2023-08-08 23:58:45 +00:00
|
|
|
// Copyright (c) Tailscale Inc & AUTHORS
|
|
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
|
|
|
|
// Package web provides the Tailscale client for web.
|
|
|
|
package web
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2023-08-16 22:52:31 +00:00
|
|
|
"crypto/rand"
|
2023-08-08 23:58:45 +00:00
|
|
|
"encoding/json"
|
2023-10-05 18:48:45 +00:00
|
|
|
"errors"
|
2023-08-08 23:58:45 +00:00
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"log"
|
|
|
|
"net/http"
|
|
|
|
"net/netip"
|
|
|
|
"os"
|
2023-08-23 22:22:24 +00:00
|
|
|
"path/filepath"
|
2023-08-28 20:44:48 +00:00
|
|
|
"slices"
|
2023-08-08 23:58:45 +00:00
|
|
|
"strings"
|
2023-10-04 14:35:19 +00:00
|
|
|
"sync"
|
|
|
|
"time"
|
2023-08-08 23:58:45 +00:00
|
|
|
|
2023-08-16 22:52:31 +00:00
|
|
|
"github.com/gorilla/csrf"
|
2023-08-08 23:58:45 +00:00
|
|
|
"tailscale.com/client/tailscale"
|
2023-08-28 20:44:48 +00:00
|
|
|
"tailscale.com/client/tailscale/apitype"
|
2023-08-08 23:58:45 +00:00
|
|
|
"tailscale.com/envknob"
|
|
|
|
"tailscale.com/ipn"
|
|
|
|
"tailscale.com/ipn/ipnstate"
|
|
|
|
"tailscale.com/licenses"
|
|
|
|
"tailscale.com/net/netutil"
|
|
|
|
"tailscale.com/tailcfg"
|
2023-10-11 18:35:22 +00:00
|
|
|
"tailscale.com/types/logger"
|
2023-08-25 15:27:22 +00:00
|
|
|
"tailscale.com/util/httpm"
|
2023-08-08 23:58:45 +00:00
|
|
|
"tailscale.com/version/distro"
|
|
|
|
)
|
|
|
|
|
2023-08-09 17:14:03 +00:00
|
|
|
// Server is the backend server for a Tailscale web client.
|
|
|
|
type Server struct {
|
2023-10-11 18:35:22 +00:00
|
|
|
logf logger.Logf
|
2023-10-19 20:13:40 +00:00
|
|
|
lc *tailscale.LocalClient
|
|
|
|
timeNow func() time.Time
|
2023-08-10 17:58:59 +00:00
|
|
|
|
2023-09-26 19:57:40 +00:00
|
|
|
devMode bool
|
|
|
|
tsDebugMode string
|
2023-08-16 22:52:31 +00:00
|
|
|
|
2023-08-23 22:22:24 +00:00
|
|
|
cgiMode bool
|
2023-08-31 21:27:41 +00:00
|
|
|
pathPrefix string
|
2023-09-08 19:30:07 +00:00
|
|
|
|
|
|
|
apiHandler http.Handler // serves api endpoints; csrf-protected
|
2023-10-11 18:35:22 +00:00
|
|
|
assetsHandler http.Handler // serves frontend assets
|
|
|
|
assetsCleanup func() // called from Server.Shutdown
|
2023-10-04 14:35:19 +00:00
|
|
|
|
|
|
|
// browserSessions is an in-memory cache of browser sessions for the
|
|
|
|
// full management web client, which is only accessible over Tailscale.
|
|
|
|
//
|
|
|
|
// Users obtain a valid browser session by connecting to the web client
|
|
|
|
// over Tailscale and verifying their identity by authenticating on the
|
|
|
|
// control server.
|
|
|
|
//
|
|
|
|
// browserSessions get reset on every Server restart.
|
|
|
|
//
|
|
|
|
// The map provides a lookup of the session by cookie value
|
|
|
|
// (browserSession.ID => browserSession).
|
2023-10-19 20:13:40 +00:00
|
|
|
browserSessions sync.Map
|
2023-10-04 14:35:19 +00:00
|
|
|
}
|
|
|
|
|
2023-10-12 21:02:20 +00:00
|
|
|
var (
|
|
|
|
exitNodeRouteV4 = netip.MustParsePrefix("0.0.0.0/0")
|
|
|
|
exitNodeRouteV6 = netip.MustParsePrefix("::/0")
|
|
|
|
)
|
|
|
|
|
2023-08-23 22:22:24 +00:00
|
|
|
// ServerOpts contains options for constructing a new Server.
|
|
|
|
type ServerOpts struct {
|
|
|
|
DevMode bool
|
|
|
|
|
|
|
|
// CGIMode indicates if the server is running as a CGI script.
|
|
|
|
CGIMode bool
|
|
|
|
|
2023-08-31 21:27:41 +00:00
|
|
|
// PathPrefix is the URL prefix added to requests by CGI or reverse proxy.
