Age | Commit message (Collapse) | Author |
|
|
|
... this is done for easier readability of the commands
|
|
|
|
|
|
vyos@vyos:~$ show hardware storage nvme
Node SN Model Namespace Usage Format FW Rev
---------------- -------------------- ---------------------------------------- --------- -------------------------- ---------------- --------
/dev/nvme0n1 S437Nxxxxxxxxx SAMSUNG MZQLB960HAJR-00007 1 25.17 GB / 960.20 GB 512 B + 0 B EDA5202Q
/dev/nvme1n1 S437Nxxxxxxxxx SAMSUNG MZQLB960HAJR-00007 1 38.36 GB / 960.20 GB 512 B + 0 B EDA5202Q
vyos@vyos:~$ show hardware storage smart nvme0n1
=== START OF INFORMATION SECTION ===
Model Number: SAMSUNG MZQLB960HAJR-00007
Serial Number: S437Nxxxxxxxxx
...
(cherry picked from commit 2e44365dad5f8dd6a495070d36c590319a421c28)
|
|
(cherry picked from commit 51899c362f2eba1dd067414f2dfa8e78f30ca408)
|
|
openconnect-server: T3559: Add restart op-command
|
|
|
|
|
|
Implementing a wrapper which will - based on the command - add a sudo prefix
to the execution string seemed to be a nice idea but unfortunately it did not
only not get momentum but also the codebase somethis added an implicit "sudo"
call a second time.
This resulted in a call: "sudo sudo systemctl"
The entire functionality was removed again and if an op-mode script requires
root priviledges it must be explicitly called with them - no black magic.
|
|
|
|
|
|
|
|
|
|
Instead of renaming the OSPFv3 commands for every individual XML invocation,
also re-use the common helper shell script. One source, one truth!
|
|
|
|
generate wireguard mobile-config wg0 server wg.vyos.net address 1.2.2.2/24
WireGuard client configuration for interface: wg0
[Interface]
PrivateKey = AEXrZ4b3xFVLg1lql3hy/93+d43q3+3vPdSMUGI6/Fo=
Address = 1.2.2.2/24
[Peer]
PublicKey = h1HkYlSuHdJN6Qv4Hz4bBzjGg5WUty+U1L7DJsZy1iE=
Endpoint = wg.vyos.net:41751
AllowedIPs = 0.0.0.0/0, ::/0
The servers public key and port are automatically extracter from the running
config.
|
|
|
|
|
|
containers: T2216: Add podman for containers
|
|
|
|
|
|
cpo@PE1:~$ show bgp vrf all
Instance default:
No BGP prefixes displayed, 0 exist
Instance red:
BGP table version is 1, local router ID is 10.2.1.1, vrf id 11
Default local pref 100, local AS 100
Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, r RIB-failure, S Stale, R Removed
Nexthop codes: @NNN nexthop's vrf id, < announce-nh-self
Origin codes: i - IGP, e - EGP, ? - incomplete
Network Next Hop Metric LocPrf Weight Path
*> 10.2.1.0/24 0.0.0.0 0 32768 ?
Displayed 1 routes and 1 total paths
Instance blue:
BGP table version is 1, local router ID is 10.1.1.1, vrf id 10
Default local pref 100, local AS 100
Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, r RIB-failure, S Stale, R Removed
Nexthop codes: @NNN nexthop's vrf id, < announce-nh-self
Origin codes: i - IGP, e - EGP, ? - incomplete
Network Next Hop Metric LocPrf Weight Path
*> 10.1.1.0/24 0.0.0.0 0 32768 ?
Displayed 1 routes and 1 total paths
|
|
This change makes it easier to group all BGP related operational level command
building blocks in one place.
|
|
|
|
Add a new CLI command "monitor log colored" to run the log file monitoring
through grc (https://github.com/garabik/grc).
|
|
|
|
|
|
|
|
|
|
|
|
When NTP is executed inside a VRF context, we also must execute the op-mode
commands inside the given VRF.
This is a workaround until the op-mode programming library from T3402 is
available.
|
|
|
|
|
|
|
|
|
|
op-mode: Correct help messages
|
|
|
|
Commit 68f7d1474d ("op-mode: bgp: T1513: add "show bgp" tree containing l2vpn
evpn") added the required XML definitions and a bash helper script. The helper
always got invoked using "sudo" which is not necessary for vtysh.
Calling "sudo" only slows down the system when e.g. RADIUS backed accounts are
used.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
* 't3255-rpki' of github.com:c-po/vyos-1x:
rpki: T3255: provide full protocol support in XML and Python
op-mode: ssh: support generating client keypair
smoketest: openvpn: remove print() when generating keys
|
|
vyos@vyos:~$ generate ssh client-key /config/auth/id_rsa_rpki
Generating public/private rsa key pair.
Your identification has been saved in /config/auth/id_rsa_rpki.
Your public key has been saved in /config/auth/id_rsa_rpki.pub.
The key fingerprint is:
SHA256:aBMN1F6lINh4CbG/fuEVReCpbZr3U0/KdorWY6iGfvw vyos@vyos
The key's randomart image is:
+---[RSA 2048]----+
| oB+o. .+o |
| o.++.o.o. |
| ......+. |
| . o.o. |
| = S o. |
| . o.+. . .|
| ..o=. = + |
| . +.+.+.B o|
| .o.o.+E+.+ |
+----[SHA256]-----+
|
|
|
|
|
|
|