X-Git-Url: https://iankelling.org/git/?a=blobdiff_plain;f=vpn-mk-client-cert;h=59ddda55cc5cc5959d2d68273d85f7ae5d81e415;hb=aa9be22d2798d15580907238cfdbf8f3ffd7364d;hp=306cb22fdb004d06cfd515edbd8e07042144b83d;hpb=beeb3f8f469421f9b926ab6b5763a099086c6f2b;p=vpn-setup diff --git a/vpn-mk-client-cert b/vpn-mk-client-cert index 306cb22..59ddda5 100755 --- a/vpn-mk-client-cert +++ b/vpn-mk-client-cert @@ -13,56 +13,176 @@ # See the License for the specific language governing permissions and # limitations under the License. -# usage: $0 SERVER_HOST [DEST_HOST] -# ssh to SERVER_HOST, create a cert & client config, put it on -# DEST_HOST, or localhost by default. Assumes server was setup -# by the other script in this dir. - set -eE -o pipefail trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?" >&2' ERR [[ $EUID == 0 ]] || exec sudo -E "$BASH_SOURCE" "$@" +readonly this_file="$(readlink -f -- "${BASH_SOURCE[0]}")"; cd "${this_file%/*}" + + usage() { - cat <= 1)) || usage 1 -host=$1 +####### begin command line parsing and checking ############## + shell="bash -c" -if [[ $2 ]]; then - shell="ssh $2" +name=client +client_host=$CLIENT_HOST +force=false + +temp=$(getopt -l help hb:c:fn:o:s: "$@") || usage 1 +eval set -- "$temp" +while true; do + case $1 in + -b) common_name="$2"; shift 2 ;; + -c) client_host=$2; shell="ssh root@$client_host"; shift 2 ;; + -f) force=true; shift ;; + -n) name="$2"; shift 2 ;; + -o) server_name="$2"; shift 2 ;; + -s) script="$2"; shift 2 ;; + -h|--help) usage ;; + --) shift; break ;; + *) echo "$0: Internal error! unexpected args: $*" ; exit 1 ;; + esac +done + +if [[ ! $server_name ]]; then + server_name="$name" +fi + +if [[ ! $common_name ]]; then + if [[ $client_host ]]; then + common_name=$client_host + else + common_name=$HOSTNAME + fi +fi + +host=$1 +[[ $host ]] || usage 1 + +####### end command line parsing and checking ############## + + +f=/etc/openvpn/client/$name.crt + +cert_to_test=$f +if [[ $client_host ]]; then + cert_to_test=$(mktemp) + ssh root@$client_host cat $f 2>/dev/null >$cert_to_test ||: fi +if ! $force && openssl x509 -checkend $(( 60 * 60 * 24 * 30 )) -noout -in $cert_to_test &>/dev/null; then + echo "$0: cert already exists. exiting early" + exit 0 +fi + # bash or else we get motd spam. note sleep 2, sleep 1 failed. -ssh $host bash </dev/null +$shell '[[ -e /etc/openvpn ]] || apt install openvpn' +if ! ssh root@$host bash -s -- $server_name $common_name < client-cert-helper \ + | $shell 'id -u | grep -xF 0 || s=sudo; $s tar xzv -C /etc/openvpn/client'; then + echo ssh root@$host cat /tmp/vpn-mk-client-cert.log: + ssh root@$host cat /tmp/vpn-mk-client-cert.log + echo EOF for root@$host:/tmp/vpn-mk-client-cert.log + exit 1 +fi + +port=$(echo '/^port/ {print $2}' | ssh root@$host awk -f - /etc/openvpn/server/$name.conf | tail -n1) -# uuidgen because common name must be unique -{ echo -e '\n\n\n\n\n'\$(uuidgen)'\n\n\n\n\n'; sleep 2; echo -e 'y\ny\n'; } | ./build-key client &>/dev/null -d=\$(mktemp -d) -cp /etc/openvpn/easy-rsa/keys/ca.crt \ - /etc/openvpn/update-resolv-conf \ - /usr/share/doc/openvpn/examples/sample-config-files/client.conf \$d -mv /etc/openvpn/easy-rsa/keys/client.{crt,key} \$d +if ! $shell "test -s $f"; then + # if common name is not unique, you get empty file. and if we didn't silence + # build-key, you'd see an error "TXT_DB error number 2" + echo "$0: error: $f is empty or otherwise bad. is this common name unique?" + exit 1 +fi -sed -i --follow-symlinks "s/^remote .*/remote $host 1194/" \$d/client.conf +$shell "dd of=/etc/openvpn/client/$name.conf" <