Revert "ovs-monitor-ipsec: Detect correctly IPSEC configuration changes"
authorAnsis Atteka <aatteka@nicira.com>
Fri, 9 Mar 2012 02:34:15 +0000 (18:34 -0800)
committerAnsis Atteka <aatteka@nicira.com>
Fri, 9 Mar 2012 02:40:54 +0000 (18:40 -0800)
This reverts commit e1870e82f5ea35d45d7358c2454e876122a02bfb.

Reverting due to a failing build test.

Signed-off-by: Ansis Atteka <aatteka@nicira.com>
debian/ovs-monitor-ipsec

index 1547824..9707082 100755 (executable)
@@ -216,10 +216,12 @@ path certificate "%s";
 
         # The peer's certificate comes to us in PEM format as a string.
         # Write that string to a file for Racoon to use.
-        f = open(root_prefix + vals["peer_cert_file"], "w")
+        peer_cert_file = "%s/ovs-%s.pem" % (self.cert_dir, host)
+        f = open(root_prefix + peer_cert_file, "w")
         f.write(vals["peer_cert"])
         f.close()
 
+        vals["peer_cert_file"] = peer_cert_file
 
         self.cert_hosts[host] = vals
         self.commit()
@@ -489,10 +491,8 @@ def main():
                         vlog.warn("no valid SSL entry for %s" % name)
                         continue
 
-                    cert_name = "ovs-%s.pem" % (options.get("remote_ip"))
                     entry["certificate"] = ssl_cert[0]
                     entry["private_key"] = ssl_cert[1]
-                    entry["peer_cert_file"] = Racoon.cert_dir + "/" + cert_name
 
                 new_interfaces[name] = entry