1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
/* -------------------------------------------------------------------------- *\
 *        Apache 2.0 License Copyright © 2022-2023 The Aurae Authors          *
 *                                                                            *
 *                +--------------------------------------------+              *
 *                |   █████╗ ██╗   ██╗██████╗  █████╗ ███████╗ |              *
 *                |  ██╔══██╗██║   ██║██╔══██╗██╔══██╗██╔════╝ |              *
 *                |  ███████║██║   ██║██████╔╝███████║█████╗   |              *
 *                |  ██╔══██║██║   ██║██╔══██╗██╔══██║██╔══╝   |              *
 *                |  ██║  ██║╚██████╔╝██║  ██║██║  ██║███████╗ |              *
 *                |  ╚═╝  ╚═╝ ╚═════╝ ╚═╝  ╚═╝╚═╝  ╚═╝╚══════╝ |              *
 *                +--------------------------------------------+              *
 *                                                                            *
 *                         Distributed Systems Runtime                        *
 *                                                                            *
 * -------------------------------------------------------------------------- *
 *                                                                            *
 *   Licensed under the Apache License, Version 2.0 (the "License");          *
 *   you may not use this file except in compliance with the License.         *
 *   You may obtain a copy of the License at                                  *
 *                                                                            *
 *       http://www.apache.org/licenses/LICENSE-2.0                           *
 *                                                                            *
 *   Unless required by applicable law or agreed to in writing, software      *
 *   distributed under the License is distributed on an "AS IS" BASIS,        *
 *   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. *
 *   See the License for the specific language governing permissions and      *
 *   limitations under the License.                                           *
 *                                                                            *
\* -------------------------------------------------------------------------- */

//! Run the Aurae daemon as a pid 1 init program.
//!
//! The Aurae daemon assumes that if the current process id (PID) is 1 to
//! run itself as an initialization program, otherwise bypass the init module.

pub use self::system_runtimes::SocketStream;
use self::system_runtimes::{
    CellSystemRuntime, ContainerSystemRuntime, DaemonSystemRuntime,
    Pid1SystemRuntime, SystemRuntime, SystemRuntimeError,
};
use std::fs::File;
use std::io::{BufReader, Read};
mod fileio;
mod fs;
mod logging;
mod network;
mod power;
mod system_runtimes;

const BANNER: &str = "
    ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┓
    ┃   █████╗ ██╗   ██╗██████╗  █████╗ ███████╗ ┃
    ┃  ██╔══██╗██║   ██║██╔══██╗██╔══██╗██╔════╝ ┃
    ┃  ███████║██║   ██║██████╔╝███████║█████╗   ┃
    ┃  ██╔══██║██║   ██║██╔══██╗██╔══██║██╔══╝   ┃
    ┃  ██║  ██║╚██████╔╝██║  ██║██║  ██║███████╗ ┃
    ┃  ╚═╝  ╚═╝ ╚═════╝ ╚═╝  ╚═╝╚═╝  ╚═╝╚══════╝ ┃
    ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┛

         Distributed Systems Runtime Daemon

 ┌───────────────────────────────────────────────────┐
 │  WARNING WARNING WARNING WARNING WARNING WARNING  │
 │                                                   │
 │ The Aurae Runtime Project is currently in a state │
 │ of 'Early Active Development'. The current APIs   │
 │ and features of the project should be considered  │
 │ unstable. As the project matures the APIs and     │
 │ features will stabilize.                          │
 │                                                   │
 │ As the project maintainers deem appropriate the   │
 │ project will remove this warning.                 │
 │                                                   │
 │ At the time this banner is removed the project    │
 │ will have documentation available in the main     │
 │ repository on current API stability and backwards │
 │ compatability.                                    │
 │                                                   │
 │          github.com/aurae-runtime/aurae           │
 │                                                   │
 │  WARNING WARNING WARNING WARNING WARNING WARNING  │
 └───────────────────────────────────────────────────┘
\n";

#[derive(thiserror::Error, Debug)]
pub(crate) enum InitError {
    #[error(transparent)]
    SystemRuntimeError(#[from] SystemRuntimeError),
}

