peer_server.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543
  1. package server
  2. import (
  3. "bytes"
  4. "crypto/tls"
  5. "encoding/binary"
  6. "encoding/json"
  7. "fmt"
  8. "io/ioutil"
  9. "net/http"
  10. "net/url"
  11. "time"
  12. etcdErr "github.com/coreos/etcd/error"
  13. "github.com/coreos/etcd/log"
  14. "github.com/coreos/etcd/store"
  15. "github.com/coreos/go-raft"
  16. )
  17. type PeerServer struct {
  18. *raft.Server
  19. server *Server
  20. joinIndex uint64
  21. name string
  22. url string
  23. listenHost string
  24. tlsConf *TLSConfig
  25. tlsInfo *TLSInfo
  26. followersStats *raftFollowersStats
  27. serverStats *raftServerStats
  28. registry *Registry
  29. store *store.Store
  30. snapConf *snapshotConf
  31. MaxClusterSize int
  32. RetryTimes int
  33. }
  34. // TODO: find a good policy to do snapshot
  35. type snapshotConf struct {
  36. // Etcd will check if snapshot is need every checkingInterval
  37. checkingInterval time.Duration
  38. // The number of writes when the last snapshot happened
  39. lastWrites uint64
  40. // If the incremental number of writes since the last snapshot
  41. // exceeds the write Threshold, etcd will do a snapshot
  42. writesThr uint64
  43. }
  44. func NewPeerServer(name string, path string, url string, listenHost string, tlsConf *TLSConfig, tlsInfo *TLSInfo, registry *Registry, store *store.Store) *PeerServer {
  45. s := &PeerServer{
  46. name: name,
  47. url: url,
  48. listenHost: listenHost,
  49. tlsConf: tlsConf,
  50. tlsInfo: tlsInfo,
  51. registry: registry,
  52. store: store,
  53. snapConf: &snapshotConf{time.Second * 3, 0, 20 * 1000},
  54. followersStats: &raftFollowersStats{
  55. Leader: name,
  56. Followers: make(map[string]*raftFollowerStats),
  57. },
  58. serverStats: &raftServerStats{
  59. StartTime: time.Now(),
  60. sendRateQueue: &statsQueue{
  61. back: -1,
  62. },
  63. recvRateQueue: &statsQueue{
  64. back: -1,
  65. },
  66. },
  67. }
  68. // Create transporter for raft
  69. raftTransporter := newTransporter(tlsConf.Scheme, tlsConf.Client, s)
  70. // Create raft server
  71. server, err := raft.NewServer(name, path, raftTransporter, s.store, s, "")
  72. if err != nil {
  73. log.Fatal(err)
  74. }
  75. s.Server = server
  76. return s
  77. }
  78. // Start the raft server
  79. func (s *PeerServer) ListenAndServe(snapshot bool, cluster []string) {
  80. // LoadSnapshot
  81. if snapshot {
  82. err := s.LoadSnapshot()
  83. if err == nil {
  84. log.Debugf("%s finished load snapshot", s.name)
  85. } else {
  86. log.Debug(err)
  87. }
  88. }
  89. s.SetElectionTimeout(ElectionTimeout)
  90. s.SetHeartbeatTimeout(HeartbeatTimeout)
  91. s.Start()
  92. if s.IsLogEmpty() {
  93. // start as a leader in a new cluster
  94. if len(cluster) == 0 {
  95. s.startAsLeader()
  96. } else {
  97. s.startAsFollower(cluster)
  98. }
  99. } else {
  100. // Rejoin the previous cluster
  101. cluster = s.registry.PeerURLs(s.Leader(), s.name)
  102. for i := 0; i < len(cluster); i++ {
  103. u, err := url.Parse(cluster[i])
  104. if err != nil {
  105. log.Debug("rejoin cannot parse url: ", err)
  106. }
  107. cluster[i] = u.Host
  108. }
  109. ok := s.joinCluster(cluster)
  110. if !ok {
  111. log.Warn("the entire cluster is down! this machine will restart the cluster.")
