blob: 7a75ecfba7a01ff01e7495cdadd47ce4dfbcc8de [file] [log] [blame]
Lorenz Brun878f5f92020-05-12 16:15:39 +02001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package kubernetes
18
19import (
20 "context"
Serge Bazanski2cfafc92023-03-21 16:42:47 +010021 "crypto/ed25519"
Lorenz Brun878f5f92020-05-12 16:15:39 +020022 "encoding/json"
Serge Bazanski2cfafc92023-03-21 16:42:47 +010023 "encoding/pem"
Lorenz Brun878f5f92020-05-12 16:15:39 +020024 "fmt"
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020025 "net"
Lorenz Brun878f5f92020-05-12 16:15:39 +020026 "os/exec"
27
Lorenz Brun878f5f92020-05-12 16:15:39 +020028 v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020029 kubeletconfig "k8s.io/kubelet/config/v1beta1"
Tim Windelschmidtd77e26e2024-12-02 18:23:10 +010030 "k8s.io/utils/ptr"
Serge Bazanski77cb6c52020-12-19 00:09:22 +010031
Serge Bazanski2cfafc92023-03-21 16:42:47 +010032 ipb "source.monogon.dev/metropolis/node/core/curator/proto/api"
Tim Windelschmidt93020d72024-02-13 18:13:07 +010033
Serge Bazanski31370b02021-01-07 16:31:14 +010034 "source.monogon.dev/metropolis/node/core/localstorage"
Serge Bazanski31370b02021-01-07 16:31:14 +010035 "source.monogon.dev/metropolis/node/kubernetes/pki"
Tim Windelschmidt9f21f532024-05-07 15:14:20 +020036 "source.monogon.dev/osbase/fileargs"
37 "source.monogon.dev/osbase/supervisor"
Lorenz Brun878f5f92020-05-12 16:15:39 +020038)
39
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020040type kubeletService struct {
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020041 ClusterDNS []net.IP
Lorenz Brun78cefca2022-06-20 12:59:55 +000042 ClusterDomain string
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020043 KubeletDirectory *localstorage.DataKubernetesKubeletDirectory
44 EphemeralDirectory *localstorage.EphemeralDirectory
Serge Bazanski9411f7c2021-03-10 13:12:53 +010045
Serge Bazanski2cfafc92023-03-21 16:42:47 +010046 kubeconfig []byte
47 serverCACert []byte
48 serverCert []byte
Lorenz Brun878f5f92020-05-12 16:15:39 +020049}
50
Serge Bazanski2cfafc92023-03-21 16:42:47 +010051func (s *kubeletService) getPubkey(ctx context.Context) (ed25519.PublicKey, error) {
52 // First make sure we have a local ED25519 private key, and generate one if not.
53 if err := s.KubeletDirectory.PKI.GeneratePrivateKey(); err != nil {
54 return nil, fmt.Errorf("failed to generate private key: %w", err)
55 }
56 priv, err := s.KubeletDirectory.PKI.ReadPrivateKey()
Serge Bazanski71f7a562020-06-22 16:37:28 +020057 if err != nil {
Serge Bazanski2cfafc92023-03-21 16:42:47 +010058 return nil, fmt.Errorf("could not read keypair: %w", err)
59 }
60 pubkey := priv.Public().(ed25519.PublicKey)
61 return pubkey, nil
62}
63
64func (s *kubeletService) setCertificates(kw *ipb.IssueCertificateResponse_KubernetesWorker) error {
65 key, err := s.KubeletDirectory.PKI.ReadPrivateKey()
66 if err != nil {
67 return fmt.Errorf("could not read private key from disk: %w", err)
Serge Bazanski71f7a562020-06-22 16:37:28 +020068 }
69
Serge Bazanski2cfafc92023-03-21 16:42:47 +010070 s.kubeconfig, err = pki.KubeconfigRaw(kw.IdentityCaCertificate, kw.KubeletClientCertificate, key, pki.KubernetesAPIEndpointForWorker)
Serge Bazanski71f7a562020-06-22 16:37:28 +020071 if err != nil {
Serge Bazanski9411f7c2021-03-10 13:12:53 +010072 return fmt.Errorf("when generating kubeconfig: %w", err)
Serge Bazanski71f7a562020-06-22 16:37:28 +020073 }
Serge Bazanski2cfafc92023-03-21 16:42:47 +010074 s.serverCACert = pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: kw.IdentityCaCertificate})
75 s.serverCert = pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: kw.KubeletServerCertificate})
Serge Bazanski71f7a562020-06-22 16:37:28 +020076 return nil
77}
78
Serge Bazanski2cfafc92023-03-21 16:42:47 +010079func (s *kubeletService) configure(fargs *fileargs.FileArgs) *kubeletconfig.KubeletConfiguration {
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020080 var clusterDNS []string
81 for _, dnsIP := range s.ClusterDNS {
82 clusterDNS = append(clusterDNS, dnsIP.String())
83 }
Lorenz Brun878f5f92020-05-12 16:15:39 +020084
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020085 return &kubeletconfig.KubeletConfiguration{
86 TypeMeta: v1.TypeMeta{
87 Kind: "KubeletConfiguration",
Lorenz Brun6211e4d2023-11-14 19:09:40 +010088 APIVersion: kubeletconfig.SchemeGroupVersion.String(),
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020089 },
Lorenz Brun6211e4d2023-11-14 19:09:40 +010090 ContainerRuntimeEndpoint: "unix://" + s.EphemeralDirectory.Containerd.ClientSocket.FullPath(),
91 TLSCertFile: fargs.ArgPath("server.crt", s.serverCert),
92 TLSPrivateKeyFile: s.KubeletDirectory.PKI.Key.FullPath(),
93 TLSMinVersion: "VersionTLS13",
94 ClusterDNS: clusterDNS,
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020095 Authentication: kubeletconfig.KubeletAuthentication{
96 X509: kubeletconfig.KubeletX509Authentication{
Serge Bazanski2cfafc92023-03-21 16:42:47 +010097 ClientCAFile: fargs.ArgPath("ca.crt", s.serverCACert),
Lorenz Brun878f5f92020-05-12 16:15:39 +020098 },
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020099 },
100 // TODO(q3k): move reconciler.False to a generic package, fix the following references.
