mirror of
https://github.com/MirageNetwork/MirageServer.git
synced 2025-09-26 20:41:34 +08:00

何川完成的使autogroup:self可配置作用域的修改 * 租户的aclPolicy的默认配置为nil * 修改:aclPolicy判空需要对Acls字段进行判断,空则浅复制之后,替换为全通再生成rules * 新增:ACLPolicy-autogroup:self * 使用map来判断autogroup * 处理autogroup self和owner * 修改:减少updateACLRules的无效次数 * 添加一点关于autogroup替换的注释 * 减少updateAclRules的引用处 * 在aclRules的生成函数中加入userID,以便于可以获取到和请求用户相关的信息&&调整autogroup:self的src acl生成 * autogroup:self 配置后,src只包含self解析出来的地址,并不会包含dest的所有地址 * 获取peers:添加peerCacheMap(同步HS修改)以及快速判断autogroup:self * 添加节点更新推送 * 租户内节点更新,通知其他节点进行更新netmap;获取LastStateChange不必排序,只需取最晚time * 新用户登录时候查询组织不存在的错误码替换为组织不存在,以便可以新建用户 * autogroup:self bug fix * merge main * 修改peerCache的生成和使用方式,不再遍历CIDR内所有ip * 将UpdateAclRule操作从getPeer中提出到getMapResponse中 * fix bug: updateAclRules之后没有同步更新到对应的machine上 * 抽取出关于autogroup:self的修改 * fix bug:self情况下peer加入要判断uid * acl expand alias: 调整autogroup到前面 * 租户建立时,默认添加一条全通ACL规则 * 租户初始化默认ACL添加一条全通 * 添加autogroup:self标签的作用域 * expand group去掉归一化操作 --------- Co-authored-by: chuanh <chuanh@opera.com> Co-authored-by: chuanhe <chuanhe.u90@gmail.com> Co-authored-by: Chenyang Gao <gps949@outlook.com>
1010 lines
24 KiB
Go
1010 lines
24 KiB
Go
package controller
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"net/netip"
|
|
"os"
|
|
"path/filepath"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/rs/zerolog/log"
|
|
"github.com/samber/lo"
|
|
"github.com/tailscale/hujson"
|
|
"gopkg.in/yaml.v3"
|
|
"tailscale.com/envknob"
|
|
"tailscale.com/tailcfg"
|
|
)
|
|
|
|
const (
|
|
errEmptyPolicy = Error("empty policy")
|
|
errInvalidAction = Error("invalid action")
|
|
errInvalidGroup = Error("invalid group")
|
|
errInvalidTag = Error("invalid tag")
|
|
errInvalidPortFormat = Error("invalid port format")
|
|
errWildcardIsNeeded = Error("wildcard as port is required for the protocol")
|
|
)
|
|
|
|
const (
|
|
Base8 = 8
|
|
Base10 = 10
|
|
BitSize16 = 16
|
|
BitSize32 = 32
|
|
BitSize64 = 64
|
|
portRangeBegin = 0
|
|
portRangeEnd = 65535
|
|
expectedTokenItems = 2
|
|
)
|
|
|
|
const (
|
|
AutoGroupPrefix = "autogroup:"
|
|
AutoGroupSelf = "autogroup:self"
|
|
AutoGroupOwner = "autogroup:owner"
|
|
AutoGroupInternet = "autogroup:internet"
|
|
)
|
|
|
|
// For some reason golang.org/x/net/internal/iana is an internal package.
|
|
const (
|
|
protocolICMP = 1 // Internet Control Message
|
|
protocolIGMP = 2 // Internet Group Management
|
|
protocolIPv4 = 4 // IPv4 encapsulation
|
|
protocolTCP = 6 // Transmission Control
|
|
protocolEGP = 8 // Exterior Gateway Protocol
|
|
protocolIGP = 9 // any private interior gateway (used by Cisco for their IGRP)
|
|
protocolUDP = 17 // User Datagram
|
|
protocolGRE = 47 // Generic Routing Encapsulation
|
|
protocolESP = 50 // Encap Security Payload
|
|
protocolAH = 51 // Authentication Header
|
|
protocolIPv6ICMP = 58 // ICMP for IPv6
|
|
protocolSCTP = 132 // Stream Control Transmission Protocol
|
|
ProtocolFC = 133 // Fibre Channel
|
|
)
|
|
|
|
var featureEnableSSH = envknob.RegisterBool("MIRAGE_EXPERIMENTAL_FEATURE_SSH")
|
|
|
|
func (h *Mirage) SaveACLPolicy(path string) error {
|
|
log.Debug().
