2016-09-12 07:25:09 +03:00
/ *
*
2017-10-05 17:40:19 +03:00
* Copyright 2014 gRPC authors .
2016-09-12 07:25:09 +03:00
*
2017-10-05 17:40:19 +03:00
* Licensed under the Apache License , Version 2.0 ( the "License" ) ;
* you may not use this file except in compliance with the License .
* You may obtain a copy of the License at
2016-09-12 07:25:09 +03:00
*
2017-10-05 17:40:19 +03:00
* http : //www.apache.org/licenses/LICENSE-2.0
2016-09-12 07:25:09 +03:00
*
2017-10-05 17:40:19 +03:00
* Unless required by applicable law or agreed to in writing , software
* distributed under the License is distributed on an "AS IS" BASIS ,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND , either express or implied .
* See the License for the specific language governing permissions and
* limitations under the License .
2016-09-12 07:25:09 +03:00
*
* /
package main
import (
"flag"
"net"
"strconv"
"google.golang.org/grpc"
"google.golang.org/grpc/credentials"
"google.golang.org/grpc/credentials/oauth"
"google.golang.org/grpc/grpclog"
"google.golang.org/grpc/interop"
testpb "google.golang.org/grpc/interop/grpc_testing"
2017-10-05 17:40:19 +03:00
"google.golang.org/grpc/testdata"
2016-09-12 07:25:09 +03:00
)
var (
2017-10-05 17:40:19 +03:00
caFile = flag . String ( "ca_file" , "" , "The file containning the CA root cert file" )
2016-09-12 07:25:09 +03:00
useTLS = flag . Bool ( "use_tls" , false , "Connection uses TLS if true, else plain TCP" )
testCA = flag . Bool ( "use_test_ca" , false , "Whether to replace platform root CAs with test CA as the CA root" )
serviceAccountKeyFile = flag . String ( "service_account_key_file" , "" , "Path to service account json key file" )
oauthScope = flag . String ( "oauth_scope" , "" , "The scope for OAuth2 tokens" )
defaultServiceAccount = flag . String ( "default_service_account" , "" , "Email of GCE default service account" )
2017-10-05 17:40:19 +03:00
serverHost = flag . String ( "server_host" , "localhost" , "The server host name" )
2016-09-12 07:25:09 +03:00
serverPort = flag . Int ( "server_port" , 10000 , "The server port number" )
tlsServerName = flag . String ( "server_host_override" , "" , "The server name use to verify the hostname returned by TLS handshake if it is not empty. Otherwise, --server_host is used." )
testCase = flag . String ( "test_case" , "large_unary" ,
` Configure different test cases . Valid options are :
empty_unary : empty ( zero bytes ) request and response ;
large_unary : single request and ( large ) response ;
client_streaming : request streaming with single response ;
server_streaming : single request with response streaming ;
ping_pong : full - duplex streaming ;
empty_stream : full - duplex streaming with zero message ;
timeout_on_sleeping_server : fullduplex streaming on a sleeping server ;
compute_engine_creds : large_unary with compute engine auth ;
service_account_creds : large_unary with service account auth ;
jwt_token_creds : large_unary with jwt token auth ;
per_rpc_creds : large_unary with per rpc token ;
oauth2_auth_token : large_unary with oauth2 token auth ;
cancel_after_begin : cancellation after metadata has been sent but before payloads are sent ;
2017-10-05 17:40:19 +03:00
cancel_after_first_response : cancellation after receiving 1 st message from the server ;
status_code_and_message : status code propagated back to client ;
custom_metadata : server will echo custom metadata ;
unimplemented_method : client attempts to call unimplemented method ;
unimplemented_service : client attempts to call unimplemented service . ` )
2016-09-12 07:25:09 +03:00
)
func main ( ) {
flag . Parse ( )
serverAddr := net . JoinHostPort ( * serverHost , strconv . Itoa ( * serverPort ) )
var opts [ ] grpc . DialOption
if * useTLS {
var sn string
if * tlsServerName != "" {
sn = * tlsServerName
}
var creds credentials . TransportCredentials
if * testCA {
var err error
2017-10-05 17:40:19 +03:00
if * caFile == "" {
* caFile = testdata . Path ( "ca.pem" )
}
creds , err = credentials . NewClientTLSFromFile ( * caFile , sn )
2016-09-12 07:25:09 +03:00
if err != nil {
grpclog . Fatalf ( "Failed to create TLS credentials %v" , err )
}
} else {