  112. }
  113. log.Debugf("%s restart as a follower", s.name)
  114. }
  115. // open the snapshot
  116. if snapshot {
  117. go s.monitorSnapshot()
  118. }
  119. // start to response to raft requests
  120. go s.startTransport(s.tlsConf.Scheme, s.tlsConf.Server)
  121. }
  122. // Retrieves the underlying Raft server.
  123. func (s *PeerServer) RaftServer() *raft.Server {
  124. return s.Server
  125. }
  126. // Associates the client server with the peer server.
  127. func (s *PeerServer) SetServer(server *Server) {
  128. s.server = server
  129. }
  130. // Get all the current logs
  131. func (s *PeerServer) GetLogHttpHandler(w http.ResponseWriter, req *http.Request) {
  132. log.Debugf("[recv] GET %s/log", s.url)
  133. w.Header().Set("Content-Type", "application/json")
  134. w.WriteHeader(http.StatusOK)
  135. json.NewEncoder(w).Encode(s.LogEntries())
  136. }
  137. // Response to vote request
  138. func (s *PeerServer) VoteHttpHandler(w http.ResponseWriter, req *http.Request) {
  139. rvreq := &raft.RequestVoteRequest{}
  140. err := decodeJsonRequest(req, rvreq)
  141. if err == nil {
  142. log.Debugf("[recv] POST %s/vote [%s]", s.url, rvreq.CandidateName)
  143. if resp := s.RequestVote(rvreq); resp != nil {
  144. w.WriteHeader(http.StatusOK)
  145. json.NewEncoder(w).Encode(resp)
  146. return
  147. }
  148. }
  149. log.Warnf("[vote] ERROR: %v", err)
  150. w.WriteHeader(http.StatusInternalServerError)
  151. }
  152. // Response to append entries request
  153. func (s *PeerServer) AppendEntriesHttpHandler(w http.ResponseWriter, req *http.Request) {
  154. aereq := &raft.AppendEntriesRequest{}
  155. err := decodeJsonRequest(req, aereq)
  156. if err == nil {
  157. log.Debugf("[recv] POST %s/log/append [%d]", s.url, len(aereq.Entries))
  158. s.serverStats.RecvAppendReq(aereq.LeaderName, int(req.ContentLength))
  159. if resp := s.AppendEntries(aereq); resp != nil {
  160. w.WriteHeader(http.StatusOK)
  161. json.NewEncoder(w).Encode(resp)
  162. if !resp.Success {
  163. log.Debugf("[Append Entry] Step back")
  164. }
  165. return
  166. }
  167. }
  168. log.Warnf("[Append Entry] ERROR: %v", err)
  169. w.WriteHeader(http.StatusInternalServerError)
  170. }
  171. // Response to recover from snapshot request
  172. func (s *PeerServer) SnapshotHttpHandler(w http.ResponseWriter, req *http.Request) {
  173. aereq := &raft.SnapshotRequest{}
  174. err := decodeJsonRequest(req, aereq)
  175. if err == nil {
  176. log.Debugf("[recv] POST %s/snapshot/ ", s.url)
  177. if resp := s.RequestSnapshot(aereq); resp != nil {
  178. w.WriteHeader(http.StatusOK)
  179. json.NewEncoder(w).Encode(resp)
  180. return
  181. }
  182. }
  183. log.Warnf("[Snapshot] ERROR: %v", err)
  184. w.WriteHeader(http.StatusInternalServerError)
  185. }
  186. // Response to recover from snapshot request
  187. func (s *PeerServer) SnapshotRecoveryHttpHandler(w http.ResponseWriter, req *http.Request) {
  188. aereq := &raft.SnapshotRecoveryRequest{}
  189. err := decodeJsonRequest(req, aereq)
  190. if err == nil {
  191. log.Debugf("[recv] POST %s/snapshotRecovery/ ", s.url)
  192. if resp := s.SnapshotRecoveryRequest(aereq); resp != nil {
  193. w.WriteHeader(http.StatusOK)
  194. json.NewEncoder(w).Encode(resp)
  195. return
  196. }
  197. }
  198. log.Warnf("[Snapshot] ERROR: %v", err)
  199. w.WriteHeader(http.StatusInternalServerError)
  200. }
  201. // Get the port that listening for etcd connecting of the server
  202. func (s *PeerServer) EtcdURLHttpHandler(w http.ResponseWriter, req *http.Request) {
  203. log.Debugf("[recv] Get %s/etcdURL/ ", s.url)
  204. w.WriteHeader(http.StatusOK)
  205. w.Write([]byte(s.server.URL()))
  206. }
  207. // Response to the join request
  208. func (s *PeerServer) JoinHttpHandler(w http.ResponseWriter, req *http.Request) {
  209. command := &JoinCommand{}
  210. // Write CORS header.
