# Copyright 2023-2024 VyOS maintainers and contributors # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public License # along with this library. If not, see . from vyos.configtree import ConfigTree base = ['vpn', 'l2tp', 'remote-access'] def migrate(config: ConfigTree) -> None: if not config.exists(base): return #migrate idle to ppp option lcp-echo-timeout idle_path = base + ['idle'] if config.exists(idle_path): config.set(base + ['ppp-options', 'lcp-echo-timeout'], value=config.return_value(idle_path)) config.delete(idle_path) #migrate mppe from authentication to ppp-otion mppe_path = base + ['authentication', 'mppe'] if config.exists(mppe_path): config.set(base + ['ppp-options', 'mppe'], value=config.return_value(mppe_path)) config.delete(mppe_path) #migrate require to protocol require_path = base + ['authentication', 'require'] if config.exists(require_path): protocols = list(config.return_values(require_path)) for protocol in protocols: config.set(base + ['authentication', 'protocols'], value=protocol, replace=False) config.delete(require_path) else: config.set(base + ['authentication', 'protocols'], value='mschap-v2') #migrate default gateway if not exist if not config.exists(base + ['gateway-address']): config.set(base + ['gateway-address'], value='10.255.255.0') #migrate authentication radius timeout rad_timeout_path = base + ['authentication', 'radius', 'timeout'] if config.exists(rad_timeout_path): if int(config.return_value(rad_timeout_path)) > 60: config.set(rad_timeout_path, value=60) #migrate authentication radius acct timeout rad_acct_timeout_path = base + ['authentication', 'radius', 'acct-timeout'] if config.exists(rad_acct_timeout_path): if int(config.return_value(rad_acct_timeout_path)) > 60: config.set(rad_acct_timeout_path,value=60) #migrate authentication radius max-try rad_max_try_path = base + ['authentication', 'radius', 'max-try'] if config.exists(rad_max_try_path): if int(config.return_value(rad_max_try_path)) > 20: config.set(rad_max_try_path, value=20) #migrate dae-server to dynamic-author dae_path_old = base + ['authentication', 'radius', 'dae-server'] dae_path_new = base + ['authentication', 'radius', 'dynamic-author'] if config.exists(dae_path_old + ['ip-address']): config.set(dae_path_new + ['server'], value=config.return_value(dae_path_old + ['ip-address'])) if config.exists(dae_path_old + ['port']): config.set(dae_path_new + ['port'], value=config.return_value(dae_path_old + ['port'])) if config.exists(dae_path_old + ['secret']): config.set(dae_path_new + ['key'], value=config.return_value(dae_path_old + ['secret'])) if config.exists(dae_path_old): config.delete(dae_path_old)