mirror of
https://github.com/juanfont/headscale.git
synced 2025-02-08 10:18:01 +09:00
use dedicated registration ID for auth flow (#2337)
Some checks are pending
Build / build-cross (GOARCH=arm64 GOOS=darwin) (push) Waiting to run
Build / build-nix (push) Waiting to run
Build / build-cross (GOARCH=386 GOOS=linux) (push) Waiting to run
Build / build-cross (GOARCH=amd64 GOOS=darwin) (push) Waiting to run
Build / build-cross (GOARCH=amd64 GOOS=linux) (push) Waiting to run
Build / build-cross (GOARCH=arm GOOS=linux GOARM=5) (push) Waiting to run
Build / build-cross (GOARCH=arm GOOS=linux GOARM=6) (push) Waiting to run
Build / build-cross (GOARCH=arm GOOS=linux GOARM=7) (push) Waiting to run
Build / build-cross (GOARCH=arm64 GOOS=linux) (push) Waiting to run
Tests / test (push) Waiting to run
Some checks are pending
Build / build-cross (GOARCH=arm64 GOOS=darwin) (push) Waiting to run
Build / build-nix (push) Waiting to run
Build / build-cross (GOARCH=386 GOOS=linux) (push) Waiting to run
Build / build-cross (GOARCH=amd64 GOOS=darwin) (push) Waiting to run
Build / build-cross (GOARCH=amd64 GOOS=linux) (push) Waiting to run
Build / build-cross (GOARCH=arm GOOS=linux GOARM=5) (push) Waiting to run
Build / build-cross (GOARCH=arm GOOS=linux GOARM=6) (push) Waiting to run
Build / build-cross (GOARCH=arm GOOS=linux GOARM=7) (push) Waiting to run
Build / build-cross (GOARCH=arm64 GOOS=linux) (push) Waiting to run
Tests / test (push) Waiting to run
This commit is contained in:
parent
97e5d95399
commit
4c8e847f47
26 changed files with 586 additions and 586 deletions
|
@ -4,10 +4,10 @@ import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
v1 "github.com/juanfont/headscale/gen/go/headscale/v1"
|
v1 "github.com/juanfont/headscale/gen/go/headscale/v1"
|
||||||
|
"github.com/juanfont/headscale/hscontrol/types"
|
||||||
"github.com/rs/zerolog/log"
|
"github.com/rs/zerolog/log"
|
||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
"google.golang.org/grpc/status"
|
"google.golang.org/grpc/status"
|
||||||
"tailscale.com/types/key"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -79,7 +79,7 @@ var createNodeCmd = &cobra.Command{
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
machineKey, err := cmd.Flags().GetString("key")
|
registrationID, err := cmd.Flags().GetString("key")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ErrorOutput(
|
ErrorOutput(
|
||||||
err,
|
err,
|
||||||
|
@ -88,8 +88,7 @@ var createNodeCmd = &cobra.Command{
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
var mkey key.MachinePublic
|
_, err = types.RegistrationIDFromString(registrationID)
|
||||||
err = mkey.UnmarshalText([]byte(machineKey))
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ErrorOutput(
|
ErrorOutput(
|
||||||
err,
|
err,
|
||||||
|
@ -108,7 +107,7 @@ var createNodeCmd = &cobra.Command{
|
||||||
}
|
}
|
||||||
|
|
||||||
request := &v1.DebugCreateNodeRequest{
|
request := &v1.DebugCreateNodeRequest{
|
||||||
Key: machineKey,
|
Key: registrationID,
|
||||||
Name: name,
|
Name: name,
|
||||||
User: user,
|
User: user,
|
||||||
Routes: routes,
|
Routes: routes,
|
||||||
|
|
|
@ -122,7 +122,7 @@ var registerNodeCmd = &cobra.Command{
|
||||||
defer cancel()
|
defer cancel()
|
||||||
defer conn.Close()
|
defer conn.Close()
|
||||||
|
|
||||||
machineKey, err := cmd.Flags().GetString("key")
|
registrationID, err := cmd.Flags().GetString("key")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ErrorOutput(
|
ErrorOutput(
|
||||||
err,
|
err,
|
||||||
|
@ -132,7 +132,7 @@ var registerNodeCmd = &cobra.Command{
|
||||||
}
|
}
|
||||||
|
|
||||||
request := &v1.RegisterNodeRequest{
|
request := &v1.RegisterNodeRequest{
|
||||||
Key: machineKey,
|
Key: registrationID,
|
||||||
User: user,
|
User: user,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -96,7 +96,7 @@ type Headscale struct {
|
||||||
mapper *mapper.Mapper
|
mapper *mapper.Mapper
|
||||||
nodeNotifier *notifier.Notifier
|
nodeNotifier *notifier.Notifier
|
||||||
|
|
||||||
registrationCache *zcache.Cache[string, types.Node]
|
registrationCache *zcache.Cache[types.RegistrationID, types.RegisterNode]
|
||||||
|
|
||||||
authProvider AuthProvider
|
authProvider AuthProvider
|
||||||
|
|
||||||
|
@ -123,7 +123,7 @@ func NewHeadscale(cfg *types.Config) (*Headscale, error) {
|
||||||
return nil, fmt.Errorf("failed to read or create Noise protocol private key: %w", err)
|
return nil, fmt.Errorf("failed to read or create Noise protocol private key: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
registrationCache := zcache.New[string, types.Node](
|
registrationCache := zcache.New[types.RegistrationID, types.RegisterNode](
|
||||||
registerCacheExpiration,
|
registerCacheExpiration,
|
||||||
registerCacheCleanup,
|
registerCacheCleanup,
|
||||||
)
|
)
|
||||||
|
@ -462,7 +462,7 @@ func (h *Headscale) createRouter(grpcMux *grpcRuntime.ServeMux) *mux.Router {
|
||||||
|
|
||||||
router.HandleFunc("/health", h.HealthHandler).Methods(http.MethodGet)
|
router.HandleFunc("/health", h.HealthHandler).Methods(http.MethodGet)
|
||||||
router.HandleFunc("/key", h.KeyHandler).Methods(http.MethodGet)
|
router.HandleFunc("/key", h.KeyHandler).Methods(http.MethodGet)
|
||||||
router.HandleFunc("/register/{mkey}", h.authProvider.RegisterHandler).Methods(http.MethodGet)
|
router.HandleFunc("/register/{registration_id}", h.authProvider.RegisterHandler).Methods(http.MethodGet)
|
||||||
|
|
||||||
if provider, ok := h.authProvider.(*AuthProviderOIDC); ok {
|
if provider, ok := h.authProvider.(*AuthProviderOIDC); ok {
|
||||||
router.HandleFunc("/oidc/callback", provider.OIDCCallbackHandler).Methods(http.MethodGet)
|
router.HandleFunc("/oidc/callback", provider.OIDCCallbackHandler).Methods(http.MethodGet)
|
||||||
|
|
|
@ -6,6 +6,8 @@ import (
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
"net/url"
|
||||||
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/juanfont/headscale/hscontrol/db"
|
"github.com/juanfont/headscale/hscontrol/db"
|
||||||
|
@ -20,16 +22,18 @@ import (
|
||||||
|
|
||||||
type AuthProvider interface {
|
type AuthProvider interface {
|
||||||
RegisterHandler(http.ResponseWriter, *http.Request)
|
RegisterHandler(http.ResponseWriter, *http.Request)
|
||||||
AuthURL(key.MachinePublic) string
|
AuthURL(types.RegistrationID) string
|
||||||
}
|
}
|
||||||
|
|
||||||
func logAuthFunc(
|
func logAuthFunc(
|
||||||
registerRequest tailcfg.RegisterRequest,
|
registerRequest tailcfg.RegisterRequest,
|
||||||
machineKey key.MachinePublic,
|
machineKey key.MachinePublic,
|
||||||
|
registrationId types.RegistrationID,
|
||||||
) (func(string), func(string), func(error, string)) {
|
) (func(string), func(string), func(error, string)) {
|
||||||
return func(msg string) {
|
return func(msg string) {
|
||||||
log.Info().
|
log.Info().
|
||||||
Caller().
|
Caller().
|
||||||
|
Str("registration_id", registrationId.String()).
|
||||||
Str("machine_key", machineKey.ShortString()).
|
Str("machine_key", machineKey.ShortString()).
|
||||||
Str("node_key", registerRequest.NodeKey.ShortString()).
|
Str("node_key", registerRequest.NodeKey.ShortString()).
|
||||||
Str("node_key_old", registerRequest.OldNodeKey.ShortString()).
|
Str("node_key_old", registerRequest.OldNodeKey.ShortString()).
|
||||||
|
@ -41,6 +45,7 @@ func logAuthFunc(
|
||||||
func(msg string) {
|
func(msg string) {
|
||||||
log.Trace().
|
log.Trace().
|
||||||
Caller().
|
Caller().
|
||||||
|
Str("registration_id", registrationId.String()).
|
||||||
Str("machine_key", machineKey.ShortString()).
|
Str("machine_key", machineKey.ShortString()).
|
||||||
Str("node_key", registerRequest.NodeKey.ShortString()).
|
Str("node_key", registerRequest.NodeKey.ShortString()).
|
||||||
Str("node_key_old", registerRequest.OldNodeKey.ShortString()).
|
Str("node_key_old", registerRequest.OldNodeKey.ShortString()).
|
||||||
|
@ -52,6 +57,7 @@ func logAuthFunc(
|
||||||
func(err error, msg string) {
|
func(err error, msg string) {
|
||||||
log.Error().
|
log.Error().
|
||||||
Caller().
|
Caller().
|
||||||
|
Str("registration_id", registrationId.String()).
|
||||||
Str("machine_key", machineKey.ShortString()).
|
Str("machine_key", machineKey.ShortString()).
|
||||||
Str("node_key", registerRequest.NodeKey.ShortString()).
|
Str("node_key", registerRequest.NodeKey.ShortString()).
|
||||||
Str("node_key_old", registerRequest.OldNodeKey.ShortString()).
|
Str("node_key_old", registerRequest.OldNodeKey.ShortString()).
|
||||||
|
@ -63,6 +69,40 @@ func logAuthFunc(
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (h *Headscale) waitForFollowup(
|
||||||
|
req *http.Request,
|
||||||
|
regReq tailcfg.RegisterRequest,
|
||||||
|
logTrace func(string),
|
||||||
|
) {
|
||||||
|
logTrace("register request is a followup")
|
||||||
|
fu, err := url.Parse(regReq.Followup)
|
||||||
|
if err != nil {
|
||||||
|
logTrace("failed to parse followup URL")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
followupReg, err := types.RegistrationIDFromString(strings.ReplaceAll(fu.Path, "/register/", ""))
|
||||||
|
if err != nil {
|
||||||
|
logTrace("followup URL does not contains a valid registration ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
logTrace(fmt.Sprintf("followup URL contains a valid registration ID, looking up in cache: %s", followupReg))
|
||||||
|
|
||||||
|
if reg, ok := h.registrationCache.Get(followupReg); ok {
|
||||||
|
logTrace("Node is waiting for interactive login")
|
||||||
|
|
||||||
|
select {
|
||||||
|
case <-req.Context().Done():
|
||||||
|
logTrace("node went away before it was registered")
|
||||||
|
return
|
||||||
|
case <-reg.Registered:
|
||||||
|
logTrace("node has successfully registered")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// handleRegister is the logic for registering a client.
|
// handleRegister is the logic for registering a client.
|
||||||
func (h *Headscale) handleRegister(
|
func (h *Headscale) handleRegister(
|
||||||
writer http.ResponseWriter,
|
writer http.ResponseWriter,
|
||||||
|
@ -70,9 +110,23 @@ func (h *Headscale) handleRegister(
|
||||||
regReq tailcfg.RegisterRequest,
|
regReq tailcfg.RegisterRequest,
|
||||||
machineKey key.MachinePublic,
|
machineKey key.MachinePublic,
|
||||||
) {
|
) {
|
||||||
logInfo, logTrace, _ := logAuthFunc(regReq, machineKey)
|
registrationId, err := types.NewRegistrationID()
|
||||||
|
if err != nil {
|
||||||
|
log.Error().
|
||||||
|
Caller().
|
||||||
|
Err(err).
|
||||||
|
Msg("Failed to generate registration ID")
|
||||||
|
http.Error(writer, "Internal server error", http.StatusInternalServerError)
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
logInfo, logTrace, _ := logAuthFunc(regReq, machineKey, registrationId)
|
||||||
now := time.Now().UTC()
|
now := time.Now().UTC()
|
||||||
logTrace("handleRegister called, looking up machine in DB")
|
logTrace("handleRegister called, looking up machine in DB")
|
||||||
|
|
||||||
|
// TODO(kradalby): Use reqs NodeKey and OldNodeKey as indicators for new registrations vs
|
||||||
|
// key refreshes. This will allow us to remove the machineKey from the registration request.
|
||||||
node, err := h.db.GetNodeByAnyKey(machineKey, regReq.NodeKey, regReq.OldNodeKey)
|
node, err := h.db.GetNodeByAnyKey(machineKey, regReq.NodeKey, regReq.OldNodeKey)
|
||||||
logTrace("handleRegister database lookup has returned")
|
logTrace("handleRegister database lookup has returned")
|
||||||
if errors.Is(err, gorm.ErrRecordNotFound) {
|
if errors.Is(err, gorm.ErrRecordNotFound) {
|
||||||
|
@ -84,27 +138,9 @@ func (h *Headscale) handleRegister(
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if the node is waiting for interactive login.
|
// Check if the node is waiting for interactive login.
|
||||||
//
|
|
||||||
// TODO(juan): We could use this field to improve our protocol implementation,
|
|
||||||
// and hold the request until the client closes it, or the interactive
|
|
||||||
// login is completed (i.e., the user registers the node).
|
|
||||||
// This is not implemented yet, as it is no strictly required. The only side-effect
|
|
||||||
// is that the client will hammer headscale with requests until it gets a
|
|
||||||
// successful RegisterResponse.
