2ec840ff63
I've decided to maintain the project myself now, so I've forked it and create a drone pipeline to push image to my registry
38 lines
980 B
Bash
Executable File
38 lines
980 B
Bash
Executable File
#!/bin/bash
|
|
|
|
#
|
|
# Initialize the EasyRSA PKI
|
|
#
|
|
|
|
if [ "$DEBUG" == "1" ]; then
|
|
set -x
|
|
fi
|
|
|
|
set -e
|
|
|
|
source "$OPENVPN/ovpn_env.sh"
|
|
|
|
# Specify "nopass" as arg[2] to make the CA insecure (not recommended!)
|
|
nopass=$1
|
|
|
|
/usr/share/easy-rsa/easyrsa init-pki
|
|
/usr/share/easy-rsa/easyrsa build-ca $nopass
|
|
/usr/share/easy-rsa/easyrsa gen-dh
|
|
openvpn --genkey --secret $EASYRSA_PKI/ta.key
|
|
|
|
# Was nice to autoset, but probably a bad idea in practice, users should
|
|
# have to explicitly specify the common name of their server
|
|
#if [ -z "$cn"]; then
|
|
# #TODO: Handle IPv6 (when I get a VPS with IPv6)...
|
|
# ip4=$(dig +short myip.opendns.com @resolver1.opendns.com)
|
|
# ptr=$(dig +short -x $ip4 | sed -e 's:\.$::')
|
|
#
|
|
# [ -n "$ptr" ] && cn=$ptr || cn=$ip4
|
|
#fi
|
|
|
|
# For a server key with a password, manually init; this is autopilot
|
|
/usr/share/easy-rsa/easyrsa build-server-full "$OVPN_CN" nopass
|
|
|
|
# Generate the CRL for client/server certificates revocation.
|
|
/usr/share/easy-rsa/easyrsa gen-crl
|