Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 1 | // Copyright 2020 The Monogon Project Authors. |
| 2 | // |
| 3 | // SPDX-License-Identifier: Apache-2.0 |
| 4 | // |
| 5 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 6 | // you may not use this file except in compliance with the License. |
| 7 | // You may obtain a copy of the License at |
| 8 | // |
| 9 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 10 | // |
| 11 | // Unless required by applicable law or agreed to in writing, software |
| 12 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 13 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 14 | // See the License for the specific language governing permissions and |
| 15 | // limitations under the License. |
| 16 | |
| 17 | package main |
| 18 | |
| 19 | import ( |
Serge Bazanski | cdb8c78 | 2020-02-17 12:34:02 +0100 | [diff] [blame] | 20 | "context" |
Serge Bazanski | 57b4375 | 2020-07-13 19:17:48 +0200 | [diff] [blame] | 21 | "crypto/ed25519" |
| 22 | "crypto/rand" |
| 23 | "crypto/x509" |
Lorenz Brun | dd8c80e | 2019-10-07 16:19:49 +0200 | [diff] [blame] | 24 | "fmt" |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 25 | "log" |
Serge Bazanski | 57b4375 | 2020-07-13 19:17:48 +0200 | [diff] [blame] | 26 | "math/big" |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 27 | "net" |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 28 | "os" |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 29 | "os/signal" |
Lorenz Brun | f95909d | 2019-09-11 19:48:26 +0200 | [diff] [blame] | 30 | "runtime/debug" |
Serge Bazanski | 76003f8 | 2021-06-17 16:39:01 +0200 | [diff] [blame] | 31 | "time" |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 32 | |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 33 | "golang.org/x/sys/unix" |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 34 | "google.golang.org/grpc" |
Serge Bazanski | 99f4774 | 2021-08-04 20:21:42 +0200 | [diff] [blame^] | 35 | |
Serge Bazanski | 31370b0 | 2021-01-07 16:31:14 +0100 | [diff] [blame] | 36 | common "source.monogon.dev/metropolis/node" |
| 37 | "source.monogon.dev/metropolis/node/core/cluster" |
Serge Bazanski | 76003f8 | 2021-06-17 16:39:01 +0200 | [diff] [blame] | 38 | "source.monogon.dev/metropolis/node/core/curator" |
Serge Bazanski | 31370b0 | 2021-01-07 16:31:14 +0100 | [diff] [blame] | 39 | "source.monogon.dev/metropolis/node/core/localstorage" |
| 40 | "source.monogon.dev/metropolis/node/core/localstorage/declarative" |
| 41 | "source.monogon.dev/metropolis/node/core/network" |
Serge Bazanski | f9edf52 | 2021-06-17 15:57:13 +0200 | [diff] [blame] | 42 | "source.monogon.dev/metropolis/node/core/roleserve" |
Serge Bazanski | 31370b0 | 2021-01-07 16:31:14 +0100 | [diff] [blame] | 43 | "source.monogon.dev/metropolis/node/kubernetes/pki" |
| 44 | "source.monogon.dev/metropolis/pkg/logtree" |
| 45 | "source.monogon.dev/metropolis/pkg/supervisor" |
| 46 | "source.monogon.dev/metropolis/pkg/tpm" |
| 47 | apb "source.monogon.dev/metropolis/proto/api" |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 48 | ) |
| 49 | |
| 50 | func main() { |
Lorenz Brun | f95909d | 2019-09-11 19:48:26 +0200 | [diff] [blame] | 51 | defer func() { |
| 52 | if r := recover(); r != nil { |
| 53 | fmt.Println("Init panicked:", r) |
| 54 | debug.PrintStack() |
| 55 | } |
| 56 | unix.Sync() |
Leopold Schabel | 68c5875 | 2019-11-14 21:00:59 +0100 | [diff] [blame] | 57 | // TODO(lorenz): Switch this to Reboot when init panics are less likely |
Serge Bazanski | 216fe7b | 2021-05-21 18:36:16 +0200 | [diff] [blame] | 58 | // Best effort, nothing we can do if this fails except printing the |
