etcd.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426
  1. /*
  2. Copyright 2014 CoreOS, Inc.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package etcdmain
  14. import (
  15. "flag"
  16. "fmt"
  17. "log"
  18. "net"
  19. "net/http"
  20. "net/url"
  21. "os"
  22. "strings"
  23. "github.com/coreos/etcd/discovery"
  24. "github.com/coreos/etcd/etcdserver"
  25. "github.com/coreos/etcd/etcdserver/etcdhttp"
  26. "github.com/coreos/etcd/pkg/cors"
  27. "github.com/coreos/etcd/pkg/fileutil"
  28. "github.com/coreos/etcd/pkg/flags"
  29. "github.com/coreos/etcd/pkg/transport"
  30. "github.com/coreos/etcd/pkg/types"
  31. "github.com/coreos/etcd/proxy"
  32. "github.com/coreos/etcd/rafthttp"
  33. "github.com/coreos/etcd/version"
  34. )
  35. const (
  36. // the owner can make/remove files inside the directory
  37. privateDirMode = 0700
  38. proxyFlagOff = "off"
  39. proxyFlagReadonly = "readonly"
  40. proxyFlagOn = "on"
  41. fallbackFlagExit = "exit"
  42. fallbackFlagProxy = "proxy"
  43. clusterStateFlagNew = "new"
  44. clusterStateFlagExisting = "existing"
  45. )
  46. var (
  47. fs = flag.NewFlagSet("etcd", flag.ContinueOnError)
  48. name = fs.String("name", "default", "Unique human-readable name for this node")
  49. dir = fs.String("data-dir", "", "Path to the data directory")
  50. durl = fs.String("discovery", "", "Discovery service used to bootstrap the cluster")
  51. dproxy = fs.String("discovery-proxy", "", "HTTP proxy to use for traffic to discovery service")
  52. snapCount = fs.Uint64("snapshot-count", etcdserver.DefaultSnapCount, "Number of committed transactions to trigger a snapshot")
  53. printVersion = fs.Bool("version", false, "Print the version and exit")
  54. forceNewCluster = fs.Bool("force-new-cluster", false, "Force to create a new one member cluster")
  55. maxSnapFiles = fs.Uint("max-snapshots", 5, "Maximum number of snapshot files to retain (0 is unlimited)")
  56. maxWalFiles = fs.Uint("max-wals", 5, "Maximum number of wal files to retain (0 is unlimited)")
  57. initialCluster = fs.String("initial-cluster", "default=http://localhost:2380,default=http://localhost:7001", "Initial cluster configuration for bootstrapping")
  58. initialClusterToken = fs.String("initial-cluster-token", "etcd-cluster", "Initial cluster token for the etcd cluster during bootstrap")
  59. corsInfo = &cors.CORSInfo{}
  60. clientTLSInfo = transport.TLSInfo{}
  61. peerTLSInfo = transport.TLSInfo{}
  62. proxyFlag = flags.NewStringsFlag(
  63. proxyFlagOff,
  64. proxyFlagReadonly,
  65. proxyFlagOn,
  66. )
  67. fallbackFlag = flags.NewStringsFlag(
  68. fallbackFlagExit,
  69. fallbackFlagProxy,
  70. )
  71. clusterStateFlag = flags.NewStringsFlag(
  72. clusterStateFlagNew,
  73. clusterStateFlagExisting,
  74. )
  75. ignored = []string{
  76. "cluster-active-size",
  77. "cluster-remove-delay",
  78. "cluster-sync-interval",
  79. "config",
  80. "force",
  81. "max-result-buffer",
  82. "max-retry-attempts",
  83. "peer-heartbeat-interval",
  84. "peer-election-timeout",
  85. "retry-interval",
  86. "snapshot",
  87. "v",
  88. "vv",
  89. }
  90. )
  91. func init() {
  92. fs.Usage = func() {
  93. fmt.Println(usageline)
  94. fmt.Println(flagsline)
  95. }
  96. fs.Var(clusterStateFlag, "initial-cluster-state", "Initial cluster configuration for bootstrapping")
  97. if err := clusterStateFlag.Set(clusterStateFlagNew); err != nil {
  98. // Should never happen.
