2020-06-21 06:32:08 -04:00
|
|
|
package headscale
|
|
|
|
|
|
|
|
import (
|
2021-10-26 16:42:56 -04:00
|
|
|
"context"
|
|
|
|
"crypto/tls"
|
2021-04-23 22:54:15 -04:00
|
|
|
"errors"
|
2020-06-21 06:32:08 -04:00
|
|
|
"fmt"
|
2021-10-29 12:45:06 -04:00
|
|
|
"io"
|
2021-10-26 16:42:56 -04:00
|
|
|
"net"
|
2021-04-23 22:54:15 -04:00
|
|
|
"net/http"
|
2021-02-21 17:54:15 -05:00
|
|
|
"os"
|
2021-11-02 17:46:15 -04:00
|
|
|
"os/signal"
|
2021-10-06 18:06:07 -04:00
|
|
|
"sort"
|
2021-04-23 16:54:35 -04:00
|
|
|
"strings"
|
2021-02-23 15:07:52 -05:00
|
|
|
"sync"
|
2021-11-02 17:46:15 -04:00
|
|
|
"syscall"
|
2021-05-22 20:15:29 -04:00
|
|
|
"time"
|
2020-06-21 06:32:08 -04:00
|
|
|
|
2021-10-18 15:27:52 -04:00
|
|
|
"github.com/coreos/go-oidc/v3/oidc"
|
2022-06-18 12:41:42 -04:00
|
|
|
"github.com/gorilla/mux"
|
2022-09-04 05:34:23 -04:00
|
|
|
grpcMiddleware "github.com/grpc-ecosystem/go-grpc-middleware"
|
2021-10-26 16:42:56 -04:00
|
|
|
"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
|
2021-11-04 18:18:55 -04:00
|
|
|
v1 "github.com/juanfont/headscale/gen/go/headscale/v1"
|
2021-11-13 03:39:04 -05:00
|
|
|
"github.com/patrickmn/go-cache"
|
|
|
|
zerolog "github.com/philip-bui/grpc-zerolog"
|
2022-07-15 14:03:46 -04:00
|
|
|
"github.com/prometheus/client_golang/prometheus/promhttp"
|
2022-10-27 16:09:29 -04:00
|
|
|
"github.com/puzpuzpuz/xsync/v2"
|
2021-11-08 17:06:25 -05:00
|
|
|
zl "github.com/rs/zerolog"
|
2021-10-26 16:42:56 -04:00
|
|
|
"github.com/rs/zerolog/log"
|
2021-10-03 14:26:38 -04:00
|
|
|
"golang.org/x/crypto/acme"
|
2021-04-23 22:54:15 -04:00
|
|
|
"golang.org/x/crypto/acme/autocert"
|
2021-11-13 03:39:04 -05:00
|
|
|
"golang.org/x/oauth2"
|
2021-10-26 16:42:56 -04:00
|
|
|
"golang.org/x/sync/errgroup"
|
|
|
|
"google.golang.org/grpc"
|
2021-10-29 12:45:06 -04:00
|
|
|
"google.golang.org/grpc/codes"
|
2022-02-12 12:05:30 -05:00
|
|
|
"google.golang.org/grpc/credentials"
|
2022-02-12 14:48:05 -05:00
|
|
|
"google.golang.org/grpc/credentials/insecure"
|
2021-10-29 12:45:06 -04:00
|
|
|
"google.golang.org/grpc/metadata"
|
|
|
|
"google.golang.org/grpc/peer"
|
|
|
|
"google.golang.org/grpc/reflection"
|
|
|
|
"google.golang.org/grpc/status"
|
2021-07-04 15:40:46 -04:00
|
|
|
"gorm.io/gorm"
|
2021-02-20 17:57:06 -05:00
|
|
|
"tailscale.com/tailcfg"
|
2021-10-02 06:13:05 -04:00
|
|
|
"tailscale.com/types/dnstype"
|
2021-11-26 18:28:06 -05:00
|
|
|
"tailscale.com/types/key"
|
2020-06-21 06:32:08 -04:00
|
|
|
)
|
|
|
|
|
2022-03-16 14:46:59 -04:00
|
|
|
const (
|
|
|
|
errSTUNAddressNotSet = Error("STUN address not set")
|
|
|
|
errUnsupportedDatabase = Error("unsupported DB")
|
|
|
|
errUnsupportedLetsEncryptChallengeType = Error(
|
|
|
|
"unknown value for Lets Encrypt challenge type",
|
|
|
|
)
|
2022-08-13 08:46:23 -04:00
|
|
|
|
|
|
|
ErrFailedPrivateKey = Error("failed to read or create private key")
|
2022-09-26 05:34:04 -04:00
|
|
|
ErrFailedNoisePrivateKey = Error(
|
|
|
|
"failed to read or create Noise protocol private key",
|
|
|
|
)
|
|
|
|
ErrSamePrivateKeys = Error("private key and noise private key are the same")
|
2022-03-16 14:46:59 -04:00
|
|
|
)
|
|
|
|
|
2021-10-29 12:45:06 -04:00
|
|
|
const (
|
2022-06-17 04:58:22 -04:00
|
|
|
AuthPrefix = "Bearer "
|
|
|
|
Postgres = "postgres"
|
|
|
|
Sqlite = "sqlite3"
|
|
|
|
updateInterval = 5000
|
|
|
|
HTTPReadTimeout = 30 * time.Second
|
|
|
|
HTTPShutdownTimeout = 3 * time.Second
|
|
|
|
privateKeyFileMode = 0o600
|
2021-11-15 14:18:14 -05:00
|
|
|
|
2022-02-28 17:42:30 -05:00
|
|
|
registerCacheExpiration = time.Minute * 15
|
|
|
|
registerCacheCleanup = time.Minute * 20
|
2021-11-22 14:32:52 -05:00
|
|
|
|
2022-01-30 10:46:57 -05:00
|
|
|
DisabledClientAuth = "disabled"
|
|
|
|
RelaxedClientAuth = "relaxed"
|
|
|
|
EnforcedClientAuth = "enforced"
|
2021-10-29 12:45:06 -04:00
|
|
|
)
|
|
|
|
|
2021-10-26 16:42:56 -04:00
|
|
|
// Headscale represents the base app of the service.
|
2020-06-21 06:32:08 -04:00
|
|
|
type Headscale struct {
|
2022-08-13 05:14:38 -04:00
|
|
|
cfg *Config
|
|
|
|
db *gorm.DB
|
|
|
|
dbString string
|
|
|
|
dbType string
|
|
|
|
dbDebug bool
|
|
|
|
privateKey *key.MachinePrivate
|
|
|
|
noisePrivateKey *key.MachinePrivate
|
2021-02-23 15:07:52 -05:00
|
|
|
|
2022-08-13 14:55:37 -04:00
|
|
|
noiseMux *mux.Router
|
|
|
|
|
2022-03-05 10:22:02 -05:00
|
|
|
DERPMap *tailcfg.DERPMap
|
|
|
|
DERPServer *DERPServer
|
2021-10-22 12:55:14 -04:00
|
|
|
|
2021-07-03 11:31:32 -04:00
|
|
|
aclPolicy *ACLPolicy
|
2021-11-04 18:18:55 -04:00
|
|
|
aclRules []tailcfg.FilterRule
|
2021-07-03 11:31:32 -04:00
|
|
|
|
2022-10-27 16:09:29 -04:00
|
|
|
lastStateChange *xsync.MapOf[string, time.Time]
|
2021-10-08 05:43:52 -04:00
|
|
|
|
2022-02-28 17:42:30 -05:00
|
|
|
oidcProvider *oidc.Provider
|
|
|
|
oauth2Config *oauth2.Config
|
2022-02-24 08:18:18 -05:00
|
|
|
|
2022-02-28 03:06:39 -05:00
|
|
|
registrationCache *cache.Cache
|
|
|
|
|
2022-02-24 08:18:18 -05:00
|
|
|
ipAllocationMutex sync.Mutex
|
2022-06-23 13:40:07 -04:00
|
|
|
|
2022-07-11 14:33:24 -04:00
|
|
|
shutdownChan chan struct{}
|
|
|
|
pollNetMapStreamWG sync.WaitGroup
|
2020-06-21 06:32:08 -04:00
|
|
|
}
|
|
|
|
|
2022-02-20 09:06:14 -05:00
|
|
|
// Look up the TLS constant relative to user-supplied TLS client
|
|
|
|
// authentication mode. If an unknown mode is supplied, the default
|
|
|
|
// value, tls.RequireAnyClientCert, is returned. The returned boolean
|
|
|
|
// indicates if the supplied mode was valid.
