2013-12-09 21:13:40 +00:00
|
|
|
package consul
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
"sync"
|
|
|
|
"time"
|
2015-05-08 22:57:37 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/consul/tlsutil"
|
2013-12-09 21:13:40 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// RaftLayer implements the raft.StreamLayer interface,
|
|
|
|
// so that we can use a single RPC layer for Raft and Consul
|
|
|
|
type RaftLayer struct {
|
|
|
|
// Addr is the listener address to return
|
|
|
|
addr net.Addr
|
|
|
|
|
|
|
|
// connCh is used to accept connections
|
|
|
|
connCh chan net.Conn
|
|
|
|
|
2015-05-08 22:57:37 +00:00
|
|
|
// TLS wrapper
|
|
|
|
tlsWrap tlsutil.Wrapper
|
2014-04-04 23:36:47 +00:00
|
|
|
|
2013-12-09 21:13:40 +00:00
|
|
|
// Tracks if we are closed
|
|
|
|
closed bool
|
|
|
|
closeCh chan struct{}
|
|
|
|
closeLock sync.Mutex
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewRaftLayer is used to initialize a new RaftLayer which can
|
2014-04-04 23:36:47 +00:00
|
|
|
// be used as a StreamLayer for Raft. If a tlsConfig is provided,
|
|
|
|
// then the connection will use TLS.
|
2015-05-08 22:57:37 +00:00
|
|
|
func NewRaftLayer(addr net.Addr, tlsWrap tlsutil.Wrapper) *RaftLayer {
|
2013-12-09 21:13:40 +00:00
|
|
|
layer := &RaftLayer{
|
2015-05-08 22:57:37 +00:00
|
|
|
addr: addr,
|
|
|
|
connCh: make(chan net.Conn),
|
|
|
|
tlsWrap: tlsWrap,
|
|
|
|
closeCh: make(chan struct{}),
|
2013-12-09 21:13:40 +00:00
|
|
|
}
|
|
|
|
return layer
|
|
|
|
}
|
|
|
|
|
|
|
|
// Handoff is used to hand off a connection to the
|
|
|
|
// RaftLayer. This allows it to be Accept()'ed
|
|
|
|
func (l *RaftLayer) Handoff(c net.Conn) error {
|
|
|
|
select {
|
|
|
|
case l.connCh <- c:
|
|
|
|
return nil
|
|
|
|
case <-l.closeCh:
|
|
|
|
return fmt.Errorf("Raft RPC layer closed")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Accept is used to return connection which are
|
|
|
|
// dialed to be used with the Raft layer
|
|
|
|
func (l *RaftLayer) Accept() (net.Conn, error) {
|
|
|
|
select {
|
|
|
|
case conn := <-l.connCh:
|
|
|
|
return conn, nil
|
|
|
|
case <-l.closeCh:
|
|
|
|
return nil, fmt.Errorf("Raft RPC layer closed")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close is used to stop listening for Raft connections
|
|
|
|
func (l *RaftLayer) Close() error {
|
|
|
|
l.closeLock.Lock()
|
|
|
|
defer l.closeLock.Unlock()
|
|
|
|
|
|
|
|
if !l.closed {
|
|
|
|
l.closed = true
|
|
|
|
close(l.closeCh)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Addr is used to return the address of the listener
|
|
|
|
func (l *RaftLayer) Addr() net.Addr {
|
|
|
|
return l.addr
|
|
|
|
}
|
|
|
|
|
|
|
|
// Dial is used to create a new outgoing connection
|
|
|
|
func (l *RaftLayer) Dial(address string, timeout time.Duration) (net.Conn, error) {
|
2013-12-09 22:29:20 +00:00
|
|
|
conn, err := net.DialTimeout("tcp", address, timeout)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2014-04-04 23:36:47 +00:00
|
|
|
// Check for tls mode
|
2015-05-08 22:57:37 +00:00
|
|
|
if l.tlsWrap != nil {
|
2014-04-04 23:36:47 +00:00
|
|
|
// Switch the connection into TLS mode
|
|
|
|
if _, err := conn.Write([]byte{byte(rpcTLS)}); err != nil {
|
|
|
|
conn.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wrap the connection in a TLS client
|
2015-05-08 22:57:37 +00:00
|
|
|
conn, err = l.tlsWrap(conn)
|
2014-06-22 19:49:51 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2014-04-04 23:36:47 +00:00
|
|
|
}
|
|
|
|
|
2013-12-09 22:29:20 +00:00
|
|
|
// Write the Raft byte to set the mode
|
2014-01-10 20:09:19 +00:00
|
|
|
_, err = conn.Write([]byte{byte(rpcRaft)})
|
|
|
|
if err != nil {
|
|
|
|
conn.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
2013-12-09 22:29:20 +00:00
|
|
|
return conn, err
|
2013-12-09 21:13:40 +00:00
|
|
|
}
|