summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2024-08-12configverify: T6642: verify_interface_exists requires config_dict argJohn Estabrook
The function verify_interface_exists requires a reference to the ambient config_dict rather than creating an instance. As access is required to the 'interfaces' path, provide as attribute of class ConfigDict, so as not to confuse path searches of script-specific config_dict instances.
2024-08-12xml: T6650: add initial op-mode cache supportJohn Estabrook
2024-08-11Merge pull request #3965 from kumvijaya/currentChristian Breunig
T6637: add pr commenting back in un-used import check
2024-08-11Merge branch 'current' into currentVijayakumar A
2024-08-10Merge pull request #3964 from nicolas-fort/T6643Christian Breunig
T6643: firewall: fix ip address range parsing on firewall rules.
2024-08-10T6637: add pr commenting back in un-used import checkVijayakumar A
2024-08-09T6643: firewall: fix ip address range parsing on firewall rules.Nicolas Fort
2024-08-09Merge pull request #3960 from jestabro/verify-interface-state-existsDaniil Baturin
qos: T6638: require interface state existence in verify conditional
2024-08-08qos: T6638: require interface state existence in verify conditionalJohn Estabrook
2024-08-08Merge pull request #3955 from jestabro/configd-in-session-falseDaniil Baturin
configd: T6640: enforce in_session returns False under configd
2024-08-07configd: T6640: enforce in_session returns False under configdJohn Estabrook
The CStore in_session check is a false positive outside of a config session if a specific environment variable is set with an existing referent in unionfs. To allow extensions when running under configd and avoid confusion, enforce in_session returns False.
2024-08-06Merge pull request #3949 from kumvijaya/currentDaniil Baturin
T6637: py files filter added for unused import check
2024-08-06smoketest: T6614: add op-mode test for Kernel version (#3946)Christian Breunig
2024-08-06Merge pull request #3945 from c-po/T3204-sysctlChristian Breunig
sysctl: T3204: restore sysctl setttings overwritten by tuned
2024-08-06T6637: py files filter added for unused import checkVijayakumar A
2024-08-06T6634: README: Add image graphs of contributors (#3944)Viacheslav Hletenko
2024-08-05sysctl: T3204: restore sysctl setttings overwritten by tunedChristian Breunig
2024-08-05Merge pull request #3947 from c-po/openvpn-T6555Christian Breunig
smoketest: T6555: openvpn: NameError: name 'elf' is not defined
2024-08-05smoketest: T6555: openvpn: NameError: name 'elf' is not definedChristian Breunig
2024-08-05Merge pull request #3942 from c-po/bugfixesDaniil Baturin
T6560: T4694: T6555: multiple minor bugfixes for package build
2024-08-05smoketest: T6555: openvpn: SyntaxError: '(' was never closedChristian Breunig
2024-08-05firewall: T4694: fix GRE key include path in XMLChristian Breunig
2024-08-05GitHub: T6560: checkout pull request HEAD commit instead of merge commitChristian Breunig
2024-08-05Merge pull request #3637 from talmakion/feature/T4694/gre-match-fieldsChristian Breunig
firewall: T4694: Adding GRE flags & fields matches to firewall rules
2024-08-05Merge branch 'current' into feature/T4694/gre-match-fieldsChristian Breunig
2024-08-05Merge pull request #3920 from fett0/T6555Christian Breunig
OPENVPN: T6555: add server-bridge options in mode server
2024-08-05Merge pull request #3939 from c-po/unused-importsChristian Breunig
T5873: T6619: remove unused imports
2024-08-04firewall: T4694: Adding GRE flags & fields matches to firewall rulesAndrew Topp
* Only matching flags and fields used by modern RFC2890 "extended GRE" - this is backwards-compatible, but does not match all possible flags. * There are no nftables helpers for the GRE key field, which is critical to match individual tunnel sessions (more detail in the forum post) * nft expression syntax is not flexible enough for multiple field matches in a single rule and the key offset changes depending on flags. * Thus, clumsy compromise in requiring an explicit match on the "checksum" flag if a key is present, so we know where key will be. In most cases, nobody uses the checksum, but assuming it to be off or automatically adding a "not checksum" match unless told otherwise would be confusing * The automatic "flags key" check when specifying a key doesn't have similar validation, I added it first and it makes sense. I would still like to find a workaround to the "checksum" offset problem. * If we could add 2 rules from 1 config definition, we could match both cases with appropriate offsets, but this would break existing FW generation logic, logging, etc. * Added a "test_gre_match" smoketest
2024-08-04Merge pull request #3901 from nicolas-fort/T4072-extend-bridge-fwallChristian Breunig
T4072: firewall extend bridge firewall
2024-08-04ipsec: T5873: remove unused importsChristian Breunig
2024-08-04multicast: T6619: remove unused importsChristian Breunig
2024-08-02Merge pull request #3933 from jestabro/add-missing-standard-funcDaniil Baturin
T6632: add missing standard functions to config scripts
2024-08-02Merge pull request #3932 from jestabro/check-kmod-under-configdDaniil Baturin
T6629: call check_kmod within a standard config function
2024-08-02T6619: Remove the remaining uses of per-protocol FRR configs (#3916)Roman Khramshin
2024-08-02T6486: generate OpenVPN use data-ciphers instead of ncp-ciphers (#3930)Viacheslav Hletenko
In the PR https://github.com/vyos/vyos-1x/pull/3823 the ncp-ciphers were replaced with `data-ciphers` fix template for "generate openvpn client-config"
2024-08-02OPENVPN: T6555: fix name to bridgefett0
2024-08-02T6632: add missing standard functions to config scriptsJohn Estabrook
2024-08-02OPENVPN: T6555: fix name to bridgefett0
2024-08-02T6629: call check_kmod within a standard config functionJohn Estabrook
Move the remaining calls to check_kmod within a standard function, with placement determined by the needs of the config script.
2024-08-02Merge pull request #3927 from jestabro/nat64-check-kmodDaniil Baturin
nat64: T6627: call check_kmod within standard config function
2024-08-02nat64: T6627: call check_kmod within standard config functionJohn Estabrook
Functions called from config scripts outside of the standard functions get_config/verify/generate/apply will not be called when run under configd. Move as appropriate for the general config script structure and the specific script requirements.
2024-08-02T4072: change same helpers in xml definitions; add notrack action for ↵Nicolas Fort
prerouting chain; re introduce <set vrf> in policy; change global options for passing traffic to IPvX firewall; update smoketest
2024-08-01Merge pull request #3923 from c-po/console-T3334Christian Breunig
console: T3334: remove unused directories imported from vyos.defaults
2024-08-01T4072: firewall: extend firewall bridge smoketestNicolas Fort
2024-08-01T6570: firewall: add global-option to configure sysctl parameter for ↵Nicolas Fort
enabling/disabling sending traffic from bridge layer to ipvX layer
2024-08-01T4072: firewall: improve error handling when firewall configuration is ↵Nicolas Fort
wrong. Use nft -c option to check temporary file, and use output provided by nftables to parse the error if possible, or print it as it is if it's an unknown error
2024-08-01T4072: firewall: extend firewall bridge capabilities, in order to include ↵Nicolas Fort
new chains, priorities, and firewall groups
2024-08-01Merge pull request #3221 from lucasec/t5873Christian Breunig
T5873: ipsec remote access VPN: support VTI interfaces.
2024-08-01console: T3334: remove unused directories imported from vyos.defaultsChristian Breunig
2024-08-01Merge pull request #3903 from lucasec/ipsec-remote-access-profileChristian Breunig
T6617: T6618: vpn ipsec remote-access: fix profile generators