Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add OpenAI client #482

Merged
merged 2 commits into from
Mar 4, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 5 additions & 3 deletions src/c++/perf_analyzer/client_backend/openai/CMakeLists.txt
Original file line number Diff line number Diff line change
Expand Up @@ -28,15 +28,17 @@ cmake_minimum_required (VERSION 3.18)

set(
OPENAI_CLIENT_BACKEND_SRCS
http_client.cc
openai_client_backend.cc
openai_http_client.cc
openai_client.cc
openai_infer_input.cc
)

set(
OPENAI_CLIENT_BACKEND_HDRS
http_client.h
openai_client_backend.h
openai_http_client.h
openai_client.h
openai_infer_input.h
)

Expand All @@ -48,7 +50,7 @@ add_library(

target_link_libraries(
openai-client-backend-library
PUBLIC CURL::libcurl
PUBLIC CURL::libcurl
PUBLIC httpclient_static
)

Expand Down
267 changes: 267 additions & 0 deletions src/c++/perf_analyzer/client_backend/openai/http_client.cc
Original file line number Diff line number Diff line change
@@ -0,0 +1,267 @@
// Copyright 2024, NVIDIA CORPORATION & AFFILIATES. All rights reserved.
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions
// are met:
// * Redistributions of source code must retain the above copyright
// notice, this list of conditions and the following disclaimer.
// * Redistributions in binary form must reproduce the above copyright
// notice, this list of conditions and the following disclaimer in the
// documentation and/or other materials provided with the distribution.
// * Neither the name of NVIDIA CORPORATION nor the names of its
// contributors may be used to endorse or promote products derived
// from this software without specific prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS ``AS IS'' AND ANY
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
// PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
// CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
// EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
// PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
// OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

#include "http_client.h"

#include <functional>
#include <iostream>

namespace triton { namespace perfanalyzer { namespace clientbackend {
namespace openai {

HttpRequest::HttpRequest(
std::function<void(HttpRequest*)>&& completion_callback, const bool verbose)
: completion_callback_(std::move(completion_callback)), verbose_(verbose)
{
}

HttpRequest::~HttpRequest()
{
if (header_list_ != nullptr) {
curl_slist_free_all(header_list_);
header_list_ = nullptr;
}
}

void
HttpRequest::AddInput(uint8_t* buf, size_t byte_size)
{
data_buffers_.push_back(std::pair<uint8_t*, size_t>(buf, byte_size));
total_input_byte_size_ += byte_size;
}

void
HttpRequest::GetNextInput(uint8_t* buf, size_t size, size_t* input_bytes)
{
*input_bytes = 0;

while (!data_buffers_.empty() && size > 0) {
const size_t csz = std::min(data_buffers_.front().second, size);
if (csz > 0) {
const uint8_t* input_ptr = data_buffers_.front().first;
std::copy(input_ptr, input_ptr + csz, buf);
size -= csz;
buf += csz;
*input_bytes += csz;

data_buffers_.front().first += csz;
data_buffers_.front().second -= csz;
}
if (data_buffers_.front().second == 0) {
data_buffers_.pop_front();
}
}
}

HttpClient::HttpClient(
const std::string& server_url, bool verbose,
const HttpSslOptions& ssl_options)
: url_(server_url), verbose_(verbose), ssl_options_(ssl_options)
{
auto* ver = curl_version_info(CURLVERSION_NOW);
if (ver->features & CURL_VERSION_THREADSAFE == 0) {
throw std::runtime_error(
"HTTP client has dependency on CURL library to have thread-safe "
"support (CURL_VERSION_THREADSAFE set)");
}
if (curl_global_init(CURL_GLOBAL_ALL) != 0) {
throw std::runtime_error("CURL global initialization failed");
}

multi_handle_ = curl_multi_init();

worker_ = std::thread(&HttpClient::AsyncTransfer, this);
}

HttpClient::~HttpClient()
{
exiting_ = true;

// thread not joinable if AsyncInfer() is not called
// (it is default constructed thread before the first AsyncInfer() call)
if (worker_.joinable()) {
cv_.notify_all();
worker_.join();
}

for (auto& request : ongoing_async_requests_) {
CURL* easy_handle = reinterpret_cast<CURL*>(request.first);
curl_multi_remove_handle(multi_handle_, easy_handle);
curl_easy_cleanup(easy_handle);
}
curl_multi_cleanup(multi_handle_);

curl_global_cleanup();
}

const std::string&
HttpClient::ParseSslCertType(HttpSslOptions::CERTTYPE cert_type)
{
static std::string pem_str{"PEM"};
static std::string der_str{"DER"};
switch (cert_type) {
case HttpSslOptions::CERTTYPE::CERT_PEM:
return pem_str;
case HttpSslOptions::CERTTYPE::CERT_DER:
return der_str;
}
throw std::runtime_error(
"Unexpected SSL certificate type encountered. Only PEM and DER are "
"supported.");
}