|
|
Str("func", "SaveACLPolicy").
|
|
Str("path", path).
|
|
Msg("Saving ACL policy back to path")
|
|
|
|
aclData, err := json.Marshal(h.aclPolicy)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = os.WriteFile(path, aclData, 0644)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (h *Mirage) SaveACLPolicyOfOrg(org *Organization) error {
|
|
return h.db.Select("AclPolicy").Save(org).Error
|
|
}
|
|
func (h *Mirage) CreateDefaultACLPolicy() error {
|
|
h.aclPolicy = &ACLPolicy{
|
|
ACLs: []ACL{{
|
|
Action: "accept",
|
|
Protocol: "",
|
|
Sources: []string{"*"},
|
|
Destinations: []string{"*:*"},
|
|
}},
|
|
}
|
|
return h.UpdateACLRules(0)
|
|
}
|
|
|
|
// LoadACLPolicy loads the ACL policy from the specify path, and generates the ACL rules.
|
|
func (h *Mirage) LoadACLPolicy(path string) error {
|
|
log.Debug().
|
|
Str("func", "LoadACLPolicy").
|
|
Str("path", path).
|
|
Msg("Loading ACL policy from path")
|
|
|
|
policyFile, err := os.Open(path)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer policyFile.Close()
|
|
|
|
var policy ACLPolicy
|
|
policyBytes, err := io.ReadAll(policyFile)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
switch filepath.Ext(path) {
|
|
case ".yml", ".yaml":
|
|
log.Debug().
|
|
Str("path", path).
|
|
Bytes("file", policyBytes).
|
|
Msg("Loading ACLs from YAML")
|
|
|
|
err := yaml.Unmarshal(policyBytes, &policy)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
log.Trace().
|
|
Interface("policy", policy).
|
|
Msg("Loaded policy from YAML")
|
|
|
|
default:
|
|
ast, err := hujson.Parse(policyBytes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
ast.Standardize()
|
|
policyBytes = ast.Pack()
|
|
err = json.Unmarshal(policyBytes, &policy)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if policy.IsZero() {
|
|
return errEmptyPolicy
|
|
}
|
|
|
|
h.aclPolicy = &policy
|
|
|
|
return h.UpdateACLRules(0)
|
|
}
|
|
|
|
func (h *Mirage) UpdateACLRules(userId int64) error {
|
|
machines, err := h.ListMachines()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if h.aclPolicy == nil {
|
|
return errEmptyPolicy
|
|
}
|
|
|
|
rules, _, err := h.generateACLRules(machines, &User{}, *h.aclPolicy, h.cfg.OIDC.StripEmaildomain)
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
log.Trace().Interface("ACL", rules).Msg("ACL rules generated")
|
|
h.aclRules = rules
|
|
|
|
if featureEnableSSH() {
|
|
sshRules, err := h.generateSSHRules(userId)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
log.Trace().Interface("SSH", sshRules).Msg("SSH rules generated")
|
|
if h.sshPolicy == nil {
|
|
h.sshPolicy = &tailcfg.SSHPolicy{}
|
|
}
|
|
h.sshPolicy.Rules = sshRules
|
|
} else if h.aclPolicy != nil && len(h.aclPolicy.SSHs) > 0 {
|
|
log.Info().Msg("SSH ACLs has been defined, but MIRAGE_EXPERIMENTAL_FEATURE_SSH is not enabled, this is a unstable feature, check docs before activating")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (h *Mirage) UpdateACLRulesOfOrg(org *Organization, user *User) (bool, error) {
|
|
|
|
var enableSelf bool
|
|
if org == nil || org.ID == 0 {
|
|
return enableSelf, ErrOrgNotFound
|
|
}
|
|
machines, err := h.ListMachinesByOrgID(org.ID)
|
|
if err != nil {
|
|
return enableSelf, err
|
|
}
|
|
aclPolicy := org.AclPolicy
|
|
rules, enableSelf, err := h.generateACLRules(machines, user, *aclPolicy, h.cfg.OIDC.StripEmaildomain)
|
|
|
|
if err != nil {
|
|
