k3s/pkg/server/server.go

360 lines
9.0 KiB
Go
Raw Normal View History

2019-01-01 08:23:01 +00:00
package server
import (
"context"
"crypto/sha256"
"encoding/hex"
"fmt"
"io/ioutil"
2019-01-09 16:54:15 +00:00
net2 "net"
2019-01-01 08:23:01 +00:00
"os"
"path/filepath"
2019-01-22 21:14:58 +00:00
"strconv"
2019-05-03 00:55:05 +00:00
"strings"
2019-01-01 08:23:01 +00:00
"github.com/pkg/errors"
2019-05-09 22:05:51 +00:00
"github.com/rancher/dynamiclistener"
"github.com/rancher/helm-controller/pkg/helm"
2019-05-09 22:05:51 +00:00
"github.com/rancher/k3s/pkg/clientaccess"
2019-01-09 16:54:15 +00:00
"github.com/rancher/k3s/pkg/daemons/config"
"github.com/rancher/k3s/pkg/daemons/control"
"github.com/rancher/k3s/pkg/datadir"
2019-01-22 21:14:58 +00:00
"github.com/rancher/k3s/pkg/deploy"
2019-04-16 23:42:23 +00:00
"github.com/rancher/k3s/pkg/node"
2019-03-08 22:47:44 +00:00
"github.com/rancher/k3s/pkg/rootlessports"
2019-02-02 05:09:11 +00:00
"github.com/rancher/k3s/pkg/servicelb"
"github.com/rancher/k3s/pkg/static"
2019-01-09 16:54:15 +00:00
"github.com/rancher/k3s/pkg/tls"
2019-05-09 22:05:51 +00:00
"github.com/rancher/wrangler/pkg/leader"
"github.com/rancher/wrangler/pkg/resolvehome"
2019-01-01 08:23:01 +00:00
"github.com/sirupsen/logrus"
"k8s.io/apimachinery/pkg/util/net"
)
func resolveDataDir(dataDir string) (string, error) {
2019-03-08 22:47:44 +00:00
dataDir, err := datadir.Resolve(dataDir)
return filepath.Join(dataDir, "server"), err
2019-01-01 08:23:01 +00:00
}
2019-01-09 16:54:15 +00:00
func StartServer(ctx context.Context, config *Config) (string, error) {
2019-01-01 08:23:01 +00:00
if err := setupDataDirAndChdir(&config.ControlConfig); err != nil {
2019-01-09 16:54:15 +00:00
return "", err
2019-01-01 08:23:01 +00:00
}
2019-05-03 00:55:05 +00:00
if err := setNoProxyEnv(&config.ControlConfig); err != nil {
return "", err
}
2019-01-01 08:23:01 +00:00
if err := control.Server(ctx, &config.ControlConfig); err != nil {
2019-01-09 16:54:15 +00:00
return "", errors.Wrap(err, "starting kubernetes")
2019-01-01 08:23:01 +00:00
}
2019-05-09 22:05:51 +00:00
certs, err := startWrangler(ctx, config)
2019-01-01 08:23:01 +00:00
if err != nil {
2019-01-09 16:54:15 +00:00
return "", errors.Wrap(err, "starting tls server")
2019-01-01 08:23:01 +00:00
}
2019-03-31 00:10:23 +00:00
ip := net2.ParseIP(config.TLSConfig.BindAddress)
if ip == nil {
ip, err = net.ChooseHostInterface()
if err != nil {
ip = net2.ParseIP("127.0.0.1")
}
2019-01-09 16:54:15 +00:00
}
printTokens(certs, ip.String(), &config.TLSConfig, &config.ControlConfig)
2019-01-01 08:23:01 +00:00
2019-03-08 22:47:44 +00:00
writeKubeConfig(certs, &config.TLSConfig, config)
2019-01-01 08:23:01 +00:00
2019-01-09 16:54:15 +00:00
return certs, nil
2019-01-01 08:23:01 +00:00
}
2019-05-09 22:05:51 +00:00
func startWrangler(ctx context.Context, config *Config) (string, error) {
2019-01-01 08:23:01 +00:00
var (
2019-02-02 05:09:11 +00:00
err error
tlsConfig = &config.TLSConfig
controlConfig = &config.ControlConfig
2019-01-01 08:23:01 +00:00
)
2019-05-29 18:53:51 +00:00
caBytes, err := ioutil.ReadFile(controlConfig.Runtime.ServerCA)
if err != nil {
return "", err
}
caKeyBytes, err := ioutil.ReadFile(controlConfig.Runtime.ServerCAKey)
if err != nil {
return "", err
}
certs := string(caBytes)
tlsConfig.CACerts = certs
2019-05-29 18:53:51 +00:00
tlsConfig.CAKey = string(caKeyBytes)
2019-02-02 05:09:11 +00:00
tlsConfig.Handler = router(controlConfig, controlConfig.Runtime.Tunnel, func() (string, error) {
return certs, nil
2019-01-01 08:23:01 +00:00
})
2019-05-29 18:53:51 +00:00
sc, err := newContext(ctx, controlConfig.Runtime.KubeConfigAdmin)
2019-05-09 22:05:51 +00:00
if err != nil {
