peer_server.go 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400
  1. package server
  2. import (
  3. "bytes"
  4. "crypto/tls"
  5. "encoding/binary"
  6. "encoding/json"
  7. "fmt"
  8. "io/ioutil"
  9. "net"
  10. "net/http"
  11. "net/url"
  12. "time"
  13. etcdErr "github.com/coreos/etcd/error"
  14. "github.com/coreos/etcd/log"
  15. "github.com/coreos/etcd/store"
  16. "github.com/coreos/go-raft"
  17. )
  18. type PeerServer struct {
  19. raftServer raft.Server
  20. server *Server
  21. httpServer *http.Server
  22. listener net.Listener
  23. joinIndex uint64
  24. name string
  25. url string
  26. listenHost string
  27. tlsConf *TLSConfig
  28. tlsInfo *TLSInfo
  29. followersStats *raftFollowersStats
  30. serverStats *raftServerStats
  31. registry *Registry
  32. store store.Store
  33. snapConf *snapshotConf
  34. MaxClusterSize int
  35. RetryTimes int
  36. }
  37. // TODO: find a good policy to do snapshot
  38. type snapshotConf struct {
  39. // Etcd will check if snapshot is need every checkingInterval
  40. checkingInterval time.Duration
  41. // The number of writes when the last snapshot happened
  42. lastWrites uint64
  43. // If the incremental number of writes since the last snapshot
  44. // exceeds the write Threshold, etcd will do a snapshot
  45. writesThr uint64
  46. }
  47. func NewPeerServer(name string, path string, url string, listenHost string, tlsConf *TLSConfig, tlsInfo *TLSInfo, registry *Registry, store store.Store) *PeerServer {
  48. s := &PeerServer{
  49. name: name,
  50. url: url,
  51. listenHost: listenHost,
  52. tlsConf: tlsConf,
  53. tlsInfo: tlsInfo,
  54. registry: registry,
  55. store: store,
  56. snapConf: &snapshotConf{time.Second * 3, 0, 20 * 1000},
  57. followersStats: &raftFollowersStats{
  58. Leader: name,
  59. Followers: make(map[string]*raftFollowerStats),
  60. },
  61. serverStats: &raftServerStats{
  62. StartTime: time.Now(),
  63. sendRateQueue: &statsQueue{
  64. back: -1,
  65. },
  66. recvRateQueue: &statsQueue{
  67. back: -1,
  68. },
  69. },
  70. }
  71. // Create transporter for raft
  72. raftTransporter := newTransporter(tlsConf.Scheme, tlsConf.Client, s)
  73. // Create raft server
  74. raftServer, err := raft.NewServer(name, path, raftTransporter, s.store, s, "")
  75. if err != nil {
  76. log.Fatal(err)
  77. }
  78. s.raftServer = raftServer
  79. return s
  80. }
  81. // Start the raft server
  82. func (s *PeerServer) ListenAndServe(snapshot bool, cluster []string) error {
  83. // LoadSnapshot
  84. if snapshot {
  85. err := s.raftServer.LoadSnapshot()
  86. if err == nil {
  87. log.Debugf("%s finished load snapshot", s.name)
  88. } else {
  89. log.Debug(err)
  90. }
  91. }
  92. s.raftServer.SetElectionTimeout(ElectionTimeout)
  93. s.raftServer.SetHeartbeatTimeout(HeartbeatTimeout)
  94. s.raftServer.Start()
  95. if s.raftServer.IsLogEmpty() {
  96. // start as a leader in a new cluster
  97. if len(cluster) == 0 {
  98. s.startAsLeader()
  99. } else {
  100. s.startAsFollower(cluster)
  101. }
  102. } else {
  103. // Rejoin the previous cluster
  104. cluster = s.registry.PeerURLs(s.raftServer.Leader(), s.name)
  105. for i := 0; i < len(cluster); i++ {
  106. u, err := url.Parse(cluster[i])
  107. if err != nil {
  108. log.Debug("rejoin cannot parse url: ", err)
  109. }
  110. cluster[i] = u.Host
  111. }
  112. ok := s.joinCluster(cluster)
  113. if !ok {
  114. log.Warn("the entire cluster is down! this machine will restart the cluster.")
  115. }
  116. log.Debugf("%s restart as a follower", s.name)
  117. }
  118. // open the snapshot
  119. if snapshot {
  120. go s.monitorSnapshot()
  121. }
  122. // start to response to raft requests
  123. return s.startTransport(s.tlsConf.Scheme, s.tlsConf.Server)
  124. }
  125. // Overridden version of net/http added so we can manage the listener.
