123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188 |
- // Copyright 2016 The etcd Authors
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package etcdmain
- import (
- "crypto/tls"
- "fmt"
- "net"
- "net/http"
- "os"
- "time"
- "github.com/coreos/etcd/clientv3"
- pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
- "github.com/coreos/etcd/pkg/transport"
- "github.com/coreos/etcd/proxy/grpcproxy"
- "github.com/spf13/cobra"
- "google.golang.org/grpc"
- "github.com/cockroachdb/cmux"
- grpc_prometheus "github.com/grpc-ecosystem/go-grpc-prometheus"
- "github.com/prometheus/client_golang/prometheus"
- )
- var (
- grpcProxyListenAddr string
- grpcProxyEndpoints []string
- grpcProxyCert string
- grpcProxyKey string
- grpcProxyCA string
- )
- func init() {
- rootCmd.AddCommand(newGRPCProxyCommand())
- }
- // newGRPCProxyCommand returns the cobra command for "grpc-proxy".
- func newGRPCProxyCommand() *cobra.Command {
- lpc := &cobra.Command{
- Use: "grpc-proxy <subcommand>",
- Short: "grpc-proxy related command",
- }
- lpc.AddCommand(newGRPCProxyStartCommand())
- return lpc
- }
- func newGRPCProxyStartCommand() *cobra.Command {
- cmd := cobra.Command{
- Use: "start",
- Short: "start the grpc proxy",
- Run: startGRPCProxy,
- }
- cmd.Flags().StringVar(&grpcProxyListenAddr, "listen-addr", "127.0.0.1:23790", "listen address")
- cmd.Flags().StringSliceVar(&grpcProxyEndpoints, "endpoints", []string{"127.0.0.1:2379"}, "comma separated etcd cluster endpoints")
- cmd.Flags().StringVar(&grpcProxyCert, "cert", "", "identify secure connections with etcd servers using this TLS certificate file")
- cmd.Flags().StringVar(&grpcProxyKey, "key", "", "identify secure connections with etcd servers using this TLS key file")
- cmd.Flags().StringVar(&grpcProxyCA, "cacert", "", "verify certificates of TLS-enabled secure etcd servers using this CA bundle")
- return &cmd
- }
- func startGRPCProxy(cmd *cobra.Command, args []string) {
- l, err := net.Listen("tcp", grpcProxyListenAddr)
- if err != nil {
- fmt.Fprintln(os.Stderr, err)
- os.Exit(1)
- }
- if l, err = transport.NewKeepAliveListener(l, "tcp", nil); err != nil {
- fmt.Fprintln(os.Stderr, err)
- os.Exit(1)
- }
- plog.Infof("listening for grpc-proxy client requests on %s", grpcProxyListenAddr)
- defer func() {
- l.Close()
- plog.Infof("stopping listening for grpc-proxy client requests on %s", grpcProxyListenAddr)
- }()
- m := cmux.New(l)
- cfg, err := newClientCfg()
- if err != nil {
- fmt.Fprintln(os.Stderr, err)
- os.Exit(1)
- }
- client, err := clientv3.New(*cfg)
- if err != nil {
- fmt.Fprintln(os.Stderr, err)
- os.Exit(1)
- }
- kvp, _ := grpcproxy.NewKvProxy(client)
- watchp, _ := grpcproxy.NewWatchProxy(client)
- clusterp := grpcproxy.NewClusterProxy(client)
- leasep := grpcproxy.NewLeaseProxy(client)
- mainp := grpcproxy.NewMaintenanceProxy(client)
- authp := grpcproxy.NewAuthProxy(client)
- server := grpc.NewServer(
- grpc.StreamInterceptor(grpc_prometheus.StreamServerInterceptor),
- grpc.UnaryInterceptor(grpc_prometheus.UnaryServerInterceptor),
- )
- pb.RegisterKVServer(server, kvp)
- pb.RegisterWatchServer(server, watchp)
- pb.RegisterClusterServer(server, clusterp)
- pb.RegisterLeaseServer(server, leasep)
- pb.RegisterMaintenanceServer(server, mainp)
- pb.RegisterAuthServer(server, authp)
- errc := make(chan error)
- grpcl := m.Match(cmux.HTTP2())
- go func() { errc <- server.Serve(grpcl) }()
- httpmux := http.NewServeMux()
- httpmux.HandleFunc("/", http.NotFound)
- httpmux.Handle("/metrics", prometheus.Handler())
- srvhttp := &http.Server{
- Handler: httpmux,
- }
- var httpl net.Listener
- if cfg.TLS != nil {
- srvhttp.TLSConfig = cfg.TLS
- httpl = tls.NewListener(m.Match(cmux.Any()), cfg.TLS)
- } else {
- httpl = m.Match(cmux.HTTP1())
- }
- go func() { errc <- srvhttp.Serve(httpl) }()
- go func() { errc <- m.Serve() }()
- // grpc-proxy is initialized, ready to serve
- notifySystemd()
- fmt.Fprintln(os.Stderr, <-errc)
- os.Exit(1)
- }
- func newClientCfg() (*clientv3.Config, error) {
- // set tls if any one tls option set
- var cfgtls *transport.TLSInfo
- tlsinfo := transport.TLSInfo{}
- if grpcProxyCert != "" {
- tlsinfo.CertFile = grpcProxyCert
- cfgtls = &tlsinfo
- }
- if grpcProxyKey != "" {
- tlsinfo.KeyFile = grpcProxyKey
- cfgtls = &tlsinfo
- }
- if grpcProxyCA != "" {
- tlsinfo.CAFile = grpcProxyCA
- cfgtls = &tlsinfo
- }
- cfg := clientv3.Config{
- Endpoints: grpcProxyEndpoints,
- DialTimeout: 5 * time.Second,
- }
- if cfgtls != nil {
- clientTLS, err := cfgtls.ClientConfig()
- if err != nil {
- return nil, err
- }
- cfg.TLS = clientTLS
- }
- // TODO: support insecure tls
- return &cfg, nil
- }
|