etcd.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422
  1. /*
  2. Copyright 2014 CoreOS, Inc.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package etcdmain
  14. import (
  15. "flag"
  16. "fmt"
  17. "log"
  18. "net"
  19. "net/http"
  20. "net/url"
  21. "os"
  22. "strings"
  23. "github.com/coreos/etcd/discovery"
  24. "github.com/coreos/etcd/etcdserver"
  25. "github.com/coreos/etcd/etcdserver/etcdhttp"
  26. "github.com/coreos/etcd/pkg/cors"
  27. "github.com/coreos/etcd/pkg/fileutil"
  28. "github.com/coreos/etcd/pkg/flags"
  29. "github.com/coreos/etcd/pkg/transport"
  30. "github.com/coreos/etcd/pkg/types"
  31. "github.com/coreos/etcd/proxy"
  32. "github.com/coreos/etcd/rafthttp"
  33. "github.com/coreos/etcd/version"
  34. )
  35. const (
  36. // the owner can make/remove files inside the directory
  37. privateDirMode = 0700
  38. proxyFlagOff = "off"
  39. proxyFlagReadonly = "readonly"
  40. proxyFlagOn = "on"
  41. fallbackFlagExit = "exit"
  42. fallbackFlagProxy = "proxy"
  43. clusterStateFlagNew = "new"
  44. clusterStateFlagExisting = "existing"
  45. )
  46. var (
  47. fs = flag.NewFlagSet("etcd", flag.ContinueOnError)
  48. name = fs.String("name", "default", "Unique human-readable name for this node")
  49. dir = fs.String("data-dir", "", "Path to the data directory")
  50. durl = fs.String("discovery", "", "Discovery service used to bootstrap the cluster")
  51. dproxy = fs.String("discovery-proxy", "", "HTTP proxy to use for traffic to discovery service")
  52. snapCount = fs.Uint64("snapshot-count", etcdserver.DefaultSnapCount, "Number of committed transactions to trigger a snapshot")
  53. printVersion = fs.Bool("version", false, "Print the version and exit")
  54. forceNewCluster = fs.Bool("force-new-cluster", false, "Force to create a new one member cluster")
  55. maxSnapFiles = fs.Uint("max-snapshots", 5, "Maximum number of snapshot files to retain (0 is unlimited)")
  56. maxWalFiles = fs.Uint("max-wals", 5, "Maximum number of wal files to retain (0 is unlimited)")
  57. initialCluster = fs.String("initial-cluster", "default=http://localhost:2380,default=http://localhost:7001", "Initial cluster configuration for bootstrapping")
  58. initialClusterToken = fs.String("initial-cluster-token", "etcd-cluster", "Initial cluster token for the etcd cluster during bootstrap")
  59. corsInfo = &cors.CORSInfo{}
  60. clientTLSInfo = transport.TLSInfo{}
  61. peerTLSInfo = transport.TLSInfo{}
  62. proxyFlag = flags.NewStringsFlag(
  63. proxyFlagOff,
  64. proxyFlagReadonly,
  65. proxyFlagOn,
  66. )
  67. fallbackFlag = flags.NewStringsFlag(
  68. fallbackFlagExit,
  69. fallbackFlagProxy,
  70. )
  71. clusterStateFlag = flags.NewStringsFlag(
  72. clusterStateFlagNew,
  73. clusterStateFlagExisting,
  74. )
  75. ignored = []string{
  76. "cluster-active-size",
  77. "cluster-remove-delay",
  78. "cluster-sync-interval",
  79. "config",
  80. "force",
  81. "max-result-buffer",
  82. "max-retry-attempts",
  83. "peer-heartbeat-interval",
  84. "peer-election-timeout",
  85. "retry-interval",
  86. "snapshot",
  87. "v",
  88. "vv",
  89. }
  90. )
  91. func init() {
  92. fs.Var(clusterStateFlag, "initial-cluster-state", "Initial cluster configuration for bootstrapping")
  93. if err := clusterStateFlag.Set(clusterStateFlagNew); err != nil {
  94. // Should never happen.
