2021-04-28 16:15:45 +02:00
package cli
import (
2021-10-29 19:09:06 +02:00
"context"
2021-05-08 13:28:22 +02:00
"encoding/json"
2021-06-05 11:13:28 +02:00
"errors"
2021-05-08 13:28:22 +02:00
"fmt"
2021-10-22 18:55:14 +02:00
"net/url"
2021-04-28 16:15:45 +02:00
"os"
"path/filepath"
2021-10-18 21:27:52 +02:00
"regexp"
2021-10-29 19:09:06 +02:00
"strconv"
2021-04-28 16:15:45 +02:00
"strings"
2021-05-23 02:15:29 +02:00
"time"
2021-04-28 16:15:45 +02:00
"github.com/juanfont/headscale"
2021-11-04 23:31:47 +01:00
v1 "github.com/juanfont/headscale/gen/go/headscale/v1"
2021-08-05 19:26:49 +02:00
"github.com/rs/zerolog/log"
2021-04-28 16:15:45 +02:00
"github.com/spf13/viper"
2021-10-29 19:09:06 +02:00
"google.golang.org/grpc"
2021-11-04 23:31:47 +01:00
"gopkg.in/yaml.v2"
2021-08-02 21:06:26 +02:00
"inet.af/netaddr"
2021-04-28 16:15:45 +02:00
"tailscale.com/tailcfg"
2021-09-14 23:46:16 +02:00
"tailscale.com/types/dnstype"
2021-04-28 16:15:45 +02:00
)
2021-06-05 11:13:28 +02:00
func LoadConfig ( path string ) error {
viper . SetConfigName ( "config" )
if path == "" {
viper . AddConfigPath ( "/etc/headscale/" )
viper . AddConfigPath ( "$HOME/.headscale" )
viper . AddConfigPath ( "." )
} else {
// For testing
viper . AddConfigPath ( path )
}
viper . AutomaticEnv ( )
viper . SetDefault ( "tls_letsencrypt_cache_dir" , "/var/www/.cache" )
viper . SetDefault ( "tls_letsencrypt_challenge_type" , "HTTP-01" )
2021-08-02 21:06:26 +02:00
viper . SetDefault ( "ip_prefix" , "100.64.0.0/10" )
2021-08-20 18:15:07 +02:00
viper . SetDefault ( "log_level" , "info" )
2021-08-05 20:19:25 +02:00
2021-08-24 08:09:47 +02:00
viper . SetDefault ( "dns_config" , nil )
2021-10-30 16:08:16 +02:00
viper . SetDefault ( "unix_socket" , "/var/run/headscale.sock" )
2021-06-05 11:13:28 +02:00
err := viper . ReadInConfig ( )
if err != nil {
return fmt . Errorf ( "Fatal error reading config file: %s \n" , err )
}
// Collect any validation errors and return them all at once
var errorText string
2021-10-22 18:55:14 +02:00
if ( viper . GetString ( "tls_letsencrypt_hostname" ) != "" ) &&
( ( viper . GetString ( "tls_cert_path" ) != "" ) || ( viper . GetString ( "tls_key_path" ) != "" ) ) {
2021-06-05 11:13:28 +02:00
errorText += "Fatal config error: set either tls_letsencrypt_hostname or tls_cert_path/tls_key_path, not both\n"
}
2021-10-22 18:55:14 +02:00
if ( viper . GetString ( "tls_letsencrypt_hostname" ) != "" ) &&
( viper . GetString ( "tls_letsencrypt_challenge_type" ) == "TLS-ALPN-01" ) &&
( ! strings . HasSuffix ( viper . GetString ( "listen_addr" ) , ":443" ) ) {
2021-07-17 04:02:05 +02:00
// this is only a warning because there could be something sitting in front of headscale that redirects the traffic (e.g. an iptables rule)
2021-08-05 19:26:49 +02:00
log . Warn ( ) .
