Age | Commit message (Collapse) | Author |
|
T5661: Add show show ssh dynamic-protection attacker and show log ssh…
|
|
default actions and extend references for firewall groups
|
|
T5681: Firewall,Nat and Nat66: simplified and standarize interface matcher
|
|
T5683: Fix reverse-proxy PKI filenames mismatch
|
|
(valid for interfaces and groups) in firewal, nat and nat66.
|
|
The current named for certificates are hardcoded in generated config to:
- ca.pem
- cert.pem.key
- cert.pem
It cause a generated config certificates and certificates itself
are different (test-cert-1.pem and ca.pem)
bind :::8080 v4v6 ssl crt /run/haproxy/test-cert-1.pem
/run/haproxy/ca.pem
It is a bug of initial impelemtation. Fix required correct names
from PKI certificates
|
|
T5643: nat: add interface-groups to nat. Use same cli structure for i…
|
|
T5675: Use addr_prefix instead of addr in NAT66 source rule prefix parsing
|
|
T5677: show lldp neighbors shows empty platform if descr not in lldpctl output
|
|
|
|
|
|
T5299: Add missed option ceiling for QoS shaper
|
|
vxlan: T5671: change port to IANA assigned default port
|
|
|
|
Add missed option `ceil` for QoS class 'trafficshaper'
|
|
scripts: T5672: remove the conf mode node.def importer
|
|
|
|
dynamic-protection
|
|
|
|
T5667: BGP label-unicast enable ecmp
|
|
T5642: op-cmd: correction of generated file name
|
|
Currently VyOS VXLAN implementation uses the Linux assigned port 8472 that
predates the IANA assignment. As Most other vendors use the IANA assigned port,
follow this guideline and use the new default port 4789.
Existing configuration not defining an explicit port number will be migrated
to the old default port number of 8472, keeping existing configurations work!
|
|
|
|
|
|
bridge: T5670: add missing constraint on "member interface" node
|
|
T5541: firewall zone: re add firewall zone-base firewall
|
|
cluster: T2897: add a migration script for converting cluster to VRRP
|
|
T5637: add new rule at the end of base chains for default-actions and log capabilities
|
|
We have had a mix of both string and list arguments to conf.exists(),
stremaline this to only make use of list calls.
|
|
One could specify a bridge member of VXLAN1 interface, but it is not possible
to create a VXLAN interface with the name of VXLAN1 - prohibited by VXLAN
interface name validator.
Add missing interface-name validator code
|
|
|
|
T4913: migrate wireless scripts to new op-mode style
|
|
pmacct: T5232: Fixed socket parameters for trigger-packets
|
|
This fixes sending packets to uacctd using a socket.
|
|
|
|
configdep: T5662: fix incorrect inspect.stack index of calling script
|
|
|
|
|
|
remains the same, so no migration is needed regarding this feature
|
|
|
|
op-mode: T5642: 'generate tech-support archive' moved to vyos-1x
|
|
T5634: Smoketest add OpenVPN encryption ciphers
|
|
'generate tech-support archive' moved to vyos-1x.
Output of 'show tech-support report' command is added to archive.
The default location of the archive is moved to '/tmp'.
The script is rewritten to Python.
|
|
As `providers legacy default` option was deleted with
insecure DES and Blowfish ciphers, the smoketest cannot pass
without adding encyption ciphers
Otherwise
Oct 16 09:41:34 r4 openvpn-vtun5[9648]: DCO version: N/A
Oct 16 09:41:34 r4 openvpn-vtun5[9648]: Cipher BF-CBC not supported
Oct 16 09:41:34 r4 openvpn-vtun5[9648]: Exiting due to fatal error
Fix the smoketest
|
|
remote: T5650: Resize-aware progressbar implementation
|
|
pmacct: T5232: Fixed pmacct service control via systemctl
|
|
|
|
pmacct daemons have one very important specific - they handle control signals in
the same loop as packets. And packets waiting is blocking operation.
Because of this, when systemctl sends SIGTERM to uacctd, this signal has no
effect until uacct receives at least one packet via nflog. In some cases, this
leads to a 90-second timeout, sending SIGKILL, and improperly finished tasks.
As a result, a working folder is not cleaned properly.
This commit contains several changes to fix service issues:
- add a new nftables table for pmacct with a single rule to get the ability to
send a packet to nflog and unlock uacctd
- remove PID file options from the uacctd and a systemd service file. Systemd
can detect proper PID, and PIDfile is created by uacctd too late, which leads
to extra errors in systemd logs
- KillMode changed to mixed. Without this, SIGTERM is sent to all plugins and
the core process exits with status 1 because it loses connection to plugins too
early. As a result, we have errors in logs, and the systemd service is in a
failed state.
- added logging to uacctd
- systemctl service modified to send packets to specific address during a service
stop which unlocks uacctd and allows systemctl to finish its work properly
|
|
ldpd: T5648: Fix ldpd template errors
|
|
xml: T5649: catch errors from schema validation before generating cache
|