| Tim Windelschmidt | 6d33a43 | 2025-02-04 14:34:25 +0100 | [diff] [blame^] | 1 | // Copyright The Monogon Project Authors. |
| Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 2 | // SPDX-License-Identifier: Apache-2.0 |
| Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 3 | |
| 4 | package main |
| 5 | |
| 6 | import ( |
| Serge Bazanski | cdb8c78 | 2020-02-17 12:34:02 +0100 | [diff] [blame] | 7 | "context" |
| Lorenz Brun | dd8c80e | 2019-10-07 16:19:49 +0200 | [diff] [blame] | 8 | "fmt" |
| Serge Bazanski | 3b09823 | 2023-03-16 17:57:02 +0100 | [diff] [blame] | 9 | "strings" |
| Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 10 | |
| Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 11 | "golang.org/x/sys/unix" |
| Serge Bazanski | 99f4774 | 2021-08-04 20:21:42 +0200 | [diff] [blame] | 12 | |
| Serge Bazanski | 3c5d063 | 2024-09-12 10:49:12 +0000 | [diff] [blame] | 13 | "source.monogon.dev/go/logging" |
| Serge Bazanski | 31370b0 | 2021-01-07 16:31:14 +0100 | [diff] [blame] | 14 | "source.monogon.dev/metropolis/node/core/cluster" |
| Lorenz Brun | 6c45434 | 2023-06-01 12:23:38 +0200 | [diff] [blame] | 15 | "source.monogon.dev/metropolis/node/core/devmgr" |
| Serge Bazanski | 31370b0 | 2021-01-07 16:31:14 +0100 | [diff] [blame] | 16 | "source.monogon.dev/metropolis/node/core/localstorage" |
| 17 | "source.monogon.dev/metropolis/node/core/localstorage/declarative" |
| Serge Bazanski | efbde19 | 2024-07-31 14:53:20 +0000 | [diff] [blame] | 18 | "source.monogon.dev/metropolis/node/core/metrics" |
| Serge Bazanski | 31370b0 | 2021-01-07 16:31:14 +0100 | [diff] [blame] | 19 | "source.monogon.dev/metropolis/node/core/network" |
| Serge Bazanski | f9edf52 | 2021-06-17 15:57:13 +0200 | [diff] [blame] | 20 | "source.monogon.dev/metropolis/node/core/roleserve" |
| Serge Bazanski | 58ddc09 | 2022-06-30 18:23:33 +0200 | [diff] [blame] | 21 | "source.monogon.dev/metropolis/node/core/rpc/resolver" |
| Serge Bazanski | 0d9e125 | 2024-09-03 12:16:47 +0200 | [diff] [blame] | 22 | "source.monogon.dev/metropolis/node/core/tconsole" |
| Lorenz Brun | e306d78 | 2021-09-01 13:01:06 +0200 | [diff] [blame] | 23 | timesvc "source.monogon.dev/metropolis/node/core/time" |
| Lorenz Brun | 35fcf03 | 2023-06-29 04:15:58 +0200 | [diff] [blame] | 24 | "source.monogon.dev/metropolis/node/core/update" |
| Serge Bazanski | 8d64a3b | 2023-11-20 12:58:42 +0100 | [diff] [blame] | 25 | mversion "source.monogon.dev/metropolis/version" |
| Tim Windelschmidt | 7dac92b | 2024-12-16 02:51:04 +0100 | [diff] [blame] | 26 | "source.monogon.dev/osbase/bringup" |
| Tim Windelschmidt | 9f21f53 | 2024-05-07 15:14:20 +0200 | [diff] [blame] | 27 | "source.monogon.dev/osbase/logtree" |
| Jan Schär | 91bf1c8 | 2024-07-29 17:31:33 +0200 | [diff] [blame] | 28 | "source.monogon.dev/osbase/net/dns" |
| Tim Windelschmidt | 9f21f53 | 2024-05-07 15:14:20 +0200 | [diff] [blame] | 29 | "source.monogon.dev/osbase/supervisor" |
| Serge Bazanski | 154e6d9 | 2024-09-11 17:26:31 +0200 | [diff] [blame] | 30 | "source.monogon.dev/osbase/sysctl" |
| Tim Windelschmidt | 9f21f53 | 2024-05-07 15:14:20 +0200 | [diff] [blame] | 31 | "source.monogon.dev/osbase/tpm" |
| Serge Bazanski | 8d64a3b | 2023-11-20 12:58:42 +0100 | [diff] [blame] | 32 | "source.monogon.dev/version" |
| Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 33 | ) |
| 34 | |
| 35 | func main() { |
| Tim Windelschmidt | 7dac92b | 2024-12-16 02:51:04 +0100 | [diff] [blame] | 36 | bringup.Runnable(root).RunWith(bringup.Config{ |
