starter.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409
  1. // Copyright 2015 CoreOS, Inc.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package starter
  15. import (
  16. "encoding/json"
  17. "flag"
  18. "fmt"
  19. "io/ioutil"
  20. "log"
  21. "net/http"
  22. "net/url"
  23. "os"
  24. "path"
  25. "strings"
  26. "syscall"
  27. "github.com/coreos/etcd/client"
  28. "github.com/coreos/etcd/etcdmain"
  29. "github.com/coreos/etcd/migrate"
  30. "github.com/coreos/etcd/pkg/fileutil"
  31. "github.com/coreos/etcd/pkg/flags"
  32. "github.com/coreos/etcd/pkg/types"
  33. "github.com/coreos/etcd/Godeps/_workspace/src/golang.org/x/net/context"
  34. )
  35. type version string
  36. const (
  37. internalV1 version = "1"
  38. internalV2 version = "2"
  39. internalV2Proxy version = "2.proxy"
  40. internalUnknown version = "unknown"
  41. v0_4 version = "v0.4"
  42. v2_0 version = "v2.0"
  43. v2_0Proxy version = "v2.0 proxy"
  44. empty version = "empty"
  45. unknown version = "unknown"
  46. defaultInternalV1etcdBinaryDir = "/usr/libexec/etcd/versions/"
  47. )
  48. var (
  49. v2SpecialFlags = []string{
  50. "initial-cluster",
  51. "listen-peer-urls",
  52. "listen-client-urls",
  53. "proxy",
  54. }
  55. )
  56. func StartDesiredVersion(args []string) {
  57. fs, err := parseConfig(args)
  58. if err != nil {
  59. return
  60. }
  61. ver := checkInternalVersion(fs)
  62. log.Printf("starter: start etcd version %s", ver)
  63. switch ver {
  64. case internalV1:
  65. startInternalV1()
  66. case internalV2:
  67. case internalV2Proxy:
  68. if _, err := os.Stat(standbyInfo4(fs.Lookup("data-dir").Value.String())); err != nil {
  69. log.Printf("starter: Detect standby_info file exists, and add --proxy=on flag to ensure it runs in v2.0 proxy mode.")
  70. log.Printf("starter: Before removing v0.4 data, --proxy=on flag MUST be added.")
  71. }
  72. // append proxy flag to args to trigger proxy mode
  73. os.Args = append(os.Args, "-proxy=on")
  74. default:
  75. log.Panicf("starter: unhandled start version")
  76. }
  77. }
  78. func checkInternalVersion(fs *flag.FlagSet) version {
  79. // If it uses 2.0 env var explicitly, start 2.0
  80. for _, name := range v2SpecialFlags {
  81. if fs.Lookup(name).Value.String() != "" {
  82. return internalV2
  83. }
  84. }
  85. dataDir := fs.Lookup("data-dir").Value.String()
  86. if dataDir == "" {
  87. log.Fatalf("starter: please set --data-dir or ETCD_DATA_DIR for etcd")
  88. }
  89. // check the data directory
  90. ver, err := checkVersion(dataDir)
  91. if err != nil {
  92. log.Fatalf("starter: failed to detect etcd version in %v: %v", dataDir, err)
  93. }
  94. log.Printf("starter: detect etcd version %s in %s", ver, dataDir)
  95. switch ver {
  96. case v2_0:
  97. return internalV2
  98. case v2_0Proxy:
  99. return internalV2Proxy
  100. case v0_4:
  101. standbyInfo, err := migrate.DecodeStandbyInfo4FromFile(standbyInfo4(dataDir))
  102. if err != nil && !os.IsNotExist(err) {
  103. log.Fatalf("starter: failed to decode standbyInfo in %v: %v", dataDir, err)
  104. }
  105. inStandbyMode := standbyInfo != nil && standbyInfo.Running
  106. if inStandbyMode {
  107. ver, err := checkInternalVersionByClientURLs(standbyInfo.ClientURLs(), clientTLSInfo(fs))
  108. if err != nil {
  109. log.Printf("starter: failed to check start version through peers: %v", err)
  110. return internalV1
  111. }
  112. if ver == internalV2 {
  113. os.Args = append(os.Args, "-initial-cluster", standbyInfo.InitialCluster())
  114. return internalV2Proxy
  115. }
  116. return ver
  117. }
  118. ver, err := checkInternalVersionByDataDir4(dataDir)
  119. if err != nil {
  120. log.Fatalf("starter: failed to check start version in %v: %v", dataDir, err)
  121. }
  122. return ver
  123. case empty:
  124. discovery := fs.Lookup("discovery").Value.String()
  125. dpeers, err := getPeersFromDiscoveryURL(discovery)
  126. if err != nil {
  127. log.Printf("starter: failed to get peers from discovery %s: %v", discovery, err)
  128. }
  129. peerStr := fs.Lookup("peers").Value.String()
  130. ppeers := getPeersFromPeersFlag(peerStr, peerTLSInfo(fs))
  131. urls := getClientURLsByPeerURLs(append(dpeers, ppeers...), peerTLSInfo(fs))
  132. ver, err := checkInternalVersionByClientURLs(urls, clientTLSInfo(fs))
  133. if err != nil {
  134. log.Printf("starter: failed to check start version through peers: %v", err)
  135. return internalV2
  136. }
  137. return ver
  138. }
  139. // never reach here
  140. log.Panicf("starter: unhandled etcd version in %v", dataDir)
  141. return internalUnknown
  142. }
  143. func checkVersion(dataDir string) (version, error) {
  144. names, err := fileutil.ReadDir(dataDir)
  145. if err != nil {
  146. if os.IsNotExist(err) {
  147. err = nil
  148. }
  149. return empty, err
  150. }
  151. if len(names) == 0 {
  152. return empty, nil
  153. }
  154. nameSet := types.NewUnsafeSet(names...)
