|
@@ -53,146 +53,18 @@ function critical()
|
|
|
}
|
|
|
|
|
|
###################################################################################
|
|
|
-# IPv6 and route config stuff #
|
|
|
+# Cleanup #
|
|
|
###################################################################################
|
|
|
|
|
|
-has_nativeip6() {
|
|
|
- ip -6 route | grep -q "default via"
|
|
|
-}
|
|
|
-
|
|
|
-has_ip6delegatedprefix() {
|
|
|
- [ "${ynh_ip6_addr}" != none ] && [ "${ynh_ip6_addr}" != "" ]
|
|
|
-}
|
|
|
-
|
|
|
-is_ip6addr_set() {
|
|
|
- ip address show dev tun0 2> /dev/null | grep -q "${ynh_ip6_addr}/"
|
|
|
-}
|
|
|
-
|
|
|
-set_ip6addr() {
|
|
|
- info "Adding IPv6 from VPN configuration"
|
|
|
- ip address add "${ynh_ip6_addr}/128" dev tun0
|
|
|
-}
|
|
|
-
|
|
|
-unset_ip6addr() {
|
|
|
- info "Removing IPv6 from VPN configuration"
|
|
|
- ip address delete "${ynh_ip6_addr}/128" dev tun0
|
|
|
-}
|
|
|
-
|
|
|
-#
|
|
|
-# Server IPv6 route
|
|
|
-#
|
|
|
-
|
|
|
-is_serverip6route_set() {
|
|
|
- server_ip6s=${1}
|
|
|
-
|
|
|
- if [[ -z "${server_ip6s}" ]]; then
|
|
|
- return 0
|
|
|
- fi
|
|
|
-
|
|
|
- for server_ip6 in ${server_ip6s}; do
|
|
|
- if ! ip -6 route | grep -q "^${server_ip6}"; then
|
|
|
- return 1
|
|
|
- fi
|
|
|
- done
|
|
|
-}
|
|
|
-
|
|
|
-set_serverip6route() {
|
|
|
- server_ip6s=${1}
|
|
|
- ip6_gw=${2}
|
|
|
- wired_device=${3}
|
|
|
-
|
|
|
- info "Adding IPv6 server route"
|
|
|
- for server_ip6 in ${server_ip6s};
|
|
|
- do
|
|
|
- ip route add "${server_ip6}/128" via "${ip6_gw}" dev "${wired_device}"
|
|
|
- done
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
-unset_serverip6route() {
|
|
|
- server_ip6s=${1}
|
|
|
- ip6_gw=${2}
|
|
|
- wired_device=${3}
|
|
|
-
|
|
|
- info "Removing IPv6 server route"
|
|
|
- for server_ip6 in ${server_ip6s};
|
|
|
- do
|
|
|
- ip route delete "${server_ip6}/128" via "${ip6_gw}" dev "${wired_device}"
|
|
|
- done
|
|
|
-}
|
|
|
-
|
|
|
-###################################################################################
|
|
|
-# DNS rules #
|
|
|
-###################################################################################
|
|
|
-
|
|
|
-is_dns_set() {
|
|
|
- if [[ "$ynh_dns_method" == "custom" ]]
|
|
|
- then
|
|
|
-
|
|
|
- current_dns=$(grep -o -P '\s*nameserver\s+\K[abcdefabcdef\d.:]+' /etc/resolv.dnsmasq.conf | sort | uniq)
|
|
|
- wanted_dns=$(echo "${ynh_dns}" | sed 's/,/\n/g' | sort | uniq)
|
|
|
- [ -e /etc/dhcp/dhclient-exit-hooks.d/ynh-vpnclient ]\
|
|
|
- && [[ "$current_dns" == "$wanted_dns" ]]
|
|
|
- else
|
|
|
- true
|
|
|
- fi
|
|
|
-}
|
|
|
-
|
|
|
-set_dns() {
|
|
|
- info "Enforcing custom DNS resolvers from vpnclient"
|
|
|
-
|
|
|
- resolvconf=/etc/resolv.dnsmasq.conf
|
|
|
-
|
|
|
- cp -fa "${resolvconf}" "${resolvconf}.ynh"
|
|
|
- if [[ "$ynh_dns_method" == "custom" ]]
|
|
|
- then
|
|
|
- cat << EOF > /etc/dhcp/dhclient-exit-hooks.d/ynh-vpnclient
|
|
|
-echo "${ynh_dns}" | sed 's/,/\n/g' | sort | uniq | sed 's/^/nameserver /g' > ${resolvconf}
|
|
|
-EOF
|
|
|
- bash /etc/dhcp/dhclient-exit-hooks.d/ynh-vpnclient
|
|
|
+cleanup() {
|
|
|
+ local last_exit_code="$?"