  95. log.Panicf("unexpected error setting up clusterStateFlag: %v", err)
  96. }
  97. fs.Var(flags.NewURLsValue("http://localhost:2380,http://localhost:7001"), "initial-advertise-peer-urls", "List of this member's peer URLs to advertise to the rest of the cluster")
  98. fs.Var(flags.NewURLsValue("http://localhost:2379,http://localhost:4001"), "advertise-client-urls", "List of this member's client URLs to advertise to the rest of the cluster")
  99. fs.Var(flags.NewURLsValue("http://localhost:2380,http://localhost:7001"), "listen-peer-urls", "List of URLs to listen on for peer traffic")
  100. fs.Var(flags.NewURLsValue("http://localhost:2379,http://localhost:4001"), "listen-client-urls", "List of URLs to listen on for client traffic")
  101. fs.Var(corsInfo, "cors", "Comma-separated white list of origins for CORS (cross-origin resource sharing).")
  102. fs.Var(proxyFlag, "proxy", fmt.Sprintf("Valid values include %s", strings.Join(proxyFlag.Values, ", ")))
  103. if err := proxyFlag.Set(proxyFlagOff); err != nil {
  104. // Should never happen.
  105. log.Panicf("unexpected error setting up proxyFlag: %v", err)
  106. }
  107. fs.Var(fallbackFlag, "discovery-fallback", fmt.Sprintf("Valid values include %s", strings.Join(fallbackFlag.Values, ", ")))
  108. if err := fallbackFlag.Set(fallbackFlagProxy); err != nil {
  109. // Should never happen.
  110. log.Panicf("unexpected error setting up discovery-fallback flag: %v", err)
  111. }
  112. fs.StringVar(&clientTLSInfo.CAFile, "ca-file", "", "Path to the client server TLS CA file.")
  113. fs.StringVar(&clientTLSInfo.CertFile, "cert-file", "", "Path to the client server TLS cert file.")
  114. fs.StringVar(&clientTLSInfo.KeyFile, "key-file", "", "Path to the client server TLS key file.")
  115. fs.StringVar(&peerTLSInfo.CAFile, "peer-ca-file", "", "Path to the peer server TLS CA file.")
  116. fs.StringVar(&peerTLSInfo.CertFile, "peer-cert-file", "", "Path to the peer server TLS cert file.")
  117. fs.StringVar(&peerTLSInfo.KeyFile, "peer-key-file", "", "Path to the peer server TLS key file.")
  118. // backwards-compatibility with v0.4.6
  119. fs.Var(&flags.IPAddressPort{}, "addr", "DEPRECATED: Use -advertise-client-urls instead.")
  120. fs.Var(&flags.IPAddressPort{}, "bind-addr", "DEPRECATED: Use -listen-client-urls instead.")
  121. fs.Var(&flags.IPAddressPort{}, "peer-addr", "DEPRECATED: Use -initial-advertise-peer-urls instead.")
  122. fs.Var(&flags.IPAddressPort{}, "peer-bind-addr", "DEPRECATED: Use -listen-peer-urls instead.")
  123. for _, f := range ignored {
  124. fs.Var(&flags.IgnoredFlag{Name: f}, f, "")
  125. }
  126. fs.Var(&flags.DeprecatedFlag{Name: "peers"}, "peers", "DEPRECATED: Use -initial-cluster instead")
  127. fs.Var(&flags.DeprecatedFlag{Name: "peers-file"}, "peers-file", "DEPRECATED: Use -initial-cluster instead")
  128. }
  129. func Main() {
  130. fs.Usage = flags.UsageWithIgnoredFlagsFunc(fs, ignored)
  131. perr := fs.Parse(os.Args[1:])
  132. switch perr {
  133. case nil:
  134. case flag.ErrHelp:
  135. os.Exit(0)
  136. default:
  137. os.Exit(2)
  138. }
  139. if *printVersion {
  140. fmt.Println("etcd version", version.Version)
  141. os.Exit(0)
  142. }
  143. err := flags.SetFlagsFromEnv(fs)
  144. if err != nil {
  145. log.Fatalf("etcd: %v", err)
  146. }
  147. shouldProxy := proxyFlag.String() != proxyFlagOff
  148. var stopped <-chan struct{}
  149. if !shouldProxy {
  150. stopped, err = startEtcd()
  151. if err == discovery.ErrFullCluster && fallbackFlag.String() == fallbackFlagProxy {
  152. log.Printf("etcd: discovery cluster full, falling back to %s", fallbackFlagProxy)
  153. shouldProxy = true
  154. }
  155. }
  156. if shouldProxy {
  157. err = startProxy()
  158. }
  159. if err != nil {
  160. log.Fatalf("etcd: %v", err)
  161. }
  162. <-stopped
  163. }
  164. // startEtcd launches the etcd server and HTTP handlers for client/server communication.
