summaryrefslogtreecommitdiff
path: root/interface-definitions
AgeCommit message (Collapse)Author
2020-07-26Merge branch 'crux' of https://github.com/vyos/vyos-1x into cruxDaniil Baturin
2020-07-26dynamic DNS: T1953: Relaxed service name checkzsdc
Internally, we can accept more than one server of each type for sending dynamic DNS updates, but due to a strong check in CLI, it is not possible to add more than one server with the same protocol (except "custom", but it allows to add only one more server). The patch relaxing this limitation by allowing adding as many servers with the same protocol, as needed.
2020-07-26wireguard: T2734: fwmark is a 32bit value - fix validatorChristian Poessinger
(cherry picked from commit c87616aaef53e69ddf135725bb33d105afaa6c5b)
2020-07-26Fix a typo in BFD command help.Daniil Baturin
2020-07-11snmp: fix "seclevel" completion helper Christian Poessinger
There is no seclevel "priv" it was a typo and must be "priv"
2020-06-14pim: T1729: Add PIM and IGMPv2/v3 supportDmitriyEshenko
2020-04-28syslog: T2131: improve valueHelpChristian Poessinger
2020-04-28syslog: T2131: add generic fqdn validatorChristian Poessinger
2020-04-12syslog: T1828: implemented missing completion help and add input constraintshagbard
syslog: Improved constraint for host/IP check
2020-04-05wireguard: T2228: support ports < 1024Christian Poessinger
There is no legit reason to not allow ports < 1024.
2020-03-22Fix type in mode-force.Daniil Baturin
2020-02-07vrrp: T1884: Add mode-force for run transition-scripts without checking ↵DmitriyEshenko
previous state
2020-01-26snmpd: T1964: forbid whitespace in script extension identifierhagbard
(cherry picked from commit 742da889afa4375d5b6cb98dada7f2d3ec2f0326)
2020-01-17[pppoe-server] T1452 - add vendor option to shaperhagbard
(cherry picked from commit 85c9e0200a4619f0388b7fd7ba9a03f4be933ef5)
2020-01-16[pppoe-server] - fixed default RADIUS attribute Filter-Idhagbard
(cherry picked from commit 2cd0498f50296d5d9e80b6acafb63dd3d45fb5cd)
2020-01-16[pppoe-server] - typo correctedhagbard
(cherry picked from commit 87ddd50f55cd80873e295d66803ceb072de6fd74)
2020-01-16[pppoe-server] T1341 - Adding rate-limiter for pppoe server usershagbard
- RADIUS shaper settings (cherry picked from commit d4556b31e920197e1c58febb8d87a1765bfea81f)
2020-01-16[pppoe-server] T1341 - Adding rate-limiter for pppoe server usershagbard
- implementation for locally definied users (cherry picked from commit c1dc93391b9ec1785ab648fa7685521c85774d28)
2019-12-15dynamic-dns: T1879: extend XML validatorsChristian Poessinger
(cherry picked from commit 47c368136342f235765e1a0b611f0783a73ce299)
2019-12-15dynamic-dns: T1879: extend valueHelp stringsChristian Poessinger
(cherry picked from commit 6b7453ea7d2b17e3988895e4fd8a5e8b634a8f90)
2019-11-28[T1299] - SNMP extension with custom scriptshagbard
(cherry picked from commit 334677572aef752b0bf2c893bd14bdf6f801bb4b)
2019-11-20QAT: T1788: Intel QAT implementationDmitriyEshenko
Conflicts: Makefile
2019-11-19[XML templates] T1772: Changed old hacks to proper regex, according to the fixzsdc
(cherry picked from commit 8ae02a738df9746ad648a9611ae03e62b5af9e5d)
2019-11-18[service https] T1443: add setting of HTTPS listen portJohn Estabrook
(cherry picked from commit 6b25ed2a44dde77f5cbfbf68fb4f5f661a34c1c0)
2019-11-17[pppoe-server] adding CIDR based prefixes as client-ip-pool optionhagbard
2019-11-17Import BFD implementation from current. Implementation by Christian ↵Daniil Baturin
Poessinger et al.
