headscale/hscontrol/policy/acls.go

955 lines
22 KiB
Go
Raw Normal View History

package policy
2021-07-03 09:55:32 +00:00
import (
"encoding/json"
"errors"
2021-07-03 15:31:32 +00:00
"fmt"
2021-07-03 09:55:32 +00:00
"io"
2022-09-03 21:46:14 +00:00
"net/netip"
2021-07-03 09:55:32 +00:00
"os"
2022-02-27 08:04:48 +00:00
"path/filepath"
"strconv"
2021-07-03 15:31:32 +00:00
"strings"
"time"
2021-07-03 09:55:32 +00:00
"github.com/juanfont/headscale/hscontrol/types"
"github.com/juanfont/headscale/hscontrol/util"
2021-08-05 17:18:18 +00:00
"github.com/rs/zerolog/log"
2021-07-03 09:55:32 +00:00
"github.com/tailscale/hujson"
"go4.org/netipx"
2022-02-27 08:04:48 +00:00
"gopkg.in/yaml.v3"
2021-07-03 15:31:32 +00:00
"tailscale.com/tailcfg"
2021-07-03 09:55:32 +00:00
)
var (
ErrEmptyPolicy = errors.New("empty policy")
ErrInvalidAction = errors.New("invalid action")
ErrInvalidGroup = errors.New("invalid group")
ErrInvalidTag = errors.New("invalid tag")
ErrInvalidPortFormat = errors.New("invalid port format")
ErrWildcardIsNeeded = errors.New("wildcard as port is required for the protocol")
)
2021-07-03 09:55:32 +00:00
const (
portRangeBegin = 0
portRangeEnd = 65535
expectedTokenItems = 2
)
2022-06-26 09:43:17 +00:00
// For some reason golang.org/x/net/internal/iana is an internal package.
2022-06-11 12:09:08 +00:00
const (
protocolICMP = 1 // Internet Control Message
protocolIGMP = 2 // Internet Group Management
protocolIPv4 = 4 // IPv4 encapsulation
protocolTCP = 6 // Transmission Control
protocolEGP = 8 // Exterior Gateway Protocol
protocolIGP = 9 // any private interior gateway (used by Cisco for their IGRP)
protocolUDP = 17 // User Datagram
protocolGRE = 47 // Generic Routing Encapsulation
protocolESP = 50 // Encap Security Payload
protocolAH = 51 // Authentication Header
protocolIPv6ICMP = 58 // ICMP for IPv6
protocolSCTP = 132 // Stream Control Transmission Protocol
ProtocolFC = 133 // Fibre Channel
)
// LoadACLPolicyFromPath loads the ACL policy from the specify path, and generates the ACL rules.
func LoadACLPolicyFromPath(path string) (*ACLPolicy, error) {
log.Debug().
Str("func", "LoadACLPolicy").
Str("path", path).
Msg("Loading ACL policy from path")
2021-07-03 09:55:32 +00:00
policyFile, err := os.Open(path)
if err != nil {
return nil, err
2021-07-03 09:55:32 +00:00
}
defer policyFile.Close()
policyBytes, err := io.ReadAll(policyFile)
2021-07-03 09:55:32 +00:00
if err != nil {
return nil, err
2021-07-03 09:55:32 +00:00
}
2021-11-05 07:24:00 +00:00
log.Debug().
Str("path", path).
Bytes("file", policyBytes).
Msg("Loading ACLs")
2022-02-27 08:04:48 +00:00
switch filepath.Ext(path) {
case ".yml", ".yaml":
return LoadACLPolicyFromBytes(policyBytes, "yaml")
}
2022-02-27 08:04:48 +00:00
return LoadACLPolicyFromBytes(policyBytes, "hujson")
}
func LoadACLPolicyFromBytes(acl []byte, format string) (*ACLPolicy, error) {
var policy ACLPolicy
switch format {
case "yaml":
err := yaml.Unmarshal(acl, &policy)
2022-02-27 08:04:48 +00:00
if err != nil {
return nil, err
2022-02-27 08:04:48 +00:00
}
default:
ast, err := hujson.Parse(acl)
2022-02-27 08:04:48 +00:00
if err != nil {
return nil, err
2022-02-27 08:04:48 +00:00
}
ast.Standardize()
acl = ast.Pack()
err = json.Unmarshal(acl, &policy)
2022-02-27 08:04:48 +00:00
if err != nil {
return nil, err
2022-02-27 08:04:48 +00:00
}
2021-07-04 11:33:00 +00:00
}
2022-02-27 08:04:48 +00:00
2021-07-03 09:55:32 +00:00
if policy.IsZero() {
return nil, ErrEmptyPolicy
2021-07-03 09:55:32 +00:00
}
return &policy, nil
2022-02-03 19:00:41 +00:00
}
func GenerateFilterAndSSHRules(
policy *ACLPolicy,
2023-09-24 11:42:05 +00:00
node *types.Node,
peers types.Nodes,
) ([]tailcfg.FilterRule, *tailcfg.SSHPolicy, error) {
// If there is no policy defined, we default to allow all
if policy == nil {
return tailcfg.FilterAllowAll, &tailcfg.SSHPolicy{}, nil
}
2023-09-24 11:42:05 +00:00
rules, err := policy.generateFilterRules(node, peers)
2021-07-04 11:24:05 +00:00
if err != nil {
return []tailcfg.FilterRule{}, &tailcfg.SSHPolicy{}, err
2021-07-04 11:24:05 +00:00
}
2023-09-24 11:42:05 +00:00
log.Trace().Interface("ACL", rules).Str("node", node.GivenName).Msg("ACL rules")
var sshPolicy *tailcfg.SSHPolicy
2023-09-24 11:42:05 +00:00
sshRules, err := policy.generateSSHRules(node, peers)
if err != nil {
return []tailcfg.FilterRule{}, &tailcfg.SSHPolicy{}, err
}
log.Trace().
Interface("SSH", sshRules).
2023-09-24 11:42:05 +00:00
Str("node", node.GivenName).
Msg("SSH rules")
if sshPolicy == nil {
sshPolicy = &tailcfg.SSHPolicy{}
}
sshPolicy.Rules = sshRules
return rules, sshPolicy, nil
2021-07-03 15:31:32 +00:00
}
2023-09-24 11:42:05 +00:00
// generateFilterRules takes a set of nodes and an ACLPolicy and generates a
// set of Tailscale compatible FilterRules used to allow traffic on clients.
func (pol *ACLPolicy) generateFilterRules(
2023-09-24 11:42:05 +00:00
node *types.Node,
peers types.Nodes,
) ([]tailcfg.FilterRule, error) {
2021-07-03 15:31:32 +00:00
rules := []tailcfg.FilterRule{}
2023-09-24 11:42:05 +00:00
nodes := append(peers, node)
2021-07-03 15:31:32 +00:00
for index, acl := range pol.ACLs {
if acl.Action != "accept" {
return nil, ErrInvalidAction
2021-07-03 15:31:32 +00:00
}
srcIPs := []string{}
for srcIndex, src := range acl.Sources {
2023-09-24 11:42:05 +00:00
srcs, err := pol.expandSource(src, nodes)
2021-07-03 15:31:32 +00:00
if err != nil {
2021-08-05 17:18:18 +00:00
log.Error().
Interface("src", src).
Int("ACL index", index).
Int("Src index", srcIndex).
Msgf("Error parsing ACL")
2021-11-14 15:46:09 +00:00
2021-07-03 15:31:32 +00:00
return nil, err
}
srcIPs = append(srcIPs, srcs...)
2021-07-03 15:31:32 +00:00
}
protocols, isWildcard, err := parseProtocol(acl.Protocol)
if err != nil {
log.Error().
Msgf("Error parsing ACL %d. protocol unknown %s", index, acl.Protocol)
return nil, err
}
destPorts := []tailcfg.NetPortRange{}
for _, dest := range acl.Destinations {
alias, port, err := parseDestination(dest)
if err != nil {
return nil, err
}
expanded, err := pol.ExpandAlias(
2023-09-24 11:42:05 +00:00
nodes,
alias,
2022-08-04 08:47:00 +00:00
)
if err != nil {
return nil, err
}
2021-11-14 15:46:09 +00:00
ports, err := expandPorts(port, isWildcard)
if err != nil {
return nil, err
}
dests := []tailcfg.NetPortRange{}
for _, dest := range expanded.Prefixes() {
for _, port := range *ports {
pr := tailcfg.NetPortRange{
IP: dest.String(),
Ports: port,
}
dests = append(dests, pr)
}
}
destPorts = append(destPorts, dests...)
}
rules = append(rules, tailcfg.FilterRule{
SrcIPs: srcIPs,
DstPorts: destPorts,
IPProto: protocols,
})
2021-07-03 15:31:32 +00:00
}
return rules, nil
2021-07-03 15:31:32 +00:00
}
2023-09-24 11:42:05 +00:00
// ReduceFilterRules takes a node and a set of rules and removes all rules and destinations
// that are not relevant to that particular node.
2023-09-24 11:42:05 +00:00
func ReduceFilterRules(node *types.Node, rules []tailcfg.FilterRule) []tailcfg.FilterRule {
ret := []tailcfg.FilterRule{}
for _, rule := range rules {
2023-09-24 11:42:05 +00:00
// record if the rule is actually relevant for the given node.
dests := []tailcfg.NetPortRange{}
for _, dest := range rule.DstPorts {
expanded, err := util.ParseIPSet(dest.IP, nil)
// Fail closed, if we cant parse it, then we should not allow
// access.
if err != nil {
continue
}
2023-09-24 11:42:05 +00:00
if node.IPAddresses.InIPSet(expanded) {
dests = append(dests, dest)
}
}
if len(dests) > 0 {
ret = append(ret, tailcfg.FilterRule{
SrcIPs: rule.SrcIPs,
DstPorts: dests,
IPProto: rule.IPProto,
})
}
}
return ret
}
func (pol *ACLPolicy) generateSSHRules(
2023-09-24 11:42:05 +00:00
node *types.Node,
peers types.Nodes,
) ([]*tailcfg.SSHRule, error) {
rules := []*tailcfg.SSHRule{}
acceptAction := tailcfg.SSHAction{
Message: "",
Reject: false,
Accept: true,
SessionDuration: 0,
AllowAgentForwarding: false,
HoldAndDelegate: "",
AllowLocalPortForwarding: true,
}
rejectAction := tailcfg.SSHAction{
Message: "",
Reject: true,
Accept: false,
SessionDuration: 0,
AllowAgentForwarding: false,
HoldAndDelegate: "",
AllowLocalPortForwarding: false,
}
for index, sshACL := range pol.SSHs {
var dest netipx.IPSetBuilder
for _, src := range sshACL.Destinations {
2023-09-24 11:42:05 +00:00
expanded, err := pol.ExpandAlias(append(peers, node), src)
if err != nil {
return nil, err
}
dest.AddSet(expanded)
}
destSet, err := dest.IPSet()
if err != nil {
return nil, err
}
2023-09-24 11:42:05 +00:00
if !node.IPAddresses.InIPSet(destSet) {
continue
}
action := rejectAction
switch sshACL.Action {
case "accept":
action = acceptAction
case "check":
checkAction, err := sshCheckAction(sshACL.CheckPeriod)
if err != nil {
log.Error().
Msgf("Error parsing SSH %d, check action with unparsable duration '%s'", index, sshACL.CheckPeriod)
} else {
action = *checkAction
}
default:
log.Error().
Msgf("Error parsing SSH %d, unknown action '%s', skipping", index, sshACL.Action)
continue
}
principals := make([]*tailcfg.SSHPrincipal, 0, len(sshACL.Sources))
for innerIndex, rawSrc := range sshACL.Sources {
if isWildcard(rawSrc) {
principals = append(principals, &tailcfg.SSHPrincipal{
Any: true,
})
} else if isGroup(rawSrc) {
users, err := pol.expandUsersFromGroup(rawSrc)
if err != nil {
log.Error().
Msgf("Error parsing SSH %d, Source %d", index, innerIndex)
return nil, err
}
for _, user := range users {
principals = append(principals, &tailcfg.SSHPrincipal{
UserLogin: user,
})
}
} else {
expandedSrcs, err := pol.ExpandAlias(
peers,
rawSrc,
)
if err != nil {
log.Error().
Msgf("Error parsing SSH %d, Source %d", index, innerIndex)
return nil, err
}
for _, expandedSrc := range expandedSrcs.Prefixes() {
principals = append(principals, &tailcfg.SSHPrincipal{
NodeIP: expandedSrc.Addr().String(),
})
}
}
}
userMap := make(map[string]string, len(sshACL.Users))
for _, user := range sshACL.Users {
userMap[user] = "="
}
rules = append(rules, &tailcfg.SSHRule{
Principals: principals,
SSHUsers: userMap,
Action: &action,
})
}
return rules, nil
}
func sshCheckAction(duration string) (*tailcfg.SSHAction, error) {
sessionLength, err := time.ParseDuration(duration)
if err != nil {
return nil, err
}
return &tailcfg.SSHAction{
Message: "",
Reject: false,
Accept: true,
SessionDuration: sessionLength,
AllowAgentForwarding: false,
HoldAndDelegate: "",
AllowLocalPortForwarding: true,
}, nil
}
func parseDestination(dest string) (string, string, error) {
var tokens []string
2023-04-16 10:26:35 +00:00
// Check if there is a IPv4/6:Port combination, IPv6 has more than
// three ":".
tokens = strings.Split(dest, ":")
if len(tokens) < expectedTokenItems || len(tokens) > 3 {
2023-04-16 10:26:35 +00:00
port := tokens[len(tokens)-1]
maybeIPv6Str := strings.TrimSuffix(dest, ":"+port)
log.Trace().Str("maybeIPv6Str", maybeIPv6Str).Msg("")
2023-05-20 09:53:01 +00:00
filteredMaybeIPv6Str := maybeIPv6Str
if strings.Contains(maybeIPv6Str, "/") {
networkParts := strings.Split(maybeIPv6Str, "/")
filteredMaybeIPv6Str = networkParts[0]
}
if maybeIPv6, err := netip.ParseAddr(filteredMaybeIPv6Str); err != nil && !maybeIPv6.Is6() {
2023-04-16 10:26:35 +00:00
log.Trace().Err(err).Msg("trying to parse as IPv6")
return "", "", fmt.Errorf(
2023-04-16 10:26:35 +00:00
"failed to parse destination, tokens %v: %w",
tokens,
ErrInvalidPortFormat,
2023-04-16 10:26:35 +00:00
)
} else {
tokens = []string{maybeIPv6Str, port}
}
}
var alias string
// We can have here stuff like:
// git-server:*
// 192.168.1.0/24:22
2023-04-16 10:26:35 +00:00
// fd7a:115c:a1e0::2:22
// fd7a:115c:a1e0::2/128:22
// tag:montreal-webserver:80,443
// tag:api-server:443
// example-host-1:*
if len(tokens) == expectedTokenItems {
alias = tokens[0]
} else {
alias = fmt.Sprintf("%s:%s", tokens[0], tokens[1])
}
return alias, tokens[len(tokens)-1], nil
}
// parseProtocol reads the proto field of the ACL and generates a list of
// protocols that will be allowed, following the IANA IP protocol number
// https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
//
// If the ACL proto field is empty, it allows ICMPv4, ICMPv6, TCP, and UDP,
// as per Tailscale behaviour (see tailcfg.FilterRule).
//
// Also returns a boolean indicating if the protocol
// requires all the destinations to use wildcard as port number (only TCP,
// UDP and SCTP support specifying ports).
func parseProtocol(protocol string) ([]int, bool, error) {
switch protocol {
case "":
return nil, false, nil
case "igmp":
2022-06-11 12:09:08 +00:00
return []int{protocolIGMP}, true, nil
case "ipv4", "ip-in-ip":
2022-06-11 12:09:08 +00:00
return []int{protocolIPv4}, true, nil
case "tcp":
2022-06-11 12:09:08 +00:00
return []int{protocolTCP}, false, nil
case "egp":
2022-06-11 12:09:08 +00:00
return []int{protocolEGP}, true, nil
case "igp":
2022-06-11 12:09:08 +00:00
return []int{protocolIGP}, true, nil
case "udp":
2022-06-11 12:09:08 +00:00
return []int{protocolUDP}, false, nil
case "gre":
2022-06-11 12:09:08 +00:00
return []int{protocolGRE}, true, nil
case "esp":
2022-06-11 12:09:08 +00:00
return []int{protocolESP}, true, nil
case "ah":
2022-06-11 12:09:08 +00:00
return []int{protocolAH}, true, nil
case "sctp":
2022-06-11 12:09:08 +00:00
return []int{protocolSCTP}, false, nil
case "icmp":
2022-06-11 12:09:08 +00:00
return []int{protocolICMP, protocolIPv6ICMP}, true, nil
default:
protocolNumber, err := strconv.Atoi(protocol)
if err != nil {
return nil, false, err
}
2022-08-04 08:47:00 +00:00
needsWildcard := protocolNumber != protocolTCP &&
protocolNumber != protocolUDP &&
protocolNumber != protocolSCTP
return []int{protocolNumber}, needsWildcard, nil
}
}
// expandSource returns a set of Source IPs that would be associated
// with the given src alias.
func (pol *ACLPolicy) expandSource(
src string,
2023-09-24 11:42:05 +00:00
nodes types.Nodes,
) ([]string, error) {
2023-09-24 11:42:05 +00:00
ipSet, err := pol.ExpandAlias(nodes, src)
if err != nil {
return []string{}, err
}
prefixes := []string{}
for _, prefix := range ipSet.Prefixes() {
prefixes = append(prefixes, prefix.String())
}
return prefixes, nil
}
// expandalias has an input of either
// - a user
// - a group
// - a tag
// - a host
2023-04-16 10:26:35 +00:00
// - an ip
// - a cidr
// and transform these in IPAddresses.
func (pol *ACLPolicy) ExpandAlias(
2023-09-24 11:42:05 +00:00
nodes types.Nodes,
2022-02-14 14:54:51 +00:00
alias string,
) (*netipx.IPSet, error) {
if isWildcard(alias) {
return util.ParseIPSet("*", nil)
2021-07-03 15:31:32 +00:00
}
build := netipx.IPSetBuilder{}
log.Debug().
Str("alias", alias).
Msg("Expanding")
// if alias is a group
if isGroup(alias) {
2023-09-24 11:42:05 +00:00
return pol.expandIPsFromGroup(alias, nodes)
2021-07-03 15:31:32 +00:00
}
// if alias is a tag
if isTag(alias) {
2023-09-24 11:42:05 +00:00
return pol.expandIPsFromTag(alias, nodes)
2021-07-03 15:31:32 +00:00
}
// if alias is a user
2023-09-24 11:42:05 +00:00
if ips, err := pol.expandIPsFromUser(alias, nodes); ips != nil {
return ips, err
2021-07-03 15:31:32 +00:00
}
// if alias is an host
// Note, this is recursive.
if h, ok := pol.Hosts[alias]; ok {
log.Trace().Str("host", h.String()).Msg("ExpandAlias got hosts entry")
2023-04-16 10:26:35 +00:00
2023-09-24 11:42:05 +00:00
return pol.ExpandAlias(nodes, h.String())
2021-07-03 15:31:32 +00:00
}
// if alias is an IP
2023-04-16 10:26:35 +00:00
if ip, err := netip.ParseAddr(alias); err == nil {
2023-09-24 11:42:05 +00:00
return pol.expandIPsFromSingleIP(ip, nodes)
2021-07-03 15:31:32 +00:00
}
// if alias is an IP Prefix (CIDR)
if prefix, err := netip.ParsePrefix(alias); err == nil {
2023-09-24 11:42:05 +00:00
return pol.expandIPsFromIPPrefix(prefix, nodes)
2021-07-03 15:31:32 +00:00
}
log.Warn().Msgf("No IPs found with the alias %v", alias)
return build.IPSet()
2021-07-03 09:55:32 +00:00
}
// excludeCorrectlyTaggedNodes will remove from the list of input nodes the ones
// that are correctly tagged since they should not be listed as being in the user
// we assume in this function that we only have nodes from 1 user.
2022-02-14 14:54:51 +00:00
func excludeCorrectlyTaggedNodes(
aclPolicy *ACLPolicy,
2023-09-24 11:42:05 +00:00
nodes types.Nodes,
user string,
2023-09-24 11:42:05 +00:00
) types.Nodes {
out := types.Nodes{}
tags := []string{}
for tag := range aclPolicy.TagOwners {
owners, _ := expandOwnersFromTag(aclPolicy, user)
ns := append(owners, user)
if util.StringOrPrefixListContains(ns, user) {
tags = append(tags, tag)
}
}
2023-09-24 11:42:05 +00:00
// for each node if tag is in tags list, don't append it.
for _, node := range nodes {
found := false
if node.Hostinfo == nil {
continue
}
for _, t := range node.Hostinfo.RequestTags {
if util.StringOrPrefixListContains(tags, t) {
found = true
break
}
}
2023-09-24 11:42:05 +00:00
if len(node.ForcedTags) > 0 {
found = true
}
if !found {
2023-09-24 11:42:05 +00:00
out = append(out, node)
}
}
2022-03-02 08:15:14 +00:00
return out
}
func expandPorts(portsStr string, isWild bool) (*[]tailcfg.PortRange, error) {
if isWildcard(portsStr) {
return &[]tailcfg.PortRange{
{First: portRangeBegin, Last: portRangeEnd},
}, nil
}
if isWild {
return nil, ErrWildcardIsNeeded
}
ports := []tailcfg.PortRange{}
for _, portStr := range strings.Split(portsStr, ",") {
2023-04-16 10:26:35 +00:00
log.Trace().Msgf("parsing portstring: %s", portStr)
rang := strings.Split(portStr, "-")
2021-11-14 17:44:37 +00:00
switch len(rang) {
case 1:
port, err := strconv.ParseUint(rang[0], util.Base10, util.BitSize16)
if err != nil {
return nil, err
}
ports = append(ports, tailcfg.PortRange{
First: uint16(port),
Last: uint16(port),
})
2021-11-14 17:44:37 +00:00
case expectedTokenItems:
start, err := strconv.ParseUint(rang[0], util.Base10, util.BitSize16)
if err != nil {
return nil, err
}
last, err := strconv.ParseUint(rang[1], util.Base10, util.BitSize16)
if err != nil {
return nil, err
}
ports = append(ports, tailcfg.PortRange{
First: uint16(start),
Last: uint16(last),
})
2021-11-14 17:44:37 +00:00
default:
return nil, ErrInvalidPortFormat
}
}
2021-11-14 15:46:09 +00:00
return &ports, nil
}
// expandOwnersFromTag will return a list of user. An owner can be either a user or a group
// a group cannot be composed of groups.
func expandOwnersFromTag(
pol *ACLPolicy,
2022-03-01 20:01:46 +00:00
tag string,
) ([]string, error) {
noTagErr := fmt.Errorf(
"%w. %v isn't owned by a TagOwner. Please add one first. https://tailscale.com/kb/1018/acls/#tag-owners",
ErrInvalidTag,
tag,
)
if pol == nil {
return []string{}, noTagErr
}
var owners []string
ows, ok := pol.TagOwners[tag]
if !ok {
return []string{}, noTagErr
}
for _, owner := range ows {
if isGroup(owner) {
gs, err := pol.expandUsersFromGroup(owner)
if err != nil {
return []string{}, err
}
owners = append(owners, gs...)
} else {
owners = append(owners, owner)
}
}
return owners, nil
}
// expandUsersFromGroup will return the list of user inside the group
// after some validation.
func (pol *ACLPolicy) expandUsersFromGroup(
2022-03-01 20:01:46 +00:00
group string,
) ([]string, error) {
users := []string{}
log.Trace().Caller().Interface("pol", pol).Msg("test")
aclGroups, ok := pol.Groups[group]
if !ok {
2022-02-14 14:54:51 +00:00
return []string{}, fmt.Errorf(
"group %v isn't registered. %w",
group,
ErrInvalidGroup,
2022-02-14 14:54:51 +00:00
)
}
2022-03-01 20:01:46 +00:00
for _, group := range aclGroups {
if isGroup(group) {
2022-02-14 14:54:51 +00:00
return []string{}, fmt.Errorf(
"%w. A group cannot be composed of groups. https://tailscale.com/kb/1018/acls/#groups",
ErrInvalidGroup,
2022-02-14 14:54:51 +00:00
)
}
grp, err := util.NormalizeToFQDNRulesConfigFromViper(group)
2022-03-01 20:01:46 +00:00
if err != nil {
return []string{}, fmt.Errorf(
"failed to normalize group %q, err: %w",
group,
ErrInvalidGroup,
2022-03-01 20:01:46 +00:00
)
}
users = append(users, grp)
}
return users, nil
}
func (pol *ACLPolicy) expandIPsFromGroup(
group string,
2023-09-24 11:42:05 +00:00
nodes types.Nodes,
) (*netipx.IPSet, error) {
build := netipx.IPSetBuilder{}
users, err := pol.expandUsersFromGroup(group)
if err != nil {
return &netipx.IPSet{}, err
}
for _, user := range users {
2023-09-24 11:42:05 +00:00
filteredNodes := filterNodesByUser(nodes, user)
for _, node := range filteredNodes {
node.IPAddresses.AppendToIPSet(&build)
}
}
return build.IPSet()
}
func (pol *ACLPolicy) expandIPsFromTag(
alias string,
2023-09-24 11:42:05 +00:00
nodes types.Nodes,
) (*netipx.IPSet, error) {
build := netipx.IPSetBuilder{}
// check for forced tags
2023-09-24 11:42:05 +00:00
for _, node := range nodes {
if util.StringOrPrefixListContains(node.ForcedTags, alias) {
node.IPAddresses.AppendToIPSet(&build)
}
}
// find tag owners
owners, err := expandOwnersFromTag(pol, alias)
if err != nil {
if errors.Is(err, ErrInvalidTag) {
ipSet, _ := build.IPSet()
if len(ipSet.Prefixes()) == 0 {
return ipSet, fmt.Errorf(
"%w. %v isn't owned by a TagOwner and no forced tags are defined",
ErrInvalidTag,
alias,
)
}
return build.IPSet()
} else {
return nil, err
}
}
2023-09-24 11:42:05 +00:00
// filter out nodes per tag owner
for _, user := range owners {
2023-09-24 11:42:05 +00:00
nodes := filterNodesByUser(nodes, user)
for _, node := range nodes {
if node.Hostinfo == nil {
continue
}
if util.StringOrPrefixListContains(node.Hostinfo.RequestTags, alias) {
2023-09-24 11:42:05 +00:00
node.IPAddresses.AppendToIPSet(&build)
}
}
}
return build.IPSet()
}
func (pol *ACLPolicy) expandIPsFromUser(
user string,
2023-09-24 11:42:05 +00:00
nodes types.Nodes,
) (*netipx.IPSet, error) {
build := netipx.IPSetBuilder{}
2023-09-24 11:42:05 +00:00
filteredNodes := filterNodesByUser(nodes, user)
filteredNodes = excludeCorrectlyTaggedNodes(pol, filteredNodes, user)
2023-09-24 11:42:05 +00:00
// shortcurcuit if we have no nodes to get ips from.
