blob: 34fa05e8c228a90c35d1e41f4ebc004e8bee4706 [file] [log] [blame]
Lorenz Brunae0d90d2019-09-05 17:53:56 +02001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package main
18
19import (
Serge Bazanskicdb8c782020-02-17 12:34:02 +010020 "context"
Lorenz Brundd8c80e2019-10-07 16:19:49 +020021 "fmt"
Serge Bazanskie803fc12022-01-25 14:58:24 +010022 "io"
Serge Bazanski1ebd1e12020-07-13 19:17:16 +020023 "net"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020024 "os"
Lorenz Brunf95909d2019-09-11 19:48:26 +020025 "runtime/debug"
Serge Bazanski76003f82021-06-17 16:39:01 +020026 "time"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020027
Lorenz Brunae0d90d2019-09-05 17:53:56 +020028 "golang.org/x/sys/unix"
Serge Bazanski1ebd1e12020-07-13 19:17:16 +020029 "google.golang.org/grpc"
Serge Bazanski99f47742021-08-04 20:21:42 +020030
Serge Bazanski31370b02021-01-07 16:31:14 +010031 common "source.monogon.dev/metropolis/node"
32 "source.monogon.dev/metropolis/node/core/cluster"
Serge Bazanski76003f82021-06-17 16:39:01 +020033 "source.monogon.dev/metropolis/node/core/curator"
Serge Bazanski31370b02021-01-07 16:31:14 +010034 "source.monogon.dev/metropolis/node/core/localstorage"
35 "source.monogon.dev/metropolis/node/core/localstorage/declarative"
36 "source.monogon.dev/metropolis/node/core/network"
Serge Bazanskif9edf522021-06-17 15:57:13 +020037 "source.monogon.dev/metropolis/node/core/roleserve"
Lorenz Brune306d782021-09-01 13:01:06 +020038 timesvc "source.monogon.dev/metropolis/node/core/time"
Serge Bazanski31370b02021-01-07 16:31:14 +010039 "source.monogon.dev/metropolis/node/kubernetes/pki"
40 "source.monogon.dev/metropolis/pkg/logtree"
41 "source.monogon.dev/metropolis/pkg/supervisor"
42 "source.monogon.dev/metropolis/pkg/tpm"
43 apb "source.monogon.dev/metropolis/proto/api"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020044)
45
46func main() {
Lorenz Brunf95909d2019-09-11 19:48:26 +020047 defer func() {
48 if r := recover(); r != nil {
Serge Bazanskieac8f732021-10-05 23:30:37 +020049 fmt.Fprintf(os.Stderr, "\n\n")
50 fmt.Fprintf(os.Stderr, " Metropolis encountered an uncorrectable error and this node must be restarted.\n")
51 fmt.Fprintf(os.Stderr, " Core panicked: %v\n\n", r)
Lorenz Brunf95909d2019-09-11 19:48:26 +020052 debug.PrintStack()
53 }
54 unix.Sync()
Serge Bazanskieac8f732021-10-05 23:30:37 +020055 // TODO(lorenz): Switch this to Reboot when init panics are less likely.
Leopold Schabel68c58752019-11-14 21:00:59 +010056 if err := unix.Reboot(unix.LINUX_REBOOT_CMD_POWER_OFF); err != nil {
Serge Bazanskieac8f732021-10-05 23:30:37 +020057 // Best effort, nothing we can do if this fails except printing the error to the
58 // console.
Leopold Schabel68c58752019-11-14 21:00:59 +010059 panic(fmt.Sprintf("failed to halt node: %v\n", err))
60 }
Lorenz Brunf95909d2019-09-11 19:48:26 +020061 }()
Serge Bazanskic7359672020-10-30 16:38:57 +010062
Serge Bazanskie803fc12022-01-25 14:58:24 +010063 // Set up basic mounts (like /dev, /sys...).
