2021-10-14 09:50:12 +00:00
//! Module containing structs related to membership management
2021-10-15 09:05:09 +00:00
use std ::collections ::HashMap ;
2021-10-14 09:50:12 +00:00
use std ::io ::{ Read , Write } ;
2022-03-06 13:50:00 +00:00
use std ::net ::{ IpAddr , SocketAddr } ;
2021-10-19 14:16:10 +00:00
use std ::path ::Path ;
2021-10-15 09:05:09 +00:00
use std ::sync ::{ Arc , RwLock } ;
2021-10-19 14:16:10 +00:00
use std ::time ::{ Duration , Instant } ;
2021-10-14 09:50:12 +00:00
use arc_swap ::ArcSwap ;
use async_trait ::async_trait ;
use futures ::{ join , select } ;
use futures_util ::future ::* ;
use serde ::{ Deserialize , Serialize } ;
use sodiumoxide ::crypto ::sign ::ed25519 ;
use tokio ::sync ::watch ;
use tokio ::sync ::Mutex ;
2021-10-15 09:05:09 +00:00
use netapp ::endpoint ::{ Endpoint , EndpointHandler } ;
2021-10-14 09:50:12 +00:00
use netapp ::peering ::fullmesh ::FullMeshPeeringStrategy ;
use netapp ::proto ::* ;
2021-10-15 09:05:09 +00:00
use netapp ::util ::parse_and_resolve_peer_addr ;
2021-10-19 14:16:10 +00:00
use netapp ::{ NetApp , NetworkKey , NodeID , NodeKey } ;
2021-10-14 09:50:12 +00:00
use garage_util ::background ::BackgroundRunner ;
2021-10-19 14:16:10 +00:00
use garage_util ::config ::Config ;
2021-11-09 11:24:04 +00:00
use garage_util ::data ::* ;
2021-10-19 14:16:10 +00:00
use garage_util ::error ::* ;
2021-10-14 09:50:12 +00:00
use garage_util ::persister ::Persister ;
2021-10-15 09:05:09 +00:00
use garage_util ::time ::* ;
2021-10-14 09:50:12 +00:00
2021-10-15 09:05:09 +00:00
use crate ::consul ::* ;
2022-03-16 11:09:50 +00:00
#[ cfg(feature = " kubernetes-discovery " ) ]
2022-03-06 13:50:00 +00:00
use crate ::kubernetes ::* ;
2021-11-09 11:24:04 +00:00
use crate ::layout ::* ;
2021-10-14 09:50:12 +00:00
use crate ::ring ::* ;
2021-10-15 09:05:09 +00:00
use crate ::rpc_helper ::* ;
2021-10-14 09:50:12 +00:00
const DISCOVERY_INTERVAL : Duration = Duration ::from_secs ( 60 ) ;
2021-10-15 09:05:09 +00:00
const STATUS_EXCHANGE_INTERVAL : Duration = Duration ::from_secs ( 10 ) ;
2021-10-14 09:50:12 +00:00
const PING_TIMEOUT : Duration = Duration ::from_secs ( 2 ) ;
2022-02-18 19:39:55 +00:00
/// Version tag used for version check upon Netapp connection
2022-02-24 12:25:28 +00:00
pub const GARAGE_VERSION_TAG : u64 = 0x6761726167650007 ; // garage 0x0007
2022-02-18 19:39:55 +00:00
2021-10-14 09:50:12 +00:00
/// RPC endpoint used for calls related to membership
pub const SYSTEM_RPC_PATH : & str = " garage_rpc/membership.rs/SystemRpc " ;
2021-10-19 14:16:10 +00:00
pub const CONNECT_ERROR_MESSAGE : & str = " Error establishing RPC connection to remote node. This can happen if the remote node is not reachable on the network, but also if the two nodes are not configured with the same rpc_secret " ;
2021-10-14 09:50:12 +00:00
/// RPC messages related to membership
#[ derive(Debug, Serialize, Deserialize, Clone) ]
pub enum SystemRpc {
/// Response to successfull advertisements
Ok ,
2021-10-15 09:05:09 +00:00
/// Request to connect to a specific node (in <pubkey>@<host>:<port> format)
Connect ( String ) ,
2021-11-09 11:24:04 +00:00
/// Ask other node its cluster layout. Answered with AdvertiseClusterLayout
PullClusterLayout ,
2021-10-14 09:50:12 +00:00
/// Advertise Garage status. Answered with another AdvertiseStatus.
/// Exchanged with every node on a regular basis.