| 37 | Console: bringup.ConsoleConfig{ |
| 38 | ShortenDictionary: logtree.MetropolisShortenDict, |
| 39 | Filter: consoleFilter, |
| Serge Bazanski | 3b09823 | 2023-03-16 17:57:02 +0100 | [diff] [blame] | 40 | }, |
| Tim Windelschmidt | 7dac92b | 2024-12-16 02:51:04 +0100 | [diff] [blame] | 41 | Supervisor: bringup.SupervisorConfig{ |
| 42 | Metrics: []supervisor.Metrics{ |
| 43 | supervisor.NewMetricsPrometheus(metrics.CoreRegistry), |
| 44 | }, |
| Lorenz Brun | f0b22ff | 2023-05-02 16:04:20 +0200 | [diff] [blame] | 45 | }, |
| Tim Windelschmidt | 7dac92b | 2024-12-16 02:51:04 +0100 | [diff] [blame] | 46 | }) |
| Serge Bazanski | 57b4375 | 2020-07-13 19:17:48 +0200 | [diff] [blame] | 47 | } |
| Serge Bazanski | 3b09823 | 2023-03-16 17:57:02 +0100 | [diff] [blame] | 48 | |
| 49 | // consoleFilter is used to filter out some uselessly verbose logs from the |
| 50 | // console. |
| 51 | // |
| 52 | // This should be limited to external services, our internal services should |
| 53 | // instead just have good logging by default. |
| 54 | func consoleFilter(p *logtree.LogEntry) bool { |
| 55 | if p.Raw != nil { |
| 56 | return false |
| 57 | } |
| 58 | if p.Leveled == nil { |
| 59 | return false |
| 60 | } |
| 61 | s := string(p.DN) |
| 62 | if strings.HasPrefix(s, "root.role.controlplane.launcher.consensus.etcd") { |
| Serge Bazanski | 3c5d063 | 2024-09-12 10:49:12 +0000 | [diff] [blame] | 63 | return p.Leveled.Severity().AtLeast(logging.WARNING) |
| Serge Bazanski | 3b09823 | 2023-03-16 17:57:02 +0100 | [diff] [blame] | 64 | } |
| 65 | // TODO(q3k): turn off RPC traces instead |
| 66 | if strings.HasPrefix(s, "root.role.controlplane.launcher.curator.listener.rpc") { |
| 67 | return false |
| 68 | } |
| 69 | if strings.HasPrefix(s, "root.role.kubernetes.run.kubernetes.networked.kubelet") { |
| Serge Bazanski | 3c5d063 | 2024-09-12 10:49:12 +0000 | [diff] [blame] | 70 | return p.Leveled.Severity().AtLeast(logging.WARNING) |
| Serge Bazanski | 3b09823 | 2023-03-16 17:57:02 +0100 | [diff] [blame] | 71 | } |
| 72 | if strings.HasPrefix(s, "root.role.kubernetes.run.kubernetes.networked.apiserver") { |
| Serge Bazanski | 3c5d063 | 2024-09-12 10:49:12 +0000 | [diff] [blame] | 73 | return p.Leveled.Severity().AtLeast(logging.WARNING) |
| Serge Bazanski | 3b09823 | 2023-03-16 17:57:02 +0100 | [diff] [blame] | 74 | } |
| 75 | if strings.HasPrefix(s, "root.role.kubernetes.run.kubernetes.controller-manager") { |
| Serge Bazanski | 3c5d063 | 2024-09-12 10:49:12 +0000 | [diff] [blame] | 76 | return p.Leveled.Severity().AtLeast(logging.WARNING) |
| Serge Bazanski | 3b09823 | 2023-03-16 17:57:02 +0100 | [diff] [blame] | 77 | } |
| 78 | if strings.HasPrefix(s, "root.role.kubernetes.run.kubernetes.scheduler") { |
| Serge Bazanski | 3c5d063 | 2024-09-12 10:49:12 +0000 | [diff] [blame] | 79 | return p.Leveled.Severity().AtLeast(logging.WARNING) |
| Serge Bazanski | 3b09823 | 2023-03-16 17:57:02 +0100 | [diff] [blame] | 80 | } |
| Lorenz Brun | 6eb3fb3 | 2023-08-09 17:19:24 +0200 | [diff] [blame] | 81 | if strings.HasPrefix(s, "root.kernel") { |
| 82 | // Linux writes high-severity logs directly to the console anyways and |
| 83 | // its low-severity logs are too verbose. |
| 84 | return false |
| 85 | } |
| Serge Bazanski | 6b7731e | 2023-03-22 17:58:04 +0100 | [diff] [blame] | 86 | if strings.HasPrefix(s, "supervisor") { |
| Serge Bazanski | 3c5d063 | 2024-09-12 10:49:12 +0000 | [diff] [blame] | 87 | return p.Leveled.Severity().AtLeast(logging.WARNING) |
