// Copyright (c) 2021 Tailscale Inc & AUTHORS All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package cli import ( "bytes" "context" _ "embed" "encoding/json" "flag" "fmt" "html/template" "log" "net/http" "net/http/cgi" "os/exec" "runtime" "strings" "github.com/peterbourgon/ff/v2/ffcli" "tailscale.com/client/tailscale" "tailscale.com/ipn" "tailscale.com/tailcfg" "tailscale.com/types/preftype" "tailscale.com/version/distro" ) //go:embed web.html var webHTML string var tmpl = template.Must(template.New("html").Parse(webHTML)) type tmplData struct { Profile tailcfg.UserProfile SynologyUser string Status string DeviceName string IP string } var webCmd = &ffcli.Command{ Name: "web", ShortUsage: "web [flags]", ShortHelp: "Run a web server for controlling Tailscale", FlagSet: (func() *flag.FlagSet { webf := flag.NewFlagSet("web", flag.ExitOnError) webf.StringVar(&webArgs.listen, "listen", "localhost:8088", "listen address; use port 0 for automatic") webf.BoolVar(&webArgs.cgi, "cgi", false, "run as CGI script") return webf })(), Exec: runWeb, } var webArgs struct { listen string cgi bool } func runWeb(ctx context.Context, args []string) error { if len(args) > 0 { log.Fatalf("too many non-flag arguments: %q", args) } if webArgs.cgi { return cgi.Serve(http.HandlerFunc(webHandler)) } return http.ListenAndServe(webArgs.listen, http.HandlerFunc(webHandler)) } func auth() (string, error) { if distro.Get() == distro.Synology { cmd := exec.Command("/usr/syno/synoman/webman/modules/authenticate.cgi") out, err := cmd.CombinedOutput() if err != nil { return "", fmt.Errorf("auth: %v: %s", err, out) } return string(out), nil } return "", nil } func synoTokenRedirect(w http.ResponseWriter, r *http.Request) bool { if distro.Get() != distro.Synology { return false } if r.Header.Get("X-Syno-Token") != "" { return false } if r.URL.Query().Get("SynoToken") != "" { return false } if r.Method == "POST" && r.FormValue("SynoToken") != "" { return false } // We need a SynoToken for authenticate.cgi. // So we tell the client to get one. serverURL := r.URL.Scheme + "://" + r.URL.Host fmt.Fprintf(w, synoTokenRedirectHTML, serverURL) return true } const synoTokenRedirectHTML = ` Redirecting with session token... ` const authenticationRedirectHTML = ` Redirecting...
Redirecting...
` func webHandler(w http.ResponseWriter, r *http.Request) { if synoTokenRedirect(w, r) { return } user, err := auth() if err != nil { http.Error(w, err.Error(), http.StatusForbidden) return } if r.URL.Path == "/redirect" || r.URL.Path == "/redirect/" { w.Write([]byte(authenticationRedirectHTML)) return } if r.Method == "POST" { type mi map[string]interface{} w.Header().Set("Content-Type", "application/json") url, err := tailscaleUp(r.Context()) if err != nil { json.NewEncoder(w).Encode(mi{"error": err}) return } json.NewEncoder(w).Encode(mi{"url": url}) return } st, err := tailscale.Status(r.Context()) if err != nil { http.Error(w, err.Error(), 500) return } profile := st.User[st.Self.UserID] deviceName := strings.Split(st.Self.DNSName, ".")[0] data := tmplData{ SynologyUser: user, Profile: profile, Status: st.BackendState, DeviceName: deviceName, } if len(st.TailscaleIPs) != 0 { data.IP = st.TailscaleIPs[0].String() } buf := new(bytes.Buffer) if err := tmpl.Execute(buf, data); err != nil { http.Error(w, err.Error(), 500) return } w.Write(buf.Bytes()) } // TODO(crawshaw): some of this is very similar to the code in 'tailscale up', can we share anything? func tailscaleUp(ctx context.Context) (authURL string, retErr error) { prefs := ipn.NewPrefs() prefs.ControlURL = "https://login.tailscale.com" prefs.WantRunning = true prefs.CorpDNS = true prefs.AllowSingleHosts = true prefs.ForceDaemon = (runtime.GOOS == "windows") if distro.Get() == distro.Synology { prefs.NetfilterMode = preftype.NetfilterOff } c, bc, ctx, cancel := connect(ctx) defer cancel() bc.SetPrefs(prefs) opts := ipn.Options{ StateKey: ipn.GlobalDaemonStateKey, Notify: func(n ipn.Notify) { if n.ErrMessage != nil { msg := *n.ErrMessage if msg == ipn.ErrMsgPermissionDenied { switch runtime.GOOS { case "windows": msg += " (Tailscale service in use by other user?)" default: msg += " (try 'sudo tailscale up [...]')" } } retErr = fmt.Errorf("backend error: %v", msg) cancel() } else if url := n.BrowseToURL; url != nil { authURL = *url cancel() } }, } bc.Start(opts) bc.StartLoginInteractive() pump(ctx, bc, c) if authURL == "" && retErr == nil { return "", fmt.Errorf("login failed with no backend error message") } return authURL, retErr }