constellation/disk-mapper/cmd/main.go

213 lines
6.6 KiB
Go
Raw Permalink Normal View History

/*
Copyright (c) Edgeless Systems GmbH
SPDX-License-Identifier: AGPL-3.0-only
*/
package main
import (
"context"
"flag"
2024-02-08 09:20:01 -05:00
"fmt"
"io"
2024-02-08 09:20:01 -05:00
"log/slog"
"log/syslog"
"net"
"os"
"path/filepath"
"time"
"github.com/edgelesssys/constellation/v2/disk-mapper/internal/diskencryption"
2022-09-21 07:47:57 -04:00
"github.com/edgelesssys/constellation/v2/disk-mapper/internal/recoveryserver"
"github.com/edgelesssys/constellation/v2/disk-mapper/internal/rejoinclient"
"github.com/edgelesssys/constellation/v2/disk-mapper/internal/setup"
"github.com/edgelesssys/constellation/v2/internal/attestation/choose"
"github.com/edgelesssys/constellation/v2/internal/attestation/tdx"
"github.com/edgelesssys/constellation/v2/internal/attestation/variant"
2022-09-21 07:47:57 -04:00
"github.com/edgelesssys/constellation/v2/internal/attestation/vtpm"
awscloud "github.com/edgelesssys/constellation/v2/internal/cloud/aws"
2022-09-21 07:47:57 -04:00
azurecloud "github.com/edgelesssys/constellation/v2/internal/cloud/azure"
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
2022-09-21 07:47:57 -04:00
gcpcloud "github.com/edgelesssys/constellation/v2/internal/cloud/gcp"
"github.com/edgelesssys/constellation/v2/internal/cloud/metadata"
"github.com/edgelesssys/constellation/v2/internal/cloud/openstack"
2022-09-21 07:47:57 -04:00
qemucloud "github.com/edgelesssys/constellation/v2/internal/cloud/qemu"
"github.com/edgelesssys/constellation/v2/internal/constants"
"github.com/edgelesssys/constellation/v2/internal/grpc/dialer"
kmssetup "github.com/edgelesssys/constellation/v2/internal/kms/setup"
2022-09-21 07:47:57 -04:00
"github.com/edgelesssys/constellation/v2/internal/logger"
"github.com/edgelesssys/constellation/v2/internal/role"
"github.com/spf13/afero"
)
const (
gcpStateDiskPath = "/dev/disk/by-id/google-state-disk"
azureStateDiskPath = "/dev/disk/azure/scsi1/lun0"
awsStateDiskPath = "/dev/sdb"
qemuStateDiskPath = "/dev/vdb"
openstackStateDiskPath = "/dev/vdb"
)
func main() {
runErr := run()
if runErr == nil {
return
}
syslogWriter, err := syslog.New(syslog.LOG_EMERG|syslog.LOG_KERN, "disk-mapper")
if err != nil {
os.Exit(1)
}
_ = syslogWriter.Err(runErr.Error())
_ = syslogWriter.Emerg("disk-mapper has failed. In most cases, this is due to a misconfiguration or transient error with the infrastructure.")
time.Sleep(time.Minute) // sleep to allow the message to be written to syslog and seen by the user
os.Exit(1)
}
func run() error {
csp := flag.String("csp", "", "Cloud Service Provider the image is running on")
verbosity := flag.Int("v", 0, logger.CmdLineVerbosityDescription)
flag.Parse()
2024-02-08 09:20:01 -05:00
log := logger.NewJSONLogger(logger.VerbosityFromInt(*verbosity))
log.With(slog.String("version", constants.BinaryVersion().String()), slog.String("cloudProvider", *csp)).
Info("Starting disk-mapper")
// set up quote issuer for aTLS connections
attestVariant, err := variant.FromString(os.Getenv(constants.AttestationVariant))
if err != nil {
2024-02-08 09:20:01 -05:00
log.With(slog.Any("error", err)).Error("Failed to parse attestation variant")
return err
}
issuer, err := choose.Issuer(attestVariant, log)
if err != nil {
2024-02-08 09:20:01 -05:00
log.With(slog.Any("error", err)).Error("Failed to select issuer")
return err
}
// set up metadata API
var diskPath string
var metadataClient setup.MetadataAPI
switch cloudprovider.FromString(*csp) {
case cloudprovider.AWS:
// on AWS Nitro platform, disks are attached over NVMe
// using udev rules, a symlink for our disk is created at /dev/sdb
diskPath, err = filepath.EvalSymlinks(awsStateDiskPath)
if err != nil {
2024-02-08 09:20:01 -05:00
log.With(slog.Any("error", err)).Error("Unable to resolve Azure state disk path")
return err
}
metadataClient, err = awscloud.New(context.Background())
if err != nil {
2024-02-08 09:20:01 -05:00
log.With(slog.Any("error", err)).Error("Failed to set up AWS metadata client")
return err
}
case cloudprovider.Azure:
diskPath, err = filepath.EvalSymlinks(azureStateDiskPath)
if err != nil {
2024-02-08 09:20:01 -05:00
log.With(slog.Any("error", err)).Error("Unable to resolve Azure state disk path")
return err
}
metadataClient, err = azurecloud.New(context.Background())
if err != nil {
2024-02-08 09:20:01 -05:00
log.With(slog.Any("error", err)).Error("Failed to set up Azure metadata client")
return err
}
case cloudprovider.GCP:
diskPath, err = filepath.EvalSymlinks(gcpStateDiskPath)
if err != nil {
2024-02-08 09:20:01 -05:00
log.With(slog.Any("error", err)).Error("Unable to resolve GCP state disk path")
return err
}
gcpMeta, err := gcpcloud.New(context.Background())
if err != nil {
2024-02-08 09:20:01 -05:00
log.With(slog.Any("error", err)).Error(("Failed to create GCP metadata client"))
return err
}
defer gcpMeta.Close()
metadataClient = gcpMeta
case cloudprovider.OpenStack:
diskPath = openstackStateDiskPath
metadataClient, err = openstack.New(context.Background())
if err != nil {
2024-02-08 09:20:01 -05:00
log.With(slog.Any("error", err)).Error(("Failed to create OpenStack metadata client"))
return err
}
case cloudprovider.QEMU:
diskPath = qemuStateDiskPath
metadataClient = qemucloud.New()
default:
2024-02-08 09:20:01 -05:00
log.Error(fmt.Sprintf("CSP %s is not supported by Constellation", *csp))
return err
}
// initialize device mapper
mapper, free, err := diskencryption.New(diskPath, log)
if err != nil {
2024-02-08 09:20:01 -05:00
log.With(slog.Any("error", err)).Error(("Failed to initialize device mapper"))
return err
}
defer free()
// Use TDX if available
openDevice := vtpm.OpenVTPM
if attestVariant.OID().Equal(variant.QEMUTDX{}.OID()) {
openDevice = func() (io.ReadWriteCloser, error) {
return tdx.Open()
}
}
setupManger := setup.New(
2024-02-08 09:20:01 -05:00
log.WithGroup("setupManager"),
*csp,
diskPath,
afero.Afero{Fs: afero.NewOsFs()},
mapper,
setup.DiskMounter{},
openDevice,
)
if err := setupManger.LogDevices(); err != nil {
2024-02-08 09:20:01 -05:00
log.With(slog.Any("error", err)).Error(("Failed to log devices"))
return err
}
// prepare the state disk
if mapper.IsInitialized() {
// set up rejoin client
var self metadata.InstanceMetadata
self, err = metadataClient.Self(context.Background())
if err != nil {
2024-02-08 09:20:01 -05:00
log.With(slog.Any("error", err)).Error(("Failed to get self metadata"))
return err
}
rejoinClient := rejoinclient.New(
dialer.New(issuer, nil, &net.Dialer{}),
self,
metadataClient,
2024-02-08 09:20:01 -05:00
log.WithGroup("rejoinClient"),
)
// set up recovery server if control-plane node
var recoveryServer setup.RecoveryServer
if self.Role == role.ControlPlane {
2024-02-08 09:20:01 -05:00
recoveryServer = recoveryserver.New(issuer, kmssetup.KMS, log.WithGroup("recoveryServer"))
} else {
2024-02-08 09:20:01 -05:00
recoveryServer = recoveryserver.NewStub(log.WithGroup("recoveryServer"))
}
err = setupManger.PrepareExistingDisk(setup.NewNodeRecoverer(recoveryServer, rejoinClient))
} else {
err = setupManger.PrepareNewDisk()
}
if err != nil {
2024-02-08 09:20:01 -05:00
log.With(slog.Any("error", err)).Error(("Failed to prepare state disk"))
return err
}
return nil
}