|
|
@@ -0,0 +1,132 @@
|
|
|
+// Copyright 2016 The etcd Authors
|
|
|
+//
|
|
|
+// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
+// you may not use this file except in compliance with the License.
|
|
|
+// You may obtain a copy of the License at
|
|
|
+//
|
|
|
+// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
+//
|
|
|
+// Unless required by applicable law or agreed to in writing, software
|
|
|
+// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
+// See the License for the specific language governing permissions and
|
|
|
+// limitations under the License.
|
|
|
+
|
|
|
+package etcdmain
|
|
|
+
|
|
|
+import (
|
|
|
+ "fmt"
|
|
|
+ "net"
|
|
|
+ "os"
|
|
|
+ "time"
|
|
|
+
|
|
|
+ "github.com/coreos/etcd/clientv3"
|
|
|
+ pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
|
|
|
+ "github.com/coreos/etcd/pkg/transport"
|
|
|
+ "github.com/coreos/etcd/proxy/grpcproxy"
|
|
|
+
|
|
|
+ "github.com/spf13/cobra"
|
|
|
+ "google.golang.org/grpc"
|
|
|
+)
|
|
|
+
|
|
|
+var (
|
|
|
+ grpcProxyListenAddr string
|
|
|
+ grpcProxyEndpoints []string
|
|
|
+ grpcProxyCert string
|
|
|
+ grpcProxyKey string
|
|
|
+ grpcProxyCA string
|
|
|
+)
|
|
|
+
|
|
|
+func init() {
|
|
|
+ rootCmd.AddCommand(newGRPCProxyCommand())
|
|
|
+}
|
|
|
+
|
|
|
+// newGRPCProxyCommand returns the cobra command for "grpc-proxy".
|
|
|
+func newGRPCProxyCommand() *cobra.Command {
|
|
|
+ lpc := &cobra.Command{
|
|
|
+ Use: "grpc-proxy <subcommand>",
|
|
|
+ Short: "grpc-proxy related command",
|
|
|
+ }
|
|
|
+ lpc.AddCommand(newGRPCProxyStartCommand())
|
|
|
+
|
|
|
+ return lpc
|
|
|
+}
|
|
|
+
|
|
|
+func newGRPCProxyStartCommand() *cobra.Command {
|
|
|
+ cmd := cobra.Command{
|
|
|
+ Use: "start",
|
|
|
+ Short: "start the grpc proxy",
|
|
|
+ Run: startGRPCProxy,
|
|
|
+ }
|
|
|
+
|
|
|
+ cmd.Flags().StringVar(&grpcProxyListenAddr, "listen-addr", "127.0.0.1:23790", "listen address")
|
|
|
+ cmd.Flags().StringSliceVar(&grpcProxyEndpoints, "endpoints", []string{"127.0.0.1:2379"}, "comma separated etcd cluster endpoints")
|
|
|
+ cmd.Flags().StringVar(&grpcProxyCert, "cert", "", "identify secure connections with etcd servers using this TLS certificate file")
|
|
|
+ cmd.Flags().StringVar(&grpcProxyKey, "key", "", "identify secure connections with etcd servers using this TLS key file")
|
|
|
+ cmd.Flags().StringVar(&grpcProxyCA, "cacert", "", "verify certificates of TLS-enabled secure etcd servers using this CA bundle")
|
|
|
+
|
|
|
+ return &cmd
|
|
|
+}
|
|
|
+
|
|
|
+func startGRPCProxy(cmd *cobra.Command, args []string) {
|
|
|
+ l, err := net.Listen("tcp", grpcProxyListenAddr)
|
|
|
+ if err != nil {
|
|
|
+ fmt.Fprintln(os.Stderr, err)
|
|
|
+ os.Exit(1)
|
|
|
+ }
|
|
|
+
|
|
|
+ cfg, err := newClientCfg()
|
|
|
+ if err != nil {
|
|
|
+ fmt.Fprintln(os.Stderr, err)
|
|
|
+ os.Exit(1)
|
|
|
+ }
|
|
|
+
|
|
|
+ client, err := clientv3.New(*cfg)
|
|
|
+ if err != nil {
|
|
|
+ fmt.Fprintln(os.Stderr, err)
|
|
|
+ os.Exit(1)
|
|
|
+ }
|
|
|
+
|
|
|
+ kvp := grpcproxy.NewKvProxy(client)
|
|
|
+
|
|
|
+ server := grpc.NewServer()
|
|
|
+ pb.RegisterKVServer(server, kvp)
|
|
|
+
|
|
|
+ server.Serve(l)
|
|
|
+}
|
|
|
+
|
|
|
+func newClientCfg() (*clientv3.Config, error) {
|
|
|
+ // set tls if any one tls option set
|
|
|
+ var cfgtls *transport.TLSInfo
|
|
|
+ tlsinfo := transport.TLSInfo{}
|
|
|
+ if grpcProxyCert != "" {
|
|
|
+ tlsinfo.CertFile = grpcProxyCert
|
|
|
+ cfgtls = &tlsinfo
|
|
|
+ }
|
|
|
+
|
|
|
+ if grpcProxyKey != "" {
|
|
|
+ tlsinfo.KeyFile = grpcProxyKey
|
|
|
+ cfgtls = &tlsinfo
|
|
|
+ }
|
|
|
+
|
|
|
+ if grpcProxyCA != "" {
|
|
|
+ tlsinfo.CAFile = grpcProxyCA
|
|
|
+ cfgtls = &tlsinfo
|
|
|
+ }
|
|
|
+
|
|
|
+ cfg := clientv3.Config{
|
|
|
+ Endpoints: grpcProxyEndpoints,
|
|
|
+ DialTimeout: 5 * time.Second,
|
|
|
+ }
|
|
|
+ if cfgtls != nil {
|
|
|
+ clientTLS, err := cfgtls.ClientConfig()
|
|
|
+ if err != nil {
|
|
|
+ return nil, err
|
|
|
+ }
|
|
|
+ cfg.TLS = clientTLS
|
|
|
+ }
|
|
|
+
|
|
|
+ // TODO: support insecure tls
|
|
|
+
|
|
|
+ return &cfg, nil
|
|
|
+}
|