  155. if nameSet.ContainsAll([]string{"member"}) {
  156. return v2_0, nil
  157. }
  158. if nameSet.ContainsAll([]string{"proxy"}) {
  159. return v2_0Proxy, nil
  160. }
  161. if nameSet.ContainsAll([]string{"snapshot", "conf", "log"}) {
  162. return v0_4, nil
  163. }
  164. if nameSet.ContainsAll([]string{"standby_info"}) {
  165. return v0_4, nil
  166. }
  167. return unknown, fmt.Errorf("failed to check version")
  168. }
  169. func checkInternalVersionByDataDir4(dataDir string) (version, error) {
  170. // check v0.4 snapshot
  171. snap4, err := migrate.DecodeLatestSnapshot4FromDir(snapDir4(dataDir))
  172. if err != nil {
  173. return internalUnknown, err
  174. }
  175. if snap4 != nil {
  176. st := &migrate.Store4{}
  177. if err := json.Unmarshal(snap4.State, st); err != nil {
  178. return internalUnknown, err
  179. }
  180. dir := st.Root.Children["_etcd"]
  181. n, ok := dir.Children["next-internal-version"]
  182. if ok && n.Value == "2" {
  183. return internalV2, nil
  184. }
  185. }
  186. // check v0.4 log
  187. ents4, err := migrate.DecodeLog4FromFile(logFile4(dataDir))
  188. if err != nil {
  189. return internalUnknown, err
  190. }
  191. for _, e := range ents4 {
  192. cmd, err := migrate.NewCommand4(e.GetCommandName(), e.GetCommand(), nil)
  193. if err != nil {
  194. return internalUnknown, err
  195. }
  196. setcmd, ok := cmd.(*migrate.SetCommand)
  197. if !ok {
  198. continue
  199. }
  200. if setcmd.Key == "/_etcd/next-internal-version" && setcmd.Value == "2" {
  201. return internalV2, nil
  202. }
  203. }
  204. return internalV1, nil
  205. }
  206. func getClientURLsByPeerURLs(peers []string, tls *TLSInfo) []string {
  207. c, err := newDefaultClient(tls)
  208. if err != nil {
  209. log.Printf("starter: new client error: %v", err)
  210. return nil
  211. }
  212. var urls []string
  213. for _, u := range peers {
  214. resp, err := c.Get(u + "/etcdURL")
  215. if err != nil {
  216. log.Printf("starter: failed to get /etcdURL from %s", u)
  217. continue
  218. }
  219. b, err := ioutil.ReadAll(resp.Body)
  220. if err != nil {
  221. log.Printf("starter: failed to read body from %s", u)
  222. continue
  223. }
  224. urls = append(urls, string(b))
  225. }
  226. return urls
  227. }
  228. func checkInternalVersionByClientURLs(urls []string, tls *TLSInfo) (version, error) {
  229. c, err := newDefaultClient(tls)
  230. if err != nil {
  231. return internalUnknown, err
  232. }
  233. for _, u := range urls {
  234. resp, err := c.Get(u + "/version")
  235. if err != nil {
  236. log.Printf("starter: failed to get /version from %s", u)
  237. continue
  238. }
  239. b, err := ioutil.ReadAll(resp.Body)
  240. if err != nil {
  241. log.Printf("starter: failed to read body from %s", u)
  242. continue
  243. }
  244. var m map[string]string
  245. err = json.Unmarshal(b, &m)
  246. if err != nil {
  247. log.Printf("starter: failed to unmarshal body %s from %s", b, u)
  248. continue
  249. }
  250. switch m["internalVersion"] {
  251. case "1":
  252. return internalV1, nil
  253. case "2":
  254. return internalV2, nil
  255. default:
  256. log.Printf("starter: unrecognized internal version %s from %s", m["internalVersion"], u)
  257. }
  258. }
  259. return internalUnknown, fmt.Errorf("failed to get version from urls %v", urls)
  260. }
  261. func getPeersFromDiscoveryURL(discoverURL string) ([]string, error) {
  262. if discoverURL == "" {
  263. return nil, nil
  264. }