Lorenz Brun78cefca2022-06-20 12:59:55 +0000101 ClusterDomain: s.ClusterDomain,
Tim Windelschmidtd77e26e2024-12-02 18:23:10 +0100102 EnableControllerAttachDetach: ptr.To(false),
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200103 HairpinMode: "none",
Tim Windelschmidtd77e26e2024-12-02 18:23:10 +0100104 MakeIPTablesUtilChains: ptr.To(false), // We don't have iptables
105 FailSwapOn: ptr.To(false),
Lorenz Brunfe6b5062024-07-02 16:32:35 +0000106 MemorySwap: kubeletconfig.MemorySwapConfiguration{
107 // Only allow burstable pods to use swap
108 SwapBehavior: "LimitedSwap",
109 },
110 CgroupRoot: "/",
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200111 KubeReserved: map[string]string{
112 "cpu": "200m",
113 "memory": "300Mi",
114 },
Lorenz Brun0db90ba2020-04-06 14:04:52 +0200115
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200116 // We're not going to use this, but let's make it point to a
117 // known-empty directory in case anybody manages to trigger it.
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200118 VolumePluginDir: s.EphemeralDirectory.FlexvolumePlugins.FullPath(),
Lorenz Brun2f7e0a22023-06-22 16:56:13 +0200119 // Currently we allocate a /24 per node, so we can have a maximum of
120 // 253 pods per node.
Lorenz Brund58edf42024-11-27 20:38:14 +0000121 MaxPods: 253,
122 PodLogsDir: "/data/kubelet/logs",
123 FeatureGates: extraFeatureGates.AsMap(),
Lorenz Brun837cb8e2024-12-23 13:52:56 +0100124 // Only kill a single process on OOM instead of the whole container.
125 // This is generally the more sane behavior and was default under
126 // cgroups v1.
127 SingleProcessOOMKill: ptr.To(true),
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200128 }
129}
Lorenz Brun878f5f92020-05-12 16:15:39 +0200130
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200131func (s *kubeletService) Run(ctx context.Context) error {
Serge Bazanski2cfafc92023-03-21 16:42:47 +0100132 if len(s.serverCert) == 0 || len(s.serverCACert) == 0 || len(s.kubeconfig) == 0 {
133 return fmt.Errorf("setCertificates was not called")
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200134 }
135
136 fargs, err := fileargs.New()
137 if err != nil {
Lorenz Brun878f5f92020-05-12 16:15:39 +0200138 return err
139 }
Serge Bazanski2cfafc92023-03-21 16:42:47 +0100140 defer fargs.Close()
141
142 configRaw, err := json.Marshal(s.configure(fargs))
143 if err != nil {
144 return fmt.Errorf("when marshaling kubelet configuration: %w", err)
145 }
146
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200147 cmd := exec.CommandContext(ctx, "/kubernetes/bin/kube", "kubelet",
148 fargs.FileOpt("--config", "config.json", configRaw),
Serge Bazanski2cfafc92023-03-21 16:42:47 +0100149 fargs.FileOpt("--kubeconfig", "kubeconfig", s.kubeconfig),
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200150 fmt.Sprintf("--root-dir=%s", s.KubeletDirectory.FullPath()),
151 )
152 cmd.Env = []string{"PATH=/kubernetes/bin"}
Serge Bazanski05604292021-03-12 17:47:21 +0100153 return supervisor.RunCommand(ctx, cmd, supervisor.ParseKLog())
Lorenz Brun878f5f92020-05-12 16:15:39 +0200154}