blob: 0adef40307e6bcf2eaaee6db4b63731ce635df39 [file] [log] [blame]
Sergiusz Bazanski73cef112019-04-07 00:06:23 +02001#!/usr/bin/env python
2
3from builtins import object
4
5import datetime
6from io import BytesIO
7import json
8import logging
9import os
10import tempfile
11import subprocess
12import sys
13
14from cryptography import x509
15from cryptography.hazmat.backends import default_backend
16import fabric
17
18from tools import secretstore
19
20import ca
21
22
23local_root = os.getenv('hscloud_root')
24if local_root is None:
25 raise Exception("Please source env.sh")
26
27
28cluster = 'k0.hswaw.net'
Sergiusz Bazanski73cef112019-04-07 00:06:23 +020029ss = secretstore.SecretStore(
30 plain_root=os.path.join(local_root, 'cluster/secrets/plain'),
31 cipher_root=os.path.join(local_root, 'cluster/secrets/cipher'))
32
33
34logger = logging.getLogger()
35logger.setLevel(logging.INFO)
36formatter = logging.Formatter('%(levelname)s - %(message)s')
37sh = logging.StreamHandler()
38sh.setFormatter(formatter)
39logger.addHandler(sh)
40
41
42
Sergiusz Bazanskic78cc132020-02-02 22:31:53 +010043def pki_config(key, fqdn):
44 machine_name = fqdn.split('.')[0]
Sergiusz Bazanski73cef112019-04-07 00:06:23 +020045 raw = subprocess.check_output([
46 'nix', 'eval', '--raw',
Sergiusz Bazanskic78cc132020-02-02 22:31:53 +010047 '( ((import ' + local_root + '/cluster/nix/defs-cluster-k0.nix ) "' + machine_name + '").pki.' + key + '.json )',
Sergiusz Bazanski73cef112019-04-07 00:06:23 +020048 ])
49 return json.loads(raw)
50
51
52def _file_exists(c, filename):
53 res = c.run('stat "{}"'.format(filename), warn=True, hide=True)
54 return res.exited == 0
55
56
57def configure_k8s(username, ca, cert, key):
58 subprocess.check_call([
59 'kubectl', 'config',
Sergiusz Bazanskib13b7ff2019-08-29 20:12:24 +020060 'set-cluster', 'admin.' + cluster,
Sergiusz Bazanski73cef112019-04-07 00:06:23 +020061 '--certificate-authority=' + ca,
62 '--embed-certs=true',
63 '--server=https://' + cluster + ':4001',
64 ])
65 subprocess.check_call([
66 'kubectl', 'config',
67 'set-credentials', username,
68 '--client-certificate=' + cert,
69 '--client-key=' + key,
70 '--embed-certs=true',
71 ])
72 subprocess.check_call([
73 'kubectl', 'config',
Sergiusz Bazanskib13b7ff2019-08-29 20:12:24 +020074 'set-context', 'admin.' + cluster,
75 '--cluster=' + 'admin.' + cluster,
Sergiusz Bazanski73cef112019-04-07 00:06:23 +020076 '--user=' + username,
77 ])
78 subprocess.check_call([
79 'kubectl', 'config',
Sergiusz Bazanskib13b7ff2019-08-29 20:12:24 +020080 'use-context', 'admin.' + cluster,
Sergiusz Bazanski73cef112019-04-07 00:06:23 +020081 ])
82
83
84def admincreds(args):
85 if len(args) != 1:
86 sys.stderr.write("Usage: admincreds q3k\n")
87 return 1
88 username = args[0]
Sergiusz Bazanskib13b7ff2019-08-29 20:12:24 +020089 print("")
90 print("WARNING WARNING WARNING WARNING WARNING WARNING")
91 print("===============================================")
92 print("")
93 print("You are requesting ADMIN credentials.")
94 print("")
95 print("You likely shouldn't be doing this, and")
96 print("instead should be using `prodaccess`.")
97 print("")
98 print("===============================================")
99 print("WARNING WARNING WARNING WARNING WARNING WARNING")
100 print("")
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200101
102 ## Make kube certificates.
