|
@@ -15,12 +15,13 @@
|
|
|
package etcdmain
|
|
package etcdmain
|
|
|
|
|
|
|
|
import (
|
|
import (
|
|
|
- "crypto/tls"
|
|
|
|
|
"fmt"
|
|
"fmt"
|
|
|
|
|
+ "math"
|
|
|
"net"
|
|
"net"
|
|
|
"net/http"
|
|
"net/http"
|
|
|
"net/url"
|
|
"net/url"
|
|
|
"os"
|
|
"os"
|
|
|
|
|
+ "path/filepath"
|
|
|
"time"
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/coreos/etcd/clientv3"
|
|
"github.com/coreos/etcd/clientv3"
|
|
@@ -45,9 +46,22 @@ var (
|
|
|
grpcProxyEndpoints []string
|
|
grpcProxyEndpoints []string
|
|
|
grpcProxyDNSCluster string
|
|
grpcProxyDNSCluster string
|
|
|
grpcProxyInsecureDiscovery bool
|
|
grpcProxyInsecureDiscovery bool
|
|
|
- grpcProxyCert string
|
|
|
|
|
- grpcProxyKey string
|
|
|
|
|
- grpcProxyCA string
|
|
|
|
|
|
|
+ grpcProxyDataDir string
|
|
|
|
|
+
|
|
|
|
|
+ // tls for connecting to etcd
|
|
|
|
|
+
|
|
|
|
|
+ grpcProxyCA string
|
|
|
|
|
+ grpcProxyCert string
|
|
|
|
|
+ grpcProxyKey string
|
|
|
|
|
+ grpcProxyInsecureSkipTLSVerify bool
|
|
|
|
|
+
|
|
|
|
|
+ // tls for clients connecting to proxy
|
|
|
|
|
+
|
|
|
|
|
+ grpcProxyListenCA string
|
|
|
|
|
+ grpcProxyListenCert string
|
|
|
|
|
+ grpcProxyListenKey string
|
|
|
|
|
+ grpcProxyListenAutoTLS bool
|
|
|
|
|
+ grpcProxyListenCRL string
|
|
|
|
|
|
|
|
grpcProxyAdvertiseClientURL string
|
|
grpcProxyAdvertiseClientURL string
|
|
|
grpcProxyResolverPrefix string
|
|
grpcProxyResolverPrefix string
|
|
@@ -85,19 +99,77 @@ func newGRPCProxyStartCommand() *cobra.Command {
|
|
|
cmd.Flags().StringVar(&grpcProxyMetricsListenAddr, "metrics-addr", "", "listen for /metrics requests on an additional interface")
|
|
cmd.Flags().StringVar(&grpcProxyMetricsListenAddr, "metrics-addr", "", "listen for /metrics requests on an additional interface")
|
|
|
cmd.Flags().BoolVar(&grpcProxyInsecureDiscovery, "insecure-discovery", false, "accept insecure SRV records")
|
|
cmd.Flags().BoolVar(&grpcProxyInsecureDiscovery, "insecure-discovery", false, "accept insecure SRV records")
|
|
|
cmd.Flags().StringSliceVar(&grpcProxyEndpoints, "endpoints", []string{"127.0.0.1:2379"}, "comma separated etcd cluster endpoints")
|
|
cmd.Flags().StringSliceVar(&grpcProxyEndpoints, "endpoints", []string{"127.0.0.1:2379"}, "comma separated etcd cluster endpoints")
|
|
|
- cmd.Flags().StringVar(&grpcProxyCert, "cert", "", "identify secure connections with etcd servers using this TLS certificate file")
|
|
|
|
|
- cmd.Flags().StringVar(&grpcProxyKey, "key", "", "identify secure connections with etcd servers using this TLS key file")
|
|
|
|
|
- cmd.Flags().StringVar(&grpcProxyCA, "cacert", "", "verify certificates of TLS-enabled secure etcd servers using this CA bundle")
|
|
|
|
|
cmd.Flags().StringVar(&grpcProxyAdvertiseClientURL, "advertise-client-url", "127.0.0.1:23790", "advertise address to register (must be reachable by client)")