  211. if s.server.OriginAllowed("*") {
  212. w.Header().Add("Access-Control-Allow-Origin", "*")
  213. } else if s.server.OriginAllowed(req.Header.Get("Origin")) {
  214. w.Header().Add("Access-Control-Allow-Origin", req.Header.Get("Origin"))
  215. }
  216. err := decodeJsonRequest(req, command)
  217. if err != nil {
  218. w.WriteHeader(http.StatusInternalServerError)
  219. return
  220. }
  221. log.Debugf("Receive Join Request from %s", command.Name)
  222. err = s.dispatchRaftCommand(command, w, req)
  223. // Return status.
  224. if err != nil {
  225. if etcdErr, ok := err.(*etcdErr.Error); ok {
  226. log.Debug("Return error: ", (*etcdErr).Error())
  227. etcdErr.Write(w)
  228. } else {
  229. http.Error(w, err.Error(), http.StatusInternalServerError)
  230. }
  231. }
  232. }
  233. // Response to remove request
  234. func (s *PeerServer) RemoveHttpHandler(w http.ResponseWriter, req *http.Request) {
  235. if req.Method != "DELETE" {
  236. w.WriteHeader(http.StatusMethodNotAllowed)
  237. return
  238. }
  239. nodeName := req.URL.Path[len("/remove/"):]
  240. command := &RemoveCommand{
  241. Name: nodeName,
  242. }
  243. log.Debugf("[recv] Remove Request [%s]", command.Name)
  244. s.dispatchRaftCommand(command, w, req)
  245. }
  246. // Response to the name request
  247. func (s *PeerServer) NameHttpHandler(w http.ResponseWriter, req *http.Request) {
  248. log.Debugf("[recv] Get %s/name/ ", s.url)
  249. w.WriteHeader(http.StatusOK)
  250. w.Write([]byte(s.name))
  251. }
  252. // Response to the name request
  253. func (s *PeerServer) RaftVersionHttpHandler(w http.ResponseWriter, req *http.Request) {
  254. log.Debugf("[recv] Get %s/version/ ", s.url)
  255. w.WriteHeader(http.StatusOK)
  256. w.Write([]byte(PeerVersion))
  257. }
  258. func (s *PeerServer) dispatchRaftCommand(c raft.Command, w http.ResponseWriter, req *http.Request) error {
  259. return s.dispatch(c, w, req)
  260. }
  261. func (s *PeerServer) startAsLeader() {
  262. // leader need to join self as a peer
  263. for {
  264. _, err := s.Do(NewJoinCommand(PeerVersion, s.Name(), s.url, s.server.URL()))
  265. if err == nil {
  266. break
  267. }
  268. }
  269. log.Debugf("%s start as a leader", s.name)
  270. }
  271. func (s *PeerServer) startAsFollower(cluster []string) {
  272. // start as a follower in a existing cluster
  273. for i := 0; i < s.RetryTimes; i++ {
  274. ok := s.joinCluster(cluster)
  275. if ok {
  276. return
  277. }
  278. log.Warnf("cannot join to cluster via given machines, retry in %d seconds", RetryInterval)
