2020-06-21 04:32:08 -06:00
|
|
|
package headscale
|
|
|
|
|
|
|
|
import (
|
2021-10-26 14:42:56 -06:00
|
|
|
"context"
|
|
|
|
"crypto/tls"
|
2021-04-23 20:54:15 -06:00
|
|
|
"errors"
|
2020-06-21 04:32:08 -06:00
|
|
|
"fmt"
|
2021-10-29 10:45:06 -06:00
|
|
|
"io"
|
2021-10-26 14:42:56 -06:00
|
|
|
"net"
|
2021-04-23 20:54:15 -06:00
|
|
|
"net/http"
|
2021-10-22 10:55:14 -06:00
|
|
|
"net/url"
|
2021-02-21 15:54:15 -07:00
|
|
|
"os"
|
2021-11-02 15:46:15 -06:00
|
|
|
"os/signal"
|
2021-10-06 16:06:07 -06:00
|
|
|
"sort"
|
2021-04-23 14:54:35 -06:00
|
|
|
"strings"
|
2021-02-23 13:07:52 -07:00
|
|
|
"sync"
|
2021-11-02 15:46:15 -06:00
|
|
|
"syscall"
|
2021-05-22 18:15:29 -06:00
|
|
|
"time"
|
2020-06-21 04:32:08 -06:00
|
|
|
|
2021-10-18 13:27:52 -06:00
|
|
|
"github.com/coreos/go-oidc/v3/oidc"
|
2020-06-21 04:32:08 -06:00
|
|
|
"github.com/gin-gonic/gin"
|
2021-11-13 01:39:04 -07:00
|
|
|
grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware"
|
2021-10-26 14:42:56 -06:00
|
|
|
"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
|
2021-11-04 16:18:55 -06:00
|
|
|
v1 "github.com/juanfont/headscale/gen/go/headscale/v1"
|
2021-11-13 01:39:04 -07:00
|
|
|
"github.com/patrickmn/go-cache"
|
|
|
|
zerolog "github.com/philip-bui/grpc-zerolog"
|
2021-11-08 15:06:25 -07:00
|
|
|
zl "github.com/rs/zerolog"
|
2021-10-26 14:42:56 -06:00
|
|
|
"github.com/rs/zerolog/log"
|
|
|
|
"github.com/soheilhy/cmux"
|
2021-10-09 04:22:13 -06:00
|
|
|
ginprometheus "github.com/zsais/go-gin-prometheus"
|
2021-10-03 12:26:38 -06:00
|
|
|
"golang.org/x/crypto/acme"
|
2021-04-23 20:54:15 -06:00
|
|
|
"golang.org/x/crypto/acme/autocert"
|
2021-11-13 01:39:04 -07:00
|
|
|
"golang.org/x/oauth2"
|
2021-10-26 14:42:56 -06:00
|
|
|
"golang.org/x/sync/errgroup"
|
|
|
|
"google.golang.org/grpc"
|
2021-10-29 10:45:06 -06:00
|
|
|
"google.golang.org/grpc/codes"
|
|
|
|
"google.golang.org/grpc/credentials"
|
|
|
|
"google.golang.org/grpc/metadata"
|
|
|
|
"google.golang.org/grpc/peer"
|
|
|
|
"google.golang.org/grpc/reflection"
|
|
|
|
"google.golang.org/grpc/status"
|
2021-07-04 13:40:46 -06:00
|
|
|
"gorm.io/gorm"
|
2021-08-02 13:06:26 -06:00
|
|
|
"inet.af/netaddr"
|
2021-02-20 15:57:06 -07:00
|
|
|
"tailscale.com/tailcfg"
|
2021-10-02 04:13:05 -06:00
|
|
|
"tailscale.com/types/dnstype"
|
2021-06-25 10:57:08 -06:00
|
|
|
"tailscale.com/types/wgkey"
|
2020-06-21 04:32:08 -06:00
|
|
|
)
|
|
|
|
|
2021-10-29 10:45:06 -06:00
|
|
|
const (
|
2021-10-30 08:08:16 -06:00
|
|
|
AUTH_PREFIX = "Bearer "
|
2021-10-29 10:45:06 -06:00
|
|
|
)
|
|
|
|
|
2021-10-26 14:42:56 -06:00
|
|
|
// Config contains the initial Headscale configuration.
