blob: 2a667d695dcb6a89e5e79b1447c940551bbe308c [file] [log] [blame]
Lorenz Brunae0d90d2019-09-05 17:53:56 +02001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package main
18
19import (
Serge Bazanskicdb8c782020-02-17 12:34:02 +010020 "context"
Lorenz Brundd8c80e2019-10-07 16:19:49 +020021 "fmt"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020022 "os"
Serge Bazanski3b098232023-03-16 17:57:02 +010023 "strings"
Serge Bazanskif2f85f52023-03-16 11:51:19 +010024 "time"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020025
Lorenz Brunae0d90d2019-09-05 17:53:56 +020026 "golang.org/x/sys/unix"
Serge Bazanski99f47742021-08-04 20:21:42 +020027
Serge Bazanski3c5d0632024-09-12 10:49:12 +000028 "source.monogon.dev/go/logging"
Serge Bazanski31370b02021-01-07 16:31:14 +010029 "source.monogon.dev/metropolis/node/core/cluster"
Lorenz Brun6c454342023-06-01 12:23:38 +020030 "source.monogon.dev/metropolis/node/core/devmgr"
Serge Bazanski31370b02021-01-07 16:31:14 +010031 "source.monogon.dev/metropolis/node/core/localstorage"
32 "source.monogon.dev/metropolis/node/core/localstorage/declarative"
Serge Bazanskiefbde192024-07-31 14:53:20 +000033 "source.monogon.dev/metropolis/node/core/metrics"
Serge Bazanski31370b02021-01-07 16:31:14 +010034 "source.monogon.dev/metropolis/node/core/network"
Serge Bazanskif9edf522021-06-17 15:57:13 +020035 "source.monogon.dev/metropolis/node/core/roleserve"
Serge Bazanski58ddc092022-06-30 18:23:33 +020036 "source.monogon.dev/metropolis/node/core/rpc/resolver"
Serge Bazanski0d9e1252024-09-03 12:16:47 +020037 "source.monogon.dev/metropolis/node/core/tconsole"
Lorenz Brune306d782021-09-01 13:01:06 +020038 timesvc "source.monogon.dev/metropolis/node/core/time"
Lorenz Brun35fcf032023-06-29 04:15:58 +020039 "source.monogon.dev/metropolis/node/core/update"
Serge Bazanski8d64a3b2023-11-20 12:58:42 +010040 mversion "source.monogon.dev/metropolis/version"
Tim Windelschmidt9f21f532024-05-07 15:14:20 +020041 "source.monogon.dev/osbase/logtree"
Jan Schär91bf1c82024-07-29 17:31:33 +020042 "source.monogon.dev/osbase/net/dns"
Tim Windelschmidt9f21f532024-05-07 15:14:20 +020043 "source.monogon.dev/osbase/supervisor"
Serge Bazanski154e6d92024-09-11 17:26:31 +020044 "source.monogon.dev/osbase/sysctl"
Tim Windelschmidt9f21f532024-05-07 15:14:20 +020045 "source.monogon.dev/osbase/tpm"
Serge Bazanski8d64a3b2023-11-20 12:58:42 +010046 "source.monogon.dev/version"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020047)
48
49func main() {
Serge Bazanskie803fc12022-01-25 14:58:24 +010050 // Set up basic mounts (like /dev, /sys...).
51 if err := setupMounts(); err != nil {
52 panic(fmt.Errorf("could not set up basic mounts: %w", err))
Lorenz Brunae0d90d2019-09-05 17:53:56 +020053 }
Serge Bazanskie803fc12022-01-25 14:58:24 +010054
Serge Bazanskif2f85f52023-03-16 11:51:19 +010055 // Root system logtree.
56 lt := logtree.New()
57
Serge Bazanski0d9e1252024-09-03 12:16:47 +020058 // Set up logger for Metropolis. Currently logs everything to /dev/ttyS{0,1}.
