starter.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403
  1. // Copyright 2015 CoreOS, Inc.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package starter
  15. import (
  16. "encoding/json"
  17. "flag"
  18. "fmt"
  19. "io/ioutil"
  20. "log"
  21. "net/http"
  22. "net/url"
  23. "os"
  24. "path"
  25. "strings"
  26. "syscall"
  27. "github.com/coreos/etcd/client"
  28. "github.com/coreos/etcd/etcdmain"
  29. "github.com/coreos/etcd/migrate"
  30. "github.com/coreos/etcd/pkg/flags"
  31. "github.com/coreos/etcd/pkg/osutil"
  32. etcdversion "github.com/coreos/etcd/version"
  33. "github.com/coreos/etcd/wal"
  34. "github.com/coreos/etcd/Godeps/_workspace/src/golang.org/x/net/context"
  35. )
  36. type version string
  37. const (
  38. internalV1 version = "1"
  39. internalV2 version = "2"
  40. internalV2Proxy version = "2.proxy"
  41. internalUnknown version = "unknown"
  42. v0_4 version = "v0.4"
  43. v2_0 version = "v2.0"
  44. v2_0Proxy version = "v2.0 proxy"
  45. empty version = "empty"
  46. unknown version = "unknown"
  47. defaultInternalV1etcdBinaryDir = "/usr/libexec/etcd/internal_versions/"
  48. )
  49. var (
  50. v2SpecialFlags = []string{
  51. "initial-cluster",
  52. "listen-peer-urls",
  53. "listen-client-urls",
  54. "proxy",
  55. }
  56. )
  57. func StartDesiredVersion(args []string) {
  58. fs, err := parseConfig(args)
  59. if err != nil {
  60. return
  61. }
  62. if fs.Lookup("version").Value.String() == "true" {
  63. fmt.Println("etcd version", etcdversion.Version)
  64. os.Exit(0)
  65. }
  66. ver := checkInternalVersion(fs)
  67. log.Printf("starter: start etcd version %s", ver)
  68. switch ver {
  69. case internalV1:
  70. startInternalV1()
  71. case internalV2:
  72. case internalV2Proxy:
  73. if _, err := os.Stat(standbyInfo4(fs.Lookup("data-dir").Value.String())); err != nil {
  74. log.Printf("starter: Detect standby_info file exists, and add --proxy=on flag to ensure it runs in v2.0 proxy mode.")
  75. log.Printf("starter: Before removing v0.4 data, --proxy=on flag MUST be added.")
  76. }
  77. // append proxy flag to args to trigger proxy mode
  78. os.Args = append(os.Args, "-proxy=on")
  79. default:
  80. log.Panicf("starter: unhandled start version")
  81. }
  82. }
  83. func checkInternalVersion(fs *flag.FlagSet) version {
  84. // If it uses 2.0 env var explicitly, start 2.0
  85. for _, name := range v2SpecialFlags {
  86. if fs.Lookup(name).Value.String() != "" {
  87. return internalV2
  88. }
  89. }
  90. dataDir := fs.Lookup("data-dir").Value.String()
  91. if dataDir == "" {
  92. log.Fatalf("starter: please set --data-dir or ETCD_DATA_DIR for etcd")
  93. }
  94. // check the data directory
  95. dataver, err := wal.DetectVersion(dataDir)
  96. if err != nil {
  97. log.Fatalf("starter: failed to detect etcd version in %v: %v", dataDir, err)
  98. }
  99. log.Printf("starter: detect etcd version %s in %s", dataver, dataDir)
  100. switch dataver {
  101. case wal.WALv2_0:
  102. return internalV2
  103. case wal.WALv2_0_1:
  104. return internalV2
  105. case wal.WALv2_0Proxy:
  106. return internalV2Proxy
  107. case wal.WALv0_4:
  108. standbyInfo, err := migrate.DecodeStandbyInfo4FromFile(standbyInfo4(dataDir))
  109. if err != nil && !os.IsNotExist(err) {
  110. log.Fatalf("starter: failed to decode standbyInfo in %v: %v", dataDir, err)
  111. }
  112. inStandbyMode := standbyInfo != nil && standbyInfo.Running
  113. if inStandbyMode {
  114. ver, err := checkInternalVersionByClientURLs(standbyInfo.ClientURLs(), clientTLSInfo(fs))
  115. if err != nil {
  116. log.Printf("starter: failed to check start version through peers: %v", err)
  117. return internalV1
  118. }
  119. if ver == internalV2 {
  120. osutil.Unsetenv("ETCD_DISCOVERY")
  121. os.Args = append(os.Args, "-initial-cluster", standbyInfo.InitialCluster())
  122. return internalV2Proxy
  123. }
  124. return ver
  125. }
