summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2023-09-21T5602: Reverse-proxy add option backup for backend serverViacheslav Hletenko
A `backup` server can be defined to take over in the case of all other backends failing set load-balancing reverse-proxy backend <tag> server <tag> address '192.0.2.3' set load-balancing reverse-proxy backend <tag> server <tag> port '8883' set load-balancing reverse-proxy backend <tag> server <tag> backup (cherry picked from commit cb297aea56da91144c53be1f396b64a26a8e5b04)
2023-09-20Merge pull request #2297 from vyos/mergify/bp/sagitta/pr-2296Christian Breunig
openvpn: T5269: add a deprecation warning for shared-secret (backport #2296)
2023-09-20openvpn: T5269: add a deprecation warning for shared-secretDaniil Baturin
(cherry picked from commit 4bbbaab60d56bfd6f3a145378027642b4c47adee)
2023-09-19Merge pull request #2290 from vyos/mergify/bp/sagitta/pr-2285Daniil Baturin
isis: T5597: add new features from FRR 9 (backport #2285)
2023-09-19isis: T5597: add new features from FRR 9Christian Breunig
* Add support for IS-IS advertise-high-metrics set protocols isis advertise-high-metrics * Add support for IS-IS advertise-passive-only set protocols isis advertise-passive-only (cherry picked from commit f7d35c15256ea74ab32c9b978a5c6fdbd659a7a0)
2023-09-19Merge pull request #2287 from vyos/mergify/bp/sagitta/pr-2281Christian Breunig
T5594: vrrp: extend function is_ipv6_tentative (backport #2281)
2023-09-19T5594: vrrp: extend function is_ipv6_tentative to analysis all type of ipv6 ↵Nicolas Fort
address, and not only global ipv6 address. This allows to configure ipv6 link local address on vrrp hello-source-address parameter. (cherry picked from commit b6ae59354b5d69751cc7ea75e0aa4ac0070afa47)
2023-09-16Merge pull request #2267 from vyos/mergify/bp/sagitta/pr-2253Christian Breunig
T5561: nat: inbound|outbound interface should not be mandatory (backport #2253)
2023-09-16Merge pull request #2275 from c-po/sagittaChristian Breunig
frr: T2472: disable EIGRP daemon
2023-09-16frr: T2472: disable eigrp daemonChristian Breunig
There is no EIGRP support in VyOS 1.4/sagitta
2023-09-15Merge pull request #2271 from vyos/mergify/bp/sagitta/pr-2270Christian Breunig
ddclient: T5585: Fix file access mode for dynamic dns configuration (backport #2270)
2023-09-15Merge pull request #2266 from vyos/mergify/bp/sagitta/pr-2255Christian Breunig
T5575: ARP/NDP table-size isnt set properly (backport #2255)
2023-09-15Merge pull request #2265 from vyos/mergify/bp/sagitta/pr-2262Viacheslav Hletenko
op mode: T5582: Add 'force ntp synchronization' (backport #2262)
2023-09-15Merge pull request #2274 from vyos/mergify/bp/sagitta/pr-2273Christian Breunig
T5586: Disable by default SNMP for Keeplived VRRP service (backport #2273)
2023-09-15T5586: Disable by default SNMP for Keeplived VRRP serviceViacheslav Hletenko
AgentX does not work stable. From time to time we see the system service crashing/degrading if something is wrong with SNMP from util net-snmp. We should disable it by default and enable it only if configured. set high-availability vrrp snmp (cherry picked from commit 47875457cd8b176f7f23a3141175d745aeb14d8a)
2023-09-15system: T5505: T5575: support calling system-ip(v6).py from init processChristian Breunig
After commit 976f82785 ("T5575: ARP/NDP table-size isnt set properly") the system bootup process got interrupted as both system-ip.py and system-ipv6.py tried to talk to FRR which was yet not started. This has been fixed by using a conditional path to only execute when FRR service has been enabled. This is safe to do as the initial commit call will has FRR service running and the path will be executed. (cherry picked from commit 22d5cd42f082fb11060edc51128f0b246198d2c1)
2023-09-15ddclient: T5585: Fix file access mode for dynamic dns configurationIndrajit Raychaudhuri
ddclient.conf file is expected to have permission 600. We need to set the permission explicitly while creating the file. (cherry picked from commit 7a66413d6010485dd913832f54167bce38c12250)
