2022-03-22 11:03:15 -04:00
package core
import (
"context"
"strings"
2022-05-04 08:32:34 -04:00
"time"
2022-03-22 11:03:15 -04:00
"github.com/edgelesssys/constellation/coordinator/kubernetes"
2022-03-25 05:42:27 -04:00
"github.com/edgelesssys/constellation/coordinator/kubernetes/k8sapi/resources"
2022-03-22 11:03:15 -04:00
"github.com/edgelesssys/constellation/coordinator/role"
2022-05-04 08:32:34 -04:00
"github.com/edgelesssys/constellation/internal/constants"
2022-03-22 11:03:15 -04:00
"go.uber.org/zap"
kubeadm "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm/v1beta3"
)
// GetK8sJoinArgs returns the args needed by a Node to join the cluster.
func ( c * Core ) GetK8sJoinArgs ( ) ( * kubeadm . BootstrapTokenDiscovery , error ) {
2022-05-04 08:32:34 -04:00
return c . kube . GetJoinToken ( constants . KubernetesJoinTokenTTL )
2022-03-22 11:03:15 -04:00
}
2022-04-25 11:24:48 -04:00
// GetK8SCertificateKey returns the key needed by a Coordinator to join the cluster.
func ( c * Core ) GetK8SCertificateKey ( ) ( string , error ) {
return c . kube . GetKubeadmCertificateKey ( )
}
2022-03-22 11:03:15 -04:00
// InitCluster initializes the cluster, stores the join args, and returns the kubeconfig.
2022-03-25 05:42:27 -04:00
func ( c * Core ) InitCluster ( autoscalingNodeGroups [ ] string , cloudServiceAccountURI string ) ( [ ] byte , error ) {
2022-03-22 11:03:15 -04:00
var nodeName string
var providerID string
2022-03-25 05:42:27 -04:00
var instance Instance
var ccmConfigMaps resources . ConfigMaps
var ccmSecrets resources . Secrets
2022-03-29 07:25:04 -04:00
var caSecrets resources . Secrets
2022-03-25 05:42:27 -04:00
var err error
nodeIP := coordinatorVPNIP . String ( )
2022-03-22 11:03:15 -04:00
if c . metadata . Supported ( ) {
2022-03-25 05:42:27 -04:00
instance , err = c . metadata . Self ( context . TODO ( ) )
2022-03-22 11:03:15 -04:00
if err != nil {
c . zaplogger . Error ( "Retrieving own instance metadata failed" , zap . Error ( err ) )
return nil , err
}
nodeName = instance . Name
providerID = instance . ProviderID
2022-03-25 05:51:59 -04:00
if len ( instance . IPs ) > 0 {
nodeIP = instance . IPs [ 0 ]
}
2022-03-22 11:03:15 -04:00
} else {
nodeName = coordinatorVPNIP . String ( )
}
if c . cloudControllerManager . Supported ( ) && c . metadata . Supported ( ) {
c . zaplogger . Info ( "Preparing node for cloud-controller-manager" )
if err := PrepareInstanceForCCM ( context . TODO ( ) , c . metadata , c . cloudControllerManager , coordinatorVPNIP . String ( ) ) ; err != nil {
c . zaplogger . Error ( "Preparing node for CCM failed" , zap . Error ( err ) )
return nil , err
}
2022-03-25 05:42:27 -04:00
ccmConfigMaps , err = c . cloudControllerManager . ConfigMaps ( instance )
if err != nil {
c . zaplogger . Error ( "Defining ConfigMaps for CCM failed" , zap . Error ( err ) )
return nil , err
}
ccmSecrets , err = c . cloudControllerManager . Secrets ( instance , cloudServiceAccountURI )
if err != nil {
c . zaplogger . Error ( "Defining Secrets for CCM failed" , zap . Error ( err ) )
return nil , err
}
2022-03-22 11:03:15 -04:00
}
2022-03-29 07:25:04 -04:00
if c . clusterAutoscaler . Supported ( ) {
caSecrets , err = c . clusterAutoscaler . Secrets ( instance , cloudServiceAccountURI )
if err != nil {
c . zaplogger . Error ( "Defining Secrets for cluster-autoscaler failed" , zap . Error ( err ) )
return nil , err
}
}
2022-03-22 11:03:15 -04:00
c . zaplogger . Info ( "Initializing cluster" )
2022-05-04 08:32:34 -04:00
if err := c . kube . InitCluster ( kubernetes . InitClusterInput {
2022-03-25 05:42:27 -04:00
APIServerAdvertiseIP : coordinatorVPNIP . String ( ) ,
NodeIP : nodeIP ,
NodeName : k8sCompliantHostname ( nodeName ) ,
ProviderID : providerID ,
SupportClusterAutoscaler : c . clusterAutoscaler . Supported ( ) ,
AutoscalingCloudprovider : c . clusterAutoscaler . Name ( ) ,
2022-03-29 07:25:04 -04:00
AutoscalingSecrets : caSecrets ,
AutoscalingVolumes : c . clusterAutoscaler . Volumes ( ) ,
AutoscalingVolumeMounts : c . clusterAutoscaler . VolumeMounts ( ) ,
AutoscalingEnv : c . clusterAutoscaler . Env ( ) ,
2022-03-25 05:42:27 -04:00
AutoscalingNodeGroups : autoscalingNodeGroups ,
SupportsCloudControllerManager : c . cloudControllerManager . Supported ( ) ,
CloudControllerManagerName : c . cloudControllerManager . Name ( ) ,
CloudControllerManagerImage : c . cloudControllerManager . Image ( ) ,
CloudControllerManagerPath : c . cloudControllerManager . Path ( ) ,
CloudControllerManagerExtraArgs : c . cloudControllerManager . ExtraArgs ( ) ,
CloudControllerManagerConfigMaps : ccmConfigMaps ,
CloudControllerManagerSecrets : ccmSecrets ,
CloudControllerManagerVolumes : c . cloudControllerManager . Volumes ( ) ,
CloudControllerManagerVolumeMounts : c . cloudControllerManager . VolumeMounts ( ) ,
CloudControllerManagerEnv : c . cloudControllerManager . Env ( ) ,
2022-03-25 05:49:18 -04:00
SupportsCloudNodeManager : c . cloudNodeManager . Supported ( ) ,
CloudNodeManagerImage : c . cloudNodeManager . Image ( ) ,
CloudNodeManagerPath : c . cloudNodeManager . Path ( ) ,
CloudNodeManagerExtraArgs : c . cloudNodeManager . ExtraArgs ( ) ,
2022-05-04 08:32:34 -04:00
} ) ; err != nil {
2022-03-22 11:03:15 -04:00
c . zaplogger . Error ( "Initializing cluster failed" , zap . Error ( err ) )
return nil , err
}
kubeconfig , err := c . kube . GetKubeconfig ( )
if err != nil {
return nil , err
}
if err := c . data ( ) . PutKubernetesConfig ( kubeconfig ) ; err != nil {
return nil , err
}
// set role in cloud provider metadata for autoconfiguration
if c . metadata . Supported ( ) {
if err := c . metadata . SignalRole ( context . TODO ( ) , role . Coordinator ) ; err != nil {
c . zaplogger . Info ( "unable to update role in cloud provider metadata" , zap . Error ( err ) )
}
}
return kubeconfig , nil
}
// JoinCluster lets a Node join the cluster.
2022-04-25 11:24:48 -04:00
func ( c * Core ) JoinCluster ( args * kubeadm . BootstrapTokenDiscovery , certKey string , peerRole role . Role ) error {
2022-04-26 05:22:21 -04:00
c . zaplogger . Info ( "Joining Kubernetes cluster" )
2022-03-22 11:03:15 -04:00
nodeVPNIP , err := c . vpn . GetInterfaceIP ( )
if err != nil {
c . zaplogger . Error ( "Retrieving vpn ip failed" , zap . Error ( err ) )
return err
}
var nodeName string
var providerID string
2022-03-25 05:51:59 -04:00
nodeIP := nodeVPNIP
2022-03-22 11:03:15 -04:00
if c . metadata . Supported ( ) {
instance , err := c . metadata . Self ( context . TODO ( ) )
if err != nil {
c . zaplogger . Error ( "Retrieving own instance metadata failed" , zap . Error ( err ) )
return err
}
providerID = instance . ProviderID
nodeName = instance . Name
2022-03-25 05:51:59 -04:00
if len ( instance . IPs ) > 0 {
nodeIP = instance . IPs [ 0 ]
}
2022-03-22 11:03:15 -04:00
} else {
nodeName = nodeVPNIP
}
if c . cloudControllerManager . Supported ( ) && c . metadata . Supported ( ) {
c . zaplogger . Info ( "Preparing node for cloud-controller-manager" )
if err := PrepareInstanceForCCM ( context . TODO ( ) , c . metadata , c . cloudControllerManager , nodeVPNIP ) ; err != nil {
c . zaplogger . Error ( "Preparing node for CCM failed" , zap . Error ( err ) )
return err
}
}
2022-04-25 11:24:48 -04:00
c . zaplogger . Info ( "k8s Join data" , zap . String ( "nodename" , nodeName ) , zap . String ( "nodeIP" , nodeIP ) , zap . String ( "nodeVPNIP" , nodeVPNIP ) , zap . String ( "provid" , providerID ) )
// we need to pass the VPNIP for another control-plane, otherwise etcd will bind itself to the wrong IP address and fails
2022-04-27 10:37:05 -04:00
if err := c . kube . JoinCluster ( args , k8sCompliantHostname ( nodeName ) , nodeIP , nodeVPNIP , providerID , certKey , c . cloudControllerManager . Supported ( ) , peerRole ) ; err != nil {
2022-04-26 05:22:21 -04:00
c . zaplogger . Error ( "Joining Kubernetes cluster failed" , zap . Error ( err ) )
2022-03-22 11:03:15 -04:00
return err
}
2022-04-26 05:22:21 -04:00
c . zaplogger . Info ( "Joined Kubernetes cluster" )
2022-03-22 11:03:15 -04:00
// set role in cloud provider metadata for autoconfiguration
if c . metadata . Supported ( ) {
2022-04-25 11:24:48 -04:00
if err := c . metadata . SignalRole ( context . TODO ( ) , peerRole ) ; err != nil {
2022-03-22 11:03:15 -04:00
c . zaplogger . Info ( "unable to update role in cloud provider metadata" , zap . Error ( err ) )
}
}
return nil
}
// Cluster manages the overall cluster lifecycle (init, join).