| 59 | // error to the console. |
Leopold Schabel | 68c5875 | 2019-11-14 21:00:59 +0100 | [diff] [blame] | 60 | if err := unix.Reboot(unix.LINUX_REBOOT_CMD_POWER_OFF); err != nil { |
| 61 | panic(fmt.Sprintf("failed to halt node: %v\n", err)) |
| 62 | } |
Lorenz Brun | f95909d | 2019-09-11 19:48:26 +0200 | [diff] [blame] | 63 | }() |
Serge Bazanski | c735967 | 2020-10-30 16:38:57 +0100 | [diff] [blame] | 64 | |
Serge Bazanski | 662b5b3 | 2020-12-21 13:49:00 +0100 | [diff] [blame] | 65 | // Set up logger for Metropolis. Currently logs everything to stderr. |
Serge Bazanski | c735967 | 2020-10-30 16:38:57 +0100 | [diff] [blame] | 66 | lt := logtree.New() |
| 67 | reader, err := lt.Read("", logtree.WithChildren(), logtree.WithStream()) |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 68 | if err != nil { |
Serge Bazanski | c735967 | 2020-10-30 16:38:57 +0100 | [diff] [blame] | 69 | panic(fmt.Errorf("could not set up root log reader: %v", err)) |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 70 | } |
Serge Bazanski | c735967 | 2020-10-30 16:38:57 +0100 | [diff] [blame] | 71 | go func() { |
| 72 | for { |
| 73 | p := <-reader.Stream |
Serge Bazanski | b027218 | 2020-11-02 18:39:44 +0100 | [diff] [blame] | 74 | fmt.Fprintf(os.Stderr, "%s\n", p.String()) |
Serge Bazanski | c735967 | 2020-10-30 16:38:57 +0100 | [diff] [blame] | 75 | } |
| 76 | }() |
| 77 | |
| 78 | // Initial logger. Used until we get to a supervisor. |
| 79 | logger := lt.MustLeveledFor("init") |
Serge Bazanski | 581b0bd | 2020-03-12 13:36:43 +0100 | [diff] [blame] | 80 | |
Lorenz Brun | 3a99c59 | 2021-01-26 19:57:21 +0100 | [diff] [blame] | 81 | // Set up basic mounts |
| 82 | err = setupMounts(logger) |
Serge Bazanski | 581b0bd | 2020-03-12 13:36:43 +0100 | [diff] [blame] | 83 | if err != nil { |
Lorenz Brun | 3a99c59 | 2021-01-26 19:57:21 +0100 | [diff] [blame] | 84 | panic(fmt.Errorf("could not set up basic mounts: %w", err)) |
Serge Bazanski | 581b0bd | 2020-03-12 13:36:43 +0100 | [diff] [blame] | 85 | } |
| 86 | |
Serge Bazanski | 216fe7b | 2021-05-21 18:36:16 +0200 | [diff] [blame] | 87 | // Linux kernel default is 4096 which is far too low. Raise it to 1M which |
| 88 | // is what gVisor suggests. |
Lorenz Brun | 878f5f9 | 2020-05-12 16:15:39 +0200 | [diff] [blame] | 89 | if err := unix.Setrlimit(unix.RLIMIT_NOFILE, &unix.Rlimit{Cur: 1048576, Max: 1048576}); err != nil { |
Serge Bazanski | c735967 | 2020-10-30 16:38:57 +0100 | [diff] [blame] | 90 | logger.Fatalf("Failed to raise rlimits: %v", err) |
Lorenz Brun | 878f5f9 | 2020-05-12 16:15:39 +0200 | [diff] [blame] | 91 | } |
| 92 | |
Serge Bazanski | 662b5b3 | 2020-12-21 13:49:00 +0100 | [diff] [blame] | 93 | logger.Info("Starting Metropolis node init") |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 94 | |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 95 | signalChannel := make(chan os.Signal, 2) |
| 96 | signal.Notify(signalChannel) |
| 97 | |
Serge Bazanski | c735967 | 2020-10-30 16:38:57 +0100 | [diff] [blame] | 98 | if err := tpm.Initialize(logger); err != nil { |
| 99 | logger.Fatalf("Failed to initialize TPM 2.0: %v", err) |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 100 | } |
| 101 | |
Serge Bazanski | d8af5bf | 2021-03-16 13:38:29 +0100 | [diff] [blame] | 102 | networkSvc := network.New() |
Leopold Schabel | 68c5875 | 2019-11-14 21:00:59 +0100 | [diff] [blame] | 103 | |
Serge Bazanski | 216fe7b | 2021-05-21 18:36:16 +0200 | [diff] [blame] | 104 | // This function initializes a headless Delve if this is a debug build or |
| 105 | // does nothing if it's not |
Lorenz Brun | 70f65b2 | 2020-07-08 17:02:47 +0200 | [diff] [blame] | 106 | initializeDebugger(networkSvc) |
| 107 | |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 108 | // Prepare local storage. |
| 109 | root := &localstorage.Root{} |
| 110 | if err := declarative.PlaceFS(root, "/"); err != nil { |
| 111 | panic(fmt.Errorf("when placing root FS: %w", err)) |
| 112 | } |
| 113 | |
Serge Bazanski | 216fe7b | 2021-05-21 18:36:16 +0200 | [diff] [blame] | 114 | // trapdoor is a channel used to signal to the init service that a very |
| 115 | // low-level, unrecoverable failure occured. This causes a GURU MEDITATION |
| 116 | // ERROR visible to the end user. |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 117 | trapdoor := make(chan struct{}) |
| 118 | |
| 119 | // Make context for supervisor. We cancel it when we reach the trapdoor. |
| 120 | ctxS, ctxC := context.WithCancel(context.Background()) |
| 121 | |
Serge Bazanski | 216fe7b | 2021-05-21 18:36:16 +0200 | [diff] [blame] | 122 | // Start root initialization code as a supervisor one-shot runnable. This |
| 123 | // means waiting for the network, starting the cluster manager, and then |
| 124 | // starting all services related to the node's roles. |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 125 | // TODO(q3k): move this to a separate 'init' service. |
Serge Bazanski | c735967 | 2020-10-30 16:38:57 +0100 | [diff] [blame] | 126 | supervisor.New(ctxS, func(ctx context.Context) error { |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 127 | // Start storage and network - we need this to get anything else done. |
| 128 | if err := root.Start(ctx); err != nil { |
| 129 | return fmt.Errorf("cannot start root FS: %w", err) |
| 130 | } |
Serge Bazanski | b1b742f | 2020-03-24 13:58:19 +0100 | [diff] [blame] | 131 | if err := supervisor.Run(ctx, "network", networkSvc.Run); err != nil { |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 132 | return fmt.Errorf("when starting network: %w", err) |
Serge Bazanski | b1b742f | 2020-03-24 13:58:19 +0100 | [diff] [blame] | 133 | } |
Lorenz Brun | f95909d | 2019-09-11 19:48:26 +0200 | [diff] [blame] | 134 | |
Serge Bazanski | 216fe7b | 2021-05-21 18:36:16 +0200 | [diff] [blame] | 135 | // Start cluster manager. This kicks off cluster membership machinery, |
| 136 | // which will either start a new cluster, enroll into one or join one. |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 137 | m := cluster.NewManager(root, networkSvc) |
| 138 | if err := supervisor.Run(ctx, "enrolment", m.Run); err != nil { |
| 139 | return fmt.Errorf("when starting enrolment: %w", err) |
| 140 | } |
| 141 | |
Serge Bazanski | a105db5 | 2021-04-12 19:57:46 +0200 | [diff] [blame] | 142 | // Wait until the node finds a home in the new cluster. |
| 143 | watcher := m.Watch() |
| 144 | status, err := watcher.GetHome(ctx) |
Serge Bazanski | 42e61c6 | 2021-03-18 15:07:18 +0100 | [diff] [blame] | 145 | if err != nil { |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 146 | close(trapdoor) |
Serge Bazanski | a105db5 | 2021-04-12 19:57:46 +0200 | [diff] [blame] | 147 | return fmt.Errorf("new couldn't find home in new cluster, aborting: %w", err) |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 148 | } |
| 149 | |
Serge Bazanski | f9edf52 | 2021-06-17 15:57:13 +0200 | [diff] [blame] | 150 | // Here starts some hairy stopgap code. In the future, not all nodes will have |
| 151 | // direct access to etcd (ie. the ability to retrieve an etcd client via |