|
|
|
|
func LookupTLSClientAuthMode(mode string) (tls.ClientAuthType, bool) {
|
|
|
|
switch mode {
|
|
|
|
case DisabledClientAuth:
|
|
|
|
// Client cert is _not_ required.
|
|
|
|
return tls.NoClientCert, true
|
|
|
|
case RelaxedClientAuth:
|
|
|
|
// Client cert required, but _not verified_.
|
|
|
|
return tls.RequireAnyClientCert, true
|
|
|
|
case EnforcedClientAuth:
|
|
|
|
// Client cert is _required and verified_.
|
|
|
|
return tls.RequireAndVerifyClientCert, true
|
|
|
|
default:
|
2022-02-21 10:09:23 -05:00
|
|
|
// Return the default when an unknown value is supplied.
|
2022-02-20 09:06:14 -05:00
|
|
|
return tls.RequireAnyClientCert, false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-05 11:47:26 -04:00
|
|
|
func NewHeadscale(cfg *Config) (*Headscale, error) {
|
2022-08-13 05:14:38 -04:00
|
|
|
privateKey, err := readOrCreatePrivateKey(cfg.PrivateKeyPath)
|
2021-11-28 04:17:18 -05:00
|
|
|
if err != nil {
|
2022-08-13 08:46:23 -04:00
|
|
|
return nil, ErrFailedPrivateKey
|
2021-11-28 04:17:18 -05:00
|
|
|
}
|
2021-05-15 08:32:26 -04:00
|
|
|
|
2022-08-19 18:23:33 -04:00
|
|
|
// TS2021 requires to have a different key from the legacy protocol.
|
2022-08-13 05:14:38 -04:00
|
|
|
noisePrivateKey, err := readOrCreatePrivateKey(cfg.NoisePrivateKeyPath)
|
|
|
|
if err != nil {
|
2022-08-13 08:46:23 -04:00
|
|
|
return nil, ErrFailedNoisePrivateKey
|
2022-08-13 05:14:38 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if privateKey.Equal(*noisePrivateKey) {
|
2022-08-13 08:46:23 -04:00
|
|
|
return nil, ErrSamePrivateKeys
|
2022-08-13 05:14:38 -04:00
|
|
|
}
|
|
|
|
|
2021-05-15 08:32:26 -04:00
|
|
|
var dbString string
|
|
|
|
switch cfg.DBtype {
|
2021-11-15 12:24:24 -05:00
|
|
|
case Postgres:
|
2021-11-13 03:36:45 -05:00
|
|
|
dbString = fmt.Sprintf(
|
2022-08-16 03:56:36 -04:00
|
|
|
"host=%s dbname=%s user=%s",
|
2021-11-13 03:36:45 -05:00
|
|
|
cfg.DBhost,
|
|
|
|
cfg.DBname,
|
|
|
|
cfg.DBuser,
|
|
|
|
)
|
2022-08-12 13:00:16 -04:00
|
|
|
|
2022-08-16 03:50:30 -04:00
|
|
|
if !cfg.DBssl {
|
2022-08-17 15:12:45 -04:00
|
|
|
dbString += " sslmode=disable"
|
2022-08-17 14:32:20 -04:00
|
|
|
}
|
2022-08-16 03:56:36 -04:00
|
|
|
|
2022-08-12 13:00:16 -04:00
|
|
|
if cfg.DBport != 0 {
|
|
|
|
dbString += fmt.Sprintf(" port=%d", cfg.DBport)
|
|
|
|
}
|
|
|
|
|
|
|
|
if cfg.DBpass != "" {
|
|
|
|
dbString += fmt.Sprintf(" password=%s", cfg.DBpass)
|
|
|
|
}
|
2021-11-15 12:24:24 -05:00
|
|
|
case Sqlite:
|
2021-05-15 08:32:26 -04:00
|
|
|
dbString = cfg.DBpath
|
|
|
|
default:
|
2021-11-15 14:18:14 -05:00
|
|
|
return nil, errUnsupportedDatabase
|
2021-05-15 08:32:26 -04:00
|
|
|
}
|
|
|
|
|
2022-02-28 03:06:39 -05:00
|
|
|
registrationCache := cache.New(
|
2022-02-28 17:42:30 -05:00
|
|
|
registerCacheExpiration,
|
|
|
|
registerCacheCleanup,
|
2022-02-28 03:06:39 -05:00
|
|
|
)
|
|
|
|
|
2021-11-14 14:32:03 -05:00
|
|
|
app := Headscale{
|
2022-07-11 14:33:24 -04:00
|
|
|
cfg: cfg,
|
|
|
|
dbType: cfg.DBtype,
|
|
|
|
dbString: dbString,
|
2022-08-13 05:14:38 -04:00
|
|
|
privateKey: privateKey,
|
|
|
|
noisePrivateKey: noisePrivateKey,
|
2022-07-11 14:33:24 -04:00
|
|
|
aclRules: tailcfg.FilterAllowAll, // default allowall
|
|
|
|
registrationCache: registrationCache,
|
|
|
|
pollNetMapStreamWG: sync.WaitGroup{},
|
2020-06-21 06:32:08 -04:00
|
|
|
}
|
2021-07-04 07:24:05 -04:00
|
|
|
|
2021-11-28 04:17:18 -05:00
|
|
|
err = app.initDB()
|
2020-06-21 06:32:08 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-07-04 15:40:46 -04:00
|
|
|
|
2021-10-18 15:27:52 -04:00
|
|
|
if cfg.OIDC.Issuer != "" {
|
2021-11-14 14:32:03 -05:00
|
|
|
err = app.initOIDC()
|
2022-09-27 05:51:00 -04:00
|
|
|
if err != nil {
|
|
|
|
if cfg.OIDC.OnlyStartIfOIDCIsAvailable {
|
|
|
|
return nil, err
|
|
|
|
} else {
|
|
|
|
log.Warn().Err(err).Msg("failed to set up OIDC provider, falling back to CLI based authentication")
|
|
|
|
}
|
2021-10-08 05:43:52 -04:00
|
|
|
}
|
2021-10-18 15:27:52 -04:00
|
|
|
}
|
2021-10-16 10:31:37 -04:00
|
|
|
|
2021-11-14 14:32:03 -05:00
|
|
|
if app.cfg.DNSConfig != nil && app.cfg.DNSConfig.Proxied { // if MagicDNS
|
2022-01-16 08:16:59 -05:00
|
|
|
magicDNSDomains := generateMagicDNSRootDomains(app.cfg.IPPrefixes)
|
2021-10-20 03:35:56 -04:00
|
|
|
// we might have routes already from Split DNS
|
2021-11-14 14:32:03 -05:00
|
|
|
if app.cfg.DNSConfig.Routes == nil {
|
2022-06-11 11:33:48 -04:00
|
|
|
app.cfg.DNSConfig.Routes = make(map[string][]*dnstype.Resolver)
|
2021-10-19 14:51:43 -04:00
|
|
|
}
|
2021-10-10 06:43:41 -04:00
|
|
|
for _, d := range magicDNSDomains {
|
2021-11-14 14:32:03 -05:00
|
|
|
app.cfg.DNSConfig.Routes[d.WithoutTrailingDot()] = nil
|
2021-10-02 06:13:05 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-05 10:22:02 -05:00
|
|
|
if cfg.DERP.ServerEnabled {
|
|
|
|
embeddedDERPServer, err := app.NewDERPServer()
|
2022-03-03 18:01:31 -05:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-03-05 10:22:02 -05:00
|
|
|
app.DERPServer = embeddedDERPServer
|
2022-03-03 18:01:31 -05:00
|
|
|
}
|
|
|
|
|
2021-11-14 14:32:03 -05:00
|
|
|
return &app, nil
|
2020-06-21 06:32:08 -04:00
|
|
|
}
|
|
|
|
|
2021-10-26 16:42:56 -04:00
|
|
|
// Redirect to our TLS url.
