2019-10-27 05:53:25 +00:00
|
|
|
package cluster
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2021-02-12 15:35:57 +00:00
|
|
|
"net/url"
|
2019-11-11 22:18:26 +00:00
|
|
|
"strings"
|
2019-10-27 05:53:25 +00:00
|
|
|
|
2020-11-30 23:45:22 +00:00
|
|
|
"github.com/k3s-io/kine/pkg/client"
|
|
|
|
"github.com/k3s-io/kine/pkg/endpoint"
|
2019-12-16 18:44:13 +00:00
|
|
|
"github.com/pkg/errors"
|
2019-10-27 05:53:25 +00:00
|
|
|
"github.com/rancher/k3s/pkg/clientaccess"
|
2020-05-05 21:59:15 +00:00
|
|
|
"github.com/rancher/k3s/pkg/cluster/managed"
|
2019-10-27 05:53:25 +00:00
|
|
|
"github.com/rancher/k3s/pkg/daemons/config"
|
2021-02-12 15:35:57 +00:00
|
|
|
"github.com/rancher/k3s/pkg/etcd"
|
2019-10-27 05:53:25 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type Cluster struct {
|
|
|
|
clientAccessInfo *clientaccess.Info
|
|
|
|
config *config.Control
|
|
|
|
runtime *config.ControlRuntime
|
2020-05-05 21:59:15 +00:00
|
|
|
managedDB managed.Driver
|
|
|
|
shouldBootstrap bool
|
2019-11-11 22:18:26 +00:00
|
|
|
storageStarted bool
|
|
|
|
etcdConfig endpoint.ETCDConfig
|
|
|
|
joining bool
|
|
|
|
saveBootstrap bool
|
|
|
|
storageClient client.Client
|
2019-10-27 05:53:25 +00:00
|
|
|
}
|
|
|
|
|
2020-09-24 06:29:25 +00:00
|
|
|
// Start creates the dynamic tls listener, http request handler,
|
|
|
|
// handles starting and writing/reading bootstrap data, and returns a channel
|
|
|
|
// that will be closed when datastore is ready.
|
2020-05-05 21:59:15 +00:00
|
|
|
func (c *Cluster) Start(ctx context.Context) (<-chan struct{}, error) {
|
2020-09-24 06:29:25 +00:00
|
|
|
// Set up the dynamiclistener and http request handlers
|
2020-05-05 21:59:15 +00:00
|
|
|
if err := c.initClusterAndHTTPS(ctx); err != nil {
|
2020-09-24 06:29:25 +00:00
|
|
|
return nil, errors.Wrap(err, "init cluster datastore and https")
|
2019-10-27 05:53:25 +00:00
|
|
|
}
|
|
|
|
|
2021-02-12 15:35:57 +00:00
|
|
|
if c.config.DisableETCD {
|
|
|
|
ready := make(chan struct{})
|
|
|
|
defer close(ready)
|
|
|
|
|
|
|
|
// try to get /db/info urls first before attempting to use join url
|
|
|
|
clientURLs, _, err := etcd.ClientURLs(ctx, c.clientAccessInfo)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if len(clientURLs) < 1 {
|
|
|
|
clientURL, err := url.Parse(c.config.JoinURL)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
clientURL.Host = clientURL.Hostname() + ":2379"
|
|
|
|
clientURLs = append(clientURLs, clientURL.String())
|
|
|
|
}
|
|
|
|
etcdProxy, err := etcd.NewETCDProxy(true, c.config.DataDir, clientURLs[0])
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
c.setupEtcdProxy(ctx, etcdProxy)
|
|
|
|
return ready, nil
|
|
|
|
}
|
|
|
|
|
2020-09-24 06:29:25 +00:00
|
|
|
// start managed database (if necessary)
|
2020-05-05 21:59:15 +00:00
|
|
|
if err := c.start(ctx); err != nil {
|
2020-09-24 06:29:25 +00:00
|
|
|
return nil, errors.Wrap(err, "start managed database")
|
2019-10-27 05:53:25 +00:00
|
|
|
}
|
|
|
|
|
2020-09-24 06:29:25 +00:00
|
|
|
// get the wait channel for testing managed database readiness
|
2020-05-05 21:59:15 +00:00
|
|
|
ready, err := c.testClusterDB(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2019-10-27 05:53:25 +00:00
|
|
|
}
|
|
|
|
|
2020-09-24 06:29:25 +00:00
|
|
|
// if necessary, store bootstrap data to datastore
|
2019-11-11 22:18:26 +00:00
|
|
|
if c.saveBootstrap {
|
|
|
|
if err := c.save(ctx); err != nil {
|
2020-05-05 21:59:15 +00:00
|
|
|
return nil, err
|
2019-10-27 05:53:25 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-24 06:29:25 +00:00
|
|
|
// if necessary, record successful bootstrap
|
2020-05-05 21:59:15 +00:00
|
|
|
if c.shouldBootstrap {
|
|
|
|
if err := c.bootstrapped(); err != nil {
|
|
|
|
return nil, err
|
2019-11-11 22:18:26 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-05 21:59:15 +00:00
|
|
|
return ready, c.startStorage(ctx)
|
2019-11-11 22:18:26 +00:00
|
|
|
}
|
|
|
|
|
2020-09-24 06:29:25 +00:00
|
|
|
// startStorage starts the kine listener and configures the endpoints, if necessary.
|
|
|
|
// This calls into the kine endpoint code, which sets up the database client
|
|
|
|
// and unix domain socket listener if using an external database. In the case of an etcd
|
|
|
|
// backend it just returns the user-provided etcd endpoints and tls config.
|
2019-11-11 22:18:26 +00:00
|
|
|
func (c *Cluster) startStorage(ctx context.Context) error {
|
|
|
|
if c.storageStarted {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
c.storageStarted = true
|
|
|
|
|
2020-09-24 06:29:25 +00:00
|
|
|
// start listening on the kine socket as an etcd endpoint, or return the external etcd endpoints
|
2019-11-16 00:12:27 +00:00
|
|
|
etcdConfig, err := endpoint.Listen(ctx, c.config.Datastore)
|
2019-11-11 22:18:26 +00:00
|
|
|
if err != nil {
|
2019-12-16 18:44:13 +00:00
|
|
|
return errors.Wrap(err, "creating storage endpoint")
|
2019-10-31 02:05:40 +00:00
|
|
|
}
|
|
|
|
|
2020-09-24 06:29:25 +00:00
|
|
|
// Persist the returned etcd configuration. We decide if we're doing leader election for embedded controllers
|
|
|
|
// based on what the kine wrapper tells us about the datastore. Single-node datastores like sqlite don't require
|
|
|
|
// leader election, while basically all others (etcd, external database, etc) do since they allow multiple servers.
|
2019-11-11 22:18:26 +00:00
|
|
|
c.etcdConfig = etcdConfig
|
2019-11-16 00:12:27 +00:00
|
|
|
c.config.Datastore.Config = etcdConfig.TLSConfig
|
|
|
|
c.config.Datastore.Endpoint = strings.Join(etcdConfig.Endpoints, ",")
|
2019-11-11 22:18:26 +00:00
|
|
|
c.config.NoLeaderElect = !etcdConfig.LeaderElect
|
|
|
|
return nil
|
2019-10-27 05:53:25 +00:00
|
|
|
}
|
|
|
|
|
2020-09-24 06:29:25 +00:00
|
|
|
// New creates an initial cluster using the provided configuration
|
2019-10-27 05:53:25 +00:00
|
|
|
func New(config *config.Control) *Cluster {
|
|
|
|
return &Cluster{
|
|
|
|
config: config,
|
|
|
|
runtime: config.Runtime,
|
|
|
|
}
|
|
|
|
}
|