64 if err := setupMounts(); err != nil {
65 panic(fmt.Errorf("could not set up basic mounts: %w", err))
Lorenz Brunae0d90d2019-09-05 17:53:56 +020066 }
Serge Bazanskie803fc12022-01-25 14:58:24 +010067
68 // Set up logger for Metropolis. Currently logs everything to /dev/tty0 and
69 // /dev/ttyS0.
70 lt := logtree.New()
71 for _, p := range []string{
72 "/dev/tty0", "/dev/ttyS0",
73 } {
74 f, err := os.OpenFile(p, os.O_WRONLY, 0)
75 if err != nil {
76 continue
Serge Bazanskic7359672020-10-30 16:38:57 +010077 }
Serge Bazanskie803fc12022-01-25 14:58:24 +010078 reader, err := lt.Read("", logtree.WithChildren(), logtree.WithStream())
79 if err != nil {
80 panic(fmt.Errorf("could not set up root log reader: %v", err))
81 }
82 go func(path string, f io.Writer) {
83 fmt.Fprintf(f, "\nMetropolis: this is %s. Verbose node logs follow.\n\n", path)
84 for {
85 p := <-reader.Stream
86 fmt.Fprintf(f, "%s\n", p.String())
87 }
88 }(p, f)
89 }
Serge Bazanskic7359672020-10-30 16:38:57 +010090
91 // Initial logger. Used until we get to a supervisor.
92 logger := lt.MustLeveledFor("init")
Serge Bazanski581b0bd2020-03-12 13:36:43 +010093
Serge Bazanski216fe7b2021-05-21 18:36:16 +020094 // Linux kernel default is 4096 which is far too low. Raise it to 1M which
95 // is what gVisor suggests.
Lorenz Brun878f5f92020-05-12 16:15:39 +020096 if err := unix.Setrlimit(unix.RLIMIT_NOFILE, &unix.Rlimit{Cur: 1048576, Max: 1048576}); err != nil {
Serge Bazanskic7359672020-10-30 16:38:57 +010097 logger.Fatalf("Failed to raise rlimits: %v", err)
Lorenz Brun878f5f92020-05-12 16:15:39 +020098 }
99
Serge Bazanski662b5b32020-12-21 13:49:00 +0100100 logger.Info("Starting Metropolis node init")
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200101
Serge Bazanskic7359672020-10-30 16:38:57 +0100102 if err := tpm.Initialize(logger); err != nil {
Lorenz Brun8b786892022-01-13 14:21:16 +0100103 logger.Warningf("Failed to initialize TPM 2.0, attempting fallback to untrusted: %v", err)
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200104 }
105
Serge Bazanskid8af5bf2021-03-16 13:38:29 +0100106 networkSvc := network.New()
Lorenz Brune306d782021-09-01 13:01:06 +0200107 timeSvc := timesvc.New()
Leopold Schabel68c58752019-11-14 21:00:59 +0100108
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200109 // This function initializes a headless Delve if this is a debug build or
110 // does nothing if it's not
Lorenz Brun70f65b22020-07-08 17:02:47 +0200111 initializeDebugger(networkSvc)
112
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200113 // Prepare local storage.
114 root := &localstorage.Root{}
115 if err := declarative.PlaceFS(root, "/"); err != nil {
116 panic(fmt.Errorf("when placing root FS: %w", err))
117 }
118
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200119 // trapdoor is a channel used to signal to the init service that a very
Serge Bazanskieac8f732021-10-05 23:30:37 +0200120 // low-level, unrecoverable failure occured.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200121 trapdoor := make(chan struct{})
122
123 // Make context for supervisor. We cancel it when we reach the trapdoor.
124 ctxS, ctxC := context.WithCancel(context.Background())
125
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200126 // Start root initialization code as a supervisor one-shot runnable. This
127 // means waiting for the network, starting the cluster manager, and then
128 // starting all services related to the node's roles.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200129 // TODO(q3k): move this to a separate 'init' service.
Serge Bazanskic7359672020-10-30 16:38:57 +0100130 supervisor.New(ctxS, func(ctx context.Context) error {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200131 // Start storage and network - we need this to get anything else done.
132 if err := root.Start(ctx); err != nil {
133 return fmt.Errorf("cannot start root FS: %w", err)
134 }
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100135 if err := supervisor.Run(ctx, "network", networkSvc.Run); err != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200136 return fmt.Errorf("when starting network: %w", err)
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100137 }
Lorenz Brune306d782021-09-01 13:01:06 +0200138 if err := supervisor.Run(ctx, "time", timeSvc.Run); err != nil {
139 return fmt.Errorf("when starting time: %w", err)
140 }
Lorenz Brunf95909d2019-09-11 19:48:26 +0200141
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200142 // Start cluster manager. This kicks off cluster membership machinery,
143 // which will either start a new cluster, enroll into one or join one.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200144 m := cluster.NewManager(root, networkSvc)
145 if err := supervisor.Run(ctx, "enrolment", m.Run); err != nil {
146 return fmt.Errorf("when starting enrolment: %w", err)
147 }
148
Serge Bazanskia105db52021-04-12 19:57:46 +0200149 // Wait until the node finds a home in the new cluster.
150 watcher := m.Watch()
151 status, err := watcher.GetHome(ctx)
Serge Bazanski42e61c62021-03-18 15:07:18 +0100152 if err != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200153 close(trapdoor)
Serge Bazanskia105db52021-04-12 19:57:46 +0200154 return fmt.Errorf("new couldn't find home in new cluster, aborting: %w", err)
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200155 }
156
Serge Bazanskie78a0892021-10-07 17:03:49 +0200157 // Currently, only the first node of the cluster runs etcd. That means only that
158 // node can run the curator, kubernetes and roleserver.
Serge Bazanskif9edf522021-06-17 15:57:13 +0200159 //
Serge Bazanskie78a0892021-10-07 17:03:49 +0200160 // This is a temporary stopgap until we land a roleserver rewrite which fixes
161 // this.
Serge Bazanskif9edf522021-06-17 15:57:13 +0200162
Serge Bazanskie78a0892021-10-07 17:03:49 +0200163 var rs *roleserve.Service
Serge Bazanski5839e972021-11-16 15:46:19 +0100164 if status.Consensus != nil {
165 w := status.Consensus.Watch()
166 supervisor.Logger(ctx).Infof("Waiting for consensus before continuing control plane startup...")
167 st, err := w.GetRunning(ctx)
Serge Bazanskie78a0892021-10-07 17:03:49 +0200168 if err != nil {
Serge Bazanski5839e972021-11-16 15:46:19 +0100169 return fmt.Errorf("while waiting for running consensus: %w", err)
Serge Bazanskie78a0892021-10-07 17:03:49 +0200170 }
Serge Bazanski5839e972021-11-16 15:46:19 +0100171 supervisor.Logger(ctx).Infof("Got consensus, continuing control plane startup...")
172 kkv, err := st.KubernetesClient()
Serge Bazanskie78a0892021-10-07 17:03:49 +0200173 if err != nil {
174 close(trapdoor)
175 return fmt.Errorf("failed to retrieve consensus kubernetes PKI client: %w", err)
176 }
Serge Bazanskif9edf522021-06-17 15:57:13 +0200177
Serge Bazanskie78a0892021-10-07 17:03:49 +0200178 // TODO(q3k): restart curator on credentials change?
Serge Bazanski5b2ae552021-08-17 13:00:14 +0200179
Serge Bazanskie78a0892021-10-07 17:03:49 +0200180 // Start cluster curator. The cluster curator is responsible for lifecycle
181 // management of the cluster.
182 // In the future, this will only be started on nodes that run etcd.
183 c := curator.New(curator.Config{
Serge Bazanski5839e972021-11-16 15:46:19 +0100184 Consensus: status.Consensus,
Serge Bazanskie78a0892021-10-07 17:03:49 +0200185 NodeCredentials: status.Credentials,
186 // TODO(q3k): make this configurable?
187 LeaderTTL: time.Second * 5,
188 Directory: &root.Ephemeral.Curator,
189 })
190 if err := supervisor.Run(ctx, "curator", c.Run); err != nil {
191 close(trapdoor)
192 return fmt.Errorf("when starting curator: %w", err)
193 }
Serge Bazanski76003f82021-06-17 16:39:01 +0200194
Serge Bazanskie78a0892021-10-07 17:03:49 +0200195 // We are now in a cluster. We can thus access our 'node' object and
196 // start all services that we should be running.
Serge Bazanski5839e972021-11-16 15:46:19 +0100197 logger.Info("Control plane running, starting roleserver....")
Serge Bazanskia959cbd2021-06-17 15:56:51 +0200198
Serge Bazanskie78a0892021-10-07 17:03:49 +0200199 // Ensure Kubernetes PKI objects exist in etcd. In the future, this logic will
200 // be implemented in the curator.
201 kpki := pki.New(lt.MustLeveledFor("pki.kubernetes"), kkv)
202 if err := kpki.EnsureAll(ctx); err != nil {
203 close(trapdoor)
204 return fmt.Errorf("failed to ensure kubernetes PKI present: %w", err)
205 }
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200206
Serge Bazanskie78a0892021-10-07 17:03:49 +0200207 // Start the role service. The role service connects to the curator and runs
208 // all node-specific role code (eg. Kubernetes services).
209 // supervisor.Logger(ctx).Infof("Starting role service...")
210 rs = roleserve.New(roleserve.Config{
211 CuratorDial: c.DialCluster,
212 StorageRoot: root,
213 Network: networkSvc,
214 KPKI: kpki,
Lorenz Brun1de8b182021-12-21 17:15:18 +0100215 Node: &status.Credentials.Node,
Serge Bazanskie78a0892021-10-07 17:03:49 +0200216 })
217 if err := supervisor.Run(ctx, "role", rs.Run); err != nil {
218 close(trapdoor)
219 return fmt.Errorf("failed to start role service: %w", err)
220 }
221 } else {
222 logger.Warningf("TODO(q3k): Dummy node - will not run Kubernetes/Curator/Roleserver...")
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200223 }
224
225 // Start the node debug service.
Serge Bazanskif9edf522021-06-17 15:57:13 +0200226 supervisor.Logger(ctx).Infof("Starting debug service...")
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200227 dbg := &debugService{
Serge Bazanski158e9a42021-08-17 17:04:54 +0200228 roleserve: rs,
229 logtree: lt,
230 traceLock: make(chan struct{}, 1),
Lorenz Brun9d6c4c72021-07-20 21:16:27 +0200231 ephemeralVolume: &root.Ephemeral.Containerd,
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200232 }
233 dbgSrv := grpc.NewServer()
234 apb.RegisterNodeDebugServiceServer(dbgSrv, dbg)
235 dbgLis, err := net.Listen("tcp", fmt.Sprintf(":%d", common.DebugServicePort))
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100236 if err != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200237 return fmt.Errorf("failed to listen on debug service: %w", err)
238 }
239 if err := supervisor.Run(ctx, "debug", supervisor.GRPCServer(dbgSrv, dbgLis, false)); err != nil {
240 return fmt.Errorf("failed to start debug service: %w", err)
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100241 }
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200242
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100243 supervisor.Signal(ctx, supervisor.SignalHealthy)
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200244 supervisor.Signal(ctx, supervisor.SignalDone)
245 return nil
Serge Bazanskic7359672020-10-30 16:38:57 +0100246 }, supervisor.WithExistingLogtree(lt))
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100247
Serge Bazanskieac8f732021-10-05 23:30:37 +0200248 <-trapdoor
249 logger.Infof("Trapdoor closed, exiting core.")
250 ctxC()
Serge Bazanski57b43752020-07-13 19:17:48 +0200251}