Add Go interop http2 client
This commit is contained in:
174
interop/http2/negative_http2_client.go
Normal file
174
interop/http2/negative_http2_client.go
Normal file
@ -0,0 +1,174 @@
|
|||||||
|
/*
|
||||||
|
*
|
||||||
|
* Copyright 2016, Google Inc.
|
||||||
|
* All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions are
|
||||||
|
* met:
|
||||||
|
*
|
||||||
|
* * Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
* * Redistributions in binary form must reproduce the above
|
||||||
|
* copyright notice, this list of conditions and the following disclaimer
|
||||||
|
* in the documentation and/or other materials provided with the
|
||||||
|
* distribution.
|
||||||
|
* * Neither the name of Google Inc. nor the names of its
|
||||||
|
* contributors may be used to endorse or promote products derived from
|
||||||
|
* this software without specific prior written permission.
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||||||
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||||||
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
||||||
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
||||||
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||||
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
||||||
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
||||||
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
||||||
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
||||||
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
*
|
||||||
|
*
|
||||||
|
* Client used to test http2 error edge cases like GOAWAYs and RST_STREAMs
|
||||||
|
*
|
||||||
|
* Documentation:
|
||||||
|
* https://github.com/grpc/grpc/blob/master/doc/negative-http2-interop-test-descriptions.md
|
||||||
|
*/
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"flag"
|
||||||
|
"net"
|
||||||
|
"strconv"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/golang/protobuf/proto"
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
"google.golang.org/grpc"
|
||||||
|
"google.golang.org/grpc/codes"
|
||||||
|
"google.golang.org/grpc/grpclog"
|
||||||
|
"google.golang.org/grpc/interop"
|
||||||
|
testpb "google.golang.org/grpc/interop/grpc_testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
serverHost = flag.String("server_host", "127.0.0.1", "The server host name")
|
||||||
|
serverPort = flag.Int("server_port", 8080, "The server port number")
|
||||||
|
testCase = flag.String("test_case", "goaway",
|
||||||
|
`Configure different test cases. Valid options are:
|
||||||
|
goaway : client sends two requests, the server will send a goaway in between;
|
||||||
|
rst_after_header : server will send rst_stream after it sends headers;
|
||||||
|
rst_during_data : server will send rst_stream while sending data;
|
||||||
|
rst_after_data : server will send rst_stream after sending data;
|
||||||
|
ping : server will send pings between each http2 frame;
|
||||||
|
max_streams : server will ensure that the max_concurrent_streams limit is upheld;`)
|
||||||
|
largeReqSize = 271828
|
||||||
|
largeRespSize = 314159
|
||||||
|
)
|
||||||
|
|
||||||
|
func largeSimpleRequest() *testpb.SimpleRequest {
|
||||||
|
pl := interop.ClientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
||||||
|
return &testpb.SimpleRequest{
|
||||||
|
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
||||||
|
ResponseSize: proto.Int32(int32(largeRespSize)),
|
||||||
|
Payload: pl,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// sends two unary calls. The server asserts that the calls use different connections.
|
||||||
|
func goaway(tc testpb.TestServiceClient) {
|
||||||
|
interop.DoLargeUnaryCall(tc)
|
||||||
|
// sleep to ensure that the client has time to recv the GOAWAY.
|
||||||
|
// TODO(ncteisen): make this less hacky.
|
||||||
|
time.Sleep(1 * time.Second)
|
||||||
|
interop.DoLargeUnaryCall(tc)
|
||||||
|
}
|
||||||
|
|
||||||
|
func rstAfterHeader(tc testpb.TestServiceClient) {
|
||||||
|
req := largeSimpleRequest()
|
||||||
|
reply, err := tc.UnaryCall(context.Background(), req)
|
||||||
|
if reply != nil {
|
||||||
|
grpclog.Fatalf("Client received reply despite server sending rst stream after header")
|
||||||
|
}
|
||||||
|
if grpc.Code(err) != codes.Internal {
|
||||||
|
grpclog.Fatalf("%v.UnaryCall() = _, %v, want _, %v", tc, grpc.Code(err), codes.Internal)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func rstDuringData(tc testpb.TestServiceClient) {
|
||||||
|
req := largeSimpleRequest()
|
||||||
|
reply, err := tc.UnaryCall(context.Background(), req)
|
||||||
|
if reply != nil {
|
||||||
|
grpclog.Fatalf("Client received reply despite server sending rst stream during data")
|
||||||
|
}
|
||||||
|
if grpc.Code(err) != codes.Unknown {
|
||||||
|
grpclog.Fatalf("%v.UnaryCall() = _, %v, want _, %v", tc, grpc.Code(err), codes.Unknown)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func rstAfterData(tc testpb.TestServiceClient) {
|
||||||
|
req := largeSimpleRequest()
|
||||||
|
reply, err := tc.UnaryCall(context.Background(), req)
|
||||||
|
if reply != nil {
|
||||||
|
grpclog.Fatalf("Client received reply despite server sending rst stream after data")
|
||||||
|
}
|
||||||
|
if grpc.Code(err) != codes.Internal {
|
||||||
|
grpclog.Fatalf("%v.UnaryCall() = _, %v, want _, %v", tc, grpc.Code(err), codes.Internal)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func ping(tc testpb.TestServiceClient) {
|
||||||
|
// The server will assert that every ping it sends was ACK-ed by the client.
|
||||||
|
interop.DoLargeUnaryCall(tc)
|
||||||
|
}
|
||||||
|
|
||||||
|
func maxStreams(tc testpb.TestServiceClient) {
|
||||||
|
interop.DoLargeUnaryCall(tc)
|
||||||
|
var wg sync.WaitGroup
|
||||||
|
for i := 0; i < 15; i++ {
|
||||||
|
wg.Add(1)
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
interop.DoLargeUnaryCall(tc)
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
wg.Wait()
|
||||||
|
}
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
flag.Parse()
|
||||||
|
serverAddr := net.JoinHostPort(*serverHost, strconv.Itoa(*serverPort))
|
||||||
|
var opts []grpc.DialOption
|
||||||
|
opts = append(opts, grpc.WithInsecure())
|
||||||
|
conn, err := grpc.Dial(serverAddr, opts...)
|
||||||
|
if err != nil {
|
||||||
|
grpclog.Fatalf("Fail to dial: %v", err)
|
||||||
|
}
|
||||||
|
defer conn.Close()
|
||||||
|
tc := testpb.NewTestServiceClient(conn)
|
||||||
|
switch *testCase {
|
||||||
|
case "goaway":
|
||||||
|
goaway(tc)
|
||||||
|
grpclog.Println("goaway done")
|
||||||
|
case "rst_after_header":
|
||||||
|
rstAfterHeader(tc)
|
||||||
|
grpclog.Println("rst_after_header done")
|
||||||
|
case "rst_during_data":
|
||||||
|
rstDuringData(tc)
|
||||||
|
grpclog.Println("rst_during_data done")
|
||||||
|
case "rst_after_data":
|
||||||
|
rstAfterData(tc)
|
||||||
|
grpclog.Println("rst_after_data done")
|
||||||
|
case "ping":
|
||||||
|
ping(tc)
|
||||||
|
grpclog.Println("ping done")
|
||||||
|
case "max_streams":
|
||||||
|
maxStreams(tc)
|
||||||
|
grpclog.Println("max_streams done")
|
||||||
|
default:
|
||||||
|
grpclog.Fatal("Unsupported test case: ", *testCase)
|
||||||
|
}
|
||||||
|
}
|
@ -60,7 +60,8 @@ var (
|
|||||||
trailingMetadataKey = "x-grpc-test-echo-trailing-bin"
|
trailingMetadataKey = "x-grpc-test-echo-trailing-bin"
|
||||||
)
|
)
|
||||||
|
|
||||||
func clientNewPayload(t testpb.PayloadType, size int) *testpb.Payload {
|
// ClientNewPayload returns a payload of the given type and size.
|
||||||
|
func ClientNewPayload(t testpb.PayloadType, size int) *testpb.Payload {
|
||||||
if size < 0 {
|
if size < 0 {
|
||||||
grpclog.Fatalf("Requested a response with invalid length %d", size)
|
grpclog.Fatalf("Requested a response with invalid length %d", size)
|
||||||
}
|
}
|
||||||
@ -91,7 +92,7 @@ func DoEmptyUnaryCall(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
|||||||
|
|
||||||
// DoLargeUnaryCall performs a unary RPC with large payload in the request and response.
|
// DoLargeUnaryCall performs a unary RPC with large payload in the request and response.
|
||||||
func DoLargeUnaryCall(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
func DoLargeUnaryCall(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
||||||
pl := clientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
||||||
req := &testpb.SimpleRequest{
|
req := &testpb.SimpleRequest{
|
||||||
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
||||||
ResponseSize: proto.Int32(int32(largeRespSize)),
|
ResponseSize: proto.Int32(int32(largeRespSize)),
|
||||||
@ -116,7 +117,7 @@ func DoClientStreaming(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
|||||||
}
|
}
|
||||||
var sum int
|
var sum int
|
||||||
for _, s := range reqSizes {
|
for _, s := range reqSizes {
|
||||||
pl := clientNewPayload(testpb.PayloadType_COMPRESSABLE, s)
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, s)
|
||||||
req := &testpb.StreamingInputCallRequest{
|
req := &testpb.StreamingInputCallRequest{
|
||||||
Payload: pl,
|
Payload: pl,
|
||||||
}
|
}
|
||||||
@ -193,7 +194,7 @@ func DoPingPong(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
|||||||
Size: proto.Int32(int32(respSizes[index])),
|
Size: proto.Int32(int32(respSizes[index])),
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
pl := clientNewPayload(testpb.PayloadType_COMPRESSABLE, reqSizes[index])
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, reqSizes[index])
|
||||||
req := &testpb.StreamingOutputCallRequest{
|
req := &testpb.StreamingOutputCallRequest{
|
||||||
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
||||||
ResponseParameters: respParam,
|
ResponseParameters: respParam,
|
||||||
@ -249,7 +250,7 @@ func DoTimeoutOnSleepingServer(tc testpb.TestServiceClient, args ...grpc.CallOpt
|
|||||||
}
|
}
|
||||||
grpclog.Fatalf("%v.FullDuplexCall(_) = _, %v", tc, err)
|
grpclog.Fatalf("%v.FullDuplexCall(_) = _, %v", tc, err)
|
||||||
}
|
}
|
||||||
pl := clientNewPayload(testpb.PayloadType_COMPRESSABLE, 27182)
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, 27182)
|
||||||
req := &testpb.StreamingOutputCallRequest{
|
req := &testpb.StreamingOutputCallRequest{
|
||||||
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
||||||
Payload: pl,
|
Payload: pl,
|
||||||
@ -266,7 +267,7 @@ func DoTimeoutOnSleepingServer(tc testpb.TestServiceClient, args ...grpc.CallOpt
|
|||||||
|
|
||||||
// DoComputeEngineCreds performs a unary RPC with compute engine auth.
|
// DoComputeEngineCreds performs a unary RPC with compute engine auth.
|
||||||
func DoComputeEngineCreds(tc testpb.TestServiceClient, serviceAccount, oauthScope string) {
|
func DoComputeEngineCreds(tc testpb.TestServiceClient, serviceAccount, oauthScope string) {
|
||||||
pl := clientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
||||||
req := &testpb.SimpleRequest{
|
req := &testpb.SimpleRequest{
|
||||||
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
||||||
ResponseSize: proto.Int32(int32(largeRespSize)),
|
ResponseSize: proto.Int32(int32(largeRespSize)),
|
||||||
@ -298,7 +299,7 @@ func getServiceAccountJSONKey(keyFile string) []byte {
|
|||||||
|
|
||||||
// DoServiceAccountCreds performs a unary RPC with service account auth.
|
// DoServiceAccountCreds performs a unary RPC with service account auth.
|
||||||
func DoServiceAccountCreds(tc testpb.TestServiceClient, serviceAccountKeyFile, oauthScope string) {
|
func DoServiceAccountCreds(tc testpb.TestServiceClient, serviceAccountKeyFile, oauthScope string) {
|
||||||
pl := clientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
||||||
req := &testpb.SimpleRequest{
|
req := &testpb.SimpleRequest{
|
||||||
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
||||||
ResponseSize: proto.Int32(int32(largeRespSize)),
|
ResponseSize: proto.Int32(int32(largeRespSize)),
|
||||||
@ -323,7 +324,7 @@ func DoServiceAccountCreds(tc testpb.TestServiceClient, serviceAccountKeyFile, o
|
|||||||
|
|
||||||
// DoJWTTokenCreds performs a unary RPC with JWT token auth.
|
// DoJWTTokenCreds performs a unary RPC with JWT token auth.
|
||||||
func DoJWTTokenCreds(tc testpb.TestServiceClient, serviceAccountKeyFile string) {
|
func DoJWTTokenCreds(tc testpb.TestServiceClient, serviceAccountKeyFile string) {
|
||||||
pl := clientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
||||||
req := &testpb.SimpleRequest{
|
req := &testpb.SimpleRequest{
|
||||||
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
||||||
ResponseSize: proto.Int32(int32(largeRespSize)),
|
ResponseSize: proto.Int32(int32(largeRespSize)),
|
||||||
@ -357,7 +358,7 @@ func GetToken(serviceAccountKeyFile string, oauthScope string) *oauth2.Token {
|
|||||||
|
|
||||||
// DoOauth2TokenCreds performs a unary RPC with OAUTH2 token auth.
|
// DoOauth2TokenCreds performs a unary RPC with OAUTH2 token auth.
|
||||||
func DoOauth2TokenCreds(tc testpb.TestServiceClient, serviceAccountKeyFile, oauthScope string) {
|
func DoOauth2TokenCreds(tc testpb.TestServiceClient, serviceAccountKeyFile, oauthScope string) {
|
||||||
pl := clientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
||||||
req := &testpb.SimpleRequest{
|
req := &testpb.SimpleRequest{
|
||||||
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
||||||
ResponseSize: proto.Int32(int32(largeRespSize)),
|
ResponseSize: proto.Int32(int32(largeRespSize)),
|
||||||
@ -383,7 +384,7 @@ func DoOauth2TokenCreds(tc testpb.TestServiceClient, serviceAccountKeyFile, oaut
|
|||||||
// DoPerRPCCreds performs a unary RPC with per RPC OAUTH2 token.
|
// DoPerRPCCreds performs a unary RPC with per RPC OAUTH2 token.
|
||||||
func DoPerRPCCreds(tc testpb.TestServiceClient, serviceAccountKeyFile, oauthScope string) {
|
func DoPerRPCCreds(tc testpb.TestServiceClient, serviceAccountKeyFile, oauthScope string) {
|
||||||
jsonKey := getServiceAccountJSONKey(serviceAccountKeyFile)
|
jsonKey := getServiceAccountJSONKey(serviceAccountKeyFile)
|
||||||
pl := clientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
||||||
req := &testpb.SimpleRequest{
|
req := &testpb.SimpleRequest{
|
||||||
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
||||||
ResponseSize: proto.Int32(int32(largeRespSize)),
|
ResponseSize: proto.Int32(int32(largeRespSize)),
|
||||||
@ -441,7 +442,7 @@ func DoCancelAfterFirstResponse(tc testpb.TestServiceClient, args ...grpc.CallOp
|
|||||||
Size: proto.Int32(31415),
|
Size: proto.Int32(31415),
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
pl := clientNewPayload(testpb.PayloadType_COMPRESSABLE, 27182)
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, 27182)
|
||||||
req := &testpb.StreamingOutputCallRequest{
|
req := &testpb.StreamingOutputCallRequest{
|
||||||
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
||||||
ResponseParameters: respParam,
|
ResponseParameters: respParam,
|
||||||
@ -486,7 +487,7 @@ func validateMetadata(header, trailer metadata.MD) {
|
|||||||
// DoCustomMetadata checks that metadata is echoed back to the client.
|
// DoCustomMetadata checks that metadata is echoed back to the client.
|
||||||
func DoCustomMetadata(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
func DoCustomMetadata(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
||||||
// Testing with UnaryCall.
|
// Testing with UnaryCall.
|
||||||
pl := clientNewPayload(testpb.PayloadType_COMPRESSABLE, 1)
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, 1)
|
||||||
req := &testpb.SimpleRequest{
|
req := &testpb.SimpleRequest{
|
||||||
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
ResponseType: testpb.PayloadType_COMPRESSABLE.Enum(),
|
||||||
ResponseSize: proto.Int32(int32(1)),
|
ResponseSize: proto.Int32(int32(1)),
|
||||||
|
Reference in New Issue
Block a user