--- title: Customizing your gateway category: documentation order: 101 --- # Customizing your gateway ## Message serialization ### Custom serializer You might want to serialize request/response messages in MessagePack instead of JSON, for example. 1. Write a custom implementation of [`Marshaler`](https://pkg.go.dev/github.com/grpc-ecosystem/grpc-gateway/runtime?tab=doc#Marshaler) 2. Register your marshaler with [`WithMarshalerOption`](https://pkg.go.dev/github.com/grpc-ecosystem/grpc-gateway/runtime?tab=doc#WithMarshalerOption) e.g. ```go var m your.MsgPackMarshaler mux := runtime.NewServeMux( runtime.WithMarshalerOption("application/x-msgpack", m), ) ``` You can see [the default implementation for JSON](https://github.com/grpc-ecosystem/grpc-gateway/blob/master/runtime/marshal_jsonpb.go) for reference. ### Using camelCase for JSON The protocol buffer compiler generates camelCase JSON tags that can be used with jsonpb package. By default jsonpb Marshaller uses `OrigName: true` which uses the exact case used in the proto files. To use camelCase for the JSON representation, ```go mux := runtime.NewServeMux(runtime.WithMarshalerOption(runtime.MIMEWildcard, &runtime.JSONPb{OrigName:false})) ``` ### Pretty-print JSON responses when queried with ?pretty You can have Elasticsearch-style `?pretty` support in your gateway's endpoints as follows: 1. Wrap the ServeMux using a stdlib [`http.HandlerFunc`](https://golang.org/pkg/net/http/#HandlerFunc) that translates the provided query parameter into a custom `Accept` header, and 2. Register a pretty-printing marshaler for that MIME code. For example: ```go mux := runtime.NewServeMux( runtime.WithMarshalerOption("application/json+pretty", &runtime.JSONPb{Indent: " "}), ) prettier := func(h http.Handler) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { // checking Values as map[string][]string also catches ?pretty and ?pretty= // r.URL.Query().Get("pretty") would not. if _, ok := r.URL.Query()["pretty"]; ok { r.Header.Set("Accept", "application/json+pretty") } h.ServeHTTP(w, r) }) } http.ListenAndServe(":8080", prettier(mux)) ``` Note that `runtime.JSONPb{Indent: " "}` will do the trick for pretty-printing: it wraps `jsonpb.Marshaler`: ```go type Marshaler struct { // ... // A string to indent each level by. The presence of this field will // also cause a space to appear between the field separator and // value, and for newlines to appear between fields and array // elements. Indent string // ... } ``` Now, either when passing the header `Accept: application/json+pretty` or appending `?pretty` to your HTTP endpoints, the response will be pretty-printed. Note that this will conflict with any methods having input messages with fields named `pretty`; also, this example code does not remove the query parameter `pretty` from further processing. ## Customize unmarshaling per Content-Type Having different unmarshaling options per Content-Type is possible by wrapping the decoder and passing that to `runtime.WithMarshalerOption`: ```go type m struct { *runtime.JSONPb unmarshaler *jsonpb.Unmarshaler } type decoderWrapper struct { *json.Decoder *jsonpb.Unmarshaler } func (n *m) NewDecoder(r io.Reader) runtime.Decoder { d := json.NewDecoder(r) return &decoderWrapper{Decoder: d, Unmarshaler: n.unmarshaler} } func (d *decoderWrapper) Decode(v interface{}) error { p, ok := v.(proto.Message) if !ok { // if it's not decoding into a proto.Message, there's no notion of unknown fields return d.Decoder.Decode(v) } return d.UnmarshalNext(d.Decoder, p) // uses m's jsonpb.Unmarshaler configuration } ``` This scaffolding allows us to pass a custom unmarshal options. In this example, we configure the unmarshaler to disallow unknown fields. For demonstration purposes, we'll also change some of the default marshaler options: ```go mux := runtime.NewServeMux( runtime.WithMarshalerOption("application/json+strict", &m{ JSONPb: &runtime.JSONPb{EmitDefaults: true}, unmarshaler: &jsonpb.Unmarshaler{AllowUnknownFields: false}, // explicit "false", &jsonpb.Unmarshaler{} would have the same effect }), ) ``` ## Mapping from HTTP request headers to gRPC client metadata You might not like [the default mapping rule](https://pkg.go.dev/github.com/grpc-ecosystem/grpc-gateway/runtime?tab=doc#DefaultHeaderMatcher) and might want to pass through all the HTTP headers, for example. 1. Write a [`HeaderMatcherFunc`](https://pkg.go.dev/github.com/grpc-ecosystem/grpc-gateway/runtime?tab=doc#HeaderMatcherFunc). 