diff options
author | Christian Poessinger <christian@poessinger.com> | 2021-06-10 19:07:22 +0200 |
---|---|---|
committer | Christian Poessinger <christian@poessinger.com> | 2021-06-10 19:12:37 +0200 |
commit | 6b8ff2e8a847841ca632ea2611a7ed16f9abdfea (patch) | |
tree | 9634affdc734d98ef6e47e466e87fb9a1848a89c /src/etc/dhcp/dhclient-exit-hooks.d/ipsec-dhclient-hook.py | |
parent | 5d068442cf7b1863724c83168176ce2940a023fe (diff) | |
download | vyos-1x-6b8ff2e8a847841ca632ea2611a7ed16f9abdfea.tar.gz vyos-1x-6b8ff2e8a847841ca632ea2611a7ed16f9abdfea.zip |
ipsec: T2816: add .py extenstion to dhclient helper script for processing
dhclient fails to execute the script without the extension.
Diffstat (limited to 'src/etc/dhcp/dhclient-exit-hooks.d/ipsec-dhclient-hook.py')
-rw-r--r-- | src/etc/dhcp/dhclient-exit-hooks.d/ipsec-dhclient-hook.py | 46 |
1 files changed, 46 insertions, 0 deletions
diff --git a/src/etc/dhcp/dhclient-exit-hooks.d/ipsec-dhclient-hook.py b/src/etc/dhcp/dhclient-exit-hooks.d/ipsec-dhclient-hook.py new file mode 100644 index 000000000..36edf04f3 --- /dev/null +++ b/src/etc/dhcp/dhclient-exit-hooks.d/ipsec-dhclient-hook.py @@ -0,0 +1,46 @@ +#!/usr/bin/env python3 + +import os +import sys + +from vyos.util import call + +IPSEC_CONF="/etc/ipsec.conf" +IPSEC_SECRETS="/etc/ipsec.secrets" + +def getlines(file): + with open(file, 'r') as f: + return f.readlines() + +def writelines(file, lines): + with open(file, 'w') as f: + f.writelines(lines) + +if __name__ == '__main__': + interface = os.getenv('interface') + new_ip = os.getenv('new_ip_address') + old_ip = os.getenv('old_ip_address') + reason = os.getenv('reason') + + if (old_ip == new_ip and reason != 'BOUND') or reason in ['REBOOT', 'EXPIRE']: + sys.exit(0) + + conf_lines = getlines(IPSEC_CONF) + secrets_lines = getlines(IPSEC_SECRETS) + found = False + to_match = f'# dhcp:{interface}' + + for i, line in enumerate(conf_lines): + if line.find(to_match) > 0: + conf_lines[i] = line.replace(old_ip, new_ip) + found = True + + for i, line in enumerate(secrets_lines): + if line.find(to_match) > 0: + secrets_lines[i] = line.replace(old_ip, new_ip) + + if found: + writelines(IPSEC_CONF, conf_lines) + writelines(IPSEC_SECRETS, secrets_lines) + call('sudo /usr/sbin/ipsec rereadall') + call('sudo /usr/sbin/ipsec reload') |