  265. u, err := url.Parse(discoverURL)
  266. if err != nil {
  267. return nil, err
  268. }
  269. token := u.Path
  270. u.Path = ""
  271. c, err := client.NewHTTPClient(&http.Transport{}, []string{u.String()})
  272. if err != nil {
  273. return nil, err
  274. }
  275. dc := client.NewDiscoveryKeysAPI(c)
  276. ctx, cancel := context.WithTimeout(context.Background(), client.DefaultRequestTimeout)
  277. resp, err := dc.Get(ctx, token)
  278. cancel()
  279. if err != nil {
  280. return nil, err
  281. }
  282. peers := make([]string, 0)
  283. // append non-config keys to peers
  284. for _, n := range resp.Node.Nodes {
  285. if g := path.Base(n.Key); g == "_config" || g == "_state" {
  286. continue
  287. }
  288. peers = append(peers, n.Value)
  289. }
  290. return peers, nil
  291. }
  292. func getPeersFromPeersFlag(str string, tls *TLSInfo) []string {
  293. peers := trimSplit(str, ",")
  294. for i, p := range peers {
  295. peers[i] = tls.Scheme() + "://" + p
  296. }
  297. return peers
  298. }
  299. func startInternalV1() {
  300. p := os.Getenv("ETCD_BINARY_DIR")
  301. if p == "" {
  302. p = defaultInternalV1etcdBinaryDir
  303. }
  304. p = path.Join(p, "1")
  305. err := syscall.Exec(p, os.Args, syscall.Environ())
  306. if err != nil {
  307. log.Fatalf("starter: failed to execute internal v1 etcd: %v", err)
  308. }
  309. }
  310. func newDefaultClient(tls *TLSInfo) (*http.Client, error) {
  311. tr := &http.Transport{}
  312. if tls.Scheme() == "https" {
  313. tlsConfig, err := tls.ClientConfig()
  314. if err != nil {
  315. return nil, err
  316. }
  317. tr.TLSClientConfig = tlsConfig
  318. }
  319. return &http.Client{Transport: tr}, nil
  320. }
  321. type value struct {
  322. s string
  323. }
  324. func (v *value) String() string { return v.s }
  325. func (v *value) Set(s string) error {
  326. v.s = s
  327. return nil
  328. }
  329. // parseConfig parses out the input config from cmdline arguments and
  330. // environment variables.
  331. func parseConfig(args []string) (*flag.FlagSet, error) {
  332. fs := flag.NewFlagSet("full flagset", flag.ContinueOnError)
  333. etcdmain.NewConfig().VisitAll(func(f *flag.Flag) {
  334. fs.Var(&value{}, f.Name, "")
  335. })
  336. if err := fs.Parse(args); err != nil {
  337. return nil, err
  338. }
  339. if err := flags.SetFlagsFromEnv(fs); err != nil {
  340. return nil, err
  341. }
  342. return fs, nil
  343. }
  344. func clientTLSInfo(fs *flag.FlagSet) *TLSInfo {
  345. return &TLSInfo{
  346. CAFile: fs.Lookup("ca-file").Value.String(),
  347. CertFile: fs.Lookup("cert-file").Value.String(),
  348. KeyFile: fs.Lookup("key-file").Value.String(),
  349. }
  350. }
  351. func peerTLSInfo(fs *flag.FlagSet) *TLSInfo {
  352. return &TLSInfo{
  353. CAFile: fs.Lookup("peer-ca-file").Value.String(),
  354. CertFile: fs.Lookup("peer-cert-file").Value.String(),
  355. KeyFile: fs.Lookup("peer-key-file").Value.String(),
  356. }
  357. }
  358. func snapDir4(dataDir string) string {
  359. return path.Join(dataDir, "snapshot")
  360. }
  361. func logFile4(dataDir string) string {
  362. return path.Join(dataDir, "log")
  363. }
  364. func standbyInfo4(dataDir string) string {
  365. return path.Join(dataDir, "standby_info")
  366. }
  367. func trimSplit(s, sep string) []string {
  368. trimmed := strings.Split(s, sep)
  369. for i := range trimmed {
  370. trimmed[i] = strings.TrimSpace(trimmed[i])
  371. }
  372. return trimmed
  373. }