etcd.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391
  1. // Copyright 2015 CoreOS, Inc.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package etcdmain
  15. import (
  16. "encoding/json"
  17. "fmt"
  18. "io/ioutil"
  19. "log"
  20. "net"
  21. "net/http"
  22. "os"
  23. "path"
  24. "reflect"
  25. "strings"
  26. "time"
  27. "github.com/coreos/etcd/discovery"
  28. "github.com/coreos/etcd/etcdserver"
  29. "github.com/coreos/etcd/etcdserver/etcdhttp"
  30. "github.com/coreos/etcd/pkg/cors"
  31. "github.com/coreos/etcd/pkg/fileutil"
  32. "github.com/coreos/etcd/pkg/osutil"
  33. "github.com/coreos/etcd/pkg/transport"
  34. "github.com/coreos/etcd/pkg/types"
  35. "github.com/coreos/etcd/proxy"
  36. "github.com/coreos/etcd/rafthttp"
  37. )
  38. type dirType string
  39. const (
  40. // the owner can make/remove files inside the directory
  41. privateDirMode = 0700
  42. )
  43. var (
  44. dirMember = dirType("member")
  45. dirProxy = dirType("proxy")
  46. dirEmpty = dirType("empty")
  47. )
  48. func Main() {
  49. cfg := NewConfig()
  50. err := cfg.Parse(os.Args[1:])
  51. if err != nil {
  52. log.Printf("etcd: error verifying flags, %v. See 'etcd -help'.", err)
  53. os.Exit(2)
  54. }
  55. var stopped <-chan struct{}
  56. if cfg.name != defaultName && cfg.initialCluster == initialClusterFromName(defaultName) {
  57. cfg.initialCluster = initialClusterFromName(cfg.name)
  58. }
  59. if cfg.dir == "" {
  60. cfg.dir = fmt.Sprintf("%v.etcd", cfg.name)
  61. log.Printf("etcd: no data-dir provided, using default data-dir ./%s", cfg.dir)
  62. }
  63. which := identifyDataDirOrDie(cfg.dir)
  64. if which != dirEmpty {
  65. log.Printf("etcd: already initialized as %v before, starting as etcd %v...", which, which)
  66. }
  67. shouldProxy := cfg.isProxy() || which == dirProxy
  68. if !shouldProxy {
  69. stopped, err = startEtcd(cfg)
  70. if err == discovery.ErrFullCluster && cfg.shouldFallbackToProxy() {
  71. log.Printf("etcd: discovery cluster full, falling back to %s", fallbackFlagProxy)
  72. shouldProxy = true
  73. }
  74. }
  75. if shouldProxy {
  76. err = startProxy(cfg)
  77. }
  78. if err != nil {
  79. switch err {
  80. case discovery.ErrDuplicateID:
  81. log.Fatalf("etcd: member %s has previously registered with discovery service (%s), but the data-dir (%s) on disk cannot be found.",
  82. cfg.name, cfg.durl, cfg.dir)
  83. default:
  84. log.Fatalf("etcd: %v", err)
  85. }
  86. }
  87. osutil.HandleInterrupts()
  88. <-stopped
  89. osutil.Exit(0)
  90. }
  91. // startEtcd launches the etcd server and HTTP handlers for client/server communication.
  92. func startEtcd(cfg *config) (<-chan struct{}, error) {
  93. cls, err := setupCluster(cfg)
  94. if err != nil {
  95. return nil, fmt.Errorf("error setting up initial cluster: %v", err)
  96. }
  97. pt, err := transport.NewTimeoutTransport(cfg.peerTLSInfo, rafthttp.DialTimeout, rafthttp.ConnReadTimeout, rafthttp.ConnWriteTimeout)
  98. if err != nil {
  99. return nil, err
  100. }
  101. if !cfg.peerTLSInfo.Empty() {
  102. log.Printf("etcd: peerTLS: %s", cfg.peerTLSInfo)
  103. }
  104. plns := make([]net.Listener, 0)
  105. for _, u := range cfg.lpurls {
  106. var l net.Listener
  107. l, err = transport.NewTimeoutListener(u.Host, u.Scheme, cfg.peerTLSInfo, rafthttp.ConnReadTimeout, rafthttp.ConnWriteTimeout)
  108. if err != nil {
  109. return nil, err
  110. }
  111. urlStr := u.String()
  112. log.Print("etcd: listening for peers on ", urlStr)
  113. defer func() {
  114. if err != nil {
  115. l.Close()
  116. log.Print("etcd: stopping listening for peers on ", urlStr)
  117. }
  118. }()
  119. plns = append(plns, l)
  120. }
  121. if !cfg.clientTLSInfo.Empty() {
  122. log.Printf("etcd: clientTLS: %s", cfg.clientTLSInfo)
  123. }