  126. func (s *PeerServer) listenAndServe() error {
  127. addr := s.httpServer.Addr
  128. if addr == "" {
  129. addr = ":http"
  130. }
  131. l, e := net.Listen("tcp", addr)
  132. if e != nil {
  133. return e
  134. }
  135. s.listener = l
  136. return s.httpServer.Serve(l)
  137. }
  138. // Overridden version of net/http added so we can manage the listener.
  139. func (s *PeerServer) listenAndServeTLS(certFile, keyFile string) error {
  140. addr := s.httpServer.Addr
  141. if addr == "" {
  142. addr = ":https"
  143. }
  144. config := &tls.Config{}
  145. if s.httpServer.TLSConfig != nil {
  146. *config = *s.httpServer.TLSConfig
  147. }
  148. if config.NextProtos == nil {
  149. config.NextProtos = []string{"http/1.1"}
  150. }
  151. var err error
  152. config.Certificates = make([]tls.Certificate, 1)
  153. config.Certificates[0], err = tls.LoadX509KeyPair(certFile, keyFile)
  154. if err != nil {
  155. return err
  156. }
  157. conn, err := net.Listen("tcp", addr)
  158. if err != nil {
  159. return err
  160. }
  161. tlsListener := tls.NewListener(conn, config)
  162. s.listener = tlsListener
  163. return s.httpServer.Serve(tlsListener)
  164. }
  165. // Stops the server.
  166. func (s *PeerServer) Close() {
  167. if s.listener != nil {
  168. s.listener.Close()
  169. s.listener = nil
  170. }
  171. }
  172. // Retrieves the underlying Raft server.
  173. func (s *PeerServer) RaftServer() raft.Server {
  174. return s.raftServer
  175. }
  176. // Associates the client server with the peer server.
  177. func (s *PeerServer) SetServer(server *Server) {
  178. s.server = server
  179. }
  180. func (s *PeerServer) startAsLeader() {
  181. // leader need to join self as a peer
  182. for {
  183. _, err := s.raftServer.Do(NewJoinCommand(PeerVersion, s.raftServer.Name(), s.url, s.server.URL()))
  184. if err == nil {
  185. break
  186. }
  187. }
  188. log.Debugf("%s start as a leader", s.name)
  189. }
  190. func (s *PeerServer) startAsFollower(cluster []string) {
  191. // start as a follower in a existing cluster
  192. for i := 0; i < s.RetryTimes; i++ {
  193. ok := s.joinCluster(cluster)
  194. if ok {
  195. return
  196. }
  197. log.Warnf("cannot join to cluster via given machines, retry in %d seconds", RetryInterval)
  198. time.Sleep(time.Second * RetryInterval)
  199. }
  200. log.Fatalf("Cannot join the cluster via given machines after %x retries", s.RetryTimes)
  201. }
  202. // Start to listen and response raft command
  203. func (s *PeerServer) startTransport(scheme string, tlsConf tls.Config) error {
  204. log.Infof("raft server [name %s, listen on %s, advertised url %s]", s.name, s.listenHost, s.url)
  205. raftMux := http.NewServeMux()
  206. s.httpServer = &http.Server{
  207. Handler: raftMux,
  208. TLSConfig: &tlsConf,
  209. Addr: s.listenHost,
  210. }
  211. // internal commands
  212. raftMux.HandleFunc("/name", s.NameHttpHandler)
  213. raftMux.HandleFunc("/version", s.RaftVersionHttpHandler)
  214. raftMux.HandleFunc("/join", s.JoinHttpHandler)
  215. raftMux.HandleFunc("/remove/", s.RemoveHttpHandler)
  216. raftMux.HandleFunc("/vote", s.VoteHttpHandler)
  217. raftMux.HandleFunc("/log", s.GetLogHttpHandler)
  218. raftMux.HandleFunc("/log/append", s.AppendEntriesHttpHandler)
  219. raftMux.HandleFunc("/snapshot", s.SnapshotHttpHandler)
  220. raftMux.HandleFunc("/snapshotRecovery", s.SnapshotRecoveryHttpHandler)
  221. raftMux.HandleFunc("/etcdURL", s.EtcdURLHttpHandler)
  222. if scheme == "http" {
  223. return s.listenAndServe()
  224. } else {
  225. return s.listenAndServeTLS(s.tlsInfo.CertFile, s.tlsInfo.KeyFile)
  226. }
  227. }
  228. // getVersion fetches the raft version of a peer. This works for now but we
  229. // will need to do something more sophisticated later when we allow mixed
  230. // version clusters.
