blob: b5bab3d2c8935b5820ace92b2c12924e65c28f01 [file] [log] [blame]
Lorenz Brun6e8f69c2019-11-18 10:44:24 +01001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package kubernetes
18
19import (
20 "context"
21 "encoding/pem"
22 "errors"
23 "fmt"
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020024 "io"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010025 "net"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010026 "os/exec"
27 "path"
28
Lorenz Brunfc5dbc62020-05-28 12:18:07 +020029 "git.monogon.dev/source/nexantic.git/core/internal/common"
Serge Bazanski5a091422020-06-22 14:01:45 +020030 "git.monogon.dev/source/nexantic.git/core/internal/common/supervisor"
31 "git.monogon.dev/source/nexantic.git/core/internal/kubernetes/pki"
32 "git.monogon.dev/source/nexantic.git/core/pkg/fileargs"
Lorenz Brunfc5dbc62020-05-28 12:18:07 +020033
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010034 "go.etcd.io/etcd/clientv3"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010035)
36
37type apiserverConfig struct {
38 advertiseAddress net.IP
39 serviceIPRange net.IPNet
40 // All PKI-related things are in DER
41 idCA []byte
42 kubeletClientCert []byte
43 kubeletClientKey []byte
44 aggregationCA []byte
45 aggregationClientCert []byte
46 aggregationClientKey []byte
47 serviceAccountPrivKey []byte // In PKIX form
48 serverCert []byte
49 serverKey []byte
50}
51
52func getPKIApiserverConfig(consensusKV clientv3.KV) (*apiserverConfig, error) {
53 var config apiserverConfig
54 var err error
Serge Bazanski5a091422020-06-22 14:01:45 +020055 config.idCA, _, err = pki.GetCert(consensusKV, "id-ca")
56 config.kubeletClientCert, config.kubeletClientKey, err = pki.GetCert(consensusKV, "kubelet-client")
57 config.aggregationCA, _, err = pki.GetCert(consensusKV, "aggregation-ca")
58 config.aggregationClientCert, config.aggregationClientKey, err = pki.GetCert(consensusKV, "front-proxy-client")
59 config.serverCert, config.serverKey, err = pki.GetCert(consensusKV, "apiserver")
60 saPrivkey, err := consensusKV.Get(context.Background(), path.Join(pki.EtcdPath, "service-account-privkey.der"))
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010061 if err != nil {
62 return nil, fmt.Errorf("failed to get serviceaccount privkey: %w", err)
63 }
64 if len(saPrivkey.Kvs) != 1 {
65 return nil, errors.New("failed to get serviceaccount privkey: not found")
66 }
67 config.serviceAccountPrivKey = saPrivkey.Kvs[0].Value
68 return &config, nil
69}
70
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020071func runAPIServer(config apiserverConfig, output io.Writer) supervisor.Runnable {
72 return func(ctx context.Context) error {
73 args, err := fileargs.New()
74 if err != nil {
75 panic(err) // If this fails, something is very wrong. Just crash.
76 }
77 defer args.Close()
78 cmd := exec.CommandContext(ctx, "/kubernetes/bin/kube", "kube-apiserver",
79 fmt.Sprintf("--advertise-address=%v", config.advertiseAddress.String()),
80 "--authorization-mode=Node,RBAC",
81 args.FileOpt("--client-ca-file", "client-ca.pem",
82 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.idCA})),
83 "--enable-admission-plugins=NodeRestriction,PodSecurityPolicy",
84 "--enable-aggregator-routing=true",
85 "--insecure-port=0",
Lorenz Brunfc5dbc62020-05-28 12:18:07 +020086 fmt.Sprintf("--secure-port=%v", common.KubernetesAPIPort),
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020087 // Due to the magic of GRPC this really needs four slashes and a :0
88 fmt.Sprintf("--etcd-servers=%v", "unix:////consensus/listener.sock:0"),
89 args.FileOpt("--kubelet-client-certificate", "kubelet-client-cert.pem",
90 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.kubeletClientCert})),
91 args.FileOpt("--kubelet-client-key", "kubelet-client-key.pem",
92 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.kubeletClientKey})),
93 "--kubelet-preferred-address-types=Hostname",
94 args.FileOpt("--proxy-client-cert-file", "aggregation-client-cert.pem",
95 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.aggregationClientCert})),
96 args.FileOpt("--proxy-client-key-file", "aggregation-client-key.pem",
97 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.aggregationClientKey})),
98 "--requestheader-allowed-names=front-proxy-client",
99 args.FileOpt("--requestheader-client-ca-file", "aggregation-ca.pem",
100 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.aggregationCA})),
101 "--requestheader-extra-headers-prefix=X-Remote-Extra-",
102 "--requestheader-group-headers=X-Remote-Group",
103 "--requestheader-username-headers=X-Remote-User",
104 args.FileOpt("--service-account-key-file", "service-account-pubkey.pem",
105 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.serviceAccountPrivKey})),
106 fmt.Sprintf("--service-cluster-ip-range=%v", config.serviceIPRange.String()),
107 args.FileOpt("--tls-cert-file", "server-cert.pem",
108 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.serverCert})),
109 args.FileOpt("--tls-private-key-file", "server-key.pem",
110 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.serverKey})),
111 )
112 if args.Error() != nil {
113 return err
114 }
115 cmd.Stdout = output
116 cmd.Stderr = output
117 supervisor.Signal(ctx, supervisor.SignalHealthy)
118 err = cmd.Run()
119 fmt.Fprintf(output, "apiserver stopped: %v\n", err)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +0100120 return err
121 }
Lorenz Brun6e8f69c2019-11-18 10:44:24 +0100122}