  99. log.Panicf("unexpected error setting up clusterStateFlag: %v", err)
  100. }
  101. fs.Var(flags.NewURLsValue("http://localhost:2380,http://localhost:7001"), "initial-advertise-peer-urls", "List of this member's peer URLs to advertise to the rest of the cluster")
  102. fs.Var(flags.NewURLsValue("http://localhost:2379,http://localhost:4001"), "advertise-client-urls", "List of this member's client URLs to advertise to the rest of the cluster")
  103. fs.Var(flags.NewURLsValue("http://localhost:2380,http://localhost:7001"), "listen-peer-urls", "List of URLs to listen on for peer traffic")
  104. fs.Var(flags.NewURLsValue("http://localhost:2379,http://localhost:4001"), "listen-client-urls", "List of URLs to listen on for client traffic")
  105. fs.Var(corsInfo, "cors", "Comma-separated white list of origins for CORS (cross-origin resource sharing).")
  106. fs.Var(proxyFlag, "proxy", fmt.Sprintf("Valid values include %s", strings.Join(proxyFlag.Values, ", ")))
  107. if err := proxyFlag.Set(proxyFlagOff); err != nil {
  108. // Should never happen.
  109. log.Panicf("unexpected error setting up proxyFlag: %v", err)
  110. }
  111. fs.Var(fallbackFlag, "discovery-fallback", fmt.Sprintf("Valid values include %s", strings.Join(fallbackFlag.Values, ", ")))
  112. if err := fallbackFlag.Set(fallbackFlagProxy); err != nil {
  113. // Should never happen.
  114. log.Panicf("unexpected error setting up discovery-fallback flag: %v", err)
  115. }
  116. fs.StringVar(&clientTLSInfo.CAFile, "ca-file", "", "Path to the client server TLS CA file.")
  117. fs.StringVar(&clientTLSInfo.CertFile, "cert-file", "", "Path to the client server TLS cert file.")
  118. fs.StringVar(&clientTLSInfo.KeyFile, "key-file", "", "Path to the client server TLS key file.")
  119. fs.StringVar(&peerTLSInfo.CAFile, "peer-ca-file", "", "Path to the peer server TLS CA file.")
  120. fs.StringVar(&peerTLSInfo.CertFile, "peer-cert-file", "", "Path to the peer server TLS cert file.")
  121. fs.StringVar(&peerTLSInfo.KeyFile, "peer-key-file", "", "Path to the peer server TLS key file.")
  122. // backwards-compatibility with v0.4.6
  123. fs.Var(&flags.IPAddressPort{}, "addr", "DEPRECATED: Use -advertise-client-urls instead.")
  124. fs.Var(&flags.IPAddressPort{}, "bind-addr", "DEPRECATED: Use -listen-client-urls instead.")
  125. fs.Var(&flags.IPAddressPort{}, "peer-addr", "DEPRECATED: Use -initial-advertise-peer-urls instead.")
  126. fs.Var(&flags.IPAddressPort{}, "peer-bind-addr", "DEPRECATED: Use -listen-peer-urls instead.")
  127. for _, f := range ignored {
  128. fs.Var(&flags.IgnoredFlag{Name: f}, f, "")
  129. }
  130. fs.Var(&flags.DeprecatedFlag{Name: "peers"}, "peers", "DEPRECATED: Use -initial-cluster instead")
  131. fs.Var(&flags.DeprecatedFlag{Name: "peers-file"}, "peers-file", "DEPRECATED: Use -initial-cluster instead")
  132. }
  133. func Main() {
  134. perr := fs.Parse(os.Args[1:])
  135. switch perr {
  136. case nil:
  137. case flag.ErrHelp:
  138. os.Exit(0)
  139. default:
  140. os.Exit(2)
  141. }
  142. if *printVersion {
  143. fmt.Println("etcd version", version.Version)
  144. os.Exit(0)
  145. }
  146. err := flags.SetFlagsFromEnv(fs)
  147. if err != nil {
  148. log.Fatalf("etcd: %v", err)
  149. }
  150. shouldProxy := proxyFlag.String() != proxyFlagOff
  151. var stopped <-chan struct{}
  152. if !shouldProxy {
  153. stopped, err = startEtcd()
  154. if err == discovery.ErrFullCluster && fallbackFlag.String() == fallbackFlagProxy {
  155. log.Printf("etcd: discovery cluster full, falling back to %s", fallbackFlagProxy)
  156. shouldProxy = true
  157. }
  158. }
  159. if shouldProxy {
  160. err = startProxy()
  161. }
  162. if err != nil {
  163. log.Fatalf("etcd: %v", err)
  164. }
  165. <-stopped
  166. }
  167. // startEtcd launches the etcd server and HTTP handlers for client/server communication.