  231. func getVersion(t *transporter, versionURL url.URL) (string, error) {
  232. resp, req, err := t.Get(versionURL.String())
  233. if err != nil {
  234. return "", err
  235. }
  236. defer resp.Body.Close()
  237. t.CancelWhenTimeout(req)
  238. body, err := ioutil.ReadAll(resp.Body)
  239. return string(body), nil
  240. }
  241. func (s *PeerServer) joinCluster(cluster []string) bool {
  242. for _, machine := range cluster {
  243. if len(machine) == 0 {
  244. continue
  245. }
  246. err := s.joinByMachine(s.raftServer, machine, s.tlsConf.Scheme)
  247. if err == nil {
  248. log.Debugf("%s success join to the cluster via machine %s", s.name, machine)
  249. return true
  250. } else {
  251. if _, ok := err.(etcdErr.Error); ok {
  252. log.Fatal(err)
  253. }
  254. log.Debugf("cannot join to cluster via machine %s %s", machine, err)
  255. }
  256. }
  257. return false
  258. }
  259. // Send join requests to machine.
  260. func (s *PeerServer) joinByMachine(server raft.Server, machine string, scheme string) error {
  261. var b bytes.Buffer
  262. // t must be ok
  263. t, _ := server.Transporter().(*transporter)
  264. // Our version must match the leaders version
  265. versionURL := url.URL{Host: machine, Scheme: scheme, Path: "/version"}
  266. version, err := getVersion(t, versionURL)
  267. if err != nil {
  268. return fmt.Errorf("Error during join version check: %v", err)
  269. }
  270. // TODO: versioning of the internal protocol. See:
  271. // Documentation/internatl-protocol-versioning.md
  272. if version != PeerVersion {
  273. return fmt.Errorf("Unable to join: internal version mismatch, entire cluster must be running identical versions of etcd")
  274. }
  275. json.NewEncoder(&b).Encode(NewJoinCommand(PeerVersion, server.Name(), s.url, s.server.URL()))
  276. joinURL := url.URL{Host: machine, Scheme: scheme, Path: "/join"}
  277. log.Debugf("Send Join Request to %s", joinURL.String())
  278. resp, req, err := t.Post(joinURL.String(), &b)
  279. for {
  280. if err != nil {
  281. return fmt.Errorf("Unable to join: %v", err)
  282. }
  283. if resp != nil {
  284. defer resp.Body.Close()
  285. t.CancelWhenTimeout(req)
  286. if resp.StatusCode == http.StatusOK {
  287. b, _ := ioutil.ReadAll(resp.Body)
  288. s.joinIndex, _ = binary.Uvarint(b)
  289. return nil
  290. }
  291. if resp.StatusCode == http.StatusTemporaryRedirect {
  292. address := resp.Header.Get("Location")
  293. log.Debugf("Send Join Request to %s", address)
  294. json.NewEncoder(&b).Encode(NewJoinCommand(PeerVersion, server.Name(), s.url, s.server.URL()))
  295. resp, req, err = t.Post(address, &b)
  296. } else if resp.StatusCode == http.StatusBadRequest {
  297. log.Debug("Reach max number machines in the cluster")
  298. decoder := json.NewDecoder(resp.Body)
  299. err := &etcdErr.Error{}
  300. decoder.Decode(err)
  301. return *err
  302. } else {
  303. return fmt.Errorf("Unable to join")
  304. }
  305. }
  306. }
  307. }
  308. func (s *PeerServer) Stats() []byte {
  309. s.serverStats.LeaderInfo.Uptime = time.Now().Sub(s.serverStats.LeaderInfo.startTime).String()
  310. queue := s.serverStats.sendRateQueue
  311. s.serverStats.SendingPkgRate, s.serverStats.SendingBandwidthRate = queue.Rate()
  312. queue = s.serverStats.recvRateQueue
  313. s.serverStats.RecvingPkgRate, s.serverStats.RecvingBandwidthRate = queue.Rate()
  314. b, _ := json.Marshal(s.serverStats)
  315. return b
  316. }
  317. func (s *PeerServer) PeerStats() []byte {
  318. if s.raftServer.State() == raft.Leader {
  319. b, _ := json.Marshal(s.followersStats)
  320. return b
  321. }
  322. return nil
  323. }
  324. func (s *PeerServer) monitorSnapshot() {
  325. for {
  326. time.Sleep(s.snapConf.checkingInterval)
  327. currentWrites := 0
  328. if uint64(currentWrites) > s.snapConf.writesThr {
  329. s.raftServer.TakeSnapshot()
  330. s.snapConf.lastWrites = 0
  331. }
  332. }
  333. }