mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-10-01 01:36:09 -04:00
90b88e1cf9
In the light of extending our eKMS support it will be helpful to have a tighter use of the word "KMS". KMS should refer to the actual component that manages keys. The keyservice, also called KMS in the constellation code, does not manage keys itself. It talks to a KMS backend, which in turn does the actual key management.
155 lines
5.0 KiB
Go
155 lines
5.0 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
package main
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"flag"
|
|
"net"
|
|
"path/filepath"
|
|
"strconv"
|
|
"time"
|
|
|
|
"github.com/edgelesssys/constellation/v2/internal/atls"
|
|
awscloud "github.com/edgelesssys/constellation/v2/internal/cloud/aws"
|
|
azurecloud "github.com/edgelesssys/constellation/v2/internal/cloud/azure"
|
|
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
|
|
gcpcloud "github.com/edgelesssys/constellation/v2/internal/cloud/gcp"
|
|
"github.com/edgelesssys/constellation/v2/internal/cloud/metadata"
|
|
qemucloud "github.com/edgelesssys/constellation/v2/internal/cloud/qemu"
|
|
"github.com/edgelesssys/constellation/v2/internal/constants"
|
|
"github.com/edgelesssys/constellation/v2/internal/file"
|
|
"github.com/edgelesssys/constellation/v2/internal/grpc/atlscredentials"
|
|
"github.com/edgelesssys/constellation/v2/internal/logger"
|
|
"github.com/edgelesssys/constellation/v2/internal/watcher"
|
|
"github.com/edgelesssys/constellation/v2/joinservice/internal/kms"
|
|
"github.com/edgelesssys/constellation/v2/joinservice/internal/kubeadm"
|
|
"github.com/edgelesssys/constellation/v2/joinservice/internal/kubernetesca"
|
|
"github.com/edgelesssys/constellation/v2/joinservice/internal/server"
|
|
"github.com/spf13/afero"
|
|
"go.uber.org/zap"
|
|
)
|
|
|
|
// vpcIPTimeout is the maximum amount of time to wait for retrieval of the VPC ip.
|
|
const vpcIPTimeout = 30 * time.Second
|
|
|
|
func main() {
|
|
provider := flag.String("cloud-provider", "", "cloud service provider this binary is running on")
|
|
keyserviceEndpoint := flag.String("keyservice-endpoint", "", "endpoint of Constellations key management service")
|
|
verbosity := flag.Int("v", 0, logger.CmdLineVerbosityDescription)
|
|
flag.Parse()
|
|
|
|
log := logger.New(logger.JSONLog, logger.VerbosityFromInt(*verbosity))
|
|
log.With(zap.String("version", constants.VersionInfo), zap.String("cloudProvider", *provider)).
|
|
Infof("Constellation Node Join Service")
|
|
|
|
handler := file.NewHandler(afero.NewOsFs())
|
|
|
|
cvmRaw, err := handler.Read(filepath.Join(constants.ServiceBasePath, constants.AzureCVM))
|
|
if err != nil {
|
|
log.With(zap.Error(err)).Fatalf("Failed to get azureCVM from config map")
|
|
}
|
|
azureCVM, err := strconv.ParseBool(string(cvmRaw))
|
|
if err != nil {
|
|
log.With(zap.Error(err)).Fatalf("Failed to parse content of AzureCVM: %s", cvmRaw)
|
|
}
|
|
|
|
validator, err := watcher.NewValidator(log.Named("validator"), *provider, handler, azureCVM)
|
|
if err != nil {
|
|
flag.Usage()
|
|
log.With(zap.Error(err)).Fatalf("Failed to create validator")
|
|
}
|
|
|
|
creds := atlscredentials.New(nil, []atls.Validator{validator})
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), vpcIPTimeout)
|
|
defer cancel()
|
|
vpcIP, err := getVPCIP(ctx, *provider)
|
|
if err != nil {
|
|
log.With(zap.Error(err)).Fatalf("Failed to get IP in VPC")
|
|
}
|
|
apiServerEndpoint := net.JoinHostPort(vpcIP, strconv.Itoa(constants.KubernetesPort))
|
|
kubeadm, err := kubeadm.New(apiServerEndpoint, log.Named("kubeadm"))
|
|
if err != nil {
|
|
log.With(zap.Error(err)).Fatalf("Failed to create kubeadm")
|
|
}
|
|
keyserviceClient := kms.New(log.Named("keyserviceClient"), *keyserviceEndpoint)
|
|
|
|
measurementSalt, err := handler.Read(filepath.Join(constants.ServiceBasePath, constants.MeasurementSaltFilename))
|
|
if err != nil {
|
|
log.With(zap.Error(err)).Fatalf("Failed to read measurement salt")
|
|
}
|
|
|
|
server, err := server.New(
|
|
measurementSalt,
|
|
kubernetesca.New(log.Named("certificateAuthority"), handler),
|
|
kubeadm,
|
|
keyserviceClient,
|
|
log.Named("server"),
|
|
)
|
|
if err != nil {
|
|
log.With(zap.Error(err)).Fatalf("Failed to create server")
|
|
}
|
|
|
|
watcher, err := watcher.New(log.Named("fileWatcher"), validator)
|
|
if err != nil {
|
|
log.With(zap.Error(err)).Fatalf("Failed to create watcher for measurements updates")
|
|
}
|
|
defer watcher.Close()
|
|
|
|
go func() {
|
|
log.Infof("starting file watcher for measurements file %s", filepath.Join(constants.ServiceBasePath, constants.MeasurementsFilename))
|
|
if err := watcher.Watch(filepath.Join(constants.ServiceBasePath, constants.MeasurementsFilename)); err != nil {
|
|
log.With(zap.Error(err)).Fatalf("Failed to watch measurements file")
|
|
}
|
|
}()
|
|
|
|
if err := server.Run(creds, strconv.Itoa(constants.JoinServicePort)); err != nil {
|
|
log.With(zap.Error(err)).Fatalf("Failed to run server")
|
|
}
|
|
}
|
|
|
|
func getVPCIP(ctx context.Context, provider string) (string, error) {
|
|
var metadata metadataAPI
|
|
var err error
|
|
|
|
switch cloudprovider.FromString(provider) {
|
|
case cloudprovider.AWS:
|
|
metadata, err = awscloud.New(ctx)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
case cloudprovider.Azure:
|
|
metadata, err = azurecloud.New(ctx)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
case cloudprovider.GCP:
|
|
gcpMeta, err := gcpcloud.New(ctx)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
defer gcpMeta.Close()
|
|
metadata = gcpMeta
|
|
case cloudprovider.QEMU:
|
|
metadata = qemucloud.New()
|
|
default:
|
|
return "", errors.New("unsupported cloud provider")
|
|
}
|
|
|
|
self, err := metadata.Self(ctx)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return self.VPCIP, nil
|
|
}
|
|
|
|
type metadataAPI interface {
|
|
Self(ctx context.Context) (metadata.InstanceMetadata, error)
|
|
}
|