type Cluster interface {
// InitCluster bootstraps a new cluster with the current node being the master, returning the arguments required to join the cluster.
2022-05-04 08:32:34 -04:00
InitCluster ( kubernetes . InitClusterInput ) error
2022-03-22 11:03:15 -04:00
// JoinCluster will join the current node to an existing cluster.
2022-04-27 10:37:05 -04:00
JoinCluster ( args * kubeadm . BootstrapTokenDiscovery , nodeName , nodeIP , nodeVPNIP , providerID , certKey string , ccmSupported bool , peerRole role . Role ) error
2022-03-22 11:03:15 -04:00
// GetKubeconfig reads the kubeconfig from the filesystem. Only succeeds after cluster is initialized.
GetKubeconfig ( ) ( [ ] byte , error )
2022-04-25 11:24:48 -04:00
// GetKubeadmCertificateKey returns the 64-byte hex string key needed to join the cluster as control-plane. This function must be executed on a control-plane.
GetKubeadmCertificateKey ( ) ( string , error )
2022-05-04 08:32:34 -04:00
// GetJoinToken returns a bootstrap (join) token.
GetJoinToken ( ttl time . Duration ) ( * kubeadm . BootstrapTokenDiscovery , error )
2022-05-19 11:18:22 -04:00
// StartKubelet starts the kubelet service.
StartKubelet ( ) error
2022-03-22 11:03:15 -04:00
}
2022-04-26 05:22:21 -04:00
// ClusterFake behaves like a real cluster, but does not actually initialize or join Kubernetes.
2022-03-22 11:03:15 -04:00
type ClusterFake struct { }
// InitCluster fakes bootstrapping a new cluster with the current node being the master, returning the arguments required to join the cluster.
2022-05-04 08:32:34 -04:00
func ( c * ClusterFake ) InitCluster ( kubernetes . InitClusterInput ) error {
return nil
2022-03-22 11:03:15 -04:00
}
// JoinCluster will fake joining the current node to an existing cluster.
2022-04-27 10:37:05 -04:00
func ( c * ClusterFake ) JoinCluster ( args * kubeadm . BootstrapTokenDiscovery , nodeName , nodeIP , nodeVPNIP , providerID , certKey string , _ bool , _ role . Role ) error {
2022-03-22 11:03:15 -04:00
return nil
}
// GetKubeconfig fakes reading the kubeconfig from the filesystem. Only succeeds after cluster is initialized.
func ( c * ClusterFake ) GetKubeconfig ( ) ( [ ] byte , error ) {
return [ ] byte ( "kubeconfig" ) , nil
}
2022-04-25 11:24:48 -04:00
// GetKubeadmCertificateKey fakes generating a certificateKey.
func ( c * ClusterFake ) GetKubeadmCertificateKey ( ) ( string , error ) {
return "controlPlaneCertficateKey" , nil
}
2022-05-04 08:32:34 -04:00
// GetJoinToken returns a bootstrap (join) token.
func ( c * ClusterFake ) GetJoinToken ( _ time . Duration ) ( * kubeadm . BootstrapTokenDiscovery , error ) {
return & kubeadm . BootstrapTokenDiscovery {
APIServerEndpoint : "0.0.0.0" ,
Token : "kube-fake-token" ,
CACertHashes : [ ] string { "sha256:a60ebe9b0879090edd83b40a4df4bebb20506bac1e51d518ff8f4505a721930f" } ,
} , nil
}
2022-05-19 11:18:22 -04:00
// StartKubelet starts the kubelet service.
func ( c * ClusterFake ) StartKubelet ( ) error {
return nil
}
2022-04-26 05:22:21 -04:00
// k8sCompliantHostname transforms a hostname to an RFC 1123 compliant, lowercase subdomain as required by Kubernetes node names.
2022-03-22 11:03:15 -04:00
// The following regex is used by k8s for validation: /^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$/ .
// Only a simple heuristic is used for now (to lowercase, replace underscores).
func k8sCompliantHostname ( in string ) string {
hostname := strings . ToLower ( in )
hostname = strings . ReplaceAll ( hostname , "_" , "-" )
return hostname
}