2023-09-14T5561: nat: defining inbound|outbound interface should not be mandatory ↵Nicolas Fort
while configuring dNAT|sNAT rule (cherry picked from commit ec5437913e489f40fea6bab89a6bb5f565cd1ab7)
2023-09-14Merge pull request #2254 from vyos/mergify/bp/sagitta/pr-2245Christian Breunig
frr: T5239: fix process startup order (backport #2245)
2023-09-14T5575: ARP/NDP table-size isnt set properlyApachez
(cherry picked from commit 976f827859102a4e453b38bc6d2a628c66c9b582)
2023-09-14T5575: ARP/NDP table-size isnt set properlyApachez
(cherry picked from commit 9391fc273ce95ff92a6b40b2dee4a688d3048f9f)
2023-09-14T5582: make "force ntp synchronisation" command VRF awareChristian Breunig
(cherry picked from commit c27b0ca1816bc9fcbb88b05ae3193d765b798d81)
2023-09-14op mode: T5582: Add 'force ntp synchronization'Daniil Baturin
(cherry picked from commit 8e5931c94a4ee409424ba092777a1a9ce03768d7)
2023-09-14Merge pull request #2261 from vyos/mergify/bp/sagitta/pr-2260John Estabrook
T671: do not preserve old tech-support report implementation (backport #2260)
2023-09-14Merge pull request #2258 from vyos/mergify/bp/sagitta/pr-2257Viacheslav Hletenko
op-mode: T5581: add "show ip nht" command (IPv4 nexthop tracking table) (backport #2257)
2023-09-14Merge pull request #2212 from sever-sever/T5480-sagDaniil Baturin
T5480: Ability to disable SNMP for keepalived service VRRP
2023-09-14Merge pull request #2259 from vyos/mergify/bp/sagitta/pr-2252Christian Breunig
T5576: Add BGP remove-private-as all option (backport #2252)
2023-09-13T671: do not preserve old tech-support report implementationJohn Estabrook
(cherry picked from commit d1ec84877f8ca0a78f1ab37d21ff43d212644fd6)
2023-09-13T5576: Add BGP remove-private-as all optionViacheslav Hletenko
Add the ability to use the option all for remove-private-as. Remove private ASNs in outbound updates. all - Apply to all AS numbers set protocols bgp neighbor <tag> address-family ipv4-unicast remove-private-as all (cherry picked from commit d72024b11e127cc11931cfaee4d07944dceb1ea9)
2023-09-13op-mode: T5581: add "show ip nht" command (IPv4 nexthop tracking table)Christian Breunig
vyos@vyos:~$ show ip nht 172.18.254.202 resolved via ospf via 172.18.201.254, eth0.201 (vrf default), weight 1 Client list: bgp(fd 28) (cherry picked from commit 138e60831842ea9366655fde7acf929d8c9f645b)
2023-09-13frr: T5239: T2061: prevent writing logs to /var/log/frr/frr.logChristian Breunig
(cherry picked from commit d4b9b2aa5f5dda6a11b7038ab0ab52653531183d)
2023-09-13frr: T5239: fix process startup orderChristian Breunig
- Reuse existing utility functions to check if a boot is ongoing (boot_configuration_complete()) - Run system_frr.py script to configure FRR daemon before initial launch - Add safety net to always have FRR running on the system This does yet not solve the error in T5239 but it's a small step towards the solution. (cherry picked from commit df74a09b80df0c2ec769a10ef4f7bac01f50eb2d)
2023-09-12Merge pull request #2237 from vfreex/fix-nat-problem-with-vrf-sagittaChristian Breunig
T3655: Fix NAT problem with VRF
2023-09-12Merge pull request #2247 from sever-sever/T5562-sagViacheslav Hletenko
T5562: Cleanup netns for smoketest load-balancing wan
2023-09-12T5562: Cleanup netns for smoketest load-balancing wanViacheslav Hletenko
Cleanup nets for the smoketest load-balancing Remove deleting container interfaces from default netns as those interfaces leave inly in netns. (cherry picked from commit 849499f44f6e50c591e250cf40b5ab0115839b53)
2023-09-12Merge pull request #2244 from vyos/mergify/bp/sagitta/pr-2235Viacheslav Hletenko
T5564: Fix show firewall group and show firewall summary (backport #2235)
2023-09-11T5564: Fix show firewall group and show firewall summaryViacheslav Hletenko
The `rule` key could be not exists in the entry of the dictionary for examppe `{'default_action': 'drop'}` Fix it (cherry picked from commit 9daac1632df96b6d2089244e3c7a7b42ae682eb9)
2023-09-11Merge pull request #2215 from jestabro/T5353-sagittaJohn Estabrook