return "", err
}
if err := stageFiles(ctx, sc, controlConfig); err != nil {
return "", err
}
_, err = tls.NewServer(ctx, sc.K3s.K3s().V1().ListenerConfig(), *tlsConfig)
2019-05-09 22:05:51 +00:00
if err != nil {
return "", err
}
if err := sc.Start(ctx); err != nil {
2019-01-01 08:23:01 +00:00
return "", err
}
start := func(ctx context.Context) {
2019-05-09 22:05:51 +00:00
if err := masterControllers(ctx, sc, config); err != nil {
panic(err)
}
if err := sc.Start(ctx); err != nil {
panic(err)
}
}
if controlConfig.NoLeaderElect {
go func() {
start(ctx)
<-ctx.Done()
logrus.Fatal("controllers exited")
}()
} else {
go leader.RunOrDie(ctx, "", "k3s", sc.K8s, start)
}
2019-05-09 22:05:51 +00:00
return certs, nil
}
func masterControllers(ctx context.Context, sc *Context, config *Config) error {
if err := node.Register(ctx, sc.Core.Core().V1().ConfigMap(), sc.Core.Core().V1().Node()); err != nil {
return err
}
helm.Register(ctx, sc.Apply,
sc.Helm.Helm().V1().HelmChart(),
sc.Batch.Batch().V1().Job(),
sc.Auth.Rbac().V1().ClusterRoleBinding(),
sc.Core.Core().V1().ServiceAccount(),
sc.Core.Core().V1().ConfigMap())
2019-05-09 22:05:51 +00:00
if err := servicelb.Register(ctx,
sc.K8s,
sc.Apply,
sc.Apps.Apps().V1().DaemonSet(),
sc.Apps.Apps().V1().Deployment(),
sc.Core.Core().V1().Node(),
sc.Core.Core().V1().Pod(),
sc.Core.Core().V1().Service(),
sc.Core.Core().V1().Endpoints(),
!config.DisableServiceLB, config.Rootless); err != nil {
return err
}
if !config.DisableServiceLB && config.Rootless {
return rootlessports.Register(ctx, sc.Core.Core().V1().Service(), config.TLSConfig.HTTPSPort)
}
return nil
}
func stageFiles(ctx context.Context, sc *Context, controlConfig *config.Control) error {
dataDir := filepath.Join(controlConfig.DataDir, "static")
if err := static.Stage(dataDir); err != nil {
return err
}
dataDir = filepath.Join(controlConfig.DataDir, "manifests")
templateVars := map[string]string{
"%{CLUSTER_DNS}%": controlConfig.ClusterDNS.String(),
"%{CLUSTER_DOMAIN}%": controlConfig.ClusterDomain,
}
if err := deploy.Stage(dataDir, templateVars, controlConfig.Skips); err != nil {
return err
}
return deploy.WatchFiles(ctx, sc.Apply, sc.K3s.K3s().V1().Addon(), dataDir)
2019-01-01 08:23:01 +00:00
}
2019-03-08 22:47:44 +00:00
func HomeKubeConfig(write, rootless bool) (string, error) {
if write {
2019-03-08 22:47:44 +00:00
if os.Getuid() == 0 && !rootless {
return datadir.GlobalConfig, nil
}
return resolvehome.Resolve(datadir.HomeConfig)
}
if _, err := os.Stat(datadir.GlobalConfig); err == nil {
return datadir.GlobalConfig, nil
}
return resolvehome.Resolve(datadir.HomeConfig)
2019-01-01 08:23:01 +00:00
}
func printTokens(certs, advertiseIP string, tlsConfig *dynamiclistener.UserConfig, config *config.Control) {
var (
nodeFile string
)
if advertiseIP == "" {
2019-08-22 18:56:00 +00:00
advertiseIP = "127.0.0.1"
2019-01-01 08:23:01 +00:00
}
if len(config.Runtime.NodeToken) > 0 {
p := filepath.Join(config.DataDir, "node-token")
if err := writeToken(config.Runtime.NodeToken, p, certs); err == nil {
logrus.Infof("Node token is available at %s", p)
nodeFile = p
}
}
if len(nodeFile) > 0 {
2019-01-22 21:14:58 +00:00
printToken(tlsConfig.HTTPSPort, advertiseIP, "To join node to cluster:", "agent")
2019-01-01 08:23:01 +00:00
}
}
2019-03-08 22:47:44 +00:00
func writeKubeConfig(certs string, tlsConfig *dynamiclistener.UserConfig, config *Config) {
clientToken := FormatToken(config.ControlConfig.Runtime.ClientToken, certs)
2019-03-31 00:10:23 +00:00
ip := tlsConfig.BindAddress
if ip == "" {
2019-08-22 18:56:00 +00:00
ip = "127.0.0.1"
2019-03-31 00:10:23 +00:00
}
url := fmt.Sprintf("https://%s:%d", ip, tlsConfig.HTTPSPort)
2019-03-08 22:47:44 +00:00