|
|
||||||
if regReq.Followup != "" {
|
if regReq.Followup != "" {
|
||||||
logTrace("register request is a followup")
|
h.waitForFollowup(req, regReq, logTrace)
|
||||||
if _, ok := h.registrationCache.Get(machineKey.String()); ok {
|
return
|
||||||
logTrace("Node is waiting for interactive login")
|
|
||||||
|
|
||||||
select {
|
|
||||||
case <-req.Context().Done():
|
|
||||||
return
|
|
||||||
case <-time.After(registrationHoldoff):
|
|
||||||
h.handleNewNode(writer, regReq, machineKey)
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
logInfo("Node not found in database, creating new")
|
logInfo("Node not found in database, creating new")
|
||||||
|
@ -113,25 +149,28 @@ func (h *Headscale) handleRegister(
|
||||||
// that we rely on a method that calls back some how (OpenID or CLI)
|
// that we rely on a method that calls back some how (OpenID or CLI)
|
||||||
// We create the node and then keep it around until a callback
|
// We create the node and then keep it around until a callback
|
||||||
// happens
|
// happens
|
||||||
newNode := types.Node{
|
newNode := types.RegisterNode{
|
||||||
MachineKey: machineKey,
|
Node: types.Node{
|
||||||
Hostname: regReq.Hostinfo.Hostname,
|
MachineKey: machineKey,
|
||||||
NodeKey: regReq.NodeKey,
|
Hostname: regReq.Hostinfo.Hostname,
|
||||||
LastSeen: &now,
|
NodeKey: regReq.NodeKey,
|
||||||
Expiry: &time.Time{},
|
LastSeen: &now,
|
||||||
|
Expiry: &time.Time{},
|
||||||
|
},
|
||||||
|
Registered: make(chan struct{}),
|
||||||
}
|
}
|
||||||
|
|
||||||
if !regReq.Expiry.IsZero() {
|
if !regReq.Expiry.IsZero() {
|
||||||
logTrace("Non-zero expiry time requested")
|
logTrace("Non-zero expiry time requested")
|
||||||
newNode.Expiry = ®Req.Expiry
|
newNode.Node.Expiry = ®Req.Expiry
|
||||||
}
|
}
|
||||||
|
|
||||||
h.registrationCache.Set(
|
h.registrationCache.Set(
|
||||||
machineKey.String(),
|
registrationId,
|
||||||
newNode,
|
newNode,
|
||||||
)
|
)
|
||||||
|
|
||||||
h.handleNewNode(writer, regReq, machineKey)
|
h.handleNewNode(writer, regReq, registrationId)
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -206,27 +245,28 @@ func (h *Headscale) handleRegister(
|
||||||
}
|
}
|
||||||
|
|
||||||
if regReq.Followup != "" {
|
if regReq.Followup != "" {
|
||||||
select {
|
h.waitForFollowup(req, regReq, logTrace)
|
||||||
case <-req.Context().Done():
|
return
|
||||||
return
|
|
||||||
case <-time.After(registrationHoldoff):
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// The node has expired or it is logged out
|
// The node has expired or it is logged out
|
||||||
h.handleNodeExpiredOrLoggedOut(writer, regReq, *node, machineKey)
|
h.handleNodeExpiredOrLoggedOut(writer, regReq, *node, machineKey, registrationId)
|
||||||
|
|
||||||
// TODO(juan): RegisterRequest includes an Expiry time, that we could optionally use
|
// TODO(juan): RegisterRequest includes an Expiry time, that we could optionally use
|
||||||
node.Expiry = &time.Time{}
|
node.Expiry = &time.Time{}
|
||||||
|
|
||||||
|
// TODO(kradalby): do we need to rethink this as part of authflow?
|
||||||
// If we are here it means the client needs to be reauthorized,
|
// If we are here it means the client needs to be reauthorized,
|
||||||
// we need to make sure the NodeKey matches the one in the request
|
// we need to make sure the NodeKey matches the one in the request
|
||||||
// TODO(juan): What happens when using fast user switching between two
|
// TODO(juan): What happens when using fast user switching between two
|
||||||
// headscale-managed tailnets?
|
// headscale-managed tailnets?
|
||||||
node.NodeKey = regReq.NodeKey
|
node.NodeKey = regReq.NodeKey
|
||||||
h.registrationCache.Set(
|
h.registrationCache.Set(
|
||||||
machineKey.String(),
|
registrationId,
|
||||||
*node,
|
types.RegisterNode{
|
||||||
|
Node: *node,
|
||||||
|
Registered: make(chan struct{}),
|
||||||
|
},
|
||||||
)
|
)
|
||||||
|
|
||||||
return
|
return
|
||||||
|
@ -296,6 +336,8 @@ func (h *Headscale) handleAuthKey(
|
||||||
// The error is not important, because if it does not
|
// The error is not important, because if it does not
|
||||||
// exist, then this is a new node and we will move
|
// exist, then this is a new node and we will move
|
||||||
// on to registration.
|
// on to registration.
|
||||||
|
// TODO(kradalby): Use reqs NodeKey and OldNodeKey as indicators for new registrations vs
|
||||||
|
// key refreshes. This will allow us to remove the machineKey from the registration request.
|
||||||
node, _ := h.db.GetNodeByAnyKey(machineKey, registerRequest.NodeKey, registerRequest.OldNodeKey)
|
node, _ := h.db.GetNodeByAnyKey(machineKey, registerRequest.NodeKey, registerRequest.OldNodeKey)
|
||||||
if node != nil {
|
if node != nil {
|
||||||
log.Trace().
|
log.Trace().
|
||||||
|
@ -444,16 +486,16 @@ func (h *Headscale) handleAuthKey(
|
||||||
func (h *Headscale) handleNewNode(
|
func (h *Headscale) handleNewNode(
|
||||||
writer http.ResponseWriter,
|
writer http.ResponseWriter,
|
||||||
registerRequest tailcfg.RegisterRequest,
|
registerRequest tailcfg.RegisterRequest,
|
||||||
machineKey key.MachinePublic,
|
registrationId types.RegistrationID,
|
||||||
) {
|
) {
|
||||||
logInfo, logTrace, logErr := logAuthFunc(registerRequest, machineKey)
|
logInfo, logTrace, logErr := logAuthFunc(registerRequest, key.MachinePublic{}, registrationId)
|
||||||
|
|
||||||
resp := tailcfg.RegisterResponse{}
|
resp := tailcfg.RegisterResponse{}
|
||||||
|
|
||||||
// The node registration is new, redirect the client to the registration URL
|
// The node registration is new, redirect the client to the registration URL
|
||||||
logTrace("The node seems to be new, sending auth url")
|
logTrace("The node is new, sending auth url")
|
||||||
|
|
||||||
resp.AuthURL = h.authProvider.AuthURL(machineKey)
|
resp.AuthURL = h.authProvider.AuthURL(registrationId)
|
||||||
|
|
||||||
respBody, err := json.Marshal(resp)
|
respBody, err := json.Marshal(resp)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -660,6 +702,7 @@ func (h *Headscale) handleNodeExpiredOrLoggedOut(
|
||||||
regReq tailcfg.RegisterRequest,
|
regReq tailcfg.RegisterRequest,
|
||||||
node types.Node,
|
node types.Node,
|
||||||
machineKey key.MachinePublic,
|
machineKey key.MachinePublic,
|
||||||
|
registrationId types.RegistrationID,
|
||||||
) {
|
) {
|
||||||
resp := tailcfg.RegisterResponse{}
|
resp := tailcfg.RegisterResponse{}
|
||||||
|
|
||||||
|
@ -673,12 +716,12 @@ func (h *Headscale) handleNodeExpiredOrLoggedOut(
|
||||||
log.Trace().
|
log.Trace().
|
||||||
Caller().
|
Caller().
|
||||||
Str("node", node.Hostname).
|
Str("node", node.Hostname).
|
||||||
Str("machine_key", machineKey.ShortString()).
|
Str("registration_id", registrationId.String()).
|
||||||
Str("node_key", regReq.NodeKey.ShortString()).
|
Str("node_key", regReq.NodeKey.ShortString()).
|
||||||
Str("node_key_old", regReq.OldNodeKey.ShortString()).
|
Str("node_key_old", regReq.OldNodeKey.ShortString()).
|
||||||
Msg("Node registration has expired or logged out. Sending a auth url to register")
|
Msg("Node registration has expired or logged out. Sending a auth url to register")
|
||||||
|
|
||||||
resp.AuthURL = h.authProvider.AuthURL(machineKey)
|
resp.AuthURL = h.authProvider.AuthURL(registrationId)
|
||||||
|
|
||||||
respBody, err := json.Marshal(resp)
|
respBody, err := json.Marshal(resp)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -703,7 +746,7 @@ func (h *Headscale) handleNodeExpiredOrLoggedOut(
|
||||||
|
|
||||||
log.Trace().
|
log.Trace().
|
||||||
Caller().
|
Caller().
|
||||||
Str("machine_key", machineKey.ShortString()).
|
Str("registration_id", registrationId.String()).
|
||||||
Str("node_key", regReq.NodeKey.ShortString()).
|
Str("node_key", regReq.NodeKey.ShortString()).
|
||||||
Str("node_key_old", regReq.OldNodeKey.ShortString()).
|
Str("node_key_old", regReq.OldNodeKey.ShortString()).
|
||||||
Str("node", node.Hostname).
|
Str("node", node.Hostname).
|
||||||
|
|
|
@ -1,56 +0,0 @@
|
||||||
package hscontrol
|
|
||||||
|
|
||||||
import (
|
|
||||||
"encoding/json"
|
|
||||||
"io"
|
|
||||||
"net/http"
|
|
||||||
|
|
||||||
"github.com/rs/zerolog/log"
|
|
||||||
"tailscale.com/tailcfg"
|
|
||||||
)
|
|
||||||
|
|
||||||
// // NoiseRegistrationHandler handles the actual registration process of a node.
|
|
||||||
func (ns *noiseServer) NoiseRegistrationHandler(
|
|
||||||
writer http.ResponseWriter,
|
|
||||||
req *http.Request,
|
|
||||||
) {
|
|
||||||
log.Trace().Caller().Msgf("Noise registration handler for client %s", req.RemoteAddr)
|
|
||||||
if req.Method != http.MethodPost {
|
|
||||||
http.Error(writer, "Wrong method", http.StatusMethodNotAllowed)
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Trace().
|
|
||||||
Any("headers", req.Header).
|
|
||||||
Caller().
|
|
||||||
Msg("Headers")
|
|
||||||
|
|
||||||
body, _ := io.ReadAll(req.Body)
|
|
||||||
registerRequest := tailcfg.RegisterRequest{}
|
|
||||||
if err := json.Unmarshal(body, ®isterRequest); err != nil {
|
|
||||||
log.Error().
|
|
||||||
Caller().
|
|
||||||
Err(err).
|
|
||||||
Msg("Cannot parse RegisterRequest")
|
|
||||||
http.Error(writer, "Internal error", http.StatusInternalServerError)
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Reject unsupported versions
|
|
||||||
if registerRequest.Version < MinimumCapVersion {
|
|
||||||
log.Info().
|
|
||||||
Caller().
|
|
||||||
Int("min_version", int(MinimumCapVersion)).
|
|
||||||
Int("client_version", int(registerRequest.Version)).
|
|
||||||
Msg("unsupported client connected")
|
|
||||||
http.Error(writer, "Internal error", http.StatusBadRequest)
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
ns.nodeKey = registerRequest.NodeKey
|
|
||||||
|
|
||||||
ns.headscale.handleRegister(writer, req, registerRequest, ns.conn.Peer())
|
|
||||||
}
|
|
|
@ -41,7 +41,7 @@ type KV struct {
|
||||||
type HSDatabase struct {
|
type HSDatabase struct {
|
||||||
DB *gorm.DB
|
DB *gorm.DB
|
||||||
cfg *types.DatabaseConfig
|
cfg *types.DatabaseConfig
|
||||||
regCache *zcache.Cache[string, types.Node]
|
regCache *zcache.Cache[types.RegistrationID, types.RegisterNode]
|
||||||
|
|
||||||
baseDomain string
|
baseDomain string
|
||||||
}
|
}
|
||||||
|
@ -51,7 +51,7 @@ type HSDatabase struct {
|
||||||
func NewHeadscaleDatabase(
|
func NewHeadscaleDatabase(
|
||||||
cfg types.DatabaseConfig,
|
cfg types.DatabaseConfig,
|
||||||
baseDomain string,
|
baseDomain string,
|
||||||
regCache *zcache.Cache[string, types.Node],
|
regCache *zcache.Cache[types.RegistrationID, types.RegisterNode],
|
||||||
) (*HSDatabase, error) {
|
) (*HSDatabase, error) {
|
||||||
dbConn, err := openDB(cfg)
|
dbConn, err := openDB(cfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -260,8 +260,8 @@ func testCopyOfDatabase(src string) (string, error) {
|
||||||
return dst, err
|
return dst, err
|
||||||
}
|
}
|
||||||
|
|
||||||
func emptyCache() *zcache.Cache[string, types.Node] {
|
func emptyCache() *zcache.Cache[types.RegistrationID, types.RegisterNode] {
|
||||||
return zcache.New[string, types.Node](time.Minute, time.Hour)
|
return zcache.New[types.RegistrationID, types.RegisterNode](time.Minute, time.Hour)
|
||||||
}
|
}
|
||||||
|
|
||||||
// requireConstraintFailed checks if the error is a constraint failure with
|
// requireConstraintFailed checks if the error is a constraint failure with
|
||||||
|
|
|
@ -158,6 +158,30 @@ func GetNodeByMachineKey(
|
||||||
return &mach, nil
|
return &mach, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (hsdb *HSDatabase) GetNodeByNodeKey(nodeKey key.NodePublic) (*types.Node, error) {
|
||||||
|
return Read(hsdb.DB, func(rx *gorm.DB) (*types.Node, error) {
|
||||||
|
return GetNodeByNodeKey(rx, nodeKey)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetNodeByNodeKey finds a Node by its NodeKey and returns the Node struct.
|
||||||
|
func GetNodeByNodeKey(
|
||||||
|
tx *gorm.DB,
|
||||||
|
nodeKey key.NodePublic,
|
||||||
|
) (*types.Node, error) {
|
||||||
|
mach := types.Node{}
|
||||||
|
if result := tx.
|
||||||
|
Preload("AuthKey").
|
||||||
|
Preload("AuthKey.User").
|
||||||
|
Preload("User").
|
||||||
|
Preload("Routes").
|
||||||
|
First(&mach, "node_key = ?", nodeKey.String()); result.Error != nil {
|
||||||
|
return nil, result.Error
|
||||||
|
}
|
||||||
|
|
||||||
|
return &mach, nil
|
||||||
|
}
|
||||||
|
|
||||||
func (hsdb *HSDatabase) GetNodeByAnyKey(
|
func (hsdb *HSDatabase) GetNodeByAnyKey(
|
||||||
machineKey key.MachinePublic,
|
machineKey key.MachinePublic,
|
||||||
nodeKey key.NodePublic,
|
nodeKey key.NodePublic,
|
||||||
|
@ -319,60 +343,83 @@ func SetLastSeen(tx *gorm.DB, nodeID types.NodeID, lastSeen time.Time) error {
|
||||||
return tx.Model(&types.Node{}).Where("id = ?", nodeID).Update("last_seen", lastSeen).Error
|
return tx.Model(&types.Node{}).Where("id = ?", nodeID).Update("last_seen", lastSeen).Error
|
||||||
}
|
}
|
||||||
|
|
||||||
func (hsdb *HSDatabase) RegisterNodeFromAuthCallback(
|
// HandleNodeFromAuthPath is called from the OIDC or CLI auth path
|
||||||
mkey key.MachinePublic,
|
// with a registrationID to register or reauthenticate a node.
|
||||||
|
// If the node found in the registration cache is not already registered,
|
||||||
|
// it will be registered with the user and the node will be removed from the cache.
|
||||||
|
// If the node is already registered, the expiry will be updated.
|
||||||
|
// The node, and a boolean indicating if it was a new node or not, will be returned.
|
||||||
|
func (hsdb *HSDatabase) HandleNodeFromAuthPath(
|
||||||
|
registrationID types.RegistrationID,
|
||||||
userID types.UserID,
|
userID types.UserID,
|
||||||
nodeExpiry *time.Time,
|
nodeExpiry *time.Time,
|
||||||
registrationMethod string,
|
registrationMethod string,
|
||||||
ipv4 *netip.Addr,
|
ipv4 *netip.Addr,
|
||||||
ipv6 *netip.Addr,
|
ipv6 *netip.Addr,
|
||||||
) (*types.Node, error) {
|
) (*types.Node, bool, error) {
|
||||||
return Write(hsdb.DB, func(tx *gorm.DB) (*types.Node, error) {
|
var newNode bool
|
||||||
if node, ok := hsdb.regCache.Get(mkey.String()); ok {
|
node, err := Write(hsdb.DB, func(tx *gorm.DB) (*types.Node, error) {
|
||||||
user, err := GetUserByID(tx, userID)
|
if reg, ok := hsdb.regCache.Get(registrationID); ok {
|
||||||
if err != nil {
|
if node, _ := GetNodeByNodeKey(tx, reg.Node.NodeKey); node == nil {
|
||||||
return nil, fmt.Errorf(
|
user, err := GetUserByID(tx, userID)
|
||||||
"failed to find user in register node from auth callback, %w",
|
if err != nil {
|
||||||
err,
|
return nil, fmt.Errorf(
|
||||||
|
"failed to find user in register node from auth callback, %w",
|
||||||
|
err,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug().