59 serialConsoles := []*console{
Serge Bazanski3b098232023-03-16 17:57:02 +010060 {
61 path: "/dev/ttyS0",
62 maxWidth: 120,
63 },
Lorenz Brunf0b22ff2023-05-02 16:04:20 +020064 {
65 path: "/dev/ttyS1",
66 maxWidth: 120,
67 },
Serge Bazanski3b098232023-03-16 17:57:02 +010068 }
Serge Bazanskif2f85f52023-03-16 11:51:19 +010069 // Alternative channel that crash handling writes to, and which gets distributed
70 // to the consoles.
71 crash := make(chan string)
72
73 // Open up consoles and set up logging from logtree and crash channel.
Serge Bazanski0d9e1252024-09-03 12:16:47 +020074 for _, c := range serialConsoles {
Tim Windelschmidt13b83f72024-04-11 23:10:16 +020075 f, err := os.OpenFile(c.path, os.O_WRONLY, 0)
Serge Bazanskie803fc12022-01-25 14:58:24 +010076 if err != nil {
77 continue
Serge Bazanskic7359672020-10-30 16:38:57 +010078 }
Serge Bazanskie803fc12022-01-25 14:58:24 +010079 reader, err := lt.Read("", logtree.WithChildren(), logtree.WithStream())
80 if err != nil {
Tim Windelschmidt6b207812024-04-22 19:13:15 +020081 panic(fmt.Sprintf("could not set up root log reader: %v", err))
Serge Bazanskie803fc12022-01-25 14:58:24 +010082 }
Tim Windelschmidt13b83f72024-04-11 23:10:16 +020083 c.reader = reader
84 go func() {
85 fmt.Fprintf(f, "\nMetropolis: this is %s. Verbose node logs follow.\n\n", c.path)
Serge Bazanskie803fc12022-01-25 14:58:24 +010086 for {
Serge Bazanskif2f85f52023-03-16 11:51:19 +010087 select {
88 case p := <-reader.Stream:
Serge Bazanski3b098232023-03-16 17:57:02 +010089 if consoleFilter(p) {
Tim Windelschmidt13b83f72024-04-11 23:10:16 +020090 fmt.Fprintf(f, "%s\n", p.ConciseString(logtree.MetropolisShortenDict, c.maxWidth))
Serge Bazanski3b098232023-03-16 17:57:02 +010091 }
Serge Bazanskif2f85f52023-03-16 11:51:19 +010092 case s := <-crash:
93 fmt.Fprintf(f, "%s\n", s)
94 }
Serge Bazanskie803fc12022-01-25 14:58:24 +010095 }
Tim Windelschmidt13b83f72024-04-11 23:10:16 +020096 }()
Serge Bazanskie803fc12022-01-25 14:58:24 +010097 }
Serge Bazanskif2f85f52023-03-16 11:51:19 +010098
Lorenz Brun4025c9b2022-06-16 16:12:53 +000099 // Initialize persistent panic handler early
Serge Bazanski0d9e1252024-09-03 12:16:47 +0200100 initPanicHandler(lt, serialConsoles)
Serge Bazanskic7359672020-10-30 16:38:57 +0100101
102 // Initial logger. Used until we get to a supervisor.
103 logger := lt.MustLeveledFor("init")
Serge Bazanski581b0bd2020-03-12 13:36:43 +0100104
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200105 // Linux kernel default is 4096 which is far too low. Raise it to 1M which
106 // is what gVisor suggests.