|
|
cmd.Flags().StringVar(&grpcProxyAdvertiseClientURL, "advertise-client-url", "127.0.0.1:23790", "advertise address to register (must be reachable by client)")
|
|
|
cmd.Flags().StringVar(&grpcProxyResolverPrefix, "resolver-prefix", "", "prefix to use for registering proxy (must be shared with other grpc-proxy members)")
|
|
cmd.Flags().StringVar(&grpcProxyResolverPrefix, "resolver-prefix", "", "prefix to use for registering proxy (must be shared with other grpc-proxy members)")
|
|
|
cmd.Flags().IntVar(&grpcProxyResolverTTL, "resolver-ttl", 0, "specify TTL, in seconds, when registering proxy endpoints")
|
|
cmd.Flags().IntVar(&grpcProxyResolverTTL, "resolver-ttl", 0, "specify TTL, in seconds, when registering proxy endpoints")
|
|
|
cmd.Flags().StringVar(&grpcProxyNamespace, "namespace", "", "string to prefix to all keys for namespacing requests")
|
|
cmd.Flags().StringVar(&grpcProxyNamespace, "namespace", "", "string to prefix to all keys for namespacing requests")
|
|
|
cmd.Flags().BoolVar(&grpcProxyEnablePprof, "enable-pprof", false, `Enable runtime profiling data via HTTP server. Address is at client URL + "/debug/pprof/"`)
|
|
cmd.Flags().BoolVar(&grpcProxyEnablePprof, "enable-pprof", false, `Enable runtime profiling data via HTTP server. Address is at client URL + "/debug/pprof/"`)
|
|
|
|
|
+ cmd.Flags().StringVar(&grpcProxyDataDir, "data-dir", "default.proxy", "Data directory for persistent data")
|
|
|
|
|
+
|
|
|
|
|
+ // client TLS for connecting to server
|
|
|
|
|
+ cmd.Flags().StringVar(&grpcProxyCert, "cert", "", "identify secure connections with etcd servers using this TLS certificate file")
|
|
|
|
|
+ cmd.Flags().StringVar(&grpcProxyKey, "key", "", "identify secure connections with etcd servers using this TLS key file")
|
|
|
|
|
+ cmd.Flags().StringVar(&grpcProxyCA, "cacert", "", "verify certificates of TLS-enabled secure etcd servers using this CA bundle")
|
|
|
|
|
+ cmd.Flags().BoolVar(&grpcProxyInsecureSkipTLSVerify, "insecure-skip-tls-verify", false, "skip authentication of etcd server TLS certificates")
|
|
|
|
|
+
|
|
|
|
|
+ // client TLS for connecting to proxy
|
|
|
|
|
+ cmd.Flags().StringVar(&grpcProxyListenCert, "cert-file", "", "identify secure connections to the proxy using this TLS certificate file")
|
|
|
|
|
+ cmd.Flags().StringVar(&grpcProxyListenKey, "key-file", "", "identify secure connections to the proxy using this TLS key file")
|
|
|
|
|
+ cmd.Flags().StringVar(&grpcProxyListenCA, "trusted-ca-file", "", "verify certificates of TLS-enabled secure proxy using this CA bundle")
|
|
|
|
|
+ cmd.Flags().BoolVar(&grpcProxyListenAutoTLS, "auto-tls", false, "proxy TLS using generated certificates")
|
|
|
|
|
+ cmd.Flags().StringVar(&grpcProxyListenCRL, "client-crl-file", "", "proxy client certificate revocation list file.")
