OSDN Git Service

Thanos did someting
[bytom/vapor.git] / vendor / google.golang.org / grpc / interop / client / client.go
diff --git a/vendor/google.golang.org/grpc/interop/client/client.go b/vendor/google.golang.org/grpc/interop/client/client.go
deleted file mode 100644 (file)
index da6bc2d..0000000
+++ /dev/null
@@ -1,190 +0,0 @@
-/*
- *
- * Copyright 2014 gRPC authors.
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- *     http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- *
- */
-
-package main
-
-import (
-       "flag"
-       "net"
-       "strconv"
-
-       "google.golang.org/grpc"
-       "google.golang.org/grpc/credentials"
-       "google.golang.org/grpc/credentials/oauth"
-       "google.golang.org/grpc/grpclog"
-       "google.golang.org/grpc/interop"
-       testpb "google.golang.org/grpc/interop/grpc_testing"
-       "google.golang.org/grpc/testdata"
-)
-
-var (
-       caFile                = flag.String("ca_file", "", "The file containning the CA root cert file")
-       useTLS                = flag.Bool("use_tls", false, "Connection uses TLS if true, else plain TCP")
-       testCA                = flag.Bool("use_test_ca", false, "Whether to replace platform root CAs with test CA as the CA root")
-       serviceAccountKeyFile = flag.String("service_account_key_file", "", "Path to service account json key file")
-       oauthScope            = flag.String("oauth_scope", "", "The scope for OAuth2 tokens")
-       defaultServiceAccount = flag.String("default_service_account", "", "Email of GCE default service account")
-       serverHost            = flag.String("server_host", "localhost", "The server host name")
-       serverPort            = flag.Int("server_port", 10000, "The server port number")
-       tlsServerName         = flag.String("server_host_override", "", "The server name use to verify the hostname returned by TLS handshake if it is not empty. Otherwise, --server_host is used.")
-       testCase              = flag.String("test_case", "large_unary",
-               `Configure different test cases. Valid options are:
-        empty_unary : empty (zero bytes) request and response;
-        large_unary : single request and (large) response;
-        client_streaming : request streaming with single response;
-        server_streaming : single request with response streaming;
-        ping_pong : full-duplex streaming;
-        empty_stream : full-duplex streaming with zero message;
-        timeout_on_sleeping_server: fullduplex streaming on a sleeping server;
-        compute_engine_creds: large_unary with compute engine auth;
-        service_account_creds: large_unary with service account auth;
-        jwt_token_creds: large_unary with jwt token auth;
-        per_rpc_creds: large_unary with per rpc token;
-        oauth2_auth_token: large_unary with oauth2 token auth;
-        cancel_after_begin: cancellation after metadata has been sent but before payloads are sent;
-        cancel_after_first_response: cancellation after receiving 1st message from the server;
-        status_code_and_message: status code propagated back to client;
-        custom_metadata: server will echo custom metadata;
-        unimplemented_method: client attempts to call unimplemented method;
-        unimplemented_service: client attempts to call unimplemented service.`)
-)
-
-func main() {
-       flag.Parse()
-       serverAddr := net.JoinHostPort(*serverHost, strconv.Itoa(*serverPort))
-       var opts []grpc.DialOption
-       if *useTLS {
-               var sn string
-               if *tlsServerName != "" {
-                       sn = *tlsServerName
-               }
-               var creds credentials.TransportCredentials
-               if *testCA {
-                       var err error
-                       if *caFile == "" {
-                               *caFile = testdata.Path("ca.pem")
-                       }
-                       creds, err = credentials.NewClientTLSFromFile(*caFile, sn)
-                       if err != nil {
-                               grpclog.Fatalf("Failed to create TLS credentials %v", err)
-                       }
-               } else {
-                       creds = credentials.NewClientTLSFromCert(nil, sn)
-               }
-               opts = append(opts, grpc.WithTransportCredentials(creds))
-               if *testCase == "compute_engine_creds" {
-                       opts = append(opts, grpc.WithPerRPCCredentials(oauth.NewComputeEngine()))
-               } else if *testCase == "service_account_creds" {
-                       jwtCreds, err := oauth.NewServiceAccountFromFile(*serviceAccountKeyFile, *oauthScope)
-                       if err != nil {
-                               grpclog.Fatalf("Failed to create JWT credentials: %v", err)
-                       }
-                       opts = append(opts, grpc.WithPerRPCCredentials(jwtCreds))
-               } else if *testCase == "jwt_token_creds" {
-                       jwtCreds, err := oauth.NewJWTAccessFromFile(*serviceAccountKeyFile)
-                       if err != nil {
-                               grpclog.Fatalf("Failed to create JWT credentials: %v", err)
-                       }
-                       opts = append(opts, grpc.WithPerRPCCredentials(jwtCreds))
-               } else if *testCase == "oauth2_auth_token" {
-                       opts = append(opts, grpc.WithPerRPCCredentials(oauth.NewOauthAccess(interop.GetToken(*serviceAccountKeyFile, *oauthScope))))
-               }
-       } else {
-               opts = append(opts, grpc.WithInsecure())
-       }
-       opts = append(opts, grpc.WithBlock())
-       conn, err := grpc.Dial(serverAddr, opts...)
