115 lines
5.3 KiB
Bash
115 lines
5.3 KiB
Bash
#!/usr/bin/env bash
|
|
# @file CloudFlare SSO SSH Tunnel Setup
|
|
# @brief Installs and configures cloudflared for short-lived SSH certificates authenticated via SSO
|
|
# @description
|
|
# This script ensures Homebrew is installed and then uses Homebrew to ensure `cloudflared` is installed.
|
|
# After that, it connects `cloudflared` to CloudFlare Teams and sets up short-lived SSH certificates so
|
|
# that you do not have to manage SSH keys and instead use SSO (Single Sign-On) via CloudFlare Teams.
|
|
#
|
|
# **Note**: `https://install.doctor/cloudflared` points to this file.
|
|
#
|
|
# ## Variables
|
|
#
|
|
# The `SSH_DOMAIN` variable should be set to the endpoint you want to be able to SSH into. The SSH endpoint(s)
|
|
# that are created depend on what type of system is being configured. Some device types include multiple
|
|
# properties that need multiple unique SSH endpoints. The `SSH_DOMAIN` must be passed to this script or else
|
|
# it will default to `ssh.megabyte.space`.
|
|
#
|
|
# * For most installations, the configured domain will be `$(hostname).${SSH_DOMAIN}`
|
|
# * If Qubes is being configured, then the configured domain will be `$(hostname)-qube.${SSH_DOMAIN}`
|
|
# * If [EasyEngine](https://easyengine.io/) is installed, then each domain setup with EasyEngine is configured to have an `ssh` subdomain (i.e. `ssh.example.com` for `example.com`)
|
|
#
|
|
# There are other optional variables that can be customized as well:
|
|
#
|
|
# * `CF_TUNNEL_NAME` - The ID to assign to the tunnel that `cloudflared` creates (`default-ssh-tunnel` by default)
|
|
#
|
|
# ## Notes
|
|
#
|
|
# Since the certificates are "short-lived", you will have to periodically re-authenticate against the
|
|
# SSO authentication endpoint that is hosted by CloudFlare Teams (or an identity provider of your choosing).
|
|
# This script will likely only work on AMD x64 devices.
|
|
#
|
|
# Some of the commands are conditionally run based on whether or not the `CRONTAB_JOB` environment variable is set.
|
|
# This is to accomodate EasyEngine installations where the list of SSH endpoints is variable. Both the initial
|
|
# setup and updates are applied using this script (via a cronjob that does not need to run initialization tasks during
|
|
# the cronjobs).
|
|
#
|
|
# ## TODO
|
|
#
|
|
# * Automatically add UFW exceptions using [this script](https://github.com/Paul-Reed/cloudflare-ufw)
|
|
#
|
|
# ## Links
|
|
#
|
|
# [SSH with short-lived certificates](https://developers.cloudflare.com/cloudflare-one/tutorials/ssh-cert-bastion/)
|
|
|
|
# @description Ensure dependencies like `git` and `curl` are installed (among a few other lightweight system packages)
|
|
{{ include "partials" "basic-deps" }}
|
|
|
|
# @description Ensure Homebrew is installed and available in the `PATH`
|
|
{{ include "partials" "homebrew" }}
|
|
|
|
# @description Ensures `cloudflared` is installed via Homebrew
|
|
if ! command -v cloudflared > /dev/null; then
|
|
brew install cloudflared
|
|
fi
|
|
|
|
# @description Detect the SSH port being used
|
|
SSH_PORT="22"
|
|
if sudo cat /etc/ssh/sshd_config | grep '^Port ' > /dev/null; then
|
|
SSH_PORT="$(sudo cat /etc/ssh/sshd_config | grep '^Port ' | sed 's/Port //')"
|
|
fi
|
|
|
|
# @description Login to the CloudFlare network (if running outside a cronjob) and acquire the tunnel ID
|
|
if [ -z "$CRONTAB_JOB" ]; then
|
|
sudo cloudflared tunnel login
|
|
sudo cloudflared tunnel create "${CF_TUNNEL_NAME:=default-ssh-tunnel}"
|
|
fi
|
|
TUNNEL_ID="$(sudo cloudflared tunnel list | grep " ${CF_TUNNEL_NAME} " | sed 's/^\([^ ]*\).*$/\1/')"
|
|
|
|
# @description Ensure CloudFlare tunnel ID was acquired, then add tunnel route, and create
|
|
# tunnel configuration based on what type of machine is being configured (i.e. regular, Qubes, or EasyEngine)
|
|
if [ -n "$TUNNEL_ID" ]; then
|
|
if [ -z "$CRONTAB_JOB" ]; then
|
|
sudo cloudflared tunnel route ip add 100.64.0.0/10 "${TUNNEL_ID}"
|
|
fi
|
|
|
|
# @description Create the `/root/.cloudflared/config.yml`
|
|
CONFIG_TMP="$(mktemp)"
|
|
echo "tunnel: ${TUNNEL_ID}" > "$CONFIG_TMP"
|
|
echo "credentials-file: /root/.cloudflared/${TUNNEL_ID}.json" >> "$CONFIG_TMP"
|
|
echo "" >> "$CONFIG_TMP"
|
|
echo "ingress:" >> "$CONFIG_TMP"
|
|
if [ -d '/opt/easyengine/sites' ]; then
|
|
DOMAINS_HOSTED="$(find /opt/easyengine/sites -maxdepth 1 -mindepth 1 -type d | sed 's/.*sites\///' | xargs)"
|
|
else
|
|
if [ -d /etc/qubes ]; then
|
|
DOMAINS_HOSTED="$(hostname)-qube.${SSH_DOMAIN:-ssh.megabyte.space}"
|
|
else
|
|
DOMAINS_HOSTED="$(hostname).${SSH_DOMAIN:-ssh.megabyte.space}"
|
|
fi
|
|
fi
|
|
for DOMAIN in $DOMAINS_HOSTED; do
|
|
echo " - hostname: ${DOMAIN}" >> "$CONFIG_TMP"
|
|
echo " service: ssh://localhost:$SSH_PORT" >> "$CONFIG_TMP"
|
|
done
|
|
echo " - service: http_status:404" >> "$CONFIG_TMP"
|
|
echo "" >> "$CONFIG_TMP"
|
|
sudo mkdir -p /root/.cloudflared
|
|
sudo mv "$CONFIG_TMP" /root/.cloudflared/config.yml
|
|
|
|
# @description Install the `cloudflared` system service (if it is not a cronjob)
|
|
if [ -z "$CRONTAB_JOB" ]; then
|
|
sudo cloudflared service install
|
|
fi
|
|
else
|
|
echo "ERROR: Unable to acquire CloudFlare tunnel ID" && exit 1
|
|
fi
|
|
|
|
# @description Restart if the config file changed
|
|
if [ ! -f /root/.cloudflared/config-previous.yml ] || [ "$(cat /root/.cloudflared/config-previous.yml)" != "$(cat /root/.cloudflared/config.yml)" ]; then
|
|
# @todo Add restart command for non-systemctl devices (i.e. macOS)
|
|
if command -v systemctl > /dev/null; then
|
|
sudo systemctl restart cloudflared
|
|
fi
|
|
sudo cp /root/.cloudflared/config.yml /root/.cloudflared/config-previous.yml
|
|
fi
|