mirror of https://github.com/tailscale/tailscale/
tsnet,internal/client/tailscale: resolve OAuth into authkeys in tsnet (#17191)
* tsnet,internal/client/tailscale: resolve OAuth into authkeys in tsnet Updates #8403. * internal/client/tailscale: omit OAuth library via build tag Updates #12614. Signed-off-by: Naman Sood <mail@nsood.in>pull/17201/head
parent
2351cc0d0e
commit
b9cda4bca5
@ -0,0 +1,13 @@
|
|||||||
|
// Copyright (c) Tailscale Inc & AUTHORS
|
||||||
|
// SPDX-License-Identifier: BSD-3-Clause
|
||||||
|
|
||||||
|
// Code generated by gen.go; DO NOT EDIT.
|
||||||
|
|
||||||
|
//go:build ts_omit_oauthkey
|
||||||
|
|
||||||
|
package buildfeatures
|
||||||
|
|
||||||
|
// HasOAuthKey is whether the binary was built with support for modular feature "OAuth secret-to-authkey resolution support".
|
||||||
|
// Specifically, it's whether the binary was NOT built with the "ts_omit_oauthkey" build tag.
|
||||||
|
// It's a const so it can be used for dead code elimination.
|
||||||
|
const HasOAuthKey = false
|
||||||
@ -0,0 +1,13 @@
|
|||||||
|
// Copyright (c) Tailscale Inc & AUTHORS
|
||||||
|
// SPDX-License-Identifier: BSD-3-Clause
|
||||||
|
|
||||||
|
// Code generated by gen.go; DO NOT EDIT.
|
||||||
|
|
||||||
|
//go:build !ts_omit_oauthkey
|
||||||
|
|
||||||
|
package buildfeatures
|
||||||
|
|
||||||
|
// HasOAuthKey is whether the binary was built with support for modular feature "OAuth secret-to-authkey resolution support".
|
||||||
|
// Specifically, it's whether the binary was NOT built with the "ts_omit_oauthkey" build tag.
|
||||||
|
// It's a const so it can be used for dead code elimination.
|
||||||
|
const HasOAuthKey = true
|
||||||
@ -0,0 +1,10 @@
|
|||||||
|
// Copyright (c) Tailscale Inc & AUTHORS
|
||||||
|
// SPDX-License-Identifier: BSD-3-Clause
|
||||||
|
|
||||||
|
// Package oauthkey registers support for OAuth key resolution
|
||||||
|
// if it's not disabled via the ts_omit_oauthkey build tag.
|
||||||
|
// Currently (2025-09-19), tailscaled does not need OAuth key
|
||||||
|
// resolution, only the CLI and tsnet do, so this package is
|
||||||
|
// pulled out separately to avoid linking OAuth packages into
|
||||||
|
// tailscaled.
|
||||||
|
package oauthkey
|
||||||
@ -0,0 +1,8 @@
|
|||||||
|
// Copyright (c) Tailscale Inc & AUTHORS
|
||||||
|
// SPDX-License-Identifier: BSD-3-Clause
|
||||||
|
|
||||||
|
//go:build !ts_omit_oauthkey
|
||||||
|
|
||||||
|
package oauthkey
|
||||||
|
|
||||||
|
import _ "tailscale.com/feature/oauthkey"
|
||||||
@ -0,0 +1,108 @@
|
|||||||
|
// Copyright (c) Tailscale Inc & AUTHORS
|
||||||
|
// SPDX-License-Identifier: BSD-3-Clause
|
||||||
|
|
||||||
|
// Package oauthkey registers support for using OAuth client secrets to
|
||||||
|
// automatically request authkeys for logging in.
|
||||||
|
package oauthkey
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"net/url"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"golang.org/x/oauth2/clientcredentials"
|
||||||
|
"tailscale.com/feature"
|
||||||
|
"tailscale.com/internal/client/tailscale"
|
||||||
|
)
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
feature.Register("oauthkey")
|
||||||
|
tailscale.HookResolveAuthKey.Set(resolveAuthKey)
|
||||||
|
}
|
||||||
|
|
||||||
|
// resolveAuthKey either returns v unchanged (in the common case) or, if it
|
||||||
|
// starts with "tskey-client-" (as Tailscale OAuth secrets do) parses it like
|
||||||
|
//
|
||||||
|
// tskey-client-xxxx[?ephemeral=false&bar&preauthorized=BOOL&baseURL=...]
