| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403 |
- // Copyright 2015 CoreOS, Inc.
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package starter
- import (
- "encoding/json"
- "flag"
- "fmt"
- "io/ioutil"
- "log"
- "net/http"
- "net/url"
- "os"
- "path"
- "strings"
- "syscall"
- "github.com/coreos/etcd/client"
- "github.com/coreos/etcd/etcdmain"
- "github.com/coreos/etcd/migrate"
- "github.com/coreos/etcd/pkg/flags"
- "github.com/coreos/etcd/pkg/osutil"
- etcdversion "github.com/coreos/etcd/version"
- "github.com/coreos/etcd/wal"
- "github.com/coreos/etcd/Godeps/_workspace/src/golang.org/x/net/context"
- )
- type version string
- const (
- internalV1 version = "1"
- internalV2 version = "2"
- internalV2Proxy version = "2.proxy"
- internalUnknown version = "unknown"
- v0_4 version = "v0.4"
- v2_0 version = "v2.0"
- v2_0Proxy version = "v2.0 proxy"
- empty version = "empty"
- unknown version = "unknown"
- defaultInternalV1etcdBinaryDir = "/usr/libexec/etcd/internal_versions/"
- )
- var (
- v2SpecialFlags = []string{
- "initial-cluster",
- "listen-peer-urls",
- "listen-client-urls",
- "proxy",
- }
- )
- func StartDesiredVersion(args []string) {
- fs, err := parseConfig(args)
- if err != nil {
- return
- }
- if fs.Lookup("version").Value.String() == "true" {
- fmt.Println("etcd version", etcdversion.Version)
- os.Exit(0)
- }
- ver := checkInternalVersion(fs)
- log.Printf("starter: start etcd version %s", ver)
- switch ver {
- case internalV1:
- startInternalV1()
- case internalV2:
- case internalV2Proxy:
- if _, err := os.Stat(standbyInfo4(fs.Lookup("data-dir").Value.String())); err != nil {
- log.Printf("starter: Detect standby_info file exists, and add --proxy=on flag to ensure it runs in v2.0 proxy mode.")
- log.Printf("starter: Before removing v0.4 data, --proxy=on flag MUST be added.")
- }
- // append proxy flag to args to trigger proxy mode
- os.Args = append(os.Args, "-proxy=on")
- default:
- log.Panicf("starter: unhandled start version")
- }
- }
- func checkInternalVersion(fs *flag.FlagSet) version {
- // If it uses 2.0 env var explicitly, start 2.0
- for _, name := range v2SpecialFlags {
- if fs.Lookup(name).Value.String() != "" {
- return internalV2
- }
- }
- dataDir := fs.Lookup("data-dir").Value.String()
- if dataDir == "" {
- log.Fatalf("starter: please set --data-dir or ETCD_DATA_DIR for etcd")
- }
- // check the data directory
- dataver, err := wal.DetectVersion(dataDir)
- if err != nil {
- log.Fatalf("starter: failed to detect etcd version in %v: %v", dataDir, err)
- }
- log.Printf("starter: detect etcd version %s in %s", dataver, dataDir)
- switch dataver {
- case wal.WALv2_0:
- return internalV2
- case wal.WALv2_0_1:
- return internalV2
- case wal.WALv2_0Proxy:
- return internalV2Proxy
- case wal.WALv0_4:
- standbyInfo, err := migrate.DecodeStandbyInfo4FromFile(standbyInfo4(dataDir))
- if err != nil && !os.IsNotExist(err) {
- log.Fatalf("starter: failed to decode standbyInfo in %v: %v", dataDir, err)
- }
- inStandbyMode := standbyInfo != nil && standbyInfo.Running
- if inStandbyMode {
- ver, err := checkInternalVersionByClientURLs(standbyInfo.ClientURLs(), clientTLSInfo(fs))
- if err != nil {
- log.Printf("starter: failed to check start version through peers: %v", err)
- return internalV1
- }
- if ver == internalV2 {
- osutil.Unsetenv("ETCD_DISCOVERY")
- os.Args = append(os.Args, "-initial-cluster", standbyInfo.InitialCluster())
