Cleanup
- Remove quickstart.sh, which was removed from project documentation in March 2022, and no longer in use.
This commit is contained in:
parent
664c1072a4
commit
8cbbe1cddd
4
.github/workflows/check_urls.yml
vendored
4
.github/workflows/check_urls.yml
vendored
@ -40,7 +40,6 @@ jobs:
|
||||
$wg vpnsetup_amzn.sh "$gi/vpnsetup_amzn.sh"; $sl
|
||||
$wg vpnsetup_ubuntu.sh "$gi/vpnsetup_ubuntu.sh"; $sl
|
||||
$wg vpnsetup_alpine.sh "$gi/vpnsetup_alpine.sh"; $sl
|
||||
$wg quickstart.sh "$gi/extras/quickstart.sh"; $sl
|
||||
$wg ikev2setup.sh "$gi/extras/ikev2setup.sh"; $sl
|
||||
$wg vpnupgrade.sh "$gi/extras/vpnupgrade.sh"; $sl
|
||||
$wg vpnupgrade_centos.sh "$gi/extras/vpnupgrade_centos.sh"; $sl
|
||||
@ -59,7 +58,6 @@ jobs:
|
||||
$wg vpnsetup_amzn2.sh "$gh/vpnsetup_amzn.sh"; $sl
|
||||
$wg vpnsetup_ubuntu2.sh "$gh/vpnsetup_ubuntu.sh"; $sl
|
||||
$wg vpnsetup_alpine2.sh "$gh/vpnsetup_alpine.sh"; $sl
|
||||
$wg quickstart2.sh "$gh/extras/quickstart.sh"; $sl
|
||||
$wg ikev2setup2.sh "$gh/extras/ikev2setup.sh"; $sl
|
||||
$wg vpnupgrade2.sh "$gh/extras/vpnupgrade.sh"; $sl
|
||||
$wg vpnupgrade_centos2.sh "$gh/extras/vpnupgrade_centos.sh"; $sl
|
||||
@ -78,7 +76,6 @@ jobs:
|
||||
diff vpnsetup_amzn.sh ../vpnsetup_amzn.sh
|
||||
diff vpnsetup_ubuntu.sh ../vpnsetup_ubuntu.sh
|
||||
diff vpnsetup_alpine.sh ../vpnsetup_alpine.sh
|
||||
diff quickstart.sh ../extras/quickstart.sh
|
||||
diff ikev2setup.sh ../extras/ikev2setup.sh
|
||||
diff vpnupgrade.sh ../extras/vpnupgrade.sh
|
||||
diff vpnupgrade_centos.sh ../extras/vpnupgrade_centos.sh
|
||||
@ -97,7 +94,6 @@ jobs:
|
||||
diff vpnsetup_amzn2.sh ../vpnsetup_amzn.sh
|
||||
diff vpnsetup_ubuntu2.sh ../vpnsetup_ubuntu.sh
|
||||
diff vpnsetup_alpine2.sh ../vpnsetup_alpine.sh
|
||||
diff quickstart2.sh ../extras/quickstart.sh
|
||||
diff ikev2setup2.sh ../extras/ikev2setup.sh
|
||||
diff vpnupgrade2.sh ../extras/vpnupgrade.sh
|
||||
diff vpnupgrade_centos2.sh ../extras/vpnupgrade_centos.sh
|
||||
|
@ -1,309 +0,0 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# Script for automatic setup of an IPsec VPN server on Ubuntu, Debian, CentOS/RHEL,
|
||||
# Rocky Linux, AlmaLinux, Oracle Linux, Amazon Linux 2 and Alpine Linux
|
||||
#
|
||||
# DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC!
|
||||
#
|
||||
# The latest version of this script is available at:
|
||||
# https://github.com/hwdsl2/setup-ipsec-vpn
|
||||
#
|
||||
# Copyright (C) 2021-2023 Lin Song <linsongui@gmail.com>
|
||||
#
|
||||
# This work is licensed under the Creative Commons Attribution-ShareAlike 3.0
|
||||
# Unported License: http://creativecommons.org/licenses/by-sa/3.0/
|
||||
#
|
||||
# Attribution required: please include my name in any derivative and let me
|
||||
# know how you have improved it!
|
||||
|
||||
# =====================================================
|
||||
|
||||
# Define your own values for these variables
|
||||
# - IPsec pre-shared key, VPN username and password
|
||||
# - All values MUST be placed inside 'single quotes'
|
||||
# - DO NOT use these special characters within values: \ " '
|
||||
|
||||
YOUR_IPSEC_PSK=''
|
||||
YOUR_USERNAME=''
|
||||
YOUR_PASSWORD=''
|
||||
|
||||
# =====================================================
|
||||
|
||||
export PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
||||
|
||||
exiterr() { echo "Error: $1" >&2; exit 1; }
|
||||
|
||||
check_ip() {
|
||||
IP_REGEX='^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])$'
|
||||
printf '%s' "$1" | tr -d '\n' | grep -Eq "$IP_REGEX"
|
||||
}
|
||||
|
||||
check_dns_name() {
|
||||
FQDN_REGEX='^([a-zA-Z0-9]([a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?\.)+[a-zA-Z]{2,}$'
|
||||
printf '%s' "$1" | tr -d '\n' | grep -Eq "$FQDN_REGEX"
|
||||
}
|
||||
|
||||
check_root() {
|
||||
if [ "$(id -u)" != 0 ]; then
|
||||
exiterr "Script must be run as root. Try 'sudo sh $0'"
|
||||
fi
|
||||
}
|
||||
|
||||
check_vz() {
|
||||
if [ -f /proc/user_beancounters ]; then
|
||||
exiterr "OpenVZ VPS is not supported."
|
||||
fi
|
||||
}
|
||||
|
||||
check_lxc() {
|
||||
# shellcheck disable=SC2154
|
||||
if [ "$container" = "lxc" ] && [ ! -e /dev/ppp ]; then
|
||||
cat 1>&2 <<'EOF'
|
||||
Error: /dev/ppp is missing. LXC containers require configuration.
|
||||
See: https://github.com/hwdsl2/setup-ipsec-vpn/issues/1014
|
||||
EOF
|
||||
exit 1
|
||||
fi
|
||||
}
|
||||
|
||||
check_os() {
|
||||
rh_file="/etc/redhat-release"
|
||||
if [ -f "$rh_file" ]; then
|
||||
os_type=centos
|
||||
if grep -q "Red Hat" "$rh_file"; then
|
||||
os_type=rhel
|
||||
fi
|
||||
[ -f /etc/oracle-release ] && os_type=ol
|
||||
grep -qi rocky "$rh_file" && os_type=rocky
|
||||
grep -qi alma "$rh_file" && os_type=alma
|
||||
if grep -q "release 7" "$rh_file"; then
|
||||
os_ver=7
|
||||
elif grep -q "release 8" "$rh_file"; then
|
||||
os_ver=8
|
||||
grep -qi stream "$rh_file" && os_ver=8s
|
||||
if [ "$os_type$os_ver" = "centos8" ]; then
|
||||
exiterr "CentOS Linux 8 is EOL and not supported."
|
||||
fi
|
||||
elif grep -q "release 9" "$rh_file"; then
|
||||
os_ver=9
|
||||
grep -qi stream "$rh_file" && os_ver=9s
|
||||
else
|
||||
exiterr "This script only supports CentOS/RHEL 7-9."
|
||||
fi
|
||||
elif grep -qs "Amazon Linux release 2 " /etc/system-release; then
|
||||
os_type=amzn
|
||||
os_ver=2
|
||||
elif grep -qs "Amazon Linux release 2023" /etc/system-release; then
|
||||
exiterr "Amazon Linux 2023 is not supported."
|
||||
else
|
||||
os_type=$(lsb_release -si 2>/dev/null)
|
||||
[ -z "$os_type" ] && [ -f /etc/os-release ] && os_type=$(. /etc/os-release && printf '%s' "$ID")
|
||||
case $os_type in
|
||||
[Uu]buntu)
|
||||
os_type=ubuntu
|
||||
;;
|
||||
[Dd]ebian|[Kk]ali)
|
||||
os_type=debian
|
||||
;;
|
||||
[Rr]aspbian)
|
||||
os_type=raspbian
|
||||
;;
|
||||
[Aa]lpine)
|
||||
os_type=alpine
|
||||
;;
|
||||
*)
|
||||
cat 1>&2 <<'EOF'
|
||||
Error: This script only supports one of the following OS:
|
||||
Ubuntu, Debian, CentOS/RHEL, Rocky Linux, AlmaLinux,
|
||||
Oracle Linux, Amazon Linux 2 or Alpine Linux
|
||||
EOF
|
||||
exit 1
|
||||
;;
|
||||
esac
|
||||
if [ "$os_type" = "alpine" ]; then
|
||||
os_ver=$(. /etc/os-release && printf '%s' "$VERSION_ID" | cut -d '.' -f 1,2)
|
||||
if [ "$os_ver" != "3.17" ] && [ "$os_ver" != "3.18" ]; then
|
||||
exiterr "This script only supports Alpine Linux 3.17/3.18."
|
||||
fi
|
||||
else
|
||||
os_ver=$(sed 's/\..*//' /etc/debian_version | tr -dc 'A-Za-z0-9')
|
||||
if [ "$os_ver" = 8 ] || [ "$os_ver" = "jessiesid" ]; then
|
||||
exiterr "Debian 8 or Ubuntu < 16.04 is not supported."
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
check_iface() {
|
||||
def_iface=$(route 2>/dev/null | grep -m 1 '^default' | grep -o '[^ ]*$')
|
||||
if [ "$os_type" != "alpine" ]; then
|
||||
[ -z "$def_iface" ] && def_iface=$(ip -4 route list 0/0 2>/dev/null | grep -m 1 -Po '(?<=dev )(\S+)')
|
||||
fi
|
||||
def_state=$(cat "/sys/class/net/$def_iface/operstate" 2>/dev/null)
|
||||
check_wl=0
|
||||
if [ -n "$def_state" ] && [ "$def_state" != "down" ]; then
|
||||
if [ "$os_type" = "ubuntu" ] || [ "$os_type" = "debian" ] || [ "$os_type" = "raspbian" ]; then
|
||||
if ! uname -m | grep -qi -e '^arm' -e '^aarch64'; then
|
||||
check_wl=1
|
||||
fi
|
||||
else
|
||||
check_wl=1
|
||||
fi
|
||||
fi
|
||||
if [ "$check_wl" = 1 ]; then
|
||||
case $def_iface in
|
||||
wl*)
|
||||
exiterr "Wireless interface '$def_iface' detected. DO NOT run this script on your PC or Mac!"
|
||||
;;
|
||||
esac
|
||||
fi
|
||||
}
|
||||
|
||||
check_creds() {
|
||||
[ -n "$YOUR_IPSEC_PSK" ] && VPN_IPSEC_PSK="$YOUR_IPSEC_PSK"
|
||||
[ -n "$YOUR_USERNAME" ] && VPN_USER="$YOUR_USERNAME"
|
||||
[ -n "$YOUR_PASSWORD" ] && VPN_PASSWORD="$YOUR_PASSWORD"
|
||||
if [ -z "$VPN_IPSEC_PSK" ] && [ -z "$VPN_USER" ] && [ -z "$VPN_PASSWORD" ]; then
|
||||
return 0
|
||||
fi
|
||||
if [ -z "$VPN_IPSEC_PSK" ] || [ -z "$VPN_USER" ] || [ -z "$VPN_PASSWORD" ]; then
|
||||
exiterr "All VPN credentials must be specified. Edit the script and re-enter them."
