diff options
author | Lucas Christian <lucas@lucasec.com> | 2024-07-21 22:46:55 -0700 |
---|---|---|
committer | Mergify <37929162+mergify[bot]@users.noreply.github.com> | 2024-07-22 10:28:04 +0000 |
commit | 99bce9f6291ef53ecb9507f9b6d61ec28be7be17 (patch) | |
tree | 4bcaf2606a436026b8dabdcd55374f0561ca3a6a /src/conf_mode/vpn_ipsec.py | |
parent | 842e4c20300de3e0ebeabdb5761d50a077cfbd27 (diff) | |
download | vyos-1x-99bce9f6291ef53ecb9507f9b6d61ec28be7be17.tar.gz vyos-1x-99bce9f6291ef53ecb9507f9b6d61ec28be7be17.zip |
T6599: ipsec: fix incorect default behavior for dead-peer-detectionmergify/bp/circinus/pr-3841
(cherry picked from commit 23a3419d512139650cfe3dc76759b370b0c0c3d6)
Diffstat (limited to 'src/conf_mode/vpn_ipsec.py')
-rwxr-xr-x | src/conf_mode/vpn_ipsec.py | 16 |
1 files changed, 15 insertions, 1 deletions
diff --git a/src/conf_mode/vpn_ipsec.py b/src/conf_mode/vpn_ipsec.py index dc78c755e..cf82b767f 100755 --- a/src/conf_mode/vpn_ipsec.py +++ b/src/conf_mode/vpn_ipsec.py @@ -24,6 +24,7 @@ from time import sleep from vyos.base import Warning from vyos.config import Config +from vyos.config import config_dict_merge from vyos.configdep import set_dependents from vyos.configdep import call_dependents from vyos.configdict import leaf_node_changed @@ -86,9 +87,22 @@ def get_config(config=None): ipsec = conf.get_config_dict(base, key_mangling=('-', '_'), no_tag_node_value_mangle=True, get_first_key=True, - with_recursive_defaults=True, with_pki=True) + # We have to cleanup the default dict, as default values could + # enable features which are not explicitly enabled on the + # CLI. E.g. dead-peer-detection defaults should not be injected + # unless the feature is explicitly opted in to by setting the + # top-level node + default_values = conf.get_config_defaults(**ipsec.kwargs, recursive=True) + + if 'ike_group' in ipsec: + for name, ike in ipsec['ike_group'].items(): + if 'dead_peer_detection' not in ike: + del default_values['ike_group'][name]['dead_peer_detection'] + + ipsec = config_dict_merge(default_values, ipsec) + ipsec['dhcp_interfaces'] = set() ipsec['dhcp_no_address'] = {} ipsec['install_routes'] = 'no' if conf.exists(base + ["options", "disable-route-autoinstall"]) else default_install_routes |