summaryrefslogtreecommitdiff
path: root/debian/strongswan-starter.config
diff options
context:
space:
mode:
authorRene Mayrhofer <rene@mayrhofer.eu.org>2009-03-26 16:03:13 +0000
committerRene Mayrhofer <rene@mayrhofer.eu.org>2009-03-26 16:03:13 +0000
commit49bf9e74e53dbed0079595f8a6fb9f1aa8247de3 (patch)
treebc8fe341de61027426e2814559b0a7b57d130fe1 /debian/strongswan-starter.config
parent9e964aaea512fd10456eff0ac4152d47e87748eb (diff)
downloadvyos-strongswan-49bf9e74e53dbed0079595f8a6fb9f1aa8247de3.tar.gz
vyos-strongswan-49bf9e74e53dbed0079595f8a6fb9f1aa8247de3.zip
- Modularize: move stuff to sub-packages.
Diffstat (limited to 'debian/strongswan-starter.config')
-rw-r--r--debian/strongswan-starter.config47
1 files changed, 47 insertions, 0 deletions
diff --git a/debian/strongswan-starter.config b/debian/strongswan-starter.config
new file mode 100644
index 000000000..eb5f2c2dd
--- /dev/null
+++ b/debian/strongswan-starter.config
@@ -0,0 +1,47 @@
+#!/bin/sh -e
+
+. /usr/share/debconf/confmodule
+
+db_input medium strongswan/start_level || true
+
+# disable for now, until we can deal with the don't-edit-conffiles situation
+#db_input high strongswan/ikev1 || true
+#db_input high strongswan/ikev2 || true
+
+db_input medium strongswan/restart || true
+
+db_input high strongswan/enable-oe || true
+
+db_input high strongswan/create_rsa_key || true
+db_go || true
+
+db_get strongswan/create_rsa_key
+if [ "$RET" = "true" ]; then
+ # create a new certificate
+ db_input medium strongswan/rsa_key_length || true
+ db_input high strongswan/x509_self_signed || true
+ # we can't allow the country code to be empty - openssl will
+ # refuse to create a certificate this way
+ countrycode=""
+ while [ -z "$countrycode" ]; do
+ db_input medium strongswan/x509_country_code || true
+ db_go || true
+ db_get strongswan/x509_country_code
+ countrycode="$RET"
+ done
+ db_input medium strongswan/x509_state_name || true
+ db_input medium strongswan/x509_locality_name || true
+ db_input medium strongswan/x509_organization_name || true
+ db_input medium strongswan/x509_organizational_unit || true
+ db_input medium strongswan/x509_common_name || true
+ db_input medium strongswan/x509_email_address || true
+ db_go || true
+else
+ db_get strongswan/existing_x509_certificate
+ if [ "$RET" = "true" ]; then
+ # existing certificate - use it
+ db_input critical strongswan/existing_x509_certificate_filename || true
+ db_input critical strongswan/existing_x509_key_filename || true
+ db_go || true
+ fi
+fi