|
|
|
|
|
|
|
|
return &cmd
|
|
return &cmd
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
func startGRPCProxy(cmd *cobra.Command, args []string) {
|
|
func startGRPCProxy(cmd *cobra.Command, args []string) {
|
|
|
|
|
+ checkArgs()
|
|
|
|
|
+
|
|
|
|
|
+ tlsinfo := newTLS(grpcProxyListenCA, grpcProxyListenCert, grpcProxyListenKey)
|
|
|
|
|
+ if tlsinfo == nil && grpcProxyListenAutoTLS {
|
|
|
|
|
+ host := []string{"https://" + grpcProxyListenAddr}
|
|
|
|
|
+ dir := filepath.Join(grpcProxyDataDir, "fixtures", "proxy")
|
|
|
|
|
+ autoTLS, err := transport.SelfCert(dir, host)
|
|
|
|
|
+ if err != nil {
|
|
|
|
|
+ plog.Fatal(err)
|
|
|
|
|
+ }
|
|
|
|
|
+ tlsinfo = &autoTLS
|
|
|
|
|
+ }
|
|
|
|
|
+ if tlsinfo != nil {
|
|
|
|
|
+ plog.Infof("ServerTLS: %s", tlsinfo)
|
|
|
|
|
+ }
|
|
|
|
|
+ m := mustListenCMux(tlsinfo)
|
|
|
|
|
+
|
|
|
|
|
+ grpcl := m.Match(cmux.HTTP2())
|
|
|
|
|
+ defer func() {
|
|
|
|
|
+ grpcl.Close()
|
|
|
|
|
+ plog.Infof("stopping listening for grpc-proxy client requests on %s", grpcProxyListenAddr)
|
|
|
|
|
+ }()
|
|
|
|
|
+
|
|
|
|
|
+ client := mustNewClient()
|
|
|
|
|
+
|
|
|
|
|
+ srvhttp, httpl := mustHTTPListener(m, tlsinfo)
|
|
|
|
|
+ errc := make(chan error)
|
|
|
|
|
+ go func() { errc <- newGRPCProxyServer(client).Serve(grpcl) }()
|
|
|
|
|
+ go func() { errc <- srvhttp.Serve(httpl) }()
|
|
|
|
|
+ go func() { errc <- m.Serve() }()
|
|
|
|
|
+ if len(grpcProxyMetricsListenAddr) > 0 {
|
|
|
|
|
+ mhttpl := mustMetricsListener(tlsinfo)
|
|
|
|
|
+ go func() {
|
|
|
|
|
+ mux := http.NewServeMux()
|
|
|
|
|
+ mux.Handle("/metrics", prometheus.Handler())
|
|
|
|
|
+ plog.Fatal(http.Serve(mhttpl, mux))
|
|
|
|
|
+ }()
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ // grpc-proxy is initialized, ready to serve
|
|
|
|
|
+ notifySystemd()
|
|
|
|
|
+
|
|
|
|
|
+ fmt.Fprintln(os.Stderr, <-errc)
|
|
|
|
|
+ os.Exit(1)
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+func checkArgs() {
|
|
|
if grpcProxyResolverPrefix != "" && grpcProxyResolverTTL < 1 {
|
|
if grpcProxyResolverPrefix != "" && grpcProxyResolverTTL < 1 {
|
|
|
fmt.Fprintln(os.Stderr, fmt.Errorf("invalid resolver-ttl %d", grpcProxyResolverTTL))
|
|
fmt.Fprintln(os.Stderr, fmt.Errorf("invalid resolver-ttl %d", grpcProxyResolverTTL))
|
|
|
os.Exit(1)
|
|
os.Exit(1)
|
|
@@ -110,40 +182,79 @@ func startGRPCProxy(cmd *cobra.Command, args []string) {
|
|
|
fmt.Fprintln(os.Stderr, fmt.Errorf("invalid advertise-client-url %q", grpcProxyAdvertiseClientURL))
|
|
fmt.Fprintln(os.Stderr, fmt.Errorf("invalid advertise-client-url %q", grpcProxyAdvertiseClientURL))
|
|
|
os.Exit(1)
|
|
os.Exit(1)
|
|
|
}
|
|
}
|
|
|
|
|
+}
|
|
|
|
|
|
|
|
|
|
+func mustNewClient() *clientv3.Client {
|
|
|
srvs := discoverEndpoints(grpcProxyDNSCluster, grpcProxyCA, grpcProxyInsecureDiscovery)
|
|
srvs := discoverEndpoints(grpcProxyDNSCluster, grpcProxyCA, grpcProxyInsecureDiscovery)
|
|
|
- if len(srvs.Endpoints) != 0 {
|
|
|
|
|
- grpcProxyEndpoints = srvs.Endpoints