creds = credentials . NewClientTLSFromCert ( nil , sn )
}
opts = append ( opts , grpc . WithTransportCredentials ( creds ) )
if * testCase == "compute_engine_creds" {
opts = append ( opts , grpc . WithPerRPCCredentials ( oauth . NewComputeEngine ( ) ) )
} else if * testCase == "service_account_creds" {
jwtCreds , err := oauth . NewServiceAccountFromFile ( * serviceAccountKeyFile , * oauthScope )
if err != nil {
grpclog . Fatalf ( "Failed to create JWT credentials: %v" , err )
}
opts = append ( opts , grpc . WithPerRPCCredentials ( jwtCreds ) )
} else if * testCase == "jwt_token_creds" {
jwtCreds , err := oauth . NewJWTAccessFromFile ( * serviceAccountKeyFile )
if err != nil {
grpclog . Fatalf ( "Failed to create JWT credentials: %v" , err )
}
opts = append ( opts , grpc . WithPerRPCCredentials ( jwtCreds ) )
} else if * testCase == "oauth2_auth_token" {
opts = append ( opts , grpc . WithPerRPCCredentials ( oauth . NewOauthAccess ( interop . GetToken ( * serviceAccountKeyFile , * oauthScope ) ) ) )
}
} else {
opts = append ( opts , grpc . WithInsecure ( ) )
}
conn , err := grpc . Dial ( serverAddr , opts ... )
if err != nil {
grpclog . Fatalf ( "Fail to dial: %v" , err )
}
defer conn . Close ( )
tc := testpb . NewTestServiceClient ( conn )
switch * testCase {
case "empty_unary" :
interop . DoEmptyUnaryCall ( tc )
grpclog . Println ( "EmptyUnaryCall done" )
case "large_unary" :
interop . DoLargeUnaryCall ( tc )
grpclog . Println ( "LargeUnaryCall done" )
case "client_streaming" :
interop . DoClientStreaming ( tc )
grpclog . Println ( "ClientStreaming done" )
case "server_streaming" :
interop . DoServerStreaming ( tc )
grpclog . Println ( "ServerStreaming done" )
case "ping_pong" :
interop . DoPingPong ( tc )
grpclog . Println ( "Pingpong done" )
case "empty_stream" :
interop . DoEmptyStream ( tc )
grpclog . Println ( "Emptystream done" )
case "timeout_on_sleeping_server" :
interop . DoTimeoutOnSleepingServer ( tc )
grpclog . Println ( "TimeoutOnSleepingServer done" )
case "compute_engine_creds" :
if ! * useTLS {
grpclog . Fatalf ( "TLS is not enabled. TLS is required to execute compute_engine_creds test case." )
}
interop . DoComputeEngineCreds ( tc , * defaultServiceAccount , * oauthScope )
grpclog . Println ( "ComputeEngineCreds done" )
case "service_account_creds" :
if ! * useTLS {
grpclog . Fatalf ( "TLS is not enabled. TLS is required to execute service_account_creds test case." )
}
interop . DoServiceAccountCreds ( tc , * serviceAccountKeyFile , * oauthScope )
grpclog . Println ( "ServiceAccountCreds done" )
case "jwt_token_creds" :
if ! * useTLS {
grpclog . Fatalf ( "TLS is not enabled. TLS is required to execute jwt_token_creds test case." )
}
interop . DoJWTTokenCreds ( tc , * serviceAccountKeyFile )
grpclog . Println ( "JWTtokenCreds done" )
case "per_rpc_creds" :
if ! * useTLS {
grpclog . Fatalf ( "TLS is not enabled. TLS is required to execute per_rpc_creds test case." )
}
interop . DoPerRPCCreds ( tc , * serviceAccountKeyFile , * oauthScope )
grpclog . Println ( "PerRPCCreds done" )
case "oauth2_auth_token" :
if ! * useTLS {
grpclog . Fatalf ( "TLS is not enabled. TLS is required to execute oauth2_auth_token test case." )
}
interop . DoOauth2TokenCreds ( tc , * serviceAccountKeyFile , * oauthScope )
grpclog . Println ( "Oauth2TokenCreds done" )
case "cancel_after_begin" :
interop . DoCancelAfterBegin ( tc )
grpclog . Println ( "CancelAfterBegin done" )
case "cancel_after_first_response" :
interop . DoCancelAfterFirstResponse ( tc )
grpclog . Println ( "CancelAfterFirstResponse done" )
2017-10-05 17:40:19 +03:00
case "status_code_and_message" :
interop . DoStatusCodeAndMessage ( tc )
grpclog . Println ( "StatusCodeAndMessage done" )
case "custom_metadata" :
interop . DoCustomMetadata ( tc )
grpclog . Println ( "CustomMetadata done" )
case "unimplemented_method" :
interop . DoUnimplementedMethod ( conn )
grpclog . Println ( "UnimplementedMethod done" )
case "unimplemented_service" :
interop . DoUnimplementedService ( testpb . NewUnimplementedServiceClient ( conn ) )
grpclog . Println ( "UnimplementedService done" )
2016-09-12 07:25:09 +03:00
default :
grpclog . Fatal ( "Unsupported test case: " , * testCase )
}
}