| Serge Bazanski | 6b7731e | 2023-03-22 17:58:04 +0100 | [diff] [blame] | 88 | } |
| Serge Bazanski | 3b09823 | 2023-03-16 17:57:02 +0100 | [diff] [blame] | 89 | return true |
| 90 | } |
| 91 | |
| Tim Windelschmidt | 7dac92b | 2024-12-16 02:51:04 +0100 | [diff] [blame] | 92 | // Function which performs core, one-way initialization of the node. This means |
| 93 | // waiting for the network, starting the cluster manager, and then starting all |
| 94 | // services related to the node's roles. |
| 95 | func root(ctx context.Context) error { |
| 96 | logger := supervisor.Logger(ctx) |
| 97 | |
| 98 | logger.Info("Starting Metropolis node init") |
| 99 | logger.Infof("Version: %s", version.Semver(mversion.Version)) |
| 100 | |
| 101 | // Linux kernel default is 4096 which is far too low. Raise it to 1M which |
| 102 | // is what gVisor suggests. |
| 103 | if err := unix.Setrlimit(unix.RLIMIT_NOFILE, &unix.Rlimit{Cur: 1048576, Max: 1048576}); err != nil { |
| 104 | logger.Fatalf("Failed to raise rlimits: %v", err) |
| 105 | } |
| 106 | |
| 107 | haveTPM := true |
| 108 | if err := tpm.Initialize(logger); err != nil { |
| 109 | logger.Warningf("Failed to initialize TPM 2.0: %v", err) |
| 110 | haveTPM = false |
| 111 | } |
| 112 | |
| 113 | metrics.CoreRegistry.MustRegister(dns.MetricsRegistry) |
| 114 | networkSvc := network.New(nil, []string{"hosts", "kubernetes"}) |
| 115 | networkSvc.DHCPVendorClassID = "dev.monogon.metropolis.node.v1" |
| 116 | timeSvc := timesvc.New() |
| 117 | devmgrSvc := devmgr.New() |
| 118 | |
| 119 | // This function initializes a headless Delve if this is a debug build or |
| 120 | // does nothing if it's not |
| 121 | initializeDebugger(networkSvc) |
| 122 | |
| 123 | // Prepare local storage. |
| 124 | root := &localstorage.Root{} |
| 125 | if err := declarative.PlaceFS(root, "/"); err != nil { |
| 126 | panic(fmt.Errorf("when placing root FS: %w", err)) |
| 127 | } |
| 128 | |
| 129 | updateSvc := &update.Service{ |
| 130 | Logger: supervisor.MustSubLogger(ctx, "update"), |
| 131 | } |
| 132 | // Make node-wide cluster resolver. |
| 133 | res := resolver.New(ctx, resolver.WithLogger(supervisor.MustSubLogger(ctx, "resolver"))) |
| 134 | |
| 135 | // Start storage and network - we need this to get anything else done. |
| 136 | if err := root.Start(ctx, updateSvc); err != nil { |
| 137 | return fmt.Errorf("cannot start root FS: %w", err) |
| 138 | } |
| 139 | |
| 140 | localNodeParams, err := getLocalNodeParams(ctx, root) |
| 141 | if err != nil { |
| 142 | return fmt.Errorf("cannot get local node parameters: %w", err) |
| 143 | } |
| 144 | |
| 145 | if localNodeParams.NetworkConfig != nil { |
| 146 | networkSvc.StaticConfig = localNodeParams.NetworkConfig |
| 147 | if err := root.ESP.Metropolis.NetworkConfiguration.Marshal(localNodeParams.NetworkConfig); err != nil { |
| 148 | logger.Errorf("Error writing back network_config from NodeParameters: %v", err) |
| 149 | } |
| 150 | } |
| 151 | if networkSvc.StaticConfig == nil { |
| 152 | staticConfig, err := root.ESP.Metropolis.NetworkConfiguration.Unmarshal() |
| 153 | if err == nil { |
| 154 | networkSvc.StaticConfig = staticConfig |
| 155 | } else { |
| 156 | logger.Errorf("Unable to load static config, proceeding without it: %v", err) |
| 157 | } |
| 158 | } |
| 159 | |
| 160 | if err := supervisor.Run(ctx, "devmgr", devmgrSvc.Run); err != nil { |
