blob: 6ece4ce07740d4d5701d46a970ac6af55368f806 [file] [log] [blame]
package manager
import (
"context"
"crypto/ed25519"
"crypto/rand"
"errors"
"flag"
"fmt"
"os"
"strings"
"sync"
"github.com/packethost/packngo"
"golang.org/x/crypto/ssh"
"k8s.io/klog/v2"
ecl "source.monogon.dev/cloud/shepherd/equinix/wrapngo"
)
var (
NoSuchKey = errors.New("no such key")
)
// SharedConfig contains configuration options used by both the Initializer and
// Provisioner components of the Shepherd. In CLI scenarios, RegisterFlags should
// be called to configure this struct from CLI flags. Otherwise, this structure
// should be explicitly configured, as the default values are not valid.
type SharedConfig struct {
// ProjectId is the Equinix project UUID used by the manager. See Equinix API
// documentation for details. Must be set.
ProjectId string
// Label specifies the ID to use when handling the Equinix-registered SSH key
// used to authenticate to newly created servers. Must be set.
KeyLabel string
// myKey guards Key.
muKey sync.Mutex
// SSH key to use when creating machines and then connecting to them. If not
// provided, it will be automatically loaded from KeyPersistPath, and if that
// doesn't exist either, it will be first generated and persisted there.
Key ed25519.PrivateKey
// Path at which the SSH key will be loaded from and persisted to, if Key is not
// explicitly set. Either KeyPersistPath or Key must be set.
KeyPersistPath string
// Prefix applied to all devices (machines) created by the Provisioner, and used
// by the Provisioner to identify machines which it managed. Must be set.
DevicePrefix string
// configPrefix will be set to the prefix of the latest RegisterFlags call and
// will be then used by various methods to display the full name of a
// misconfigured flag.
configPrefix string
}
func (c *SharedConfig) check() error {
if c.ProjectId == "" {
return fmt.Errorf("-%sequinix_project_id must be set", c.configPrefix)
}
if c.KeyLabel == "" {
return fmt.Errorf("-%sequinix_ssh_key_label must be set", c.configPrefix)
}
if c.DevicePrefix == "" {
return fmt.Errorf("-%sequinix_device_prefix must be set", c.configPrefix)
}
return nil
}
func (k *SharedConfig) RegisterFlags(prefix string) {
k.configPrefix = prefix
flag.StringVar(&k.ProjectId, prefix+"equinix_project_id", "", "Equinix project ID where resources will be managed")
flag.StringVar(&k.KeyLabel, prefix+"equinix_ssh_key_label", "shepherd-FIXME", "Label used to identify managed SSH key in Equinix project")
flag.StringVar(&k.KeyPersistPath, prefix+"ssh_key_path", "shepherd-key.priv", "Local filesystem path to read SSH key from, and save generated key to")
flag.StringVar(&k.DevicePrefix, prefix+"equinix_device_prefix", "shepherd-FIXME-", "Prefix applied to all devices (machines) in Equinix project, used to identify managed machines")
}
// sshKey returns the SSH key as defined by the Key and KeyPersistPath options,
// loading/generating/persisting it as necessary.
func (c *SharedConfig) sshKey() (ed25519.PrivateKey, error) {
c.muKey.Lock()
defer c.muKey.Unlock()
if c.Key != nil {
return c.Key, nil
}
if c.KeyPersistPath == "" {
return nil, fmt.Errorf("-%sequinix_ssh_key_path must be set", c.configPrefix)
}
data, err := os.ReadFile(c.KeyPersistPath)
switch {
case err == nil:
if len(data) != ed25519.PrivateKeySize {
return nil, fmt.Errorf("%s is not a valid ed25519 private key", c.KeyPersistPath)
}
c.Key = data
klog.Infof("Loaded SSH key from %s", c.KeyPersistPath)
return c.Key, nil
case os.IsNotExist(err):
if err := c.sshGenerateUnlocked(); err != nil {
return nil, err
}
if err := os.WriteFile(c.KeyPersistPath, c.Key, 0400); err != nil {
return nil, fmt.Errorf("could not persist key: %w", err)
}
return c.Key, nil
default:
return nil, fmt.Errorf("could not load peristed key: %w", err)
}
}
// sshPub returns the SSH public key marshaled for use, based on sshKey.
func (c *SharedConfig) sshPub() (string, error) {
private, err := c.sshKey()
if err != nil {
return "", err
}
// Marshal the public key part in OpenSSH authorized_keys format that will be
// registered with Equinix Metal.
sshpub, err := ssh.NewPublicKey(private.Public())
if err != nil {
return "", fmt.Errorf("while building SSH public key: %w", err)
}
return string(ssh.MarshalAuthorizedKey(sshpub)), nil
}
// sshSigner builds an ssh.Signer (for use in SSH connections) based on sshKey.
func (c *SharedConfig) sshSigner() (ssh.Signer, error) {
private, err := c.sshKey()
if err != nil {
return nil, err
}
// Set up the internal ssh.Signer to be later used to initiate SSH
// connections with newly provided hosts.
signer, err := ssh.NewSignerFromKey(private)
if err != nil {
return nil, fmt.Errorf("while building SSH signer: %w", err)
}
return signer, nil
}
// sshGenerateUnlocked saves a new private key into SharedConfig.Key.
func (c *SharedConfig) sshGenerateUnlocked() error {
if c.Key != nil {
return nil
}
_, priv, err := ed25519.GenerateKey(rand.Reader)
if err != nil {
return fmt.Errorf("while generating SSH key: %w", err)
}
c.Key = priv
return nil
}
// sshEquinixGet looks up the Equinix key matching SharedConfig.KeyLabel,
// returning its packngo.SSHKey instance.
func (c *SharedConfig) sshEquinix(ctx context.Context, cl ecl.Client) (*packngo.SSHKey, error) {
ks, err := cl.ListSSHKeys(ctx)
if err != nil {
return nil, fmt.Errorf("while listing SSH keys: %w", err)
}
for _, k := range ks {
if k.Label == c.KeyLabel {
return &k, nil
}
}
return nil, NoSuchKey
}
// sshEquinixId looks up the Equinix key identified by SharedConfig.KeyLabel,
// returning its Equinix-assigned UUID.
func (c *SharedConfig) sshEquinixId(ctx context.Context, cl ecl.Client) (string, error) {
k, err := c.sshEquinix(ctx, cl)
if err != nil {
return "", err
}
return k.ID, nil
}
// sshEquinixUpdate makes sure the existing SSH key registered with Equinix
// matches the one from sshPub.
func (c *SharedConfig) sshEquinixUpdate(ctx context.Context, cl ecl.Client, kid string) error {
pub, err := c.sshPub()
if err != nil {
return err
}
_, err = cl.UpdateSSHKey(ctx, kid, &packngo.SSHKeyUpdateRequest{
Key: &pub,
})
if err != nil {
return fmt.Errorf("while updating the SSH key: %w", err)
}
return nil
}
// sshEquinixUpload registers a new SSH key from sshPub.
func (c *SharedConfig) sshEquinixUpload(ctx context.Context, cl ecl.Client) error {
pub, err := c.sshPub()
if err != nil {
return fmt.Errorf("while generating public key: %w", err)
}
_, err = cl.CreateSSHKey(ctx, &packngo.SSHKeyCreateRequest{
Label: c.KeyLabel,
Key: pub,
ProjectID: c.ProjectId,
})
if err != nil {
return fmt.Errorf("while creating an SSH key: %w", err)
}
return nil
}
// SSHEquinixEnsure initializes the locally managed SSH key (from a persistence
// path or explicitly set key) and updates or uploads it to Equinix. The key is
// generated as needed The key is generated as needed
func (c *SharedConfig) SSHEquinixEnsure(ctx context.Context, cl ecl.Client) error {
k, err := c.sshEquinix(ctx, cl)
switch err {
case NoSuchKey:
if err := c.sshEquinixUpload(ctx, cl); err != nil {
return fmt.Errorf("while uploading key: %w", err)
}
return nil
case nil:
if err := c.sshEquinixUpdate(ctx, cl, k.ID); err != nil {
return fmt.Errorf("while updating key: %w", err)
}
return nil
default:
return err
}
}
// managedDevices provides a map of device provider IDs to matching
// packngo.Device instances. It calls Equinix API's ListDevices. The returned
// devices are filtered according to DevicePrefix provided through Opts. The
// returned error value, if not nil, will originate in wrapngo.
func (c *SharedConfig) managedDevices(ctx context.Context, cl ecl.Client) (map[string]packngo.Device, error) {
ds, err := cl.ListDevices(ctx, c.ProjectId)
if err != nil {
return nil, err
}
dm := map[string]packngo.Device{}
for _, d := range ds {
if strings.HasPrefix(d.Hostname, c.DevicePrefix) {
dm[d.ID] = d
}
}
return dm, nil
}