kubeConfig, err := HomeKubeConfig(true, config.Rootless)
2019-01-01 08:23:01 +00:00
def := true
if err != nil {
2019-03-08 22:47:44 +00:00
kubeConfig = filepath.Join(config.ControlConfig.DataDir, "kubeconfig-k3s.yaml")
2019-01-01 08:23:01 +00:00
def = false
}
kubeConfigSymlink := kubeConfig
2019-03-08 22:47:44 +00:00
if config.ControlConfig.KubeConfigOutput != "" {
kubeConfig = config.ControlConfig.KubeConfigOutput
2019-01-22 21:14:58 +00:00
}
if isSymlink(kubeConfigSymlink) {
if err := os.Remove(kubeConfigSymlink); err != nil {
logrus.Errorf("failed to remove kubeconfig symlink")
}
}
2019-01-01 08:23:01 +00:00
if err = clientaccess.AgentAccessInfoToKubeConfig(kubeConfig, url, clientToken); err != nil {
logrus.Errorf("Failed to generate kubeconfig: %v", err)
}
2019-03-08 22:47:44 +00:00
if config.ControlConfig.KubeConfigMode != "" {
mode, err := strconv.ParseInt(config.ControlConfig.KubeConfigMode, 8, 0)
2019-01-22 21:14:58 +00:00
if err == nil {
os.Chmod(kubeConfig, os.FileMode(mode))
} else {
2019-01-24 17:51:24 +00:00
logrus.Errorf("failed to set %s to mode %s: %v", kubeConfig, os.FileMode(mode), err)
2019-01-22 21:14:58 +00:00
}
} else {
os.Chmod(kubeConfig, os.FileMode(0600))
2019-01-22 21:14:58 +00:00
}
if kubeConfigSymlink != kubeConfig {
if err := writeConfigSymlink(kubeConfig, kubeConfigSymlink); err != nil {
logrus.Errorf("failed to write kubeconfig symlink: %v", err)
}
}
2019-01-01 08:23:01 +00:00
logrus.Infof("Wrote kubeconfig %s", kubeConfig)
if def {
logrus.Infof("Run: %s kubectl", filepath.Base(os.Args[0]))
}
}
func setupDataDirAndChdir(config *config.Control) error {
var (
err error
)
config.DataDir, err = resolveDataDir(config.DataDir)
if err != nil {
return err
}
dataDir := config.DataDir
if err := os.MkdirAll(dataDir, 0700); err != nil {
return errors.Wrapf(err, "can not mkdir %s", dataDir)
}
if err := os.Chdir(dataDir); err != nil {
return errors.Wrapf(err, "can not chdir %s", dataDir)
}
return nil
}
2019-01-22 21:14:58 +00:00
func printToken(httpsPort int, advertiseIP, prefix, cmd string) {
2019-01-01 08:23:01 +00:00
ip := advertiseIP
if ip == "" {
hostIP, err := net.ChooseHostInterface()
if err != nil {
logrus.Error(err)
}
ip = hostIP.String()
}
2019-01-22 21:14:58 +00:00
logrus.Infof("%s k3s %s -s https://%s:%d -t ${NODE_TOKEN}", prefix, cmd, ip, httpsPort)
2019-01-01 08:23:01 +00:00
}
func FormatToken(token string, certs string) string {
if len(token) == 0 {
return token
}
prefix := "K10"
if len(certs) > 0 {
digest := sha256.Sum256([]byte(certs))
prefix = "K10" + hex.EncodeToString(digest[:]) + "::"
}
return prefix + token
}
func writeToken(token, file, certs string) error {
if len(token) == 0 {
return nil
}
token = FormatToken(token, certs)
return ioutil.WriteFile(file, []byte(token+"\n"), 0600)
}
2019-05-03 00:55:05 +00:00
func setNoProxyEnv(config *config.Control) error {
envList := strings.Join([]string{
os.Getenv("NO_PROXY"),
config.ClusterIPRange.String(),
config.ServiceIPRange.String(),
}, ",")
return os.Setenv("NO_PROXY", envList)
}
func writeConfigSymlink(kubeconfig, kubeconfigSymlink string) error {
if err := os.Remove(kubeconfigSymlink); err != nil && !os.IsNotExist(err) {
return fmt.Errorf("failed to remove %s file: %v", kubeconfigSymlink, err)
}
if err := os.MkdirAll(filepath.Dir(kubeconfigSymlink), 0755); err != nil {
return fmt.Errorf("failed to create path for symlink: %v", err)
}
if err := os.Symlink(kubeconfig, kubeconfigSymlink); err != nil {
return fmt.Errorf("failed to create symlink: %v", err)
}
return nil
}
func isSymlink(config string) bool {
if fi, err := os.Lstat(config); err == nil && (fi.Mode()&os.ModeSymlink == os.ModeSymlink) {
return true
}
return false
}