2020-06-21 06:32:08 -04:00
|
|
|
// Codehere is mostly taken from github.com/tailscale/tailscale
|
|
|
|
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package headscale
|
|
|
|
|
|
|
|
import (
|
2021-10-30 10:29:03 -04:00
|
|
|
"context"
|
2022-01-25 17:11:15 -05:00
|
|
|
"crypto/rand"
|
|
|
|
"encoding/base64"
|
2020-06-21 06:32:08 -04:00
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
2022-06-03 03:24:36 -04:00
|
|
|
"io/fs"
|
2021-10-30 10:29:03 -04:00
|
|
|
"net"
|
2022-09-01 18:05:18 -04:00
|
|
|
"net/netip"
|
2022-05-31 06:57:48 -04:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2022-04-25 15:50:40 -04:00
|
|
|
"reflect"
|
2022-09-23 05:51:38 -04:00
|
|
|
"regexp"
|
2022-06-03 03:24:36 -04:00
|
|
|
"strconv"
|
2021-08-13 05:33:19 -04:00
|
|
|
"strings"
|
2020-06-21 06:32:08 -04:00
|
|
|
|
2021-11-26 18:30:42 -05:00
|
|
|
"github.com/rs/zerolog/log"
|
2022-05-31 06:57:48 -04:00
|
|
|
"github.com/spf13/viper"
|
2022-09-01 18:05:18 -04:00
|
|
|
"go4.org/netipx"
|
2021-08-13 05:33:19 -04:00
|
|
|
"tailscale.com/tailcfg"
|
2021-11-26 18:30:42 -05:00
|
|
|
"tailscale.com/types/key"
|
2020-06-21 06:32:08 -04:00
|
|
|
)
|
|
|
|
|
2021-11-15 14:18:14 -05:00
|
|
|
const (
|
2022-08-04 18:00:36 -04:00
|
|
|
ErrCannotDecryptResponse = Error("cannot decrypt response")
|
|
|
|
ErrCouldNotAllocateIP = Error("could not find any suitable IP")
|
2021-11-26 18:30:42 -05:00
|
|
|
|
|
|
|
// These constants are copied from the upstream tailscale.com/types/key
|
|
|
|
// library, because they are not exported.
|
|
|
|
// https://github.com/tailscale/tailscale/tree/main/types/key
|
|
|
|
|
|
|
|
// nodePublicHexPrefix is the prefix used to identify a
|
|
|
|
// hex-encoded node public key.
|
|
|
|
//
|
|
|
|
// This prefix is used in the control protocol, so cannot be
|
|
|
|
// changed.
|
|
|
|
nodePublicHexPrefix = "nodekey:"
|
|
|
|
|
|
|
|
// machinePublicHexPrefix is the prefix used to identify a
|
|
|
|
// hex-encoded machine public key.
|
|
|
|
//
|
|
|
|
// This prefix is used in the control protocol, so cannot be
|
|
|
|
// changed.
|
|
|
|
machinePublicHexPrefix = "mkey:"
|
|
|
|
|
|
|
|
// discoPublicHexPrefix is the prefix used to identify a
|
|
|
|
// hex-encoded disco public key.
|
|
|
|
//
|
|
|
|
// This prefix is used in the control protocol, so cannot be
|
|
|
|
// changed.
|
|
|
|
discoPublicHexPrefix = "discokey:"
|
2021-11-28 04:17:18 -05:00
|
|
|
|
|
|
|
// privateKey prefix.