  124. clns := make([]net.Listener, 0)
  125. for _, u := range cfg.lcurls {
  126. var l net.Listener
  127. l, err = transport.NewKeepAliveListener(u.Host, u.Scheme, cfg.clientTLSInfo)
  128. if err != nil {
  129. return nil, err
  130. }
  131. urlStr := u.String()
  132. log.Print("etcd: listening for client requests on ", urlStr)
  133. defer func() {
  134. if err != nil {
  135. l.Close()
  136. log.Print("etcd: stopping listening for client requests on ", urlStr)
  137. }
  138. }()
  139. clns = append(clns, l)
  140. }
  141. srvcfg := &etcdserver.ServerConfig{
  142. Name: cfg.name,
  143. ClientURLs: cfg.acurls,
  144. PeerURLs: cfg.apurls,
  145. DataDir: cfg.dir,
  146. SnapCount: cfg.snapCount,
  147. MaxSnapFiles: cfg.maxSnapFiles,
  148. MaxWALFiles: cfg.maxWalFiles,
  149. Cluster: cls,
  150. DiscoveryURL: cfg.durl,
  151. DiscoveryProxy: cfg.dproxy,
  152. NewCluster: cfg.isNewCluster(),
  153. ForceNewCluster: cfg.forceNewCluster,
  154. Transport: pt,
  155. TickMs: cfg.TickMs,
  156. ElectionTicks: cfg.electionTicks(),
  157. }
  158. var s *etcdserver.EtcdServer
  159. s, err = etcdserver.NewServer(srvcfg)
  160. if err != nil {
  161. return nil, err
  162. }
  163. s.Start()
  164. osutil.RegisterInterruptHandler(s.Stop)
  165. if cfg.corsInfo.String() != "" {
  166. log.Printf("etcd: cors = %s", cfg.corsInfo)
  167. }
  168. ch := &cors.CORSHandler{
  169. Handler: etcdhttp.NewClientHandler(s),
  170. Info: cfg.corsInfo,
  171. }
  172. ph := etcdhttp.NewPeerHandler(s.Cluster, etcdserver.RaftTimer(s), s.RaftHandler())
  173. // Start the peer server in a goroutine
  174. for _, l := range plns {
  175. go func(l net.Listener) {
  176. log.Fatal(serveHTTP(l, ph, 5*time.Minute))
  177. }(l)
  178. }
  179. // Start a client server goroutine for each listen address
  180. for _, l := range clns {
  181. go func(l net.Listener) {
  182. // read timeout does not work with http close notify
  183. // TODO: https://github.com/golang/go/issues/9524
  184. log.Fatal(serveHTTP(l, ch, 0))
  185. }(l)
  186. }
  187. return s.StopNotify(), nil
  188. }
  189. // startProxy launches an HTTP proxy for client communication which proxies to other etcd nodes.
  190. func startProxy(cfg *config) error {
  191. cls, err := setupCluster(cfg)
  192. if err != nil {
  193. return fmt.Errorf("error setting up initial cluster: %v", err)
  194. }
  195. if cfg.durl != "" {
  196. s, err := discovery.GetCluster(cfg.durl, cfg.dproxy)
  197. if err != nil {
  198. return err
  199. }
  200. if cls, err = etcdserver.NewClusterFromString(cfg.durl, s); err != nil {
  201. return err
  202. }
  203. }
  204. pt, err := transport.NewTransport(cfg.clientTLSInfo)
  205. if err != nil {
  206. return err
  207. }
  208. tr, err := transport.NewTransport(cfg.peerTLSInfo)
  209. if err != nil {
  210. return err
  211. }
  212. cfg.dir = path.Join(cfg.dir, "proxy")
  213. err = os.MkdirAll(cfg.dir, 0700)
  214. if err != nil {
  215. return err
  216. }
  217. var peerURLs []string
  218. clusterfile := path.Join(cfg.dir, "cluster")
  219. b, err := ioutil.ReadFile(clusterfile)
  220. switch {
  221. case err == nil:
  222. urls := struct{ PeerURLs []string }{}
  223. err := json.Unmarshal(b, &urls)
  224. if err != nil {
  225. return err
  226. }
  227. peerURLs = urls.PeerURLs
  228. log.Printf("proxy: using peer urls %v from cluster file ./%s", peerURLs, clusterfile)
  229. case os.IsNotExist(err):
  230. peerURLs = cls.PeerURLs()
  231. log.Printf("proxy: using peer urls %v ", peerURLs)
  232. default:
  233. return err
  234. }
  235. uf := func() []string {
  236. gcls, err := etcdserver.GetClusterFromRemotePeers(peerURLs, tr)
  237. // TODO: remove the 2nd check when we fix GetClusterFromPeers
  238. // GetClusterFromPeers should not return nil error with an invaild empty cluster
