strongswan-5.0.2.ebuild: elog "/etc/sudoers:" elog " Defaults:ipsec always_set_home,!env_reset" elog " ipsec ALL=(ALL) NOPASSWD: /usr/sbin/ipsec" elog "Under the specific connection block in /etc/ipsec.conf:" elog " leftupdown=\"sudo ipsec _updown\"" However, after setting such options, no firewall rules are inserted, because $1 given from ipsec to _updown is blank. Thus we need to modify the leftupdown and append "iptables". Also, the environment preservation can be made easier by calling sudo -E. A complete working example: sudoers: ipsec ALL = NOPASSWD: SETENV: /usr/sbin/ipsec ipsec.conf: leftupdown="sudo -E ipsec _updown iptables" --- strongswan-5.0.2.ebuild 2013-02-02 18:34:50.000000000 +0100 +++ strongswan-5.0.2-r1.ebuild 2013-03-13 16:53:08.000000000 +0100 @@ -245,10 +245,9 @@ elog "user \"ipsec\" the appropriate rights." elog "For example (the default case):" elog "/etc/sudoers:" - elog " Defaults:ipsec always_set_home,!env_reset" - elog " ipsec ALL=(ALL) NOPASSWD: /usr/sbin/ipsec" + elog " ipsec ALL=(ALL) NOPASSWD: SETENV: /usr/sbin/ipsec" elog "Under the specific connection block in /etc/ipsec.conf:" - elog " leftupdown=\"sudo ipsec _updown\"" + elog " leftupdown=\"sudo -E ipsec _updown iptables\"" elog fi elog
Fixed, thanks for reporting.
Thanks Bjarke