func manage(c *cli.Context) { var ( tlsConfig *tls.Config = nil err error ) // If either --tls or --tlsverify are specified, load the certificates. if c.Bool("tls") || c.Bool("tlsverify") { tlsConfig, err = loadTlsConfig( c.String("tlscacert"), c.String("tlscert"), c.String("tlskey"), c.Bool("tlsverify")) if err != nil { log.Fatal(err) } } refresh := func(c *cluster.Cluster, nodes []string) { for _, addr := range nodes { go func(addr string) { if !strings.Contains(addr, "://") { addr = "http://" + addr } if c.Node(addr) == nil { n := cluster.NewNode(addr) if err := n.Connect(tlsConfig); err != nil { log.Error(err) return } if err := c.AddNode(n); err != nil { log.Error(err) return } } }(addr) } } cluster := cluster.NewCluster() cluster.Events(&logHandler{}) go func() { if c.String("token") != "" { nodes, err := discovery.FetchSlaves(c.String("token")) if err != nil { log.Fatal(err) } refresh(cluster, nodes) hb := time.Duration(c.Int("heartbeat")) go func() { for { time.Sleep(hb * time.Second) nodes, err = discovery.FetchSlaves(c.String("token")) if err == nil { refresh(cluster, nodes) } } }() } else { refresh(cluster, c.Args()) } }() s := scheduler.NewScheduler( cluster, &strategy.BinPackingPlacementStrategy{OvercommitRatio: 0.05}, []filter.Filter{ &filter.HealthFilter{}, &filter.LabelFilter{}, &filter.PortFilter{}, }, ) log.Fatal(api.ListenAndServe(cluster, s, c.String("addr"), c.App.Version, c.Bool("cors"), tlsConfig)) }
func manage(c *cli.Context) { var ( tlsConfig *tls.Config = nil err error ) // If either --tls or --tlsverify are specified, load the certificates. if c.Bool("tls") || c.Bool("tlsverify") { if !c.IsSet("tlscert") || !c.IsSet("tlskey") { log.Fatal("--tlscert and --tlskey must be provided when using --tls") } if c.Bool("tlsverify") && !c.IsSet("tlscacert") { log.Fatal("--tlscacert must be provided when using --tlsverify") } tlsConfig, err = loadTlsConfig( c.String("tlscacert"), c.String("tlscert"), c.String("tlskey"), c.Bool("tlsverify")) if err != nil { log.Fatal(err) } } else { // Otherwise, if neither --tls nor --tlsverify are specified, abort if // the other flags are passed as they will be ignored. if c.IsSet("tlscert") || c.IsSet("tlskey") || c.IsSet("tlscacert") { log.Fatal("--tlscert, --tlskey and --tlscacert require the use of either --tls or --tlsverify") } } store := state.NewStore(path.Join(c.String("rootdir"), "state")) if err := store.Initialize(); err != nil { log.Fatal(err) } cluster := cluster.NewCluster(store, tlsConfig, c.Float64("overcommit")) cluster.Events(&logHandler{}) dflag := getDiscovery(c) if dflag == "" { log.Fatalf("discovery required to manage a cluster. See '%s manage --help'.", c.App.Name) } s, err := strategy.New(c.String("strategy")) if err != nil { log.Fatal(err) } // see https://github.com/codegangsta/cli/issues/160 names := c.StringSlice("filter") if c.IsSet("filter") || c.IsSet("f") { names = names[DEFAULT_FILTER_NUMBER:] } fs, err := filter.New(names) if err != nil { log.Fatal(err) } // get the list of nodes from the discovery service go func() { d, err := discovery.New(dflag, c.Int("heartbeat")) if err != nil { log.Fatal(err) } nodes, err := d.Fetch() if err != nil { log.Fatal(err) } cluster.UpdateNodes(nodes) go d.Watch(cluster.UpdateNodes) }() sched := scheduler.NewScheduler( cluster, s, fs, ) // see https://github.com/codegangsta/cli/issues/160 hosts := c.StringSlice("host") if c.IsSet("host") || c.IsSet("H") { hosts = hosts[1:] } log.Fatal(api.ListenAndServe(cluster, sched, hosts, c.Bool("cors"), tlsConfig)) }