Age | Commit message (Collapse) | Author | |
---|---|---|---|
2022-01-11 | firewall: op-mode: T4131: Display `show firewall group` reference and member ↵ | sarthurdev | |
items sorted and one per line | |||
2022-01-11 | firewall: T2199: Add ipv6-range support to IPv6 address group | sarthurdev | |
2022-01-11 | validators: T4144: Add error messages to the majority of IP validators | sarthurdev | |
2022-01-11 | firewall: policy: T4159: T4164: Fix empty firewall groups, create separate ↵ | sarthurdev | |
file for group definitions. | |||
2022-01-11 | remote: T3950: Gracefully handle chained exceptions | erkin | |
2022-01-11 | policy: T4170: rename "policy ipv6-route" -> "policy route6" | Christian Poessinger | |
In order to have a consistent looking CLI we should rename this CLI node. There is: * access-list and access-list6 (policy) * prefix-list and prefix-list6 (policy) * route and route6 (static routes) | |||
2022-01-11 | policy: T2199: add missing rule constraints | Christian Poessinger | |
2022-01-11 | Merge pull request #1153 from jestabro/frr_debug | Christian Poessinger | |
frr: T4166: move log debug setting to init function for vyos-configd | |||
2022-01-11 | Merge pull request #1154 from imathew/current | Christian Poessinger | |
containers: T2216: bugfix host networking on image upgrade | |||
2022-01-11 | containers: T2216: bugfix host networking on image upgrade | Mathew Inkson | |
The bug was partially fixed with this commit: https://github.com/vyos/vyos-1x/commit/358f0b481d8620cad4954e3fe418054b9a8c3ecd The earlier commit introduced a startup retry (up to 10 times) to allow the OS to settle before the container is started. However, it only applies if host networking is NOT used. This change applies the same for containers where host networking is employed. Since the retry portion of the code (written in the earlier commit) is now referenced twice, it has been moved to its own function. | |||
2022-01-10 | frr: T4166: move log debug setting to init function for vyos-configd | John Estabrook | |
frr.py debugging is set True if the file '/tmp/vyos.frr.debug' exists; this check needs to be called within an init function, as frr.py will have already been loaded by vyos-configd before the /tmp/*.debug files are created by vyos-router, or by call to 'touch'. | |||
2022-01-10 | nat: T2199: dry-run newly generated config before install | Christian Poessinger | |
Before installing a new conntrack policy into the OS Kernel, the new policy should be verified by nftables if it can be loaded at all or if it will fail to load. There is no need to load a "bad" configuration if we can pre-test it. | |||
2022-01-10 | conntrack: T3579: dry-run newly generated config before install | Christian Poessinger | |
Before installing a new conntrack policy into the OS Kernel, the new policy should be verified by nftables if it can be loaded at all or if it will fail to load. There is no need to load a "bad" configuration if we can pre-test it. | |||
2022-01-10 | conntrack: T3579: prepare for "conntrack timeout custom rule" CLI commands | Christian Poessinger | |
2022-01-10 | Merge pull request #1152 from sarthurdev/firewall_validators | Christian Poessinger | |
firewall: validators: T4148: Improve validators and firewall validator usage | |||
2022-01-10 | conntrack: T3579: make the timeout tree re-usable as XML include | Christian Poessinger | |
2022-01-10 | conntrack: T3579: use "notrack" over "return" in nft statements | Christian Poessinger | |
2022-01-10 | conntrack: T3579: migrate "conntrack ignore" tree to vyos-1x and nftables | Christian Poessinger | |
2022-01-10 | validators: Stricter checking on port-range validator | sarthurdev | |
2022-01-10 | validators: T4148: Add text output when validators fail | sarthurdev | |
2022-01-10 | firewall: validators: T2199: Improve port validation | sarthurdev | |
2022-01-10 | Merge pull request #1151 from sarthurdev/firewall | Christian Poessinger | |
firewall: policy: T4149: T4155: Fix incorrect table variable, fix handling of deleted base firewall node | |||
