gitops-pusher.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449
  1. // Copyright (c) Tailscale Inc & AUTHORS
  2. // SPDX-License-Identifier: BSD-3-Clause
  3. // Command gitops-pusher allows users to use a GitOps flow for managing Tailscale ACLs.
  4. //
  5. // See README.md for more details.
  6. package main
  7. import (
  8. "bytes"
  9. "context"
  10. "crypto/sha256"
  11. "encoding/json"
  12. "flag"
  13. "fmt"
  14. "io"
  15. "log"
  16. "net/http"
  17. "os"
  18. "regexp"
  19. "strings"
  20. "sync"
  21. "time"
  22. "github.com/peterbourgon/ff/v3/ffcli"
  23. "github.com/tailscale/hujson"
  24. "golang.org/x/oauth2/clientcredentials"
  25. tsclient "tailscale.com/client/tailscale"
  26. _ "tailscale.com/feature/condregister/identityfederation"
  27. "tailscale.com/internal/client/tailscale"
  28. "tailscale.com/util/httpm"
  29. )
  30. var (
  31. rootFlagSet = flag.NewFlagSet("gitops-pusher", flag.ExitOnError)
  32. policyFname = rootFlagSet.String("policy-file", "./policy.hujson", "filename for policy file")
  33. cacheFname = rootFlagSet.String("cache-file", "./version-cache.json", "filename for the previous known version hash")
  34. timeout = rootFlagSet.Duration("timeout", 5*time.Minute, "timeout for the entire CI run")
  35. githubSyntax = rootFlagSet.Bool("github-syntax", true, "use GitHub Action error syntax (https://docs.github.com/en/actions/using-workflows/workflow-commands-for-github-actions#setting-an-error-message)")
  36. apiServer = rootFlagSet.String("api-server", "api.tailscale.com", "API server to contact")
  37. failOnManualEdits = rootFlagSet.Bool("fail-on-manual-edits", false, "fail if manual edits to the ACLs in the admin panel are detected; when set to false (the default) only a warning is printed")
  38. )
  39. var (
  40. getCredentialsOnce sync.Once
  41. client *http.Client
  42. apiKey string
  43. )
  44. func modifiedExternallyError() error {
  45. if *githubSyntax {
  46. return fmt.Errorf("::warning file=%s,line=1,col=1,title=Policy File Modified Externally::The policy file was modified externally in the admin console.", *policyFname)
  47. } else {
  48. return fmt.Errorf("The policy file was modified externally in the admin console.")
  49. }
  50. }
  51. func apply(cache *Cache, tailnet string) func(context.Context, []string) error {
  52. return func(ctx context.Context, args []string) error {
  53. controlEtag, err := getACLETag(ctx, tailnet)
  54. if err != nil {
  55. return err
  56. }
  57. localEtag, err := sumFile(*policyFname)
  58. if err != nil {
  59. return err
  60. }
  61. if cache.PrevETag == "" {
  62. log.Println("no previous etag found, assuming the latest control etag")
  63. cache.PrevETag = controlEtag
  64. }
  65. log.Printf("control: %s", controlEtag)
  66. log.Printf("local: %s", localEtag)
  67. log.Printf("cache: %s", cache.PrevETag)
  68. if controlEtag == localEtag {
  69. cache.PrevETag = localEtag
  70. log.Println("no update needed, doing nothing")
  71. return nil
  72. }
  73. if cache.PrevETag != controlEtag {
  74. if err := modifiedExternallyError(); err != nil {
  75. if *failOnManualEdits {
  76. return err
  77. } else {
  78. fmt.Println(err)
  79. }
  80. }
  81. }
  82. if err := applyNewACL(ctx, tailnet, *policyFname, controlEtag); err != nil {
  83. return err
  84. }
