diff options
Diffstat (limited to 'src/migration-scripts')
| -rwxr-xr-x | src/migration-scripts/conntrack/4-to-5 | 59 | ||||
| -rwxr-xr-x | src/migration-scripts/firewall/10-to-11 | 18 | ||||
| -rwxr-xr-x | src/migration-scripts/firewall/12-to-13 | 9 | ||||
| -rwxr-xr-x | src/migration-scripts/interfaces/29-to-30 | 11 | ||||
| -rwxr-xr-x | src/migration-scripts/pppoe-server/6-to-7 | 36 | 
5 files changed, 99 insertions, 34 deletions
| diff --git a/src/migration-scripts/conntrack/4-to-5 b/src/migration-scripts/conntrack/4-to-5 new file mode 100755 index 000000000..d2e5fc5fa --- /dev/null +++ b/src/migration-scripts/conntrack/4-to-5 @@ -0,0 +1,59 @@ +#!/usr/bin/env python3 +# +# Copyright (C) 2023 VyOS maintainers and contributors +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License version 2 or later as +# published by the Free Software Foundation. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program.  If not, see <http://www.gnu.org/licenses/>. + +# T5779: system conntrack timeout custom +# Before: +#   Protocols tcp, udp and icmp allowed. When using udp it did not work +#   Only ipv4 custom timeout rules +# Now: +#   Valid protocols are only tcp or udp. +#   Extend functionality to ipv6 and move ipv4 custom rules to new node: +#       set system conntrack timeout custom [ipv4 | ipv6] rule <rule> ... + +from sys import argv +from sys import exit + +from vyos.configtree import ConfigTree + +if len(argv) < 2: +    print("Must specify file name!") +    exit(1) + +file_name = argv[1] + +with open(file_name, 'r') as f: +    config_file = f.read() + +base = ['system', 'conntrack'] +config = ConfigTree(config_file) + +if not config.exists(base): +    # Nothing to do +    exit(0) + +if config.exists(base + ['timeout', 'custom', 'rule']): +    for rule in config.list_nodes(base + ['timeout', 'custom', 'rule']): +        if config.exists(base + ['timeout', 'custom', 'rule', rule, 'protocol', 'tcp']): +            config.set(base + ['timeout', 'custom', 'ipv4', 'rule']) +            config.copy(base + ['timeout', 'custom', 'rule', rule], base + ['timeout', 'custom', 'ipv4', 'rule', rule]) +    config.delete(base + ['timeout', 'custom', 'rule']) + +try: +    with open(file_name, 'w') as f: +        f.write(config.to_string()) +except OSError as e: +    print("Failed to save the modified config: {}".format(e)) +    exit(1) diff --git a/src/migration-scripts/firewall/10-to-11 b/src/migration-scripts/firewall/10-to-11 index b739fb139..e14ea0e51 100755 --- a/src/migration-scripts/firewall/10-to-11 +++ b/src/migration-scripts/firewall/10-to-11 @@ -63,19 +63,11 @@ if not config.exists(base):  ### Migration of state policies  if config.exists(base + ['state-policy']): -    for family in ['ipv4', 'ipv6']: -        for hook in ['forward', 'input', 'output']: -            for priority in ['filter']: -                # Add default-action== accept for compatibility reasons: -                config.set(base + [family, hook, priority, 'default-action'], value='accept') -                position = 1 -                for state in config.list_nodes(base + ['state-policy']): -                    action = config.return_value(base + ['state-policy', state, 'action']) -                    config.set(base + [family, hook, priority, 'rule']) -                    config.set_tag(base + [family, hook, priority, 'rule']) -                    config.set(base + [family, hook, priority, 'rule', position, 'state', state], value='enable') -                    config.set(base + [family, hook, priority, 'rule', position, 'action'], value=action) -                    position = position + 1 +    for state in config.list_nodes(base + ['state-policy']): +        action = config.return_value(base + ['state-policy', state, 'action']) +        config.set(base + ['global-options', 'state-policy', state, 'action'], value=action) +        if config.exists(base + ['state-policy', state, 'log']): +            config.set(base + ['global-options', 'state-policy', state, 'log'], value='enable')      config.delete(base + ['state-policy'])  ## migration of global options: diff --git a/src/migration-scripts/firewall/12-to-13 b/src/migration-scripts/firewall/12-to-13 index 4eaae779b..8396dd9d1 100755 --- a/src/migration-scripts/firewall/12-to-13 +++ b/src/migration-scripts/firewall/12-to-13 @@ -49,6 +49,15 @@ if not config.exists(base):      # Nothing to do      exit(0) +# State Policy logs: +if config.exists(base + ['global-options', 'state-policy']): +    for state in config.list_nodes(base + ['global-options', 'state-policy']): +        if config.exists(base + ['global-options', 'state-policy', state, 'log']): +            log_value = config.return_value(base + ['global-options', 'state-policy', state, 'log']) +            config.delete(base + ['global-options', 'state-policy', state, 'log']) +            if log_value == 'enable': +                config.set(base + ['global-options', 'state-policy', state, 'log']) +  for family in ['ipv4', 'ipv6', 'bridge']:      if config.exists(base + [family]):          for hook in ['forward', 'input', 'output', 'name']: diff --git a/src/migration-scripts/interfaces/29-to-30 b/src/migration-scripts/interfaces/29-to-30 index 97e1b329c..04e023e77 100755 --- a/src/migration-scripts/interfaces/29-to-30 +++ b/src/migration-scripts/interfaces/29-to-30 @@ -35,16 +35,19 @@ if __name__ == '__main__':          # Nothing to do          sys.exit(0)      for interface in config.list_nodes(base): +        if not config.exists(base + [interface, 'private-key']): +            continue          private_key = config.return_value(base + [interface, 'private-key'])          interface_base = base + [interface]          if config.exists(interface_base + ['peer']):              for peer in config.list_nodes(interface_base + ['peer']):                  peer_base = interface_base + ['peer', peer] +                if not config.exists(peer_base + ['public-key']): +                    continue                  peer_public_key = config.return_value(peer_base + ['public-key']) -                if config.exists(peer_base + ['public-key']): -                    if not config.exists(peer_base + ['disable']) \ -                            and is_wireguard_key_pair(private_key, peer_public_key): -                        config.set(peer_base + ['disable']) +                if not config.exists(peer_base + ['disable']) \ +                        and is_wireguard_key_pair(private_key, peer_public_key): +                    config.set(peer_base + ['disable'])      try:          with open(file_name, 'w') as f: diff --git a/src/migration-scripts/pppoe-server/6-to-7 b/src/migration-scripts/pppoe-server/6-to-7 index 8b5482705..34996d8fe 100755 --- a/src/migration-scripts/pppoe-server/6-to-7 +++ b/src/migration-scripts/pppoe-server/6-to-7 @@ -76,23 +76,25 @@ if config.exists(base + ['gateway-address']):  #named pool migration  namedpools_base = pool_base + ['name'] -if config.return_value(base + ['authentication', 'mode']) == 'local': -    if config.list_nodes(namedpools_base): -        default_pool = config.list_nodes(namedpools_base)[0] - -for pool_name in config.list_nodes(namedpools_base): -    pool_path = namedpools_base + [pool_name] -    if config.exists(pool_path + ['subnet']): -        subnet = config.return_value(pool_path + ['subnet']) -        config.set(pool_base + [pool_name, 'range'], value=subnet) -    if config.exists(pool_path + ['next-pool']): -        next_pool = config.return_value(pool_path + ['next-pool']) -        config.set(pool_base + [pool_name, 'next-pool'], value=next_pool) -    if not gateway: -        if config.exists(pool_path + ['gateway-address']): -            gateway = config.return_value(pool_path + ['gateway-address']) - -config.delete(namedpools_base) +if config.exists(namedpools_base): +    if config.exists(base + ['authentication', 'mode']): +        if config.return_value(base + ['authentication', 'mode']) == 'local': +            if config.list_nodes(namedpools_base): +                default_pool = config.list_nodes(namedpools_base)[0] + +    for pool_name in config.list_nodes(namedpools_base): +        pool_path = namedpools_base + [pool_name] +        if config.exists(pool_path + ['subnet']): +            subnet = config.return_value(pool_path + ['subnet']) +            config.set(pool_base + [pool_name, 'range'], value=subnet) +        if config.exists(pool_path + ['next-pool']): +            next_pool = config.return_value(pool_path + ['next-pool']) +            config.set(pool_base + [pool_name, 'next-pool'], value=next_pool) +        if not gateway: +            if config.exists(pool_path + ['gateway-address']): +                gateway = config.return_value(pool_path + ['gateway-address']) + +    config.delete(namedpools_base)  if gateway:      config.set(base + ['gateway-address'], value=gateway) | 