return enableSelf, err
|
|
}
|
|
log.Trace().Interface("ACL", rules).Msg("ACL rules generated")
|
|
org.AclRules = rules
|
|
|
|
if featureEnableSSH() {
|
|
sshRules, err := h.generateSSHRulesOfOrg(machines, user.ID, org)
|
|
|
|
if err != nil {
|
|
return enableSelf, err
|
|
}
|
|
log.Trace().Interface("SSH", sshRules).Msg("SSH rules generated")
|
|
if org.SshPolicy == nil {
|
|
org.SshPolicy = &tailcfg.SSHPolicy{}
|
|
}
|
|
org.SshPolicy.Rules = sshRules
|
|
} else if org.AclPolicy != nil && len(org.AclPolicy.SSHs) > 0 {
|
|
log.Info().Msg("SSH ACLs has been defined, but MIRAGE_EXPERIMENTAL_FEATURE_SSH is not enabled, this is a unstable feature, check docs before activating")
|
|
}
|
|
|
|
return enableSelf, nil
|
|
}
|
|
|
|
func (h *Mirage) generateSSHRulesOfOrg(machines []Machine, userId int64, org *Organization) ([]*tailcfg.SSHRule, error) {
|
|
if org == nil || org.ID == 0 {
|
|
return nil, ErrOrgNotFound
|
|
}
|
|
a := org.AclPolicy
|
|
|
|
rules := []*tailcfg.SSHRule{}
|
|
|
|
acceptAction := tailcfg.SSHAction{
|
|
Message: "",
|
|
Reject: false,
|
|
Accept: true,
|
|
SessionDuration: 0,
|
|
AllowAgentForwarding: false,
|
|
HoldAndDelegate: "",
|
|
AllowLocalPortForwarding: true,
|
|
}
|
|
|
|
rejectAction := tailcfg.SSHAction{
|
|
Message: "",
|
|
Reject: true,
|
|
Accept: false,
|
|
SessionDuration: 0,
|
|
AllowAgentForwarding: false,
|
|
HoldAndDelegate: "",
|
|
AllowLocalPortForwarding: false,
|
|
}
|
|
|
|
for index, sshACL := range a.SSHs {
|
|
action := rejectAction
|
|
switch sshACL.Action {
|
|
case "accept":
|
|
action = acceptAction
|
|
case "check":
|
|
checkAction, err := sshCheckAction(sshACL.CheckPeriod)
|
|
if err != nil {
|
|
log.Error().
|
|
Msgf("Error parsing SSH %d, check action with unparsable duration '%s'", index, sshACL.CheckPeriod)
|
|
} else {
|
|
action = *checkAction
|
|
}
|
|
default:
|
|
log.Error().
|
|
Msgf("Error parsing SSH %d, unknown action '%s'", index, sshACL.Action)
|
|
|
|
return nil, fmt.Errorf("Error parsing SSH %d, unknown action '%s'", index, sshACL.Action)
|
|
}
|
|
|
|
principals := make([]*tailcfg.SSHPrincipal, 0, len(sshACL.Sources))
|
|
for innerIndex, rawSrc := range sshACL.Sources {
|
|
expandedSrcs, err := h.expandAlias(
|
|
false,
|
|
machines,
|
|
userId,
|
|
*a,
|
|
rawSrc,
|
|
h.cfg.OIDC.StripEmaildomain,
|
|
)
|
|
if err != nil {
|
|
log.Error().
|
|
Msgf("Error parsing SSH %d, Source %d", index, innerIndex)
|
|
|
|
return nil, err
|
|
}
|
|
for _, expandedSrc := range expandedSrcs {
|
|
principals = append(principals, &tailcfg.SSHPrincipal{
|
|
NodeIP: expandedSrc,
|
|
})
|
|
}
|
|
}
|
|
|
|
userMap := make(map[string]string, len(sshACL.Users))
|
|
for _, user := range sshACL.Users {
|
|
userMap[user] = "="
|
|
}
|
|
rules = append(rules, &tailcfg.SSHRule{
|
|
RuleExpires: nil,
|
|
Principals: principals,
|
|
SSHUsers: userMap,
|
|
Action: &action,
|
|
})
|
|
}
|
|
|
|
return rules, nil
|
|
}
|
|
|
|
func (h *Mirage) generateACLRules(
|
|
machines []Machine,
|
|
user *User,
|
|
aclPolicy ACLPolicy,
|
|
stripEmaildomain bool,
|
|
) ([]tailcfg.FilterRule, bool, error) {
|
|
rules := []tailcfg.FilterRule{}
|
|
enableSelf := false
|
|
Loop:
|
|
for index, acl := range aclPolicy.ACLs {
|
|
if acl.Action != "accept" {
|
|
return nil, enableSelf, errInvalidAction
|
|
}
|
|
|
|
protocols, needsWildcard, err := parseProtocol(acl.Protocol)
|
|
if err != nil {
|
|
log.Error().