Lorenz Brun878f5f92020-05-12 16:15:39 +0200107 if err := unix.Setrlimit(unix.RLIMIT_NOFILE, &unix.Rlimit{Cur: 1048576, Max: 1048576}); err != nil {
Serge Bazanskic7359672020-10-30 16:38:57 +0100108 logger.Fatalf("Failed to raise rlimits: %v", err)
Lorenz Brun878f5f92020-05-12 16:15:39 +0200109 }
110
Serge Bazanski662b5b32020-12-21 13:49:00 +0100111 logger.Info("Starting Metropolis node init")
Serge Bazanski8d64a3b2023-11-20 12:58:42 +0100112 logger.Infof("Version: %s", version.Semver(mversion.Version))
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200113
Serge Bazanski5df62ba2023-03-22 17:56:46 +0100114 haveTPM := true
Serge Bazanskic7359672020-10-30 16:38:57 +0100115 if err := tpm.Initialize(logger); err != nil {
Serge Bazanski5df62ba2023-03-22 17:56:46 +0100116 logger.Warningf("Failed to initialize TPM 2.0: %v", err)
117 haveTPM = false
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200118 }
119
Jan Schär91bf1c82024-07-29 17:31:33 +0200120 metrics.CoreRegistry.MustRegister(dns.MetricsRegistry)
121 networkSvc := network.New(nil, []string{"hosts", "kubernetes"})
Lorenz Brun3ecb04a2023-03-16 20:41:20 +0100122 networkSvc.DHCPVendorClassID = "dev.monogon.metropolis.node.v1"
Lorenz Brune306d782021-09-01 13:01:06 +0200123 timeSvc := timesvc.New()
Lorenz Brun6c454342023-06-01 12:23:38 +0200124 devmgrSvc := devmgr.New()
Leopold Schabel68c58752019-11-14 21:00:59 +0100125
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200126 // This function initializes a headless Delve if this is a debug build or
127 // does nothing if it's not
Lorenz Brun70f65b22020-07-08 17:02:47 +0200128 initializeDebugger(networkSvc)
129
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200130 // Prepare local storage.
131 root := &localstorage.Root{}
132 if err := declarative.PlaceFS(root, "/"); err != nil {
133 panic(fmt.Errorf("when placing root FS: %w", err))
134 }
135
Lorenz Brun35fcf032023-06-29 04:15:58 +0200136 updateSvc := &update.Service{
137 Logger: lt.MustLeveledFor("update"),
138 }
139
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200140 // Make context for supervisor. We cancel it when we reach the trapdoor.
141 ctxS, ctxC := context.WithCancel(context.Background())
142
Serge Bazanski58ddc092022-06-30 18:23:33 +0200143 // Make node-wide cluster resolver.
Serge Bazanskica8d9512024-09-12 14:20:57 +0200144 res := resolver.New(ctxS, resolver.WithLogger(lt.MustLeveledFor("resolver")))
Serge Bazanski58ddc092022-06-30 18:23:33 +0200145
Serge Bazanskif2f85f52023-03-16 11:51:19 +0100146 // Function which performs core, one-way initialization of the node. This means
147 // waiting for the network, starting the cluster manager, and then starting all
148 // services related to the node's roles.
149 init := func(ctx context.Context) error {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200150 // Start storage and network - we need this to get anything else done.
