X-Git-Url: https://iankelling.org/git/?p=vpn-setup;a=blobdiff_plain;f=vpn-mk-client-cert;h=f4e5762d78c52024dfad15245960599140c813a6;hp=306cb22fdb004d06cfd515edbd8e07042144b83d;hb=dbea144f7249f9c244e748ac972fd86a54ee2086;hpb=beeb3f8f469421f9b926ab6b5763a099086c6f2b diff --git a/vpn-mk-client-cert b/vpn-mk-client-cert index 306cb22..f4e5762 100755 --- a/vpn-mk-client-cert +++ b/vpn-mk-client-cert @@ -13,56 +13,147 @@ # See the License for the specific language governing permissions and # limitations under the License. -# usage: $0 SERVER_HOST [DEST_HOST] -# ssh to SERVER_HOST, create a cert & client config, put it on -# DEST_HOST, or localhost by default. Assumes server was setup -# by the other script in this dir. - set -eE -o pipefail trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?" >&2' ERR [[ $EUID == 0 ]] || exec sudo -E "$BASH_SOURCE" "$@" +readonly this_file="$(readlink -f -- "${BASH_SOURCE[0]}")"; cd "${this_file%/*}" + + usage() { - cat <= 1)) || usage 1 -host=$1 +####### begin command line parsing and checking ############## + shell="bash -c" -if [[ $2 ]]; then - shell="ssh $2" +name=client +custom_script=false +script=/etc/openvpn/update-resolv-conf +client_host=$CLIENT_HOST + +temp=$(getopt -l help hb:c:n:s: "$@") || usage 1 +eval set -- "$temp" +while true; do + case $1 in + -b) common_name="$2"; shift 2 ;; + -c) client_host=$2; shell="ssh root@$client_host"; shift 2 ;; + -n) name="$2"; shift 2 ;; + -s) custom_script=true; script="$2"; shift 2 ;; + -h|--help) usage ;; + --) shift; break ;; + *) echo "$0: Internal error! unexpected args: $*" ; exit 1 ;; + esac +done + +if [[ ! $common_name ]]; then + if [[ $client_host ]]; then + common_name=$client_host + else + common_name=$HOSTNAME + fi fi -# bash or else we get motd spam. note sleep 2, sleep 1 failed. -ssh $host bash </dev/null +host=$1 +[[ $host ]] || usage 1 + +####### end command line parsing and checking ############## -# uuidgen because common name must be unique -{ echo -e '\n\n\n\n\n'\$(uuidgen)'\n\n\n\n\n'; sleep 2; echo -e 'y\ny\n'; } | ./build-key client &>/dev/null -d=\$(mktemp -d) -cp /etc/openvpn/easy-rsa/keys/ca.crt \ - /etc/openvpn/update-resolv-conf \ - /usr/share/doc/openvpn/examples/sample-config-files/client.conf \$d -mv /etc/openvpn/easy-rsa/keys/client.{crt,key} \$d +# bash or else we get motd spam. note sleep 2, sleep 1 failed. +if ! ssh root@$host bash -s -- $name $common_name < client-cert-helper \ + | $shell 'id -u | grep -xF 0 || s=sudo; $s tar xzv -C /etc/openvpn/client'; then + echo ssh root@$host cat /tmp/vpn-mk-client-cert.log: + ssh root@$host cat /tmp/vpn-mk-client-cert.log + exit 1 +fi + -sed -i --follow-symlinks "s/^remote .*/remote $host 1194/" \$d/client.conf +f=/etc/openvpn/client/$name.crt +if ! $shell "test -s $f"; then + # if common name is not unique, you get empty file. and if we didn't silence + # build-key, you'd see an error "TXT_DB error number 2" + echo "$0: error: $f is empty or otherwise bad. is this common name unique?" + exit 1 +fi -tar cz -C \$d . -rm -rf \$d +$shell "dd of=/etc/openvpn/client/$name.conf" <