| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 1 | package main |
| 2 | |
| 3 | import ( |
| 4 | "context" |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 5 | "log" |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 6 | "os" |
| Lorenz Brun | 20d1dd1 | 2022-07-01 12:21:42 +0000 | [diff] [blame] | 7 | "os/exec" |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 8 | |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 9 | "github.com/spf13/cobra" |
| Serge Bazanski | 925ec3d | 2024-02-05 14:38:20 +0100 | [diff] [blame] | 10 | "google.golang.org/grpc" |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 11 | |
| Mateusz Zalega | 18a67b0 | 2022-08-02 13:37:50 +0200 | [diff] [blame] | 12 | "source.monogon.dev/metropolis/cli/metroctl/core" |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 13 | clicontext "source.monogon.dev/metropolis/cli/pkg/context" |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 14 | "source.monogon.dev/metropolis/node/core/rpc" |
| Serge Bazanski | 925ec3d | 2024-02-05 14:38:20 +0100 | [diff] [blame] | 15 | "source.monogon.dev/metropolis/node/core/rpc/resolver" |
| Serge Bazanski | dc1bec4 | 2021-12-16 17:38:53 +0100 | [diff] [blame] | 16 | apb "source.monogon.dev/metropolis/proto/api" |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 17 | ) |
| 18 | |
| 19 | var takeownershipCommand = &cobra.Command{ |
| Mateusz Zalega | b1e7ee4 | 2022-07-08 12:19:02 +0200 | [diff] [blame] | 20 | Use: "takeownership", |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 21 | Short: "Takes ownership of a new Metropolis cluster", |
| 22 | Long: `This takes ownership of a new Metropolis cluster by asking the new |
| 23 | cluster to issue an owner certificate to for the owner key generated by a |
| Mateusz Zalega | b1e7ee4 | 2022-07-08 12:19:02 +0200 | [diff] [blame] | 24 | previous invocation of metroctl install on this machine. A single cluster |
| 25 | endpoint must be provided with the --endpoints parameter.`, |
| 26 | Args: cobra.ExactArgs(0), |
| 27 | Run: doTakeOwnership, |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 28 | } |
| 29 | |
| Mateusz Zalega | b1e7ee4 | 2022-07-08 12:19:02 +0200 | [diff] [blame] | 30 | func doTakeOwnership(cmd *cobra.Command, _ []string) { |
| 31 | if len(flags.clusterEndpoints) != 1 { |
| 32 | log.Fatalf("takeownership requires a single cluster endpoint to be provided with the --endpoints parameter.") |
| 33 | } |
| Serge Bazanski | 7eeef0f | 2024-02-05 14:40:15 +0100 | [diff] [blame] | 34 | ctx := clicontext.WithInterrupt(context.Background()) |
| 35 | |
| 36 | ca, err := core.GetClusterCAWithTOFU(ctx, connectOptions()) |
| 37 | if err != nil { |
| 38 | log.Fatalf("Could not retrieve cluster CA: %v", err) |
| 39 | } |
| Mateusz Zalega | b1e7ee4 | 2022-07-08 12:19:02 +0200 | [diff] [blame] | 40 | |
| Mateusz Zalega | 1846450 | 2022-07-14 16:18:26 +0200 | [diff] [blame] | 41 | // Retrieve the cluster owner's private key, and use it to construct |
| 42 | // ephemeral credentials. Then, dial the cluster. |
| Serge Bazanski | cf23ebc | 2023-03-14 17:02:04 +0100 | [diff] [blame] | 43 | opk, err := core.GetOwnerKey(flags.configPath) |
| 44 | if err == core.NoCredentialsError { |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 45 | log.Fatalf("Owner key does not exist. takeownership needs to be executed on the same system that has previously installed the cluster using metroctl install.") |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 46 | } |
| Mateusz Zalega | 1846450 | 2022-07-14 16:18:26 +0200 | [diff] [blame] | 47 | if err != nil { |
| 48 | log.Fatalf("Couldn't get owner's key: %v", err) |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 49 | } |
| Serge Bazanski | 925ec3d | 2024-02-05 14:38:20 +0100 | [diff] [blame] | 50 | opts, err := core.DialOpts(ctx, connectOptions()) |
