|
1 | 1 | #cloud-config |
| 2 | +## The sed and daemon-reload entries are temporary and will be removed once permission issue is handled on base AMI. |
| 3 | +## https://github.com/WhistleLabs/terraform-aws-openvpn/pull/2 |
2 | 4 | runcmd: |
3 | | - - echo "OPENVPN_CERT_SOURCE=s3://${replace(s3_bucket,"/(\/)+$/","")}/${replace(s3_bucket_prefix,"/^(\/)+|(\/)+$/","")}" > /etc/openvpn/get-openvpn-certs.env |
| 5 | + - echo "OPENVPN_CERT_SOURCE=s3://${replace(s3_bucket,"/(/)+$/","")}/${replace(s3_bucket_prefix,"/^(/)+|(/)+$/","")}" > /etc/openvpn/get-openvpn-certs.env |
| 6 | + - echo 'crl-verify /etc/openvpn/keys/crl.pem' >> /etc/openvpn/server.conf |
4 | 7 | - echo "push \"route $(ip route get 8.8.8.8| grep src| sed 's/.*src \(.*\)$/\1/g') 255.255.255.255 net_gateway\"" >> /etc/openvpn/server.conf |
5 | 8 | - echo "push \"route ${cidrhost(element(split(",",route_cidrs),1), 0)} ${cidrnetmask(element(split(",",route_cidrs),1))}\"" >> /etc/openvpn/server.conf |
6 | 9 | - echo "push \"route ${cidrhost(element(split(",",route_cidrs),2), 0)} ${cidrnetmask(element(split(",",route_cidrs),2))}\"" >> /etc/openvpn/server.conf |
7 | 10 | - echo "push \"route ${cidrhost(element(split(",",route_cidrs),3), 0)} ${cidrnetmask(element(split(",",route_cidrs),3))}\"" >> /etc/openvpn/server.conf |
8 | 11 | - echo "push \"route ${cidrhost(element(split(",",route_cidrs),4), 0)} ${cidrnetmask(element(split(",",route_cidrs),4))}\"" >> /etc/openvpn/server.conf |
| 12 | + - sed -i 's/\(ExecStartPost=.*chmod.*$\)/ExecStartPost=\/bin\/chown -R nobody:nogroup \/etc\/openvpn\n\1\n/g' /etc/systemd/system/get-openvpn-certs.service |
| 13 | + - systemctl daemon-reload |
9 | 14 | - systemctl start get-openvpn-certs |
10 | 15 | - systemctl restart openvpn@server |
11 | 16 | - systemctl restart iptables |
|
0 commit comments