Skip to content

Commit

Permalink
caa: remove option to configure agent via userdata
Browse files Browse the repository at this point in the history
The agent doesn't require dynamic configuration any more (userdata is
untrusted input) we can reduce the surface and package a static
configuration.

In this change image auth support is always enabled. An empty auth
file is provisioned by default to /run/peerpod/auth.json, it can be
overwritten by userdata.

Signed-off-by: Magnus Kulke <[email protected]>
  • Loading branch information
mkulke committed Dec 9, 2024
1 parent 7aae9b6 commit 485aa68
Show file tree
Hide file tree
Showing 11 changed files with 18 additions and 142 deletions.
2 changes: 0 additions & 2 deletions src/cloud-api-adaptor/docs/initdata.md
Original file line number Diff line number Diff line change
Expand Up @@ -146,8 +146,6 @@ spec:
cloud-api-adaptor will read the annotation and write it to [write_files](../../cloud-providers/util/cloudinit/cloudconfig.go). Note: files unrelated to initdata (like network tunnel configuration in `/run/peerpod/daemon.json`) are also part of the `write_files` directive.
```yaml
write_files:
- path: /run/peerpod/agent-config.toml
content:
- path: /run/peerpod/daemon.json
content:
- path: /run/peerpod/auth.json
Expand Down
12 changes: 0 additions & 12 deletions src/cloud-api-adaptor/pkg/adaptor/cloud/cloud.go
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,6 @@ import (

"github.com/confidential-containers/cloud-api-adaptor/src/cloud-api-adaptor/pkg/adaptor/k8sops"
"github.com/confidential-containers/cloud-api-adaptor/src/cloud-api-adaptor/pkg/adaptor/proxy"
"github.com/confidential-containers/cloud-api-adaptor/src/cloud-api-adaptor/pkg/agent"
"github.com/confidential-containers/cloud-api-adaptor/src/cloud-api-adaptor/pkg/forwarder"
. "github.com/confidential-containers/cloud-api-adaptor/src/cloud-api-adaptor/pkg/paths"
"github.com/confidential-containers/cloud-api-adaptor/src/cloud-api-adaptor/pkg/podnetwork"
Expand Down Expand Up @@ -255,7 +254,6 @@ func (s *cloudService) CreateVM(ctx context.Context, req *pb.CreateVMRequest) (r
agentProxy := s.proxyFactory.New(serverName, socketPath)

var authJSON []byte
var authFilePath string
_, err = os.Stat(SrcAuthfilePath)
if err != nil {
logger.Printf("credential file %s is not present, skipping image auth config", SrcAuthfilePath)
Expand All @@ -264,15 +262,9 @@ func (s *cloudService) CreateVM(ctx context.Context, req *pb.CreateVMRequest) (r
if err != nil {
return nil, fmt.Errorf("error reading %s: %v", SrcAuthfilePath, err)
}
authFilePath = AuthFilePath
logger.Printf("configure agent to use credentials file %s", SrcAuthfilePath)
}

agentConfig, err := agent.CreateConfigFile(authFilePath)
if err != nil {
return nil, fmt.Errorf("creating agent config: %w", err)
}

daemonConfig := forwarder.Config{
PodNamespace: namespace,
PodName: pod,
Expand Down Expand Up @@ -321,10 +313,6 @@ func (s *cloudService) CreateVM(ctx context.Context, req *pb.CreateVMRequest) (r

cloudConfig := &cloudinit.CloudConfig{
WriteFiles: []cloudinit.WriteFile{
{
Path: agent.ConfigFilePath,
Content: agentConfig,
},
{
Path: forwarder.DefaultConfigPath,
Content: string(daemonJSON),
Expand Down
36 changes: 0 additions & 36 deletions src/cloud-api-adaptor/pkg/agent/config.go

This file was deleted.

59 changes: 0 additions & 59 deletions src/cloud-api-adaptor/pkg/agent/config_test.go

This file was deleted.

2 changes: 1 addition & 1 deletion src/cloud-api-adaptor/pkg/userdata/provision.go
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ const (
)

var logger = log.New(log.Writer(), "[userdata/provision] ", log.LstdFlags|log.Lmsgprefix)
var WriteFilesList = []string{AACfgPath, CDHCfgPath, AgentCfgPath, ForwarderCfgPath, AuthFilePath, InitDataPath}
var WriteFilesList = []string{AACfgPath, CDHCfgPath, ForwarderCfgPath, AuthFilePath, InitDataPath}
var InitdDataFilesList = []string{AACfgPath, CDHCfgPath, PolicyPath}

type Config struct {
Expand Down
32 changes: 2 additions & 30 deletions src/cloud-api-adaptor/pkg/userdata/provision_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -14,10 +14,6 @@ import (
"time"
)

var testAgentConfig string = `server_addr = 'unix:///run/kata-containers/agent.sock'
guest_components_procs = 'none'
`

var testDaemonConfig string = `{
"pod-network": {
"podip": "10.244.0.19/24",
Expand Down Expand Up @@ -336,12 +332,11 @@ func TestProcessCloudConfig(t *testing.T) {
