blob: 0f6ebd15e05a7a4b1b761a7a38d4a0c395fd3cab [file] [log] [blame]
Lorenz Brunae0d90d2019-09-05 17:53:56 +02001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package main
18
19import (
Serge Bazanskicdb8c782020-02-17 12:34:02 +010020 "context"
Serge Bazanski57b43752020-07-13 19:17:48 +020021 "crypto/ed25519"
22 "crypto/rand"
23 "crypto/x509"
Lorenz Brundd8c80e2019-10-07 16:19:49 +020024 "fmt"
Serge Bazanski1ebd1e12020-07-13 19:17:16 +020025 "log"
Serge Bazanski57b43752020-07-13 19:17:48 +020026 "math/big"
Serge Bazanski1ebd1e12020-07-13 19:17:16 +020027 "net"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020028 "os"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020029 "os/signal"
Lorenz Brunf95909d2019-09-11 19:48:26 +020030 "runtime/debug"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020031
Lorenz Brunae0d90d2019-09-05 17:53:56 +020032 "golang.org/x/sys/unix"
Serge Bazanski1ebd1e12020-07-13 19:17:16 +020033 "google.golang.org/grpc"
34
Serge Bazanski31370b02021-01-07 16:31:14 +010035 common "source.monogon.dev/metropolis/node"
36 "source.monogon.dev/metropolis/node/core/cluster"
37 "source.monogon.dev/metropolis/node/core/localstorage"
38 "source.monogon.dev/metropolis/node/core/localstorage/declarative"
39 "source.monogon.dev/metropolis/node/core/network"
40 "source.monogon.dev/metropolis/node/core/network/dns"
41 "source.monogon.dev/metropolis/node/kubernetes"
42 "source.monogon.dev/metropolis/node/kubernetes/containerd"
43 "source.monogon.dev/metropolis/node/kubernetes/pki"
44 "source.monogon.dev/metropolis/pkg/logtree"
45 "source.monogon.dev/metropolis/pkg/supervisor"
46 "source.monogon.dev/metropolis/pkg/tpm"
47 apb "source.monogon.dev/metropolis/proto/api"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020048)
49
Serge Bazanski1ebd1e12020-07-13 19:17:16 +020050var (
51 // kubernetesConfig is the static/global part of the Kubernetes service configuration. In the future, this might
52 // be configurable by loading it from the EnrolmentConfig. Fow now, it's static and same across all clusters.
53 kubernetesConfig = kubernetes.Config{
54 ServiceIPRange: net.IPNet{ // TODO(q3k): Decide if configurable / final value
Lorenz Brunca24cfa2020-08-18 13:49:37 +020055 IP: net.IP{10, 0, 255, 1},
Serge Bazanski1ebd1e12020-07-13 19:17:16 +020056 Mask: net.IPMask{0xff, 0xff, 0xff, 0x00}, // /24, but Go stores as a literal mask
57 },
58 ClusterNet: net.IPNet{
59 IP: net.IP{10, 0, 0, 0},
60 Mask: net.IPMask{0xff, 0xff, 0x00, 0x00}, // /16
61 },
62 }
Leopold Schabela4516f92019-12-04 20:27:05 +000063)
64
Lorenz Brunae0d90d2019-09-05 17:53:56 +020065func main() {
Lorenz Brunf95909d2019-09-11 19:48:26 +020066 defer func() {
67 if r := recover(); r != nil {
68 fmt.Println("Init panicked:", r)
69 debug.PrintStack()
70 }
71 unix.Sync()
Leopold Schabel68c58752019-11-14 21:00:59 +010072 // TODO(lorenz): Switch this to Reboot when init panics are less likely
73 // Best effort, nothing we can do if this fails except printing the error to the console.
74 if err := unix.Reboot(unix.LINUX_REBOOT_CMD_POWER_OFF); err != nil {
75 panic(fmt.Sprintf("failed to halt node: %v\n", err))
76 }
Lorenz Brunf95909d2019-09-11 19:48:26 +020077 }()
Serge Bazanskic7359672020-10-30 16:38:57 +010078
Serge Bazanski662b5b32020-12-21 13:49:00 +010079 // Set up logger for Metropolis. Currently logs everything to stderr.