-       if err != nil {
-               grpclog.Fatalf("Fail to dial: %v", err)
-       }
-       defer conn.Close()
-       tc := testpb.NewTestServiceClient(conn)
-       switch *testCase {
-       case "empty_unary":
-               interop.DoEmptyUnaryCall(tc)
-               grpclog.Println("EmptyUnaryCall done")
-       case "large_unary":
-               interop.DoLargeUnaryCall(tc)
-               grpclog.Println("LargeUnaryCall done")
-       case "client_streaming":
-               interop.DoClientStreaming(tc)
-               grpclog.Println("ClientStreaming done")
-       case "server_streaming":
-               interop.DoServerStreaming(tc)
-               grpclog.Println("ServerStreaming done")
-       case "ping_pong":
-               interop.DoPingPong(tc)
-               grpclog.Println("Pingpong done")
-       case "empty_stream":
-               interop.DoEmptyStream(tc)
-               grpclog.Println("Emptystream done")
-       case "timeout_on_sleeping_server":
-               interop.DoTimeoutOnSleepingServer(tc)
-               grpclog.Println("TimeoutOnSleepingServer done")
-       case "compute_engine_creds":
-               if !*useTLS {
-                       grpclog.Fatalf("TLS is not enabled. TLS is required to execute compute_engine_creds test case.")
-               }
-               interop.DoComputeEngineCreds(tc, *defaultServiceAccount, *oauthScope)
-               grpclog.Println("ComputeEngineCreds done")
-       case "service_account_creds":
-               if !*useTLS {
-                       grpclog.Fatalf("TLS is not enabled. TLS is required to execute service_account_creds test case.")
-               }
-               interop.DoServiceAccountCreds(tc, *serviceAccountKeyFile, *oauthScope)
-               grpclog.Println("ServiceAccountCreds done")
-       case "jwt_token_creds":
-               if !*useTLS {
-                       grpclog.Fatalf("TLS is not enabled. TLS is required to execute jwt_token_creds test case.")
-               }
-               interop.DoJWTTokenCreds(tc, *serviceAccountKeyFile)
-               grpclog.Println("JWTtokenCreds done")
-       case "per_rpc_creds":
-               if !*useTLS {
-                       grpclog.Fatalf("TLS is not enabled. TLS is required to execute per_rpc_creds test case.")
-               }
-               interop.DoPerRPCCreds(tc, *serviceAccountKeyFile, *oauthScope)
-               grpclog.Println("PerRPCCreds done")
-       case "oauth2_auth_token":
-               if !*useTLS {
-                       grpclog.Fatalf("TLS is not enabled. TLS is required to execute oauth2_auth_token test case.")
-               }
-               interop.DoOauth2TokenCreds(tc, *serviceAccountKeyFile, *oauthScope)
-               grpclog.Println("Oauth2TokenCreds done")
-       case "cancel_after_begin":
-               interop.DoCancelAfterBegin(tc)
-               grpclog.Println("CancelAfterBegin done")
-       case "cancel_after_first_response":
-               interop.DoCancelAfterFirstResponse(tc)
-               grpclog.Println("CancelAfterFirstResponse done")
-       case "status_code_and_message":
-               interop.DoStatusCodeAndMessage(tc)
-               grpclog.Println("StatusCodeAndMessage done")
-       case "custom_metadata":
-               interop.DoCustomMetadata(tc)
-               grpclog.Println("CustomMetadata done")
-       case "unimplemented_method":
-               interop.DoUnimplementedMethod(conn)
-               grpclog.Println("UnimplementedMethod done")
-       case "unimplemented_service":
-               interop.DoUnimplementedService(testpb.NewUnimplementedServiceClient(conn))
-               grpclog.Println("UnimplementedService done")
-       default:
-               grpclog.Fatal("Unsupported test case: ", *testCase)
-       }
-}