Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-10-27 | snmp: T1738: cleanup import statements | Christian Poessinger | |
(cherry picked from commit b86f1d702e3b67774d3a2eec1f9fa83108711798) | |||
2019-10-27 | snmp: T1769: remove TSM (Transport Security Mode) support | Christian Poessinger | |
The SNMPv3 TSM is very complex and I know 0 users of it. Also this is untested and I know no way how it could be tested. Instead of carrying on dead and unused code we should favour a drop of it using a proper config migration script. (cherry picked from commit 556b528ef9cc1eca9d142ebe1f8f88cd02d536da) | |||
2019-10-27 | snmp: T818: T1738: remove per user/trap engine id | Christian Poessinger | |
As of the SNMP specification an SNMP engine ID should be unique per device. To not make it more complicated for users - only use the global SNMP engine ID. (cherry picked from commit d523111279b3a9a5266b442db5f04049a31685f7) | |||
2019-10-19 | dhcp-server: T1745: bugfix corner case on static-assignments | Christian Poessinger | |
There was a bug when refactoring this with commits 5848a4d ("dhcp-server: T1707: remove DHCP static-mappings from address pool") and 1182b44 ("dhcp-server: T1707: bugfix on subsequent DHCP exclude addresses") that when a static address assignemnt was using the last IP address from the specified range. This triggered the following error: "DHCP range stop address x must be greater or equal to the range start address y!" (cherry picked from commit 735d73e162634d598aa6b8ee13197aa231eefedb) | |||
2019-10-17 | snmp: T1737: add missing completion helpers | Christian Poessinger | |
(cherry picked from commit 7f9dceaa7898d6418edcdf148b52b66ccd3bd36a) | |||
2019-10-11 | Jenkins: Docker: always pull container from Dockerhub | Christian Poessinger | |
(cherry picked from commit ef7c5aaecd2936d9c2f28d22aec185602dc48206) | |||
2019-10-06 | T1496: use upstream accel-ppp rather then an unmaintained fork | Christian Poessinger | |
(cherry picked from commit 41aa7bc4c804c0eba36ba6ec10b49b303e8c1df4) | |||
2019-10-03 | dhcp-server: T1707: remove DHCP static-mappings from address pool | Christian Poessinger | |
Previously when static-mappings have been created the address was still within the DHCP pool resulting in log entries as follows: dhcpd: Dynamic and static leases present for 192.0.2.51 dhcpd: Remove host declaration DMZ_PC2 or remove 192.0.2.51 dhcpd: from the dynamic address pool for DMZ | |||
2019-10-03 | dhcp-server: only import ip_address and ip_network from ipaddress class | Christian Poessinger | |
2019-10-03 | dhcp-server: T1707: bugfix on subsequent DHCP exclude addresses | Christian Poessinger | |
Moved the code for splicing a DHCP range into its dedicated function as this will later be required again. Having subsequent DHCP exclude addresses e.g. 192.0.2.70 and 192.0.2.71 did not work as the previous algorithm created a range whose start address was after the end address. | |||
2019-09-28 | Jenkins: assume dependencies are available in Docker container | Christian Poessinger | |
2019-09-24 | Jenkins: sync with current version | Christian Poessinger | |
2019-09-24 | T1638: generated hosts file fix for proper FQDN resolution | kroy | |
2019-09-22 | Jenkins: use Dockerhub tag 'crux' | Christian Poessinger | |
2019-09-22 | Jenkins: sync to current branch | Christian Poessinger | |
Imported Jenkinsfile from commit b6c8ba61582d38c72b13c5 | |||
2019-09-04 | T1439: remove beginning and end anchors, they are implied with re.fullmatch | Jernej Jakob | |
(cherry picked from commit 03c09b1b0d7dfdab9fc87bc7b017455c45141ced) | |||
2019-09-04 | T1439: move DUID validator to regex | Jernej Jakob | |
(cherry picked from commit 6a6634b02d73cc93cd7368cf2290940b57fae9c7) | |||
2019-09-04 | T1439: add dhcpv6-client-id validator | Jernej Jakob | |
(cherry picked from commit 87df87e3983e120ad171ae9dc2966309fc14fcd8) | |||
2019-09-04 | T1439: remove quotes around dhcp6.client-id | Jernej Jakob | |
(cherry picked from commit b04a9791226f7953cfa740804ec0d43745605f49) | |||
2019-09-04 | [service https] T1443: rename "server-names" option to "server-name". | Daniil Baturin | |
2019-09-04 | [service https] T1443: correct the listen-address option in the script. | Daniil Baturin | |
2019-09-04 | [service https] T1443: use "listen-address" option instead of "listen-addresses" | Daniil Baturin | |
