aks-engine/cmd/rotate_certs.go

780 строки
28 KiB
Go

// Copyright (c) Microsoft Corporation. All rights reserved.
// Licensed under the MIT license.
package cmd
import (
"context"
"fmt"
"os"
"path"
"path/filepath"
"strings"
"time"
ops "github.com/Azure/aks-engine/cmd/rotatecerts"
"github.com/Azure/aks-engine/pkg/api"
"github.com/Azure/aks-engine/pkg/api/common"
"github.com/Azure/aks-engine/pkg/engine"
"github.com/Azure/aks-engine/pkg/helpers"
"github.com/Azure/aks-engine/pkg/helpers/ssh"
"github.com/Azure/aks-engine/pkg/i18n"
"github.com/Azure/aks-engine/pkg/kubernetes"
"github.com/pkg/errors"
log "github.com/sirupsen/logrus"
"github.com/spf13/cobra"
"golang.org/x/text/cases"
"golang.org/x/text/language"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
)
const (
rotateCertsName = "rotate-certs"
rotateCertsShortDescription = "Rotate certificates on an existing AKS Engine-created Kubernetes cluster"
rotateCertsLongDescription = "Rotate CA, etcd, kubelet, kubeconfig and apiserver certificates in a cluster built with AKS Engine. Rotating certificates can break component connectivity and leave the cluster in an unrecoverable state. Before performing any of these instructions on a live cluster, it is preferrable to backup your cluster state and migrate critical workloads to another cluster."
)
const (
rootUserGroup = "root:root"
etcdUserGroup = "etcd:etcd"
keyPermissions = "600"
crtPermissions = "644"
configPermissions = "600"
kubeAPIServer = "kube-apiserver"
kubeAddonManager = "kube-addon-manager"
kubeControllerManager = "kube-controller-manager"
kubeScheduler = "kube-scheduler"
kubeProxyLabels = "component=kube-proxy,k8s-app=kube-proxy,tier=node"
kubeSchedulerLabels = "component=kube-scheduler,tier=control-plane"
rotateCertsDefaultInterval = 10 * time.Second
rotateCertsDefaultTimeout = 20 * time.Minute
vmasSSHPort = 22
vmssSSHPort = 50001
)
type nodeMap = map[string]*ssh.RemoteHost
type fileMap = map[string]*ssh.RemoteFile
type rotateCertsCmd struct {
authProvider
// user input
resourceGroupName string
location string
apiModelPath string
newCertsPath string
sshHostURI string
linuxSSHPrivateKeyPath string
outputDirectory string
force bool
// computed
backupDirectory string
apiVersion string
cs *api.ContainerService
loader *api.Apiloader
newCertsProfile *api.CertificateProfile
kubeClient *kubernetes.CompositeClientSet
armClient *ops.ARMClientWrapper
nodes nodeMap
generateCerts bool
linuxAuthConfig *ssh.AuthConfig
windowsAuthConfig *ssh.AuthConfig
jumpbox *ssh.JumpBox
sshPort int
}
func newRotateCertsCmd() *cobra.Command {
rcc := rotateCertsCmd{
authProvider: &authArgs{},
generateCerts: true,
}
command := &cobra.Command{
Use: rotateCertsName,
Short: rotateCertsShortDescription,
Long: rotateCertsLongDescription,
RunE: func(cmd *cobra.Command, args []string) error {
if err := rcc.validateArgs(); err != nil {
return errors.Wrap(err, "validating rotate-certs args")
}
if err := rcc.loadAPIModel(); err != nil {
return errors.Wrap(err, "loading API model")
}
if err := rcc.init(); err != nil {
return err
}
cmd.SilenceUsage = true
return rcc.run()
},
}
f := command.Flags()
f.StringVarP(&rcc.location, "location", "l", "", "Azure location where the cluster is deployed")
f.StringVarP(&rcc.resourceGroupName, "resource-group", "g", "", "the resource group where the cluster is deployed")
f.StringVarP(&rcc.apiModelPath, "api-model", "m", "", "path to the generated apimodel.json file")
f.StringVar(&rcc.sshHostURI, "ssh-host", "", "FQDN, or IP address, of an SSH listener that can reach all nodes in the cluster")