  85. cache.PrevETag = localEtag
  86. return nil
  87. }
  88. }
  89. func test(cache *Cache, tailnet string) func(context.Context, []string) error {
  90. return func(ctx context.Context, args []string) error {
  91. controlEtag, err := getACLETag(ctx, tailnet)
  92. if err != nil {
  93. return err
  94. }
  95. localEtag, err := sumFile(*policyFname)
  96. if err != nil {
  97. return err
  98. }
  99. if cache.PrevETag == "" {
  100. log.Println("no previous etag found, assuming the latest control etag")
  101. cache.PrevETag = controlEtag
  102. }
  103. log.Printf("control: %s", controlEtag)
  104. log.Printf("local: %s", localEtag)
  105. log.Printf("cache: %s", cache.PrevETag)
  106. if controlEtag == localEtag {
  107. log.Println("no updates found, doing nothing")
  108. return nil
  109. }
  110. if cache.PrevETag != controlEtag {
  111. if err := modifiedExternallyError(); err != nil {
  112. if *failOnManualEdits {
  113. return err
  114. } else {
  115. fmt.Println(err)
  116. }
  117. }
  118. }
  119. if err := testNewACLs(ctx, tailnet, *policyFname); err != nil {
  120. return err
  121. }
  122. return nil
  123. }
  124. }
  125. func getChecksums(cache *Cache, tailnet string) func(context.Context, []string) error {
  126. return func(ctx context.Context, args []string) error {
  127. controlEtag, err := getACLETag(ctx, tailnet)
  128. if err != nil {
  129. return err
  130. }
  131. localEtag, err := sumFile(*policyFname)
  132. if err != nil {
  133. return err
  134. }
  135. if cache.PrevETag == "" {
  136. log.Println("no previous etag found, assuming control etag")
  137. cache.PrevETag = Shuck(controlEtag)
  138. }
  139. log.Printf("control: %s", controlEtag)
  140. log.Printf("local: %s", localEtag)
  141. log.Printf("cache: %s", cache.PrevETag)
  142. return nil
  143. }
  144. }
  145. func main() {
  146. tailnet, ok := os.LookupEnv("TS_TAILNET")
  147. if !ok {
  148. log.Fatal("set envvar TS_TAILNET to your tailnet's name")
  149. }
  150. cache, err := LoadCache(*cacheFname)
  151. if err != nil {
  152. if os.IsNotExist(err) {
  153. cache = &Cache{}
  154. } else {
  155. log.Fatalf("error loading cache: %v", err)
  156. }
  157. }
  158. defer cache.Save(*cacheFname)
  159. applyCmd := &ffcli.Command{
  160. Name: "apply",
  161. ShortUsage: "gitops-pusher [options] apply",
  162. ShortHelp: "Pushes changes to CONTROL",
  163. LongHelp: `Pushes changes to CONTROL`,
  164. Exec: apply(cache, tailnet),
  165. }
  166. testCmd := &ffcli.Command{
  167. Name: "test",
  168. ShortUsage: "gitops-pusher [options] test",
  169. ShortHelp: "Tests ACL changes",
  170. LongHelp: "Tests ACL changes",
  171. Exec: test(cache, tailnet),
  172. }
  173. cksumCmd := &ffcli.Command{
  174. Name: "checksum",
  175. ShortUsage: "Shows checksums of ACL files",
  176. ShortHelp: "Fetch checksum of CONTROL's ACL and the local ACL for comparison",
  177. LongHelp: "Fetch checksum of CONTROL's ACL and the local ACL for comparison",
  178. Exec: getChecksums(cache, tailnet),
  179. }
  180. root := &ffcli.Command{
  181. ShortUsage: "gitops-pusher [options] <command>",
  182. ShortHelp: "Push Tailscale ACLs to CONTROL using a GitOps workflow",
  183. Subcommands: []*ffcli.Command{applyCmd, cksumCmd, testCmd},
  184. FlagSet: rootFlagSet,
  185. }