|
||||||
|
Str("registration_id", registrationID.String()).
|
||||||
|
Str("username", user.Username()).
|
||||||
|
Str("registrationMethod", registrationMethod).
|
||||||
|
Str("expiresAt", fmt.Sprintf("%v", nodeExpiry)).
|
||||||
|
Msg("Registering node from API/CLI or auth callback")
|
||||||
|
|
||||||
|
// TODO(kradalby): This looks quite wrong? why ID 0?
|
||||||
|
// Why not always?
|
||||||
|
// Registration of expired node with different user
|
||||||
|
if reg.Node.ID != 0 &&
|
||||||
|
reg.Node.UserID != user.ID {
|
||||||
|
return nil, ErrDifferentRegisteredUser
|
||||||
|
}
|
||||||
|
|
||||||
|
reg.Node.UserID = user.ID
|
||||||
|
reg.Node.User = *user
|
||||||
|
reg.Node.RegisterMethod = registrationMethod
|
||||||
|
|
||||||
|
if nodeExpiry != nil {
|
||||||
|
reg.Node.Expiry = nodeExpiry
|
||||||
|
}
|
||||||
|
|
||||||
|
node, err := RegisterNode(
|
||||||
|
tx,
|
||||||
|
reg.Node,
|
||||||
|
ipv4, ipv6,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
if err == nil {
|
||||||
|
hsdb.regCache.Delete(registrationID)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Signal to waiting clients that the machine has been registered.
|
||||||
|
close(reg.Registered)
|
||||||
|
newNode = true
|
||||||
|
return node, err
|
||||||
|
} else {
|
||||||
|
// If the node is already registered, this is a refresh.
|
||||||
|
err := NodeSetExpiry(tx, node.ID, *nodeExpiry)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return node, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().
|
|
||||||
Str("machine_key", mkey.ShortString()).
|
|
||||||
Str("username", user.Username()).
|
|
||||||
Str("registrationMethod", registrationMethod).
|
|
||||||
Str("expiresAt", fmt.Sprintf("%v", nodeExpiry)).
|
|
||||||
Msg("Registering node from API/CLI or auth callback")
|
|
||||||
|
|
||||||
// Registration of expired node with different user
|
|
||||||
if node.ID != 0 &&
|
|
||||||
node.UserID != user.ID {
|
|
||||||
return nil, ErrDifferentRegisteredUser
|
|
||||||
}
|
|
||||||
|
|
||||||
node.UserID = user.ID
|
|
||||||
node.User = *user
|
|
||||||
node.RegisterMethod = registrationMethod
|
|
||||||
|
|
||||||
if nodeExpiry != nil {
|
|
||||||
node.Expiry = nodeExpiry
|
|
||||||
}
|
|
||||||
|
|
||||||
node, err := RegisterNode(
|
|
||||||
tx,
|
|
||||||
node,
|
|
||||||
ipv4, ipv6,
|
|
||||||
)
|
|
||||||
|
|
||||||
if err == nil {
|
|
||||||
hsdb.regCache.Delete(mkey.String())
|
|
||||||
}
|
|
||||||
|
|
||||||
return node, err
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil, ErrNodeNotFoundRegistrationCache
|
return nil, ErrNodeNotFoundRegistrationCache
|
||||||
})
|
})
|
||||||
|
|
||||||
|
return node, newNode, err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (hsdb *HSDatabase) RegisterNode(node types.Node, ipv4 *netip.Addr, ipv6 *netip.Addr) (*types.Node, error) {
|
func (hsdb *HSDatabase) RegisterNode(node types.Node, ipv4 *netip.Addr, ipv6 *netip.Addr) (*types.Node, error) {
|
||||||
|
|
|
@ -227,11 +227,10 @@ func (api headscaleV1APIServer) RegisterNode(
|
||||||
) (*v1.RegisterNodeResponse, error) {
|
) (*v1.RegisterNodeResponse, error) {
|
||||||
log.Trace().
|
log.Trace().
|
||||||
Str("user", request.GetUser()).
|
Str("user", request.GetUser()).
|
||||||
Str("machine_key", request.GetKey()).
|
Str("registration_id", request.GetKey()).
|
||||||
Msg("Registering node")
|
Msg("Registering node")
|
||||||
|
|
||||||
var mkey key.MachinePublic
|
registrationId, err := types.RegistrationIDFromString(request.GetKey())
|
||||||
err := mkey.UnmarshalText([]byte(request.GetKey()))
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -246,8 +245,8 @@ func (api headscaleV1APIServer) RegisterNode(
|
||||||
return nil, fmt.Errorf("looking up user: %w", err)
|
return nil, fmt.Errorf("looking up user: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
node, err := api.h.db.RegisterNodeFromAuthCallback(
|
node, _, err := api.h.db.HandleNodeFromAuthPath(
|
||||||
mkey,
|
registrationId,
|
||||||
types.UserID(user.ID),
|
types.UserID(user.ID),
|
||||||
nil,
|
nil,
|
||||||
util.RegisterMethodCLI,
|
util.RegisterMethodCLI,
|
||||||
|
@ -839,36 +838,36 @@ func (api headscaleV1APIServer) DebugCreateNode(
|
||||||
Hostname: "DebugTestNode",
|
Hostname: "DebugTestNode",
|
||||||
}
|
}
|
||||||
|
|
||||||
var mkey key.MachinePublic
|
registrationId, err := types.RegistrationIDFromString(request.GetKey())
|
||||||
err = mkey.UnmarshalText([]byte(request.GetKey()))
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
nodeKey := key.NewNode()
|
newNode := types.RegisterNode{
|
||||||
|
Node: types.Node{
|
||||||
|
NodeKey: key.NewNode().Public(),
|
||||||
|
MachineKey: key.NewMachine().Public(),
|
||||||
|
Hostname: request.GetName(),
|
||||||
|
User: *user,
|
||||||
|
|
||||||
newNode := types.Node{
|
Expiry: &time.Time{},
|
||||||
MachineKey: mkey,
|
LastSeen: &time.Time{},
|
||||||
NodeKey: nodeKey.Public(),
|
|
||||||
Hostname: request.GetName(),
|
|
||||||
User: *user,
|
|
||||||
|
|
||||||
Expiry: &time.Time{},
|
Hostinfo: &hostinfo,
|
||||||
LastSeen: &time.Time{},
|
},
|
||||||
|
Registered: make(chan struct{}),
|
||||||
Hostinfo: &hostinfo,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().
|
log.Debug().
|
||||||
Str("machine_key", mkey.ShortString()).
|
Str("registration_id", registrationId.String()).
|
||||||
Msg("adding debug machine via CLI, appending to registration cache")
|
Msg("adding debug machine via CLI, appending to registration cache")
|
||||||
|
|
||||||
api.h.registrationCache.Set(
|
api.h.registrationCache.Set(
|
||||||
mkey.String(),
|
registrationId,
|
||||||
newNode,
|
newNode,
|
||||||
)
|
)
|
||||||
|
|
||||||
return &v1.DebugCreateNodeResponse{Node: newNode.Proto()}, nil
|
return &v1.DebugCreateNodeResponse{Node: newNode.Node.Proto()}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (api headscaleV1APIServer) mustEmbedUnimplementedHeadscaleServiceServer() {}
|
func (api headscaleV1APIServer) mustEmbedUnimplementedHeadscaleServiceServer() {}
|
||||||
|
|
|
@ -8,16 +8,13 @@ import (
|
||||||
"net/http"
|
"net/http"
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
|
||||||
|
|
||||||
"github.com/chasefleming/elem-go"
|
|
||||||
"github.com/chasefleming/elem-go/attrs"
|
|
||||||
"github.com/chasefleming/elem-go/styles"
|
"github.com/chasefleming/elem-go/styles"
|
||||||
"github.com/gorilla/mux"
|
"github.com/gorilla/mux"
|
||||||
"github.com/juanfont/headscale/hscontrol/templates"
|
"github.com/juanfont/headscale/hscontrol/templates"
|
||||||
|
"github.com/juanfont/headscale/hscontrol/types"
|
||||||
"github.com/rs/zerolog/log"
|
"github.com/rs/zerolog/log"
|
||||||
"tailscale.com/tailcfg"
|
"tailscale.com/tailcfg"
|
||||||
"tailscale.com/types/key"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -32,8 +29,6 @@ const (
|
||||||
// See also https://github.com/tailscale/tailscale/blob/main/tailcfg/tailcfg.go
|
// See also https://github.com/tailscale/tailscale/blob/main/tailcfg/tailcfg.go
|
||||||
NoiseCapabilityVersion = 39
|
NoiseCapabilityVersion = 39
|
||||||
|
|
||||||
// TODO(juan): remove this once https://github.com/juanfont/headscale/issues/727 is fixed.
|
|
||||||
registrationHoldoff = time.Second * 5
|
|
||||||
reservedResponseHeaderSize = 4
|
reservedResponseHeaderSize = 4
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -204,31 +199,6 @@ var codeStyleRegisterWebAPI = styles.Props{
|
||||||
styles.BackgroundColor: "#eee",
|
styles.BackgroundColor: "#eee",
|
||||||
}
|
}
|
||||||
|
|
||||||
func registerWebHTML(key string) *elem.Element {
|
|
||||||
return elem.Html(nil,
|
|
||||||
elem.Head(
|
|
||||||
nil,
|
|
||||||
elem.Title(nil, elem.Text("Registration - Headscale")),
|
|
||||||
elem.Meta(attrs.Props{
|
|
||||||
attrs.Name: "viewport",
|
|
||||||
attrs.Content: "width=device-width, initial-scale=1",
|
|
||||||
}),
|
|
||||||
),
|
|
||||||
elem.Body(attrs.Props{
|
|
||||||
attrs.Style: styles.Props{
|
|
||||||
styles.FontFamily: "sans",
|
|
||||||
}.ToInline(),
|
|
||||||
},
|
|
||||||
elem.H1(nil, elem.Text("headscale")),
|
|
||||||
elem.H2(nil, elem.Text("Machine registration")),
|
|
||||||
elem.P(nil, elem.Text("Run the command below in the headscale server to add this machine to your network:")),
|
|
||||||
elem.Code(attrs.Props{attrs.Style: codeStyleRegisterWebAPI.ToInline()},
|
|
||||||
elem.Text(fmt.Sprintf("headscale nodes register --user USERNAME --key %s", key)),
|
|
||||||
),
|
|
||||||
),
|
|
||||||
)
|
|
||||||
}
|
|
||||||
|
|
||||||
type AuthProviderWeb struct {
|
type AuthProviderWeb struct {
|
||||||
serverURL string
|
serverURL string
|
||||||
}
|
}
|
||||||
|
@ -239,15 +209,15 @@ func NewAuthProviderWeb(serverURL string) *AuthProviderWeb {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *AuthProviderWeb) AuthURL(mKey key.MachinePublic) string {
|
func (a *AuthProviderWeb) AuthURL(registrationId types.RegistrationID) string {
|
||||||
return fmt.Sprintf(
|
return fmt.Sprintf(
|
||||||
"%s/register/%s",
|
"%s/register/%s",
|
||||||
strings.TrimSuffix(a.serverURL, "/"),
|
strings.TrimSuffix(a.serverURL, "/"),
|
||||||
mKey.String())
|
registrationId.String())
|
||||||
}
|
}
|
||||||
|
|
||||||
// RegisterWebAPI shows a simple message in the browser to point to the CLI
|
// RegisterWebAPI shows a simple message in the browser to point to the CLI
|
||||||
// Listens in /register/:nkey.
|
// Listens in /register/:registration_id.
|
||||||
//
|
//
|
||||||
// This is not part of the Tailscale control API, as we could send whatever URL
|
// This is not part of the Tailscale control API, as we could send whatever URL
|
||||||
// in the RegisterResponse.AuthURL field.
|
// in the RegisterResponse.AuthURL field.
|
||||||
|
@ -256,39 +226,23 @@ func (a *AuthProviderWeb) RegisterHandler(
|
||||||
req *http.Request,
|
req *http.Request,
|
||||||
) {
|
) {
|
||||||
vars := mux.Vars(req)
|
vars := mux.Vars(req)
|
||||||
machineKeyStr := vars["mkey"]
|
registrationIdStr := vars["registration_id"]
|
||||||
|
|
||||||
// We need to make sure we dont open for XSS style injections, if the parameter that
|
// We need to make sure we dont open for XSS style injections, if the parameter that
|
||||||
// is passed as a key is not parsable/validated as a NodePublic key, then fail to render
|
// is passed as a key is not parsable/validated as a NodePublic key, then fail to render
|
||||||
// the template and log an error.
|
// the template and log an error.
|
||||||
var machineKey key.MachinePublic
|
registrationId, err := types.RegistrationIDFromString(registrationIdStr)
|
||||||
err := machineKey.UnmarshalText(
|
|
||||||
[]byte(machineKeyStr),
|
|
||||||
)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Warn().Err(err).Msg("Failed to parse incoming machinekey")
|
http.Error(writer, "invalid registration ID", http.StatusBadRequest)
|
||||||
|
|
||||||
writer.Header().Set("Content-Type", "text/plain; charset=utf-8")
|
|
||||||
writer.WriteHeader(http.StatusBadRequest)
|
|
||||||
_, err := writer.Write([]byte("Wrong params"))
|
|
||||||
if err != nil {
|
|
||||||
log.Error().
|
|
||||||
Caller().
|
|
||||||
Err(err).
|
|
||||||
Msg("Failed to write response")
|
|
||||||
}
|
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
writer.Header().Set("Content-Type", "text/html; charset=utf-8")
|
writer.Header().Set("Content-Type", "text/html; charset=utf-8")
|
||||||
writer.WriteHeader(http.StatusOK)
|
writer.WriteHeader(http.StatusOK)
|
||||||
if _, err := writer.Write([]byte(registerWebHTML(machineKey.String()).Render())); err != nil {
|
if _, err := writer.Write([]byte(templates.RegisterWeb(registrationId).Render())); err != nil {
|
||||||
if _, err := writer.Write([]byte(templates.RegisterWeb(machineKey.String()).Render())); err != nil {
|
log.Error().
|
||||||
log.Error().
|
Caller().
|
||||||
Caller().
|
Err(err).
|
||||||
Err(err).
|
Msg("Failed to write response")
|
||||||
Msg("Failed to write response")
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,6 +3,7 @@ package hscontrol
|
||||||
import (
|
import (
|
||||||
"encoding/binary"
|
"encoding/binary"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
|
@ -115,18 +116,8 @@ func (h *Headscale) NoiseUpgradeHandler(
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ns *noiseServer) earlyNoise(protocolVersion int, writer io.Writer) error {
|
func (ns *noiseServer) earlyNoise(protocolVersion int, writer io.Writer) error {
|
||||||
log.Trace().
|
if !isSupportedVersion(tailcfg.CapabilityVersion(protocolVersion)) {
|
||||||
Caller().
|
return fmt.Errorf("unsupported client version: %d", protocolVersion)
|
||||||
Int("protocol_version", protocolVersion).