2. Register the function with [`WithIncomingHeaderMatcher`](https://pkg.go.dev/github.com/grpc-ecosystem/grpc-gateway/runtime?tab=doc#WithIncomingHeaderMatcher) e.g. ```go func CustomMatcher(key string) (string, bool) { switch key { case "X-Custom-Header1": return key, true case "X-Custom-Header2": return "custom-header2", true default: return key, false } } mux := runtime.NewServeMux( runtime.WithIncomingHeaderMatcher(CustomMatcher), ) ``` To keep the [the default mapping rule](https://pkg.go.dev/github.com/grpc-ecosystem/grpc-gateway/runtime?tab=doc#DefaultHeaderMatcher) alongside with your own rules write: ```go func CustomMatcher(key string) (string, bool) { switch key { case "X-User-Id": return key, true default: return runtime.DefaultHeaderMatcher(key) } } ``` It will work with both: ```shell $ curl --header "x-user-id: 100d9f38-2777-4ee2-ac3b-b3a108f81a30" ... ``` and: ```shell $ curl --header "X-USER-ID: 100d9f38-2777-4ee2-ac3b-b3a108f81a30" ... ``` To access this header on gRPC server side use: ```go userID := "" if md, ok := metadata.FromIncomingContext(ctx); ok { if uID, ok := md["x-user-id"]; ok { userID = strings.Join(uID, ",") } } ``` ## Mapping from gRPC server metadata to HTTP response headers ditto. Use [`WithOutgoingHeaderMatcher`](https://pkg.go.dev/github.com/grpc-ecosystem/grpc-gateway/runtime?tab=doc#WithOutgoingHeaderMatcher). See [gRPC metadata docs](https://github.com/grpc/grpc-go/blob/master/Documentation/grpc-metadata.md) for more info on sending / receiving gRPC metadata, e.g. ```go if appendCustomHeader { grpc.SendHeader(ctx, metadata.New(map[string]string{ "x-custom-header1": "value", })) } ``` ## Mutate response messages or set response headers ### Set HTTP headers You might want to return a subset of response fields as HTTP response headers; You might want to simply set an application-specific token in a header. Or you might want to mutate the response messages to be returned. 1. Write a filter function. ```go func myFilter(ctx context.Context, w http.ResponseWriter, resp proto.Message) error { t, ok := resp.(*externalpb.Tokenizer) if ok { w.Header().Set("X-My-Tracking-Token", t.Token) t.Token = "" } return nil } ``` 2. Register the filter with [`WithForwardResponseOption`](https://pkg.go.dev/github.com/grpc-ecosystem/grpc-gateway/runtime?tab=doc#WithForwardResponseOption) e.g. ```go mux := runtime.NewServeMux( runtime.WithForwardResponseOption(myFilter), ) ``` ### Controlling HTTP response status codes To have the most control over the HTTP response status codes, you can use custom metadata. While handling the rpc, set the intended status code: ```go grpc.SetHeader(ctx, metadata.Pairs("x-http-code", "401")) ``` Now, before sending the HTTP response, we need to check for this metadata pair and explicitly set the status code for the response if found. To do so, create a function and hook it into the grpc-gateway as a Forward Response Option. The function looks like this: ```go func httpResponseModifier(ctx context.Context, w http.ResponseWriter, p proto.Message) error { md, ok := runtime.ServerMetadataFromContext(ctx) if !ok { return nil } // set http status code if vals := md.HeaderMD.Get("x-http-code"); len(vals) > 0 { code, err := strconv.Atoi(vals[0]) if err != nil { return err } w.WriteHeader(code) // delete the headers to not expose any grpc-metadata in http response delete(md.HeaderMD, "x-http-code") delete(w.Header(), "Grpc-Metadata-X-Http-Code") } return nil } ``` And it gets hooked into the grpc-gateway with: ```go gwMux := runtime.NewServeMux( runtime.WithForwardResponseOption(httpResponseModifier), ) ``` ## OpenTracing Support If your project uses [OpenTracing](https://github.com/opentracing/opentracing-go) and you'd like spans to propagate through the gateway, you can add some middleware which parses the incoming HTTP headers to create a new span correctly. ```go import ( "github.com/opentracing/opentracing-go" "github.com/opentracing/opentracing-go/ext" ) var grpcGatewayTag = opentracing.Tag{Key: string(ext.Component), Value: "grpc-gateway"} func tracingWrapper(h http.Handler) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { parentSpanContext, err := opentracing.GlobalTracer().Extract( opentracing.HTTPHeaders, opentracing.HTTPHeadersCarrier(r.Header)) if err == nil || err == opentracing.ErrSpanContextNotFound { serverSpan := opentracing.GlobalTracer().StartSpan( "ServeHTTP", // this is magical, it attaches the new span to the parent parentSpanContext, and creates an unparented one if empty. ext.RPCServerOption(parentSpanContext), grpcGatewayTag, ) r = r.WithContext(opentracing.ContextWithSpan(r.Context(), serverSpan)) defer serverSpan.Finish() } h.ServeHTTP(w, r) }) } // Then just wrap the mux returned by runtime.NewServeMux() like this if err := http.ListenAndServe(":8080", tracingWrapper(mux)); err != nil { log.Fatalf("failed to start gateway server on 8080: %v", err) } ``` Finally, don't forget to add a tracing interceptor when registering the services. E.g. ```go import ( "google.golang.org/grpc" "github.com/grpc-ecosystem/go-grpc-middleware/tracing/opentracing" ) opts := []grpc.DialOption{ grpc.WithUnaryInterceptor( grpc_opentracing.UnaryClientInterceptor( grpc_opentracing.WithTracer(opentracing.GlobalTracer()), ), ), } if err := pb.RegisterMyServiceHandlerFromEndpoint(ctx, mux, serviceEndpoint, opts); err != nil { log.Fatalf("could not register HTTP service: %v", err) } ``` ## Error handler The gateway uses two different error handlers for non-streaming requests: * `runtime.HTTPError` is called for errors from backend calls * `runtime.OtherErrorHandler` is called for errors from parsing and routing client requests To override all error handling for a `*runtime.ServeMux`, use the `runtime.WithProtoErrorHandler` serve option. Alternatively, you can override the global default `HTTPError` handling by setting `runtime.GlobalHTTPErrorHandler` to a custom function, and override the global default `OtherErrorHandler` by setting `runtime.OtherErrorHandler` to a custom function. You should not set `runtime.HTTPError` directly, because that might break any `ServeMux` set up with the `WithProtoErrorHandler` option. See https://mycodesmells.com/post/grpc-gateway-error-handler for an example of writing a custom error handler function. ## Stream Error Handler The error handler described in the previous section applies only to RPC methods that have a unary response. When the method has a streaming response, grpc-gateway handles that by emitting a newline-separated stream of "chunks". Each chunk is an envelope that can contain either a response message or an error. Only the last chunk will include an error, and only when the RPC handler ends abnormally (i.e. with an error code). Because of the way the errors are included in the response body, the other error handler signature is insufficient. So for server streams, you must install a _different_ error handler: ```go mux := runtime.NewServeMux( runtime.WithStreamErrorHandler(handleStreamError), ) ``` The signature of the handler is much more rigid because we need to know the structure of the error payload to properly encode the "chunk" schema into a Swagger/OpenAPI spec. So the function must return a `*runtime.StreamError`. The handler can choose to omit some fields and can filter/transform the original error, such as stripping stack traces from error messages. Here's an example custom handler: ```go // handleStreamError overrides default behavior for computing an error // message for a server stream. // // It uses a default "502 Bad Gateway" HTTP code; only emits "safe" // messages; and does not set gRPC code or details fields (so they will // be omitted from the resulting JSON object that is sent to client). func handleStreamError(ctx context.Context, err error) *runtime.StreamError { code := http.StatusBadGateway msg := "unexpected error" if s, ok := status.FromError(err); ok { code = runtime.HTTPStatusFromCode(s.Code()) // default message, based on the name of the gRPC code msg = code.String() // see if error details include "safe" message to send // to external callers for _, msg := s.Details() { if safe, ok := msg.(*SafeMessage); ok { msg = safe.Text break } } } return &runtime.StreamError{ HttpCode: int32(code), HttpStatus: http.StatusText(code), Message: msg, } } ``` If no custom handler is provided, the default stream error handler will include any gRPC error attributes (code, message, detail messages), if the error being reported includes them. If the error does not have these attributes, a gRPC code of `Unknown` (2) is reported. The default handler will also include an HTTP code and status, which is derived from the gRPC code (or set to `"500 Internal Server Error"` when the source error has no gRPC attributes).