2022-07-07 20:11:50 +00:00
|
|
|
/*
|
|
|
|
*
|
|
|
|
* Copyright 2018 gRPC authors.
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
package binarylog
|
|
|
|
|
|
|
|
import (
|
2024-02-24 00:34:55 +00:00
|
|
|
"context"
|
2022-07-07 20:11:50 +00:00
|
|
|
"net"
|
|
|
|
"strings"
|
|
|
|
"sync/atomic"
|
|
|
|
"time"
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
binlogpb "google.golang.org/grpc/binarylog/grpc_binarylog_v1"
|
2022-07-07 20:11:50 +00:00
|
|
|
"google.golang.org/grpc/metadata"
|
|
|
|
"google.golang.org/grpc/status"
|
2024-02-24 00:34:55 +00:00
|
|
|
"google.golang.org/protobuf/proto"
|
|
|
|
"google.golang.org/protobuf/types/known/durationpb"
|
|
|
|
"google.golang.org/protobuf/types/known/timestamppb"
|
2022-07-07 20:11:50 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type callIDGenerator struct {
|
|
|
|
id uint64
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *callIDGenerator) next() uint64 {
|
|
|
|
id := atomic.AddUint64(&g.id, 1)
|
|
|
|
return id
|
|
|
|
}
|
|
|
|
|
|
|
|
// reset is for testing only, and doesn't need to be thread safe.
|
|
|
|
func (g *callIDGenerator) reset() {
|
|
|
|
g.id = 0
|
|
|
|
}
|
|
|
|
|
|
|
|
var idGen callIDGenerator
|
|
|
|
|
|
|
|
// MethodLogger is the sub-logger for each method.
|
2024-02-24 00:34:55 +00:00
|
|
|
//
|
|
|
|
// This is used in the 1.0 release of gcp/observability, and thus must not be
|
|
|
|
// deleted or changed.
|
|
|
|
type MethodLogger interface {
|
|
|
|
Log(context.Context, LogEntryConfig)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TruncatingMethodLogger is a method logger that truncates headers and messages
|
|
|
|
// based on configured fields.
|
|
|
|
type TruncatingMethodLogger struct {
|
2022-07-07 20:11:50 +00:00
|
|
|
headerMaxLen, messageMaxLen uint64
|
|
|
|
|
|
|
|
callID uint64
|
|
|
|
idWithinCallGen *callIDGenerator
|
|
|
|
|
2024-10-16 10:54:40 +00:00
|
|
|
sink Sink // TODO(blog): make this pluggable.
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
// NewTruncatingMethodLogger returns a new truncating method logger.
|
|
|
|
//
|
|
|
|
// This is used in the 1.0 release of gcp/observability, and thus must not be
|
|
|
|
// deleted or changed.
|
|
|
|
func NewTruncatingMethodLogger(h, m uint64) *TruncatingMethodLogger {
|
|
|
|
return &TruncatingMethodLogger{
|
2022-07-07 20:11:50 +00:00
|
|
|
headerMaxLen: h,
|
|
|
|
messageMaxLen: m,
|
|
|
|
|
|
|
|
callID: idGen.next(),
|
|
|
|
idWithinCallGen: &callIDGenerator{},
|
|
|
|
|
2024-10-16 10:54:40 +00:00
|
|
|
sink: DefaultSink, // TODO(blog): make it pluggable.
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
// Build is an internal only method for building the proto message out of the
|
|
|
|
// input event. It's made public to enable other library to reuse as much logic
|
|
|
|
// in TruncatingMethodLogger as possible.
|
|
|
|
func (ml *TruncatingMethodLogger) Build(c LogEntryConfig) *binlogpb.GrpcLogEntry {
|
2022-07-07 20:11:50 +00:00
|
|
|
m := c.toProto()
|
2024-02-24 00:34:55 +00:00
|
|
|
timestamp := timestamppb.Now()
|
2022-07-07 20:11:50 +00:00
|
|
|
m.Timestamp = timestamp
|
|
|
|
m.CallId = ml.callID
|
|
|
|
m.SequenceIdWithinCall = ml.idWithinCallGen.next()
|
|
|
|
|
|
|
|
switch pay := m.Payload.(type) {
|
2024-02-24 00:34:55 +00:00
|
|
|
case *binlogpb.GrpcLogEntry_ClientHeader:
|
2022-07-07 20:11:50 +00:00
|
|
|
m.PayloadTruncated = ml.truncateMetadata(pay.ClientHeader.GetMetadata())
|
2024-02-24 00:34:55 +00:00
|
|
|
case *binlogpb.GrpcLogEntry_ServerHeader:
|
2022-07-07 20:11:50 +00:00
|
|
|
m.PayloadTruncated = ml.truncateMetadata(pay.ServerHeader.GetMetadata())
|
2024-02-24 00:34:55 +00:00
|
|
|
case *binlogpb.GrpcLogEntry_Message:
|
2022-07-07 20:11:50 +00:00
|
|
|
m.PayloadTruncated = ml.truncateMessage(pay.Message)
|
|
|
|
}
|
2024-02-24 00:34:55 +00:00
|
|
|
return m
|
|
|
|
}
|
2022-07-07 20:11:50 +00:00
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
// Log creates a proto binary log entry, and logs it to the sink.
