blob: c6b0bd3a0ad0d490ae0712c4f9fe3459634e50e4 [file] [log] [blame]
Lorenz Brunae0d90d2019-09-05 17:53:56 +02001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package main
18
19import (
Serge Bazanskicdb8c782020-02-17 12:34:02 +010020 "context"
Lorenz Brundd8c80e2019-10-07 16:19:49 +020021 "fmt"
Serge Bazanskie803fc12022-01-25 14:58:24 +010022 "io"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020023 "os"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020024
Lorenz Brunae0d90d2019-09-05 17:53:56 +020025 "golang.org/x/sys/unix"
Serge Bazanski99f47742021-08-04 20:21:42 +020026
Serge Bazanski31370b02021-01-07 16:31:14 +010027 "source.monogon.dev/metropolis/node/core/cluster"
28 "source.monogon.dev/metropolis/node/core/localstorage"
29 "source.monogon.dev/metropolis/node/core/localstorage/declarative"
30 "source.monogon.dev/metropolis/node/core/network"
Serge Bazanski6dff6d62022-01-28 18:15:14 +010031 "source.monogon.dev/metropolis/node/core/network/hostsfile"
Serge Bazanskif9edf522021-06-17 15:57:13 +020032 "source.monogon.dev/metropolis/node/core/roleserve"
Serge Bazanski58ddc092022-06-30 18:23:33 +020033 "source.monogon.dev/metropolis/node/core/rpc/resolver"
Lorenz Brune306d782021-09-01 13:01:06 +020034 timesvc "source.monogon.dev/metropolis/node/core/time"
Serge Bazanski31370b02021-01-07 16:31:14 +010035 "source.monogon.dev/metropolis/pkg/logtree"
36 "source.monogon.dev/metropolis/pkg/supervisor"
37 "source.monogon.dev/metropolis/pkg/tpm"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020038)
39
40func main() {
Serge Bazanskie803fc12022-01-25 14:58:24 +010041 // Set up basic mounts (like /dev, /sys...).
42 if err := setupMounts(); err != nil {
43 panic(fmt.Errorf("could not set up basic mounts: %w", err))
Lorenz Brunae0d90d2019-09-05 17:53:56 +020044 }
Serge Bazanskie803fc12022-01-25 14:58:24 +010045
46 // Set up logger for Metropolis. Currently logs everything to /dev/tty0 and
47 // /dev/ttyS0.
48 lt := logtree.New()
49 for _, p := range []string{
50 "/dev/tty0", "/dev/ttyS0",
51 } {
52 f, err := os.OpenFile(p, os.O_WRONLY, 0)
53 if err != nil {
54 continue
Serge Bazanskic7359672020-10-30 16:38:57 +010055 }
Serge Bazanskie803fc12022-01-25 14:58:24 +010056 reader, err := lt.Read("", logtree.WithChildren(), logtree.WithStream())
57 if err != nil {
58 panic(fmt.Errorf("could not set up root log reader: %v", err))
59 }
60 go func(path string, f io.Writer) {
61 fmt.Fprintf(f, "\nMetropolis: this is %s. Verbose node logs follow.\n\n", path)
62 for {
63 p := <-reader.Stream
64 fmt.Fprintf(f, "%s\n", p.String())
65 }
66 }(p, f)
67 }
Lorenz Brun4025c9b2022-06-16 16:12:53 +000068 // Initialize persistent panic handler early
69 initPanicHandler(lt)
Serge Bazanskic7359672020-10-30 16:38:57 +010070
71 // Initial logger. Used until we get to a supervisor.
72 logger := lt.MustLeveledFor("init")
Serge Bazanski581b0bd2020-03-12 13:36:43 +010073
Serge Bazanski216fe7b2021-05-21 18:36:16 +020074 // Linux kernel default is 4096 which is far too low. Raise it to 1M which
75 // is what gVisor suggests.
Lorenz Brun878f5f92020-05-12 16:15:39 +020076 if err := unix.Setrlimit(unix.RLIMIT_NOFILE, &unix.Rlimit{Cur: 1048576, Max: 1048576}); err != nil {
Serge Bazanskic7359672020-10-30 16:38:57 +010077 logger.Fatalf("Failed to raise rlimits: %v", err)
Lorenz Brun878f5f92020-05-12 16:15:39 +020078 }
79
Serge Bazanski662b5b32020-12-21 13:49:00 +010080 logger.Info("Starting Metropolis node init")
Lorenz Brunae0d90d2019-09-05 17:53:56 +020081
Serge Bazanskic7359672020-10-30 16:38:57 +010082 if err := tpm.Initialize(logger); err != nil {
Lorenz Brun8b786892022-01-13 14:21:16 +010083 logger.Warningf("Failed to initialize TPM 2.0, attempting fallback to untrusted: %v", err)
Lorenz Brunae0d90d2019-09-05 17:53:56 +020084 }
85
Serge Bazanskid8af5bf2021-03-16 13:38:29 +010086 networkSvc := network.New()
Lorenz Brune306d782021-09-01 13:01:06 +020087 timeSvc := timesvc.New()
Leopold Schabel68c58752019-11-14 21:00:59 +010088
Serge Bazanski216fe7b2021-05-21 18:36:16 +020089 // This function initializes a headless Delve if this is a debug build or
90 // does nothing if it's not
Lorenz Brun70f65b22020-07-08 17:02:47 +020091 initializeDebugger(networkSvc)
92
Serge Bazanski1ebd1e12020-07-13 19:17:16 +020093 // Prepare local storage.
94 root := &localstorage.Root{}
95 if err := declarative.PlaceFS(root, "/"); err != nil {
96 panic(fmt.Errorf("when placing root FS: %w", err))
97 }
98
Serge Bazanski216fe7b2021-05-21 18:36:16 +020099 // trapdoor is a channel used to signal to the init service that a very
Serge Bazanskieac8f732021-10-05 23:30:37 +0200100 // low-level, unrecoverable failure occured.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200101 trapdoor := make(chan struct{})
102
103 // Make context for supervisor. We cancel it when we reach the trapdoor.
104 ctxS, ctxC := context.WithCancel(context.Background())
105
Serge Bazanski58ddc092022-06-30 18:23:33 +0200106 // Make node-wide cluster resolver.
107 res := resolver.New(ctxS, resolver.WithLogger(func(f string, args ...interface{}) {
108 lt.MustLeveledFor("resolver").WithAddedStackDepth(1).Infof(f, args...)
109 }))
110
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200111 // Start root initialization code as a supervisor one-shot runnable. This
112 // means waiting for the network, starting the cluster manager, and then
113 // starting all services related to the node's roles.
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200114 // TODO(q3k): move this to a separate 'init' service.
Serge Bazanskic7359672020-10-30 16:38:57 +0100115 supervisor.New(ctxS, func(ctx context.Context) error {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200116 // Start storage and network - we need this to get anything else done.
117 if err := root.Start(ctx); err != nil {
118 return fmt.Errorf("cannot start root FS: %w", err)
119 }
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100120 if err := supervisor.Run(ctx, "network", networkSvc.Run); err != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200121 return fmt.Errorf("when starting network: %w", err)
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100122 }
Lorenz Brune306d782021-09-01 13:01:06 +0200123 if err := supervisor.Run(ctx, "time", timeSvc.Run); err != nil {
124 return fmt.Errorf("when starting time: %w", err)
125 }
Lorenz Brun1b2df232022-06-14 12:42:03 +0200126 if err := supervisor.Run(ctx, "pstore", dumpAndCleanPstore); err != nil {
127 return fmt.Errorf("when starting pstore: %w", err)
128 }
Lorenz Brunf95909d2019-09-11 19:48:26 +0200129
Serge Bazanski6dff6d62022-01-28 18:15:14 +0100130 // Start the role service. The role service connects to the curator and runs
131 // all node-specific role code (eg. Kubernetes services).
132 // supervisor.Logger(ctx).Infof("Starting role service...")
133 rs := roleserve.New(roleserve.Config{
134 StorageRoot: root,
135 Network: networkSvc,
Serge Bazanski58ddc092022-06-30 18:23:33 +0200136 Resolver: res,
Serge Bazanski6dff6d62022-01-28 18:15:14 +0100137 })
138 if err := supervisor.Run(ctx, "role", rs.Run); err != nil {
139 close(trapdoor)
140 return fmt.Errorf("failed to start role service: %w", err)
141 }
142
143 // Start the hostsfile service.
144 hostsfileSvc := hostsfile.Service{
145 Config: hostsfile.Config{
146 Roleserver: rs,
147 Network: networkSvc,
148 Ephemeral: &root.Ephemeral,
Mateusz Zalegab30a41d2022-04-29 17:14:50 +0200149 ESP: &root.ESP,
Serge Bazanski6dff6d62022-01-28 18:15:14 +0100150 },
151 }
152 if err := supervisor.Run(ctx, "hostsfile", hostsfileSvc.Run); err != nil {
153 close(trapdoor)
154 return fmt.Errorf("failed to start hostsfile service: %w", err)
155 }
156
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200157 // Start cluster manager. This kicks off cluster membership machinery,
158 // which will either start a new cluster, enroll into one or join one.
Serge Bazanski6dff6d62022-01-28 18:15:14 +0100159 m := cluster.NewManager(root, networkSvc, rs)
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200160 if err := supervisor.Run(ctx, "enrolment", m.Run); err != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200161 close(trapdoor)
Serge Bazanski6dff6d62022-01-28 18:15:14 +0100162 return fmt.Errorf("when starting enrolment: %w", err)
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200163 }
164
Lorenz Brunac82c0d2022-03-01 13:32:45 +0100165 if err := runDebugService(ctx, rs, lt, root); err != nil {
166 return fmt.Errorf("when starting debug service: %w", err)
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100167 }
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200168
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100169 supervisor.Signal(ctx, supervisor.SignalHealthy)
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200170 supervisor.Signal(ctx, supervisor.SignalDone)
171 return nil
Serge Bazanskic7359672020-10-30 16:38:57 +0100172 }, supervisor.WithExistingLogtree(lt))
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100173
Serge Bazanskieac8f732021-10-05 23:30:37 +0200174 <-trapdoor
175 logger.Infof("Trapdoor closed, exiting core.")
176 ctxC()
Serge Bazanski57b43752020-07-13 19:17:48 +0200177}