Mainly designed to access juniper network secure
Define your env inside ./env.sh
cat > env.sh <<eof
export vpn_url="http://vpn.foo.net"
export vpn_realm="foobar hosting subsection"
export vpn_user="foo"
export vpn_password="secret"
chmod 600 env.sh
Then run a docker daemon that will terminate with a shell connected to the VPN
docker run \
-v $(pwd)/env.sh:/s/env.sh \
-v /:/thishost \
--privileged -ti --rm\
makinacorpus/openconnect /s/juniper_connect.sh
The / of your current box is mounted inside /thishost
in the container
debug:
docker run \
-v $(pwd)/juniper_connect.sh:/s/juniper_connect.sh \
-v $(pwd)/env.sh:/s/env.sh \
-v /:/thishost \
--privileged -ti --rm\
makinacorpus/openconnect /s/juniper_connect.sh
cat > env.sh <<EOF
export VPN_URL="vpn.foo.net"
export VPN_PORT=443
export VPN_REALM="foobar hosting subsection"
export VPN_USER="foo"
export VPN_PASSWORD="secret"
chmod 600 env.sh
docker run \
-v $(pwd)/env.sh:/s/env.sh \
-v /:/thishost \
--privileged -ti --rm\
makinacorpus/openconnect /s/openfortivpn_connect.sh
Or in dev mode
docker run \
-v $(pwd)/openfortivpn_connect.sh:/s/openfortivpn_connect.sh \
-v $(pwd)/env.sh:/s/env.sh \
-v /:/thishost \
--privileged -ti --rm\
makinacorpus/openconnect /s/openfortivpn_connect.sh