summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2019-09-04T1439: move DUID validator to regexJernej Jakob
(cherry picked from commit 6a6634b02d73cc93cd7368cf2290940b57fae9c7)
2019-09-04T1439: add dhcpv6-client-id validatorJernej Jakob
(cherry picked from commit 87df87e3983e120ad171ae9dc2966309fc14fcd8)
2019-09-04T1439: remove quotes around dhcp6.client-idJernej Jakob
(cherry picked from commit b04a9791226f7953cfa740804ec0d43745605f49)
2019-09-04[service https] T1443: rename "server-names" option to "server-name".Daniil Baturin
2019-09-04[service https] T1443: correct the listen-address option in the script.Daniil Baturin
2019-09-04[service https] T1443: use "listen-address" option instead of "listen-addresses"Daniil Baturin
to follow the established convention.
2019-09-04Update changelog.Daniil Baturin
2019-09-04[service https] T1443: create /etc/vyos if it doesn't exist.Daniil Baturin
2019-09-04T1443: backport the HTTP API to crux.Daniil Baturin
Implementation by Daniil Baturin and John Estabrook.
2019-08-31[wireguard] T1428: Add handling of fwmark setting (#70)Matthias Fetzer
[wireguard] T1428: correct handling of the fwmark option
2019-08-31[syslog] T1530 - "set system syslog global archive file" doesn't workhagbard
2019-08-31[VRRP] T1362: quote VRRP password strings to avoid config parse errors.Daniil Baturin
2019-08-30T1598: fix vyos-hostsd unit dependencies.Daniil Baturin
2019-08-29T1598: import the static-host-mappings CLI from current.Daniil Baturin
2019-08-29T1598: import the new host_name.py from current.Daniil Baturin
2019-08-29T1598: fix the debian/rules to get vyos-hostsd installed.Daniil Baturin
2019-08-27T1598: make dns_forwarding.py retrieve name servers from vyos-hostsd.Daniil Baturin
2019-08-27T1598: add a vyos-hostsd operation for retrieving name servers by tag.Daniil Baturin
2019-08-27T1606: change vyos-hostsd systemd target to avoid boot problemsJohn Estabrook
2019-08-27T1598: clean up vyos-hostsd state dump on clean shutdown.Daniil Baturin
2019-08-27T1598: improve autogenerated file comments.Daniil Baturin
2019-08-27T1598: handle the socket timeout exception in vyos.hostsd_clientDaniil Baturin
2019-08-27T1598: start vyos-hostsd before everything that may need it.Daniil Baturin
2019-08-27T1598: initial implementation of the hosts keeper daemon.Daniil Baturin
Conflicts: debian/control
2019-08-25powerdns: T1524: support setting allow-from networkChristian Poessinger
Netmasks (both IPv4 and IPv6) that are allowed to use the server. The default allows access only from RFC 1918 private IP addresses. Due to the aggressive nature of the internet these days, it is highly recommended to not open up the recursor for the entire internet. Questions from IP addresses not listed here are ignored and do not get an answer. https://docs.powerdns.com/recursor/settings.html#allow-from Imagine an ISP network with non RFC1918 IP adresses - they can't make use of PowerDNS recursor. As of now VyOS hat allow-from set to 0.0.0.0/0 and ::/0 which created an open resolver. If there is no allow-from statement a config-migrator will add the appropriate nodes to the configuration, resulting in: service { dns { forwarding { allow-from 0.0.0.0/0 allow-from ::/0 cache-size 0 ignore-hosts-file listen-address 192.0.2.1 } } } (cherry picked from commit dc0f641956d002fa8588ef8d1213791cf36e92f2)
2019-08-13Merge pull request #101 from DmitriyEshenko/patch-6Daniil Baturin
[show arp] T1576 deleting improper quotes
2019-08-12[show arp] T1576 deleting improper quotesEshenko Dmitriy
2019-07-25T1541 Fix: adding additional checkEshenko Dmitriy
(cherry picked from commit 3945b2259aaa64eb9f4d61334126235f2d641293)
2019-07-23[wireguard] fixing value help typohagbard
(cherry picked from commit 36f8a1e4e5966c43c5330ff223fa2ef07d346b6e)
2019-07-23[wireguard] T1425 - assign a /31 address on Wireguard interfacehagbard
- added a validator for checking if the address is any cidr noted address (cherry picked from commit 2ee0eff1bd04ef02b0769341eee22543f8011b68)
2019-07-21T1537: add missing help for 'set service dns'Christian Poessinger
(cherry picked from commit d99bf6a3a623433e743bb2d1d72e2ef3e0ab5057)
2019-07-21[dns-forwarding] T1333: handle domain forward and general recursion in one ↵Christian Poessinger
configuration line In the past we used the PowerDNS cofniguration option forward-zones and forward-zones-recurse, but only the latter one sets the recursion bit in the DNS query. Thus all recursions have been moved to this config statement. (cherry picked from commit 5886dd27cbc65f8cda04752bbd39a960b0887523)
2019-07-19T1527: fix typo, s/IPv5/IPv6/Daniil Baturin
2019-07-19T1440: in IPv4 DHCP, print the subnet rather than a dict dumpDaniil Baturin
when a non-unique subnet is found.
2019-07-17Update changelog.Daniil Baturin
2019-07-16T1531: do not include FQDN in the hostname.Daniil Baturin
2019-07-12Do not try to verify the config when host_name.py is called from dhclient ↵Daniil Baturin
script.
2019-07-11[wireguard] - T1516: changing committed config causes errorhagbard
2019-07-09T1497: remove duplicate values from name servers and search domains obtained ↵Daniil Baturin
from DHCP.
2019-07-08Fix a stray debug print in vyos-config-file-query.Daniil Baturin
2019-07-04Merge branch 'crux' of https://github.com/vyos/vyos-1x into cruxDaniil Baturin
2019-07-04T1497: make host_name.py wait for commit lock too.Daniil Baturin
2019-07-04T1497: remove the no longer necessary workaround for bad ↵Daniil Baturin
return_effective_values output.
2019-07-04[vyos.config] T1505: correct return_effective_values output splitting.Daniil Baturin
2019-07-03Merge pull request #76 from qiuchengxuan/cruxChristian Poessinger
[pdns-recursor] T1469 - replace forward-zones with forward-zones-recurse
2019-07-03T1504: wait for commit lock before trying to update resolv.conf in the out ↵Daniil Baturin
of CLI mode.
2019-07-03T1503: add functions for commit lock checking and waiting.Daniil Baturin
Conflicts: python/vyos/defaults.py
2019-07-02Merge pull request #84 from UnicronNL/cruxKim
T1497: "set system name-server" generates invalid/incorrect resolv.conf
2019-07-02T1497: "set system name-server" generates invalid/incorrect resolv.confUnicronNL
2019-07-01Merge pull request #81 from UnicronNL/cruxKim
T1498: Nameservers are not propagated into resolv.conf