etcd.go 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342
  1. // Copyright 2015 CoreOS, Inc.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package etcdmain
  15. import (
  16. "encoding/json"
  17. "fmt"
  18. "io/ioutil"
  19. "log"
  20. "net"
  21. "net/http"
  22. "os"
  23. "path"
  24. "reflect"
  25. "strings"
  26. "time"
  27. "github.com/coreos/etcd/discovery"
  28. "github.com/coreos/etcd/etcdserver"
  29. "github.com/coreos/etcd/etcdserver/etcdhttp"
  30. "github.com/coreos/etcd/pkg/cors"
  31. "github.com/coreos/etcd/pkg/osutil"
  32. "github.com/coreos/etcd/pkg/transport"
  33. "github.com/coreos/etcd/pkg/types"
  34. "github.com/coreos/etcd/proxy"
  35. "github.com/coreos/etcd/rafthttp"
  36. )
  37. const (
  38. // the owner can make/remove files inside the directory
  39. privateDirMode = 0700
  40. )
  41. func Main() {
  42. cfg := NewConfig()
  43. err := cfg.Parse(os.Args[1:])
  44. if err != nil {
  45. log.Printf("etcd: error verifying flags, %v", err)
  46. os.Exit(2)
  47. }
  48. var stopped <-chan struct{}
  49. shouldProxy := cfg.isProxy()
  50. if !shouldProxy {
  51. stopped, err = startEtcd(cfg)
  52. if err == discovery.ErrFullCluster && cfg.shouldFallbackToProxy() {
  53. log.Printf("etcd: discovery cluster full, falling back to %s", fallbackFlagProxy)
  54. shouldProxy = true
  55. }
  56. }
  57. if shouldProxy {
  58. err = startProxy(cfg)
  59. }
  60. if err != nil {
  61. switch err {
  62. case discovery.ErrDuplicateID:
  63. log.Fatalf("etcd: member %s has previously registered with discovery service (%s), but the data-dir (%s) on disk cannot be found.",
  64. cfg.name, cfg.durl, cfg.dir)
  65. default:
  66. log.Fatalf("etcd: %v", err)
  67. }
  68. }
  69. osutil.HandleInterrupts()
  70. <-stopped
  71. osutil.Exit(0)
  72. }
  73. // startEtcd launches the etcd server and HTTP handlers for client/server communication.
  74. func startEtcd(cfg *config) (<-chan struct{}, error) {
  75. cls, err := setupCluster(cfg)
  76. if err != nil {
  77. return nil, fmt.Errorf("error setting up initial cluster: %v", err)
  78. }
  79. if cfg.dir == "" {
  80. cfg.dir = fmt.Sprintf("%v.etcd", cfg.name)
  81. log.Printf("no data-dir provided, using default data-dir ./%s", cfg.dir)
  82. }
  83. pt, err := transport.NewTimeoutTransport(cfg.peerTLSInfo, rafthttp.DialTimeout, rafthttp.ConnReadTimeout, rafthttp.ConnWriteTimeout)
  84. if err != nil {
  85. return nil, err
  86. }
  87. if !cfg.peerTLSInfo.Empty() {
  88. log.Printf("etcd: peerTLS: %s", cfg.peerTLSInfo)
  89. }
  90. plns := make([]net.Listener, 0)
  91. for _, u := range cfg.lpurls {
  92. var l net.Listener
  93. l, err = transport.NewTimeoutListener(u.Host, u.Scheme, cfg.peerTLSInfo, rafthttp.ConnReadTimeout, rafthttp.ConnWriteTimeout)
  94. if err != nil {
  95. return nil, err
  96. }
  97. urlStr := u.String()
  98. log.Print("etcd: listening for peers on ", urlStr)
  99. defer func() {
  100. if err != nil {
  101. l.Close()
  102. log.Print("etcd: stopping listening for peers on ", urlStr)
  103. }
  104. }()
  105. plns = append(plns, l)
  106. }
  107. if !cfg.clientTLSInfo.Empty() {
  108. log.Printf("etcd: clientTLS: %s", cfg.clientTLSInfo)
  109. }
  110. clns := make([]net.Listener, 0)
  111. for _, u := range cfg.lcurls {
  112. var l net.Listener
  113. l, err = transport.NewKeepAliveListener(u.Host, u.Scheme, cfg.clientTLSInfo)