Serge Bazanskic7359672020-10-30 16:38:57 +010080 lt := logtree.New()
81 reader, err := lt.Read("", logtree.WithChildren(), logtree.WithStream())
Lorenz Brunae0d90d2019-09-05 17:53:56 +020082 if err != nil {
Serge Bazanskic7359672020-10-30 16:38:57 +010083 panic(fmt.Errorf("could not set up root log reader: %v", err))
Lorenz Brunae0d90d2019-09-05 17:53:56 +020084 }
Serge Bazanskic7359672020-10-30 16:38:57 +010085 go func() {
86 for {
87 p := <-reader.Stream
Serge Bazanskib0272182020-11-02 18:39:44 +010088 fmt.Fprintf(os.Stderr, "%s\n", p.String())
Serge Bazanskic7359672020-10-30 16:38:57 +010089 }
90 }()
91
92 // Initial logger. Used until we get to a supervisor.
93 logger := lt.MustLeveledFor("init")
Serge Bazanski581b0bd2020-03-12 13:36:43 +010094
Lorenz Brun3a99c592021-01-26 19:57:21 +010095 // Set up basic mounts
96 err = setupMounts(logger)
Serge Bazanski581b0bd2020-03-12 13:36:43 +010097 if err != nil {
Lorenz Brun3a99c592021-01-26 19:57:21 +010098 panic(fmt.Errorf("could not set up basic mounts: %w", err))
Serge Bazanski581b0bd2020-03-12 13:36:43 +010099 }
100
Lorenz Brun878f5f92020-05-12 16:15:39 +0200101 // Linux kernel default is 4096 which is far too low. Raise it to 1M which is what gVisor suggests.
102 if err := unix.Setrlimit(unix.RLIMIT_NOFILE, &unix.Rlimit{Cur: 1048576, Max: 1048576}); err != nil {
Serge Bazanskic7359672020-10-30 16:38:57 +0100103 logger.Fatalf("Failed to raise rlimits: %v", err)
Lorenz Brun878f5f92020-05-12 16:15:39 +0200104 }
105
Serge Bazanski662b5b32020-12-21 13:49:00 +0100106 logger.Info("Starting Metropolis node init")
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200107
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200108 signalChannel := make(chan os.Signal, 2)
109 signal.Notify(signalChannel)
110
Serge Bazanskic7359672020-10-30 16:38:57 +0100111 if err := tpm.Initialize(logger); err != nil {
112 logger.Fatalf("Failed to initialize TPM 2.0: %v", err)
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200113 }
114
Lorenz Brunfa5c2fc2020-09-28 13:32:12 +0200115 corednsRegistrationChan := make(chan *dns.ExtraDirective)
116
117 networkSvc := network.New(network.Config{CorednsRegistrationChan: corednsRegistrationChan})
Leopold Schabel68c58752019-11-14 21:00:59 +0100118
Lorenz Brun70f65b22020-07-08 17:02:47 +0200119 // This function initializes a headless Delve if this is a debug build or does nothing if it's not
120 initializeDebugger(networkSvc)
121
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200122 // Prepare local storage.
123 root := &localstorage.Root{}
124 if err := declarative.PlaceFS(root, "/"); err != nil {
125 panic(fmt.Errorf("when placing root FS: %w", err))
126 }
127
128 // trapdoor is a channel used to signal to the init service that a very low-level, unrecoverable failure
129 // occured. This causes a GURU MEDITATION ERROR visible to the end user.
130 trapdoor := make(chan struct{})
131
132 // Make context for supervisor. We cancel it when we reach the trapdoor.
133 ctxS, ctxC := context.WithCancel(context.Background())
134
135 // Start root initialization code as a supervisor one-shot runnable. This means waiting for the network, starting
136 // the cluster manager, and then starting all services related to the node's roles.
137 // TODO(q3k): move this to a separate 'init' service.
Serge Bazanskic7359672020-10-30 16:38:57 +0100138 supervisor.New(ctxS, func(ctx context.Context) error {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200139 logger := supervisor.Logger(ctx)
140
141 // Start storage and network - we need this to get anything else done.