  126. ver, err := checkInternalVersionByDataDir4(dataDir)
  127. if err != nil {
  128. log.Fatalf("starter: failed to check start version in %v: %v", dataDir, err)
  129. }
  130. return ver
  131. case wal.WALNotExist:
  132. discovery := fs.Lookup("discovery").Value.String()
  133. dpeers, err := getPeersFromDiscoveryURL(discovery)
  134. if err != nil {
  135. log.Printf("starter: failed to get peers from discovery %s: %v", discovery, err)
  136. }
  137. peerStr := fs.Lookup("peers").Value.String()
  138. ppeers := getPeersFromPeersFlag(peerStr, peerTLSInfo(fs))
  139. urls := getClientURLsByPeerURLs(append(dpeers, ppeers...), peerTLSInfo(fs))
  140. ver, err := checkInternalVersionByClientURLs(urls, clientTLSInfo(fs))
  141. if err != nil {
  142. log.Printf("starter: failed to check start version through peers: %v", err)
  143. return internalV2
  144. }
  145. return ver
  146. }
  147. // never reach here
  148. log.Panicf("starter: unhandled etcd version in %v", dataDir)
  149. return internalUnknown
  150. }
  151. func checkInternalVersionByDataDir4(dataDir string) (version, error) {
  152. // check v0.4 snapshot
  153. snap4, err := migrate.DecodeLatestSnapshot4FromDir(snapDir4(dataDir))
  154. if err != nil {
  155. return internalUnknown, err
  156. }
  157. if snap4 != nil {
  158. st := &migrate.Store4{}
  159. if err := json.Unmarshal(snap4.State, st); err != nil {
  160. return internalUnknown, err
  161. }
  162. dir := st.Root.Children["_etcd"]
  163. n, ok := dir.Children["next-internal-version"]
  164. if ok && n.Value == "2" {
  165. return internalV2, nil
  166. }
  167. }
  168. // check v0.4 log
  169. ents4, err := migrate.DecodeLog4FromFile(logFile4(dataDir))
  170. if err != nil {
  171. return internalUnknown, err
  172. }
  173. for _, e := range ents4 {
  174. cmd, err := migrate.NewCommand4(e.GetCommandName(), e.GetCommand(), nil)
  175. if err != nil {
  176. return internalUnknown, err
  177. }
  178. setcmd, ok := cmd.(*migrate.SetCommand)
  179. if !ok {
  180. continue
  181. }
  182. if setcmd.Key == "/_etcd/next-internal-version" && setcmd.Value == "2" {
  183. return internalV2, nil
  184. }
  185. }
  186. return internalV1, nil
  187. }
  188. func getClientURLsByPeerURLs(peers []string, tls *TLSInfo) []string {
  189. c, err := newDefaultClient(tls)
  190. if err != nil {
  191. log.Printf("starter: new client error: %v", err)
  192. return nil
  193. }
  194. var urls []string
  195. for _, u := range peers {
  196. resp, err := c.Get(u + "/etcdURL")
  197. if err != nil {
  198. log.Printf("starter: failed to get /etcdURL from %s", u)
  199. continue
  200. }
  201. b, err := ioutil.ReadAll(resp.Body)
  202. if err != nil {
  203. log.Printf("starter: failed to read body from %s", u)
  204. continue
  205. }
  206. urls = append(urls, string(b))
  207. }
  208. return urls
  209. }
  210. func checkInternalVersionByClientURLs(urls []string, tls *TLSInfo) (version, error) {
  211. c, err := newDefaultClient(tls)
  212. if err != nil {
  213. return internalUnknown, err
  214. }
  215. for _, u := range urls {
  216. resp, err := c.Get(u + "/version")
  217. if err != nil {
  218. log.Printf("starter: failed to get /version from %s", u)
  219. continue
  220. }
  221. b, err := ioutil.ReadAll(resp.Body)
  222. if err != nil {
  223. log.Printf("starter: failed to read body from %s", u)
  224. continue
  225. }
  226. var m map[string]string
  227. err = json.Unmarshal(b, &m)
  228. if err != nil {
  229. log.Printf("starter: failed to unmarshal body %s from %s", b, u)
  230. continue
  231. }
  232. switch m["internalVersion"] {
  233. case "1":
  234. return internalV1, nil
  235. case "2":
  236. return internalV2, nil
  237. default:
  238. log.Printf("starter: unrecognized internal version %s from %s", m["internalVersion"], u)
  239. }
  240. }
  241. return internalUnknown, fmt.Errorf("failed to get version from urls %v", urls)
  242. }
  243. func getPeersFromDiscoveryURL(discoverURL string) ([]string, error) {
  244. if discoverURL == "" {
  245. return nil, nil
  246. }
  247. u, err := url.Parse(discoverURL)
  248. if err != nil {
  249. return nil, err
  250. }
  251. token := u.Path
  252. u.Path = ""
  253. cfg := client.Config{
  254. Transport: &http.Transport{},
  255. Endpoints: []string{u.String()},
  256. }
  257. c, err := client.New(cfg)
  258. if err != nil {
  259. return nil, err
  260. }
  261. dc := client.NewKeysAPIWithPrefix(c, "")
  262. ctx, cancel := context.WithTimeout(context.Background(), client.DefaultRequestTimeout)
  263. resp, err := dc.Get(ctx, token, nil)
  264. cancel()
  265. if err != nil {
  266. return nil, err
  267. }
  268. peers := make([]string, 0)
  269. // append non-config keys to peers
  270. for _, n := range resp.Node.Nodes {
  271. if g := path.Base(n.Key); g == "_config" || g == "_state" {
  272. continue
  273. }
  274. peers = append(peers, n.Value)
  275. }
  276. return peers, nil
  277. }
  278. func getPeersFromPeersFlag(str string, tls *TLSInfo) []string {
  279. peers := trimSplit(str, ",")
  280. for i, p := range peers {
  281. peers[i] = tls.Scheme() + "://" + p
  282. }
  283. return peers
  284. }
  285. func startInternalV1() {
  286. p := os.Getenv("ETCD_BINARY_DIR")
  287. if p == "" {
  288. p = defaultInternalV1etcdBinaryDir
  289. }
  290. p = path.Join(p, "1")
  291. err := syscall.Exec(p, os.Args, syscall.Environ())
  292. if err != nil {
  293. log.Fatalf("starter: failed to execute internal v1 etcd: %v", err)
  294. }
  295. }
  296. func newDefaultClient(tls *TLSInfo) (*http.Client, error) {
  297. tr := &http.Transport{}
  298. if tls.Scheme() == "https" {
  299. tlsConfig, err := tls.ClientConfig()
  300. if err != nil {
  301. return nil, err
  302. }
  303. tr.TLSClientConfig = tlsConfig
  304. }
  305. return &http.Client{Transport: tr}, nil
  306. }
  307. type value struct {
  308. isBoolFlag bool
  309. s string
  310. }
  311. func (v *value) String() string { return v.s }
  312. func (v *value) Set(s string) error {
  313. v.s = s
  314. return nil
  315. }
  316. func (v *value) IsBoolFlag() bool { return v.isBoolFlag }
  317. type boolFlag interface {
  318. flag.Value
  319. IsBoolFlag() bool
  320. }
  321. // parseConfig parses out the input config from cmdline arguments and
  322. // environment variables.
  323. func parseConfig(args []string) (*flag.FlagSet, error) {
  324. fs := flag.NewFlagSet("full flagset", flag.ContinueOnError)
  325. etcdmain.NewConfig().VisitAll(func(f *flag.Flag) {
  326. _, isBoolFlag := f.Value.(boolFlag)
  327. fs.Var(&value{isBoolFlag: isBoolFlag}, f.Name, "")
  328. })
  329. if err := fs.Parse(args); err != nil {
  330. return nil, err
  331. }
  332. if err := flags.SetFlagsFromEnv(fs); err != nil {
  333. return nil, err
  334. }
  335. return fs, nil
  336. }
  337. func clientTLSInfo(fs *flag.FlagSet) *TLSInfo {
  338. return &TLSInfo{
  339. CAFile: fs.Lookup("ca-file").Value.String(),
  340. CertFile: fs.Lookup("cert-file").Value.String(),
  341. KeyFile: fs.Lookup("key-file").Value.String(),
  342. }
  343. }
  344. func peerTLSInfo(fs *flag.FlagSet) *TLSInfo {
  345. return &TLSInfo{
  346. CAFile: fs.Lookup("peer-ca-file").Value.String(),
  347. CertFile: fs.Lookup("peer-cert-file").Value.String(),
  348. KeyFile: fs.Lookup("peer-key-file").Value.String(),
  349. }
  350. }
  351. func snapDir4(dataDir string) string {
  352. return path.Join(dataDir, "snapshot")
  353. }
  354. func logFile4(dataDir string) string {
  355. return path.Join(dataDir, "log")
  356. }
  357. func standbyInfo4(dataDir string) string {
  358. return path.Join(dataDir, "standby_info")
  359. }
  360. func trimSplit(s, sep string) []string {
  361. trimmed := strings.Split(s, sep)
  362. for i := range trimmed {
  363. trimmed[i] = strings.TrimSpace(trimmed[i])
  364. }
  365. return trimmed
  366. }