[ovs-git] Open vSwitch: ovs-monitor-ipsec: Detect correctly IPSEC configuration changes (branch-1.4)

dev at openvswitch.org dev at openvswitch.org
Fri Mar 9 01:46:45 UTC 2012


This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "Open vSwitch".

The branch, branch-1.4 has been updated
       via  5e2a9988bb7853cad67a36e869d532d9d2f4533a (commit)
      from  d67025e04b96ff26f22dd51167a9c44ed0e8871c (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 5e2a9988bb7853cad67a36e869d532d9d2f4533a
Diffs: http://openvswitch.org/cgi-bin/gitweb.cgi?p=openvswitch;a=commitdiff;h=5e2a9988bb7853cad67a36e869d532d9d2f4533a
Author: Ansis Atteka <aatteka at nicira.com>
		
ovs-monitor-ipsec: Detect correctly IPSEC configuration changes
		
If Open vSwitch has IPSEC tunnel (with certificates) and Interface
table was updated, then ovs-monitor-ipsec daemon would incorrectly
remove and readd all existing IPSEC tunnels.

The root cause for this issue was that "peer_cert_file" key was present in
interfaces dictionary, but it was missing in new_interfaces dictionary.

Signed-off-by: Ansis Atteka <aatteka at nicira.com>
Reported-by: Niklas Andersson <nandersson at nicira.com>


-----------------------------------------------------------------------

Summary of changes:
 debian/ovs-monitor-ipsec |    7 ++++---
 1 files changed, 4 insertions(+), 3 deletions(-)


hooks/post-receive
-- 
Open vSwitch



More information about the git mailing list