func getRegistryClient() (client.API, error) { var dial func(string, string) (net.Conn, error) tun := getTunnelFlag() if tun != "" { sshClient, err := ssh.NewSSHClient(globalFlags.SSHUserName, tun, getChecker(), false, getSSHTimeoutFlag()) if err != nil { return nil, fmt.Errorf("failed initializing SSH client: %v", err) } dial = func(network, addr string) (net.Conn, error) { tcpaddr, err := net.ResolveTCPAddr(network, addr) if err != nil { return nil, err } return sshClient.DialTCP(network, nil, tcpaddr) } } tlsConfig, err := pkg.ReadTLSConfigFiles(globalFlags.CAFile, globalFlags.CertFile, globalFlags.KeyFile) if err != nil { return nil, err } trans := &http.Transport{ Dial: dial, TLSClientConfig: tlsConfig, } eCfg := etcd.Config{ Endpoints: strings.Split(globalFlags.Endpoint, ","), Transport: trans, } eClient, err := etcd.New(eCfg) if err != nil { return nil, err } kAPI := etcd.NewKeysAPI(eClient) reg := registry.NewEtcdRegistry(kAPI, globalFlags.EtcdKeyPrefix, getRequestTimeoutFlag()) if msg, ok := checkVersion(reg); !ok { stderr(msg) } return &client.RegistryClient{Registry: reg}, nil }
func NewFleetClient() (client.API, error) { etcdClient, err := etcdInternal.New( etcdInternal.Config{Endpoints: []string{os.Getenv("ETCD_URL")}}, ) if err != nil { return nil, err } kAPI := etcdInternal.NewKeysAPI(etcdClient) reg := registry.NewEtcdRegistry( kAPI, registry.DefaultKeyPrefix, 5*time.Second, ) return &client.RegistryClient{Registry: reg}, nil }
func getETCDClient(driverEndpoint string, etcdKeyPrefix string) (client.API, error) { log.Printf("Using ETCD connection for requests") trans := &http.Transport{} eCfg := etcd.Config{ Endpoints: strings.Split(driverEndpoint, ","), Transport: trans, } eClient, err := etcd.New(eCfg) if err != nil { return nil, err } keysAPI := etcd.NewKeysAPI(eClient) reg := registry.NewEtcdRegistry(keysAPI, etcdKeyPrefix, defaultTimeout) if msg, ok := checkVersion(reg); !ok { log.Printf(msg) } return &client.RegistryClient{Registry: reg}, nil }
func New(cfg config.Config) (*Server, error) { agentTTL, err := time.ParseDuration(cfg.AgentTTL) if err != nil { return nil, err } mgr, err := systemd.NewSystemdUnitManager(systemd.DefaultUnitsDirectory) if err != nil { return nil, err } mach, err := newMachineFromConfig(cfg, mgr) if err != nil { return nil, err } tlsConfig, err := pkg.ReadTLSConfigFiles(cfg.EtcdCAFile, cfg.EtcdCertFile, cfg.EtcdKeyFile) if err != nil { return nil, err } eCfg := etcd.Config{ Transport: &http.Transport{TLSClientConfig: tlsConfig}, Endpoints: cfg.EtcdServers, } eClient, err := etcd.New(eCfg) if err != nil { return nil, err } etcdRequestTimeout := time.Duration(cfg.EtcdRequestTimeout*1000) * time.Millisecond kAPI := etcd.NewKeysAPI(eClient) reg := registry.NewEtcdRegistry(kAPI, cfg.EtcdKeyPrefix, etcdRequestTimeout) pub := agent.NewUnitStatePublisher(reg, mach, agentTTL) gen := unit.NewUnitStateGenerator(mgr) a := agent.New(mgr, gen, reg, mach, agentTTL) var rStream pkg.EventStream if !cfg.DisableWatches { rStream = registry.NewEtcdEventStream(kAPI, cfg.EtcdKeyPrefix) } lManager := lease.NewEtcdLeaseManager(kAPI, cfg.EtcdKeyPrefix, etcdRequestTimeout) ar := agent.NewReconciler(reg, rStream) e := engine.New(reg, lManager, rStream, mach) listeners, err := activation.Listeners(false) if err != nil { return nil, err } hrt := heart.New(reg, mach) mon := heart.NewMonitor(agentTTL) apiServer := api.NewServer(listeners, api.NewServeMux(reg, cfg.TokenLimit)) apiServer.Serve() eIval := time.Duration(cfg.EngineReconcileInterval*1000) * time.Millisecond srv := Server{ agent: a, aReconciler: ar, usGen: gen, usPub: pub, engine: e, mach: mach, hrt: hrt, mon: mon, api: apiServer, stop: nil, engineReconcileInterval: eIval, disableEngine: cfg.DisableEngine, } return &srv, nil }
func New(cfg config.Config) (*Server, error) { agentTTL, err := time.ParseDuration(cfg.AgentTTL) if err != nil { return nil, err } mgr, err := systemd.NewSystemdUnitManager(systemd.DefaultUnitsDirectory) if err != nil { return nil, err } mach, err := newMachineFromConfig(cfg, mgr) if err != nil { return nil, err } tlsConfig, err := pkg.ReadTLSConfigFiles(cfg.EtcdCAFile, cfg.EtcdCertFile, cfg.EtcdKeyFile) if err != nil { return nil, err } etcdRequestTimeout := time.Duration(cfg.EtcdRequestTimeout*1000) * time.Millisecond // set a per server request timeout that is the global request timeout divided by the number of quorum nodes (i.e. 3 out of 5) // this ensures that the the retry logic in etcd can try at least 3 servers before the global timeout fires and cancels the entire request quorumCount := (len(cfg.EtcdServers) / 2) + 1 etcdRequestPerServerTimeout := etcdRequestTimeout if quorumCount > 1 { etcdRequestPerServerTimeout = time.Duration(int64(etcdRequestTimeout) / int64(quorumCount)) } log.Infof("Etcd endpoints: %v", strings.Join(cfg.EtcdServers, ",")) log.Infof("Setting global request timeout of %v and per server request timeout of %v using a quorum count of %v", etcdRequestTimeout, etcdRequestPerServerTimeout, quorumCount) eCfg := etcd.Config{ Transport: &http.Transport{TLSClientConfig: tlsConfig}, Endpoints: cfg.EtcdServers, HeaderTimeoutPerRequest: etcdRequestPerServerTimeout, } eClient, err := etcd.New(eCfg) if err != nil { return nil, err } kAPI := etcd.NewKeysAPI(eClient) reg := registry.NewEtcdRegistry(kAPI, cfg.EtcdKeyPrefix, etcdRequestTimeout) pub := agent.NewUnitStatePublisher(reg, mach, agentTTL) gen := unit.NewUnitStateGenerator(mgr) a := agent.New(mgr, gen, reg, mach, agentTTL) rStream := registry.NewEtcdEventStream(kAPI, cfg.EtcdKeyPrefix) lManager := lease.NewEtcdLeaseManager(kAPI, cfg.EtcdKeyPrefix, etcdRequestTimeout) ar := agent.NewReconciler(reg, rStream) e := engine.New(reg, lManager, rStream, mach) listeners, err := activation.Listeners(false) if err != nil { return nil, err } hrt := heart.New(reg, mach) mon := heart.NewMonitor(agentTTL) apiServer := api.NewServer(listeners, api.NewServeMux(reg)) apiServer.Serve() eIval := time.Duration(cfg.EngineReconcileInterval*1000) * time.Millisecond srv := Server{ agent: a, aReconciler: ar, usGen: gen, usPub: pub, engine: e, mach: mach, hrt: hrt, mon: mon, api: apiServer, stop: nil, engineReconcileInterval: eIval, } return &srv, nil }