  239. if err != nil {
  240. log.Printf("proxy: %v", err)
  241. return []string{}
  242. }
  243. if len(gcls.Members()) == 0 {
  244. return cls.ClientURLs()
  245. }
  246. cls = gcls
  247. urls := struct{ PeerURLs []string }{cls.PeerURLs()}
  248. b, err := json.Marshal(urls)
  249. if err != nil {
  250. log.Printf("proxy: error on marshal peer urls %s", err)
  251. return cls.ClientURLs()
  252. }
  253. err = ioutil.WriteFile(clusterfile+".bak", b, 0600)
  254. if err != nil {
  255. log.Printf("proxy: error on writing urls %s", err)
  256. return cls.ClientURLs()
  257. }
  258. err = os.Rename(clusterfile+".bak", clusterfile)
  259. if err != nil {
  260. log.Printf("proxy: error on updating clusterfile %s", err)
  261. return cls.ClientURLs()
  262. }
  263. if !reflect.DeepEqual(cls.PeerURLs(), peerURLs) {
  264. log.Printf("proxy: updated peer urls in cluster file from %v to %v", peerURLs, cls.PeerURLs())
  265. }
  266. peerURLs = cls.PeerURLs()
  267. return cls.ClientURLs()
  268. }
  269. ph := proxy.NewHandler(pt, uf)
  270. ph = &cors.CORSHandler{
  271. Handler: ph,
  272. Info: cfg.corsInfo,
  273. }
  274. if cfg.isReadonlyProxy() {
  275. ph = proxy.NewReadonlyHandler(ph)
  276. }
  277. // Start a proxy server goroutine for each listen address
  278. for _, u := range cfg.lcurls {
  279. l, err := transport.NewListener(u.Host, u.Scheme, cfg.clientTLSInfo)
  280. if err != nil {
  281. return err
  282. }
  283. host := u.Host
  284. go func() {
  285. log.Print("proxy: listening for client requests on ", host)
  286. log.Fatal(http.Serve(l, ph))
  287. }()
  288. }
  289. return nil
  290. }
  291. // setupCluster sets up an initial cluster definition for bootstrap or discovery.
  292. func setupCluster(cfg *config) (*etcdserver.Cluster, error) {
  293. var cls *etcdserver.Cluster
  294. var err error
  295. switch {
  296. case cfg.durl != "":
  297. // If using discovery, generate a temporary cluster based on
  298. // self's advertised peer URLs
  299. clusterStr := genClusterString(cfg.name, cfg.apurls)
  300. cls, err = etcdserver.NewClusterFromString(cfg.durl, clusterStr)
  301. case cfg.dnsCluster != "":
  302. clusterStr, clusterToken, err := discovery.SRVGetCluster(cfg.name, cfg.dnsCluster, cfg.initialClusterToken, cfg.apurls)
  303. if err != nil {
  304. return nil, err
  305. }
  306. cls, err = etcdserver.NewClusterFromString(clusterToken, clusterStr)
  307. default:
  308. // We're statically configured, and cluster has appropriately been set.
  309. cls, err = etcdserver.NewClusterFromString(cfg.initialClusterToken, cfg.initialCluster)
  310. }
  311. return cls, err
  312. }
  313. func genClusterString(name string, urls types.URLs) string {
  314. addrs := make([]string, 0)
  315. for _, u := range urls {
  316. addrs = append(addrs, fmt.Sprintf("%v=%v", name, u.String()))
  317. }
  318. return strings.Join(addrs, ",")
  319. }
  320. // identifyDataDirOrDie returns the type of the data dir.
  321. // Dies if the datadir is invalid.
  322. func identifyDataDirOrDie(dir string) dirType {
  323. names, err := fileutil.ReadDir(dir)
  324. if err != nil {
  325. if os.IsNotExist(err) {
  326. return dirEmpty
  327. }
  328. log.Fatalf("etcd: error listing data dir: %s", dir)
  329. }
  330. var m, p bool
  331. for _, name := range names {
  332. switch dirType(name) {
  333. case dirMember:
  334. m = true
  335. case dirProxy:
  336. p = true
  337. default:
  338. log.Printf("etcd: found invalid file/dir %s under data dir %s (Ignore this if you are upgrading etcd)", name, dir)
  339. }
  340. }
  341. if m && p {
  342. log.Fatal("etcd: invalid datadir. Both member and proxy directories exist.")
  343. }
  344. if m {
  345. return dirMember
  346. }
  347. if p {
  348. return dirProxy
  349. }
  350. return dirEmpty
  351. }