|
|
@ -6,6 +6,7 @@
|
|
|
|
package localapi
|
|
|
|
package localapi
|
|
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
import (
|
|
|
|
|
|
|
|
"bytes"
|
|
|
|
"crypto/rand"
|
|
|
|
"crypto/rand"
|
|
|
|
"encoding/hex"
|
|
|
|
"encoding/hex"
|
|
|
|
"encoding/json"
|
|
|
|
"encoding/json"
|
|
|
@ -24,6 +25,7 @@ import (
|
|
|
|
|
|
|
|
|
|
|
|
"inet.af/netaddr"
|
|
|
|
"inet.af/netaddr"
|
|
|
|
"tailscale.com/client/tailscale/apitype"
|
|
|
|
"tailscale.com/client/tailscale/apitype"
|
|
|
|
|
|
|
|
"tailscale.com/envknob"
|
|
|
|
"tailscale.com/ipn"
|
|
|
|
"tailscale.com/ipn"
|
|
|
|
"tailscale.com/ipn/ipnlocal"
|
|
|
|
"tailscale.com/ipn/ipnlocal"
|
|
|
|
"tailscale.com/ipn/ipnstate"
|
|
|
|
"tailscale.com/ipn/ipnstate"
|
|
|
@ -128,6 +130,8 @@ func (h *Handler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
|
|
h.serveSetExpirySooner(w, r)
|
|
|
|
h.serveSetExpirySooner(w, r)
|
|
|
|
case "/localapi/v0/dial":
|
|
|
|
case "/localapi/v0/dial":
|
|
|
|
h.serveDial(w, r)
|
|
|
|
h.serveDial(w, r)
|
|
|
|
|
|
|
|
case "/localapi/v0/id-token":
|
|
|
|
|
|
|
|
h.serveIDToken(w, r)
|
|
|
|
case "/":
|
|
|
|
case "/":
|
|
|
|
io.WriteString(w, "tailscaled\n")
|
|
|
|
io.WriteString(w, "tailscaled\n")
|
|
|
|
default:
|
|
|
|
default:
|
|
|
@ -135,6 +139,54 @@ func (h *Handler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// serveIDToken handles requests to get an OIDC ID token.
|
|
|
|
|
|
|
|
func (h *Handler) serveIDToken(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
|
|
|
if !h.PermitWrite {
|
|
|
|
|
|
|
|
http.Error(w, "id-token access denied", http.StatusForbidden)
|
|
|
|
|
|
|
|
return
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if !envknob.UseWIPCode() {
|
|
|
|
|
|
|
|
http.Error(w, "id-token access denied", http.StatusServiceUnavailable)
|
|
|
|
|
|
|
|
return
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
nm := h.b.NetMap()
|
|
|
|
|
|
|
|
if nm == nil {
|
|
|
|
|
|
|
|
http.Error(w, "no netmap", http.StatusServiceUnavailable)
|
|
|
|
|
|
|
|
return
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
aud := strings.TrimSpace(r.FormValue("aud"))
|
|
|
|
|
|
|
|
if len(aud) == 0 {
|
|
|
|
|
|
|
|
http.Error(w, "no audience requested", http.StatusBadRequest)
|
|
|
|
|
|
|
|
return
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
req := &tailcfg.TokenRequest{
|
|
|
|
|
|
|
|
CapVersion: tailcfg.CurrentCapabilityVersion,
|
|
|
|
|
|
|
|
Audience: aud,
|
|
|
|
|
|
|
|
NodeKey: nm.NodeKey,
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
b, err := json.Marshal(req)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
|
|
http.Error(w, err.Error(), 500)
|
|
|
|
|
|
|
|
return
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
httpReq, err := http.NewRequest("POST", "https://unused/machine/id-token", bytes.NewReader(b))
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
|
|
http.Error(w, err.Error(), 500)
|
|
|
|
|
|
|
|
return
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := h.b.DoNoiseRequest(httpReq)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
|
|
http.Error(w, err.Error(), 500)
|
|
|
|
|
|
|
|
return
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
w.WriteHeader(resp.StatusCode)
|
|
|
|
|
|
|
|
if _, err := io.Copy(w, resp.Body); err != nil {
|
|
|
|
|
|
|
|
http.Error(w, err.Error(), 500)
|
|
|
|
|
|
|
|
return
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func (h *Handler) serveBugReport(w http.ResponseWriter, r *http.Request) {
|
|
|
|
func (h *Handler) serveBugReport(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if !h.PermitRead {
|
|
|
|
if !h.PermitRead {
|
|
|
|
http.Error(w, "bugreport access denied", http.StatusForbidden)
|
|
|
|
http.Error(w, "bugreport access denied", http.StatusForbidden)
|
|
|
|