2024-05-10 18:01:30 +08:00
|
|
|
package client
|
|
|
|
|
|
|
|
import (
|
2024-05-17 10:39:37 +08:00
|
|
|
"context"
|
2024-05-10 18:01:30 +08:00
|
|
|
"fmt"
|
|
|
|
"math"
|
|
|
|
"net/url"
|
|
|
|
"regexp"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/cockroachdb/errors"
|
|
|
|
"google.golang.org/grpc"
|
|
|
|
"google.golang.org/grpc/backoff"
|
|
|
|
"google.golang.org/grpc/keepalive"
|
2024-05-20 20:47:38 +08:00
|
|
|
|
|
|
|
"github.com/milvus-io/milvus/pkg/util/crypto"
|
2024-05-10 18:01:30 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
disableDatabase uint64 = 1 << iota
|
|
|
|
disableJSON
|
|
|
|
disableDynamicSchema
|
|
|
|
disableParitionKey
|
|
|
|
)
|
|
|
|
|
|
|
|
var regexValidScheme = regexp.MustCompile(`^https?:\/\/`)
|
|
|
|
|
|
|
|
// DefaultGrpcOpts is GRPC options for milvus client.
|
|
|
|
var DefaultGrpcOpts = []grpc.DialOption{
|
|
|
|
grpc.WithBlock(),
|
|
|
|
grpc.WithKeepaliveParams(keepalive.ClientParameters{
|
|
|
|
Time: 5 * time.Second,
|
|
|
|
Timeout: 10 * time.Second,
|
|
|
|
PermitWithoutStream: true,
|
|
|
|
}),
|
|
|
|
grpc.WithConnectParams(grpc.ConnectParams{
|
|
|
|
Backoff: backoff.Config{
|
|
|
|
BaseDelay: 100 * time.Millisecond,
|
|
|
|
Multiplier: 1.6,
|
|
|
|
Jitter: 0.2,
|
|
|
|
MaxDelay: 3 * time.Second,
|
|
|
|
},
|
|
|
|
MinConnectTimeout: 3 * time.Second,
|
|
|
|
}),
|
2024-10-17 14:33:23 +08:00
|
|
|
grpc.WithDefaultCallOptions(
|
|
|
|
grpc.MaxCallRecvMsgSize(math.MaxInt32), // math.MaxInt32 = 2147483647, 2GB - 1
|
|
|
|
),
|
2024-05-10 18:01:30 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// ClientConfig for milvus client.
|
|
|
|
type ClientConfig struct {
|
|
|
|
Address string // Remote address, "localhost:19530".
|
|
|
|
Username string // Username for auth.
|
|
|
|
Password string // Password for auth.
|
|
|
|
DBName string // DBName for this client.
|
|
|
|
|
|
|
|
EnableTLSAuth bool // Enable TLS Auth for transport security.
|
|
|
|
APIKey string // API key
|
|
|
|
|
|
|
|
DialOptions []grpc.DialOption // Dial options for GRPC.
|
|
|
|
|
2024-05-17 10:39:37 +08:00
|
|
|
RetryRateLimit *RetryRateLimitOption // option for retry on rate limit inteceptor
|
2024-05-10 18:01:30 +08:00
|
|
|
|
|
|
|
DisableConn bool
|
|
|
|
|
2024-05-17 10:39:37 +08:00
|
|
|
metadataHeaders map[string]string
|
|
|
|
|
2024-05-10 18:01:30 +08:00
|
|
|
identifier string // Identifier for this connection
|
|
|
|
ServerVersion string // ServerVersion
|
|
|
|
parsedAddress *url.URL
|
|
|
|
flags uint64 // internal flags
|
|
|
|
}
|
|
|
|
|
2024-05-17 10:39:37 +08:00
|
|
|
type RetryRateLimitOption struct {
|
|
|
|
MaxRetry uint
|
|
|
|
MaxBackoff time.Duration
|
|
|
|
}
|
|
|
|
|
2024-05-10 18:01:30 +08:00
|
|
|
func (cfg *ClientConfig) parse() error {
|
|
|
|
// Prepend default fake tcp:// scheme for remote address.
|
|
|
|
address := cfg.Address
|
|
|
|
if !regexValidScheme.MatchString(address) {
|
|
|
|
address = fmt.Sprintf("tcp://%s", address)
|
|
|
|
}
|
|
|
|
|
|
|
|
remoteURL, err := url.Parse(address)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "milvus address parse fail")
|
|
|
|
}
|
|
|
|
// Remote Host should never be empty.
