123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296 |
- // Copyright 2015 CoreOS, Inc.
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package main
- import (
- "flag"
- "fmt"
- "net"
- "os"
- "os/signal"
- "path/filepath"
- "strings"
- "sync"
- "syscall"
- "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/go-systemd/daemon"
- log "github.com/coreos/flannel/Godeps/_workspace/src/github.com/golang/glog"
- "github.com/coreos/flannel/Godeps/_workspace/src/golang.org/x/net/context"
- "github.com/coreos/flannel/backend"
- "github.com/coreos/flannel/network"
- "github.com/coreos/flannel/pkg/ip"
- "github.com/coreos/flannel/remote"
- "github.com/coreos/flannel/subnet"
- )
- type CmdLineOpts struct {
- etcdEndpoints string
- etcdPrefix string
- etcdKeyfile string
- etcdCertfile string
- etcdCAFile string
- help bool
- version bool
- ipMasq bool
- subnetFile string
- subnetDir string
- iface string
- listen string
- remote string
- networks string
- }
- var opts CmdLineOpts
- func init() {
- flag.StringVar(&opts.etcdEndpoints, "etcd-endpoints", "http://127.0.0.1:4001,http://127.0.0.1:2379", "a comma-delimited list of etcd endpoints")
- flag.StringVar(&opts.etcdPrefix, "etcd-prefix", "/coreos.com/network", "etcd prefix")
- flag.StringVar(&opts.etcdKeyfile, "etcd-keyfile", "", "SSL key file used to secure etcd communication")
- flag.StringVar(&opts.etcdCertfile, "etcd-certfile", "", "SSL certification file used to secure etcd communication")
- flag.StringVar(&opts.etcdCAFile, "etcd-cafile", "", "SSL Certificate Authority file used to secure etcd communication")
- flag.StringVar(&opts.subnetFile, "subnet-file", "/run/flannel/subnet.env", "filename where env variables (subnet, MTU, ... ) will be written to")
- flag.StringVar(&opts.subnetDir, "subnet-dir", "/run/flannel/networks", "directory where files with env variables (subnet, MTU, ...) will be written to")
- flag.StringVar(&opts.iface, "iface", "", "interface to use (IP or name) for inter-host communication")
- flag.StringVar(&opts.listen, "listen", "", "run as server and listen on specified address (e.g. ':8080')")
- flag.StringVar(&opts.remote, "remote", "", "run as client and connect to server on specified address (e.g. '10.1.2.3:8080')")
- flag.StringVar(&opts.networks, "networks", "", "run in multi-network mode and service the specified networks")
- flag.BoolVar(&opts.ipMasq, "ip-masq", false, "setup IP masquerade rule for traffic destined outside of overlay network")
- flag.BoolVar(&opts.help, "help", false, "print this message")
- flag.BoolVar(&opts.version, "version", false, "print version and exit")
- }
- // TODO: This is yet another copy (others found in etcd, fleet) -- Pull it out!
- // flagsFromEnv parses all registered flags in the given flagset,
- // and if they are not already set it attempts to set their values from
- // environment variables. Environment variables take the name of the flag but
- // are UPPERCASE, have the given prefix, and any dashes are replaced by
- // underscores - for example: some-flag => PREFIX_SOME_FLAG
- func flagsFromEnv(prefix string, fs *flag.FlagSet) {
- alreadySet := make(map[string]bool)
- fs.Visit(func(f *flag.Flag) {
- alreadySet[f.Name] = true
- })
- fs.VisitAll(func(f *flag.Flag) {
- if !alreadySet[f.Name] {
- key := strings.ToUpper(prefix + "_" + strings.Replace(f.Name, "-", "_", -1))
- val := os.Getenv(key)
- if val != "" {
- fs.Set(f.Name, val)
- }
- }
- })
- }
- func writeSubnetFile(path string, sn *backend.SubnetDef) error {
- dir, name := filepath.Split(path)
- os.MkdirAll(dir, 0755)
- tempFile := filepath.Join(dir, "."+name)
- f, err := os.Create(tempFile)
- if err != nil {
- return err
- }
- // Write out the first usable IP by incrementing
- // sn.IP by one
- sn.Net.IP += 1
- fmt.Fprintf(f, "FLANNEL_SUBNET=%s\n", sn.Net)
- fmt.Fprintf(f, "FLANNEL_MTU=%d\n", sn.MTU)
- _, err = fmt.Fprintf(f, "FLANNEL_IPMASQ=%v\n", opts.ipMasq)
- f.Close()
- if err != nil {
- return err
- }
