|
|
|
@ -1118,33 +1118,31 @@ func init() {
|
|
|
|
|
tailscale.I_Acknowledge_This_API_Is_Unstable = true
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// resolveAuthKey either returns v unchanged (in the common case)
|
|
|
|
|
// or, if it starts with "oauth:" parses it as one of:
|
|
|
|
|
// resolveAuthKey either returns v unchanged (in the common case) or, if it
|
|
|
|
|
// starts with "tskey-client-" (as Tailscale OAuth secrets do) parses it like
|
|
|
|
|
//
|
|
|
|
|
// oauth2:CLIENT_ID:CLIENT_SECRET?ephemeral=false&tags=foo,bar&preauthorized=BOOL
|
|
|
|
|
// oauth2:CLIENT_ID:CLIENT_SECRET:BASE_URL?...
|
|
|
|
|
// tskey-client-xxxx[?ephemeral=false&tags=foo,bar&preauthorized=BOOL&baseURL=...]
|
|
|
|
|
//
|
|
|
|
|
// and does the OAuth2 dance to get and return an authkey. The "ephemeral" property
|
|
|
|
|
// defaults to true if unspecified. The "preauthorized" defaults to false.
|
|
|
|
|
//
|
|
|
|
|
// If the BASE_URL argument is not provided, it defaults to https://api.tailscale.com.
|
|
|
|
|
// and does the OAuth2 dance to get and return an authkey. The "ephemeral"
|
|
|
|
|
// property defaults to true if unspecified. The "preauthorized" defaults to
|
|
|
|
|
// false. The "baseURL" defaults to
|
|
|
|
|
// https://api.tailscale.com.
|
|
|
|
|
func resolveAuthKey(ctx context.Context, v string) (string, error) {
|
|
|
|
|
suff, ok := strings.CutPrefix(v, "oauth:")
|
|
|
|
|
if !ok {
|
|
|
|
|
if !strings.HasPrefix(v, "tskey-client-") {
|
|
|
|
|
return v, nil
|
|
|
|
|
}
|
|
|
|
|
if !envknob.Bool("TS_EXPERIMENT_OAUTH_AUTHKEY") {
|
|
|
|
|
return "", errors.New("oauth authkeys are in experimental status")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pos, named, _ := strings.Cut(suff, "?")
|
|
|
|
|
clientSecret, named, _ := strings.Cut(v, "?")
|
|
|
|
|
attrs, err := url.ParseQuery(named)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return "", err
|
|
|
|
|
}
|
|
|
|
|
for k := range attrs {
|
|
|
|
|
switch k {
|
|
|
|
|
case "ephemeral", "preauthorized", "tags":
|
|
|
|
|
case "ephemeral", "preauthorized", "tags", "baseURL":
|
|
|
|
|
default:
|
|
|
|
|
return "", fmt.Errorf("unknown attribute %q", k)
|
|
|
|
|
}
|
|
|
|
@ -1173,18 +1171,13 @@ func resolveAuthKey(ctx context.Context, v string) (string, error) {
|
|
|
|
|
tags = strings.Split(v, ",")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
f := strings.SplitN(pos, ":", 3)
|
|
|
|
|
if len(f) < 2 || len(f) > 3 {
|
|
|
|
|
return "", errors.New("invalid auth key format; want oauth2:CLIENT_ID:CLIENT_SECRET[:BASE_URL]")
|
|
|
|
|
}
|
|
|
|
|
clientID, clientSecret := f[0], f[1]
|
|
|
|
|
baseURL := "https://api.tailscale.com"
|
|
|
|
|
if len(f) == 3 {
|
|
|
|
|
baseURL = f[2]
|
|
|
|
|
if v := attrs.Get("baseURL"); v != "" {
|
|
|
|
|
baseURL = v
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
credentials := clientcredentials.Config{
|
|
|
|
|
ClientID: clientID,
|
|
|
|
|
ClientID: "some-client-id", // ignored
|
|
|
|
|
ClientSecret: clientSecret,
|
|
|
|
|
TokenURL: baseURL + "/api/v2/oauth/token",
|
|
|
|
|
Scopes: []string{"device"},
|
|
|
|
|