From: Jonatan Schlag <jonatan.schlag@ipfire.org>
To: network@lists.ipfire.org
Subject: [PATCH 2/2] ipsec: reload connection when the security policy changes
Date: Fri, 04 Aug 2017 21:26:37 +0200 [thread overview]
Message-ID: <1501874797-9731-2-git-send-email-jonatan.schlag@ipfire.org> (raw)
In-Reply-To: <1501874797-9731-1-git-send-email-jonatan.schlag@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 2363 bytes --]
Signed-off-by: Jonatan Schlag <jonatan.schlag(a)ipfire.org>
---
src/functions/functions.ipsec | 12 ++++++++----
src/functions/functions.vpn-security-policies | 25 ++++++++++++++++++++++++-
2 files changed, 32 insertions(+), 5 deletions(-)
diff --git a/src/functions/functions.ipsec b/src/functions/functions.ipsec
index 6dc4d5b..57897ec 100644
--- a/src/functions/functions.ipsec
+++ b/src/functions/functions.ipsec
@@ -283,6 +283,13 @@ ipsec_connection_exists() {
[ -d "${path}" ] && return ${EXIT_TRUE} || return ${EXIT_FALSE}
}
+ipsec_strongswan_load() {
+ if ! cmd swanctl --load-all; then
+ log ERROR "Could not reload strongswan config"
+ return ${EXIT_ERROR}
+ fi
+}
+
# Reloads the connection after config changes
ipsec_reload() {
local connection=${1}
@@ -292,10 +299,7 @@ ipsec_reload() {
return ${EXIT_ERROR}
fi
- if ! cmd swanctl --load-all; then
- log ERROR "Could not reload strongswan config"
- return ${EXIT_ERROR}
- fi
+ ipsec_strongswan_load
}
# Handle the cli after authentification
diff --git a/src/functions/functions.vpn-security-policies b/src/functions/functions.vpn-security-policies
index f73670b..ae652a2 100644
--- a/src/functions/functions.vpn-security-policies
+++ b/src/functions/functions.vpn-security-policies
@@ -334,7 +334,30 @@ vpn_security_policies_write_config() {
return ${EXIT_ERROR}
fi
- # TODO everytime we successfully write a config we should call some trigger to take the changes into effect
+ if ! vpn_security_policies_reload ${name}; then
+ log WARNING "Could not reload the IPsec connection using this security policy"
+ return ${EXIT_ERROR}
+ fi
+}
+
+# reload IPsec connections using a special policy
+vpn_security_policies_reload() {
+ local name=${1}
+
+ local connection
+ for connection in $(ipsec_list_connections); do
+ if ! ipsec_connection_read_config "${connection}" "SECURITY_POLICY"; then
+ continue
+ fi
+
+ if [[ "${SECURITY_POLICY}" = "${name}" ]]; then
+ if ! ipsec_connection_to_strongswan "${connection}"; then
+ log ERROR "Could not generate strongswan config for ${connnection}"
+ fi
+ fi
+ done
+
+ ipsec_strongswan_load
}
# This funtion writes the value for one key to a via ${name} specificated vpn security policy configuration file
--
2.6.3
prev parent reply other threads:[~2017-08-04 19:26 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-08-04 19:26 [PATCH 1/2] ipsec: reload connection when the config changes Jonatan Schlag
2017-08-04 19:26 ` Jonatan Schlag [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1501874797-9731-2-git-send-email-jonatan.schlag@ipfire.org \
--to=jonatan.schlag@ipfire.org \
--cc=network@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox