google.golang.org/grpc@v1.74.2/interop/client/client.go (about) 1 /* 2 * 3 * Copyright 2014 gRPC authors. 4 * 5 * Licensed under the Apache License, Version 2.0 (the "License"); 6 * you may not use this file except in compliance with the License. 7 * You may obtain a copy of the License at 8 * 9 * http://www.apache.org/licenses/LICENSE-2.0 10 * 11 * Unless required by applicable law or agreed to in writing, software 12 * distributed under the License is distributed on an "AS IS" BASIS, 13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 14 * See the License for the specific language governing permissions and 15 * limitations under the License. 16 * 17 */ 18 19 // Binary client is an interop client. 20 // 21 // See interop test case descriptions [here]. 22 // 23 // [here]: https://github.com/grpc/grpc/blob/master/doc/interop-test-descriptions.md 24 package main 25 26 import ( 27 "context" 28 "crypto/tls" 29 "crypto/x509" 30 "flag" 31 "log" 32 "net" 33 "os" 34 "strconv" 35 "strings" 36 "time" 37 38 "golang.org/x/oauth2" 39 "google.golang.org/grpc" 40 "google.golang.org/grpc/credentials" 41 "google.golang.org/grpc/credentials/alts" 42 "google.golang.org/grpc/credentials/google" 43 "google.golang.org/grpc/credentials/insecure" 44 "google.golang.org/grpc/credentials/oauth" 45 "google.golang.org/grpc/grpclog" 46 "google.golang.org/grpc/interop" 47 "google.golang.org/grpc/metadata" 48 "google.golang.org/grpc/resolver" 49 "google.golang.org/grpc/testdata" 50 51 _ "google.golang.org/grpc/balancer/grpclb" // Register the grpclb load balancing policy. 52 _ "google.golang.org/grpc/balancer/rls" // Register the RLS load balancing policy. 53 "google.golang.org/grpc/xds/googledirectpath" // Register xDS resolver required for c2p directpath. 54 55 testgrpc "google.golang.org/grpc/interop/grpc_testing" 56 ) 57 58 const ( 59 googleDefaultCredsName = "google_default_credentials" 60 computeEngineCredsName = "compute_engine_channel_creds" 61 ) 62 63 var ( 64 caFile = flag.String("ca_file", "", "The file containing the CA root cert file") 65 useTLS = flag.Bool("use_tls", false, "Connection uses TLS if true") 66 useALTS = flag.Bool("use_alts", false, "Connection uses ALTS if true (this option can only be used on GCP)") 67 customCredentialsType = flag.String("custom_credentials_type", "", "Custom creds to use, excluding TLS or ALTS") 68 altsHSAddr = flag.String("alts_handshaker_service_address", "", "ALTS handshaker gRPC service address") 69 testCA = flag.Bool("use_test_ca", false, "Whether to replace platform root CAs with test CA as the CA root") 70 serviceAccountKeyFile = flag.String("service_account_key_file", "", "Path to service account json key file") 71 oauthScope = flag.String("oauth_scope", "", "The scope for OAuth2 tokens") 72 defaultServiceAccount = flag.String("default_service_account", "", "Email of GCE default service account") 73 googleC2PUniverseDomain = flag.String("google_c2p_universe_domain", "", "Universe domain for google-c2p resolve") 74 serverHost = flag.String("server_host", "localhost", "The server host name") 75 serverPort = flag.Int("server_port", 10000, "The server port number") 76 serviceConfigJSON = flag.String("service_config_json", "", "Disables service config lookups and sets the provided string as the default service config.") 77 soakIterations = flag.Int("soak_iterations", 10, "The number of iterations to use for the two soak tests: rpc_soak and channel_soak") 78 soakMaxFailures = flag.Int("soak_max_failures", 0, "The number of iterations in soak tests that are allowed to fail (either due to non-OK status code or exceeding the per-iteration max acceptable latency).") 