| 161 | return fmt.Errorf("when starting devmgr: %w", err) |
| 162 | } |
| 163 | if err := supervisor.Run(ctx, "network", networkSvc.Run); err != nil { |
| 164 | return fmt.Errorf("when starting network: %w", err) |
| 165 | } |
| 166 | if err := supervisor.Run(ctx, "time", timeSvc.Run); err != nil { |
| 167 | return fmt.Errorf("when starting time: %w", err) |
| 168 | } |
| 169 | if err := supervisor.Run(ctx, "sysctl", nodeSysctls); err != nil { |
| 170 | return fmt.Errorf("when applying sysctls: %w", err) |
| 171 | } |
| 172 | |
| 173 | // The kernel does of course not run in this runnable, only the log pipe |
| 174 | // runs in it. |
| 175 | if err := supervisor.Run(ctx, "kernel", func(ctx context.Context) error { |
| 176 | return logtree.KmsgPipe(ctx, supervisor.Logger(ctx)) |
| 177 | }); err != nil { |
| 178 | return fmt.Errorf("when starting kernel log pipe: %w", err) |
| 179 | } |
| 180 | |
| 181 | // Start the role service. The role service connects to the curator and runs |
| 182 | // all node-specific role code (eg. Kubernetes services). |
| 183 | logger.Infof("Starting role service...") |
| 184 | rs := roleserve.New(roleserve.Config{ |
| 185 | StorageRoot: root, |
| 186 | Network: networkSvc, |
| 187 | Resolver: res, |
| 188 | LogTree: supervisor.LogTree(ctx), |
| 189 | Update: updateSvc, |
| 190 | }) |
| 191 | if err := supervisor.Run(ctx, "role", rs.Run); err != nil { |
| 192 | return fmt.Errorf("failed to start role service: %w", err) |
| 193 | } |
| 194 | |
| 195 | if err := runDebugService(ctx, rs, supervisor.LogTree(ctx), root); err != nil { |
| 196 | return fmt.Errorf("when starting debug service: %w", err) |
| 197 | } |
| 198 | |
| 199 | // Initialize interactive consoles. |
| 200 | interactiveConsoles := []string{"/dev/tty0"} |
| 201 | for _, c := range interactiveConsoles { |
| 202 | console, err := tconsole.New(tconsole.TerminalLinux, c, supervisor.LogTree(ctx), &networkSvc.Status, &rs.LocalRoles, &rs.CuratorConnection) |
| 203 | if err != nil { |
| 204 | logger.Infof("Failed to initialize interactive console at %s: %v", c, err) |
| 205 | } else { |
| 206 | logger.Infof("Started interactive console at %s", c) |
| 207 | supervisor.Run(ctx, "console-"+c, console.Run) |
| 208 | } |
| 209 | } |
| 210 | |
| 211 | // Now that we have consoles, set console logging level to 1 (KERNEL_EMERG, |
| 212 | // minimum possible). This prevents the TUI console from being polluted by |
| 213 | // random printks. |
| 214 | opts := sysctl.Options{ |
| 215 | "kernel.printk": "1", |
| 216 | } |
| 217 | if err := opts.Apply(); err != nil { |
| 218 | logger.Errorf("Failed to configure printk logging: %v", err) |
| 219 | } |
| 220 | |
| 221 | nodeParams, err := getNodeParams(ctx, root) |
| 222 | if err != nil { |
| 223 | return fmt.Errorf("cannot get node parameters: %w", err) |
| 224 | } |
| 225 | |
| 226 | // Start cluster manager. This kicks off cluster membership machinery, |
| 227 | // which will either start a new cluster, enroll into one or join one. |
| 228 | m := cluster.NewManager(root, networkSvc, rs, updateSvc, nodeParams, haveTPM) |
| 229 | if err := supervisor.Run(ctx, "cluster-manager", m.Run); err != nil { |
| 230 | return fmt.Errorf("when starting cluster manager: %w", err) |
| 231 | } |
| 232 | |
| 233 | supervisor.Signal(ctx, supervisor.SignalHealthy) |
| 234 | supervisor.Signal(ctx, supervisor.SignalDone) |
| 235 | return nil |
| Serge Bazanski | 3b09823 | 2023-03-16 17:57:02 +0100 | [diff] [blame] | 236 | } |