  165. func startEtcd() (<-chan struct{}, error) {
  166. apurls, err := flags.URLsFromFlags(fs, "initial-advertise-peer-urls", "addr", peerTLSInfo)
  167. if err != nil {
  168. return nil, err
  169. }
  170. cls, err := setupCluster(apurls)
  171. if err != nil {
  172. return nil, fmt.Errorf("error setting up initial cluster: %v", err)
  173. }
  174. if *dir == "" {
  175. *dir = fmt.Sprintf("%v.etcd", *name)
  176. log.Printf("no data-dir provided, using default data-dir ./%s", *dir)
  177. }
  178. if err := os.MkdirAll(*dir, privateDirMode); err != nil {
  179. return nil, fmt.Errorf("cannot create data directory: %v", err)
  180. }
  181. if err := fileutil.IsDirWriteable(*dir); err != nil {
  182. return nil, fmt.Errorf("cannot write to data directory: %v", err)
  183. }
  184. pt, err := transport.NewTimeoutTransport(peerTLSInfo, rafthttp.ConnReadTimeout, rafthttp.ConnWriteTimeout)
  185. if err != nil {
  186. return nil, err
  187. }
  188. acurls, err := flags.URLsFromFlags(fs, "advertise-client-urls", "addr", clientTLSInfo)
  189. if err != nil {
  190. return nil, err
  191. }
  192. lpurls, err := flags.URLsFromFlags(fs, "listen-peer-urls", "peer-bind-addr", peerTLSInfo)
  193. if err != nil {
  194. return nil, err
  195. }
  196. if !peerTLSInfo.Empty() {
  197. log.Printf("etcd: peerTLS: %s", peerTLSInfo)
  198. }
  199. plns := make([]net.Listener, 0)
  200. for _, u := range lpurls {
  201. var l net.Listener
  202. l, err = transport.NewTimeoutListener(u.Host, u.Scheme, peerTLSInfo, rafthttp.ConnReadTimeout, rafthttp.ConnWriteTimeout)
  203. if err != nil {
  204. return nil, err
  205. }
  206. urlStr := u.String()
  207. log.Print("etcd: listening for peers on ", urlStr)
  208. defer func() {
  209. if err != nil {
  210. l.Close()
  211. log.Print("etcd: stopping listening for peers on ", urlStr)
  212. }
  213. }()
  214. plns = append(plns, l)
  215. }
  216. lcurls, err := flags.URLsFromFlags(fs, "listen-client-urls", "bind-addr", clientTLSInfo)
  217. if err != nil {
  218. return nil, err
  219. }
  220. if !clientTLSInfo.Empty() {
  221. log.Printf("etcd: clientTLS: %s", clientTLSInfo)
  222. }
  223. clns := make([]net.Listener, 0)
  224. for _, u := range lcurls {
  225. var l net.Listener
  226. l, err = transport.NewListener(u.Host, u.Scheme, clientTLSInfo)
  227. if err != nil {
  228. return nil, err
  229. }
  230. urlStr := u.String()
  231. log.Print("etcd: listening for client requests on ", urlStr)
  232. defer func() {
  233. if err != nil {
  234. l.Close()
  235. log.Print("etcd: stopping listening for client requests on ", urlStr)
  236. }
  237. }()
  238. clns = append(clns, l)
  239. }
  240. cfg := &etcdserver.ServerConfig{
  241. Name: *name,
  242. ClientURLs: acurls,
  243. PeerURLs: apurls,
  244. DataDir: *dir,
  245. SnapCount: *snapCount,
  246. MaxSnapFiles: *maxSnapFiles,
  247. MaxWALFiles: *maxWalFiles,
  248. Cluster: cls,
  249. DiscoveryURL: *durl,
  250. DiscoveryProxy: *dproxy,
  251. NewCluster: clusterStateFlag.String() == clusterStateFlagNew,
  252. ForceNewCluster: *forceNewCluster,
  253. Transport: pt,
  254. }
  255. var s *etcdserver.EtcdServer
  256. s, err = etcdserver.NewServer(cfg)
  257. if err != nil {
  258. return nil, err
  259. }
  260. s.Start()
  261. if corsInfo.String() != "" {
  262. log.Printf("etcd: cors = %s", corsInfo)
  263. }
  264. ch := &cors.CORSHandler{
  265. Handler: etcdhttp.NewClientHandler(s),
  266. Info: corsInfo,
  267. }
  268. ph := etcdhttp.NewPeerHandler(s)
  269. // Start the peer server in a goroutine
  270. for _, l := range plns {
  271. go func(l net.Listener) {
  272. log.Fatal(http.Serve(l, ph))
  273. }(l)
  274. }
  275. // Start a client server goroutine for each listen address
  276. for _, l := range clns {
  277. go func(l net.Listener) {
  278. log.Fatal(http.Serve(l, ch))
  279. }(l)
  280. }
  281. return s.StopNotify(), nil
  282. }
  283. // startProxy launches an HTTP proxy for client communication which proxies to other etcd nodes.
  284. func startProxy() error {
  285. apurls, err := flags.URLsFromFlags(fs, "initial-advertise-peer-urls", "addr", peerTLSInfo)
  286. if err != nil {
  287. return err
  288. }
  289. cls, err := setupCluster(apurls)
  290. if err != nil {
  291. return fmt.Errorf("error setting up initial cluster: %v", err)
  292. }
  293. if *durl != "" {
  294. s, err := discovery.GetCluster(*durl, *dproxy)
  295. if err != nil {
  296. return err
  297. }
  298. if cls, err = etcdserver.NewClusterFromString(*durl, s); err != nil {
  299. return err
  300. }
  301. }
  302. pt, err := transport.NewTransport(clientTLSInfo)
  303. if err != nil {
  304. return err
  305. }
  306. // TODO(jonboulle): update peerURLs dynamically (i.e. when updating
  307. // clientURLs) instead of just using the initial fixed list here
  308. peerURLs := cls.PeerURLs()
  309. uf := func() []string {
  310. cls, err := etcdserver.GetClusterFromPeers(peerURLs)
  311. if err != nil {
  312. log.Printf("proxy: %v", err)
  313. return []string{}
  314. }
  315. return cls.ClientURLs()
  316. }
  317. ph := proxy.NewHandler(pt, uf)
  318. ph = &cors.CORSHandler{
  319. Handler: ph,
  320. Info: corsInfo,
  321. }
  322. if proxyFlag.String() == proxyFlagReadonly {
  323. ph = proxy.NewReadonlyHandler(ph)
  324. }
  325. lcurls, err := flags.URLsFromFlags(fs, "listen-client-urls", "bind-addr", clientTLSInfo)
  326. if err != nil {
  327. return err
  328. }
  329. // Start a proxy server goroutine for each listen address
  330. for _, u := range lcurls {
  331. l, err := transport.NewListener(u.Host, u.Scheme, clientTLSInfo)
  332. if err != nil {
  333. return err
  334. }
  335. host := u.Host
  336. go func() {
  337. log.Print("proxy: listening for client requests on ", host)
  338. log.Fatal(http.Serve(l, ph))
  339. }()
  340. }
  341. return nil
  342. }
  343. // setupCluster sets up an initial cluster definition for bootstrap or discovery.
  344. func setupCluster(apurls []url.URL) (*etcdserver.Cluster, error) {
  345. set := make(map[string]bool)
  346. fs.Visit(func(f *flag.Flag) {
  347. set[f.Name] = true
  348. })
  349. if set["discovery"] && set["initial-cluster"] {
  350. return nil, fmt.Errorf("both discovery and bootstrap-config are set")
  351. }
  352. var cls *etcdserver.Cluster
  353. var err error
  354. switch {
  355. case set["discovery"]:
  356. // If using discovery, generate a temporary cluster based on
  357. // self's advertised peer URLs
  358. clusterStr := genClusterString(*name, apurls)
  359. cls, err = etcdserver.NewClusterFromString(*durl, clusterStr)
  360. case set["initial-cluster"]:
  361. fallthrough
  362. default:
  363. // We're statically configured, and cluster has appropriately been set.
  364. cls, err = etcdserver.NewClusterFromString(*initialClusterToken, *initialCluster)
  365. }
  366. return cls, err
  367. }
  368. func genClusterString(name string, urls types.URLs) string {
  369. addrs := make([]string, 0)
  370. for _, u := range urls {
  371. addrs = append(addrs, fmt.Sprintf("%v=%v", name, u.String()))
  372. }
  373. return strings.Join(addrs, ",")
  374. }