|
|
|
|
|
|
|
+ eps := srvs.Endpoints
|
|
|
|
|
+ if len(eps) == 0 {
|
|
|
|
|
+ eps = grpcProxyEndpoints
|
|
|
}
|
|
}
|
|
|
-
|
|
|
|
|
- l, err := net.Listen("tcp", grpcProxyListenAddr)
|
|
|
|
|
|
|
+ cfg, err := newClientCfg(eps)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
fmt.Fprintln(os.Stderr, err)
|
|
fmt.Fprintln(os.Stderr, err)
|
|
|
os.Exit(1)
|
|
os.Exit(1)
|
|
|
}
|
|
}
|
|
|
- if l, err = transport.NewKeepAliveListener(l, "tcp", nil); err != nil {
|
|
|
|
|
|
|
+ client, err := clientv3.New(*cfg)
|
|
|
|
|
+ if err != nil {
|
|
|
fmt.Fprintln(os.Stderr, err)
|
|
fmt.Fprintln(os.Stderr, err)
|
|
|
os.Exit(1)
|
|
os.Exit(1)
|
|
|
}
|
|
}
|
|
|
- plog.Infof("listening for grpc-proxy client requests on %s", grpcProxyListenAddr)
|
|
|
|
|
- defer func() {
|
|
|
|
|
- l.Close()
|
|
|
|
|
- plog.Infof("stopping listening for grpc-proxy client requests on %s", grpcProxyListenAddr)
|
|
|
|
|
- }()
|
|
|
|
|
- m := cmux.New(l)
|
|
|
|
|
|
|
+ return client
|
|
|
|
|
+}
|
|
|
|
|
|
|
|
- cfg, cfgtls, err := newClientCfg()
|
|
|
|
|
|
|
+func newClientCfg(eps []string) (*clientv3.Config, error) {
|
|
|
|
|
+ // set tls if any one tls option set
|
|
|
|
|
+ cfg := clientv3.Config{
|
|
|
|
|
+ Endpoints: eps,
|
|
|
|
|
+ DialTimeout: 5 * time.Second,
|
|
|
|
|
+ }
|
|
|
|
|
+ tls := newTLS(grpcProxyCA, grpcProxyCert, grpcProxyKey)
|
|
|
|
|
+ if tls == nil && grpcProxyInsecureSkipTLSVerify {
|
|
|
|
|
+ tls = &transport.TLSInfo{}
|
|
|
|
|
+ }
|
|
|
|
|
+ if tls != nil {
|
|
|
|
|
+ clientTLS, err := tls.ClientConfig()
|
|
|
|
|
+ if err != nil {
|
|
|
|
|
+ return nil, err
|
|
|
|
|
+ }
|
|
|
|
|
+ clientTLS.InsecureSkipVerify = grpcProxyInsecureSkipTLSVerify
|
|
|
|
|
+ cfg.TLS = clientTLS
|
|
|
|
|
+ plog.Infof("ClientTLS: %s", tls)
|
|
|
|
|
+ }
|
|
|
|
|
+ return &cfg, nil
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+func newTLS(ca, cert, key string) *transport.TLSInfo {
|
|
|
|
|
+ if ca == "" && cert == "" && key == "" {
|
|
|
|
|
+ return nil
|
|
|
|
|
+ }
|
|
|
|
|
+ return &transport.TLSInfo{CAFile: ca, CertFile: cert, KeyFile: key}
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+func mustListenCMux(tlsinfo *transport.TLSInfo) cmux.CMux {
|
|
|
|
|
+ l, err := net.Listen("tcp", grpcProxyListenAddr)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
fmt.Fprintln(os.Stderr, err)
|
|
fmt.Fprintln(os.Stderr, err)
|
|
|
os.Exit(1)
|
|
os.Exit(1)
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- client, err := clientv3.New(*cfg)
|
|
|
|
|
- if err != nil {
|
|
|
|
|
|
|
+ if l, err = transport.NewKeepAliveListener(l, "tcp", nil); err != nil {
|
|
|
fmt.Fprintln(os.Stderr, err)
|
|
fmt.Fprintln(os.Stderr, err)
|
|
|
os.Exit(1)
|
|
os.Exit(1)
|
|
|
}
|
|
}
|
|
|
|
|
+ if tlsinfo != nil {
|
|
|
|
|
+ tlsinfo.CRLFile = grpcProxyListenCRL
|
|
|
|
|
+ if l, err = transport.NewTLSListener(l, tlsinfo); err != nil {
|
|
|
|
|
+ plog.Fatal(err)
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
|
|
|
|
|
