blob: 5c4ec3359ccdbe1dec0b407e251904e0ac4111ac [file] [log] [blame]
Tim Windelschmidt6d33a432025-02-04 14:34:25 +01001// Copyright The Monogon Project Authors.
Lorenz Brunae0d90d2019-09-05 17:53:56 +02002// SPDX-License-Identifier: Apache-2.0
Lorenz Brunae0d90d2019-09-05 17:53:56 +02003
4package main
5
6import (
Serge Bazanskicdb8c782020-02-17 12:34:02 +01007 "context"
Lorenz Brundd8c80e2019-10-07 16:19:49 +02008 "fmt"
Serge Bazanski3b098232023-03-16 17:57:02 +01009 "strings"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020010
Lorenz Brunae0d90d2019-09-05 17:53:56 +020011 "golang.org/x/sys/unix"
Serge Bazanski99f47742021-08-04 20:21:42 +020012
Serge Bazanski3c5d0632024-09-12 10:49:12 +000013 "source.monogon.dev/go/logging"
Serge Bazanski31370b02021-01-07 16:31:14 +010014 "source.monogon.dev/metropolis/node/core/cluster"
Lorenz Brun6c454342023-06-01 12:23:38 +020015 "source.monogon.dev/metropolis/node/core/devmgr"
Serge Bazanski31370b02021-01-07 16:31:14 +010016 "source.monogon.dev/metropolis/node/core/localstorage"
17 "source.monogon.dev/metropolis/node/core/localstorage/declarative"
Serge Bazanskiefbde192024-07-31 14:53:20 +000018 "source.monogon.dev/metropolis/node/core/metrics"
Serge Bazanski31370b02021-01-07 16:31:14 +010019 "source.monogon.dev/metropolis/node/core/network"
Lorenz Bruncb76c842025-08-11 12:54:28 +020020 "source.monogon.dev/metropolis/node/core/network/ipam"
Jan Schärb86917b2025-05-14 16:31:08 +000021 "source.monogon.dev/metropolis/node/core/productinfo"
Serge Bazanskif9edf522021-06-17 15:57:13 +020022 "source.monogon.dev/metropolis/node/core/roleserve"
Serge Bazanski58ddc092022-06-30 18:23:33 +020023 "source.monogon.dev/metropolis/node/core/rpc/resolver"
Serge Bazanski0d9e1252024-09-03 12:16:47 +020024 "source.monogon.dev/metropolis/node/core/tconsole"
Lorenz Brune306d782021-09-01 13:01:06 +020025 timesvc "source.monogon.dev/metropolis/node/core/time"
Lorenz Brun35fcf032023-06-29 04:15:58 +020026 "source.monogon.dev/metropolis/node/core/update"
Tim Windelschmidt7dac92b2024-12-16 02:51:04 +010027 "source.monogon.dev/osbase/bringup"
Lorenz Brunc607bf62025-07-22 20:25:26 +020028 "source.monogon.dev/osbase/event/memory"
Tim Windelschmidt9f21f532024-05-07 15:14:20 +020029 "source.monogon.dev/osbase/logtree"
Jan Schär91bf1c82024-07-29 17:31:33 +020030 "source.monogon.dev/osbase/net/dns"
Tim Windelschmidt9f21f532024-05-07 15:14:20 +020031 "source.monogon.dev/osbase/supervisor"
Serge Bazanski154e6d92024-09-11 17:26:31 +020032 "source.monogon.dev/osbase/sysctl"
Tim Windelschmidt9f21f532024-05-07 15:14:20 +020033 "source.monogon.dev/osbase/tpm"
Lorenz Brunae0d90d2019-09-05 17:53:56 +020034)
35
36func main() {
Tim Windelschmidt7dac92b2024-12-16 02:51:04 +010037 bringup.Runnable(root).RunWith(bringup.Config{
38 Console: bringup.ConsoleConfig{
39 ShortenDictionary: logtree.MetropolisShortenDict,
40 Filter: consoleFilter,
Serge Bazanski3b098232023-03-16 17:57:02 +010041 },
Tim Windelschmidt7dac92b2024-12-16 02:51:04 +010042 Supervisor: bringup.SupervisorConfig{
43 Metrics: []supervisor.Metrics{
44 supervisor.NewMetricsPrometheus(metrics.CoreRegistry),
45 },
Lorenz Brunf0b22ff2023-05-02 16:04:20 +020046 },
Tim Windelschmidt7dac92b2024-12-16 02:51:04 +010047 })
Serge Bazanski57b43752020-07-13 19:17:48 +020048}
Serge Bazanski3b098232023-03-16 17:57:02 +010049
50// consoleFilter is used to filter out some uselessly verbose logs from the
51// console.
52//
53// This should be limited to external services, our internal services should
54// instead just have good logging by default.
55func consoleFilter(p *logtree.LogEntry) bool {
56 if p.Raw != nil {
57 return false
58 }
59 if p.Leveled == nil {
60 return false
61 }
62 s := string(p.DN)
63 if strings.HasPrefix(s, "root.role.controlplane.launcher.consensus.etcd") {
Serge Bazanski3c5d0632024-09-12 10:49:12 +000064 return p.Leveled.Severity().AtLeast(logging.WARNING)
Serge Bazanski3b098232023-03-16 17:57:02 +010065 }
66 // TODO(q3k): turn off RPC traces instead
67 if strings.HasPrefix(s, "root.role.controlplane.launcher.curator.listener.rpc") {
68 return false
69 }
70 if strings.HasPrefix(s, "root.role.kubernetes.run.kubernetes.networked.kubelet") {
Serge Bazanski3c5d0632024-09-12 10:49:12 +000071 return p.Leveled.Severity().AtLeast(logging.WARNING)
Serge Bazanski3b098232023-03-16 17:57:02 +010072 }
73 if strings.HasPrefix(s, "root.role.kubernetes.run.kubernetes.networked.apiserver") {
Serge Bazanski3c5d0632024-09-12 10:49:12 +000074 return p.Leveled.Severity().AtLeast(logging.WARNING)
Serge Bazanski3b098232023-03-16 17:57:02 +010075 }
76 if strings.HasPrefix(s, "root.role.kubernetes.run.kubernetes.controller-manager") {
Serge Bazanski3c5d0632024-09-12 10:49:12 +000077 return p.Leveled.Severity().AtLeast(logging.WARNING)
Serge Bazanski3b098232023-03-16 17:57:02 +010078 }
79 if strings.HasPrefix(s, "root.role.kubernetes.run.kubernetes.scheduler") {
Serge Bazanski3c5d0632024-09-12 10:49:12 +000080 return p.Leveled.Severity().AtLeast(logging.WARNING)
Serge Bazanski3b098232023-03-16 17:57:02 +010081 }
Lorenz Brun6eb3fb32023-08-09 17:19:24 +020082 if strings.HasPrefix(s, "root.kernel") {
83 // Linux writes high-severity logs directly to the console anyways and
84 // its low-severity logs are too verbose.
85 return false
86 }
Serge Bazanski6b7731e2023-03-22 17:58:04 +010087 if strings.HasPrefix(s, "supervisor") {
Serge Bazanski3c5d0632024-09-12 10:49:12 +000088 return p.Leveled.Severity().AtLeast(logging.WARNING)
Serge Bazanski6b7731e2023-03-22 17:58:04 +010089 }
Serge Bazanski3b098232023-03-16 17:57:02 +010090 return true
91}
92
Tim Windelschmidt7dac92b2024-12-16 02:51:04 +010093// Function which performs core, one-way initialization of the node. This means
94// waiting for the network, starting the cluster manager, and then starting all
95// services related to the node's roles.