|
|
Msgf("Error parsing ACL %d. protocol unknown %s", index, acl.Protocol)
|
|
|
|
return nil, enableSelf, err
|
|
}
|
|
|
|
if containsSubStr(acl.Destinations, AutoGroupSelf) {
|
|
if containsStr(acl.Sources, "*") {
|
|
enableSelf = true
|
|
} else {
|
|
LoopForSelf:
|
|
for _, alias := range acl.Sources {
|
|
if strings.HasPrefix(alias, "group:") {
|
|
users, err := expandGroup(aclPolicy, acl.Sources[0], stripEmaildomain)
|
|
if err != nil {
|
|
log.Error().
|
|
Msgf("Error expand group %s ", acl.Sources[0])
|
|
continue LoopForSelf
|
|
}
|
|
if containsStr(users, user.Name) {
|
|
enableSelf = true
|
|
break LoopForSelf
|
|
}
|
|
} else if alias == user.Name {
|
|
enableSelf = true
|
|
break LoopForSelf
|
|
}
|
|
}
|
|
}
|
|
if !enableSelf {
|
|
continue Loop
|
|
}
|
|
}
|
|
destPorts := []tailcfg.NetPortRange{}
|
|
for innerIndex, dest := range acl.Destinations {
|
|
dests, err := h.generateACLPolicyDest(
|
|
machines,
|
|
user.ID,
|
|
aclPolicy,
|
|
dest,
|
|
needsWildcard,
|
|
stripEmaildomain,
|
|
)
|
|
if err != nil {
|
|
log.Error().
|
|
Msgf("Error parsing ACL %d, Destination %d", index, innerIndex)
|
|
|
|
return nil, enableSelf, err
|
|
}
|
|
destPorts = append(destPorts, dests...)
|
|
}
|
|
|
|
srcIPs := []string{}
|
|
// 如果dest里面配置了autogroup:self,且src的作用域包含了user
|
|
if enableSelf {
|
|
|
|
/*
|
|
for _, dest := range destPorts {
|
|
srcIPs = append(srcIPs, dest.IP)
|
|
}
|
|
*/
|
|
// src 按照autogroup:self的规则来解析
|
|
srcs, err := h.generateACLPolicySrc(machines, user.ID, aclPolicy, AutoGroupSelf, stripEmaildomain)
|
|
|
|
if err != nil {
|
|
log.Error().
|
|
Msgf("Error parsing ACL %d, Source %d", index, 0)
|
|
|
|
return nil, enableSelf, err
|
|
}
|
|
srcIPs = append(srcIPs, srcs...)
|
|
} else {
|
|
for innerIndex, src := range acl.Sources {
|
|
srcs, err := h.generateACLPolicySrc(machines, user.ID, aclPolicy, src, stripEmaildomain)
|
|
|
|
if err != nil {
|
|
log.Error().
|
|
Msgf("Error parsing ACL %d, Source %d", index, innerIndex)
|
|
|
|
return nil, enableSelf, err
|
|
}
|
|
srcIPs = append(srcIPs, srcs...)
|
|
}
|
|
}
|
|
rules = append(rules, tailcfg.FilterRule{
|
|
SrcIPs: srcIPs,
|
|
DstPorts: destPorts,
|
|
IPProto: protocols,
|
|
})
|
|
}
|
|
|
|
return rules, enableSelf, nil
|
|
}
|
|
|
|
func (h *Mirage) generateSSHRules(userId int64) ([]*tailcfg.SSHRule, error) {
|
|
rules := []*tailcfg.SSHRule{}
|
|
|
|
if h.aclPolicy == nil {
|
|
return nil, errEmptyPolicy
|
|
}
|
|
|
|
machines, err := h.ListMachines()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
acceptAction := tailcfg.SSHAction{
|
|
Message: "",
|
|
Reject: false,
|
|
Accept: true,
|
|
SessionDuration: 0,
|
|
AllowAgentForwarding: false,
|
|
HoldAndDelegate: "",
|
|
AllowLocalPortForwarding: true,
|
|
}
|
|
|
|
rejectAction := tailcfg.SSHAction{
|
|
Message: "",
|
|
Reject: true,
|
|
Accept: false,
|
|
SessionDuration: 0,
|
|
AllowAgentForwarding: false,
|
|
HoldAndDelegate: "",
|
|
AllowLocalPortForwarding: false,
|
|
}
|
|
|
|
for index, sshACL := range h.aclPolicy.SSHs {
|
|
action := rejectAction
|
|
switch sshACL.Action {
|
|
case "accept":
|
|
action = acceptAction
|
|
case "check":
|
|
checkAction, err := sshCheckAction(sshACL.CheckPeriod)
|
|
if err != nil {
|
|
log.Error().
