blob: 26c258ab3b066dd0dd196c5f285d21cf5e969dad [file] [log] [blame]
Lorenz Brun6e8f69c2019-11-18 10:44:24 +01001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package kubernetes
18
19import (
20 "context"
21 "encoding/pem"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010022 "fmt"
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020023 "io"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010024 "net"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010025 "os/exec"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010026
Lorenz Brunfc5dbc62020-05-28 12:18:07 +020027 "git.monogon.dev/source/nexantic.git/core/internal/common"
Serge Bazanskidbfc6382020-06-19 20:35:43 +020028 "git.monogon.dev/source/nexantic.git/core/internal/common/supervisor"
29 "git.monogon.dev/source/nexantic.git/core/internal/kubernetes/pki"
30 "git.monogon.dev/source/nexantic.git/core/pkg/fileargs"
Lorenz Brunfc5dbc62020-05-28 12:18:07 +020031
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010032 "go.etcd.io/etcd/clientv3"
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010033)
34
35type apiserverConfig struct {
36 advertiseAddress net.IP
37 serviceIPRange net.IPNet
38 // All PKI-related things are in DER
39 idCA []byte
40 kubeletClientCert []byte
41 kubeletClientKey []byte
42 aggregationCA []byte
43 aggregationClientCert []byte
44 aggregationClientKey []byte
45 serviceAccountPrivKey []byte // In PKIX form
46 serverCert []byte
47 serverKey []byte
48}
49
Serge Bazanskidbfc6382020-06-19 20:35:43 +020050func getPKIApiserverConfig(ctx context.Context, kv clientv3.KV, kpki *pki.KubernetesPKI) (*apiserverConfig, error) {
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010051 var config apiserverConfig
Serge Bazanskidbfc6382020-06-19 20:35:43 +020052
53 for _, el := range []struct {
54 targetCert *[]byte
55 targetKey *[]byte
56 name pki.KubeCertificateName
57 }{
58 {&config.idCA, nil, pki.IdCA},
59 {&config.kubeletClientCert, &config.kubeletClientKey, pki.KubeletClient},
60 {&config.aggregationCA, nil, pki.AggregationCA},
61 {&config.aggregationClientCert, &config.aggregationClientKey, pki.FrontProxyClient},
62 {&config.serverCert, &config.serverKey, pki.APIServer},
63 } {
64 cert, key, err := kpki.Certificate(ctx, el.name, kv)
65 if err != nil {
66 return nil, fmt.Errorf("could not load certificate %q from PKI: %w", el.name, err)
67 }
68 if el.targetCert != nil {
69 *el.targetCert = cert
70 }
71 if el.targetKey != nil {
72 *el.targetKey = key
73 }
74 }
75
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010076 var err error
Serge Bazanskidbfc6382020-06-19 20:35:43 +020077 config.serviceAccountPrivKey, err = kpki.ServiceAccountKey(ctx, kv)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010078 if err != nil {
Serge Bazanskidbfc6382020-06-19 20:35:43 +020079 return nil, fmt.Errorf("could not load serviceaccount privkey: %w", err)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010080 }
Lorenz Brun6e8f69c2019-11-18 10:44:24 +010081 return &config, nil
82}
83
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +020084func runAPIServer(config apiserverConfig, output io.Writer) supervisor.Runnable {
85 return func(ctx context.Context) error {
86 args, err := fileargs.New()
87 if err != nil {
88 panic(err) // If this fails, something is very wrong. Just crash.
89 }
90 defer args.Close()
91 cmd := exec.CommandContext(ctx, "/kubernetes/bin/kube", "kube-apiserver",
92 fmt.Sprintf("--advertise-address=%v", config.advertiseAddress.String()),
93 "--authorization-mode=Node,RBAC",
94 args.FileOpt("--client-ca-file", "client-ca.pem",
95 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.idCA})),
96 "--enable-admission-plugins=NodeRestriction,PodSecurityPolicy",
97 "--enable-aggregator-routing=true",
98 "--insecure-port=0",
Lorenz Brunfc5dbc62020-05-28 12:18:07 +020099 fmt.Sprintf("--secure-port=%v", common.KubernetesAPIPort),
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +0200100 // Due to the magic of GRPC this really needs four slashes and a :0
101 fmt.Sprintf("--etcd-servers=%v", "unix:////consensus/listener.sock:0"),
102 args.FileOpt("--kubelet-client-certificate", "kubelet-client-cert.pem",
103 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.kubeletClientCert})),
104 args.FileOpt("--kubelet-client-key", "kubelet-client-key.pem",
105 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.kubeletClientKey})),
Lorenz Brunf042e6f2020-06-24 16:46:09 +0200106 "--kubelet-preferred-address-types=InternalIP",
Lorenz Brun8e3b8fc2020-05-19 14:29:40 +0200107 args.FileOpt("--proxy-client-cert-file", "aggregation-client-cert.pem",
108 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.aggregationClientCert})),
109 args.FileOpt("--proxy-client-key-file", "aggregation-client-key.pem",
110 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.aggregationClientKey})),
111 "--requestheader-allowed-names=front-proxy-client",
112 args.FileOpt("--requestheader-client-ca-file", "aggregation-ca.pem",
113 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.aggregationCA})),
114 "--requestheader-extra-headers-prefix=X-Remote-Extra-",
115 "--requestheader-group-headers=X-Remote-Group",
116 "--requestheader-username-headers=X-Remote-User",
117 args.FileOpt("--service-account-key-file", "service-account-pubkey.pem",
118 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.serviceAccountPrivKey})),
119 fmt.Sprintf("--service-cluster-ip-range=%v", config.serviceIPRange.String()),
120 args.FileOpt("--tls-cert-file", "server-cert.pem",
121 pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: config.serverCert})),
122 args.FileOpt("--tls-private-key-file", "server-key.pem",
123 pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: config.serverKey})),
124 )
125 if args.Error() != nil {
126 return err
127 }
128 cmd.Stdout = output
129 cmd.Stderr = output
130 supervisor.Signal(ctx, supervisor.SignalHealthy)
131 err = cmd.Run()
132 fmt.Fprintf(output, "apiserver stopped: %v\n", err)
Lorenz Brun6e8f69c2019-11-18 10:44:24 +0100133 return err
134 }
Lorenz Brun6e8f69c2019-11-18 10:44:24 +0100135}