f.StringVar(&rcc.linuxSSHPrivateKeyPath, "linux-ssh-private-key", "", "path to a valid private SSH key to access the cluster's Linux nodes")
_ = command.MarkFlagRequired("location")
_ = command.MarkFlagRequired("resource-group")
_ = command.MarkFlagRequired("api-model")
_ = command.MarkFlagRequired("ssh-host")
_ = command.MarkFlagRequired("linux-ssh-private-key")
f.StringVarP(&rcc.newCertsPath, "certificate-profile", "", "", "path to a JSON file containing the new set of certificates")
f.BoolVarP(&rcc.force, "force", "", false, "force execution even if API Server is not responsive")
addAuthFlags(rcc.getAuthArgs(), f)
return command
}
func (rcc *rotateCertsCmd) validateArgs() (err error) {
locale, err := i18n.LoadTranslations()
if err != nil {
return errors.Wrap(err, "loading translation files")
}
rcc.loader = &api.Apiloader{
Translator: &i18n.Translator{
Locale: locale,
},
}
rcc.location = helpers.NormalizeAzureRegion(rcc.location)
if rcc.location == "" {
return errors.New("--location must be specified")
}
if rcc.sshHostURI == "" {
return errors.New("--ssh-host must be specified")
}
if rcc.linuxSSHPrivateKeyPath == "" {
return errors.New("--linux-ssh-private-key must be specified")
} else if _, err = os.Stat(rcc.linuxSSHPrivateKeyPath); os.IsNotExist(err) {
return errors.Errorf("specified --linux-ssh-private-key does not exist (%s)", rcc.linuxSSHPrivateKeyPath)
}
if rcc.apiModelPath == "" {
return errors.New("--api-model must be specified")
} else if _, err = os.Stat(rcc.apiModelPath); os.IsNotExist(err) {
return errors.Errorf("specified --api-model does not exist (%s)", rcc.apiModelPath)
}
if rcc.newCertsPath != "" {
rcc.generateCerts = false
if _, err = os.Stat(rcc.newCertsPath); os.IsNotExist(err) {
return errors.Errorf("specified --certificate-profile does not exist (%s)", rcc.newCertsPath)
}
}
if rcc.outputDirectory == "" {
rcc.outputDirectory = path.Join(filepath.Dir(rcc.apiModelPath), "_rotate_certs_output")
if err = os.MkdirAll(rcc.outputDirectory, 0755); err != nil {
return errors.Errorf("error creating output directory (%s)", rcc.outputDirectory)
}
}
if _, err := os.ReadDir(rcc.outputDirectory); err != nil {
return errors.Wrapf(err, "reading output directory %s", rcc.outputDirectory)
}
return nil
}
func (rcc *rotateCertsCmd) loadAPIModel() (err error) {
if rcc.cs, rcc.apiVersion, err = rcc.loader.LoadContainerServiceFromFile(rcc.apiModelPath, false, false, nil); err != nil {
return errors.Wrap(err, "error parsing api-model")
}
if rcc.newCertsPath != "" {
// TODO validate certificates metadata
if rcc.newCertsProfile, err = rcc.loader.LoadCertificateProfileFromFile(rcc.newCertsPath); err != nil {
return errors.Wrap(err, "error parsing certificate-profile")
}
}
if rcc.cs.Properties.IsCustomCloudProfile() {
if err = writeCustomCloudProfile(rcc.cs); err != nil {
return errors.Wrap(err, "error writing custom cloud profile")
}
if err = rcc.cs.Properties.SetCustomCloudSpec(api.AzureCustomCloudSpecParams{IsUpgrade: false, IsScale: true}); err != nil {
return errors.Wrap(err, "error parsing the api model")
}
}
if rcc.cs.Location == "" {
rcc.cs.Location = rcc.location
} else if rcc.cs.Location != rcc.location {
return errors.New("--location flag does not match api-model location")
}
if rcc.cs.Properties.WindowsProfile != nil && !rcc.cs.Properties.WindowsProfile.GetSSHEnabled() {
return errors.New("SSH not enabled on Windows nodes. SSH is required in order to rotate agent nodes certificates")
}
if err = rcc.getAuthArgs().validateAuthArgs(); err != nil {
return errors.Wrap(err, "failed to get validate auth args")
}
armClient, err := rcc.authProvider.getClient()
if err != nil {
return errors.Wrap(err, "failed to get ARM client")
}
rcc.armClient = ops.NewARMClientWrapper(armClient, rotateCertsDefaultInterval, rotateCertsDefaultTimeout)
return
}
func (rcc *rotateCertsCmd) init() (err error) {
rcc.backupDirectory = path.Join(filepath.Dir(rcc.apiModelPath), "_rotate_certs_backup")
rcc.linuxAuthConfig = &ssh.AuthConfig{
User: rcc.cs.Properties.LinuxProfile.AdminUsername,
PrivateKeyPath: rcc.linuxSSHPrivateKeyPath,
}
if rcc.cs.Properties.WindowsProfile != nil {
rcc.windowsAuthConfig = &ssh.AuthConfig{
User: rcc.cs.Properties.WindowsProfile.AdminUsername,
Password: rcc.cs.Properties.WindowsProfile.AdminPassword,
}
}
rcc.sshPort = vmssSSHPort
if rcc.cs.Properties.MasterProfile.IsAvailabilitySet() {
rcc.sshPort = vmasSSHPort
}
rcc.jumpbox = &ssh.JumpBox{URI: rcc.sshHostURI, Port: rcc.sshPort, OperatingSystem: api.Linux, AuthConfig: rcc.linuxAuthConfig}
if err := ssh.ValidateConfig(rcc.jumpbox); err != nil {
return errors.Wrap(err, "validating ssh configuration")
}
return
}
func (rcc *rotateCertsCmd) run() (err error) {
if err = rcc.backupCerts(); err != nil {
return errors.Wrap(err, "backing up current state")
}
if err = rcc.updateCertificateProfile(); err != nil {
return errors.Wrap(err, "updating certificate profile")
}
rcc.kubeClient, err = rcc.getKubeClient()
if err != nil {
return errors.Wrap(err, "creating Kubernetes client")
}
if !rcc.force {
var resumeClusterAutoscaler func() error
resumeClusterAutoscaler, err = ops.PauseClusterAutoscaler(rcc.kubeClient)
if resumeClusterAutoscaler != nil {
defer func() {
if e := resumeClusterAutoscaler(); e != nil {
log.Warn(e)
}
}()
}
if err != nil {
return err
}
if err = rcc.waitForNodesReady(rcc.cs.Properties.GetMasterVMNameList()); err != nil {
return err
}
if err = rcc.waitForControlPlaneReadiness(); err != nil {
return err
}
}
if err = rcc.rotateMasterCerts(); err != nil {
return errors.Wrap(err, "rotating certificates")
}
if err = rcc.rotateAgentCerts(); err != nil {
return errors.Wrap(err, "rotating certificates")
}
if err = rcc.updateAPIModel(); err != nil {
return errors.Wrap(err, "updating apimodel")
}
log.Infoln("Certificate rotation completed")
return nil
}
func (rcc *rotateCertsCmd) backupCerts() error {
log.Infof("Backing up artifacts to directory %s", rcc.backupDirectory)
if err := writeArtifacts(rcc.backupDirectory, rcc.cs, rcc.apiVersion, rcc.loader.Translator); err != nil {
return errors.Wrap(err, "writing artifacts")
}
return nil
}
func (rcc *rotateCertsCmd) updateCertificateProfile() error {
if rcc.generateCerts {
if err := rcc.generateTLSArtifacts(); err != nil {
return errors.Wrap(err, "generating artifacts")
}
} else {
rcc.cs.Properties.CertificateProfile = rcc.newCertsProfile
}
log.Infof("Writing artifacts to output directory %s", rcc.outputDirectory)
if err := writeArtifacts(rcc.outputDirectory, rcc.cs, rcc.apiVersion, rcc.loader.Translator); err != nil {
return errors.Wrap(err, "writing artifacts")
}
return nil
}
func (rcc *rotateCertsCmd) generateTLSArtifacts() error {
log.Infoln("Generating new certificates")
rcc.cs.Properties.CertificateProfile = &api.CertificateProfile{}
if ok, _, err := rcc.cs.SetDefaultCerts(api.DefaultCertParams{PkiKeySize: helpers.DefaultPkiKeySize}); !ok || err != nil {
return errors.Wrap(err, "generating new certificates")
}
return nil
}
// getControlPlaneNodes ...
func (rcc *rotateCertsCmd) getControlPlaneNodes() nodeMap {
nodes := make(nodeMap)
for _, master := range rcc.cs.Properties.GetMasterVMNameList() {
nodes[master] = &ssh.RemoteHost{
URI: master,
Port: 22,
OperatingSystem: api.Linux,
AuthConfig: rcc.linuxAuthConfig,
Jumpbox: rcc.jumpbox,
}
}
return nodes
}
// getAgentNodes ...
func (rcc *rotateCertsCmd) getAgentNodes() (nodeMap, error) {
nodeList, err := rcc.kubeClient.ListNodes()
if err != nil {
return nil, err
}
nodes := make(nodeMap)
for _, nli := range nodeList.Items {
node := &ssh.RemoteHost{
URI: nli.Name,
Port: 22,
Jumpbox: rcc.jumpbox,
}
caser := cases.Title(language.English)
switch api.OSType(caser.String(nli.Status.NodeInfo.OperatingSystem)) {
case api.Linux:
node.OperatingSystem = api.Linux
node.AuthConfig = rcc.linuxAuthConfig
case api.Windows:
node.OperatingSystem = api.Windows
node.AuthConfig = rcc.windowsAuthConfig
default:
return nil, errors.Errorf("listing nodes, could not determine operating system of node %s", nli.Name)
}
nodes[node.URI] = node
}
for k, v := range nodes {
if isMaster(v) {
delete(nodes, k)
}
}
return nodes, nil
}
// distributeCerts copies the new set of certificates to the cluster nodes.
func (rcc *rotateCertsCmd) distributeCerts() (err error) {
upload := func(files fileMap, node *ssh.RemoteHost) error {
for _, file := range files {
var co string
if co, err = ssh.CopyToRemote(context.Background(), node, file); err != nil {
log.Debugf("Remote command output: %s", co)
return errors.Wrap(err, "uploading certificate")
}
}
return nil
}
masterCerts, linuxCerts, windowsCerts, e := getFilesToDistribute(rcc.cs, "/etc/kubernetes/rotate-certs/certs")
if e != nil {
return errors.Wrap(e, "collecting files to distribute")
}
for _, node := range rcc.nodes {
log.Debugf("Uploading certificates to node %s", node.URI)
if isMaster(node) {
err = upload(masterCerts, node)
} else if isLinuxAgent(node) {
err = upload(linuxCerts, node)
} else if isWindowsAgent(node) {
err = upload(windowsCerts, node)
}
if err != nil {
return err
}
}
return nil
}
func (rcc *rotateCertsCmd) rotateMasterCerts() (err error) {
rcc.nodes = rcc.getControlPlaneNodes()
if err != nil {
return errors.Wrap(err, "listing cluster nodes")
}
log.Info("Distributing control plane certificates")
if err = rcc.distributeCerts(); err != nil {
return errors.Wrap(err, "distributing certificates")
}
if err = rcc.backupRemote(); err != nil {
return err
}
if err = rcc.rotateMasters(); err != nil {
return err
}
log.Infoln("Deleting temporary artifacts from control plane nodes")
if err = rcc.cleanupRemote(); err != nil {
return err
}
if err = rcc.waitForNodesReady(keys(rcc.nodes)); err != nil {
return err
}
if err = rcc.waitForControlPlaneReadiness(); err != nil {
return err
}
return nil
}
func (rcc *rotateCertsCmd) rotateAgentCerts() (err error) {
rcc.nodes, err = rcc.getAgentNodes()
if err != nil {
return errors.Wrap(err, "listing cluster nodes")
}
log.Info("Distributing agent certificates")
if err = rcc.distributeCerts(); err != nil {
return errors.Wrap(err, "distributing certificates")
}
if err = rcc.backupRemote(); err != nil {
return err
}
if err = rcc.rotateAgents(); err != nil {
return err
}
log.Infoln("Deleting temporary artifacts from agent nodes")
if err = rcc.cleanupRemote(); err != nil {
return err
}
if err = rcc.waitForNodesReady(keys(rcc.nodes)); err != nil {
return err
}
log.Info("Recreating service account tokens")
if err = ops.RotateServiceAccountTokens(rcc.kubeClient); err != nil {
return err
}
if err = rcc.waitForKubeSystemReadiness(); err != nil {
log.Errorf("waitForKubeSystemReadiness returned an error: %s", err.Error())
}
return nil
}
func (rcc *rotateCertsCmd) backupRemote() error {
log.Info("Backing up node certificates")
step := "backup"
for _, node := range rcc.nodes {
if err := execStepsSequence(isLinux, node, execRemoteFunc(remoteBashScript(step))); err != nil {
return errors.Wrapf(err, "executing %s function on remote host %s", step, node.URI)
}
if err := execStepsSequence(isWindowsAgent, node, execRemoteFunc(remotePowershellScript("Backup"))); err != nil {
return errors.Wrapf(err, "executing %s function on remote host %s", step, node.URI)
}
}
return nil
}
func (rcc *rotateCertsCmd) rotateMasters() error {
log.Info("Rotating control plane certificates")
step := "cp_certs"
for _, node := range rcc.nodes {
log.Debugf("Node: %s. Step: %s", node.URI, step)
if err := execStepsSequence(isMaster, node, execRemoteFunc(remoteBashScript(step))); err != nil {
return errors.Wrapf(err, "executing %s function on remote host %s", step, node.URI)
}
}
if err := rcc.rebootNodes(rcc.cs.Properties.GetMasterVMNameList()...); err != nil {
return err
}
if err := rcc.waitForVMsRunning(keys(rcc.nodes)); err != nil {
return err
}
if err := rcc.waitForNodesReady(keys(rcc.nodes)); err != nil {
return err
}
log.Info("Rotating front-proxy certificates")
step = "cp_proxy"
// cp_proxy execution has to remain serial, otherwise it will break the front-proxy PKI rotation
for _, node := range rcc.nodes {
log.Debugf("Node: %s. Step: %s", node.URI, step)
if err := execStepsSequence(isMaster, node, execRemoteFunc(remoteBashScript(step))); err != nil {
return errors.Wrapf(err, "executing %s function on remote host %s", step, node.URI)
}
}
return nil
}
func (rcc *rotateCertsCmd) rotateAgents() error {
log.Info("Rotating agents certificates")
step := "agent_certs"
for _, node := range rcc.nodes {
log.Debugf("Node: %s. Step: %s", node.URI, step)
if err := execStepsSequence(isLinuxAgent, node, execRemoteFunc(remoteBashScript(step)), deletePodFunc(rcc.kubeClient, kubeProxyLabels)); err != nil {
return errors.Wrapf(err, "executing %s function on remote host %s", step, node.URI)
}
if err := execStepsSequence(isWindowsAgent, node, execRemoteFunc(remotePowershellScript("Start-CertRotation"))); err != nil {
return errors.Wrapf(err, "executing Start-CertRotation function on remote host %s", node.URI)
}
}
return nil
}
func (rcc *rotateCertsCmd) cleanupRemote() error {
step := "cleanup"
for _, node := range rcc.nodes {
log.Debugf("Node: %s. Step: %s", node.URI, step)
if err := execStepsSequence(isLinux, node, execRemoteFunc(remoteBashScript(step))); err != nil {
return errors.Wrapf(err, "executing %s function on remote host %s", step, node.URI)
}
if err := execStepsSequence(isWindowsAgent, node, execRemoteFunc(remotePowershellScript("Clean"))); err != nil {
return errors.Wrapf(err, "executing %s function on remote host %s", step, node.URI)
}
}
return nil
}
func (rcc *rotateCertsCmd) updateAPIModel() error {
log.Infof("Generating new artifacts")
if err := writeArtifacts(filepath.Dir(rcc.apiModelPath), rcc.cs, rcc.apiVersion, rcc.loader.Translator); err != nil {
return errors.Wrap(err, "writing artifacts")
}
if err := os.RemoveAll(rcc.outputDirectory); err != nil {
return errors.Wrap(err, "deleting output directory")
}
return nil
}
func execStepsSequence(cond nodeCondition, node *ssh.RemoteHost, steps ...func(node *ssh.RemoteHost) error) error {
if !cond(node) {
return nil
}
for _, step := range steps {
if err := step(node); err != nil {
return err
}
}
return nil
}
func execRemoteFunc(script string) func(node *ssh.RemoteHost) error {
return func(node *ssh.RemoteHost) error {
out, err := ssh.ExecuteRemote(context.Background(), node, script)
if err != nil {
log.Debugf("Remote command output: %s", out)
}
return err
}
}
func deletePodFunc(client *kubernetes.CompositeClientSet, labels string) func(node *ssh.RemoteHost) error {
return func(node *ssh.RemoteHost) error {
err := client.DeletePods(metav1.NamespaceSystem, metav1.ListOptions{
FieldSelector: fmt.Sprintf("spec.nodeName=%s", node.URI),
LabelSelector: labels,
})
if err != nil {
return errors.Wrapf(err, "deleting pod with labels %s from node %s", labels, node.URI)
}
return nil
}
}
// waitForControlPlaneReadiness checks that the control plane components are in a healthy state before we move to the next step.
func (rcc *rotateCertsCmd) waitForControlPlaneReadiness() error {
log.Info("Checking health of control plane components")
pods := make([]string, 0)
for _, n := range rcc.cs.Properties.GetMasterVMNameList() {
for _, c := range []string{kubeAddonManager, kubeAPIServer, kubeControllerManager, kubeScheduler} {
pods = append(pods, fmt.Sprintf("%s-%s", c, n))
}
}
if err := ops.WaitForReady(rcc.kubeClient, metav1.NamespaceSystem, pods, rotateCertsDefaultInterval, rotateCertsDefaultTimeout, rcc.nodes); err != nil {
return errors.Wrap(err, "waiting for control plane containers to reach the Ready state within the timeout period")
}
return nil
}
func (rcc *rotateCertsCmd) waitForNodesReady(nodes []string) error {
log.Infof("Waiting for cluster nodes readiness: %s", nodes)
if err := ops.WaitForNodesReady(rcc.kubeClient, nodes, rotateCertsDefaultInterval, rotateCertsDefaultTimeout); err != nil {
return errors.Wrap(err, "waiting for cluster nodes readiness")
}
return nil
}
func (rcc *rotateCertsCmd) waitForVMsRunning(nodes []string) error {
if rcc.cs.Properties.MasterProfile.IsAvailabilitySet() {
if err := ops.WaitForVMsRunning(rcc.armClient, rcc.resourceGroupName, nodes, rotateCertsDefaultInterval, rotateCertsDefaultTimeout); err != nil {
return errors.Wrap(err, "waiting for VMs to reach the running state")
}
} else {
vmssName := fmt.Sprintf("%svmss", rcc.cs.Properties.GetMasterVMPrefix())
count := rcc.cs.Properties.MasterProfile.Count
if err := ops.WaitForVMSSIntancesRunning(rcc.armClient, rcc.resourceGroupName, vmssName, count, rotateCertsDefaultInterval, rotateCertsDefaultTimeout); err != nil {
return errors.Wrap(err, "waiting for VMs to reach the running state")
}
}
return nil
}
// waitForKubeSystemReadiness checks that all kube-system pods are in a healthy state before we move to the next step.
