2021-07-03 09:55:32 +00:00
|
|
|
package headscale
|
|
|
|
|
|
|
|
import (
|
2021-07-04 10:35:18 +00:00
|
|
|
"encoding/json"
|
2021-07-03 15:31:32 +00:00
|
|
|
"fmt"
|
2021-07-03 09:55:32 +00:00
|
|
|
"io"
|
|
|
|
"os"
|
2021-07-04 10:35:18 +00:00
|
|
|
"strconv"
|
2021-07-03 15:31:32 +00:00
|
|
|
"strings"
|
2021-07-03 09:55:32 +00:00
|
|
|
|
2021-08-05 17:18:18 +00:00
|
|
|
"github.com/rs/zerolog/log"
|
2021-07-03 09:55:32 +00:00
|
|
|
"github.com/tailscale/hujson"
|
2021-07-03 15:31:32 +00:00
|
|
|
"inet.af/netaddr"
|
|
|
|
"tailscale.com/tailcfg"
|
2021-07-03 09:55:32 +00:00
|
|
|
)
|
|
|
|
|
2021-11-04 22:16:56 +00:00
|
|
|
const (
|
2021-11-15 16:33:16 +00:00
|
|
|
errEmptyPolicy = Error("empty policy")
|
|
|
|
errInvalidAction = Error("invalid action")
|
|
|
|
errInvalidUserSection = Error("invalid user section")
|
|
|
|
errInvalidGroup = Error("invalid group")
|
|
|
|
errInvalidTag = Error("invalid tag")
|
|
|
|
errInvalidPortFormat = Error("invalid port format")
|
2021-11-04 22:16:56 +00:00
|
|
|
)
|
2021-07-03 09:55:32 +00:00
|
|
|
|
2021-11-14 17:31:51 +00:00
|
|
|
const (
|
2022-01-28 18:58:22 +00:00
|
|
|
Base8 = 8
|
2021-11-15 17:24:24 +00:00
|
|
|
Base10 = 10
|
|
|
|
BitSize16 = 16
|
2022-01-28 18:58:22 +00:00
|
|
|
BitSize32 = 32
|
|
|
|
BitSize64 = 64
|
2021-11-15 17:24:24 +00:00
|
|
|
portRangeBegin = 0
|
|
|
|
portRangeEnd = 65535
|
|
|
|
expectedTokenItems = 2
|
2021-11-14 17:31:51 +00:00
|
|
|
)
|
|
|
|
|
2021-11-13 08:39:04 +00:00
|
|
|
// LoadACLPolicy loads the ACL policy from the specify path, and generates the ACL rules.
|
2021-07-04 11:33:00 +00:00
|
|
|
func (h *Headscale) LoadACLPolicy(path string) error {
|
2021-12-01 19:02:00 +00:00
|
|
|
log.Debug().
|
|
|
|
Str("func", "LoadACLPolicy").
|
|
|
|
Str("path", path).
|
|
|
|
Msg("Loading ACL policy from path")
|
|
|
|
|
2021-07-03 09:55:32 +00:00
|
|
|
policyFile, err := os.Open(path)
|
|
|
|
if err != nil {
|
2021-07-03 15:31:32 +00:00
|
|
|
return err
|
2021-07-03 09:55:32 +00:00
|
|
|
}
|
|
|
|
defer policyFile.Close()
|
|
|
|
|
|
|
|
var policy ACLPolicy
|
2021-11-14 19:32:03 +00:00
|
|
|
policyBytes, err := io.ReadAll(policyFile)
|
2021-07-03 09:55:32 +00:00
|
|
|
if err != nil {
|
2021-07-03 15:31:32 +00:00
|
|
|
return err
|
2021-07-03 09:55:32 +00:00
|
|
|
}
|
2021-11-05 07:24:00 +00:00
|
|
|
|
2021-11-14 19:32:03 +00:00
|
|
|
ast, err := hujson.Parse(policyBytes)
|
2021-11-05 07:24:00 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
ast.Standardize()
|
2021-11-14 19:32:03 +00:00
|
|
|
policyBytes = ast.Pack()
|
|
|
|
err = json.Unmarshal(policyBytes, &policy)
|
2021-07-04 11:33:00 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-07-03 09:55:32 +00:00
|
|
|