config-mgmt: T5353: normalize archive updates and commit log entries
2023-09-11init: remove dependency on frr.service - required for router shutdownChristian Breunig
(cherry picked from commit af398c51f7d06cdf582b347a35b1e5c867aaea58)
2023-09-11vxlan: T3700: Revert change to `vyos.utils.process.cmd`sarthurdev
(cherry picked from commit e46afa2c58eea2d81df84e2630a6f346f1f51c2a)
2023-09-10Merge pull request #2214 from sever-sever/T5533-sagJohn Estabrook
T5533: Fix for vrrp dict key if virtual-server is used
2023-09-10T3655: Fix NAT problem with VRFYuxiang Zhu
Linux netfilter patch https://patchwork.ozlabs.org/project/netfilter-devel/patch/d0f84a97f9c86bec4d537536a26d0150873e640d.1439559328.git.daniel@iogearbox.net/ adds direction support for conntrack zones, which makes it possible to do NAT with conflicting IP address/port tuples from multiple, isolated tenants on a host. According to the description of the kernel patch: > ... overlapping tuples can be made unique with the zone identifier in original direction, where the NAT engine will then allocate a unique tuple in the commonly shared default zone for the reply direction. I did some basic tests in my lab and it worked fine to forward packets from eth0 to pppoe0. - eth0 192.168.1.1/24 in VRF red - pppoe0 dynamic public IP from ISP VRF default - set vrf name red protocols static route 0.0.0.0/0 interface pppoe0 vrf 'default' - set protocols static route 192.168.1.0/24 interface eth0 vrf 'red' `conntrack -L` shows something like: ``` tcp 6 113 ESTABLISHED src=192.168.1.2 dst=1.1.1.1 sport=58946 dport=80 zone-orig=250 packets=6 bytes=391 src=1.1.1.1 dst=<my-public-ip> sport=80 dport=58946 packets=4 bytes=602 [ASSURED] mark=0 helper=tns use=1 ``` It would be much appreciated if someone could test this with more complex VRF setup.
2023-09-10T5567: Increase allowed range for maximum-object-size to 1000000 KB for the ↵Alain Lamar
webproxy service (cherry picked from commit 4401c6920fed08050832a00041021137e9efae54)
2023-09-09Merge pull request #2231 from sever-sever/sonar-sagViacheslav Hletenko
Revert "Create build.yml"
2023-09-09Revert "Create build.yml"Viacheslav Hletenko
This reverts commit 7a99a59b338fecd73d34819a0a95646c054a0f12. SonarCloud is not configured for now properly. Revert this commit until we confiugre all properly if we'll use it in the future. (cherry picked from commit a0e3d29ee33e6c5b773e29ccd5a226e7f6c3bfd1)
2023-09-09Merge pull request #2229 from c-po/sagittaViacheslav Hletenko
container: T5563 Fix environment replaced by label
2023-09-09container: T5563 Fix environment replaced by labelCyrus
(cherry picked from commit 79a46675b031a4edc0ea925a45066077c0804b9b)
2023-09-09vxlan: T3700: support VLAN tunnel mapping of VLAN aware bridgesChristian Breunig
FRR supports a new way of configuring VLAN-to-VNI mappings for EVPN-VXLAN, when working with the Linux kernel. In this new way, the mapping of a VLAN to a VNI is configured against a container VXLAN interface which is referred to as a 'Single VXLAN device (SVD)'. Multiple VLAN to VNI mappings can be configured against the same SVD. This allows for a significant scaling of the number of VNIs since a separate VXLAN interface is no longer required for each VNI. Sample configuration of SVD with VLAN to VNI mappings is shown below. set interfaces bridge br0 member interface vxlan0 set interfaces vxlan vxlan0 external set interfaces vxlan vxlan0 source-interface 'dum0' set interfaces vxlan vxlan0 vlan-to-vni 10 vni '10010' set interfaces vxlan vxlan0 vlan-to-vni 11 vni '10011' set interfaces vxlan vxlan0 vlan-to-vni 30 vni '10030' set interfaces vxlan vxlan0 vlan-to-vni 31 vni '10031' (cherry picked from commit 7f6624f5a6f8bd1749b54103ea5ec9f010adf778)
2023-09-08Merge pull request #2224 from sever-sever/T5489-sagViacheslav Hletenko
T5489: Add sysctl TCP congestion control by default to BBR
2023-09-08Merge pull request #2226 from sever-sever/T5423-sagViacheslav Hletenko
T5423: Fix for op-mode show vpn ike secrets