|
|
|
|
PathPrefix string
|
2023-08-24 19:56:09 +00:00
|
|
|
|
2023-08-23 22:22:24 +00:00
|
|
|
// LocalClient is the tailscale.LocalClient to use for this web server.
|
|
|
|
// If nil, a new one will be created.
|
|
|
|
LocalClient *tailscale.LocalClient
|
2023-10-19 20:13:40 +00:00
|
|
|
|
|
|
|
// TimeNow optionally provides a time function.
|
|
|
|
// time.Now is used as default.
|
|
|
|
TimeNow func() time.Time
|
2023-10-11 18:35:22 +00:00
|
|
|
|
|
|
|
Logf logger.Logf
|
2023-08-23 22:22:24 +00:00
|
|
|
}
|
|
|
|
|
2023-08-09 17:14:03 +00:00
|
|
|
// NewServer constructs a new Tailscale web client server.
|
2023-10-11 18:35:22 +00:00
|
|
|
// If err is empty, s is always non-nil.
|
|
|
|
// ctx is only required to live the duration of the NewServer call,
|
|
|
|
// and not the lifespan of the web server.
|
|
|
|
func NewServer(opts ServerOpts) (s *Server, err error) {
|
2023-08-23 22:22:24 +00:00
|
|
|
if opts.LocalClient == nil {
|
|
|
|
opts.LocalClient = &tailscale.LocalClient{}
|
2023-08-09 17:14:03 +00:00
|
|
|
}
|
2023-08-10 17:58:59 +00:00
|
|
|
s = &Server{
|
2023-10-11 18:35:22 +00:00
|
|
|
logf: opts.Logf,
|
2023-08-31 21:27:41 +00:00
|
|
|
devMode: opts.DevMode,
|
|
|
|
lc: opts.LocalClient,
|
2023-10-23 19:04:49 +00:00
|
|
|
cgiMode: opts.CGIMode,
|
2023-08-31 21:27:41 +00:00
|
|
|
pathPrefix: opts.PathPrefix,
|
2023-10-19 20:13:40 +00:00
|
|
|
timeNow: opts.TimeNow,
|
|
|
|
}
|
|
|
|
if s.timeNow == nil {
|
|
|
|
s.timeNow = time.Now
|
2023-08-09 17:14:03 +00:00
|
|
|
}
|
2023-10-11 18:35:22 +00:00
|
|
|
if s.logf == nil {
|
|
|
|
s.logf = log.Printf
|
|
|
|
}
|
2023-09-26 19:57:40 +00:00
|
|
|
s.tsDebugMode = s.debugMode()
|
2023-10-11 18:35:22 +00:00
|
|
|
s.assetsHandler, s.assetsCleanup = assetsHandler(opts.DevMode)
|
2023-08-24 20:24:57 +00:00
|
|
|
|
2023-10-11 18:35:22 +00:00
|
|
|
var metric string // clientmetric to report on startup
|
|
|
|
|
2023-08-22 23:14:00 +00:00
|
|
|
// Create handler for "/api" requests with CSRF protection.
|
|
|
|
// We don't require secure cookies, since the web client is regularly used
|
|
|
|
// on network appliances that are served on local non-https URLs.
|
|
|
|
// The client is secured by limiting the interface it listens on,
|
|
|
|
// or by authenticating requests before they reach the web client.
|
|
|
|
csrfProtect := csrf.Protect(s.csrfKey(), csrf.Secure(false))
|
2023-09-26 19:57:40 +00:00
|
|
|
if s.tsDebugMode == "login" {
|
2023-09-26 19:57:40 +00:00
|
|
|
// For the login client, we don't serve the full web client API,
|
|
|
|
// only the login endpoints.
|
|
|
|
s.apiHandler = csrfProtect(http.HandlerFunc(s.serveLoginAPI))
|
2023-10-11 18:35:22 +00:00
|
|
|
metric = "web_login_client_initialization"
|
2023-09-26 19:57:40 +00:00
|
|
|
} else {
|
|
|
|
s.apiHandler = csrfProtect(http.HandlerFunc(s.serveAPI))
|
2023-10-11 18:35:22 +00:00
|
|
|
metric = "web_client_initialization"
|
2023-09-26 19:57:40 +00:00
|
|
|
}
|
2023-08-22 23:14:00 +00:00
|
|
|
|
2023-10-11 18:35:22 +00:00
|
|
|
// Don't block startup on reporting metric.
|
|
|
|
// Report in separate go routine with 5 second timeout.
