|
2022-08-19 17:07:22 +00:00
|
|
|
"github.com/hashicorp/go-hclog"
|
2022-03-22 12:40:24 +00:00
|
|
|
)
|
|
|
|
|
2022-07-13 15:33:48 +00:00
|
|
|
// NewServer constructs a gRPC server for the external gRPC port, to which
|
2022-03-22 12:40:24 +00:00
|
|
|
// handlers can be registered.
|
|
|
|
func NewServer(logger agentmiddleware.Logger, tls *tlsutil.Configurator) *grpc.Server {
|
|
|
|
recoveryOpts := agentmiddleware.PanicHandlerMiddlewareOpts(logger)
|
|
|
|
|
|
|
|
opts := []grpc.ServerOption{
|
|
|
|
grpc.MaxConcurrentStreams(2048),
|
|
|
|
middleware.WithUnaryServerChain(
|
|
|
|
// Add middlware interceptors to recover in case of panics.
|
|
|
|
recovery.UnaryServerInterceptor(recoveryOpts...),
|
|
|
|
),
|
|
|
|
middleware.WithStreamServerChain(
|
|
|
|
// Add middlware interceptors to recover in case of panics.
|
|
|
|
recovery.StreamServerInterceptor(recoveryOpts...),
|
|
|
|
),
|
2022-07-18 23:12:03 +00:00
|
|
|
grpc.KeepaliveEnforcementPolicy(keepalive.EnforcementPolicy{
|
|
|
|
// This must be less than the keealive.ClientParameters Time setting, otherwise
|
|
|
|
// the server will disconnect the client for sending too many keepalive pings.
|
|
|
|
// Currently the client param is set to 30s.
|
|
|
|
MinTime: 15 * time.Second,
|
|
|
|
}),
|
2022-03-22 12:40:24 +00:00
|
|
|
}
|
2022-08-24 16:31:38 +00:00
|
|
|
if tls != nil && tls.GRPCServerUseTLS() {
|
2022-03-22 12:40:24 +00:00
|
|
|
creds := credentials.NewTLS(tls.IncomingGRPCConfig())
|
|
|
|
opts = append(opts, grpc.Creds(creds))
|
|
|
|
}
|
|
|
|
return grpc.NewServer(opts...)
|
|
|
|
}
|
2022-08-19 17:07:22 +00:00
|
|
|
|
|
|
|
// BuildExternalGRPCServers constructs two gRPC servers for the external gRPC ports.
|
|
|
|
// This function exists because behavior for the original `ports.grpc` is dependent on
|
|
|
|
// whether the new `ports.grpc_tls` is defined. This behavior should be simplified in
|
|
|
|
// a future release so that the `ports.grpc` is always plain-text and not dependent on
|
|
|
|
// the `ports.grpc_tls` configuration.
|
|
|
|
func BuildExternalGRPCServers(grpcPort int, grpcTLSPort int, t *tlsutil.Configurator, l hclog.InterceptLogger) (grpc, grpcTLS *grpc.Server) {
|
|
|
|
if grpcPort > 0 {
|
|
|
|
// TODO: remove this deprecated behavior in a future version and only support plain-text for this port.
|
|
|
|
if grpcTLSPort > 0 {
|
|
|
|
// Use plain-text if the new grpc_tls port is configured.
|
|
|
|
grpc = NewServer(l.Named("grpc.external"), nil)
|
|
|
|
} else {
|
|
|
|
// Otherwise, check TLS configuration to determine whether to encrypt (for backwards compatibility).
|
|
|
|
grpc = NewServer(l.Named("grpc.external"), t)
|
|
|
|
if t != nil && t.GRPCServerUseTLS() {
|
|
|
|
l.Warn("deprecated gRPC TLS configuration detected. Consider using `ports.grpc_tls` instead")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if grpcTLSPort > 0 {
|
|
|
|
if t.GRPCServerUseTLS() {
|
|
|
|
grpcTLS = NewServer(l.Named("grpc_tls.external"), t)
|
|
|
|
} else {
|
|
|
|
l.Error("error starting gRPC TLS server", "error", "port is set, but invalid TLS configuration detected")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|