|
|
Msgf("Error parsing SSH %d, check action with unparsable duration '%s'", index, sshACL.CheckPeriod)
|
|
} else {
|
|
action = *checkAction
|
|
}
|
|
default:
|
|
log.Error().
|
|
Msgf("Error parsing SSH %d, unknown action '%s'", index, sshACL.Action)
|
|
|
|
return nil, err
|
|
}
|
|
|
|
principals := make([]*tailcfg.SSHPrincipal, 0, len(sshACL.Sources))
|
|
for innerIndex, rawSrc := range sshACL.Sources {
|
|
expandedSrcs, err := h.expandAlias(
|
|
false,
|
|
machines,
|
|
userId,
|
|
*h.aclPolicy,
|
|
rawSrc,
|
|
h.cfg.OIDC.StripEmaildomain,
|
|
)
|
|
if err != nil {
|
|
log.Error().
|
|
Msgf("Error parsing SSH %d, Source %d", index, innerIndex)
|
|
|
|
return nil, err
|
|
}
|
|
for _, expandedSrc := range expandedSrcs {
|
|
principals = append(principals, &tailcfg.SSHPrincipal{
|
|
NodeIP: expandedSrc,
|
|
})
|
|
}
|
|
}
|
|
|
|
userMap := make(map[string]string, len(sshACL.Users))
|
|
for _, user := range sshACL.Users {
|
|
userMap[user] = "="
|
|
}
|
|
rules = append(rules, &tailcfg.SSHRule{
|
|
RuleExpires: nil,
|
|
Principals: principals,
|
|
SSHUsers: userMap,
|
|
Action: &action,
|
|
})
|
|
}
|
|
|
|
return rules, nil
|
|
}
|
|
|
|
func sshCheckAction(duration string) (*tailcfg.SSHAction, error) {
|
|
sessionLength, err := time.ParseDuration(duration)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &tailcfg.SSHAction{
|
|
Message: "",
|
|
Reject: false,
|
|
Accept: true,
|
|
SessionDuration: sessionLength,
|
|
AllowAgentForwarding: false,
|
|
HoldAndDelegate: "",
|
|
AllowLocalPortForwarding: true,
|
|
}, nil
|
|
}
|
|
|
|
func (h *Mirage) generateACLPolicySrc(
|
|
machines []Machine,
|
|
userId int64,
|
|
aclPolicy ACLPolicy,
|
|
src string,
|
|
stripEmaildomain bool,
|
|
) ([]string, error) {
|
|
return h.expandAlias(false, machines, userId, aclPolicy, src, stripEmaildomain)
|
|
}
|
|
|
|
func (h *Mirage) generateACLPolicyDest(
|
|
machines []Machine,
|
|
userId int64,
|
|
aclPolicy ACLPolicy,
|
|
dest string,
|
|
needsWildcard bool,
|
|
stripEmaildomain bool,
|
|
) ([]tailcfg.NetPortRange, error) {
|
|
tokens := strings.Split(dest, ":")
|
|
if len(tokens) < expectedTokenItems || len(tokens) > 3 {
|
|
return nil, errInvalidPortFormat
|
|
}
|
|
|
|
var alias string
|
|
// We can have here stuff like:
|
|
// git-server:*
|
|
// 192.168.1.0/24:22
|
|
// tag:montreal-webserver:80,443
|
|
// tag:api-server:443
|
|
// example-host-1:*
|
|
if len(tokens) == expectedTokenItems {
|
|
alias = tokens[0]
|
|
} else {
|
|
alias = fmt.Sprintf("%s:%s", tokens[0], tokens[1])
|
|
}
|
|
|
|
expanded, err := h.expandAlias(
|
|
h.cfg.AllowRouteDueToMachine,
|
|
machines,
|
|
userId,
|
|
aclPolicy,
|
|
alias,
|
|
stripEmaildomain,
|
|
)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
ports, err := expandPorts(tokens[len(tokens)-1], needsWildcard)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
dests := []tailcfg.NetPortRange{}
|
|
for _, d := range expanded {
|
|
for _, p := range *ports {
|
|
pr := tailcfg.NetPortRange{
|
|
IP: d,
|
|
Ports: p,
|
|
}
|
|
dests = append(dests, pr)
|
|
}
|
|
}
|
|
|
|
return dests, nil
|
|
}
|
|
|
|
// parseProtocol reads the proto field of the ACL and generates a list of
|
|
// protocols that will be allowed, following the IANA IP protocol number
|
|
// https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
|
|
//
|
|
// If the ACL proto field is empty, it allows ICMPv4, ICMPv6, TCP, and UDP,
|
|
// as per Tailscale behaviour (see tailcfg.FilterRule).
|
|
//
|
|
// Also returns a boolean indicating if the protocol
|
|
// requires all the destinations to use wildcard as port number (only TCP,
|
|
// UDP and SCTP support specifying ports).
|
|
func parseProtocol(protocol string) ([]int, bool, error) {
|
|
switch protocol {
|
|
case "":
|
|
return nil, false, nil
|
|
case "igmp":
|
|
return []int{protocolIGMP}, true, nil
|
|
case "ipv4", "ip-in-ip":
|
|
return []int{protocolIPv4}, true, nil
|
|
case "tcp":
|
|
return []int{protocolTCP}, false, nil
|
|
case "egp":
|
|
return []int{protocolEGP}, true, nil
|
|
case "igp":
|
|
return []int{protocolIGP}, true, nil
|
|
case "udp":
|
|
return []int{protocolUDP}, false, nil
|
|
case "gre":
|
|
return []int{protocolGRE}, true, nil
|
|
case "esp":
|
|
return []int{protocolESP}, true, nil
|
|
case "ah":
|
|
return []int{protocolAH}, true, nil
|
|
case "sctp":
|
|
return []int{protocolSCTP}, false, nil
|
|
case "icmp":
|
|
return []int{protocolICMP, protocolIPv6ICMP}, true, nil
|
|
|
|
default:
|
|
protocolNumber, err := strconv.Atoi(protocol)
|
|
if err != nil {
|
|
return nil, false, err
|
|
}
|
|
needsWildcard := protocolNumber != protocolTCP &&
|
|
protocolNumber != protocolUDP &&
|
|
protocolNumber != protocolSCTP
|
|
|
|
return []int{protocolNumber}, needsWildcard, nil
|
|
}
|
|
}
|
|
|
|
func (h *Mirage) expandMachineRoutes(machine Machine) []string {
|
|
routeIPs := []string{}
|
|
routeList, err := h.GetMachineRoutes(&machine)
|
|
if err != nil {
|
|
return routeIPs
|
|
}
|
|
for _, route := range routeList {
|
|
routeIPs = append(routeIPs, netip.Prefix(route.Prefix).String())
|
|
}
|
|
|
|
return routeIPs
|
|
}
|
|
|
|
// expandalias has an input of either
|
|
// - a user
|
|
// - a group
|
|
// - a tag
|
|
// - a host
|
|
// and transform these in IPAddresses.
|
|
func (h *Mirage) expandAlias(
|
|
autoAddRoute bool,
|
|
machines []Machine,
|
|
userId int64,
|
|
aclPolicy ACLPolicy,
|
|
alias string,
|
|
stripEmailDomain bool,
|
|
) (ips []string, resErr error) {
|
|
defer func() {
|
|
ips = lo.Uniq(ips)
|
|
}()
|
|
if alias == "*" {
|
|
ips = []string{"*"}
|
|
return
|
|
}
|
|
|
|
log.Debug().
|
|
Str("alias", alias).
|
|
Msg("Expanding")
|
|
|
|
// autogroup
|
|
if strings.HasPrefix(alias, AutoGroupPrefix) {
|
|
// 处理 autogroup:self
|
|
if alias == AutoGroupSelf {
|
|
nodes, err := h.ListMachinesByUser(userId)
|
|
if err != nil {
|
|
resErr = err
|
|
return
|
|
}
|
|
for _, node := range nodes {
|
|
if len(node.ForcedTags) > 0 {
|
|
continue
|
|
}
|
|
ips = append(ips, node.IPAddresses.ToStringSlice()...)
|
|
if autoAddRoute {
|
|
ips = append(ips, h.expandMachineRoutes(node)...)
|
|
}
|
|
}
|
|
// 处理 autogroup:owner
|
|
} else if alias == AutoGroupOwner {
|
|
for _, machine := range machines {
|
|
if machine.User.Role == RoleOwner {
|
|
ips = append(ips, machine.IPAddresses.ToStringSlice()...)
|
|
if autoAddRoute {
|
|
ips = append(ips, h.expandMachineRoutes(machine)...)
|
|
}
|
|
}
|
|
}
|
|
|
|
// 处理 autogroup:internet
|
|
} else if alias == AutoGroupInternet {
|
|
ips = append(ips, InternetIpLists...)
|
|
}
|
|
return
|
|
}
|
|
|
|
if strings.HasPrefix(alias, "group:") {
|
|
users, err := expandGroup(aclPolicy, alias, stripEmailDomain)
|
|
if err != nil {
|
|
resErr = err
|
|
return
|
|
}
|
|
for _, n := range users {
|
|
nodes := filterMachinesByUser(machines, n)
|
|
for _, node := range nodes {
|
|
ips = append(ips, node.IPAddresses.ToStringSlice()...)
