We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ipsec phase2 tunnels removed from config are not deleted in the xml / on the remote, they require a explicit
opn_unset: - ipsec/phase2[uniqid="ee0e6..."]
The text was updated successfully, but these errors were encountered:
#14 #21 added example to unset a ipsec phase2 entry
f34f2e4
How about adding something like this after the ipsecphase2.yml loop?
- name: "IPSec ike phase2 search configured uniqid for ikeid {{ ikeid }}" delegate_to: localhost xml: path: "{{ local_config_path }}" xpath: "/opnsense/ipsec/phase2[ikeid='{{ ikeid }}']/uniqid" content: text register: phase2ikeiduniqid_all - name: "IPSec ike phase2 cleanup for ikeid {{ ikeid }}" delegate_to: localhost xml: path: "{{ local_config_path }}" xpath: "/opnsense/ipsec/phase2[ikeid='{{ ikeid }}' and uniqid='{{ item.uniqid }}']" state: absent pretty_print: yes when: item.uniqid not in ipsecphasevar.phase2 with_items: "{{ phase2ikeiduniqid_all.matches }}"
Sorry, something went wrong.
@Jonybat : thanks; yes, looks like a viable solution. Would you like to open a PR? (would be great if you include a test for it)
fixed in PR #67
zerwes
fnateghi
potzblitzzz
No branches or pull requests
ipsec phase2 tunnels removed from config are not deleted in the xml / on the remote, they require a explicit
The text was updated successfully, but these errors were encountered: