summaryrefslogtreecommitdiff
path: root/src/migration-scripts/ipsec/9-to-10
blob: 98e0aede4b04460c926264133e78ce5d46440b94 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
#!/usr/bin/env python3
#
# Copyright (C) 2022 VyOS maintainers and contributors
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 or later as
# published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

import re

from sys import argv
from sys import exit

from vyos.configtree import ConfigTree
from vyos.template import is_ipv4
from vyos.template import is_ipv6


if (len(argv) < 1):
    print("Must specify file name!")
    exit(1)

file_name = argv[1]

with open(file_name, 'r') as f:
    config_file = f.read()

base = ['vpn', 'ipsec']
config = ConfigTree(config_file)

if not config.exists(base):
    # Nothing to do
    exit(0)

# IKE changes, T4118:
if config.exists(base + ['ike-group']):
    for ike_group in config.list_nodes(base + ['ike-group']):
        # replace 'ipsec ike-group <tag> mobike disable'
        #      => 'ipsec ike-group <tag> disable-mobike'
        mobike = base + ['ike-group', ike_group, 'mobike']
        if config.exists(mobike):
            if config.return_value(mobike) == 'disable':
                config.set(base + ['ike-group', ike_group, 'disable-mobike'])
            config.delete(mobike)

        # replace 'ipsec ike-group <tag> ikev2-reauth yes'
        #      => 'ipsec ike-group <tag> ikev2-reauth'
        reauth = base + ['ike-group', ike_group, 'ikev2-reauth']
        if config.exists(reauth):
            if config.return_value(reauth) == 'yes':
                config.delete(reauth)
                config.set(reauth)
            else:
                config.delete(reauth)

# ESP changes
# replace 'ipsec esp-group <tag> compression enable'
#      => 'ipsec esp-group <tag> compression'
if config.exists(base + ['esp-group']):
    for esp_group in config.list_nodes(base + ['esp-group']):
        compression = base + ['esp-group', esp_group, 'compression']
        if config.exists(compression):
            if config.return_value(compression) == 'enable':
                config.delete(compression)
                config.set(compression)
            else:
                config.delete(compression)

# PEER changes
if config.exists(base + ['site-to-site', 'peer']):
    for peer in config.list_nodes(base + ['site-to-site', 'peer']):
        # replace: 'peer <tag> id x'
        #       => 'peer <tag> local-id x'
        if config.exists(base + ['site-to-site', 'peer', peer, 'authentication', 'id']):
            config.rename(base + ['site-to-site', 'peer', peer, 'authentication', 'id'], 'local-id')

        # For the peer '@foo' set remote-id 'foo' if remote-id is not defined
        if peer.startswith('@'):
            if not config.exists(base + ['site-to-site', 'peer', peer, 'authentication', 'remote-id']):
                tmp = peer.replace('@', '')
                config.set(base + ['site-to-site', 'peer', peer, 'authentication', 'remote-id'], value=tmp)

        # replace: 'peer <tag> force-encapsulation enable'
        #       => 'peer <tag> force-udp-encapsulation'
        force_enc = base + ['site-to-site', 'peer', peer, 'force-encapsulation']
        if config.exists(force_enc):
            if config.return_value(force_enc) == 'enable':
                config.delete(force_enc)
                config.set(base + ['site-to-site', 'peer', peer, 'force-udp-encapsulation'])
            else:
                config.delete(force_enc)

        # add option: 'peer <tag> remote-address x.x.x.x'
        remote_address = peer
        if peer.startswith('@'):
            remote_address = 'any'
        config.set(base + ['site-to-site', 'peer', peer, 'remote-address', remote_address])
        # Peer name it is swanctl connection name and shouldn't contain dots or colons
        # rename peer:
        #   peer 192.0.2.1   => peer peer_192-0-2-1
        #   peer 2001:db8::2 => peer peer_2001-db8--2
        #   peer @foo        => peer peer_foo
        re_peer_name = re.sub(':|\.', '-', peer)
        if re_peer_name.startswith('@'):
            re_peer_name = re.sub('@', '', re_peer_name)
        new_peer_name = f'peer_{re_peer_name}'

        config.rename(base + ['site-to-site', 'peer', peer], new_peer_name)

try:
    with open(file_name, 'w') as f:
        f.write(config.to_string())
except OSError as e:
    print(f'Failed to save the modified config: {e}')
    exit(1)