  279. time.Sleep(time.Second * RetryInterval)
  280. }
  281. log.Fatalf("Cannot join the cluster via given machines after %x retries", s.RetryTimes)
  282. }
  283. // Start to listen and response raft command
  284. func (s *PeerServer) startTransport(scheme string, tlsConf tls.Config) {
  285. log.Infof("raft server [name %s, listen on %s, advertised url %s]", s.name, s.listenHost, s.url)
  286. raftMux := http.NewServeMux()
  287. server := &http.Server{
  288. Handler: raftMux,
  289. TLSConfig: &tlsConf,
  290. Addr: s.listenHost,
  291. }
  292. // internal commands
  293. raftMux.HandleFunc("/name", s.NameHttpHandler)
  294. raftMux.HandleFunc("/version", s.RaftVersionHttpHandler)
  295. raftMux.HandleFunc("/join", s.JoinHttpHandler)
  296. raftMux.HandleFunc("/remove/", s.RemoveHttpHandler)
  297. raftMux.HandleFunc("/vote", s.VoteHttpHandler)
  298. raftMux.HandleFunc("/log", s.GetLogHttpHandler)
  299. raftMux.HandleFunc("/log/append", s.AppendEntriesHttpHandler)
  300. raftMux.HandleFunc("/snapshot", s.SnapshotHttpHandler)
  301. raftMux.HandleFunc("/snapshotRecovery", s.SnapshotRecoveryHttpHandler)
  302. raftMux.HandleFunc("/etcdURL", s.EtcdURLHttpHandler)
  303. if scheme == "http" {
  304. log.Fatal(server.ListenAndServe())
  305. } else {
  306. log.Fatal(server.ListenAndServeTLS(s.tlsInfo.CertFile, s.tlsInfo.KeyFile))
  307. }
  308. }
  309. // getVersion fetches the raft version of a peer. This works for now but we
  310. // will need to do something more sophisticated later when we allow mixed
  311. // version clusters.
  312. func getVersion(t *transporter, versionURL url.URL) (string, error) {
  313. resp, req, err := t.Get(versionURL.String())
  314. if err != nil {
  315. return "", err
  316. }
  317. defer resp.Body.Close()
  318. t.CancelWhenTimeout(req)
  319. body, err := ioutil.ReadAll(resp.Body)
  320. return string(body), nil
  321. }
  322. func (s *PeerServer) joinCluster(cluster []string) bool {
  323. for _, machine := range cluster {
  324. if len(machine) == 0 {
  325. continue
  326. }
  327. err := s.joinByMachine(s.Server, machine, s.tlsConf.Scheme)
  328. if err == nil {
  329. log.Debugf("%s success join to the cluster via machine %s", s.name, machine)
  330. return true
  331. } else {
  332. if _, ok := err.(etcdErr.Error); ok {
  333. log.Fatal(err)
  334. }
  335. log.Debugf("cannot join to cluster via machine %s %s", machine, err)
  336. }
  337. }
  338. return false
  339. }
  340. // Send join requests to machine.
