starter.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401
  1. // Copyright 2015 CoreOS, Inc.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package starter
  15. import (
  16. "encoding/json"
  17. "flag"
  18. "fmt"
  19. "io/ioutil"
  20. "log"
  21. "net/http"
  22. "net/url"
  23. "os"
  24. "path"
  25. "strings"
  26. "syscall"
  27. "github.com/coreos/etcd/client"
  28. "github.com/coreos/etcd/etcdmain"
  29. "github.com/coreos/etcd/migrate"
  30. "github.com/coreos/etcd/pkg/flags"
  31. "github.com/coreos/etcd/pkg/osutil"
  32. etcdversion "github.com/coreos/etcd/version"
  33. "github.com/coreos/etcd/wal"
  34. "github.com/coreos/etcd/Godeps/_workspace/src/golang.org/x/net/context"
  35. )
  36. type version string
  37. const (
  38. internalV1 version = "1"
  39. internalV2 version = "2"
  40. internalV2Proxy version = "2.proxy"
  41. internalUnknown version = "unknown"
  42. v0_4 version = "v0.4"
  43. v2_0 version = "v2.0"
  44. v2_0Proxy version = "v2.0 proxy"
  45. empty version = "empty"
  46. unknown version = "unknown"
  47. defaultInternalV1etcdBinaryDir = "/usr/libexec/etcd/internal_versions/"
  48. )
  49. var (
  50. v2SpecialFlags = []string{
  51. "initial-cluster",
  52. "listen-peer-urls",
  53. "listen-client-urls",
  54. "proxy",
  55. }
  56. )
  57. func StartDesiredVersion(args []string) {
  58. fs, err := parseConfig(args)
  59. if err != nil {
  60. return
  61. }
  62. if fs.Lookup("version").Value.String() == "true" {
  63. fmt.Println("etcd version", etcdversion.Version)
  64. os.Exit(0)
  65. }
  66. ver := checkInternalVersion(fs)
  67. log.Printf("starter: start etcd version %s", ver)
  68. switch ver {
  69. case internalV1:
  70. startInternalV1()
  71. case internalV2:
  72. case internalV2Proxy:
  73. if _, err := os.Stat(standbyInfo4(fs.Lookup("data-dir").Value.String())); err != nil {
  74. log.Printf("starter: Detect standby_info file exists, and add --proxy=on flag to ensure it runs in v2.0 proxy mode.")
  75. log.Printf("starter: Before removing v0.4 data, --proxy=on flag MUST be added.")
  76. }
  77. // append proxy flag to args to trigger proxy mode
  78. os.Args = append(os.Args, "-proxy=on")
  79. default:
  80. log.Panicf("starter: unhandled start version")
  81. }
  82. }
  83. func checkInternalVersion(fs *flag.FlagSet) version {
  84. // If it uses 2.0 env var explicitly, start 2.0
  85. for _, name := range v2SpecialFlags {
  86. if fs.Lookup(name).Value.String() != "" {
  87. return internalV2
  88. }
  89. }
  90. dataDir := fs.Lookup("data-dir").Value.String()
  91. if dataDir == "" {
  92. log.Fatalf("starter: please set --data-dir or ETCD_DATA_DIR for etcd")
  93. }
  94. // check the data directory
  95. dataver, err := wal.DetectVersion(dataDir)
  96. if err != nil {
  97. log.Fatalf("starter: failed to detect etcd version in %v: %v", dataDir, err)
  98. }
  99. log.Printf("starter: detect etcd version %s in %s", dataver, dataDir)
  100. switch dataver {
  101. case wal.WALv2_0:
  102. return internalV2
  103. case wal.WALv2_0Proxy:
  104. return internalV2Proxy
  105. case wal.WALv0_4:
  106. standbyInfo, err := migrate.DecodeStandbyInfo4FromFile(standbyInfo4(dataDir))
  107. if err != nil && !os.IsNotExist(err) {
  108. log.Fatalf("starter: failed to decode standbyInfo in %v: %v", dataDir, err)
  109. }
  110. inStandbyMode := standbyInfo != nil && standbyInfo.Running
  111. if inStandbyMode {
  112. ver, err := checkInternalVersionByClientURLs(standbyInfo.ClientURLs(), clientTLSInfo(fs))
  113. if err != nil {
  114. log.Printf("starter: failed to check start version through peers: %v", err)
  115. return internalV1
  116. }
  117. if ver == internalV2 {
  118. osutil.Unsetenv("ETCD_DISCOVERY")
  119. os.Args = append(os.Args, "-initial-cluster", standbyInfo.InitialCluster())
  120. return internalV2Proxy
  121. }
  122. return ver
  123. }
  124. ver, err := checkInternalVersionByDataDir4(dataDir)
  125. if err != nil {
  126. log.Fatalf("starter: failed to check start version in %v: %v", dataDir, err)
  127. }
  128. return ver
  129. case wal.WALNotExist:
  130. discovery := fs.Lookup("discovery").Value.String()
  131. dpeers, err := getPeersFromDiscoveryURL(discovery)
  132. if err != nil {
  133. log.Printf("starter: failed to get peers from discovery %s: %v", discovery, err)
  134. }
  135. peerStr := fs.Lookup("peers").Value.String()
  136. ppeers := getPeersFromPeersFlag(peerStr, peerTLSInfo(fs))
  137. urls := getClientURLsByPeerURLs(append(dpeers, ppeers...), peerTLSInfo(fs))
  138. ver, err := checkInternalVersionByClientURLs(urls, clientTLSInfo(fs))
  139. if err != nil {
  140. log.Printf("starter: failed to check start version through peers: %v", err)
  141. return internalV2
  142. }
  143. return ver
  144. }
  145. // never reach here
  146. log.Panicf("starter: unhandled etcd version in %v", dataDir)
  147. return internalUnknown
  148. }
  149. func checkInternalVersionByDataDir4(dataDir string) (version, error) {
  150. // check v0.4 snapshot
  151. snap4, err := migrate.DecodeLatestSnapshot4FromDir(snapDir4(dataDir))
  152. if err != nil {
  153. return internalUnknown, err
  154. }
  155. if snap4 != nil {
  156. st := &migrate.Store4{}
  157. if err := json.Unmarshal(snap4.State, st); err != nil {
  158. return internalUnknown, err
  159. }
  160. dir := st.Root.Children["_etcd"]
  161. n, ok := dir.Children["next-internal-version"]
  162. if ok && n.Value == "2" {
  163. return internalV2, nil
  164. }
  165. }
  166. // check v0.4 log
  167. ents4, err := migrate.DecodeLog4FromFile(logFile4(dataDir))
  168. if err != nil {
  169. return internalUnknown, err
  170. }
  171. for _, e := range ents4 {
  172. cmd, err := migrate.NewCommand4(e.GetCommandName(), e.GetCommand(), nil)
  173. if err != nil {
  174. return internalUnknown, err
  175. }
  176. setcmd, ok := cmd.(*migrate.SetCommand)
  177. if !ok {
  178. continue
  179. }
  180. if setcmd.Key == "/_etcd/next-internal-version" && setcmd.Value == "2" {
  181. return internalV2, nil
  182. }
  183. }
  184. return internalV1, nil
  185. }
  186. func getClientURLsByPeerURLs(peers []string, tls *TLSInfo) []string {
  187. c, err := newDefaultClient(tls)
  188. if err != nil {
  189. log.Printf("starter: new client error: %v", err)
  190. return nil
  191. }
  192. var urls []string
  193. for _, u := range peers {
  194. resp, err := c.Get(u + "/etcdURL")
  195. if err != nil {
  196. log.Printf("starter: failed to get /etcdURL from %s", u)
  197. continue
  198. }
  199. b, err := ioutil.ReadAll(resp.Body)
  200. if err != nil {
  201. log.Printf("starter: failed to read body from %s", u)
  202. continue
  203. }
  204. urls = append(urls, string(b))
  205. }
  206. return urls
  207. }
  208. func checkInternalVersionByClientURLs(urls []string, tls *TLSInfo) (version, error) {
  209. c, err := newDefaultClient(tls)
  210. if err != nil {
  211. return internalUnknown, err
  212. }
  213. for _, u := range urls {
  214. resp, err := c.Get(u + "/version")
  215. if err != nil {
  216. log.Printf("starter: failed to get /version from %s", u)
  217. continue
  218. }
  219. b, err := ioutil.ReadAll(resp.Body)
  220. if err != nil {
  221. log.Printf("starter: failed to read body from %s", u)
  222. continue
  223. }
  224. var m map[string]string
  225. err = json.Unmarshal(b, &m)
  226. if err != nil {
  227. log.Printf("starter: failed to unmarshal body %s from %s", b, u)
  228. continue
  229. }
  230. switch m["internalVersion"] {
  231. case "1":
  232. return internalV1, nil
  233. case "2":
  234. return internalV2, nil
  235. default:
  236. log.Printf("starter: unrecognized internal version %s from %s", m["internalVersion"], u)
  237. }
  238. }
  239. return internalUnknown, fmt.Errorf("failed to get version from urls %v", urls)
  240. }
