blob: a67f6fd7bd572d37b71396abacaada029fb52f78 [file] [log] [blame]
Lorenz Brun6e8f69c2019-11-18 10:44:24 +01001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package kubernetes
18
19import (
Lorenz Brun878f5f92020-05-12 16:15:39 +020020 "context"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010021 "encoding/pem"
22 "fmt"
Lorenz Brun878f5f92020-05-12 16:15:39 +020023 "go.uber.org/zap"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010024 "net"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010025 "os/exec"
26
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010027 "go.etcd.io/etcd/clientv3"
Hendrik Hofstadt8efe51e2020-02-28 12:53:41 +010028
29 "git.monogon.dev/source/nexantic.git/core/pkg/fileargs"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010030)
31
32type controllerManagerConfig struct {
33 clusterNet net.IPNet
34 // All PKI-related things are in DER
35 kubeConfig []byte
36 rootCA []byte
37 serviceAccountPrivKey []byte // In PKCS#8 form
38 serverCert []byte
39 serverKey []byte
40}
41
42func getPKIControllerManagerConfig(consensusKV clientv3.KV) (*controllerManagerConfig, error) {
43 var config controllerManagerConfig
44 var err error
45 config.rootCA, _, err = getCert(consensusKV, "id-ca")
46 if err != nil {
47 return nil, fmt.Errorf("failed to get ID root CA: %w", err)
48 }
49 config.serverCert, config.serverKey, err = getCert(consensusKV, "controller-manager")
50 if err != nil {
51 return nil, fmt.Errorf("failed to get controller-manager serving certificate: %w", err)
52 }
53 config.serviceAccountPrivKey, err = getSingle(consensusKV, "service-account-privkey.der")
54 if err != nil {
55 return nil, fmt.Errorf("failed to get serviceaccount privkey: %w", err)
56 }
57 config.kubeConfig, err = getSingle(consensusKV, "controller-manager.kubeconfig")
58 if err != nil {
59 return nil, fmt.Errorf("failed to get controller-manager kubeconfig: %w", err)
60 }
61 return &config, nil
62}
63
Lorenz Brun878f5f92020-05-12 16:15:39 +020064func (s *Service) runControllerManager(ctx context.Context, config controllerManagerConfig) error {
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010065 args, err := fileargs.New()
66 if err != nil {
67 panic(err) // If this fails, something is very wrong. Just crash.
68 }
69 defer args.Close()
Lorenz Brun878f5f92020-05-12 16:15:39 +020070 cmd := exec.CommandContext(ctx, "/kubernetes/bin/kube", "kube-controller-manager",
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010071 args.FileOpt("--kubeconfig", "kubeconfig", config.kubeConfig),
72 args.FileOpt("--service-account-private-key-file", "service-account-privkey.pem",
73 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.serviceAccountPrivKey})),
74 args.FileOpt("--root-ca-file", "root-ca.pem",
75 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.rootCA})),
76 "--port=0", // Kill insecure serving
77 "--use-service-account-credentials=true", // Enables things like PSP enforcement
78 fmt.Sprintf("--cluster-cidr=%v", config.clusterNet.String()),
79 args.FileOpt("--tls-cert-file", "server-cert.pem",
80 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.serverCert})),
81 args.FileOpt("--tls-private-key-file", "server-key.pem",
82 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.serverKey})),
83 )
84 if args.Error() != nil {
85 return fmt.Errorf("failed to use fileargs: %w", err)
86 }
Lorenz Brun878f5f92020-05-12 16:15:39 +020087 cmd.Stdout = s.controllerManagerLogs
88 cmd.Stderr = s.controllerManagerLogs
89 err = cmd.Run()
90 fmt.Fprintf(s.controllerManagerLogs, "controller-manager stopped: %v\n", err)
91 if ctx.Err() == context.Canceled {
92 s.logger.Info("controller-manager stopped", zap.Error(err))
93 } else {
94 s.logger.Warn("controller-manager stopped unexpectedly", zap.Error(err))
95 }
96 return err
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010097}