18 KiB
A practical guide to gRPC with
Victor Martinez
Contents
- Ingredients to build a gRPC API
- Defining our API with Protocol Buffers
- Generate a Rust library
- CI & Release flow
- Building a gRPC server
- How to call our server
- How is it going so far
Ingredients to build a gRPC API
Tonic
Defining our API
EsPolicyGrpc
https://github.com/primait/es-policy-grpc
Why a dedicated repository?
-
It is not coupled to a single project.
-
Multiple projects implement the same gRPC server.
-
We want multiple domains to use our gRPC libraries.
-
Dedicated CI, can grow without affecting directly an existing project.
Project structure
https://github.com/primait/es-policy-grpc
Project structure
https://github.com/primait/es-policy-grpc
Defining a request
syntax = "proto3";
package es_policy_grpc.messages.issue_policy.request.v1;
import "es_policy_grpc/domain/v1/bundle.proto";
import "es_policy_grpc/domain/v1/coverage.proto";
import "es_policy_grpc/domain/v1/issuing_company.proto";
// ... etc
message IssuePolicyRequest {
google.protobuf.Timestamp requested_at = 1;
google.protobuf.Timestamp start_at = 2;
google.protobuf.Timestamp end_at = 3;
google.protobuf.Timestamp purchased_at = 4;
es_policy_grpc.domain.v1.TransactionInformation transaction = 5;
es_policy_grpc.domain.v1.IssuingCompany issuing_company = 6;
string quote_id = 7;
es_policy_grpc.domain.v1.QuoteSource quote_source = 8;
string application_id = 9;
string offer_id = 10;
es_policy_grpc.domain.v1.Price price = 11;
es_policy_grpc.domain.v1.Bundle bundle = 12;
repeated es_policy_grpc.domain.v1.ProductCover covers = 13;
es_policy_grpc.domain.v1.PolicyHolderInformation policy_holder_information = 14;
es_policy_grpc.domain.v1.VehicleInformation vehicle_information = 15;
es_policy_grpc.domain.v1.QuoteVersion quote_version = 16;
}
Defining a request
syntax = "proto3";
package es_policy_grpc.domain.v1;
import "es_policy_grpc/domain/v1/price.proto";
import "google/protobuf/timestamp.proto";
message ProductCover {
CoverType cover_type = 1;
google.protobuf.Timestamp start_at = 2;
google.protobuf.Timestamp end_at = 3;
es_policy_grpc.domain.v1.Price price = 4;
optional RoadsideAssistanceTier roadside_assistance_tier = 5;
}
enum CoverType {
COVER_TYPE_UNSPECIFIED = 0;
COVER_TYPE_MANDATORY_THIRD_PARTY_LIABILITY = 1;
COVER_TYPE_VOLUNTARY_THIRD_PARTY_LIABILITY = 2;
COVER_TYPE_DRIVER_ACCIDENT = 3;
COVER_TYPE_WINDSHIELD = 4;
COVER_TYPE_THEFT = 5;
// ..etc
}
enum RoadsideAssistanceTier {
ROADSIDE_ASSISTANCE_TIER_UNSPECIFIED = 0;
ROADSIDE_ASSISTANCE_TIER_BASE = 1;
ROADSIDE_ASSISTANCE_TIER_PREMIUM = 2;
ROADSIDE_ASSISTANCE_TIER_PREMIUM_V2 = 3;
}
Defining a response
syntax = "proto3";
package es_policy_grpc.messages.issue_policy.response.v1;
message IssuePolicyResponse {
string policy_id = 1;
}
About backwards compatibility
Required fields don't exist, everything has a default value
- Strings => The empty string.
- Bytes => Empty bytes.
- Bools => False.
- Numeric => Zero.
- Message => Not set. Its exact value is language-dependent.
- Enums => The first defined enum value, which must be 0.
https://protobuf.dev/programming-guides/proto3/#default
Enums must have an "Unspecified" variant
enum BundleSlug {
BUNDLE_SLUG_UNSPECIFIED = 0;
BUNDLE_SLUG_TERCEROS_BASICO = 1;
BUNDLE_SLUG_TERCEROS_AMPLIADO = 2;
BUNDLE_SLUG_TODO_RIESGO_CON_FRANQUICIA = 3;
BUNDLE_SLUG_TODO_RIESGO_CON_FRANQUICIA_300 = 4;
BUNDLE_SLUG_TODO_RIESGO_CON_FRANQUICIA_500 = 5;
}
https://protobuf.dev/best-practices/dos-donts/#unspecified-enum
Field tags must never be reused
And deleted fields must be marked as reserved
message AmendWithdrawalRequest {
string policy_id = 1;
google.protobuf.Timestamp requested_at = 2;
reserved 3;
reserved "interruption_at";
optional string description = 4;
oneof reason {
es_policy_grpc.messages.withdraw_policy.request.v1.CustomerWithdrawReason customer = 5;
}
}
https://protobuf.dev/best-practices/dos-donts#reuse-number
Learn more about Do's and Dont's
https://protobuf.dev/best-practices/dos-donts
Defining a service
syntax = "proto3";
package es_policy_grpc.service.v1;
import "es_policy_grpc/messages/issue_policy/request/v1/request.proto";
import "es_policy_grpc/messages/issue_policy/response/v1/response.proto";
service PolicyManagementService {
rpc IssuePolicy(es_policy_grpc.messages.issue_policy.request.v1.IssuePolicyRequest) returns (es_policy_grpc.messages.issue_policy.response.v1.IssuePolicyResponse);
}
Building a library
Project structure
Build script
use std::io::Result;
fn main() -> Result<()> {
// List of proto files containing a message definition
let proto_files = &[
//Domain
"proto/es_policy_grpc/domain/v1/address.proto",
"proto/es_policy_grpc/domain/v1/bundle.proto",
// etc.
// Messages
"proto/es_policy_grpc/messages/issue_policy/request/v1/request.proto",
"proto/es_policy_grpc/messages/issue_policy/response/v1/response.proto",
// Services
"proto/es_policy_grpc/service/v1/service.proto",
];
// Name of the folder containing the proto definitions
let proto_folder = "proto";
tonic_prost_build::configure()
.protoc_arg("--experimental_allow_proto3_optional")
.compile_protos(proto_files, &[proto_folder])
.unwrap();
Ok(())
}
Exposing the generated code
// src/lib.rs
pub mod domain {
pub mod v1 {
include!(concat!(env!("OUT_DIR"), "/es_policy_grpc.domain.v1.rs",));
}
}
pub mod messages {
pub mod issue_policy {
pub mod request {
pub mod v1 {
include!(concat!(env!("OUT_DIR"), "/es_policy_grpc.messages.issue_policy.request.v1.rs"));
}
}
pub mod response {
pub mod v1 {
include!(concat!(env!("OUT_DIR"), "/es_policy_grpc.messages.issue_policy.response.v1.rs"));
}
}
}
}
pub mod policy_service {
pub mod v1 {
include!(concat!(env!("OUT_DIR"), "/es_policy_grpc.service.v1.rs"));
}
}
CI & Release flow
CI workflows: Proto checks
name: "Check proto"
on:
pull_request:
paths:
- "proto/**"
jobs:
check-proto:
# ..
steps:
# ..
- name: Protobuf format check
shell: bash
run: |
buf format -d --exit-code
- name: Protobuf lint
shell: bash
run: |
buf lint
CI workflows: Backwards compatibility check
name: "Check backwards compatibility"
on: pull_request
jobs:
check-backward-compatibility:
# ..
steps:
- uses: actions/checkout@v4
- name: Install buf
# ..
- name: Fetch master branch
shell: bash
run: |
git fetch origin master:master
- name: Check backwards compatibility against master
shell: bash
run: |
buf breaking --against ".git#branch=master"
Release workflow
name: "Release Rust Crate"
on:
push:
tags:
- "*"
jobs:
publish:
# ..
steps:
- uses: actions/checkout@v4
- uses: primait/shared-github-actions/actions/install-rust@rust-ci-v3
# ..
- name: Install cargo edit
# ..
- name: Set release version
working-directory: es-policy-grpc-rust
run: |
cargo set-version $GITHUB_REF_NAME
- name: Retrieve vault token
# ..
- name: Install protoc compiler
# ..
- name: Publish package
working-directory: es-policy-grpc-rust
run: |
cargo publish --allow-dirty
env:
CARGO_REGISTRIES_ARTIFACTORY_TOKEN: ${{ format('Bearer {0}', CARGO_REGISTRIES_ARTIFACTORY_TOKEN) }}
Release workflow: Cargo configuration
# .cargo/config.toml
# Makes artifactory the default registry and saves passing --registry parameter
[registry]
default = "artifactory"
global-credential-providers = ["cargo:token"]
[registries]
artifactory = { index = "sparse+https://prima.jfrog.io/artifactory/api/cargo/policy-management-crates/index/" }
# Cargo.toml
[package]
name = "es-policy-grpc"
version = "0.6.7"
edition = "2024"
# ..
publish = ["artifactory"]
Building a gRPC server
Importing our library: Required setup
# .cargo/config.toml
[registries.policy-management-crates]
index = "sparse+https://prima.jfrog.io/artifactory/api/cargo/policy-management-crates/index/"
[registry]
global-credential-providers = ["cargo:token"]
Importing our library: Required setup
# ~/.cargo/credentials.toml
[registries.policy-management]
token = "Bearer <generated-token>"
Importing our library
# Cargo.toml
es-policy-grpc = { version = "=0.6.4", registry = "policy-management-crates", features = [
"tonic_0_14",
] }
prost = "0.14"
prost-types = "0.14"
tonic = { version = "0.14", features = [
"gzip",
"server",
"tls-native-roots",
"tls-ring",
"tls-webpki-roots",
] }
tonic-health = "0.14"
Implementing the service trait
// ..
use es_policy_grpc::policy_service::v1::PolicyManagementService;
pub struct PolicyManagementServiceImpl {
application: Application,
}
#[tonic::async_trait]
impl PolicyManagementService for PolicyManagementServiceImpl {
// ..
}
Implementing the service trait
// ..
impl PolicyManagementService for PolicyManagementServiceImpl {
async fn issue_policy(
&self,
request: Request<IssuePolicyRequest>,
) -> Result<Response<IssuePolicyResponse>, Status> {
let request = request.into_inner();
let issue_policy = request.try_to_domain().map_err(|err| {
Status::invalid_argument(
format!("Failed to parse issue policy request: '{err}'")
)
})?;
let policy_id = self
.application
.policy_service()
.issue(issue_policy)
.await
.map_err(|err| Status::internal(
format!("Error issuing policy; error '{err:?}'")
))?;
Ok(Response::new(IssuePolicyResponse { policy_id: policy_id.to_string() }))
}
}
Implementing the service trait: Parsing request data
impl TryToDomain<DomainIssuePolicyRequest> for IssuePolicyRequest {
fn try_to_domain(self) -> Result<DomainIssuePolicyRequest, ParseGrpcError> {
Ok(DomainIssuePolicyRequest {
start_at: self
.start_at
.ok_or(ParseGrpcError::MissingField("start_at"))
.and_then(|v| {
parse_prost_timestamp(v).map_err(|err|
ParseGrpcError::InvalidField("start_at", err)
)
})?,
purchased_at: self
.purchased_at
.ok_or(ParseGrpcError::MissingField("purchased_at"))
.and_then(|v| {
parse_prost_timestamp(v).map_err(|err|
ParseGrpcError::InvalidField("purchased_at", err)
)
})?,
transaction: self
.transaction
.clone()
.ok_or(ParseGrpcError::MissingField("transaction"))?
.try_to_domain()?,
//..
})
}
}
Exposing our server
let service = ServiceBuilder::new()
.layer(JwtAuthLayer::new(jwks_client, auth0_audience))
.named_layer(PolicyManagementServiceServer::new(
PolicyManagementServiceImpl::new(application),
));
let router = Server::builder().add_service(service);
let listener = tokio::net::TcpListener::bind(("0.0.0.0", port))
.await
.context("Failed to open socket connection for gRPC server")?;
router
.serve_with_incoming(TcpListenerStream::new(listener))
.await?;
Calling our server
Create a client
use es_policy_grpc::{
policy_service::v1::policy_management_service_client::PolicyManagementServiceClient
};
use tower_http::sensitive_headers::{
SetSensitiveRequestHeadersLayer, SetSensitiveResponseHeadersLayer,
};
use prima_tower::authentication::client_credentials::{ ClientCredentials, ClientCredentialsAuth, ClientCredentialsAuthLayer, };
// ..
let uri = "http://policy-management-es.policy-management:50051";
let channel = Channel::builder(uri).connect_lazy();
let channel = ServiceBuilder::new()
.layer(ClientCredentialsAuthLayer::new(
prima_http::Client::standard(credentials.token_url).build(),
credentials,
))
.layer(SetSensitiveRequestHeadersLayer::new(once(
header::AUTHORIZATION,
)))
.layer(OpenTelemetryClientTracingLayer::new_for_grpc())
.layer(SetSensitiveResponseHeadersLayer::new(once(
header::AUTHORIZATION,
)))
.service(channel);
let client = PolicyManagementServiceClient::new(channel);
Making a gRPC call: Building the request
impl FromDomain<DomainIssuePolicyRequest> for IssuePolicyRequest {
fn from_domain(request: DomainIssuePolicyRequest) -> Self {
Self {
policy_holder_information: Some(PolicyHolderInformation::from_domain(
request.policy_holder_information(),
)),
vehicle_information: Some(VehicleInformation::from_domain((
request.vehicle_information(),
request.occasional_driver(),
))),
requested_at: Some(to_prost_timestamp(Utc::now())),
start_at: Some(to_prost_timestamp(request.start_at)),
end_at: Some(to_prost_timestamp(request.end_at)),
purchased_at: Some(to_prost_timestamp(request.purchased_at)),
transaction: Some(TransactionInformation::from_domain(request.transaction)),
issuing_company: IssuingCompany::from_domain(request.issuing_company) as i32,
quote_id: String::from(Uuid::from(request.quote_id)),
quote_source: QuoteSource::from_domain(request.quote_source) as i32,
application_id: String::from(Uuid::from(request.application_id)),
offer_id: String::from(Uuid::from(request.offer_id)),
price: Some(Price::from_domain(request.price)),
bundle: Some(Bundle::from_domain(request.bundle)),
covers: request.covers.into_iter().map(ProductCover::from_domain).collect(),
quote_version: QuoteVersion::from_domain(request.terms_and_conditions) as i32,
}
}
}
Making a gRPC call
let response = client
.issue_policy(IssuePolicyRequest::from_domain(issue_policy_request))
.await
.map_err(|status| GrpcError::BadResponse(status.to_string()))?
.into_inner();
let policy_id = Uuid::parse_str(&response.policy_id).expect("policy_id should always be a valid uuid");
How is it going so far?
Domains using our gRPC client
- Backoffice
- Pricing & Underwriting
How are they using it: Backoffice
The Customer Support Spain UK team has been using our Rust library for some time.
Currently they are making use of the following operations in production:
- update_policy_holder_email
- send_policy_contract_email
- terminate_policy
- withdraw_policy
- amend_termination
- decline_renewal
How are they using it: Pricing & Underwriting
The Underwriting Processes team is using the Elixir library to generate a pre-signed url of a contract.
Some metrics
Data gathered from October 21st to November 4th
Thank you
💜