blob: d9f408ef00c78106e53633503ff9871ce42000e0 [file] [log] [blame]
Lorenz Brunae0d90d2019-09-05 17:53:56 +02001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package main
18
19import (
Serge Bazanskicdb8c782020-02-17 12:34:02 +010020 "context"
Serge Bazanski57b43752020-07-13 19:17:48 +020021 "crypto/ed25519"
22 "crypto/rand"
23 "crypto/x509"
Lorenz Brundd8c80e2019-10-07 16:19:49 +020024 "fmt"
Serge Bazanski1ebd1e12020-07-13 19:17:16 +020025 "log"
Serge Bazanski57b43752020-07-13 19:17:48 +020026 "math/big"
Serge Bazanski1ebd1e12020-07-13 19:17:16 +020027 "net"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020028 "os"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020029 "os/signal"
Lorenz Brunf95909d2019-09-11 19:48:26 +020030 "runtime/debug"
Serge Bazanski76003f82021-06-17 16:39:01 +020031 "time"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020032
Lorenz Brunae0d90d2019-09-05 17:53:56 +020033 "golang.org/x/sys/unix"
Serge Bazanski1ebd1e12020-07-13 19:17:16 +020034 "google.golang.org/grpc"
35
Serge Bazanski31370b02021-01-07 16:31:14 +010036 common "source.monogon.dev/metropolis/node"
37 "source.monogon.dev/metropolis/node/core/cluster"
Serge Bazanski76003f82021-06-17 16:39:01 +020038 "source.monogon.dev/metropolis/node/core/curator"
Serge Bazanski31370b02021-01-07 16:31:14 +010039 "source.monogon.dev/metropolis/node/core/localstorage"
40 "source.monogon.dev/metropolis/node/core/localstorage/declarative"
41 "source.monogon.dev/metropolis/node/core/network"
Serge Bazanski31370b02021-01-07 16:31:14 +010042 "source.monogon.dev/metropolis/node/kubernetes"
43 "source.monogon.dev/metropolis/node/kubernetes/containerd"
44 "source.monogon.dev/metropolis/node/kubernetes/pki"
45 "source.monogon.dev/metropolis/pkg/logtree"
46 "source.monogon.dev/metropolis/pkg/supervisor"
47 "source.monogon.dev/metropolis/pkg/tpm"
48 apb "source.monogon.dev/metropolis/proto/api"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020049)
50
Serge Bazanski1ebd1e12020-07-13 19:17:16 +020051var (
Serge Bazanski216fe7b2021-05-21 18:36:16 +020052 // kubernetesConfig is the static/global part of the Kubernetes service
53 // configuration. In the future, this might be configurable by loading it
54 // from the EnrolmentConfig. Fow now, it's static and same across all
55 // clusters.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +020056 kubernetesConfig = kubernetes.Config{
57 ServiceIPRange: net.IPNet{ // TODO(q3k): Decide if configurable / final value
Lorenz Brunca24cfa2020-08-18 13:49:37 +020058 IP: net.IP{10, 0, 255, 1},
Serge Bazanski1ebd1e12020-07-13 19:17:16 +020059 Mask: net.IPMask{0xff, 0xff, 0xff, 0x00}, // /24, but Go stores as a literal mask
60 },
61 ClusterNet: net.IPNet{
62 IP: net.IP{10, 0, 0, 0},
63 Mask: net.IPMask{0xff, 0xff, 0x00, 0x00}, // /16
64 },
65 }
Leopold Schabela4516f92019-12-04 20:27:05 +000066)
67
Lorenz Brunae0d90d2019-09-05 17:53:56 +020068func main() {
Lorenz Brunf95909d2019-09-11 19:48:26 +020069 defer func() {
70 if r := recover(); r != nil {
71 fmt.Println("Init panicked:", r)
72 debug.PrintStack()
73 }
74 unix.Sync()
Leopold Schabel68c58752019-11-14 21:00:59 +010075 // TODO(lorenz): Switch this to Reboot when init panics are less likely
Serge Bazanski216fe7b2021-05-21 18:36:16 +020076 // Best effort, nothing we can do if this fails except printing the
77 // error to the console.
Leopold Schabel68c58752019-11-14 21:00:59 +010078 if err := unix.Reboot(unix.LINUX_REBOOT_CMD_POWER_OFF); err != nil {
79 panic(fmt.Sprintf("failed to halt node: %v\n", err))
80 }
Lorenz Brunf95909d2019-09-11 19:48:26 +020081 }()
Serge Bazanskic7359672020-10-30 16:38:57 +010082
Serge Bazanski662b5b32020-12-21 13:49:00 +010083 // Set up logger for Metropolis. Currently logs everything to stderr.