|
2020-06-21 04:32:08 -06:00
|
|
|
type Config struct {
|
2021-05-22 18:15:29 -06:00
|
|
|
ServerURL string
|
|
|
|
Addr string
|
|
|
|
PrivateKeyPath string
|
|
|
|
EphemeralNodeInactivityTimeout time.Duration
|
2021-08-02 13:06:26 -06:00
|
|
|
IPPrefix netaddr.IPPrefix
|
2021-10-02 03:20:42 -06:00
|
|
|
BaseDomain string
|
2020-06-21 04:32:08 -06:00
|
|
|
|
2021-10-22 10:55:14 -06:00
|
|
|
DERP DERPConfig
|
|
|
|
|
2021-05-15 06:32:26 -06:00
|
|
|
DBtype string
|
|
|
|
DBpath string
|
2020-06-21 04:32:08 -06:00
|
|
|
DBhost string
|
|
|
|
DBport int
|
|
|
|
DBname string
|
|
|
|
DBuser string
|
|
|
|
DBpass string
|
2021-04-23 14:54:35 -06:00
|
|
|
|
2021-07-23 16:12:01 -06:00
|
|
|
TLSLetsEncryptListen string
|
2021-04-23 20:54:15 -06:00
|
|
|
TLSLetsEncryptHostname string
|
|
|
|
TLSLetsEncryptCacheDir string
|
|
|
|
TLSLetsEncryptChallengeType string
|
|
|
|
|
2021-04-23 14:54:35 -06:00
|
|
|
TLSCertPath string
|
|
|
|
TLSKeyPath string
|
2021-08-24 00:09:47 -06:00
|
|
|
|
2021-10-03 12:26:38 -06:00
|
|
|
ACMEURL string
|
|
|
|
ACMEEmail string
|
|
|
|
|
2021-08-24 00:09:47 -06:00
|
|
|
DNSConfig *tailcfg.DNSConfig
|
2021-10-30 08:08:16 -06:00
|
|
|
|
|
|
|
UnixSocket string
|
2021-10-31 03:40:43 -06:00
|
|
|
|
2021-10-18 13:27:52 -06:00
|
|
|
OIDC OIDCConfig
|
2021-10-08 03:43:52 -06:00
|
|
|
|
2021-11-07 02:41:14 -07:00
|
|
|
CLI CLIConfig
|
|
|
|
|
2021-10-10 03:22:42 -06:00
|
|
|
MaxMachineRegistrationDuration time.Duration
|
|
|
|
DefaultMachineRegistrationDuration time.Duration
|
2020-06-21 04:32:08 -06:00
|
|
|
}
|
|
|
|
|
2021-10-18 13:27:52 -06:00
|
|
|
type OIDCConfig struct {
|
|
|
|
Issuer string
|
|
|
|
ClientID string
|
|
|
|
ClientSecret string
|
|
|
|
MatchMap map[string]string
|
2020-06-21 04:32:08 -06:00
|
|
|
}
|
|
|
|
|
2021-10-22 10:55:14 -06:00
|
|
|
type DERPConfig struct {
|
|
|
|
URLs []url.URL
|
|
|
|
Paths []string
|
|
|
|
AutoUpdate bool
|
|
|
|
UpdateFrequency time.Duration
|
|
|
|
}
|
|
|
|
|
2021-11-07 02:41:14 -07:00
|
|
|
type CLIConfig struct {
|
|
|
|
Address string
|
|
|
|
APIKey string
|
|
|
|
Insecure bool
|
|
|
|
Timeout time.Duration
|
|
|
|
}
|
|
|
|
|
2021-10-26 14:42:56 -06:00
|
|
|
// Headscale represents the base app of the service.
|
2020-06-21 04:32:08 -06:00
|
|
|
type Headscale struct {
|
|
|
|
cfg Config
|
2021-07-04 13:40:46 -06:00
|
|
|
db *gorm.DB
|
2020-06-21 04:32:08 -06:00
|
|
|
dbString string
|
2021-05-02 12:47:36 -06:00
|
|
|
dbType string
|
|
|
|
dbDebug bool
|
2021-06-25 10:57:08 -06:00
|
|
|
publicKey *wgkey.Key
|
|
|
|
privateKey *wgkey.Private
|
2021-02-23 13:07:52 -07:00
|
|
|
|
2021-10-22 10:55:14 -06:00
|
|
|
DERPMap *tailcfg.DERPMap
|
|
|
|
|
2021-07-03 09:31:32 -06:00
|
|
|
aclPolicy *ACLPolicy
|
2021-11-04 16:18:55 -06:00
|
|
|
aclRules []tailcfg.FilterRule
|
2021-07-03 09:31:32 -06:00
|
|
|
|
2021-08-19 11:19:26 -06:00
|
|
|
lastStateChange sync.Map
|
2021-10-08 03:43:52 -06:00
|
|
|
|
|
|
|
oidcProvider *oidc.Provider
|
|
|
|
oauth2Config *oauth2.Config
|
|
|
|
oidcStateCache *cache.Cache
|
2020-06-21 04:32:08 -06:00
|
|
|
}
|
|
|
|
|
2021-10-26 14:42:56 -06:00
|
|
|
// NewHeadscale returns the Headscale app.
|
2020-06-21 04:32:08 -06:00
|
|
|
func NewHeadscale(cfg Config) (*Headscale, error) {
|
2021-02-21 15:54:15 -07:00
|
|
|
content, err := os.ReadFile(cfg.PrivateKeyPath)
|
2020-06-21 04:32:08 -06:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-10-26 14:42:56 -06:00
|
|
|
|
2021-06-25 10:57:08 -06:00
|
|
|
privKey, err := wgkey.ParsePrivate(string(content))
|
2020-06-21 04:32:08 -06:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
pubKey := privKey.Public()
|
2021-05-15 06:32:26 -06:00
|
|
|
|
|
|
|
var dbString string
|
|
|
|
switch cfg.DBtype {
|
|
|
|
case "postgres":
|
2021-11-13 01:36:45 -07:00
|
|
|
dbString = fmt.Sprintf(
|
|
|
|
"host=%s port=%d dbname=%s user=%s password=%s sslmode=disable",
|
|
|
|
cfg.DBhost,
|
|
|
|
cfg.DBport,
|
|
|
|
cfg.DBname,
|
|
|
|
cfg.DBuser,
|
|
|
|
cfg.DBpass,
|
|
|
|
)
|
2021-05-15 06:32:26 -06:00
|
|
|
case "sqlite3":
|
|
|
|
dbString = cfg.DBpath
|
|
|
|
default:
|
2021-07-11 07:10:37 -06:00
|
|
|
return nil, errors.New("unsupported DB")
|
2021-05-15 06:32:26 -06:00
|
|
|
}
|
|
|
|
|
2020-06-21 04:32:08 -06:00
|
|
|
h := Headscale{
|
2021-05-15 06:32:26 -06:00
|
|
|
cfg: cfg,
|
|
|
|
dbType: cfg.DBtype,
|
|
|
|
dbString: dbString,
|
2020-06-21 04:32:08 -06:00
|
|
|
privateKey: privKey,
|
|
|
|
publicKey: &pubKey,
|
2021-11-04 16:18:55 -06:00
|
|
|
aclRules: tailcfg.FilterAllowAll, // default allowall
|
2020-06-21 04:32:08 -06:00
|
|
|
}
|
2021-07-04 05:24:05 -06:00
|
|
|
|
2020-06-21 04:32:08 -06:00
|
|
|
err = h.initDB()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-07-04 13:40:46 -06:00
|
|
|
|
2021-10-18 13:27:52 -06:00
|
|
|
if cfg.OIDC.Issuer != "" {
|
2021-10-08 03:43:52 -06:00
|
|
|
err = h.initOIDC()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-10-18 13:27:52 -06:00
|
|
|
}
|
2021-10-16 08:31:37 -06:00
|
|
|
|
2021-10-02 04:13:05 -06:00
|
|
|
if h.cfg.DNSConfig != nil && h.cfg.DNSConfig.Proxied { // if MagicDNS
|
2021-11-13 01:36:45 -07:00
|
|
|
magicDNSDomains, err := generateMagicDNSRootDomains(
|
|
|
|
h.cfg.IPPrefix,
|
|
|
|
h.cfg.BaseDomain,
|
|
|
|
)
|
2021-10-02 04:13:05 -06:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-10-20 01:35:56 -06:00
|
|
|
// we might have routes already from Split DNS
|
2021-10-22 10:55:14 -06:00
|
|
|
if h.cfg.DNSConfig.Routes == nil {
|
2021-10-19 12:51:43 -06:00
|
|
|
h.cfg.DNSConfig.Routes = make(map[string][]dnstype.Resolver)
|
|
|
|
}
|
2021-10-10 04:43:41 -06:00
|
|
|
for _, d := range magicDNSDomains {
|
2021-10-02 04:13:05 -06:00
|
|
|
h.cfg.DNSConfig.Routes[d.WithoutTrailingDot()] = nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-21 04:32:08 -06:00
|
|
|
return &h, nil
|
|
|
|
}
|
|
|
|
|
2021-10-26 14:42:56 -06:00
|
|
|
// Redirect to our TLS url.
|
2021-04-23 20:54:15 -06:00
|
|
|
func (h *Headscale) redirect(w http.ResponseWriter, req *http.Request) {
|
|
|
|
target := h.cfg.ServerURL + req.URL.RequestURI()
|
|
|
|
http.Redirect(w, req, target, http.StatusFound)
|
|
|
|
}
|
|
|
|
|
2021-08-12 13:45:40 -06:00
|
|
|
// expireEphemeralNodes deletes ephemeral machine records that have not been
|
2021-10-26 14:42:56 -06:00
|
|
|
// seen for longer than h.cfg.EphemeralNodeInactivityTimeout.
|
2021-08-12 13:45:40 -06:00
|
|
|
func (h *Headscale) expireEphemeralNodes(milliSeconds int64) {
|
2021-05-22 18:15:29 -06:00
|
|
|
ticker := time.NewTicker(time.Duration(milliSeconds) * time.Millisecond)
|
|
|
|
for range ticker.C {
|
|
|
|
h.expireEphemeralNodesWorker()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *Headscale) expireEphemeralNodesWorker() {
|
|
|
|
namespaces, err := h.ListNamespaces()
|
|
|
|
if err != nil {
|
2021-08-05 11:11:26 -06:00
|
|
|
log.Error().Err(err).Msg("Error listing namespaces")
|
2021-10-26 14:42:56 -06:00
|
|
|
|
2021-05-22 18:15:29 -06:00
|
|
|
return
|
|
|
|
}
|
2021-10-26 14:42:56 -06:00
|
|
|
|
2021-11-04 16:18:55 -06:00
|
|
|
for _, ns := range namespaces {
|
2021-05-22 18:15:29 -06:00
|
|
|
machines, err := h.ListMachinesInNamespace(ns.Name)
|
|
|
|
if err != nil {
|
2021-11-13 01:36:45 -07:00
|
|
|
log.Error().
|
|
|
|
Err(err).
|
|
|
|
Str("namespace", ns.Name).
|
|
|
|
Msg("Error listing machines in namespace")
|
2021-10-26 14:42:56 -06:00
|
|
|
|
2021-05-22 18:15:29 -06:00
|
|
|
return
|
|
|
|
}
|
2021-10-26 14:42:56 -06:00
|
|
|
|
2021-11-04 16:18:55 -06:00
|
|
|
for _, m := range machines {
|
2021-10-22 10:55:14 -06:00
|
|
|
if m.AuthKey != nil && m.LastSeen != nil && m.AuthKey.Ephemeral &&
|
|
|
|
time.Now().After(m.LastSeen.Add(h.cfg.EphemeralNodeInactivityTimeout)) {
|
2021-11-13 01:36:45 -07:00
|
|
|
log.Info().
|
|
|
|
Str("machine", m.Name).
|
|
|
|
Msg("Ephemeral client removed from database")
|
2021-10-26 14:42:56 -06:00
|
|
|
|
2021-07-04 13:40:46 -06:00
|
|
|
err = h.db.Unscoped().Delete(m).Error
|
2021-05-22 18:15:29 -06:00
|
|
|
if err != nil {
|
2021-10-22 10:55:14 -06:00
|
|
|
log.Error().
|
|
|
|
Err(err).
|
|
|
|
Str("machine", m.Name).
|
|
|
|
Msg("🤮 Cannot delete ephemeral machine from the database")
|
2021-05-22 18:15:29 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-10-26 14:42:56 -06:00
|
|
|
|
2021-10-05 10:24:46 -06:00
|
|
|
h.setLastStateChangeToNow(ns.Name)
|
2021-05-22 18:15:29 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-25 09:59:48 -06:00
|
|
|
// WatchForKVUpdates checks the KV DB table for requests to perform tailnet upgrades
|
2021-10-26 14:42:56 -06:00
|
|
|
// This is a way to communitate the CLI with the headscale server.
|
2021-07-25 09:59:48 -06:00
|
|
|
func (h *Headscale) watchForKVUpdates(milliSeconds int64) {
|
|
|
|
ticker := time.NewTicker(time.Duration(milliSeconds) * time.Millisecond)
|
|
|
|
for range ticker.C {
|
|
|
|
h.watchForKVUpdatesWorker()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *Headscale) watchForKVUpdatesWorker() {
|
|
|
|
h.checkForNamespacesPendingUpdates()
|
|
|
|
// more functions will come here in the future
|
|
|
|
}
|
|
|
|
|
2021-10-29 10:45:06 -06:00
|
|
|
func (h *Headscale) grpcAuthenticationInterceptor(ctx context.Context,
|
|
|
|
req interface{},
|
|
|
|
info *grpc.UnaryServerInfo,
|
|
|
|
handler grpc.UnaryHandler) (interface{}, error) {
|
|
|
|
// Check if the request is coming from the on-server client.
|
|
|
|
// This is not secure, but it is to maintain maintainability
|
|
|
|
// with the "legacy" database-based client
|
|
|
|
// It is also neede for grpc-gateway to be able to connect to
|
|
|
|
// the server
|
|
|
|
p, _ := peer.FromContext(ctx)
|
|
|
|
|
2021-11-13 01:36:45 -07:00
|
|
|
log.Trace().
|
|
|
|
Caller().
|
|
|
|
Str("client_address", p.Addr.String()).
|
|
|
|
Msg("Client is trying to authenticate")
|
2021-10-29 10:45:06 -06:00
|
|
|
|
|
|
|
md, ok := metadata.FromIncomingContext(ctx)
|
|
|
|
if !ok {
|
2021-11-13 01:36:45 -07:00
|
|
|
log.Error().
|
|
|
|
Caller().
|
|
|
|
Str("client_address", p.Addr.String()).
|
|
|
|
Msg("Retrieving metadata is failed")
|
2021-11-14 08:46:09 -07:00
|
|
|
|
2021-11-13 01:36:45 -07:00
|
|
|
return ctx, status.Errorf(
|
|
|
|
codes.InvalidArgument,
|
|
|
|
"Retrieving metadata is failed",
|
|
|
|
)
|
2021-10-29 10:45:06 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
authHeader, ok := md["authorization"]
|
|
|
|
if !ok {
|
2021-11-13 01:36:45 -07:00
|
|
|
log.Error().
|
|
|
|
Caller().
|
|
|
|
Str("client_address", p.Addr.String()).
|
|
|
|
Msg("Authorization token is not supplied")
|
2021-11-14 08:46:09 -07:00
|
|
|
|
2021-11-13 01:36:45 -07:00
|
|
|
return ctx, status.Errorf(
|
|
|
|
codes.Unauthenticated,
|
|
|
|
"Authorization token is not supplied",
|
|
|
|
)
|
2021-10-29 10:45:06 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
token := authHeader[0]
|
|
|
|
|
|
|
|
if !strings.HasPrefix(token, AUTH_PREFIX) {
|
|
|
|
log.Error().
|
|
|
|
Caller().
|
|
|
|
Str("client_address", p.Addr.String()).
|
|
|
|
Msg(`missing "Bearer " prefix in "Authorization" header`)
|
2021-11-14 08:46:09 -07:00
|
|
|
|
2021-11-13 01:36:45 -07:00
|
|
|
return ctx, status.Error(
|
|
|
|
codes.Unauthenticated,
|
|
|
|
`missing "Bearer " prefix in "Authorization" header`,
|
|
|
|
)
|
2021-10-29 10:45:06 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(kradalby): Implement API key backend:
|
|
|
|
// - Table in the DB
|
|
|
|
// - Key name
|
|
|
|
// - Encrypted
|
|
|
|
// - Expiry
|
|
|
|
//
|
|
|
|
// Currently all other than localhost traffic is unauthorized, this is intentional to allow
|
|
|
|
// us to make use of gRPC for our CLI, but not having to implement any of the remote capabilities
|
|
|
|
// and API key auth
|
2021-11-13 01:36:45 -07:00
|
|
|
return ctx, status.Error(
|
|
|
|
codes.Unauthenticated,
|
|
|
|
"Authentication is not implemented yet",
|
|
|
|
)
|
2021-10-29 10:45:06 -06:00
|
|
|
|
|
|
|
//if strings.TrimPrefix(token, AUTH_PREFIX) != a.Token {
|
|
|
|
// log.Error().Caller().Str("client_address", p.Addr.String()).Msg("invalid token")
|
|
|
|
// return ctx, status.Error(codes.Unauthenticated, "invalid token")
|
|
|
|
//}
|
|
|
|
|
|
|
|
// return handler(ctx, req)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *Headscale) httpAuthenticationMiddleware(c *gin.Context) {
|
|
|
|
log.Trace().
|
|
|
|
Caller().
|
|
|
|
Str("client_address", c.ClientIP()).
|
|
|
|
Msg("HTTP authentication invoked")
|
|
|
|
|
|
|
|
authHeader := c.GetHeader("authorization")
|
|
|
|
|
|
|
|
if !strings.HasPrefix(authHeader, AUTH_PREFIX) {
|
|
|
|
log.Error().
|
|
|
|
Caller().
|
|
|
|
Str("client_address", c.ClientIP()).
|
|
|
|
Msg(`missing "Bearer " prefix in "Authorization" header`)
|
|
|
|
c.AbortWithStatus(http.StatusUnauthorized)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
c.AbortWithStatus(http.StatusUnauthorized)
|
|
|
|
|
|
|
|
// TODO(kradalby): Implement API key backend
|
|
|
|
// Currently all traffic is unauthorized, this is intentional to allow
|
|
|
|
// us to make use of gRPC for our CLI, but not having to implement any of the remote capabilities
|
|
|
|
// and API key auth
|
|
|
|
//
|
|
|
|
// if strings.TrimPrefix(authHeader, AUTH_PREFIX) != a.Token {
|
|
|
|
// log.Error().Caller().Str("client_address", c.ClientIP()).Msg("invalid token")
|
|
|
|
// c.AbortWithStatusJSON(http.StatusUnauthorized, gin.H{"error", "unauthorized"})
|
|
|
|
|
|
|
|
// return
|
|
|
|
// }
|
|
|
|
|
|
|
|
// c.Next()
|
|
|
|
}
|
|
|
|
|
2021-11-07 02:55:32 -07:00
|
|
|
// ensureUnixSocketIsAbsent will check if the given path for headscales unix socket is clear
|
|
|
|
// and will remove it if it is not.
|
|
|
|
func (h *Headscale) ensureUnixSocketIsAbsent() error {
|
|
|
|
// File does not exist, all fine
|
|
|
|
if _, err := os.Stat(h.cfg.UnixSocket); errors.Is(err, os.ErrNotExist) {
|
|
|
|
return nil
|
|
|
|
}
|
2021-11-14 08:46:09 -07:00
|
|
|
|
2021-11-07 02:55:32 -07:00
|
|
|
return os.Remove(h.cfg.UnixSocket)
|
|
|
|
}
|
|
|
|
|
2021-10-26 14:42:56 -06:00
|
|
|
// Serve launches a GIN server with the Headscale API.
|
2020-06-21 04:32:08 -06:00
|
|
|
func (h *Headscale) Serve() error {
|
2021-10-26 14:42:56 -06:00
|
|
|
var err error
|
|
|
|
|
|
|
|
ctx := context.Background()
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
|
|
|
|
defer cancel()
|
|
|
|
|
2021-11-07 02:55:32 -07:00
|
|
|
err = h.ensureUnixSocketIsAbsent()
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
2021-10-30 08:08:16 -06:00
|
|
|
socketListener, err := net.Listen("unix", h.cfg.UnixSocket)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
2021-11-02 15:46:15 -06:00
|
|
|
// Handle common process-killing signals so we can gracefully shut down:
|
|
|
|
sigc := make(chan os.Signal, 1)
|
2021-11-02 15:49:19 -06:00
|
|
|
signal.Notify(sigc, os.Interrupt, syscall.SIGTERM)
|
2021-11-02 15:46:15 -06:00
|
|
|
go func(c chan os.Signal) {
|
|
|
|
// Wait for a SIGINT or SIGKILL:
|
|
|
|
sig := <-c
|
|
|
|
log.Printf("Caught signal %s: shutting down.", sig)
|
|
|
|
// Stop listening (and unlink the socket if unix type):
|
|
|
|
socketListener.Close()
|
|
|
|
// And we're done:
|
|
|
|
os.Exit(0)
|
|
|
|
}(sigc)
|
|
|
|
|
2021-10-30 08:08:16 -06:00
|
|
|
networkListener, err := net.Listen("tcp", h.cfg.Addr)
|
2021-10-26 14:42:56 -06:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the cmux object that will multiplex 2 protocols on the same port.
|
|
|
|
// The two following listeners will be served on the same port below gracefully.
|
2021-10-30 08:08:16 -06:00
|
|
|
m := cmux.New(networkListener)
|
2021-10-26 14:42:56 -06:00
|
|
|
// Match gRPC requests here
|
2021-10-29 10:45:06 -06:00
|
|
|
grpcListener := m.MatchWithWriters(
|
|
|
|
cmux.HTTP2MatchHeaderFieldSendSettings("content-type", "application/grpc"),
|
2021-11-13 01:36:45 -07:00
|
|
|
cmux.HTTP2MatchHeaderFieldSendSettings(
|
|
|
|
"content-type",
|
|
|
|
"application/grpc+proto",
|
|
|
|
),
|
2021-10-29 10:45:06 -06:00
|
|
|
)
|
2021-10-26 14:42:56 -06:00
|
|
|
// Otherwise match regular http requests.
|
|
|
|
httpListener := m.Match(cmux.Any())
|
|
|
|
|
|
|
|
grpcGatewayMux := runtime.NewServeMux()
|
|
|
|
|
2021-10-30 08:08:16 -06:00
|
|
|
// Make the grpc-gateway connect to grpc over socket
|
|
|
|
grpcGatewayConn, err := grpc.Dial(
|
|
|
|
h.cfg.UnixSocket,
|
|
|
|
[]grpc.DialOption{
|
|
|
|
grpc.WithInsecure(),
|
2021-10-30 08:29:03 -06:00
|
|
|
grpc.WithContextDialer(GrpcSocketDialer),
|
2021-10-30 08:08:16 -06:00
|
|
|
}...,
|
|
|
|
)
|
2021-10-29 10:45:06 -06:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-10-26 14:42:56 -06:00
|
|
|
|
2021-10-29 10:45:06 -06:00
|
|
|
// Connect to the gRPC server over localhost to skip
|
|
|
|
// the authentication.
|
2021-11-04 16:18:55 -06:00
|
|
|
err = v1.RegisterHeadscaleServiceHandler(ctx, grpcGatewayMux, grpcGatewayConn)
|
2021-10-26 14:42:56 -06:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-06-21 04:32:08 -06:00
|
|
|
r := gin.Default()
|
2021-10-04 10:28:07 -06:00
|
|
|
|
|
|
|
p := ginprometheus.NewPrometheus("gin")
|
|
|
|
p.Use(r)
|
|
|
|
|
2021-11-13 01:36:45 -07:00
|
|
|
r.GET(
|
|
|
|
"/health",
|
|
|
|
func(c *gin.Context) { c.JSON(http.StatusOK, gin.H{"healthy": "ok"}) },
|
|
|
|
)
|
2020-06-21 04:32:08 -06:00
|
|
|
r.GET("/key", h.KeyHandler)
|
|
|
|
r.GET("/register", h.RegisterWebAPI)
|
|
|
|
r.POST("/machine/:id/map", h.PollNetMapHandler)
|
|
|
|
r.POST("/machine/:id", h.RegistrationHandler)
|
2021-10-06 03:19:15 -06:00
|
|
|
r.GET("/oidc/register/:mkey", h.RegisterOIDC)
|
2021-09-26 02:53:05 -06:00
|
|
|
r.GET("/oidc/callback", h.OIDCCallback)
|
2021-09-19 10:56:29 -06:00
|
|
|
r.GET("/apple", h.AppleMobileConfig)
|
|
|
|
r.GET("/apple/:platform", h.ApplePlatformConfig)
|
2021-10-30 08:29:53 -06:00
|
|
|
r.GET("/swagger", SwaggerUI)
|
|
|
|
r.GET("/swagger/v1/openapiv2.json", SwaggerAPIv1)
|
2021-10-26 14:42:56 -06:00
|
|
|
|
2021-10-29 10:45:06 -06:00
|
|
|
api := r.Group("/api")
|
|
|
|
api.Use(h.httpAuthenticationMiddleware)
|
|
|
|
{
|
|
|
|
api.Any("/v1/*any", gin.WrapF(grpcGatewayMux.ServeHTTP))
|
|
|
|
}
|
|
|
|
|
|
|
|
r.NoRoute(stdoutHandler)
|
2021-07-25 09:59:48 -06:00
|
|
|
|
2021-10-22 10:55:14 -06:00
|
|
|
// Fetch an initial DERP Map before we start serving
|
|
|
|
h.DERPMap = GetDERPMap(h.cfg.DERP)
|
|
|
|
|
|
|
|
if h.cfg.DERP.AutoUpdate {
|
|
|
|
derpMapCancelChannel := make(chan struct{})
|
|
|
|
defer func() { derpMapCancelChannel <- struct{}{} }()
|
|
|
|
go h.scheduledDERPMapUpdateWorker(derpMapCancelChannel)
|
|
|
|
}
|
|
|
|
|
2021-10-26 14:42:56 -06:00
|
|
|
// I HATE THIS
|
2021-10-29 10:45:06 -06:00
|
|
|
updateMillisecondsWait := int64(5000)
|
2021-10-26 14:42:56 -06:00
|
|
|
go h.watchForKVUpdates(updateMillisecondsWait)
|
|
|
|
go h.expireEphemeralNodes(updateMillisecondsWait)
|
|
|
|
|
|
|
|
httpServer := &http.Server{
|
2021-10-02 08:29:27 -06:00
|
|
|
Addr: h.cfg.Addr,
|
|
|
|
Handler: r,
|
|
|
|
ReadTimeout: 30 * time.Second,
|
|
|
|
// Go does not handle timeouts in HTTP very well, and there is
|
|
|
|
// no good way to handle streaming timeouts, therefore we need to
|
|
|
|
// keep this at unlimited and be careful to clean up connections
|
|
|
|
// https://blog.cloudflare.com/the-complete-guide-to-golang-net-http-timeouts/#aboutstreaming
|
|
|
|
WriteTimeout: 0,
|
2021-08-18 16:21:11 -06:00
|
|
|
}
|
|
|
|
|
2021-11-08 15:06:25 -07:00
|
|
|
if zl.GlobalLevel() == zl.TraceLevel {
|
|
|
|
zerolog.RespLog = true
|
|
|
|
} else {
|
|
|
|
zerolog.RespLog = false
|
|
|
|
}
|
|
|
|
|
2021-10-29 10:45:06 -06:00
|
|
|
grpcOptions := []grpc.ServerOption{
|
|
|
|
grpc.UnaryInterceptor(
|
2021-11-04 16:18:55 -06:00
|
|
|
grpc_middleware.ChainUnaryServer(
|
|
|
|
h.grpcAuthenticationInterceptor,
|
|
|
|
zerolog.NewUnaryServerInterceptor(),
|
|
|
|
),
|
2021-10-29 10:45:06 -06:00
|
|
|
),
|
|
|
|
}
|
|
|
|
|
2021-10-26 14:42:56 -06:00
|
|
|
tlsConfig, err := h.getTLSSettings()
|
|
|
|
if err != nil {
|
|
|
|
log.Error().Err(err).Msg("Failed to set up TLS configuration")
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if tlsConfig != nil {
|
|
|
|
httpServer.TLSConfig = tlsConfig
|
2021-10-29 10:45:06 -06:00
|
|
|
|
|
|
|
grpcOptions = append(grpcOptions, grpc.Creds(credentials.NewTLS(tlsConfig)))
|
2021-10-26 14:42:56 -06:00
|
|
|
}
|
|
|
|
|
2021-10-29 10:45:06 -06:00
|
|
|
grpcServer := grpc.NewServer(grpcOptions...)
|
|
|
|
|
2021-10-31 13:52:34 -06:00
|
|
|
// Start the local gRPC server without TLS and without authentication
|
2021-11-04 16:18:55 -06:00
|
|
|
grpcSocket := grpc.NewServer(zerolog.UnaryInterceptor())
|
2021-10-31 13:52:34 -06:00
|
|
|
|
2021-11-04 16:18:55 -06:00
|
|
|
v1.RegisterHeadscaleServiceServer(grpcServer, newHeadscaleV1APIServer(h))
|
|
|
|
v1.RegisterHeadscaleServiceServer(grpcSocket, newHeadscaleV1APIServer(h))
|
2021-10-29 10:45:06 -06:00
|
|
|
reflection.Register(grpcServer)
|
2021-10-31 13:52:34 -06:00
|
|
|
reflection.Register(grpcSocket)
|
2021-10-29 10:45:06 -06:00
|
|
|
|
2021-10-26 14:42:56 -06:00
|
|
|
g := new(errgroup.Group)
|
|
|
|
|
2021-10-31 13:52:34 -06:00
|
|
|
g.Go(func() error { return grpcSocket.Serve(socketListener) })
|
2021-10-31 10:34:20 -06:00
|
|
|
|
|
|
|
// TODO(kradalby): Verify if we need the same TLS setup for gRPC as HTTP
|
2021-10-26 14:42:56 -06:00
|
|
|
g.Go(func() error { return grpcServer.Serve(grpcListener) })
|
2021-10-31 10:19:38 -06:00
|
|
|
|
|
|
|
if tlsConfig != nil {
|
|
|
|
g.Go(func() error {
|
|
|
|
tlsl := tls.NewListener(httpListener, tlsConfig)
|
2021-11-14 08:46:09 -07:00
|
|
|
|
2021-10-31 10:19:38 -06:00
|
|
|
return httpServer.Serve(tlsl)
|
|
|
|
})
|
|
|
|
} else {
|
|
|
|
g.Go(func() error { return httpServer.Serve(httpListener) })
|
|
|
|
}
|
|
|
|
|
2021-10-26 14:42:56 -06:00
|
|
|
g.Go(func() error { return m.Serve() })
|
|
|
|
|
2021-11-13 01:36:45 -07:00
|
|
|
log.Info().
|
|
|
|
Msgf("listening and serving (multiplexed HTTP and gRPC) on: %s", h.cfg.Addr)
|
2021-10-26 14:42:56 -06:00
|
|
|
|
|
|
|
return g.Wait()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *Headscale) getTLSSettings() (*tls.Config, error) {
|
2021-04-23 20:54:15 -06:00
|
|
|
if h.cfg.TLSLetsEncryptHostname != "" {
|
|
|
|
if !strings.HasPrefix(h.cfg.ServerURL, "https://") {
|
2021-11-13 01:36:45 -07:00
|
|
|
log.Warn().
|
|
|
|
Msg("Listening with TLS but ServerURL does not start with https://")
|
2021-04-23 20:54:15 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
m := autocert.Manager{
|
|
|
|
Prompt: autocert.AcceptTOS,
|
|
|
|
HostPolicy: autocert.HostWhitelist(h.cfg.TLSLetsEncryptHostname),
|
|
|
|
Cache: autocert.DirCache(h.cfg.TLSLetsEncryptCacheDir),
|
2021-10-03 12:26:38 -06:00
|
|
|
Client: &acme.Client{
|
|
|
|
DirectoryURL: h.cfg.ACMEURL,
|
|
|
|
},
|
|
|
|
Email: h.cfg.ACMEEmail,
|
2021-04-23 20:54:15 -06:00
|
|
|
}
|
2021-10-02 08:29:27 -06:00
|
|
|
|
2021-04-23 20:54:15 -06:00
|
|
|
if h.cfg.TLSLetsEncryptChallengeType == "TLS-ALPN-01" {
|
|
|
|
// Configuration via autocert with TLS-ALPN-01 (https://tools.ietf.org/html/rfc8737)
|
|
|
|
// The RFC requires that the validation is done on port 443; in other words, headscale
|
2021-07-24 07:01:20 -06:00
|
|
|
// must be reachable on port 443.
|
2021-10-26 14:42:56 -06:00
|
|
|
return m.TLSConfig(), nil
|
2021-04-23 20:54:15 -06:00
|
|
|
} else if h.cfg.TLSLetsEncryptChallengeType == "HTTP-01" {
|
|
|
|
// Configuration via autocert with HTTP-01. This requires listening on
|
|
|
|
// port 80 for the certificate validation in addition to the headscale
|
|
|
|
// service, which can be configured to run on any other port.
|
|
|
|
go func() {
|
2021-08-05 11:11:26 -06:00
|
|
|
log.Fatal().
|
|
|
|
Err(http.ListenAndServe(h.cfg.TLSLetsEncryptListen, m.HTTPHandler(http.HandlerFunc(h.redirect)))).
|
|
|
|
Msg("failed to set up a HTTP server")
|
2021-04-23 20:54:15 -06:00
|
|
|
}()
|
2021-10-26 14:42:56 -06:00
|
|
|
|
|
|
|
return m.TLSConfig(), nil
|
2021-04-23 20:54:15 -06:00
|
|
|
} else {
|
2021-10-26 14:42:56 -06:00
|
|
|
return nil, errors.New("unknown value for TLSLetsEncryptChallengeType")
|
2021-04-23 20:54:15 -06:00
|
|
|
}
|
|
|
|
} else if h.cfg.TLSCertPath == "" {
|
2021-04-23 14:54:35 -06:00
|
|
|
if !strings.HasPrefix(h.cfg.ServerURL, "http://") {
|
2021-08-05 11:11:26 -06:00
|
|
|
log.Warn().Msg("Listening without TLS but ServerURL does not start with http://")
|
2021-04-23 14:54:35 -06:00
|
|
|
}
|
2021-10-26 14:42:56 -06:00
|
|
|
|
|
|
|
return nil, nil
|
2021-04-23 14:54:35 -06:00
|
|
|
} else {
|
|
|
|
if !strings.HasPrefix(h.cfg.ServerURL, "https://") {
|
2021-08-05 11:11:26 -06:00
|
|
|
log.Warn().Msg("Listening with TLS but ServerURL does not start with https://")
|
2021-04-23 14:54:35 -06:00
|
|
|
}
|
2021-10-26 14:42:56 -06:00
|
|
|
var err error
|
|
|
|
tlsConfig := &tls.Config{}
|
|
|
|
tlsConfig.ClientAuth = tls.RequireAnyClientCert
|
|
|
|
tlsConfig.NextProtos = []string{"http/1.1"}
|
|
|
|
tlsConfig.Certificates = make([]tls.Certificate, 1)
|
|
|
|
tlsConfig.Certificates[0], err = tls.LoadX509KeyPair(h.cfg.TLSCertPath, h.cfg.TLSKeyPath)
|
|
|
|
|
|
|
|
return tlsConfig, err
|
2021-04-23 14:54:35 -06:00
|
|
|
}
|
2020-06-21 04:32:08 -06:00
|
|
|
}
|
2021-08-18 16:21:11 -06:00
|
|
|
|
2021-08-19 11:19:26 -06:00
|
|
|
func (h *Headscale) setLastStateChangeToNow(namespace string) {
|
2021-08-18 16:21:11 -06:00
|
|
|
now := time.Now().UTC()
|
2021-10-04 10:28:07 -06:00
|
|
|
lastStateUpdate.WithLabelValues("", "headscale").Set(float64(now.Unix()))
|
2021-08-19 11:19:26 -06:00
|
|
|
h.lastStateChange.Store(namespace, now)
|
2021-08-18 16:21:11 -06:00
|
|
|
}
|
|
|
|
|
2021-10-06 16:06:07 -06:00
|
|
|
func (h *Headscale) getLastStateChange(namespaces ...string) time.Time {
|
|
|
|
times := []time.Time{}
|
|
|
|
|
|
|
|
for _, namespace := range namespaces {
|
|
|
|
if wrapped, ok := h.lastStateChange.Load(namespace); ok {
|
|
|
|
lastChange, _ := wrapped.(time.Time)
|
|
|
|
|
|
|
|
times = append(times, lastChange)
|
|
|
|
}
|
2021-08-19 11:19:26 -06:00
|
|
|
}
|
|
|
|
|
2021-10-06 16:06:07 -06:00
|
|
|
sort.Slice(times, func(i, j int) bool {
|
|
|
|
return times[i].After(times[j])
|
|
|
|
})
|
|
|
|
|
|
|
|
log.Trace().Msgf("Latest times %#v", times)
|
|
|
|
|
|
|
|
if len(times) == 0 {
|
|
|
|
return time.Now().UTC()
|
|
|
|
} else {
|
|
|
|
return times[0]
|
|
|
|
}
|
2021-08-18 16:21:11 -06:00
|
|
|
}
|
2021-10-29 10:45:06 -06:00
|
|
|
|
|
|
|
func stdoutHandler(c *gin.Context) {
|
|
|
|
b, _ := io.ReadAll(c.Request.Body)
|
|
|
|
|
|
|
|
log.Trace().
|
|
|
|
Interface("header", c.Request.Header).
|
|
|
|
Interface("proto", c.Request.Proto).
|
|
|
|
Interface("url", c.Request.URL).
|
|
|
|
Bytes("body", b).
|
|
|
|
Msg("Request did not match")
|
|
|
|
}
|