|
2023-10-11 18:35:22 +00:00
|
|
|
go func() {
|
2023-10-11 18:35:22 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
2023-10-11 18:35:22 +00:00
|
|
|
defer cancel()
|
|
|
|
s.lc.IncrementCounter(ctx, metric, 1)
|
|
|
|
}()
|
|
|
|
|
2023-10-11 18:35:22 +00:00
|
|
|
return s, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) Shutdown() {
|
|
|
|
if s.assetsCleanup != nil {
|
|
|
|
s.assetsCleanup()
|
|
|
|
}
|
2023-08-09 17:14:03 +00:00
|
|
|
}
|
2023-08-08 23:58:45 +00:00
|
|
|
|
2023-09-26 19:57:40 +00:00
|
|
|
// debugMode returns the debug mode the web client is being run in.
|
|
|
|
// The empty string is returned in the case that this instance is
|
|
|
|
// not running in any debug mode.
|
|
|
|
func (s *Server) debugMode() string {
|
|
|
|
if !s.devMode {
|
|
|
|
return "" // debug modes only available in dev
|
|
|
|
}
|
|
|
|
switch mode := os.Getenv("TS_DEBUG_WEB_CLIENT_MODE"); mode {
|
|
|
|
case "login", "full": // valid debug modes
|
|
|
|
return mode
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2023-08-24 19:46:51 +00:00
|
|
|
// ServeHTTP processes all requests for the Tailscale web client.
|
|
|
|
func (s *Server) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
2023-08-24 19:56:09 +00:00
|
|
|
handler := s.serve
|
|
|
|
|
2023-08-31 21:27:41 +00:00
|
|
|
// if path prefix is defined, strip it from requests.
|
|
|
|
if s.pathPrefix != "" {
|
|
|
|
handler = enforcePrefix(s.pathPrefix, handler)
|
2023-08-24 19:56:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
handler(w, r)
|
2023-08-08 23:58:45 +00:00
|
|
|
}
|
|
|
|
|
2023-09-26 19:57:40 +00:00
|
|
|
func (s *Server) serve(w http.ResponseWriter, r *http.Request) {
|
2023-10-17 20:07:37 +00:00
|
|
|
if ok := s.authorizeRequest(w, r); !ok {
|
|
|
|
return
|
|
|
|
}
|
2023-09-26 19:57:40 +00:00
|
|
|
if strings.HasPrefix(r.URL.Path, "/api/") {
|
|
|
|
// Pass API requests through to the API handler.
|
|
|
|
s.apiHandler.ServeHTTP(w, r)
|
|
|
|
return
|
2023-08-24 21:40:17 +00:00
|
|
|
}
|
2023-09-26 19:57:40 +00:00
|
|
|
if !s.devMode {
|
2023-10-12 21:02:20 +00:00
|
|
|
s.lc.IncrementCounter(r.Context(), "web_client_page_load", 1)
|
2023-09-26 19:57:40 +00:00
|
|
|
}
|
|
|
|
s.assetsHandler.ServeHTTP(w, r)
|
|
|
|
}
|
2023-08-24 21:40:17 +00:00
|
|
|
|
2023-10-17 20:07:37 +00:00
|
|
|
// authorizeRequest reports whether the request from the web client
|
|
|
|
// is authorized to be completed.
|
2023-09-26 19:57:40 +00:00
|
|
|
// It reports true if the request is authorized, and false otherwise.
|
2023-10-17 20:07:37 +00:00
|
|
|
// authorizeRequest manages writing out any relevant authorization
|
2023-09-26 19:57:40 +00:00
|
|
|
// errors to the ResponseWriter itself.
|
2023-10-17 20:07:37 +00:00
|
|
|
func (s *Server) authorizeRequest(w http.ResponseWriter, r *http.Request) (ok bool) {
|
|
|
|
if s.tsDebugMode == "full" { // client using tailscale auth
|
|
|
|
_, err := s.lc.WhoIs(r.Context(), r.RemoteAddr)
|
|
|
|
switch {
|
|
|
|
case err != nil:
|
|
|
|
// All requests must be made over tailscale.
|
|
|
|
http.Error(w, "must access over tailscale", http.StatusUnauthorized)
|
|
|
|
return false
|
|
|
|
case r.URL.Path == "/api/data" && r.Method == httpm.GET:
|
|
|
|
// Readonly endpoint allowed without browser session.
|
|
|
|
return true
|
|
|
|
case r.URL.Path == "/api/auth":
|
|
|
|
// Endpoint for browser to request auth allowed without browser session.
|
|
|
|
return true
|
|
|
|
case strings.HasPrefix(r.URL.Path, "/api/"):
|
|
|
|
// All other /api/ endpoints require a valid browser session.
|
2023-10-18 20:45:25 +00:00
|
|
|
//
|
|
|
|
// TODO(sonia): s.getTailscaleBrowserSession calls whois again,
|
|
|
|
// should try and use the above call instead of running another
|
|
|
|
// localapi request.
|
|
|
|
session, _, err := s.getTailscaleBrowserSession(r)
|
2023-10-23 16:36:21 +00:00
|
|
|
if err != nil || !session.isAuthorized(s.timeNow()) {
|
2023-10-17 20:07:37 +00:00
|
|
|
http.Error(w, "no valid session", http.StatusUnauthorized)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
default:
|
|
|
|
// No additional auth on non-api (assets, index.html, etc).
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Client using system-specific auth.
|
|
|
|
d := distro.Get()
|
|
|
|
switch {
|
2023-10-18 15:48:20 +00:00
|
|
|
case strings.HasPrefix(r.URL.Path, "/assets/") && r.Method == httpm.GET:
|
2023-10-17 20:07:37 +00:00
|
|
|
// Don't require authorization for static assets.
|
|
|
|
return true
|
|
|
|
case d == distro.Synology:
|
2023-08-24 21:40:17 +00:00
|
|
|
return authorizeSynology(w, r)
|
2023-10-17 20:07:37 +00:00
|
|
|
case d == distro.QNAP:
|
2023-08-24 21:40:17 +00:00
|
|
|
return authorizeQNAP(w, r)
|
2023-10-17 20:07:37 +00:00
|
|
|
default:
|
|
|
|
return true // no additional auth for this distro
|
2023-08-24 21:40:17 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-26 19:57:40 +00:00
|
|
|
// serveLoginAPI serves requests for the web login client.
|
|
|
|
// It should only be called by Server.ServeHTTP, via Server.apiHandler,
|
|
|
|
// which protects the handler using gorilla csrf.
|
|
|
|
func (s *Server) serveLoginAPI(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Set("X-CSRF-Token", csrf.Token(r))
|
|
|
|
if r.URL.Path != "/api/data" { // only endpoint allowed for login client
|
|
|
|
http.Error(w, "invalid endpoint", http.StatusNotFound)
|
2023-08-10 17:58:59 +00:00
|
|
|
return
|
2023-09-26 19:57:40 +00:00
|
|
|
}
|
|
|
|
switch r.Method {
|
|
|
|
case httpm.GET:
|
2023-09-26 19:57:40 +00:00
|
|
|
// TODO(soniaappasamy): we may want a minimal node data response here
|
|
|
|
s.serveGetNodeData(w, r)
|
2023-09-26 19:57:40 +00:00
|
|
|
case httpm.POST:
|
|
|
|
// TODO(soniaappasamy): implement
|
2023-08-15 15:38:13 +00:00
|
|
|
default:
|
2023-09-26 19:57:40 +00:00
|
|
|
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
|
2023-08-08 23:58:45 +00:00
|
|
|
}
|
2023-09-26 19:57:40 +00:00
|
|
|
return
|
2023-08-15 15:38:13 +00:00
|
|
|
}
|
2023-08-08 23:58:45 +00:00
|
|
|
|
2023-10-05 18:48:45 +00:00
|
|
|
type authResponse struct {
|
|
|
|
OK bool `json:"ok"` // true when user has valid auth session
|
|
|
|
AuthURL string `json:"authUrl,omitempty"` // filled when user has control auth action to take
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) serveTailscaleAuth(w http.ResponseWriter, r *http.Request) {
|
2023-10-18 20:45:25 +00:00
|
|
|
if r.Method != httpm.GET {
|
|
|
|
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
|
|
|
|
return
|
|
|
|
}
|
2023-10-05 18:48:45 +00:00
|
|
|
var resp authResponse
|
|
|
|
|
2023-10-18 20:45:25 +00:00
|
|
|
session, whois, err := s.getTailscaleBrowserSession(r)
|
2023-10-05 18:48:45 +00:00
|
|
|
switch {
|
|
|
|
case err != nil && !errors.Is(err, errNoSession):
|
2023-10-18 20:45:25 +00:00
|
|
|
http.Error(w, err.Error(), http.StatusUnauthorized)
|
|
|
|
return
|
2023-10-05 18:48:45 +00:00
|
|
|
case session == nil:
|
2023-10-18 20:45:25 +00:00
|
|
|
// Create a new session.
|
2023-10-19 20:13:40 +00:00
|
|
|
d, err := s.getOrAwaitAuth(r.Context(), "", whois.Node.ID)
|
2023-10-18 20:45:25 +00:00
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
sid, err := s.newSessionID()
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
session := &browserSession{
|
|
|
|
ID: sid,
|
|
|
|
SrcNode: whois.Node.ID,
|
|
|
|
SrcUser: whois.UserProfile.ID,
|
2023-10-19 20:13:40 +00:00
|
|
|
AuthID: d.ID,
|
2023-10-18 20:45:25 +00:00
|
|
|
AuthURL: d.URL,
|
2023-10-19 20:13:40 +00:00
|
|
|
Created: s.timeNow(),
|
2023-10-18 20:45:25 +00:00
|
|
|
}
|
|
|
|
s.browserSessions.Store(sid, session)
|
|
|
|
// Set the cookie on browser.
