Age | Commit message (Collapse) | Author | |
---|---|---|---|
2020-06-13 | snmp: T2321: add VRF support | Christian Poessinger | |
2020-05-29 | airbag: T2088: explicit enabling of the feature | Thomas Mangin | |
airbag must now be explicitly installed. the patch also allow to fully disables the installation of the logging code at setup (and not just installing and doing nothing) | |||
2020-04-15 | dns-forwarding: T2298: fix path to control file | Christian Poessinger | |
After migrating PowerDNS to systemd and also its configuration files to a volatile directory in commit 77d725f ("dns-forwarding: T2185: move configuration files to volatile /run directory") the path for the control file has not been altered and pushed to the client rec_control binary" | |||
2020-04-12 | template: T2230: use render to generate templates | Thomas Mangin | |
convert all call to jinja to use template.render | |||
2020-04-09 | util: T2226: os.system was wrongly converted to run | Thomas Mangin | |
os.system does print the ouput of the command, run() does not. A new function called call() does the printing and return the error code. | |||
2020-04-06 | util: T2226: covert most calls from os.system to util | Thomas Mangin | |
As little change a possible but the function call The behaviour should be totally unchanged. | |||
2020-04-05 | snmp: T2230: move inlined templates to dedicated files | Christian Poessinger | |
2020-03-25 | T2161: Skip ipv6 listen, if it is disabled | Andras Elso | |
2020-03-21 | snmp: cleanup import section | Christian Poessinger | |
2020-02-19 | snmp: T1769: fix indentation error and add try clause | John Estabrook | |
2020-02-18 | snmp: T1769: cleanup leftove code path for certificate migration | Christian Poessinger | |
2020-02-18 | snmp: T2042: remove superfluous sudo calls | Christian Poessinger | |
2020-02-18 | snmp: T2042: import statement cleanup | Christian Poessinger | |
2020-02-15 | snmp: T2042: stricter validation when deleting SNMP in combination with LLDP | Christian Poessinger | |
A consistency check was missing to prevent deleting the SNMP configuration but still setting "service lldp snmp enable". | |||
2020-02-09 | snmp: T1931: instead of searching a pseudo marker find real marker in config | Christian Poessinger | |
As we need to operate with usmUser, we can search for it directly if its present or not. There is always one usmUser entry for the system user. | |||
2020-02-09 | snmp: T1931: change calling order when setting marker flag | Christian Poessinger | |
2020-02-09 | snmp: T1931: delete obsolete reading of oldEngineID | Christian Poessinger | |
2020-02-09 | snmp: T1931: harden logic when re-reading config fpr encrypted keys | Christian Poessinger | |
2020-02-09 | snmp: T1931: shorten file read timeout to 10ms | Christian Poessinger | |
2020-01-26 | snmpd: T1937: fix all startup warnings | Christian Poessinger | |
This is actually an "upstream" bug, see [1] but it can be fixed via our own scripts. [1]: https://bugs.launchpad.net/ubuntu/+source/net-snmp/+bug/1384122 | |||
2020-01-26 | Revert "snmp: T1937: fix "unknown token" warnings" | Christian Poessinger | |
This reverts commit 6945b2e3561cd76d193d41dd6ab5249661230460. | |||
2020-01-06 | service-snmp: T1931: Enabling SNMP commit error | hagbard | |
2020-01-03 | snmp: T1937: fix "unknown token" warnings | Christian Poessinger | |
2019-12-30 | snmp: T1921: reduce syslog noise | Christian Poessinger | |
Remove informative but noisy messages: Dec 30 11:45:02 vyos snmpd[2870]: Connection from UDP: [172.16.100.1]:42781 ... Dec 30 11:45:02 vyos snmpd[2870]: Connection from UDP: [172.16.100.1]:57331 ... | |||
2019-12-30 | snmp: T1921: change log options | Christian Poessinger | |
suppress error message: Dec 30 11:44:10 LR1 snmpd[2870]: error on subcontainer 'ia_addr' insert (-1) | |||
2019-12-30 | snmp: T1921: migrate sysvinit default to systemd override file | Christian Poessinger | |
2019-12-30 | snmp: adopt user/group to Debian Buster | Christian Poessinger | |
