blob: 9c4132d36724429d9677b3625a1a433fda21587c [file] [log] [blame]
Lorenz Brun6e8f69c2019-11-18 10:44:24 +01001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package kubernetes
18
19import (
20 "context"
21 "encoding/pem"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010022 "fmt"
23 "net"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010024 "os/exec"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010025
Serge Bazanski31370b02021-01-07 16:31:14 +010026 common "source.monogon.dev/metropolis/node"
27 "source.monogon.dev/metropolis/node/core/localstorage"
28 "source.monogon.dev/metropolis/node/kubernetes/pki"
29 "source.monogon.dev/metropolis/pkg/fileargs"
30 "source.monogon.dev/metropolis/pkg/supervisor"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010031)
32
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020033type apiserverService struct {
Serge Bazanski9411f7c2021-03-10 13:12:53 +010034 KPKI *pki.PKI
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020035 AdvertiseAddress net.IP
36 ServiceIPRange net.IPNet
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020037 EphemeralConsensusDirectory *localstorage.EphemeralConsensusDirectory
38
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010039 // All PKI-related things are in DER
40 idCA []byte
41 kubeletClientCert []byte
42 kubeletClientKey []byte
43 aggregationCA []byte
44 aggregationClientCert []byte
45 aggregationClientKey []byte
46 serviceAccountPrivKey []byte // In PKIX form
47 serverCert []byte
48 serverKey []byte
49}
50
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020051func (s *apiserverService) loadPKI(ctx context.Context) error {
Serge Bazanskidbfc6382020-06-19 20:35:43 +020052 for _, el := range []struct {
53 targetCert *[]byte
54 targetKey *[]byte
55 name pki.KubeCertificateName
56 }{
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020057 {&s.idCA, nil, pki.IdCA},
Serge Bazanski9411f7c2021-03-10 13:12:53 +010058 {&s.kubeletClientCert, &s.kubeletClientKey, pki.APIServerKubeletClient},
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020059 {&s.aggregationCA, nil, pki.AggregationCA},
60 {&s.aggregationClientCert, &s.aggregationClientKey, pki.FrontProxyClient},
61 {&s.serverCert, &s.serverKey, pki.APIServer},
Serge Bazanskidbfc6382020-06-19 20:35:43 +020062 } {
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020063 cert, key, err := s.KPKI.Certificate(ctx, el.name)
Serge Bazanskidbfc6382020-06-19 20:35:43 +020064 if err != nil {
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020065 return fmt.Errorf("could not load certificate %q from PKI: %w", el.name, err)
Serge Bazanskidbfc6382020-06-19 20:35:43 +020066 }
67 if el.targetCert != nil {
68 *el.targetCert = cert
69 }
70 if el.targetKey != nil {
71 *el.targetKey = key
72 }
73 }
74
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010075 var err error
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020076 s.serviceAccountPrivKey, err = s.KPKI.ServiceAccountKey(ctx)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010077 if err != nil {
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020078 return fmt.Errorf("could not load serviceaccount privkey: %w", err)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010079 }
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020080 return nil
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010081}
82
Serge Bazanskic2c7ad92020-07-13 17:20:09 +020083func (s *apiserverService) Run(ctx context.Context) error {
84 if err := s.loadPKI(ctx); err != nil {
85 return fmt.Errorf("loading PKI data failed: %w", err)
86 }
87 args, err := fileargs.New()
88 if err != nil {
89 panic(err) // If this fails, something is very wrong. Just crash.
90 }
91 defer args.Close()
92
93 cmd := exec.CommandContext(ctx, "/kubernetes/bin/kube", "kube-apiserver",
94 fmt.Sprintf("--advertise-address=%v", s.AdvertiseAddress.String()),
95 "--authorization-mode=Node,RBAC",
96 args.FileOpt("--client-ca-file", "client-ca.pem",
97 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: s.idCA})),
98 "--enable-admission-plugins=NodeRestriction,PodSecurityPolicy",
99 "--enable-aggregator-routing=true",
Serge Bazanski52304a82021-10-29 16:56:18 +0200100 fmt.Sprintf("--secure-port=%d", common.KubernetesAPIPort),
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200101 fmt.Sprintf("--etcd-servers=unix:///%s:0", s.EphemeralConsensusDirectory.ClientSocket.FullPath()),
102 args.FileOpt("--kubelet-client-certificate", "kubelet-client-cert.pem",
103 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: s.kubeletClientCert})),
104 args.FileOpt("--kubelet-client-key", "kubelet-client-key.pem",
105 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: s.kubeletClientKey})),
106 "--kubelet-preferred-address-types=InternalIP",
107 args.FileOpt("--proxy-client-cert-file", "aggregation-client-cert.pem",
108 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: s.aggregationClientCert})),
109 args.FileOpt("--proxy-client-key-file", "aggregation-client-key.pem",
110 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: s.aggregationClientKey})),
Lorenz Bruncc078df2021-12-23 11:51:55 +0100111 "--requestheader-allowed-names=front-proxy-client,metropolis-auth-proxy-client",
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200112 args.FileOpt("--requestheader-client-ca-file", "aggregation-ca.pem",
113 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: s.aggregationCA})),
114 "--requestheader-extra-headers-prefix=X-Remote-Extra-",
115 "--requestheader-group-headers=X-Remote-Group",
116 "--requestheader-username-headers=X-Remote-User",
117 args.FileOpt("--service-account-key-file", "service-account-pubkey.pem",
118 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: s.serviceAccountPrivKey})),
Lorenz Brund13c1c62022-03-30 19:58:58 +0200119 args.FileOpt("--service-account-signing-key-file", "service-account-signing-key.pem",
120 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: s.serviceAccountPrivKey})),
121 "--service-account-issuer", "https://metropolis.internal", // TODO: Figure out federation
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200122 fmt.Sprintf("--service-cluster-ip-range=%v", s.ServiceIPRange.String()),
Tim Windelschmidt03000772023-07-03 02:19:28 +0200123 // We use a patch for the allocator that prevents usage of system ports.
124 fmt.Sprintf("--service-node-port-range=1-65535"),
Serge Bazanskic2c7ad92020-07-13 17:20:09 +0200125 args.FileOpt("--tls-cert-file", "server-cert.pem",
126 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: s.serverCert})),
127 args.FileOpt("--tls-private-key-file", "server-key.pem",
128 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: s.serverKey})),
129 )
130 if args.Error() != nil {
Lorenz Brun6e8f69c2019-11-18 10:44:24 +0100131 return err
132 }
Serge Bazanski05604292021-03-12 17:47:21 +0100133 return supervisor.RunCommand(ctx, cmd, supervisor.ParseKLog())
Lorenz Brun6e8f69c2019-11-18 10:44:24 +0100134}