config.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288
  1. // Copyright 2015 CoreOS, Inc.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package etcdmain
  15. import (
  16. "errors"
  17. "flag"
  18. "fmt"
  19. "log"
  20. "net/url"
  21. "os"
  22. "strings"
  23. "github.com/coreos/etcd/etcdserver"
  24. "github.com/coreos/etcd/pkg/cors"
  25. "github.com/coreos/etcd/pkg/flags"
  26. "github.com/coreos/etcd/pkg/netutil"
  27. "github.com/coreos/etcd/pkg/transport"
  28. "github.com/coreos/etcd/version"
  29. )
  30. const (
  31. proxyFlagOff = "off"
  32. proxyFlagReadonly = "readonly"
  33. proxyFlagOn = "on"
  34. fallbackFlagExit = "exit"
  35. fallbackFlagProxy = "proxy"
  36. clusterStateFlagNew = "new"
  37. clusterStateFlagExisting = "existing"
  38. defaultName = "default"
  39. )
  40. var (
  41. ignored = []string{
  42. "cluster-active-size",
  43. "cluster-remove-delay",
  44. "cluster-sync-interval",
  45. "config",
  46. "force",
  47. "max-result-buffer",
  48. "max-retry-attempts",
  49. "peer-heartbeat-interval",
  50. "peer-election-timeout",
  51. "retry-interval",
  52. "snapshot",
  53. "v",
  54. "vv",
  55. }
  56. ErrConflictBootstrapFlags = fmt.Errorf("multiple discovery or bootstrap flags are set" +
  57. "Choose one of \"initial-cluster\", \"discovery\" or \"discovery-srv\"")
  58. )
  59. type config struct {
  60. *flag.FlagSet
  61. // member
  62. corsInfo *cors.CORSInfo
  63. dir string
  64. lpurls, lcurls []url.URL
  65. maxSnapFiles uint
  66. maxWalFiles uint
  67. name string
  68. snapCount uint64
  69. // TODO: decouple tickMs and heartbeat tick (current heartbeat tick = 1).
  70. // make ticks a cluster wide configuration.
  71. TickMs uint
  72. ElectionMs uint
  73. // clustering
  74. apurls, acurls []url.URL
  75. clusterState *flags.StringsFlag
  76. dnsCluster string
  77. dproxy string
  78. durl string
  79. fallback *flags.StringsFlag
  80. initialCluster string
  81. initialClusterToken string
  82. // proxy
  83. proxy *flags.StringsFlag
  84. // security
  85. clientTLSInfo, peerTLSInfo transport.TLSInfo
  86. // unsafe
  87. forceNewCluster bool
  88. printVersion bool
  89. ignored []string
  90. }
  91. func NewConfig() *config {
  92. cfg := &config{
  93. corsInfo: &cors.CORSInfo{},
  94. clusterState: flags.NewStringsFlag(
  95. clusterStateFlagNew,
  96. clusterStateFlagExisting,
  97. ),
  98. fallback: flags.NewStringsFlag(
  99. fallbackFlagExit,
  100. fallbackFlagProxy,
  101. ),
  102. ignored: ignored,
  103. proxy: flags.NewStringsFlag(
  104. proxyFlagOff,
  105. proxyFlagReadonly,
  106. proxyFlagOn,
  107. ),
  108. }
  109. cfg.FlagSet = flag.NewFlagSet("etcd", flag.ContinueOnError)
  110. fs := cfg.FlagSet
  111. fs.Usage = func() {
  112. fmt.Println(usageline)
  113. fmt.Println(flagsline)
  114. }
  115. // member
  116. fs.Var(cfg.corsInfo, "cors", "Comma-separated white list of origins for CORS (cross-origin resource sharing).")
  117. fs.StringVar(&cfg.dir, "data-dir", "", "Path to the data directory")
  118. fs.Var(flags.NewURLsValue("http://localhost:2380,http://localhost:7001"), "listen-peer-urls", "List of URLs to listen on for peer traffic")
  119. fs.Var(flags.NewURLsValue("http://localhost:2379,http://localhost:4001"), "listen-client-urls", "List of URLs to listen on for client traffic")
  120. fs.UintVar(&cfg.maxSnapFiles, "max-snapshots", defaultMaxSnapshots, "Maximum number of snapshot files to retain (0 is unlimited)")
  121. fs.UintVar(&cfg.maxWalFiles, "max-wals", defaultMaxWALs, "Maximum number of wal files to retain (0 is unlimited)")
  122. fs.StringVar(&cfg.name, "name", defaultName, "Unique human-readable name for this node")
  123. fs.Uint64Var(&cfg.snapCount, "snapshot-count", etcdserver.DefaultSnapCount, "Number of committed transactions to trigger a snapshot")
  124. fs.UintVar(&cfg.TickMs, "heartbeat-interval", 100, "Time (in milliseconds) of a heartbeat interval.")
  125. fs.UintVar(&cfg.ElectionMs, "election-timeout", 1000, "Time (in milliseconds) for an election to timeout.")
  126. // clustering
  127. fs.Var(flags.NewURLsValue("http://localhost:2380,http://localhost:7001"), "initial-advertise-peer-urls", "List of this member's peer URLs to advertise to the rest of the cluster")
  128. fs.Var(flags.NewURLsValue("http://localhost:2379,http://localhost:4001"), "advertise-client-urls", "List of this member's client URLs to advertise to the rest of the cluster")
  129. fs.StringVar(&cfg.durl, "discovery", "", "Discovery service used to bootstrap the initial cluster")
  130. fs.Var(cfg.fallback, "discovery-fallback", fmt.Sprintf("Valid values include %s", strings.Join(cfg.fallback.Values, ", ")))
  131. if err := cfg.fallback.Set(fallbackFlagProxy); err != nil {
  132. // Should never happen.
  133. log.Panicf("unexpected error setting up discovery-fallback flag: %v", err)
  134. }
  135. fs.StringVar(&cfg.dproxy, "discovery-proxy", "", "HTTP proxy to use for traffic to discovery service")
  136. fs.StringVar(&cfg.dnsCluster, "discovery-srv", "", "DNS domain used to bootstrap initial cluster")
  137. fs.StringVar(&cfg.initialCluster, "initial-cluster", initialClusterFromName(defaultName), "Initial cluster configuration for bootstrapping")
  138. fs.StringVar(&cfg.initialClusterToken, "initial-cluster-token", "etcd-cluster", "Initial cluster token for the etcd cluster during bootstrap")
  139. fs.Var(cfg.clusterState, "initial-cluster-state", "Initial cluster configuration for bootstrapping")
  140. if err := cfg.clusterState.Set(clusterStateFlagNew); err != nil {
  141. // Should never happen.
  142. log.Panicf("unexpected error setting up clusterStateFlag: %v", err)
  143. }
  144. // proxy
  145. fs.Var(cfg.proxy, "proxy", fmt.Sprintf("Valid values include %s", strings.Join(cfg.proxy.Values, ", ")))
  146. if err := cfg.proxy.Set(proxyFlagOff); err != nil {
  147. // Should never happen.
  148. log.Panicf("unexpected error setting up proxyFlag: %v", err)
  149. }
  150. // security
  151. fs.StringVar(&cfg.clientTLSInfo.CAFile, "ca-file", "", "Path to the client server TLS CA file.")
  152. fs.StringVar(&cfg.clientTLSInfo.CertFile, "cert-file", "", "Path to the client server TLS cert file.")
  153. fs.StringVar(&cfg.clientTLSInfo.KeyFile, "key-file", "", "Path to the client server TLS key file.")
  154. fs.BoolVar(&cfg.clientTLSInfo.ClientCertAuth, "client-cert-auth", false, "Enable client cert authentication.")
  155. fs.StringVar(&cfg.clientTLSInfo.TrustedCAFile, "trusted-ca-file", "", "Path to the client server TLS trusted CA key file.")
  156. fs.StringVar(&cfg.peerTLSInfo.CAFile, "peer-ca-file", "", "Path to the peer server TLS CA file.")
  157. fs.StringVar(&cfg.peerTLSInfo.CertFile, "peer-cert-file", "", "Path to the peer server TLS cert file.")
  158. fs.StringVar(&cfg.peerTLSInfo.KeyFile, "peer-key-file", "", "Path to the peer server TLS key file.")
  159. fs.BoolVar(&cfg.peerTLSInfo.ClientCertAuth, "peer-client-cert-auth", false, "Enable peer client cert authentication.")
  160. fs.StringVar(&cfg.peerTLSInfo.TrustedCAFile, "peer-trusted-ca-file", "", "Path to the peer server TLS trusted CA file.")
  161. // unsafe
  162. fs.BoolVar(&cfg.forceNewCluster, "force-new-cluster", false, "Force to create a new one member cluster")
  163. // version
  164. fs.BoolVar(&cfg.printVersion, "version", false, "Print the version and exit")
  165. // backwards-compatibility with v0.4.6
  166. fs.Var(&flags.IPAddressPort{}, "addr", "DEPRECATED: Use -advertise-client-urls instead.")
  167. fs.Var(&flags.IPAddressPort{}, "bind-addr", "DEPRECATED: Use -listen-client-urls instead.")
  168. fs.Var(&flags.IPAddressPort{}, "peer-addr", "DEPRECATED: Use -initial-advertise-peer-urls instead.")
  169. fs.Var(&flags.IPAddressPort{}, "peer-bind-addr", "DEPRECATED: Use -listen-peer-urls instead.")
  170. fs.Var(&flags.DeprecatedFlag{Name: "peers"}, "peers", "DEPRECATED: Use -initial-cluster instead")
  171. fs.Var(&flags.DeprecatedFlag{Name: "peers-file"}, "peers-file", "DEPRECATED: Use -initial-cluster instead")
  172. // ignored
  173. for _, f := range cfg.ignored {
  174. fs.Var(&flags.IgnoredFlag{Name: f}, f, "")
  175. }
  176. return cfg
  177. }
  178. func (cfg *config) Parse(arguments []string) error {
  179. perr := cfg.FlagSet.Parse(arguments)
  180. switch perr {
  181. case nil:
  182. case flag.ErrHelp:
  183. os.Exit(0)
  184. default:
  185. os.Exit(2)
  186. }
  187. if cfg.printVersion {
  188. fmt.Println("etcd version", version.Version)
  189. os.Exit(0)
  190. }
  191. err := flags.SetFlagsFromEnv(cfg.FlagSet)
  192. if err != nil {
  193. log.Fatalf("etcd: %v", err)
  194. }
  195. set := make(map[string]bool)
  196. cfg.FlagSet.Visit(func(f *flag.Flag) {
  197. set[f.Name] = true
  198. })
  199. nSet := 0
  200. for _, v := range []bool{set["discovery"], set["initial-cluster"], set["discovery-srv"]} {
  201. if v {
  202. nSet += 1
  203. }
  204. }
  205. if nSet > 1 {
  206. return ErrConflictBootstrapFlags
  207. }
  208. flags.SetBindAddrFromAddr(cfg.FlagSet, "peer-bind-addr", "peer-addr")
  209. flags.SetBindAddrFromAddr(cfg.FlagSet, "bind-addr", "addr")
  210. cfg.lpurls, err = flags.URLsFromFlags(cfg.FlagSet, "listen-peer-urls", "peer-bind-addr", cfg.peerTLSInfo)
  211. if err != nil {
  212. return err
  213. }
  214. cfg.apurls, err = flags.URLsFromFlags(cfg.FlagSet, "initial-advertise-peer-urls", "peer-addr", cfg.peerTLSInfo)
  215. if err != nil {
  216. return err
  217. }
  218. cfg.lcurls, err = flags.URLsFromFlags(cfg.FlagSet, "listen-client-urls", "bind-addr", cfg.clientTLSInfo)
  219. if err != nil {
  220. return err
  221. }
  222. cfg.acurls, err = flags.URLsFromFlags(cfg.FlagSet, "advertise-client-urls", "addr", cfg.clientTLSInfo)
  223. if err != nil {
  224. return err
  225. }
  226. if err := cfg.resolveUrls(); err != nil {
  227. return errors.New("cannot resolve DNS hostnames.")
  228. }
  229. if 5*cfg.TickMs > cfg.ElectionMs {
  230. return fmt.Errorf("-election-timeout[%vms] should be at least as 5 times as -heartbeat-interval[%vms]", cfg.ElectionMs, cfg.TickMs)
  231. }
  232. return nil
  233. }
  234. func initialClusterFromName(name string) string {
  235. n := name
  236. if name == "" {
  237. n = defaultName
  238. }
  239. return fmt.Sprintf("%s=http://localhost:2380,%s=http://localhost:7001", n, n)
  240. }
  241. func (cfg *config) resolveUrls() error {
  242. return netutil.ResolveTCPAddrs(cfg.lpurls, cfg.apurls, cfg.lcurls, cfg.acurls)
  243. }
  244. func (cfg config) isNewCluster() bool { return cfg.clusterState.String() == clusterStateFlagNew }
  245. func (cfg config) isProxy() bool { return cfg.proxy.String() != proxyFlagOff }
  246. func (cfg config) isReadonlyProxy() bool { return cfg.proxy.String() == proxyFlagReadonly }
  247. func (cfg config) shouldFallbackToProxy() bool { return cfg.fallback.String() == fallbackFlagProxy }
  248. func (cfg config) electionTicks() int { return int(cfg.ElectionMs / cfg.TickMs) }