peer_server.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451
  1. package server
  2. import (
  3. "bytes"
  4. "crypto/tls"
  5. "encoding/binary"
  6. "encoding/json"
  7. "fmt"
  8. "io/ioutil"
  9. "net"
  10. "net/http"
  11. "net/url"
  12. "strings"
  13. "time"
  14. etcdErr "github.com/coreos/etcd/error"
  15. "github.com/coreos/etcd/log"
  16. "github.com/coreos/etcd/store"
  17. "github.com/coreos/go-raft"
  18. )
  19. type PeerServer struct {
  20. raftServer raft.Server
  21. server *Server
  22. httpServer *http.Server
  23. listener net.Listener
  24. joinIndex uint64
  25. name string
  26. url string
  27. listenHost string
  28. tlsConf *TLSConfig
  29. tlsInfo *TLSInfo
  30. followersStats *raftFollowersStats
  31. serverStats *raftServerStats
  32. registry *Registry
  33. store store.Store
  34. snapConf *snapshotConf
  35. MaxClusterSize int
  36. RetryTimes int
  37. }
  38. // TODO: find a good policy to do snapshot
  39. type snapshotConf struct {
  40. // Etcd will check if snapshot is need every checkingInterval
  41. checkingInterval time.Duration
  42. // The number of writes when the last snapshot happened
  43. lastWrites uint64
  44. // If the incremental number of writes since the last snapshot
  45. // exceeds the write Threshold, etcd will do a snapshot
  46. writesThr uint64
  47. }
  48. func NewPeerServer(name string, path string, url string, listenHost string, tlsConf *TLSConfig, tlsInfo *TLSInfo, registry *Registry, store store.Store) *PeerServer {
  49. s := &PeerServer{
  50. name: name,
  51. url: url,
  52. listenHost: listenHost,
  53. tlsConf: tlsConf,
  54. tlsInfo: tlsInfo,
  55. registry: registry,
  56. store: store,
  57. snapConf: &snapshotConf{time.Second * 3, 0, 20 * 1000},
  58. followersStats: &raftFollowersStats{
  59. Leader: name,
  60. Followers: make(map[string]*raftFollowerStats),
  61. },
  62. serverStats: &raftServerStats{
  63. StartTime: time.Now(),
  64. sendRateQueue: &statsQueue{
  65. back: -1,
  66. },
  67. recvRateQueue: &statsQueue{
  68. back: -1,
  69. },
  70. },
  71. }
  72. // Create transporter for raft
  73. raftTransporter := newTransporter(tlsConf.Scheme, tlsConf.Client, s)
  74. // Create raft server
  75. raftServer, err := raft.NewServer(name, path, raftTransporter, s.store, s, "")
  76. if err != nil {
  77. log.Fatal(err)
  78. }
  79. s.raftServer = raftServer
  80. return s
  81. }
  82. // Start the raft server
  83. func (s *PeerServer) ListenAndServe(snapshot bool, cluster []string) error {
  84. // LoadSnapshot
  85. if snapshot {
  86. err := s.raftServer.LoadSnapshot()
  87. if err == nil {
  88. log.Debugf("%s finished load snapshot", s.name)
  89. } else {
  90. log.Debug(err)
  91. }
  92. }
  93. s.raftServer.SetElectionTimeout(ElectionTimeout)
  94. s.raftServer.SetHeartbeatTimeout(HeartbeatTimeout)
  95. s.raftServer.Start()
  96. if s.raftServer.IsLogEmpty() {
  97. // start as a leader in a new cluster
  98. if len(cluster) == 0 {
  99. s.startAsLeader()
  100. } else {
  101. s.startAsFollower(cluster)
  102. }
  103. } else {
  104. // Rejoin the previous cluster
  105. cluster = s.registry.PeerURLs(s.raftServer.Leader(), s.name)
  106. for i := 0; i < len(cluster); i++ {
  107. u, err := url.Parse(cluster[i])
  108. if err != nil {
  109. log.Debug("rejoin cannot parse url: ", err)
  110. }
  111. cluster[i] = u.Host
  112. }
  113. ok := s.joinCluster(cluster)
  114. if !ok {
  115. log.Warn("the entire cluster is down! this machine will restart the cluster.")
  116. }
  117. log.Debugf("%s restart as a follower", s.name)
  118. }
  119. // open the snapshot
  120. if snapshot {
  121. go s.monitorSnapshot()
  122. }
  123. // start to response to raft requests
  124. return s.startTransport(s.tlsConf.Scheme, s.tlsConf.Server)
  125. }
  126. // Overridden version of net/http added so we can manage the listener.
  127. func (s *PeerServer) listenAndServe() error {
  128. addr := s.httpServer.Addr
  129. if addr == "" {
  130. addr = ":http"
  131. }
  132. l, e := net.Listen("tcp", addr)
  133. if e != nil {
  134. return e
  135. }
  136. s.listener = l
  137. return s.httpServer.Serve(l)
  138. }
  139. // Overridden version of net/http added so we can manage the listener.
  140. func (s *PeerServer) listenAndServeTLS(certFile, keyFile string) error {
  141. addr := s.httpServer.Addr
  142. if addr == "" {
  143. addr = ":https"
  144. }
  145. config := &tls.Config{}
  146. if s.httpServer.TLSConfig != nil {
  147. *config = *s.httpServer.TLSConfig
  148. }
  149. if config.NextProtos == nil {
  150. config.NextProtos = []string{"http/1.1"}
  151. }
  152. var err error
  153. config.Certificates = make([]tls.Certificate, 1)
  154. config.Certificates[0], err = tls.LoadX509KeyPair(certFile, keyFile)
  155. if err != nil {
  156. return err
  157. }
  158. conn, err := net.Listen("tcp", addr)
  159. if err != nil {
  160. return err
  161. }
  162. tlsListener := tls.NewListener(conn, config)
  163. s.listener = tlsListener
  164. return s.httpServer.Serve(tlsListener)
  165. }
  166. // Stops the server.
  167. func (s *PeerServer) Close() {
  168. if s.listener != nil {
  169. s.listener.Close()
  170. s.listener = nil
  171. }
  172. }
  173. // Retrieves the underlying Raft server.
  174. func (s *PeerServer) RaftServer() raft.Server {
  175. return s.raftServer
  176. }
  177. // Associates the client server with the peer server.
  178. func (s *PeerServer) SetServer(server *Server) {
  179. s.server = server
  180. }
  181. func (s *PeerServer) startAsLeader() {
  182. // leader need to join self as a peer
  183. for {
  184. _, err := s.raftServer.Do(NewJoinCommand(PeerVersion, s.raftServer.Name(), s.url, s.server.URL()))
  185. if err == nil {
  186. break
  187. }
  188. }
  189. log.Debugf("%s start as a leader", s.name)
  190. }
  191. func (s *PeerServer) startAsFollower(cluster []string) {
  192. // start as a follower in a existing cluster
  193. for i := 0; i < s.RetryTimes; i++ {
  194. ok := s.joinCluster(cluster)
  195. if ok {
  196. return
  197. }
  198. log.Warnf("cannot join to cluster via given machines, retry in %d seconds", RetryInterval)
  199. time.Sleep(time.Second * RetryInterval)
  200. }
  201. log.Fatalf("Cannot join the cluster via given machines after %x retries", s.RetryTimes)
  202. }
  203. // Start to listen and response raft command
  204. func (s *PeerServer) startTransport(scheme string, tlsConf tls.Config) error {
  205. log.Infof("raft server [name %s, listen on %s, advertised url %s]", s.name, s.listenHost, s.url)
  206. raftMux := http.NewServeMux()
  207. s.httpServer = &http.Server{
  208. Handler: raftMux,
  209. TLSConfig: &tlsConf,
  210. Addr: s.listenHost,
  211. }
  212. // internal commands
  213. raftMux.HandleFunc("/name", s.NameHttpHandler)
  214. raftMux.HandleFunc("/version", s.RaftVersionHttpHandler)
  215. raftMux.HandleFunc("/join", s.JoinHttpHandler)
  216. raftMux.HandleFunc("/remove/", s.RemoveHttpHandler)
  217. raftMux.HandleFunc("/vote", s.VoteHttpHandler)
  218. raftMux.HandleFunc("/log", s.GetLogHttpHandler)
  219. raftMux.HandleFunc("/log/append", s.AppendEntriesHttpHandler)
  220. raftMux.HandleFunc("/snapshot", s.SnapshotHttpHandler)
  221. raftMux.HandleFunc("/snapshotRecovery", s.SnapshotRecoveryHttpHandler)
  222. raftMux.HandleFunc("/etcdURL", s.EtcdURLHttpHandler)
  223. if scheme == "http" {
  224. return s.listenAndServe()
  225. } else {
  226. return s.listenAndServeTLS(s.tlsInfo.CertFile, s.tlsInfo.KeyFile)
  227. }
  228. }
  229. // getVersion fetches the raft version of a peer. This works for now but we
  230. // will need to do something more sophisticated later when we allow mixed
  231. // version clusters.
  232. func getVersion(t *transporter, versionURL url.URL) (string, error) {
  233. resp, req, err := t.Get(versionURL.String())
  234. if err != nil {
  235. return "", err
  236. }
  237. defer resp.Body.Close()
  238. t.CancelWhenTimeout(req)
  239. body, err := ioutil.ReadAll(resp.Body)
  240. return string(body), nil
  241. }
  242. func (s *PeerServer) joinCluster(cluster []string) bool {
  243. for _, machine := range cluster {
  244. if len(machine) == 0 {
  245. continue
  246. }
  247. err := s.joinByMachine(s.raftServer, machine, s.tlsConf.Scheme)
  248. if err == nil {
  249. log.Debugf("%s success join to the cluster via machine %s", s.name, machine)
  250. return true
  251. } else {
  252. if _, ok := err.(etcdErr.Error); ok {
  253. log.Fatal(err)
  254. }
  255. log.Debugf("cannot join to cluster via machine %s %s", machine, err)
  256. }
  257. }
  258. return false
  259. }
  260. // Send join requests to machine.