- // rename(2) the temporary file to the desired location so that it becomes
- // atomically visible with the contents
- return os.Rename(tempFile, path)
- }
- func lookupIface() (*net.Interface, net.IP, error) {
- var iface *net.Interface
- var ipaddr net.IP
- var err error
- if len(opts.iface) > 0 {
- if ipaddr = net.ParseIP(opts.iface); ipaddr != nil {
- iface, err = ip.GetInterfaceByIP(ipaddr)
- if err != nil {
- return nil, nil, fmt.Errorf("Error looking up interface %s: %s", opts.iface, err)
- }
- } else {
- iface, err = net.InterfaceByName(opts.iface)
- if err != nil {
- return nil, nil, fmt.Errorf("Error looking up interface %s: %s", opts.iface, err)
- }
- }
- } else {
- log.Info("Determining IP address of default interface")
- if iface, err = ip.GetDefaultGatewayIface(); err != nil {
- return nil, nil, fmt.Errorf("Failed to get default interface: %s", err)
- }
- }
- if ipaddr == nil {
- ipaddr, err = ip.GetIfaceIP4Addr(iface)
- if err != nil {
- return nil, nil, fmt.Errorf("Failed to find IPv4 address for interface %s", iface.Name)
- }
- }
- return iface, ipaddr, nil
- }
- func isMultiNetwork() bool {
- return len(opts.networks) > 0
- }
- func newSubnetManager() (subnet.Manager, error) {
- if opts.remote != "" {
- return remote.NewRemoteManager(opts.remote), nil
- }
- cfg := &subnet.EtcdConfig{
- Endpoints: strings.Split(opts.etcdEndpoints, ","),
- Keyfile: opts.etcdKeyfile,
- Certfile: opts.etcdCertfile,
- CAFile: opts.etcdCAFile,
- Prefix: opts.etcdPrefix,
- }
- return subnet.NewEtcdManager(cfg)
- }
- func initAndRun(ctx context.Context, sm subnet.Manager, netnames []string) {
- iface, ipaddr, err := lookupIface()
- if err != nil {
- log.Error(err)
- return
- }
- if iface.MTU == 0 {
- log.Errorf("Failed to determine MTU for %s interface", ipaddr)
- return
- }
- log.Infof("Using %s as external interface", ipaddr)
- nets := []*network.Network{}
- for _, n := range netnames {
- nets = append(nets, network.New(sm, n, opts.ipMasq))
- }
- wg := sync.WaitGroup{}
- for _, n := range nets {
- go func(n *network.Network) {
- wg.Add(1)
- defer wg.Done()
- sn := n.Init(ctx, iface, ipaddr)
- if sn != nil {
- if isMultiNetwork() {
- path := filepath.Join(opts.subnetDir, n.Name) + ".env"
- if err := writeSubnetFile(path, sn); err != nil {
- return
- }
- } else {
- if err := writeSubnetFile(opts.subnetFile, sn); err != nil {
- return
- }
- daemon.SdNotify("READY=1")
- }
- n.Run(ctx)
- log.Infof("%v exited", n.Name)
- }
- }(n)
- }
- wg.Wait()
- }
- func main() {
- // glog will log to tmp files by default. override so all entries
- // can flow into journald (if running under systemd)
- flag.Set("logtostderr", "true")
- // now parse command line args
- flag.Parse()
- if opts.help {
- fmt.Fprintf(os.Stderr, "Usage: %s [OPTION]...\n", os.Args[0])
- flag.PrintDefaults()
- os.Exit(0)
- }
- if opts.version {
- fmt.Fprintln(os.Stderr, Version)
- os.Exit(0)
- }
- flagsFromEnv("FLANNELD", flag.CommandLine)
- sm, err := newSubnetManager()
- if err != nil {
- log.Error("Failed to create SubnetManager: ", err)
- os.Exit(1)
- }
- var runFunc func(ctx context.Context)
- if opts.listen != "" {
- if opts.remote != "" {
- log.Error("--listen and --remote are mutually exclusive")
- os.Exit(1)
- }
- log.Info("running as server")
- runFunc = func(ctx context.Context) {
- remote.RunServer(ctx, sm, opts.listen)
- }
- } else {
- networks := strings.Split(opts.networks, ",")
- if len(networks) == 0 {
- networks = append(networks, "")
- }
- runFunc = func(ctx context.Context) {
- initAndRun(ctx, sm, networks)
- }
- }
- // Register for SIGINT and SIGTERM
- log.Info("Installing signal handlers")
- sigs := make(chan os.Signal, 1)
- signal.Notify(sigs, os.Interrupt, syscall.SIGTERM)
- ctx, cancel := context.WithCancel(context.Background())
- wg := sync.WaitGroup{}
- wg.Add(1)
- go func() {
- runFunc(ctx)
- wg.Done()
- }()
- <-sigs
- // unregister to get default OS nuke behaviour in case we don't exit cleanly
- signal.Stop(sigs)
- log.Info("Exiting...")
- cancel()
- wg.Wait()
- }
|