2021-10-15 09:05:09 +00:00
AdvertiseStatus ( NodeStatus ) ,
2021-11-09 11:24:04 +00:00
/// Advertisement of cluster layout. Sent spontanously or in response to PullClusterLayout
AdvertiseClusterLayout ( ClusterLayout ) ,
2021-10-14 09:50:12 +00:00
/// Get known nodes states
GetKnownNodes ,
/// Return known nodes
2021-10-15 09:05:09 +00:00
ReturnKnownNodes ( Vec < KnownNodeInfo > ) ,
2021-10-14 09:50:12 +00:00
}
2021-10-15 09:05:09 +00:00
impl Rpc for SystemRpc {
type Response = Result < SystemRpc , Error > ;
2021-10-14 09:50:12 +00:00
}
/// This node's membership manager
pub struct System {
/// The id of this node
2021-10-15 09:05:09 +00:00
pub id : Uuid ,
2021-10-14 09:50:12 +00:00
2021-11-09 11:24:04 +00:00
persist_cluster_layout : Persister < ClusterLayout > ,
2021-10-15 09:05:09 +00:00
persist_peer_list : Persister < Vec < ( Uuid , SocketAddr ) > > ,
2021-10-14 09:50:12 +00:00
2021-10-15 09:05:09 +00:00
local_status : ArcSwap < NodeStatus > ,
node_status : RwLock < HashMap < Uuid , ( u64 , NodeStatus ) > > ,
2021-10-14 09:50:12 +00:00
pub netapp : Arc < NetApp > ,
fullmesh : Arc < FullMeshPeeringStrategy > ,
pub rpc : RpcHelper ,
system_endpoint : Arc < Endpoint < SystemRpc , System > > ,
rpc_listen_addr : SocketAddr ,
2021-10-15 09:05:09 +00:00
rpc_public_addr : Option < SocketAddr > ,
2021-10-14 09:50:12 +00:00
bootstrap_peers : Vec < ( NodeID , SocketAddr ) > ,
2022-03-06 13:50:00 +00:00
2022-03-16 11:09:50 +00:00
consul_discovery : Option < ConsulDiscoveryParam > ,
#[ cfg(feature = " kubernetes-discovery " ) ]
kubernetes_discovery : Option < KubernetesDiscoveryParam > ,
2022-03-06 13:50:00 +00:00
2021-10-14 09:50:12 +00:00
replication_factor : usize ,
/// The ring
pub ring : watch ::Receiver < Arc < Ring > > ,
update_ring : Mutex < watch ::Sender < Arc < Ring > > > ,
/// The job runner of this node
pub background : Arc < BackgroundRunner > ,
}
#[ derive(Debug, Clone, Serialize, Deserialize) ]
2021-10-15 09:05:09 +00:00
pub struct NodeStatus {
2021-10-14 09:50:12 +00:00
/// Hostname of the node
pub hostname : String ,
/// Replication factor configured on the node
pub replication_factor : usize ,
2021-11-09 11:24:04 +00:00
/// Cluster layout version
pub cluster_layout_version : u64 ,
/// Hash of cluster layout staging data
pub cluster_layout_staging_hash : Hash ,
2021-10-14 09:50:12 +00:00
}
2021-10-15 09:05:09 +00:00
#[ derive(Debug, Clone, Serialize, Deserialize) ]
pub struct KnownNodeInfo {
pub id : Uuid ,
pub addr : SocketAddr ,
pub is_up : bool ,
2021-10-19 14:16:10 +00:00
pub last_seen_secs_ago : Option < u64 > ,
2021-10-15 09:05:09 +00:00
pub status : NodeStatus ,
}
2021-10-19 14:16:10 +00:00
pub fn read_node_id ( metadata_dir : & Path ) -> Result < NodeID , Error > {
let mut pubkey_file = metadata_dir . to_path_buf ( ) ;
pubkey_file . push ( " node_key.pub " ) ;
let mut f = std ::fs ::File ::open ( pubkey_file . as_path ( ) ) ? ;
let mut d = vec! [ ] ;
f . read_to_end ( & mut d ) ? ;
if d . len ( ) ! = 32 {
return Err ( Error ::Message ( " Corrupt node_key.pub file " . to_string ( ) ) ) ;
}
let mut key = [ 0 u8 ; 32 ] ;
key . copy_from_slice ( & d [ .. ] ) ;
Ok ( NodeID ::from_slice ( & key [ .. ] ) . unwrap ( ) )
}
pub fn gen_node_key ( metadata_dir : & Path ) -> Result < NodeKey , Error > {
2021-10-15 09:05:09 +00:00
let mut key_file = metadata_dir . to_path_buf ( ) ;
key_file . push ( " node_key " ) ;