|
|
|
+ if [[ "${action}" != "stop" && "${last_exit_code}" -ne 0 ]]; then
|
|
|
+ rm -f /tmp/.ynh-vpnclient-started
|
|
|
fi
|
|
|
-
|
|
|
-}
|
|
|
-
|
|
|
-unset_dns() {
|
|
|
- resolvconf=/etc/resolv.dnsmasq.conf
|
|
|
-
|
|
|
- info "Removing custom DNS resolvers from vpnclient"
|
|
|
- rm -f /etc/dhcp/dhclient-exit-hooks.d/ynh-vpnclient
|
|
|
- [ -e "${resolvconf}.ynh" ] && mv "${resolvconf}.ynh" "${resolvconf}"
|
|
|
-
|
|
|
- # FIXME : this situation happened to a user ...
|
|
|
- # We could try to force regen the dns conf
|
|
|
- # (though for now it's tightly coupled to dnsmasq)
|
|
|
- grep -q "^nameserver\s" "${resolvconf}" || error "${resolvconf} does not have any nameserver line !?"
|
|
|
-}
|
|
|
-
|
|
|
-###################################################################################
|
|
|
-# Firewall rules management #
|
|
|
-###################################################################################
|
|
|
-
|
|
|
-is_firewall_set() {
|
|
|
- wired_device=$(ip route | awk '/default via/ { print $5; }')
|
|
|
-
|
|
|
- ip6tables -w -nvL OUTPUT | grep vpnclient_out | grep -q "${wired_device}"\
|
|
|
- && iptables -w -nvL OUTPUT | grep vpnclient_out | grep -q "${wired_device}"
|
|
|
}
|
|
|
|
|
|
-set_firewall() {
|
|
|
- info "Adding vpnclient custom rules to the firewall"
|
|
|
-
|
|
|
- cp /etc/yunohost/hooks.d/{90-vpnclient.tpl,post_iptable_rules/90-vpnclient}
|
|
|
-
|
|
|
- info "Restarting yunohost firewall..."
|
|
|
- yunohost firewall reload >/dev/null && success "Firewall restarted!"
|
|
|
-}
|
|
|
-
|
|
|
-unset_firewall() {
|
|
|
- info "Cleaning vpnclient custom rules from the firewall"
|
|
|
- rm -f /etc/yunohost/hooks.d/post_iptable_rules/90-vpnclient
|
|
|
- info "Restarting yunohost firewall..."
|
|
|
- yunohost firewall reload >/dev/null && success "Firewall restarted!"
|
|
|
-}
|
|
|
+# Cleanup before exit
|
|
|
+trap cleanup 0
|
|
|
|
|
|
###################################################################################
|
|
|
# Time sync #
|
|
@@ -207,7 +79,7 @@ sync_time() {
|
|
|
# Try to get the date with an http request on the internetcube web site
|
|
|
if [ $? -ne 0 ]; then
|
|
|
info "ntp synchronization failed, falling back to curl method"
|
|
|
- http_date=$(curl --max-time 5 -sD - labriqueinter.net | grep '^Date:' | cut -d' ' -f3-6)
|
|
|
+ http_date=$(curl --max-time 5 -sD - yunohost.org | grep -i '^Date:' | cut -d' ' -f2-)
|
|
|
http_date_seconds=$(date -d "${http_date}" +%s)
|
|
|
curr_date_seconds=$(date +%s)
|
|
|
|
|
@@ -221,92 +93,12 @@ sync_time() {
|
|
|
}
|
|
|
|
|
|
###################################################################################
|
|
|
-# OpenVPN client start/stop procedures #
|
|
|
-###################################################################################
|
|
|
-
|
|
|
-is_openvpn_running() {
|
|
|
- systemctl is-active openvpn@client.service &> /dev/null
|
|
|
-}
|
|
|
-
|
|
|
-start_openvpn() {
|
|
|
-
|
|
|
- # Unset firewall to let DNS and NTP resolution works
|
|
|
- # Firewall is reset after vpn is mounted (more details on #1016)
|
|
|
- unset_firewall
|
|
|
-
|
|
|
- sync_time
|
|
|
-
|
|
|
- info "Now actually starting OpenVPN client..."