+ plog.Infof("listening for grpc-proxy client requests on %s", grpcProxyListenAddr)
|
|
|
|
|
+ return cmux.New(l)
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+func newGRPCProxyServer(client *clientv3.Client) *grpc.Server {
|
|
|
if len(grpcProxyNamespace) > 0 {
|
|
if len(grpcProxyNamespace) > 0 {
|
|
|
client.KV = namespace.NewKV(client.KV, grpcProxyNamespace)
|
|
client.KV = namespace.NewKV(client.KV, grpcProxyNamespace)
|
|
|
client.Watcher = namespace.NewWatcher(client.Watcher, grpcProxyNamespace)
|
|
client.Watcher = namespace.NewWatcher(client.Watcher, grpcProxyNamespace)
|
|
@@ -165,7 +276,9 @@ func startGRPCProxy(cmd *cobra.Command, args []string) {
|
|
|
server := grpc.NewServer(
|
|
server := grpc.NewServer(
|
|
|
grpc.StreamInterceptor(grpc_prometheus.StreamServerInterceptor),
|
|
grpc.StreamInterceptor(grpc_prometheus.StreamServerInterceptor),
|
|
|
grpc.UnaryInterceptor(grpc_prometheus.UnaryServerInterceptor),
|
|
grpc.UnaryInterceptor(grpc_prometheus.UnaryServerInterceptor),
|
|
|
|
|
+ grpc.MaxConcurrentStreams(math.MaxUint32),
|
|
|
)
|
|
)
|
|
|
|
|
+
|
|
|
pb.RegisterKVServer(server, kvp)
|
|
pb.RegisterKVServer(server, kvp)
|
|
|
pb.RegisterWatchServer(server, watchp)
|
|
pb.RegisterWatchServer(server, watchp)
|
|
|
pb.RegisterClusterServer(server, clusterp)
|
|
pb.RegisterClusterServer(server, clusterp)
|
|
@@ -174,12 +287,10 @@ func startGRPCProxy(cmd *cobra.Command, args []string) {
|
|
|
pb.RegisterAuthServer(server, authp)
|
|
pb.RegisterAuthServer(server, authp)
|
|
|
v3electionpb.RegisterElectionServer(server, electionp)
|
|
v3electionpb.RegisterElectionServer(server, electionp)
|
|
|
v3lockpb.RegisterLockServer(server, lockp)
|
|
v3lockpb.RegisterLockServer(server, lockp)
|
|
|
|
|
+ return server
|
|
|
|
|
+}
|
|
|
|
|
|
|
|
- errc := make(chan error)
|
|
|
|
|
-
|
|
|
|
|
- grpcl := m.Match(cmux.HTTP2())
|
|
|
|
|
- go func() { errc <- server.Serve(grpcl) }()
|
|
|
|
|
-
|
|
|
|
|
|
|
+func mustHTTPListener(m cmux.CMux, tlsinfo *transport.TLSInfo) (*http.Server, net.Listener) {
|
|
|
httpmux := http.NewServeMux()
|
|
httpmux := http.NewServeMux()
|
|
|
httpmux.HandleFunc("/", http.NotFound)
|
|
httpmux.HandleFunc("/", http.NotFound)
|
|
|
httpmux.Handle("/metrics", prometheus.Handler())
|
|
httpmux.Handle("/metrics", prometheus.Handler())
|
|
@@ -189,82 +300,31 @@ func startGRPCProxy(cmd *cobra.Command, args []string) {
|
|
|
}
|
|
}
|
|
|
plog.Infof("pprof is enabled under %s", debugutil.HTTPPrefixPProf)
|
|
plog.Infof("pprof is enabled under %s", debugutil.HTTPPrefixPProf)
|
|
|
}
|
|
}
|
|
|
|
|
+ srvhttp := &http.Server{Handler: httpmux}
|
|
|
|
|
|
|
|
- srvhttp := &http.Server{
|
|
|
|
|
- Handler: httpmux,
|
|
|
|
|
|
|
+ if tlsinfo == nil {
|
|
|
|
|
+ return srvhttp, m.Match(cmux.HTTP1())
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- var httpl net.Listener
|
|
|
|
|
- if cfg.TLS != nil {
|
|
|
|
|
- srvhttp.TLSConfig = cfg.TLS
|
|
|
|
|
- httpl = tls.NewListener(m.Match(cmux.Any()), cfg.TLS)
|
|
|
|
|