|
||||
fi
|
||||
if printf '%s' "$VPN_IPSEC_PSK $VPN_USER $VPN_PASSWORD" | LC_ALL=C grep -q '[^ -~]\+'; then
|
||||
exiterr "VPN credentials must not contain non-ASCII characters."
|
||||
fi
|
||||
case "$VPN_IPSEC_PSK $VPN_USER $VPN_PASSWORD" in
|
||||
*[\\\"\']*)
|
||||
exiterr "VPN credentials must not contain these special characters: \\ \" '"
|
||||
;;
|
||||
esac
|
||||
}
|
||||
|
||||
check_dns() {
|
||||
if { [ -n "$VPN_DNS_SRV1" ] && ! check_ip "$VPN_DNS_SRV1"; } \
|
||||
|| { [ -n "$VPN_DNS_SRV2" ] && ! check_ip "$VPN_DNS_SRV2"; }; then
|
||||
exiterr "The DNS server specified is invalid."
|
||||
fi
|
||||
}
|
||||
|
||||
check_server_dns() {
|
||||
if [ -n "$VPN_DNS_NAME" ] && ! check_dns_name "$VPN_DNS_NAME"; then
|
||||
exiterr "Invalid DNS name. 'VPN_DNS_NAME' must be a fully qualified domain name (FQDN)."
|
||||
fi
|
||||
}
|
||||
|
||||
check_client_name() {
|
||||
if [ -n "$VPN_CLIENT_NAME" ]; then
|
||||
name_len="$(printf '%s' "$VPN_CLIENT_NAME" | wc -m)"
|
||||
if [ "$name_len" -gt "64" ] || printf '%s' "$VPN_CLIENT_NAME" | LC_ALL=C grep -q '[^A-Za-z0-9_-]\+' \
|
||||
|| case $VPN_CLIENT_NAME in -*) true ;; *) false ;; esac; then
|
||||
exiterr "Invalid client name. Use one word only, no special characters except '-' and '_'."
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
wait_for_apt() {
|
||||
count=0
|
||||
apt_lk=/var/lib/apt/lists/lock
|
||||
pkg_lk=/var/lib/dpkg/lock
|
||||
while fuser "$apt_lk" "$pkg_lk" >/dev/null 2>&1 \
|
||||
|| lsof "$apt_lk" >/dev/null 2>&1 || lsof "$pkg_lk" >/dev/null 2>&1; do
|
||||
[ "$count" = 0 ] && echo "## Waiting for apt to be available..."
|
||||
[ "$count" -ge 100 ] && exiterr "Could not get apt/dpkg lock."
|
||||
count=$((count+1))
|
||||
printf '%s' '.'
|
||||
sleep 3
|
||||
done
|
||||
}
|
||||
|
||||
install_pkgs() {
|
||||
if ! command -v wget >/dev/null 2>&1; then
|
||||
if [ "$os_type" = "ubuntu" ] || [ "$os_type" = "debian" ] || [ "$os_type" = "raspbian" ]; then
|
||||
wait_for_apt
|
||||
export DEBIAN_FRONTEND=noninteractive
|
||||
(
|
||||
set -x
|
||||
apt-get -yqq update || apt-get -yqq update
|
||||
) || exiterr "'apt-get update' failed."
|
||||
(
|
||||
set -x
|
||||
apt-get -yqq install wget >/dev/null || apt-get -yqq install wget >/dev/null
|
||||
) || exiterr "'apt-get install wget' failed."
|
||||
elif [ "$os_type" != "alpine" ]; then
|
||||
(
|
||||
set -x
|
||||
yum -y -q install wget >/dev/null || yum -y -q install wget >/dev/null
|
||||
) || exiterr "'yum install wget' failed."
|
||||
fi
|
||||
fi
|
||||
if [ "$os_type" = "alpine" ]; then
|
||||
(
|
||||
set -x
|
||||
apk add -U -q bash coreutils grep net-tools sed wget
|
||||
) || exiterr "'apk add' failed."
|
||||
fi
|
||||
}
|
||||
|
||||
get_setup_url() {
|
||||
base_url1="https://raw.githubusercontent.com/hwdsl2/setup-ipsec-vpn/master"
|
||||
base_url2="https://gitlab.com/hwdsl2/setup-ipsec-vpn/-/raw/master"
|
||||
sh_file="vpnsetup_ubuntu.sh"
|
||||
if [ "$os_type" = "centos" ] || [ "$os_type" = "rhel" ] || [ "$os_type" = "rocky" ] \
|
||||
|| [ "$os_type" = "alma" ] || [ "$os_type" = "ol" ]; then
|
||||
sh_file="vpnsetup_centos.sh"
|
||||
elif [ "$os_type" = "amzn" ]; then
|
||||
sh_file="vpnsetup_amzn.sh"
|
||||
elif [ "$os_type" = "alpine" ]; then
|
||||
sh_file="vpnsetup_alpine.sh"
|
||||
fi
|
||||
setup_url1="$base_url1/$sh_file"
|
||||
setup_url2="$base_url2/$sh_file"
|
||||
}
|
||||
|
||||
run_setup() {
|
||||
status=0
|
||||
if tmpdir=$(mktemp --tmpdir -d vpn.XXXXX 2>/dev/null); then
|
||||
if ( set -x; wget -t 3 -T 30 -q -O "$tmpdir/vpn.sh" "$setup_url1" \
|
||||
|| wget -t 3 -T 30 -q -O "$tmpdir/vpn.sh" "$setup_url2" \
|
||||
|| curl -m 30 -fsL "$setup_url1" -o "$tmpdir/vpn.sh" 2>/dev/null ); then
|
||||
VPN_IPSEC_PSK="$VPN_IPSEC_PSK" VPN_USER="$VPN_USER" \
|
||||
VPN_PASSWORD="$VPN_PASSWORD" \
|
||||
VPN_PUBLIC_IP="$VPN_PUBLIC_IP" VPN_L2TP_NET="$VPN_L2TP_NET" \
|
||||
VPN_L2TP_LOCAL="$VPN_L2TP_LOCAL" VPN_L2TP_POOL="$VPN_L2TP_POOL" \
|
||||
VPN_XAUTH_NET="$VPN_XAUTH_NET" VPN_XAUTH_POOL="$VPN_XAUTH_POOL" \
|
||||
VPN_DNS_SRV1="$VPN_DNS_SRV1" VPN_DNS_SRV2="$VPN_DNS_SRV2" \
|
||||
VPN_DNS_NAME="$VPN_DNS_NAME" VPN_CLIENT_NAME="$VPN_CLIENT_NAME" \
|
||||
VPN_PROTECT_CONFIG="$VPN_PROTECT_CONFIG" \
|
||||
VPN_CLIENT_VALIDITY="$VPN_CLIENT_VALIDITY" \
|
||||
VPN_SKIP_IKEV2="$VPN_SKIP_IKEV2" \
|
||||
/bin/bash "$tmpdir/vpn.sh" || status=1
|
||||
else
|
||||
status=1
|
||||
echo "Error: Could not download VPN setup script." >&2
|
||||
fi
|
||||
/bin/rm -f "$tmpdir/vpn.sh"
|
||||
/bin/rmdir "$tmpdir"
|
||||
else
|
||||
exiterr "Could not create temporary directory."
|
||||
fi
|
||||
}
|
||||
|
||||
vpnsetup() {
|
||||
check_root
|
||||
check_vz
|
||||
check_lxc
|
||||
check_os
|
||||
check_iface
|
||||
check_creds
|
||||
check_dns
|
||||
check_server_dns
|
||||
check_client_name
|
||||
install_pkgs
|
||||
get_setup_url
|
||||
run_setup
|
||||
}
|
||||
|
||||
## Defer setup until we have the complete script
|
||||
vpnsetup "$@"
|
||||
|
||||
exit "$status"
|
Loading…
Reference in New Issue
Block a user