79 soakPerIterationMaxAcceptableLatencyMs = flag.Int("soak_per_iteration_max_acceptable_latency_ms", 1000, "The number of milliseconds a single iteration in the two soak tests (rpc_soak and channel_soak) should take.") 80 soakOverallTimeoutSeconds = flag.Int("soak_overall_timeout_seconds", 10, "The overall number of seconds after which a soak test should stop and fail, if the desired number of iterations have not yet completed.") 81 soakMinTimeMsBetweenRPCs = flag.Int("soak_min_time_ms_between_rpcs", 0, "The minimum time in milliseconds between consecutive RPCs in a soak test (rpc_soak or channel_soak), useful for limiting QPS") 82 soakRequestSize = flag.Int("soak_request_size", 271828, "The request size in a soak RPC. The default value is set based on the interop large unary test case.") 83 soakResponseSize = flag.Int("soak_response_size", 314159, "The response size in a soak RPC. The default value is set based on the interop large unary test case.") 84 soakNumThreads = flag.Int("soak_num_threads", 1, "The number of threads for concurrent execution of the soak tests (rpc_soak or channel_soak). The default value is set based on the interop large unary test case.") 85 tlsServerName = flag.String("server_host_override", "", "The server name used to verify the hostname returned by TLS handshake if it is not empty. Otherwise, --server_host is used.") 86 additionalMetadata = flag.String("additional_metadata", "", "Additional metadata to send in each request, as a semicolon-separated list of key:value pairs.") 87 testCase = flag.String("test_case", "large_unary", 88 `Configure different test cases. Valid options are: 89 empty_unary : empty (zero bytes) request and response; 90 large_unary : single request and (large) response; 91 client_streaming : request streaming with single response; 92 server_streaming : single request with response streaming; 93 ping_pong : full-duplex streaming; 94 empty_stream : full-duplex streaming with zero message; 95 timeout_on_sleeping_server: fullduplex streaming on a sleeping server; 96 compute_engine_creds: large_unary with compute engine auth; 97 service_account_creds: large_unary with service account auth; 98 jwt_token_creds: large_unary with jwt token auth; 99 per_rpc_creds: large_unary with per rpc token; 100 oauth2_auth_token: large_unary with oauth2 token auth; 101 google_default_credentials: large_unary with google default credentials 102 compute_engine_channel_credentials: large_unary with compute engine creds 103 cancel_after_begin: cancellation after metadata has been sent but before payloads are sent; 104 cancel_after_first_response: cancellation after receiving 1st message from the server; 105 status_code_and_message: status code propagated back to client; 106 special_status_message: Unicode and whitespace is correctly processed in status message; 107 custom_metadata: server will echo custom metadata; 108 unimplemented_method: client attempts to call unimplemented method; 109 unimplemented_service: client attempts to call unimplemented service; 110 pick_first_unary: all requests are sent to one server despite multiple servers are resolved; 111 orca_per_rpc: the client verifies ORCA per-RPC metrics are provided; 112 orca_oob: the client verifies ORCA out-of-band metrics are provided.`) 113 114 logger = grpclog.Component("interop") 115 ) 116 117 type credsMode uint8 118 119 const ( 120 credsNone credsMode = iota 121 credsTLS 122 credsALTS 123 credsGoogleDefaultCreds 124 credsComputeEngineCreds 125 ) 126 127 // Parses the --additional_metadata flag and returns metadata to send on each RPC, 128 // formatted as per https://pkg.go.dev/google.golang.org/grpc/metadata#Pairs. 