96func root(ctx context.Context) error {
97 logger := supervisor.Logger(ctx)
98
Jan Schärb86917b2025-05-14 16:31:08 +000099 productInfo := productinfo.Get()
100 logger.Infof("Starting %s init", productInfo.Info.Name)
101 logger.Infof("Version: %s", productInfo.VersionString)
102 logger.Infof("Variant: %s", productInfo.Info.Variant)
103 if productInfo.Info.BuildTreeDirty {
104 logger.Warning("Build tree dirty")
105 }
106 if productInfo.Info.CommitHash != "" {
107 logger.Infof("Commit: %s", productInfo.Info.CommitHash)
108 logger.Infof("Commit date: %s", productInfo.HumanCommitDate)
109 }
Tim Windelschmidt7dac92b2024-12-16 02:51:04 +0100110
111 // Linux kernel default is 4096 which is far too low. Raise it to 1M which
112 // is what gVisor suggests.
113 if err := unix.Setrlimit(unix.RLIMIT_NOFILE, &unix.Rlimit{Cur: 1048576, Max: 1048576}); err != nil {
114 logger.Fatalf("Failed to raise rlimits: %v", err)
115 }
116
117 haveTPM := true
118 if err := tpm.Initialize(logger); err != nil {
119 logger.Warningf("Failed to initialize TPM 2.0: %v", err)
120 haveTPM = false
121 }
122
123 metrics.CoreRegistry.MustRegister(dns.MetricsRegistry)
Lorenz Bruncb76c842025-08-11 12:54:28 +0200124 var podNetwork memory.Value[*ipam.Prefixes]
Lorenz Brunc607bf62025-07-22 20:25:26 +0200125 networkSvc := network.New(nil, []string{"hosts", "kubernetes"}, &podNetwork)
Tim Windelschmidt7dac92b2024-12-16 02:51:04 +0100126 networkSvc.DHCPVendorClassID = "dev.monogon.metropolis.node.v1"
127 timeSvc := timesvc.New()
128 devmgrSvc := devmgr.New()
129
130 // This function initializes a headless Delve if this is a debug build or
131 // does nothing if it's not
132 initializeDebugger(networkSvc)
133
134 // Prepare local storage.
135 root := &localstorage.Root{}
136 if err := declarative.PlaceFS(root, "/"); err != nil {
137 panic(fmt.Errorf("when placing root FS: %w", err))
138 }
139
140 updateSvc := &update.Service{
141 Logger: supervisor.MustSubLogger(ctx, "update"),
142 }
143 // Make node-wide cluster resolver.
144 res := resolver.New(ctx, resolver.WithLogger(supervisor.MustSubLogger(ctx, "resolver")))
145
146 // Start storage and network - we need this to get anything else done.
147 if err := root.Start(ctx, updateSvc); err != nil {
148 return fmt.Errorf("cannot start root FS: %w", err)
149 }
150
151 localNodeParams, err := getLocalNodeParams(ctx, root)
152 if err != nil {
153 return fmt.Errorf("cannot get local node parameters: %w", err)
154 }
155
156 if localNodeParams.NetworkConfig != nil {
157 networkSvc.StaticConfig = localNodeParams.NetworkConfig
158 if err := root.ESP.Metropolis.NetworkConfiguration.Marshal(localNodeParams.NetworkConfig); err != nil {
159 logger.Errorf("Error writing back network_config from NodeParameters: %v", err)
160 }
161 }
162 if networkSvc.StaticConfig == nil {
163 staticConfig, err := root.ESP.Metropolis.NetworkConfiguration.Unmarshal()
164 if err == nil {
165 networkSvc.StaticConfig = staticConfig
166 } else {
167 logger.Errorf("Unable to load static config, proceeding without it: %v", err)
168 }
169 }
170
171 if err := supervisor.Run(ctx, "devmgr", devmgrSvc.Run); err != nil {
172 return fmt.Errorf("when starting devmgr: %w", err)
173 }
174 if err := supervisor.Run(ctx, "network", networkSvc.Run); err != nil {
175 return fmt.Errorf("when starting network: %w", err)
176 }
177 if err := supervisor.Run(ctx, "time", timeSvc.Run); err != nil {
178 return fmt.Errorf("when starting time: %w", err)
179 }
180 if err := supervisor.Run(ctx, "sysctl", nodeSysctls); err != nil {
181 return fmt.Errorf("when applying sysctls: %w", err)
182 }
183
184 // The kernel does of course not run in this runnable, only the log pipe
185 // runs in it.
