blob: 583e2686d1482d90c7bc42b88c2f904b72d60ace [file] [log] [blame]
Lorenz Brun6e8f69c2019-11-18 10:44:24 +01001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package kubernetes
18
19import (
20 "context"
21 "encoding/pem"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010022 "fmt"
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020023 "io"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010024 "net"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010025 "os/exec"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010026
Serge Bazanski77cb6c52020-12-19 00:09:22 +010027 common "git.monogon.dev/source/nexantic.git/metropolis/node"
28 "git.monogon.dev/source/nexantic.git/metropolis/node/common/fileargs"
29 "git.monogon.dev/source/nexantic.git/metropolis/node/common/supervisor"
30 "git.monogon.dev/source/nexantic.git/metropolis/node/core/localstorage"
31 "git.monogon.dev/source/nexantic.git/metropolis/node/kubernetes/pki"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010032)
33
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020034type apiserverService struct {
35 KPKI *pki.KubernetesPKI
36 AdvertiseAddress net.IP
37 ServiceIPRange net.IPNet
38 Output io.Writer
39 EphemeralConsensusDirectory *localstorage.EphemeralConsensusDirectory
40
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010041 // All PKI-related things are in DER
42 idCA []byte
43 kubeletClientCert []byte
44 kubeletClientKey []byte
45 aggregationCA []byte
46 aggregationClientCert []byte
47 aggregationClientKey []byte
48 serviceAccountPrivKey []byte // In PKIX form
49 serverCert []byte
50 serverKey []byte
51}
52
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020053func (s *apiserverService) loadPKI(ctx context.Context) error {
Serge Bazanskidbfc6382020-06-19 20:35:43 +020054 for _, el := range []struct {
55 targetCert *[]byte
56 targetKey *[]byte
57 name pki.KubeCertificateName
58 }{
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020059 {&s.idCA, nil, pki.IdCA},
60 {&s.kubeletClientCert, &s.kubeletClientKey, pki.KubeletClient},
61 {&s.aggregationCA, nil, pki.AggregationCA},
62 {&s.aggregationClientCert, &s.aggregationClientKey, pki.FrontProxyClient},
63 {&s.serverCert, &s.serverKey, pki.APIServer},
Serge Bazanskidbfc6382020-06-19 20:35:43 +020064 } {
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020065 cert, key, err := s.KPKI.Certificate(ctx, el.name)
Serge Bazanskidbfc6382020-06-19 20:35:43 +020066 if err != nil {
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020067 return fmt.Errorf("could not load certificate %q from PKI: %w", el.name, err)
Serge Bazanskidbfc6382020-06-19 20:35:43 +020068 }
69 if el.targetCert != nil {
70 *el.targetCert = cert
71 }
72 if el.targetKey != nil {
73 *el.targetKey = key
74 }
75 }
76
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010077 var err error
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020078 s.serviceAccountPrivKey, err = s.KPKI.ServiceAccountKey(ctx)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010079 if err != nil {
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020080 return fmt.Errorf("could not load serviceaccount privkey: %w", err)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010081 }
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020082 return nil
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010083}
84
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020085func (s *apiserverService) Run(ctx context.Context) error {
86 if err := s.loadPKI(ctx); err != nil {
87 return fmt.Errorf("loading PKI data failed: %w", err)
88 }
89 args, err := fileargs.New()
90 if err != nil {
91 panic(err) // If this fails, something is very wrong. Just crash.
92 }
93 defer args.Close()
94
95 cmd := exec.CommandContext(ctx, "/kubernetes/bin/kube", "kube-apiserver",
96 fmt.Sprintf("--advertise-address=%v", s.AdvertiseAddress.String()),
97 "--authorization-mode=Node,RBAC",
98 args.FileOpt("--client-ca-file", "client-ca.pem",
99 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: s.idCA})),
100 "--enable-admission-plugins=NodeRestriction,PodSecurityPolicy",
101 "--enable-aggregator-routing=true",
102 "--insecure-port=0",
103 fmt.Sprintf("--secure-port=%v", common.KubernetesAPIPort),
104 fmt.Sprintf("--etcd-servers=unix:///%s:0", s.EphemeralConsensusDirectory.ClientSocket.FullPath()),
105 args.FileOpt("--kubelet-client-certificate", "kubelet-client-cert.pem",
106 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: s.kubeletClientCert})),
107 args.FileOpt("--kubelet-client-key", "kubelet-client-key.pem",
108 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: s.kubeletClientKey})),
109 "--kubelet-preferred-address-types=InternalIP",
110 args.FileOpt("--proxy-client-cert-file", "aggregation-client-cert.pem",
111 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: s.aggregationClientCert})),
112 args.FileOpt("--proxy-client-key-file", "aggregation-client-key.pem",
113 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: s.aggregationClientKey})),
114 "--requestheader-allowed-names=front-proxy-client",
115 args.FileOpt("--requestheader-client-ca-file", "aggregation-ca.pem",
116 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: s.aggregationCA})),
117 "--requestheader-extra-headers-prefix=X-Remote-Extra-",
118 "--requestheader-group-headers=X-Remote-Group",
119 "--requestheader-username-headers=X-Remote-User",
120 args.FileOpt("--service-account-key-file", "service-account-pubkey.pem",
121 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: s.serviceAccountPrivKey})),
122 fmt.Sprintf("--service-cluster-ip-range=%v", s.ServiceIPRange.String()),
123 args.FileOpt("--tls-cert-file", "server-cert.pem",
124 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: s.serverCert})),
125 args.FileOpt("--tls-private-key-file", "server-key.pem",
126 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: s.serverKey})),
127 )
128 if args.Error() != nil {
Lorenz Brun6e8f69c2019-11-18 10:44:24 +0100129 return err
130 }
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200131 cmd.Stdout = s.Output
132 cmd.Stderr = s.Output
133 supervisor.Signal(ctx, supervisor.SignalHealthy)
134 err = cmd.Run()
135 fmt.Fprintf(s.Output, "apiserver stopped: %v\n", err)
136 return err
Lorenz Brun6e8f69c2019-11-18 10:44:24 +0100137}