  168. func startEtcd() (<-chan struct{}, error) {
  169. apurls, err := flags.URLsFromFlags(fs, "initial-advertise-peer-urls", "addr", peerTLSInfo)
  170. if err != nil {
  171. return nil, err
  172. }
  173. cls, err := setupCluster(apurls)
  174. if err != nil {
  175. return nil, fmt.Errorf("error setting up initial cluster: %v", err)
  176. }
  177. if *dir == "" {
  178. *dir = fmt.Sprintf("%v.etcd", *name)
  179. log.Printf("no data-dir provided, using default data-dir ./%s", *dir)
  180. }
  181. if err := os.MkdirAll(*dir, privateDirMode); err != nil {
  182. return nil, fmt.Errorf("cannot create data directory: %v", err)
  183. }
  184. if err := fileutil.IsDirWriteable(*dir); err != nil {
  185. return nil, fmt.Errorf("cannot write to data directory: %v", err)
  186. }
  187. pt, err := transport.NewTimeoutTransport(peerTLSInfo, rafthttp.ConnReadTimeout, rafthttp.ConnWriteTimeout)
  188. if err != nil {
  189. return nil, err
  190. }
  191. acurls, err := flags.URLsFromFlags(fs, "advertise-client-urls", "addr", clientTLSInfo)
  192. if err != nil {
  193. return nil, err
  194. }
  195. lpurls, err := flags.URLsFromFlags(fs, "listen-peer-urls", "peer-bind-addr", peerTLSInfo)
  196. if err != nil {
  197. return nil, err
  198. }
  199. if !peerTLSInfo.Empty() {
  200. log.Printf("etcd: peerTLS: %s", peerTLSInfo)
  201. }
  202. plns := make([]net.Listener, 0)
  203. for _, u := range lpurls {
  204. var l net.Listener
  205. l, err = transport.NewTimeoutListener(u.Host, u.Scheme, peerTLSInfo, rafthttp.ConnReadTimeout, rafthttp.ConnWriteTimeout)
  206. if err != nil {
  207. return nil, err
  208. }
  209. urlStr := u.String()
  210. log.Print("etcd: listening for peers on ", urlStr)
  211. defer func() {
  212. if err != nil {
  213. l.Close()
  214. log.Print("etcd: stopping listening for peers on ", urlStr)
  215. }
  216. }()
  217. plns = append(plns, l)
  218. }
  219. lcurls, err := flags.URLsFromFlags(fs, "listen-client-urls", "bind-addr", clientTLSInfo)
  220. if err != nil {
  221. return nil, err
  222. }
  223. if !clientTLSInfo.Empty() {
  224. log.Printf("etcd: clientTLS: %s", clientTLSInfo)
  225. }
  226. clns := make([]net.Listener, 0)
  227. for _, u := range lcurls {
  228. var l net.Listener
  229. l, err = transport.NewListener(u.Host, u.Scheme, clientTLSInfo)
  230. if err != nil {
  231. return nil, err
  232. }
  233. urlStr := u.String()
  234. log.Print("etcd: listening for client requests on ", urlStr)
  235. defer func() {
  236. if err != nil {
  237. l.Close()
  238. log.Print("etcd: stopping listening for client requests on ", urlStr)
  239. }
  240. }()
  241. clns = append(clns, l)
  242. }
  243. cfg := &etcdserver.ServerConfig{
  244. Name: *name,
  245. ClientURLs: acurls,
  246. PeerURLs: apurls,
  247. DataDir: *dir,
  248. SnapCount: *snapCount,
  249. MaxSnapFiles: *maxSnapFiles,
  250. MaxWALFiles: *maxWalFiles,
  251. Cluster: cls,
  252. DiscoveryURL: *durl,
  253. DiscoveryProxy: *dproxy,
  254. NewCluster: clusterStateFlag.String() == clusterStateFlagNew,
  255. ForceNewCluster: *forceNewCluster,
  256. Transport: pt,
  257. }
  258. var s *etcdserver.EtcdServer
  259. s, err = etcdserver.NewServer(cfg)
  260. if err != nil {
  261. return nil, err
  262. }
  263. s.Start()
  264. if corsInfo.String() != "" {
  265. log.Printf("etcd: cors = %s", corsInfo)
  266. }
  267. ch := &cors.CORSHandler{
  268. Handler: etcdhttp.NewClientHandler(s),
  269. Info: corsInfo,
  270. }
  271. ph := etcdhttp.NewPeerHandler(s)
  272. // Start the peer server in a goroutine
  273. for _, l := range plns {
  274. go func(l net.Listener) {
  275. log.Fatal(http.Serve(l, ph))
  276. }(l)
  277. }
  278. // Start a client server goroutine for each listen address
  279. for _, l := range clns {
  280. go func(l net.Listener) {
  281. log.Fatal(http.Serve(l, ch))
  282. }(l)
  283. }
  284. return s.StopNotify(), nil
  285. }
  286. // startProxy launches an HTTP proxy for client communication which proxies to other etcd nodes.
