/* Copyright (c) Edgeless Systems GmbH SPDX-License-Identifier: AGPL-3.0-only */ package cloudcmd import ( "context" "errors" "fmt" "io" "net/url" "os" "path" "regexp" "runtime" "strings" "github.com/edgelesssys/constellation/v2/cli/internal/libvirt" "github.com/edgelesssys/constellation/v2/cli/internal/state" "github.com/edgelesssys/constellation/v2/cli/internal/terraform" "github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider" "github.com/edgelesssys/constellation/v2/internal/config" "github.com/edgelesssys/constellation/v2/internal/constants" "github.com/edgelesssys/constellation/v2/internal/imagefetcher" "github.com/edgelesssys/constellation/v2/internal/maa" ) // Creator creates cloud resources. type Creator struct { out io.Writer image imageFetcher newTerraformClient func(ctx context.Context, workspace string) (tfResourceClient, error) newLibvirtRunner func() libvirtRunner newRawDownloader func() rawDownloader policyPatcher policyPatcher } // NewCreator creates a new creator. func NewCreator(out io.Writer) *Creator { return &Creator{ out: out, image: imagefetcher.New(), newTerraformClient: func(ctx context.Context, workspace string) (tfResourceClient, error) { return terraform.New(ctx, workspace) }, newLibvirtRunner: func() libvirtRunner { return libvirt.New() }, newRawDownloader: func() rawDownloader { return imagefetcher.NewDownloader() }, policyPatcher: maa.NewAzurePolicyPatcher(), } } // CreateOptions are the options for creating a Constellation cluster. type CreateOptions struct { Provider cloudprovider.Provider Config *config.Config TFWorkspace string image string TFLogLevel terraform.LogLevel } // Create creates the handed amount of instances and all the needed resources. func (c *Creator) Create(ctx context.Context, opts CreateOptions) (state.Infrastructure, error) { provider := opts.Config.GetProvider() attestationVariant := opts.Config.GetAttestationConfig().GetVariant() region := opts.Config.GetRegion() image, err := c.image.FetchReference(ctx, provider, attestationVariant, opts.Config.Image, region) if err != nil { return state.Infrastructure{}, fmt.Errorf("fetching image reference: %w", err) } opts.image = image cl, err := c.newTerraformClient(ctx, opts.TFWorkspace) if err != nil { return state.Infrastructure{}, err } defer cl.RemoveInstaller() var infraState state.Infrastructure switch opts.Provider { case cloudprovider.AWS: infraState, err = c.createAWS(ctx, cl, opts) case cloudprovider.GCP: infraState, err = c.createGCP(ctx, cl, opts) case cloudprovider.Azure: infraState, err = c.createAzure(ctx, cl, opts) case cloudprovider.OpenStack: infraState, err = c.createOpenStack(ctx, cl, opts) case cloudprovider.QEMU: if runtime.GOARCH != "amd64" || runtime.GOOS != "linux" { return state.Infrastructure{}, fmt.Errorf("creation of a QEMU based Constellation is not supported for %s/%s", runtime.GOOS, runtime.GOARCH) } lv := c.newLibvirtRunner() qemuOpts := qemuCreateOptions{ source: image, CreateOptions: opts, } infraState, err = c.createQEMU(ctx, cl, lv, qemuOpts) default: return state.Infrastructure{}, fmt.Errorf("unsupported cloud provider: %s", opts.Provider) } if err != nil { return state.Infrastructure{}, fmt.Errorf("creating cluster: %w", err) } return infraState, nil } func (c *Creator) createAWS(ctx context.Context, cl tfResourceClient, opts CreateOptions) (tfOutput state.Infrastructure, retErr error) { vars := awsTerraformVars(opts.Config, opts.image) tfOutput, err := runTerraformCreate(ctx, cl, cloudprovider.AWS, vars, c.out, opts.TFLogLevel) if err != nil { return state.Infrastructure{}, err } return tfOutput, nil } func (c *Creator) createGCP(ctx context.Context, cl tfResourceClient, opts CreateOptions) (tfOutput state.Infrastructure, retErr error) { vars := gcpTerraformVars(opts.Config, opts.image) tfOutput, err := runTerraformCreate(ctx, cl, cloudprovider.GCP, vars, c.out, opts.TFLogLevel) if err != nil { return state.Infrastructure{}, err } return tfOutput, nil } func (c *Creator) createAzure(ctx context.Context, cl tfResourceClient, opts CreateOptions) (tfOutput state.Infrastructure, retErr error) { vars := azureTerraformVars(opts.Config, opts.image) tfOutput, err := runTerraformCreate(ctx, cl, cloudprovider.Azure, vars, c.out, opts.TFLogLevel) if err != nil { return state.Infrastructure{}, err } if vars.GetCreateMAA() { // Patch the attestation policy to allow the cluster to boot while having secure boot disabled. if tfOutput.Azure == nil { return state.Infrastructure{}, errors.New("no Terraform Azure output found") } if err := c.policyPatcher.Patch(ctx, tfOutput.Azure.AttestationURL); err != nil { return state.Infrastructure{}, err } } return tfOutput, nil } // policyPatcher interacts with the CSP (currently only applies for Azure) to update the attestation policy. type policyPatcher interface { Patch(ctx context.Context, attestationURL string) error } // The azurerm Terraform provider enforces its own convention of case sensitivity for Azure URIs which Azure's API itself does not enforce or, even worse, actually returns. // Let's go loco with case insensitive Regexp here and fix the user input here to be compliant with this arbitrary design decision. var ( caseInsensitiveSubscriptionsRegexp = regexp.MustCompile(`(?i)\/subscriptions\/`) caseInsensitiveResourceGroupRegexp = regexp.MustCompile(`(?i)\/resourcegroups\/`) caseInsensitiveProvidersRegexp = regexp.MustCompile(`(?i)\/providers\/`) caseInsensitiveUserAssignedIdentitiesRegexp = regexp.MustCompile(`(?i)\/userassignedidentities\/`) caseInsensitiveMicrosoftManagedIdentity = regexp.MustCompile(`(?i)\/microsoft.managedidentity\/`) caseInsensitiveCommunityGalleriesRegexp = regexp.MustCompile(`(?i)\/communitygalleries\/`) caseInsensitiveImagesRegExp = regexp.MustCompile(`(?i)\/images\/`) caseInsensitiveVersionsRegExp = regexp.MustCompile(`(?i)\/versions\/`) ) func normalizeAzureURIs(vars *terraform.AzureClusterVariables) *terraform.AzureClusterVariables { vars.UserAssignedIdentity = caseInsensitiveSubscriptionsRegexp.ReplaceAllString(vars.UserAssignedIdentity, "/subscriptions/") vars.UserAssignedIdentity = caseInsensitiveResourceGroupRegexp.ReplaceAllString(vars.UserAssignedIdentity, "/resourceGroups/") vars.UserAssignedIdentity = caseInsensitiveProvidersRegexp.ReplaceAllString(vars.UserAssignedIdentity, "/providers/") vars.UserAssignedIdentity = caseInsensitiveUserAssignedIdentitiesRegexp.ReplaceAllString(vars.UserAssignedIdentity, "/userAssignedIdentities/") vars.UserAssignedIdentity = caseInsensitiveMicrosoftManagedIdentity.ReplaceAllString(vars.UserAssignedIdentity, "/Microsoft.ManagedIdentity/") vars.ImageID = caseInsensitiveCommunityGalleriesRegexp.ReplaceAllString(vars.ImageID, "/communityGalleries/") vars.ImageID = caseInsensitiveImagesRegExp.ReplaceAllString(vars.ImageID, "/images/") vars.ImageID = caseInsensitiveVersionsRegExp.ReplaceAllString(vars.ImageID, "/versions/") return vars } func (c *Creator) createOpenStack(ctx context.Context, cl tfResourceClient, opts CreateOptions) (infraState state.Infrastructure, retErr error) { if os.Getenv("CONSTELLATION_OPENSTACK_DEV") != "1" { return state.Infrastructure{}, errors.New("Constellation must be fine-tuned to your OpenStack deployment. Please create an issue or contact Edgeless Systems at https://edgeless.systems/contact/") } if _, hasOSAuthURL := os.LookupEnv("OS_AUTH_URL"); !hasOSAuthURL && opts.Config.Provider.OpenStack.Cloud == "" { return state.Infrastructure{}, errors.New( "neither environment variable OS_AUTH_URL nor cloud name for \"clouds.yaml\" is set. OpenStack authentication requires a set of " + "OS_* environment variables that are typically sourced into the current shell with an openrc file " + "or a cloud name for \"clouds.yaml\". " + "See https://docs.openstack.org/openstacksdk/latest/user/config/configuration.html for more information", ) } vars := openStackTerraformVars(opts.Config, opts.image) infraState, err := runTerraformCreate(ctx, cl, cloudprovider.OpenStack, vars, c.out, opts.TFLogLevel) if err != nil { return state.Infrastructure{}, err } return infraState, nil } func runTerraformCreate(ctx context.Context, cl tfResourceClient, provider cloudprovider.Provider, vars terraform.Variables, outWriter io.Writer, loglevel terraform.LogLevel) (output state.Infrastructure, retErr error) { if err := cl.PrepareWorkspace(path.Join(constants.TerraformEmbeddedDir, strings.ToLower(provider.String())), vars); err != nil { return state.Infrastructure{}, err } defer rollbackOnError(outWriter, &retErr, &rollbackerTerraform{client: cl}, loglevel) tfOutput, err := cl.ApplyCluster(ctx, provider, loglevel) if err != nil { return state.Infrastructure{}, err } return tfOutput, nil } type qemuCreateOptions struct { source string CreateOptions } func (c *Creator) createQEMU(ctx context.Context, cl tfResourceClient, lv libvirtRunner, opts qemuCreateOptions) (tfOutput state.Infrastructure, retErr error) { qemuRollbacker := &rollbackerQEMU{client: cl, libvirt: lv} defer rollbackOnError(c.out, &retErr, qemuRollbacker, opts.TFLogLevel) // TODO(malt3): render progress bar downloader := c.newRawDownloader() imagePath, err := downloader.Download(ctx, c.out, false, opts.source, opts.Config.Image) if err != nil { return state.Infrastructure{}, fmt.Errorf("download raw image: %w", err) } libvirtURI := opts.Config.Provider.QEMU.LibvirtURI libvirtSocketPath := "." switch { // if no libvirt URI is specified, start a libvirt container case libvirtURI == "": if err := lv.Start(ctx, opts.Config.Name, opts.Config.Provider.QEMU.LibvirtContainerImage); err != nil { return state.Infrastructure{}, fmt.Errorf("start libvirt container: %w", err) } libvirtURI = libvirt.LibvirtTCPConnectURI // socket for system URI should be in /var/run/libvirt/libvirt-sock case libvirtURI == "qemu:///system": libvirtSocketPath = "/var/run/libvirt/libvirt-sock" // socket for session URI should be in /run/user//libvirt/libvirt-sock case libvirtURI == "qemu:///session": libvirtSocketPath = fmt.Sprintf("/run/user/%d/libvirt/libvirt-sock", os.Getuid()) // if a unix socket is specified we need to parse the URI to get the socket path case strings.HasPrefix(libvirtURI, "qemu+unix://"): unixURI, err := url.Parse(strings.TrimPrefix(libvirtURI, "qemu+unix://")) if err != nil { return state.Infrastructure{}, err } libvirtSocketPath = unixURI.Query().Get("socket") if libvirtSocketPath == "" { return state.Infrastructure{}, fmt.Errorf("socket path not specified in qemu+unix URI: %s", libvirtURI) } } metadataLibvirtURI := libvirtURI if libvirtSocketPath != "." { metadataLibvirtURI = "qemu:///system" } vars := qemuTerraformVars(opts.Config, imagePath, libvirtURI, libvirtSocketPath, metadataLibvirtURI) if opts.Config.Provider.QEMU.Firmware != "" { vars.Firmware = toPtr(opts.Config.Provider.QEMU.Firmware) } if err := cl.PrepareWorkspace(path.Join(constants.TerraformEmbeddedDir, strings.ToLower(cloudprovider.QEMU.String())), vars); err != nil { return state.Infrastructure{}, fmt.Errorf("prepare workspace: %w", err) } tfOutput, err = cl.ApplyCluster(ctx, opts.Provider, opts.TFLogLevel) if err != nil { return state.Infrastructure{}, fmt.Errorf("create cluster: %w", err) } return tfOutput, nil } func toPtr[T any](v T) *T { return &v }