129 // Allow any character but semicolons in values. If the flag is empty, return a nil map. 130 func parseAdditionalMetadataFlag() []string { 131 if len(*additionalMetadata) == 0 { 132 return nil 133 } 134 r := *additionalMetadata 135 addMd := make([]string, 0) 136 for len(r) > 0 { 137 i := strings.Index(r, ":") 138 if i < 0 { 139 logger.Fatalf("Error parsing --additional_metadata flag: missing colon separator") 140 } 141 addMd = append(addMd, r[:i]) // append key 142 r = r[i+1:] 143 i = strings.Index(r, ";") 144 // append value 145 if i < 0 { 146 addMd = append(addMd, r) 147 break 148 } 149 addMd = append(addMd, r[:i]) 150 r = r[i+1:] 151 } 152 return addMd 153 } 154 155 // createSoakTestConfig creates a shared configuration structure for soak tests. 156 func createBaseSoakConfig(serverAddr string) interop.SoakTestConfig { 157 return interop.SoakTestConfig{ 158 RequestSize: *soakRequestSize, 159 ResponseSize: *soakResponseSize, 160 PerIterationMaxAcceptableLatency: time.Duration(*soakPerIterationMaxAcceptableLatencyMs) * time.Millisecond, 161 MinTimeBetweenRPCs: time.Duration(*soakMinTimeMsBetweenRPCs) * time.Millisecond, 162 OverallTimeout: time.Duration(*soakOverallTimeoutSeconds) * time.Second, 163 ServerAddr: serverAddr, 164 NumWorkers: *soakNumThreads, 165 Iterations: *soakIterations, 166 MaxFailures: *soakMaxFailures, 167 } 168 } 169 170 func main() { 171 flag.Parse() 172 logger.Infof("Client running with test case %q", *testCase) 173 var useGDC bool // use google default creds 174 var useCEC bool // use compute engine creds 175 if *customCredentialsType != "" { 176 switch *customCredentialsType { 177 case googleDefaultCredsName: 178 useGDC = true 179 case computeEngineCredsName: 180 useCEC = true 181 default: 182 logger.Fatalf("If set, custom_credentials_type can only be set to one of %v or %v", 183 googleDefaultCredsName, computeEngineCredsName) 184 } 185 } 186 if (*useTLS && *useALTS) || (*useTLS && useGDC) || (*useALTS && useGDC) || (*useTLS && useCEC) || (*useALTS && useCEC) { 187 logger.Fatalf("only one of TLS, ALTS, google default creds, or compute engine creds can be used") 188 } 189 190 ctx := context.Background() 191 192 var credsChosen credsMode 193 switch { 194 case *useTLS: 195 credsChosen = credsTLS 196 case *useALTS: 197 credsChosen = credsALTS 198 case useGDC: 199 credsChosen = credsGoogleDefaultCreds 200 case useCEC: 201 credsChosen = credsComputeEngineCreds 202 } 203 204 resolver.SetDefaultScheme("dns") 205 if len(*googleC2PUniverseDomain) > 0 { 206 if err := googledirectpath.SetUniverseDomain(*googleC2PUniverseDomain); err != nil { 207 log.Fatalf("googlec2p.SetUniverseDomain(%s) failed: %v", *googleC2PUniverseDomain, err) 208 } 209 } 210 serverAddr := *serverHost 211 if *serverPort != 0 { 212 serverAddr = net.JoinHostPort(*serverHost, strconv.Itoa(*serverPort)) 213 } 214 var opts []grpc.DialOption 215 switch credsChosen { 216 case credsTLS: 217 var roots *x509.CertPool 218 if *testCA { 219 if *caFile == "" { 220 *caFile = testdata.Path("ca.pem") 221 } 222 b, err := os.ReadFile(*caFile) 223 if err != nil { 224 logger.Fatalf("Failed to read root certificate file %q: %v", *caFile, err) 225 } 226 roots = x509.NewCertPool() 227 if !roots.AppendCertsFromPEM(b) { 228 logger.Fatalf("Failed to append certificates: %s", string(b)) 229 } 230 } 231 var creds credentials.TransportCredentials 232 if *tlsServerName != "" { 233 creds = credentials.NewClientTLSFromCert(roots, *tlsServerName) 234 } else { 235 creds = credentials.NewTLS(&tls.Config{RootCAs: roots}) 236 } 237 opts = append(opts, grpc.WithTransportCredentials(creds)) 238 case credsALTS: 239 altsOpts := alts.DefaultClientOptions() 240 if *altsHSAddr != "" { 241 altsOpts.HandshakerServiceAddress = *altsHSAddr 242 } 243 altsTC := alts.NewClientCreds(altsOpts) 