|
|
||||||
Str("challenge", ns.challenge.Public().String()).
|
|
||||||
Msg("earlyNoise called")
|
|
||||||
|
|
||||||
if protocolVersion < earlyNoiseCapabilityVersion {
|
|
||||||
log.Trace().
|
|
||||||
Caller().
|
|
||||||
Msgf("protocol version %d does not support early noise", protocolVersion)
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
earlyJSON, err := json.Marshal(&tailcfg.EarlyNoise{
|
earlyJSON, err := json.Marshal(&tailcfg.EarlyNoise{
|
||||||
|
@ -162,6 +153,26 @@ const (
|
||||||
MinimumCapVersion tailcfg.CapabilityVersion = 82
|
MinimumCapVersion tailcfg.CapabilityVersion = 82
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func isSupportedVersion(version tailcfg.CapabilityVersion) bool {
|
||||||
|
return version >= MinimumCapVersion
|
||||||
|
}
|
||||||
|
|
||||||
|
func rejectUnsupported(writer http.ResponseWriter, version tailcfg.CapabilityVersion) bool {
|
||||||
|
// Reject unsupported versions
|
||||||
|
if !isSupportedVersion(version) {
|
||||||
|
log.Info().
|
||||||
|
Caller().
|
||||||
|
Int("min_version", int(MinimumCapVersion)).
|
||||||
|
Int("client_version", int(version)).
|
||||||
|
Msg("unsupported client connected")
|
||||||
|
http.Error(writer, "unsupported client version", http.StatusBadRequest)
|
||||||
|
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
// NoisePollNetMapHandler takes care of /machine/:id/map using the Noise protocol
|
// NoisePollNetMapHandler takes care of /machine/:id/map using the Noise protocol
|
||||||
//
|
//
|
||||||
// This is the busiest endpoint, as it keeps the HTTP long poll that updates
|
// This is the busiest endpoint, as it keeps the HTTP long poll that updates
|
||||||
|
@ -177,7 +188,7 @@ func (ns *noiseServer) NoisePollNetMapHandler(
|
||||||
) {
|
) {
|
||||||
body, _ := io.ReadAll(req.Body)
|
body, _ := io.ReadAll(req.Body)
|
||||||
|
|
||||||
mapRequest := tailcfg.MapRequest{}
|
var mapRequest tailcfg.MapRequest
|
||||||
if err := json.Unmarshal(body, &mapRequest); err != nil {
|
if err := json.Unmarshal(body, &mapRequest); err != nil {
|
||||||
log.Error().
|
log.Error().
|
||||||
Caller().
|
Caller().
|
||||||
|
@ -197,14 +208,7 @@ func (ns *noiseServer) NoisePollNetMapHandler(
|
||||||
Msg("PollNetMapHandler called")
|
Msg("PollNetMapHandler called")
|
||||||
|
|
||||||
// Reject unsupported versions
|
// Reject unsupported versions
|
||||||
if mapRequest.Version < MinimumCapVersion {
|
if rejectUnsupported(writer, mapRequest.Version) {
|
||||||
log.Info().
|
|
||||||
Caller().
|
|
||||||
Int("min_version", int(MinimumCapVersion)).
|
|
||||||
Int("client_version", int(mapRequest.Version)).
|
|
||||||
Msg("unsupported client connected")
|
|
||||||
http.Error(writer, "Internal error", http.StatusBadRequest)
|
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -232,3 +236,42 @@ func (ns *noiseServer) NoisePollNetMapHandler(
|
||||||
sess.serveLongPoll()
|
sess.serveLongPoll()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NoiseRegistrationHandler handles the actual registration process of a node.
|
||||||
|
func (ns *noiseServer) NoiseRegistrationHandler(
|
||||||
|
writer http.ResponseWriter,
|
||||||
|
req *http.Request,
|
||||||
|
) {
|
||||||
|
log.Trace().Caller().Msgf("Noise registration handler for client %s", req.RemoteAddr)
|
||||||
|
if req.Method != http.MethodPost {
|
||||||
|
http.Error(writer, "Wrong method", http.StatusMethodNotAllowed)
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Trace().
|
||||||
|
Any("headers", req.Header).
|
||||||
|
Caller().
|
||||||
|
Msg("Headers")
|
||||||
|
|
||||||
|
body, _ := io.ReadAll(req.Body)
|
||||||
|
var registerRequest tailcfg.RegisterRequest
|
||||||
|
if err := json.Unmarshal(body, ®isterRequest); err != nil {
|
||||||
|
log.Error().
|
||||||
|
Caller().
|
||||||
|
Err(err).
|
||||||
|
Msg("Cannot parse RegisterRequest")
|
||||||
|
http.Error(writer, "Internal error", http.StatusInternalServerError)
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Reject unsupported versions
|
||||||
|
if rejectUnsupported(writer, registerRequest.Version) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
ns.nodeKey = registerRequest.NodeKey
|
||||||
|
|
||||||
|
ns.headscale.handleRegister(writer, req, registerRequest, ns.conn.Peer())
|
||||||
|
}
|
||||||
|
|
|
@ -21,7 +21,6 @@ import (
|
||||||
"github.com/juanfont/headscale/hscontrol/util"
|
"github.com/juanfont/headscale/hscontrol/util"
|
||||||
"github.com/rs/zerolog/log"
|
"github.com/rs/zerolog/log"
|
||||||
"golang.org/x/oauth2"
|
"golang.org/x/oauth2"
|
||||||
"tailscale.com/types/key"
|
|
||||||
"zgo.at/zcache/v2"
|
"zgo.at/zcache/v2"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -49,8 +48,8 @@ var (
|
||||||
|
|
||||||
// RegistrationInfo contains both machine key and verifier information for OIDC validation.
|
// RegistrationInfo contains both machine key and verifier information for OIDC validation.
|
||||||
type RegistrationInfo struct {
|
type RegistrationInfo struct {
|
||||||
MachineKey key.MachinePublic
|
RegistrationID types.RegistrationID
|
||||||
Verifier *string
|
Verifier *string
|
||||||
}
|
}
|
||||||
|
|
||||||
type AuthProviderOIDC struct {
|
type AuthProviderOIDC struct {
|
||||||
|
@ -112,11 +111,11 @@ func NewAuthProviderOIDC(
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *AuthProviderOIDC) AuthURL(mKey key.MachinePublic) string {
|
func (a *AuthProviderOIDC) AuthURL(registrationID types.RegistrationID) string {
|
||||||
return fmt.Sprintf(
|
return fmt.Sprintf(
|
||||||
"%s/register/%s",
|
"%s/register/%s",
|
||||||
strings.TrimSuffix(a.serverURL, "/"),
|
strings.TrimSuffix(a.serverURL, "/"),
|
||||||
mKey.String())
|
registrationID.String())
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *AuthProviderOIDC) determineNodeExpiry(idTokenExpiration time.Time) time.Time {
|
func (a *AuthProviderOIDC) determineNodeExpiry(idTokenExpiration time.Time) time.Time {
|
||||||
|
@ -129,32 +128,29 @@ func (a *AuthProviderOIDC) determineNodeExpiry(idTokenExpiration time.Time) time
|
||||||
|
|
||||||
// RegisterOIDC redirects to the OIDC provider for authentication
|
// RegisterOIDC redirects to the OIDC provider for authentication
|
||||||
// Puts NodeKey in cache so the callback can retrieve it using the oidc state param
|
// Puts NodeKey in cache so the callback can retrieve it using the oidc state param
|
||||||
// Listens in /register/:mKey.
|
// Listens in /register/:registration_id.
|
||||||
func (a *AuthProviderOIDC) RegisterHandler(
|
func (a *AuthProviderOIDC) RegisterHandler(
|
||||||
writer http.ResponseWriter,
|
writer http.ResponseWriter,
|
||||||
req *http.Request,
|
req *http.Request,
|
||||||
) {
|
) {
|
||||||
vars := mux.Vars(req)
|
vars := mux.Vars(req)
|
||||||
machineKeyStr, ok := vars["mkey"]
|
registrationIdStr, ok := vars["registration_id"]
|
||||||
|
|
||||||
log.Debug().
|
|
||||||
Caller().
|
|
||||||
Str("machine_key", machineKeyStr).
|
|
||||||
Bool("ok", ok).
|
|
||||||
Msg("Received oidc register call")
|
|
||||||
|
|
||||||
// We need to make sure we dont open for XSS style injections, if the parameter that
|
// We need to make sure we dont open for XSS style injections, if the parameter that
|
||||||
// is passed as a key is not parsable/validated as a NodePublic key, then fail to render
|
// is passed as a key is not parsable/validated as a NodePublic key, then fail to render
|
||||||
// the template and log an error.
|
// the template and log an error.
|
||||||
var machineKey key.MachinePublic
|
registrationId, err := types.RegistrationIDFromString(registrationIdStr)
|
||||||
err := machineKey.UnmarshalText(
|
|
||||||
[]byte(machineKeyStr),
|
|
||||||
)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
http.Error(writer, err.Error(), http.StatusBadRequest)
|
http.Error(writer, "invalid registration ID", http.StatusBadRequest)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
log.Debug().
|
||||||
|
Caller().
|
||||||
|
Str("registration_id", registrationId.String()).
|
||||||
|
Bool("ok", ok).
|
||||||
|
Msg("Received oidc register call")
|
||||||
|
|
||||||
// Set the state and nonce cookies to protect against CSRF attacks
|
// Set the state and nonce cookies to protect against CSRF attacks
|
||||||
state, err := setCSRFCookie(writer, req, "state")
|
state, err := setCSRFCookie(writer, req, "state")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -171,7 +167,7 @@ func (a *AuthProviderOIDC) RegisterHandler(
|
||||||
|
|
||||||
// Initialize registration info with machine key
|
// Initialize registration info with machine key
|
||||||
registrationInfo := RegistrationInfo{
|
registrationInfo := RegistrationInfo{
|
||||||
MachineKey: machineKey,
|
RegistrationID: registrationId,
|
||||||
}
|
}
|
||||||
|
|
||||||
extras := make([]oauth2.AuthCodeOption, 0, len(a.cfg.ExtraParams)+defaultOAuthOptionsCount)
|
extras := make([]oauth2.AuthCodeOption, 0, len(a.cfg.ExtraParams)+defaultOAuthOptionsCount)
|
||||||
|
@ -290,49 +286,27 @@ func (a *AuthProviderOIDC) OIDCCallbackHandler(
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Retrieve the node and the machine key from the state cache and
|
// TODO(kradalby): Is this comment right?
|
||||||
// database.
|
|
||||||
// If the node exists, then the node should be reauthenticated,
|
// If the node exists, then the node should be reauthenticated,
|
||||||
// if the node does not exist, and the machine key exists, then
|
// if the node does not exist, and the machine key exists, then
|
||||||
// this is a new node that should be registered.
|
// this is a new node that should be registered.
|
||||||
node, mKey := a.getMachineKeyFromState(state)
|
registrationId := a.getRegistrationIDFromState(state)
|
||||||
|
|
||||||
// Reauthenticate the node if it does exists.
|
// Register the node if it does not exist.
|
||||||
if node != nil {
|
if registrationId != nil {
|
||||||
err := a.reauthenticateNode(node, nodeExpiry)
|
verb := "Reauthenticated"
|
||||||
|
newNode, err := a.handleRegistrationID(user, *registrationId, nodeExpiry)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
http.Error(writer, err.Error(), http.StatusInternalServerError)
|
http.Error(writer, err.Error(), http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if newNode {
|
||||||
|
verb = "Authenticated"
|
||||||
|
}
|
||||||
|
|
||||||
// TODO(kradalby): replace with go-elem
|
// TODO(kradalby): replace with go-elem
|
||||||
var content bytes.Buffer
|
content, err := renderOIDCCallbackTemplate(user, verb)
|
||||||
if err := oidcCallbackTemplate.Execute(&content, oidcCallbackTemplateConfig{
|
|
||||||
User: user.DisplayNameOrUsername(),
|
|
||||||
Verb: "Reauthenticated",
|
|
||||||
}); err != nil {
|
|
||||||
http.Error(writer, fmt.Errorf("rendering OIDC callback template: %w", err).Error(), http.StatusInternalServerError)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
writer.Header().Set("Content-Type", "text/html; charset=utf-8")
|
|
||||||
writer.WriteHeader(http.StatusOK)
|
|
||||||
_, err = writer.Write(content.Bytes())
|
|
||||||
if err != nil {
|
|
||||||
util.LogErr(err, "Failed to write response")
|
|
||||||
}
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Register the node if it does not exist.
|
|
||||||
if mKey != nil {
|
|
||||||
if err := a.registerNode(user, mKey, nodeExpiry); err != nil {
|
|
||||||
http.Error(writer, err.Error(), http.StatusInternalServerError)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
content, err := renderOIDCCallbackTemplate(user)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
http.Error(writer, err.Error(), http.StatusInternalServerError)
|
http.Error(writer, err.Error(), http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
|
@ -456,49 +430,14 @@ func validateOIDCAllowedUsers(
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// getMachineKeyFromState retrieves the machine key from the state
|
// getRegistrationIDFromState retrieves the registration ID from the state.
|
||||||
// cache. If the machine key is found, it will try retrieve the
|
func (a *AuthProviderOIDC) getRegistrationIDFromState(state string) *types.RegistrationID {
|
||||||
// node information from the database.
|
|
||||||
func (a *AuthProviderOIDC) getMachineKeyFromState(state string) (*types.Node, *key.MachinePublic) {
|
|
||||||
regInfo, ok := a.registrationCache.Get(state)
|
regInfo, ok := a.registrationCache.Get(state)
|
||||||
if !ok {
|
if !ok {
|
||||||
return nil, nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// retrieve node information if it exist
|
return ®Info.RegistrationID
|
||||||
// The error is not important, because if it does not
|
|
||||||
// exist, then this is a new node and we will move
|
|
||||||
// on to registration.
|
|
||||||
node, _ := a.db.GetNodeByMachineKey(regInfo.MachineKey)
|
|
||||||
|
|
||||||
return node, ®Info.MachineKey
|
|
||||||
}
|
|
||||||
|
|
||||||
// reauthenticateNode updates the node expiry in the database
|
|
||||||
// and notifies the node and its peers about the change.