|
|
|
|
http.SetCookie(w, &http.Cookie{
|
|
|
|
Name: sessionCookieName,
|
|
|
|
Value: sid,
|
|
|
|
Raw: sid,
|
|
|
|
Path: "/",
|
|
|
|
Expires: session.expires(),
|
|
|
|
})
|
|
|
|
resp = authResponse{OK: false, AuthURL: d.URL}
|
2023-10-23 16:36:21 +00:00
|
|
|
case !session.isAuthorized(s.timeNow()):
|
2023-10-18 20:45:25 +00:00
|
|
|
if r.URL.Query().Get("wait") == "true" {
|
|
|
|
// Client requested we block until user completes auth.
|
2023-10-19 20:13:40 +00:00
|
|
|
d, err := s.getOrAwaitAuth(r.Context(), session.AuthID, whois.Node.ID)
|
2023-10-20 17:24:29 +00:00
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusUnauthorized)
|
|
|
|
// Clean up the session. Doing this on any error from control
|
|
|
|
// server to avoid the user getting stuck with a bad session
|
|
|
|
// cookie.
|
|
|
|
s.browserSessions.Delete(session.ID)
|
2023-10-18 20:45:25 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
if d.Complete {
|
|
|
|
session.Authenticated = d.Complete
|
|
|
|
s.browserSessions.Store(session.ID, session)
|
|
|
|
}
|
|
|
|
}
|
2023-10-23 16:36:21 +00:00
|
|
|
if session.isAuthorized(s.timeNow()) {
|
2023-10-18 20:45:25 +00:00
|
|
|
resp = authResponse{OK: true}
|
|
|
|
} else {
|
|
|
|
resp = authResponse{OK: false, AuthURL: session.AuthURL}
|
|
|
|
}
|
2023-10-05 18:48:45 +00:00
|
|
|
default:
|
|
|
|
resp = authResponse{OK: true}
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := json.NewEncoder(w).Encode(resp); err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
}
|
|
|
|
|
2023-08-25 15:27:22 +00:00
|
|
|
// serveAPI serves requests for the web client api.
|
|
|
|
// It should only be called by Server.ServeHTTP, via Server.apiHandler,
|
|
|
|
// which protects the handler using gorilla csrf.
|
|
|
|
func (s *Server) serveAPI(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Set("X-CSRF-Token", csrf.Token(r))
|
|
|
|
path := strings.TrimPrefix(r.URL.Path, "/api")
|
2023-08-28 20:44:48 +00:00
|
|
|
switch {
|
2023-10-17 20:07:37 +00:00
|
|
|
case path == "/auth":
|
|
|
|
if s.tsDebugMode == "full" { // behind debug flag
|
|
|
|
s.serveTailscaleAuth(w, r)
|
|
|
|
return
|
|
|
|
}
|
2023-08-28 20:44:48 +00:00
|
|
|
case path == "/data":
|
2023-08-25 15:27:22 +00:00
|
|
|
switch r.Method {
|
|
|
|
case httpm.GET:
|
2023-09-27 17:27:59 +00:00
|
|
|
s.serveGetNodeData(w, r)
|
2023-08-25 15:27:22 +00:00
|
|
|
case httpm.POST:
|
|
|
|
s.servePostNodeUpdate(w, r)
|
|
|
|
default:
|
|
|
|
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
|
|
|
|
}
|
|
|
|
return
|
2023-08-28 20:44:48 +00:00
|
|
|
case strings.HasPrefix(path, "/local/"):
|
|
|
|
s.proxyRequestToLocalAPI(w, r)
|
|
|
|
return
|
2023-08-25 15:27:22 +00:00
|
|
|
}
|
|
|
|
http.Error(w, "invalid endpoint", http.StatusNotFound)
|
|
|
|
}
|
|
|
|
|
2023-08-15 15:38:13 +00:00
|
|
|
type nodeData struct {
|
|
|
|
Profile tailcfg.UserProfile
|
|
|
|
Status string
|
|
|
|
DeviceName string
|
|
|
|
IP string
|
|
|
|
AdvertiseExitNode bool
|
|
|
|
AdvertiseRoutes string
|
|
|
|
LicensesURL string
|
|
|
|
TUNMode bool
|
|
|
|
IsSynology bool
|
|
|
|
DSMVersion int // 6 or 7, if IsSynology=true
|
|
|
|
IsUnraid bool
|
|
|
|
UnraidToken string
|
|
|
|
IPNVersion string
|
2023-09-26 19:57:40 +00:00
|
|
|
DebugMode string // empty when not running in any debug mode
|
2023-08-15 15:38:13 +00:00
|
|
|
}
|
|
|
|
|
2023-09-27 17:27:59 +00:00
|
|
|
func (s *Server) serveGetNodeData(w http.ResponseWriter, r *http.Request) {
|
|
|
|
st, err := s.lc.Status(r.Context())
|
2023-08-08 23:58:45 +00:00
|
|
|
if err != nil {
|
2023-09-27 17:27:59 +00:00
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
2023-08-08 23:58:45 +00:00
|
|
|
}
|
2023-09-27 17:27:59 +00:00
|
|
|
prefs, err := s.lc.GetPrefs(r.Context())
|
2023-08-08 23:58:45 +00:00
|
|
|
if err != nil {
|
2023-09-27 17:27:59 +00:00
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
2023-08-08 23:58:45 +00:00
|
|
|
}
|
|
|
|
profile := st.User[st.Self.UserID]
|
|
|
|
deviceName := strings.Split(st.Self.DNSName, ".")[0]
|
|
|
|
versionShort := strings.Split(st.Version, "-")[0]
|
2023-08-15 15:38:13 +00:00
|
|
|
data := &nodeData{
|
2023-08-24 19:46:51 +00:00
|
|
|
Profile: profile,
|
|
|
|
Status: st.BackendState,
|
|
|
|
DeviceName: deviceName,
|
|
|
|
LicensesURL: licenses.LicensesURL(),
|
|
|
|
TUNMode: st.TUN,
|
|
|
|
IsSynology: distro.Get() == distro.Synology || envknob.Bool("TS_FAKE_SYNOLOGY"),
|
|
|
|
DSMVersion: distro.DSMVersion(),
|
|
|
|
IsUnraid: distro.Get() == distro.Unraid,
|
|
|
|
UnraidToken: os.Getenv("UNRAID_CSRF_TOKEN"),
|
|
|
|
IPNVersion: versionShort,
|
2023-09-26 19:57:40 +00:00
|
|
|
DebugMode: s.tsDebugMode,
|
2023-08-08 23:58:45 +00:00
|
|
|
}
|
|
|
|
for _, r := range prefs.AdvertiseRoutes {
|
|
|
|
if r == exitNodeRouteV4 || r == exitNodeRouteV6 {
|
|
|
|
data.AdvertiseExitNode = true
|
|
|
|
} else {
|
|
|
|
if data.AdvertiseRoutes != "" {
|
|
|
|
data.AdvertiseRoutes += ","
|
|
|
|
}
|
|
|
|
data.AdvertiseRoutes += r.String()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if len(st.TailscaleIPs) != 0 {
|
|
|
|
data.IP = st.TailscaleIPs[0].String()
|
|
|
|
}
|
2023-08-15 15:38:13 +00:00
|
|
|
if err := json.NewEncoder(w).Encode(*data); err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
}
|
|
|
|
|
|
|
|
type nodeUpdate struct {
|
|
|
|
AdvertiseRoutes string
|
|
|
|
AdvertiseExitNode bool
|
|
|
|
Reauthenticate bool
|
|
|
|
ForceLogout bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) servePostNodeUpdate(w http.ResponseWriter, r *http.Request) {
|
|
|
|
defer r.Body.Close()
|
|
|
|
|
|
|
|
st, err := s.lc.Status(r.Context())
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var postData nodeUpdate
|
|
|
|
type mi map[string]any
|
|
|
|
if err := json.NewDecoder(r.Body).Decode(&postData); err != nil {
|
|
|
|
w.WriteHeader(400)
|
|
|
|
json.NewEncoder(w).Encode(mi{"error": err.Error()})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-10-12 21:02:20 +00:00
|
|
|
prefs, err := s.lc.GetPrefs(r.Context())
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
isCurrentlyExitNode := slices.Contains(prefs.AdvertiseRoutes, exitNodeRouteV4) || slices.Contains(prefs.AdvertiseRoutes, exitNodeRouteV6)
|
|
|
|
|
|
|
|
if postData.AdvertiseExitNode != isCurrentlyExitNode {
|
|
|
|
if postData.AdvertiseExitNode {
|
|
|
|
s.lc.IncrementCounter(r.Context(), "web_client_advertise_exitnode_enable", 1)
|
|
|
|
} else {
|
|
|
|
s.lc.IncrementCounter(r.Context(), "web_client_advertise_exitnode_disable", 1)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-15 15:38:13 +00:00
|
|
|
routes, err := netutil.CalcAdvertiseRoutes(postData.AdvertiseRoutes, postData.AdvertiseExitNode)
|
|
|
|
if err != nil {
|
|
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
|
|
json.NewEncoder(w).Encode(mi{"error": err.Error()})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
mp := &ipn.MaskedPrefs{
|
|
|
|
AdvertiseRoutesSet: true,
|
|
|
|
WantRunningSet: true,
|
|
|
|
}
|
|
|
|
mp.Prefs.WantRunning = true
|
|
|
|
mp.Prefs.AdvertiseRoutes = routes
|
2023-10-11 18:35:22 +00:00
|
|
|
s.logf("Doing edit: %v", mp.Pretty())
|
2023-08-15 15:38:13 +00:00
|
|
|
|
|
|
|
if _, err := s.lc.EditPrefs(r.Context(), mp); err != nil {
|
|
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
|
|
json.NewEncoder(w).Encode(mi{"error": err.Error()})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
var reauth, logout bool
|
|
|
|
if postData.Reauthenticate {
|
|
|
|
reauth = true
|
|
|
|
}
|
|
|
|
if postData.ForceLogout {
|
|
|
|
logout = true
|
|
|
|
}
|
2023-10-11 18:35:22 +00:00
|
|
|
s.logf("tailscaleUp(reauth=%v, logout=%v) ...", reauth, logout)
|
2023-08-15 15:38:13 +00:00
|
|
|
url, err := s.tailscaleUp(r.Context(), st, postData)
|
2023-10-11 18:35:22 +00:00
|
|
|
s.logf("tailscaleUp = (URL %v, %v)", url != "", err)
|
2023-08-15 15:38:13 +00:00
|
|
|
if err != nil {
|
|
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
|
|
json.NewEncoder(w).Encode(mi{"error": err.Error()})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if url != "" {
|
|
|
|
json.NewEncoder(w).Encode(mi{"url": url})
|
|
|
|
} else {
|
|
|
|
io.WriteString(w, "{}")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) tailscaleUp(ctx context.Context, st *ipnstate.Status, postData nodeUpdate) (authURL string, retErr error) {
|
2023-08-08 23:58:45 +00:00
|
|
|
if postData.ForceLogout {
|
2023-08-09 17:14:03 +00:00
|
|
|
if err := s.lc.Logout(ctx); err != nil {
|
2023-08-08 23:58:45 +00:00
|
|
|
return "", fmt.Errorf("Logout error: %w", err)
|
|
|
|
}
|
|
|
|
return "", nil
|
|
|
|
}
|
|
|
|
|
|
|
|
origAuthURL := st.AuthURL
|
|
|
|
isRunning := st.BackendState == ipn.Running.String()
|
|
|
|
|
|
|
|
forceReauth := postData.Reauthenticate
|
|
|
|
if !forceReauth {
|
|
|
|
if origAuthURL != "" {
|
|
|
|
return origAuthURL, nil
|
|
|
|
}
|
|
|
|
if isRunning {
|
|
|
|
return "", nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// printAuthURL reports whether we should print out the
|
|
|
|
// provided auth URL from an IPN notify.
|
|
|
|
printAuthURL := func(url string) bool {
|
|
|
|
return url != origAuthURL
|
|
|
|
}
|
|
|
|
|
|
|
|
watchCtx, cancelWatch := context.WithCancel(ctx)
|
|
|
|
defer cancelWatch()
|
2023-08-09 17:14:03 +00:00
|
|
|
watcher, err := s.lc.WatchIPNBus(watchCtx, 0)
|
2023-08-08 23:58:45 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
defer watcher.Close()
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
if !isRunning {
|
2023-08-09 17:14:03 +00:00
|
|
|
s.lc.Start(ctx, ipn.Options{})
|
2023-08-08 23:58:45 +00:00
|
|
|
}
|
|
|
|
if forceReauth {
|
2023-08-09 17:14:03 +00:00
|
|
|
s.lc.StartLoginInteractive(ctx)
|
2023-08-08 23:58:45 +00:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
for {
|
|
|
|
n, err := watcher.Next()
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
if n.ErrMessage != nil {
|
|
|
|
msg := *n.ErrMessage
|
|
|
|
return "", fmt.Errorf("backend error: %v", msg)
|
|
|
|
}
|
|
|
|
if url := n.BrowseToURL; url != nil && printAuthURL(*url) {
|
|
|
|
return *url, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-08-16 22:52:31 +00:00
|
|
|
|
2023-08-28 20:44:48 +00:00
|
|
|
// proxyRequestToLocalAPI proxies the web API request to the localapi.
|
|
|
|
//
|
|
|
|
// The web API request path is expected to exactly match a localapi path,
|
|
|
|
// with prefix /api/local/ rather than /localapi/.
|
|
|
|
//
|
|
|
|
// If the localapi path is not included in localapiAllowlist,
|
|
|
|
// the request is rejected.
|
|
|
|
func (s *Server) proxyRequestToLocalAPI(w http.ResponseWriter, r *http.Request) {
|
|
|
|
path := strings.TrimPrefix(r.URL.Path, "/api/local")
|
|
|
|
if r.URL.Path == path { // missing prefix
|
|
|
|
http.Error(w, "invalid request", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if !slices.Contains(localapiAllowlist, path) {
|
|
|
|
http.Error(w, fmt.Sprintf("%s not allowed from localapi proxy", path), http.StatusForbidden)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
localAPIURL := "http://" + apitype.LocalAPIHost + "/localapi" + path
|
|
|
|
req, err := http.NewRequestWithContext(r.Context(), r.Method, localAPIURL, r.Body)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, "failed to construct request", http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make request to tailscaled localapi.