|
||||||
|
//
|
||||||
|
// and does the OAuth2 dance to get and return an authkey. The "ephemeral"
|
||||||
|
// property defaults to true if unspecified. The "preauthorized" defaults to
|
||||||
|
// false. The "baseURL" defaults to https://api.tailscale.com.
|
||||||
|
// The passed in tags are required, and must be non-empty. These will be
|
||||||
|
// set on the authkey generated by the OAuth2 dance.
|
||||||
|
func resolveAuthKey(ctx context.Context, v string, tags []string) (string, error) {
|
||||||
|
if !strings.HasPrefix(v, "tskey-client-") {
|
||||||
|
return v, nil
|
||||||
|
}
|
||||||
|
if len(tags) == 0 {
|
||||||
|
return "", errors.New("oauth authkeys require --advertise-tags")
|
||||||
|
}
|
||||||
|
|
||||||
|
clientSecret, named, _ := strings.Cut(v, "?")
|
||||||
|
attrs, err := url.ParseQuery(named)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
for k := range attrs {
|
||||||
|
switch k {
|
||||||
|
case "ephemeral", "preauthorized", "baseURL":
|
||||||
|
default:
|
||||||
|
return "", fmt.Errorf("unknown attribute %q", k)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
getBool := func(name string, def bool) (bool, error) {
|
||||||
|
v := attrs.Get(name)
|
||||||
|
if v == "" {
|
||||||
|
return def, nil
|
||||||
|
}
|
||||||
|
ret, err := strconv.ParseBool(v)
|
||||||
|
if err != nil {
|
||||||
|
return false, fmt.Errorf("invalid attribute boolean attribute %s value %q", name, v)
|
||||||
|
}
|
||||||
|
return ret, nil
|
||||||
|
}
|
||||||
|
ephemeral, err := getBool("ephemeral", true)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
preauth, err := getBool("preauthorized", false)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
baseURL := "https://api.tailscale.com"
|
||||||
|
if v := attrs.Get("baseURL"); v != "" {
|
||||||
|
baseURL = v
|
||||||
|
}
|
||||||
|
|
||||||
|
credentials := clientcredentials.Config{
|
||||||
|
ClientID: "some-client-id", // ignored
|
||||||
|
ClientSecret: clientSecret,
|
||||||
|
TokenURL: baseURL + "/api/v2/oauth/token",
|
||||||
|
}
|
||||||
|
|
||||||
|
tsClient := tailscale.NewClient("-", nil)
|
||||||
|
tsClient.UserAgent = "tailscale-cli"
|
||||||
|
tsClient.HTTPClient = credentials.Client(ctx)
|
||||||
|
tsClient.BaseURL = baseURL
|
||||||
|
|
||||||
|
caps := tailscale.KeyCapabilities{
|
||||||
|
Devices: tailscale.KeyDeviceCapabilities{
|
||||||
|
Create: tailscale.KeyDeviceCreateCapabilities{
|
||||||
|
Reusable: false,
|
||||||
|
Ephemeral: ephemeral,
|
||||||
|
Preauthorized: preauth,
|
||||||
|
Tags: tags,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
authkey, _, err := tsClient.CreateKey(ctx, caps)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
return authkey, nil
|
||||||
|
}
|
||||||
@ -0,0 +1,20 @@
|
|||||||
|
// Copyright (c) Tailscale Inc & AUTHORS
|
||||||
|
// SPDX-License-Identifier: BSD-3-Clause
|
||||||
|
|
||||||
|
package tailscale
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
|
"tailscale.com/feature"
|
||||||
|
)
|
||||||
|
|
||||||
|
// HookResolveAuthKey resolves to [oauthkey.ResolveAuthKey] when the
|
||||||
|
// corresponding feature tag is enabled in the build process.
|
||||||
|
//
|
||||||
|
// authKey is a standard device auth key or an OAuth client secret to
|
||||||
|
// resolve into an auth key.
|
||||||
|
// tags is the list of tags being advertised by the client (required to be
|
||||||
|
// provided for the OAuth secret case, and required to be the same as the
|
||||||
|
// list of tags for which the OAuth secret is allowed to issue auth keys).
|
||||||
|
var HookResolveAuthKey feature.Hook[func(ctx context.Context, authKey string, tags []string) (string, error)]
|
||||||
Loading…
Reference in New Issue