<feed xmlns='http://www.w3.org/2005/Atom'>
<title>vyos-1x.git/src/etc/systemd/system, branch current</title>
<subtitle>VyOS command definitions, scripts, and utilities (mirror of https://github.com/marekm72/vyos-1x.git)
</subtitle>
<id>https://git.amelek.net/marekm72/vyos-1x.git/atom?h=current</id>
<link rel='self' href='https://git.amelek.net/marekm72/vyos-1x.git/atom?h=current'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/marekm72/vyos-1x.git/'/>
<updated>2024-05-12T08:36:34+00:00</updated>
<entry>
<title>suricata: T751: Initial support for suricata</title>
<updated>2024-05-12T08:36:34+00:00</updated>
<author>
<name>Maxime THIEBAUT</name>
<email>46688461+0xThiebaut@users.noreply.github.com</email>
</author>
<published>2024-05-01T20:16:03+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/marekm72/vyos-1x.git/commit/?id=549089a970e39d1ea09c10af5eaf8f696dd19d40'/>
<id>urn:sha1:549089a970e39d1ea09c10af5eaf8f696dd19d40</id>
<content type='text'>
</content>
</entry>
<entry>
<title>ssh: T6192: allow binding to multiple VRF instances</title>
<updated>2024-04-01T19:26:16+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2024-04-01T18:40:16+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/marekm72/vyos-1x.git/commit/?id=e5af1f0905991103b12302892e6f0070bbb7b770'/>
<id>urn:sha1:e5af1f0905991103b12302892e6f0070bbb7b770</id>
<content type='text'>
Currently VyOS only supports binding a service to one individual VRF. It might
become handy to have the services (initially it will be VRF, NTP and SNMP) be
bound to multiple VRFs.

Changed VRF from leafNode to multi leafNode with defaultValue: default - which
is the name of the default VRF.
</content>
</entry>
<entry>
<title>dns: T5959: Streamline dns forwarding service</title>
<updated>2024-01-21T19:29:25+00:00</updated>
<author>
<name>Indrajit Raychaudhuri</name>
<email>irc@indrajit.com</email>
</author>
<published>2023-12-30T00:21:33+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/marekm72/vyos-1x.git/commit/?id=1c1fb5fb4bd7c0d205b28caf90357ad56423464f'/>
<id>urn:sha1:1c1fb5fb4bd7c0d205b28caf90357ad56423464f</id>
<content type='text'>
Streamline configuration and operation of dns forwarding service in
following ways:

- Remove `dns_forwarding_reset.py` as its functionality is now covered
  by `dns.py`
- Adjust function names in `dns.py` to disambiguate between DNS
  forwarding and dynamic DNS
- Remove `dns_forwarding_restart.sh` as its functionality is inlined in
  `dns-forwarding.xml`
- Templatize systemd override for `pdns-recursor.service` and move the
  generated override files in /run. This ensures that the override files
  are always generated afresh after boot
- Simplify the systemd override file by removing the redundant overrides
- Relocate configuration path for pdns-recursor to `/run/pdns-recursor`
  and utilize the `RuntimeDirectory` default that pdns-recursor expects
- We do not need to use custom `--socket-dir` path anymore, the default
  path (viz., `/run/pdns-recursor` is fine)
</content>
</entry>
<entry>
<title>https: T5902: remove virtual-host configuration</title>
<updated>2024-01-09T06:29:16+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2024-01-06T09:55:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/marekm72/vyos-1x.git/commit/?id=d0d3071e99eb65edb888c26ef2fdc9e038438887'/>
<id>urn:sha1:d0d3071e99eb65edb888c26ef2fdc9e038438887</id>
<content type='text'>
We have not seen the adoption of the https virtual-host CLI option.

What it did?
* Create multiple webservers each listening on a different IP/port
  (but in the same VRF)
* All webservers shared one common document root
* All webservers shared the same SSL certificates
* All webservers could have had individual allow-client configurations
* API could be enabled for a particular virtual-host but was always enabled on
  the default host

This configuration tried to provide a full webserver via the CLI but VyOS is a
router and the Webserver is there for an API or to serve files for a local-ui.

Changes

Remove support for virtual-hosts as it's an incomplete and thus mostly useless
"thing". Migrate all allow-client statements to one top-level allow statement.
</content>
</entry>
<entry>
<title>pki: T5886: add support for ACME protocol (LetsEncrypt)</title>
<updated>2024-01-06T07:33:33+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2024-01-05T21:27:45+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/marekm72/vyos-1x.git/commit/?id=b8db1a9d7baf91b70c1b735e58710f1e2bc9fc7a'/>
<id>urn:sha1:b8db1a9d7baf91b70c1b735e58710f1e2bc9fc7a</id>
<content type='text'>
The "idea" of this PR is to add new CLI nodes under the pki subsystem to
activate ACME for any given certificate.

vyos@vyos# set pki certificate NAME acme
Possible completions:
+  domain-name          Domain Name
   email                Email address to associate with certificate
   listen-address       Local IPv4 addresses to listen on
   rsa-key-size         Size of the RSA key (default: 2048)
   url                  Remote URL (default:
                        https://acme-v02.api.letsencrypt.org/directory)

Users choose if the CLI based custom certificates are used
  set pki certificate EXAMPLE acme certificate &lt;base64&gt;
or if it should be generated via ACME.

The ACME server URL defaults to LetsEncrypt but can be changed to their staging
API for testing to not get blacklisted.
  set pki certificate EXAMPLE acme url https://acme-staging-v02.api.letsencrypt.org/directory

Certificate retrieval has a certbot --dry-run stage in verify() to see if it
can be generated.

After successful generation, the certificate is stored in under
/config/auth/letsencrypt. Once a certificate is referenced in the CLI (e.g. set
interfaces ethernet eth0 eapol certificate EXAMPLE) we call
vyos.config.get_config_dict() which will (if with_pki=True is set) blend in the
base64 encoded certificate into the JSON data structure normally used when
using a certificate set by the CLI.

Using this "design" does not need any change to any other code referencing the
PKI system, as the base64 encoded certificate is already there.

certbot renewal will call the PKI python script to trigger dependency updates.
</content>
</entry>
<entry>
<title>T5897: frr should be stopped before vyos-router</title>
<updated>2024-01-04T10:16:22+00:00</updated>
<author>
<name>Date Huang</name>
<email>tjjh89017@hotmail.com</email>
</author>
<published>2024-01-04T10:16:22+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/marekm72/vyos-1x.git/commit/?id=6d16ab081b70bc4ea837b66dfe032ec6bdb563d7'/>
<id>urn:sha1:6d16ab081b70bc4ea837b66dfe032ec6bdb563d7</id>
<content type='text'>
Signed-off-by: Date Huang &lt;tjjh89017@hotmail.com&gt;
</content>
</entry>
<entry>
<title>dhcp: T3316: Migrate dhcp/dhcpv6 server to Kea</title>
<updated>2023-12-07T23:29:38+00:00</updated>
<author>
<name>sarthurdev</name>
<email>965089+sarthurdev@users.noreply.github.com</email>
</author>
<published>2022-12-16T10:41:33+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/marekm72/vyos-1x.git/commit/?id=d95200e96763e4a7ed02577b1b177c84abb77838'/>
<id>urn:sha1:d95200e96763e4a7ed02577b1b177c84abb77838</id>
<content type='text'>
</content>
</entry>
<entry>
<title>mdns: T5723: Always reload systemd daemon before applying changes</title>
<updated>2023-11-07T21:51:13+00:00</updated>
<author>
<name>Indrajit Raychaudhuri</name>
<email>irc@indrajit.com</email>
</author>
<published>2023-11-07T20:03:20+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/marekm72/vyos-1x.git/commit/?id=eb906739047187c322b6ce9efe7c9479bed9a024'/>
<id>urn:sha1:eb906739047187c322b6ce9efe7c9479bed9a024</id>
<content type='text'>
Additionally, templatize system service override and move it to the
runtime path.
</content>
</entry>
<entry>
<title>T5480: Ability to disable SNMP for keepalived service VRRP</title>
<updated>2023-09-05T10:52:41+00:00</updated>
<author>
<name>Viacheslav Hletenko</name>
<email>v.gletenko@vyos.io</email>
</author>
<published>2023-09-05T10:52:41+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/marekm72/vyos-1x.git/commit/?id=5ae730a52de2f284e45cd433bb0cf66c8508f2f7'/>
<id>urn:sha1:5ae730a52de2f284e45cd433bb0cf66c8508f2f7</id>
<content type='text'>
By default we enable `--snmp` for keepalived unit service
Add ability to disable it

set high-availability vrrp disable-snmp
</content>
</entry>
<entry>
<title>T3355: import startup scripts from vyatta-cfg repo for vyos-router</title>
<updated>2023-07-09T18:45:15+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2023-07-09T18:45:15+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/marekm72/vyos-1x.git/commit/?id=00f95c93b6c3aca25d5f4ba0e29b4f8db954952c'/>
<id>urn:sha1:00f95c93b6c3aca25d5f4ba0e29b4f8db954952c</id>
<content type='text'>
</content>
</entry>
</feed>
