summaryrefslogtreecommitdiff
path: root/interface-definitions
AgeCommit message (Collapse)Author
2019-12-06T1843: recursively include IP address definitions in VIF/VIF-S definitionsChristian Poessinger
2019-12-06T1843: use include files for VIF/VIF-S interfacesChristian Poessinger
As 219779bc6151 ("T1843: run interface-definitions though GCC preprocessor") implemented the foundation of using the GCC preprocessor to make our XML definitions more lightweight this commit transforms the configuration of VIF and VIF-S interfaces to this new style. It implementes it for the following types: * bond * ethernet * wireless
2019-12-06T1843: use include files for IPv4/IPv6 interface address configurationChristian Poessinger
As 219779bc6151 ("T1843: run interface-definitions though GCC preprocessor") implemented the foundation of using the GCC preprocessor to make our XML definitions more lightweight this commit transforms the configuration of an IPv4/IPv6 address to this new style. It implementes it for the following interface types: * bond * bridge * dummy * ethernet * geneve * loopback * vxlan * wireguard * wireless
2019-12-06T1843: run interface-definitions though GCC preprocessorChristian Poessinger
A lot of XML code is duplicated (VLAN, interface address) for instance. Such XML definitions should be moved to feature.xml.i files and then just pulled in via GCC preprocessor #include definition in e.g. bond or ethernet definitions. This will give us the ability to single-source repeating node definitions as: * Interface Address * Interface Description * Interface Disable * VLAN (both vif-s and vif-c) The .in suffix of the interface-definitions is a marker that those files are input files to the GCC preprocessor. They will be rendered into proper XML files in the build directory. Some node definitions have been reworder to remove escaped double quote occurances which would have been warned about by the GCC preprocessor.
2019-12-06openvpn: bridge: T1556: remove obsolete bridge-group definitionChristian Poessinger
2019-12-06syslog: T1845: syslog host no longer accepts a porthagbard
- created 'set system syslog host <ip address> port'
2019-12-05syslog: renaming files and conf script to fit new schemehagbard
2019-12-05Revert "syslog: T1845: syslog host no longer accepts a port"hagbard
This reverts commit a93a1dbd7d18ff82246b4f7fb9a3757c14e6a9c7.
2019-12-04syslog: T1845: syslog host no longer accepts a porthagbard
- renamed interface xml - renamed syslog.py to system-syslog.py - moved protocol out of the facility node (bug) - node port created - migration script included
2019-11-28syslog: T1828: implemented missing completion help and add input constraintshagbard
syslog: Improved constraint for host/IP check
2019-11-27syslog: typo fixedhagbard
2019-11-24geneve: T1799: set minimum MTU size 1500 bytesChristian Poessinger
2019-11-24geneve: T1799: add IPv4 routing parametersChristian Poessinger
2019-11-24geneve: T1799: add Generic Network Virtualization EncapsulationChristian Poessinger
2019-11-23wireless: T1627: support DHCP(v6) addressesChristian Poessinger
2019-11-23wireless: T1627: add support for RADIUS source-addressChristian Poessinger
2019-11-23wireless: T1627: change RADIUS CLI syntaxChristian Poessinger
Adopt RADIUS configuration and harmonize it with the rest of VyOS. Move the following configuration block: security { wpa { cipher CCMP mode wpa2 radius-server 172.16.100.10 { port 1812 secret secretkey } radius-server 172.16.100.11 { port 1812 secret secretkey } } } to the harmonized version of: security { wpa { cipher CCMP mode wpa2 radius { server 172.16.100.10 { port 1812 secret secretkey } server 172.16.100.11 { port 1812 secret secretkey } } } } And add the new "set interfaces wireless wlan0 security wpa radius source-address" CLI command to specify the origin of any RADIUS query on systems having multiple IP addresses.
2019-11-23l2tp: harmonize RADIUS wordingChristian Poessinger
2019-11-23wireless: T1627: change priority from 318 to 400Christian Poessinger
2019-11-23wireless: T1627: fix regex for 'ht channel-set-width'Christian Poessinger
2019-11-23wireless: T1627: config migrator does not support camel casingChristian Poessinger
convert all nodes to lowercase
2019-11-23wireless: T1627: initial rewrite in XML/Python styleChristian Poessinger
Working: - Wireless modes b, g, n, ac - WPA/WPA2 psk and RADIUS (tested using Microsoft NPS)
2019-11-14[service https] T1443: add setting of HTTPS listen portJohn Estabrook
2019-11-11[OpenVPN]: T1704: Changed the description of ncp-ciphers in configvindenesen
2019-11-11[OpenVPN]: T1704: Added function for ncp-ciphers, and ability to disable it.vindenesen
[OpenVPN]: T1704: Changed config structure for OpenVPN encryption to support ncp-ciphers. [OpenVPN]: T1704: Added migration scripts for interface 2-to-3
2019-11-08QAT: T1788: Intel QAT implementationDmitriyEshenko
2019-11-02bonding: T1777: change priority to be after ethernet interfacesChristian Poessinger
On system reboots (mainly) the bond has been created and configured a MAC address on the physical ports. Later ethernet interfaces have been configured overwriting the bond MAC address.
2019-10-28Merge pull request #154 from zdc/T1772Christian Poessinger
[XML templates] T1772: Add escaping of `\` symbol in `<regex>`
2019-10-28[XML templates] T1772: Changed old hacks to proper regex, according to the fixzsdc
2019-10-27snmp: T1769: remove TSM (Transport Security Mode) supportChristian Poessinger
The SNMPv3 TSM is very complex and I know 0 users of it. Also this is untested and I know no way how it could be tested. Instead of carrying on dead and unused code we should favour a drop of it using a proper config migration script.
2019-10-27snmp: T818: T1738: remove per user/trap engine idChristian Poessinger
As of the SNMP specification an SNMP engine ID should be unique per device. To not make it more complicated for users - only use the global SNMP engine ID.
2019-10-18system-proxy: T1741 - Add system wide proxy setting CLI implementationhagbard
2019-10-17snmp: T1737: add missing completion helpersChristian Poessinger
2019-10-13Sync XML interface description source file pattern and conf script nameChristian Poessinger
renamed: interface-bonding.py -> interfaces-bonding.py renamed: interface-bridge.py -> interfaces-bridge.py renamed: interface-dummy.py -> interfaces-dummy.py renamed: interface-ethernet.py -> interfaces-ethernet.py renamed: interface-loopback.py -> interfaces-loopback.py renamed: interface-openvpn.py -> interfaces-openvpn.py renamed: interface-vxlan.py -> interfaces-vxlan.py renamed: interface-wireguard.py -> interfaces-wireguard.py
2019-10-09T1430: add dhcp vendor-class-id client optionChristian Poessinger
2019-10-06ipoe-server: XML: run through XMLlintChristian Poessinger
2019-10-06ipoe-server: optimize port completion helper to match all othersChristian Poessinger
2019-10-01Revert "wireguard: T1700 - Wireguard FQDN endpoint doesn't work after reboot"hagbard
This reverts commit daf2e29e3693a7eb2d8b6fc378d984b9a17d2aa3. It had unknown side effects, undiscovered during testing
2019-09-30wireguard: T1700 - Wireguard FQDN endpoint doesn't work after reboothagbard
2019-09-30[OpenVPN]: T1688: Added aes-gcm encryptionsvindenesen
2019-09-25T1685 Adding ethernet valueHelp for vif,vif-s,vif-cDmitriyEshenko
2019-09-21Merge pull request #134 from c-po/t1637-ethernetChristian Poessinger
T1637 - Rewrite ethernet interface in new style XML syntax
2019-09-20ethernet: T1637: add support for 25G, 40G, 50G and 100G link speedsChristian Poessinger
2019-09-20Revert "ethernet: T1637: only list supported link speeds for completion helper"Christian Poessinger
This reverts commit d6a6daaf1d7ed0f1ff2e53490972e0cf11fff000.
2019-09-20ethernet: T1637: only list supported link speeds for completion helperChristian Poessinger
2019-09-20ethernet: T1637: initial rewrite in XML/Python styleChristian Poessinger
2019-09-20Merge pull request #133 from vindenesen/openvpn-minimum-tls-versionDaniil Baturin
[OpenVPN] T1675: Added setting for minimum tls version
2019-09-20OpenVPN - changed tls-minimum-version to tls-version-minvindenesen
2019-09-20openvpn: T1548: add validator for TLS cert filesChristian Poessinger
2019-09-19OpenVPN - Added setting for minimum tls versionvindenesen