|
|
|
|
privateHexPrefix = "privkey:"
|
2022-06-03 03:24:36 -04:00
|
|
|
|
|
|
|
PermissionFallback = 0o700
|
2022-08-14 11:04:07 -04:00
|
|
|
|
|
|
|
ZstdCompression = "zstd"
|
2021-11-15 14:18:14 -05:00
|
|
|
)
|
|
|
|
|
2022-09-23 05:51:38 -04:00
|
|
|
var NodePublicKeyRegex = regexp.MustCompile("nodekey:[a-fA-F0-9]+")
|
|
|
|
|
2021-11-26 18:30:42 -05:00
|
|
|
func MachinePublicKeyStripPrefix(machineKey key.MachinePublic) string {
|
|
|
|
return strings.TrimPrefix(machineKey.String(), machinePublicHexPrefix)
|
|
|
|
}
|
|
|
|
|
|
|
|
func NodePublicKeyStripPrefix(nodeKey key.NodePublic) string {
|
|
|
|
return strings.TrimPrefix(nodeKey.String(), nodePublicHexPrefix)
|
|
|
|
}
|
|
|
|
|
|
|
|
func DiscoPublicKeyStripPrefix(discoKey key.DiscoPublic) string {
|
|
|
|
return strings.TrimPrefix(discoKey.String(), discoPublicHexPrefix)
|
|
|
|
}
|
|
|
|
|
2021-11-27 15:25:12 -05:00
|
|
|
func MachinePublicKeyEnsurePrefix(machineKey string) string {
|
|
|
|
if !strings.HasPrefix(machineKey, machinePublicHexPrefix) {
|
|
|
|
return machinePublicHexPrefix + machineKey
|
|
|
|
}
|
|
|
|
|
|
|
|
return machineKey
|
|
|
|
}
|
|
|
|
|
|
|
|
func NodePublicKeyEnsurePrefix(nodeKey string) string {
|
|
|
|
if !strings.HasPrefix(nodeKey, nodePublicHexPrefix) {
|
|
|
|
return nodePublicHexPrefix + nodeKey
|
|
|
|
}
|
|
|
|
|
|
|
|
return nodeKey
|
|
|
|
}
|
|
|
|
|
|
|
|
func DiscoPublicKeyEnsurePrefix(discoKey string) string {
|
|
|
|
if !strings.HasPrefix(discoKey, discoPublicHexPrefix) {
|
|
|
|
return discoPublicHexPrefix + discoKey
|
|
|
|
}
|
|
|
|
|
|
|
|
return discoKey
|
|
|
|
}
|
|
|
|
|
2021-11-28 04:17:18 -05:00
|
|
|
func PrivateKeyEnsurePrefix(privateKey string) string {
|
|
|
|
if !strings.HasPrefix(privateKey, privateHexPrefix) {
|
|
|
|
return privateHexPrefix + privateKey
|
|
|
|
}
|
|
|
|
|
|
|
|
return privateKey
|
|
|
|
}
|
|
|
|
|
2021-05-05 19:01:45 -04:00
|
|
|
// Error is used to compare errors as per https://dave.cheney.net/2016/04/07/constant-errors
|
2021-05-05 17:00:04 -04:00
|
|
|
type Error string
|
|
|
|
|
|
|
|
func (e Error) Error() string { return string(e) }
|
|
|
|
|
2021-11-13 03:36:45 -05:00
|
|
|
func decode(
|
|
|
|
msg []byte,
|
2021-11-14 14:32:03 -05:00
|
|
|
output interface{},
|
2021-11-26 18:30:42 -05:00
|
|
|
pubKey *key.MachinePublic,
|
|
|
|
privKey *key.MachinePrivate,
|
2021-11-13 03:36:45 -05:00
|
|
|
) error {
|
2022-08-15 04:43:39 -04:00
|
|
|
log.Trace().
|
|
|
|
Str("pubkey", pubKey.ShortString()).
|
|
|
|
Int("length", len(msg)).