|
|
|
-
|
|
|
- if systemctl start openvpn@client.service
|
|
|
- then
|
|
|
- info "OpenVPN client started ... waiting for tun0 interface to show up"
|
|
|
- else
|
|
|
- tail -n 20 /var/log/openvpn-client.log | tee -a $LOGFILE
|
|
|
- critical "Failed to start OpenVPN :/"
|
|
|
- fi
|
|
|
-
|
|
|
- for attempt in $(seq 0 20)
|
|
|
- do
|
|
|
- sleep 1
|
|
|
- if ip link show dev tun0 &> /dev/null
|
|
|
- then
|
|
|
- success "tun0 interface is up!"
|
|
|
- return 0
|
|
|
- fi
|
|
|
- done
|
|
|
-
|
|
|
- error "Tun0 interface did not show up ... most likely an issue happening in OpenVPN client ... below is an extract of the log that might be relevant to pinpoint the issue"
|
|
|
- tail -n 20 /var/log/openvpn-client.log | tee -a $LOGFILE
|
|
|
- stop_openvpn
|
|
|
- critical "Failed to start OpenVPN client : tun0 interface did not show up"
|
|
|
-}
|
|
|
-
|
|
|
-stop_openvpn() {
|
|
|
- info "Stopping OpenVPN service"
|
|
|
- systemctl stop openvpn@client.service
|
|
|
-
|
|
|
- for attempt in $(seq 0 20)
|
|
|
- do
|
|
|
- if ip link show dev tun0 &> /dev/null
|
|
|
- then
|
|
|
- info "(Waiting for tun0 to disappear if it was up)"
|
|
|
- sleep 1
|
|
|
- fi
|
|
|
- done
|
|
|
-}
|
|
|
-
|
|
|
-###################################################################################
|
|
|
-# Yunohost settings interface #
|
|
|
-###################################################################################
|
|
|
-
|
|
|
-ynh_setting_get() {
|
|
|
- app=${1}
|
|
|
- setting=${2}
|
|
|
-
|
|
|
- grep "^${setting}:" "/etc/yunohost/apps/${app}/settings.yml" | sed s/^[^:]\\+:\\s*[\"\']\\?// | sed s/\\s*[\"\']\$//
|
|
|
- # '"
|
|
|
-}
|
|
|
-
|
|
|
-ynh_setting_set() {
|
|
|
- app=${1}
|
|
|
- setting=${2}
|
|
|
- value=${3}
|
|
|
-
|
|
|
- yunohost app setting "${app}" "${setting}" -v "${value}"
|
|
|
-}
|
|
|
-
|
|
|
-###################################################################################
|
|
|
# The actual ynh vpnclient management thing #
|
|
|
###################################################################################
|
|
|
|
|
|
-is_running() {
|
|
|
- ((has_nativeip6 && is_serverip6route_set "${new_server_ip6}") || ! has_nativeip6)\
|
|
|
- && ((has_ip6delegatedprefix && is_ip6addr_set) || ! has_ip6delegatedprefix)\
|
|
|
- && is_dns_set && is_firewall_set && is_openvpn_running
|
|
|
-}
|
|
|
-
|
|
|
check_config() {
|
|
|
+ info "Checking if configuration is valid..."