- } else {
|
|
|
|
|
- httpl = m.Match(cmux.HTTP1())
|
|
|
|
|
- }
|
|
|
|
|
- go func() { errc <- srvhttp.Serve(httpl) }()
|
|
|
|
|
-
|
|
|
|
|
- go func() { errc <- m.Serve() }()
|
|
|
|
|
-
|
|
|
|
|
- if len(grpcProxyMetricsListenAddr) > 0 {
|
|
|
|
|
- murl, err := url.Parse(grpcProxyMetricsListenAddr)
|
|
|
|
|
- if err != nil {
|
|
|
|
|
- fmt.Fprintf(os.Stderr, "cannot parse %q", grpcProxyMetricsListenAddr)
|
|
|
|
|
- os.Exit(1)
|
|
|
|
|
- }
|
|
|
|
|
- ml, err := transport.NewListener(murl.Host, murl.Scheme, cfgtls)
|
|
|
|
|
- if err != nil {
|
|
|
|
|
- fmt.Fprintln(os.Stderr, err)
|
|
|
|
|
- os.Exit(1)
|
|
|
|
|
- }
|
|
|
|
|
-
|
|
|
|
|
- mux := http.NewServeMux()
|
|
|
|
|
- mux.Handle("/metrics", prometheus.Handler())
|
|
|
|
|
-
|
|
|
|
|
- go func() {
|
|
|
|
|
- plog.Info("grpc-proxy: listening for metrics on ", murl.String())
|
|
|
|
|
- plog.Fatal(http.Serve(ml, mux))
|
|
|
|
|
- }()
|
|
|
|
|
|
|
+ srvTLS, err := tlsinfo.ServerConfig()
|
|
|
|
|
+ if err != nil {
|
|
|
|
|
+ plog.Fatalf("could not setup TLS (%v)", err)
|
|
|
}
|
|
}
|
|
|
-
|
|
|
|
|
- // grpc-proxy is initialized, ready to serve
|
|
|
|
|
- notifySystemd()
|
|
|
|
|
-
|
|
|
|
|
- fmt.Fprintln(os.Stderr, <-errc)
|
|
|
|
|
- os.Exit(1)
|
|
|
|
|
|
|
+ srvhttp.TLSConfig = srvTLS
|
|
|
|
|
+ return srvhttp, m.Match(cmux.Any())
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
-func newClientCfg() (*clientv3.Config, *transport.TLSInfo, error) {
|
|
|
|
|
- // set tls if any one tls option set
|
|
|
|
|
- var cfgtls *transport.TLSInfo
|
|
|
|
|
- tlsinfo := transport.TLSInfo{}
|
|
|
|
|
- if grpcProxyCert != "" {
|
|
|
|
|
- tlsinfo.CertFile = grpcProxyCert
|
|
|
|
|
- cfgtls = &tlsinfo
|
|
|
|
|
- }
|
|
|
|
|
-
|
|
|
|
|
- if grpcProxyKey != "" {
|
|
|
|
|
- tlsinfo.KeyFile = grpcProxyKey
|
|
|
|
|
- cfgtls = &tlsinfo
|
|
|
|
|
- }
|
|
|
|
|
-
|
|
|
|
|
- if grpcProxyCA != "" {
|
|
|
|
|
- tlsinfo.CAFile = grpcProxyCA
|
|
|
|
|
- cfgtls = &tlsinfo
|
|
|
|
|
- }
|
|
|
|
|
-
|
|
|
|
|
- cfg := clientv3.Config{
|
|
|
|
|
- Endpoints: grpcProxyEndpoints,
|
|
|
|
|
- DialTimeout: 5 * time.Second,
|
|
|
|
|
|
|
+func mustMetricsListener(tlsinfo *transport.TLSInfo) net.Listener {
|
|
|
|
|
+ murl, err := url.Parse(grpcProxyMetricsListenAddr)
|
|
|
|
|
+ if err != nil {
|
|
|
|
|
+ fmt.Fprintf(os.Stderr, "cannot parse %q", grpcProxyMetricsListenAddr)
|
|
|
|
|
+ os.Exit(1)
|
|
|
}
|
|
}
|
|
|
- if cfgtls != nil {
|
|
|
|
|
- clientTLS, err := cfgtls.ClientConfig()
|
|
|
|
|
- if err != nil {
|
|
|
|
|
- return nil, nil, err
|
|
|
|
|
- }
|
|
|
|
|
- cfg.TLS = clientTLS
|
|
|
|
|
|
|
+ ml, err := transport.NewListener(murl.Host, murl.Scheme, tlsinfo)
|
|
|
|
|
+ if err != nil {
|
|
|
|
|
+ fmt.Fprintln(os.Stderr, err)
|
|
|
|
|
+ os.Exit(1)
|
|
|
}
|
|
}
|
|
|
-
|
|
|
|
|
- // TODO: support insecure tls
|
|
|
|
|
-
|
|
|
|
|
- return &cfg, cfgtls, nil
|
|
|
|
|
|
|
+ plog.Info("grpc-proxy: listening for metrics on ", murl.String())
|
|
|
|
|
+ return ml
|
|
|
}
|
|
}
|