Age | Commit message (Collapse) | Author | |
---|---|---|---|
2024-04-06 | Debian: T6199: add pylint do list of build dependencies | Christian Breunig | |
2024-04-06 | Merge pull request #3260 from c-po/spring-cleaning-3 | Christian Breunig | |
T6199: remove unused Python imports from migration scripts | |||
2024-04-06 | T6199: remove unused Python imports from migration scripts | Christian Breunig | |
2024-04-06 | Merge pull request #3219 from l0crian1/add-fw-description-show | Viacheslav Hletenko | |
T6188: add description to show firewall | |||
2024-04-05 | Merge pull request #3255 from jestabro/remove-xml-lib | Christian Breunig | |
T6203: remove obsoleted xml lib | |||
2024-04-05 | T6203: remove obsoleted xml lib | John Estabrook | |
The vyos.xml functionality is replaced with vyos.xml_ref. | |||
2024-04-05 | T6188: Add description to detail view only | l0crian1 | |
For readability in console sessions, moved the description column to only be shown in the detail view. Changed wrapping in the detail view for description to 65 characters to prevent full line wrapping in console sessions. | |||
2024-04-05 | Merge pull request #3252 from HollyGurza/T6204 | Christian Breunig | |
T6204: cleanup shebang lines | |||
2024-04-05 | T6204: cleanup shebang lines | khramshinr | |
2024-04-04 | op-mode: T6203: replace use of vyos.xml.defaults with automatic defaults | John Estabrook | |
2024-04-04 | Merge pull request #3249 from c-po/ospf-T6089 | Christian Breunig | |
ospf: T6089: fix invalid "ospf passive-interface default" | |||
2024-04-04 | GitHub: fix "on" trigger for unused-imports workflow | Christian Breunig | |
2024-04-04 | ospf: T6089: fix invalid "ospf passive-interface default" | Christian Breunig | |
The option "passive-interface default" was set even if it was not present in the previous version we are migrating from. Fix migration script to handle this with a conditional path. | |||
2024-04-04 | Merge pull request #3244 from aapostoliuk/T6197-circinus | Christian Breunig | |
T6197: Fixed usage ipoe interface client-subnet without pools | |||
2024-04-04 | Merge pull request #3246 from c-po/spring-cleaning-2 | Christian Breunig | |
T6199: drop unused Python imports from graphql source | |||
2024-04-04 | Makefile: improve "unused-imports" target | Christian Breunig | |
2024-04-04 | T6199: drop unused Python imports from graphql source | Christian Breunig | |
2024-04-04 | Merge pull request #3238 from HollyGurza/T5943 | Daniil Baturin | |
bgp: T5943: BGP Peer-group members must be all internal or all external | |||
2024-04-04 | Merge pull request #3214 from nicolas-fort/T6068-kea | Daniil Baturin | |
T6068: dhcp-server: add command <set service dhcp-server high-availability mode> | |||
2024-04-04 | T6197: Fixed usage ipoe interface client-subnet without pools | aapostoliuk | |
Allowed using ipoe interface client-subnet without client pools configuration. | |||
2024-04-04 | Merge pull request #3242 from HollyGurza/T6166 | Christian Breunig | |
T6166: Tech support generation error for custom output location | |||
2024-04-04 | T6166: Tech support generation error for custom output location | khramshinr | |
2024-04-04 | bgp: T5943: BGP Peer-group members must be all internal or all external | khramshinr | |
2024-04-03 | GitHub: run unused imports action only for pull requests | Christian Breunig | |
2024-04-03 | Merge pull request #3240 from c-po/spring-cleaning | Christian Breunig | |
T6199: spring cleaning - drop unused Python imports | |||
2024-04-03 | T6068: dhcp-server: add command <set service dhcp-server high-availability ↵ | Nicolas Fort | |
mode> so user can define what type of ha use: active-active or active-passive | |||
2024-04-03 | GitHub: add action to check for unused imports | Christian Breunig | |
2024-04-03 | T6199: drop unused Python imports | Christian Breunig | |
found using "git ls-files *.py | xargs pylint | grep W0611" | |||
2024-04-03 | T6199: replace netifaces.interfaces() with common custom helpers | Christian Breunig | |
* Use interface_exists() outside of verify() * Use verify_interface_exists() in verify() to drop common error message | |||
2024-04-03 | T6199: drop unused sphinx documentation folder | Christian Breunig | |
2024-04-02 | Merge pull request #3236 from c-po/pki-verify | Christian Breunig | |