Lorenz Brun35fcf032023-06-29 04:15:58 +0200151 if err := root.Start(ctx, updateSvc); err != nil {
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200152 return fmt.Errorf("cannot start root FS: %w", err)
153 }
Lorenz Brune4b1d202024-09-17 23:44:46 +0200154 localNodeParams, err := getLocalNodeParams(ctx, root)
Lorenz Brun85ad26a2023-03-27 17:00:00 +0200155 if err != nil {
Lorenz Brune4b1d202024-09-17 23:44:46 +0200156 return fmt.Errorf("cannot get local node parameters: %w", err)
Lorenz Brun85ad26a2023-03-27 17:00:00 +0200157 }
Lorenz Brune4b1d202024-09-17 23:44:46 +0200158 if localNodeParams.NetworkConfig != nil {
159 networkSvc.StaticConfig = localNodeParams.NetworkConfig
160 if err := root.ESP.Metropolis.NetworkConfiguration.Marshal(localNodeParams.NetworkConfig); err != nil {
Lorenz Brun85ad26a2023-03-27 17:00:00 +0200161 logger.Errorf("Error writing back network_config from NodeParameters: %v", err)
162 }
163 }
164 if networkSvc.StaticConfig == nil {
165 staticConfig, err := root.ESP.Metropolis.NetworkConfiguration.Unmarshal()
166 if err == nil {
167 networkSvc.StaticConfig = staticConfig
168 } else {
169 logger.Errorf("Unable to load static config, proceeding without it: %v", err)
170 }
Lorenz Brunab583b32023-05-02 22:41:45 +0200171 }
Lorenz Brun6c454342023-06-01 12:23:38 +0200172 if err := supervisor.Run(ctx, "devmgr", devmgrSvc.Run); err != nil {
173 return fmt.Errorf("when starting devmgr: %w", err)
174 }
Lorenz Brunab583b32023-05-02 22:41:45 +0200175 if err := supervisor.Run(ctx, "network", networkSvc.Run); err != nil {
176 return fmt.Errorf("when starting network: %w", err)
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100177 }
Lorenz Brune306d782021-09-01 13:01:06 +0200178 if err := supervisor.Run(ctx, "time", timeSvc.Run); err != nil {
179 return fmt.Errorf("when starting time: %w", err)
180 }
Lorenz Brun1b2df232022-06-14 12:42:03 +0200181 if err := supervisor.Run(ctx, "pstore", dumpAndCleanPstore); err != nil {
182 return fmt.Errorf("when starting pstore: %w", err)
183 }
Tim Windelschmidtd9f1f1e2023-10-31 15:44:35 +0100184 if err := supervisor.Run(ctx, "sysctl", nodeSysctls); err != nil {
185 return fmt.Errorf("when applying sysctls: %w", err)
186 }
Lorenz Brunf95909d2019-09-11 19:48:26 +0200187
Lorenz Brun6eb3fb32023-08-09 17:19:24 +0200188 // The kernel does of course not run in this runnable, only the log pipe
189 // runs in it.
190 if err := supervisor.Run(ctx, "kernel", func(ctx context.Context) error {
191 return logtree.KmsgPipe(ctx, supervisor.Logger(ctx))
192 }); err != nil {
193 return fmt.Errorf("when starting kernel log pipe: %w", err)
194 }
195
Serge Bazanski6dff6d62022-01-28 18:15:14 +0100196 // Start the role service. The role service connects to the curator and runs
197 // all node-specific role code (eg. Kubernetes services).
198 // supervisor.Logger(ctx).Infof("Starting role service...")
199 rs := roleserve.New(roleserve.Config{
200 StorageRoot: root,
201 Network: networkSvc,
Serge Bazanski58ddc092022-06-30 18:23:33 +0200202 Resolver: res,
Serge Bazanskie012b722023-03-29 17:49:04 +0200203 LogTree: lt,
Lorenz Brun35fcf032023-06-29 04:15:58 +0200204 Update: updateSvc,
Serge Bazanski6dff6d62022-01-28 18:15:14 +0100205 })
206 if err := supervisor.Run(ctx, "role", rs.Run); err != nil {
Serge Bazanski6dff6d62022-01-28 18:15:14 +0100207 return fmt.Errorf("failed to start role service: %w", err)
208 }
209
Lorenz Brunac82c0d2022-03-01 13:32:45 +0100210 if err := runDebugService(ctx, rs, lt, root); err != nil {
211 return fmt.Errorf("when starting debug service: %w", err)
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100212 }
Lorenz Brunae0d90d2019-09-05 17:53:56 +0200213
Serge Bazanski0d9e1252024-09-03 12:16:47 +0200214 // Initialize interactive consoles.