| 152 | // status.ConsensusClient). |
| 153 | // However, we are not ready to implement this yet, as that would require |
| 154 | // moving more logic into the curator (eg. some of the Kubernetes PKI logic). |
| 155 | // |
| 156 | // For now, we keep Kubernetes PKI initialization logic here, and just assume |
| 157 | // that every node will have direct access to etcd. |
| 158 | |
| 159 | // Retrieve namespaced etcd KV clients for the two main direct etcd users: |
| 160 | // - Curator |
| 161 | // - Kubernetes PKI |
| 162 | ckv, err := status.ConsensusClient(cluster.ConsensusUserCurator) |
Serge Bazanski | 76003f8 | 2021-06-17 16:39:01 +0200 | [diff] [blame] | 163 | if err != nil { |
Serge Bazanski | f9edf52 | 2021-06-17 15:57:13 +0200 | [diff] [blame] | 164 | close(trapdoor) |
Serge Bazanski | 76003f8 | 2021-06-17 16:39:01 +0200 | [diff] [blame] | 165 | return fmt.Errorf("failed to retrieve consensus curator client: %w", err) |
| 166 | } |
Serge Bazanski | f9edf52 | 2021-06-17 15:57:13 +0200 | [diff] [blame] | 167 | kkv, err := status.ConsensusClient(cluster.ConsensusUserKubernetesPKI) |
| 168 | if err != nil { |
| 169 | close(trapdoor) |
| 170 | return fmt.Errorf("failed to retrieve consensus kubernetes PKI client: %w", err) |
| 171 | } |
| 172 | |
| 173 | // Start cluster curator. The cluster curator is responsible for lifecycle |
| 174 | // management of the cluster. |
| 175 | // In the future, this will only be started on nodes that run etcd. |
Serge Bazanski | 76003f8 | 2021-06-17 16:39:01 +0200 | [diff] [blame] | 176 | c := curator.New(curator.Config{ |
Serge Bazanski | f9edf52 | 2021-06-17 15:57:13 +0200 | [diff] [blame] | 177 | Etcd: ckv, |
Serge Bazanski | a959cbd | 2021-06-17 15:56:51 +0200 | [diff] [blame] | 178 | NodeID: status.Credentials.ID(), |
Serge Bazanski | 76003f8 | 2021-06-17 16:39:01 +0200 | [diff] [blame] | 179 | // TODO(q3k): make this configurable? |
| 180 | LeaderTTL: time.Second * 5, |
| 181 | Directory: &root.Ephemeral.Curator, |
| 182 | }) |
| 183 | if err := supervisor.Run(ctx, "curator", c.Run); err != nil { |
Serge Bazanski | f9edf52 | 2021-06-17 15:57:13 +0200 | [diff] [blame] | 184 | close(trapdoor) |
Serge Bazanski | 76003f8 | 2021-06-17 16:39:01 +0200 | [diff] [blame] | 185 | return fmt.Errorf("when starting curator: %w", err) |
| 186 | } |
| 187 | |
Serge Bazanski | 216fe7b | 2021-05-21 18:36:16 +0200 | [diff] [blame] | 188 | // We are now in a cluster. We can thus access our 'node' object and |
| 189 | // start all services that we should be running. |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 190 | logger.Info("Enrolment success, continuing startup.") |
Serge Bazanski | a959cbd | 2021-06-17 15:56:51 +0200 | [diff] [blame] | 191 | |
Serge Bazanski | f9edf52 | 2021-06-17 15:57:13 +0200 | [diff] [blame] | 192 | // Ensure Kubernetes PKI objects exist in etcd. In the future, this logic will |
| 193 | // be implemented in the curator. |
Serge Bazanski | a959cbd | 2021-06-17 15:56:51 +0200 | [diff] [blame] | 194 | kpki := pki.New(lt.MustLeveledFor("pki.kubernetes"), kkv) |
| 195 | if err := kpki.EnsureAll(ctx); err != nil { |
Serge Bazanski | f9edf52 | 2021-06-17 15:57:13 +0200 | [diff] [blame] | 196 | close(trapdoor) |
Serge Bazanski | a959cbd | 2021-06-17 15:56:51 +0200 | [diff] [blame] | 197 | return fmt.Errorf("failed to ensure kubernetes PKI present: %w", err) |
| 198 | } |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 199 | |
Serge Bazanski | f9edf52 | 2021-06-17 15:57:13 +0200 | [diff] [blame] | 200 | // Start the role service. The role service connects to the curator and runs |
| 201 | // all node-specific role code (eg. Kubernetes services). |
| 202 | // supervisor.Logger(ctx).Infof("Starting role service...") |
| 203 | rs := roleserve.New(roleserve.Config{ |
| 204 | CuratorDial: c.DialCluster, |
| 205 | StorageRoot: root, |
| 206 | Network: networkSvc, |
| 207 | KPKI: kpki, |
| 208 | NodeID: status.Credentials.ID(), |
| 209 | }) |
| 210 | if err := supervisor.Run(ctx, "role", rs.Run); err != nil { |
| 211 | close(trapdoor) |
| 212 | return fmt.Errorf("failed to start role service: %w", err) |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 213 | } |
| 214 | |
| 215 | // Start the node debug service. |
Serge Bazanski | f9edf52 | 2021-06-17 15:57:13 +0200 | [diff] [blame] | 216 | supervisor.Logger(ctx).Infof("Starting debug service...") |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 217 | dbg := &debugService{ |
Serge Bazanski | f9edf52 | 2021-06-17 15:57:13 +0200 | [diff] [blame] | 218 | roleserve: rs, |
| 219 | logtree: lt, |
| 220 | traceLock: make(chan struct{}, 1), |
Lorenz Brun | 9d6c4c7 | 2021-07-20 21:16:27 +0200 | [diff] [blame] | 221 | ephemeralVolume: &root.Ephemeral.Containerd, |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 222 | } |
| 223 | dbgSrv := grpc.NewServer() |
| 224 | apb.RegisterNodeDebugServiceServer(dbgSrv, dbg) |
| 225 | dbgLis, err := net.Listen("tcp", fmt.Sprintf(":%d", common.DebugServicePort)) |
Serge Bazanski | b1b742f | 2020-03-24 13:58:19 +0100 | [diff] [blame] | 226 | if err != nil { |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 227 | return fmt.Errorf("failed to listen on debug service: %w", err) |
| 228 | } |
| 229 | if err := supervisor.Run(ctx, "debug", supervisor.GRPCServer(dbgSrv, dbgLis, false)); err != nil { |
| 230 | return fmt.Errorf("failed to start debug service: %w", err) |
Serge Bazanski | b1b742f | 2020-03-24 13:58:19 +0100 | [diff] [blame] | 231 | } |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 232 | |
Serge Bazanski | b1b742f | 2020-03-24 13:58:19 +0100 | [diff] [blame] | 233 | supervisor.Signal(ctx, supervisor.SignalHealthy) |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 234 | supervisor.Signal(ctx, supervisor.SignalDone) |
| 235 | return nil |
Serge Bazanski | c735967 | 2020-10-30 16:38:57 +0100 | [diff] [blame] | 236 | }, supervisor.WithExistingLogtree(lt)) |
Serge Bazanski | b1b742f | 2020-03-24 13:58:19 +0100 | [diff] [blame] | 237 | |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 238 | // We're PID1, so orphaned processes get reparented to us to clean up |
| 239 | for { |
| 240 | select { |
| 241 | case <-trapdoor: |
Serge Bazanski | 216fe7b | 2021-05-21 18:36:16 +0200 | [diff] [blame] | 242 | // If the trapdoor got closed, we got stuck early enough in the |
| 243 | // boot process that we can't do anything about it. Display a |
| 244 | // generic error message until we handle error conditions better. |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 245 | ctxC() |
| 246 | log.Printf(" ########################") |
| 247 | log.Printf(" # GURU MEDIATION ERROR #") |
| 248 | log.Printf(" ########################") |
| 249 | log.Printf("") |
Serge Bazanski | 662b5b3 | 2020-12-21 13:49:00 +0100 | [diff] [blame] | 250 | log.Printf("Metropolis encountered an uncorrectable error and this node must be") |
| 251 | log.Printf("restarted.") |
| 252 | log.Printf("") |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 253 | log.Printf("(Error condition: init trapdoor closed)") |
| 254 | log.Printf("") |
| 255 | select {} |
| 256 | |
| 257 | case sig := <-signalChannel: |
| 258 | switch sig { |
| 259 | case unix.SIGCHLD: |
| 260 | var status unix.WaitStatus |
| 261 | var rusage unix.Rusage |
| 262 | for { |
| 263 | res, err := unix.Wait4(-1, &status, unix.WNOHANG, &rusage) |
| 264 | if err != nil && err != unix.ECHILD { |
Serge Bazanski | c735967 | 2020-10-30 16:38:57 +0100 | [diff] [blame] | 265 | logger.Errorf("Failed to wait on orphaned child: %v", err) |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 266 | break |
Serge Bazanski | b1b742f | 2020-03-24 13:58:19 +0100 | [diff] [blame] | 267 | } |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 268 | if res <= 0 { |
| 269 | break |
| 270 | } |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 271 | } |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 272 | case unix.SIGURG: |
Serge Bazanski | 216fe7b | 2021-05-21 18:36:16 +0200 | [diff] [blame] | 273 | // Go 1.14 introduced asynchronous preemption, which uses |
| 274 | // SIGURG. |
| 275 | // In order not to break backwards compatibility in the |
| 276 | // unlikely case of an application actually using SIGURG on its |
| 277 | // own, they're not filtering them. |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 278 | // (https://github.com/golang/go/issues/37942) |
Serge Bazanski | c735967 | 2020-10-30 16:38:57 +0100 | [diff] [blame] | 279 | logger.V(5).Info("Ignoring SIGURG") |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 280 | // TODO(lorenz): We can probably get more than just SIGCHLD as init, but I can't think |
| 281 | // of any others right now, just log them in case we hit any of them. |
| 282 | default: |
Serge Bazanski | c735967 | 2020-10-30 16:38:57 +0100 | [diff] [blame] | 283 | logger.Warningf("Got unexpected signal %s", sig.String()) |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 284 | } |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 285 | } |
Serge Bazanski | 1ebd1e1 | 2020-07-13 19:17:16 +0200 | [diff] [blame] | 286 | } |
Lorenz Brun | ae0d90d | 2019-09-05 17:53:56 +0200 | [diff] [blame] | 287 | } |
Serge Bazanski | 57b4375 | 2020-07-13 19:17:48 +0200 | [diff] [blame] | 288 | |
Serge Bazanski | 216fe7b | 2021-05-21 18:36:16 +0200 | [diff] [blame] | 289 | // nodeCertificate creates a node key/certificate for a foreign node. This is |
| 290 | // duplicated code with localstorage's PKIDirectory EnsureSelfSigned, but is |
| 291 | // temporary (and specific to 'golden tickets'). |
Serge Bazanski | 57b4375 | 2020-07-13 19:17:48 +0200 | [diff] [blame] | 292 | func (s *debugService) nodeCertificate() (cert, key []byte, err error) { |
| 293 | pubKey, privKey, err := ed25519.GenerateKey(rand.Reader) |
| 294 | if err != nil { |
| 295 | err = fmt.Errorf("failed to generate key: %w", err) |
| 296 | return |
| 297 | } |
| 298 | |
| 299 | key, err = x509.MarshalPKCS8PrivateKey(privKey) |
| 300 | if err != nil { |
| 301 | err = fmt.Errorf("failed to marshal key: %w", err) |
| 302 | return |
| 303 | } |
| 304 | |
| 305 | serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 127) |
| 306 | serialNumber, err := rand.Int(rand.Reader, serialNumberLimit) |
| 307 | if err != nil { |
| 308 | err = fmt.Errorf("failed to generate serial number: %w", err) |
| 309 | return |
| 310 | } |
| 311 | |
| 312 | template := localstorage.CertificateForNode(pubKey) |
| 313 | template.SerialNumber = serialNumber |
| 314 | |
| 315 | cert, err = x509.CreateCertificate(rand.Reader, &template, &template, pubKey, privKey) |
| 316 | if err != nil { |
| 317 | err = fmt.Errorf("could not sign certificate: %w", err) |
| 318 | return |
| 319 | } |
| 320 | return |
| 321 | } |