mirror of
https://github.com/etcd-io/etcd.git
synced 2024-09-27 06:25:44 +00:00

We use nodeID as the default dir previously. It works fine before we do dynamic nodeID generation (introducing time). After the change the dynamic nodeID will change every time we restart the etcd process. If the user does not provide the data dir, the default dir will change every time. It is not the desired behavior. In this commit, we change the default data dir to node name. If the user changes the node name and does provide the data dir, etcd still cannot recover from previous state. But it is much better than using nodeID. And it is actually a doucmentation issue. Conflicts: main.go
276 lines
8.1 KiB
Go
276 lines
8.1 KiB
Go
package main
|
|
|
|
import (
|
|
"flag"
|
|
"fmt"
|
|
"log"
|
|
"net/http"
|
|
"os"
|
|
"strings"
|
|
|
|
"github.com/coreos/etcd/etcdserver"
|
|
"github.com/coreos/etcd/etcdserver/etcdhttp"
|
|
"github.com/coreos/etcd/pkg"
|
|
flagtypes "github.com/coreos/etcd/pkg/flags"
|
|
"github.com/coreos/etcd/pkg/transport"
|
|
"github.com/coreos/etcd/proxy"
|
|
"github.com/coreos/etcd/raft"
|
|
)
|
|
|
|
const (
|
|
// the owner can make/remove files inside the directory
|
|
privateDirMode = 0700
|
|
|
|
version = "0.5.0-alpha"
|
|
)
|
|
|
|
var (
|
|
name = flag.String("name", "default", "Unique human-readable name for this node")
|
|
dir = flag.String("data-dir", "", "Path to the data directory")
|
|
durl = flag.String("discovery", "", "Discovery service used to bootstrap the cluster")
|
|
snapCount = flag.Uint64("snapshot-count", etcdserver.DefaultSnapCount, "Number of committed transactions to trigger a snapshot")
|
|
printVersion = flag.Bool("version", false, "Print the version and exit")
|
|
|
|
cluster = &etcdserver.Cluster{}
|
|
clusterState = new(etcdserver.ClusterState)
|
|
|
|
cors = &pkg.CORSInfo{}
|
|
proxyFlag = new(flagtypes.Proxy)
|
|
|
|
clientTLSInfo = transport.TLSInfo{}
|
|
peerTLSInfo = transport.TLSInfo{}
|
|
|
|
ignored = []string{
|
|
"cluster-active-size",
|
|
"cluster-remove-delay",
|
|
"cluster-sync-interval",
|
|
"config",
|
|
"force",
|
|
"max-result-buffer",
|
|
"max-retry-attempts",
|
|
"peer-heartbeat-interval",
|
|
"peer-election-timeout",
|
|
"retry-interval",
|
|
"snapshot",
|
|
"v",
|
|
"vv",
|
|
}
|
|
)
|
|
|
|
func init() {
|
|
flag.Var(cluster, "initial-cluster", "Initial cluster configuration for bootstrapping")
|
|
if err := cluster.Set("default=http://localhost:2380,default=http://localhost:7001"); err != nil {
|
|
// Should never happen
|
|
log.Panic(err)
|
|
}
|
|
flag.Var(clusterState, "initial-cluster-state", "Initial cluster configuration for bootstrapping")
|
|
clusterState.Set(etcdserver.ClusterStateValueNew)
|
|
|
|
flag.Var(flagtypes.NewURLsValue("http://localhost:2380,http://localhost:7001"), "advertise-peer-urls", "List of this member's peer URLs to advertise to the rest of the cluster")
|
|
flag.Var(flagtypes.NewURLsValue("http://localhost:2379,http://localhost:4001"), "advertise-client-urls", "List of this member's client URLs to advertise to the rest of the cluster")
|
|
flag.Var(flagtypes.NewURLsValue("http://localhost:2380,http://localhost:7001"), "listen-peer-urls", "List of URLs to listen on for peer traffic")
|
|
flag.Var(flagtypes.NewURLsValue("http://localhost:2379,http://localhost:4001"), "listen-client-urls", "List of URLs to listen on for client traffic")
|
|
|
|
flag.Var(cors, "cors", "Comma-separated white list of origins for CORS (cross-origin resource sharing).")
|
|
|
|
flag.Var(proxyFlag, "proxy", fmt.Sprintf("Valid values include %s", strings.Join(flagtypes.ProxyValues, ", ")))
|
|
proxyFlag.Set(flagtypes.ProxyValueOff)
|
|
|
|
flag.StringVar(&clientTLSInfo.CAFile, "ca-file", "", "Path to the client server TLS CA file.")
|
|
flag.StringVar(&clientTLSInfo.CertFile, "cert-file", "", "Path to the client server TLS cert file.")
|
|
flag.StringVar(&clientTLSInfo.KeyFile, "key-file", "", "Path to the client server TLS key file.")
|
|
|
|
flag.StringVar(&peerTLSInfo.CAFile, "peer-ca-file", "", "Path to the peer server TLS CA file.")
|
|
flag.StringVar(&peerTLSInfo.CertFile, "peer-cert-file", "", "Path to the peer server TLS cert file.")
|
|
flag.StringVar(&peerTLSInfo.KeyFile, "peer-key-file", "", "Path to the peer server TLS key file.")
|
|
|
|
// backwards-compatibility with v0.4.6
|
|
flag.Var(&flagtypes.IPAddressPort{}, "addr", "DEPRECATED: Use -advertise-client-urls instead.")
|
|
flag.Var(&flagtypes.IPAddressPort{}, "bind-addr", "DEPRECATED: Use -listen-client-urls instead.")
|
|
flag.Var(&flagtypes.IPAddressPort{}, "peer-addr", "DEPRECATED: Use -advertise-peer-urls instead.")
|
|
flag.Var(&flagtypes.IPAddressPort{}, "peer-bind-addr", "DEPRECATED: Use -listen-peer-urls instead.")
|
|
|
|
for _, f := range ignored {
|
|
flag.Var(&pkg.IgnoredFlag{f}, f, "")
|
|
}
|
|
|
|
flag.Var(&pkg.DeprecatedFlag{"peers"}, "peers", "DEPRECATED: Use -initial-cluster instead")
|
|
flag.Var(&pkg.DeprecatedFlag{"peers-file"}, "peers-file", "DEPRECATED: Use -initial-cluster instead")
|
|
}
|
|
|
|
func main() {
|
|
flag.Usage = pkg.UsageWithIgnoredFlagsFunc(flag.CommandLine, ignored)
|
|
flag.Parse()
|
|
|
|
if *printVersion {
|
|
fmt.Println("etcd version", version)
|
|
os.Exit(0)
|
|
}
|
|
|
|
pkg.SetFlagsFromEnv(flag.CommandLine)
|
|
if err := setClusterForDiscovery(); err != nil {
|
|
log.Fatalf("etcd: %v", err)
|
|
}
|
|
|
|
if string(*proxyFlag) == flagtypes.ProxyValueOff {
|
|
startEtcd()
|
|
} else {
|
|
startProxy()
|
|
}
|
|
|
|
// Block indefinitely
|
|
<-make(chan struct{})
|
|
}
|
|
|
|
// startEtcd launches the etcd server and HTTP handlers for client/server communication.
|
|
func startEtcd() {
|
|
self := cluster.FindName(*name)
|
|
if self == nil {
|
|
log.Fatalf("etcd: no member with name=%q exists", *name)
|
|
}
|
|
|
|
if self.ID == raft.None {
|
|
log.Fatalf("etcd: cannot use None(%d) as member id", raft.None)
|
|
}
|
|
|
|
if *dir == "" {
|
|
*dir = fmt.Sprintf("%v_etcd_data", self.Name)
|
|
log.Printf("etcd: no data-dir provided, using default data-dir ./%s", *dir)
|
|
}
|
|
if err := os.MkdirAll(*dir, privateDirMode); err != nil {
|
|
log.Fatalf("etcd: cannot create data directory: %v", err)
|
|
}
|
|
|
|
pt, err := transport.NewTransport(peerTLSInfo)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
|
|
acurls, err := pkg.URLsFromFlags(flag.CommandLine, "advertise-client-urls", "addr", clientTLSInfo)
|
|
if err != nil {
|
|
log.Fatal(err.Error())
|
|
}
|
|
cfg := &etcdserver.ServerConfig{
|
|
Name: *name,
|
|
ClientURLs: acurls,
|
|
DataDir: *dir,
|
|
SnapCount: *snapCount,
|
|
Cluster: cluster,
|
|
DiscoveryURL: *durl,
|
|
ClusterState: *clusterState,
|
|
Transport: pt,
|
|
}
|
|
s := etcdserver.NewServer(cfg)
|
|
s.Start()
|
|
|
|
ch := &pkg.CORSHandler{
|
|
Handler: etcdhttp.NewClientHandler(s),
|
|
Info: cors,
|
|
}
|
|
ph := etcdhttp.NewPeerHandler(s)
|
|
|
|
lpurls, err := pkg.URLsFromFlags(flag.CommandLine, "listen-peer-urls", "peer-bind-addr", peerTLSInfo)
|
|
if err != nil {
|
|
log.Fatal(err.Error())
|
|
}
|
|
|
|
for _, u := range lpurls {
|
|
l, err := transport.NewListener(u.Host, peerTLSInfo)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
|
|
// Start the peer server in a goroutine
|
|
urlStr := u.String()
|
|
go func() {
|
|
log.Print("Listening for peers on ", urlStr)
|
|
log.Fatal(http.Serve(l, ph))
|
|
}()
|
|
}
|
|
|
|
lcurls, err := pkg.URLsFromFlags(flag.CommandLine, "listen-client-urls", "bind-addr", clientTLSInfo)
|
|
if err != nil {
|
|
log.Fatal(err.Error())
|
|
}
|
|
|
|
// Start a client server goroutine for each listen address
|
|
for _, u := range lcurls {
|
|
l, err := transport.NewListener(u.Host, clientTLSInfo)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
|
|
urlStr := u.String()
|
|
go func() {
|
|
log.Print("Listening for client requests on ", urlStr)
|
|
log.Fatal(http.Serve(l, ch))
|
|
}()
|
|
}
|
|
}
|
|
|
|
// startProxy launches an HTTP proxy for client communication which proxies to other etcd nodes.
|
|
func startProxy() {
|
|
pt, err := transport.NewTransport(clientTLSInfo)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
|
|
ph, err := proxy.NewHandler(pt, (*cluster).PeerURLs())
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
|
|
ph = &pkg.CORSHandler{
|
|
Handler: ph,
|
|
Info: cors,
|
|
}
|
|
|
|
if string(*proxyFlag) == flagtypes.ProxyValueReadonly {
|
|
ph = proxy.NewReadonlyHandler(ph)
|
|
}
|
|
|
|
lcurls, err := pkg.URLsFromFlags(flag.CommandLine, "listen-client-urls", "bind-addr", clientTLSInfo)
|
|
if err != nil {
|
|
log.Fatal(err.Error())
|
|
}
|
|
// Start a proxy server goroutine for each listen address
|
|
for _, u := range lcurls {
|
|
l, err := transport.NewListener(u.Host, clientTLSInfo)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
|
|
host := u.Host
|
|
go func() {
|
|
log.Print("Listening for client requests on ", host)
|
|
log.Fatal(http.Serve(l, ph))
|
|
}()
|
|
}
|
|
}
|
|
|
|
// setClusterForDiscovery sets cluster to a temporary value if you are using
|
|
// the discovery.
|
|
func setClusterForDiscovery() error {
|
|
set := make(map[string]bool)
|
|
flag.Visit(func(f *flag.Flag) {
|
|
set[f.Name] = true
|
|
})
|
|
if set["discovery"] && set["initial-cluster"] {
|
|
return fmt.Errorf("both discovery and initial-cluster are set")
|
|
}
|
|
if set["discovery"] {
|
|
apurls, err := pkg.URLsFromFlags(flag.CommandLine, "advertise-peer-urls", "addr", peerTLSInfo)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
addrs := make([]string, len(apurls))
|
|
for i := range apurls {
|
|
addrs[i] = fmt.Sprintf("%s=%s", *name, apurls[i].String())
|
|
}
|
|
if err := cluster.Set(strings.Join(addrs, ",")); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|