Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-09-04 | [service https] T1443: use "listen-address" option instead of "listen-addresses" | Daniil Baturin | |
to follow the established convention. | |||
2019-09-04 | Update changelog. | Daniil Baturin | |
2019-09-04 | [service https] T1443: create /etc/vyos if it doesn't exist. | Daniil Baturin | |
2019-09-04 | T1443: backport the HTTP API to crux. | Daniil Baturin | |
Implementation by Daniil Baturin and John Estabrook. | |||
2019-08-31 | [wireguard] T1428: Add handling of fwmark setting (#70) | Matthias Fetzer | |
[wireguard] T1428: correct handling of the fwmark option | |||
2019-08-31 | [syslog] T1530 - "set system syslog global archive file" doesn't work | hagbard | |
2019-08-31 | [VRRP] T1362: quote VRRP password strings to avoid config parse errors. | Daniil Baturin | |
2019-08-30 | T1598: fix vyos-hostsd unit dependencies. | Daniil Baturin | |
2019-08-29 | T1598: import the static-host-mappings CLI from current. | Daniil Baturin | |
2019-08-29 | T1598: import the new host_name.py from current. | Daniil Baturin | |
2019-08-29 | T1598: fix the debian/rules to get vyos-hostsd installed. | Daniil Baturin | |
2019-08-27 | T1598: make dns_forwarding.py retrieve name servers from vyos-hostsd. | Daniil Baturin | |
2019-08-27 | T1598: add a vyos-hostsd operation for retrieving name servers by tag. | Daniil Baturin | |
2019-08-27 | T1606: change vyos-hostsd systemd target to avoid boot problems | John Estabrook | |
2019-08-27 | T1598: clean up vyos-hostsd state dump on clean shutdown. | Daniil Baturin | |
2019-08-27 | T1598: improve autogenerated file comments. | Daniil Baturin | |
2019-08-27 | T1598: handle the socket timeout exception in vyos.hostsd_client | Daniil Baturin | |
2019-08-27 | T1598: start vyos-hostsd before everything that may need it. | Daniil Baturin | |
2019-08-27 | T1598: initial implementation of the hosts keeper daemon. | Daniil Baturin | |
Conflicts: debian/control | |||
2019-08-25 | powerdns: T1524: support setting allow-from network | Christian Poessinger | |
Netmasks (both IPv4 and IPv6) that are allowed to use the server. The default allows access only from RFC 1918 private IP addresses. Due to the aggressive nature of the internet these days, it is highly recommended to not open up the recursor for the entire internet. Questions from IP addresses not listed here are ignored and do not get an answer. https://docs.powerdns.com/recursor/settings.html#allow-from Imagine an ISP network with non RFC1918 IP adresses - they can't make use of PowerDNS recursor. As of now VyOS hat allow-from set to 0.0.0.0/0 and ::/0 which created an open resolver. If there is no allow-from statement a config-migrator will add the appropriate nodes to the configuration, resulting in: service { dns { forwarding { allow-from 0.0.0.0/0 allow-from ::/0 cache-size 0 ignore-hosts-file listen-address 192.0.2.1 } } } (cherry picked from commit dc0f641956d002fa8588ef8d1213791cf36e92f2) | |||
2019-08-13 | Merge pull request #101 from DmitriyEshenko/patch-6 | Daniil Baturin | |
[show arp] T1576 deleting improper quotes | |||
2019-08-12 | [show arp] T1576 deleting improper quotes | Eshenko Dmitriy | |
2019-07-25 | T1541 Fix: adding additional check | Eshenko Dmitriy | |
(cherry picked from commit 3945b2259aaa64eb9f4d61334126235f2d641293) | |||
2019-07-23 | [wireguard] fixing value help typo | hagbard | |
(cherry picked from commit 36f8a1e4e5966c43c5330ff223fa2ef07d346b6e) | |||
2019-07-23 | [wireguard] T1425 - assign a /31 address on Wireguard interface | hagbard | |
- added a validator for checking if the address is any cidr noted address (cherry picked from commit 2ee0eff1bd04ef02b0769341eee22543f8011b68) | |||
2019-07-21 | T1537: add missing help for 'set service dns' | Christian Poessinger | |
(cherry picked from commit d99bf6a3a623433e743bb2d1d72e2ef3e0ab5057) | |||