142 if err := root.Start(ctx); err != nil {
143 return fmt.Errorf("cannot start root FS: %w", err)
144 }
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100145 if err := supervisor.Run(ctx, "network", networkSvc.Run); err != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200146 return fmt.Errorf("when starting network: %w", err)
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100147 }
Lorenz Brunf95909d2019-09-11 19:48:26 +0200148
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200149 // Wait for IP address from network.
150 ip, err := networkSvc.GetIP(ctx, true)
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100151 if err != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200152 return fmt.Errorf("when waiting for IP address: %w", err)
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100153 }
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200154
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200155 // Start cluster manager. This kicks off cluster membership machinery, which will either start
156 // a new cluster, enroll into one or join one.
157 m := cluster.NewManager(root, networkSvc)
158 if err := supervisor.Run(ctx, "enrolment", m.Run); err != nil {
159 return fmt.Errorf("when starting enrolment: %w", err)
160 }
161
162 // Wait until the cluster manager settles.
163 success := m.WaitFinished()
164 if !success {
165 close(trapdoor)
166 return fmt.Errorf("enrolment failed, aborting")
167 }
168
169 // We are now in a cluster. We can thus access our 'node' object and start all services that
170 // we should be running.
171
172 node := m.Node()
Lorenz Brun3a99c592021-01-26 19:57:21 +0100173 if err := node.ConfigureLocalHostname(&root.Ephemeral); err != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200174 close(trapdoor)
175 return fmt.Errorf("failed to set local hostname: %w", err)
176 }
177
178 logger.Info("Enrolment success, continuing startup.")
179 logger.Info(fmt.Sprintf("This node (%s) has roles:", node.String()))
180 if cm := node.ConsensusMember(); cm != nil {
181 // There's no need to start anything for when we are a consensus member - the cluster
182 // manager does this for us if necessary (as creating/enrolling/joining a cluster is
183 // pretty tied into cluster lifecycle management).
184 logger.Info(fmt.Sprintf(" - etcd consensus member"))
185 }
186 if kw := node.KubernetesWorker(); kw != nil {
187 logger.Info(fmt.Sprintf(" - kubernetes worker"))
188 }
189
190 // If we're supposed to be a kubernetes worker, start kubernetes services and containerd.
191 // In the future, this might be split further into kubernetes control plane and data plane
192 // roles.
193 var containerdSvc *containerd.Service
194 var kubeSvc *kubernetes.Service
195 if kw := node.KubernetesWorker(); kw != nil {
196 logger.Info("Starting Kubernetes worker services...")
197
198 // Ensure Kubernetes PKI objects exist in etcd.
199 kpkiKV := m.ConsensusKV("cluster", "kpki")
Serge Bazanski9411f7c2021-03-10 13:12:53 +0100200 kpki := pki.New(lt.MustLeveledFor("pki.kubernetes"), kpkiKV)
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200201 if err := kpki.EnsureAll(ctx); err != nil {
202 return fmt.Errorf("failed to ensure kubernetes PKI present: %w", err)
203 }
204
205 containerdSvc = &containerd.Service{
206 EphemeralVolume: &root.Ephemeral.Containerd,
207 }
208 if err := supervisor.Run(ctx, "containerd", containerdSvc.Run); err != nil {
209 return fmt.Errorf("failed to start containerd service: %w", err)
210 }
211
212 kubernetesConfig.KPKI = kpki
213 kubernetesConfig.Root = root
214 kubernetesConfig.AdvertiseAddress = *ip
Lorenz Brunfa5c2fc2020-09-28 13:32:12 +0200215 kubernetesConfig.CorednsRegistrationChan = corednsRegistrationChan
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200216 kubeSvc = kubernetes.New(kubernetesConfig)
217 if err := supervisor.Run(ctx, "kubernetes", kubeSvc.Run); err != nil {
218 return fmt.Errorf("failed to start kubernetes service: %w", err)
219 }
220
221 }
222
223 // Start the node debug service.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200224 dbg := &debugService{
225 cluster: m,
Serge Bazanskib0272182020-11-02 18:39:44 +0100226 logtree: lt,
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200227 kubernetes: kubeSvc,
228 }
229 dbgSrv := grpc.NewServer()
230 apb.RegisterNodeDebugServiceServer(dbgSrv, dbg)
231 dbgLis, err := net.Listen("tcp", fmt.Sprintf(":%d", common.DebugServicePort))
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100232 if err != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200233 return fmt.Errorf("failed to listen on debug service: %w", err)
234 }
235 if err := supervisor.Run(ctx, "debug", supervisor.GRPCServer(dbgSrv, dbgLis, false)); err != nil {
236 return fmt.Errorf("failed to start debug service: %w", err)
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100237 }
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200238
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100239 supervisor.Signal(ctx, supervisor.SignalHealthy)
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200240 supervisor.Signal(ctx, supervisor.SignalDone)
241 return nil
Serge Bazanskic7359672020-10-30 16:38:57 +0100242 }, supervisor.WithExistingLogtree(lt))
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100243
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200244 // We're PID1, so orphaned processes get reparented to us to clean up
245 for {
246 select {
247 case <-trapdoor:
248 // If the trapdoor got closed, we got stuck early enough in the boot process that we can't do anything about
249 // it. Display a generic error message until we handle error conditions better.
250 ctxC()
251 log.Printf(" ########################")
252 log.Printf(" # GURU MEDIATION ERROR #")
253 log.Printf(" ########################")
254 log.Printf("")
Serge Bazanski662b5b32020-12-21 13:49:00 +0100255 log.Printf("Metropolis encountered an uncorrectable error and this node must be")
256 log.Printf("restarted.")
257 log.Printf("")
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200258 log.Printf("(Error condition: init trapdoor closed)")
259 log.Printf("")
260 select {}
261
262 case sig := <-signalChannel:
263 switch sig {
264 case unix.SIGCHLD:
265 var status unix.WaitStatus
266 var rusage unix.Rusage
267 for {
268 res, err := unix.Wait4(-1, &status, unix.WNOHANG, &rusage)
269 if err != nil && err != unix.ECHILD {
Serge Bazanskic7359672020-10-30 16:38:57 +0100270 logger.Errorf("Failed to wait on orphaned child: %v", err)
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200271 break
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100272 }
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200273 if res <= 0 {
274 break
275 }
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200276 }
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200277 case unix.SIGURG:
278 // Go 1.14 introduced asynchronous preemption, which uses SIGURG.
279 // In order not to break backwards compatibility in the unlikely case
280 // of an application actually using SIGURG on its own, they're not filtering them.
281 // (https://github.com/golang/go/issues/37942)
Serge Bazanskic7359672020-10-30 16:38:57 +0100282 logger.V(5).Info("Ignoring SIGURG")
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200283 // TODO(lorenz): We can probably get more than just SIGCHLD as init, but I can't think
284 // of any others right now, just log them in case we hit any of them.
285 default:
Serge Bazanskic7359672020-10-30 16:38:57 +0100286 logger.Warningf("Got unexpected signal %s", sig.String())
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200287 }
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200288 }
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200289 }
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200290}
Serge Bazanski57b43752020-07-13 19:17:48 +0200291
292// nodeCertificate creates a node key/certificate for a foreign node. This is duplicated code with localstorage's
293// PKIDirectory EnsureSelfSigned, but is temporary (and specific to 'golden tickets').
294func (s *debugService) nodeCertificate() (cert, key []byte, err error) {
295 pubKey, privKey, err := ed25519.GenerateKey(rand.Reader)
296 if err != nil {
297 err = fmt.Errorf("failed to generate key: %w", err)
298 return
299 }
300
301 key, err = x509.MarshalPKCS8PrivateKey(privKey)
302 if err != nil {
303 err = fmt.Errorf("failed to marshal key: %w", err)
304 return
305 }
306
307 serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 127)
308 serialNumber, err := rand.Int(rand.Reader, serialNumberLimit)
309 if err != nil {
310 err = fmt.Errorf("failed to generate serial number: %w", err)
311 return
312 }
313
314 template := localstorage.CertificateForNode(pubKey)
315 template.SerialNumber = serialNumber
316
317 cert, err = x509.CreateCertificate(rand.Reader, &template, &template, pubKey, privKey)
318 if err != nil {
319 err = fmt.Errorf("could not sign certificate: %w", err)
320 return
321 }
322 return
323}