blob: e26253442b3f62e32f195a5d238979e26b1e6ed0 [file] [log] [blame]
Lorenz Brun878f5f92020-05-12 16:15:39 +02001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package kubernetes
18
19import (
20 "context"
Serge Bazanski2cfafc92023-03-21 16:42:47 +010021 "crypto/ed25519"
Lorenz Brun878f5f92020-05-12 16:15:39 +020022 "encoding/json"
Serge Bazanski2cfafc92023-03-21 16:42:47 +010023 "encoding/pem"
Lorenz Brun878f5f92020-05-12 16:15:39 +020024 "fmt"
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020025 "net"
Lorenz Brun878f5f92020-05-12 16:15:39 +020026 "os/exec"
27
Lorenz Brun878f5f92020-05-12 16:15:39 +020028 v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020029 kubeletconfig "k8s.io/kubelet/config/v1beta1"
Serge Bazanski77cb6c52020-12-19 00:09:22 +010030
Serge Bazanski2cfafc92023-03-21 16:42:47 +010031 ipb "source.monogon.dev/metropolis/node/core/curator/proto/api"
Serge Bazanski31370b02021-01-07 16:31:14 +010032 "source.monogon.dev/metropolis/node/core/localstorage"
Serge Bazanski31370b02021-01-07 16:31:14 +010033 "source.monogon.dev/metropolis/node/kubernetes/pki"
34 "source.monogon.dev/metropolis/node/kubernetes/reconciler"
35 "source.monogon.dev/metropolis/pkg/fileargs"
36 "source.monogon.dev/metropolis/pkg/supervisor"
Lorenz Brun878f5f92020-05-12 16:15:39 +020037)
38
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020039type kubeletService struct {
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020040 ClusterDNS []net.IP
Lorenz Brun78cefca2022-06-20 12:59:55 +000041 ClusterDomain string
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020042 KubeletDirectory *localstorage.DataKubernetesKubeletDirectory
43 EphemeralDirectory *localstorage.EphemeralDirectory
Serge Bazanski9411f7c2021-03-10 13:12:53 +010044
Serge Bazanski2cfafc92023-03-21 16:42:47 +010045 kubeconfig []byte
46 serverCACert []byte
47 serverCert []byte
Lorenz Brun878f5f92020-05-12 16:15:39 +020048}
49
Serge Bazanski2cfafc92023-03-21 16:42:47 +010050func (s *kubeletService) getPubkey(ctx context.Context) (ed25519.PublicKey, error) {
51 // First make sure we have a local ED25519 private key, and generate one if not.
52 if err := s.KubeletDirectory.PKI.GeneratePrivateKey(); err != nil {
53 return nil, fmt.Errorf("failed to generate private key: %w", err)
54 }
55 priv, err := s.KubeletDirectory.PKI.ReadPrivateKey()
Serge Bazanski71f7a562020-06-22 16:37:28 +020056 if err != nil {
Serge Bazanski2cfafc92023-03-21 16:42:47 +010057 return nil, fmt.Errorf("could not read keypair: %w", err)
58 }
59 pubkey := priv.Public().(ed25519.PublicKey)
60 return pubkey, nil
61}
62
63func (s *kubeletService) setCertificates(kw *ipb.IssueCertificateResponse_KubernetesWorker) error {
64 key, err := s.KubeletDirectory.PKI.ReadPrivateKey()
65 if err != nil {
66 return fmt.Errorf("could not read private key from disk: %w", err)
Serge Bazanski71f7a562020-06-22 16:37:28 +020067 }
68
Serge Bazanski2cfafc92023-03-21 16:42:47 +010069 s.kubeconfig, err = pki.KubeconfigRaw(kw.IdentityCaCertificate, kw.KubeletClientCertificate, key, pki.KubernetesAPIEndpointForWorker)
Serge Bazanski71f7a562020-06-22 16:37:28 +020070 if err != nil {
Serge Bazanski9411f7c2021-03-10 13:12:53 +010071 return fmt.Errorf("when generating kubeconfig: %w", err)
Serge Bazanski71f7a562020-06-22 16:37:28 +020072 }
Serge Bazanski2cfafc92023-03-21 16:42:47 +010073 s.serverCACert = pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: kw.IdentityCaCertificate})
74 s.serverCert = pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: kw.KubeletServerCertificate})
Serge Bazanski71f7a562020-06-22 16:37:28 +020075 return nil
76}
77
Serge Bazanski2cfafc92023-03-21 16:42:47 +010078func (s *kubeletService) configure(fargs *fileargs.FileArgs) *kubeletconfig.KubeletConfiguration {
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020079 var clusterDNS []string
80 for _, dnsIP := range s.ClusterDNS {
81 clusterDNS = append(clusterDNS, dnsIP.String())
82 }
Lorenz Brun878f5f92020-05-12 16:15:39 +020083
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020084 return &kubeletconfig.KubeletConfiguration{
85 TypeMeta: v1.TypeMeta{
86 Kind: "KubeletConfiguration",
87 APIVersion: kubeletconfig.GroupName + "/v1beta1",
88 },
Serge Bazanski2cfafc92023-03-21 16:42:47 +010089 TLSCertFile: fargs.ArgPath("server.crt", s.serverCert),
90 TLSPrivateKeyFile: s.KubeletDirectory.PKI.Key.FullPath(),
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020091 TLSMinVersion: "VersionTLS13",
92 ClusterDNS: clusterDNS,
93 Authentication: kubeletconfig.KubeletAuthentication{
94 X509: kubeletconfig.KubeletX509Authentication{
Serge Bazanski2cfafc92023-03-21 16:42:47 +010095 ClientCAFile: fargs.ArgPath("ca.crt", s.serverCACert),
Lorenz Brun878f5f92020-05-12 16:15:39 +020096 },
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020097 },
98 // TODO(q3k): move reconciler.False to a generic package, fix the following references.
Lorenz Brun78cefca2022-06-20 12:59:55 +000099 ClusterDomain: s.ClusterDomain,
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200100 EnableControllerAttachDetach: reconciler.False(),
101 HairpinMode: "none",
102 MakeIPTablesUtilChains: reconciler.False(), // We don't have iptables
103 FailSwapOn: reconciler.False(), // Our kernel doesn't have swap enabled which breaks Kubelet's detection
Lorenz Brun98206b92022-06-22 16:21:50 +0000104 CgroupRoot: "/",
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200105 KubeReserved: map[string]string{
106 "cpu": "200m",
107 "memory": "300Mi",
108 },
Lorenz Brun0db90ba2020-04-06 14:04:52 +0200109
Serge Bazanski216fe7b2021-05-21 18:36:16 +0200110 // We're not going to use this, but let's make it point to a
111 // known-empty directory in case anybody manages to trigger it.
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200112 VolumePluginDir: s.EphemeralDirectory.FlexvolumePlugins.FullPath(),
113 }
114}
Lorenz Brun878f5f92020-05-12 16:15:39 +0200115
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200116func (s *kubeletService) Run(ctx context.Context) error {
Serge Bazanski2cfafc92023-03-21 16:42:47 +0100117 if len(s.serverCert) == 0 || len(s.serverCACert) == 0 || len(s.kubeconfig) == 0 {
118 return fmt.Errorf("setCertificates was not called")
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200119 }
120
121 fargs, err := fileargs.New()
122 if err != nil {
Lorenz Brun878f5f92020-05-12 16:15:39 +0200123 return err
124 }
Serge Bazanski2cfafc92023-03-21 16:42:47 +0100125 defer fargs.Close()
126
127 configRaw, err := json.Marshal(s.configure(fargs))
128 if err != nil {
129 return fmt.Errorf("when marshaling kubelet configuration: %w", err)
130 }
131
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200132 cmd := exec.CommandContext(ctx, "/kubernetes/bin/kube", "kubelet",
133 fargs.FileOpt("--config", "config.json", configRaw),
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200134 fmt.Sprintf("--container-runtime-endpoint=unix://%s", s.EphemeralDirectory.Containerd.ClientSocket.FullPath()),
Serge Bazanski2cfafc92023-03-21 16:42:47 +0100135 fargs.FileOpt("--kubeconfig", "kubeconfig", s.kubeconfig),
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200136 fmt.Sprintf("--root-dir=%s", s.KubeletDirectory.FullPath()),
137 )
138 cmd.Env = []string{"PATH=/kubernetes/bin"}
Serge Bazanski05604292021-03-12 17:47:21 +0100139 return supervisor.RunCommand(ctx, cmd, supervisor.ParseKLog())
Lorenz Brun878f5f92020-05-12 16:15:39 +0200140}