Skip to content

Conversation

@Pranjali-2501
Copy link
Contributor

@Pranjali-2501 Pranjali-2501 commented Apr 29, 2025

Partially addresses: #7286

Client should ensure an "Internal" error is returned for client-streaming RPCs if the server doesn't send a message before returning status OK.
Currently it is returning "EOF", which should not be the case for cardinality violations.

RELEASE NOTES:

  • grpc: return status code INTERNAL when servers send 0 response messages in unary and client streaming RPCs.

@linux-foundation-easycla
Copy link

linux-foundation-easycla bot commented Apr 29, 2025

CLA Signed

The committers listed above are authorized under a signed CLA.

@codecov
Copy link

codecov bot commented Apr 29, 2025

Codecov Report

Attention: Patch coverage is 50.00000% with 4 lines in your changes missing coverage. Please review.

Project coverage is 82.10%. Comparing base (6dfe07c) to head (85ab6ed).
Report is 7 commits behind head on master.

Files with missing lines Patch % Lines
stream.go 50.00% 3 Missing and 1 partial ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##           master    #8278      +/-   ##
==========================================
- Coverage   82.33%   82.10%   -0.23%     
==========================================
  Files         419      419              
  Lines       42062    42071       +9     
==========================================
- Hits        34631    34543      -88     
- Misses       5979     6049      +70     
- Partials     1452     1479      +27     
Files with missing lines Coverage Δ
stream.go 81.74% <50.00%> (-0.17%) ⬇️

... and 36 files with indirect coverage changes

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

stream.go Outdated
return toRPCErr(err)
}
if cs.desc.ClientStreams {
cs.recvMsg = true
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we set this boolean without the check? Otherwise we would need to document the variable in a way to make it obvious that this is set only for client streaming RPCs. Even then users may accidentally use it for other types of RPCs.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changed it to !cs.desc.ServerStreams, so that it will mark cs.recvFirstMsg=true for both unary and clientStreaming RPCs.

@arjan-bal
Copy link
Contributor

Do we need a similar check on the server side also, i.e. change the status to internal if the server attempts to close without writing a message?

@dfawley dfawley assigned dfawley and unassigned Pranjali-2501 May 12, 2025
stream.go Outdated
return statusErr
}
if !cs.desc.ServerStreams && !cs.recvFirstMsg {
return status.Errorf(codes.Internal, "client streaming cardinality violation")
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's be more specific about what happened here so that a user could understand what's happening when they see the error.

"received no response message from non-streaming RPC"?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sure.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't see a change here.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done.

stream.go Outdated
return toRPCErr(err)
}
if !cs.desc.ServerStreams {
cs.recvFirstMsg = true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should there also be something here that fails if recvFirstMsg is already set? (That would indicate we received multiple messages in a unary RPC.)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For both unary and client-streaming RPCs, client.recvmsg() will wait for the trailers after receiving its first msg over here .

I'll change the status code here from UNKNOWN to INTERNAL in upcoming PR with tests. It will handle the case when trailers are not send from server side for unary and client-streaming RPCs.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I see. So why do you need this new field, then?

If the above recv ever returns io.EOF, then we already know there was never a message read from the stream. Either that, or the user called Recv after receiving an error from a previous call to Recv, which is illegal and undefined.

Copy link
Contributor Author

@Pranjali-2501 Pranjali-2501 May 13, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah, make sense.
So for non-server streaming rpcs, we can directly return INTERNAL error if the first recv() call gets EOF.

if !cs.desc.ServerStreams {
	return status.Errorf(codes.Internal, "client streaming cardinality violation")
}

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, I think that should work and avoids adding new state to track.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ping - I think we can remove recvFirstMsg now?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I had reverted that in this commit bbd8366.
But than @arjan-bal pointed out that in case of successful RPC, if user call RecvMsg() twice, the second RecvMsg() call should return with io.EOF instead of cardinality violation.
That's why I reverted back to the older code to fulfill that condition.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As I mentioned before, it's not defined what happens if RecvMsg is called after returning an error.

There are other scenarios where calling recvMsg repeatedly will not cause the previously returned error to occur. E.g. if a received message is too large, recv will return an error. But I believe a subsequent call to RecvMsg would actually return the next message from the stream, or io.EOF at the end of the stream.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Acknowledged, if we're fine with changing the existing behaviour of returning io.EOF on subsequent calls after an RPC ends successfully, we can get rid of the extra variable to track state.

Copy link
Contributor Author

@Pranjali-2501 Pranjali-2501 Jun 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have removed the extra variable and the tests that were added to check the scenario when recvMsg() called twice.

@dfawley dfawley assigned Pranjali-2501 and unassigned dfawley May 12, 2025
@Pranjali-2501 Pranjali-2501 requested a review from dfawley May 15, 2025 17:14
@dfawley dfawley assigned dfawley and unassigned Pranjali-2501 May 16, 2025
stream.go Outdated
return statusErr
}
if !cs.desc.ServerStreams && !cs.recvFirstMsg {
return status.Errorf(codes.Internal, "client streaming cardinality violation")
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't see a change here.

return
}
defer conn.Close()
framer := http2.NewFramer(conn, conn)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Realistically this test shouldn't need low level framer access. You should be able to implement it with a grpc.Server that has its EmptyCall handler configured as a streaming handling, and with an implementation that just returns nil immediately without sending a message.