186 if err := supervisor.Run(ctx, "kernel", func(ctx context.Context) error {
187 return logtree.KmsgPipe(ctx, supervisor.Logger(ctx))
188 }); err != nil {
189 return fmt.Errorf("when starting kernel log pipe: %w", err)
190 }
191
192 // Start the role service. The role service connects to the curator and runs
193 // all node-specific role code (eg. Kubernetes services).
194 logger.Infof("Starting role service...")
195 rs := roleserve.New(roleserve.Config{
196 StorageRoot: root,
197 Network: networkSvc,
198 Resolver: res,
199 LogTree: supervisor.LogTree(ctx),
200 Update: updateSvc,
Lorenz Brunc607bf62025-07-22 20:25:26 +0200201 PodNetwork: &podNetwork,
Tim Windelschmidt7dac92b2024-12-16 02:51:04 +0100202 })
203 if err := supervisor.Run(ctx, "role", rs.Run); err != nil {
204 return fmt.Errorf("failed to start role service: %w", err)
205 }
206
207 if err := runDebugService(ctx, rs, supervisor.LogTree(ctx), root); err != nil {
208 return fmt.Errorf("when starting debug service: %w", err)
209 }
210
211 // Initialize interactive consoles.
212 interactiveConsoles := []string{"/dev/tty0"}
Jan Schärb86917b2025-05-14 16:31:08 +0000213 consoleConfig := tconsole.Config{
214 Terminal: tconsole.TerminalLinux,
215 LogTree: supervisor.LogTree(ctx),
216 Network: &networkSvc.Status,
217 Roles: &rs.LocalRoles,
218 CuratorConn: &rs.CuratorConnection,
219 }
Tim Windelschmidt7dac92b2024-12-16 02:51:04 +0100220 for _, c := range interactiveConsoles {
Jan Schärb86917b2025-05-14 16:31:08 +0000221 console, err := tconsole.New(consoleConfig, c)
Tim Windelschmidt7dac92b2024-12-16 02:51:04 +0100222 if err != nil {
223 logger.Infof("Failed to initialize interactive console at %s: %v", c, err)
224 } else {
225 logger.Infof("Started interactive console at %s", c)
226 supervisor.Run(ctx, "console-"+c, console.Run)
227 }
228 }
229
230 // Now that we have consoles, set console logging level to 1 (KERNEL_EMERG,
231 // minimum possible). This prevents the TUI console from being polluted by
232 // random printks.
233 opts := sysctl.Options{
234 "kernel.printk": "1",
235 }
236 if err := opts.Apply(); err != nil {
237 logger.Errorf("Failed to configure printk logging: %v", err)
238 }
239
240 nodeParams, err := getNodeParams(ctx, root)
241 if err != nil {
242 return fmt.Errorf("cannot get node parameters: %w", err)
243 }
244
245 // Start cluster manager. This kicks off cluster membership machinery,
246 // which will either start a new cluster, enroll into one or join one.
247 m := cluster.NewManager(root, networkSvc, rs, updateSvc, nodeParams, haveTPM)
248 if err := supervisor.Run(ctx, "cluster-manager", m.Run); err != nil {
249 return fmt.Errorf("when starting cluster manager: %w", err)
250 }
251
252 supervisor.Signal(ctx, supervisor.SignalHealthy)
253 supervisor.Signal(ctx, supervisor.SignalDone)
254 return nil
Serge Bazanski3b098232023-03-16 17:57:02 +0100255}