Msg ( "Warning: when using tls_letsencrypt_hostname with TLS-ALPN-01 as challenge type, headscale must be reachable on port 443, i.e. listen_addr should probably end in :443" )
2021-06-05 11:13:28 +02:00
}
2021-10-22 18:55:14 +02:00
if ( viper . GetString ( "tls_letsencrypt_challenge_type" ) != "HTTP-01" ) &&
( viper . GetString ( "tls_letsencrypt_challenge_type" ) != "TLS-ALPN-01" ) {
2021-06-05 11:13:28 +02:00
errorText += "Fatal config error: the only supported values for tls_letsencrypt_challenge_type are HTTP-01 and TLS-ALPN-01\n"
}
2021-10-22 18:55:14 +02:00
if ! strings . HasPrefix ( viper . GetString ( "server_url" ) , "http://" ) &&
! strings . HasPrefix ( viper . GetString ( "server_url" ) , "https://" ) {
2021-06-05 11:13:28 +02:00
errorText += "Fatal config error: server_url must start with https:// or http://\n"
}
if errorText != "" {
return errors . New ( strings . TrimSuffix ( errorText , "\n" ) )
} else {
return nil
}
2021-10-22 18:55:14 +02:00
}
func GetDERPConfig ( ) headscale . DERPConfig {
urlStrs := viper . GetStringSlice ( "derp.urls" )
urls := make ( [ ] url . URL , len ( urlStrs ) )
for index , urlStr := range urlStrs {
urlAddr , err := url . Parse ( urlStr )
if err != nil {
log . Error ( ) .
Str ( "url" , urlStr ) .
Err ( err ) .
Msg ( "Failed to parse url, ignoring..." )
}
urls [ index ] = * urlAddr
}
2021-08-24 08:09:47 +02:00
2021-10-22 18:55:14 +02:00
paths := viper . GetStringSlice ( "derp.paths" )
autoUpdate := viper . GetBool ( "derp.auto_update_enabled" )
updateFrequency := viper . GetDuration ( "derp.update_frequency" )
return headscale . DERPConfig {
URLs : urls ,
Paths : paths ,
AutoUpdate : autoUpdate ,
UpdateFrequency : updateFrequency ,
}
2021-08-24 08:09:47 +02:00
}
2021-10-02 11:20:42 +02:00
func GetDNSConfig ( ) ( * tailcfg . DNSConfig , string ) {
2021-08-24 08:09:47 +02:00
if viper . IsSet ( "dns_config" ) {
dnsConfig := & tailcfg . DNSConfig { }
if viper . IsSet ( "dns_config.nameservers" ) {
nameserversStr := viper . GetStringSlice ( "dns_config.nameservers" )
nameservers := make ( [ ] netaddr . IP , len ( nameserversStr ) )
2021-09-14 23:46:16 +02:00
resolvers := make ( [ ] dnstype . Resolver , len ( nameserversStr ) )
2021-08-24 08:09:47 +02:00
for index , nameserverStr := range nameserversStr {
nameserver , err := netaddr . ParseIP ( nameserverStr )
if err != nil {
log . Error ( ) .
Str ( "func" , "getDNSConfig" ) .
Err ( err ) .
Msgf ( "Could not parse nameserver IP: %s" , nameserverStr )
}
nameservers [ index ] = nameserver
2021-09-14 23:46:16 +02:00
resolvers [ index ] = dnstype . Resolver {
2021-08-25 19:43:13 +02:00
Addr : nameserver . String ( ) ,
2021-08-25 08:04:48 +02:00
}
2021-08-24 08:09:47 +02:00
}
dnsConfig . Nameservers = nameservers
2021-08-25 08:04:48 +02:00
dnsConfig . Resolvers = resolvers
2021-08-24 08:09:47 +02:00
}
2021-10-19 20:51:43 +02:00
if viper . IsSet ( "dns_config.restricted_nameservers" ) {
if len ( dnsConfig . Nameservers ) > 0 {
dnsConfig . Routes = make ( map [ string ] [ ] dnstype . Resolver )
restrictedDNS := viper . GetStringMapStringSlice ( "dns_config.restricted_nameservers" )
2021-10-20 09:35:56 +02:00
for domain , restrictedNameservers := range restrictedDNS {
restrictedResolvers := make ( [ ] dnstype . Resolver , len ( restrictedNameservers ) )
for index , nameserverStr := range restrictedNameservers {
2021-10-19 20:51:43 +02:00
nameserver , err := netaddr . ParseIP ( nameserverStr )
if err != nil {
log . Error ( ) .
Str ( "func" , "getDNSConfig" ) .
Err ( err ) .
Msgf ( "Could not parse restricted nameserver IP: %s" , nameserverStr )
}
2021-10-20 09:35:56 +02:00
restrictedResolvers [ index ] = dnstype . Resolver {
2021-10-19 20:51:43 +02:00
Addr : nameserver . String ( ) ,
}
}
2021-10-20 09:35:56 +02:00
dnsConfig . Routes [ domain ] = restrictedResolvers
2021-10-19 20:51:43 +02:00
}
} else {
log . Warn ( ) .
Msg ( "Warning: dns_config.restricted_nameservers is set, but no nameservers are configured. Ignoring restricted_nameservers." )
}
}
2021-08-24 08:09:47 +02:00
if viper . IsSet ( "dns_config.domains" ) {
dnsConfig . Domains = viper . GetStringSlice ( "dns_config.domains" )
}
2021-10-04 22:16:53 +02:00
if viper . IsSet ( "dns_config.magic_dns" ) {
magicDNS := viper . GetBool ( "dns_config.magic_dns" )
if len ( dnsConfig . Nameservers ) > 0 {
dnsConfig . Proxied = magicDNS
} else if magicDNS {
log . Warn ( ) .
Msg ( "Warning: dns_config.magic_dns is set, but no nameservers are configured. Ignoring magic_dns." )
2021-10-04 19:43:58 +02:00
}
2021-09-28 00:22:29 +02:00
}
2021-10-02 11:20:42 +02:00
var baseDomain string
if viper . IsSet ( "dns_config.base_domain" ) {
baseDomain = viper . GetString ( "dns_config.base_domain" )
} else {
baseDomain = "headscale.net" // does not really matter when MagicDNS is not enabled
}
2021-10-02 13:03:08 +02:00
2021-10-02 11:20:42 +02:00
return dnsConfig , baseDomain
2021-08-24 08:09:47 +02:00
}
2021-10-02 11:20:42 +02:00
return nil , ""
2021-06-05 11:13:28 +02:00
}
2021-04-28 16:15:45 +02:00
func absPath ( path string ) string {
// If a relative path is provided, prefix it with the the directory where
// the config file was found.
2021-05-18 23:33:08 +02:00
if ( path != "" ) && ! strings . HasPrefix ( path , string ( os . PathSeparator ) ) {
2021-04-28 16:15:45 +02:00
dir , _ := filepath . Split ( viper . ConfigFileUsed ( ) )
if dir != "" {
2021-05-18 23:33:08 +02:00
path = filepath . Join ( dir , path )
2021-04-28 16:15:45 +02:00
}
}
return path
}
2021-10-29 19:09:06 +02:00
func getHeadscaleConfig ( ) headscale . Config {
2021-10-29 15:35:07 +02:00
// maxMachineRegistrationDuration is the maximum time headscale will allow a client to (optionally) request for
// the machine key expiry time. RegisterRequests with Expiry times that are more than
// maxMachineRegistrationDuration in the future will be clamped to (now + maxMachineRegistrationDuration)
2021-10-30 17:33:01 +02:00
maxMachineRegistrationDuration , _ := time . ParseDuration (
"10h" ,
) // use 10h here because it is the length of a standard business day plus a small amount of leeway
2021-10-10 11:22:42 +02:00
if viper . GetDuration ( "max_machine_registration_duration" ) >= time . Second {
maxMachineRegistrationDuration = viper . GetDuration ( "max_machine_registration_duration" )
2021-10-08 11:43:52 +02:00
}
2021-10-29 15:35:07 +02:00
// defaultMachineRegistrationDuration is the default time assigned to a machine registration if one is not
// specified by the tailscale client. It is the default amount of time a machine registration is valid for
// (ie the amount of time before the user has to re-authenticate when requesting a connection)
2021-10-30 17:33:01 +02:00
defaultMachineRegistrationDuration , _ := time . ParseDuration (
"8h" ,
) // use 8h here because it's the length of a standard business day
2021-10-10 11:22:42 +02:00
if viper . GetDuration ( "default_machine_registration_duration" ) >= time . Second {
defaultMachineRegistrationDuration = viper . GetDuration ( "default_machine_registration_duration" )
2021-10-08 11:43:52 +02:00
}
2021-10-02 11:20:42 +02:00
dnsConfig , baseDomain := GetDNSConfig ( )
2021-10-22 18:55:14 +02:00
derpConfig := GetDERPConfig ( )
2021-10-02 11:20:42 +02:00
2021-10-29 19:09:06 +02:00
return headscale . Config {
2021-04-28 16:15:45 +02:00
ServerURL : viper . GetString ( "server_url" ) ,
Addr : viper . GetString ( "listen_addr" ) ,
PrivateKeyPath : absPath ( viper . GetString ( "private_key_path" ) ) ,
2021-08-02 21:06:26 +02:00
IPPrefix : netaddr . MustParseIPPrefix ( viper . GetString ( "ip_prefix" ) ) ,
2021-10-02 11:20:42 +02:00
BaseDomain : baseDomain ,
2021-04-28 16:15:45 +02:00
2021-10-22 18:55:14 +02:00
DERP : derpConfig ,
2021-05-23 02:15:29 +02:00
EphemeralNodeInactivityTimeout : viper . GetDuration ( "ephemeral_node_inactivity_timeout" ) ,
2021-05-15 14:32:26 +02:00
DBtype : viper . GetString ( "db_type" ) ,
2021-05-19 01:28:47 +02:00
DBpath : absPath ( viper . GetString ( "db_path" ) ) ,
2021-04-28 16:15:45 +02:00
DBhost : viper . GetString ( "db_host" ) ,
DBport : viper . GetInt ( "db_port" ) ,
DBname : viper . GetString ( "db_name" ) ,
DBuser : viper . GetString ( "db_user" ) ,
DBpass : viper . GetString ( "db_pass" ) ,
TLSLetsEncryptHostname : viper . GetString ( "tls_letsencrypt_hostname" ) ,
2021-07-24 00:12:01 +02:00
TLSLetsEncryptListen : viper . GetString ( "tls_letsencrypt_listen" ) ,
2021-04-28 16:15:45 +02:00
TLSLetsEncryptCacheDir : absPath ( viper . GetString ( "tls_letsencrypt_cache_dir" ) ) ,
TLSLetsEncryptChallengeType : viper . GetString ( "tls_letsencrypt_challenge_type" ) ,
TLSCertPath : absPath ( viper . GetString ( "tls_cert_path" ) ) ,
TLSKeyPath : absPath ( viper . GetString ( "tls_key_path" ) ) ,
2021-08-24 08:09:47 +02:00
2021-10-02 11:20:42 +02:00
DNSConfig : dnsConfig ,
2021-10-04 22:16:53 +02:00
2021-10-03 22:02:44 +02:00
ACMEEmail : viper . GetString ( "acme_email" ) ,
ACMEURL : viper . GetString ( "acme_url" ) ,
2021-10-30 16:08:16 +02:00
UnixSocket : viper . GetString ( "unix_socket" ) ,
2021-10-31 10:40:43 +01:00
2021-10-18 21:27:52 +02:00
OIDC : headscale . OIDCConfig {
Issuer : viper . GetString ( "oidc.issuer" ) ,
ClientID : viper . GetString ( "oidc.client_id" ) ,
ClientSecret : viper . GetString ( "oidc.client_secret" ) ,
} ,
2021-10-08 11:43:52 +02:00
2021-10-29 15:35:07 +02:00
MaxMachineRegistrationDuration : maxMachineRegistrationDuration ,
DefaultMachineRegistrationDuration : defaultMachineRegistrationDuration ,
2021-04-28 16:15:45 +02:00
}
2021-10-29 19:09:06 +02:00
}
func getHeadscaleApp ( ) ( * headscale . Headscale , error ) {
// Minimum inactivity time out is keepalive timeout (60s) plus a few seconds
// to avoid races
minInactivityTimeout , _ := time . ParseDuration ( "65s" )
if viper . GetDuration ( "ephemeral_node_inactivity_timeout" ) <= minInactivityTimeout {
err := fmt . Errorf (
"ephemeral_node_inactivity_timeout (%s) is set too low, must be more than %s\n" ,
viper . GetString ( "ephemeral_node_inactivity_timeout" ) ,
minInactivityTimeout ,
)
return nil , err
}
cfg := getHeadscaleConfig ( )
2021-04-28 16:15:45 +02:00
2021-10-18 21:27:52 +02:00
cfg . OIDC . MatchMap = loadOIDCMatchMap ( )
2021-04-28 16:15:45 +02:00
h , err := headscale . NewHeadscale ( cfg )
if err != nil {
return nil , err
}
2021-07-04 13:24:05 +02:00
// We are doing this here, as in the future could be cool to have it also hot-reload
2021-07-11 15:10:11 +02:00
if viper . GetString ( "acl_policy_path" ) != "" {
2021-08-05 19:26:49 +02:00
aclPath := absPath ( viper . GetString ( "acl_policy_path" ) )
err = h . LoadACLPolicy ( aclPath )
2021-07-11 15:10:11 +02:00
if err != nil {
2021-08-05 19:26:49 +02:00
log . Error ( ) .
2021-08-05 21:57:47 +02:00
Str ( "path" , aclPath ) .
2021-08-05 19:26:49 +02:00
Err ( err ) .
Msg ( "Could not load the ACL policy" )
2021-07-11 15:10:11 +02:00
}
2021-07-04 13:24:05 +02:00
}
2021-04-28 16:15:45 +02:00
return h , nil
}
2021-11-04 23:31:47 +01:00
func getHeadscaleGRPCClient ( ctx context . Context ) ( v1 . HeadscaleServiceClient , * grpc . ClientConn ) {
2021-10-29 19:15:52 +02:00
grpcOptions := [ ] grpc . DialOption {
grpc . WithBlock ( ) ,
}
address := os . Getenv ( "HEADSCALE_ADDRESS" )
// If the address is not set, we assume that we are on the server hosting headscale.
if address == "" {
cfg := getHeadscaleConfig ( )
2021-10-30 16:08:16 +02:00
log . Debug ( ) .
Str ( "socket" , cfg . UnixSocket ) .
Msgf ( "HEADSCALE_ADDRESS environment is not set, connecting to unix socket." )
2021-10-29 19:15:52 +02:00
2021-10-30 16:08:16 +02:00
address = cfg . UnixSocket
2021-10-29 19:15:52 +02:00
2021-10-30 16:08:16 +02:00
grpcOptions = append (
grpcOptions ,
grpc . WithInsecure ( ) ,
2021-10-30 16:29:03 +02:00
grpc . WithContextDialer ( headscale . GrpcSocketDialer ) ,
2021-10-30 16:08:16 +02:00
)
} else {
// If we are not connecting to a local server, require an API key for authentication
2021-10-29 19:15:52 +02:00
apiKey := os . Getenv ( "HEADSCALE_API_KEY" )
if apiKey == "" {
log . Fatal ( ) . Msgf ( "HEADSCALE_API_KEY environment variable needs to be set." )
}
grpcOptions = append ( grpcOptions ,
grpc . WithPerRPCCredentials ( tokenAuth {
token : apiKey ,
} ) ,
)
insecureStr := os . Getenv ( "HEADSCALE_INSECURE" )
if insecureStr != "" {
insecure , err := strconv . ParseBool ( insecureStr )
if err != nil {
log . Fatal ( ) . Err ( err ) . Msgf ( "Failed to parse HEADSCALE_INSECURE: %v" , err )
}
if insecure {
grpcOptions = append ( grpcOptions , grpc . WithInsecure ( ) )
}
}
}
log . Trace ( ) . Caller ( ) . Str ( "address" , address ) . Msg ( "Connecting via gRPC" )
2021-10-29 19:36:11 +02:00
conn , err := grpc . DialContext ( ctx , address , grpcOptions ... )
2021-10-29 19:15:52 +02:00
if err != nil {
log . Fatal ( ) . Err ( err ) . Msgf ( "Could not connect: %v" , err )
}
2021-11-04 23:31:47 +01:00
client := v1 . NewHeadscaleServiceClient ( conn )
2021-10-29 19:15:52 +02:00
return client , conn
}
2021-11-04 23:31:47 +01:00
func SuccessOutput ( result interface { } , override string , outputFormat string ) {
2021-05-08 13:28:22 +02:00
var j [ ] byte
var err error
switch outputFormat {
case "json" :
2021-11-04 23:31:47 +01:00
j , err = json . MarshalIndent ( result , "" , "\t" )
if err != nil {
log . Fatal ( ) . Err ( err )
2021-05-08 13:28:22 +02:00
}
case "json-line" :
2021-11-04 23:31:47 +01:00
j , err = json . Marshal ( result )
if err != nil {
log . Fatal ( ) . Err ( err )
}
case "yaml" :
j , err = yaml . Marshal ( result )
if err != nil {
log . Fatal ( ) . Err ( err )
2021-05-08 13:28:22 +02:00
}
2021-11-04 23:31:47 +01:00
default :
fmt . Println ( override )
return
2021-05-08 13:28:22 +02:00
}
2021-11-04 23:31:47 +01:00
2021-05-08 13:28:22 +02:00
fmt . Println ( string ( j ) )
}
2021-10-13 00:18:55 +02:00
2021-11-04 23:31:47 +01:00
func ErrorOutput ( errResult error , override string , outputFormat string ) {
type errOutput struct {
Error string ` json:"error" `
}
SuccessOutput ( errOutput { errResult . Error ( ) } , override , outputFormat )
}
func HasMachineOutputFlag ( ) bool {
2021-10-13 00:18:55 +02:00
for _ , arg := range os . Args {
2021-11-04 23:31:47 +01:00
if arg == "json" || arg == "json-line" || arg == "yaml" {
2021-10-13 00:18:55 +02:00
return true
}
}
return false
}
2021-10-29 19:08:21 +02:00
type tokenAuth struct {
token string
}
// Return value is mapped to request headers.
func ( t tokenAuth ) GetRequestMetadata ( ctx context . Context , in ... string ) ( map [ string ] string , error ) {
return map [ string ] string {
"authorization" : "Bearer " + t . token ,
} , nil
}
func ( tokenAuth ) RequireTransportSecurity ( ) bool {
return true
}
2021-10-31 10:40:43 +01:00
2021-10-18 21:27:52 +02:00
// loadOIDCMatchMap is a wrapper around viper to verifies that the keys in
// the match map is valid regex strings.
func loadOIDCMatchMap ( ) map [ string ] string {
strMap := viper . GetStringMapString ( "oidc.domain_map" )
for oidcMatcher := range strMap {
_ = regexp . MustCompile ( oidcMatcher )
}
return strMap
}