|
1 | 1 | #cloud-config |
2 | | -## The sed and daemon-reload entries are temporary and will be removed once permission issue is handled on base AMI. |
3 | | -## https://github.com/WhistleLabs/terraform-aws-openvpn/pull/2 |
4 | 2 | runcmd: |
5 | | - - echo "OPENVPN_CERT_SOURCE=s3://${replace(s3_bucket,"/(/)+$/","")}/${replace(s3_bucket_prefix,"/^(/)+|(/)+$/","")}" > /etc/openvpn/get-openvpn-certs.env |
6 | | - - echo 'crl-verify /etc/openvpn/keys/crl.pem' >> /etc/openvpn/server.conf |
| 3 | + - echo "OPENVPN_CERT_SOURCE=s3://${replace(s3_bucket,"/(\/)+$/","")}/${replace(s3_bucket_prefix,"/^(\/)+|(\/)+$/","")}" > /etc/openvpn/get-openvpn-certs.env |
7 | 4 | - echo "push \"route $(ip route get 8.8.8.8| grep src| sed 's/.*src \(.*\)$/\1/g') 255.255.255.255 net_gateway\"" >> /etc/openvpn/server.conf |
8 | 5 | - echo "push \"route ${cidrhost(element(split(",",route_cidrs),1), 0)} ${cidrnetmask(element(split(",",route_cidrs),1))}\"" >> /etc/openvpn/server.conf |
9 | 6 | - echo "push \"route ${cidrhost(element(split(",",route_cidrs),2), 0)} ${cidrnetmask(element(split(",",route_cidrs),2))}\"" >> /etc/openvpn/server.conf |
10 | 7 | - echo "push \"route ${cidrhost(element(split(",",route_cidrs),3), 0)} ${cidrnetmask(element(split(",",route_cidrs),3))}\"" >> /etc/openvpn/server.conf |
11 | 8 | - echo "push \"route ${cidrhost(element(split(",",route_cidrs),4), 0)} ${cidrnetmask(element(split(",",route_cidrs),4))}\"" >> /etc/openvpn/server.conf |
12 | | - - sed -i 's/\(ExecStartPost=.*chmod.*$\)/ExecStartPost=\/bin\/chown -R nobody:nogroup \/etc\/openvpn\n\1\n/g' /etc/systemd/system/get-openvpn-certs.service |
13 | | - - systemctl daemon-reload |
14 | 9 | - systemctl start get-openvpn-certs |
15 | 10 | - systemctl restart openvpn@server |
16 | 11 | - systemctl restart iptables |
|
0 commit comments