main.go 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170
  1. // Copyright 2015 flannel authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package main
  15. import (
  16. "flag"
  17. "fmt"
  18. "os"
  19. "os/signal"
  20. "strings"
  21. "sync"
  22. "syscall"
  23. "github.com/coreos/pkg/flagutil"
  24. log "github.com/golang/glog"
  25. "golang.org/x/net/context"
  26. "github.com/coreos/flannel/network"
  27. "github.com/coreos/flannel/remote"
  28. "github.com/coreos/flannel/subnet"
  29. "github.com/coreos/flannel/version"
  30. // Backends need to be imported for their init() to get executed and them to register
  31. _ "github.com/coreos/flannel/backend/alloc"
  32. _ "github.com/coreos/flannel/backend/awsvpc"
  33. _ "github.com/coreos/flannel/backend/gce"
  34. _ "github.com/coreos/flannel/backend/hostgw"
  35. _ "github.com/coreos/flannel/backend/udp"
  36. _ "github.com/coreos/flannel/backend/vxlan"
  37. )
  38. type CmdLineOpts struct {
  39. etcdEndpoints string
  40. etcdPrefix string
  41. etcdKeyfile string
  42. etcdCertfile string
  43. etcdCAFile string
  44. etcdUsername string
  45. etcdPassword string
  46. help bool
  47. version bool
  48. listen string
  49. remote string
  50. remoteKeyfile string
  51. remoteCertfile string
  52. remoteCAFile string
  53. }
  54. var opts CmdLineOpts
  55. func init() {
  56. flag.StringVar(&opts.etcdEndpoints, "etcd-endpoints", "http://127.0.0.1:4001,http://127.0.0.1:2379", "a comma-delimited list of etcd endpoints")
  57. flag.StringVar(&opts.etcdPrefix, "etcd-prefix", "/coreos.com/network", "etcd prefix")
  58. flag.StringVar(&opts.etcdKeyfile, "etcd-keyfile", "", "SSL key file used to secure etcd communication")
  59. flag.StringVar(&opts.etcdCertfile, "etcd-certfile", "", "SSL certification file used to secure etcd communication")
  60. flag.StringVar(&opts.etcdCAFile, "etcd-cafile", "", "SSL Certificate Authority file used to secure etcd communication")
  61. flag.StringVar(&opts.etcdUsername, "etcd-username", "", "Username for BasicAuth to etcd")
  62. flag.StringVar(&opts.etcdPassword, "etcd-password", "", "Password for BasicAuth to etcd")
  63. flag.StringVar(&opts.listen, "listen", "", "run as server and listen on specified address (e.g. ':8080')")
  64. flag.StringVar(&opts.remote, "remote", "", "run as client and connect to server on specified address (e.g. '10.1.2.3:8080')")
  65. flag.StringVar(&opts.remoteKeyfile, "remote-keyfile", "", "SSL key file used to secure client/server communication")
  66. flag.StringVar(&opts.remoteCertfile, "remote-certfile", "", "SSL certification file used to secure client/server communication")
  67. flag.StringVar(&opts.remoteCAFile, "remote-cafile", "", "SSL Certificate Authority file used to secure client/server communication")
  68. flag.BoolVar(&opts.help, "help", false, "print this message")
  69. flag.BoolVar(&opts.version, "version", false, "print version and exit")
  70. }
  71. func newSubnetManager() (subnet.Manager, error) {
  72. if opts.remote != "" {
  73. return remote.NewRemoteManager(opts.remote, opts.remoteCAFile, opts.remoteCertfile, opts.remoteKeyfile)
  74. }
  75. cfg := &subnet.EtcdConfig{
  76. Endpoints: strings.Split(opts.etcdEndpoints, ","),
  77. Keyfile: opts.etcdKeyfile,
  78. Certfile: opts.etcdCertfile,
  79. CAFile: opts.etcdCAFile,
  80. Prefix: opts.etcdPrefix,
  81. Username: opts.etcdUsername,
  82. Password: opts.etcdPassword,
  83. }
  84. return subnet.NewLocalManager(cfg)
  85. }
  86. func main() {
  87. // glog will log to tmp files by default. override so all entries
  88. // can flow into journald (if running under systemd)
  89. flag.Set("logtostderr", "true")
  90. // now parse command line args
  91. flag.Parse()
  92. if flag.NArg() > 0 || opts.help {
  93. fmt.Fprintf(os.Stderr, "Usage: %s [OPTION]...\n", os.Args[0])
  94. flag.PrintDefaults()
  95. os.Exit(0)
  96. }
  97. if opts.version {
  98. fmt.Fprintln(os.Stderr, version.Version)
  99. os.Exit(0)
  100. }
  101. flagutil.SetFlagsFromEnv(flag.CommandLine, "FLANNELD")
  102. sm, err := newSubnetManager()
  103. if err != nil {
  104. log.Error("Failed to create SubnetManager: ", err)
  105. os.Exit(1)
  106. }
  107. // Register for SIGINT and SIGTERM
  108. log.Info("Installing signal handlers")
  109. sigs := make(chan os.Signal, 1)
  110. signal.Notify(sigs, os.Interrupt, syscall.SIGTERM)
  111. ctx, cancel := context.WithCancel(context.Background())
  112. var runFunc func(ctx context.Context)
  113. if opts.listen != "" {
  114. if opts.remote != "" {
  115. log.Error("--listen and --remote are mutually exclusive")
  116. os.Exit(1)
  117. }
  118. log.Info("running as server")
  119. runFunc = func(ctx context.Context) {
  120. remote.RunServer(ctx, sm, opts.listen, opts.remoteCAFile, opts.remoteCertfile, opts.remoteKeyfile)
  121. }
  122. } else {
  123. nm, err := network.NewNetworkManager(ctx, sm)
  124. if err != nil {
  125. log.Error("Failed to create NetworkManager: ", err)
  126. os.Exit(1)
  127. }
  128. runFunc = func(ctx context.Context) {
  129. nm.Run(ctx)
  130. }
  131. }
  132. wg := sync.WaitGroup{}
  133. wg.Add(1)
  134. go func() {
  135. runFunc(ctx)
  136. wg.Done()
  137. }()
  138. <-sigs
  139. // unregister to get default OS nuke behaviour in case we don't exit cleanly
  140. signal.Stop(sigs)
  141. log.Info("Exiting...")
  142. cancel()
  143. wg.Wait()
  144. }