blob: 8a85a9949cb1428230e7577c9a7d0e9e284d9599 [file] [log] [blame]
Lorenz Brun6e8f69c2019-11-18 10:44:24 +01001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package kubernetes
18
19import (
Lorenz Brun878f5f92020-05-12 16:15:39 +020020 "context"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010021 "encoding/pem"
22 "fmt"
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020023 "io"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010024 "net"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010025 "os/exec"
26
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010027 "go.etcd.io/etcd/clientv3"
Hendrik Hofstadt8efe51e2020-02-28 12:53:41 +010028
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020029 "git.monogon.dev/source/nexantic.git/core/internal/common/supervisor"
Serge Bazanskidbfc6382020-06-19 20:35:43 +020030 "git.monogon.dev/source/nexantic.git/core/internal/kubernetes/pki"
Hendrik Hofstadt8efe51e2020-02-28 12:53:41 +010031 "git.monogon.dev/source/nexantic.git/core/pkg/fileargs"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010032)
33
34type controllerManagerConfig struct {
35 clusterNet net.IPNet
36 // All PKI-related things are in DER
37 kubeConfig []byte
38 rootCA []byte
39 serviceAccountPrivKey []byte // In PKCS#8 form
40 serverCert []byte
41 serverKey []byte
42}
43
Lorenz Brunf042e6f2020-06-24 16:46:09 +020044var clusterNet = net.IPNet{IP: net.IP{10, 0, 0, 0}, Mask: net.IPMask{255, 255, 0, 0}}
45
Serge Bazanskidbfc6382020-06-19 20:35:43 +020046func getPKIControllerManagerConfig(ctx context.Context, kv clientv3.KV, kpki *pki.KubernetesPKI) (*controllerManagerConfig, error) {
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010047 var config controllerManagerConfig
48 var err error
Serge Bazanskidbfc6382020-06-19 20:35:43 +020049 config.rootCA, _, err = kpki.Certificate(ctx, pki.IdCA, kv)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010050 if err != nil {
51 return nil, fmt.Errorf("failed to get ID root CA: %w", err)
52 }
Serge Bazanskidbfc6382020-06-19 20:35:43 +020053 config.serverCert, config.serverKey, err = kpki.Certificate(ctx, pki.ControllerManager, kv)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010054 if err != nil {
55 return nil, fmt.Errorf("failed to get controller-manager serving certificate: %w", err)
56 }
Serge Bazanskidbfc6382020-06-19 20:35:43 +020057 config.serviceAccountPrivKey, err = kpki.ServiceAccountKey(ctx, kv)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010058 if err != nil {
59 return nil, fmt.Errorf("failed to get serviceaccount privkey: %w", err)
60 }
Serge Bazanskidbfc6382020-06-19 20:35:43 +020061 config.kubeConfig, err = kpki.Kubeconfig(ctx, pki.ControllerManagerClient, kv)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010062 if err != nil {
63 return nil, fmt.Errorf("failed to get controller-manager kubeconfig: %w", err)
64 }
65 return &config, nil
66}
67
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020068func runControllerManager(config controllerManagerConfig, output io.Writer) supervisor.Runnable {
69 return func(ctx context.Context) error {
70 args, err := fileargs.New()
71 if err != nil {
72 panic(err) // If this fails, something is very wrong. Just crash.
73 }
74 defer args.Close()
75
76 cmd := exec.CommandContext(ctx, "/kubernetes/bin/kube", "kube-controller-manager",
77 args.FileOpt("--kubeconfig", "kubeconfig", config.kubeConfig),
78 args.FileOpt("--service-account-private-key-file", "service-account-privkey.pem",
79 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.serviceAccountPrivKey})),
80 args.FileOpt("--root-ca-file", "root-ca.pem",
81 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.rootCA})),
82 "--port=0", // Kill insecure serving
83 "--use-service-account-credentials=true", // Enables things like PSP enforcement
84 fmt.Sprintf("--cluster-cidr=%v", config.clusterNet.String()),
85 args.FileOpt("--tls-cert-file", "server-cert.pem",
86 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.serverCert})),
87 args.FileOpt("--tls-private-key-file", "server-key.pem",
88 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.serverKey})),
Lorenz Brunf042e6f2020-06-24 16:46:09 +020089 "--allocate-node-cidrs",
90 "--cluster-cidr="+clusterNet.String(),
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020091 )
Lorenz Brunf042e6f2020-06-24 16:46:09 +020092
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020093 if args.Error() != nil {
94 return fmt.Errorf("failed to use fileargs: %w", err)
95 }
96 cmd.Stdout = output
97 cmd.Stderr = output
98 supervisor.Signal(ctx, supervisor.SignalHealthy)
99 err = cmd.Run()
100 fmt.Fprintf(output, "controller-manager stopped: %v\n", err)
101 return err
Lorenz Brun6e8f69c2019-11-18 10:44:24 +0100102 }
Lorenz Brun6e8f69c2019-11-18 10:44:24 +0100103}