|
|
if autoAddRoute {
|
|
ips = append(ips, h.expandMachineRoutes(node)...)
|
|
}
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
if strings.HasPrefix(alias, "tag:") {
|
|
// check for forced tags
|
|
for _, machine := range machines {
|
|
if contains(machine.ForcedTags, alias) {
|
|
ips = append(ips, machine.IPAddresses.ToStringSlice()...)
|
|
if autoAddRoute {
|
|
ips = append(ips, h.expandMachineRoutes(machine)...)
|
|
}
|
|
}
|
|
}
|
|
|
|
// find tag owners
|
|
owners, err := expandTagOwners(aclPolicy, alias, stripEmailDomain)
|
|
if err != nil {
|
|
if errors.Is(err, errInvalidTag) {
|
|
if len(ips) == 0 {
|
|
resErr = fmt.Errorf(
|
|
"%w. %v isn't owned by a TagOwner and no forced tags are defined",
|
|
errInvalidTag,
|
|
alias,
|
|
)
|
|
return
|
|
}
|
|
return
|
|
} else {
|
|
resErr = err
|
|
return
|
|
}
|
|
}
|
|
|
|
// filter out machines per tag owner
|
|
for _, user := range owners {
|
|
machines := filterMachinesByUser(machines, user)
|
|
for _, machine := range machines {
|
|
hi := machine.GetHostInfo()
|
|
if contains(hi.RequestTags, alias) {
|
|
ips = append(ips, machine.IPAddresses.ToStringSlice()...)
|
|
if autoAddRoute {
|
|
ips = append(ips, h.expandMachineRoutes(machine)...)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
// if alias is a user
|
|
nodes := filterMachinesByUser(machines, alias)
|
|
nodes = excludeCorrectlyTaggedNodes(aclPolicy, nodes, alias, stripEmailDomain)
|
|
|
|
for _, n := range nodes {
|
|
ips = append(ips, n.IPAddresses.ToStringSlice()...)
|
|
if autoAddRoute {
|
|
ips = append(ips, h.expandMachineRoutes(n)...)
|
|
}
|
|
}
|
|
if len(ips) > 0 {
|
|
return
|
|
}
|
|
|
|
// if alias is an host
|
|
if host, ok := aclPolicy.Hosts[alias]; ok {
|
|
ips = append(ips, host.String())
|
|
if autoAddRoute {
|
|
mlist := h.GetMachinesInPrefix(host)
|
|
for _, m := range mlist {
|
|
ips = append(ips, h.expandMachineRoutes(m)...)
|
|
}
|
|
}
|
|
return ips, nil
|
|
}
|
|
|
|
// if alias is an IP
|
|
ip, err := netip.ParseAddr(alias)
|
|
if err == nil {
|
|
ips = append(ips, ip.String())
|
|
if autoAddRoute {
|
|
m := h.GetMachineByIP(ip)
|
|
if m != nil {
|
|
ips = append(ips, h.expandMachineRoutes(*m)...)
|
|
}
|
|
}
|
|
return ips, nil
|
|
}
|
|
|
|
// if alias is an CIDR
|
|
cidr, err := netip.ParsePrefix(alias)
|
|
if err == nil {
|
|
ips = append(ips, cidr.String())
|
|
if autoAddRoute {
|
|
mlist := h.GetMachinesInPrefix(cidr)
|
|
for _, m := range mlist {
|
|
ips = append(ips, h.expandMachineRoutes(m)...)
|
|
}
|
|
}
|
|
return ips, nil
|
|
}
|
|
|
|
log.Debug().Msgf("No IPs found with the alias %v", alias)
|
|
|
|
return
|
|
}
|
|
|
|
// excludeCorrectlyTaggedNodes will remove from the list of input nodes the ones
|
|
// that are correctly tagged since they should not be listed as being in the user
|
|
// we assume in this function that we only have nodes from 1 user.
|
|
func excludeCorrectlyTaggedNodes(
|
|
aclPolicy ACLPolicy,
|
|
nodes []Machine,
|
|
user string,
|
|
stripEmailDomain bool,
|
|
) []Machine {
|
|
out := []Machine{}
|
|
tags := []string{}
|
|
for tag := range aclPolicy.TagOwners {
|
|
owners, _ := expandTagOwners(aclPolicy, user, stripEmailDomain)
|
|
ns := append(owners, user)
|
|
if contains(ns, user) {
|
|
tags = append(tags, tag)
|
|
}
|
|
}
|
|
// for each machine if tag is in tags list, don't append it.
|
|
for _, machine := range nodes {
|
|
hi := machine.GetHostInfo()
|
|
|
|
found := false
|
|
for _, t := range hi.RequestTags {
|
|
if contains(tags, t) {
|
|
found = true
|
|
|
|
break
|
|
}
|
|
}
|
|
if len(machine.ForcedTags) > 0 {
|
|
found = true
|
|
}
|
|
if !found {
|
|
out = append(out, machine)
|
|
}
|
|
}
|
|
|
|
return out
|
|
}
|
|
|
|
func expandPorts(portsStr string, needsWildcard bool) (*[]tailcfg.PortRange, error) {
|
|
if portsStr == "*" {
|
|
return &[]tailcfg.PortRange{
|
|
{First: portRangeBegin, Last: portRangeEnd},
|
|
}, nil
|
|
}
|
|
|
|
if needsWildcard {
|
|
return nil, errWildcardIsNeeded
|
|
}
|
|
|
|
ports := []tailcfg.PortRange{}
|
|
for _, portStr := range strings.Split(portsStr, ",") {
|
|
rang := strings.Split(portStr, "-")
|
|
switch len(rang) {
|
|
case 1:
|
|
port, err := strconv.ParseUint(rang[0], Base10, BitSize16)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
ports = append(ports, tailcfg.PortRange{
|
|
First: uint16(port),
|
|
Last: uint16(port),
|
|
})
|
|
|
|
case expectedTokenItems:
|
|
start, err := strconv.ParseUint(rang[0], Base10, BitSize16)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
last, err := strconv.ParseUint(rang[1], Base10, BitSize16)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
ports = append(ports, tailcfg.PortRange{
|
|
First: uint16(start),
|
|
Last: uint16(last),
|
|
})
|
|
|
|
default:
|
|
return nil, errInvalidPortFormat
|
|
}
|
|
}
|
|
|
|
return &ports, nil
|
|
}
|
|
|
|
func filterMachinesByUser(machines []Machine, user string) []Machine {
|
|
out := []Machine{}
|
|
for _, machine := range machines {
|
|
if machine.User.Name == user {
|
|
out = append(out, machine)
|
|
}
|
|
}
|
|
|
|
return out
|
|
}
|
|
|
|
// expandTagOwners will return a list of user. An owner can be either a user or a group
|
|
// a group cannot be composed of groups.
|
|
func expandTagOwners(
|
|
aclPolicy ACLPolicy,
|
|
tag string,
|
|
stripEmailDomain bool,
|
|
) ([]string, error) {
|
|
var owners []string
|
|
ows, ok := aclPolicy.TagOwners[tag]
|
|
if !ok {
|
|
return []string{}, fmt.Errorf(
|
|
"%w. %v isn't owned by a TagOwner. Please add one first. https://tailscale.com/kb/1018/acls/#tag-owners",
|
|
errInvalidTag,
|
|
tag,
|
|
)
|
|
}
|
|
for _, owner := range ows {
|
|
if strings.HasPrefix(owner, "group:") {
|
|
gs, err := expandGroup(aclPolicy, owner, stripEmailDomain)
|
|
if err != nil {
|
|
return []string{}, err
|
|
}
|
|
owners = append(owners, gs...)
|
|
} else {
|
|
owners = append(owners, owner)
|
|
}
|
|
}
|
|
|
|
return owners, nil
|
|
}
|
|
|
|
// expandGroup will return the list of user inside the group
|
|
// after some validation.
|
|
func expandGroup(
|
|
aclPolicy ACLPolicy,
|
|
group string,
|
|
stripEmailDomain bool,
|
|
) ([]string, error) {
|
|
outGroups := []string{}
|
|
aclGroups, ok := aclPolicy.Groups[group]
|
|
if !ok {
|
|
return []string{}, fmt.Errorf(
|
|
"group %v isn't registered. %w",
|
|
group,
|
|
errInvalidGroup,
|
|
)
|
|
}
|
|
for _, name := range aclGroups {
|
|
if strings.HasPrefix(name, "group:") {
|
|
return []string{}, fmt.Errorf(
|
|
"%w. A group cannot be composed of groups. https://tailscale.com/kb/1018/acls/#groups",
|
|
errInvalidGroup,
|
|
)
|
|
}
|
|
if stripEmailDomain {
|
|
if atIdx := strings.Index(name, "@"); atIdx > 0 {
|
|
name = name[:atIdx]
|
|
}
|
|
}
|
|
outGroups = append(outGroups, name)
|
|
}
|
|
|
|
return outGroups, nil
|
|
}
|