blob: 1146a140de7143a117d6770a6c55f6c7e7b3cf71 [file] [log] [blame]
Lorenz Brun6e8f69c2019-11-18 10:44:24 +01001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package kubernetes
18
19import (
20 "encoding/pem"
21 "fmt"
22 "net"
23 "os"
24 "os/exec"
25
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010026 "go.etcd.io/etcd/clientv3"
Hendrik Hofstadt8efe51e2020-02-28 12:53:41 +010027
28 "git.monogon.dev/source/nexantic.git/core/pkg/fileargs"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010029)
30
31type controllerManagerConfig struct {
32 clusterNet net.IPNet
33 // All PKI-related things are in DER
34 kubeConfig []byte
35 rootCA []byte
36 serviceAccountPrivKey []byte // In PKCS#8 form
37 serverCert []byte
38 serverKey []byte
39}
40
41func getPKIControllerManagerConfig(consensusKV clientv3.KV) (*controllerManagerConfig, error) {
42 var config controllerManagerConfig
43 var err error
44 config.rootCA, _, err = getCert(consensusKV, "id-ca")
45 if err != nil {
46 return nil, fmt.Errorf("failed to get ID root CA: %w", err)
47 }
48 config.serverCert, config.serverKey, err = getCert(consensusKV, "controller-manager")
49 if err != nil {
50 return nil, fmt.Errorf("failed to get controller-manager serving certificate: %w", err)
51 }
52 config.serviceAccountPrivKey, err = getSingle(consensusKV, "service-account-privkey.der")
53 if err != nil {
54 return nil, fmt.Errorf("failed to get serviceaccount privkey: %w", err)
55 }
56 config.kubeConfig, err = getSingle(consensusKV, "controller-manager.kubeconfig")
57 if err != nil {
58 return nil, fmt.Errorf("failed to get controller-manager kubeconfig: %w", err)
59 }
60 return &config, nil
61}
62
63func runControllerManager(config controllerManagerConfig) error {
64 args, err := fileargs.New()
65 if err != nil {
66 panic(err) // If this fails, something is very wrong. Just crash.
67 }
68 defer args.Close()
69 cmd := exec.Command("/bin/kube-controlplane", "kube-controller-manager",
70 args.FileOpt("--kubeconfig", "kubeconfig", config.kubeConfig),
71 args.FileOpt("--service-account-private-key-file", "service-account-privkey.pem",
72 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.serviceAccountPrivKey})),
73 args.FileOpt("--root-ca-file", "root-ca.pem",
74 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.rootCA})),
75 "--port=0", // Kill insecure serving
76 "--use-service-account-credentials=true", // Enables things like PSP enforcement
77 fmt.Sprintf("--cluster-cidr=%v", config.clusterNet.String()),
78 args.FileOpt("--tls-cert-file", "server-cert.pem",
79 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.serverCert})),
80 args.FileOpt("--tls-private-key-file", "server-key.pem",
81 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.serverKey})),
82 )
83 if args.Error() != nil {
84 return fmt.Errorf("failed to use fileargs: %w", err)
85 }
86 cmd.Stdout = os.Stdout
87 cmd.Stderr = os.Stderr
88 return cmd.Run()
89}