Serge Bazanskic7359672020-10-30 16:38:57 +010084 lt := logtree.New()
85 reader, err := lt.Read("", logtree.WithChildren(), logtree.WithStream())
Lorenz Brunae0d90d2019-09-05 17:53:56 +020086 if err != nil {
Serge Bazanskic7359672020-10-30 16:38:57 +010087 panic(fmt.Errorf("could not set up root log reader: %v", err))
Lorenz Brunae0d90d2019-09-05 17:53:56 +020088 }
Serge Bazanskic7359672020-10-30 16:38:57 +010089 go func() {
90 for {
91 p := <-reader.Stream
Serge Bazanskib0272182020-11-02 18:39:44 +010092 fmt.Fprintf(os.Stderr, "%s\n", p.String())
Serge Bazanskic7359672020-10-30 16:38:57 +010093 }
94 }()
95
96 // Initial logger. Used until we get to a supervisor.
97 logger := lt.MustLeveledFor("init")
Serge Bazanski581b0bd2020-03-12 13:36:43 +010098
Lorenz Brun3a99c592021-01-26 19:57:21 +010099 // Set up basic mounts
100 err = setupMounts(logger)
Serge Bazanski581b0bd2020-03-12 13:36:43 +0100101 if err != nil {
Lorenz Brun3a99c592021-01-26 19:57:21 +0100102 panic(fmt.Errorf("could not set up basic mounts: %w", err))
Serge Bazanski581b0bd2020-03-12 13:36:43 +0100103 }
104
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200105 // Linux kernel default is 4096 which is far too low. Raise it to 1M which
106 // is what gVisor suggests.
Lorenz Brun878f5f92020-05-12 16:15:39 +0200107 if err := unix.Setrlimit(unix.RLIMIT_NOFILE, &unix.Rlimit{Cur: 1048576, Max: 1048576}); err != nil {
Serge Bazanskic7359672020-10-30 16:38:57 +0100108 logger.Fatalf("Failed to raise rlimits: %v", err)
Lorenz Brun878f5f92020-05-12 16:15:39 +0200109 }
110
Serge Bazanski662b5b32020-12-21 13:49:00 +0100111 logger.Info("Starting Metropolis node init")
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200112
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200113 signalChannel := make(chan os.Signal, 2)
114 signal.Notify(signalChannel)
115
Serge Bazanskic7359672020-10-30 16:38:57 +0100116 if err := tpm.Initialize(logger); err != nil {
117 logger.Fatalf("Failed to initialize TPM 2.0: %v", err)
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200118 }
119
Serge Bazanskid8af5bf2021-03-16 13:38:29 +0100120 networkSvc := network.New()
Leopold Schabel68c58752019-11-14 21:00:59 +0100121
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200122 // This function initializes a headless Delve if this is a debug build or
123 // does nothing if it's not
Lorenz Brun70f65b22020-07-08 17:02:47 +0200124 initializeDebugger(networkSvc)
125
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200126 // Prepare local storage.
127 root := &localstorage.Root{}
128 if err := declarative.PlaceFS(root, "/"); err != nil {
129 panic(fmt.Errorf("when placing root FS: %w", err))
130 }
131
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200132 // trapdoor is a channel used to signal to the init service that a very
133 // low-level, unrecoverable failure occured. This causes a GURU MEDITATION
134 // ERROR visible to the end user.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200135 trapdoor := make(chan struct{})
136
137 // Make context for supervisor. We cancel it when we reach the trapdoor.
138 ctxS, ctxC := context.WithCancel(context.Background())
139
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200140 // Start root initialization code as a supervisor one-shot runnable. This
141 // means waiting for the network, starting the cluster manager, and then
142 // starting all services related to the node's roles.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200143 // TODO(q3k): move this to a separate 'init' service.
Serge Bazanskic7359672020-10-30 16:38:57 +0100144 supervisor.New(ctxS, func(ctx context.Context) error {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200145 logger := supervisor.Logger(ctx)
146
147 // Start storage and network - we need this to get anything else done.
148 if err := root.Start(ctx); err != nil {
149 return fmt.Errorf("cannot start root FS: %w", err)
150 }
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100151 if err := supervisor.Run(ctx, "network", networkSvc.Run); err != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200152 return fmt.Errorf("when starting network: %w", err)
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100153 }
Lorenz Brunf95909d2019-09-11 19:48:26 +0200154
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200155 // Start cluster manager. This kicks off cluster membership machinery,
156 // which will either start a new cluster, enroll into one or join one.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200157 m := cluster.NewManager(root, networkSvc)
158 if err := supervisor.Run(ctx, "enrolment", m.Run); err != nil {
159 return fmt.Errorf("when starting enrolment: %w", err)
160 }
161
Serge Bazanskia105db52021-04-12 19:57:46 +0200162 // Wait until the node finds a home in the new cluster.
163 watcher := m.Watch()
164 status, err := watcher.GetHome(ctx)
Serge Bazanski42e61c62021-03-18 15:07:18 +0100165 if err != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200166 close(trapdoor)
Serge Bazanskia105db52021-04-12 19:57:46 +0200167 return fmt.Errorf("new couldn't find home in new cluster, aborting: %w", err)
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200168 }
169
Serge Bazanski76003f82021-06-17 16:39:01 +0200170 // Start cluster curator.
171 kv, err := status.ConsensusClient(cluster.ConsensusUserCurator)
172 if err != nil {
173 return fmt.Errorf("failed to retrieve consensus curator client: %w", err)
174 }
175 c := curator.New(curator.Config{
176 Etcd: kv,
177 NodeID: status.Node.ID(),
178 // TODO(q3k): make this configurable?
179 LeaderTTL: time.Second * 5,
180 Directory: &root.Ephemeral.Curator,
181 })
182 if err := supervisor.Run(ctx, "curator", c.Run); err != nil {
183 return fmt.Errorf("when starting curator: %w", err)
184 }
185
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200186 // We are now in a cluster. We can thus access our 'node' object and
187 // start all services that we should be running.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200188
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200189 logger.Info("Enrolment success, continuing startup.")
Serge Bazanskia105db52021-04-12 19:57:46 +0200190 logger.Info(fmt.Sprintf("This node (%s) has roles:", status.Node.String()))
191 if cm := status.Node.ConsensusMember(); cm != nil {
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200192 // There's no need to start anything for when we are a consensus
193 // member - the cluster manager does this for us if necessary (as
194 // creating/enrolling/joining a cluster is pretty tied into cluster
195 // lifecycle management).
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200196 logger.Info(fmt.Sprintf(" - etcd consensus member"))
197 }
Serge Bazanskia105db52021-04-12 19:57:46 +0200198 if kw := status.Node.KubernetesWorker(); kw != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200199 logger.Info(fmt.Sprintf(" - kubernetes worker"))
200 }
201
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200202 // If we're supposed to be a kubernetes worker, start kubernetes
203 // services and containerd. In the future, this might be split further
204 // into kubernetes control plane and data plane roles.
205 // TODO(q3k): watch on cluster status updates to start/stop kubernetes
206 // service.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200207 var containerdSvc *containerd.Service
208 var kubeSvc *kubernetes.Service
Serge Bazanskia105db52021-04-12 19:57:46 +0200209 if kw := status.Node.KubernetesWorker(); kw != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200210 logger.Info("Starting Kubernetes worker services...")
211
Serge Bazanskia105db52021-04-12 19:57:46 +0200212 kv, err := status.ConsensusClient(cluster.ConsensusUserKubernetesPKI)
213 if err != nil {
214 return fmt.Errorf("failed to retrieve consensus kubernetes PKI client: %w", err)
215 }
216
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200217 // Ensure Kubernetes PKI objects exist in etcd.
Serge Bazanskia105db52021-04-12 19:57:46 +0200218 kpki := pki.New(lt.MustLeveledFor("pki.kubernetes"), kv)
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200219 if err := kpki.EnsureAll(ctx); err != nil {
220 return fmt.Errorf("failed to ensure kubernetes PKI present: %w", err)
221 }
222
223 containerdSvc = &containerd.Service{
224 EphemeralVolume: &root.Ephemeral.Containerd,
225 }
226 if err := supervisor.Run(ctx, "containerd", containerdSvc.Run); err != nil {
227 return fmt.Errorf("failed to start containerd service: %w", err)
228 }
229
230 kubernetesConfig.KPKI = kpki
231 kubernetesConfig.Root = root
Serge Bazanskid8af5bf2021-03-16 13:38:29 +0100232 kubernetesConfig.Network = networkSvc
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200233 kubeSvc = kubernetes.New(kubernetesConfig)
234 if err := supervisor.Run(ctx, "kubernetes", kubeSvc.Run); err != nil {
235 return fmt.Errorf("failed to start kubernetes service: %w", err)
236 }
237
238 }
239
240 // Start the node debug service.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200241 dbg := &debugService{
242 cluster: m,
Serge Bazanskib0272182020-11-02 18:39:44 +0100243 logtree: lt,
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200244 kubernetes: kubeSvc,
Lorenz Brun09c275b2021-03-30 12:47:09 +0200245 traceLock: make(chan struct{}, 1),
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200246 }
247 dbgSrv := grpc.NewServer()
248 apb.RegisterNodeDebugServiceServer(dbgSrv, dbg)
249 dbgLis, err := net.Listen("tcp", fmt.Sprintf(":%d", common.DebugServicePort))
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100250 if err != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200251 return fmt.Errorf("failed to listen on debug service: %w", err)
252 }
253 if err := supervisor.Run(ctx, "debug", supervisor.GRPCServer(dbgSrv, dbgLis, false)); err != nil {
254 return fmt.Errorf("failed to start debug service: %w", err)
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100255 }
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200256
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100257 supervisor.Signal(ctx, supervisor.SignalHealthy)
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200258 supervisor.Signal(ctx, supervisor.SignalDone)
259 return nil
Serge Bazanskic7359672020-10-30 16:38:57 +0100260 }, supervisor.WithExistingLogtree(lt))
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100261
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200262 // We're PID1, so orphaned processes get reparented to us to clean up
263 for {
264 select {
265 case <-trapdoor:
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200266 // If the trapdoor got closed, we got stuck early enough in the
267 // boot process that we can't do anything about it. Display a
268 // generic error message until we handle error conditions better.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200269 ctxC()
270 log.Printf(" ########################")
271 log.Printf(" # GURU MEDIATION ERROR #")
272 log.Printf(" ########################")
273 log.Printf("")
Serge Bazanski662b5b32020-12-21 13:49:00 +0100274 log.Printf("Metropolis encountered an uncorrectable error and this node must be")
275 log.Printf("restarted.")
276 log.Printf("")
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200277 log.Printf("(Error condition: init trapdoor closed)")
278 log.Printf("")
279 select {}
280
281 case sig := <-signalChannel:
282 switch sig {
283 case unix.SIGCHLD:
284 var status unix.WaitStatus
285 var rusage unix.Rusage
286 for {
287 res, err := unix.Wait4(-1, &status, unix.WNOHANG, &rusage)
288 if err != nil && err != unix.ECHILD {
Serge Bazanskic7359672020-10-30 16:38:57 +0100289 logger.Errorf("Failed to wait on orphaned child: %v", err)
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200290 break
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100291 }
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200292 if res <= 0 {
293 break
294 }
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200295 }
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200296 case unix.SIGURG:
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200297 // Go 1.14 introduced asynchronous preemption, which uses
298 // SIGURG.
299 // In order not to break backwards compatibility in the
300 // unlikely case of an application actually using SIGURG on its
301 // own, they're not filtering them.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200302 // (https://github.com/golang/go/issues/37942)
Serge Bazanskic7359672020-10-30 16:38:57 +0100303 logger.V(5).Info("Ignoring SIGURG")
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200304 // TODO(lorenz): We can probably get more than just SIGCHLD as init, but I can't think
305 // of any others right now, just log them in case we hit any of them.
306 default:
Serge Bazanskic7359672020-10-30 16:38:57 +0100307 logger.Warningf("Got unexpected signal %s", sig.String())
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200308 }
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200309 }
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200310 }
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200311}
Serge Bazanski57b43752020-07-13 19:17:48 +0200312
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200313// nodeCertificate creates a node key/certificate for a foreign node. This is
314// duplicated code with localstorage's PKIDirectory EnsureSelfSigned, but is
315// temporary (and specific to 'golden tickets').
Serge Bazanski57b43752020-07-13 19:17:48 +0200316func (s *debugService) nodeCertificate() (cert, key []byte, err error) {
317 pubKey, privKey, err := ed25519.GenerateKey(rand.Reader)
318 if err != nil {
319 err = fmt.Errorf("failed to generate key: %w", err)
320 return
321 }
322
323 key, err = x509.MarshalPKCS8PrivateKey(privKey)
324 if err != nil {
325 err = fmt.Errorf("failed to marshal key: %w", err)
326 return
327 }
328
329 serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 127)
330 serialNumber, err := rand.Int(rand.Reader, serialNumberLimit)
331 if err != nil {
332 err = fmt.Errorf("failed to generate serial number: %w", err)
333 return
334 }
335
336 template := localstorage.CertificateForNode(pubKey)
337 template.SerialNumber = serialNumber
338
339 cert, err = x509.CreateCertificate(rand.Reader, &template, &template, pubKey, privKey)
340 if err != nil {
341 err = fmt.Errorf("could not sign certificate: %w", err)
342 return
343 }
344 return
345}