244 opts = append(opts, grpc.WithTransportCredentials(altsTC)) 245 case credsGoogleDefaultCreds: 246 opts = append(opts, grpc.WithCredentialsBundle(google.NewDefaultCredentials())) 247 case credsComputeEngineCreds: 248 opts = append(opts, grpc.WithCredentialsBundle(google.NewComputeEngineCredentials())) 249 case credsNone: 250 opts = append(opts, grpc.WithTransportCredentials(insecure.NewCredentials())) 251 default: 252 logger.Fatal("Invalid creds") 253 } 254 if credsChosen == credsTLS { 255 if *testCase == "compute_engine_creds" { 256 opts = append(opts, grpc.WithPerRPCCredentials(oauth.NewComputeEngine())) 257 } else if *testCase == "service_account_creds" { 258 jwtCreds, err := oauth.NewServiceAccountFromFile(*serviceAccountKeyFile, *oauthScope) 259 if err != nil { 260 logger.Fatalf("Failed to create JWT credentials: %v", err) 261 } 262 opts = append(opts, grpc.WithPerRPCCredentials(jwtCreds)) 263 } else if *testCase == "jwt_token_creds" { 264 jwtCreds, err := oauth.NewJWTAccessFromFile(*serviceAccountKeyFile) 265 if err != nil { 266 logger.Fatalf("Failed to create JWT credentials: %v", err) 267 } 268 opts = append(opts, grpc.WithPerRPCCredentials(jwtCreds)) 269 } else if *testCase == "oauth2_auth_token" { 270 opts = append(opts, grpc.WithPerRPCCredentials(oauth.TokenSource{TokenSource: oauth2.StaticTokenSource(interop.GetToken(ctx, *serviceAccountKeyFile, *oauthScope))})) 271 } 272 } 273 if len(*serviceConfigJSON) > 0 { 274 opts = append(opts, grpc.WithDisableServiceConfig(), grpc.WithDefaultServiceConfig(*serviceConfigJSON)) 275 } 276 if addMd := parseAdditionalMetadataFlag(); addMd != nil { 277 unaryAddMd := func(ctx context.Context, method string, req, reply any, cc *grpc.ClientConn, invoker grpc.UnaryInvoker, opts ...grpc.CallOption) error { 278 ctx = metadata.AppendToOutgoingContext(ctx, addMd...) 279 return invoker(ctx, method, req, reply, cc, opts...) 280 } 281 streamingAddMd := func(ctx context.Context, desc *grpc.StreamDesc, cc *grpc.ClientConn, method string, streamer grpc.Streamer, opts ...grpc.CallOption) (grpc.ClientStream, error) { 282 ctx = metadata.AppendToOutgoingContext(ctx, addMd...) 283 return streamer(ctx, desc, cc, method, opts...) 284 } 285 opts = append(opts, grpc.WithUnaryInterceptor(unaryAddMd), grpc.WithStreamInterceptor(streamingAddMd)) 286 } 287 conn, err := grpc.NewClient(serverAddr, opts...) 288 if err != nil { 289 logger.Fatalf("grpc.NewClient(%q) = %v", serverAddr, err) 290 } 291 defer conn.Close() 292 tc := testgrpc.NewTestServiceClient(conn) 293 ctxWithDeadline, cancel := context.WithTimeout(ctx, time.Duration(*soakOverallTimeoutSeconds)*time.Second) 294 defer cancel() 295 switch *testCase { 296 case "empty_unary": 297 interop.DoEmptyUnaryCall(ctx, tc) 298 logger.Infoln("EmptyUnaryCall done") 299 case "large_unary": 300 interop.DoLargeUnaryCall(ctx, tc) 301 logger.Infoln("LargeUnaryCall done") 302 case "client_streaming": 303 interop.DoClientStreaming(ctx, tc) 304 logger.Infoln("ClientStreaming done") 305 case "server_streaming": 306 interop.DoServerStreaming(ctx, tc) 307 logger.Infoln("ServerStreaming done") 308 case "ping_pong": 309 interop.DoPingPong(ctx, tc) 310 logger.Infoln("Pingpong done") 311 case "empty_stream": 312 interop.DoEmptyStream(ctx, tc) 313 logger.Infoln("Emptystream done") 314 case "timeout_on_sleeping_server": 315 interop.DoTimeoutOnSleepingServer(ctx, tc) 316 logger.Infoln("TimeoutOnSleepingServer done") 317 case "compute_engine_creds": 318 if credsChosen != credsTLS { 319 logger.Fatalf("TLS credentials need to be set for compute_engine_creds test case.") 320 } 321 interop.DoComputeEngineCreds(ctx, tc, *defaultServiceAccount, *oauthScope) 322 logger.Infoln("ComputeEngineCreds done") 323 case "service_account_creds": 324 if credsChosen != credsTLS { 325 logger.Fatalf("TLS credentials need to be set for service_account_creds test case.") 326 } 327 interop.DoServiceAccountCreds(ctx, tc, *serviceAccountKeyFile, *oauthScope) 328 logger.Infoln("ServiceAccountCreds done") 329 case "jwt_token_creds": 330 if credsChosen != credsTLS { 331 logger.Fatalf("TLS credentials need to be set for jwt_token_creds test case.") 332 } 333 interop.DoJWTTokenCreds(ctx, tc, *serviceAccountKeyFile) 334 logger.Infoln("JWTtokenCreds done") 335 case "per_rpc_creds": 336 if credsChosen != credsTLS { 337 logger.Fatalf("TLS credentials need to be set for per_rpc_creds test case.") 338 } 339 interop.DoPerRPCCreds(ctx, tc, *serviceAccountKeyFile, *oauthScope) 340 logger.Infoln("PerRPCCreds done") 341 case "oauth2_auth_token": 342 if credsChosen != credsTLS { 343 logger.Fatalf("TLS credentials need to be set for oauth2_auth_token test case.") 344 } 345 interop.DoOauth2TokenCreds(ctx, tc, *serviceAccountKeyFile, *oauthScope) 346 logger.Infoln("Oauth2TokenCreds done") 347 case "google_default_credentials": 348 if credsChosen != credsGoogleDefaultCreds { 349 logger.Fatalf("GoogleDefaultCredentials need to be set for google_default_credentials test case.") 350 } 351 interop.DoGoogleDefaultCredentials(ctx, tc, *defaultServiceAccount) 352 logger.Infoln("GoogleDefaultCredentials done") 353 case "compute_engine_channel_credentials": 354 if credsChosen != credsComputeEngineCreds { 355 logger.Fatalf("ComputeEngineCreds need to be set for compute_engine_channel_credentials test case.") 356 } 357 interop.DoComputeEngineChannelCredentials(ctx, tc, *defaultServiceAccount) 358 logger.Infoln("ComputeEngineChannelCredentials done") 359 case "cancel_after_begin": 360 interop.DoCancelAfterBegin(ctx, tc) 361 logger.Infoln("CancelAfterBegin done") 362 case "cancel_after_first_response": 363 interop.DoCancelAfterFirstResponse(ctx, tc) 364 logger.Infoln("CancelAfterFirstResponse done") 365 case "status_code_and_message": 366 interop.DoStatusCodeAndMessage(ctx, tc) 367 logger.Infoln("StatusCodeAndMessage done") 368 case "special_status_message": 369 interop.DoSpecialStatusMessage(ctx, tc) 370 logger.Infoln("SpecialStatusMessage done") 371 case "custom_metadata": 372 interop.DoCustomMetadata(ctx, tc) 373 logger.Infoln("CustomMetadata done") 374 case "unimplemented_method": 375 interop.DoUnimplementedMethod(ctx, conn) 376 logger.Infoln("UnimplementedMethod done") 377 case "unimplemented_service": 378 interop.DoUnimplementedService(ctx, testgrpc.NewUnimplementedServiceClient(conn)) 379 logger.Infoln("UnimplementedService done") 380 case "pick_first_unary": 381 interop.DoPickFirstUnary(ctx, tc) 382 logger.Infoln("PickFirstUnary done") 383 case "rpc_soak": 384 rpcSoakConfig := createBaseSoakConfig(serverAddr) 385 rpcSoakConfig.ChannelForTest = func() (*grpc.ClientConn, func()) { return conn, func() {} } 386 interop.DoSoakTest(ctxWithDeadline, rpcSoakConfig) 387 logger.Infoln("RpcSoak done") 388 case "channel_soak": 389 channelSoakConfig := createBaseSoakConfig(serverAddr) 390 channelSoakConfig.ChannelForTest = func() (*grpc.ClientConn, func()) { 391 cc, err := grpc.NewClient(serverAddr, opts...) 392 if err != nil { 393 log.Fatalf("Failed to create shared channel: %v", err) 394 } 395 return cc, func() { cc.Close() } 396 } 397 interop.DoSoakTest(ctxWithDeadline, channelSoakConfig) 398 logger.Infoln("ChannelSoak done") 399 case "orca_per_rpc": 400 interop.DoORCAPerRPCTest(ctx, tc) 401 logger.Infoln("ORCAPerRPC done") 402 case "orca_oob": 403 interop.DoORCAOOBTest(ctx, tc) 404 logger.Infoln("ORCAOOB done") 405 default: 406 logger.Fatal("Unsupported test case: ", *testCase) 407 } 408 }