| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425 |
- // Copyright (c) Tailscale Inc & AUTHORS
- // SPDX-License-Identifier: BSD-3-Clause
- // Package tsweb contains code used in various Tailscale webservers.
- package tsweb
- import (
- "bufio"
- "bytes"
- "context"
- "errors"
- "expvar"
- "fmt"
- "net"
- "net/http"
- _ "net/http/pprof"
- "net/netip"
- "os"
- "path/filepath"
- "strconv"
- "strings"
- "sync"
- "time"
- "go4.org/mem"
- "tailscale.com/envknob"
- "tailscale.com/net/tsaddr"
- "tailscale.com/tsweb/varz"
- "tailscale.com/types/logger"
- "tailscale.com/util/cmpx"
- "tailscale.com/util/vizerror"
- )
- // DevMode controls whether extra output in shown, for when the binary is being run in dev mode.
- var DevMode bool
- func DefaultCertDir(leafDir string) string {
- cacheDir, err := os.UserCacheDir()
- if err == nil {
- return filepath.Join(cacheDir, "tailscale", leafDir)
- }
- return ""
- }
- // IsProd443 reports whether addr is a Go listen address for port 443.
- func IsProd443(addr string) bool {
- _, port, _ := net.SplitHostPort(addr)
- return port == "443" || port == "https"
- }
- // AllowDebugAccess reports whether r should be permitted to access
- // various debug endpoints.
- func AllowDebugAccess(r *http.Request) bool {
- if r.Header.Get("X-Forwarded-For") != "" {
- // TODO if/when needed. For now, conservative:
- return false
- }
- ipStr, _, err := net.SplitHostPort(r.RemoteAddr)
- if err != nil {
- return false
- }
- ip, err := netip.ParseAddr(ipStr)
- if err != nil {
- return false
- }
- if tsaddr.IsTailscaleIP(ip) || ip.IsLoopback() || ipStr == envknob.String("TS_ALLOW_DEBUG_IP") {
- return true
- }
- if r.Method == "GET" {
- urlKey := r.FormValue("debugkey")
- keyPath := envknob.String("TS_DEBUG_KEY_PATH")
- if urlKey != "" && keyPath != "" {
- slurp, err := os.ReadFile(keyPath)
- if err == nil && string(bytes.TrimSpace(slurp)) == urlKey {
- return true
- }
- }
- }
- return false
- }
- // AcceptsEncoding reports whether r accepts the named encoding
- // ("gzip", "br", etc).
- func AcceptsEncoding(r *http.Request, enc string) bool {
- h := r.Header.Get("Accept-Encoding")
- if h == "" {
- return false
- }
- if !strings.Contains(h, enc) && !mem.ContainsFold(mem.S(h), mem.S(enc)) {
- return false
- }
- remain := h
- for len(remain) > 0 {
- var part string
- part, remain, _ = strings.Cut(remain, ",")
- part = strings.TrimSpace(part)
- part, _, _ = strings.Cut(part, ";")
- if part == enc {
- return true
- }
- }
- return false
- }
- // Protected wraps a provided debug handler, h, returning a Handler
- // that enforces AllowDebugAccess and returns forbidden replies for
- // unauthorized requests.
- func Protected(h http.Handler) http.Handler {
- return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
- if !AllowDebugAccess(r) {
- msg := "debug access denied"
- if DevMode {
- ipStr, _, _ := net.SplitHostPort(r.RemoteAddr)
- msg += fmt.Sprintf("; to permit access, set TS_ALLOW_DEBUG_IP=%v", ipStr)
- }
- http.Error(w, msg, http.StatusForbidden)
- return
- }
- h.ServeHTTP(w, r)
- })
- }
- // Port80Handler is the handler to be given to
- // autocert.Manager.HTTPHandler. The inner handler is the mux
- // returned by NewMux containing registered /debug handlers.
- type Port80Handler struct {
- Main http.Handler
- // FQDN is used to redirect incoming requests to https://<FQDN>.
- // If it is not set, the hostname is calculated from the incoming
- // request.
- FQDN string
- }
- func (h Port80Handler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
- path := r.RequestURI
- if path == "/debug" || strings.HasPrefix(path, "/debug") {
- h.Main.ServeHTTP(w, r)
- return
- }
- if r.Method != "GET" && r.Method != "HEAD" {
- http.Error(w, "Use HTTPS", http.StatusBadRequest)
- return
- }
- if path == "/" && AllowDebugAccess(r) {
- // Redirect authorized user to the debug handler.
- path = "/debug/"
- }
- host := cmpx.Or(h.FQDN, r.Host)
- target := "https://" + host + path
- http.Redirect(w, r, target, http.StatusFound)
- }
- // ReturnHandler is like net/http.Handler, but the handler can return an
- // error instead of writing to its ResponseWriter.
- type ReturnHandler interface {
- // ServeHTTPReturn is like http.Handler.ServeHTTP, except that
- // it can choose to return an error instead of writing to its
- // http.ResponseWriter.
- //
- // If ServeHTTPReturn returns an error, it caller should handle
- // an error by serving an HTTP 500 response to the user. The
- // error details should not be sent to the client, as they may
- // contain sensitive information. If the error is an
- // HTTPError, though, callers should use the HTTP response
- // code and message as the response to the client.
- ServeHTTPReturn(http.ResponseWriter, *http.Request) error
- }
- type HandlerOptions struct {
- QuietLoggingIfSuccessful bool // if set, do not log successfully handled HTTP requests (200 and 304 status codes)
- Logf logger.Logf
- Now func() time.Time // if nil, defaults to time.Now
- // If non-nil, StatusCodeCounters maintains counters
- // of status codes for handled responses.
- // The keys are "1xx", "2xx", "3xx", "4xx", and "5xx".
- StatusCodeCounters *expvar.Map
- // If non-nil, StatusCodeCountersFull maintains counters of status
- // codes for handled responses.
- // The keys are HTTP numeric response codes e.g. 200, 404, ...
- StatusCodeCountersFull *expvar.Map
- // OnError is called if the handler returned a HTTPError. This
- // is intended to be used to present pretty error pages if
- // the user agent is determined to be a browser.
- OnError ErrorHandlerFunc
- }
- // ErrorHandlerFunc is called to present a error response.
- type ErrorHandlerFunc func(http.ResponseWriter, *http.Request, HTTPError)
- // ReturnHandlerFunc is an adapter to allow the use of ordinary
- // functions as ReturnHandlers. If f is a function with the
- // appropriate signature, ReturnHandlerFunc(f) is a ReturnHandler that
- // calls f.
- type ReturnHandlerFunc func(http.ResponseWriter, *http.Request) error
- // ServeHTTPReturn calls f(w, r).
- func (f ReturnHandlerFunc) ServeHTTPReturn(w http.ResponseWriter, r *http.Request) error {
- return f(w, r)
- }
- // StdHandler converts a ReturnHandler into a standard http.Handler.
- // Handled requests are logged using opts.Logf, as are any errors.
- // Errors are handled as specified by the Handler interface.
- func StdHandler(h ReturnHandler, opts HandlerOptions) http.Handler {
- if opts.Now == nil {
- opts.Now = time.Now
- }
- if opts.Logf == nil {
- opts.Logf = logger.Discard
- }
- return retHandler{h, opts}
- }
- // retHandler is an http.Handler that wraps a Handler and handles errors.
- type retHandler struct {
- rh ReturnHandler
- opts HandlerOptions
- }
- // ServeHTTP implements the http.Handler interface.
- func (h retHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
- msg := AccessLogRecord{
- When: h.opts.Now(),
- RemoteAddr: r.RemoteAddr,
- Proto: r.Proto,
- TLS: r.TLS != nil,
- Host: r.Host,
- Method: r.Method,
- RequestURI: r.URL.RequestURI(),
- UserAgent: r.UserAgent(),
- Referer: r.Referer(),
- }
- lw := &loggingResponseWriter{ResponseWriter: w, logf: h.opts.Logf}
- err := h.rh.ServeHTTPReturn(lw, r)
- var hErr HTTPError
- var hErrOK bool
- if errors.As(err, &hErr) {
- hErrOK = true
- } else if vizErr, ok := vizerror.As(err); ok {
- hErrOK = true
- hErr = HTTPError{Msg: vizErr.Error()}
- }
- if lw.code == 0 && err == nil && !lw.hijacked {
- // If the handler didn't write and didn't send a header, that still means 200.
- // (See https://play.golang.org/p/4P7nx_Tap7p)
- lw.code = 200
- }
- msg.Seconds = h.opts.Now().Sub(msg.When).Seconds()
- msg.Code = lw.code
- msg.Bytes = lw.bytes
- switch {
- case lw.hijacked:
- // Connection no longer belongs to us, just log that we
- // switched protocols away from HTTP.
- if msg.Code == 0 {
- msg.Code = http.StatusSwitchingProtocols
- }
- case err != nil && r.Context().Err() == context.Canceled:
- msg.Code = 499 // nginx convention: Client Closed Request
- msg.Err = context.Canceled.Error()
- case hErrOK:
- // Handler asked us to send an error. Do so, if we haven't
- // already sent a response.
- msg.Err = hErr.Msg
- if hErr.Err != nil {
- if msg.Err == "" {
- msg.Err = hErr.Err.Error()
- } else {
- msg.Err = msg.Err + ": " + hErr.Err.Error()
- }
- }
- if lw.code != 0 {
- h.opts.Logf("[unexpected] handler returned HTTPError %v, but already sent a response with code %d", hErr, lw.code)
- break
- }
- msg.Code = hErr.Code
- if msg.Code == 0 {
- h.opts.Logf("[unexpected] HTTPError %v did not contain an HTTP status code, sending internal server error", hErr)
- msg.Code = http.StatusInternalServerError
- }
- if h.opts.OnError != nil {
- h.opts.OnError(lw, r, hErr)
- } else {
- // Default headers set by http.Error.