|
|
|
|
func (ml *TruncatingMethodLogger) Log(ctx context.Context, c LogEntryConfig) {
|
|
|
|
ml.sink.Write(ml.Build(c))
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
func (ml *TruncatingMethodLogger) truncateMetadata(mdPb *binlogpb.Metadata) (truncated bool) {
|
2022-07-07 20:11:50 +00:00
|
|
|
if ml.headerMaxLen == maxUInt {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
var (
|
|
|
|
bytesLimit = ml.headerMaxLen
|
|
|
|
index int
|
|
|
|
)
|
|
|
|
// At the end of the loop, index will be the first entry where the total
|
|
|
|
// size is greater than the limit:
|
|
|
|
//
|
|
|
|
// len(entry[:index]) <= ml.hdr && len(entry[:index+1]) > ml.hdr.
|
|
|
|
for ; index < len(mdPb.Entry); index++ {
|
|
|
|
entry := mdPb.Entry[index]
|
|
|
|
if entry.Key == "grpc-trace-bin" {
|
|
|
|
// "grpc-trace-bin" is a special key. It's kept in the log entry,
|
|
|
|
// but not counted towards the size limit.
|
|
|
|
continue
|
|
|
|
}
|
2024-02-24 00:34:55 +00:00
|
|
|
currentEntryLen := uint64(len(entry.GetKey())) + uint64(len(entry.GetValue()))
|
2022-07-07 20:11:50 +00:00
|
|
|
if currentEntryLen > bytesLimit {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
bytesLimit -= currentEntryLen
|
|
|
|
}
|
|
|
|
truncated = index < len(mdPb.Entry)
|
|
|
|
mdPb.Entry = mdPb.Entry[:index]
|
|
|
|
return truncated
|
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
func (ml *TruncatingMethodLogger) truncateMessage(msgPb *binlogpb.Message) (truncated bool) {
|
2022-07-07 20:11:50 +00:00
|
|
|
if ml.messageMaxLen == maxUInt {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if ml.messageMaxLen >= uint64(len(msgPb.Data)) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
msgPb.Data = msgPb.Data[:ml.messageMaxLen]
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// LogEntryConfig represents the configuration for binary log entry.
|
2024-02-24 00:34:55 +00:00
|
|
|
//
|
|
|
|
// This is used in the 1.0 release of gcp/observability, and thus must not be
|
|
|
|
// deleted or changed.
|
2022-07-07 20:11:50 +00:00
|
|
|
type LogEntryConfig interface {
|
2024-02-24 00:34:55 +00:00
|
|
|
toProto() *binlogpb.GrpcLogEntry
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ClientHeader configs the binary log entry to be a ClientHeader entry.
|
|
|
|
type ClientHeader struct {
|
|
|
|
OnClientSide bool
|
|
|
|
Header metadata.MD
|
|
|
|
MethodName string
|
|
|
|
Authority string
|
|
|
|
Timeout time.Duration
|
|
|
|
// PeerAddr is required only when it's on server side.
|
|
|
|
PeerAddr net.Addr
|
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
func (c *ClientHeader) toProto() *binlogpb.GrpcLogEntry {
|
2022-07-07 20:11:50 +00:00
|
|
|
// This function doesn't need to set all the fields (e.g. seq ID). The Log
|
|
|
|
// function will set the fields when necessary.
