2021-04-28 16:15:45 +02:00
package cli
import (
2021-05-08 13:28:22 +02:00
"encoding/json"
2021-06-05 11:13:28 +02:00
"errors"
2021-05-08 13:28:22 +02:00
"fmt"
2021-10-22 18:55:14 +02:00
"net/url"
2021-04-28 16:15:45 +02:00
"os"
"path/filepath"
"strings"
2021-05-23 02:15:29 +02:00
"time"
2021-04-28 16:15:45 +02:00
"github.com/juanfont/headscale"
2021-08-05 19:26:49 +02:00
"github.com/rs/zerolog/log"
2021-04-28 16:15:45 +02:00
"github.com/spf13/viper"
2021-08-02 21:06:26 +02:00
"inet.af/netaddr"
2021-04-28 16:15:45 +02:00
"tailscale.com/tailcfg"
2021-09-14 23:46:16 +02:00
"tailscale.com/types/dnstype"
2021-04-28 16:15:45 +02:00
)
2021-05-08 13:28:22 +02:00
type ErrorOutput struct {
Error string
}
2021-06-05 11:13:28 +02:00
func LoadConfig ( path string ) error {
viper . SetConfigName ( "config" )
if path == "" {
viper . AddConfigPath ( "/etc/headscale/" )
viper . AddConfigPath ( "$HOME/.headscale" )
viper . AddConfigPath ( "." )
} else {
// For testing
viper . AddConfigPath ( path )
}
viper . AutomaticEnv ( )
viper . SetDefault ( "tls_letsencrypt_cache_dir" , "/var/www/.cache" )
viper . SetDefault ( "tls_letsencrypt_challenge_type" , "HTTP-01" )
2021-08-02 21:06:26 +02:00
viper . SetDefault ( "ip_prefix" , "100.64.0.0/10" )
2021-08-20 18:15:07 +02:00
viper . SetDefault ( "log_level" , "info" )
2021-08-05 20:19:25 +02:00
2021-08-24 08:09:47 +02:00
viper . SetDefault ( "dns_config" , nil )
2021-06-05 11:13:28 +02:00
err := viper . ReadInConfig ( )
if err != nil {
return fmt . Errorf ( "Fatal error reading config file: %s \n" , err )
}
// Collect any validation errors and return them all at once
var errorText string
2021-10-22 18:55:14 +02:00
if ( viper . GetString ( "tls_letsencrypt_hostname" ) != "" ) &&
( ( viper . GetString ( "tls_cert_path" ) != "" ) || ( viper . GetString ( "tls_key_path" ) != "" ) ) {
2021-06-05 11:13:28 +02:00
errorText += "Fatal config error: set either tls_letsencrypt_hostname or tls_cert_path/tls_key_path, not both\n"
}
2021-10-22 18:55:14 +02:00
if ( viper . GetString ( "tls_letsencrypt_hostname" ) != "" ) &&
( viper . GetString ( "tls_letsencrypt_challenge_type" ) == "TLS-ALPN-01" ) &&
( ! strings . HasSuffix ( viper . GetString ( "listen_addr" ) , ":443" ) ) {
2021-07-17 04:02:05 +02:00
// this is only a warning because there could be something sitting in front of headscale that redirects the traffic (e.g. an iptables rule)
2021-08-05 19:26:49 +02:00
log . Warn ( ) .
Msg ( "Warning: when using tls_letsencrypt_hostname with TLS-ALPN-01 as challenge type, headscale must be reachable on port 443, i.e. listen_addr should probably end in :443" )
2021-06-05 11:13:28 +02:00
}
2021-10-22 18:55:14 +02:00
if ( viper . GetString ( "tls_letsencrypt_challenge_type" ) != "HTTP-01" ) &&
( viper . GetString ( "tls_letsencrypt_challenge_type" ) != "TLS-ALPN-01" ) {
2021-06-05 11:13:28 +02:00
errorText += "Fatal config error: the only supported values for tls_letsencrypt_challenge_type are HTTP-01 and TLS-ALPN-01\n"
}
2021-10-22 18:55:14 +02:00
if ! strings . HasPrefix ( viper . GetString ( "server_url" ) , "http://" ) &&
! strings . HasPrefix ( viper . GetString ( "server_url" ) , "https://" ) {
2021-06-05 11:13:28 +02:00
errorText += "Fatal config error: server_url must start with https:// or http://\n"
}
if errorText != "" {
return errors . New ( strings . TrimSuffix ( errorText , "\n" ) )
} else {
return nil
}
2021-10-22 18:55:14 +02:00
}
func GetDERPConfig ( ) headscale . DERPConfig {
urlStrs := viper . GetStringSlice ( "derp.urls" )
urls := make ( [ ] url . URL , len ( urlStrs ) )
for index , urlStr := range urlStrs {
urlAddr , err := url . Parse ( urlStr )
if err != nil {
log . Error ( ) .
Str ( "url" , urlStr ) .
Err ( err ) .
Msg ( "Failed to parse url, ignoring..." )
}
urls [ index ] = * urlAddr
}
2021-08-24 08:09:47 +02:00
2021-10-22 18:55:14 +02:00
paths := viper . GetStringSlice ( "derp.paths" )
autoUpdate := viper . GetBool ( "derp.auto_update_enabled" )
updateFrequency := viper . GetDuration ( "derp.update_frequency" )
return headscale . DERPConfig {
URLs : urls ,
Paths : paths ,
AutoUpdate : autoUpdate ,
UpdateFrequency : updateFrequency ,
}
2021-08-24 08:09:47 +02:00
}
2021-10-02 11:20:42 +02:00
func GetDNSConfig ( ) ( * tailcfg . DNSConfig , string ) {
2021-08-24 08:09:47 +02:00
if viper . IsSet ( "dns_config" ) {
dnsConfig := & tailcfg . DNSConfig { }
if viper . IsSet ( "dns_config.nameservers" ) {
nameserversStr := viper . GetStringSlice ( "dns_config.nameservers" )
nameservers := make ( [ ] netaddr . IP , len ( nameserversStr ) )
2021-09-14 23:46:16 +02:00
resolvers := make ( [ ] dnstype . Resolver , len ( nameserversStr ) )
2021-08-24 08:09:47 +02:00
for index , nameserverStr := range nameserversStr {
nameserver , err := netaddr . ParseIP ( nameserverStr )
if err != nil {
log . Error ( ) .
Str ( "func" , "getDNSConfig" ) .
Err ( err ) .
Msgf ( "Could not parse nameserver IP: %s" , nameserverStr )
}
nameservers [ index ] = nameserver
2021-09-14 23:46:16 +02:00
resolvers [ index ] = dnstype . Resolver {
2021-08-25 19:43:13 +02:00
Addr : nameserver . String ( ) ,
2021-08-25 08:04:48 +02:00
}
2021-08-24 08:09:47 +02:00
}
dnsConfig . Nameservers = nameservers
2021-08-25 08:04:48 +02:00
dnsConfig . Resolvers = resolvers
2021-08-24 08:09:47 +02:00
}
2021-10-19 20:51:43 +02:00
if viper . IsSet ( "dns_config.restricted_nameservers" ) {
if len ( dnsConfig . Nameservers ) > 0 {
dnsConfig . Routes = make ( map [ string ] [ ] dnstype . Resolver )
restrictedDNS := viper . GetStringMapStringSlice ( "dns_config.restricted_nameservers" )
2021-10-20 09:35:56 +02:00
for domain , restrictedNameservers := range restrictedDNS {
restrictedResolvers := make ( [ ] dnstype . Resolver , len ( restrictedNameservers ) )
for index , nameserverStr := range restrictedNameservers {
2021-10-19 20:51:43 +02:00
nameserver , err := netaddr . ParseIP ( nameserverStr )
if err != nil {
log . Error ( ) .
Str ( "func" , "getDNSConfig" ) .
Err ( err ) .
Msgf ( "Could not parse restricted nameserver IP: %s" , nameserverStr )
}
2021-10-20 09:35:56 +02:00
restrictedResolvers [ index ] = dnstype . Resolver {
2021-10-19 20:51:43 +02:00
Addr : nameserver . String ( ) ,
}
}
2021-10-20 09:35:56 +02:00
dnsConfig . Routes [ domain ] = restrictedResolvers
2021-10-19 20:51:43 +02:00
}
} else {
log . Warn ( ) .
Msg ( "Warning: dns_config.restricted_nameservers is set, but no nameservers are configured. Ignoring restricted_nameservers." )
}
}
2021-08-24 08:09:47 +02:00
if viper . IsSet ( "dns_config.domains" ) {
dnsConfig . Domains = viper . GetStringSlice ( "dns_config.domains" )
}
2021-10-04 22:16:53 +02:00
if viper . IsSet ( "dns_config.magic_dns" ) {
magicDNS := viper . GetBool ( "dns_config.magic_dns" )
if len ( dnsConfig . Nameservers ) > 0 {
dnsConfig . Proxied = magicDNS
} else if magicDNS {
log . Warn ( ) .
Msg ( "Warning: dns_config.magic_dns is set, but no nameservers are configured. Ignoring magic_dns." )
2021-10-04 19:43:58 +02:00
}
2021-09-28 00:22:29 +02:00
}
2021-10-02 11:20:42 +02:00
var baseDomain string
if viper . IsSet ( "dns_config.base_domain" ) {
baseDomain = viper . GetString ( "dns_config.base_domain" )
} else {
baseDomain = "headscale.net" // does not really matter when MagicDNS is not enabled
}
2021-10-02 13:03:08 +02:00
2021-10-02 11:20:42 +02:00
return dnsConfig , baseDomain
2021-08-24 08:09:47 +02:00
}
2021-10-02 11:20:42 +02:00
return nil , ""
2021-06-05 11:13:28 +02:00
}
2021-04-28 16:15:45 +02:00
func absPath ( path string ) string {
// If a relative path is provided, prefix it with the the directory where
// the config file was found.
2021-05-18 23:33:08 +02:00
if ( path != "" ) && ! strings . HasPrefix ( path , string ( os . PathSeparator ) ) {
2021-04-28 16:15:45 +02:00
dir , _ := filepath . Split ( viper . ConfigFileUsed ( ) )
if dir != "" {
2021-05-18 23:33:08 +02:00
path = filepath . Join ( dir , path )
2021-04-28 16:15:45 +02:00
}
}
return path
}
func getHeadscaleApp ( ) ( * headscale . Headscale , error ) {
2021-05-23 02:15:29 +02:00
// Minimum inactivity time out is keepalive timeout (60s) plus a few seconds
// to avoid races
minInactivityTimeout , _ := time . ParseDuration ( "65s" )
if viper . GetDuration ( "ephemeral_node_inactivity_timeout" ) <= minInactivityTimeout {
2021-10-22 18:55:14 +02:00
err := fmt . Errorf (
"ephemeral_node_inactivity_timeout (%s) is set too low, must be more than %s\n" ,
viper . GetString ( "ephemeral_node_inactivity_timeout" ) ,
minInactivityTimeout ,
)
2021-05-23 02:15:29 +02:00
return nil , err
}
2021-10-02 11:20:42 +02:00
dnsConfig , baseDomain := GetDNSConfig ( )
2021-10-22 18:55:14 +02:00
derpConfig := GetDERPConfig ( )
2021-10-02 11:20:42 +02:00
2021-04-28 16:15:45 +02:00
cfg := headscale . Config {
ServerURL : viper . GetString ( "server_url" ) ,
Addr : viper . GetString ( "listen_addr" ) ,
PrivateKeyPath : absPath ( viper . GetString ( "private_key_path" ) ) ,
2021-08-02 21:06:26 +02:00
IPPrefix : netaddr . MustParseIPPrefix ( viper . GetString ( "ip_prefix" ) ) ,
2021-10-02 11:20:42 +02:00
BaseDomain : baseDomain ,
2021-04-28 16:15:45 +02:00
2021-10-22 18:55:14 +02:00
DERP : derpConfig ,
2021-05-23 02:15:29 +02:00
EphemeralNodeInactivityTimeout : viper . GetDuration ( "ephemeral_node_inactivity_timeout" ) ,
2021-05-15 14:32:26 +02:00
DBtype : viper . GetString ( "db_type" ) ,
2021-05-19 01:28:47 +02:00
DBpath : absPath ( viper . GetString ( "db_path" ) ) ,
2021-04-28 16:15:45 +02:00
DBhost : viper . GetString ( "db_host" ) ,
DBport : viper . GetInt ( "db_port" ) ,
DBname : viper . GetString ( "db_name" ) ,
DBuser : viper . GetString ( "db_user" ) ,
DBpass : viper . GetString ( "db_pass" ) ,
TLSLetsEncryptHostname : viper . GetString ( "tls_letsencrypt_hostname" ) ,
2021-07-24 00:12:01 +02:00
TLSLetsEncryptListen : viper . GetString ( "tls_letsencrypt_listen" ) ,
2021-04-28 16:15:45 +02:00
TLSLetsEncryptCacheDir : absPath ( viper . GetString ( "tls_letsencrypt_cache_dir" ) ) ,
TLSLetsEncryptChallengeType : viper . GetString ( "tls_letsencrypt_challenge_type" ) ,
TLSCertPath : absPath ( viper . GetString ( "tls_cert_path" ) ) ,
TLSKeyPath : absPath ( viper . GetString ( "tls_key_path" ) ) ,
2021-08-24 08:09:47 +02:00
2021-10-02 11:20:42 +02:00
DNSConfig : dnsConfig ,
2021-10-04 22:16:53 +02:00
2021-10-03 22:02:44 +02:00
ACMEEmail : viper . GetString ( "acme_email" ) ,
ACMEURL : viper . GetString ( "acme_url" ) ,
2021-04-28 16:15:45 +02:00
}
h , err := headscale . NewHeadscale ( cfg )
if err != nil {
return nil , err
}
2021-07-04 13:24:05 +02:00
// We are doing this here, as in the future could be cool to have it also hot-reload
2021-07-11 15:10:11 +02:00
if viper . GetString ( "acl_policy_path" ) != "" {
2021-08-05 19:26:49 +02:00
aclPath := absPath ( viper . GetString ( "acl_policy_path" ) )
err = h . LoadACLPolicy ( aclPath )
2021-07-11 15:10:11 +02:00
if err != nil {
2021-08-05 19:26:49 +02:00
log . Error ( ) .
2021-08-05 21:57:47 +02:00
Str ( "path" , aclPath ) .
2021-08-05 19:26:49 +02:00
Err ( err ) .
Msg ( "Could not load the ACL policy" )
2021-07-11 15:10:11 +02:00
}
2021-07-04 13:24:05 +02:00
}
2021-04-28 16:15:45 +02:00
return h , nil
}
2021-05-08 17:06:36 +02:00
func JsonOutput ( result interface { } , errResult error , outputFormat string ) {
2021-05-08 13:28:22 +02:00
var j [ ] byte
var err error
switch outputFormat {
case "json" :
if errResult != nil {
j , err = json . MarshalIndent ( ErrorOutput { errResult . Error ( ) } , "" , "\t" )
if err != nil {
2021-08-05 20:19:25 +02:00
log . Fatal ( ) . Err ( err )
2021-05-08 13:28:22 +02:00
}
} else {
j , err = json . MarshalIndent ( result , "" , "\t" )
if err != nil {
2021-08-05 20:19:25 +02:00
log . Fatal ( ) . Err ( err )
2021-05-08 13:28:22 +02:00
}
}
case "json-line" :
if errResult != nil {
j , err = json . Marshal ( ErrorOutput { errResult . Error ( ) } )
if err != nil {
2021-08-05 20:19:25 +02:00
log . Fatal ( ) . Err ( err )
2021-05-08 13:28:22 +02:00
}
} else {
j , err = json . Marshal ( result )
if err != nil {
2021-08-05 20:19:25 +02:00
log . Fatal ( ) . Err ( err )
2021-05-08 13:28:22 +02:00
}
}
}
fmt . Println ( string ( j ) )
}
2021-10-13 00:18:55 +02:00
func HasJsonOutputFlag ( ) bool {
for _ , arg := range os . Args {
if arg == "json" || arg == "json-line" {
return true
}
}
return false
}