if policy.IsZero() {
|
2021-11-15 16:33:16 +00:00
|
|
|
return errEmptyPolicy
|
2021-07-03 09:55:32 +00:00
|
|
|
}
|
|
|
|
|
2021-07-03 15:31:32 +00:00
|
|
|
h.aclPolicy = &policy
|
2022-02-14 14:26:54 +00:00
|
|
|
|
2022-02-03 19:00:41 +00:00
|
|
|
return h.UpdateACLRules()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *Headscale) UpdateACLRules() error {
|
2021-07-04 11:24:05 +00:00
|
|
|
rules, err := h.generateACLRules()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-12-01 19:02:00 +00:00
|
|
|
log.Trace().Interface("ACL", rules).Msg("ACL rules generated")
|
2022-02-03 19:00:41 +00:00
|
|
|
h.aclRules = rules
|
2022-02-14 14:26:54 +00:00
|
|
|
|
2021-07-04 11:24:05 +00:00
|
|
|
return nil
|
2021-07-03 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2021-11-04 22:16:56 +00:00
|
|
|
func (h *Headscale) generateACLRules() ([]tailcfg.FilterRule, error) {
|
2021-07-03 15:31:32 +00:00
|
|
|
rules := []tailcfg.FilterRule{}
|
|
|
|
|
2022-02-21 19:06:31 +00:00
|
|
|
if h.aclPolicy == nil {
|
|
|
|
return nil, errEmptyPolicy
|
|
|
|
}
|
|
|
|
|
2022-02-25 09:26:34 +00:00
|
|
|
machines, err := h.ListMachines()
|
2022-02-07 15:12:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2021-11-14 19:32:03 +00:00
|
|
|
for index, acl := range h.aclPolicy.ACLs {
|
|
|
|
if acl.Action != "accept" {
|
2021-11-15 16:33:16 +00:00
|
|
|
return nil, errInvalidAction
|
2021-07-03 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
srcIPs := []string{}
|
2021-11-14 19:32:03 +00:00
|
|
|
for innerIndex, user := range acl.Users {
|
2022-02-07 15:12:05 +00:00
|
|
|
srcs, err := h.generateACLPolicySrcIP(machines, *h.aclPolicy, user)
|
2021-07-03 15:31:32 +00:00
|
|
|
if err != nil {
|
2021-08-05 17:18:18 +00:00
|
|
|
log.Error().
|
2021-11-14 19:32:03 +00:00
|
|
|
Msgf("Error parsing ACL %d, User %d", index, innerIndex)
|
2021-11-14 15:46:09 +00:00
|
|
|
|
2021-07-03 15:31:32 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2021-11-04 22:16:56 +00:00
|
|
|
srcIPs = append(srcIPs, srcs...)
|
2021-07-03 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2021-07-04 10:35:18 +00:00
|
|
|
destPorts := []tailcfg.NetPortRange{}
|
2021-11-14 19:32:03 +00:00
|
|
|
for innerIndex, ports := range acl.Ports {
|
2022-02-07 15:12:05 +00:00
|
|
|
dests, err := h.generateACLPolicyDestPorts(machines, *h.aclPolicy, ports)
|
2021-07-04 10:35:18 +00:00
|
|
|
if err != nil {
|
2021-08-05 17:18:18 +00:00
|
|
|
log.Error().
|
2021-11-14 19:32:03 +00:00
|
|
|
Msgf("Error parsing ACL %d, Port %d", index, innerIndex)
|
2021-11-14 15:46:09 +00:00
|
|
|
|
2021-07-04 10:35:18 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2021-11-04 22:16:56 +00:00
|
|
|
destPorts = append(destPorts, dests...)
|
2021-07-04 10:35:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
rules = append(rules, tailcfg.FilterRule{
|
|
|
|
SrcIPs: srcIPs,
|
|
|
|
DstPorts: destPorts,
|
|
|
|
})
|
2021-07-03 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2021-11-04 22:16:56 +00:00
|
|
|
return rules, nil
|
2021-07-03 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2022-02-14 14:54:51 +00:00
|
|
|
func (h *Headscale) generateACLPolicySrcIP(
|
|
|
|
machines []Machine,
|
|
|
|
aclPolicy ACLPolicy,
|
|
|
|
u string,
|
|
|
|
) ([]string, error) {
|
2022-02-07 15:12:05 +00:00
|
|
|
return expandAlias(machines, aclPolicy, u)
|
2021-07-04 10:35:18 +00:00
|
|
|
}
|
|
|
|
|
2021-11-13 08:36:45 +00:00
|
|
|
func (h *Headscale) generateACLPolicyDestPorts(
|
2022-02-07 15:12:05 +00:00
|
|
|
machines []Machine,
|
|
|
|
aclPolicy ACLPolicy,
|
2021-11-13 08:36:45 +00:00
|
|
|
d string,
|
|
|
|
) ([]tailcfg.NetPortRange, error) {
|
2021-07-04 10:35:18 +00:00
|
|
|
tokens := strings.Split(d, ":")
|
2021-11-15 17:24:24 +00:00
|
|
|
if len(tokens) < expectedTokenItems || len(tokens) > 3 {
|
2021-11-15 16:33:16 +00:00
|
|
|
return nil, errInvalidPortFormat
|
2021-07-04 10:35:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var alias string
|
|
|
|
// We can have here stuff like:
|
|
|
|
// git-server:*
|
|
|
|
// 192.168.1.0/24:22
|
|
|
|
// tag:montreal-webserver:80,443
|
|
|
|
// tag:api-server:443
|
|
|
|
// example-host-1:*
|
2021-11-15 17:24:24 +00:00
|
|
|
if len(tokens) == expectedTokenItems {
|
2021-07-04 10:35:18 +00:00
|
|
|
alias = tokens[0]
|
|
|
|
} else {
|
|
|
|
alias = fmt.Sprintf("%s:%s", tokens[0], tokens[1])
|
|
|
|
}
|
|
|
|
|
2022-02-07 15:12:05 +00:00
|
|
|
expanded, err := expandAlias(machines, aclPolicy, alias)
|
2021-07-04 10:35:18 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-02-07 15:12:05 +00:00
|
|
|
ports, err := expandPorts(tokens[len(tokens)-1])
|
2021-07-04 10:35:18 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
dests := []tailcfg.NetPortRange{}
|
2021-11-04 22:16:56 +00:00
|
|
|
for _, d := range expanded {
|
2021-07-04 10:35:18 +00:00
|
|
|
for _, p := range *ports {
|
|
|
|
pr := tailcfg.NetPortRange{
|
|
|
|
IP: d,
|
|
|
|
Ports: p,
|
|
|
|
}
|
|
|
|
dests = append(dests, pr)
|
|
|
|
}
|
|
|
|
}
|
2021-11-14 15:46:09 +00:00
|
|
|
|
2021-11-04 22:16:56 +00:00
|
|
|
return dests, nil
|
2021-07-04 10:35:18 +00:00
|
|
|
}
|
|
|
|
|
2022-02-05 16:18:39 +00:00
|
|
|
// expandalias has an input of either
|
|
|
|
// - a namespace
|
|
|
|
// - a group
|
|
|
|
// - a tag
|
2022-02-14 14:26:54 +00:00
|
|
|
// and transform these in IPAddresses.
|
2022-02-14 14:54:51 +00:00
|
|
|
func expandAlias(
|
|
|
|
machines []Machine,
|
|
|
|
aclPolicy ACLPolicy,
|
|
|
|
alias string,
|
|
|
|
) ([]string, error) {
|
2022-02-07 15:12:05 +00:00
|
|
|
ips := []string{}
|
2021-11-14 19:32:03 +00:00
|
|
|
if alias == "*" {
|
2021-11-04 22:16:56 +00:00
|
|
|
return []string{"*"}, nil
|
2021-07-03 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2021-11-14 19:32:03 +00:00
|
|
|
if strings.HasPrefix(alias, "group:") {
|
2022-02-07 15:12:05 +00:00
|
|
|
namespaces, err := expandGroup(aclPolicy, alias)
|
2022-02-05 16:18:39 +00:00
|
|
|
if err != nil {
|
2022-02-07 15:12:05 +00:00
|
|
|
return ips, err
|
2021-07-03 15:31:32 +00:00
|
|
|
}
|
2022-02-05 16:18:39 +00:00
|
|
|
for _, n := range namespaces {
|
2022-02-20 20:24:02 +00:00
|
|
|
nodes := filterMachinesByNamespace(machines, n)
|
2021-11-04 22:16:56 +00:00
|
|
|
for _, node := range nodes {
|
2022-01-16 13:16:59 +00:00
|
|
|
ips = append(ips, node.IPAddresses.ToStringSlice()...)