|
|
|
|
resp, err := s.lc.DoLocalRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), resp.StatusCode)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
// Send response back to web frontend.
|
|
|
|
w.Header().Set("Content-Type", resp.Header.Get("Content-Type"))
|
|
|
|
w.WriteHeader(resp.StatusCode)
|
|
|
|
if _, err := io.Copy(w, resp.Body); err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// localapiAllowlist is an allowlist of localapi endpoints the
|
|
|
|
// web client is allowed to proxy to the client's localapi.
|
|
|
|
//
|
|
|
|
// Rather than exposing all localapi endpoints over the proxy,
|
|
|
|
// this limits to just the ones actually used from the web
|
|
|
|
// client frontend.
|
|
|
|
//
|
|
|
|
// TODO(sonia,will): Shouldn't expand this beyond the existing
|
|
|
|
// localapi endpoints until the larger web client auth story
|
|
|
|
// is worked out (tailscale/corp#14335).
|
|
|
|
var localapiAllowlist = []string{
|
|
|
|
"/v0/logout",
|
|
|
|
}
|
|
|
|
|
2023-08-23 22:22:24 +00:00
|
|
|
// csrfKey returns a key that can be used for CSRF protection.
|
|
|
|
// If an error occurs during key creation, the error is logged and the active process terminated.
|
|
|
|
// If the server is running in CGI mode, the key is cached to disk and reused between requests.
|
|
|
|
// If an error occurs during key storage, the error is logged and the active process terminated.
|
|
|
|
func (s *Server) csrfKey() []byte {
|
2023-08-30 18:20:02 +00:00
|
|
|
csrfFile := filepath.Join(os.TempDir(), "tailscale-web-csrf.key")
|
2023-08-23 22:22:24 +00:00
|
|
|
|
|
|
|
// if running in CGI mode, try to read from disk, but ignore errors
|
|
|
|
if s.cgiMode {
|
|
|
|
key, _ := os.ReadFile(csrfFile)
|
|
|
|
if len(key) == 32 {
|
|
|
|
return key
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// create a new key
|
2023-08-16 22:52:31 +00:00
|
|
|
key := make([]byte, 32)
|
|
|
|
if _, err := rand.Read(key); err != nil {
|
2023-09-02 18:09:38 +00:00
|
|
|
log.Fatalf("error generating CSRF key: %v", err)
|
2023-08-16 22:52:31 +00:00
|
|
|
}
|
2023-08-23 22:22:24 +00:00
|
|
|
|
|
|
|
// if running in CGI mode, try to write the newly created key to disk, and exit if it fails.
|
|
|
|
if s.cgiMode {
|
|
|
|
if err := os.WriteFile(csrfFile, key, 0600); err != nil {
|
|
|
|
log.Fatalf("unable to store CSRF key: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-16 22:52:31 +00:00
|
|
|
return key
|
|
|
|
}
|
2023-08-24 19:56:09 +00:00
|
|
|
|
|
|
|
// enforcePrefix returns a HandlerFunc that enforces a given path prefix is used in requests,
|
|
|
|
// then strips it before invoking h.
|
|
|
|
// Unlike http.StripPrefix, it does not return a 404 if the prefix is not present.
|
|
|
|
// Instead, it returns a redirect to the prefix path.
|
|
|
|
func enforcePrefix(prefix string, h http.HandlerFunc) http.HandlerFunc {
|
2023-08-31 21:27:41 +00:00
|
|
|
if prefix == "" {
|
|
|
|
return h
|
|
|
|
}
|
|
|
|
|
|
|
|
// ensure that prefix always has both a leading and trailing slash so
|
|
|
|
// that relative links for JS and CSS assets work correctly.
|
|
|
|
if !strings.HasPrefix(prefix, "/") {
|
|
|
|
prefix = "/" + prefix
|
|
|
|
}
|
|
|
|
if !strings.HasSuffix(prefix, "/") {
|
|
|
|
prefix += "/"
|
|
|
|
}
|
|
|
|
|
2023-08-24 19:56:09 +00:00
|
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if !strings.HasPrefix(r.URL.Path, prefix) {
|
|
|
|
http.Redirect(w, r, prefix, http.StatusFound)
|
|
|
|
return
|
|
|
|
}
|
2023-08-24 21:40:17 +00:00
|
|
|
prefix = strings.TrimSuffix(prefix, "/")
|
2023-08-24 19:56:09 +00:00
|
|
|
http.StripPrefix(prefix, h).ServeHTTP(w, r)
|
|
|
|
}
|
|
|
|
}
|