- return internalV2Proxy
- }
- return ver
- }
- ver, err := checkInternalVersionByDataDir4(dataDir)
- if err != nil {
- log.Fatalf("starter: failed to check start version in %v: %v", dataDir, err)
- }
- return ver
- case wal.WALNotExist:
- discovery := fs.Lookup("discovery").Value.String()
- dpeers, err := getPeersFromDiscoveryURL(discovery)
- if err != nil {
- log.Printf("starter: failed to get peers from discovery %s: %v", discovery, err)
- }
- peerStr := fs.Lookup("peers").Value.String()
- ppeers := getPeersFromPeersFlag(peerStr, peerTLSInfo(fs))
- urls := getClientURLsByPeerURLs(append(dpeers, ppeers...), peerTLSInfo(fs))
- ver, err := checkInternalVersionByClientURLs(urls, clientTLSInfo(fs))
- if err != nil {
- log.Printf("starter: failed to check start version through peers: %v", err)
- return internalV2
- }
- return ver
- }
- // never reach here
- log.Panicf("starter: unhandled etcd version in %v", dataDir)
- return internalUnknown
- }
- func checkInternalVersionByDataDir4(dataDir string) (version, error) {
- // check v0.4 snapshot
- snap4, err := migrate.DecodeLatestSnapshot4FromDir(snapDir4(dataDir))
- if err != nil {
- return internalUnknown, err
- }
- if snap4 != nil {
- st := &migrate.Store4{}
- if err := json.Unmarshal(snap4.State, st); err != nil {
- return internalUnknown, err
- }
- dir := st.Root.Children["_etcd"]
- n, ok := dir.Children["next-internal-version"]
- if ok && n.Value == "2" {
- return internalV2, nil
- }
- }
- // check v0.4 log
- ents4, err := migrate.DecodeLog4FromFile(logFile4(dataDir))
- if err != nil {
- return internalUnknown, err
- }
- for _, e := range ents4 {
- cmd, err := migrate.NewCommand4(e.GetCommandName(), e.GetCommand(), nil)
- if err != nil {
- return internalUnknown, err
- }
- setcmd, ok := cmd.(*migrate.SetCommand)
- if !ok {
- continue
- }
- if setcmd.Key == "/_etcd/next-internal-version" && setcmd.Value == "2" {
- return internalV2, nil
- }
- }
- return internalV1, nil
- }
- func getClientURLsByPeerURLs(peers []string, tls *TLSInfo) []string {
- c, err := newDefaultClient(tls)
- if err != nil {
- log.Printf("starter: new client error: %v", err)
- return nil
- }
- var urls []string
- for _, u := range peers {
- resp, err := c.Get(u + "/etcdURL")
- if err != nil {
- log.Printf("starter: failed to get /etcdURL from %s", u)
- continue
- }
- b, err := ioutil.ReadAll(resp.Body)
- if err != nil {
- log.Printf("starter: failed to read body from %s", u)
- continue
- }
- urls = append(urls, string(b))
- }
- return urls
- }
- func checkInternalVersionByClientURLs(urls []string, tls *TLSInfo) (version, error) {
- c, err := newDefaultClient(tls)
- if err != nil {
- return internalUnknown, err
- }
- for _, u := range urls {
- resp, err := c.Get(u + "/version")
- if err != nil {
- log.Printf("starter: failed to get /version from %s", u)
- continue
- }
- b, err := ioutil.ReadAll(resp.Body)
- if err != nil {
- log.Printf("starter: failed to read body from %s", u)
- continue
- }
- var m map[string]string
- err = json.Unmarshal(b, &m)
- if err != nil {
- log.Printf("starter: failed to unmarshal body %s from %s", b, u)
- continue
- }
- switch m["internalVersion"] {
- case "1":
- return internalV1, nil
- case "2":
- return internalV2, nil
- default:
- log.Printf("starter: unrecognized internal version %s from %s", m["internalVersion"], u)
- }
- }
- return internalUnknown, fmt.Errorf("failed to get version from urls %v", urls)
- }
- func getPeersFromDiscoveryURL(discoverURL string) ([]string, error) {
- if discoverURL == "" {
- return nil, nil
- }
- u, err := url.Parse(discoverURL)
- if err != nil {
- return nil, err
- }
- token := u.Path
- u.Path = ""
- cfg := client.Config{
- Transport: &http.Transport{},
- Endpoints: []string{u.String()},
- }
- c, err := client.New(cfg)
- if err != nil {
- return nil, err
- }
- dc := client.NewKeysAPIWithPrefix(c, "")
- ctx, cancel := context.WithTimeout(context.Background(), client.DefaultRequestTimeout)
- resp, err := dc.Get(ctx, token, nil)
- cancel()
- if err != nil {
- return nil, err
- }
- peers := make([]string, 0)
- // append non-config keys to peers
- for _, n := range resp.Node.Nodes {
- if g := path.Base(n.Key); g == "_config" || g == "_state" {
- continue
- }
- peers = append(peers, n.Value)
- }
- return peers, nil
- }
- func getPeersFromPeersFlag(str string, tls *TLSInfo) []string {
- peers := trimSplit(str, ",")
- for i, p := range peers {
- peers[i] = tls.Scheme() + "://" + p
- }
- return peers
- }
- func startInternalV1() {
- p := os.Getenv("ETCD_BINARY_DIR")
- if p == "" {
- p = defaultInternalV1etcdBinaryDir
- }
- p = path.Join(p, "1")
- err := syscall.Exec(p, os.Args, syscall.Environ())
- if err != nil {
- log.Fatalf("starter: failed to execute internal v1 etcd: %v", err)
- }
- }
- func newDefaultClient(tls *TLSInfo) (*http.Client, error) {
- tr := &http.Transport{}
- if tls.Scheme() == "https" {
- tlsConfig, err := tls.ClientConfig()
- if err != nil {
- return nil, err
- }
- tr.TLSClientConfig = tlsConfig
- }
- return &http.Client{Transport: tr}, nil
- }
- type value struct {
- isBoolFlag bool
- s string
- }
- func (v *value) String() string { return v.s }
- func (v *value) Set(s string) error {
- v.s = s
- return nil
- }
- func (v *value) IsBoolFlag() bool { return v.isBoolFlag }
- type boolFlag interface {
- flag.Value
- IsBoolFlag() bool
- }
- // parseConfig parses out the input config from cmdline arguments and
- // environment variables.
- func parseConfig(args []string) (*flag.FlagSet, error) {
- fs := flag.NewFlagSet("full flagset", flag.ContinueOnError)
- etcdmain.NewConfig().VisitAll(func(f *flag.Flag) {
- _, isBoolFlag := f.Value.(boolFlag)
- fs.Var(&value{isBoolFlag: isBoolFlag}, f.Name, "")
- })
- if err := fs.Parse(args); err != nil {
- return nil, err
- }
- if err := flags.SetFlagsFromEnv(fs); err != nil {
- return nil, err
- }
- return fs, nil
- }
- func clientTLSInfo(fs *flag.FlagSet) *TLSInfo {
- return &TLSInfo{
- CAFile: fs.Lookup("ca-file").Value.String(),
- CertFile: fs.Lookup("cert-file").Value.String(),
- KeyFile: fs.Lookup("key-file").Value.String(),
- }
- }
- func peerTLSInfo(fs *flag.FlagSet) *TLSInfo {
- return &TLSInfo{
- CAFile: fs.Lookup("peer-ca-file").Value.String(),
- CertFile: fs.Lookup("peer-cert-file").Value.String(),
- KeyFile: fs.Lookup("peer-key-file").Value.String(),
- }
- }
- func snapDir4(dataDir string) string {
- return path.Join(dataDir, "snapshot")
- }
- func logFile4(dataDir string) string {
- return path.Join(dataDir, "log")
- }
- func standbyInfo4(dataDir string) string {
- return path.Join(dataDir, "standby_info")
- }
- func trimSplit(s, sep string) []string {
- trimmed := strings.Split(s, sep)
- for i := range trimmed {
- trimmed[i] = strings.TrimSpace(trimmed[i])
- }
- return trimmed
- }
|