summaryrefslogtreecommitdiff
path: root/src/conf_mode/interfaces-wireless.py
AgeCommit message (Collapse)Author
2020-04-12vyos.util: rename chmod_x() -> chmod_755()Christian Poessinger
2020-04-12wireless: T1627: typo bugfix for VLAN interfacesDavide Beatrici
The typos cause the configurator to throw an exception when a wireless VLAN is specified: Traceback (most recent call last): File "/usr/libexec/vyos/conf_mode/interfaces-wireless.py", line 1463, in <module> apply(c) File "/usr/libexec/vyos/conf_mode/interfaces-wireless.py", line 1433, in apply vlan = e.add_vlan(vif['id']) NameError: name 'e' is not defined
2020-04-11wireless: T2213: bugfix: Use ieee80211n and ieee80211ac if require_vht not setAlain Lamar
Use WiFi modes ieee80211ac and ieee80211n if VHT capabilities are optional. ieee80211n = 1 ieee80211ac = 1 Use only ieee80211ac if VHT capabilities are required (ieee80211n=0). ieee80211ac = 1 ieee80211n = 0 require_vht = 1 In order to make this decision, the desired WiFi operation mode needs to be known. Therefore, we must require users to set the WiFi mode. mode = (a|b|g|n|ac)
2020-04-11dhcp: T2265: refactor DHCP classThomas Mangin
Break the code between v4 and v6, remove need for getter/setter as they are just exposing the underlying dict. Move FixedDict from tunnel code and expose it to other part so it can be used to prevent accidental change to the dhcp option if no default exists already.
2020-04-08vyos-util: rename chown_file() > chown()Christian Poessinger
... to make it clear also directories can be chown(-ed)
2020-04-08bridge: T2232: bugfix wifi and wwan verify() sectionChristian Poessinger
Commit fcce471 ("bridge: T2232: prevent deletion of enslaved interfaces") added a regression by referencing a wrong variable name.
2020-04-07bridge: T2232: prevent deletion of enslaved interfacesChristian Poessinger
Interfaces enslaved to a bridge are not allowed to be deleted. If an interface is deleted from the config but it is still enslaved to a bridge will cause a configuration error on the subsequent boot.
2020-04-06util: T2226: rewrite wireless to use run (should be cmd)Thomas Mangin
cmd is not used as with not wireless adaptor wireless testing fails
2020-04-05wireless: T2212: bugfix for BF-ANTENNA and SOUNDING-DIMENSION flagsalainlamar
VHT flags deal with many variables which depend on antenna count and supported features. BF-ANTENNA-(2|3|4) and SOUNDING-DIMENSION-(2|3|4) were not dealt with correctly. IEEE 802.11ac (VHT) supports at least 1 antenna and up to 8 antennas at most. The hsotapd VHT flags may support as many but most do not. Therefore, we need to be picky here...
2020-04-05wireless: T1627: add imports from netaddrChristian Poessinger
Commit 3d978249b313 ("wireless: T1627: move Jinja2 templates to data/templates folder") remove a wildcard import statement which is required for MAC address modification for the AP.
2020-04-05wireless: T1627: add missing importChristian Poessinger
Commit 3d978249b313c ("wireless: T1627: move Jinja2 templates to data/templates folder") made use of a new library function (chown_file) from vyos.util, unfortunately the required import was somehow not added into the patch.
2020-04-04wireless: T1627: move Jinja2 templates to data/templates folderChristian Poessinger
2020-04-04Merge pull request #303 from alainlamar/T2211Christian Poessinger
wireless: T2211: bugfix: vht_oper_chwidth was not set in hostapd config
2020-04-04wireless: T2211: bugfix: Bugfix for the bugfix: set no defaultsAlain Lamar
When any defaults are set, VHT capabilities are automatically assumed for all WiFi modes which does not match the reality. Therefore we must leave this undefined by default.
2020-04-04wireless: T2211: bugfix: vht_oper_chwidth was not set in hostapd configAlain Lamar
When operating in certain modes, channel width must be configured for WiFi interfaces. The hostapd config does this in two separate lines which must both be configured: vht_oper_chwidth=(0|1|2|3) vht_capab+=[VHT160] for 160MHz in one block or vht_capab+=[VHT160-80PLUS80] for 160MHz as 2x 80MHz in two separate blocks.
2020-04-04wireless: T2208: bugfix: errors in the XML and Python fileAlain Lamar
Commits to "interfaces wireless wlanX capabilities vht link-adaptation (unsolicited|both)" always failed.
2020-03-30wireless: T2151: support phys that provide multiple mac addressesChristian Poessinger
A user reported a PHY that provides two consecutive MAC addresses, this case has been added as I was not aware of such cards. As we manipulate the MAC address anyways its safe to take only the first one.
2020-03-29vyos.util: increase usage of process_running() and remove duplicated codeChristian Poessinger
OpenVPN, WIFI, SSTP all had the same boiler plate copied about checking if a process associated with a pidfile is running or not. This has been migrated to the common library function vyos.util.process_running().
2020-03-28ifconfig: T2057: Do not set empty hw_id macThomas Mangin
set_mac is validating the mac address passed, therefore passing empty string will cause it to fail. if the hardware id could not be found then it should not be attempted to be set
2020-03-28ipv6: T1831: migrate eui64 addressing to XML and pythonChristian Poessinger
2020-03-28ipv6: T1831: migrate autoconf nodeChristian Poessinger
Autoconfigure addresses using Prefix Information in Router Advertisements.
2020-03-28ipv6: T1831: use integers over bool in interface configurationChristian Poessinger
2020-03-28ipv6: T1831: migrate forwarding and dup-addr-detect-transmits nodesChristian Poessinger
... to new XML and Python based frontend/backend.
2020-03-28Merge pull request #275 from thomas-mangin/T2057-oper-adminChristian Poessinger
ifconfig: T2057: explicity name state functions
2020-03-28ifconfig: T2057: explicity name state functionsThomas Mangin
The Interface get_state/set_state were not clear about if they edited the admin or operational state. functions are now using admin_state and oper_state for clarity.
2020-03-27wireless: T2105: properly support disabled WIFI interfacesChristian Poessinger
It is not sufficient to only place a wifi interface in adminsitrative down state as hostapd could change the interface state again. If the wifi interface is administratively disabled, hostapd or wpa_supplicant should not be started at all to prevent anyone from messing arround with the admin state.
2020-03-23ifconfig: T2154: fixing failure to start-stop-daemonThomas Mangin
2020-03-23wireless: T2151: switch to iw when adding and deleting interfacesChristian Poessinger
2020-03-23Merge pull request #258 from thomas-mangin/31-vrfChristian Poessinger
tunnel: T31: fix vrf deletion, add support for vrf on tunnels
2020-03-23ifconfig: T31: convert all interface to set_vrf apiThomas Mangin
2020-03-22wireless: T2151: calculate MAC address only if not deletedChristian Poessinger
Calculation of the locally administered MAC address should only be performed when the interface is not deleted.
2020-03-22wireless: T2151: rename dict member from type to op_modeChristian Poessinger
2020-03-22wireless: T2151: calculate locally administered MAC address per SSIDChristian Poessinger
According to http://wiki.stocksy.co.uk/wiki/Multiple_SSIDs_with_hostapd every SSID served by access-point should run on its own, locally administered MAC address. Take the phy's interface MAC address as base and calculate a per interface locally administered MAC address.
2020-03-22wireless: T1627: add validator on physical-interfaceChristian Poessinger
A physical (phy) interface is mandatory for WiFi to work.
2020-03-22wireless: T1627: bugfix reading physical-interface to configChristian Poessinger
2020-03-08vrf: T31: add missing import netifaces.interfacesChristian Poessinger
2020-03-08wireless: T1627: configure own_ip_addr to be compliant with the RADIUS protocolChristian Poessinger
2020-03-08wireless: radius: T2110: aupport server disable optionChristian Poessinger
2020-03-08vrf: T31: fix invalid variable referenceChristian Poessinger
With commit d61cab4 ("vrf: T31: enable vrf support for wireless interface") an unknown variable has been referenced.
2020-03-08vrf: T31: enable vrf support for wireless interfaceChristian Poessinger
2020-03-08vrf: T31: support VRF usage on VLAN/VIF interfacesChristian Poessinger
2020-03-07wireless: T2107: fix connecting to networks without passphraseChristian Poessinger
2020-03-06wireless: T2105: Add check interface stateDmitriyEshenko
2020-03-03interfaces: T1579: fix c/p error when evaluating ↵Christian Poessinger
os.environ['VYOS_TAGNODE_VALUE'] This has been only a theoretical problem but then the error condition was triggered - only an error has been printed instead of raising an Exception.
2020-02-17wireless: T2048: fix wrong verify() logic when type is monitorChristian Poessinger
2020-01-03ifconfig: T1939: provide abstraction for interface "ip" optionChristian Poessinger
Provide an XML/Python abstraction to * ip disable-arp-filter * ip enable-arp-accept * ip enable-arp-announce * ip enable-arp-ignore The old implementation can co-exist until the last interfaces have been migrated.
2020-01-02ifconfig: T1557: refactor apply_vlan_config() functionChristian Poessinger
instead of providing three copies of the same method in bonding, ethernet and wireless, make a common function in vyos.ifconfig_vlan.apply_vlan_config().
2019-11-23wireless: T1627: support station modeChristian Poessinger
Tested using: ------------- set interfaces wireless wlan0 address 'dhcp' set interfaces wireless wlan0 channel '0' set interfaces wireless wlan0 description '1' set interfaces wireless wlan0 physical-device 'phy0' set interfaces wireless wlan0 security wpa passphrase '12345678' set interfaces wireless wlan0 ssid 'VyOS-TEST' set interfaces wireless wlan0 type 'station'
2019-11-23wireless: T1627: RADIUS servers must have a key specifiedChristian Poessinger
2019-11-23wireless: T1627: change RADIUS CLI syntaxChristian Poessinger
Adopt RADIUS configuration and harmonize it with the rest of VyOS. Move the following configuration block: security { wpa { cipher CCMP mode wpa2 radius-server 172.16.100.10 { port 1812 secret secretkey } radius-server 172.16.100.11 { port 1812 secret secretkey } } } to the harmonized version of: security { wpa { cipher CCMP mode wpa2 radius { server 172.16.100.10 { port 1812 secret secretkey } server 172.16.100.11 { port 1812 secret secretkey } } } } And add the new "set interfaces wireless wlan0 security wpa radius source-address" CLI command to specify the origin of any RADIUS query on systems having multiple IP addresses.