|
|
|
+
|
|
|
if [[ ! -e /etc/openvpn/keys/ca-server.crt ]]; then
|
|
|
critical "You need a CA server (you can add it through the web admin)"
|
|
|
fi
|
|
@@ -334,119 +126,92 @@ check_config() {
|
|
|
fi
|
|
|
}
|
|
|
|
|
|
-if [ "$1" != restart ]; then
|
|
|
-
|
|
|
+action=${1}
|
|
|
+if [[ "$action" != restart ]]; then
|
|
|
# Variables
|
|
|
|
|
|
info "Retrieving Yunohost settings... "
|
|
|
|
|
|
- ynh_service_enabled=$(ynh_setting_get vpnclient service_enabled)
|
|
|
- ynh_ip6_addr=$(ynh_setting_get vpnclient ip6_addr)
|
|
|
- ynh_dns_method=$(ynh_setting_get vpnclient dns_method)
|
|
|
- ynh_dns=$(ynh_setting_get vpnclient nameservers)
|
|
|
-
|
|
|
- old_ip6_gw=$(ynh_setting_get vpnclient ip6_gw)
|
|
|
- old_wired_device=$(ynh_setting_get vpnclient wired_device)
|
|
|
- old_server_ip6=$(ynh_setting_get vpnclient server_ip6)
|
|
|
-
|
|
|
- new_ip6_gw=$(ip -6 route | awk '/default via/ { print $3 }')
|
|
|
- new_wired_device=$(ip route | awk '/default via/ { print $5; }')
|
|
|
- ynh_server_names=$(grep -o -P '^\s*remote\s+\K([^\s]+)' /etc/openvpn/client.conf | sort | uniq)
|
|
|
- new_server_ip6=$(dig AAAA +short $ynh_server_names @127.0.0.1 | grep -v '\.$' | grep -v "timed out" | sort | uniq)
|
|
|
-
|
|
|
- for i in $ynh_server_names; do
|
|
|
- if [[ "${i}" =~ : ]] && [[ ! "$new_server_ip6" == *"${i}"* ]] ; then
|
|
|
- new_server_ip6+=" ${i}"
|
|
|
- fi
|
|
|
- done
|
|
|
+ ynh_service_enabled=$(yunohost app setting "vpnclient" "service_enabled")
|
|
|
|
|
|
success "Settings retrieved"
|
|
|
-
|
|
|
fi
|
|
|
|
|
|
###################################################################################
|
|
|
# Start / stop / restart / status handling #
|
|
|
###################################################################################
|
|
|
|
|
|
-case "${1}" in
|
|
|
+case "$action" in
|
|
|
|
|
|
# ########## #
|
|
|
# Starting #
|
|
|
# ########## #
|
|
|
|
|
|
start)
|
|
|
-
|
|
|
- if is_running; then
|
|
|
+ info "[vpnclient] Starting..."
|
|
|
+
|
|
|
+ if [[ -e /tmp/.ynh-vpnclient.started ]] || systemctl -q is-active openvpn@client.service; then
|
|
|
info "Service is already running"
|
|
|
exit 0
|
|
|
- elif [ "${ynh_service_enabled}" -eq 0 ]; then
|
|
|
+ elif [[ "${ynh_service_enabled}" -eq 0 ]]; then
|
|
|
warn "Service is disabled, not starting it"
|
|
|
exit 0
|
|
|
fi
|
|
|
|
|
|
- check_config
|
|
|
-
|
|
|
- info "[vpnclient] Starting..."
|
|
|
touch /tmp/.ynh-vpnclient-started
|
|
|
|
|
|
- # Run openvpn
|
|
|
- if is_openvpn_running; then
|
|
|
- info "(openvpn is already running)"
|
|
|
- else
|
|
|
- start_openvpn
|
|
|
- fi
|
|
|
-
|
|
|
- # Check old state of the server ipv6 route
|
|
|
- if [ ! -z "${old_server_ip6}" -a ! -z "${old_ip6_gw}" -a ! -z "${old_wired_device}"\
|
|
|
- -a \( "${new_server_ip6}" != "${old_server_ip6}" -o "${new_ip6_gw}" != "${old_ip6_gw}"\
|
|
|
- -o "${new_wired_device}" != "${old_wired_device}" \) ]\
|
|
|
- && is_serverip6route_set "${old_server_ip6}"
|
|
|
- then
|
|
|
- unset_serverip6route "${old_server_ip6}" "${old_ip6_gw}" "${old_wired_device}"
|
|
|
- fi
|
|
|
+ sync_time
|
|
|
+ check_config
|
|
|
|
|
|
- # Set the new server ipv6 route
|
|
|
- if has_nativeip6 && ! is_serverip6route_set "${new_server_ip6}"
|
|
|
- then
|
|
|
- set_serverip6route "${new_server_ip6}" "${new_ip6_gw}" "${new_wired_device}"
|
|
|
- fi
|
|
|
+ info "Now actually starting OpenVPN client..."
|
|
|
|
|
|
- # Set the ipv6 address
|
|
|
- if has_ip6delegatedprefix && ! is_ip6addr_set
|
|
|
- then
|
|
|
- set_ip6addr
|
|
|
+ if systemctl start openvpn@client.service; then
|
|
|
+ info "OpenVPN client started ... waiting for tun0 interface to show up"
|
|
|
+ else
|
|
|
+ tail -n 20 /var/log/openvpn-client.log | tee -a $LOGFILE
|
|
|
+ critical "Failed to start OpenVPN :/"
|
|
|
fi
|
|
|
|
|
|
- # Set host DNS resolvers
|
|
|
- if ! is_dns_set; then
|
|
|
- set_dns
|
|
|
+ has_errors=true
|
|
|
+ for attempt in $(seq 0 20); do
|
|
|
+ sleep 1
|
|
|
+ if ip link show dev tun0 &> /dev/null; then
|
|
|
+ success "tun0 interface is up!"
