google.golang.org/grpc@v1.74.2/interop/client/client.go (about)

     1  /*
     2   *
     3   * Copyright 2014 gRPC authors.
     4   *
     5   * Licensed under the Apache License, Version 2.0 (the "License");
     6   * you may not use this file except in compliance with the License.
     7   * You may obtain a copy of the License at
     8   *
     9   *     http://www.apache.org/licenses/LICENSE-2.0
    10   *
    11   * Unless required by applicable law or agreed to in writing, software
    12   * distributed under the License is distributed on an "AS IS" BASIS,
    13   * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    14   * See the License for the specific language governing permissions and
    15   * limitations under the License.
    16   *
    17   */
    18  
    19  // Binary client is an interop client.
    20  //
    21  // See interop test case descriptions [here].
    22  //
    23  // [here]: https://github.com/grpc/grpc/blob/master/doc/interop-test-descriptions.md
    24  package main
    25  
    26  import (
    27  	"context"
    28  	"crypto/tls"
    29  	"crypto/x509"
    30  	"flag"
    31  	"log"
    32  	"net"
    33  	"os"
    34  	"strconv"
    35  	"strings"
    36  	"time"
    37  
    38  	"golang.org/x/oauth2"
    39  	"google.golang.org/grpc"
    40  	"google.golang.org/grpc/credentials"
    41  	"google.golang.org/grpc/credentials/alts"
    42  	"google.golang.org/grpc/credentials/google"
    43  	"google.golang.org/grpc/credentials/insecure"
    44  	"google.golang.org/grpc/credentials/oauth"
    45  	"google.golang.org/grpc/grpclog"
    46  	"google.golang.org/grpc/interop"
    47  	"google.golang.org/grpc/metadata"
    48  	"google.golang.org/grpc/resolver"
    49  	"google.golang.org/grpc/testdata"
    50  
    51  	_ "google.golang.org/grpc/balancer/grpclb"    // Register the grpclb load balancing policy.
    52  	_ "google.golang.org/grpc/balancer/rls"       // Register the RLS load balancing policy.
    53  	"google.golang.org/grpc/xds/googledirectpath" // Register xDS resolver required for c2p directpath.
    54  
    55  	testgrpc "google.golang.org/grpc/interop/grpc_testing"
    56  )
    57  
    58  const (
    59  	googleDefaultCredsName = "google_default_credentials"
    60  	computeEngineCredsName = "compute_engine_channel_creds"
    61  )
    62  
    63  var (
    64  	caFile                                 = flag.String("ca_file", "", "The file containing the CA root cert file")
    65  	useTLS                                 = flag.Bool("use_tls", false, "Connection uses TLS if true")
    66  	useALTS                                = flag.Bool("use_alts", false, "Connection uses ALTS if true (this option can only be used on GCP)")
    67  	customCredentialsType                  = flag.String("custom_credentials_type", "", "Custom creds to use, excluding TLS or ALTS")
    68  	altsHSAddr                             = flag.String("alts_handshaker_service_address", "", "ALTS handshaker gRPC service address")
    69  	testCA                                 = flag.Bool("use_test_ca", false, "Whether to replace platform root CAs with test CA as the CA root")
    70  	serviceAccountKeyFile                  = flag.String("service_account_key_file", "", "Path to service account json key file")
    71  	oauthScope                             = flag.String("oauth_scope", "", "The scope for OAuth2 tokens")
    72  	defaultServiceAccount                  = flag.String("default_service_account", "", "Email of GCE default service account")
    73  	googleC2PUniverseDomain                = flag.String("google_c2p_universe_domain", "", "Universe domain for google-c2p resolve")
    74  	serverHost                             = flag.String("server_host", "localhost", "The server host name")
    75  	serverPort                             = flag.Int("server_port", 10000, "The server port number")
    76  	serviceConfigJSON                      = flag.String("service_config_json", "", "Disables service config lookups and sets the provided string as the default service config.")
    77  	soakIterations                         = flag.Int("soak_iterations", 10, "The number of iterations to use for the two soak tests: rpc_soak and channel_soak")
    78  	soakMaxFailures                        = flag.Int("soak_max_failures", 0, "The number of iterations in soak tests that are allowed to fail (either due to non-OK status code or exceeding the per-iteration max acceptable latency).")
    79  	soakPerIterationMaxAcceptableLatencyMs = flag.Int("soak_per_iteration_max_acceptable_latency_ms", 1000, "The number of milliseconds a single iteration in the two soak tests (rpc_soak and channel_soak) should take.")
    80  	soakOverallTimeoutSeconds              = flag.Int("soak_overall_timeout_seconds", 10, "The overall number of seconds after which a soak test should stop and fail, if the desired number of iterations have not yet completed.")
    81  	soakMinTimeMsBetweenRPCs               = flag.Int("soak_min_time_ms_between_rpcs", 0, "The minimum time in milliseconds between consecutive RPCs in a soak test (rpc_soak or channel_soak), useful for limiting QPS")
    82  	soakRequestSize                        = flag.Int("soak_request_size", 271828, "The request size in a soak RPC. The default value is set based on the interop large unary test case.")
    83  	soakResponseSize                       = flag.Int("soak_response_size", 314159, "The response size in a soak RPC. The default value is set based on the interop large unary test case.")
    84  	soakNumThreads                         = flag.Int("soak_num_threads", 1, "The number of threads for concurrent execution of the soak tests (rpc_soak or channel_soak). The default value is set based on the interop large unary test case.")
    85  	tlsServerName                          = flag.String("server_host_override", "", "The server name used to verify the hostname returned by TLS handshake if it is not empty. Otherwise, --server_host is used.")
    86  	additionalMetadata                     = flag.String("additional_metadata", "", "Additional metadata to send in each request, as a semicolon-separated list of key:value pairs.")
    87  	testCase                               = flag.String("test_case", "large_unary",
    88  		`Configure different test cases. Valid options are:
    89          empty_unary : empty (zero bytes) request and response;
    90          large_unary : single request and (large) response;
    91          client_streaming : request streaming with single response;
    92          server_streaming : single request with response streaming;
    93          ping_pong : full-duplex streaming;
    94          empty_stream : full-duplex streaming with zero message;
    95          timeout_on_sleeping_server: fullduplex streaming on a sleeping server;
    96          compute_engine_creds: large_unary with compute engine auth;
    97          service_account_creds: large_unary with service account auth;
    98          jwt_token_creds: large_unary with jwt token auth;
    99          per_rpc_creds: large_unary with per rpc token;
   100          oauth2_auth_token: large_unary with oauth2 token auth;
   101          google_default_credentials: large_unary with google default credentials
   102          compute_engine_channel_credentials: large_unary with compute engine creds
   103          cancel_after_begin: cancellation after metadata has been sent but before payloads are sent;
   104          cancel_after_first_response: cancellation after receiving 1st message from the server;
   105          status_code_and_message: status code propagated back to client;
   106          special_status_message: Unicode and whitespace is correctly processed in status message;
   107          custom_metadata: server will echo custom metadata;
   108          unimplemented_method: client attempts to call unimplemented method;
   109          unimplemented_service: client attempts to call unimplemented service;
   110          pick_first_unary: all requests are sent to one server despite multiple servers are resolved;
   111          orca_per_rpc: the client verifies ORCA per-RPC metrics are provided;
   112          orca_oob: the client verifies ORCA out-of-band metrics are provided.`)
   113  
   114  	logger = grpclog.Component("interop")
   115  )
   116  
   117  type credsMode uint8
   118  
   119  const (
   120  	credsNone credsMode = iota
   121  	credsTLS
   122  	credsALTS
   123  	credsGoogleDefaultCreds
   124  	credsComputeEngineCreds
   125  )
   126  
   127  // Parses the --additional_metadata flag and returns metadata to send on each RPC,
   128  // formatted as per https://pkg.go.dev/google.golang.org/grpc/metadata#Pairs.
   129  // Allow any character but semicolons in values. If the flag is empty, return a nil map.
   130  func parseAdditionalMetadataFlag() []string {
   131  	if len(*additionalMetadata) == 0 {
   132  		return nil
   133  	}
   134  	r := *additionalMetadata
   135  	addMd := make([]string, 0)
   136  	for len(r) > 0 {
   137  		i := strings.Index(r, ":")
   138  		if i < 0 {
   139  			logger.Fatalf("Error parsing --additional_metadata flag: missing colon separator")
   140  		}
   141  		addMd = append(addMd, r[:i]) // append key
   142  		r = r[i+1:]
   143  		i = strings.Index(r, ";")
   144  		// append value
   145  		if i < 0 {
   146  			addMd = append(addMd, r)
   147  			break
   148  		}
   149  		addMd = append(addMd, r[:i])
   150  		r = r[i+1:]
   151  	}
   152  	return addMd
   153  }
   154  
   155  // createSoakTestConfig creates a shared configuration structure for soak tests.
   156  func createBaseSoakConfig(serverAddr string) interop.SoakTestConfig {
   157  	return interop.SoakTestConfig{
   158  		RequestSize:                      *soakRequestSize,
   159  		ResponseSize:                     *soakResponseSize,
   160  		PerIterationMaxAcceptableLatency: time.Duration(*soakPerIterationMaxAcceptableLatencyMs) * time.Millisecond,
   161  		MinTimeBetweenRPCs:               time.Duration(*soakMinTimeMsBetweenRPCs) * time.Millisecond,
   162  		OverallTimeout:                   time.Duration(*soakOverallTimeoutSeconds) * time.Second,
   163  		ServerAddr:                       serverAddr,
   164  		NumWorkers:                       *soakNumThreads,
   165  		Iterations:                       *soakIterations,
   166  		MaxFailures:                      *soakMaxFailures,
   167  	}
   168  }
   169  
   170  func main() {
   171  	flag.Parse()
   172  	logger.Infof("Client running with test case %q", *testCase)
   173  	var useGDC bool // use google default creds
   174  	var useCEC bool // use compute engine creds
   175  	if *customCredentialsType != "" {
   176  		switch *customCredentialsType {
   177  		case googleDefaultCredsName:
   178  			useGDC = true
   179  		case computeEngineCredsName:
   180  			useCEC = true
   181  		default:
   182  			logger.Fatalf("If set, custom_credentials_type can only be set to one of %v or %v",
   183  				googleDefaultCredsName, computeEngineCredsName)
   184  		}
   185  	}
   186  	if (*useTLS && *useALTS) || (*useTLS && useGDC) || (*useALTS && useGDC) || (*useTLS && useCEC) || (*useALTS && useCEC) {
   187  		logger.Fatalf("only one of TLS, ALTS, google default creds, or compute engine creds can be used")
   188  	}
   189  
   190  	ctx := context.Background()
   191  
   192  	var credsChosen credsMode
   193  	switch {
   194  	case *useTLS:
   195  		credsChosen = credsTLS
   196  	case *useALTS:
   197  		credsChosen = credsALTS
   198  	case useGDC:
   199  		credsChosen = credsGoogleDefaultCreds
   200  	case useCEC:
   201  		credsChosen = credsComputeEngineCreds
   202  	}
   203  
   204  	resolver.SetDefaultScheme("dns")
   205  	if len(*googleC2PUniverseDomain) > 0 {
   206  		if err := googledirectpath.SetUniverseDomain(*googleC2PUniverseDomain); err != nil {
   207  			log.Fatalf("googlec2p.SetUniverseDomain(%s) failed: %v", *googleC2PUniverseDomain, err)
   208  		}
   209  	}
   210  	serverAddr := *serverHost
   211  	if *serverPort != 0 {
   212  		serverAddr = net.JoinHostPort(*serverHost, strconv.Itoa(*serverPort))
   213  	}
   214  	var opts []grpc.DialOption
   215  	switch credsChosen {
   216  	case credsTLS:
   217  		var roots *x509.CertPool
   218  		if *testCA {
   219  			if *caFile == "" {
   220  				*caFile = testdata.Path("ca.pem")
   221  			}
   222  			b, err := os.ReadFile(*caFile)
   223  			if err != nil {
   224  				logger.Fatalf("Failed to read root certificate file %q: %v", *caFile, err)
   225  			}
   226  			roots = x509.NewCertPool()
   227  			if !roots.AppendCertsFromPEM(b) {
   228  				logger.Fatalf("Failed to append certificates: %s", string(b))
   229  			}
   230  		}
   231  		var creds credentials.TransportCredentials
   232  		if *tlsServerName != "" {
   233  			creds = credentials.NewClientTLSFromCert(roots, *tlsServerName)
   234  		} else {
   235  			creds = credentials.NewTLS(&tls.Config{RootCAs: roots})
   236  		}
   237  		opts = append(opts, grpc.WithTransportCredentials(creds))
   238  	case credsALTS:
   239  		altsOpts := alts.DefaultClientOptions()
   240  		if *altsHSAddr != "" {
   241  			altsOpts.HandshakerServiceAddress = *altsHSAddr
   242  		}
   243  		altsTC := alts.NewClientCreds(altsOpts)
   244  		opts = append(opts, grpc.WithTransportCredentials(altsTC))
   245  	case credsGoogleDefaultCreds:
   246  		opts = append(opts, grpc.WithCredentialsBundle(google.NewDefaultCredentials()))
   247  	case credsComputeEngineCreds:
   248  		opts = append(opts, grpc.WithCredentialsBundle(google.NewComputeEngineCredentials()))
   249  	case credsNone:
   250  		opts = append(opts, grpc.WithTransportCredentials(insecure.NewCredentials()))
   251  	default:
   252  		logger.Fatal("Invalid creds")
   253  	}
   254  	if credsChosen == credsTLS {
   255  		if *testCase == "compute_engine_creds" {
   256  			opts = append(opts, grpc.WithPerRPCCredentials(oauth.NewComputeEngine()))
   257  		} else if *testCase == "service_account_creds" {
   258  			jwtCreds, err := oauth.NewServiceAccountFromFile(*serviceAccountKeyFile, *oauthScope)
   259  			if err != nil {
   260  				logger.Fatalf("Failed to create JWT credentials: %v", err)
   261  			}
   262  			opts = append(opts, grpc.WithPerRPCCredentials(jwtCreds))
   263  		} else if *testCase == "jwt_token_creds" {
   264  			jwtCreds, err := oauth.NewJWTAccessFromFile(*serviceAccountKeyFile)
   265  			if err != nil {
   266  				logger.Fatalf("Failed to create JWT credentials: %v", err)
   267  			}
   268  			opts = append(opts, grpc.WithPerRPCCredentials(jwtCreds))
   269  		} else if *testCase == "oauth2_auth_token" {
   270  			opts = append(opts, grpc.WithPerRPCCredentials(oauth.TokenSource{TokenSource: oauth2.StaticTokenSource(interop.GetToken(ctx, *serviceAccountKeyFile, *oauthScope))}))
   271  		}
   272  	}
   273  	if len(*serviceConfigJSON) > 0 {
   274  		opts = append(opts, grpc.WithDisableServiceConfig(), grpc.WithDefaultServiceConfig(*serviceConfigJSON))
   275  	}
   276  	if addMd := parseAdditionalMetadataFlag(); addMd != nil {
   277  		unaryAddMd := func(ctx context.Context, method string, req, reply any, cc *grpc.ClientConn, invoker grpc.UnaryInvoker, opts ...grpc.CallOption) error {
   278  			ctx = metadata.AppendToOutgoingContext(ctx, addMd...)
   279  			return invoker(ctx, method, req, reply, cc, opts...)
   280  		}
   281  		streamingAddMd := func(ctx context.Context, desc *grpc.StreamDesc, cc *grpc.ClientConn, method string, streamer grpc.Streamer, opts ...grpc.CallOption) (grpc.ClientStream, error) {
   282  			ctx = metadata.AppendToOutgoingContext(ctx, addMd...)
   283  			return streamer(ctx, desc, cc, method, opts...)
   284  		}
   285  		opts = append(opts, grpc.WithUnaryInterceptor(unaryAddMd), grpc.WithStreamInterceptor(streamingAddMd))
   286  	}
   287  	conn, err := grpc.NewClient(serverAddr, opts...)
   288  	if err != nil {
   289  		logger.Fatalf("grpc.NewClient(%q) = %v", serverAddr, err)
   290  	}
   291  	defer conn.Close()
   292  	tc := testgrpc.NewTestServiceClient(conn)
   293  	ctxWithDeadline, cancel := context.WithTimeout(ctx, time.Duration(*soakOverallTimeoutSeconds)*time.Second)
   294  	defer cancel()
   295  	switch *testCase {
   296  	case "empty_unary":
   297  		interop.DoEmptyUnaryCall(ctx, tc)
   298  		logger.Infoln("EmptyUnaryCall done")
   299  	case "large_unary":
   300  		interop.DoLargeUnaryCall(ctx, tc)
   301  		logger.Infoln("LargeUnaryCall done")
   302  	case "client_streaming":
   303  		interop.DoClientStreaming(ctx, tc)
   304  		logger.Infoln("ClientStreaming done")
   305  	case "server_streaming":
   306  		interop.DoServerStreaming(ctx, tc)
   307  		logger.Infoln("ServerStreaming done")
   308  	case "ping_pong":
   309  		interop.DoPingPong(ctx, tc)
   310  		logger.Infoln("Pingpong done")
   311  	case "empty_stream":
   312  		interop.DoEmptyStream(ctx, tc)
   313  		logger.Infoln("Emptystream done")
   314  	case "timeout_on_sleeping_server":
   315  		interop.DoTimeoutOnSleepingServer(ctx, tc)
   316  		logger.Infoln("TimeoutOnSleepingServer done")
   317  	case "compute_engine_creds":
   318  		if credsChosen != credsTLS {
   319  			logger.Fatalf("TLS credentials need to be set for compute_engine_creds test case.")
   320  		}
   321  		interop.DoComputeEngineCreds(ctx, tc, *defaultServiceAccount, *oauthScope)
   322  		logger.Infoln("ComputeEngineCreds done")
   323  	case "service_account_creds":
   324  		if credsChosen != credsTLS {
   325  			logger.Fatalf("TLS credentials need to be set for service_account_creds test case.")
   326  		}
   327  		interop.DoServiceAccountCreds(ctx, tc, *serviceAccountKeyFile, *oauthScope)
   328  		logger.Infoln("ServiceAccountCreds done")
   329  	case "jwt_token_creds":
   330  		if credsChosen != credsTLS {
   331  			logger.Fatalf("TLS credentials need to be set for jwt_token_creds test case.")
   332  		}
   333  		interop.DoJWTTokenCreds(ctx, tc, *serviceAccountKeyFile)
   334  		logger.Infoln("JWTtokenCreds done")
   335  	case "per_rpc_creds":
   336  		if credsChosen != credsTLS {
   337  			logger.Fatalf("TLS credentials need to be set for per_rpc_creds test case.")
   338  		}
   339  		interop.DoPerRPCCreds(ctx, tc, *serviceAccountKeyFile, *oauthScope)
   340  		logger.Infoln("PerRPCCreds done")
   341  	case "oauth2_auth_token":
   342  		if credsChosen != credsTLS {
   343  			logger.Fatalf("TLS credentials need to be set for oauth2_auth_token test case.")
   344  		}
   345  		interop.DoOauth2TokenCreds(ctx, tc, *serviceAccountKeyFile, *oauthScope)
   346  		logger.Infoln("Oauth2TokenCreds done")
   347  	case "google_default_credentials":
   348  		if credsChosen != credsGoogleDefaultCreds {
   349  			logger.Fatalf("GoogleDefaultCredentials need to be set for google_default_credentials test case.")
   350  		}
   351  		interop.DoGoogleDefaultCredentials(ctx, tc, *defaultServiceAccount)
   352  		logger.Infoln("GoogleDefaultCredentials done")
   353  	case "compute_engine_channel_credentials":
   354  		if credsChosen != credsComputeEngineCreds {
   355  			logger.Fatalf("ComputeEngineCreds need to be set for compute_engine_channel_credentials test case.")
   356  		}
   357  		interop.DoComputeEngineChannelCredentials(ctx, tc, *defaultServiceAccount)
   358  		logger.Infoln("ComputeEngineChannelCredentials done")
   359  	case "cancel_after_begin":
   360  		interop.DoCancelAfterBegin(ctx, tc)
   361  		logger.Infoln("CancelAfterBegin done")
   362  	case "cancel_after_first_response":
   363  		interop.DoCancelAfterFirstResponse(ctx, tc)
   364  		logger.Infoln("CancelAfterFirstResponse done")
   365  	case "status_code_and_message":
   366  		interop.DoStatusCodeAndMessage(ctx, tc)
   367  		logger.Infoln("StatusCodeAndMessage done")
   368  	case "special_status_message":
   369  		interop.DoSpecialStatusMessage(ctx, tc)
   370  		logger.Infoln("SpecialStatusMessage done")
   371  	case "custom_metadata":
   372  		interop.DoCustomMetadata(ctx, tc)
   373  		logger.Infoln("CustomMetadata done")
   374  	case "unimplemented_method":
   375  		interop.DoUnimplementedMethod(ctx, conn)
   376  		logger.Infoln("UnimplementedMethod done")
   377  	case "unimplemented_service":
   378  		interop.DoUnimplementedService(ctx, testgrpc.NewUnimplementedServiceClient(conn))
   379  		logger.Infoln("UnimplementedService done")
   380  	case "pick_first_unary":
   381  		interop.DoPickFirstUnary(ctx, tc)
   382  		logger.Infoln("PickFirstUnary done")
   383  	case "rpc_soak":
   384  		rpcSoakConfig := createBaseSoakConfig(serverAddr)
   385  		rpcSoakConfig.ChannelForTest = func() (*grpc.ClientConn, func()) { return conn, func() {} }
   386  		interop.DoSoakTest(ctxWithDeadline, rpcSoakConfig)
   387  		logger.Infoln("RpcSoak done")
   388  	case "channel_soak":
   389  		channelSoakConfig := createBaseSoakConfig(serverAddr)
   390  		channelSoakConfig.ChannelForTest = func() (*grpc.ClientConn, func()) {
   391  			cc, err := grpc.NewClient(serverAddr, opts...)
   392  			if err != nil {
   393  				log.Fatalf("Failed to create shared channel: %v", err)
   394  			}
   395  			return cc, func() { cc.Close() }
   396  		}
   397  		interop.DoSoakTest(ctxWithDeadline, channelSoakConfig)
   398  		logger.Infoln("ChannelSoak done")
   399  	case "orca_per_rpc":
   400  		interop.DoORCAPerRPCTest(ctx, tc)
   401  		logger.Infoln("ORCAPerRPC done")
   402  	case "orca_oob":
   403  		interop.DoORCAOOBTest(ctx, tc)
   404  		logger.Infoln("ORCAOOB done")
   405  	default:
   406  		logger.Fatal("Unsupported test case: ", *testCase)
   407  	}
   408  }