|
|
||||||
func (a *AuthProviderOIDC) reauthenticateNode(
|
|
||||||
node *types.Node,
|
|
||||||
expiry time.Time,
|
|
||||||
) error {
|
|
||||||
err := a.db.NodeSetExpiry(node.ID, expiry)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
ctx := types.NotifyCtx(context.Background(), "oidc-expiry-self", node.Hostname)
|
|
||||||
a.notifier.NotifyByNodeID(
|
|
||||||
ctx,
|
|
||||||
types.StateUpdate{
|
|
||||||
Type: types.StateSelfUpdate,
|
|
||||||
ChangeNodes: []types.NodeID{node.ID},
|
|
||||||
},
|
|
||||||
node.ID,
|
|
||||||
)
|
|
||||||
|
|
||||||
ctx = types.NotifyCtx(context.Background(), "oidc-expiry-peers", node.Hostname)
|
|
||||||
a.notifier.NotifyWithIgnore(ctx, types.StateUpdateExpire(node.ID, expiry), node.ID)
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *AuthProviderOIDC) createOrUpdateUserFromClaim(
|
func (a *AuthProviderOIDC) createOrUpdateUserFromClaim(
|
||||||
|
@ -556,43 +495,63 @@ func (a *AuthProviderOIDC) createOrUpdateUserFromClaim(
|
||||||
return user, nil
|
return user, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *AuthProviderOIDC) registerNode(
|
func (a *AuthProviderOIDC) handleRegistrationID(
|
||||||
user *types.User,
|
user *types.User,
|
||||||
machineKey *key.MachinePublic,
|
registrationID types.RegistrationID,
|
||||||
expiry time.Time,
|
expiry time.Time,
|
||||||
) error {
|
) (bool, error) {
|
||||||
ipv4, ipv6, err := a.ipAlloc.Next()
|
ipv4, ipv6, err := a.ipAlloc.Next()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return false, err
|
||||||
}
|
}
|
||||||
|
|
||||||
if _, err := a.db.RegisterNodeFromAuthCallback(
|
node, newNode, err := a.db.HandleNodeFromAuthPath(
|
||||||
*machineKey,
|
registrationID,
|
||||||
types.UserID(user.ID),
|
types.UserID(user.ID),
|
||||||
&expiry,
|
&expiry,
|
||||||
util.RegisterMethodOIDC,
|
util.RegisterMethodOIDC,
|
||||||
ipv4, ipv6,
|
ipv4, ipv6,
|
||||||
); err != nil {
|
)
|
||||||
return fmt.Errorf("could not register node: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
err = nodesChangedHook(a.db, a.polMan, a.notifier)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("updating resources using node: %w", err)
|
return false, fmt.Errorf("could not register node: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
// Send an update to all nodes if this is a new node that they need to know
|
||||||
|
// about.
|
||||||
|
// If this is a refresh, just send new expiry updates.
|
||||||
|
if newNode {
|
||||||
|
err = nodesChangedHook(a.db, a.polMan, a.notifier)
|
||||||
|
if err != nil {
|
||||||
|
return false, fmt.Errorf("updating resources using node: %w", err)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
ctx := types.NotifyCtx(context.Background(), "oidc-expiry-self", node.Hostname)
|
||||||
|
a.notifier.NotifyByNodeID(
|
||||||
|
ctx,
|
||||||
|
types.StateUpdate{
|
||||||
|
Type: types.StateSelfUpdate,
|
||||||
|
ChangeNodes: []types.NodeID{node.ID},
|
||||||
|
},
|
||||||
|
node.ID,
|
||||||
|
)
|
||||||
|
|
||||||
|
ctx = types.NotifyCtx(context.Background(), "oidc-expiry-peers", node.Hostname)
|
||||||
|
a.notifier.NotifyWithIgnore(ctx, types.StateUpdateExpire(node.ID, expiry), node.ID)
|
||||||
|
}
|
||||||
|
|
||||||
|
return newNode, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO(kradalby):
|
// TODO(kradalby):
|
||||||
// Rewrite in elem-go.
|
// Rewrite in elem-go.
|
||||||
func renderOIDCCallbackTemplate(
|
func renderOIDCCallbackTemplate(
|
||||||
user *types.User,
|
user *types.User,
|
||||||
|
verb string,
|
||||||
) (*bytes.Buffer, error) {
|
) (*bytes.Buffer, error) {
|
||||||
var content bytes.Buffer
|
var content bytes.Buffer
|
||||||
if err := oidcCallbackTemplate.Execute(&content, oidcCallbackTemplateConfig{
|
if err := oidcCallbackTemplate.Execute(&content, oidcCallbackTemplateConfig{
|
||||||
User: user.DisplayNameOrUsername(),
|
User: user.DisplayNameOrUsername(),
|
||||||
Verb: "Authenticated",
|
Verb: verb,
|
||||||
}); err != nil {
|
}); err != nil {
|
||||||
return nil, fmt.Errorf("rendering OIDC callback template: %w", err)
|
return nil, fmt.Errorf("rendering OIDC callback template: %w", err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -6,6 +6,7 @@ import (
|
||||||
"github.com/chasefleming/elem-go"
|
"github.com/chasefleming/elem-go"
|
||||||
"github.com/chasefleming/elem-go/attrs"
|
"github.com/chasefleming/elem-go/attrs"
|
||||||
"github.com/chasefleming/elem-go/styles"
|
"github.com/chasefleming/elem-go/styles"
|
||||||
|
"github.com/juanfont/headscale/hscontrol/types"
|
||||||
)
|
)
|
||||||
|
|
||||||
var codeStyleRegisterWebAPI = styles.Props{
|
var codeStyleRegisterWebAPI = styles.Props{
|
||||||
|
@ -15,7 +16,7 @@ var codeStyleRegisterWebAPI = styles.Props{
|
||||||
styles.BackgroundColor: "#eee",
|
styles.BackgroundColor: "#eee",
|
||||||
}
|
}
|
||||||
|
|
||||||
func RegisterWeb(key string) *elem.Element {
|
func RegisterWeb(registrationID types.RegistrationID) *elem.Element {
|
||||||
return HtmlStructure(
|
return HtmlStructure(
|
||||||
elem.Title(nil, elem.Text("Registration - Headscale")),
|
elem.Title(nil, elem.Text("Registration - Headscale")),
|
||||||
elem.Body(attrs.Props{
|
elem.Body(attrs.Props{
|
||||||
|
@ -27,7 +28,7 @@ func RegisterWeb(key string) *elem.Element {
|
||||||
elem.H2(nil, elem.Text("Machine registration")),
|
elem.H2(nil, elem.Text("Machine registration")),
|
||||||
elem.P(nil, elem.Text("Run the command below in the headscale server to add this machine to your network: ")),
|
elem.P(nil, elem.Text("Run the command below in the headscale server to add this machine to your network: ")),
|
||||||
elem.Code(attrs.Props{attrs.Style: codeStyleRegisterWebAPI.ToInline()},
|
elem.Code(attrs.Props{attrs.Style: codeStyleRegisterWebAPI.ToInline()},
|
||||||
elem.Text(fmt.Sprintf("headscale nodes register --user USERNAME --key %s", key)),
|
elem.Text(fmt.Sprintf("headscale nodes register --user USERNAME --key %s", registrationID.String())),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
)
|
)
|
||||||
|
|
|
@ -3,8 +3,10 @@ package types
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"errors"
|
"errors"
|
||||||
|
"fmt"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/juanfont/headscale/hscontrol/util"
|
||||||
"tailscale.com/tailcfg"
|
"tailscale.com/tailcfg"
|
||||||
"tailscale.com/util/ctxkey"
|
"tailscale.com/util/ctxkey"
|
||||||
)
|
)
|
||||||
|
@ -123,3 +125,40 @@ func NotifyCtx(ctx context.Context, origin, hostname string) context.Context {
|
||||||
ctx2 = NotifyHostnameKey.WithValue(ctx2, hostname)
|
ctx2 = NotifyHostnameKey.WithValue(ctx2, hostname)
|
||||||
return ctx2
|
return ctx2
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const RegistrationIDLength = 24
|
||||||
|
|
||||||
|
type RegistrationID string
|
||||||
|
|
||||||
|
func NewRegistrationID() (RegistrationID, error) {
|
||||||
|
rid, err := util.GenerateRandomStringURLSafe(RegistrationIDLength)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
return RegistrationID(rid), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func MustRegistrationID() RegistrationID {
|
||||||
|
rid, err := NewRegistrationID()
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
return rid
|
||||||
|
}
|
||||||
|
|
||||||
|
func RegistrationIDFromString(str string) (RegistrationID, error) {
|
||||||
|
if len(str) != RegistrationIDLength {
|
||||||
|
return "", fmt.Errorf("registration ID must be %d characters long", RegistrationIDLength)
|
||||||
|
}
|
||||||
|
return RegistrationID(str), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r RegistrationID) String() string {
|
||||||
|
return string(r)
|
||||||
|
}
|
||||||
|
|
||||||
|
type RegisterNode struct {
|
||||||
|
Node Node
|
||||||
|
Registered chan struct{}
|
||||||
|
}
|
||||||
|
|
|
@ -32,7 +32,8 @@ func GenerateRandomBytes(n int) ([]byte, error) {
|
||||||
func GenerateRandomStringURLSafe(n int) (string, error) {
|
func GenerateRandomStringURLSafe(n int) (string, error) {
|
||||||
b, err := GenerateRandomBytes(n)
|
b, err := GenerateRandomBytes(n)
|
||||||
|
|
||||||
return base64.RawURLEncoding.EncodeToString(b), err
|
uenc := base64.RawURLEncoding.EncodeToString(b)
|
||||||
|
return uenc[:n], err
|
||||||
}
|
}
|
||||||
|
|
||||||
// GenerateRandomStringDNSSafe returns a DNS-safe
|
// GenerateRandomStringDNSSafe returns a DNS-safe
|
||||||
|
|
|
@ -11,8 +11,8 @@ import (
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/http/cookiejar"
|
"net/http/cookiejar"
|
||||||
"net/http/httptest"
|
|
||||||
"net/netip"
|
"net/netip"
|
||||||
|
"net/url"
|
||||||
"sort"
|
"sort"
|
||||||
"strconv"
|
"strconv"
|
||||||
"testing"
|
"testing"
|
||||||
|
@ -56,7 +56,7 @@ func TestOIDCAuthenticationPingAll(t *testing.T) {
|
||||||
scenario := AuthOIDCScenario{
|
scenario := AuthOIDCScenario{
|
||||||
Scenario: baseScenario,
|
Scenario: baseScenario,
|
||||||
}
|
}
|
||||||
// defer scenario.ShutdownAssertNoPanics(t)
|
defer scenario.ShutdownAssertNoPanics(t)
|
||||||
|
|
||||||
// Logins to MockOIDC is served by a queue with a strict order,
|
// Logins to MockOIDC is served by a queue with a strict order,
|
||||||
// if we use more than one node per user, the order of the logins
|
// if we use more than one node per user, the order of the logins
|
||||||
|
@ -91,7 +91,6 @@ func TestOIDCAuthenticationPingAll(t *testing.T) {
|
||||||
hsic.WithTestName("oidcauthping"),
|
hsic.WithTestName("oidcauthping"),
|
||||||
hsic.WithConfigEnv(oidcMap),
|
hsic.WithConfigEnv(oidcMap),
|
||||||
hsic.WithTLS(),
|
hsic.WithTLS(),
|
||||||
hsic.WithHostnameAsServerURL(),
|
|
||||||
hsic.WithFileInContainer("/tmp/hs_client_oidc_secret", []byte(oidcConfig.ClientSecret)),
|
hsic.WithFileInContainer("/tmp/hs_client_oidc_secret", []byte(oidcConfig.ClientSecret)),
|
||||||
)
|
)
|
||||||
assertNoErrHeadscaleEnv(t, err)
|
assertNoErrHeadscaleEnv(t, err)
|
||||||
|
@ -206,7 +205,6 @@ func TestOIDCExpireNodesBasedOnTokenExpiry(t *testing.T) {
|
||||||
spec,
|
spec,
|
||||||
hsic.WithTestName("oidcexpirenodes"),
|
hsic.WithTestName("oidcexpirenodes"),
|
||||||
hsic.WithConfigEnv(oidcMap),
|
hsic.WithConfigEnv(oidcMap),
|
||||||
hsic.WithHostnameAsServerURL(),
|
|
||||||
)
|
)
|
||||||
assertNoErrHeadscaleEnv(t, err)
|
assertNoErrHeadscaleEnv(t, err)
|
||||||
|
|
||||||
|
@ -497,7 +495,6 @@ func TestOIDC024UserCreation(t *testing.T) {
|
||||||
hsic.WithTestName("oidcmigration"),
|
hsic.WithTestName("oidcmigration"),
|
||||||
hsic.WithConfigEnv(oidcMap),
|
hsic.WithConfigEnv(oidcMap),
|
||||||
hsic.WithTLS(),
|
hsic.WithTLS(),
|
||||||
hsic.WithHostnameAsServerURL(),
|
|
||||||
hsic.WithFileInContainer("/tmp/hs_client_oidc_secret", []byte(oidcConfig.ClientSecret)),
|
hsic.WithFileInContainer("/tmp/hs_client_oidc_secret", []byte(oidcConfig.ClientSecret)),
|
||||||
)
|
)
|
||||||
assertNoErrHeadscaleEnv(t, err)
|
assertNoErrHeadscaleEnv(t, err)
|
||||||
|
@ -576,7 +573,6 @@ func TestOIDCAuthenticationWithPKCE(t *testing.T) {
|
||||||
hsic.WithTestName("oidcauthpkce"),
|
hsic.WithTestName("oidcauthpkce"),
|
||||||
hsic.WithConfigEnv(oidcMap),
|
hsic.WithConfigEnv(oidcMap),
|
||||||
hsic.WithTLS(),
|
hsic.WithTLS(),
|
||||||
hsic.WithHostnameAsServerURL(),
|
|
||||||
hsic.WithFileInContainer("/tmp/hs_client_oidc_secret", []byte(oidcConfig.ClientSecret)),
|
hsic.WithFileInContainer("/tmp/hs_client_oidc_secret", []byte(oidcConfig.ClientSecret)),
|
||||||
)
|
)
|
||||||
assertNoErrHeadscaleEnv(t, err)
|
assertNoErrHeadscaleEnv(t, err)
|
||||||
|
@ -770,11 +766,6 @@ func (t LoggingRoundTripper) RoundTrip(req *http.Request) (*http.Response, error
|
||||||
func (s *AuthOIDCScenario) runTailscaleUp(
|
func (s *AuthOIDCScenario) runTailscaleUp(
|
||||||
userStr, loginServer string,
|
userStr, loginServer string,
|
||||||
) error {
|
) error {
|
||||||
headscale, err := s.Headscale()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Printf("running tailscale up for user %s", userStr)
|
log.Printf("running tailscale up for user %s", userStr)
|
||||||
if user, ok := s.users[userStr]; ok {
|
if user, ok := s.users[userStr]; ok {
|
||||||
for _, client := range user.Clients {
|
for _, client := range user.Clients {
|
||||||
|
@ -785,59 +776,11 @@ func (s *AuthOIDCScenario) runTailscaleUp(
|
||||||
log.Printf("%s failed to run tailscale up: %s", tsc.Hostname(), err)
|
log.Printf("%s failed to run tailscale up: %s", tsc.Hostname(), err)
|
||||||
}
|
}
|
||||||
|
|
||||||
loginURL.Host = fmt.Sprintf("%s:8080", headscale.GetHostname())
|
_, err = doLoginURL(tsc.Hostname(), loginURL)
|
||||||
loginURL.Scheme = "http"
|
|
||||||
|
|
||||||
if len(headscale.GetCert()) > 0 {
|
|
||||||
loginURL.Scheme = "https"
|
|
||||||
}
|
|
||||||
|
|
||||||
httptest.NewRecorder()
|
|
||||||
hc := &http.Client{
|
|
||||||
Transport: LoggingRoundTripper{},
|
|
||||||
}
|
|
||||||
hc.Jar, err = cookiejar.New(nil)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Printf("failed to create cookie jar: %s", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Printf("%s login url: %s\n", tsc.Hostname(), loginURL.String())
|
|
||||||
|
|
||||||
log.Printf("%s logging in with url", tsc.Hostname())
|
|
||||||
ctx := context.Background()
|
|
||||||
req, _ := http.NewRequestWithContext(ctx, http.MethodGet, loginURL.String(), nil)
|
|
||||||
resp, err := hc.Do(req)
|
|
||||||
if err != nil {
|
|
||||||
log.Printf(
|
|
||||||
"%s failed to login using url %s: %s",
|
|
||||||
tsc.Hostname(),
|
|
||||||
loginURL,
|
|
||||||
err,
|
|
||||||
)
|
|
||||||
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Printf("cookies: %+v", hc.Jar.Cookies(loginURL))
|
|
||||||
|
|
||||||
if resp.StatusCode != http.StatusOK {
|
|
||||||
log.Printf("%s response code of oidc login request was %s", tsc.Hostname(), resp.Status)
|
|
||||||
body, _ := io.ReadAll(resp.Body)
|
|
||||||
log.Printf("body: %s", body)
|
|
||||||
|
|
||||||
return errStatusCodeNotOK
|
|
||||||
}
|
|
||||||
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
_, err = io.ReadAll(resp.Body)
|
|
||||||
if err != nil {
|
|
||||||
log.Printf("%s failed to read response body: %s", tsc.Hostname(), err)
|
|
||||||
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Printf("Finished request for %s to join tailnet", tsc.Hostname())
|
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -865,6 +808,49 @@ func (s *AuthOIDCScenario) runTailscaleUp(
|
||||||
return fmt.Errorf("failed to up tailscale node: %w", errNoUserAvailable)
|
return fmt.Errorf("failed to up tailscale node: %w", errNoUserAvailable)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// doLoginURL visits the given login URL and returns the body as a
|
||||||
|
// string.
|
||||||
|
func doLoginURL(hostname string, loginURL *url.URL) (string, error) {
|
||||||
|
log.Printf("%s login url: %s\n", hostname, loginURL.String())
|
||||||
|
|
||||||
|
var err error
|
||||||
|
hc := &http.Client{
|
||||||
|
Transport: LoggingRoundTripper{},
|
||||||
|
}
|
||||||
|
hc.Jar, err = cookiejar.New(nil)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("%s failed to create cookiejar : %w", hostname, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Printf("%s logging in with url", hostname)
|
||||||
|
ctx := context.Background()
|
||||||
|
req, _ := http.NewRequestWithContext(ctx, http.MethodGet, loginURL.String(), nil)
|
||||||
|
resp, err := hc.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("%s failed to send http request: %w", hostname, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Printf("cookies: %+v", hc.Jar.Cookies(loginURL))
|
||||||
|
|
||||||
|
if resp.StatusCode != http.StatusOK {
|
||||||
|
body, _ := io.ReadAll(resp.Body)
|
||||||
|
log.Printf("body: %s", body)
|
||||||
|
|
||||||
|
return "", fmt.Errorf("%s response code of login request was %w", hostname, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
defer resp.Body.Close()
|
||||||
|
|
||||||
|
body, err := io.ReadAll(resp.Body)
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("%s failed to read response body: %s", hostname, err)
|
||||||
|
|
||||||
|
return "", fmt.Errorf("%s failed to read response body: %w", hostname, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return string(body), nil
|
||||||
|
}
|
||||||
|
|
||||||
func (s *AuthOIDCScenario) Shutdown() {
|
func (s *AuthOIDCScenario) Shutdown() {
|
||||||
err := s.pool.Purge(s.mockOIDC)
|
err := s.pool.Purge(s.mockOIDC)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -1,13 +1,9 @@
|
||||||
package integration
|
package integration
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
|
||||||
"crypto/tls"
|
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
|
||||||
"log"
|
"log"
|
||||||
"net/http"
|
|
||||||
"net/netip"
|
"net/netip"
|
||||||
"net/url"
|
"net/url"
|
||||||
"strings"
|
"strings"
|
||||||
|
@ -47,7 +43,6 @@ func TestAuthWebFlowAuthenticationPingAll(t *testing.T) {
|
||||||
hsic.WithTestName("webauthping"),
|
hsic.WithTestName("webauthping"),
|
||||||
hsic.WithEmbeddedDERPServerOnly(),
|
hsic.WithEmbeddedDERPServerOnly(),
|
||||||
hsic.WithTLS(),
|
hsic.WithTLS(),
|
||||||
hsic.WithHostnameAsServerURL(),
|
|
||||||
)
|
)
|
||||||
assertNoErrHeadscaleEnv(t, err)
|
assertNoErrHeadscaleEnv(t, err)
|
||||||
|
|
||||||
|
@ -87,7 +82,10 @@ func TestAuthWebFlowLogoutAndRelogin(t *testing.T) {
|
||||||
"user2": len(MustTestVersions),
|
"user2": len(MustTestVersions),
|
||||||
}
|
}
|
||||||
|
|
||||||
err = scenario.CreateHeadscaleEnv(spec, hsic.WithTestName("weblogout"))
|
err = scenario.CreateHeadscaleEnv(spec,
|
||||||
|
hsic.WithTestName("weblogout"),
|
||||||
|
hsic.WithTLS(),
|
||||||
|
)
|
||||||
assertNoErrHeadscaleEnv(t, err)
|
assertNoErrHeadscaleEnv(t, err)
|
||||||
|
|
||||||
allClients, err := scenario.ListTailscaleClients()
|
allClients, err := scenario.ListTailscaleClients()
|
||||||
|
@ -135,7 +133,7 @@ func TestAuthWebFlowLogoutAndRelogin(t *testing.T) {
|
||||||
for userName := range spec {
|
for userName := range spec {
|
||||||
err = scenario.runTailscaleUp(userName, headscale.GetEndpoint())
|
err = scenario.runTailscaleUp(userName, headscale.GetEndpoint())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("failed to run tailscale up: %s", err)
|
t.Fatalf("failed to run tailscale up (%q): %s", headscale.GetEndpoint(), err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -227,11 +225,12 @@ func (s *AuthWebFlowScenario) CreateHeadscaleEnv(
|
||||||
func (s *AuthWebFlowScenario) runTailscaleUp(
|
func (s *AuthWebFlowScenario) runTailscaleUp(
|
||||||
userStr, loginServer string,
|
userStr, loginServer string,
|
||||||
) error {
|
) error {
|
||||||
log.Printf("running tailscale up for user %s", userStr)
|
log.Printf("running tailscale up for user %q", userStr)
|
||||||
if user, ok := s.users[userStr]; ok {
|
if user, ok := s.users[userStr]; ok {
|
||||||
for _, client := range user.Clients {
|
for _, client := range user.Clients {
|
||||||
c := client
|
c := client
|
||||||
user.joinWaitGroup.Go(func() error {
|
user.joinWaitGroup.Go(func() error {
|
||||||
|
log.Printf("logging %q into %q", c.Hostname(), loginServer)
|
||||||
loginURL, err := c.LoginWithURL(loginServer)
|
loginURL, err := c.LoginWithURL(loginServer)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Printf("failed to run tailscale up (%s): %s", c.Hostname(), err)
|
log.Printf("failed to run tailscale up (%s): %s", c.Hostname(), err)
|
||||||
|
@ -273,39 +272,11 @@ func (s *AuthWebFlowScenario) runTailscaleUp(
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *AuthWebFlowScenario) runHeadscaleRegister(userStr string, loginURL *url.URL) error {
|
func (s *AuthWebFlowScenario) runHeadscaleRegister(userStr string, loginURL *url.URL) error {
|
||||||
headscale, err := s.Headscale()
|
body, err := doLoginURL("web-auth-not-set", loginURL)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Printf("loginURL: %s", loginURL)
|
|
||||||
loginURL.Host = fmt.Sprintf("%s:8080", headscale.GetIP())
|
|
||||||
loginURL.Scheme = "http"
|
|
||||||
|
|
||||||
if len(headscale.GetCert()) > 0 {
|
|
||||||
loginURL.Scheme = "https"
|
|
||||||
}
|
|
||||||
|
|
||||||
insecureTransport := &http.Transport{
|
|
||||||
TLSClientConfig: &tls.Config{InsecureSkipVerify: true}, // nolint
|
|
||||||
}
|
|
||||||
httpClient := &http.Client{
|
|
||||||
Transport: insecureTransport,
|
|
||||||
}
|
|
||||||
ctx := context.Background()
|
|
||||||
req, _ := http.NewRequestWithContext(ctx, http.MethodGet, loginURL.String(), nil)
|
|
||||||
resp, err := httpClient.Do(req)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
body, err := io.ReadAll(resp.Body)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
// see api.go HTML template
|
// see api.go HTML template
|
||||||
codeSep := strings.Split(string(body), "</code>")
|
codeSep := strings.Split(string(body), "</code>")
|
||||||
if len(codeSep) != 2 {
|
if len(codeSep) != 2 {
|
||||||
|
|
|
@ -12,6 +12,7 @@ import (
|
||||||
"github.com/google/go-cmp/cmp/cmpopts"
|
"github.com/google/go-cmp/cmp/cmpopts"
|
||||||
v1 "github.com/juanfont/headscale/gen/go/headscale/v1"
|
v1 "github.com/juanfont/headscale/gen/go/headscale/v1"
|
||||||
"github.com/juanfont/headscale/hscontrol/policy"
|
"github.com/juanfont/headscale/hscontrol/policy"
|
||||||
|
"github.com/juanfont/headscale/hscontrol/types"
|
||||||
"github.com/juanfont/headscale/integration/hsic"
|
"github.com/juanfont/headscale/integration/hsic"
|
||||||
"github.com/juanfont/headscale/integration/tsic"
|
"github.com/juanfont/headscale/integration/tsic"
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
|
@ -544,7 +545,6 @@ func TestPreAuthKeyCorrectUserLoggedInCommand(t *testing.T) {
|
||||||
hsic.WithTestName("clipak"),
|
hsic.WithTestName("clipak"),
|
||||||
hsic.WithEmbeddedDERPServerOnly(),
|
hsic.WithEmbeddedDERPServerOnly(),
|
||||||
hsic.WithTLS(),
|
hsic.WithTLS(),
|
||||||
hsic.WithHostnameAsServerURL(),
|
|
||||||
)
|
)
|
||||||
assertNoErr(t, err)
|
assertNoErr(t, err)
|
||||||
|
|
||||||
|
@ -812,14 +812,14 @@ func TestNodeTagCommand(t *testing.T) {
|
||||||
headscale, err := scenario.Headscale()
|
headscale, err := scenario.Headscale()
|
||||||
assertNoErr(t, err)
|
assertNoErr(t, err)
|
||||||
|
|
||||||
machineKeys := []string{
|
regIDs := []string{
|
||||||
"mkey:9b2ffa7e08cc421a3d2cca9012280f6a236fd0de0b4ce005b30a98ad930306fe",
|
types.MustRegistrationID().String(),
|
||||||
"mkey:6abd00bb5fdda622db51387088c68e97e71ce58e7056aa54f592b6a8219d524c",
|
types.MustRegistrationID().String(),
|
||||||
}
|
}
|
||||||
nodes := make([]*v1.Node, len(machineKeys))
|
nodes := make([]*v1.Node, len(regIDs))
|
||||||
assert.Nil(t, err)
|
assert.Nil(t, err)
|
||||||
|
|
||||||
for index, machineKey := range machineKeys {
|
for index, regID := range regIDs {
|
||||||
_, err := headscale.Execute(
|
_, err := headscale.Execute(
|
||||||
[]string{
|
[]string{
|
||||||
"headscale",
|
"headscale",
|
||||||
|
@ -830,7 +830,7 @@ func TestNodeTagCommand(t *testing.T) {
|
||||||
"--user",
|
"--user",
|
||||||
"user1",
|
"user1",
|
||||||
"--key",
|
"--key",
|
||||||
machineKey,
|
regID,
|
||||||
"--output",
|
"--output",
|
||||||
"json",
|
"json",
|
||||||
},
|
},
|
||||||
|
@ -847,7 +847,7 @@ func TestNodeTagCommand(t *testing.T) {
|
||||||
"user1",
|
"user1",
|
||||||
"register",
|
"register",
|
||||||
"--key",
|
"--key",
|
||||||
machineKey,
|
regID,
|
||||||
"--output",
|
"--output",
|
||||||
"json",
|
"json",
|
||||||
},
|
},
|
||||||
|
@ -857,7 +857,7 @@ func TestNodeTagCommand(t *testing.T) {
|
||||||
|
|
||||||
nodes[index] = &node
|
nodes[index] = &node
|
||||||
}
|
}
|
||||||
assert.Len(t, nodes, len(machineKeys))
|
assert.Len(t, nodes, len(regIDs))
|
||||||
|
|
||||||
var node v1.Node
|
var node v1.Node
|
||||||
err = executeAndUnmarshal(
|
err = executeAndUnmarshal(
|
||||||
|
@ -889,7 +889,7 @@ func TestNodeTagCommand(t *testing.T) {
|
||||||
assert.ErrorContains(t, err, "tag must start with the string 'tag:'")
|
assert.ErrorContains(t, err, "tag must start with the string 'tag:'")
|
||||||
|
|
||||||
// Test list all nodes after added seconds
|
// Test list all nodes after added seconds
|
||||||
resultMachines := make([]*v1.Node, len(machineKeys))
|
resultMachines := make([]*v1.Node, len(regIDs))
|
||||||
err = executeAndUnmarshal(
|
err = executeAndUnmarshal(
|
||||||
headscale,
|
headscale,
|
||||||
[]string{
|
[]string{
|
||||||
|
@ -1054,18 +1054,17 @@ func TestNodeCommand(t *testing.T) {
|
||||||
headscale, err := scenario.Headscale()
|
headscale, err := scenario.Headscale()
|
||||||
assertNoErr(t, err)
|
assertNoErr(t, err)
|
||||||
|
|
||||||
// Pregenerated machine keys
|
regIDs := []string{
|
||||||
machineKeys := []string{
|
types.MustRegistrationID().String(),
|
||||||
"mkey:9b2ffa7e08cc421a3d2cca9012280f6a236fd0de0b4ce005b30a98ad930306fe",
|
types.MustRegistrationID().String(),
|
||||||
"mkey:6abd00bb5fdda622db51387088c68e97e71ce58e7056aa54f592b6a8219d524c",
|
types.MustRegistrationID().String(),
|
||||||
"mkey:f08305b4ee4250b95a70f3b7504d048d75d899993c624a26d422c67af0422507",
|
types.MustRegistrationID().String(),
|
||||||
"mkey:8bc13285cee598acf76b1824a6f4490f7f2e3751b201e28aeb3b07fe81d5b4a1",
|
types.MustRegistrationID().String(),
|
||||||
"mkey:cf7b0fd05da556fdc3bab365787b506fd82d64a70745db70e00e86c1b1c03084",
|
|
||||||
}
|
}
|
||||||
nodes := make([]*v1.Node, len(machineKeys))
|
nodes := make([]*v1.Node, len(regIDs))
|
||||||
assert.Nil(t, err)
|
assert.Nil(t, err)
|
||||||
|
|
||||||
for index, machineKey := range machineKeys {
|
for index, regID := range regIDs {
|
||||||
_, err := headscale.Execute(
|
_, err := headscale.Execute(
|
||||||
[]string{
|
[]string{
|
||||||
"headscale",
|
"headscale",
|
||||||
|
@ -1076,7 +1075,7 @@ func TestNodeCommand(t *testing.T) {
|
||||||
"--user",
|
"--user",
|
||||||
"node-user",
|
"node-user",
|
||||||
"--key",
|
"--key",
|
||||||
machineKey,
|
regID,
|
||||||
"--output",
|
"--output",
|
||||||
"json",
|
"json",
|
||||||
},
|
},
|
||||||
|
@ -1093,7 +1092,7 @@ func TestNodeCommand(t *testing.T) {
|
||||||
"node-user",
|
"node-user",
|
||||||
"register",
|
"register",
|
||||||
"--key",
|
"--key",
|
||||||
machineKey,
|
regID,
|
||||||
"--output",
|
"--output",
|
||||||
"json",
|
"json",
|
||||||
},
|
},
|
||||||
|
@ -1104,7 +1103,7 @@ func TestNodeCommand(t *testing.T) {
|
||||||
nodes[index] = &node
|
nodes[index] = &node
|
||||||
}
|
}
|
||||||
|
|
||||||
assert.Len(t, nodes, len(machineKeys))
|
assert.Len(t, nodes, len(regIDs))
|
||||||
|
|
||||||
// Test list all nodes after added seconds
|
// Test list all nodes after added seconds
|
||||||
var listAll []v1.Node
|
var listAll []v1.Node
|
||||||
|
@ -1135,14 +1134,14 @@ func TestNodeCommand(t *testing.T) {
|
||||||
assert.Equal(t, "node-4", listAll[3].GetName())
|
assert.Equal(t, "node-4", listAll[3].GetName())
|
||||||
assert.Equal(t, "node-5", listAll[4].GetName())
|
assert.Equal(t, "node-5", listAll[4].GetName())
|
||||||
|
|
||||||
otherUserMachineKeys := []string{
|
otherUserRegIDs := []string{
|
||||||
"mkey:b5b444774186d4217adcec407563a1223929465ee2c68a4da13af0d0185b4f8e",
|
types.MustRegistrationID().String(),
|
||||||
"mkey:dc721977ac7415aafa87f7d4574cbe07c6b171834a6d37375782bdc1fb6b3584",
|
types.MustRegistrationID().String(),
|
||||||
}
|
}
|
||||||
otherUserMachines := make([]*v1.Node, len(otherUserMachineKeys))
|
otherUserMachines := make([]*v1.Node, len(otherUserRegIDs))
|
||||||
assert.Nil(t, err)
|
assert.Nil(t, err)
|
||||||
|
|
||||||
for index, machineKey := range otherUserMachineKeys {
|
for index, regID := range otherUserRegIDs {
|
||||||
_, err := headscale.Execute(
|
_, err := headscale.Execute(
|
||||||
[]string{
|
[]string{
|
||||||
"headscale",
|
"headscale",
|
||||||
|
@ -1153,7 +1152,7 @@ func TestNodeCommand(t *testing.T) {
|
||||||
"--user",
|
"--user",
|
||||||
"other-user",
|
"other-user",
|
||||||
"--key",
|
"--key",
|
||||||
machineKey,
|
regID,
|
||||||
"--output",
|
"--output",
|
||||||
"json",
|
"json",
|
||||||
},
|
},
|
||||||
|
@ -1170,7 +1169,7 @@ func TestNodeCommand(t *testing.T) {
|
||||||
"other-user",
|
"other-user",
|
||||||
"register",
|
"register",
|
||||||
"--key",
|
"--key",
|
||||||
machineKey,
|
regID,
|
||||||
"--output",
|
"--output",
|
||||||
"json",
|
"json",
|
||||||
},
|
},
|
||||||
|
@ -1181,7 +1180,7 @@ func TestNodeCommand(t *testing.T) {
|
||||||
otherUserMachines[index] = &node
|
otherUserMachines[index] = &node
|
||||||
}
|
}
|
||||||
|
|
||||||
assert.Len(t, otherUserMachines, len(otherUserMachineKeys))
|
assert.Len(t, otherUserMachines, len(otherUserRegIDs))
|
||||||
|
|
||||||
// Test list all nodes after added otherUser
|
// Test list all nodes after added otherUser
|
||||||
var listAllWithotherUser []v1.Node
|
var listAllWithotherUser []v1.Node
|
||||||
|
@ -1294,17 +1293,16 @@ func TestNodeExpireCommand(t *testing.T) {
|
||||||
headscale, err := scenario.Headscale()
|
headscale, err := scenario.Headscale()
|
||||||
assertNoErr(t, err)
|
assertNoErr(t, err)
|
||||||
|
|
||||||
// Pregenerated machine keys
|
regIDs := []string{
|
||||||
machineKeys := []string{
|
types.MustRegistrationID().String(),
|
||||||
"mkey:9b2ffa7e08cc421a3d2cca9012280f6a236fd0de0b4ce005b30a98ad930306fe",
|
types.MustRegistrationID().String(),
|
||||||
"mkey:6abd00bb5fdda622db51387088c68e97e71ce58e7056aa54f592b6a8219d524c",
|
types.MustRegistrationID().String(),
|
||||||
"mkey:f08305b4ee4250b95a70f3b7504d048d75d899993c624a26d422c67af0422507",
|
types.MustRegistrationID().String(),
|
||||||
"mkey:8bc13285cee598acf76b1824a6f4490f7f2e3751b201e28aeb3b07fe81d5b4a1",
|
types.MustRegistrationID().String(),
|
||||||
"mkey:cf7b0fd05da556fdc3bab365787b506fd82d64a70745db70e00e86c1b1c03084",
|
|
||||||
}
|
}
|
||||||
nodes := make([]*v1.Node, len(machineKeys))
|
nodes := make([]*v1.Node, len(regIDs))
|
||||||
|
|
||||||
for index, machineKey := range machineKeys {
|
for index, regID := range regIDs {
|
||||||
_, err := headscale.Execute(
|
_, err := headscale.Execute(
|
||||||
[]string{
|
[]string{
|
||||||
"headscale",
|
"headscale",
|
||||||
|
@ -1315,7 +1313,7 @@ func TestNodeExpireCommand(t *testing.T) {
|
||||||
"--user",
|
"--user",
|
||||||
"node-expire-user",
|
"node-expire-user",
|
||||||
"--key",
|
"--key",
|
||||||
machineKey,
|
regID,
|
||||||
"--output",
|
"--output",
|
||||||
"json",
|
"json",
|
||||||
},
|
},
|
||||||
|
@ -1332,7 +1330,7 @@ func TestNodeExpireCommand(t *testing.T) {
|
||||||
"node-expire-user",
|
"node-expire-user",
|
||||||
"register",
|
"register",
|
||||||
"--key",
|
"--key",
|
||||||
machineKey,
|
regID,
|
||||||
"--output",
|
"--output",
|
||||||
"json",
|
"json",
|
||||||
},
|
},
|
||||||
|
@ -1343,7 +1341,7 @@ func TestNodeExpireCommand(t *testing.T) {
|
||||||
nodes[index] = &node
|
nodes[index] = &node
|
||||||
}
|
}
|
||||||
|
|
||||||
assert.Len(t, nodes, len(machineKeys))
|
assert.Len(t, nodes, len(regIDs))
|
||||||
|
|
||||||
var listAll []v1.Node
|
var listAll []v1.Node
|
||||||
err = executeAndUnmarshal(
|
err = executeAndUnmarshal(
|
||||||
|
@ -1421,18 +1419,17 @@ func TestNodeRenameCommand(t *testing.T) {
|
||||||
headscale, err := scenario.Headscale()
|
headscale, err := scenario.Headscale()
|
||||||
assertNoErr(t, err)
|
assertNoErr(t, err)
|
||||||
|
|
||||||
// Pregenerated machine keys
|
regIDs := []string{
|
||||||
machineKeys := []string{
|
types.MustRegistrationID().String(),
|
||||||
"mkey:cf7b0fd05da556fdc3bab365787b506fd82d64a70745db70e00e86c1b1c03084",
|
types.MustRegistrationID().String(),
|
||||||
"mkey:8bc13285cee598acf76b1824a6f4490f7f2e3751b201e28aeb3b07fe81d5b4a1",
|
types.MustRegistrationID().String(),
|
||||||
"mkey:f08305b4ee4250b95a70f3b7504d048d75d899993c624a26d422c67af0422507",
|
types.MustRegistrationID().String(),
|
||||||
"mkey:6abd00bb5fdda622db51387088c68e97e71ce58e7056aa54f592b6a8219d524c",
|
types.MustRegistrationID().String(),
|
||||||
"mkey:9b2ffa7e08cc421a3d2cca9012280f6a236fd0de0b4ce005b30a98ad930306fe",
|
|
||||||
}
|
}
|
||||||
nodes := make([]*v1.Node, len(machineKeys))
|
nodes := make([]*v1.Node, len(regIDs))
|
||||||
assert.Nil(t, err)
|
assert.Nil(t, err)
|
||||||
|
|
||||||
for index, machineKey := range machineKeys {
|
for index, regID := range regIDs {
|
||||||
_, err := headscale.Execute(
|
_, err := headscale.Execute(
|
||||||
[]string{
|
[]string{
|
||||||
"headscale",
|
"headscale",
|
||||||
|
@ -1443,7 +1440,7 @@ func TestNodeRenameCommand(t *testing.T) {
|
||||||
"--user",
|
"--user",
|
||||||
"node-rename-command",
|
"node-rename-command",
|
||||||
"--key",
|
"--key",
|
||||||
machineKey,
|
regID,
|
||||||
"--output",
|
"--output",
|
||||||
"json",
|
"json",
|
||||||
},
|
},
|
||||||
|
@ -1460,7 +1457,7 @@ func TestNodeRenameCommand(t *testing.T) {
|
||||||
"node-rename-command",
|
"node-rename-command",
|
||||||
"register",
|
"register",
|
||||||
"--key",
|
"--key",
|
||||||
machineKey,
|
regID,
|
||||||
"--output",
|
"--output",
|
||||||
"json",
|
"json",
|
||||||
},
|
},
|
||||||
|
@ -1471,7 +1468,7 @@ func TestNodeRenameCommand(t *testing.T) {
|
||||||
nodes[index] = &node
|
nodes[index] = &node
|
||||||
}
|
}
|
||||||
|
|
||||||
assert.Len(t, nodes, len(machineKeys))
|
assert.Len(t, nodes, len(regIDs))
|
||||||
|
|
||||||
var listAll []v1.Node
|
var listAll []v1.Node
|
||||||
err = executeAndUnmarshal(
|
err = executeAndUnmarshal(
|
||||||
|
@ -1589,7 +1586,7 @@ func TestNodeMoveCommand(t *testing.T) {
|
||||||
assertNoErr(t, err)
|
assertNoErr(t, err)
|
||||||
|
|
||||||
// Randomly generated node key
|
// Randomly generated node key
|
||||||
machineKey := "mkey:688411b767663479632d44140f08a9fde87383adc7cdeb518f62ce28a17ef0aa"
|
regID := types.MustRegistrationID()
|
||||||
|
|
||||||
_, err = headscale.Execute(
|
_, err = headscale.Execute(
|
||||||
[]string{
|
[]string{
|
||||||
|
@ -1601,7 +1598,7 @@ func TestNodeMoveCommand(t *testing.T) {
|
||||||
"--user",
|
"--user",
|
||||||
"old-user",
|
"old-user",
|
||||||
"--key",
|
"--key",
|
||||||
machineKey,
|
regID.String(),
|
||||||
"--output",
|
"--output",
|
||||||
"json",
|
"json",
|
||||||
},
|
},
|
||||||
|
@ -1618,7 +1615,7 @@ func TestNodeMoveCommand(t *testing.T) {
|
||||||
"old-user",
|
"old-user",
|
||||||
"register",
|
"register",
|
||||||
"--key",
|
"--key",
|
||||||
machineKey,
|
regID.String(),
|
||||||
"--output",
|
"--output",
|
||||||
"json",
|
"json",
|
||||||
},
|
},
|
||||||
|
|
|
@ -69,7 +69,6 @@ func TestDERPVerifyEndpoint(t *testing.T) {
|
||||||
hsic.WithHostname(hostname),
|
hsic.WithHostname(hostname),
|
||||||
hsic.WithPort(headscalePort),
|
hsic.WithPort(headscalePort),
|
||||||
hsic.WithCustomTLS(certHeadscale, keyHeadscale),
|
hsic.WithCustomTLS(certHeadscale, keyHeadscale),
|
||||||
hsic.WithHostnameAsServerURL(),
|
|
||||||
hsic.WithDERPConfig(derpMap))
|
hsic.WithDERPConfig(derpMap))
|
||||||
assertNoErrHeadscaleEnv(t, err)
|
assertNoErrHeadscaleEnv(t, err)
|
||||||
|
|
||||||
|
|
|
@ -123,7 +123,6 @@ func TestResolveMagicDNSExtraRecordsPath(t *testing.T) {
|
||||||
hsic.WithFileInContainer(erPath, b),
|
hsic.WithFileInContainer(erPath, b),
|
||||||
hsic.WithEmbeddedDERPServerOnly(),
|
hsic.WithEmbeddedDERPServerOnly(),
|
||||||
hsic.WithTLS(),
|
hsic.WithTLS(),
|
||||||
hsic.WithHostnameAsServerURL(),
|
|
||||||
)
|
)
|
||||||
assertNoErrHeadscaleEnv(t, err)
|
assertNoErrHeadscaleEnv(t, err)
|
||||||
|
|
||||||
|
|
|
@ -105,7 +105,6 @@ func derpServerScenario(
|
||||||
hsic.WithEmbeddedDERPServerOnly(),
|
hsic.WithEmbeddedDERPServerOnly(),
|
||||||
hsic.WithPort(443),
|
hsic.WithPort(443),
|
||||||
hsic.WithTLS(),
|
hsic.WithTLS(),
|
||||||
hsic.WithHostnameAsServerURL(),
|
|
||||||
hsic.WithConfigEnv(map[string]string{
|
hsic.WithConfigEnv(map[string]string{
|
||||||
"HEADSCALE_DERP_AUTO_UPDATE_ENABLED": "true",
|
"HEADSCALE_DERP_AUTO_UPDATE_ENABLED": "true",
|
||||||
"HEADSCALE_DERP_UPDATE_FREQUENCY": "10s",
|
"HEADSCALE_DERP_UPDATE_FREQUENCY": "10s",
|
||||||
|
|
|
@ -44,7 +44,6 @@ func TestPingAllByIP(t *testing.T) {
|
||||||
hsic.WithTestName("pingallbyip"),
|
hsic.WithTestName("pingallbyip"),
|
||||||
hsic.WithEmbeddedDERPServerOnly(),
|
hsic.WithEmbeddedDERPServerOnly(),
|
||||||
hsic.WithTLS(),
|
hsic.WithTLS(),
|
||||||
hsic.WithHostnameAsServerURL(),
|
|
||||||
hsic.WithIPAllocationStrategy(types.IPAllocationStrategyRandom),
|
hsic.WithIPAllocationStrategy(types.IPAllocationStrategyRandom),
|
||||||
)
|
)
|
||||||
assertNoErrHeadscaleEnv(t, err)
|
assertNoErrHeadscaleEnv(t, err)
|
||||||
|
@ -123,12 +122,9 @@ func TestAuthKeyLogoutAndRelogin(t *testing.T) {
|
||||||
|
|
||||||
opts := []hsic.Option{hsic.WithTestName("pingallbyip")}
|
opts := []hsic.Option{hsic.WithTestName("pingallbyip")}
|
||||||
if https {
|
if https {
|
||||||
opts = []hsic.Option{
|
opts = append(opts, []hsic.Option{
|
||||||
hsic.WithTestName("pingallbyip"),
|
|
||||||
hsic.WithEmbeddedDERPServerOnly(),
|
|
||||||
hsic.WithTLS(),
|
hsic.WithTLS(),
|
||||||
hsic.WithHostnameAsServerURL(),
|
}...)
