Details

  This change introduces a new automated test for StrongSwan PSK
  connectivity.

  site_linux_server.py is modified to do the following:

    vpn_strongswan_config_templates()

      Takes a list of configuration file names, and their contents.
      The contents can have text that is replaced at write-out time
      with runtime information, such as the current server IP number.

    vpn_server_config()

      Now suports the 'l2tpipsec' type of VPN connection.

      It is the responsibility of the person writing the test to make
      sure the contents of the provided configuration templates are
      correct, and self-consistent.

    vpn_server_kill()

      If the current type of VPN is 'l2tpipsec', then all programs
      known to be associated with that system are killed.

  site_wifitest.py is modified thusly:

    Two types of l2tpipsec configurations are supported

      lt2pipsec-psk
      lt2pipsec-cert

    The former uses PSK, and the latter uses certificates.  This
    separation was done to simplify the use of 'connect-vpn' (see
    review 6756032) as well as the starting of the VPN itself.

Testing

   Starting StrongSwan causes the default route on the system to go
   through the VPN (which causes active connections to go dead),
   automated testing is incomplete at this point.

   Initiating the VPN using 'connect-vpn l2tpipsec-psk' functions
   correctly.

   Initiating the VPN using 'connect-vpn l2tpipsec-cert' has not yet
   been tested; I do not have configuration files for certificate mode.

See issue 6756032.

BUG=chromium-os:11824
Testing=See above

Review URL: http://codereview.chromium.org/6765030

Change-Id: I046e0084f9f59ea4fcdc1cccc6e6d30fee79b0f3
5 files changed