  261. func (s *PeerServer) joinByMachine(server raft.Server, machine string, scheme string) error {
  262. var b bytes.Buffer
  263. // t must be ok
  264. t, _ := server.Transporter().(*transporter)
  265. // Our version must match the leaders version
  266. versionURL := url.URL{Host: machine, Scheme: scheme, Path: "/version"}
  267. version, err := getVersion(t, versionURL)
  268. if err != nil {
  269. return fmt.Errorf("Error during join version check: %v", err)
  270. }
  271. // TODO: versioning of the internal protocol. See:
  272. // Documentation/internatl-protocol-versioning.md
  273. if version != PeerVersion {
  274. return fmt.Errorf("Unable to join: internal version mismatch, entire cluster must be running identical versions of etcd")
  275. }
  276. json.NewEncoder(&b).Encode(NewJoinCommand(PeerVersion, server.Name(), s.url, s.server.URL()))
  277. joinURL := url.URL{Host: machine, Scheme: scheme, Path: "/join"}
  278. log.Debugf("Send Join Request to %s", joinURL.String())
  279. resp, req, err := t.Post(joinURL.String(), &b)
  280. for {
  281. if err != nil {
  282. return fmt.Errorf("Unable to join: %v", err)
  283. }
  284. if resp != nil {
  285. defer resp.Body.Close()
  286. t.CancelWhenTimeout(req)
  287. if resp.StatusCode == http.StatusOK {
  288. b, _ := ioutil.ReadAll(resp.Body)
  289. s.joinIndex, _ = binary.Uvarint(b)
  290. return nil
  291. }
  292. if resp.StatusCode == http.StatusTemporaryRedirect {
  293. address := resp.Header.Get("Location")
  294. log.Debugf("Send Join Request to %s", address)
  295. json.NewEncoder(&b).Encode(NewJoinCommand(PeerVersion, server.Name(), s.url, s.server.URL()))
  296. resp, req, err = t.Post(address, &b)
  297. } else if resp.StatusCode == http.StatusBadRequest {
  298. log.Debug("Reach max number machines in the cluster")
  299. decoder := json.NewDecoder(resp.Body)
  300. err := &etcdErr.Error{}
  301. decoder.Decode(err)
  302. return *err
  303. } else {
  304. return fmt.Errorf("Unable to join")
  305. }
  306. }
  307. }
  308. }
  309. func (s *PeerServer) Stats() []byte {
  310. s.serverStats.LeaderInfo.Uptime = time.Now().Sub(s.serverStats.LeaderInfo.startTime).String()
  311. queue := s.serverStats.sendRateQueue
  312. s.serverStats.SendingPkgRate, s.serverStats.SendingBandwidthRate = queue.Rate()
  313. queue = s.serverStats.recvRateQueue
  314. s.serverStats.RecvingPkgRate, s.serverStats.RecvingBandwidthRate = queue.Rate()
  315. b, _ := json.Marshal(s.serverStats)
  316. return b
  317. }
  318. func (s *PeerServer) PeerStats() []byte {
  319. if s.raftServer.State() == raft.Leader {
  320. b, _ := json.Marshal(s.followersStats)
  321. return b
  322. }
  323. return nil
  324. }
  325. func (s *PeerServer) monitorSnapshot() {
  326. for {
  327. time.Sleep(s.snapConf.checkingInterval)
  328. currentWrites := 0
  329. if uint64(currentWrites) > s.snapConf.writesThr {
  330. s.raftServer.TakeSnapshot()
  331. s.snapConf.lastWrites = 0
  332. }
  333. }
  334. }
  335. func (s *PeerServer) dispatch(c raft.Command, w http.ResponseWriter, req *http.Request) error {
  336. if s.raftServer.State() == raft.Leader {
  337. result, err := s.raftServer.Do(c)
  338. if err != nil {
  339. return err
  340. }
  341. if result == nil {
  342. return etcdErr.NewError(300, "Empty result from raft", store.UndefIndex, store.UndefTerm)
  343. }
  344. // response for raft related commands[join/remove]
  345. if b, ok := result.([]byte); ok {
  346. w.WriteHeader(http.StatusOK)
  347. w.Write(b)
  348. return nil
  349. }
  350. var b []byte
  351. if strings.HasPrefix(req.URL.Path, "/v1") {
  352. b, _ = json.Marshal(result.(*store.Event).Response())
  353. } else {
  354. b, _ = json.Marshal(result.(*store.Event))
  355. }
  356. w.WriteHeader(http.StatusOK)
  357. w.Write(b)
  358. return nil
  359. } else {
  360. leader := s.raftServer.Leader()
  361. // No leader available.
  362. if leader == "" {
  363. return etcdErr.NewError(300, "", store.UndefIndex, store.UndefTerm)
  364. }
  365. var url string
  366. switch c.(type) {
  367. case *JoinCommand, *RemoveCommand:
  368. url, _ = s.registry.PeerURL(leader)
  369. default:
  370. url, _ = s.registry.ClientURL(leader)
  371. }
  372. redirect(url, w, req)
  373. return nil
  374. }
  375. }