|
|
|
+ has_errors=false
|
|
|
+ break
|
|
|
+ fi
|
|
|
+ done
|
|
|
+
|
|
|
+ if $has_errors; then
|
|
|
+ error "Tun0 interface did not show up ... most likely an issue happening in OpenVPN client ... below is an extract of the log that might be relevant to pinpoint the issue"
|
|
|
+ tail -n 20 /var/log/openvpn-client.log | tee -a $LOGFILE
|
|
|
+ systemctl stop openvpn@client.service
|
|
|
+ critical "Failed to start OpenVPN client : tun0 interface did not show up"
|
|
|
fi
|
|
|
|
|
|
- # Set ipv6/ipv4 firewall
|
|
|
- if ! is_firewall_set; then
|
|
|
- set_firewall
|
|
|
+ info "Waiting for VPN client to be ready..."
|
|
|
+ if ! timeout 180 tail -n 0 -f /var/log/openvpn-client.log | grep -q "Initialization Sequence Completed"; then
|
|
|
+ error "The VPN client didn't complete initiliasation"
|
|
|
+ tail -n 20 /var/log/openvpn-client.log | tee -a $LOGFILE
|
|
|
+ systemctl stop openvpn@client.service
|
|
|
+ critical "Failed to start OpenVPN client"
|
|
|
fi
|
|
|
|
|
|
- # Update dynamic settings
|
|
|
- info "Saving settings..."
|
|
|
- ynh_setting_set vpnclient server_ip6 "${new_server_ip6}"
|
|
|
- ynh_setting_set vpnclient ip6_gw "${new_ip6_gw}"
|
|
|
- ynh_setting_set vpnclient wired_device "${new_wired_device}"
|
|
|
+ info "Validating that VPN is up and the server is connected to internet..."
|
|
|
|
|
|
- ipv4=$(ping -w3 -c1 ip.yunohost.org >/dev/null 2>&1 && curl --max-time 5 https://ip.yunohost.org --silent)
|
|
|
- ipv6=$(ping -w3 -c1 ip6.yunohost.org >/dev/null 2>&1 && curl --max-time 5 https://ip6.yunohost.org --silent)
|
|
|
+ ipv4=$(timeout 5 ping -w3 -c1 ip.yunohost.org >/dev/null 2>&1 && curl --max-time 5 https://ip.yunohost.org --silent)
|
|
|
+ ipv6=$(timeout 5 ping -w3 -c1 ip6.yunohost.org >/dev/null 2>&1 && curl --max-time 5 https://ip6.yunohost.org --silent)
|
|
|
|
|
|
- info "Validating that VPN is up and the server is connected to internet..."
|
|
|
if ip route get 1.2.3.4 | grep -q tun0; then
|
|
|
- if ping -c1 -w5 debian.org >/dev/null; then
|
|
|
- success "YunoHost VPN client started!"
|
|
|
- info "IPv4 address is $ipv4"
|
|
|
- info "IPv6 address is $ipv6"
|
|
|
- else
|
|
|
- critical "The VPN is up but debian.org cannot be reached, indicating that something is probably misconfigured/blocked."
|
|
|
- fi
|
|
|
+ if timeout 5 ping -c1 -w3 debian.org >/dev/null; then
|
|
|
+ success "YunoHost VPN client started!"
|
|
|
+ info "IPv4 address is $ipv4"
|
|
|
+ info "IPv6 address is $ipv6"
|
|
|
+ else
|
|
|
+ critical "The VPN is up but debian.org cannot be reached, indicating that something is probably misconfigured/blocked."
|
|
|
+ fi
|
|
|
else
|
|
|
- critical "IPv4 routes are misconfigured !?"
|
|
|
+ critical "[CRIT] IPv4 routes are misconfigured !?"
|
|
|
fi
|
|
|
;;
|
|
|
|
|
@@ -458,19 +223,17 @@ case "${1}" in
|
|
|
info "[vpnclient] Stopping..."