func (rcc *rotateCertsCmd) waitForKubeSystemReadiness() error {
log.Info("Checking health of all kube-system pods")
timeout := time.Duration(len(rcc.nodes)) * time.Duration(float64(time.Minute)*1.25)
if rotateCertsDefaultTimeout > timeout {
timeout = rotateCertsDefaultTimeout
}
if err := ops.WaitForAllInNamespaceReady(rcc.kubeClient, metav1.NamespaceSystem, rotateCertsDefaultInterval, timeout, rcc.nodes); err != nil {
return errors.Wrap(err, "waiting for kube-system containers to reach the Ready state within the timeout period")
}
return nil
}
func (rcc *rotateCertsCmd) rebootNodes(nodes ...string) error {
log.Info("Rebooting control plane nodes")
if rcc.cs.Properties.MasterProfile.IsAvailabilitySet() {
for _, node := range nodes {
log.Debugf("Node: %s. Step: reboot", node)
if err := rcc.armClient.RestartVirtualMachine(rcc.resourceGroupName, node); err != nil {
return errors.Wrapf(err, "rebooting host %s", node)
}
}
} else {
vmssName := fmt.Sprintf("%svmss", rcc.cs.Properties.GetMasterVMPrefix())
if err := rcc.armClient.RestartVirtualMachineScaleSets(rcc.resourceGroupName, vmssName); err != nil {
return errors.Wrapf(err, "rebooting vmss %s", vmssName)
}
}
return nil
}
func (rcc *rotateCertsCmd) getKubeClient() (*kubernetes.CompositeClientSet, error) {
configPathSuffix := path.Join("kubeconfig", fmt.Sprintf("kubeconfig.%s.json", rcc.location))
oldConfigPath := path.Join(rcc.backupDirectory, configPathSuffix)
oldConfig, err := os.ReadFile(oldConfigPath)
if err != nil {
return nil, errors.Wrapf(err, "reading %s", oldConfigPath)
}
oldCAClient, err := kubernetes.NewClient("", string(oldConfig), rotateCertsDefaultInterval, rotateCertsDefaultTimeout)
if err != nil {
return nil, errors.Wrapf(err, "creating client from %s", oldConfigPath)
}
newConfigPath := path.Join(rcc.outputDirectory, configPathSuffix)
newConfig, err := os.ReadFile(newConfigPath)
if err != nil {
return nil, errors.Wrapf(err, "reading %s", newConfigPath)
}
newCAClient, err := kubernetes.NewClient("", string(newConfig), rotateCertsDefaultInterval, rotateCertsDefaultTimeout)
if err != nil {
return nil, errors.Wrapf(err, "creating client from %s", newConfigPath)
}
return kubernetes.NewCompositeClient(oldCAClient, newCAClient, rotateCertsDefaultInterval, rotateCertsDefaultTimeout), nil
}
func getFilesToDistribute(cs *api.ContainerService, dir string) (fileMap, fileMap, fileMap, error) {
p := cs.Properties.CertificateProfile
kubeconfig, err := remoteKubeConfig(cs, dir)
if err != nil {
return nil, nil, nil, errors.Wrap(err, "generating new kubeconfig")
}
linuxScript, err := loadLinuxScript()
if err != nil {
return nil, nil, nil, errors.Wrap(err, "loading rotate-certs.sh")
}
windowsScript, err := loadWindowsScript()
if err != nil {
return nil, nil, nil, errors.Wrap(err, "loading rotate-certs.ps1")
}
masterFiles := fileMap{
"apiserver.crt": ssh.NewRemoteFile(path.Join(dir, "apiserver.crt"), crtPermissions, rootUserGroup, []byte(p.APIServerCertificate)),
"apiserver.key": ssh.NewRemoteFile(path.Join(dir, "apiserver.key"), keyPermissions, rootUserGroup, []byte(p.APIServerPrivateKey)),
"ca.crt": ssh.NewRemoteFile(path.Join(dir, "ca.crt"), crtPermissions, rootUserGroup, []byte(p.CaCertificate)),
"ca.key": ssh.NewRemoteFile(path.Join(dir, "ca.key"), keyPermissions, rootUserGroup, []byte(p.CaPrivateKey)),
"client.crt": ssh.NewRemoteFile(path.Join(dir, "client.crt"), crtPermissions, rootUserGroup, []byte(p.ClientCertificate)),
"client.key": ssh.NewRemoteFile(path.Join(dir, "client.key"), keyPermissions, rootUserGroup, []byte(p.ClientPrivateKey)),
"etcdclient.crt": ssh.NewRemoteFile(path.Join(dir, "etcdclient.crt"), crtPermissions, rootUserGroup, []byte(p.EtcdClientCertificate)),
