config.go 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274
  1. // Copyright 2015 CoreOS, Inc.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package etcdmain
  15. import (
  16. "errors"
  17. "flag"
  18. "fmt"
  19. "log"
  20. "net/url"
  21. "os"
  22. "strings"
  23. "github.com/coreos/etcd/etcdserver"
  24. "github.com/coreos/etcd/pkg/cors"
  25. "github.com/coreos/etcd/pkg/flags"
  26. "github.com/coreos/etcd/pkg/netutil"
  27. "github.com/coreos/etcd/pkg/transport"
  28. "github.com/coreos/etcd/version"
  29. )
  30. const (
  31. proxyFlagOff = "off"
  32. proxyFlagReadonly = "readonly"
  33. proxyFlagOn = "on"
  34. fallbackFlagExit = "exit"
  35. fallbackFlagProxy = "proxy"
  36. clusterStateFlagNew = "new"
  37. clusterStateFlagExisting = "existing"
  38. )
  39. var (
  40. ignored = []string{
  41. "cluster-active-size",
  42. "cluster-remove-delay",
  43. "cluster-sync-interval",
  44. "config",
  45. "force",
  46. "max-result-buffer",
  47. "max-retry-attempts",
  48. "peer-heartbeat-interval",
  49. "peer-election-timeout",
  50. "retry-interval",
  51. "snapshot",
  52. "v",
  53. "vv",
  54. }
  55. ErrConflictBootstrapFlags = fmt.Errorf("multiple discovery or bootstrap flags are set" +
  56. "Choose one of \"initial-cluster\", \"discovery\" or \"discovery-srv\"")
  57. )
  58. type config struct {
  59. *flag.FlagSet
  60. // member
  61. corsInfo *cors.CORSInfo
  62. dir string
  63. lpurls, lcurls []url.URL
  64. maxSnapFiles uint
  65. maxWalFiles uint
  66. name string
  67. snapCount uint64
  68. // TODO: decouple tickMs and heartbeat tick (current heartbeat tick = 1).
  69. // make ticks a cluster wide configuration.
  70. TickMs uint
  71. ElectionMs uint
  72. // clustering
  73. apurls, acurls []url.URL
  74. clusterState *flags.StringsFlag
  75. dnsCluster string
  76. dproxy string
  77. durl string
  78. fallback *flags.StringsFlag
  79. initialCluster string
  80. initialClusterToken string
  81. // proxy
  82. proxy *flags.StringsFlag
  83. // security
  84. clientTLSInfo, peerTLSInfo transport.TLSInfo
  85. // unsafe
  86. forceNewCluster bool
  87. printVersion bool
  88. ignored []string
  89. }
  90. func NewConfig() *config {
  91. cfg := &config{
  92. corsInfo: &cors.CORSInfo{},
  93. clusterState: flags.NewStringsFlag(
  94. clusterStateFlagNew,
  95. clusterStateFlagExisting,
  96. ),
  97. fallback: flags.NewStringsFlag(
  98. fallbackFlagExit,
  99. fallbackFlagProxy,
  100. ),
  101. ignored: ignored,
  102. proxy: flags.NewStringsFlag(
  103. proxyFlagOff,
  104. proxyFlagReadonly,
  105. proxyFlagOn,
  106. ),
  107. }
  108. cfg.FlagSet = flag.NewFlagSet("etcd", flag.ContinueOnError)
  109. fs := cfg.FlagSet
  110. fs.Usage = func() {
  111. fmt.Println(usageline)
  112. fmt.Println(flagsline)
  113. }
  114. // member
  115. fs.Var(cfg.corsInfo, "cors", "Comma-separated white list of origins for CORS (cross-origin resource sharing).")