2022-01-10 | Merge pull request #1150 from nicolas-fort/T4161 | Christian Poessinger | |
policy: T4161: Set correct description for local-preference | |||
2022-01-10 | firewall: 4149: Fix verify steps being bypassed when base node is removed | sarthurdev | |
2022-01-10 | policy: T4161: Set correct description for local-preference | Nicolas Fort | |
2022-01-10 | Merge pull request #1149 from tacerus/pip | Daniil Baturin | |
T4157: Add `jinja2` to pip test requirements | |||
2022-01-09 | policy: T4155: Fix using incorrect table variable | sarthurdev | |
2022-01-09 | T4157: Add jinja2 to test-requirements.txt | Georg | |
Signed-off-by: Georg <georg@lysergic.dev> | |||
2022-01-09 | Merge pull request #1143 from sever-sever/T1972 | Christian Poessinger | |
vrrp: T1972: Ability to set IP address on not vrrp interface | |||
2022-01-09 | Merge pull request #1142 from sever-sever/T4150 | Christian Poessinger | |
keepalived: T4150: Fix template option conntrack_sync_group | |||
2022-01-09 | Merge pull request #1145 from sever-sever/T4152 | Christian Poessinger | |
nhrp: T4152: Fix template holding-time for nhrp | |||
2022-01-09 | nhrp: T4152: Fix template holding-time for nhrp | Viacheslav | |
Add missed 'holding-time' option for shortcut-target address | |||
2022-01-09 | vrrp: T1972: Ability to set IP address on not vrrp interface | Viacheslav | |
Ability to set virtual_address on not vrrp-listen interface Add ability don't track primary vrrp interface "exclude-vrrp-interface" Add ability to set tracking (state UP/Down) on desired interfaces For example eth0 is used for vrrp and we want to track another eth1 interface that not belong to any vrrp-group | |||
2022-01-08 | keepalived: T4150: Fix template option conntrack_sync_group | Viacheslav | |
conntrack_sync_group option not under 'vrrp' section but part of high-avalability dictionary | |||
2022-01-07 | xml: nat: use generic bulding block for rule description | Christian Poessinger | |
2022-01-07 | xml: firewall: T4130: add protocol completion helper all and tcp_udp | Christian Poessinger | |
2022-01-07 | Debian: T4133: add required nfct package dependency | Christian Poessinger | |
2022-01-06 | https: T4146: do not listen on port 80 | John Estabrook | |
2022-01-06 | Merge pull request #1139 from sarthurdev/firewall | Christian Poessinger | |
firewall: zone-policy: T4133: Prevent firewall from trying to clean-up zone-policy chains | |||
2022-01-06 | vrrp: T4141: bugfix missing {% if %} clause when adding sync-groups | Christian Poessinger | |
2022-01-05 | config: T3785: drop restriction to ascii in decode | John Estabrook | |
Following the update to vyos1x-config, commit 64263617, UTF-8 characters are supported within the config file, hence in the output of showConfig. | |||
2022-01-05 | firewall: zone-policy: T4133: Prevent firewall from trying to clean-up ↵ | sarthurdev | |
zone-policy chains * Prevent firewall names from using the reserved VZONE prefix | |||
2022-01-05 | Merge pull request #1138 from sever-sever/T4142 | John Estabrook | |
op-mode: T4142: Fix for show input ifbX interfaces | |||
2022-01-05 | op-mode: T4142: Fix for show input ifbX interfaces | Viacheslav | |
Ability to see interface type "input" ifbX from op-mode | |||
2022-01-05 | Merge pull request #1137 from sarthurdev/current | Christian Poessinger | |
keepalived: T4109: Update configd-include.json to reflect filename change | |||
2022-01-05 | keepalived: T4109: Update configd-include.json to reflect filename change | sarthurdev | |
2022-01-05 | Merge pull request #1136 from sarthurdev/firewall | Christian Poessinger | |
zone-policy: T4135: Raise error when using an invalid "from" zone. | |||
2022-01-05 | zone-policy: T4135: Raise error when using an invalid "from" zone. | sarthurdev | |
2022-01-05 | Merge pull request #1135 from sarthurdev/current | Christian Poessinger | |
smoketest: shim: Optimise speed of `lsof` command | |||
2022-01-05 | Merge pull request #1134 from sarthurdev/firewall | Christian Poessinger | |
firewall: zone-policy: T2199: T4130: Fixes for firewall, state-policy and zone-policy |