I do think that would be preferable, because the framing stuff is tedious and error prone, and it makes the test much more complex. If you're having too much trouble with that approach, let me know and I can try to help, or if it somehow turns out to be a lot more work than I was expecting, feel free to push back.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Initially, I attempted to resolve this by returning nil from EmptyCall. However, this approach resulted in an empty, successful response rather than a failure, which wasn't the desired outcome.

The scenario that sends no response cannot be replicated within grpc-go itself, as the framework requires a response to be sent.

This test aims to verify behavior in a cross-language context, where a unary client might interact with a unary server implemented in a different language, potentially allowing the server to send no response.

Please let me know if that is not the case or I overlook something.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think @dfawley is saying that we can register a streaming handler for a unary method on the server. The client will call EmptyCall, but the server will call a streaming handler.

	srv := grpc.NewServer()
	serviceDesc := grpc.ServiceDesc{
		ServiceName: "grpc.testing.TestService",
		HandlerType: (*any)(nil),
		Methods:     []grpc.MethodDesc{},
		Streams: []grpc.StreamDesc{
			{
				StreamName: "EmptyCall",
				Handler: func(any, grpc.ServerStream) error {
					return nil
				},
				ClientStreams: true,
			},
		},
		Metadata: "grpc/testing/test.proto",
	}
	srv.RegisterService(&serviceDesc, &testServer{})
	go srv.Serve(lis)
	defer srv.Stop()

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for clarifying. I had made the changes.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Another option (maybe easier, but no need to change now) is to use the unknown service handler, and don't register anything on the server: https://pkg.go.dev/google.golang.org/grpc#UnknownServiceHandler

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

UnknownServiceHandler uses bidirectional streaming[desc.clientstreams:true, desc.serverstreams:true].
Will it work with the changes I made to addresses cardinality violations?

if !cs.desc.ServerStreams && !cs.recvFirstMsg {
  return status.Errorf(codes.Internal, "cardinality violation: received no response message from non-streaming RPC")
}

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The idea is to make the server think it's a bidi stream, but the client thinks it's not. The client's setting is what the code snippet you are showing is checking. The client has no knowledge of how the server is treating the stream.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Pranjali-2501 did you try to use UnknownServiceHandler? I think it should reduce the amount of test code.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Made the changes.

@dfawley dfawley assigned Pranjali-2501 and unassigned dfawley May 20, 2025
@dfawley dfawley assigned Pranjali-2501 and unassigned dfawley May 29, 2025
}

// Tests that client will receive cardinality violation in the subsequent calls to RecvMsg().
func (s) TestClientStreaming_ClientCallRecvMsgTwice(t *testing.T) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In what way is this different from the previous test case? The server side is different, but actually does the same thing.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Both tests does the same thing, only difference is StreamDesc.ClientStreams is set to false in this test(Unary RPC) and set to true in previous test(Client Streaming RPC)

Copy link
Contributor

@arjan-bal arjan-bal Jun 10, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This PR is actually a fix for for "non-server streaming" RPCs instead of "client streaming RPCs". I've updated the PR title to reflect the same. So the value of StreamDesc.ClientStreams should not matter, but it's okay to have test coverage for this.

I noticed that none of the tests send 2 response messages from the server. This shows up as missing coverage reported by Codecov around line 1486. Can you please have the server send back two response messages here? You should use the UnknownServiceHandler for this to ensure the server doesn't skip sending the message after noticing it's a non-server streaming RPC.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Discussed offline: line 1486 is in addrConnStream, not csAttempt. I had initially thought the missing coverage was in csAttempt. addrConnStream is largely similar to csAttempt but is only used for establishing health streams. There is a plan to unify it with csAttempt in the future. Adding test coverage for addrConnStream may be difficult and is not necessary at this point.

@dfawley dfawley removed their assignment Jun 6, 2025
@arjan-bal arjan-bal changed the title grpc: Fix cardinality violations in client streaming RPCs grpc: Fix cardinality violations in non-server streaming RPCs Jun 10, 2025
@Pranjali-2501 Pranjali-2501 requested a review from dfawley June 10, 2025 09:56
@arjan-bal arjan-bal merged commit a64d933 into grpc:master Jun 11, 2025
23 of 24 checks passed
vinothkumarr227 pushed a commit to vinothkumarr227/grpc-go that referenced this pull request Jun 19, 2025
arjan-bal added a commit to arjan-bal/grpc-go that referenced this pull request Jun 23, 2025
arjan-bal added a commit that referenced this pull request Jun 23, 2025
Pranjali-2501 added a commit that referenced this pull request Aug 25, 2025
…avior to return io.EOF on repeated RecvMsg() calls for client-streaming RPCs (#8523)

Partially addresses: #7286

This reverts commit
20bd1e7

Changes:
- Modifies client.RecvMsg() so that successive calls after stream ends
return io.EOF.
- Adds extra state to track calls to client.recvmsg(required to return
Cardinality Violation only in case zero response)

RELEASE NOTES:
* client: Return status code INTERNAL when a server sends 0 response
messages for a unary or client streaming RPC.
eshitachandwani pushed a commit to eshitachandwani/grpc-go that referenced this pull request Aug 29, 2025
… behavior to return io.EOF on repeated RecvMsg() calls for client-streaming RPCs (grpc#8523)

Partially addresses: grpc#7286

This reverts commit
grpc@20bd1e7

Changes:
- Modifies client.RecvMsg() so that successive calls after stream ends
return io.EOF.
- Adds extra state to track calls to client.recvmsg(required to return
Cardinality Violation only in case zero response)

RELEASE NOTES:
* client: Return status code INTERNAL when a server sends 0 response
messages for a unary or client streaming RPC.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants