mirror of
https://github.com/fnproject/fn.git
synced 2022-10-28 21:29:17 +03:00
* Initial stab at the protocol * initial protocol sketch for node pool manager * Added http header frame as a message * Force the use of WithAgent variants when creating a server * adds grpc models for node pool manager plus go deps * Naming things is really hard * Merge (and optionally purge) details received by the NPM * WIP: starting to add the runner-side functionality of the new data plane * WIP: Basic startup of grpc server for pure runner. Needs proper certs. * Go fmt * Initial agent for LB nodes. * Agent implementation for LB nodes. * Pass keys and certs to LB node agent. * Remove accidentally left reference to env var. * Add env variables for certificate files * stub out the capacity and group membership server channels * implement server-side runner manager service * removes unused variable * fixes build error * splits up GetCall and GetLBGroupId * Change LB node agent to use TLS connection. * Encode call model as JSON to send to runner node. * Use hybrid client in LB node agent. This should provide access to get app and route information for the call from an API node. * More error handling on the pure runner side * Tentative fix for GetCall problem: set deadlines correctly when reserving slot * Connect loop for LB agent to runner nodes. * Extract runner connection function in LB agent. * drops committed capacity counts * Bugfix - end state tracker only in submit * Do logs properly * adds first pass of tracking capacity metrics in agent * maked memory capacity metric uint64 * maked memory capacity metric uint64 * removes use of old capacity field * adds remove capacity call * merges overwritten reconnect logic * First pass of a NPM Provide a service that talks to a (simulated) CP. - Receive incoming capacity assertions from LBs for LBGs - expire LB requests after a short period - ask the CP to add runners to a LBG - note runner set changes and readvertise - scale down by marking runners as "draining" - shut off draining runners after some cool-down period * add capacity update on schedule * Send periodic capcacity metrics Sending capcacity metrics to node pool manager * splits grpc and api interfaces for capacity manager * failure to advertise capacity shouldn't panic * Add some instructions for starting DP/CP parts. * Create the poolmanager server with TLS * Use logrus * Get npm compiling with cert fixups. * Fix: pure runner should not start async processing * brings runner, nulb and npm together * Add field to acknowledgment to record slot allocation latency; fix a bug too * iterating on pool manager locking issue * raises timeout of placement retry loop * Fix up NPM Improve logging Ensure that channels etc. are actually initialised in the structure creation! * Update the docs - runners GRPC port is 9120 * Bugfix: return runner pool accurately. * Double locking * Note purges as LBs stop talking to us * Get the purging of old LBs working. * Tweak: on restart, load runner set before making scaling decisions. * more agent synchronization improvements * Deal with teh CP pulling out active hosts from under us. * lock at lbgroup level * Send request and receive response from runner. * Add capacity check right before slot reservation * Pass the full Call into the receive loop. * Wait for the data from the runner before finishing * force runner list refresh every time * Don't init db and mq for pure runners * adds shutdown of npm * fixes broken log line * Extract an interface for the Predictor used by the NPM * purge drained connections from npm * Refactor of the LB agent into the agent package * removes capacitytest wip * Fix undefined err issue * updating README for poolmanager set up * ues retrying dial for lb to npm connections * Rename lb_calls to lb_agent now that all functionality is there * Use the right deadline and errors in LBAgent * Make stream error flag per-call rather than global otherwise the whole runner is damaged by one call dropping * abstracting gRPCNodePool * Make stream error flag per-call rather than global otherwise the whole runner is damaged by one call dropping * Add some init checks for LB and pure runner nodes * adding some useful debug * Fix default db and mq for lb node * removes unreachable code, fixes typo * Use datastore as logstore in API nodes. This fixes a bug caused by trying to insert logs into a nil logstore. It was nil because it wasn't being set for API nodes. * creates placement abstraction and moves capacity APIs to NodePool * removed TODO, added logging * Dial reconnections for LB <-> runners LB grpc connections to runners are established using a backoff stategy in event of reconnections, this allows to let the LB up even in case one of the runners go away and reconnect to it as soon as it is back. * Add a status call to the Runner protocol Stub at the moment. To be used for things like draindown, health checks. * Remove comment. * makes assign/release capacity lockless * Fix hanging issue in lb agent when connections drop * Add the CH hash from fnlb Select this with FN_PLACER=ch when launching the LB. * small improvement for locking on reloadLBGmembership * Stabilise the list of Runenrs returned by NodePool The NodePoolManager makes some attempt to keep the list of runner nodes advertised as stable as possible. Let's preserve this effort in the client side. The main point of this is to attempt to keep the same runner at the same inxed in the []Runner returned by NodePool.Runners(lbgid); the ch algorithm likes it when this is the case. * Factor out a generator function for the Runners so that mocks can be injected * temporarily allow lbgroup to be specified in HTTP header, while we sort out changes to the model * fixes bug with nil runners * Initial work for mocking things in tests * fix for anonymouse go routine error * fixing lb_test to compile * Refactor: internal objects for gRPCNodePool are now injectable, with defaults for the real world case * Make GRPC port configurable, fix weird handling of web port too * unit test reload Members * check on runner creation failure * adding nullRunner in case of failure during runner creation * Refactored capacity advertisements/aggregations. Made grpc advertisement post asynchronous and non-blocking. * make capacityEntry private * Change the runner gRPC bind address. This uses the existing `whoAmI` function, so that the gRPC server works when the runner is running on a different host. * Add support for multiple fixed runners to pool mgr * Added harness for dataplane system tests, minor refactors * Add Dockerfiles for components, along with docs. * Doc fix: second runner needs a different name. * Let us have three runners in system tests, why not * The first system test running a function in API/LB/PureRunner mode * Add unit test for Advertiser logic * Fix issue with Pure Runner not sending the last data frame * use config in models.Call as a temporary mechanism to override lb group ID * make gofmt happy * Updates documentation for how to configure lb groups for an app/route * small refactor unit test * Factor NodePool into its own package * Lots of fixes to Pure Runner - concurrency woes with errors and cancellations * New dataplane with static runnerpool (#813) Added static node pool as default implementation * moved nullRunner to grpc package * remove duplication in README * fix go vet issues * Fix server initialisation in api tests * Tiny logging changes in pool manager. Using `WithError` instead of `Errorf` when appropriate. * Change some log levels in the pure runner * fixing readme * moves multitenant compute documentation * adds introduction to multitenant readme * Proper triggering of system tests in makefile * Fix insructions about starting up the components * Change db file for system tests to avoid contention in parallel tests * fixes revisions from merge * Fix merge issue with handling of reserved slot * renaming nulb to lb in the doc and images folder * better TryExec sleep logic clean shutdown In this change we implement a better way to deal with the sleep inside the for loop during the attempt for placing a call. Plus we added a clean way to shutdown the connections with external component when we shut down the server. * System_test mysql port set mysql port for system test to a different value to the one set for the api tests to avoid conflicts as they can run in parallel. * change the container name for system-test * removes flaky test TestRouteRunnerExecution pending resolution by issue #796 * amend remove_containers to remove new added containers * Rework capacity reservation logic at a higher level for now * LB agent implements Submit rather than delegating. * Fix go vet linting errors * Changed a couple of error levels * Fix formatting * removes commmented out test * adds snappy to vendor directory * updates Gopkg and vendor directories, removing snappy and addhing siphash * wait for db containers to come up before starting the tests * make system tests start API node on 8085 to avoid port conflict with api_tests * avoid port conflicts with api_test.sh which are run in parallel * fixes postgres port conflict and issue with removal of old containers * Remove spurious println
746 lines
24 KiB
Go
746 lines
24 KiB
Go
/*
|
|
*
|
|
* Copyright 2014 gRPC authors.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*
|
|
*/
|
|
|
|
//go:generate protoc --go_out=plugins=grpc:. grpc_testing/test.proto
|
|
|
|
package interop
|
|
|
|
import (
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/golang/protobuf/proto"
|
|
"golang.org/x/net/context"
|
|
"golang.org/x/oauth2"
|
|
"golang.org/x/oauth2/google"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/codes"
|
|
"google.golang.org/grpc/grpclog"
|
|
testpb "google.golang.org/grpc/interop/grpc_testing"
|
|
"google.golang.org/grpc/metadata"
|
|
"google.golang.org/grpc/status"
|
|
)
|
|
|
|
var (
|
|
reqSizes = []int{27182, 8, 1828, 45904}
|
|
respSizes = []int{31415, 9, 2653, 58979}
|
|
largeReqSize = 271828
|
|
largeRespSize = 314159
|
|
initialMetadataKey = "x-grpc-test-echo-initial"
|
|
trailingMetadataKey = "x-grpc-test-echo-trailing-bin"
|
|
)
|
|
|
|
// ClientNewPayload returns a payload of the given type and size.
|
|
func ClientNewPayload(t testpb.PayloadType, size int) *testpb.Payload {
|
|
if size < 0 {
|
|
grpclog.Fatalf("Requested a response with invalid length %d", size)
|
|
}
|
|
body := make([]byte, size)
|
|
switch t {
|
|
case testpb.PayloadType_COMPRESSABLE:
|
|
case testpb.PayloadType_UNCOMPRESSABLE:
|
|
grpclog.Fatalf("PayloadType UNCOMPRESSABLE is not supported")
|
|
default:
|
|
grpclog.Fatalf("Unsupported payload type: %d", t)
|
|
}
|
|
return &testpb.Payload{
|
|
Type: t,
|
|
Body: body,
|
|
}
|
|
}
|
|
|
|
// DoEmptyUnaryCall performs a unary RPC with empty request and response messages.
|
|
func DoEmptyUnaryCall(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
|
reply, err := tc.EmptyCall(context.Background(), &testpb.Empty{}, args...)
|
|
if err != nil {
|
|
grpclog.Fatal("/TestService/EmptyCall RPC failed: ", err)
|
|
}
|
|
if !proto.Equal(&testpb.Empty{}, reply) {
|
|
grpclog.Fatalf("/TestService/EmptyCall receives %v, want %v", reply, testpb.Empty{})
|
|
}
|
|
}
|
|
|
|
// DoLargeUnaryCall performs a unary RPC with large payload in the request and response.
|
|
func DoLargeUnaryCall(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
|
req := &testpb.SimpleRequest{
|
|
ResponseType: testpb.PayloadType_COMPRESSABLE,
|
|
ResponseSize: int32(largeRespSize),
|
|
Payload: pl,
|
|
}
|
|
reply, err := tc.UnaryCall(context.Background(), req, args...)
|
|
if err != nil {
|
|
grpclog.Fatal("/TestService/UnaryCall RPC failed: ", err)
|
|
}
|
|
t := reply.GetPayload().GetType()
|
|
s := len(reply.GetPayload().GetBody())
|
|
if t != testpb.PayloadType_COMPRESSABLE || s != largeRespSize {
|
|
grpclog.Fatalf("Got the reply with type %d len %d; want %d, %d", t, s, testpb.PayloadType_COMPRESSABLE, largeRespSize)
|
|
}
|
|
}
|
|
|
|
// DoClientStreaming performs a client streaming RPC.
|
|
func DoClientStreaming(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
|
stream, err := tc.StreamingInputCall(context.Background(), args...)
|
|
if err != nil {
|
|
grpclog.Fatalf("%v.StreamingInputCall(_) = _, %v", tc, err)
|
|
}
|
|
var sum int
|
|
for _, s := range reqSizes {
|
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, s)
|
|
req := &testpb.StreamingInputCallRequest{
|
|
Payload: pl,
|
|
}
|
|
if err := stream.Send(req); err != nil {
|
|
grpclog.Fatalf("%v has error %v while sending %v", stream, err, req)
|
|
}
|
|
sum += s
|
|
}
|
|
reply, err := stream.CloseAndRecv()
|
|
if err != nil {
|
|
grpclog.Fatalf("%v.CloseAndRecv() got error %v, want %v", stream, err, nil)
|
|
}
|
|
if reply.GetAggregatedPayloadSize() != int32(sum) {
|
|
grpclog.Fatalf("%v.CloseAndRecv().GetAggregatePayloadSize() = %v; want %v", stream, reply.GetAggregatedPayloadSize(), sum)
|
|
}
|
|
}
|
|
|
|
// DoServerStreaming performs a server streaming RPC.
|
|
func DoServerStreaming(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
|
respParam := make([]*testpb.ResponseParameters, len(respSizes))
|
|
for i, s := range respSizes {
|
|
respParam[i] = &testpb.ResponseParameters{
|
|
Size: int32(s),
|
|
}
|
|
}
|
|
req := &testpb.StreamingOutputCallRequest{
|
|
ResponseType: testpb.PayloadType_COMPRESSABLE,
|
|
ResponseParameters: respParam,
|
|
}
|
|
stream, err := tc.StreamingOutputCall(context.Background(), req, args...)
|
|
if err != nil {
|
|
grpclog.Fatalf("%v.StreamingOutputCall(_) = _, %v", tc, err)
|
|
}
|
|
var rpcStatus error
|
|
var respCnt int
|
|
var index int
|
|
for {
|
|
reply, err := stream.Recv()
|
|
if err != nil {
|
|
rpcStatus = err
|
|
break
|
|
}
|
|
t := reply.GetPayload().GetType()
|
|
if t != testpb.PayloadType_COMPRESSABLE {
|
|
grpclog.Fatalf("Got the reply of type %d, want %d", t, testpb.PayloadType_COMPRESSABLE)
|
|
}
|
|
size := len(reply.GetPayload().GetBody())
|
|
if size != int(respSizes[index]) {
|
|
grpclog.Fatalf("Got reply body of length %d, want %d", size, respSizes[index])
|
|
}
|
|
index++
|
|
respCnt++
|
|
}
|
|
if rpcStatus != io.EOF {
|
|
grpclog.Fatalf("Failed to finish the server streaming rpc: %v", rpcStatus)
|
|
}
|
|
if respCnt != len(respSizes) {
|
|
grpclog.Fatalf("Got %d reply, want %d", len(respSizes), respCnt)
|
|
}
|
|
}
|
|
|
|
// DoPingPong performs ping-pong style bi-directional streaming RPC.
|
|
func DoPingPong(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
|
stream, err := tc.FullDuplexCall(context.Background(), args...)
|
|
if err != nil {
|
|
grpclog.Fatalf("%v.FullDuplexCall(_) = _, %v", tc, err)
|
|
}
|
|
var index int
|
|
for index < len(reqSizes) {
|
|
respParam := []*testpb.ResponseParameters{
|
|
{
|
|
Size: int32(respSizes[index]),
|
|
},
|
|
}
|
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, reqSizes[index])
|
|
req := &testpb.StreamingOutputCallRequest{
|
|
ResponseType: testpb.PayloadType_COMPRESSABLE,
|
|
ResponseParameters: respParam,
|
|
Payload: pl,
|
|
}
|
|
if err := stream.Send(req); err != nil {
|
|
grpclog.Fatalf("%v has error %v while sending %v", stream, err, req)
|
|
}
|
|
reply, err := stream.Recv()
|
|
if err != nil {
|
|
grpclog.Fatalf("%v.Recv() = %v", stream, err)
|
|
}
|
|
t := reply.GetPayload().GetType()
|
|
if t != testpb.PayloadType_COMPRESSABLE {
|
|
grpclog.Fatalf("Got the reply of type %d, want %d", t, testpb.PayloadType_COMPRESSABLE)
|
|
}
|
|
size := len(reply.GetPayload().GetBody())
|
|
if size != int(respSizes[index]) {
|
|
grpclog.Fatalf("Got reply body of length %d, want %d", size, respSizes[index])
|
|
}
|
|
index++
|
|
}
|
|
if err := stream.CloseSend(); err != nil {
|
|
grpclog.Fatalf("%v.CloseSend() got %v, want %v", stream, err, nil)
|
|
}
|
|
if _, err := stream.Recv(); err != io.EOF {
|
|
grpclog.Fatalf("%v failed to complele the ping pong test: %v", stream, err)
|
|
}
|
|
}
|
|
|
|
// DoEmptyStream sets up a bi-directional streaming with zero message.
|
|
func DoEmptyStream(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
|
stream, err := tc.FullDuplexCall(context.Background(), args...)
|
|
if err != nil {
|
|
grpclog.Fatalf("%v.FullDuplexCall(_) = _, %v", tc, err)
|
|
}
|
|
if err := stream.CloseSend(); err != nil {
|
|
grpclog.Fatalf("%v.CloseSend() got %v, want %v", stream, err, nil)
|
|
}
|
|
if _, err := stream.Recv(); err != io.EOF {
|
|
grpclog.Fatalf("%v failed to complete the empty stream test: %v", stream, err)
|
|
}
|
|
}
|
|
|
|
// DoTimeoutOnSleepingServer performs an RPC on a sleep server which causes RPC timeout.
|
|
func DoTimeoutOnSleepingServer(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
|
ctx, cancel := context.WithTimeout(context.Background(), 1*time.Millisecond)
|
|
defer cancel()
|
|
stream, err := tc.FullDuplexCall(ctx, args...)
|
|
if err != nil {
|
|
if status.Code(err) == codes.DeadlineExceeded {
|
|
return
|
|
}
|
|
grpclog.Fatalf("%v.FullDuplexCall(_) = _, %v", tc, err)
|
|
}
|
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, 27182)
|
|
req := &testpb.StreamingOutputCallRequest{
|
|
ResponseType: testpb.PayloadType_COMPRESSABLE,
|
|
Payload: pl,
|
|
}
|
|
if err := stream.Send(req); err != nil && err != io.EOF {
|
|
grpclog.Fatalf("%v.Send(_) = %v", stream, err)
|
|
}
|
|
if _, err := stream.Recv(); status.Code(err) != codes.DeadlineExceeded {
|
|
grpclog.Fatalf("%v.Recv() = _, %v, want error code %d", stream, err, codes.DeadlineExceeded)
|
|
}
|
|
}
|
|
|
|
// DoComputeEngineCreds performs a unary RPC with compute engine auth.
|
|
func DoComputeEngineCreds(tc testpb.TestServiceClient, serviceAccount, oauthScope string) {
|
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
|
req := &testpb.SimpleRequest{
|
|
ResponseType: testpb.PayloadType_COMPRESSABLE,
|
|
ResponseSize: int32(largeRespSize),
|
|
Payload: pl,
|
|
FillUsername: true,
|
|
FillOauthScope: true,
|
|
}
|
|
reply, err := tc.UnaryCall(context.Background(), req)
|
|
if err != nil {
|
|
grpclog.Fatal("/TestService/UnaryCall RPC failed: ", err)
|
|
}
|
|
user := reply.GetUsername()
|
|
scope := reply.GetOauthScope()
|
|
if user != serviceAccount {
|
|
grpclog.Fatalf("Got user name %q, want %q.", user, serviceAccount)
|
|
}
|
|
if !strings.Contains(oauthScope, scope) {
|
|
grpclog.Fatalf("Got OAuth scope %q which is NOT a substring of %q.", scope, oauthScope)
|
|
}
|
|
}
|
|
|
|
func getServiceAccountJSONKey(keyFile string) []byte {
|
|
jsonKey, err := ioutil.ReadFile(keyFile)
|
|
if err != nil {
|
|
grpclog.Fatalf("Failed to read the service account key file: %v", err)
|
|
}
|
|
return jsonKey
|
|
}
|
|
|
|
// DoServiceAccountCreds performs a unary RPC with service account auth.