  114. if err != nil {
  115. return nil, err
  116. }
  117. urlStr := u.String()
  118. log.Print("etcd: listening for client requests on ", urlStr)
  119. defer func() {
  120. if err != nil {
  121. l.Close()
  122. log.Print("etcd: stopping listening for client requests on ", urlStr)
  123. }
  124. }()
  125. clns = append(clns, l)
  126. }
  127. srvcfg := &etcdserver.ServerConfig{
  128. Name: cfg.name,
  129. ClientURLs: cfg.acurls,
  130. PeerURLs: cfg.apurls,
  131. DataDir: cfg.dir,
  132. SnapCount: cfg.snapCount,
  133. MaxSnapFiles: cfg.maxSnapFiles,
  134. MaxWALFiles: cfg.maxWalFiles,
  135. Cluster: cls,
  136. DiscoveryURL: cfg.durl,
  137. DiscoveryProxy: cfg.dproxy,
  138. NewCluster: cfg.isNewCluster(),
  139. ForceNewCluster: cfg.forceNewCluster,
  140. Transport: pt,
  141. TickMs: cfg.TickMs,
  142. ElectionTicks: cfg.electionTicks(),
  143. }
  144. var s *etcdserver.EtcdServer
  145. s, err = etcdserver.NewServer(srvcfg)
  146. if err != nil {
  147. return nil, err
  148. }
  149. s.Start()
  150. osutil.RegisterInterruptHandler(s.Stop)
  151. if cfg.corsInfo.String() != "" {
  152. log.Printf("etcd: cors = %s", cfg.corsInfo)
  153. }
  154. ch := &cors.CORSHandler{
  155. Handler: etcdhttp.NewClientHandler(s),
  156. Info: cfg.corsInfo,
  157. }
  158. ph := etcdhttp.NewPeerHandler(s.Cluster, etcdserver.RaftTimer(s), s.RaftHandler())
  159. // Start the peer server in a goroutine
  160. for _, l := range plns {
  161. go func(l net.Listener) {
  162. log.Fatal(serveHTTP(l, ph, 5*time.Minute))
  163. }(l)
  164. }
  165. // Start a client server goroutine for each listen address
  166. for _, l := range clns {
  167. go func(l net.Listener) {
  168. // read timeout does not work with http close notify
  169. // TODO: https://github.com/golang/go/issues/9524
  170. log.Fatal(serveHTTP(l, ch, 0))
  171. }(l)
  172. }
  173. return s.StopNotify(), nil
  174. }
  175. // startProxy launches an HTTP proxy for client communication which proxies to other etcd nodes.
  176. func startProxy(cfg *config) error {
  177. cls, err := setupCluster(cfg)
  178. if err != nil {
  179. return fmt.Errorf("error setting up initial cluster: %v", err)
  180. }
  181. if cfg.durl != "" {
  182. s, err := discovery.GetCluster(cfg.durl, cfg.dproxy)
  183. if err != nil {
  184. return err
  185. }
  186. if cls, err = etcdserver.NewClusterFromString(cfg.durl, s); err != nil {
  187. return err
  188. }
  189. }
  190. pt, err := transport.NewTransport(cfg.clientTLSInfo)
  191. if err != nil {
  192. return err
  193. }
  194. tr, err := transport.NewTransport(cfg.peerTLSInfo)
  195. if err != nil {
  196. return err
  197. }
  198. if cfg.dir == "" {
  199. cfg.dir = fmt.Sprintf("%v.etcd", cfg.name)
  200. log.Printf("no proxy data-dir provided, using default proxy data-dir ./%s", cfg.dir)
  201. }
  202. cfg.dir = path.Join(cfg.dir, "proxy")
  203. err = os.MkdirAll(cfg.dir, 0700)
  204. if err != nil {
  205. return err
  206. }
  207. var peerURLs []string
  208. clusterfile := path.Join(cfg.dir, "cluster")
  209. b, err := ioutil.ReadFile(clusterfile)
  210. switch {
  211. case err == nil:
  212. urls := struct{ PeerURLs []string }{}
  213. err := json.Unmarshal(b, &urls)
  214. if err != nil {
  215. return err
  216. }
  217. peerURLs = urls.PeerURLs
  218. log.Printf("proxy: using peer urls %v from cluster file ./%s", peerURLs, clusterfile)
  219. case os.IsNotExist(err):
  220. peerURLs = cls.PeerURLs()
  221. log.Printf("proxy: using peer urls %v ", peerURLs)
  222. default:
  223. return err
  224. }
  225. uf := func() []string {
  226. gcls, err := etcdserver.GetClusterFromRemotePeers(peerURLs, tr)
  227. // TODO: remove the 2nd check when we fix GetClusterFromPeers
  228. // GetClusterFromPeers should not return nil error with an invaild empty cluster
  229. if err != nil {
  230. log.Printf("proxy: %v", err)
  231. return []string{}
  232. }
  233. if len(gcls.Members()) == 0 {
  234. return cls.ClientURLs()
  235. }
  236. cls = gcls
  237. urls := struct{ PeerURLs []string }{cls.PeerURLs()}
  238. b, err := json.Marshal(urls)
  239. if err != nil {
  240. log.Printf("proxy: error on marshal peer urls %s", err)
  241. return cls.ClientURLs()
  242. }
  243. err = ioutil.WriteFile(clusterfile+".bak", b, 0600)
  244. if err != nil {
  245. log.Printf("proxy: error on writing urls %s", err)
  246. return cls.ClientURLs()
  247. }
  248. err = os.Rename(clusterfile+".bak", clusterfile)
  249. if err != nil {
  250. log.Printf("proxy: error on updating clusterfile %s", err)
  251. return cls.ClientURLs()
  252. }
  253. if !reflect.DeepEqual(cls.PeerURLs(), peerURLs) {
  254. log.Printf("proxy: updated peer urls in cluster file from %v to %v", peerURLs, cls.PeerURLs())
  255. }
  256. peerURLs = cls.PeerURLs()
  257. return cls.ClientURLs()
  258. }
  259. ph := proxy.NewHandler(pt, uf)
  260. ph = &cors.CORSHandler{
  261. Handler: ph,
  262. Info: cfg.corsInfo,
  263. }
  264. if cfg.isReadonlyProxy() {
  265. ph = proxy.NewReadonlyHandler(ph)
  266. }
  267. // Start a proxy server goroutine for each listen address
  268. for _, u := range cfg.lcurls {
  269. l, err := transport.NewListener(u.Host, u.Scheme, cfg.clientTLSInfo)
  270. if err != nil {
  271. return err
  272. }
  273. host := u.Host
  274. go func() {
  275. log.Print("proxy: listening for client requests on ", host)
  276. log.Fatal(http.Serve(l, ph))
  277. }()
  278. }
  279. return nil
  280. }
  281. // setupCluster sets up an initial cluster definition for bootstrap or discovery.
  282. func setupCluster(cfg *config) (*etcdserver.Cluster, error) {
  283. var cls *etcdserver.Cluster
  284. var err error
  285. switch {
  286. case cfg.durl != "":
  287. // If using discovery, generate a temporary cluster based on
  288. // self's advertised peer URLs
  289. clusterStr := genClusterString(cfg.name, cfg.apurls)
  290. cls, err = etcdserver.NewClusterFromString(cfg.durl, clusterStr)
  291. case cfg.dnsCluster != "":
  292. clusterStr, clusterToken, err := discovery.SRVGetCluster(cfg.name, cfg.dnsCluster, cfg.initialClusterToken, cfg.apurls)
  293. if err != nil {
  294. return nil, err
  295. }
  296. cls, err = etcdserver.NewClusterFromString(clusterToken, clusterStr)
  297. default:
  298. // We're statically configured, and cluster has appropriately been set.
  299. cls, err = etcdserver.NewClusterFromString(cfg.initialClusterToken, cfg.initialCluster)
  300. }
  301. return cls, err
  302. }
  303. func genClusterString(name string, urls types.URLs) string {
  304. addrs := make([]string, 0)
  305. for _, u := range urls {
  306. addrs = append(addrs, fmt.Sprintf("%v=%v", name, u.String()))
  307. }
  308. return strings.Join(addrs, ",")
  309. }