  341. func (s *PeerServer) joinByMachine(server *raft.Server, machine string, scheme string) error {
  342. var b bytes.Buffer
  343. // t must be ok
  344. t, _ := server.Transporter().(*transporter)
  345. // Our version must match the leaders version
  346. versionURL := url.URL{Host: machine, Scheme: scheme, Path: "/version"}
  347. version, err := getVersion(t, versionURL)
  348. if err != nil {
  349. return fmt.Errorf("Error during join version check: %v", err)
  350. }
  351. // TODO: versioning of the internal protocol. See:
  352. // Documentation/internatl-protocol-versioning.md
  353. if version != PeerVersion {
  354. return fmt.Errorf("Unable to join: internal version mismatch, entire cluster must be running identical versions of etcd")
  355. }
  356. json.NewEncoder(&b).Encode(NewJoinCommand(PeerVersion, server.Name(), s.url, s.server.URL()))
  357. joinURL := url.URL{Host: machine, Scheme: scheme, Path: "/join"}
  358. log.Debugf("Send Join Request to %s", joinURL.String())
  359. resp, req, err := t.Post(joinURL.String(), &b)
  360. for {
  361. if err != nil {
  362. return fmt.Errorf("Unable to join: %v", err)
  363. }
  364. if resp != nil {
  365. defer resp.Body.Close()
  366. t.CancelWhenTimeout(req)
  367. if resp.StatusCode == http.StatusOK {
  368. b, _ := ioutil.ReadAll(resp.Body)
  369. s.joinIndex, _ = binary.Uvarint(b)
  370. return nil
  371. }
  372. if resp.StatusCode == http.StatusTemporaryRedirect {
  373. address := resp.Header.Get("Location")
  374. log.Debugf("Send Join Request to %s", address)
  375. json.NewEncoder(&b).Encode(NewJoinCommand(PeerVersion, server.Name(), s.url, s.server.URL()))
  376. resp, req, err = t.Post(address, &b)
  377. } else if resp.StatusCode == http.StatusBadRequest {
  378. log.Debug("Reach max number machines in the cluster")
  379. decoder := json.NewDecoder(resp.Body)
  380. err := &etcdErr.Error{}
  381. decoder.Decode(err)
  382. return *err
  383. } else {
  384. return fmt.Errorf("Unable to join")
  385. }
  386. }
  387. }
  388. }
  389. func (s *PeerServer) Stats() []byte {
  390. s.serverStats.LeaderInfo.Uptime = time.Now().Sub(s.serverStats.LeaderInfo.startTime).String()
  391. queue := s.serverStats.sendRateQueue
  392. s.serverStats.SendingPkgRate, s.serverStats.SendingBandwidthRate = queue.Rate()
  393. queue = s.serverStats.recvRateQueue
  394. s.serverStats.RecvingPkgRate, s.serverStats.RecvingBandwidthRate = queue.Rate()
  395. b, _ := json.Marshal(s.serverStats)
  396. return b
  397. }
  398. func (s *PeerServer) PeerStats() []byte {
  399. if s.State() == raft.Leader {
  400. b, _ := json.Marshal(s.followersStats)
  401. return b
  402. }
  403. return nil
  404. }
  405. func (s *PeerServer) monitorSnapshot() {
  406. for {
  407. time.Sleep(s.snapConf.checkingInterval)
  408. currentWrites := 0
  409. if uint64(currentWrites) > s.snapConf.writesThr {
  410. s.TakeSnapshot()
  411. s.snapConf.lastWrites = 0
  412. }
  413. }
  414. }
  415. func (s *PeerServer) dispatch(c raft.Command, w http.ResponseWriter, req *http.Request) error {
  416. if s.State() == raft.Leader {
  417. if response, err := s.Do(c); err != nil {
  418. return err
  419. } else {
  420. if response == nil {
  421. return etcdErr.NewError(300, "Empty response from raft", store.UndefIndex, store.UndefTerm)
  422. }
  423. event, ok := response.(*store.Event)
  424. if ok {
  425. bytes, err := json.Marshal(event)
  426. if err != nil {
  427. fmt.Println(err)
  428. }
  429. w.Header().Add("X-Etcd-Index", fmt.Sprint(event.Index))
  430. w.Header().Add("X-Etcd-Term", fmt.Sprint(event.Term))
  431. w.WriteHeader(http.StatusOK)
  432. w.Write(bytes)
  433. return nil
  434. }
  435. bytes, _ := response.([]byte)
  436. w.WriteHeader(http.StatusOK)
  437. w.Write(bytes)
  438. return nil
  439. }
  440. } else {
  441. leader := s.Leader()
  442. // current no leader
  443. if leader == "" {
  444. return etcdErr.NewError(300, "", store.UndefIndex, store.UndefTerm)
  445. }
  446. url, _ := s.registry.PeerURL(leader)
  447. log.Debugf("Not leader; Current leader: %s; redirect: %s", leader, url)
  448. redirect(url, w, req)
  449. return nil
  450. }
  451. }