|
|
func DoServiceAccountCreds(tc testpb.TestServiceClient, serviceAccountKeyFile, oauthScope string) {
|
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
|
req := &testpb.SimpleRequest{
|
|
ResponseType: testpb.PayloadType_COMPRESSABLE,
|
|
ResponseSize: int32(largeRespSize),
|
|
Payload: pl,
|
|
FillUsername: true,
|
|
FillOauthScope: true,
|
|
}
|
|
reply, err := tc.UnaryCall(context.Background(), req)
|
|
if err != nil {
|
|
grpclog.Fatal("/TestService/UnaryCall RPC failed: ", err)
|
|
}
|
|
jsonKey := getServiceAccountJSONKey(serviceAccountKeyFile)
|
|
user := reply.GetUsername()
|
|
scope := reply.GetOauthScope()
|
|
if !strings.Contains(string(jsonKey), user) {
|
|
grpclog.Fatalf("Got user name %q which is NOT a substring of %q.", user, jsonKey)
|
|
}
|
|
if !strings.Contains(oauthScope, scope) {
|
|
grpclog.Fatalf("Got OAuth scope %q which is NOT a substring of %q.", scope, oauthScope)
|
|
}
|
|
}
|
|
|
|
// DoJWTTokenCreds performs a unary RPC with JWT token auth.
|
|
func DoJWTTokenCreds(tc testpb.TestServiceClient, serviceAccountKeyFile string) {
|
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
|
req := &testpb.SimpleRequest{
|
|
ResponseType: testpb.PayloadType_COMPRESSABLE,
|
|
ResponseSize: int32(largeRespSize),
|
|
Payload: pl,
|
|
FillUsername: true,
|
|
}
|
|
reply, err := tc.UnaryCall(context.Background(), req)
|
|
if err != nil {
|
|
grpclog.Fatal("/TestService/UnaryCall RPC failed: ", err)
|
|
}
|
|
jsonKey := getServiceAccountJSONKey(serviceAccountKeyFile)
|
|
user := reply.GetUsername()
|
|
if !strings.Contains(string(jsonKey), user) {
|
|
grpclog.Fatalf("Got user name %q which is NOT a substring of %q.", user, jsonKey)
|
|
}
|
|
}
|
|
|
|
// GetToken obtains an OAUTH token from the input.
|
|
func GetToken(serviceAccountKeyFile string, oauthScope string) *oauth2.Token {
|
|
jsonKey := getServiceAccountJSONKey(serviceAccountKeyFile)
|
|
config, err := google.JWTConfigFromJSON(jsonKey, oauthScope)
|
|
if err != nil {
|
|
grpclog.Fatalf("Failed to get the config: %v", err)
|
|
}
|
|
token, err := config.TokenSource(context.Background()).Token()
|
|
if err != nil {
|
|
grpclog.Fatalf("Failed to get the token: %v", err)
|
|
}
|
|
return token
|
|
}
|
|
|
|
// DoOauth2TokenCreds performs a unary RPC with OAUTH2 token auth.
|
|
func DoOauth2TokenCreds(tc testpb.TestServiceClient, serviceAccountKeyFile, oauthScope string) {
|
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
|
req := &testpb.SimpleRequest{
|
|
ResponseType: testpb.PayloadType_COMPRESSABLE,
|
|
ResponseSize: int32(largeRespSize),
|
|
Payload: pl,
|
|
FillUsername: true,
|
|
FillOauthScope: true,
|
|
}
|
|
reply, err := tc.UnaryCall(context.Background(), req)
|
|
if err != nil {
|
|
grpclog.Fatal("/TestService/UnaryCall RPC failed: ", err)
|
|
}
|
|
jsonKey := getServiceAccountJSONKey(serviceAccountKeyFile)
|
|
user := reply.GetUsername()
|
|
scope := reply.GetOauthScope()
|
|
if !strings.Contains(string(jsonKey), user) {
|
|
grpclog.Fatalf("Got user name %q which is NOT a substring of %q.", user, jsonKey)
|
|
}
|
|
if !strings.Contains(oauthScope, scope) {
|
|
grpclog.Fatalf("Got OAuth scope %q which is NOT a substring of %q.", scope, oauthScope)
|
|
}
|
|
}
|
|
|
|
// DoPerRPCCreds performs a unary RPC with per RPC OAUTH2 token.
|
|
func DoPerRPCCreds(tc testpb.TestServiceClient, serviceAccountKeyFile, oauthScope string) {
|
|
jsonKey := getServiceAccountJSONKey(serviceAccountKeyFile)
|
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, largeReqSize)
|
|
req := &testpb.SimpleRequest{
|
|
ResponseType: testpb.PayloadType_COMPRESSABLE,
|
|
ResponseSize: int32(largeRespSize),
|
|
Payload: pl,
|
|
FillUsername: true,
|
|
FillOauthScope: true,
|
|
}
|
|
token := GetToken(serviceAccountKeyFile, oauthScope)
|
|
kv := map[string]string{"authorization": token.Type() + " " + token.AccessToken}
|
|
ctx := metadata.NewOutgoingContext(context.Background(), metadata.MD{"authorization": []string{kv["authorization"]}})
|
|
reply, err := tc.UnaryCall(ctx, req)
|
|
if err != nil {
|
|
grpclog.Fatal("/TestService/UnaryCall RPC failed: ", err)
|
|
}
|
|
user := reply.GetUsername()
|
|
scope := reply.GetOauthScope()
|
|
if !strings.Contains(string(jsonKey), user) {
|
|
grpclog.Fatalf("Got user name %q which is NOT a substring of %q.", user, jsonKey)
|
|
}
|
|
if !strings.Contains(oauthScope, scope) {
|
|
grpclog.Fatalf("Got OAuth scope %q which is NOT a substring of %q.", scope, oauthScope)
|
|
}
|
|
}
|
|
|
|
var testMetadata = metadata.MD{
|
|
"key1": []string{"value1"},
|
|
"key2": []string{"value2"},
|
|
}
|
|
|
|
// DoCancelAfterBegin cancels the RPC after metadata has been sent but before payloads are sent.
|
|
func DoCancelAfterBegin(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
|
ctx, cancel := context.WithCancel(metadata.NewOutgoingContext(context.Background(), testMetadata))
|
|
stream, err := tc.StreamingInputCall(ctx, args...)
|
|
if err != nil {
|
|
grpclog.Fatalf("%v.StreamingInputCall(_) = _, %v", tc, err)
|
|
}
|
|
cancel()
|
|
_, err = stream.CloseAndRecv()
|
|
if status.Code(err) != codes.Canceled {
|
|
grpclog.Fatalf("%v.CloseAndRecv() got error code %d, want %d", stream, status.Code(err), codes.Canceled)
|
|
}
|
|
}
|
|
|
|
// DoCancelAfterFirstResponse cancels the RPC after receiving the first message from the server.
|
|
func DoCancelAfterFirstResponse(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
stream, err := tc.FullDuplexCall(ctx, args...)
|
|
if err != nil {
|
|
grpclog.Fatalf("%v.FullDuplexCall(_) = _, %v", tc, err)
|
|
}
|
|
respParam := []*testpb.ResponseParameters{
|
|
{
|
|
Size: 31415,
|
|
},
|
|
}
|
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, 27182)
|
|
req := &testpb.StreamingOutputCallRequest{
|
|
ResponseType: testpb.PayloadType_COMPRESSABLE,
|
|
ResponseParameters: respParam,
|
|
Payload: pl,
|
|
}
|
|
if err := stream.Send(req); err != nil {
|
|
grpclog.Fatalf("%v has error %v while sending %v", stream, err, req)
|
|
}
|
|
if _, err := stream.Recv(); err != nil {
|
|
grpclog.Fatalf("%v.Recv() = %v", stream, err)
|
|
}
|
|
cancel()
|
|
if _, err := stream.Recv(); status.Code(err) != codes.Canceled {
|
|
grpclog.Fatalf("%v compleled with error code %d, want %d", stream, status.Code(err), codes.Canceled)
|
|
}
|
|
}
|
|
|
|
var (
|
|
initialMetadataValue = "test_initial_metadata_value"
|
|
trailingMetadataValue = "\x0a\x0b\x0a\x0b\x0a\x0b"
|
|
customMetadata = metadata.Pairs(
|
|
initialMetadataKey, initialMetadataValue,
|
|
trailingMetadataKey, trailingMetadataValue,
|
|
)
|
|
)
|
|
|
|
func validateMetadata(header, trailer metadata.MD) {
|
|
if len(header[initialMetadataKey]) != 1 {
|
|
grpclog.Fatalf("Expected exactly one header from server. Received %d", len(header[initialMetadataKey]))
|
|
}
|
|
if header[initialMetadataKey][0] != initialMetadataValue {
|
|
grpclog.Fatalf("Got header %s; want %s", header[initialMetadataKey][0], initialMetadataValue)
|
|
}
|
|
if len(trailer[trailingMetadataKey]) != 1 {
|
|
grpclog.Fatalf("Expected exactly one trailer from server. Received %d", len(trailer[trailingMetadataKey]))
|
|
}
|
|
if trailer[trailingMetadataKey][0] != trailingMetadataValue {
|
|
grpclog.Fatalf("Got trailer %s; want %s", trailer[trailingMetadataKey][0], trailingMetadataValue)
|
|
}
|
|
}
|
|
|
|
// DoCustomMetadata checks that metadata is echoed back to the client.
|
|
func DoCustomMetadata(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
|
// Testing with UnaryCall.
|
|
pl := ClientNewPayload(testpb.PayloadType_COMPRESSABLE, 1)
|
|
req := &testpb.SimpleRequest{
|
|
ResponseType: testpb.PayloadType_COMPRESSABLE,
|
|
ResponseSize: int32(1),
|
|
Payload: pl,
|
|
}
|
|
ctx := metadata.NewOutgoingContext(context.Background(), customMetadata)
|
|
var header, trailer metadata.MD
|
|
args = append(args, grpc.Header(&header), grpc.Trailer(&trailer))
|
|
reply, err := tc.UnaryCall(
|
|
ctx,
|
|
req,
|
|
args...,
|
|
)
|
|
if err != nil {
|
|
grpclog.Fatal("/TestService/UnaryCall RPC failed: ", err)
|
|
}
|
|
t := reply.GetPayload().GetType()
|
|
s := len(reply.GetPayload().GetBody())
|
|
if t != testpb.PayloadType_COMPRESSABLE || s != 1 {
|
|
grpclog.Fatalf("Got the reply with type %d len %d; want %d, %d", t, s, testpb.PayloadType_COMPRESSABLE, 1)
|
|
}
|
|
validateMetadata(header, trailer)
|
|
|
|
// Testing with FullDuplex.
|
|
stream, err := tc.FullDuplexCall(ctx, args...)
|
|
if err != nil {
|
|
grpclog.Fatalf("%v.FullDuplexCall(_) = _, %v, want <nil>", tc, err)
|
|
}
|
|
respParam := []*testpb.ResponseParameters{
|
|
{
|
|
Size: 1,
|
|
},
|
|
}
|
|
streamReq := &testpb.StreamingOutputCallRequest{
|
|
ResponseType: testpb.PayloadType_COMPRESSABLE,
|
|
ResponseParameters: respParam,
|
|
Payload: pl,
|
|
}
|
|
if err := stream.Send(streamReq); err != nil {
|
|
grpclog.Fatalf("%v has error %v while sending %v", stream, err, streamReq)
|
|
}
|
|
streamHeader, err := stream.Header()
|
|
if err != nil {
|
|
grpclog.Fatalf("%v.Header() = %v", stream, err)
|
|
}
|
|
if _, err := stream.Recv(); err != nil {
|
|
grpclog.Fatalf("%v.Recv() = %v", stream, err)
|
|
}
|
|
if err := stream.CloseSend(); err != nil {
|
|
grpclog.Fatalf("%v.CloseSend() = %v, want <nil>", stream, err)
|
|
}
|
|
if _, err := stream.Recv(); err != io.EOF {
|
|
grpclog.Fatalf("%v failed to complete the custom metadata test: %v", stream, err)
|
|
}
|
|
streamTrailer := stream.Trailer()
|
|
validateMetadata(streamHeader, streamTrailer)
|
|
}
|
|
|
|
// DoStatusCodeAndMessage checks that the status code is propagated back to the client.
|
|
func DoStatusCodeAndMessage(tc testpb.TestServiceClient, args ...grpc.CallOption) {
|
|
var code int32 = 2
|
|
msg := "test status message"
|
|
expectedErr := status.Error(codes.Code(code), msg)
|
|
respStatus := &testpb.EchoStatus{
|
|
Code: code,
|
|
Message: msg,
|
|
}
|
|
// Test UnaryCall.
|
|
req := &testpb.SimpleRequest{
|
|
ResponseStatus: respStatus,
|
|
}
|
|
if _, err := tc.UnaryCall(context.Background(), req, args...); err == nil || err.Error() != expectedErr.Error() {
|
|
grpclog.Fatalf("%v.UnaryCall(_, %v) = _, %v, want _, %v", tc, req, err, expectedErr)
|
|
}
|
|
// Test FullDuplexCall.
|
|
stream, err := tc.FullDuplexCall(context.Background(), args...)
|
|
if err != nil {
|
|
grpclog.Fatalf("%v.FullDuplexCall(_) = _, %v, want <nil>", tc, err)
|
|
}
|
|
streamReq := &testpb.StreamingOutputCallRequest{
|
|
ResponseStatus: respStatus,
|
|
}
|
|
if err := stream.Send(streamReq); err != nil {
|
|
grpclog.Fatalf("%v has error %v while sending %v, want <nil>", stream, err, streamReq)
|
|
}
|
|
if err := stream.CloseSend(); err != nil {
|
|
grpclog.Fatalf("%v.CloseSend() = %v, want <nil>", stream, err)
|
|
}
|
|
if _, err = stream.Recv(); err.Error() != expectedErr.Error() {
|
|
grpclog.Fatalf("%v.Recv() returned error %v, want %v", stream, err, expectedErr)
|
|
}
|
|
}
|
|
|
|
// DoUnimplementedService attempts to call a method from an unimplemented service.
|
|
func DoUnimplementedService(tc testpb.UnimplementedServiceClient) {
|
|
_, err := tc.UnimplementedCall(context.Background(), &testpb.Empty{})
|
|
if status.Code(err) != codes.Unimplemented {
|
|
grpclog.Fatalf("%v.UnimplementedCall() = _, %v, want _, %v", tc, status.Code(err), codes.Unimplemented)
|
|
}
|
|
}
|
|
|
|
// DoUnimplementedMethod attempts to call an unimplemented method.
|
|
func DoUnimplementedMethod(cc *grpc.ClientConn) {
|
|
var req, reply proto.Message
|
|
if err := grpc.Invoke(context.Background(), "/grpc.testing.TestService/UnimplementedCall", req, reply, cc); err == nil || status.Code(err) != codes.Unimplemented {
|
|
grpclog.Fatalf("grpc.Invoke(_, _, _, _, _) = %v, want error code %s", err, codes.Unimplemented)
|
|
}
|
|
}
|
|
|
|
type testServer struct {
|
|
}
|
|
|
|
// NewTestServer creates a test server for test service.
|
|
func NewTestServer() testpb.TestServiceServer {
|
|
return &testServer{}
|
|
}
|
|
|
|
func (s *testServer) EmptyCall(ctx context.Context, in *testpb.Empty) (*testpb.Empty, error) {
|
|
return new(testpb.Empty), nil
|
|
}
|
|
|
|
func serverNewPayload(t testpb.PayloadType, size int32) (*testpb.Payload, error) {
|
|
if size < 0 {
|
|
return nil, fmt.Errorf("requested a response with invalid length %d", size)
|
|
}
|
|
body := make([]byte, size)
|
|
switch t {
|
|
case testpb.PayloadType_COMPRESSABLE:
|
|
case testpb.PayloadType_UNCOMPRESSABLE:
|
|
return nil, fmt.Errorf("payloadType UNCOMPRESSABLE is not supported")
|
|
default:
|
|
return nil, fmt.Errorf("unsupported payload type: %d", t)
|
|
}
|
|
return &testpb.Payload{
|
|
Type: t,
|
|
Body: body,
|
|
}, nil
|
|
}
|
|
|
|
func (s *testServer) UnaryCall(ctx context.Context, in *testpb.SimpleRequest) (*testpb.SimpleResponse, error) {
|
|
st := in.GetResponseStatus()
|
|
if md, ok := metadata.FromIncomingContext(ctx); ok {
|
|
if initialMetadata, ok := md[initialMetadataKey]; ok {
|
|
header := metadata.Pairs(initialMetadataKey, initialMetadata[0])
|
|
grpc.SendHeader(ctx, header)
|
|
}
|
|
if trailingMetadata, ok := md[trailingMetadataKey]; ok {
|
|
trailer := metadata.Pairs(trailingMetadataKey, trailingMetadata[0])
|
|
grpc.SetTrailer(ctx, trailer)
|
|
}
|
|
}
|
|
if st != nil && st.Code != 0 {
|
|
return nil, status.Error(codes.Code(st.Code), st.Message)
|
|
}
|
|
pl, err := serverNewPayload(in.GetResponseType(), in.GetResponseSize())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &testpb.SimpleResponse{
|
|
Payload: pl,
|
|
}, nil
|
|
}
|
|
|
|
func (s *testServer) StreamingOutputCall(args *testpb.StreamingOutputCallRequest, stream testpb.TestService_StreamingOutputCallServer) error {
|
|
cs := args.GetResponseParameters()
|
|
for _, c := range cs {
|
|
if us := c.GetIntervalUs(); us > 0 {
|
|
time.Sleep(time.Duration(us) * time.Microsecond)
|
|
}
|
|
pl, err := serverNewPayload(args.GetResponseType(), c.GetSize())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if err := stream.Send(&testpb.StreamingOutputCallResponse{
|
|
Payload: pl,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (s *testServer) StreamingInputCall(stream testpb.TestService_StreamingInputCallServer) error {
|
|
var sum int
|
|
for {
|
|
in, err := stream.Recv()
|
|
if err == io.EOF {
|
|
return stream.SendAndClose(&testpb.StreamingInputCallResponse{
|
|
AggregatedPayloadSize: int32(sum),
|
|
})
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
p := in.GetPayload().GetBody()
|
|
sum += len(p)
|
|
}
|
|
}
|
|
|
|
func (s *testServer) FullDuplexCall(stream testpb.TestService_FullDuplexCallServer) error {
|
|
if md, ok := metadata.FromIncomingContext(stream.Context()); ok {
|
|
if initialMetadata, ok := md[initialMetadataKey]; ok {
|
|
header := metadata.Pairs(initialMetadataKey, initialMetadata[0])
|
|
stream.SendHeader(header)
|
|
}
|
|
if trailingMetadata, ok := md[trailingMetadataKey]; ok {
|
|
trailer := metadata.Pairs(trailingMetadataKey, trailingMetadata[0])
|
|
stream.SetTrailer(trailer)
|
|
}
|
|
}
|
|
for {
|
|
in, err := stream.Recv()
|
|
if err == io.EOF {
|
|
// read done.
|
|
return nil
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
st := in.GetResponseStatus()
|
|
if st != nil && st.Code != 0 {
|
|
return status.Error(codes.Code(st.Code), st.Message)
|
|
}
|
|
cs := in.GetResponseParameters()
|
|
for _, c := range cs {
|
|
if us := c.GetIntervalUs(); us > 0 {
|
|
time.Sleep(time.Duration(us) * time.Microsecond)
|
|
}
|
|
pl, err := serverNewPayload(in.GetResponseType(), c.GetSize())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if err := stream.Send(&testpb.StreamingOutputCallResponse{
|
|
Payload: pl,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func (s *testServer) HalfDuplexCall(stream testpb.TestService_HalfDuplexCallServer) error {
|
|
var msgBuf []*testpb.StreamingOutputCallRequest
|
|
for {
|
|
in, err := stream.Recv()
|
|
if err == io.EOF {
|
|
// read done.
|
|
break
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
msgBuf = append(msgBuf, in)
|
|
}
|
|
for _, m := range msgBuf {
|
|
cs := m.GetResponseParameters()
|
|
for _, c := range cs {
|
|
if us := c.GetIntervalUs(); us > 0 {
|
|
time.Sleep(time.Duration(us) * time.Microsecond)
|
|
}
|
|
pl, err := serverNewPayload(m.GetResponseType(), c.GetSize())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if err := stream.Send(&testpb.StreamingOutputCallResponse{
|
|
Payload: pl,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|