|
2021-07-04 10:35:18 +00:00
|
|
|
}
|
|
|
|
}
|
2022-02-14 14:26:54 +00:00
|
|
|
|
2021-11-04 22:16:56 +00:00
|
|
|
return ips, nil
|
2021-07-03 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2021-11-14 19:32:03 +00:00
|
|
|
if strings.HasPrefix(alias, "tag:") {
|
2022-02-07 15:12:05 +00:00
|
|
|
owners, err := expandTagOwners(aclPolicy, alias)
|
2022-02-05 16:18:39 +00:00
|
|
|
if err != nil {
|
2022-02-07 15:12:05 +00:00
|
|
|
return ips, err
|
2021-07-04 10:35:18 +00:00
|
|
|
}
|
2022-02-05 16:18:39 +00:00
|
|
|
for _, namespace := range owners {
|
2022-02-20 20:24:02 +00:00
|
|
|
machines := filterMachinesByNamespace(machines, namespace)
|
2022-02-05 16:18:39 +00:00
|
|
|
for _, machine := range machines {
|
|
|
|
if len(machine.HostInfo) == 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
hi, err := machine.GetHostInfo()
|
2021-07-04 10:35:18 +00:00
|
|
|
if err != nil {
|
2022-02-07 15:12:05 +00:00
|
|
|
return ips, err
|
2021-07-04 10:35:18 +00:00
|
|
|
}
|
2022-02-05 16:18:39 +00:00
|
|
|
for _, t := range hi.RequestTags {
|
|
|
|
if alias == t {
|
2022-01-16 13:16:59 +00:00
|
|
|
ips = append(ips, machine.IPAddresses.ToStringSlice()...)
|
2021-07-04 10:35:18 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-02-14 14:26:54 +00:00
|
|
|
|
2021-11-04 22:16:56 +00:00
|
|
|
return ips, nil
|
2021-07-03 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2022-02-07 15:12:05 +00:00
|
|
|
// if alias is a namespace
|
2022-02-20 20:24:02 +00:00
|
|
|
nodes := filterMachinesByNamespace(machines, alias)
|
2022-02-07 15:12:05 +00:00
|
|
|
nodes, err := excludeCorrectlyTaggedNodes(aclPolicy, nodes, alias)
|
|
|
|
if err != nil {
|
|
|
|
return ips, err
|
|
|
|
}
|
|
|
|
for _, n := range nodes {
|
|
|
|
ips = append(ips, n.IPAddresses.ToStringSlice()...)
|
|
|
|
}
|
|
|
|
if len(ips) > 0 {
|
2021-11-04 22:16:56 +00:00
|
|
|
return ips, nil
|
2021-07-03 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2022-02-07 15:12:05 +00:00
|
|
|
// if alias is an host
|
|
|
|
if h, ok := aclPolicy.Hosts[alias]; ok {
|
2021-11-04 22:16:56 +00:00
|
|
|
return []string{h.String()}, nil
|
2021-07-03 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2022-02-07 15:12:05 +00:00
|
|
|
// if alias is an IP
|
2021-11-14 19:32:03 +00:00
|
|
|
ip, err := netaddr.ParseIP(alias)
|
2021-07-03 15:31:32 +00:00
|
|
|
if err == nil {
|
2021-11-04 22:16:56 +00:00
|
|
|
return []string{ip.String()}, nil
|
2021-07-03 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2022-02-07 15:12:05 +00:00
|
|
|
// if alias is an CIDR
|
2021-11-14 19:32:03 +00:00
|
|
|
cidr, err := netaddr.ParseIPPrefix(alias)
|
2021-07-03 15:31:32 +00:00
|
|
|
if err == nil {
|
2021-11-04 22:16:56 +00:00
|
|
|
return []string{cidr.String()}, nil
|
2021-07-03 15:31:32 +00:00
|
|
|
}
|
|
|
|
|
2022-02-07 15:12:05 +00:00
|
|
|
return ips, errInvalidUserSection
|
2021-07-03 09:55:32 +00:00
|
|
|
}
|
2021-07-04 10:35:18 +00:00
|
|
|
|
2022-02-07 15:12:05 +00:00
|
|
|
// excludeCorrectlyTaggedNodes will remove from the list of input nodes the ones
|
|
|
|
// that are correctly tagged since they should not be listed as being in the namespace
|
|
|
|
// we assume in this function that we only have nodes from 1 namespace.
|
2022-02-14 14:54:51 +00:00
|
|
|
func excludeCorrectlyTaggedNodes(
|
|
|
|
aclPolicy ACLPolicy,
|
|
|
|
nodes []Machine,
|
|
|
|
namespace string,
|
|
|
|
) ([]Machine, error) {
|
2022-02-07 15:12:05 +00:00
|
|
|
out := []Machine{}
|
|
|
|
tags := []string{}
|
|
|
|
for tag, ns := range aclPolicy.TagOwners {
|
|
|
|
if containsString(ns, namespace) {
|
|
|
|
tags = append(tags, tag)
|
|
|
|
}
|
2022-02-05 16:18:39 +00:00
|
|
|
}
|
2022-02-07 15:12:05 +00:00
|
|
|
// for each machine if tag is in tags list, don't append it.
|
|
|
|
for _, machine := range nodes {
|
|
|
|
if len(machine.HostInfo) == 0 {
|
|
|
|
out = append(out, machine)
|
2022-02-14 14:26:54 +00:00
|
|
|
|
2022-02-07 15:12:05 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
hi, err := machine.GetHostInfo()
|
|
|
|
if err != nil {
|
|
|
|
return out, err
|
|
|
|
}
|
|
|
|
found := false
|
|
|
|
for _, t := range hi.RequestTags {
|
|
|
|
if containsString(tags, t) {
|
|
|
|
found = true
|
2022-02-14 14:26:54 +00:00
|
|
|
|
2022-02-07 15:12:05 +00:00
|
|
|
break
|
2022-02-05 16:18:39 +00:00
|
|
|
}
|
|
|
|
}
|
2022-02-07 15:12:05 +00:00
|
|
|
if !found {
|
|
|
|
out = append(out, machine)
|
2022-02-05 16:18:39 +00:00
|
|
|
}
|
|
|
|
}
|
2022-02-14 14:26:54 +00:00
|
|
|
|
2022-02-07 15:12:05 +00:00
|
|
|
return out, nil
|
2022-02-05 16:18:39 +00:00
|
|
|
}
|
|
|
|
|
2022-02-07 15:12:05 +00:00
|
|
|
func expandPorts(portsStr string) (*[]tailcfg.PortRange, error) {
|
2021-11-14 19:32:03 +00:00
|
|
|
if portsStr == "*" {
|
2021-11-14 17:31:51 +00:00
|
|
|
return &[]tailcfg.PortRange{
|
2021-11-15 17:24:24 +00:00
|
|
|
{First: portRangeBegin, Last: portRangeEnd},
|
2021-11-14 17:31:51 +00:00
|
|
|
}, nil
|
2021-07-04 10:35:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ports := []tailcfg.PortRange{}
|
2021-11-14 19:32:03 +00:00
|
|
|
for _, portStr := range strings.Split(portsStr, ",") {
|
|
|
|
rang := strings.Split(portStr, "-")
|
2021-11-14 17:44:37 +00:00
|
|
|
switch len(rang) {
|
|
|
|
case 1:
|
2021-11-15 17:24:24 +00:00
|
|
|
port, err := strconv.ParseUint(rang[0], Base10, BitSize16)
|
2021-07-04 10:35:18 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
ports = append(ports, tailcfg.PortRange{
|
2021-11-14 19:32:03 +00:00
|
|
|
First: uint16(port),
|
|
|
|
Last: uint16(port),
|
2021-07-04 10:35:18 +00:00
|
|
|
})
|
2021-11-14 17:44:37 +00:00
|
|
|
|
2021-11-15 17:24:24 +00:00
|
|
|
case expectedTokenItems:
|
|
|
|
start, err := strconv.ParseUint(rang[0], Base10, BitSize16)
|
2021-07-04 10:35:18 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-11-15 17:24:24 +00:00
|
|
|
last, err := strconv.ParseUint(rang[1], Base10, BitSize16)
|
2021-07-04 10:35:18 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
ports = append(ports, tailcfg.PortRange{
|
|
|
|
First: uint16(start),
|
|
|
|
Last: uint16(last),
|
|
|
|
})
|
2021-11-14 17:44:37 +00:00
|
|
|
|
|
|
|
default:
|
2021-11-15 16:33:16 +00:00
|
|
|
return nil, errInvalidPortFormat
|
2021-07-04 10:35:18 +00:00
|
|
|
}
|
|
|
|
}
|
2021-11-14 15:46:09 +00:00
|
|
|
|
2021-07-04 10:35:18 +00:00
|
|
|
return &ports, nil
|
|
|
|
}
|
2022-02-07 15:12:05 +00:00
|
|
|
|
2022-02-20 20:24:02 +00:00
|
|
|
func filterMachinesByNamespace(machines []Machine, namespace string) []Machine {
|
2022-02-07 15:12:05 +00:00
|
|
|
out := []Machine{}
|
|
|
|
for _, machine := range machines {
|
|
|
|
if machine.Namespace.Name == namespace {
|
|
|
|
out = append(out, machine)
|
|
|
|
}
|
|
|
|
}
|
2022-02-14 14:26:54 +00:00
|
|
|
|
2022-02-07 15:12:05 +00:00
|
|
|
return out
|
|
|
|
}
|
|
|
|
|
|
|
|
// expandTagOwners will return a list of namespace. An owner can be either a namespace or a group
|
2022-02-14 14:26:54 +00:00
|
|
|
// a group cannot be composed of groups.
|
2022-02-07 15:12:05 +00:00
|
|
|
func expandTagOwners(aclPolicy ACLPolicy, tag string) ([]string, error) {
|
|
|
|
var owners []string
|
|
|
|
ows, ok := aclPolicy.TagOwners[tag]
|
|
|
|
if !ok {
|
2022-02-14 14:54:51 +00:00
|
|
|
return []string{}, fmt.Errorf(
|
|
|
|
"%w. %v isn't owned by a TagOwner. Please add one first. https://tailscale.com/kb/1018/acls/#tag-owners",
|
|
|
|
errInvalidTag,
|
|
|
|
tag,
|
|
|
|
)
|
2022-02-07 15:12:05 +00:00
|
|
|
}
|
2022-02-14 14:26:54 +00:00
|
|
|
for _, owner := range ows {
|
|
|
|
if strings.HasPrefix(owner, "group:") {
|
|
|
|
gs, err := expandGroup(aclPolicy, owner)
|
2022-02-07 15:12:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return []string{}, err
|
|
|
|
}
|
|
|
|
owners = append(owners, gs...)
|
|
|
|
} else {
|
2022-02-14 14:26:54 +00:00
|
|
|
owners = append(owners, owner)
|
2022-02-07 15:12:05 +00:00
|
|
|
}
|
|
|
|
}
|
2022-02-14 14:26:54 +00:00
|
|
|
|
2022-02-07 15:12:05 +00:00
|
|
|
return owners, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// expandGroup will return the list of namespace inside the group
|
2022-02-14 14:26:54 +00:00
|
|
|
// after some validation.
|
2022-02-07 15:12:05 +00:00
|
|
|
func expandGroup(aclPolicy ACLPolicy, group string) ([]string, error) {
|
2022-02-14 14:26:54 +00:00
|
|
|
groups, ok := aclPolicy.Groups[group]
|
2022-02-07 15:12:05 +00:00
|
|
|
if !ok {
|
2022-02-14 14:54:51 +00:00
|
|
|
return []string{}, fmt.Errorf(
|
|
|
|
"group %v isn't registered. %w",
|
|
|
|
group,
|
|
|
|
errInvalidGroup,
|
|
|
|
)
|
2022-02-07 15:12:05 +00:00
|
|
|
}
|
2022-02-14 14:26:54 +00:00
|
|
|
for _, g := range groups {
|
2022-02-07 15:12:05 +00:00
|
|
|
if strings.HasPrefix(g, "group:") {
|
2022-02-14 14:54:51 +00:00
|
|
|
return []string{}, fmt.Errorf(
|
|
|
|
"%w. A group cannot be composed of groups. https://tailscale.com/kb/1018/acls/#groups",
|
|
|
|
errInvalidGroup,
|
|
|
|
)
|
2022-02-07 15:12:05 +00:00
|
|
|
}
|
|
|
|
}
|
2022-02-14 14:26:54 +00:00
|
|
|
|
|
|
|
return groups, nil
|
2022-02-07 15:12:05 +00:00
|
|
|
}
|