if len(filteredNodes) == 0 {
return nil, nil //nolint
}
2023-09-24 11:42:05 +00:00
for _, node := range filteredNodes {
node.IPAddresses.AppendToIPSet(&build)
}
return build.IPSet()
}
func (pol *ACLPolicy) expandIPsFromSingleIP(
ip netip.Addr,
2023-09-24 11:42:05 +00:00
nodes types.Nodes,
) (*netipx.IPSet, error) {
log.Trace().Str("ip", ip.String()).Msg("ExpandAlias got ip")
2023-09-24 11:42:05 +00:00
matches := nodes.FilterByIP(ip)
build := netipx.IPSetBuilder{}
build.Add(ip)
2023-09-24 11:42:05 +00:00
for _, node := range matches {
node.IPAddresses.AppendToIPSet(&build)
}
return build.IPSet()
}
func (pol *ACLPolicy) expandIPsFromIPPrefix(
prefix netip.Prefix,
2023-09-24 11:42:05 +00:00
nodes types.Nodes,
) (*netipx.IPSet, error) {
log.Trace().Str("prefix", prefix.String()).Msg("expandAlias got prefix")
build := netipx.IPSetBuilder{}
build.AddPrefix(prefix)
// This is suboptimal and quite expensive, but if we only add the prefix, we will miss all the relevant IPv6
// addresses for the hosts that belong to tailscale. This doesnt really affect stuff like subnet routers.
2023-09-24 11:42:05 +00:00
for _, node := range nodes {
for _, ip := range node.IPAddresses {
// log.Trace().
2023-09-24 11:42:05 +00:00
// Msgf("checking if node ip (%s) is part of prefix (%s): %v, is single ip prefix (%v), addr: %s", ip.String(), prefix.String(), prefix.Contains(ip), prefix.IsSingleIP(), prefix.Addr().String())
if prefix.Contains(ip) {
2023-09-24 11:42:05 +00:00
node.IPAddresses.AppendToIPSet(&build)
}
}
}
return build.IPSet()
}
func isWildcard(str string) bool {
return str == "*"
}
func isGroup(str string) bool {
return strings.HasPrefix(str, "group:")
}
func isTag(str string) bool {
return strings.HasPrefix(str, "tag:")
}
2023-09-24 11:42:05 +00:00
// TagsOfNode will return the tags of the current node.
// Invalid tags are tags added by a user on a node, and that user doesn't have authority to add this tag.
// Valid tags are tags added by a user that is allowed in the ACL policy to add this tag.
2023-09-24 11:42:05 +00:00
func (pol *ACLPolicy) TagsOfNode(
node *types.Node,
) ([]string, []string) {
validTags := make([]string, 0)
invalidTags := make([]string, 0)
validTagMap := make(map[string]bool)
invalidTagMap := make(map[string]bool)
for _, tag := range node.Hostinfo.RequestTags {
owners, err := expandOwnersFromTag(pol, tag)
if errors.Is(err, ErrInvalidTag) {
invalidTagMap[tag] = true
continue
}
var found bool
for _, owner := range owners {
2023-09-24 11:42:05 +00:00
if node.User.Name == owner {
found = true
}
}
if found {
validTagMap[tag] = true
} else {
invalidTagMap[tag] = true
}
}
for tag := range invalidTagMap {
invalidTags = append(invalidTags, tag)
}
for tag := range validTagMap {
validTags = append(validTags, tag)
}
return validTags, invalidTags
}
2023-09-24 11:42:05 +00:00
func filterNodesByUser(nodes types.Nodes, user string) types.Nodes {
out := types.Nodes{}
for _, node := range nodes {
if node.User.Name == user {
out = append(out, node)
}
}
return out
}
2023-09-24 11:42:05 +00:00
// FilterNodesByACL returns the list of peers authorized to be accessed from a given node.
func FilterNodesByACL(
node *types.Node,
nodes types.Nodes,
filter []tailcfg.FilterRule,
2023-09-24 11:42:05 +00:00
) types.Nodes {
result := types.Nodes{}
2023-09-24 11:42:05 +00:00
for index, peer := range nodes {
if peer.ID == node.ID {
continue
}
2023-09-24 11:42:05 +00:00
if node.CanAccess(filter, nodes[index]) || peer.CanAccess(filter, node) {
result = append(result, peer)
}
}
return result
}