summaryrefslogtreecommitdiff
path: root/src/migration-scripts/ipsec/5-to-6
blob: 76ee9ecba44844d577c928a67f04a642b2d55598 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
#!/usr/bin/env python3
#
# Copyright (C) 2021 VyOS maintainers and contributors
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 or later as
# published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

# Remove deprecated strongSwan options from VyOS CLI
# - vpn ipsec nat-traversal enable
# - vpn ipsec nat-networks allowed-network

from sys import argv
from sys import exit

from vyos.configtree import ConfigTree

if (len(argv) < 1):
    print("Must specify file name!")
    exit(1)

file_name = argv[1]

with open(file_name, 'r') as f:
    config_file = f.read()

base = ['vpn', 'ipsec']
config = ConfigTree(config_file)

if not config.exists(base):
    # Nothing to do
    exit(0)

# Delete CLI nodes whose config options got removed by strongSwan
for cli_node in ['nat-traversal', 'nat-networks']:
    if config.exists(base + [cli_node]):
        config.delete(base + [cli_node])

# Remove options only valid in Openswan
if config.exists(base + ['site-to-site', 'peer']):
    for peer in config.list_nodes(base + ['site-to-site', 'peer']):
        if not config.exists(base + ['site-to-site', 'peer', peer, 'tunnel']):
            continue
        for tunnel in config.list_nodes(base + ['site-to-site', 'peer', peer, 'tunnel']):
            # allow-public-networks - Sets a value in ipsec.conf that was only ever valid in Openswan on kernel 2.6
            nat_networks = base + ['site-to-site', 'peer', peer, 'tunnel', tunnel, 'allow-nat-networks']
            if config.exists(nat_networks):
                config.delete(nat_networks)

            # allow-nat-networks - Also sets a value only valid in Openswan
            public_networks = base + ['site-to-site', 'peer', peer, 'tunnel', tunnel, 'allow-public-networks']
            if config.exists(public_networks):
                config.delete(public_networks)

# Rename "logging log-level" and "logging log-modes" to something more human friendly
log = base + ['logging']
if config.exists(log):
    config.rename(log, 'log')
    log = base + ['log']

log_level = log + ['log-level']
if config.exists(log_level):
    config.rename(log_level, 'level')

log_mode = log + ['log-modes']
if config.exists(log_mode):
    config.rename(log_mode, 'subsystem')

# Rename "ipsec-interfaces interface" to "interface"
base_interfaces = base + ['ipsec-interfaces', 'interface']
if config.exists(base_interfaces):
    config.copy(base_interfaces, base + ['interface'])
    config.delete(base_interfaces)

try:
    with open(file_name, 'w') as f:
        f.write(config.to_string())
except OSError as e:
    print(f'Failed to save the modified config: {e}')
    exit(1)