mirror of https://github.com/grpc/grpc-go.git
167 lines
4.8 KiB
Go
167 lines
4.8 KiB
Go
/*
|
|
*
|
|
* Copyright 2018 gRPC authors.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*
|
|
*/
|
|
|
|
// Binary client is an example client.
|
|
package main
|
|
|
|
import (
|
|
"context"
|
|
"flag"
|
|
"fmt"
|
|
"io"
|
|
"log"
|
|
"time"
|
|
|
|
"golang.org/x/oauth2"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/credentials"
|
|
"google.golang.org/grpc/credentials/oauth"
|
|
"google.golang.org/grpc/examples/data"
|
|
ecpb "google.golang.org/grpc/examples/features/proto/echo"
|
|
)
|
|
|
|
var addr = flag.String("addr", "localhost:50051", "the address to connect to")
|
|
|
|
const fallbackToken = "some-secret-token"
|
|
|
|
// logger is to mock a sophisticated logging system. To simplify the example, we just print out the content.
|
|
func logger(format string, a ...interface{}) {
|
|
fmt.Printf("LOG:\t"+format+"\n", a...)
|
|
}
|
|
|
|
// unaryInterceptor is an example unary interceptor.
|
|
func unaryInterceptor(ctx context.Context, method string, req, reply interface{}, cc *grpc.ClientConn, invoker grpc.UnaryInvoker, opts ...grpc.CallOption) error {
|
|
var credsConfigured bool
|
|
for _, o := range opts {
|
|
_, ok := o.(grpc.PerRPCCredsCallOption)
|
|
if ok {
|
|
credsConfigured = true
|
|
break
|
|
}
|
|
}
|
|
if !credsConfigured {
|
|
opts = append(opts, grpc.PerRPCCredentials(oauth.NewOauthAccess(&oauth2.Token{
|
|
AccessToken: fallbackToken,
|
|
})))
|
|
}
|
|
start := time.Now()
|
|
err := invoker(ctx, method, req, reply, cc, opts...)
|
|
end := time.Now()
|
|
logger("RPC: %s, start time: %s, end time: %s, err: %v", method, start.Format("Basic"), end.Format(time.RFC3339), err)
|
|
return err
|
|
}
|
|
|
|
// wrappedStream wraps around the embedded grpc.ClientStream, and intercepts the RecvMsg and
|
|
// SendMsg method call.
|
|
type wrappedStream struct {
|
|
grpc.ClientStream
|
|
}
|
|
|
|
func (w *wrappedStream) RecvMsg(m interface{}) error {
|
|
logger("Receive a message (Type: %T) at %v", m, time.Now().Format(time.RFC3339))
|
|
return w.ClientStream.RecvMsg(m)
|
|
}
|
|
|
|
func (w *wrappedStream) SendMsg(m interface{}) error {
|
|
logger("Send a message (Type: %T) at %v", m, time.Now().Format(time.RFC3339))
|
|
return w.ClientStream.SendMsg(m)
|
|
}
|
|
|
|
func newWrappedStream(s grpc.ClientStream) grpc.ClientStream {
|
|
return &wrappedStream{s}
|
|
}
|
|
|
|
// streamInterceptor is an example stream interceptor.
|
|
func streamInterceptor(ctx context.Context, desc *grpc.StreamDesc, cc *grpc.ClientConn, method string, streamer grpc.Streamer, opts ...grpc.CallOption) (grpc.ClientStream, error) {
|
|
var credsConfigured bool
|
|
for _, o := range opts {
|
|
_, ok := o.(*grpc.PerRPCCredsCallOption)
|
|
if ok {
|
|
credsConfigured = true
|
|
break
|
|
}
|
|
}
|
|
if !credsConfigured {
|
|
opts = append(opts, grpc.PerRPCCredentials(oauth.NewOauthAccess(&oauth2.Token{
|
|
AccessToken: fallbackToken,
|
|
})))
|
|
}
|
|
s, err := streamer(ctx, desc, cc, method, opts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return newWrappedStream(s), nil
|
|
}
|
|
|
|
func callUnaryEcho(client ecpb.EchoClient, message string) {
|
|
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
|
|
defer cancel()
|
|
resp, err := client.UnaryEcho(ctx, &ecpb.EchoRequest{Message: message})
|
|
if err != nil {
|
|
log.Fatalf("client.UnaryEcho(_) = _, %v: ", err)
|
|
}
|
|
fmt.Println("UnaryEcho: ", resp.Message)
|
|
}
|
|
|
|
func callBidiStreamingEcho(client ecpb.EchoClient) {
|
|
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
|
|
defer cancel()
|
|
c, err := client.BidirectionalStreamingEcho(ctx)
|
|
if err != nil {
|
|
return
|
|
}
|
|
for i := 0; i < 5; i++ {
|
|
if err := c.Send(&ecpb.EchoRequest{Message: fmt.Sprintf("Request %d", i+1)}); err != nil {
|
|
log.Fatalf("failed to send request due to error: %v", err)
|
|
}
|
|
}
|
|
c.CloseSend()
|
|
for {
|
|
resp, err := c.Recv()
|
|
if err == io.EOF {
|
|
break
|
|
}
|
|
if err != nil {
|
|
log.Fatalf("failed to receive response due to error: %v", err)
|
|
}
|
|
fmt.Println("BidiStreaming Echo: ", resp.Message)
|
|
}
|
|
}
|
|
|
|
func main() {
|
|
flag.Parse()
|
|
|
|
// Create tls based credential.
|
|
creds, err := credentials.NewClientTLSFromFile(data.Path("x509/ca_cert.pem"), "x.test.example.com")
|
|
if err != nil {
|
|
log.Fatalf("failed to load credentials: %v", err)
|
|
}
|
|
|
|
// Set up a connection to the server.
|
|
conn, err := grpc.Dial(*addr, grpc.WithTransportCredentials(creds), grpc.WithUnaryInterceptor(unaryInterceptor), grpc.WithStreamInterceptor(streamInterceptor))
|
|
if err != nil {
|
|
log.Fatalf("did not connect: %v", err)
|
|
}
|
|
defer conn.Close()
|
|
|
|
// Make a echo client and send RPCs.
|
|
rgc := ecpb.NewEchoClient(conn)
|
|
callUnaryEcho(rgc, "hello world")
|
|
callBidiStreamingEcho(rgc)
|
|
}
|