  241. func getPeersFromDiscoveryURL(discoverURL string) ([]string, error) {
  242. if discoverURL == "" {
  243. return nil, nil
  244. }
  245. u, err := url.Parse(discoverURL)
  246. if err != nil {
  247. return nil, err
  248. }
  249. token := u.Path
  250. u.Path = ""
  251. cfg := client.Config{
  252. Transport: &http.Transport{},
  253. Endpoints: []string{u.String()},
  254. }
  255. c, err := client.New(cfg)
  256. if err != nil {
  257. return nil, err
  258. }
  259. dc := client.NewKeysAPIWithPrefix(c, "")
  260. ctx, cancel := context.WithTimeout(context.Background(), client.DefaultRequestTimeout)
  261. resp, err := dc.Get(ctx, token, nil)
  262. cancel()
  263. if err != nil {
  264. return nil, err
  265. }
  266. peers := make([]string, 0)
  267. // append non-config keys to peers
  268. for _, n := range resp.Node.Nodes {
  269. if g := path.Base(n.Key); g == "_config" || g == "_state" {
  270. continue
  271. }
  272. peers = append(peers, n.Value)
  273. }
  274. return peers, nil
  275. }
  276. func getPeersFromPeersFlag(str string, tls *TLSInfo) []string {
  277. peers := trimSplit(str, ",")
  278. for i, p := range peers {
  279. peers[i] = tls.Scheme() + "://" + p
  280. }
  281. return peers
  282. }
  283. func startInternalV1() {
  284. p := os.Getenv("ETCD_BINARY_DIR")
  285. if p == "" {
  286. p = defaultInternalV1etcdBinaryDir
  287. }
  288. p = path.Join(p, "1")
  289. err := syscall.Exec(p, os.Args, syscall.Environ())
  290. if err != nil {
  291. log.Fatalf("starter: failed to execute internal v1 etcd: %v", err)
  292. }
  293. }
  294. func newDefaultClient(tls *TLSInfo) (*http.Client, error) {
  295. tr := &http.Transport{}
  296. if tls.Scheme() == "https" {
  297. tlsConfig, err := tls.ClientConfig()
  298. if err != nil {
  299. return nil, err
  300. }
  301. tr.TLSClientConfig = tlsConfig
  302. }
  303. return &http.Client{Transport: tr}, nil
  304. }
  305. type value struct {
  306. isBoolFlag bool
  307. s string
  308. }
  309. func (v *value) String() string { return v.s }
  310. func (v *value) Set(s string) error {
  311. v.s = s
  312. return nil
  313. }
  314. func (v *value) IsBoolFlag() bool { return v.isBoolFlag }
  315. type boolFlag interface {
  316. flag.Value
  317. IsBoolFlag() bool
  318. }
  319. // parseConfig parses out the input config from cmdline arguments and
  320. // environment variables.
  321. func parseConfig(args []string) (*flag.FlagSet, error) {
  322. fs := flag.NewFlagSet("full flagset", flag.ContinueOnError)
  323. etcdmain.NewConfig().VisitAll(func(f *flag.Flag) {
  324. _, isBoolFlag := f.Value.(boolFlag)
  325. fs.Var(&value{isBoolFlag: isBoolFlag}, f.Name, "")
  326. })
  327. if err := fs.Parse(args); err != nil {
  328. return nil, err
  329. }
  330. if err := flags.SetFlagsFromEnv(fs); err != nil {
  331. return nil, err
  332. }
  333. return fs, nil
  334. }
  335. func clientTLSInfo(fs *flag.FlagSet) *TLSInfo {
  336. return &TLSInfo{
  337. CAFile: fs.Lookup("ca-file").Value.String(),
  338. CertFile: fs.Lookup("cert-file").Value.String(),
  339. KeyFile: fs.Lookup("key-file").Value.String(),
  340. }
  341. }
  342. func peerTLSInfo(fs *flag.FlagSet) *TLSInfo {
  343. return &TLSInfo{
  344. CAFile: fs.Lookup("peer-ca-file").Value.String(),
  345. CertFile: fs.Lookup("peer-cert-file").Value.String(),
  346. KeyFile: fs.Lookup("peer-key-file").Value.String(),
  347. }
  348. }
  349. func snapDir4(dataDir string) string {
  350. return path.Join(dataDir, "snapshot")
  351. }
  352. func logFile4(dataDir string) string {
  353. return path.Join(dataDir, "log")
  354. }
  355. func standbyInfo4(dataDir string) string {
  356. return path.Join(dataDir, "standby_info")
  357. }
  358. func trimSplit(s, sep string) []string {
  359. trimmed := strings.Split(s, sep)
  360. for i := range trimmed {
  361. trimmed[i] = strings.TrimSpace(trimmed[i])
  362. }
  363. return trimmed
  364. }