- lw.Header().Set("Content-Type", "text/plain; charset=utf-8")
- lw.Header().Set("X-Content-Type-Options", "nosniff")
- for k, vs := range hErr.Header {
- lw.Header()[k] = vs
- }
- lw.WriteHeader(msg.Code)
- fmt.Fprintln(lw, hErr.Msg)
- }
- case err != nil:
- // Handler returned a generic error. Serve an internal server
- // error, if necessary.
- msg.Err = err.Error()
- if lw.code == 0 {
- msg.Code = http.StatusInternalServerError
- http.Error(lw, "internal server error", msg.Code)
- }
- }
- if !h.opts.QuietLoggingIfSuccessful || (msg.Code != http.StatusOK && msg.Code != http.StatusNotModified) {
- h.opts.Logf("%s", msg)
- }
- if h.opts.StatusCodeCounters != nil {
- h.opts.StatusCodeCounters.Add(responseCodeString(msg.Code/100), 1)
- }
- if h.opts.StatusCodeCountersFull != nil {
- h.opts.StatusCodeCountersFull.Add(responseCodeString(msg.Code), 1)
- }
- }
- func responseCodeString(code int) string {
- if v, ok := responseCodeCache.Load(code); ok {
- return v.(string)
- }
- var ret string
- if code < 10 {
- ret = fmt.Sprintf("%dxx", code)
- } else {
- ret = strconv.Itoa(code)
- }
- responseCodeCache.Store(code, ret)
- return ret
- }
- // responseCodeCache memoizes the string form of HTTP response codes,
- // so that the hot request-handling codepath doesn't have to allocate
- // in strconv/fmt for every request.
- //
- // Keys are either full HTTP response code ints (200, 404) or "family"
- // ints representing entire families (e.g. 2 for 2xx codes). Values
- // are the string form of that code/family.
- var responseCodeCache sync.Map
- // loggingResponseWriter wraps a ResponseWriter and record the HTTP
- // response code that gets sent, if any.
- type loggingResponseWriter struct {
- http.ResponseWriter
- code int
- bytes int
- hijacked bool
- logf logger.Logf
- }
- // WriteHeader implements http.Handler.
- func (l *loggingResponseWriter) WriteHeader(statusCode int) {
- if l.code != 0 {
- l.logf("[unexpected] HTTP handler set statusCode twice (%d and %d)", l.code, statusCode)
- return
- }
- l.code = statusCode
- l.ResponseWriter.WriteHeader(statusCode)
- }
- // Write implements http.Handler.
- func (l *loggingResponseWriter) Write(bs []byte) (int, error) {
- if l.code == 0 {
- l.code = 200
- }
- n, err := l.ResponseWriter.Write(bs)
- l.bytes += n
- return n, err
- }
- // Hijack implements http.Hijacker. Note that hijacking can still fail
- // because the wrapped ResponseWriter is not required to implement
- // Hijacker, as this breaks HTTP/2.
- func (l *loggingResponseWriter) Hijack() (net.Conn, *bufio.ReadWriter, error) {
- h, ok := l.ResponseWriter.(http.Hijacker)
- if !ok {
- return nil, nil, errors.New("ResponseWriter is not a Hijacker")
- }
- conn, buf, err := h.Hijack()
- if err == nil {
- l.hijacked = true
- }
- return conn, buf, err
- }
- func (l loggingResponseWriter) Flush() {
- f, _ := l.ResponseWriter.(http.Flusher)
- if f == nil {
- l.logf("[unexpected] tried to Flush a ResponseWriter that can't flush")
- return
- }
- f.Flush()
- }
- // HTTPError is an error with embedded HTTP response information.
- //
- // It is the error type to be (optionally) used by Handler.ServeHTTPReturn.
- type HTTPError struct {
- Code int // HTTP response code to send to client; 0 means 500
- Msg string // Response body to send to client
- Err error // Detailed error to log on the server
- Header http.Header // Optional set of HTTP headers to set in the response
- }
- // Error implements the error interface.
- func (e HTTPError) Error() string { return fmt.Sprintf("httperror{%d, %q, %v}", e.Code, e.Msg, e.Err) }
- func (e HTTPError) Unwrap() error { return e.Err }
- // Error returns an HTTPError containing the given information.
- func Error(code int, msg string, err error) HTTPError {
- return HTTPError{Code: code, Msg: msg, Err: err}
- }
- // VarzHandler writes expvar values as Prometheus metrics.
- // TODO: migrate all users to varz.Handler or promvarz.Handler and remove this.
- func VarzHandler(w http.ResponseWriter, r *http.Request) {
- varz.Handler(w, r)
- }
|