forked from pachyderm/pachyderm
/
main.go
252 lines (232 loc) · 7.65 KB
/
main.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
package main
import (
"fmt"
"os"
"strings"
"github.com/pachyderm/pachyderm/src/client"
pfsclient "github.com/pachyderm/pachyderm/src/client/pfs"
"github.com/pachyderm/pachyderm/src/client/pkg/discovery"
"github.com/pachyderm/pachyderm/src/client/pkg/grpcutil"
"github.com/pachyderm/pachyderm/src/client/pkg/shard"
"github.com/pachyderm/pachyderm/src/client/pkg/uuid"
ppsclient "github.com/pachyderm/pachyderm/src/client/pps" //SJ: bad name conflict w below
"github.com/pachyderm/pachyderm/src/client/version"
pfsmodel "github.com/pachyderm/pachyderm/src/server/pfs" // SJ: really bad name conflict. Normally I was making the non pfsclient stuff all under pfs server
"github.com/pachyderm/pachyderm/src/server/pfs/drive"
pfs_server "github.com/pachyderm/pachyderm/src/server/pfs/server"
"github.com/pachyderm/pachyderm/src/server/pkg/metrics"
"github.com/pachyderm/pachyderm/src/server/pkg/netutil"
ppsserver "github.com/pachyderm/pachyderm/src/server/pps" //SJ: cant name this server per the refactor convention because of the import below
"github.com/pachyderm/pachyderm/src/server/pps/persist"
persist_server "github.com/pachyderm/pachyderm/src/server/pps/persist/server"
pps_server "github.com/pachyderm/pachyderm/src/server/pps/server"
flag "github.com/spf13/pflag"
"go.pedge.io/env"
"go.pedge.io/lion/proto"
"go.pedge.io/proto/server"
"google.golang.org/grpc"
"k8s.io/kubernetes/pkg/api"
kube_client "k8s.io/kubernetes/pkg/client/restclient"
kube "k8s.io/kubernetes/pkg/client/unversioned"
)
var readinessCheck bool
func init() {
flag.BoolVar(&readinessCheck, "readiness-check", false, "Set to true when checking if local pod is ready")
flag.Parse()
}
type appEnv struct {
Port uint16 `env:"PORT,default=650"`
NumShards uint64 `env:"NUM_SHARDS,default=32"`
StorageRoot string `env:"PACH_ROOT,required"`
StorageBackend string `env:"STORAGE_BACKEND,default="`
DatabaseAddress string `env:"RETHINK_PORT_28015_TCP_ADDR,required"`
DatabaseName string `env:"DATABASE_NAME,default=pachyderm"`
KubeAddress string `env:"KUBERNETES_PORT_443_TCP_ADDR,required"`
EtcdAddress string `env:"ETCD_PORT_2379_TCP_ADDR,required"`
Namespace string `env:"NAMESPACE,default=default"`
Metrics bool `env:"METRICS,default=true"`
Init bool `env:"INIT,default=false"`
}
func main() {
env.Main(do, &appEnv{})
}
// isDBCreated is used to tell when we are trying to initialize a database,
// whether we are getting an error because the database has already been
// initialized.
func isDBCreated(err error) bool {
return strings.Contains(err.Error(), "Database") && strings.Contains(err.Error(), "already exists")
}
func do(appEnvObj interface{}) error {
appEnv := appEnvObj.(*appEnv)
etcdClient := getEtcdClient(appEnv)
if appEnv.Init {
if err := setClusterID(etcdClient); err != nil {
return fmt.Errorf("error connecting to etcd, if this error persists it likely indicates that kubernetes services are not working correctly. See https://github.com/pachyderm/pachyderm/blob/master/SETUP.md#pachd-or-pachd-init-crash-loop-with-error-connecting-to-etcd for more info")
}
if err := persist_server.InitDBs(fmt.Sprintf("%s:28015", appEnv.DatabaseAddress), appEnv.DatabaseName); err != nil && !isDBCreated(err) {
return err
}
return nil
}
if readinessCheck {
//c, err := client.NewInCluster()
c, err := client.NewFromAddress("127.0.0.1:650")
if err != nil {
return err
}
// We want to use a PPS API instead of a PFS API because PFS APIs
// typically talk to every node, but the point of the readiness probe
// is that it checks to see if this particular node is functioning,
// and removing it from the service if it's not. So if we use a PFS
// API such as ListRepo for readiness probe, then the failure of any
// node will result in the failures of all readiness probes, causing
// all nodes to be removed from the pachd service.
_, err = c.ListPipeline()
if err != nil {
return err
}
os.Exit(0)
return nil
}
clusterID, err := getClusterID(etcdClient)
if err != nil {
return err
}
kubeClient, err := getKubeClient(appEnv)
if err != nil {
return err
}
if appEnv.Metrics {
go metrics.ReportMetrics(clusterID, kubeClient)
}
rethinkAPIServer, err := getRethinkAPIServer(appEnv)
if err != nil {
return err
}
address, err := netutil.ExternalIP()
if err != nil {
return err
}
address = fmt.Sprintf("%s:%d", address, appEnv.Port)
sharder := shard.NewSharder(
etcdClient,
appEnv.NumShards,
appEnv.Namespace,
)
go func() {
if err := sharder.AssignRoles(address, nil); err != nil {
protolion.Printf("Error from sharder.AssignRoles: %s", err.Error())
}
}()
driver, err := drive.NewDriver(address)
if err != nil {
return err
}
apiServer := pfs_server.NewAPIServer(
pfsmodel.NewHasher(
appEnv.NumShards,
1,
),
shard.NewRouter(
sharder,
grpcutil.NewDialer(
grpc.WithInsecure(),
),
address,
),
)
go func() {
if err := sharder.RegisterFrontends(nil, address, []shard.Frontend{apiServer}); err != nil {
protolion.Printf("Error from sharder.RegisterFrontend %s", err.Error())
}
}()
internalAPIServer := pfs_server.NewInternalAPIServer(
pfsmodel.NewHasher(
appEnv.NumShards,
1,
),
shard.NewRouter(
sharder,
grpcutil.NewDialer(
grpc.WithInsecure(),
),
address,
),
driver,
)
ppsAPIServer := pps_server.NewAPIServer(
ppsserver.NewHasher(appEnv.NumShards, appEnv.NumShards),
address,
kubeClient,
getNamespace(),
)
go func() {
if err := sharder.Register(nil, address, []shard.Server{internalAPIServer, ppsAPIServer}); err != nil {
protolion.Printf("Error from sharder.Register %s", err.Error())
}
}()
blockAPIServer, err := pfs_server.NewBlockAPIServer(appEnv.StorageRoot, appEnv.StorageBackend)
if err != nil {
return err
}
return protoserver.Serve(
func(s *grpc.Server) {
pfsclient.RegisterAPIServer(s, apiServer)
pfsclient.RegisterInternalAPIServer(s, internalAPIServer)
pfsclient.RegisterBlockAPIServer(s, blockAPIServer)
ppsclient.RegisterAPIServer(s, ppsAPIServer)
ppsserver.RegisterInternalJobAPIServer(s, ppsAPIServer)
persist.RegisterAPIServer(s, rethinkAPIServer)
},
protoserver.ServeOptions{
Version: version.Version,
},
protoserver.ServeEnv{
GRPCPort: appEnv.Port,
},
)
}
func getEtcdClient(env *appEnv) discovery.Client {
return discovery.NewEtcdClient(fmt.Sprintf("http://%s:2379", env.EtcdAddress))
}
const clusterIDKey = "cluster-id"
func setClusterID(client discovery.Client) error {
return client.Set(clusterIDKey, uuid.NewWithoutDashes(), 0)
}
func getClusterID(client discovery.Client) (string, error) {
id, err := client.Get(clusterIDKey)
if err != nil {
return "", err
}
if id == "" {
return "", fmt.Errorf("clusterID not yet set")
}
return id, nil
}
func getKubeClient(env *appEnv) (*kube.Client, error) {
kubeClient, err := kube.NewInCluster()
if err != nil {
protolion.Errorf("Falling back to insecure kube client due to error from NewInCluster: %s", err.Error())
} else {
return kubeClient, err
}
config := &kube_client.Config{
Host: fmt.Sprintf("%s:443", env.KubeAddress),
Insecure: true,
}
return kube.New(config)
}
func getRethinkAPIServer(env *appEnv) (persist.APIServer, error) {
if err := persist_server.CheckDBs(fmt.Sprintf("%s:28015", env.DatabaseAddress), env.DatabaseName); err != nil {
return nil, err
}
return persist_server.NewRethinkAPIServer(fmt.Sprintf("%s:28015", env.DatabaseAddress), env.DatabaseName)
}
// getNamespace returns the kubernetes namespace that this pachd pod runs in
func getNamespace() string {
namespace := os.Getenv("PACHD_POD_NAMESPACE")
if namespace != "" {
return namespace
}
return api.NamespaceDefault
}