_common.sh 7.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215
  1. #!/bin/bash
  2. service_name="ynh-vpnclient"
  3. service_checker_name=$service_name"-checker"
  4. # Operations needed by both 'install' and 'upgrade' scripts
  5. function vpnclient_deploy_files_and_services()
  6. {
  7. # Install command-line cube file loader
  8. install -o root -g root -m 0755 ../conf/$service_name-loadcubefile.sh /usr/local/bin/
  9. # Copy confs
  10. chown root:${app} /etc/openvpn/
  11. chmod 775 /etc/openvpn/
  12. mkdir -pm 0755 /etc/yunohost/hooks.d/post_iptable_rules/
  13. mkdir -pm 0755 /etc/systemd/system/openvpn@.service.d/
  14. install -b -o root -g ${app} -m 0644 ../conf/openvpn_client.conf.tpl /etc/openvpn/client.conf.tpl
  15. install -b -o root -g root -m 0755 ../conf/hook_post-iptable-rules /etc/yunohost/hooks.d/90-vpnclient.tpl
  16. install -b -o root -g root -m 0644 ../conf/openvpn@.service /etc/systemd/system/openvpn@.service.d/override.conf
  17. # Create certificates directory
  18. mkdir -pm 0770 /etc/openvpn/keys/
  19. chown root:${app} /etc/openvpn/keys/
  20. # Create scripts directory
  21. mkdir -pm 0775 /etc/openvpn/scripts
  22. mkdir -pm 0775 /etc/openvpn/scripts/route-up.d
  23. mkdir -pm 0775 /etc/openvpn/scripts/route-down.d
  24. install -b -o root -g root -m 0755 ../conf/scripts/run-parts.sh /etc/openvpn/scripts/run-parts.sh
  25. install -b -o root -g root -m 0755 ../conf/scripts/route-up.d/* /etc/openvpn/scripts/route-up.d/
  26. install -b -o root -g root -m 0755 ../conf/scripts/route-down.d/* /etc/openvpn/scripts/route-down.d/
  27. #=================================================
  28. # Copy init script
  29. install -o root -g root -m 0755 ../conf/$service_name /usr/local/bin/
  30. # Copy checker timer
  31. install -o root -g root -m 0755 ../conf/$service_checker_name.sh /usr/local/bin/
  32. install -o root -g root -m 0644 ../conf/$service_checker_name.timer /etc/systemd/system/
  33. systemctl daemon-reload
  34. #=================================================
  35. # SETUP SYSTEMD
  36. #=================================================
  37. ynh_print_info "Configuring a systemd service..."
  38. ynh_add_systemd_config $service_name "$service_name.service"
  39. ynh_add_systemd_config $service_checker_name "$service_checker_name.service"
  40. }
  41. function read_cube() {
  42. local config_file="$1"
  43. local key="$2"
  44. local tmp_dir=$(dirname "$config_file")
  45. setting_value="$(jq --raw-output ".$key" "$config_file")"
  46. if [[ "$setting_value" == "null" ]]
  47. then
  48. setting_value=''
  49. # Save file in tmp dir
  50. elif [[ "$key" == "crt_"* ]]
  51. then
  52. if [ -n "${setting_value}" ]
  53. then
  54. echo "${setting_value}" | sed 's/|/\n/g' > "$tmp_dir/$key"
  55. setting_value="$tmp_dir/$key"
  56. fi
  57. fi
  58. echo $setting_value
  59. }
  60. function convert_cube_file()
  61. {
  62. local config_file="$1"
  63. local tmp_dir=$(dirname "$config_file")
  64. ynh_print_info --message="Transforming .cube into OVPN file"
  65. server_name="$(read_cube $config_file server_name)"
  66. server_port="$(read_cube $config_file server_port)"
  67. server_proto="$(read_cube $config_file server_proto)"
  68. ip6_net="$(read_cube $config_file ip6_net)"
  69. ip6_addr="$(read_cube $config_file ip6_addr)"
  70. login_user="$(read_cube $config_file login_user)"
  71. login_passphrase="$(read_cube $config_file login_passphrase)"
  72. dns0="$(read_cube $config_file dns0)"
  73. dns1="$(read_cube $config_file dns1)"
  74. crt_server_ca="$(read_cube $config_file crt_server_ca)"
  75. crt_client="$(read_cube $config_file crt_client)"
  76. crt_client_key="$(read_cube $config_file crt_client_key)"
  77. crt_client_ta="$(read_cube $config_file crt_client_ta)"
  78. if [[ -z "$dns0" && -z "$dns1" ]]; then
  79. dns_method="yunohost"
  80. else
  81. dns_method="custom"
  82. nameservers="$dns0,$dns1"
  83. fi
  84. # Build specific OVPN template
  85. config_template="$tmp_dir/client.conf.tpl"
  86. cp -f /etc/yunohost/apps/vpnclient/conf/openvpn_client.conf.tpl "$config_template"
  87. # Remove some lines
  88. jq --raw-output '.openvpn_rm[]' "${config_file}" | while read -r rm_regex
  89. do
  90. if [ ! -z "${rm_regex}" ]; then
  91. sed -i "/${rm_regex/\//\\\/}/d" "$config_template"
  92. fi
  93. done
  94. # Add some other lines
  95. echo "# Custom additions from .cube" >> "$config_template"
  96. jq --raw-output ".openvpn_add[]" "${config_file}" >> "$config_template"
  97. # Temporarily tweak sever_proto for template hydratation
  98. if [ "$server_proto" == tcp ]; then
  99. server_proto=tcp-client
  100. fi
  101. # Define other needed vars for template hydratation
  102. [ -e "$crt_client_key" ] && cert_comment="" || cert_comment="#"
  103. [ -e "$crt_client_ta" ] && ta_comment="" || ta_comment="#"
  104. [[ "$server_proto" =~ udp ]] && udp_comment="" || udp_comment="#"
  105. [ -n "$login_user" ] && login_comment="" || login_comment="#"
  106. # Actually generate/hydrate the final configuration
  107. ynh_add_config --template="$config_template" --destination="$config_file"
  108. if [ "$server_proto" == tcp-client ]; then
  109. server_proto=tcp
  110. fi
  111. }
  112. function convert_ovpn_file()
  113. {
  114. local config_file="$1"
  115. local tmp_dir=$(dirname "$config_file")
  116. ynh_print_info --message="Extracting TLS keys from .ovpn file"
  117. if grep -q '^\s*<ca>' ${config_file}
  118. then
  119. grep -Poz '(?<=<ca>)(.*\n)*.*(?=</ca>)' ${config_file} | sed '/^$/d' > $tmp_dir/crt_server_ca
  120. crt_server_ca=$tmp_dir/crt_server_ca
  121. sed -i '/^\s*<ca>/,/\s*<\/ca>/d' ${config_file}
  122. sed -i '/^\s*ca\s/d' ${config_file}
  123. echo -e "\nca /etc/openvpn/keys/ca-server.crt" >> $config_file
  124. fi
  125. if grep -q '^\s*<cert>' ${config_file}
  126. then
  127. grep -Poz '(?<=<cert>)(.*\n)*.*(?=</cert>)' ${config_file} | sed '/^$/d' > $tmp_dir/crt_client
  128. crt_client=$tmp_dir/crt_client
  129. sed -i '/^\s*<cert>/,/\s*<\/cert>/d' ${config_file}
  130. sed -i '/^\s*cert\s/d' ${config_file}
  131. echo -e "\ncert /etc/openvpn/keys/user.crt" >> ${config_file}
  132. elif ! grep -q '^\s*cert\s' ${config_file}
  133. then
  134. crt_client=""
  135. fi
  136. if grep -q '^\s*<key>' ${config_file}
  137. then
  138. grep -Poz '(?<=<key>)(.*\n)*.*(?=</key>)' ${config_file} | sed '/^$/d' > $tmp_dir/crt_client_key
  139. crt_client_key=$tmp_dir/crt_client_key
  140. sed -i '/^\s*<key>/,/\s*<\/key>/d' ${config_file}
  141. sed -i '/^\s*key\s/d' ${config_file}
  142. echo -e "\nkey /etc/openvpn/keys/user.key" >> ${config_file}
  143. elif ! grep -q '^\s*key\s' ${config_file}
  144. then
  145. crt_client_key=""
  146. fi
  147. if grep -q '^\s*<tls-auth>' ${config_file}
  148. then
  149. grep -Poz '(?<=<tls-auth>)(.*\n)*.*(?=</tls-auth>)' ${config_file} | sed '/^$/d' > $tmp_dir/crt_client_ta
  150. crt_client_ta=$tmp_dir/crt_client_ta
  151. sed -i '/^\s*<tls-auth>/,/\s*<\/tls-auth>/d' ${config_file}
  152. sed -i '/^\s*tls-auth\s/d' ${config_file}
  153. echo -e "\ntls-auth /etc/openvpn/keys/user_ta.key 1" >> ${config_file}
  154. elif ! grep -q '^\s*tls-auth\s' ${config_file}
  155. then
  156. crt_client_ta=""
  157. fi
  158. sed -i 's@^\s*ca\s.*$@ca /etc/openvpn/keys/ca-server.crt@g' ${config_file}
  159. sed -i 's@^\s*cert\s.*$@cert /etc/openvpn/keys/user.crt@g' ${config_file}
  160. sed -i 's@^\s*key\s.*$@key /etc/openvpn/keys/user.key@g' ${config_file}
  161. sed -i 's@^\s*tls-auth\s.*$@tls-auth /etc/openvpn/keys/user_ta.key 1@g' ${config_file}
  162. script_security="script-security 2"
  163. if grep -q '^\s*script-security\s.*$' ${config_file}; then
  164. sed -i "s@^\s*script-security\s.*\$@$script_security@g" ${config_file}
  165. else
  166. echo "$script_security" >> ${config_file}
  167. fi
  168. route_up='route-up "/etc/openvpn/scripts/run-parts.sh route-up"'
  169. if grep -q '^\s*route-up\s.*$' ${config_file}; then
  170. sed -i "s@^\s*route-up\s.*\$@$route_up@g" ${config_file}
  171. else
  172. echo "$route_up" >> ${config_file}
  173. fi
  174. route_down='down "/etc/openvpn/scripts/run-parts.sh route-down"'
  175. if grep -q '^\s*down\s.*$' ${config_file}; then
  176. sed -i "s@^\s*down\s.*\$@$route_down@g" ${config_file}
  177. else
  178. echo "$route_down" >> ${config_file}
  179. fi
  180. # Currently we need root priviledge to create tun0
  181. sed -i '/^\s*user\s/d' ${config_file}
  182. sed -i '/^\s*group\s/d' ${config_file}
  183. }