  186. if err := root.Parse(os.Args[1:]); err != nil {
  187. log.Fatal(err)
  188. }
  189. ctx, cancel := context.WithTimeout(context.Background(), *timeout)
  190. defer cancel()
  191. if err := root.Run(ctx); err != nil {
  192. fmt.Println(err)
  193. os.Exit(1)
  194. }
  195. }
  196. func getCredentials() (*http.Client, string) {
  197. getCredentialsOnce.Do(func() {
  198. apiKeyEnv, ok := os.LookupEnv("TS_API_KEY")
  199. oauthId, oiok := os.LookupEnv("TS_OAUTH_ID")
  200. oauthSecret, osok := os.LookupEnv("TS_OAUTH_SECRET")
  201. idToken, idok := os.LookupEnv("TS_ID_TOKEN")
  202. if !ok && (!oiok || (!osok && !idok)) {
  203. log.Fatal("set envvar TS_API_KEY to your Tailscale API key, TS_OAUTH_ID and TS_OAUTH_SECRET to a Tailscale OAuth ID and Secret, or TS_OAUTH_ID and TS_ID_TOKEN to a Tailscale federated identity Client ID and OIDC identity token")
  204. }
  205. if apiKeyEnv != "" && (oauthId != "" || (oauthSecret != "" && idToken != "")) {
  206. log.Fatal("set either the envvar TS_API_KEY, TS_OAUTH_ID and TS_OAUTH_SECRET, or TS_OAUTH_ID and TS_ID_TOKEN")
  207. }
  208. if oiok && ((oauthId != "" && !idok) || oauthSecret != "") {
  209. // Both should ideally be set, but if either are non-empty it means the user had an intent
  210. // to set _something_, so they should receive the oauth error flow.
  211. oauthConfig := &clientcredentials.Config{
  212. ClientID: oauthId,
  213. ClientSecret: oauthSecret,
  214. TokenURL: fmt.Sprintf("https://%s/api/v2/oauth/token", *apiServer),
  215. }
  216. client = oauthConfig.Client(context.Background())
  217. } else if idok {
  218. if exchangeJWTForToken, ok := tailscale.HookExchangeJWTForTokenViaWIF.GetOk(); ok {
  219. var err error
  220. apiKeyEnv, err = exchangeJWTForToken(context.Background(), fmt.Sprintf("https://%s", *apiServer), oauthId, idToken)
  221. if err != nil {
  222. log.Fatal(err)
  223. }
  224. }
  225. client = http.DefaultClient
  226. } else {
  227. client = http.DefaultClient
  228. }
  229. apiKey = apiKeyEnv
  230. })
  231. return client, apiKey
  232. }
  233. func sumFile(fname string) (string, error) {
  234. data, err := os.ReadFile(fname)
  235. if err != nil {
  236. return "", err
  237. }
  238. formatted, err := hujson.Format(data)
  239. if err != nil {
  240. return "", err
  241. }
  242. h := sha256.New()
  243. _, err = h.Write(formatted)
  244. if err != nil {
  245. return "", err
  246. }
  247. return fmt.Sprintf("%x", h.Sum(nil)), nil
  248. }
  249. func applyNewACL(ctx context.Context, tailnet, policyFname, oldEtag string) error {
  250. client, apiKey := getCredentials()
  251. fin, err := os.Open(policyFname)
  252. if err != nil {
  253. return err
  254. }
  255. defer fin.Close()
  256. req, err := http.NewRequestWithContext(ctx, httpm.POST, fmt.Sprintf("https://%s/api/v2/tailnet/%s/acl", *apiServer, tailnet), fin)
  257. if err != nil {
  258. return err
  259. }
  260. req.SetBasicAuth(apiKey, "")
  261. req.Header.Set("Content-Type", "application/hujson")
  262. req.Header.Set("If-Match", `"`+oldEtag+`"`)
  263. resp, err := client.Do(req)
  264. if err != nil {
  265. return err
  266. }
  267. defer resp.Body.Close()
  268. got := resp.StatusCode
  269. want := http.StatusOK
  270. if got != want {
  271. var ate ACLGitopsTestError
  272. err := json.NewDecoder(resp.Body).Decode(&ate)
  273. if err != nil {
  274. return err
  275. }
  276. return ate
  277. }
  278. return nil
  279. }
  280. func testNewACLs(ctx context.Context, tailnet, policyFname string) error {
  281. client, apiKey := getCredentials()
  282. data, err := os.ReadFile(policyFname)
  283. if err != nil {
  284. return err
  285. }
  286. data, err = hujson.Standardize(data)
  287. if err != nil {
  288. return err
  289. }
  290. req, err := http.NewRequestWithContext(ctx, httpm.POST, fmt.Sprintf("https://%s/api/v2/tailnet/%s/acl/validate", *apiServer, tailnet), bytes.NewBuffer(data))
  291. if err != nil {
  292. return err
  293. }
  294. req.SetBasicAuth(apiKey, "")
  295. req.Header.Set("Content-Type", "application/hujson")
  296. resp, err := client.Do(req)
  297. if err != nil {
  298. return err
  299. }
  300. defer resp.Body.Close()
  301. var ate ACLGitopsTestError
  302. err = json.NewDecoder(resp.Body).Decode(&ate)
  303. if err != nil {
  304. return err
  305. }
  306. if len(ate.Message) != 0 || len(ate.Data) != 0 {
  307. return ate
  308. }
  309. got := resp.StatusCode
  310. want := http.StatusOK
  311. if got != want {
  312. return fmt.Errorf("wanted HTTP status code %d but got %d", want, got)
  313. }
  314. return nil
  315. }
  316. var lineColMessageSplit = regexp.MustCompile(`line ([0-9]+), column ([0-9]+): (.*)$`)
  317. // ACLGitopsTestError is redefined here so we can add a custom .Error() response
  318. type ACLGitopsTestError struct {
  319. tsclient.ACLTestError
  320. }
  321. func (ate ACLGitopsTestError) Error() string {
  322. var sb strings.Builder
  323. if *githubSyntax && lineColMessageSplit.MatchString(ate.Message) {
  324. sp := lineColMessageSplit.FindStringSubmatch(ate.Message)
  325. line := sp[1]
  326. col := sp[2]
  327. msg := sp[3]
  328. fmt.Fprintf(&sb, "::error file=%s,line=%s,col=%s::%s", *policyFname, line, col, msg)
  329. } else {
  330. fmt.Fprintln(&sb, ate.Message)
  331. }
  332. fmt.Fprintln(&sb)
  333. for _, data := range ate.Data {
  334. if data.User != "" {
  335. fmt.Fprintf(&sb, "For user %s:\n", data.User)
  336. }
  337. if len(data.Errors) > 0 {
  338. fmt.Fprint(&sb, "Errors found:\n")
  339. for _, err := range data.Errors {
  340. fmt.Fprintf(&sb, "- %s\n", err)
  341. }
  342. }
  343. if len(data.Warnings) > 0 {
  344. fmt.Fprint(&sb, "Warnings found:\n")
  345. for _, err := range data.Warnings {
  346. fmt.Fprintf(&sb, "- %s\n", err)
  347. }
  348. }
  349. }
  350. return sb.String()
  351. }
  352. func getACLETag(ctx context.Context, tailnet string) (string, error) {
  353. client, apiKey := getCredentials()
  354. req, err := http.NewRequestWithContext(ctx, httpm.GET, fmt.Sprintf("https://%s/api/v2/tailnet/%s/acl", *apiServer, tailnet), nil)
  355. if err != nil {
  356. return "", err
  357. }
  358. req.SetBasicAuth(apiKey, "")
  359. req.Header.Set("Accept", "application/hujson")
  360. resp, err := client.Do(req)
  361. if err != nil {
  362. return "", err
  363. }
  364. defer resp.Body.Close()
  365. got := resp.StatusCode
  366. want := http.StatusOK
  367. if got != want {
  368. errorDetails, _ := io.ReadAll(resp.Body)
  369. return "", fmt.Errorf("wanted HTTP status code %d but got %d: %#q", want, got, string(errorDetails))
  370. }
  371. return Shuck(resp.Header.Get("ETag")), nil
  372. }