mirror of
https://github.com/tailscale/tailscale.git
synced 2024-12-01 22:15:51 +00:00
e985c6e58f
Since the tailscaled binaries that we distribute are static and don't link cgo, we previously wouldn't fetch group IDs that are returned via NSS. Try shelling out to the 'id' command, similar to how we call 'getent', to detect such cases. Updates #11682 Signed-off-by: Andrew Dunham <andrew@du.nham.ca> Change-Id: I9bdc938bd76c71bc130d44a97cc2233064d64799
148 lines
4.0 KiB
Go
148 lines
4.0 KiB
Go
// Copyright (c) Tailscale Inc & AUTHORS
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
//go:build linux || (darwin && !ios) || freebsd || openbsd
|
|
|
|
package tailssh
|
|
|
|
import (
|
|
"io"
|
|
"os"
|
|
"os/exec"
|
|
"os/user"
|
|
"path/filepath"
|
|
"runtime"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"go4.org/mem"
|
|
"tailscale.com/envknob"
|
|
"tailscale.com/hostinfo"
|
|
"tailscale.com/util/lineread"
|
|
"tailscale.com/util/osuser"
|
|
"tailscale.com/version/distro"
|
|
)
|
|
|
|
// userMeta is a wrapper around *user.User with extra fields.
|
|
type userMeta struct {
|
|
user.User
|
|
|
|
// loginShellCached is the user's login shell, if known
|
|
// at the time of userLookup.
|
|
loginShellCached string
|
|
}
|
|
|
|
// GroupIds returns the list of group IDs that the user is a member of.
|
|
func (u *userMeta) GroupIds() ([]string, error) {
|
|
return osuser.GetGroupIds(&u.User)
|
|
}
|
|
|
|
// userLookup is like os/user.Lookup but it returns a *userMeta wrapper
|
|
// around a *user.User with extra fields.
|
|
func userLookup(username string) (*userMeta, error) {
|
|
u, s, err := osuser.LookupByUsernameWithShell(username)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &userMeta{User: *u, loginShellCached: s}, nil
|
|
}
|
|
|
|
func (u *userMeta) LoginShell() string {
|
|
if u.loginShellCached != "" {
|
|
// This field should be populated on Linux, at least, because
|
|
// func userLookup on Linux uses "getent" to look up the user
|
|
// and that populates it.
|
|
return u.loginShellCached
|
|
}
|
|
switch runtime.GOOS {
|
|
case "darwin":
|
|
// Note: /Users/username is key, and not the same as u.HomeDir.
|
|
out, _ := exec.Command("dscl", ".", "-read", filepath.Join("/Users", u.Username), "UserShell").Output()
|
|
// out is "UserShell: /bin/bash"
|
|
s, ok := strings.CutPrefix(string(out), "UserShell: ")
|
|
if ok {
|
|
return strings.TrimSpace(s)
|
|
}
|
|
}
|
|
if e := os.Getenv("SHELL"); e != "" {
|
|
return e
|
|
}
|
|
return "/bin/sh"
|
|
}
|
|
|
|
// defaultPathTmpl specifies the default PATH template to use for new sessions.
|
|
//
|
|
// If empty, a default value is used based on the OS & distro to match OpenSSH's
|
|
// usually-hardcoded behavior. (see
|
|
// https://github.com/tailscale/tailscale/issues/5285 for background).
|
|
//
|
|
// The template may contain @{HOME} or @{PAM_USER} which expand to the user's
|
|
// home directory and username, respectively. (PAM is not used, despite the
|
|
// name)
|
|
var defaultPathTmpl = envknob.RegisterString("TAILSCALE_SSH_DEFAULT_PATH")
|
|
|
|
func defaultPathForUser(u *user.User) string {
|
|
if s := defaultPathTmpl(); s != "" {
|
|
return expandDefaultPathTmpl(s, u)
|
|
}
|
|
isRoot := u.Uid == "0"
|
|
switch distro.Get() {
|
|
case distro.Debian:
|
|
hi := hostinfo.New()
|
|
if hi.Distro == "ubuntu" {
|
|
// distro.Get's Debian includes Ubuntu. But see if it's actually Ubuntu.
|
|
// Ubuntu doesn't empirically seem to distinguish between root and non-root for the default.
|
|
// And it includes /snap/bin.
|
|
return "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin"
|
|
}
|
|
if isRoot {
|
|
return "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
|
}
|
|
return "/usr/local/bin:/usr/bin:/bin:/usr/bn/games"
|
|
case distro.NixOS:
|
|
return defaultPathForUserOnNixOS(u)
|
|
}
|
|
if isRoot {
|
|
return "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
|
}
|
|
return "/usr/local/bin:/usr/bin:/bin"
|
|
}
|
|
|
|
func defaultPathForUserOnNixOS(u *user.User) string {
|
|
var path string
|
|
lineread.File("/etc/pam/environment", func(lineb []byte) error {
|
|
if v := pathFromPAMEnvLine(lineb, u); v != "" {
|
|
path = v
|
|
return io.EOF // stop iteration
|
|
}
|
|
return nil
|
|
})
|
|
return path
|
|
}
|
|
|
|
func pathFromPAMEnvLine(line []byte, u *user.User) (path string) {
|
|
if !mem.HasPrefix(mem.B(line), mem.S("PATH")) {
|
|
return ""
|
|
}
|
|
rest := strings.TrimSpace(strings.TrimPrefix(string(line), "PATH"))
|
|
if quoted, ok := strings.CutPrefix(rest, "DEFAULT="); ok {
|
|
if path, err := strconv.Unquote(quoted); err == nil {
|
|
return expandDefaultPathTmpl(path, u)
|
|
}
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func expandDefaultPathTmpl(t string, u *user.User) string {
|
|
p := strings.NewReplacer(
|
|
"@{HOME}", u.HomeDir,
|
|
"@{PAM_USER}", u.Username,
|
|
).Replace(t)
|
|
if strings.Contains(p, "@{") {
|
|
// If there are unknown expansions, conservatively fail closed.
|
|
return ""
|
|
}
|
|
return p
|
|
}
|