mirror of
https://github.com/Nyr/openvpn-install.git
synced 2025-04-04 21:23:31 +03:00
added support for alpine without systemd
This commit is contained in:
parent
f943387083
commit
cc5cfe437a
2 changed files with 70 additions and 10 deletions
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
|
@ -0,0 +1 @@
|
|||
*.ovpn
|
|
@ -38,6 +38,15 @@ elif [[ -e /etc/fedora-release ]]; then
|
|||
os="fedora"
|
||||
os_version=$(grep -oE '[0-9]+' /etc/fedora-release | head -1)
|
||||
group_name="nobody"
|
||||
elif [[ -e /etc/alpine-release ]]; then
|
||||
os="alpine"
|
||||
os_version=$(cat /etc/alpine-release | cut -d '"' -f 2 | tr -d '.')
|
||||
group_name="nobody"
|
||||
if [[ ! -d /dev/net ]]; then
|
||||
mkdir -p /dev/net && \
|
||||
mknod /dev/net/tun c 10 200 && \
|
||||
chmod 600 /dev/net/tun
|
||||
fi
|
||||
else
|
||||
echo "This installer seems to be running on an unsupported distribution.
|
||||
Supported distros are Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora."
|
||||
|
@ -99,8 +108,13 @@ new_client () {
|
|||
}
|
||||
|
||||
if [[ ! -e /etc/openvpn/server/server.conf ]]; then
|
||||
# Detect some Debian minimal setups where neither wget nor curl are installed
|
||||
if ! hash wget 2>/dev/null && ! hash curl 2>/dev/null; then
|
||||
# Detect some minimal setups where neither wget nor curl are installed
|
||||
if [[ "$os" = "alpine" ]] && ( ! hash curl || ! hash iptables ) 2>/dev/null; then
|
||||
echo "curl and iptables are required to use this installer."
|
||||
read -n1 -r -p "Press any key to install curl and iptables and continue..."
|
||||
apk update
|
||||
apk add curl iptables
|
||||
elif ! hash wget 2>/dev/null && ! hash curl 2>/dev/null; then
|
||||
echo "Wget is required to use this installer."
|
||||
read -n1 -r -p "Press any key to install Wget and continue..."
|
||||
apt-get update
|
||||
|
@ -129,7 +143,7 @@ if [[ ! -e /etc/openvpn/server/server.conf ]]; then
|
|||
echo
|
||||
echo "This server is behind NAT. What is the public IPv4 address or hostname?"
|
||||
# Get public IP and sanitize with grep
|
||||
get_public_ip=$(grep -m 1 -oE '^[0-9]{1,3}(\.[0-9]{1,3}){3}$' <<< "$(wget -T 10 -t 1 -4qO- "http://ip1.dynupdate.no-ip.com/" || curl -m 10 -4Ls "http://ip1.dynupdate.no-ip.com/")")
|
||||
get_public_ip=$(grep -m 1 -oE '^[0-9]{1,3}(\.[0-9]{1,3}){3}$' <<< "$( [[ "$os" != "alpine" ]] && hash wget > /dev/null 2>&1 && wget -T 10 -t 1 -4qO- "http://ip1.dynupdate.no-ip.com/" || curl -m 10 -4Ls "http://ip1.dynupdate.no-ip.com/")")
|
||||
read -p "Public IPv4 address / hostname [$get_public_ip]: " public_ip
|
||||
# If the checkip service is unavailable and user didn't provide input, ask again
|
||||
until [[ -n "$get_public_ip" || -n "$public_ip" ]]; do
|
||||
|
@ -203,7 +217,9 @@ if [[ ! -e /etc/openvpn/server/server.conf ]]; then
|
|||
echo
|
||||
echo "OpenVPN installation is ready to begin."
|
||||
# Install a firewall if firewalld or iptables are not already available
|
||||
if ! systemctl is-active --quiet firewalld.service && ! hash iptables 2>/dev/null; then
|
||||
if [[ "$os" = "alpine" ]]; then
|
||||
firewall="iptables"
|
||||
elif ! systemctl is-active --quiet firewalld.service && ! hash iptables 2>/dev/null; then
|
||||
if [[ "$os" == "centos" || "$os" == "fedora" ]]; then
|
||||
firewall="firewalld"
|
||||
# We don't want to silently enable firewalld, so we give a subtle warning
|
||||
|
@ -216,7 +232,7 @@ if [[ ! -e /etc/openvpn/server/server.conf ]]; then
|
|||
fi
|
||||
read -n1 -r -p "Press any key to continue..."