to follow the established convention. | |||
2019-09-04 | Update changelog. | Daniil Baturin | |
2019-09-04 | [service https] T1443: create /etc/vyos if it doesn't exist. | Daniil Baturin | |
2019-09-04 | T1443: backport the HTTP API to crux. | Daniil Baturin | |
Implementation by Daniil Baturin and John Estabrook. | |||
2019-08-31 | [wireguard] T1428: Add handling of fwmark setting (#70) | Matthias Fetzer | |
[wireguard] T1428: correct handling of the fwmark option | |||
2019-08-31 | [syslog] T1530 - "set system syslog global archive file" doesn't work | hagbard | |
2019-08-31 | [VRRP] T1362: quote VRRP password strings to avoid config parse errors. | Daniil Baturin | |
2019-08-30 | T1598: fix vyos-hostsd unit dependencies. | Daniil Baturin | |
2019-08-29 | T1598: import the static-host-mappings CLI from current. | Daniil Baturin | |
2019-08-29 | T1598: import the new host_name.py from current. | Daniil Baturin | |
2019-08-29 | T1598: fix the debian/rules to get vyos-hostsd installed. | Daniil Baturin | |
2019-08-27 | T1598: make dns_forwarding.py retrieve name servers from vyos-hostsd. | Daniil Baturin | |
2019-08-27 | T1598: add a vyos-hostsd operation for retrieving name servers by tag. | Daniil Baturin | |
2019-08-27 | T1606: change vyos-hostsd systemd target to avoid boot problems | John Estabrook | |
2019-08-27 | T1598: clean up vyos-hostsd state dump on clean shutdown. | Daniil Baturin | |
2019-08-27 | T1598: improve autogenerated file comments. | Daniil Baturin | |
2019-08-27 | T1598: handle the socket timeout exception in vyos.hostsd_client | Daniil Baturin | |
2019-08-27 | T1598: start vyos-hostsd before everything that may need it. | Daniil Baturin | |
2019-08-27 | T1598: initial implementation of the hosts keeper daemon. | Daniil Baturin | |
Conflicts: debian/control | |||
2019-08-25 | powerdns: T1524: support setting allow-from network | Christian Poessinger | |
Netmasks (both IPv4 and IPv6) that are allowed to use the server. The default allows access only from RFC 1918 private IP addresses. Due to the aggressive nature of the internet these days, it is highly recommended to not open up the recursor for the entire internet. Questions from IP addresses not listed here are ignored and do not get an answer. https://docs.powerdns.com/recursor/settings.html#allow-from Imagine an ISP network with non RFC1918 IP adresses - they can't make use of PowerDNS recursor. As of now VyOS hat allow-from set to 0.0.0.0/0 and ::/0 which created an open resolver. If there is no allow-from statement a config-migrator will add the appropriate nodes to the configuration, resulting in: service { dns { forwarding { allow-from 0.0.0.0/0 allow-from ::/0 cache-size 0 ignore-hosts-file listen-address 192.0.2.1 } } } (cherry picked from commit dc0f641956d002fa8588ef8d1213791cf36e92f2) | |||
2019-08-13 | Merge pull request #101 from DmitriyEshenko/patch-6 | Daniil Baturin | |
[show arp] T1576 deleting improper quotes | |||
2019-08-12 | [show arp] T1576 deleting improper quotes | Eshenko Dmitriy | |
2019-07-25 | T1541 Fix: adding additional check | Eshenko Dmitriy | |
(cherry picked from commit 3945b2259aaa64eb9f4d61334126235f2d641293) | |||
2019-07-23 | [wireguard] fixing value help typo | hagbard | |
(cherry picked from commit 36f8a1e4e5966c43c5330ff223fa2ef07d346b6e) | |||
2019-07-23 | [wireguard] T1425 - assign a /31 address on Wireguard interface | hagbard | |
- added a validator for checking if the address is any cidr noted address (cherry picked from commit 2ee0eff1bd04ef02b0769341eee22543f8011b68) | |||
2019-07-21 | T1537: add missing help for 'set service dns' | Christian Poessinger | |
(cherry picked from commit d99bf6a3a623433e743bb2d1d72e2ef3e0ab5057) | |||
2019-07-21 | [dns-forwarding] T1333: handle domain forward and general recursion in one ↵ | Christian Poessinger | |
configuration line In the past we used the PowerDNS cofniguration option forward-zones and forward-zones-recurse, but only the latter one sets the recursion bit in the DNS query. Thus all recursions have been moved to this config statement. (cherry picked from commit 5886dd27cbc65f8cda04752bbd39a960b0887523) | |||
2019-07-19 | T1527: fix typo, s/IPv5/IPv6/ | Daniil Baturin | |
2019-07-19 | T1440: in IPv4 DHCP, print the subnet rather than a dict dump | Daniil Baturin | |
when a non-unique subnet is found. |