215 interactiveConsoles := []string{"/dev/tty0"}
216 for _, c := range interactiveConsoles {
Serge Bazanski73c632f2024-09-05 13:51:57 +0200217 console, err := tconsole.New(tconsole.TerminalLinux, c, lt, &networkSvc.Status, &rs.LocalRoles, &rs.CuratorConnection)
Serge Bazanski0d9e1252024-09-03 12:16:47 +0200218 if err != nil {
219 logger.Info("Failed to initialize interactive console at %s: %v", c, err)
220 // TODO: fall back to logger
221 } else {
222 logger.Info("Started interactive console at %s", c)
223 supervisor.Run(ctx, "console-"+c, console.Run)
224 }
225 }
226
Serge Bazanski154e6d92024-09-11 17:26:31 +0200227 // Now that we have consoles, set console logging level to 1 (KERNEL_EMERG,
228 // minimum possible). This prevents the TUI console from being polluted by
229 // random printks.
230 opts := sysctl.Options{
231 "kernel.printk": "1",
232 }
233 if err := opts.Apply(); err != nil {
234 logger.Errorf("Failed to configure printk logging: %v", err)
235 }
236
Lorenz Brune4b1d202024-09-17 23:44:46 +0200237 nodeParams, err := getNodeParams(ctx, root)
238 if err != nil {
239 return fmt.Errorf("cannot get node parameters: %w", err)
240 }
241
Serge Bazanskif2f85f52023-03-16 11:51:19 +0100242 // Start cluster manager. This kicks off cluster membership machinery,
243 // which will either start a new cluster, enroll into one or join one.
Lorenz Brun35fcf032023-06-29 04:15:58 +0200244 m := cluster.NewManager(root, networkSvc, rs, updateSvc, nodeParams, haveTPM)
Serge Bazanskif2f85f52023-03-16 11:51:19 +0100245 return m.Run(ctx)
246 }
247
Serge Bazanskiefbde192024-07-31 14:53:20 +0000248 pm, err := supervisor.NewMetricsPrometheus(metrics.CoreRegistry)
249 if err != nil {
250 // Fatal, because this generally shouldn't happen.
251 logger.Fatalf("Failed to register supervisor metrics: %v", err)
252 }
253
Serge Bazanskif2f85f52023-03-16 11:51:19 +0100254 // Start the init function in a one-shot runnable. Smuggle out any errors from
255 // the init function and stuff them into the fatal channel. This is where the
256 // system supervisor takes over as the main process management system.
257 fatal := make(chan error)
258 supervisor.New(ctxS, func(ctx context.Context) error {
259 err := init(ctx)
260 if err != nil {
261 fatal <- err
262 select {}
263 }
Serge Bazanski1ebd1e12020-07-13 19:17:16 +0200264 return nil
Serge Bazanskiefbde192024-07-31 14:53:20 +0000265 }, supervisor.WithExistingLogtree(lt), supervisor.WithMetrics(pm))
Serge Bazanskib1b742f2020-03-24 13:58:19 +0100266
Serge Bazanskif2f85f52023-03-16 11:51:19 +0100267 // Meanwhile, wait for any fatal error from the init process, and handle it
268 // accordingly.
Serge Bazanskiefbde192024-07-31 14:53:20 +0000269 err = <-fatal
Serge Bazanskif2f85f52023-03-16 11:51:19 +0100270 // Log error with primary logging mechanism still active.
271 logger.Infof("Node startup failed: %v", err)
272 // Start shutting down the supervision tree...
Serge Bazanskieac8f732021-10-05 23:30:37 +0200273 ctxC()
Serge Bazanskif2f85f52023-03-16 11:51:19 +0100274 time.Sleep(time.Second)
275 // After a bit, kill all console log readers.
Serge Bazanski0d9e1252024-09-03 12:16:47 +0200276 for _, c := range serialConsoles {
Tim Windelschmidt13b83f72024-04-11 23:10:16 +0200277 if c.reader == nil {
Serge Bazanskid02f2162023-03-22 17:57:20 +0100278 continue
279 }
Tim Windelschmidt13b83f72024-04-11 23:10:16 +0200280 c.reader.Close()
281 c.reader.Stream = nil
Serge Bazanskif2f85f52023-03-16 11:51:19 +0100282 }
283 // Wait for final logs to flush to console...
284 time.Sleep(time.Second)
285 // Present final message to the console.
286 crash <- ""
287 crash <- ""
Serge Bazanskie6719b32023-03-22 17:57:50 +0100288 crash <- fmt.Sprintf(" Fatal error: %v", err)
Tim Windelschmidt92316fd2024-04-18 23:06:40 +0200289 crash <- " This node could not be started. Rebooting..."
Serge Bazanskif2f85f52023-03-16 11:51:19 +0100290 time.Sleep(time.Second)
291 // Return to minit, which will reboot this node.
Serge Bazanskie6719b32023-03-22 17:57:50 +0100292 os.Exit(0)
Serge Bazanski57b43752020-07-13 19:17:48 +0200293}
Serge Bazanski3b098232023-03-16 17:57:02 +0100294
295// consoleFilter is used to filter out some uselessly verbose logs from the
296// console.
297//
298// This should be limited to external services, our internal services should
299// instead just have good logging by default.
300func consoleFilter(p *logtree.LogEntry) bool {
301 if p.Raw != nil {
302 return false
303 }
304 if p.Leveled == nil {
305 return false
306 }
307 s := string(p.DN)
308 if strings.HasPrefix(s, "root.role.controlplane.launcher.consensus.etcd") {
Serge Bazanski3c5d0632024-09-12 10:49:12 +0000309 return p.Leveled.Severity().AtLeast(logging.WARNING)
Serge Bazanski3b098232023-03-16 17:57:02 +0100310 }
311 // TODO(q3k): turn off RPC traces instead
312 if strings.HasPrefix(s, "root.role.controlplane.launcher.curator.listener.rpc") {
313 return false
314 }
315 if strings.HasPrefix(s, "root.role.kubernetes.run.kubernetes.networked.kubelet") {
Serge Bazanski3c5d0632024-09-12 10:49:12 +0000316 return p.Leveled.Severity().AtLeast(logging.WARNING)
Serge Bazanski3b098232023-03-16 17:57:02 +0100317 }
318 if strings.HasPrefix(s, "root.role.kubernetes.run.kubernetes.networked.apiserver") {
Serge Bazanski3c5d0632024-09-12 10:49:12 +0000319 return p.Leveled.Severity().AtLeast(logging.WARNING)
Serge Bazanski3b098232023-03-16 17:57:02 +0100320 }
321 if strings.HasPrefix(s, "root.role.kubernetes.run.kubernetes.controller-manager") {
Serge Bazanski3c5d0632024-09-12 10:49:12 +0000322 return p.Leveled.Severity().AtLeast(logging.WARNING)
Serge Bazanski3b098232023-03-16 17:57:02 +0100323 }
324 if strings.HasPrefix(s, "root.role.kubernetes.run.kubernetes.scheduler") {
Serge Bazanski3c5d0632024-09-12 10:49:12 +0000325 return p.Leveled.Severity().AtLeast(logging.WARNING)
Serge Bazanski3b098232023-03-16 17:57:02 +0100326 }
Lorenz Brun6eb3fb32023-08-09 17:19:24 +0200327 if strings.HasPrefix(s, "root.kernel") {
328 // Linux writes high-severity logs directly to the console anyways and
329 // its low-severity logs are too verbose.
330 return false
331 }
Serge Bazanski6b7731e2023-03-22 17:58:04 +0100332 if strings.HasPrefix(s, "supervisor") {
Serge Bazanski3c5d0632024-09-12 10:49:12 +0000333 return p.Leveled.Severity().AtLeast(logging.WARNING)
Serge Bazanski6b7731e2023-03-22 17:58:04 +0100334 }
Serge Bazanski3b098232023-03-16 17:57:02 +0100335 return true
336}
337
338type console struct {
339 path string
340 maxWidth int
341 reader *logtree.LogReader
342}