103 certs_root = os.path.join(local_root, 'cluster/certs')
104 ca_kube = ca.CA(ss, certs_root, 'kube', 'kubernetes main CA')
105
106 local_key = os.path.join(local_root, '.kubectl/admin.key')
107 local_crt = os.path.join(local_root, '.kubectl/admin.crt')
108
109 kubectl = os.path.join(local_root, '.kubectl')
110 if not os.path.exists(kubectl):
111 os.mkdir(kubectl)
112
113 generate_cert = False
114 if not os.path.exists(local_key):
115 generate_cert = True
116
117 if os.path.exists(local_crt):
118 with open(local_crt, 'rb') as f:
119 b = f.read()
120 cert = x509.load_pem_x509_certificate(b, default_backend())
121 delta = cert.not_valid_after - datetime.datetime.now()
122 logger.info("admin: existing cert expiry: {}".format(delta))
123 if delta.total_seconds() < 3600 * 24:
124 logger.info("admin: expires soon, regenerating")
125 generate_cert = True
126 else:
127 generate_cert = True
128
129 if not generate_cert:
130 return configure_k8s(username, ca_kube._cert, local_crt, local_key)
131
132 key, csr = ca_kube.gen_key(hosts=['admin', username], o='system:masters', ou='Kube Admin Account')
133 crt = ca_kube.sign(csr)
134
135 with open(local_key, 'w') as f:
136 f.write(key)
137
138 with open(local_crt, 'w') as f:
139 f.write(crt)
140
141 configure_k8s(username, ca_kube._cert, local_crt, local_key)
142
143
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200144def nodestrap(args, nocerts=False):
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200145 if len(args) != 1:
146 sys.stderr.write("Usage: nodestrap bc01n01.hswaw.net\n")
147 return 1
148 fqdn = args[0]
149
150 logger.info("Nodestrapping {}...".format(fqdn))
151 r = fabric.Connection('root@{}'.format(fqdn))
152
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200153 if not nocerts:
Sergiusz Bazanskic78cc132020-02-02 22:31:53 +0100154 cfg = dict((k, pki_config(k, fqdn)) for k in [
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200155 'etcdPeer', 'etcd.server', 'etcd.kube'
156 ])
157 certs_root = os.path.join(local_root, 'cluster/certs')
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200158
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200159 # Make etcd peer certificate for node.
160 ca_etcd_peer = ca.CA(ss, certs_root, 'etcdpeer', 'etcd peer ca')
Sergiusz Bazanskic78cc132020-02-02 22:31:53 +0100161 ca_etcd_peer.make_cert('etcdpeer-{}'.format(fqdn), hosts=[fqdn], ou='node etcd peer certificate')
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200162
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200163 # Make etcd server certificate for node and client certificate for kube.
164 ca_etcd = ca.CA(ss, certs_root, 'etcd', 'etcd ca')
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200165
Sergiusz Bazanskic78cc132020-02-02 22:31:53 +0100166 ca_etcd.make_cert('etcd-{}'.format(fqdn), hosts=[fqdn], ou='node etcd server certificate')
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200167
Sergiusz Bazanskic78cc132020-02-02 22:31:53 +0100168 ca_etcd.make_cert('etcd-kube', hosts=['kube'], ou='kube etcd client certificate')
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200169
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200170 ca_etcd.make_cert('etcd-root', hosts=['root'], ou='root etcd client certificate')
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200171
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200172 ca_etcd.make_cert('etcd-calico', hosts=['calico'], ou='root etcd client certificate')
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200173
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200174 ## Make kube certificates.
175 ca_kube = ca.CA(ss, certs_root, 'kube', 'kubernetes main CA')
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200176
Sergiusz Bazanskib13b7ff2019-08-29 20:12:24 +0200177 # Make prodvider intermediate CA.