configverify: T6198: add common helper for PKI certificate validation | |||
2024-04-02 | configverify: T6198: add common helper for PKI certificate validation | Christian Breunig | |
The next evolutional step after adding get_config_dict(..., with_pki=True) is to add a common verification function for the recurring task of validating SSL certificate existance in e.g. EAPoL, OpenConnect, SSTP or HTTPS. | |||
2024-04-02 | Merge pull request #3229 from c-po/multi-vrf | Christian Breunig | |
T6192: allow binding SSH to multiple VRF instances | |||
2024-04-02 | Merge pull request #3230 from c-po/syntax-cleanup | Christian Breunig | |
firewall: nat: policy: vrf: nft call syntax and import cleanup | |||
2024-04-02 | Merge pull request #3232 from aapostoliuk/T6196-circinus | Christian Breunig | |
T6196: Fixed applying parameters for aggregation in BGP | |||
2024-04-02 | T6196: Fixed applying parameters for aggregation in BGP | aapostoliuk | |
Fixed using 'route-map', 'as-set' and 'summary-only' together in aggregation in BGP | |||
2024-04-01 | Merge pull request #3212 from fett0/T6151 | fett0 | |
bgp: T6151: Allow configuration of disable-ebgp-connected-route-check | |||
2024-04-01 | init: T3355: always use full nft command name (e.g. --file over -f) | Christian Breunig | |
2024-04-01 | firewall: T970: always use full nft command name (e.g. --file over -f) | Christian Breunig | |
2024-04-01 | conntrack: T4309: T4903: always use full nft command name (e.g. --file over -f) | Christian Breunig | |
2024-04-01 | nhrp: T2199: always use full nft command name (e.g. --file over -f) | Christian Breunig | |
2024-04-01 | policy: T2199: always use full nft command name (e.g. --file over -f) | Christian Breunig | |
2024-04-01 | nat: T2199: always use full nft command name (e.g. --file over -f) | Christian Breunig | |
2024-04-01 | vrf: T3655: always use full nft command name (e.g. --check over -c) | Christian Breunig | |
2024-04-01 | firewall: T2199: always use full nft command name (e.g. --file over -f) | Christian Breunig | |
2024-04-01 | ssh: T6192: allow binding to multiple VRF instances | Christian Breunig | |
Currently VyOS only supports binding a service to one individual VRF. It might become handy to have the services (initially it will be VRF, NTP and SNMP) be bound to multiple VRFs. Changed VRF from leafNode to multi leafNode with defaultValue: default - which is the name of the default VRF. | |||
2024-04-01 | utils: T5738: always use vyos.utils.network.interface_exists over os.path.exists | Christian Breunig | |
2024-04-01 | xml: T5738: extend VRF building blocks with common constraint definition | Christian Breunig | |
2024-04-01 | T6188: | l0crian1 | |
- modified: src/op_mode/firewall.py Changed behavior of "show firewall" for specific rule to only show rule and not also default-action | |||
2024-04-01 | modified: op-mode-definitions/firewall.xml.in | l0crian1 | |
- Added show firewall <sections> detail paths modified: src/op_mode/firewall.py - Added Description as a header to normal "show firewall" commands - Added 'detail' view which shows the output in a list key-pair format Description column was added for these commands and their subsections: show firewall statistics show firewall groups show firewall <family> Detail view was added for these commands: show firewall bridge forward filter detail show firewall bridge forward filter rule <rule#> detail show firewall bridge name <chain> detail show firewall bridge name <chain> rule <rule#> detail show firewall ipv4 forward filter detail show firewall ipv4 forward filter rule <rule#> detail show firewall ipv4 input filter detail show firewall ipv4 input filter rule <rule#> detail show firewall ipv4 output filter detail show firewall ipv4 output filter rule <rule#> detail show firewall ipv4 name <chain> detail show firewall ipv4 name <chain> rule <rule#> detail show firewall ipv6 forward filter detail show firewall ipv6 forward filter rule <rule#> detail show firewall ipv6 input filter detail show firewall ipv6 input filter rule <rule#> detail show firewall ipv6 output filter detail show firewall ipv6 output filter rule <rule#> detail show firewall ipv6 name <chain> detail show firewall ipv6 name <chain> rule <rule#> detail show firewall group detail show firewall group <group> detail |