  116. fs.StringVar(&cfg.dir, "data-dir", "", "Path to the data directory")
  117. fs.Var(flags.NewURLsValue("http://localhost:2380,http://localhost:7001"), "listen-peer-urls", "List of URLs to listen on for peer traffic")
  118. fs.Var(flags.NewURLsValue("http://localhost:2379,http://localhost:4001"), "listen-client-urls", "List of URLs to listen on for client traffic")
  119. fs.UintVar(&cfg.maxSnapFiles, "max-snapshots", defaultMaxSnapshots, "Maximum number of snapshot files to retain (0 is unlimited)")
  120. fs.UintVar(&cfg.maxWalFiles, "max-wals", defaultMaxWALs, "Maximum number of wal files to retain (0 is unlimited)")
  121. fs.StringVar(&cfg.name, "name", "default", "Unique human-readable name for this node")
  122. fs.Uint64Var(&cfg.snapCount, "snapshot-count", etcdserver.DefaultSnapCount, "Number of committed transactions to trigger a snapshot")
  123. fs.UintVar(&cfg.TickMs, "heartbeat-interval", 100, "Time (in milliseconds) of a heartbeat interval.")
  124. fs.UintVar(&cfg.ElectionMs, "election-timeout", 1000, "Time (in milliseconds) for an election to timeout.")
  125. // clustering
  126. fs.Var(flags.NewURLsValue("http://localhost:2380,http://localhost:7001"), "initial-advertise-peer-urls", "List of this member's peer URLs to advertise to the rest of the cluster")
  127. fs.Var(flags.NewURLsValue("http://localhost:2379,http://localhost:4001"), "advertise-client-urls", "List of this member's client URLs to advertise to the rest of the cluster")
  128. fs.StringVar(&cfg.durl, "discovery", "", "Discovery service used to bootstrap the initial cluster")
  129. fs.Var(cfg.fallback, "discovery-fallback", fmt.Sprintf("Valid values include %s", strings.Join(cfg.fallback.Values, ", ")))
  130. if err := cfg.fallback.Set(fallbackFlagProxy); err != nil {
  131. // Should never happen.
  132. log.Panicf("unexpected error setting up discovery-fallback flag: %v", err)
  133. }
  134. fs.StringVar(&cfg.dproxy, "discovery-proxy", "", "HTTP proxy to use for traffic to discovery service")
  135. fs.StringVar(&cfg.dnsCluster, "discovery-srv", "", "DNS domain used to bootstrap initial cluster")
  136. fs.StringVar(&cfg.initialCluster, "initial-cluster", "default=http://localhost:2380,default=http://localhost:7001", "Initial cluster configuration for bootstrapping")
  137. fs.StringVar(&cfg.initialClusterToken, "initial-cluster-token", "etcd-cluster", "Initial cluster token for the etcd cluster during bootstrap")
  138. fs.Var(cfg.clusterState, "initial-cluster-state", "Initial cluster configuration for bootstrapping")
  139. if err := cfg.clusterState.Set(clusterStateFlagNew); err != nil {
  140. // Should never happen.
  141. log.Panicf("unexpected error setting up clusterStateFlag: %v", err)
  142. }
  143. // proxy
  144. fs.Var(cfg.proxy, "proxy", fmt.Sprintf("Valid values include %s", strings.Join(cfg.proxy.Values, ", ")))
  145. if err := cfg.proxy.Set(proxyFlagOff); err != nil {
  146. // Should never happen.
  147. log.Panicf("unexpected error setting up proxyFlag: %v", err)
  148. }
  149. // security
  150. fs.StringVar(&cfg.clientTLSInfo.CAFile, "ca-file", "", "Path to the client server TLS CA file.")
  151. fs.StringVar(&cfg.clientTLSInfo.CertFile, "cert-file", "", "Path to the client server TLS cert file.")
  152. fs.StringVar(&cfg.clientTLSInfo.KeyFile, "key-file", "", "Path to the client server TLS key file.")
  153. fs.StringVar(&cfg.peerTLSInfo.CAFile, "peer-ca-file", "", "Path to the peer server TLS CA file.")
  154. fs.StringVar(&cfg.peerTLSInfo.CertFile, "peer-cert-file", "", "Path to the peer server TLS cert file.")
  155. fs.StringVar(&cfg.peerTLSInfo.KeyFile, "peer-key-file", "", "Path to the peer server TLS key file.")
  156. // unsafe
  157. fs.BoolVar(&cfg.forceNewCluster, "force-new-cluster", false, "Force to create a new one member cluster")
  158. // version
  159. fs.BoolVar(&cfg.printVersion, "version", false, "Print the version and exit")
  160. // backwards-compatibility with v0.4.6
  161. fs.Var(&flags.IPAddressPort{}, "addr", "DEPRECATED: Use -advertise-client-urls instead.")
  162. fs.Var(&flags.IPAddressPort{}, "bind-addr", "DEPRECATED: Use -listen-client-urls instead.")
  163. fs.Var(&flags.IPAddressPort{}, "peer-addr", "DEPRECATED: Use -initial-advertise-peer-urls instead.")
  164. fs.Var(&flags.IPAddressPort{}, "peer-bind-addr", "DEPRECATED: Use -listen-peer-urls instead.")
  165. fs.Var(&flags.DeprecatedFlag{Name: "peers"}, "peers", "DEPRECATED: Use -initial-cluster instead")
  166. fs.Var(&flags.DeprecatedFlag{Name: "peers-file"}, "peers-file", "DEPRECATED: Use -initial-cluster instead")
  167. // ignored
  168. for _, f := range cfg.ignored {
  169. fs.Var(&flags.IgnoredFlag{Name: f}, f, "")
  170. }
  171. return cfg
  172. }
  173. func (cfg *config) Parse(arguments []string) error {
  174. perr := cfg.FlagSet.Parse(arguments)
  175. switch perr {
  176. case nil:
  177. case flag.ErrHelp:
  178. os.Exit(0)
  179. default:
  180. os.Exit(2)
  181. }
  182. if cfg.printVersion {
  183. fmt.Println("etcd version", version.Version)
  184. os.Exit(0)
  185. }
  186. err := flags.SetFlagsFromEnv(cfg.FlagSet)
  187. if err != nil {
  188. log.Fatalf("etcd: %v", err)
  189. }
  190. set := make(map[string]bool)
  191. cfg.FlagSet.Visit(func(f *flag.Flag) {
  192. set[f.Name] = true
  193. })
  194. nSet := 0
  195. for _, v := range []bool{set["discovery"], set["initial-cluster"], set["discovery-srv"]} {
  196. if v {
  197. nSet += 1
  198. }
  199. }
  200. if nSet > 1 {
  201. return ErrConflictBootstrapFlags
  202. }
  203. flags.SetBindAddrFromAddr(cfg.FlagSet, "peer-bind-addr", "peer-addr")
  204. flags.SetBindAddrFromAddr(cfg.FlagSet, "bind-addr", "addr")
  205. cfg.lpurls, err = flags.URLsFromFlags(cfg.FlagSet, "listen-peer-urls", "peer-bind-addr", cfg.peerTLSInfo)
  206. if err != nil {
  207. return err
  208. }
  209. cfg.apurls, err = flags.URLsFromFlags(cfg.FlagSet, "initial-advertise-peer-urls", "peer-addr", cfg.peerTLSInfo)
  210. if err != nil {
  211. return err
  212. }
  213. cfg.lcurls, err = flags.URLsFromFlags(cfg.FlagSet, "listen-client-urls", "bind-addr", cfg.clientTLSInfo)
  214. if err != nil {
  215. return err
  216. }
  217. cfg.acurls, err = flags.URLsFromFlags(cfg.FlagSet, "advertise-client-urls", "addr", cfg.clientTLSInfo)
  218. if err != nil {
  219. return err
  220. }
  221. if err := cfg.resolveUrls(); err != nil {
  222. return errors.New("cannot resolve DNS hostnames.")
  223. }
  224. if 5*cfg.TickMs > cfg.ElectionMs {
  225. return fmt.Errorf("-election-timeout[%vms] should be at least as 5 times as -heartbeat-interval[%vms]", cfg.ElectionMs, cfg.TickMs)
  226. }
  227. return nil
  228. }
  229. func (cfg *config) resolveUrls() error {
  230. return netutil.ResolveTCPAddrs(cfg.lpurls, cfg.apurls, cfg.lcurls, cfg.acurls)
  231. }
  232. func (cfg config) isNewCluster() bool { return cfg.clusterState.String() == clusterStateFlagNew }
  233. func (cfg config) isProxy() bool { return cfg.proxy.String() != proxyFlagOff }
  234. func (cfg config) isReadonlyProxy() bool { return cfg.proxy.String() == proxyFlagReadonly }
  235. func (cfg config) shouldFallbackToProxy() bool { return cfg.fallback.String() == fallbackFlagProxy }
  236. func (cfg config) electionTicks() int { return int(cfg.ElectionMs / cfg.TickMs) }