Sergiusz Bazanski0dcc7022020-03-28 17:58:19 +0100178 ca_kube.make_cert('ca-kube-prodvider', o='Warsaw Hackerspace', ou='kubernetes prodvider intermediate', hosts=['kubernetes prodvider intermediate CA'], profile='intermediate').ensure()
Sergiusz Bazanskib13b7ff2019-08-29 20:12:24 +0200179
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200180 # Make kubelet certificate (per node).
Sergiusz Bazanskic78cc132020-02-02 22:31:53 +0100181 ca_kube.make_cert('kube-kubelet-'+fqdn, o='system:nodes', ou='Kubelet', hosts=['system:node:'+fqdn, fqdn])
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200182
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200183 # Make apiserver certificate.
Sergiusz Bazanskic78cc132020-02-02 22:31:53 +0100184 ca_kube.make_cert('kube-apiserver', ou='Kubernetes API', hosts=[cluster, 'kubernetes.default.svc.'+cluster, '10.10.12.1'])
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200185
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200186 # Make service accounts decryption key (as cert for consistency).
Sergiusz Bazanskic78cc132020-02-02 22:31:53 +0100187 ca_kube.make_cert('kube-serviceaccounts', ou='Kubernetes Service Accounts Signer', hosts=['serviceaccounts'])
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200188
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200189 # Make kube component certificates.
190 kube_components = ['controllermanager', 'scheduler', 'proxy']
Sergiusz Bazanskic78cc132020-02-02 22:31:53 +0100191 cfg = dict((k, pki_config('kube.' + k, fqdn)) for k in kube_components)
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200192 for k in kube_components:
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200193 # meh
194 if k == 'controllermanager':
195 o = 'system:kube-controller-manager'
196 else:
197 o = 'system:kube-'+k
198 ou = 'Kubernetes Component '+k
199 c = ca_kube.make_cert('kube-'+k, ou=ou, o=o, hosts=[o,])
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200200
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200201 ## Make kubefront certificates.
202 ca_kubefront = ca.CA(ss, certs_root, 'kubefront', 'kubernetes frontend CA')
Sergiusz Bazanskic78cc132020-02-02 22:31:53 +0100203 ca_kubefront.make_cert('kubefront-apiserver', ou='Kubernetes Frontend', hosts=['apiserver'])
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200204
Serge Bazanski04604b22021-02-06 14:57:20 +0000205 ## Make admitomatic (admission controller) certificates.
206 ca_admitomatic = ca.CA(ss, certs_root, 'admitomatic', 'admitomatic webhook CA')
207 ca_admitomatic.make_cert('admitomatic-webhook', ou='Admitomatic Webhook', hosts=['admitomatic.admitomatic.svc'])
208
Sergiusz Bazanskic78cc132020-02-02 22:31:53 +0100209 subprocess.check_call(["nix", "run",
Serge Bazanski48427052021-02-14 09:50:24 +0000210 "-f", local_root,
211 "cluster.nix.provision",
Serge Bazanski36224c62020-10-10 14:54:09 +0200212 "-c", "provision-{}".format(fqdn.split('.')[0])])
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200213
214
215def usage():
Sergiusz Bazanskic78cc132020-02-02 22:31:53 +0100216 sys.stderr.write("Usage: clustercfg <nodestrap|admincreds>\n")
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200217
218
219def main():
220 if len(sys.argv) < 2:
221 usage()
222 return 1
223
224 mode = sys.argv[1]
225 if mode == "nodestrap":
226 return nodestrap(sys.argv[2:])
Sergiusz Bazanskic0fc3ee2019-06-20 16:11:38 +0200227 elif mode == "nodestrap-nocerts":
228 return nodestrap(sys.argv[2:], nocerts=True)
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200229 elif mode == "admincreds":
230 return admincreds(sys.argv[2:])
Serge Bazanskie7fca3a2020-09-25 20:23:53 +0000231 elif mode == "smoketest":
232 sys.stdout.write("Smoke test passed.")
233 return 0
Sergiusz Bazanski73cef112019-04-07 00:06:23 +0200234 else:
235 usage()
236 return 1
237
238if __name__ == '__main__':
239 sys.exit(main() or 0)