diff options
author | Christian Poessinger <christian@poessinger.com> | 2022-04-14 21:38:57 +0200 |
---|---|---|
committer | Christian Poessinger <christian@poessinger.com> | 2022-04-14 21:50:57 +0200 |
commit | f40a192635ec3445997c100134a638b1faece044 (patch) | |
tree | c5e1044000c4be4a09cd389c10bd1ff8234ed1f9 /data/templates/ethernet/wpa_supplicant.conf.tmpl | |
parent | dbfc2add3434638628b43ecfa097fbd166c85db7 (diff) | |
download | vyos-1x-f40a192635ec3445997c100134a638b1faece044.tar.gz vyos-1x-f40a192635ec3445997c100134a638b1faece044.zip |
ethernet: T4353: fix Jinja2 linting errors
Diffstat (limited to 'data/templates/ethernet/wpa_supplicant.conf.tmpl')
-rw-r--r-- | data/templates/ethernet/wpa_supplicant.conf.tmpl | 72 |
1 files changed, 0 insertions, 72 deletions
diff --git a/data/templates/ethernet/wpa_supplicant.conf.tmpl b/data/templates/ethernet/wpa_supplicant.conf.tmpl deleted file mode 100644 index 74f0999c1..000000000 --- a/data/templates/ethernet/wpa_supplicant.conf.tmpl +++ /dev/null @@ -1,72 +0,0 @@ -### Autogenerated by interfaces-ethernet.py ### - -# see full documentation: -# https://w1.fi/cgit/hostap/plain/wpa_supplicant/wpa_supplicant.conf - -# For UNIX domain sockets (default on Linux and BSD): This is a directory that -# will be created for UNIX domain sockets for listening to requests from -# external programs (CLI/GUI, etc.) for status information and configuration. -# The socket file will be named based on the interface name, so multiple -# wpa_supplicant processes can be run at the same time if more than one -# interface is used. -# /var/run/wpa_supplicant is the recommended directory for sockets and by -# default, wpa_cli will use it when trying to connect with wpa_supplicant. -ctrl_interface=/run/wpa_supplicant - -# IEEE 802.1X/EAPOL version -# wpa_supplicant is implemented based on IEEE Std 802.1X-2004 which defines -# EAPOL version 2. However, there are many APs that do not handle the new -# version number correctly (they seem to drop the frames completely). In order -# to make wpa_supplicant interoperate with these APs, the version number is set -# to 1 by default. This configuration value can be used to set it to the new -# version (2). -# Note: When using MACsec, eapol_version shall be set to 3, which is -# defined in IEEE Std 802.1X-2010. -eapol_version=2 - -# No need to scan for access points in EAPoL mode -ap_scan=0 - -# EAP fast re-authentication -fast_reauth=1 - -network={ -{% if eapol is vyos_defined %} -{% if eapol.ca_certificate is vyos_defined %} - ca_cert="/run/wpa_supplicant/{{ ifname }}_ca.pem" -{% endif %} - client_cert="/run/wpa_supplicant/{{ ifname }}_cert.pem" - private_key="/run/wpa_supplicant/{{ ifname }}_cert.key" -{% endif %} - - # list of accepted authenticated key management protocols - key_mgmt=IEEE8021X - eap=TLS - -{% if mac is vyos_defined %} - identity="{{ mac }}" -{% else %} - identity="{{ hw_id }}" -{% endif %} - - # eapol_flags: IEEE 802.1X/EAPOL options (bit field) - # Dynamic WEP key required for non-WPA mode - # bit0 (1): require dynamically generated unicast WEP key - # bit1 (2): require dynamically generated broadcast WEP key - # (3) = require both keys; default) - # Note: When using wired authentication (including MACsec drivers), - # eapol_flags must be set to 0 for the authentication to be completed - # successfully. - eapol_flags=0 - - # For wired IEEE 802.1X authentication, "allow_canned_success=1" can be - # used to configure a mode that allows EAP-Success (and EAP-Failure) without - # going through authentication step. Some switches use such sequence when - # forcing the port to be authorized/unauthorized or as a fallback option if - # the authentication server is unreachable. By default, wpa_supplicant - # discards such frames to protect against potential attacks by rogue - # devices, but this option can be used to disable that protection for cases - # where the server/authenticator does not need to be authenticated. - phase1="allow_canned_success=1" -} - |