|
2024-02-24 00:34:55 +00:00
|
|
|
clientHeader := &binlogpb.ClientHeader{
|
2022-07-07 20:11:50 +00:00
|
|
|
Metadata: mdToMetadataProto(c.Header),
|
|
|
|
MethodName: c.MethodName,
|
|
|
|
Authority: c.Authority,
|
|
|
|
}
|
|
|
|
if c.Timeout > 0 {
|
2024-02-24 00:34:55 +00:00
|
|
|
clientHeader.Timeout = durationpb.New(c.Timeout)
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
2024-02-24 00:34:55 +00:00
|
|
|
ret := &binlogpb.GrpcLogEntry{
|
|
|
|
Type: binlogpb.GrpcLogEntry_EVENT_TYPE_CLIENT_HEADER,
|
|
|
|
Payload: &binlogpb.GrpcLogEntry_ClientHeader{
|
2022-07-07 20:11:50 +00:00
|
|
|
ClientHeader: clientHeader,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if c.OnClientSide {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Logger = binlogpb.GrpcLogEntry_LOGGER_CLIENT
|
2022-07-07 20:11:50 +00:00
|
|
|
} else {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Logger = binlogpb.GrpcLogEntry_LOGGER_SERVER
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
if c.PeerAddr != nil {
|
|
|
|
ret.Peer = addrToProto(c.PeerAddr)
|
|
|
|
}
|
|
|
|
return ret
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServerHeader configs the binary log entry to be a ServerHeader entry.
|
|
|
|
type ServerHeader struct {
|
|
|
|
OnClientSide bool
|
|
|
|
Header metadata.MD
|
|
|
|
// PeerAddr is required only when it's on client side.
|
|
|
|
PeerAddr net.Addr
|
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
func (c *ServerHeader) toProto() *binlogpb.GrpcLogEntry {
|
|
|
|
ret := &binlogpb.GrpcLogEntry{
|
|
|
|
Type: binlogpb.GrpcLogEntry_EVENT_TYPE_SERVER_HEADER,
|
|
|
|
Payload: &binlogpb.GrpcLogEntry_ServerHeader{
|
|
|
|
ServerHeader: &binlogpb.ServerHeader{
|
2022-07-07 20:11:50 +00:00
|
|
|
Metadata: mdToMetadataProto(c.Header),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if c.OnClientSide {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Logger = binlogpb.GrpcLogEntry_LOGGER_CLIENT
|
2022-07-07 20:11:50 +00:00
|
|
|
} else {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Logger = binlogpb.GrpcLogEntry_LOGGER_SERVER
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
if c.PeerAddr != nil {
|
|
|
|
ret.Peer = addrToProto(c.PeerAddr)
|
|
|
|
}
|
|
|
|
return ret
|
|
|
|
}
|
|
|
|
|
|
|
|
// ClientMessage configs the binary log entry to be a ClientMessage entry.
|
|
|
|
type ClientMessage struct {
|
|
|
|
OnClientSide bool
|
|
|
|
// Message can be a proto.Message or []byte. Other messages formats are not
|
|
|
|
// supported.
|
2024-02-24 00:34:55 +00:00
|
|
|
Message any
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
func (c *ClientMessage) toProto() *binlogpb.GrpcLogEntry {
|
2022-07-07 20:11:50 +00:00
|
|
|
var (
|
|
|
|
data []byte
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
if m, ok := c.Message.(proto.Message); ok {
|
|
|
|
data, err = proto.Marshal(m)
|
|
|
|
if err != nil {
|
|
|
|
grpclogLogger.Infof("binarylogging: failed to marshal proto message: %v", err)
|
|
|
|
}
|
|
|
|
} else if b, ok := c.Message.([]byte); ok {
|
|
|
|
data = b
|
|
|
|
} else {
|
|
|
|
grpclogLogger.Infof("binarylogging: message to log is neither proto.message nor []byte")
|
|
|
|
}
|
2024-02-24 00:34:55 +00:00
|
|
|
ret := &binlogpb.GrpcLogEntry{
|
|
|
|
Type: binlogpb.GrpcLogEntry_EVENT_TYPE_CLIENT_MESSAGE,
|
|
|
|
Payload: &binlogpb.GrpcLogEntry_Message{
|
|
|
|
Message: &binlogpb.Message{
|
2022-07-07 20:11:50 +00:00
|
|
|
Length: uint32(len(data)),
|
|
|
|
Data: data,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if c.OnClientSide {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Logger = binlogpb.GrpcLogEntry_LOGGER_CLIENT
|
2022-07-07 20:11:50 +00:00
|
|
|
} else {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Logger = binlogpb.GrpcLogEntry_LOGGER_SERVER
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
return ret
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServerMessage configs the binary log entry to be a ServerMessage entry.
|
|
|
|
type ServerMessage struct {
|
|
|
|
OnClientSide bool
|
|
|
|
// Message can be a proto.Message or []byte. Other messages formats are not
|
|
|
|
// supported.
|
2024-02-24 00:34:55 +00:00
|
|
|
Message any
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
func (c *ServerMessage) toProto() *binlogpb.GrpcLogEntry {
|
2022-07-07 20:11:50 +00:00
|
|
|
var (
|
|
|
|
data []byte
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
if m, ok := c.Message.(proto.Message); ok {
|
|
|
|
data, err = proto.Marshal(m)
|
|
|
|
if err != nil {
|
|
|
|
grpclogLogger.Infof("binarylogging: failed to marshal proto message: %v", err)
|
|
|
|
}
|
|
|
|
} else if b, ok := c.Message.([]byte); ok {
|
|
|
|
data = b
|
|
|
|
} else {
|
|
|
|
grpclogLogger.Infof("binarylogging: message to log is neither proto.message nor []byte")
|
|
|
|
}
|
2024-02-24 00:34:55 +00:00
|
|
|
ret := &binlogpb.GrpcLogEntry{
|
|
|
|
Type: binlogpb.GrpcLogEntry_EVENT_TYPE_SERVER_MESSAGE,
|
|
|
|
Payload: &binlogpb.GrpcLogEntry_Message{
|
|
|
|
Message: &binlogpb.Message{
|
2022-07-07 20:11:50 +00:00
|
|
|
Length: uint32(len(data)),
|
|
|
|
Data: data,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if c.OnClientSide {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Logger = binlogpb.GrpcLogEntry_LOGGER_CLIENT
|
2022-07-07 20:11:50 +00:00
|
|
|
} else {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Logger = binlogpb.GrpcLogEntry_LOGGER_SERVER
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
return ret
|
|
|
|
}
|
|
|
|
|
|
|
|
// ClientHalfClose configs the binary log entry to be a ClientHalfClose entry.
|
|
|
|
type ClientHalfClose struct {
|
|
|
|
OnClientSide bool
|
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
func (c *ClientHalfClose) toProto() *binlogpb.GrpcLogEntry {
|
|
|
|
ret := &binlogpb.GrpcLogEntry{
|
|
|
|
Type: binlogpb.GrpcLogEntry_EVENT_TYPE_CLIENT_HALF_CLOSE,
|
2022-07-07 20:11:50 +00:00
|
|
|
Payload: nil, // No payload here.
|
|
|
|
}
|
|
|
|
if c.OnClientSide {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Logger = binlogpb.GrpcLogEntry_LOGGER_CLIENT
|
2022-07-07 20:11:50 +00:00
|
|
|
} else {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Logger = binlogpb.GrpcLogEntry_LOGGER_SERVER
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
return ret
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServerTrailer configs the binary log entry to be a ServerTrailer entry.
|
|
|
|
type ServerTrailer struct {
|
|
|
|
OnClientSide bool
|
|
|
|
Trailer metadata.MD
|
|
|
|
// Err is the status error.
|
|
|
|
Err error
|
|
|
|
// PeerAddr is required only when it's on client side and the RPC is trailer
|
|
|
|
// only.
|
|
|
|
PeerAddr net.Addr
|
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
func (c *ServerTrailer) toProto() *binlogpb.GrpcLogEntry {
|
2022-07-07 20:11:50 +00:00
|
|
|
st, ok := status.FromError(c.Err)
|
|
|
|
if !ok {
|
|
|
|
grpclogLogger.Info("binarylogging: error in trailer is not a status error")
|
|
|
|
}
|
|
|
|
var (
|
|
|
|
detailsBytes []byte
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
stProto := st.Proto()
|
|
|
|
if stProto != nil && len(stProto.Details) != 0 {
|
|
|
|
detailsBytes, err = proto.Marshal(stProto)
|
|
|
|
if err != nil {
|
|
|
|
grpclogLogger.Infof("binarylogging: failed to marshal status proto: %v", err)
|
|
|
|
}
|
|
|
|
}
|
2024-02-24 00:34:55 +00:00
|
|
|
ret := &binlogpb.GrpcLogEntry{
|
|
|
|
Type: binlogpb.GrpcLogEntry_EVENT_TYPE_SERVER_TRAILER,
|
|
|
|
Payload: &binlogpb.GrpcLogEntry_Trailer{
|
|
|
|
Trailer: &binlogpb.Trailer{
|
2022-07-07 20:11:50 +00:00
|
|
|
Metadata: mdToMetadataProto(c.Trailer),
|
|
|
|
StatusCode: uint32(st.Code()),
|
|
|
|
StatusMessage: st.Message(),
|
|
|
|
StatusDetails: detailsBytes,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if c.OnClientSide {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Logger = binlogpb.GrpcLogEntry_LOGGER_CLIENT
|
2022-07-07 20:11:50 +00:00
|
|
|
} else {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Logger = binlogpb.GrpcLogEntry_LOGGER_SERVER
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
if c.PeerAddr != nil {
|
|
|
|
ret.Peer = addrToProto(c.PeerAddr)
|
|
|
|
}
|
|
|
|
return ret
|
|
|
|
}
|
|
|
|
|
|
|
|
// Cancel configs the binary log entry to be a Cancel entry.