if key_file . as_path ( ) . exists ( ) {
let mut f = std ::fs ::File ::open ( key_file . as_path ( ) ) ? ;
2021-10-14 09:50:12 +00:00
let mut d = vec! [ ] ;
f . read_to_end ( & mut d ) ? ;
if d . len ( ) ! = 64 {
2021-10-15 09:05:09 +00:00
return Err ( Error ::Message ( " Corrupt node_key file " . to_string ( ) ) ) ;
2021-10-14 09:50:12 +00:00
}
let mut key = [ 0 u8 ; 64 ] ;
key . copy_from_slice ( & d [ .. ] ) ;
Ok ( NodeKey ::from_slice ( & key [ .. ] ) . unwrap ( ) )
} else {
2021-10-19 14:16:10 +00:00
if ! metadata_dir . exists ( ) {
info! ( " Metadata directory does not exist, creating it. " ) ;
std ::fs ::create_dir ( & metadata_dir ) ? ;
}
info! ( " Generating new node key pair. " ) ;
let ( pubkey , key ) = ed25519 ::gen_keypair ( ) ;
{
use std ::os ::unix ::fs ::PermissionsExt ;
let mut f = std ::fs ::File ::create ( key_file . as_path ( ) ) ? ;
let mut perm = f . metadata ( ) ? . permissions ( ) ;
perm . set_mode ( 0o600 ) ;
std ::fs ::set_permissions ( key_file . as_path ( ) , perm ) ? ;
f . write_all ( & key [ .. ] ) ? ;
}
{
let mut pubkey_file = metadata_dir . to_path_buf ( ) ;
pubkey_file . push ( " node_key.pub " ) ;
let mut f2 = std ::fs ::File ::create ( pubkey_file . as_path ( ) ) ? ;
f2 . write_all ( & pubkey [ .. ] ) ? ;
}
2021-10-14 09:50:12 +00:00
2021-10-15 09:05:09 +00:00
Ok ( key )
2021-10-14 09:50:12 +00:00
}
}
impl System {
/// Create this node's membership manager
pub fn new (
network_key : NetworkKey ,
background : Arc < BackgroundRunner > ,
replication_factor : usize ,
2021-10-19 14:16:10 +00:00
config : & Config ,
2021-10-14 09:50:12 +00:00
) -> Arc < Self > {
2021-10-19 14:16:10 +00:00
let node_key =
gen_node_key ( & config . metadata_dir ) . expect ( " Unable to read or generate node ID " ) ;
2022-02-18 19:39:55 +00:00
info! (
" Node ID of this node: {} " ,
hex ::encode ( & node_key . public_key ( ) [ .. 8 ] )
) ;
2021-10-14 09:50:12 +00:00
2021-11-09 11:24:04 +00:00
let persist_cluster_layout = Persister ::new ( & config . metadata_dir , " cluster_layout " ) ;
2021-10-19 14:16:10 +00:00
let persist_peer_list = Persister ::new ( & config . metadata_dir , " peer_list " ) ;
2021-10-14 09:50:12 +00:00
2021-11-09 11:24:04 +00:00
let cluster_layout = match persist_cluster_layout . load ( ) {
2021-10-14 09:50:12 +00:00
Ok ( x ) = > x ,
Err ( e ) = > {
2021-10-15 09:05:09 +00:00
info! (
2021-11-09 11:24:04 +00:00
" No valid previous cluster layout stored ({}), starting fresh. " ,
2021-10-15 09:05:09 +00:00
e
) ;
2021-11-09 11:24:04 +00:00
ClusterLayout ::new ( replication_factor )
2021-10-14 09:50:12 +00:00
}
} ;
2021-10-15 09:05:09 +00:00
let local_status = NodeStatus {
2021-10-14 09:50:12 +00:00
hostname : gethostname ::gethostname ( )
. into_string ( )
. unwrap_or_else ( | _ | " <invalid utf-8> " . to_string ( ) ) ,
2021-10-19 14:16:10 +00:00
replication_factor ,
2021-11-09 11:24:04 +00:00
cluster_layout_version : cluster_layout . version ,
cluster_layout_staging_hash : cluster_layout . staging_hash ,
2021-10-14 09:50:12 +00:00
} ;
2021-11-09 11:24:04 +00:00
let ring = Ring ::new ( cluster_layout , replication_factor ) ;
2021-10-14 09:50:12 +00:00
let ( update_ring , ring ) = watch ::channel ( Arc ::new ( ring ) ) ;
2022-03-16 11:09:50 +00:00
let rpc_public_addr = match config . rpc_public_addr {
Some ( a ) = > Some ( a ) ,
None = > {
let addr =
get_default_ip ( ) . map ( | ip | SocketAddr ::new ( ip , config . rpc_bind_addr . port ( ) ) ) ;