|
||||
# If running inside a container, disable LimitNPROC to prevent conflicts
|
||||
if systemd-detect-virt -cq; then
|
||||
if [[ "$os" != "alpine" ]] && systemd-detect-virt -cq; then
|
||||
mkdir /etc/systemd/system/openvpn-server@server.service.d/ 2>/dev/null
|
||||
echo "[Service]
|
||||
LimitNPROC=infinity" > /etc/systemd/system/openvpn-server@server.service.d/disable-limitnproc.conf
|
||||
|
@ -227,12 +243,17 @@ LimitNPROC=infinity" > /etc/systemd/system/openvpn-server@server.service.d/disab
|
|||
elif [[ "$os" = "centos" ]]; then
|
||||
yum install -y epel-release
|
||||
yum install -y openvpn openssl ca-certificates tar $firewall
|
||||
elif [[ "$os" = "alpine" ]]; then
|
||||
apk update
|
||||
apk add openvpn openssl $firewall
|
||||
else
|
||||
# Else, OS must be Fedora
|
||||
dnf install -y openvpn openssl ca-certificates tar $firewall
|
||||
fi
|
||||
# If firewalld was just installed, enable it
|
||||
if [[ "$firewall" == "firewalld" ]]; then
|
||||
if [[ "$os" = "alpine" ]]; then
|
||||
rc-update add iptables default
|
||||
elif [[ "$firewall" == "firewalld" ]]; then
|
||||
systemctl enable --now firewalld.service
|
||||
fi
|
||||
# Get easy-rsa
|
||||
|
@ -343,7 +364,20 @@ crl-verify crl.pem" >> /etc/openvpn/server/server.conf
|
|||
# Enable without waiting for a reboot or service restart
|
||||
echo 1 > /proc/sys/net/ipv6/conf/all/forwarding
|
||||
fi
|
||||
if systemctl is-active --quiet firewalld.service; then
|
||||
if [[ "$os" = "alpine" ]]; then
|
||||
iptables_path=$(command -v iptables)
|
||||
$iptables_path -t nat -A POSTROUTING -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to $ip
|
||||
$iptables_path -I INPUT -p $protocol --dport $port -j ACCEPT
|
||||
$iptables_path -I FORWARD -s 10.8.0.0/24 -j ACCEPT
|
||||
$iptables_path -I FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
|
||||
if [[ -n "$ip6" ]]; then
|
||||
ip6tables_path=$(command -v ip6tables)
|
||||
$ip6tables_path -t nat -A POSTROUTING -s fddd:1194:1194:1194::/64 ! -d fddd:1194:1194:1194::/64 -j SNAT --to $ip6
|
||||
$ip6tables_path -I FORWARD -s fddd:1194:1194:1194::/64 -j ACCEPT
|
||||
$ip6tables_path -I FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
|
||||
fi
|
||||
rc-update add openvpn default
|
||||
elif systemctl is-active --quiet firewalld.service; then
|
||||
# Using both permanent and not permanent rules to avoid a firewalld
|
||||
# reload.
|
||||
# We don't use --add-service=openvpn because that would only work with
|
||||
|
@ -427,7 +461,11 @@ cipher AES-256-CBC
|
|||
ignore-unknown-option block-outside-dns
|
||||
verb 3" > /etc/openvpn/server/client-common.txt
|
||||
# Enable and start the OpenVPN service
|
||||
systemctl enable --now openvpn-server@server.service
|
||||
if [[ "$os" = "alpine" ]]; then
|
||||
rc-service openvpn start
|
||||
else
|
||||
systemctl enable --now openvpn-server@server.service
|
||||
fi
|
||||
# Generates the custom client.ovpn
|
||||
new_client
|
||||
echo
|
||||
|
@ -518,7 +556,20 @@ else
|
|||
if [[ "$remove" =~ ^[yY]$ ]]; then
|
||||
port=$(grep '^port ' /etc/openvpn/server/server.conf | cut -d " " -f 2)
|
||||
protocol=$(grep '^proto ' /etc/openvpn/server/server.conf | cut -d " " -f 2)
|
||||
if systemctl is-active --quiet firewalld.service; then
|
||||
if [[ "$os" = "alpine" ]]; then
|
||||
# remove iptables rules
|
||||
iptables_path=$(command -v iptables)
|
||||
$iptables_path -t nat -D POSTROUTING -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to $ip
|
||||
$iptables_path -D INPUT -p $protocol --dport $port -j ACCEPT
|
||||
$iptables_path -D FORWARD -s 10.8.0.0/24 -j ACCEPT
|
||||
$iptables_path -D FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
|
||||
if grep -qs "server-ipv6" /etc/openvpn/server/server.conf; then
|
||||
ip6tables_path=$(command -v ip6tables)
|
||||
$ip6tables_path -t nat -D POSTROUTING -s fddd:1194:1194:1194::/64 ! -d fddd:1194:1194:1194::/64 -j SNAT --to $ip6
|
||||
$ip6tables_path -D FORWARD -s fddd:1194:1194:1194::/64 -j ACCEPT
|
||||
$ip6tables_path -D FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
|
||||
fi
|
||||
elif systemctl is-active --quiet firewalld.service; then
|
||||
ip=$(firewall-cmd --direct --get-rules ipv4 nat POSTROUTING | grep '\-s 10.8.0.0/24 '"'"'!'"'"' -d 10.8.0.0/24' | grep -oE '[^ ]+$')
|
||||
# Using both permanent and not permanent rules to avoid a firewalld reload.
|
||||
firewall-cmd --remove-port="$port"/"$protocol"
|
||||
|
@ -541,12 +592,20 @@ else
|
|||
if sestatus 2>/dev/null | grep "Current mode" | grep -q "enforcing" && [[ "$port" != 1194 ]]; then
|
||||
semanage port -d -t openvpn_port_t -p "$protocol" "$port"
|
||||
fi
|
||||
systemctl disable --now openvpn-server@server.service
|
||||
if [[ "$os" = "alpine" ]]; then
|
||||
rc-service openvpn stop
|
||||
rc-update del openvpn
|
||||
else
|
||||
systemctl disable --now openvpn-server@server.service
|
||||
fi
|
||||
rm -f /etc/systemd/system/openvpn-server@server.service.d/disable-limitnproc.conf
|
||||
rm -f /etc/sysctl.d/99-openvpn-forward.conf
|
||||
if [[ "$os" = "debian" || "$os" = "ubuntu" ]]; then
|
||||
rm -rf /etc/openvpn/server
|
||||
apt-get remove --purge -y openvpn
|
||||
elif [[ "$os" = "alpine" ]]; then
|
||||
rm -rf /etc/openvpn/server
|
||||
apk del openvpn
|
||||
else
|
||||
# Else, OS must be CentOS or Fedora
|
||||
yum remove -y openvpn
|
||||
|
|
Loading…
Add table
Reference in a new issue