"etcdclient.key": ssh.NewRemoteFile(path.Join(dir, "etcdclient.key"), keyPermissions, rootUserGroup, []byte(p.EtcdClientPrivateKey)),
"etcdserver.crt": ssh.NewRemoteFile(path.Join(dir, "etcdserver.crt"), crtPermissions, rootUserGroup, []byte(p.EtcdServerCertificate)),
"etcdserver.key": ssh.NewRemoteFile(path.Join(dir, "etcdserver.key"), keyPermissions, etcdUserGroup, []byte(p.EtcdServerPrivateKey)),
"kubectlClient.crt": ssh.NewRemoteFile(path.Join(dir, "kubectlClient.crt"), crtPermissions, rootUserGroup, []byte(p.KubeConfigCertificate)),
"kubectlClient.key": ssh.NewRemoteFile(path.Join(dir, "kubectlClient.key"), keyPermissions, rootUserGroup, []byte(p.KubeConfigPrivateKey)),
"kubeconfig": kubeconfig,
"script": linuxScript,
}
for i := 0; i < cs.Properties.MasterProfile.Count; i++ {
crt := fmt.Sprintf("etcdpeer%d.crt", i)
masterFiles[crt] = ssh.NewRemoteFile(path.Join(dir, crt), crtPermissions, etcdUserGroup, []byte(p.EtcdPeerCertificates[i]))
key := fmt.Sprintf("etcdpeer%d.key", i)
masterFiles[key] = ssh.NewRemoteFile(path.Join(dir, key), keyPermissions, etcdUserGroup, []byte(p.EtcdPeerPrivateKeys[i]))
}
linuxFiles := fileMap{
"ca.crt": masterFiles["ca.crt"],
"client.crt": masterFiles["client.crt"],
"client.key": masterFiles["client.key"],
"script": linuxScript,
}
windowsFiles := fileMap{
"ca.crt": ssh.NewRemoteFile(fmt.Sprintf("$env:temp\\%s", "ca.crt"), "", "", []byte(p.CaCertificate)),
"client.crt": ssh.NewRemoteFile(fmt.Sprintf("$env:temp\\%s", "client.crt"), "", "", []byte(p.ClientCertificate)),
"client.key": ssh.NewRemoteFile(fmt.Sprintf("$env:temp\\%s", "client.key"), "", "", []byte(p.ClientPrivateKey)),
"script": windowsScript,
}
return masterFiles, linuxFiles, windowsFiles, nil
}
func remoteKubeConfig(cs *api.ContainerService, dir string) (*ssh.RemoteFile, error) {
adminUsername := fmt.Sprintf("%s:%s", cs.Properties.LinuxProfile.AdminUsername, cs.Properties.LinuxProfile.AdminUsername)
kubeconfig, err := engine.GenerateKubeConfig(cs.Properties, cs.Location)
if err != nil {
return nil, err
}
return ssh.NewRemoteFile(path.Join(dir, "kubeconfig"), configPermissions, adminUsername, []byte(kubeconfig)), nil
}
func loadLinuxScript() (*ssh.RemoteFile, error) {
c, err := engine.Asset("k8s/rotate-certs.sh")
if err != nil {
return nil, err
}
return ssh.NewRemoteFile("/etc/kubernetes/rotate-certs/rotate-certs.sh", "744", rootUserGroup, c), nil
}
func loadWindowsScript() (*ssh.RemoteFile, error) {
c, err := engine.Asset("k8s/rotate-certs.ps1")
if err != nil {
return nil, err
}
return ssh.NewRemoteFile("$env:temp\\rotate-certs.ps1", "", "", c), nil
}
func remoteBashScript(step string) string {
return fmt.Sprintf("bash -euxo pipefail -c \"if [ -f /etc/kubernetes/rotate-certs/rotate-certs.sh ]; then sudo /etc/kubernetes/rotate-certs/rotate-certs.sh %s |& sudo tee -a /var/log/azure/rotate-certs.log; fi\"", step)
}
func remotePowershellScript(step string) string {
filePath := "$env:temp\\rotate-certs.ps1"
return fmt.Sprintf("powershell -noprofile -command \"cd c:\\k\\; Import-Module %s; iex %s | Out-File -Append -Encoding utf8 rotate-certs.log\"", filePath, step)
}
type nodeCondition func(*ssh.RemoteHost) bool
func isMaster(node *ssh.RemoteHost) bool {
return strings.HasPrefix(node.URI, common.LegacyControlPlaneVMPrefix)
}
func isLinux(node *ssh.RemoteHost) bool { return node.OperatingSystem == api.Linux }
func isWindowsAgent(node *ssh.RemoteHost) bool { return node.OperatingSystem == api.Windows }
func isLinuxAgent(node *ssh.RemoteHost) bool { return isLinux(node) && !isMaster(node) }
func keys(nodes nodeMap) []string {
n := make([]string, 0)
for k := range nodes {
n = append(n, k)
}
return n
}