if let Some ( a ) = addr {
warn! ( " Using autodetected rpc_public_addr: {}. Consider specifying it explicitly in configuration file if possible. " , a ) ;
}
addr
}
} ;
2022-02-18 19:39:55 +00:00
let netapp = NetApp ::new ( GARAGE_VERSION_TAG , network_key , node_key ) ;
2021-10-15 09:05:09 +00:00
let fullmesh = FullMeshPeeringStrategy ::new (
netapp . clone ( ) ,
2021-10-19 14:16:10 +00:00
config . bootstrap_peers . clone ( ) ,
2022-03-16 11:09:50 +00:00
rpc_public_addr ,
2021-10-15 09:05:09 +00:00
) ;
2021-10-14 09:50:12 +00:00
let system_endpoint = netapp . endpoint ( SYSTEM_RPC_PATH . into ( ) ) ;
2022-03-16 11:09:50 +00:00
let consul_discovery = match ( & config . consul_host , & config . consul_service_name ) {
( Some ( ch ) , Some ( csn ) ) = > Some ( ConsulDiscoveryParam {
consul_host : ch . to_string ( ) ,
service_name : csn . to_string ( ) ,
} ) ,
_ = > None ,
} ;
#[ cfg(feature = " kubernetes-discovery " ) ]
let kubernetes_discovery = match (
& config . kubernetes_service_name ,
& config . kubernetes_namespace ,
) {
( Some ( ksn ) , Some ( kn ) ) = > Some ( KubernetesDiscoveryParam {
service_name : ksn . to_string ( ) ,
namespace : kn . to_string ( ) ,
skip_crd : config . kubernetes_skip_crd ,
} ) ,
_ = > None ,
} ;
#[ cfg(not(feature = " kubernetes-discovery " )) ]
if config . kubernetes_service_name . is_some ( ) | | config . kubernetes_namespace . is_some ( ) {
warn! ( " Kubernetes discovery is not enabled in this build. " ) ;
}
2021-10-14 09:50:12 +00:00
let sys = Arc ::new ( System {
2021-10-15 09:05:09 +00:00
id : netapp . id . into ( ) ,
2021-11-09 11:24:04 +00:00
persist_cluster_layout ,
2021-10-15 09:05:09 +00:00
persist_peer_list ,
local_status : ArcSwap ::new ( Arc ::new ( local_status ) ) ,
node_status : RwLock ::new ( HashMap ::new ( ) ) ,
2021-10-14 09:50:12 +00:00
netapp : netapp . clone ( ) ,
fullmesh : fullmesh . clone ( ) ,
2021-11-04 15:04:26 +00:00
rpc : RpcHelper ::new ( netapp . id . into ( ) , fullmesh , background . clone ( ) , ring . clone ( ) ) ,
2021-10-14 09:50:12 +00:00
system_endpoint ,
replication_factor ,
2021-10-19 14:16:10 +00:00
rpc_listen_addr : config . rpc_bind_addr ,
2022-03-16 11:09:50 +00:00
rpc_public_addr ,
2021-10-19 14:16:10 +00:00
bootstrap_peers : config . bootstrap_peers . clone ( ) ,
2022-03-16 11:09:50 +00:00
consul_discovery ,
#[ cfg(feature = " kubernetes-discovery " ) ]
kubernetes_discovery ,
2022-03-06 13:50:00 +00:00
2021-10-14 09:50:12 +00:00
ring ,
update_ring : Mutex ::new ( update_ring ) ,
2021-10-19 14:16:10 +00:00
background ,
2021-10-14 09:50:12 +00:00
} ) ;
sys . system_endpoint . set_handler ( sys . clone ( ) ) ;
sys
}
/// Perform bootstraping, starting the ping loop
pub async fn run ( self : Arc < Self > , must_exit : watch ::Receiver < bool > ) {
join! (
self . netapp
. clone ( )
. listen ( self . rpc_listen_addr , None , must_exit . clone ( ) ) ,
self . fullmesh . clone ( ) . run ( must_exit . clone ( ) ) ,
self . discovery_loop ( must_exit . clone ( ) ) ,
2021-10-15 09:05:09 +00:00
self . status_exchange_loop ( must_exit . clone ( ) ) ,
2021-10-14 09:50:12 +00:00
) ;
}
// ---- INTERNALS ----
2021-10-15 09:05:09 +00:00
async fn advertise_to_consul ( self : Arc < Self > ) -> Result < ( ) , Error > {
2022-03-16 11:09:50 +00:00
let c = match & self . consul_discovery {
Some ( c ) = > c ,
_ = > return Ok ( ( ) ) ,
} ;
2021-10-15 09:05:09 +00:00