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, opts...)
|
err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, opts...)
|
||||||
|
@ -172,7 +168,7 @@ func TestAuthKeyLogoutAndRelogin(t *testing.T) {
|
||||||
// https://github.com/tailscale/tailscale/commit/1eaad7d3deb0815e8932e913ca1a862afa34db38
|
// https://github.com/tailscale/tailscale/commit/1eaad7d3deb0815e8932e913ca1a862afa34db38
|
||||||
// https://github.com/juanfont/headscale/issues/2164
|
// https://github.com/juanfont/headscale/issues/2164
|
||||||
if !https {
|
if !https {
|
||||||
time.Sleep(3 * time.Minute)
|
time.Sleep(5 * time.Minute)
|
||||||
}
|
}
|
||||||
|
|
||||||
for userName := range spec {
|
for userName := range spec {
|
||||||
|
@ -1050,7 +1046,6 @@ func TestPingAllByIPManyUpDown(t *testing.T) {
|
||||||
hsic.WithTestName("pingallbyipmany"),
|
hsic.WithTestName("pingallbyipmany"),
|
||||||
hsic.WithEmbeddedDERPServerOnly(),
|
hsic.WithEmbeddedDERPServerOnly(),
|
||||||
hsic.WithTLS(),
|
hsic.WithTLS(),
|
||||||
hsic.WithHostnameAsServerURL(),
|
|
||||||
)
|
)
|
||||||
assertNoErrHeadscaleEnv(t, err)
|
assertNoErrHeadscaleEnv(t, err)
|
||||||
|
|
||||||
|
@ -1133,7 +1128,6 @@ func Test2118DeletingOnlineNodePanics(t *testing.T) {
|
||||||
hsic.WithTestName("deletenocrash"),
|
hsic.WithTestName("deletenocrash"),
|
||||||
hsic.WithEmbeddedDERPServerOnly(),
|
hsic.WithEmbeddedDERPServerOnly(),
|
||||||
hsic.WithTLS(),
|
hsic.WithTLS(),
|
||||||
hsic.WithHostnameAsServerURL(),
|
|
||||||
)
|
)
|
||||||
assertNoErrHeadscaleEnv(t, err)
|
assertNoErrHeadscaleEnv(t, err)
|
||||||
|
|
||||||
|
|
|
@ -26,9 +26,7 @@ func DefaultConfigEnv() map[string]string {
|
||||||
"HEADSCALE_DNS_NAMESERVERS_GLOBAL": "127.0.0.11 1.1.1.1",
|
"HEADSCALE_DNS_NAMESERVERS_GLOBAL": "127.0.0.11 1.1.1.1",
|
||||||
"HEADSCALE_PRIVATE_KEY_PATH": "/tmp/private.key",
|
"HEADSCALE_PRIVATE_KEY_PATH": "/tmp/private.key",
|
||||||
"HEADSCALE_NOISE_PRIVATE_KEY_PATH": "/tmp/noise_private.key",
|
"HEADSCALE_NOISE_PRIVATE_KEY_PATH": "/tmp/noise_private.key",
|
||||||
"HEADSCALE_LISTEN_ADDR": "0.0.0.0:8080",
|
|
||||||
"HEADSCALE_METRICS_LISTEN_ADDR": "0.0.0.0:9090",
|
"HEADSCALE_METRICS_LISTEN_ADDR": "0.0.0.0:9090",
|
||||||
"HEADSCALE_SERVER_URL": "http://headscale:8080",
|
|
||||||
"HEADSCALE_DERP_URLS": "https://controlplane.tailscale.com/derpmap/default",
|
"HEADSCALE_DERP_URLS": "https://controlplane.tailscale.com/derpmap/default",
|
||||||
"HEADSCALE_DERP_AUTO_UPDATE_ENABLED": "false",
|
"HEADSCALE_DERP_AUTO_UPDATE_ENABLED": "false",
|
||||||
"HEADSCALE_DERP_UPDATE_FREQUENCY": "1m",
|
"HEADSCALE_DERP_UPDATE_FREQUENCY": "1m",
|
||||||
|
|
|
@ -7,9 +7,7 @@ import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"log"
|
"log"
|
||||||
"net"
|
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
|
||||||
"os"
|
"os"
|
||||||
"path"
|
"path"
|
||||||
"strconv"
|
"strconv"
|
||||||
|
@ -166,17 +164,6 @@ func WithHostname(hostname string) Option {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// WithHostnameAsServerURL sets the Headscale ServerURL based on
|
|
||||||
// the Hostname.
|
|
||||||
func WithHostnameAsServerURL() Option {
|
|
||||||
return func(hsic *HeadscaleInContainer) {
|
|
||||||
hsic.env["HEADSCALE_SERVER_URL"] = fmt.Sprintf("http://%s",
|
|
||||||
net.JoinHostPort(hsic.GetHostname(),
|
|
||||||
fmt.Sprintf("%d", hsic.port)),
|
|
||||||
)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithFileInContainer adds a file to the container at the given path.
|
// WithFileInContainer adds a file to the container at the given path.
|
||||||
func WithFileInContainer(path string, contents []byte) Option {
|
func WithFileInContainer(path string, contents []byte) Option {
|
||||||
return func(hsic *HeadscaleInContainer) {
|
return func(hsic *HeadscaleInContainer) {
|
||||||
|
@ -297,16 +284,6 @@ func New(
|
||||||
|
|
||||||
portProto := fmt.Sprintf("%d/tcp", hsic.port)
|
portProto := fmt.Sprintf("%d/tcp", hsic.port)
|
||||||
|
|
||||||
serverURL, err := url.Parse(hsic.env["HEADSCALE_SERVER_URL"])
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(hsic.tlsCert) != 0 && len(hsic.tlsKey) != 0 {
|
|
||||||
serverURL.Scheme = "https"
|
|
||||||
hsic.env["HEADSCALE_SERVER_URL"] = serverURL.String()
|
|
||||||
}
|
|
||||||
|
|
||||||
headscaleBuildOptions := &dockertest.BuildOptions{
|
headscaleBuildOptions := &dockertest.BuildOptions{
|
||||||
Dockerfile: IntegrationTestDockerFileName,
|
Dockerfile: IntegrationTestDockerFileName,
|
||||||
ContextDir: dockerContextPath,
|
ContextDir: dockerContextPath,
|
||||||
|
@ -352,6 +329,12 @@ func New(
|
||||||
hsic.env["HEADSCALE_TLS_CERT_PATH"] = tlsCertPath
|
hsic.env["HEADSCALE_TLS_CERT_PATH"] = tlsCertPath
|
||||||
hsic.env["HEADSCALE_TLS_KEY_PATH"] = tlsKeyPath
|
hsic.env["HEADSCALE_TLS_KEY_PATH"] = tlsKeyPath
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Server URL and Listen Addr should not be overridable outside of
|
||||||
|
// the configuration passed to docker.
|
||||||
|
hsic.env["HEADSCALE_SERVER_URL"] = hsic.GetEndpoint()
|
||||||
|
hsic.env["HEADSCALE_LISTEN_ADDR"] = fmt.Sprintf("0.0.0.0:%d", hsic.port)
|
||||||
|
|
||||||
for key, value := range hsic.env {
|
for key, value := range hsic.env {
|
||||||
env = append(env, fmt.Sprintf("%s=%s", key, value))
|
env = append(env, fmt.Sprintf("%s=%s", key, value))
|
||||||
}
|
}
|
||||||
|
@ -649,7 +632,7 @@ func (t *HeadscaleInContainer) GetHealthEndpoint() string {
|
||||||
// GetEndpoint returns the Headscale endpoint for the HeadscaleInContainer.
|
// GetEndpoint returns the Headscale endpoint for the HeadscaleInContainer.
|
||||||
func (t *HeadscaleInContainer) GetEndpoint() string {
|
func (t *HeadscaleInContainer) GetEndpoint() string {
|
||||||
hostEndpoint := fmt.Sprintf("%s:%d",
|
hostEndpoint := fmt.Sprintf("%s:%d",
|
||||||
t.GetIP(),
|
t.GetHostname(),
|
||||||
t.port)
|
t.port)
|
||||||
|
|
||||||
if t.hasTLS() {
|
if t.hasTLS() {
|
||||||
|
|
|
@ -347,6 +347,51 @@ func (s *Scenario) CreateUser(user string) error {
|
||||||
|
|
||||||
/// Client related stuff
|
/// Client related stuff
|
||||||
|
|
||||||
|
func (s *Scenario) CreateTailscaleNode(
|
||||||
|
version string,
|
||||||
|
opts ...tsic.Option,
|
||||||
|
) (TailscaleClient, error) {
|
||||||
|
headscale, err := s.Headscale()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to create tailscale node (version: %s): %w", version, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cert := headscale.GetCert()
|
||||||
|
hostname := headscale.GetHostname()
|
||||||
|
|
||||||
|
s.mu.Lock()
|
||||||
|
defer s.mu.Unlock()
|
||||||
|
opts = append(opts,
|
||||||
|
tsic.WithCACert(cert),
|
||||||
|
tsic.WithHeadscaleName(hostname),
|
||||||
|
)
|
||||||
|
|
||||||
|
tsClient, err := tsic.New(
|
||||||
|
s.pool,
|
||||||
|
version,
|
||||||
|
s.network,
|
||||||
|
opts...,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf(
|
||||||
|
"failed to create tailscale (%s) node: %w",
|
||||||
|
tsClient.Hostname(),
|
||||||
|
err,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = tsClient.WaitForNeedsLogin()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf(
|
||||||
|
"failed to wait for tailscaled (%s) to need login: %w",
|
||||||
|
tsClient.Hostname(),
|
||||||
|
err,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
return tsClient, nil
|
||||||
|
}
|
||||||
|
|
||||||
// CreateTailscaleNodesInUser creates and adds a new TailscaleClient to a
|
// CreateTailscaleNodesInUser creates and adds a new TailscaleClient to a
|
||||||
// User in the Scenario.
|
// User in the Scenario.
|
||||||
func (s *Scenario) CreateTailscaleNodesInUser(
|
func (s *Scenario) CreateTailscaleNodesInUser(
|
||||||
|
|
|
@ -466,7 +466,7 @@ func (t *TailscaleInContainer) Login(
|
||||||
// This login mechanism uses web + command line flow for authentication.
|
// This login mechanism uses web + command line flow for authentication.
|
||||||
func (t *TailscaleInContainer) LoginWithURL(
|
func (t *TailscaleInContainer) LoginWithURL(
|
||||||
loginServer string,
|
loginServer string,
|
||||||
) (*url.URL, error) {
|
) (loginURL *url.URL, err error) {
|
||||||
command := []string{
|
command := []string{
|
||||||
"tailscale",
|
"tailscale",
|
||||||
"up",
|
"up",
|
||||||
|
@ -475,20 +475,27 @@ func (t *TailscaleInContainer) LoginWithURL(
|
||||||
"--accept-routes=false",
|
"--accept-routes=false",
|
||||||
}
|
}
|
||||||
|
|
||||||
_, stderr, err := t.Execute(command)
|
stdout, stderr, err := t.Execute(command)
|
||||||
if errors.Is(err, errTailscaleNotLoggedIn) {
|
if errors.Is(err, errTailscaleNotLoggedIn) {
|
||||||
return nil, errTailscaleCannotUpWithoutAuthkey
|
return nil, errTailscaleCannotUpWithoutAuthkey
|
||||||
}
|
}
|
||||||
|
|
||||||
urlStr := strings.ReplaceAll(stderr, "\nTo authenticate, visit:\n\n\t", "")
|
defer func() {
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("join command: %q", strings.Join(command, " "))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
urlStr := strings.ReplaceAll(stdout+stderr, "\nTo authenticate, visit:\n\n\t", "")
|
||||||
urlStr = strings.TrimSpace(urlStr)
|
urlStr = strings.TrimSpace(urlStr)
|
||||||
|
|
||||||
// parse URL
|
if urlStr == "" {
|
||||||
loginURL, err := url.Parse(urlStr)
|
return nil, fmt.Errorf("failed to get login URL: stdout: %s, stderr: %s", stdout, stderr)
|
||||||
if err != nil {
|
}
|
||||||
log.Printf("Could not parse login URL: %s", err)
|
|
||||||
log.Printf("Original join command result: %s", stderr)
|
|
||||||
|
|
||||||
|
// parse URL
|
||||||
|
loginURL, err = url.Parse(urlStr)
|
||||||
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -497,12 +504,17 @@ func (t *TailscaleInContainer) LoginWithURL(
|
||||||
|
|
||||||
// Logout runs the logout routine on the given Tailscale instance.
|
// Logout runs the logout routine on the given Tailscale instance.
|
||||||
func (t *TailscaleInContainer) Logout() error {
|
func (t *TailscaleInContainer) Logout() error {
|
||||||
_, _, err := t.Execute([]string{"tailscale", "logout"})
|
stdout, stderr, err := t.Execute([]string{"tailscale", "logout"})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
stdout, stderr, _ = t.Execute([]string{"tailscale", "status"})
|
||||||
|
if !strings.Contains(stdout+stderr, "Logged out.") {
|
||||||
|
return fmt.Errorf("failed to logout, stdout: %s, stderr: %s", stdout, stderr)
|
||||||
|
}
|
||||||
|
|
||||||
|
return t.waitForBackendState("NeedsLogin")
|
||||||
}
|
}
|
||||||
|
|
||||||
// Helper that runs `tailscale up` with no arguments.
|
// Helper that runs `tailscale up` with no arguments.
|
||||||
|
@ -826,28 +838,16 @@ func (t *TailscaleInContainer) FailingPeersAsString() (string, bool, error) {
|
||||||
// WaitForNeedsLogin blocks until the Tailscale (tailscaled) instance has
|
// WaitForNeedsLogin blocks until the Tailscale (tailscaled) instance has
|
||||||
// started and needs to be logged into.
|
// started and needs to be logged into.
|
||||||
func (t *TailscaleInContainer) WaitForNeedsLogin() error {
|
func (t *TailscaleInContainer) WaitForNeedsLogin() error {
|
||||||
return t.pool.Retry(func() error {
|
return t.waitForBackendState("NeedsLogin")
|
||||||
status, err := t.Status()
|
|
||||||
if err != nil {
|
|
||||||
return errTailscaleStatus(t.hostname, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// ipnstate.Status.CurrentTailnet was added in Tailscale 1.22.0
|
|
||||||
// https://github.com/tailscale/tailscale/pull/3865
|
|
||||||
//
|
|
||||||
// Before that, we can check the BackendState to see if the
|
|
||||||
// tailscaled daemon is connected to the control system.
|
|
||||||
if status.BackendState == "NeedsLogin" {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
return errTailscaledNotReadyForLogin
|
|
||||||
})
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// WaitForRunning blocks until the Tailscale (tailscaled) instance is logged in
|
// WaitForRunning blocks until the Tailscale (tailscaled) instance is logged in
|
||||||
// and ready to be used.
|
// and ready to be used.
|
||||||
func (t *TailscaleInContainer) WaitForRunning() error {
|
func (t *TailscaleInContainer) WaitForRunning() error {
|
||||||
|
return t.waitForBackendState("Running")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *TailscaleInContainer) waitForBackendState(state string) error {
|
||||||
return t.pool.Retry(func() error {
|
return t.pool.Retry(func() error {
|
||||||
status, err := t.Status()
|
status, err := t.Status()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -859,7 +859,7 @@ func (t *TailscaleInContainer) WaitForRunning() error {
|
||||||
//
|
//
|
||||||
// Before that, we can check the BackendState to see if the
|
// Before that, we can check the BackendState to see if the
|
||||||
// tailscaled daemon is connected to the control system.
|
// tailscaled daemon is connected to the control system.
|
||||||
if status.BackendState == "Running" {
|
if status.BackendState == state {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue