88 lines
3.2 KiB
Bash
Executable File
88 lines
3.2 KiB
Bash
Executable File
#!/bin/bash
|
|
set -e
|
|
|
|
[ -n "${DEBUG+x}" ] && set -x
|
|
|
|
OVPN_DATA=basic-data-otp
|
|
CLIENT=travis-client
|
|
IMG=kylemanna/openvpn
|
|
OTP_USER=otp
|
|
CLIENT_DIR="$(readlink -f "$(dirname "$BASH_SOURCE")/../../client")"
|
|
|
|
# Function to fail
|
|
abort() { cat <<< "$@" 1>&2; exit 1; }
|
|
|
|
ip addr ls
|
|
SERV_IP=$(ip -4 -o addr show scope global | awk '{print $4}' | sed -e 's:/.*::' | head -n1)
|
|
# Configure server with two factor authentication
|
|
docker run -v $OVPN_DATA:/etc/openvpn --rm $IMG ovpn_genconfig -u udp://$SERV_IP -2
|
|
|
|
# Ensure reneg-sec 0 in server config when two factor is enabled
|
|
docker run -v $OVPN_DATA:/etc/openvpn --rm $IMG cat /etc/openvpn/openvpn.conf | grep 'reneg-sec 0' || abort 'reneg-sec not set to 0 in server config'
|
|
|
|
# nopass is insecure
|
|
docker run -v $OVPN_DATA:/etc/openvpn --rm -it -e "EASYRSA_BATCH=1" -e "EASYRSA_REQ_CN=Travis-CI Test CA" $IMG ovpn_initpki nopass
|
|
|
|
docker run -v $OVPN_DATA:/etc/openvpn --rm -it $IMG easyrsa build-client-full $CLIENT nopass
|
|
|
|
# Generate OTP credentials for user named test, should return QR code for test user
|
|
docker run -v $OVPN_DATA:/etc/openvpn --rm -it $IMG ovpn_otp_user $OTP_USER | tee $CLIENT_DIR/qrcode.txt
|
|
# Ensure a chart link is printed in client OTP configuration
|
|
grep 'https://www.google.com/chart' $CLIENT_DIR/qrcode.txt || abort 'Link to chart not generated'
|
|
grep 'Your new secret key is:' $CLIENT_DIR/qrcode.txt || abort 'Secret key is missing'
|
|
# Extract an emergency code from textual output, grepping for line and trimming spaces
|
|
OTP_TOKEN=$(grep -A1 'Your emergency scratch codes are' $CLIENT_DIR/qrcode.txt | tail -1 | tr -d '[[:space:]]')
|
|
# Token should be present
|
|
if [ -z $OTP_TOKEN ]; then
|
|
abort "QR Emergency Code not detected"
|
|
fi
|
|
|
|
# Store authentication credentials in config file and tell openvpn to use them
|
|
echo -e "$OTP_USER\n$OTP_TOKEN" > $CLIENT_DIR/credentials.txt
|
|
|
|
# Override the auth-user-pass directive to use a credentials file
|
|
docker run -v $OVPN_DATA:/etc/openvpn --rm $IMG ovpn_getclient $CLIENT | sed 's/auth-user-pass/auth-user-pass \/client\/credentials.txt/' | tee $CLIENT_DIR/config.ovpn
|
|
|
|
# Ensure reneg-sec 0 in client config when two factor is enabled
|
|
grep 'reneg-sec 0' $CLIENT_DIR/config.ovpn || abort 'reneg-sec not set to 0 in client config'
|
|
|
|
#
|
|
# Fire up the server
|
|
#
|
|
sudo iptables -N DOCKER || echo 'Firewall already configured'
|
|
sudo iptables -I FORWARD -j DOCKER || echo 'Forward already configured'
|
|
# run in shell bg to get logs
|
|
docker run --name "ovpn-test" -v $OVPN_DATA:/etc/openvpn --rm -p 1194:1194/udp --privileged $IMG &
|
|
|
|
#for i in $(seq 10); do
|
|
# SERV_IP=$(docker inspect --format '{{ .NetworkSettings.IPAddress }}')
|
|
# test -n "$SERV_IP" && break
|
|
#done
|
|
#sed -ie s:SERV_IP:$SERV_IP:g $CLIENT_DIR/config.ovpn
|
|
|
|
#
|
|
# Fire up a client in a container since openvpn is disallowed by Travis-CI, don't NAT
|
|
# the host as it confuses itself:
|
|
# "Incoming packet rejected from [AF_INET]172.17.42.1:1194[2], expected peer address: [AF_INET]10.240.118.86:1194"
|
|
#
|
|
docker run --rm --net=host --privileged --volume $CLIENT_DIR:/client $IMG /client/wait-for-connect.sh
|
|
|
|
#
|
|
# Client either connected or timed out, kill server
|
|
#
|
|
kill %1
|
|
|
|
#
|
|
# Celebrate
|
|
#
|
|
cat <<EOF
|
|
___________
|
|
< it worked >
|
|
-----------
|
|
\ ^__^
|
|
\ (oo)\_______
|
|
(__)\ )\/\\
|
|
||----w |
|
|
|| ||
|
|
EOF
|