let rpc_public_addr = match self . rpc_public_addr {
Some ( addr ) = > addr ,
None = > {
2022-03-16 11:09:50 +00:00
warn! ( " Not advertising to Consul because rpc_public_addr is not defined in config file and could not be autodetected. " ) ;
2021-10-15 09:05:09 +00:00
return Ok ( ( ) ) ;
}
} ;
publish_consul_service (
2022-03-16 11:09:50 +00:00
& c . consul_host ,
& c . service_name ,
2021-10-15 09:05:09 +00:00
self . netapp . id ,
& self . local_status . load_full ( ) . hostname ,
rpc_public_addr ,
)
. await
2021-10-19 14:16:10 +00:00
. err_context ( " Error while publishing Consul service " )
2021-10-15 09:05:09 +00:00
}
2022-03-16 11:09:50 +00:00
#[ cfg(feature = " kubernetes-discovery " ) ]
2022-03-06 13:50:00 +00:00
async fn advertise_to_kubernetes ( self : Arc < Self > ) -> Result < ( ) , Error > {
2022-03-16 11:09:50 +00:00
let k = match & self . kubernetes_discovery {
Some ( k ) = > k ,
_ = > return Ok ( ( ) ) ,
} ;
let rpc_public_addr = match self . rpc_public_addr {
Some ( addr ) = > addr ,
None = > {
warn! ( " Not advertising to Kubernetes because rpc_public_addr is not defined in config file and could not be autodetected. " ) ;
return Ok ( ( ) ) ;
}
} ;
2022-03-06 13:50:00 +00:00
publish_kubernetes_node (
2022-03-16 11:09:50 +00:00
& k . service_name ,
& k . namespace ,
2022-03-06 13:50:00 +00:00
self . netapp . id ,
& self . local_status . load_full ( ) . hostname ,
rpc_public_addr ,
)
. await
. err_context ( " Error while publishing node to kubernetes " )
}
2021-10-14 09:50:12 +00:00
/// Save network configuration to disc
2021-11-09 11:24:04 +00:00
async fn save_cluster_layout ( self : Arc < Self > ) -> Result < ( ) , Error > {
2021-10-14 09:50:12 +00:00
let ring : Arc < Ring > = self . ring . borrow ( ) . clone ( ) ;
2021-11-09 11:24:04 +00:00
self . persist_cluster_layout
. save_async ( & ring . layout )
2021-10-14 09:50:12 +00:00
. await
2021-11-09 11:24:04 +00:00
. expect ( " Cannot save current cluster layout " ) ;
2021-10-14 09:50:12 +00:00
Ok ( ( ) )
}
2021-10-15 09:05:09 +00:00
fn update_local_status ( & self ) {
let mut new_si : NodeStatus = self . local_status . load ( ) . as_ref ( ) . clone ( ) ;
2021-10-14 09:50:12 +00:00
let ring = self . ring . borrow ( ) ;
2021-11-09 11:24:04 +00:00
new_si . cluster_layout_version = ring . layout . version ;
new_si . cluster_layout_staging_hash = ring . layout . staging_hash ;
2021-10-15 09:05:09 +00:00
self . local_status . swap ( Arc ::new ( new_si ) ) ;
}
async fn handle_connect ( & self , node : & str ) -> Result < SystemRpc , Error > {
2021-10-19 14:16:10 +00:00
let ( pubkey , addrs ) = parse_and_resolve_peer_addr ( node ) . ok_or_else ( | | {
Error ::Message ( format! (
" Unable to parse or resolve node specification: {} " ,
node
) )
} ) ? ;
2021-10-15 09:05:09 +00:00
let mut errors = vec! [ ] ;
for ip in addrs . iter ( ) {
2021-10-19 14:16:10 +00:00
match self
. netapp
. clone ( )
. try_connect ( * ip , pubkey )
. await
. err_context ( CONNECT_ERROR_MESSAGE )
{
2021-10-15 09:05:09 +00:00
Ok ( ( ) ) = > return Ok ( SystemRpc ::Ok ) ,
Err ( e ) = > {
errors . push ( ( * ip , e ) ) ;
}
}
}
2021-10-19 14:16:10 +00:00
return Err ( Error ::Message ( format! (
" Could not connect to specified peers. Errors: {:?} " ,
errors
) ) ) ;
2021-10-14 09:50:12 +00:00
}
2021-11-09 11:24:04 +00:00
fn handle_pull_cluster_layout ( & self ) -> SystemRpc {
2021-10-14 09:50:12 +00:00
let ring = self . ring . borrow ( ) . clone ( ) ;
2021-11-09 11:24:04 +00:00
SystemRpc ::AdvertiseClusterLayout ( ring . layout . clone ( ) )
2021-10-14 09:50:12 +00:00
}
2021-10-15 09:05:09 +00:00
fn handle_get_known_nodes ( & self ) -> SystemRpc {
let node_status = self . node_status . read ( ) . unwrap ( ) ;
2021-10-19 14:16:10 +00:00
let known_nodes = self
. fullmesh
. get_peer_list ( )
. iter ( )
. map ( | n | KnownNodeInfo {
id : n . id . into ( ) ,
addr : n . addr ,
is_up : n . is_up ( ) ,
last_seen_secs_ago : n . last_seen . map ( | t | ( Instant ::now ( ) - t ) . as_secs ( ) ) ,
status : node_status
. get ( & n . id . into ( ) )
. cloned ( )
. map ( | ( _ , st ) | st )
. unwrap_or ( NodeStatus {
hostname : " ? " . to_string ( ) ,
replication_factor : 0 ,
2021-11-09 11:24:04 +00:00
cluster_layout_version : 0 ,
cluster_layout_staging_hash : Hash ::from ( [ 0 u8 ; 32 ] ) ,
2021-10-19 14:16:10 +00:00
} ) ,
} )
. collect ::< Vec < _ > > ( ) ;
2021-10-15 09:05:09 +00:00
SystemRpc ::ReturnKnownNodes ( known_nodes )
}
async fn handle_advertise_status (
self : & Arc < Self > ,
from : Uuid ,
info : & NodeStatus ,
) -> Result < SystemRpc , Error > {
let local_info = self . local_status . load ( ) ;
if local_info . replication_factor < info . replication_factor {
error! ( " Some node have a higher replication factor ({}) than this one ({}). This is not supported and might lead to bugs " ,
info . replication_factor ,
local_info . replication_factor ) ;
std ::process ::exit ( 1 ) ;
}
2021-11-09 11:24:04 +00:00
if info . cluster_layout_version > local_info . cluster_layout_version
| | info . cluster_layout_staging_hash ! = local_info . cluster_layout_staging_hash
{
2021-10-15 09:05:09 +00:00
let self2 = self . clone ( ) ;
self . background . spawn_cancellable ( async move {
2021-11-09 11:24:04 +00:00
self2 . pull_cluster_layout ( from ) . await ;
2021-10-15 09:05:09 +00:00
Ok ( ( ) )
} ) ;
}
self . node_status
. write ( )
. unwrap ( )
. insert ( from , ( now_msec ( ) , info . clone ( ) ) ) ;
Ok ( SystemRpc ::Ok )
}
2021-11-09 11:24:04 +00:00
async fn handle_advertise_cluster_layout (
2021-10-14 09:50:12 +00:00
self : Arc < Self > ,
2021-11-09 11:24:04 +00:00
adv : & ClusterLayout ,
2021-10-14 09:50:12 +00:00
) -> Result < SystemRpc , Error > {
let update_ring = self . update_ring . lock ( ) . await ;
2021-11-09 11:24:04 +00:00
let mut layout : ClusterLayout = self . ring . borrow ( ) . layout . clone ( ) ;
let prev_layout_check = layout . check ( ) ;
if layout . merge ( adv ) {
if prev_layout_check & & ! layout . check ( ) {
error! ( " New cluster layout is invalid, discarding. " ) ;
return Err ( Error ::Message (
" New cluster layout is invalid, discarding. " . into ( ) ,
) ) ;
}
2021-10-14 09:50:12 +00:00
2021-11-09 11:24:04 +00:00
let ring = Ring ::new ( layout . clone ( ) , self . replication_factor ) ;
2021-10-14 09:50:12 +00:00
update_ring . send ( Arc ::new ( ring ) ) ? ;
drop ( update_ring ) ;
let self2 = self . clone ( ) ;
self . background . spawn_cancellable ( async move {
self2
. rpc
. broadcast (
& self2 . system_endpoint ,
2021-11-09 11:24:04 +00:00
SystemRpc ::AdvertiseClusterLayout ( layout ) ,
2021-10-19 14:16:10 +00:00
RequestStrategy ::with_priority ( PRIO_HIGH ) ,
2021-10-14 09:50:12 +00:00
)
. await ;
Ok ( ( ) )
} ) ;
2021-11-09 11:24:04 +00:00
self . background . spawn ( self . clone ( ) . save_cluster_layout ( ) ) ;
