blob: b1fdfc6dbe43c2f7d6e21eb538017a14e51b6801 [file] [log] [blame]
Lorenz Brun6e8f69c2019-11-18 10:44:24 +01001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package kubernetes
18
19import (
Lorenz Brun878f5f92020-05-12 16:15:39 +020020 "context"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010021 "encoding/pem"
22 "fmt"
23 "net"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010024 "os/exec"
25
Serge Bazanski31370b02021-01-07 16:31:14 +010026 "source.monogon.dev/metropolis/node/kubernetes/pki"
Tim Windelschmidt9f21f532024-05-07 15:14:20 +020027 "source.monogon.dev/osbase/fileargs"
28 "source.monogon.dev/osbase/supervisor"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010029)
30
31type controllerManagerConfig struct {
32 clusterNet net.IPNet
Lorenz Brun6211e4d2023-11-14 19:09:40 +010033 serviceNet net.IPNet
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010034 // All PKI-related things are in DER
35 kubeConfig []byte
36 rootCA []byte
37 serviceAccountPrivKey []byte // In PKCS#8 form
38 serverCert []byte
39 serverKey []byte
40}
41
Serge Bazanski9411f7c2021-03-10 13:12:53 +010042func getPKIControllerManagerConfig(ctx context.Context, kpki *pki.PKI) (*controllerManagerConfig, error) {
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010043 var config controllerManagerConfig
44 var err error
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020045 config.rootCA, _, err = kpki.Certificate(ctx, pki.IdCA)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010046 if err != nil {
47 return nil, fmt.Errorf("failed to get ID root CA: %w", err)
48 }
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020049 config.serverCert, config.serverKey, err = kpki.Certificate(ctx, pki.ControllerManager)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010050 if err != nil {
51 return nil, fmt.Errorf("failed to get controller-manager serving certificate: %w", err)
52 }
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020053 config.serviceAccountPrivKey, err = kpki.ServiceAccountKey(ctx)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010054 if err != nil {
55 return nil, fmt.Errorf("failed to get serviceaccount privkey: %w", err)
56 }
Serge Bazanskie88ffe92023-03-21 13:38:46 +010057 config.kubeConfig, err = kpki.Kubeconfig(ctx, pki.ControllerManagerClient, pki.KubernetesAPIEndpointForController)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010058 if err != nil {
59 return nil, fmt.Errorf("failed to get controller-manager kubeconfig: %w", err)
60 }
61 return &config, nil
62}
63
Serge Bazanski967be212020-11-02 11:26:59 +010064func runControllerManager(config controllerManagerConfig) supervisor.Runnable {
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020065 return func(ctx context.Context) error {
66 args, err := fileargs.New()
67 if err != nil {
68 panic(err) // If this fails, something is very wrong. Just crash.
69 }
70 defer args.Close()
71
72 cmd := exec.CommandContext(ctx, "/kubernetes/bin/kube", "kube-controller-manager",
73 args.FileOpt("--kubeconfig", "kubeconfig", config.kubeConfig),
74 args.FileOpt("--service-account-private-key-file", "service-account-privkey.pem",
75 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.serviceAccountPrivKey})),
76 args.FileOpt("--root-ca-file", "root-ca.pem",
77 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.rootCA})),
Tim Windelschmidt90613af2023-07-20 14:26:18 +020078 args.FileOpt("--client-ca-file", "root-ca.pem",
79 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.rootCA})),
Jan Schärd5d33ba2024-05-15 11:45:35 +020080 "--use-service-account-credentials=true",
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020081 fmt.Sprintf("--cluster-cidr=%v", config.clusterNet.String()),
Lorenz Brun6211e4d2023-11-14 19:09:40 +010082 fmt.Sprintf("--service-cluster-ip-range=%v", config.serviceNet.String()),
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020083 args.FileOpt("--tls-cert-file", "server-cert.pem",
84 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.serverCert})),
85 args.FileOpt("--tls-private-key-file", "server-key.pem",
86 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.serverKey})),
Lorenz Brunf042e6f2020-06-24 16:46:09 +020087 "--allocate-node-cidrs",
Lorenz Brun6211e4d2023-11-14 19:09:40 +010088 // Disables unused cloud control loops and prevents warnings.
89 "--cloud-provider=external",
90 "--controllers=*,-certificatesigningrequest-signing-controller",
91 // This is intentionally empty, but if unset it tries to mkdir it
92 // in the usual place, generating an error.
93 "--flex-volume-plugin-dir=/kubernetes/conf/flexvolume-plugins",
Lorenz Brund58edf42024-11-27 20:38:14 +000094 extraFeatureGates.AsFlag(),
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020095 )
Lorenz Brunf042e6f2020-06-24 16:46:09 +020096
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020097 if args.Error() != nil {
98 return fmt.Errorf("failed to use fileargs: %w", err)
99 }
Serge Bazanski05604292021-03-12 17:47:21 +0100100 return supervisor.RunCommand(ctx, cmd, supervisor.ParseKLog())
Lorenz Brun6e8f69c2019-11-18 10:44:24 +0100101 }
Lorenz Brun6e8f69c2019-11-18 10:44:24 +0100102}