Commit Graph

9 Commits (25d7be004cfe52caa5603501cda15e1983ed0b36)

Author SHA1 Message Date
Dustin 25d7be004c Begin EC2 instance state event handler
The lifecycle of ephemeral Kubernetes worker nodes is driven by events
emitted by Amazon EventBridge and delivered via Amazon Simple
Notification Service.  These events trigger the *dynk8s* provisioner to
take the appropriate action based on the state of an EC2 instance.

In order to add a node to the cluster using `kubeadm`, a "bootstrap
token" needs to be created.  When manually adding a node, this would be
done e.g. using `kubeadm token create`.  Since bootstrap tokens are just
a special type of Secret, they can be easily created programmatically as
well.  When a new EC2 instance enters the "running" state, the
provisioner creates a new bootstrap token and associates it with the
instance by storing the instance ID in a label in the Secret resource's
metadata.

The initial implementation of the event handler is rather naïve.  It
generates a token for every instance, though some instances may not be
intended to be used as Kubernetes workers.  Ideally, the provisioner
would only allocate tokens for instances matching some configurable
criteria, such as AWS tags.  Further, a token is allocated every time
the instance enters the running state, even if a token already exists or
is not needed.
2022-10-01 10:34:03 -05:00
Dustin 8e1165eb95 terraform: Begin AWS configuration
The `terraform` directory contains the resource descriptions for all AWS
services that need to be configured in order for the dynamic K8s
provisioner to work.  Specifically, it defines the EventBridge rule and
SNS topic/subscriptions that instruct AWS to send EC2 instance state
change notifications to the *dynk8s-provisioner*'s HTTP interface.
2022-09-27 12:58:51 -05:00
Dustin c721571043 container: Rebase on Fedora 35
dustin/dynk8s-provisioner/pipeline/head This commit looks good Details
Fedora 36 has OpenSSL 3, while the *rust* container image has OpenSSL
1.1.  Since Fedora 35 is still supported, and it includes OpenSSL 1.1,
we can use it as our base for the runtime image.
2022-09-11 13:17:54 -05:00
Dustin c8e0fe1256 ci: Begin Jenkins build pipeline
dustin/dynk8s-provisioner/pipeline/head This commit looks good Details
2022-09-10 10:30:54 -05:00
Dustin ac1b20d910 sns: Save messages to disk
Upon receipt of a notification or unsubscribe confirmation message from
SNS, after the message signature has been verified, the receiver will
now write the re-serialized contents of the message out to the
filesystem.  This will allow the messages to be inspected later in order
to develop additional functionality for this service.

The messages are saved in a `messages` director within the current
working directory.  This directory contains a subdirectory for each SNS
topic.  Within the topic subdirectories, the each message is saved in a
file named with the message timestamp and ID.
2022-09-05 09:45:44 -05:00
Dustin ab45823654 Begin HTTP server, SNS message receiver
This commit introduces the HTTP interface for the dynamic K8s node
provisioner.  It will serve as the main communication point between the
ephemeral nodes in the cloud, sharing the keys and tokens they require
in order to join the Kubernetes cluster.

The initial functionality is simply an Amazon SNS notification receiver.
SNS notifications will be used to manage the lifecycle of the dynamic
nodes.

For now, the notification receiver handles subscription confirmation
messages by following the link provided to confirm the subscription.
All other messages are simply written to the filesystem; these will be
used to implement and test future functionality.
2022-09-03 22:58:23 -05:00
Dustin 3ce72623e6 model: sns: Add union type
The `model::sns::Message` enumeration provides a mechanism for
deserializing a JSON document into the correct type.  It will be used by
the HTTP operation that receives messages from SNS in order to determine
the correct action to take in response to the message.
2022-09-03 22:57:07 -05:00
Dustin 196a43c49c sns: Begin work on Amazon SNS message handling
In order to prevent arbitrary clients from using the provisioner to
retrieve WireGuard keys and Kubernetes bootstrap tokens, access to those
resources *must* be restricted to the EC2 machines created by the
Kubernetes Cloud Autoscaler.  The key to the authentication process will
be SNS notifications from AWS to indicate when new EC2 instances are
created; everything that the provisioner does will be associated with an
instance it discovered through an SNS notification.

SNS messages are signed using PKCS#1 v1.5 RSA-SHA1, with a public key
distributed in an X.509 certificate.  To ensure that messages received
are indeed from AWS, the provisioner will need to verify those
signatures.  Messages with missing or invalid signatures will be
considered unsafe and ignored.

The `model::sns` module includes the data structures that represent SNS
messages.  The `sns::sig` module includes the primitive operations for
implementing signature verification.
2022-09-01 18:22:22 -05:00
Dustin 90e5bd65ca Initial commit 2022-08-31 21:02:17 -05:00