2019-07-21 | [dns-forwarding] T1333: handle domain forward and general recursion in one ↵ | Christian Poessinger | |
configuration line In the past we used the PowerDNS cofniguration option forward-zones and forward-zones-recurse, but only the latter one sets the recursion bit in the DNS query. Thus all recursions have been moved to this config statement. (cherry picked from commit 5886dd27cbc65f8cda04752bbd39a960b0887523) | |||
2019-07-19 | T1527: fix typo, s/IPv5/IPv6/ | Daniil Baturin | |
2019-07-19 | T1440: in IPv4 DHCP, print the subnet rather than a dict dump | Daniil Baturin | |
when a non-unique subnet is found. | |||
2019-07-17 | Update changelog. | Daniil Baturin | |
2019-07-16 | T1531: do not include FQDN in the hostname. | Daniil Baturin | |
2019-07-12 | Do not try to verify the config when host_name.py is called from dhclient ↵ | Daniil Baturin | |
script. | |||
2019-07-11 | [wireguard] - T1516: changing committed config causes error | hagbard | |
2019-07-09 | T1497: remove duplicate values from name servers and search domains obtained ↵ | Daniil Baturin | |
from DHCP. | |||
2019-07-08 | Fix a stray debug print in vyos-config-file-query. | Daniil Baturin | |
2019-07-04 | Merge branch 'crux' of https://github.com/vyos/vyos-1x into crux | Daniil Baturin | |
2019-07-04 | T1497: make host_name.py wait for commit lock too. | Daniil Baturin | |
2019-07-04 | T1497: remove the no longer necessary workaround for bad ↵ | Daniil Baturin | |
return_effective_values output. | |||
2019-07-04 | [vyos.config] T1505: correct return_effective_values output splitting. | Daniil Baturin | |
2019-07-03 | Merge pull request #76 from qiuchengxuan/crux | Christian Poessinger | |
[pdns-recursor] T1469 - replace forward-zones with forward-zones-recurse | |||
2019-07-03 | T1504: wait for commit lock before trying to update resolv.conf in the out ↵ | Daniil Baturin | |
of CLI mode. | |||
2019-07-03 | T1503: add functions for commit lock checking and waiting. | Daniil Baturin | |
Conflicts: python/vyos/defaults.py | |||
2019-07-02 | Merge pull request #84 from UnicronNL/crux | Kim | |
T1497: "set system name-server" generates invalid/incorrect resolv.conf | |||
2019-07-02 | T1497: "set system name-server" generates invalid/incorrect resolv.conf | UnicronNL | |
2019-07-01 | Merge pull request #81 from UnicronNL/crux | Kim | |
T1498: Nameservers are not propagated into resolv.conf | |||
2019-07-01 | T1498: Nameservers are not propagated into resolv.conf | Kim Hagen | |
2019-06-25 | [pdns-recursor] T1469 - replace forward-zones with forward-zones-recurse | qiuchengxuan | |
forward-zones-recurse behaves identically to dnsmasq server option in legacy vyos 1.1.8, while forward-zones option disallow recursive name resolving, which leads to dns lookup failure | |||
2019-06-22 | DHCPDv6 T1433: rename daemon configuration file | Christian Poessinger | |
... to have the same pattern as the DHCPDv6 lease file (cherry picked from commit adaa9b78e2fb0c7da58ca6c09934b3e3cff44795) | |||
2019-06-22 | DHCPDv6 T1433: fix wrong lease file name | Christian Poessinger | |
A wrong lease file caused the show command to fail: vyos@vyos:~$ show dhcpv6 server leases Traceback (most recent call last): File "/usr/libexec/vyos/op_mode/show_dhcpv6.py", line 81, in <module> leases = get_leases(lease_file, state='active') File "/usr/libexec/vyos/op_mode/show_dhcpv6.py", line 44, in get_leases leases = IscDhcpLeases(lease_file).get() File "/usr/lib/python3/dist-packages/isc_dhcp_leases/iscdhcpleases.py", line 110, in get with open(self.filename) as lease_file: FileNotFoundError: [Errno 2] No such file or directory: '/config/dhcpdv6.leases' (cherry picked from commit 3b9bfe322fd4a7d652b25b28cbcd4825fee0ea4b) | |||
2019-06-22 | T1433: fix also filenames in /etc/default/isc-dhcpv6-server | Jernej Jakob | |
(cherry picked from commit 690ae8bf526b6d45997bedf5e856f858ad251658) |