2021-10-14 09:50:12 +00:00
}
Ok ( SystemRpc ::Ok )
}
2021-10-15 09:05:09 +00:00
async fn status_exchange_loop ( & self , mut stop_signal : watch ::Receiver < bool > ) {
while ! * stop_signal . borrow ( ) {
let restart_at = tokio ::time ::sleep ( STATUS_EXCHANGE_INTERVAL ) ;
self . update_local_status ( ) ;
let local_status : NodeStatus = self . local_status . load ( ) . as_ref ( ) . clone ( ) ;
self . rpc
. broadcast (
& self . system_endpoint ,
SystemRpc ::AdvertiseStatus ( local_status ) ,
RequestStrategy ::with_priority ( PRIO_HIGH ) . with_timeout ( PING_TIMEOUT ) ,
)
. await ;
select! {
_ = restart_at . fuse ( ) = > { } ,
_ = stop_signal . changed ( ) . fuse ( ) = > { } ,
}
}
}
async fn discovery_loop ( self : & Arc < Self > , mut stop_signal : watch ::Receiver < bool > ) {
2021-10-14 09:50:12 +00:00
while ! * stop_signal . borrow ( ) {
2021-11-09 11:24:04 +00:00
let not_configured = ! self . ring . borrow ( ) . layout . check ( ) ;
2021-10-14 09:50:12 +00:00
let no_peers = self . fullmesh . get_peer_list ( ) . len ( ) < self . replication_factor ;
2021-11-09 11:24:04 +00:00
let expected_n_nodes = self . ring . borrow ( ) . layout . num_nodes ( ) ;
2021-10-14 09:50:12 +00:00
let bad_peers = self
. fullmesh
. get_peer_list ( )
. iter ( )
. filter ( | p | p . is_up ( ) )
2021-11-09 11:24:04 +00:00
. count ( ) ! = expected_n_nodes ;
2021-10-14 09:50:12 +00:00
if not_configured | | no_peers | | bad_peers {
info! ( " Doing a bootstrap/discovery step (not_configured: {}, no_peers: {}, bad_peers: {}) " , not_configured , no_peers , bad_peers ) ;
2021-10-15 09:05:09 +00:00
let mut ping_list = self . bootstrap_peers . clone ( ) ;
2021-10-14 09:50:12 +00:00
2021-10-15 09:05:09 +00:00
// Add peer list from list stored on disk
if let Ok ( peers ) = self . persist_peer_list . load_async ( ) . await {
ping_list . extend ( peers . iter ( ) . map ( | ( id , addr ) | ( ( * id ) . into ( ) , * addr ) ) )
2021-10-14 09:50:12 +00:00
}
2021-10-15 09:05:09 +00:00
// Fetch peer list from Consul
2022-03-16 11:09:50 +00:00
if let Some ( c ) = & self . consul_discovery {
match get_consul_nodes ( & c . consul_host , & c . service_name ) . await {
2021-10-14 09:50:12 +00:00
Ok ( node_list ) = > {
2021-10-15 09:05:09 +00:00
ping_list . extend ( node_list ) ;
2021-10-14 09:50:12 +00:00
}
Err ( e ) = > {
warn! ( " Could not retrieve node list from Consul: {} " , e ) ;
}
}
}
2022-03-06 13:50:00 +00:00
// Fetch peer list from Kubernetes
2022-03-16 11:09:50 +00:00
#[ cfg(feature = " kubernetes-discovery " ) ]
if let Some ( k ) = & self . kubernetes_discovery {
if ! k . skip_crd {
2022-03-06 13:50:00 +00:00
match create_kubernetes_crd ( ) . await {
Ok ( ( ) ) = > ( ) ,
Err ( e ) = > {
error! ( " Failed to create kubernetes custom resource: {} " , e )
}
} ;
}
2022-03-16 11:09:50 +00:00
match get_kubernetes_nodes ( & k . service_name , & k . namespace ) . await {
2022-03-06 13:50:00 +00:00
Ok ( node_list ) = > {
ping_list . extend ( node_list ) ;
}
Err ( e ) = > {
warn! ( " Could not retrieve node list from Kubernetes: {} " , e ) ;
}
}
}
2021-10-14 09:50:12 +00:00
for ( node_id , node_addr ) in ping_list {
2021-10-19 14:16:10 +00:00
tokio ::spawn (
self . netapp
. clone ( )
. try_connect ( node_addr , node_id )
. map ( | r | r . err_context ( CONNECT_ERROR_MESSAGE ) ) ,
) ;
2021-10-14 09:50:12 +00:00
}
}
2021-11-03 16:34:44 +00:00
if let Err ( e ) = self . save_peer_list ( ) . await {
2021-10-15 09:05:09 +00:00
warn! ( " Could not save peer list to file: {} " , e ) ;
}
self . background . spawn ( self . clone ( ) . advertise_to_consul ( ) ) ;
2022-03-16 11:09:50 +00:00
#[ cfg(feature = " kubernetes-discovery " ) ]
2022-03-06 13:50:00 +00:00
self . background
. spawn ( self . clone ( ) . advertise_to_kubernetes ( ) ) ;
2021-10-15 09:05:09 +00:00
2021-10-14 09:50:12 +00:00
let restart_at = tokio ::time ::sleep ( DISCOVERY_INTERVAL ) ;
select! {
_ = restart_at . fuse ( ) = > { } ,
_ = stop_signal . changed ( ) . fuse ( ) = > { } ,
}
}
}
2021-11-03 16:34:44 +00:00
async fn save_peer_list ( & self ) -> Result < ( ) , Error > {
// Prepare new peer list to save to file
// It is a vec of tuples (node ID as Uuid, node SocketAddr)
let mut peer_list = self
. fullmesh
. get_peer_list ( )
. iter ( )
. map ( | n | ( n . id . into ( ) , n . addr ) )
. collect ::< Vec < _ > > ( ) ;
// Before doing it, we read the current peer list file (if it exists)
// and append it to the list we are about to save,
// so that no peer ID gets lost in the process.
if let Ok ( mut prev_peer_list ) = self . persist_peer_list . load_async ( ) . await {
prev_peer_list . retain ( | ( id , _ip ) | peer_list . iter ( ) . all ( | ( id2 , _ip2 ) | id2 ! = id ) ) ;
peer_list . extend ( prev_peer_list ) ;
}
// Save new peer list to file
self . persist_peer_list . save_async ( & peer_list ) . await
}
2021-11-09 11:24:04 +00:00
async fn pull_cluster_layout ( self : Arc < Self > , peer : Uuid ) {
2021-10-14 09:50:12 +00:00
let resp = self
. rpc
. call (
& self . system_endpoint ,
peer ,
2021-11-09 11:24:04 +00:00
SystemRpc ::PullClusterLayout ,
2021-10-14 09:50:12 +00:00
RequestStrategy ::with_priority ( PRIO_HIGH ) . with_timeout ( PING_TIMEOUT ) ,
)
. await ;
2021-11-09 11:24:04 +00:00
if let Ok ( SystemRpc ::AdvertiseClusterLayout ( layout ) ) = resp {
let _ : Result < _ , _ > = self . handle_advertise_cluster_layout ( & layout ) . await ;
2021-10-14 09:50:12 +00:00
}
}
}
#[ async_trait ]
impl EndpointHandler < SystemRpc > for System {
2021-10-15 09:05:09 +00:00
async fn handle ( self : & Arc < Self > , msg : & SystemRpc , from : NodeID ) -> Result < SystemRpc , Error > {
match msg {
SystemRpc ::Connect ( node ) = > self . handle_connect ( node ) . await ,
2021-11-09 11:24:04 +00:00
SystemRpc ::PullClusterLayout = > Ok ( self . handle_pull_cluster_layout ( ) ) ,
2021-10-15 09:05:09 +00:00
SystemRpc ::AdvertiseStatus ( adv ) = > self . handle_advertise_status ( from . into ( ) , adv ) . await ,
2021-11-09 11:24:04 +00:00
SystemRpc ::AdvertiseClusterLayout ( adv ) = > {
self . clone ( ) . handle_advertise_cluster_layout ( adv ) . await
}
2021-10-15 09:05:09 +00:00
SystemRpc ::GetKnownNodes = > Ok ( self . handle_get_known_nodes ( ) ) ,
2022-01-03 12:58:05 +00:00
m = > Err ( Error ::unexpected_rpc_message ( m ) ) ,
2021-10-14 09:50:12 +00:00
}
}
}
2022-03-16 11:09:50 +00:00
fn get_default_ip ( ) -> Option < IpAddr > {
pnet_datalink ::interfaces ( )
. iter ( )
. find ( | e | e . is_up ( ) & & ! e . is_loopback ( ) & & ! e . ips . is_empty ( ) )
. and_then ( | e | e . ips . first ( ) )
. map ( | a | a . ip ( ) )
}
struct ConsulDiscoveryParam {
consul_host : String ,
service_name : String ,
}
#[ cfg(feature = " kubernetes-discovery " ) ]
struct KubernetesDiscoveryParam {
service_name : String ,
namespace : String ,
skip_crd : bool ,
}