/// Initialize aurae, depending on our context.
pub async fn init(
    verbose: bool,
    nested: bool,
    socket_address: Option<String>,
) -> (Context, SocketStream) {
    let context = Context::get(nested);
    let init_result = match context {
        Context::Pid1 => Pid1SystemRuntime {}.init(verbose, socket_address),
        Context::Cell => CellSystemRuntime {}.init(verbose, socket_address),
        Context::Container => {
            ContainerSystemRuntime {}.init(verbose, socket_address)
        }
        Context::Daemon => DaemonSystemRuntime {}.init(verbose, socket_address),
    }
    .await;

    match init_result {
        Ok(stream) => (context, stream),
        Err(e) => panic!("Failed to initialize: {e:?}"),
    }
}

#[derive(Debug, PartialEq, Eq)]
pub enum Context {
    /// auraed is running as true PID 1
    Pid1,
    /// auraed is nested in a [Cell]
    Cell,
    /// auraed is running in a [Pod] as the init container
    Container,
    /// auraed is running as [Daemon] or arbitrarily on a host
    Daemon,
}

impl Context {
    pub fn get(nested: bool) -> Self {
        // TODO: Manage nested bool without passing --nested
        let in_cgroup = in_new_cgroup_namespace();
        if in_cgroup && !nested {
            // If we are in a container, we should always run this setup no matter pid 1 or not
            Self::Container
        } else if nested {
            // If we are nested, we should always run this setup no matter pid 1 or not
            Self::Cell
        } else if std::process::id() == 1 {
            Self::Pid1
        } else {
            Self::Daemon
        }
    }
}

// Here we have bespoke "in_container" logic that will check and see if we
// are executing inside an Aurae pod container.
//
// Note: All of the contents of the "cgroup" files in procfs end with a trailing \n newline byte
//
// Auraed container: /proc/self/cgroup: 0::/_aurae
// Auraed cell     : /proc/self/cgroup: 0::/../../../ae-1/_
// Systemd init    : /proc/self/cgroup: 0::/init.scope
// User slice      : /proc/self/cgroup: 0::/user.slice/user-1000.slice/session-3.scope
//
//        When reading the cgroup memberships of a "target" process from
//        /proc/[pid]/cgroup, the pathname shown in the third field of each
//        record will be relative to the reading process's root directory
//        for the corresponding cgroup hierarchy.  If the cgroup directory
//        of the target process lies outside the root directory of the
//        reading process's cgroup namespace, then the pathname will show
//        ../ entries for each ancestor level in the cgroup hierarchy.
//
// Source: https://man7.org/linux/man-pages/man7/cgroup_namespaces.7.html
fn in_new_cgroup_namespace() -> bool {
    let file = File::open("/proc/self/cgroup");

    // Note: The following is a workaround for a chicken egg problem in the init
    //       logic. We need to read from /proc to determine whether we're in a
    //       container or whether we're running as true PID 1. But if we're
    //       running as true PID 1, /proc wouldn't be mounted at this point as
    //       we only mount proc when we have determined that we _are_ running as
    //       true PID 1.
    match file {
        Ok(file) => {
            let mut reader = BufReader::new(file);
            let mut contents = String::new();
            let _ = reader
                .read_to_string(&mut contents)
                .expect("reading /proc/self/cgroup");

            // Here we examine the last few bytes of /proc/self/cgroup
            // We know if the cgroup string ends with a \n newline
            // as well as a / as in "0::/" we are in a new (and nested)
            // cgroup namespace.
            //
            // For all intents and purposes this is the closest way we
            // can guarantee that we are in "a container".
            //
            // It is important to note that Aurae cells (by default)
            // will also schedule themselves in a new cgroup namespace.
            // Therefore we would expect Aurae cells to also match this
            // pattern.
            //
            contents.to_string().ends_with("_aurae\n")
            // TODO Use the AURAE_SELF_IDENTIFIER const as currently defined in runtime_service.rs
            // TODO Consider moving the const to a better home :)
        }
        Err(_) => false,
    }
}