2019-10-27snmp: T1769: remove TSM (Transport Security Mode) supportChristian Poessinger
The SNMPv3 TSM is very complex and I know 0 users of it. Also this is untested and I know no way how it could be tested. Instead of carrying on dead and unused code we should favour a drop of it using a proper config migration script. (cherry picked from commit 556b528ef9cc1eca9d142ebe1f8f88cd02d536da)
2019-10-27snmp: T818: T1738: remove per user/trap engine idChristian Poessinger
As of the SNMP specification an SNMP engine ID should be unique per device. To not make it more complicated for users - only use the global SNMP engine ID. (cherry picked from commit d523111279b3a9a5266b442db5f04049a31685f7)
2019-10-17snmp: T1737: add missing completion helpersChristian Poessinger
(cherry picked from commit 7f9dceaa7898d6418edcdf148b52b66ccd3bd36a)
2019-09-04T1439: remove beginning and end anchors, they are implied with re.fullmatchJernej Jakob
(cherry picked from commit 03c09b1b0d7dfdab9fc87bc7b017455c45141ced)
2019-09-04T1439: move DUID validator to regexJernej Jakob
(cherry picked from commit 6a6634b02d73cc93cd7368cf2290940b57fae9c7)
2019-09-04T1439: add dhcpv6-client-id validatorJernej Jakob
(cherry picked from commit 87df87e3983e120ad171ae9dc2966309fc14fcd8)
2019-09-04[service https] T1443: rename "server-names" option to "server-name".Daniil Baturin
2019-09-04[service https] T1443: use "listen-address" option instead of "listen-addresses"Daniil Baturin
to follow the established convention.
2019-09-04T1443: backport the HTTP API to crux.Daniil Baturin
Implementation by Daniil Baturin and John Estabrook.
2019-08-29T1598: import the static-host-mappings CLI from current.Daniil Baturin
2019-08-25powerdns: T1524: support setting allow-from networkChristian Poessinger
Netmasks (both IPv4 and IPv6) that are allowed to use the server. The default allows access only from RFC 1918 private IP addresses. Due to the aggressive nature of the internet these days, it is highly recommended to not open up the recursor for the entire internet. Questions from IP addresses not listed here are ignored and do not get an answer. https://docs.powerdns.com/recursor/settings.html#allow-from Imagine an ISP network with non RFC1918 IP adresses - they can't make use of PowerDNS recursor. As of now VyOS hat allow-from set to 0.0.0.0/0 and ::/0 which created an open resolver. If there is no allow-from statement a config-migrator will add the appropriate nodes to the configuration, resulting in: service { dns { forwarding { allow-from 0.0.0.0/0 allow-from ::/0 cache-size 0 ignore-hosts-file listen-address 192.0.2.1 } } } (cherry picked from commit dc0f641956d002fa8588ef8d1213791cf36e92f2)
2019-07-23[wireguard] fixing value help typohagbard
(cherry picked from commit 36f8a1e4e5966c43c5330ff223fa2ef07d346b6e)
2019-07-23[wireguard] T1425 - assign a /31 address on Wireguard interfacehagbard
- added a validator for checking if the address is any cidr noted address (cherry picked from commit 2ee0eff1bd04ef02b0769341eee22543f8011b68)
2019-07-21T1537: add missing help for 'set service dns'Christian Poessinger
(cherry picked from commit d99bf6a3a623433e743bb2d1d72e2ef3e0ab5057)
2019-07-19T1527: fix typo, s/IPv5/IPv6/Daniil Baturin
2019-07-01T1498: Nameservers are not propagated into resolv.confKim Hagen
2019-05-20T1174: migrate local hostname/DNS handling to vyos-1xChristian Poessinger
Conflicts: src/conf_mode/host_name.py
2019-04-21[firewall] T314: add firewall options for MSS clampingChristian Poessinger
* clamp MSS IPv4 set firewall options interface pppoe0 adjust-mss '1452' * clamp MSS IPv6 set firewall options interface pppoe0 adjust-mss6 '1452' * disable entire rule set firewall options interface pppoe0 disable Output ------ $ sudo iptables-save -t mangle # Generated by iptables-save v1.4.21 on Sun Apr 21 12:56:25 2019 *mangle :PREROUTING ACCEPT [1217:439885] :INPUT ACCEPT [290:52459] :FORWARD ACCEPT [920:375774] :OUTPUT ACCEPT [301:100053] :POSTROUTING ACCEPT [1221:475827] :VYOS_FW_OPTIONS - [0:0] -A FORWARD -j VYOS_FW_OPTIONS -A VYOS_FW_OPTIONS -o pppoe0 -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --set-mss 1452 COMMIT Completed on Sun Apr 21 12:56:25 2019
2019-04-03[dhcpv6-relay] T1322: support multiple upstream serversChristian Poessinger
Add support for relaying a DHCPv6 packet to multiple servers on one upstream interface. (cherry picked from commit d5b113923aaa776f89749c820d6283b593e80c3a)
2019-03-20[rsyslog] T1282 - Configure VyOS to send syslog messages to remote syslog ↵hagbard
using fully-qualified domain name
2019-03-17T103: [dhcp-server] add support to configure host declarative namesChristian Poessinger
(cherry picked from commit 0fefe3c3b9250ad2ba841287a94036119728c708)
2019-02-28enhancement: T1225 - wireguard implement 'set int wireguard wg0 peer name ↵hagbard
disable' to disable single peers Conflicts: debian/changelog
2019-02-28IP validation for allowed ip corrected.hagbard
2019-02-28fixes T1238 - Wireguard allows invalid IP'shagbard
Conflicts: debian/changelog