|
2021-04-23 22:54:15 -04:00
|
|
|
func (h *Headscale) redirect(w http.ResponseWriter, req *http.Request) {
|
|
|
|
target := h.cfg.ServerURL + req.URL.RequestURI()
|
|
|
|
http.Redirect(w, req, target, http.StatusFound)
|
|
|
|
}
|
|
|
|
|
2021-08-12 15:45:40 -04:00
|
|
|
// expireEphemeralNodes deletes ephemeral machine records that have not been
|
2021-10-26 16:42:56 -04:00
|
|
|
// seen for longer than h.cfg.EphemeralNodeInactivityTimeout.
|
2021-08-12 15:45:40 -04:00
|
|
|
func (h *Headscale) expireEphemeralNodes(milliSeconds int64) {
|
2021-05-22 20:15:29 -04:00
|
|
|
ticker := time.NewTicker(time.Duration(milliSeconds) * time.Millisecond)
|
|
|
|
for range ticker.C {
|
|
|
|
h.expireEphemeralNodesWorker()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *Headscale) expireEphemeralNodesWorker() {
|
|
|
|
namespaces, err := h.ListNamespaces()
|
|
|
|
if err != nil {
|
2021-08-05 13:11:26 -04:00
|
|
|
log.Error().Err(err).Msg("Error listing namespaces")
|
2021-10-26 16:42:56 -04:00
|
|
|
|
2021-05-22 20:15:29 -04:00
|
|
|
return
|
|
|
|
}
|
2021-10-26 16:42:56 -04:00
|
|
|
|
2021-11-14 14:32:03 -05:00
|
|
|
for _, namespace := range namespaces {
|
|
|
|
machines, err := h.ListMachinesInNamespace(namespace.Name)
|
2021-05-22 20:15:29 -04:00
|
|
|
if err != nil {
|
2021-11-13 03:36:45 -05:00
|
|
|
log.Error().
|
|
|
|
Err(err).
|
2021-11-14 14:32:03 -05:00
|
|
|
Str("namespace", namespace.Name).
|
2021-11-13 03:36:45 -05:00
|
|
|
Msg("Error listing machines in namespace")
|
2021-10-26 16:42:56 -04:00
|
|
|
|
2021-05-22 20:15:29 -04:00
|
|
|
return
|
|
|
|
}
|
2021-10-26 16:42:56 -04:00
|
|
|
|
2022-04-30 10:47:16 -04:00
|
|
|
expiredFound := false
|
2021-11-14 14:32:03 -05:00
|
|
|
for _, machine := range machines {
|
|
|
|
if machine.AuthKey != nil && machine.LastSeen != nil &&
|
|
|
|
machine.AuthKey.Ephemeral &&
|
|
|
|
time.Now().
|
|
|
|
After(machine.LastSeen.Add(h.cfg.EphemeralNodeInactivityTimeout)) {
|
2022-04-30 10:47:16 -04:00
|
|
|
expiredFound = true
|
2021-11-13 03:36:45 -05:00
|
|
|
log.Info().
|
2022-04-24 15:54:38 -04:00
|
|
|
Str("machine", machine.Hostname).
|
2021-11-13 03:36:45 -05:00
|
|
|
Msg("Ephemeral client removed from database")
|
2021-10-26 16:42:56 -04:00
|
|
|
|
2021-11-14 14:32:03 -05:00
|
|
|
err = h.db.Unscoped().Delete(machine).Error
|
2021-05-22 20:15:29 -04:00
|
|
|
if err != nil {
|
2021-10-22 12:55:14 -04:00
|
|
|
log.Error().
|
|
|
|
Err(err).
|
2022-04-24 15:54:38 -04:00
|
|
|
Str("machine", machine.Hostname).
|
2021-10-22 12:55:14 -04:00
|
|
|
Msg("🤮 Cannot delete ephemeral machine from the database")
|
2021-05-22 20:15:29 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-10-26 16:42:56 -04:00
|
|
|
|
2022-04-30 10:47:16 -04:00
|
|
|
if expiredFound {
|
2022-08-16 07:39:15 -04:00
|
|
|
h.setLastStateChangeToNow()
|
2022-04-30 10:47:16 -04:00
|
|
|
}
|
2021-05-22 20:15:29 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-10-29 12:45:06 -04:00
|
|
|
func (h *Headscale) grpcAuthenticationInterceptor(ctx context.Context,
|
|
|
|
req interface{},
|
|
|
|
info *grpc.UnaryServerInfo,
|
2022-04-30 17:48:28 -04:00
|
|
|
handler grpc.UnaryHandler,
|
|
|
|
) (interface{}, error) {
|
2021-10-29 12:45:06 -04:00
|
|
|
// Check if the request is coming from the on-server client.
|
|
|
|
// This is not secure, but it is to maintain maintainability
|
|
|
|
// with the "legacy" database-based client
|
|
|
|
// It is also neede for grpc-gateway to be able to connect to
|
|
|
|
// the server
|
2021-11-14 14:32:03 -05:00
|
|
|
client, _ := peer.FromContext(ctx)
|
2021-10-29 12:45:06 -04:00
|
|
|
|
2021-11-13 03:36:45 -05:00
|
|
|
log.Trace().
|
|
|
|
Caller().
|
2021-11-14 14:32:03 -05:00
|
|
|
Str("client_address", client.Addr.String()).
|
2021-11-13 03:36:45 -05:00
|
|
|
Msg("Client is trying to authenticate")
|
2021-10-29 12:45:06 -04:00
|
|
|
|
2021-11-14 14:32:03 -05:00
|
|
|
meta, ok := metadata.FromIncomingContext(ctx)
|
2021-10-29 12:45:06 -04:00
|
|
|
if !ok {
|
2021-11-13 03:36:45 -05:00
|
|
|
log.Error().
|
|
|
|
Caller().
|
2021-11-14 14:32:03 -05:00
|
|
|
Str("client_address", client.Addr.String()).
|
2021-11-13 03:36:45 -05:00
|
|
|
Msg("Retrieving metadata is failed")
|
2021-11-14 10:46:09 -05:00
|
|
|
|
2021-11-13 03:36:45 -05:00
|
|
|
return ctx, status.Errorf(
|
|
|
|
codes.InvalidArgument,
|
|
|
|
"Retrieving metadata is failed",
|
|
|
|
)
|
2021-10-29 12:45:06 -04:00
|
|
|
}
|
|
|
|
|
2021-11-14 14:32:03 -05:00
|
|
|
authHeader, ok := meta["authorization"]
|
2021-10-29 12:45:06 -04:00
|
|
|
if !ok {
|
2021-11-13 03:36:45 -05:00
|
|
|
log.Error().
|
|
|
|
Caller().
|
2021-11-14 14:32:03 -05:00
|
|
|
Str("client_address", client.Addr.String()).
|
2021-11-13 03:36:45 -05:00
|
|
|
Msg("Authorization token is not supplied")
|
2021-11-14 10:46:09 -05:00
|
|
|
|
2021-11-13 03:36:45 -05:00
|
|
|
return ctx, status.Errorf(
|
|
|
|
codes.Unauthenticated,
|
|
|
|
"Authorization token is not supplied",
|
|
|
|
)
|
2021-10-29 12:45:06 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
token := authHeader[0]
|
|
|
|
|
2021-11-15 12:24:24 -05:00
|
|
|
if !strings.HasPrefix(token, AuthPrefix) {
|
2021-10-29 12:45:06 -04:00
|
|
|
log.Error().
|
|
|
|
Caller().
|
2021-11-14 14:32:03 -05:00
|
|
|
Str("client_address", client.Addr.String()).
|
2021-10-29 12:45:06 -04:00
|
|
|
Msg(`missing "Bearer " prefix in "Authorization" header`)
|
2021-11-14 10:46:09 -05:00
|
|
|
|
2021-11-13 03:36:45 -05:00
|
|
|
return ctx, status.Error(
|
|
|
|
codes.Unauthenticated,
|
|
|
|
`missing "Bearer " prefix in "Authorization" header`,
|
|
|
|
)
|
2021-10-29 12:45:06 -04:00
|
|
|
}
|
|
|
|
|
2022-01-25 17:11:15 -05:00
|
|
|
valid, err := h.ValidateAPIKey(strings.TrimPrefix(token, AuthPrefix))
|
|
|
|
if err != nil {
|
|
|
|
log.Error().
|
|
|
|
Caller().
|
|
|
|
Err(err).
|
|
|
|
Str("client_address", client.Addr.String()).
|
|
|
|
Msg("failed to validate token")
|
|
|
|
|
|
|
|
return ctx, status.Error(codes.Internal, "failed to validate token")
|
|
|
|
}
|
|
|
|
|
|
|
|
if !valid {
|
|
|
|
log.Info().
|
|
|
|
Str("client_address", client.Addr.String()).
|
|
|
|
Msg("invalid token")
|
2021-10-29 12:45:06 -04:00
|
|
|
|
2022-01-25 17:11:15 -05:00
|
|
|
return ctx, status.Error(codes.Unauthenticated, "invalid token")
|
|
|
|
}
|
2021-10-29 12:45:06 -04:00
|
|
|
|
2022-01-25 17:11:15 -05:00
|
|
|
return handler(ctx, req)
|
2021-10-29 12:45:06 -04:00
|
|
|
}
|
|
|
|
|
2022-06-18 12:41:42 -04:00
|
|
|
func (h *Headscale) httpAuthenticationMiddleware(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(
|
2022-06-26 05:55:37 -04:00
|
|
|
writer http.ResponseWriter,
|
|
|
|
req *http.Request,
|
2022-06-18 12:41:42 -04:00
|
|
|
) {
|
|
|
|
log.Trace().
|
|
|
|
Caller().
|
2022-06-26 05:55:37 -04:00
|
|
|
Str("client_address", req.RemoteAddr).
|
2022-06-18 12:41:42 -04:00
|
|
|
Msg("HTTP authentication invoked")
|
2021-10-29 12:45:06 -04:00
|
|
|
|
2022-06-26 05:55:37 -04:00
|
|
|
authHeader := req.Header.Get("authorization")
|
2021-10-29 12:45:06 -04:00
|
|
|
|
2022-06-18 12:41:42 -04:00
|
|
|
if !strings.HasPrefix(authHeader, AuthPrefix) {
|
|
|
|
log.Error().
|
|
|
|
Caller().
|
2022-06-26 05:55:37 -04:00
|
|
|
Str("client_address", req.RemoteAddr).
|
2022-06-18 12:41:42 -04:00
|
|
|
Msg(`missing "Bearer " prefix in "Authorization" header`)
|
2022-06-26 05:55:37 -04:00
|
|
|
writer.WriteHeader(http.StatusUnauthorized)
|
2022-06-26 06:21:35 -04:00
|
|
|
_, err := writer.Write([]byte("Unauthorized"))
|
|
|
|
if err != nil {
|
|
|
|
log.Error().
|
|
|
|
Caller().
|
|
|
|
Err(err).
|
|
|
|
Msg("Failed to write response")
|
|
|
|
}
|
2021-10-29 12:45:06 -04:00
|
|
|
|
2022-06-18 12:41:42 -04:00
|
|
|
return
|
|
|
|
}
|
2021-10-29 12:45:06 -04:00
|
|
|
|
2022-06-18 12:41:42 -04:00
|
|
|
valid, err := h.ValidateAPIKey(strings.TrimPrefix(authHeader, AuthPrefix))
|
|
|
|
if err != nil {
|
|
|
|
log.Error().
|
|
|
|
Caller().
|
|
|
|
Err(err).
|
2022-06-26 05:55:37 -04:00
|
|
|
Str("client_address", req.RemoteAddr).
|
2022-06-18 12:41:42 -04:00
|
|
|
Msg("failed to validate token")
|
2022-01-25 17:11:15 -05:00
|
|
|
|
2022-06-26 05:55:37 -04:00
|
|
|
writer.WriteHeader(http.StatusInternalServerError)
|
2022-06-26 06:21:35 -04:00
|
|
|
_, err := writer.Write([]byte("Unauthorized"))
|
|
|
|
if err != nil {
|
|
|
|
log.Error().
|
|
|
|
Caller().
|
|
|
|
Err(err).
|
|
|
|
Msg("Failed to write response")
|
|
|
|
}
|
2022-01-25 17:11:15 -05:00
|
|
|
|
2022-06-18 12:41:42 -04:00
|
|
|
return
|
|
|
|
}
|
2022-01-25 17:11:15 -05:00
|
|
|
|
2022-06-18 12:41:42 -04:00
|
|
|
if !valid {
|
|
|
|
log.Info().
|
2022-06-26 05:55:37 -04:00
|
|
|
Str("client_address", req.RemoteAddr).
|
2022-06-18 12:41:42 -04:00
|
|
|
Msg("invalid token")
|
2022-01-25 17:11:15 -05:00
|
|
|
|
2022-06-26 05:55:37 -04:00
|
|
|
writer.WriteHeader(http.StatusUnauthorized)
|
2022-06-26 06:21:35 -04:00
|
|
|
_, err := writer.Write([]byte("Unauthorized"))
|
|
|
|
if err != nil {
|
|
|
|
log.Error().
|
|
|
|
Caller().
|
|
|
|
Err(err).
|
|
|
|
Msg("Failed to write response")
|
|
|
|
}
|
2021-10-29 12:45:06 -04:00
|
|
|
|
2022-06-18 12:41:42 -04:00
|
|
|
return
|
|
|
|
}
|
2021-10-29 12:45:06 -04:00
|
|
|
|
2022-06-26 05:55:37 -04:00
|
|
|
next.ServeHTTP(writer, req)
|
2022-06-18 12:41:42 -04:00
|
|
|
})
|
2021-10-29 12:45:06 -04:00
|
|
|
}
|
|
|
|
|
2021-11-07 04:55:32 -05:00
|
|
|
// ensureUnixSocketIsAbsent will check if the given path for headscales unix socket is clear
|
|
|
|
// and will remove it if it is not.
|
|
|
|
func (h *Headscale) ensureUnixSocketIsAbsent() error {
|
|
|
|
// File does not exist, all fine
|
|
|
|
if _, err := os.Stat(h.cfg.UnixSocket); errors.Is(err, os.ErrNotExist) {
|
|
|
|
return nil
|
|
|
|
}
|
2021-11-14 10:46:09 -05:00
|
|
|
|
2021-11-07 04:55:32 -05:00
|
|
|
return os.Remove(h.cfg.UnixSocket)
|
|
|
|
}
|
|
|
|
|
2022-06-18 12:41:42 -04:00
|
|
|
func (h *Headscale) createRouter(grpcMux *runtime.ServeMux) *mux.Router {
|
|
|
|
router := mux.NewRouter()
|
2022-02-12 08:25:27 -05:00
|
|
|
|
2022-08-13 14:55:37 -04:00
|
|
|
router.HandleFunc(ts2021UpgradePath, h.NoiseUpgradeHandler).Methods(http.MethodPost)
|
|
|
|
|
2022-07-06 07:39:10 -04:00
|
|
|
router.HandleFunc("/health", h.HealthHandler).Methods(http.MethodGet)
|
2022-06-18 12:41:42 -04:00
|
|
|
router.HandleFunc("/key", h.KeyHandler).Methods(http.MethodGet)
|
2022-08-11 06:11:02 -04:00
|
|
|
router.HandleFunc("/register/{nkey}", h.RegisterWebAPI).Methods(http.MethodGet)
|
2022-11-04 06:26:33 -04:00
|
|
|
h.addLegacyHandlers(router)
|
|
|
|
|
2022-08-11 06:15:16 -04:00
|
|
|
router.HandleFunc("/oidc/register/{nkey}", h.RegisterOIDC).Methods(http.MethodGet)
|
2022-06-18 12:41:42 -04:00
|
|
|
router.HandleFunc("/oidc/callback", h.OIDCCallback).Methods(http.MethodGet)
|
|
|
|
router.HandleFunc("/apple", h.AppleConfigMessage).Methods(http.MethodGet)
|
2022-09-26 05:34:04 -04:00
|
|
|
router.HandleFunc("/apple/{platform}", h.ApplePlatformConfig).
|
|
|
|
Methods(http.MethodGet)
|
2022-06-18 12:41:42 -04:00
|
|
|
router.HandleFunc("/windows", h.WindowsConfigMessage).Methods(http.MethodGet)
|
2022-09-26 05:34:04 -04:00
|
|
|
router.HandleFunc("/windows/tailscale.reg", h.WindowsRegConfig).
|
|
|
|
Methods(http.MethodGet)
|
2022-06-18 12:41:42 -04:00
|
|
|
router.HandleFunc("/swagger", SwaggerUI).Methods(http.MethodGet)
|
2022-09-26 05:34:04 -04:00
|
|
|
router.HandleFunc("/swagger/v1/openapiv2.json", SwaggerAPIv1).
|
|
|
|
Methods(http.MethodGet)
|
2022-02-12 08:25:27 -05:00
|
|
|
|
2022-03-05 10:22:02 -05:00
|
|
|
if h.cfg.DERP.ServerEnabled {
|
2022-06-18 12:41:42 -04:00
|
|
|
router.HandleFunc("/derp", h.DERPHandler)
|
|
|
|
router.HandleFunc("/derp/probe", h.DERPProbeHandler)
|
|
|
|
router.HandleFunc("/bootstrap-dns", h.DERPBootstrapDNSHandler)
|
2022-03-03 18:01:31 -05:00
|
|
|
}
|
|
|
|
|
2022-07-21 17:57:07 -04:00
|
|
|
apiRouter := router.PathPrefix("/api").Subrouter()
|
|
|
|
apiRouter.Use(h.httpAuthenticationMiddleware)
|
|
|
|
apiRouter.PathPrefix("/v1/").HandlerFunc(grpcMux.ServeHTTP)
|
2022-02-12 08:25:27 -05:00
|
|
|
|
2022-06-18 12:41:42 -04:00
|
|
|
router.PathPrefix("/").HandlerFunc(stdoutHandler)
|
2022-02-12 08:25:27 -05:00
|
|
|
|
|
|
|
return router
|
|
|
|
}
|
|
|
|
|
2022-08-13 14:55:37 -04:00
|
|
|
func (h *Headscale) createNoiseMux() *mux.Router {
|
|
|
|
router := mux.NewRouter()
|
|
|
|
|
2022-09-26 05:34:04 -04:00
|
|
|
router.HandleFunc("/machine/register", h.NoiseRegistrationHandler).
|
|
|
|
Methods(http.MethodPost)
|
2022-08-14 15:07:05 -04:00
|
|
|
router.HandleFunc("/machine/map", h.NoisePollNetMapHandler)
|
2022-08-13 14:55:37 -04:00
|
|
|
|
|
|
|
return router
|
|
|
|
}
|
|
|
|
|
2021-10-26 16:42:56 -04:00
|
|
|
// Serve launches a GIN server with the Headscale API.
|
2020-06-21 06:32:08 -04:00
|
|
|
func (h *Headscale) Serve() error {
|
2021-10-26 16:42:56 -04:00
|
|
|
var err error
|
|
|
|
|
2022-03-05 14:04:31 -05:00
|
|
|
// Fetch an initial DERP Map before we start serving
|
|
|
|
h.DERPMap = GetDERPMap(h.cfg.DERP)
|
|
|
|
|
2022-03-05 10:22:02 -05:00
|
|
|
if h.cfg.DERP.ServerEnabled {
|
2022-03-18 08:10:35 -04:00
|
|
|
// When embedded DERP is enabled we always need a STUN server
|
2022-03-16 13:45:34 -04:00
|
|
|
if h.cfg.DERP.STUNAddr == "" {
|
2022-03-15 08:22:25 -04:00
|
|
|
return errSTUNAddressNotSet
|
|
|
|
}
|
|
|
|
|
2022-03-05 14:04:31 -05:00
|
|
|
h.DERPMap.Regions[h.DERPServer.region.RegionID] = &h.DERPServer.region
|
2022-03-18 08:10:35 -04:00
|
|
|
go h.ServeSTUN()
|
2022-03-05 14:04:31 -05:00
|
|
|
}
|
2021-10-26 16:42:56 -04:00
|
|
|
|
2022-03-05 14:04:31 -05:00
|
|
|
if h.cfg.DERP.AutoUpdate {
|
|
|
|
derpMapCancelChannel := make(chan struct{})
|
|
|
|
defer func() { derpMapCancelChannel <- struct{}{} }()
|
|
|
|
go h.scheduledDERPMapUpdateWorker(derpMapCancelChannel)
|
2022-02-12 08:25:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
go h.expireEphemeralNodes(updateInterval)
|
|
|
|
|
|
|
|
if zl.GlobalLevel() == zl.TraceLevel {
|
|
|
|
zerolog.RespLog = true
|
|
|
|
} else {
|
|
|
|
zerolog.RespLog = false
|
|
|
|
}
|
|
|
|
|
2022-02-12 12:05:30 -05:00
|
|
|
// Prepare group for running listeners
|
|
|
|
errorGroup := new(errgroup.Group)
|
|
|
|
|
|
|
|
ctx := context.Background()
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
2022-02-12 08:25:27 -05:00
|
|
|
//
|
|
|
|
//
|
|
|
|
// Set up LOCAL listeners
|
|
|
|
//
|
2021-10-26 16:42:56 -04:00
|
|
|
|
2021-11-07 04:55:32 -05:00
|
|
|
err = h.ensureUnixSocketIsAbsent()
|
|
|
|
if err != nil {
|
2021-12-07 02:46:55 -05:00
|
|
|
return fmt.Errorf("unable to remove old socket file: %w", err)
|
2021-11-07 04:55:32 -05:00
|
|
|
}
|
|
|
|
|
2021-10-30 10:08:16 -04:00
|
|
|
socketListener, err := net.Listen("unix", h.cfg.UnixSocket)
|
|
|
|
if err != nil {
|
2021-12-07 05:44:00 -05:00
|
|
|
return fmt.Errorf("failed to set up gRPC socket: %w", err)
|
2021-10-30 10:08:16 -04:00
|
|
|
}
|
|
|
|
|
2022-01-28 13:58:22 -05:00
|
|
|
// Change socket permissions
|
|
|
|
if err := os.Chmod(h.cfg.UnixSocket, h.cfg.UnixSocketPermission); err != nil {
|
|
|
|
return fmt.Errorf("failed change permission of gRPC socket: %w", err)
|
|
|
|
}
|
|
|
|
|
2021-10-26 16:42:56 -04:00
|
|
|
grpcGatewayMux := runtime.NewServeMux()
|
|
|
|
|
2021-10-30 10:08:16 -04:00
|
|
|
// Make the grpc-gateway connect to grpc over socket
|
|
|
|
grpcGatewayConn, err := grpc.Dial(
|
|
|
|
h.cfg.UnixSocket,
|
|
|
|
[]grpc.DialOption{
|
2022-02-12 14:48:05 -05:00
|
|
|
grpc.WithTransportCredentials(insecure.NewCredentials()),
|
2021-10-30 10:29:03 -04:00
|
|
|
grpc.WithContextDialer(GrpcSocketDialer),
|
2021-10-30 10:08:16 -04:00
|
|
|
}...,
|
|
|
|
)
|
2021-10-29 12:45:06 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-10-26 16:42:56 -04:00
|
|
|
|
2021-10-29 12:45:06 -04:00
|
|
|
// Connect to the gRPC server over localhost to skip
|
|
|
|
// the authentication.
|
2021-11-04 18:18:55 -04:00
|
|
|
err = v1.RegisterHeadscaleServiceHandler(ctx, grpcGatewayMux, grpcGatewayConn)
|
2021-10-26 16:42:56 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-10-31 15:52:34 -04:00
|
|
|
// Start the local gRPC server without TLS and without authentication
|
2021-11-04 18:18:55 -04:00
|
|
|
grpcSocket := grpc.NewServer(zerolog.UnaryInterceptor())
|
2021-10-31 15:52:34 -04:00
|
|
|
|
2021-11-04 18:18:55 -04:00
|
|
|
v1.RegisterHeadscaleServiceServer(grpcSocket, newHeadscaleV1APIServer(h))
|
2021-10-31 15:52:34 -04:00
|
|
|
reflection.Register(grpcSocket)
|
2021-10-29 12:45:06 -04:00
|
|
|
|
2022-02-12 12:05:30 -05:00
|
|
|
errorGroup.Go(func() error { return grpcSocket.Serve(socketListener) })
|
|
|
|
|
|
|
|
//
|
|
|
|
//
|
|
|
|
// Set up REMOTE listeners
|
|
|
|
//
|
|
|
|
|
|
|
|
tlsConfig, err := h.getTLSSettings()
|
|
|
|
if err != nil {
|
|
|
|
log.Error().Err(err).Msg("Failed to set up TLS configuration")
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
//
|
|
|
|
// gRPC setup
|
|
|
|
//
|
|
|
|
|
2022-02-12 14:48:05 -05:00
|
|
|
// We are sadly not able to run gRPC and HTTPS (2.0) on the same
|
|
|
|
// port because the connection mux does not support matching them
|
|
|
|
// since they are so similar. There is multiple issues open and we
|
|
|
|
// can revisit this if changes:
|
|
|
|
// https://github.com/soheilhy/cmux/issues/68
|
|
|
|
// https://github.com/soheilhy/cmux/issues/91
|
|
|
|
|
2022-06-30 17:35:22 -04:00
|
|
|
var grpcServer *grpc.Server
|
|
|
|
var grpcListener net.Listener
|
2022-02-13 04:08:46 -05:00
|
|
|
if tlsConfig != nil || h.cfg.GRPCAllowInsecure {
|
2022-02-12 12:05:30 -05:00
|
|
|
log.Info().Msgf("Enabling remote gRPC at %s", h.cfg.GRPCAddr)
|
|
|
|
|
|
|
|
grpcOptions := []grpc.ServerOption{
|
|
|
|
grpc.UnaryInterceptor(
|
2022-09-04 05:34:23 -04:00
|
|
|
grpcMiddleware.ChainUnaryServer(
|
2022-02-12 12:05:30 -05:00
|
|
|
h.grpcAuthenticationInterceptor,
|
|
|
|
zerolog.NewUnaryServerInterceptor(),
|
|
|
|
),
|
|
|
|
),
|
2022-02-13 04:08:46 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
if tlsConfig != nil {
|
|
|
|
grpcOptions = append(grpcOptions,
|
|
|
|
grpc.Creds(credentials.NewTLS(tlsConfig)),
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
log.Warn().Msg("gRPC is running without security")
|
2022-02-12 12:05:30 -05:00
|
|
|
}
|
|
|
|
|
2022-06-30 17:35:22 -04:00
|
|
|
grpcServer = grpc.NewServer(grpcOptions...)
|
2022-02-12 12:05:30 -05:00
|
|
|
|
|
|
|
v1.RegisterHeadscaleServiceServer(grpcServer, newHeadscaleV1APIServer(h))
|
|
|
|
reflection.Register(grpcServer)
|
|
|
|
|
2022-06-30 17:35:22 -04:00
|
|
|
grpcListener, err = net.Listen("tcp", h.cfg.GRPCAddr)
|
2022-02-12 12:05:30 -05:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to bind to TCP address: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
errorGroup.Go(func() error { return grpcServer.Serve(grpcListener) })
|
2022-02-12 14:30:25 -05:00
|
|
|
|
|
|
|
log.Info().
|
|
|
|
Msgf("listening and serving gRPC on: %s", h.cfg.GRPCAddr)
|
2022-02-12 11:15:26 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
//
|
|
|
|
// HTTP setup
|
|
|
|
//
|
2022-08-13 14:55:37 -04:00
|
|
|
// This is the regular router that we expose
|
|
|
|
// over our main Addr. It also serves the legacy Tailcale API
|
2022-02-12 11:15:26 -05:00
|
|
|
router := h.createRouter(grpcGatewayMux)
|
|
|
|
|
2022-08-13 14:55:37 -04:00
|
|
|
// This router is served only over the Noise connection, and exposes only the new API.
|
|
|
|
//
|
|
|
|
// The HTTP2 server that exposes this router is created for
|
|
|
|
// a single hijacked connection from /ts2021, using netutil.NewOneConnListener
|
|
|
|
h.noiseMux = h.createNoiseMux()
|
|
|
|
|
2022-02-12 11:15:26 -05:00
|
|
|
httpServer := &http.Server{
|
|
|
|
Addr: h.cfg.Addr,
|
|
|
|
Handler: router,
|
|
|
|
ReadTimeout: HTTPReadTimeout,
|
|
|
|
// Go does not handle timeouts in HTTP very well, and there is
|
|
|
|
// no good way to handle streaming timeouts, therefore we need to
|
|
|
|
// keep this at unlimited and be careful to clean up connections
|
|
|
|
// https://blog.cloudflare.com/the-complete-guide-to-golang-net-http-timeouts/#aboutstreaming
|
|
|
|
WriteTimeout: 0,
|
|
|
|
}
|
|
|
|
|
2022-02-12 11:33:18 -05:00
|
|
|
var httpListener net.Listener
|
2022-02-12 11:15:26 -05:00
|
|
|
if tlsConfig != nil {
|
|
|
|
httpServer.TLSConfig = tlsConfig
|
2022-02-12 11:33:18 -05:00
|
|
|
httpListener, err = tls.Listen("tcp", h.cfg.Addr, tlsConfig)
|
|
|
|
} else {
|
|
|
|
httpListener, err = net.Listen("tcp", h.cfg.Addr)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to bind to TCP address: %w", err)
|
2022-02-12 11:15:26 -05:00
|
|
|
}
|
|
|
|
|
2022-02-12 11:33:18 -05:00
|
|
|
errorGroup.Go(func() error { return httpServer.Serve(httpListener) })
|
2022-02-12 08:25:27 -05:00
|
|
|
|
2021-11-13 03:36:45 -05:00
|
|
|
log.Info().
|
2022-02-12 14:30:25 -05:00
|
|
|
Msgf("listening and serving HTTP on: %s", h.cfg.Addr)
|
2021-10-26 16:42:56 -04:00
|
|
|
|
2022-07-15 14:03:46 -04:00
|
|
|
promMux := http.NewServeMux()
|
|
|
|
promMux.Handle("/metrics", promhttp.Handler())
|
2022-02-21 10:50:15 -05:00
|
|
|
|
2022-02-28 08:40:02 -05:00
|
|
|
promHTTPServer := &http.Server{
|
|
|
|
Addr: h.cfg.MetricsAddr,
|
2022-07-15 14:03:46 -04:00
|
|
|
Handler: promMux,
|
2022-02-28 08:40:02 -05:00
|
|
|
ReadTimeout: HTTPReadTimeout,
|
|
|
|
WriteTimeout: 0,
|
|
|
|
}
|
2022-02-21 10:50:15 -05:00
|
|
|
|
2022-02-28 08:40:02 -05:00
|
|
|
var promHTTPListener net.Listener
|
|
|
|
promHTTPListener, err = net.Listen("tcp", h.cfg.MetricsAddr)
|
2022-02-21 10:50:15 -05:00
|
|
|
|
2022-02-28 08:40:02 -05:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to bind to TCP address: %w", err)
|
|
|
|
}
|
2022-02-21 10:50:15 -05:00
|
|
|
|
2022-02-28 08:40:02 -05:00
|
|
|
errorGroup.Go(func() error { return promHTTPServer.Serve(promHTTPListener) })
|
2022-02-21 10:50:15 -05:00
|
|
|
|
2022-02-28 08:40:02 -05:00
|
|
|
log.Info().
|
|
|
|
Msgf("listening and serving metrics on: %s", h.cfg.MetricsAddr)
|
2022-02-21 10:50:15 -05:00
|
|
|
|
2022-05-31 04:57:20 -04:00
|
|
|
// Handle common process-killing signals so we can gracefully shut down:
|
2022-06-23 13:40:07 -04:00
|
|
|
h.shutdownChan = make(chan struct{})
|
2022-05-31 04:57:20 -04:00
|
|
|
sigc := make(chan os.Signal, 1)
|
|
|
|
signal.Notify(sigc,
|
|
|
|
syscall.SIGHUP,
|
|
|
|
syscall.SIGINT,
|
|
|
|
syscall.SIGTERM,
|
|
|
|
syscall.SIGQUIT,
|
|
|
|
syscall.SIGHUP)
|
2022-07-11 14:33:24 -04:00
|
|
|
sigFunc := func(c chan os.Signal) {
|
2022-05-31 04:57:20 -04:00
|
|
|
// Wait for a SIGINT or SIGKILL:
|
2022-05-31 07:02:23 -04:00
|
|
|
for {
|
|
|
|
sig := <-c
|
|
|
|
switch sig {
|
|
|
|
case syscall.SIGHUP:
|
|
|
|
log.Info().
|
|
|
|
Str("signal", sig.String()).
|
|
|
|
Msg("Received SIGHUP, reloading ACL and Config")
|
|
|
|
|
2022-06-30 17:35:22 -04:00
|
|
|
// TODO(kradalby): Reload config on SIGHUP
|
2022-05-31 07:02:23 -04:00
|
|
|
|
|
|
|
if h.cfg.ACL.PolicyPath != "" {
|
|
|
|
aclPath := AbsolutePathFromConfigPath(h.cfg.ACL.PolicyPath)
|
|
|
|
err := h.LoadACLPolicy(aclPath)
|
|
|
|
if err != nil {
|
|
|
|
log.Error().Err(err).Msg("Failed to reload ACL policy")
|
|
|
|
}
|
|
|
|
log.Info().
|
|
|
|
Str("path", aclPath).
|
2022-06-11 07:54:44 -04:00
|
|
|
Msg("ACL policy successfully reloaded, notifying nodes of change")
|
|
|
|
|
|
|
|
h.setLastStateChangeToNow()
|
2022-05-31 07:02:23 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
default:
|
|
|
|
log.Info().
|
|
|
|
Str("signal", sig.String()).
|
|
|
|
Msg("Received signal to stop, shutting down gracefully")
|
|
|
|
|
2022-06-30 17:35:22 -04:00
|
|
|
close(h.shutdownChan)
|
2022-07-11 14:33:24 -04:00
|
|
|
h.pollNetMapStreamWG.Wait()
|
2022-06-23 13:40:07 -04:00
|
|
|
|
2022-05-31 07:02:23 -04:00
|
|
|
// Gracefully shut down servers
|
2022-08-04 04:47:00 -04:00
|
|
|
ctx, cancel := context.WithTimeout(
|
|
|
|
context.Background(),
|
|
|
|
HTTPShutdownTimeout,
|
|
|
|
)
|
2022-06-17 04:58:22 -04:00
|
|
|
if err := promHTTPServer.Shutdown(ctx); err != nil {
|
|
|
|
log.Error().Err(err).Msg("Failed to shutdown prometheus http")
|
|
|
|
}
|
|
|
|
if err := httpServer.Shutdown(ctx); err != nil {
|
|
|
|
log.Error().Err(err).Msg("Failed to shutdown http")
|
|
|
|
}
|
2022-05-31 07:02:23 -04:00
|
|
|
grpcSocket.GracefulStop()
|
|
|
|
|
2022-06-30 17:35:22 -04:00
|
|
|
if grpcServer != nil {
|
|
|
|
grpcServer.GracefulStop()
|
|
|
|
grpcListener.Close()
|
|
|
|
}
|
|
|
|
|
2022-05-31 07:02:23 -04:00
|
|
|
// Close network listeners
|
|
|
|
promHTTPListener.Close()
|
|
|
|
httpListener.Close()
|
|
|
|
grpcGatewayConn.Close()
|
|
|
|
|
|
|
|
// Stop listening (and unlink the socket if unix type):
|
|
|
|
socketListener.Close()
|
|
|
|
|
2022-06-17 04:58:22 -04:00
|
|
|
// Close db connections
|
|
|
|
db, err := h.db.DB()
|
|
|
|
if err != nil {
|
|
|
|
log.Error().Err(err).Msg("Failed to get db handle")
|
|
|
|
}
|
|
|
|
err = db.Close()
|
|
|
|
if err != nil {
|
|
|
|
log.Error().Err(err).Msg("Failed to close db")
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Info().
|
|
|
|
Msg("Headscale stopped")
|
|
|
|
|
2022-05-31 07:02:23 -04:00
|
|
|
// And we're done:
|
2022-06-17 04:58:22 -04:00
|
|
|
cancel()
|
2022-05-31 07:02:23 -04:00
|
|
|
os.Exit(0)
|
|
|
|
}
|
2022-05-31 04:57:20 -04:00
|
|
|
}
|
2022-06-30 17:35:22 -04:00
|
|
|
}
|
2022-07-11 14:33:24 -04:00
|
|
|
errorGroup.Go(func() error {
|
|
|
|
sigFunc(sigc)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
2022-05-31 04:57:20 -04:00
|
|
|
|
2021-11-14 14:32:03 -05:00
|
|
|
return errorGroup.Wait()
|
2021-10-26 16:42:56 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func (h *Headscale) getTLSSettings() (*tls.Config, error) {
|
2021-11-14 11:51:34 -05:00
|
|
|
var err error
|
2022-06-03 04:14:14 -04:00
|
|
|
if h.cfg.TLS.LetsEncrypt.Hostname != "" {
|
2021-04-23 22:54:15 -04:00
|
|
|
if !strings.HasPrefix(h.cfg.ServerURL, "https://") {
|
2021-11-13 03:36:45 -05:00
|
|
|
log.Warn().
|
|
|
|
Msg("Listening with TLS but ServerURL does not start with https://")
|
2021-04-23 22:54:15 -04:00
|
|
|
}
|
|
|
|
|
2021-11-14 14:32:03 -05:00
|
|
|
certManager := autocert.Manager{
|
2021-04-23 22:54:15 -04:00
|
|
|
Prompt: autocert.AcceptTOS,
|
2022-06-03 04:14:14 -04:00
|
|
|
HostPolicy: autocert.HostWhitelist(h.cfg.TLS.LetsEncrypt.Hostname),
|
|
|
|
Cache: autocert.DirCache(h.cfg.TLS.LetsEncrypt.CacheDir),
|
2021-10-03 14:26:38 -04:00
|
|
|
Client: &acme.Client{
|
|
|
|
DirectoryURL: h.cfg.ACMEURL,
|
|
|
|
},
|
|
|
|
Email: h.cfg.ACMEEmail,
|
2021-04-23 22:54:15 -04:00
|
|
|
}
|
2021-10-02 10:29:27 -04:00
|
|
|
|
2022-06-03 04:14:14 -04:00
|
|
|
switch h.cfg.TLS.LetsEncrypt.ChallengeType {
|
2022-07-11 14:33:24 -04:00
|
|
|
case tlsALPN01ChallengeType:
|
2021-04-23 22:54:15 -04:00
|
|
|
// Configuration via autocert with TLS-ALPN-01 (https://tools.ietf.org/html/rfc8737)
|
|
|
|
// The RFC requires that the validation is done on port 443; in other words, headscale
|
2021-07-24 09:01:20 -04:00
|
|
|
// must be reachable on port 443.
|
2021-11-14 14:32:03 -05:00
|
|
|
return certManager.TLSConfig(), nil
|
2021-11-14 12:44:37 -05:00
|
|
|
|
2022-07-11 14:33:24 -04:00
|
|
|
case http01ChallengeType:
|
2021-04-23 22:54:15 -04:00
|
|
|
// Configuration via autocert with HTTP-01. This requires listening on
|
|
|
|
// port 80 for the certificate validation in addition to the headscale
|
|
|
|
// service, which can be configured to run on any other port.
|
2022-09-04 05:47:05 -04:00
|
|
|
|
|
|
|
server := &http.Server{
|
|
|
|
Addr: h.cfg.TLS.LetsEncrypt.Listen,
|
|
|
|
Handler: certManager.HTTPHandler(http.HandlerFunc(h.redirect)),
|
|
|
|
ReadTimeout: HTTPReadTimeout,
|
|
|
|
}
|
|
|
|
|
2021-04-23 22:54:15 -04:00
|
|
|
go func() {
|
2022-09-26 05:33:48 -04:00
|
|
|
err := server.ListenAndServe()
|
2021-08-05 13:11:26 -04:00
|
|
|
log.Fatal().
|
2022-01-25 17:11:15 -05:00
|
|
|
Caller().
|
2022-09-04 05:47:05 -04:00
|
|
|
Err(err).
|
2021-08-05 13:11:26 -04:00
|
|
|
Msg("failed to set up a HTTP server")
|
2021-04-23 22:54:15 -04:00
|
|
|
}()
|
2021-10-26 16:42:56 -04:00
|
|
|
|
2021-11-14 14:32:03 -05:00
|
|
|
return certManager.TLSConfig(), nil
|
2021-11-14 12:44:37 -05:00
|
|
|
|
|
|
|
default:
|
2021-11-15 14:18:14 -05:00
|
|
|
return nil, errUnsupportedLetsEncryptChallengeType
|
2021-04-23 22:54:15 -04:00
|
|
|
}
|
2022-06-03 04:14:14 -04:00
|
|
|
} else if h.cfg.TLS.CertPath == "" {
|
2021-04-23 16:54:35 -04:00
|
|
|
if !strings.HasPrefix(h.cfg.ServerURL, "http://") {
|
2021-08-05 13:11:26 -04:00
|
|
|
log.Warn().Msg("Listening without TLS but ServerURL does not start with http://")
|
2021-04-23 16:54:35 -04:00
|
|
|
}
|
2021-10-26 16:42:56 -04:00
|
|
|
|
2021-11-14 11:51:34 -05:00
|
|
|
return nil, err
|
2021-04-23 16:54:35 -04:00
|
|
|
} else {
|
|
|
|
if !strings.HasPrefix(h.cfg.ServerURL, "https://") {
|
2021-08-05 13:11:26 -04:00
|
|
|
log.Warn().Msg("Listening with TLS but ServerURL does not start with https://")
|
2021-04-23 16:54:35 -04:00
|
|
|
}
|
2022-01-29 12:59:31 -05:00
|
|
|
|
2022-01-29 14:15:33 -05:00
|
|
|
log.Info().Msg(fmt.Sprintf(
|
|
|
|
"Client authentication (mTLS) is \"%s\". See the docs to learn about configuring this setting.",
|
2022-06-03 04:14:14 -04:00
|
|
|
h.cfg.TLS.ClientAuthMode))
|
2022-01-29 13:35:08 -05:00
|
|
|
|
2021-11-15 13:31:52 -05:00
|
|
|
tlsConfig := &tls.Config{
|
2022-06-03 04:14:14 -04:00
|
|
|
ClientAuth: h.cfg.TLS.ClientAuthMode,
|
2021-11-15 13:31:52 -05:00
|
|
|
NextProtos: []string{"http/1.1"},
|
|
|
|
Certificates: make([]tls.Certificate, 1),
|
|
|
|
MinVersion: tls.VersionTLS12,
|
|
|
|
}
|
2022-01-29 12:59:31 -05:00
|
|
|
|
2022-06-03 04:14:14 -04:00
|
|
|
tlsConfig.Certificates[0], err = tls.LoadX509KeyPair(h.cfg.TLS.CertPath, h.cfg.TLS.KeyPath)
|
2021-10-26 16:42:56 -04:00
|
|
|
|
|
|
|
return tlsConfig, err
|
2021-04-23 16:54:35 -04:00
|
|
|
}
|
2020-06-21 06:32:08 -04:00
|
|
|
}
|
2021-08-18 18:21:11 -04:00
|
|
|
|
2022-09-04 05:37:49 -04:00
|
|
|
func (h *Headscale) setLastStateChangeToNow() {
|
2022-06-11 07:53:02 -04:00
|
|
|
var err error
|
|
|
|
|
2021-08-18 18:21:11 -04:00
|
|
|
now := time.Now().UTC()
|
2022-06-11 07:53:02 -04:00
|
|
|
|
2022-10-27 16:09:29 -04:00
|
|
|
namespaces, err := h.ListNamespaces()
|
2022-09-04 05:37:49 -04:00
|
|
|
if err != nil {
|
|
|
|
log.Error().
|
|
|
|
Caller().
|
|
|
|
Err(err).
|
|
|
|
Msg("failed to fetch all namespaces, failing to update last changed state.")
|
2022-06-11 07:53:02 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, namespace := range namespaces {
|
2022-10-27 16:09:29 -04:00
|
|
|
lastStateUpdate.WithLabelValues(namespace.Name, "headscale").Set(float64(now.Unix()))
|
2022-06-11 07:53:02 -04:00
|
|
|
if h.lastStateChange == nil {
|
|
|
|
h.lastStateChange = xsync.NewMapOf[time.Time]()
|
|
|
|
}
|
2022-10-27 16:09:29 -04:00
|
|
|
h.lastStateChange.Store(namespace.Name, now)
|
2022-05-30 06:39:41 -04:00
|
|
|
}
|
2021-08-18 18:21:11 -04:00
|
|
|
}
|
|
|
|
|
2022-10-27 16:09:29 -04:00
|
|
|
func (h *Headscale) getLastStateChange(namespaces ...Namespace) time.Time {
|
2021-10-06 18:06:07 -04:00
|
|
|
times := []time.Time{}
|
|
|
|
|
2022-05-30 06:39:41 -04:00
|
|
|
// getLastStateChange takes a list of namespaces as a "filter", if no namespaces
|
|
|
|
// are past, then use the entier list of namespaces and look for the last update
|
|
|
|
if len(namespaces) > 0 {
|
|
|
|
for _, namespace := range namespaces {
|
2022-10-27 16:09:29 -04:00
|
|
|
if lastChange, ok := h.lastStateChange.Load(namespace.Name); ok {
|
2022-05-30 06:39:41 -04:00
|
|
|
times = append(times, lastChange)
|
|
|
|
}
|
2021-10-06 18:06:07 -04:00
|
|
|
}
|
2022-05-30 06:39:41 -04:00
|
|
|
} else {
|
|
|
|
h.lastStateChange.Range(func(key string, value time.Time) bool {
|
|
|
|
times = append(times, value)
|
|
|
|
|
|
|
|
return true
|
|
|
|
})
|
2021-08-19 13:19:26 -04:00
|
|
|
}
|
|
|
|
|
2021-10-06 18:06:07 -04:00
|
|
|
sort.Slice(times, func(i, j int) bool {
|
|
|
|
return times[i].After(times[j])
|
|
|
|
})
|
|
|
|
|
|
|
|
log.Trace().Msgf("Latest times %#v", times)
|
|
|
|
|
|
|
|
if len(times) == 0 {
|
|
|
|
return time.Now().UTC()
|
|
|
|
} else {
|
|
|
|
return times[0]
|
|
|
|
}
|
2021-08-18 18:21:11 -04:00
|
|
|
}
|
2021-10-29 12:45:06 -04:00
|
|
|
|
2022-06-18 12:41:42 -04:00
|
|
|
func stdoutHandler(
|
2022-06-26 05:55:37 -04:00
|
|
|
writer http.ResponseWriter,
|
|
|
|
req *http.Request,
|
2022-06-18 12:41:42 -04:00
|
|
|
) {
|
2022-06-26 05:55:37 -04:00
|
|
|
body, _ := io.ReadAll(req.Body)
|
2021-10-29 12:45:06 -04:00
|
|
|
|
|
|
|
log.Trace().
|
2022-06-26 05:55:37 -04:00
|
|
|
Interface("header", req.Header).
|
|
|
|
Interface("proto", req.Proto).
|
|
|
|
Interface("url", req.URL).
|
2021-11-14 14:32:03 -05:00
|
|
|
Bytes("body", body).
|
2021-10-29 12:45:06 -04:00
|
|
|
Msg("Request did not match")
|
|
|
|
}
|
2021-11-28 04:17:18 -05:00
|
|
|
|
|
|
|
func readOrCreatePrivateKey(path string) (*key.MachinePrivate, error) {
|
|
|
|
privateKey, err := os.ReadFile(path)
|
|
|
|
if errors.Is(err, os.ErrNotExist) {
|
|
|
|
log.Info().Str("path", path).Msg("No private key file at path, creating...")
|
|
|
|
|
|
|
|
machineKey := key.NewMachine()
|
|
|
|
|
|
|
|
machineKeyStr, err := machineKey.MarshalText()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf(
|
|
|
|
"failed to convert private key to string for saving: %w",
|
|
|
|
err,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
err = os.WriteFile(path, machineKeyStr, privateKeyFileMode)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf(
|
|
|
|
"failed to save private key to disk: %w",
|
|
|
|
err,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &machineKey, nil
|
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to read private key file: %w", err)
|
|
|
|
}
|
|
|
|
|
2022-01-28 12:23:01 -05:00
|
|
|
trimmedPrivateKey := strings.TrimSpace(string(privateKey))
|
|
|
|
privateKeyEnsurePrefix := PrivateKeyEnsurePrefix(trimmedPrivateKey)
|
2021-11-28 04:17:18 -05:00
|
|
|
|
|
|
|
var machineKey key.MachinePrivate
|
|
|
|
if err = machineKey.UnmarshalText([]byte(privateKeyEnsurePrefix)); err != nil {
|
|
|
|
log.Info().
|
|
|
|
Str("path", path).
|
|
|
|
Msg("This might be due to a legacy (headscale pre-0.12) private key. " +
|
|
|
|
"If the key is in WireGuard format, delete the key and restart headscale. " +
|
|
|
|
"A new key will automatically be generated. All Tailscale clients will have to be restarted")
|
|
|
|
|
|
|
|
return nil, fmt.Errorf("failed to parse private key: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &machineKey, nil
|
|
|
|
}
|