defer os.RemoveAll(tempDir)

var aaCfgPath = filepath.Join(tempDir, "aa.toml")
var agentCfgPath = filepath.Join(tempDir, "agent-config.toml")
var cdhCfgPath = filepath.Join(tempDir, "cdh.toml")
var daemonPath = filepath.Join(tempDir, "daemon.json")
var authPath = filepath.Join(tempDir, "auth.json")
var initdataPath = filepath.Join(tempDir, "initdata")
var writeFilesList = []string{aaCfgPath, agentCfgPath, cdhCfgPath, daemonPath, authPath, initdataPath}
var writeFilesList = []string{aaCfgPath, cdhCfgPath, daemonPath, authPath, initdataPath}

content := fmt.Sprintf(`#cloud-config
write_files:
Expand All @@ -360,14 +355,9 @@ write_files:
- path: %s
content: |
%s
- path: %s
content: |
%s
`,
aaCfgPath,
indentTextBlock(testAAConfig, 4),
agentCfgPath,
indentTextBlock(testAgentConfig, 4),
cdhCfgPath,
indentTextBlock(testCDHConfig, 4),
daemonPath,
Expand Down Expand Up @@ -403,12 +393,6 @@ write_files:
t.Fatalf("file content does not match aa config fixture: got %q", fileContent)
}

data, _ = os.ReadFile(agentCfgPath)
fileContent = string(data)
if fileContent != testAgentConfig {
t.Fatalf("file content does not match agent config fixture: got %q", fileContent)
}

data, _ = os.ReadFile(cdhCfgPath)
fileContent = string(data)
if fileContent != testCDHConfig {
Expand Down Expand Up @@ -439,12 +423,11 @@ func TestProcessCloudConfigWithMalicious(t *testing.T) {
defer os.RemoveAll(tempDir)

var aaCfgPath = filepath.Join(tempDir, "aa.toml")
var agentCfgPath = filepath.Join(tempDir, "agent-config.toml")
var cdhCfgPath = filepath.Join(tempDir, "cdh.toml")
var daemonPath = filepath.Join(tempDir, "daemon.json")
var authPath = filepath.Join(tempDir, "auth.json")
var malicious = filepath.Join(tempDir, "malicious")
var writeFilesList = []string{aaCfgPath, agentCfgPath, cdhCfgPath, daemonPath, authPath}
var writeFilesList = []string{aaCfgPath, cdhCfgPath, daemonPath, authPath}

content := fmt.Sprintf(`#cloud-config
write_files:
Expand All @@ -463,14 +446,9 @@ write_files:
- path: %s
content: |
%s
- path: %s
content: |
%s
`,
aaCfgPath,
indentTextBlock(testAAConfig, 4),
agentCfgPath,
indentTextBlock(testAgentConfig, 4),
cdhCfgPath,
indentTextBlock(testCDHConfig, 4),
daemonPath,
Expand Down Expand Up @@ -506,12 +484,6 @@ write_files:
t.Fatalf("file content does not match aa config fixture: got %q", fileContent)
}

data, _ = os.ReadFile(agentCfgPath)
fileContent = string(data)
if fileContent != testAgentConfig {
t.Fatalf("file content does not match agent config fixture: got %q", fileContent)
}

data, _ = os.ReadFile(cdhCfgPath)
fileContent = string(data)
if fileContent != testCDHConfig {
Expand Down
3 changes: 3 additions & 0 deletions src/cloud-api-adaptor/podvm/files/etc/agent-config.toml
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
server_addr = "unix:///run/kata-containers/agent.sock"
guest_components_procs = "none"
image_registry_auth = "file:///etc/kata-oci/auth.json"
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
{
"auths": {}
}
Original file line number Diff line number Diff line change
Expand Up @@ -5,9 +5,9 @@ [email protected] process-user-data.service

[Service]
ExecStartPre=mkdir -p /run/kata-containers
ExecStart=/usr/local/bin/kata-agent --config /run/peerpod/agent-config.toml
ExecStart=/usr/local/bin/kata-agent --config /etc/agent-config.toml
ExecStartPre=-umount /sys/fs/cgroup/misc
ExecStopPost=/usr/local/bin/kata-agent-clean --config /run/peerpod/agent-config.toml
ExecStopPost=/usr/local/bin/kata-agent-clean --config /etc/agent-config.toml
SyslogIdentifier=kata-agent

[Install]
Expand Down
2 changes: 2 additions & 0 deletions src/cloud-api-adaptor/podvm/files/etc/tmpfiles.d/auth.conf
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
#Type Path Mode User Group Age Argument
C /run/peerpod/auth.json - - - - /etc/kata-oci/empty-auth.json
5 changes: 5 additions & 0 deletions src/cloud-api-adaptor/podvm/qcow2/copy-files.sh
Original file line number Diff line number Diff line change
Expand Up @@ -30,3 +30,8 @@ sudo cp -a /tmp/files/pause_bundle /
sudo mkdir -p /etc/kata-opa
sudo cp -a /tmp/files/etc/kata-opa/* /etc/kata-opa/
sudo cp -a /tmp/files/etc/tmpfiles.d/policy.conf /etc/tmpfiles.d/

# Copy an empty auth.json for image pulling
sudo mkdir -p /etc/kata-oci
sudo cp -a /tmp/files/etc/kata-oci/* /etc/kata-oci/
sudo cp -a /tmp/files/etc/tmpfiles.d/auth.conf /etc/tmpfiles.d/

0 comments on commit 485aa68

Please sign in to comment.