|
|
|
|
type Cancel struct {
|
|
|
|
OnClientSide bool
|
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
func (c *Cancel) toProto() *binlogpb.GrpcLogEntry {
|
|
|
|
ret := &binlogpb.GrpcLogEntry{
|
|
|
|
Type: binlogpb.GrpcLogEntry_EVENT_TYPE_CANCEL,
|
2022-07-07 20:11:50 +00:00
|
|
|
Payload: nil,
|
|
|
|
}
|
|
|
|
if c.OnClientSide {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Logger = binlogpb.GrpcLogEntry_LOGGER_CLIENT
|
2022-07-07 20:11:50 +00:00
|
|
|
} else {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Logger = binlogpb.GrpcLogEntry_LOGGER_SERVER
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
return ret
|
|
|
|
}
|
|
|
|
|
|
|
|
// metadataKeyOmit returns whether the metadata entry with this key should be
|
|
|
|
// omitted.
|
|
|
|
func metadataKeyOmit(key string) bool {
|
|
|
|
switch key {
|
|
|
|
case "lb-token", ":path", ":authority", "content-encoding", "content-type", "user-agent", "te":
|
|
|
|
return true
|
2024-10-16 10:54:40 +00:00
|
|
|
case "grpc-trace-bin": // grpc-trace-bin is special because it's visible to users.
|
2022-07-07 20:11:50 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
return strings.HasPrefix(key, "grpc-")
|
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
func mdToMetadataProto(md metadata.MD) *binlogpb.Metadata {
|
|
|
|
ret := &binlogpb.Metadata{}
|
2022-07-07 20:11:50 +00:00
|
|
|
for k, vv := range md {
|
|
|
|
if metadataKeyOmit(k) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
for _, v := range vv {
|
|
|
|
ret.Entry = append(ret.Entry,
|
2024-02-24 00:34:55 +00:00
|
|
|
&binlogpb.MetadataEntry{
|
2022-07-07 20:11:50 +00:00
|
|
|
Key: k,
|
|
|
|
Value: []byte(v),
|
|
|
|
},
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret
|
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
func addrToProto(addr net.Addr) *binlogpb.Address {
|
|
|
|
ret := &binlogpb.Address{}
|
2022-07-07 20:11:50 +00:00
|
|
|
switch a := addr.(type) {
|
|
|
|
case *net.TCPAddr:
|
|
|
|
if a.IP.To4() != nil {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Type = binlogpb.Address_TYPE_IPV4
|
2022-07-07 20:11:50 +00:00
|
|
|
} else if a.IP.To16() != nil {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Type = binlogpb.Address_TYPE_IPV6
|
2022-07-07 20:11:50 +00:00
|
|
|
} else {
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Type = binlogpb.Address_TYPE_UNKNOWN
|
2022-07-07 20:11:50 +00:00
|
|
|
// Do not set address and port fields.
|
|
|
|
break
|
|
|
|
}
|
|
|
|
ret.Address = a.IP.String()
|
|
|
|
ret.IpPort = uint32(a.Port)
|
|
|
|
case *net.UnixAddr:
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Type = binlogpb.Address_TYPE_UNIX
|
2022-07-07 20:11:50 +00:00
|
|
|
ret.Address = a.String()
|
|
|
|
default:
|
2024-02-24 00:34:55 +00:00
|
|
|
ret.Type = binlogpb.Address_TYPE_UNKNOWN
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
return ret
|
|
|
|
}
|