2019-12-18 | snmp: T1881: Add path for ext-scripts without path | DmitriyEshenko | |
2019-12-17 | snmp: T1881: add S_IRGRP to snmp script file permission set | Christian Poessinger | |
2019-12-17 | snmp: T1881: Change permission for script files | Viacheslav Hletenko | |
2019-10-27 | snmp: make script extension code more readable | Christian Poessinger | |
2019-10-27 | snmp: use proper stat literals on chmod() | Christian Poessinger | |
2019-10-27 | snmp: fix verify() indent on script extensions | Christian Poessinger | |
2019-10-27 | snmp: fix verify() bail out early order | Christian Poessinger | |
2019-10-27 | snmp: T1738: cleanup import statements | Christian Poessinger | |
2019-10-27 | snmp: T1769: remove TSM (Transport Security Mode) support | Christian Poessinger | |
The SNMPv3 TSM is very complex and I know 0 users of it. Also this is untested and I know no way how it could be tested. Instead of carrying on dead and unused code we should favour a drop of it using a proper config migration script. | |||
2019-10-27 | snmp: T818: T1738: remove per user/trap engine id | Christian Poessinger | |
As of the SNMP specification an SNMP engine ID should be unique per device. To not make it more complicated for users - only use the global SNMP engine ID. | |||
2019-10-15 | snmpd: T1705 - High CPU usage by bgpd when snmp is active | hagbard | |
* typo fixed | |||
2019-10-13 | Revert "snmpd: T1705 - High CPU usage by bgpd when snmp is active" | Christian Poessinger | |
Systems not runing BGP won't boot anymore. Syslog shows: snmpd[5404]: getaddrinfo: inetCidrRouteTable Name or service not known snmpd[5404]: getaddrinfo("inetCidrRouteTable", NULL, ...): Name or service not known snmpd[5404]: Error opening specified endpoint "inetCidrRouteTable" snmpd[5404]: Server Exiting with code 1 snmpd[5401]: Starting SNMP services:: systemd[1]: snmpd.service: control process exited, code=exited status=1 systemd[1]: Failed to start LSB: SNMP agents. systemd[1]: Unit snmpd.service entered failed state. This reverts commit e45648cdd5a52569be7f3ac30473b0c7474a7894. | |||
2019-10-10 | snmpd: T1705 - High CPU usage by bgpd when snmp is active | hagbard | |
2019-07-15 | [T1299] - SNMP extension with custom scripts | hagbard | |
2019-01-30 | T1160: fix (ro|rw)community ACL | Christian Poessinger | |
WHen building up the SNMP v2 community ro/rw access all hosts from a INET version could access even when the community was locked to one INET family. Example #1: set service snmp community bar network 172.16.0.0/12 Allowed access only to IPv4 network 172.16.0.0/12 but it allowed acces from IPv6 ::/0. Example #2: set service snmp community baz network 2001:db8::/64 Limited IPv6 access to 2001:db8::/64 but IPv4 was open to 0.0.0.0/0 | |||
2019-01-03 | T1147: Fix SNMP config file generation on newly installed systems | Christian Poessinger | |
2018-11-05 | T950: make sure agentx is enabled in FRR only when SNMP is setup, and ↵ | Daniil Baturin | |
supress duplicate error messages. | |||
2018-10-28 | T923: enable AgentX in FRR after SNMP is configured. | Daniil Baturin | |
2018-10-20 | SNMP: update comments in Python generator | Christian Poessinger | |
2018-10-20 | T923: support SNMP integration with FRR routing daemon | Christian Poessinger | |
2018-09-29 | T855: fix SNMP python verify() to allow non group assignment | Christian Poessinger | |
VyOS 1.1.8 support SNMPv3 without a group beeing assigned to a user. This was yet not supported in VyOS 1.2.0. Use for testing: ================ set service snmp v3 user testsnmpv3 auth plain 'authkey12345' set service snmp v3 user testsnmpv3 auth type sha set service snmp v3 user testsnmpv3 mode ro set service snmp v3 user testsnmpv3 privacy plain 'privkey12345' set service snmp v3 user testsnmpv3 privacy type aes | |||
2018-09-16 | T850: SNMP: improve non existing listen-address assignments | Christian Poessinger | |
2018-09-16 | snmp: fix python script indention | Christian Poessinger | |