|
|
|
|
if remoteURL.Host == "" {
|
|
|
|
return errors.New("empty remote host of milvus address")
|
|
|
|
}
|
|
|
|
// Use DBName in remote url path.
|
|
|
|
if cfg.DBName == "" {
|
|
|
|
cfg.DBName = strings.TrimLeft(remoteURL.Path, "/")
|
|
|
|
}
|
|
|
|
// Always enable tls auth for https remote url.
|
|
|
|
if remoteURL.Scheme == "https" {
|
|
|
|
cfg.EnableTLSAuth = true
|
|
|
|
}
|
|
|
|
if remoteURL.Port() == "" && cfg.EnableTLSAuth {
|
|
|
|
remoteURL.Host += ":443"
|
|
|
|
}
|
|
|
|
cfg.parsedAddress = remoteURL
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get parsed remote milvus address, should be called after parse was called.
|
|
|
|
func (c *ClientConfig) getParsedAddress() string {
|
|
|
|
return c.parsedAddress.Host
|
|
|
|
}
|
|
|
|
|
|
|
|
// useDatabase change the inner db name.
|
|
|
|
func (c *ClientConfig) useDatabase(dbName string) {
|
|
|
|
c.DBName = dbName
|
|
|
|
}
|
|
|
|
|
|
|
|
// useDatabase change the inner db name.
|
|
|
|
func (c *ClientConfig) setIdentifier(identifier string) {
|
|
|
|
c.identifier = identifier
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *ClientConfig) setServerInfo(serverInfo string) {
|
|
|
|
c.ServerVersion = serverInfo
|
|
|
|
}
|
|
|
|
|
2024-05-17 10:39:37 +08:00
|
|
|
// parseAuthentication prepares authentication headers for grpc inteceptors based on the provided username, password or API key.
|
|
|
|
func (c *ClientConfig) parseAuthentication() {
|
|
|
|
c.metadataHeaders = make(map[string]string)
|
|
|
|
if c.Username != "" || c.Password != "" {
|
|
|
|
value := crypto.Base64Encode(fmt.Sprintf("%s:%s", c.Username, c.Password))
|
|
|
|
c.metadataHeaders[authorizationHeader] = value
|
|
|
|
}
|
|
|
|
// API overwrites username & passwd
|
|
|
|
if c.APIKey != "" {
|
|
|
|
value := crypto.Base64Encode(c.APIKey)
|
|
|
|
c.metadataHeaders[authorizationHeader] = value
|
2024-05-10 18:01:30 +08:00
|
|
|
}
|
2024-05-17 10:39:37 +08:00
|
|
|
}
|
2024-05-10 18:01:30 +08:00
|
|
|
|
2024-05-17 10:39:37 +08:00
|
|
|
func (c *ClientConfig) getRetryOnRateLimitInterceptor() grpc.UnaryClientInterceptor {
|
|
|
|
if c.RetryRateLimit == nil {
|
|
|
|
c.RetryRateLimit = c.defaultRetryRateLimitOption()
|
2024-05-10 18:01:30 +08:00
|
|
|
}
|
|
|
|
|
2024-05-17 10:39:37 +08:00
|
|
|
return RetryOnRateLimitInterceptor(c.RetryRateLimit.MaxRetry, c.RetryRateLimit.MaxBackoff, func(ctx context.Context, attempt uint) time.Duration {
|
|
|
|
return 10 * time.Millisecond * time.Duration(math.Pow(3, float64(attempt)))
|
|
|
|
})
|
2024-05-10 18:01:30 +08:00
|
|
|
}
|
|
|
|
|
2024-05-17 10:39:37 +08:00
|
|
|
func (c *ClientConfig) defaultRetryRateLimitOption() *RetryRateLimitOption {
|
|
|
|
return &RetryRateLimitOption{
|
|
|
|
MaxRetry: 75,
|
|
|
|
MaxBackoff: 3 * time.Second,
|
|
|
|
}
|
|
|
|
}
|
2024-05-10 18:01:30 +08:00
|
|
|
|
|
|
|
// addFlags set internal flags
|
|
|
|
func (c *ClientConfig) addFlags(flags uint64) {
|
|
|
|
c.flags |= flags
|
|
|
|
}
|
|
|
|
|
|
|
|
// hasFlags check flags is set
|
|
|
|
func (c *ClientConfig) hasFlags(flags uint64) bool {
|
|
|
|
return (c.flags & flags) > 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *ClientConfig) resetFlags(flags uint64) {
|
|
|
|
c.flags &= ^flags
|
|
|
|
}
|