|
|
|
rm -f /tmp/.ynh-vpnclient-started
|
|
|
|
|
|
- if has_ip6delegatedprefix && is_ip6addr_set; then
|
|
|
- unset_ip6addr
|
|
|
- fi
|
|
|
+ if systemctl is-active -q openvpn@client.service; then
|
|
|
+ info "Stopping OpenVPN service"
|
|
|
+ systemctl stop openvpn@client.service
|
|
|
|
|
|
- if is_serverip6route_set "${old_server_ip6}"; then
|
|
|
- unset_serverip6route "${old_server_ip6}" "${old_ip6_gw}" "${old_wired_device}"
|
|
|
+ for attempt in $(seq 0 20); do
|
|
|
+ if ip link show dev tun0 &> /dev/null; then
|
|
|
+ info "(Waiting for tun0 to disappear if it was up)"
|
|
|
+ sleep 1
|
|
|
+ fi
|
|
|
+ done
|
|
|
fi
|
|
|
-
|
|
|
- is_firewall_set && unset_firewall
|
|
|
-
|
|
|
- is_dns_set && unset_dns
|
|
|
-
|
|
|
- is_openvpn_running && stop_openvpn
|
|
|
;;
|
|
|
|
|
|
# ########## #
|
|
@@ -483,80 +246,11 @@ case "${1}" in
|
|
|
;;
|
|
|
|
|
|
# ########## #
|
|
|
- # Status #
|
|
|
- # ########## #
|
|
|
-
|
|
|
- status)
|
|
|
- exitcode=0
|
|
|
-
|
|
|
- if [ "${ynh_service_enabled}" -eq 0 ]; then
|
|
|
- error "VPN Client Service disabled"
|
|
|
- exitcode=1
|
|
|
- fi
|
|
|
-
|
|
|
- info "Autodetected internet interface: ${new_wired_device} (last start: ${old_wired_device})"
|
|
|
- info "Autodetected IPv6 address for the VPN server: ${new_server_ip6} (last start: ${old_server_ip6})"
|
|
|
-
|
|
|
- if has_ip6delegatedprefix; then
|
|
|
- info "IPv6 delegated prefix found"
|
|
|
- info "IPv6 address computed from the delegated prefix: ${ynh_ip6_addr}"
|
|
|
-
|
|
|
- if is_ip6addr_set; then
|
|
|
- success "IPv6 address correctly set"
|
|
|
- else
|
|
|
- error "No IPv6 address set"
|
|
|
- exitcode=1
|
|
|
- fi
|
|
|
- else
|
|
|
- info "No IPv6 delegated prefix found"
|
|
|
- fi
|
|
|
-
|
|
|
- if has_nativeip6; then
|
|
|
- info "Native IPv6 detected"
|
|
|
- info "Autodetected native IPv6 gateway: ${new_ip6_gw} (last start: ${old_ip6_gw})"
|
|
|
-
|
|
|
- if is_serverip6route_set "${new_server_ip6}"; then
|
|
|
- success "IPv6 server route correctly set"
|
|
|
- else
|
|
|
- error "No IPv6 server route set"
|
|
|
- exitcode=1
|
|
|
- fi
|
|
|
- else
|
|
|
- info "No native IPv6 detected"
|
|
|
- info "No IPv6 server route to set"
|
|
|
- fi
|
|
|
-
|
|
|
- if is_firewall_set; then
|
|
|
- success "IPv6/IPv4 firewall set"
|
|
|
- else
|
|
|
- info "No IPv6/IPv4 firewall set"
|
|
|
- exitcode=1
|
|
|
- fi
|
|
|
-
|
|
|
- if is_dns_set; then
|
|
|
- success "Host DNS correctly set"
|
|
|
- else
|
|
|
- error "No host DNS set"
|
|
|
- exitcode=1
|
|
|
- fi
|
|
|
-
|
|
|
- if is_openvpn_running; then
|
|
|
- success "Openvpn is running"
|
|
|
- else
|
|
|
- error "Openvpn is not running"
|
|
|
- exitcode=1
|
|
|
- fi
|
|
|
-
|
|
|
- exit ${exitcode}
|
|
|
- ;;
|
|
|
-
|
|
|
- # ########## #
|
|
|
# Halp #
|
|
|
# ########## #
|
|
|
|
|
|
*)
|
|
|
- echo "Usage: $0 {start|stop|restart|status}"
|
|
|
- exit 1
|
|
|
+ echo "Usage: $0 {start|stop|restart}"
|
|
|
;;
|
|
|
esac
|
|
|
|