  287. func startProxy() error {
  288. apurls, err := flags.URLsFromFlags(fs, "initial-advertise-peer-urls", "addr", peerTLSInfo)
  289. if err != nil {
  290. return err
  291. }
  292. cls, err := setupCluster(apurls)
  293. if err != nil {
  294. return fmt.Errorf("error setting up initial cluster: %v", err)
  295. }
  296. if *durl != "" {
  297. s, err := discovery.GetCluster(*durl, *dproxy)
  298. if err != nil {
  299. return err
  300. }
  301. if cls, err = etcdserver.NewClusterFromString(*durl, s); err != nil {
  302. return err
  303. }
  304. }
  305. pt, err := transport.NewTransport(clientTLSInfo)
  306. if err != nil {
  307. return err
  308. }
  309. // TODO(jonboulle): update peerURLs dynamically (i.e. when updating
  310. // clientURLs) instead of just using the initial fixed list here
  311. peerURLs := cls.PeerURLs()
  312. uf := func() []string {
  313. cls, err := etcdserver.GetClusterFromPeers(peerURLs)
  314. if err != nil {
  315. log.Printf("proxy: %v", err)
  316. return []string{}
  317. }
  318. return cls.ClientURLs()
  319. }
  320. ph := proxy.NewHandler(pt, uf)
  321. ph = &cors.CORSHandler{
  322. Handler: ph,
  323. Info: corsInfo,
  324. }
  325. if proxyFlag.String() == proxyFlagReadonly {
  326. ph = proxy.NewReadonlyHandler(ph)
  327. }
  328. lcurls, err := flags.URLsFromFlags(fs, "listen-client-urls", "bind-addr", clientTLSInfo)
  329. if err != nil {
  330. return err
  331. }
  332. // Start a proxy server goroutine for each listen address
  333. for _, u := range lcurls {
  334. l, err := transport.NewListener(u.Host, u.Scheme, clientTLSInfo)
  335. if err != nil {
  336. return err
  337. }
  338. host := u.Host
  339. go func() {
  340. log.Print("proxy: listening for client requests on ", host)
  341. log.Fatal(http.Serve(l, ph))
  342. }()
  343. }
  344. return nil
  345. }
  346. // setupCluster sets up an initial cluster definition for bootstrap or discovery.
  347. func setupCluster(apurls []url.URL) (*etcdserver.Cluster, error) {
  348. set := make(map[string]bool)
  349. fs.Visit(func(f *flag.Flag) {
  350. set[f.Name] = true
  351. })
  352. if set["discovery"] && set["initial-cluster"] {
  353. return nil, fmt.Errorf("both discovery and bootstrap-config are set")
  354. }
  355. var cls *etcdserver.Cluster
  356. var err error
  357. switch {
  358. case set["discovery"]:
  359. // If using discovery, generate a temporary cluster based on
  360. // self's advertised peer URLs
  361. clusterStr := genClusterString(*name, apurls)
  362. cls, err = etcdserver.NewClusterFromString(*durl, clusterStr)
  363. case set["initial-cluster"]:
  364. fallthrough
  365. default:
  366. // We're statically configured, and cluster has appropriately been set.
  367. cls, err = etcdserver.NewClusterFromString(*initialClusterToken, *initialCluster)
  368. }
  369. return cls, err
  370. }
  371. func genClusterString(name string, urls types.URLs) string {
  372. addrs := make([]string, 0)
  373. for _, u := range urls {
  374. addrs = append(addrs, fmt.Sprintf("%v=%v", name, u.String()))
  375. }
  376. return strings.Join(addrs, ",")
  377. }