|
|
|
|
Msg("Trying to decrypt")
|
2021-11-26 18:30:42 -05:00
|
|
|
|
|
|
|
decrypted, ok := privKey.OpenFrom(*pubKey, msg)
|
|
|
|
if !ok {
|
2022-08-04 18:00:36 -04:00
|
|
|
return ErrCannotDecryptResponse
|
2020-06-21 06:32:08 -04:00
|
|
|
}
|
2021-11-26 18:30:42 -05:00
|
|
|
|
2021-11-14 14:32:03 -05:00
|
|
|
if err := json.Unmarshal(decrypted, output); err != nil {
|
2021-11-15 14:18:14 -05:00
|
|
|
return err
|
2020-06-21 06:32:08 -04:00
|
|
|
}
|
2021-11-14 10:46:09 -05:00
|
|
|
|
2020-06-21 06:32:08 -04:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-05-16 08:59:46 -04:00
|
|
|
func (h *Headscale) getAvailableIPs() (MachineAddresses, error) {
|
|
|
|
var ips MachineAddresses
|
|
|
|
var err error
|
2022-01-16 08:16:59 -05:00
|
|
|
ipPrefixes := h.cfg.IPPrefixes
|
|
|
|
for _, ipPrefix := range ipPrefixes {
|
2022-09-01 18:05:18 -04:00
|
|
|
var ip *netip.Addr
|
2022-01-16 08:16:59 -05:00
|
|
|
ip, err = h.getAvailableIP(ipPrefix)
|
|
|
|
if err != nil {
|
2022-05-16 08:59:46 -04:00
|
|
|
return ips, err
|
2022-01-16 08:16:59 -05:00
|
|
|
}
|
|
|
|
ips = append(ips, *ip)
|
|
|
|
}
|
2021-08-02 16:57:45 -04:00
|
|
|
|
2022-05-16 08:59:46 -04:00
|
|
|
return ips, err
|
2022-01-16 08:16:59 -05:00
|
|
|
}
|
|
|
|
|
2022-09-01 18:05:18 -04:00
|
|
|
func GetIPPrefixEndpoints(na netip.Prefix) (netip.Addr, netip.Addr) {
|
|
|
|
var network, broadcast netip.Addr
|
|
|
|
ipRange := netipx.RangeOfPrefix(na)
|
2022-01-29 09:26:28 -05:00
|
|
|
network = ipRange.From()
|
|
|
|
broadcast = ipRange.To()
|
2022-01-30 03:35:10 -05:00
|
|
|
|
2022-05-16 08:59:46 -04:00
|
|
|
return network, broadcast
|
2022-01-29 09:26:28 -05:00
|
|
|
}
|
|
|
|
|
2022-09-01 18:05:18 -04:00
|
|
|
func (h *Headscale) getAvailableIP(ipPrefix netip.Prefix) (*netip.Addr, error) {
|
2021-08-02 16:57:45 -04:00
|
|
|
usedIps, err := h.getUsedIPs()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2022-01-29 09:26:28 -05:00
|
|
|
ipPrefixNetworkAddress, ipPrefixBroadcastAddress := GetIPPrefixEndpoints(ipPrefix)
|
2021-10-31 11:05:08 -04:00
|
|
|
|
2021-08-02 16:57:45 -04:00
|
|
|
// Get the first IP in our prefix
|
2021-10-31 11:05:08 -04:00
|
|
|
ip := ipPrefixNetworkAddress.Next()
|
2021-08-02 16:57:45 -04:00
|
|
|
|
2020-06-21 06:32:08 -04:00
|
|
|
for {
|
2021-08-02 16:57:45 -04:00
|
|
|
if !ipPrefix.Contains(ip) {
|
2022-07-29 11:35:21 -04:00
|
|
|
return nil, ErrCouldNotAllocateIP
|
2020-06-21 06:32:08 -04:00
|
|
|
}
|
2021-08-02 16:57:45 -04:00
|
|
|
|
2021-10-31 11:05:08 -04:00
|
|
|
switch {
|
|
|
|
case ip.Compare(ipPrefixBroadcastAddress) == 0:
|
|
|
|
fallthrough
|
2022-02-24 08:18:18 -05:00
|
|
|
case usedIps.Contains(ip):
|
2021-10-31 11:05:08 -04:00
|
|
|
fallthrough
|
2022-09-01 18:05:18 -04:00
|
|
|
case ip == netip.Addr{} || ip.IsLoopback():
|
2021-08-03 05:06:42 -04:00
|
|
|
ip = ip.Next()
|
2021-11-14 10:46:09 -05:00
|
|
|
|
2021-08-02 16:57:45 -04:00
|
|
|
continue
|
|
|
|
|
2021-10-31 11:05:08 -04:00
|
|
|
default:
|
2021-08-02 16:57:45 -04:00
|
|
|
return &ip, nil
|
2020-06-21 06:32:08 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-09-01 18:05:18 -04:00
|
|
|
func (h *Headscale) getUsedIPs() (*netipx.IPSet, error) {
|
2022-01-16 08:16:59 -05:00
|
|
|
// FIXME: This really deserves a better data model,
|
|
|
|
// but this was quick to get running and it should be enough
|
|
|
|
// to begin experimenting with a dual stack tailnet.
|
|
|
|
var addressesSlices []string
|
|
|
|
h.db.Model(&Machine{}).Pluck("ip_addresses", &addressesSlices)
|
|
|
|
|
2022-09-01 18:05:18 -04:00
|
|
|
var ips netipx.IPSetBuilder
|
2022-01-16 08:16:59 -05:00
|
|
|
for _, slice := range addressesSlices {
|
2022-02-24 08:18:18 -05:00
|
|
|
var machineAddresses MachineAddresses
|
|
|
|
err := machineAddresses.Scan(slice)
|
2022-01-16 08:16:59 -05:00
|
|
|
if err != nil {
|
2022-09-01 18:05:18 -04:00
|
|
|
return &netipx.IPSet{}, fmt.Errorf(
|
2022-02-24 08:18:18 -05:00
|
|
|
"failed to read ip from database: %w",
|
|
|
|
err,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, ip := range machineAddresses {
|
|
|
|
ips.Add(ip)
|
2021-08-03 02:42:11 -04:00
|
|
|
}
|
2021-08-02 16:57:45 -04:00
|
|
|
}
|
|
|
|
|
2022-02-25 03:28:22 -05:00
|
|
|
ipSet, err := ips.IPSet()
|
|
|
|
if err != nil {
|
2022-09-01 18:05:18 -04:00
|
|
|
return &netipx.IPSet{}, fmt.Errorf(
|
2022-02-25 03:28:22 -05:00
|
|
|
"failed to build IP Set: %w",
|
|
|
|
err,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ipSet, nil
|
2021-08-02 16:57:45 -04:00
|
|
|
}
|
|
|
|
|
2021-08-13 05:33:19 -04:00
|
|
|
func tailNodesToString(nodes []*tailcfg.Node) string {
|
|
|
|
temp := make([]string, len(nodes))
|
|
|
|
|
|
|
|
for index, node := range nodes {
|
|
|
|
temp[index] = node.Name
|
|
|
|
}
|
|
|
|
|
|
|
|
return fmt.Sprintf("[ %s ](%d)", strings.Join(temp, ", "), len(temp))
|
|
|
|
}
|
|
|
|
|
|
|
|
func tailMapResponseToString(resp tailcfg.MapResponse) string {
|
2021-11-13 03:36:45 -05:00
|
|
|
return fmt.Sprintf(
|
|
|
|
"{ Node: %s, Peers: %s }",
|
|
|
|
resp.Node.Name,
|
|
|
|
tailNodesToString(resp.Peers),
|
|
|
|
)
|
2021-08-13 05:33:19 -04:00
|
|
|
}
|
2021-10-30 10:29:03 -04:00
|
|
|
|
|
|
|
func GrpcSocketDialer(ctx context.Context, addr string) (net.Conn, error) {
|
|
|
|
var d net.Dialer
|
2021-11-14 10:46:09 -05:00
|
|
|
|
2021-10-30 10:29:03 -04:00
|
|
|
return d.DialContext(ctx, "unix", addr)
|
|
|
|
}
|
2021-11-04 18:17:44 -04:00
|
|
|
|
2022-09-01 18:05:18 -04:00
|
|
|
func ipPrefixToString(prefixes []netip.Prefix) []string {
|
2021-11-04 18:17:44 -04:00
|
|
|
result := make([]string, len(prefixes))
|
|
|
|
|
|
|
|
for index, prefix := range prefixes {
|
|
|
|
result[index] = prefix.String()
|
|
|
|
}
|
|
|
|
|
|
|
|
return result
|
|
|
|
}
|
|
|
|
|
2022-09-01 18:05:18 -04:00
|
|
|
func stringToIPPrefix(prefixes []string) ([]netip.Prefix, error) {
|
|
|
|
result := make([]netip.Prefix, len(prefixes))
|
2021-11-04 18:17:44 -04:00
|
|
|
|
|
|
|
for index, prefixStr := range prefixes {
|
2022-09-01 18:05:18 -04:00
|
|
|
prefix, err := netip.ParsePrefix(prefixStr)
|
2021-11-04 18:17:44 -04:00
|
|
|
if err != nil {
|
2022-09-01 18:05:18 -04:00
|
|
|
return []netip.Prefix{}, err
|
2021-11-04 18:17:44 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
result[index] = prefix
|
|
|
|
}
|
|
|
|
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
2022-09-01 18:05:18 -04:00
|
|
|
func contains[T string | netip.Prefix](ts []T, t T) bool {
|
2022-04-25 15:50:40 -04:00
|
|
|
for _, v := range ts {
|
|
|
|
if reflect.DeepEqual(v, t) {
|
2021-11-04 18:17:44 -04:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
2022-01-25 17:11:15 -05:00
|
|
|
|
|
|
|
// GenerateRandomBytes returns securely generated random bytes.
|
|
|
|
// It will return an error if the system's secure random
|
|
|
|
// number generator fails to function correctly, in which
|
|
|
|
// case the caller should not continue.
|
|
|
|
func GenerateRandomBytes(n int) ([]byte, error) {
|
2022-02-12 14:42:55 -05:00
|
|
|
bytes := make([]byte, n)
|
|
|
|
|
2022-01-25 17:11:15 -05:00
|
|
|
// Note that err == nil only if we read len(b) bytes.
|
2022-02-12 14:42:55 -05:00
|
|
|
if _, err := rand.Read(bytes); err != nil {
|
2022-01-25 17:11:15 -05:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2022-02-12 14:42:55 -05:00
|
|
|
return bytes, nil
|
2022-01-25 17:11:15 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// GenerateRandomStringURLSafe returns a URL-safe, base64 encoded
|
|
|
|
// securely generated random string.
|
|
|
|
// It will return an error if the system's secure random
|
|
|
|
// number generator fails to function correctly, in which
|
|
|
|
// case the caller should not continue.
|
|
|
|
func GenerateRandomStringURLSafe(n int) (string, error) {
|
|
|
|
b, err := GenerateRandomBytes(n)
|
2022-02-12 14:42:55 -05:00
|
|
|
|
2022-01-25 17:11:15 -05:00
|
|
|
return base64.RawURLEncoding.EncodeToString(b), err
|
|
|
|
}
|
2022-05-16 14:30:43 -04:00
|
|
|
|
|
|
|
// GenerateRandomStringDNSSafe returns a DNS-safe
|
|
|
|
// securely generated random string.
|
|
|
|
// It will return an error if the system's secure random
|
|
|
|
// number generator fails to function correctly, in which
|
|
|
|
// case the caller should not continue.
|
2022-06-26 05:55:37 -04:00
|
|
|
func GenerateRandomStringDNSSafe(size int) (string, error) {
|
2022-06-14 05:33:01 -04:00
|
|
|
var str string
|
|
|
|
var err error
|
2022-06-26 05:55:37 -04:00
|
|
|
for len(str) < size {
|
|
|
|
str, err = GenerateRandomStringURLSafe(size)
|
2022-06-14 05:33:01 -04:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
2022-09-23 05:51:46 -04:00
|
|
|
str = strings.ToLower(
|
|
|
|
strings.ReplaceAll(strings.ReplaceAll(str, "_", ""), "-", ""),
|
|
|
|
)
|
2022-06-14 05:33:01 -04:00
|
|
|
}
|
2022-05-16 14:30:43 -04:00
|
|
|
|
2022-06-26 05:55:37 -04:00
|
|
|
return str[:size], nil
|
2022-05-16 14:30:43 -04:00
|
|
|
}
|
2022-05-16 15:41:46 -04:00
|
|
|
|
2022-04-25 15:05:37 -04:00
|
|
|
func IsStringInSlice(slice []string, str string) bool {
|
|
|
|
for _, s := range slice {
|
|
|
|
if s == str {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
2022-05-31 06:57:48 -04:00
|
|
|
|
|
|
|
func AbsolutePathFromConfigPath(path string) string {
|
2022-11-04 07:27:23 -04:00
|
|
|
// If a relative path is provided, prefix it with the directory where
|
2022-05-31 06:57:48 -04:00
|
|
|
// the config file was found.
|
|
|
|
if (path != "") && !strings.HasPrefix(path, string(os.PathSeparator)) {
|
|
|
|
dir, _ := filepath.Split(viper.ConfigFileUsed())
|
|
|
|
if dir != "" {
|
|
|
|
path = filepath.Join(dir, path)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return path
|
|
|
|
}
|
2022-06-03 03:24:36 -04:00
|
|
|
|
|
|
|
func GetFileMode(key string) fs.FileMode {
|
|
|
|
modeStr := viper.GetString(key)
|
|
|
|
|
|
|
|
mode, err := strconv.ParseUint(modeStr, Base8, BitSize64)
|
|
|
|
if err != nil {
|
|
|
|
return PermissionFallback
|
|
|
|
}
|
|
|
|
|
|
|
|
return fs.FileMode(mode)
|
|
|
|
}
|