From 41584eb897a3e0739643542b041215d6a1f6d0d5 Mon Sep 17 00:00:00 2001 From: Vasyl Saienko Date: Fri, 23 Dec 2022 09:41:34 +0000 Subject: [PATCH] Do not spawn strongswan ipsec for admin down connections Honor admin_state_up flag when handling vpn connection. Change-Id: I9b053aa11ed03cdb8d441ca05c7e8faabe1fc140 --- neutron_vpnaas/services/vpn/device_drivers/strongswan_ipsec.py | 2 ++ 1 file changed, 2 insertions(+) diff --git a/neutron_vpnaas/services/vpn/device_drivers/strongswan_ipsec.py b/neutron_vpnaas/services/vpn/device_drivers/strongswan_ipsec.py index 708952a1f..b03a9e756 100644 --- a/neutron_vpnaas/services/vpn/device_drivers/strongswan_ipsec.py +++ b/neutron_vpnaas/services/vpn/device_drivers/strongswan_ipsec.py @@ -193,6 +193,8 @@ class StrongSwanProcess(ipsec.BaseSwanProcess): self._execute([self.binary, 'start']) # initiate ipsec connection for ipsec_site_conn in self.vpnservice['ipsec_site_connections']: + if not ipsec_site_conn['admin_state_up']: + continue self._execute([self.binary, 'stroke', 'up-nb', ipsec_site_conn['id']])