const std::string&
HttpClient::ParseSslKeyType(HttpSslOptions::KEYTYPE key_type)
{
static std::string pem_str{"PEM"};
static std::string der_str{"DER"};
switch (key_type) {
case HttpSslOptions::KEYTYPE::KEY_PEM:
return pem_str;
case HttpSslOptions::KEYTYPE::KEY_DER:
return der_str;
}
throw std::runtime_error(
"unsupported SSL key type encountered. Only PEM and DER are "
"supported.");
}

void
HttpClient::SetSSLCurlOptions(CURL* curl_handle)
{
curl_easy_setopt(
curl_handle, CURLOPT_SSL_VERIFYPEER, ssl_options_.verify_peer);
curl_easy_setopt(
curl_handle, CURLOPT_SSL_VERIFYHOST, ssl_options_.verify_host);
if (!ssl_options_.ca_info.empty()) {
curl_easy_setopt(curl_handle, CURLOPT_CAINFO, ssl_options_.ca_info.c_str());
}
const auto& curl_cert_type = ParseSslCertType(ssl_options_.cert_type);
curl_easy_setopt(curl_handle, CURLOPT_SSLCERTTYPE, curl_cert_type.c_str());
if (!ssl_options_.cert.empty()) {
curl_easy_setopt(curl_handle, CURLOPT_SSLCERT, ssl_options_.cert.c_str());
}
const auto& curl_key_type = ParseSslKeyType(ssl_options_.key_type);
curl_easy_setopt(curl_handle, CURLOPT_SSLKEYTYPE, curl_key_type.c_str());
if (!ssl_options_.key.empty()) {
curl_easy_setopt(curl_handle, CURLOPT_SSLKEY, ssl_options_.key.c_str());
}
}

void
HttpClient::Send(CURL* handle, std::unique_ptr<HttpRequest>&& request)
{
std::lock_guard<std::mutex> lock(mutex_);

auto insert_result = ongoing_async_requests_.emplace(
std::make_pair(reinterpret_cast<uintptr_t>(handle), std::move(request)));
if (!insert_result.second) {
curl_easy_cleanup(handle);
throw std::runtime_error(
"Failed to insert new asynchronous request context.");
}
curl_multi_add_handle(multi_handle_, handle);
cv_.notify_all();
}

void
HttpClient::AsyncTransfer()
{
int place_holder = 0;
CURLMsg* msg = nullptr;
do {
std::vector<std::unique_ptr<HttpRequest>> request_list;

// sleep if no work is available
std::unique_lock<std::mutex> lock(mutex_);
cv_.wait(lock, [this] {
if (this->exiting_) {
return true;
}
// wake up if an async request has been generated
return !this->ongoing_async_requests_.empty();
});

CURLMcode mc = curl_multi_perform(multi_handle_, &place_holder);
int numfds;
if (mc == CURLM_OK) {
// Wait for activity. If there are no descriptors in the multi_handle_
// then curl_multi_wait will return immediately
mc = curl_multi_wait(multi_handle_, NULL, 0, INT_MAX, &numfds);
if (mc == CURLM_OK) {
while ((msg = curl_multi_info_read(multi_handle_, &place_holder))) {
uintptr_t identifier = reinterpret_cast<uintptr_t>(msg->easy_handle);
auto itr = ongoing_async_requests_.find(identifier);
// This shouldn't happen
if (itr == ongoing_async_requests_.end()) {
std::cerr
<< "Unexpected error: received completed request that is not "
"in the list of asynchronous requests"
<< std::endl;
curl_multi_remove_handle(multi_handle_, msg->easy_handle);
curl_easy_cleanup(msg->easy_handle);
continue;
}

long http_code = 400;
if (msg->data.result == CURLE_OK) {
curl_easy_getinfo(
msg->easy_handle, CURLINFO_RESPONSE_CODE, &http_code);
} else if (msg->data.result == CURLE_OPERATION_TIMEDOUT) {
http_code = 499;
}

request_list.emplace_back(std::move(itr->second));
ongoing_async_requests_.erase(itr);
curl_multi_remove_handle(multi_handle_, msg->easy_handle);
curl_easy_cleanup(msg->easy_handle);

std::unique_ptr<HttpRequest>& async_request = request_list.back();
async_request->http_code_ = http_code;

if (msg->msg != CURLMSG_DONE) {
// Something wrong happened.
std::cerr << "Unexpected error: received CURLMsg=" << msg->msg
<< std::endl;
}
}
} else {
std::cerr << "Unexpected error: curl_multi failed. Code:" << mc
<< std::endl;
}
} else {
std::cerr << "Unexpected error: curl_multi failed. Code:" << mc
<< std::endl;
}
lock.unlock();

for (auto& this_request : request_list) {
this_request->completion_callback_(this_request.get());
}
} while (!exiting_);
}

}}}} // namespace triton::perfanalyzer::clientbackend::openai
Loading