| 51 | if err != nil { |
| 52 | log.Fatalf("While configuring cluster dial opts: %v", err) |
| 53 | } |
| Serge Bazanski | 7eeef0f | 2024-02-05 14:40:15 +0100 | [diff] [blame] | 54 | creds, err := rpc.NewEphemeralCredentials(opk, rpc.WantRemoteCluster(ca)) |
| Serge Bazanski | 925ec3d | 2024-02-05 14:38:20 +0100 | [diff] [blame] | 55 | if err != nil { |
| 56 | log.Fatalf("While generating ephemeral credentials: %v", err) |
| 57 | } |
| 58 | opts = append(opts, grpc.WithTransportCredentials(creds)) |
| 59 | |
| 60 | cc, err := grpc.Dial(resolver.MetropolisControlAddress, opts...) |
| Mateusz Zalega | 1846450 | 2022-07-14 16:18:26 +0200 | [diff] [blame] | 61 | if err != nil { |
| 62 | log.Fatalf("While dialing the cluster: %v", err) |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 63 | } |
| Mateusz Zalega | 1846450 | 2022-07-14 16:18:26 +0200 | [diff] [blame] | 64 | aaa := apb.NewAAAClient(cc) |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 65 | |
| Mateusz Zalega | 1846450 | 2022-07-14 16:18:26 +0200 | [diff] [blame] | 66 | ownerCert, err := rpc.RetrieveOwnerCertificate(ctx, aaa, opk) |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 67 | if err != nil { |
| 68 | log.Fatalf("Failed to retrive owner certificate from cluster: %v", err) |
| 69 | } |
| Serge Bazanski | 925ec3d | 2024-02-05 14:38:20 +0100 | [diff] [blame] | 70 | |
| Serge Bazanski | cf23ebc | 2023-03-14 17:02:04 +0100 | [diff] [blame] | 71 | if err := core.WriteOwnerCertificate(flags.configPath, ownerCert.Certificate[0]); err != nil { |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 72 | log.Printf("Failed to store retrieved owner certificate: %v", err) |
| 73 | log.Fatalln("Sorry, the cluster has been lost as taking ownership cannot be repeated. Fix the reason the file couldn't be written and reinstall the node.") |
| 74 | } |
| Lorenz Brun | 20d1dd1 | 2022-07-01 12:21:42 +0000 | [diff] [blame] | 75 | log.Print("Successfully retrieved owner credentials! You now own this cluster. Setting up kubeconfig now...") |
| 76 | |
| Lorenz Brun | 20d1dd1 | 2022-07-01 12:21:42 +0000 | [diff] [blame] | 77 | // If the user has metroctl in their path, use the metroctl from path as |
| 78 | // a credential plugin. Otherwise use the path to the currently-running |
| 79 | // metroctl. |
| 80 | metroctlPath := "metroctl" |
| 81 | if _, err := exec.LookPath("metroctl"); err != nil { |
| 82 | metroctlPath, err = os.Executable() |
| 83 | if err != nil { |
| 84 | log.Fatalf("Failed to create kubectl entry as metroctl is neither in PATH nor can its absolute path be determined: %v", err) |
| 85 | } |
| 86 | } |
| Serge Bazanski | 1f8cad7 | 2023-03-20 16:58:10 +0100 | [diff] [blame] | 87 | // TODO(q3k, issues/144): this only works as long as all nodes are kubernetes controller |
| 88 | // nodes. This won't be the case for too long. Figure this out. |
| Tim Windelschmidt | b37d7d8 | 2023-06-14 19:06:44 +0200 | [diff] [blame] | 89 | configName := "metroctl" |
| Serge Bazanski | 568c38c | 2024-02-05 14:40:39 +0100 | [diff] [blame^] | 90 | if err := core.InstallKubeletConfig(ctx, metroctlPath, connectOptions(), configName, flags.clusterEndpoints[0]); err != nil { |
| Serge Bazanski | cf23ebc | 2023-03-14 17:02:04 +0100 | [diff] [blame] | 91 | log.Fatalf("Failed to install metroctl/k8s integration: %v", err) |
| Lorenz Brun | 20d1dd1 | 2022-07-01 12:21:42 +0000 | [diff] [blame] | 92 | } |
| Tim Windelschmidt | b37d7d8 | 2023-06-14 19:06:44 +0200 | [diff] [blame] | 93 | log.Printf("Success! kubeconfig is set up. You can now run kubectl --context=%s ... to access the Kubernetes cluster.", configName) |
| Lorenz Brun | a9b455f | 2021-12-07 03:53:22 +0100 | [diff] [blame] | 94 | } |
| 95 | |
| 96 | func init() { |
| 97 | rootCmd.AddCommand(takeownershipCommand) |
| 98 | } |