summaryrefslogtreecommitdiff
path: root/src/conf_mode
AgeCommit message (Collapse)Author
2020-03-23Merge pull request #255 from DmitriyEshenko/crux-vrrpDaniil Baturin
vrrp: T1884: Add mode-force for run transition-scripts without checki…
2020-03-15ntp: T1803: Revert "T1694 NTPd: Do not listen on all interfaces by default"John Estabrook
This reverts commit 3d396586ee953c708465e00b6fef5d1f520d587c.
2020-03-13pppoe-server: T1821: Set radius module priorityEshenko Dmitriy
2020-02-07vrrp: T1884: Add mode-force for run transition-scripts without checking ↵DmitriyEshenko
previous state
2020-01-25keepalived: vrrp: T1900: always enable SNMP monitoringChristian Poessinger
(cherry picked from commit 8e50ece56b2644b1562efae1b3f8e07ab8146be9)
2020-01-17[pppoe-server] T1452 - add vendor option to shaperhagbard
(cherry picked from commit 85c9e0200a4619f0388b7fd7ba9a03f4be933ef5)
2020-01-16[pppoe-server] - fixed default RADIUS attribute Filter-Idhagbard
(cherry picked from commit 2cd0498f50296d5d9e80b6acafb63dd3d45fb5cd)
2020-01-16[pppoe-server] T1341 - Adding rate-limiter for pppoe server usershagbard
- RADIUS shaper settings (cherry picked from commit d4556b31e920197e1c58febb8d87a1765bfea81f)
2020-01-16[pppoe-server] T1341 - Adding rate-limiter for pppoe server usershagbard
- implementation for locally definied users (cherry picked from commit c1dc93391b9ec1785ab648fa7685521c85774d28)
2020-01-16[accel-ppp] pppoe shaper op-mode command extendedhagbard
(cherry picked from commit d748e526ca50f3acb98ec511fab977c4b044aea8)
2019-12-20igmp-proxy: T1893: verify that proxy interface existsChristian Poessinger
(cherry picked from commit 033205eb58acda9f571fbb5e84374a29186837e6)
2019-12-20igmp-proxy: T1893: rename 'interface' dictionary key to 'interfaces'Christian Poessinger
(cherry picked from commit 9a0f6371be5ef97974a4cc6d8f4fb97c3f9741ac)
2019-11-28[T1299] - SNMP extension with custom scriptshagbard
(cherry picked from commit 334677572aef752b0bf2c893bd14bdf6f801bb4b)
2019-11-28dhcp-serverr: T1825: replaced DHCP configuration error messagezdc
Previous one DHCP configuration error message does not point that DHCP server work only with primary IP address on interface. (cherry picked from commit 9b7f11bd469d788292d0c5461adabdd5a3fed87b)
2019-11-20QAT: T1788: Intel QAT implementationDmitriyEshenko
Conflicts: Makefile
2019-11-19dns: T1786: add proper processing of 'system disable-dhcp-nameservers'zdc
(cherry picked from commit 4e4f1dbd745952a24d70c3e2d7dc495d675dff34)
2019-11-19T1694 NTPd: Do not listen on all interfaces by defaultMarcel Gisselmann
(cherry picked from commit 258c24ab9be8aa4ced8bfa1c19f134ec8bbfb1a0)
2019-11-19[syslog] - T1597: 'del system system' stops now rsysloghagbard
(cherry picked from commit d34fd745438951d55c5c4899b2b3c7bfa5d08026)
2019-11-18[service https] T1443: add setting of HTTPS listen portJohn Estabrook
(cherry picked from commit 6b25ed2a44dde77f5cbfbf68fb4f5f661a34c1c0)
2019-11-18[service https] T1443: organize internal data by server blockJohn Estabrook
(cherry picked from commit 3aadfc1fb0e3af03a98fb908c8709e4099296821)
2019-11-17[pppoe-server] adding CIDR based prefixes as client-ip-pool optionhagbard
2019-11-17Import BFD implementation from current. Implementation by Christian ↵Daniil Baturin
Poessinger et al.
2019-11-17 T1470: improve output of "show dhcpv6 server leases"Jernej Jakob
- change DUID to IAID_DUID - format IAID_DUID as colon-separated hex list - implement functions: pool, sort, state - add op-mode definitions for pool, sort, state - add columns: State, Type, Last communication, Pool - implement json output - implement completionHelp function
2019-11-12snmpd: T1705 - High CPU usage by bgpd when snmp is activehagbard
* typo fixed
2019-11-09ddclient: T1789: fix RFC2136 generated configChristian Poessinger
Commit 967067970494c1800f ("ddclient: T1030: adjust to latest syntax") was under the impression that ddclient 3.9.0 now handles every config item with a comma in the end. This is unfortunately not true on RFC2136 dynamic DNS entries. Remove commas on config template. (cherry picked from commit cc2ea329b1bb2ac23ffcc64892e831e7978023e2)
2019-11-09ddclient: T1030: add cloudflare zone config entryChristian Poessinger
(cherry picked from commit bbb3a9ecdf2cf76b6336414928030798007dc1c7)
2019-11-09ddclient: T1030: adjust to latest syntaxChristian Poessinger
(cherry picked from commit 967067970494c1800f028e5a44ff2fc9e39eabb9)
2019-11-09ddclient: T1030: auto create runtime directoriesChristian Poessinger
(cherry picked from commit 760ac992c827734032cc41a77ba21bcc4bde50e1)
2019-11-09ddclient: T1030: use new default configuration file pathChristian Poessinger
(cherry picked from commit 564c75c511c2cfd23404a500340a53441c694ffd)
2019-10-28snmp: fix verify() bail out early orderChristian Poessinger
(cherry picked from commit ed642ff5e958c6ef43dee5ef684fb5ccf85ad8cf)
2019-10-27snmp: T1738: cleanup import statementsChristian Poessinger
(cherry picked from commit b86f1d702e3b67774d3a2eec1f9fa83108711798)
2019-10-27snmp: T1769: remove TSM (Transport Security Mode) supportChristian Poessinger
The SNMPv3 TSM is very complex and I know 0 users of it. Also this is untested and I know no way how it could be tested. Instead of carrying on dead and unused code we should favour a drop of it using a proper config migration script. (cherry picked from commit 556b528ef9cc1eca9d142ebe1f8f88cd02d536da)
2019-10-27snmp: T818: T1738: remove per user/trap engine idChristian Poessinger
As of the SNMP specification an SNMP engine ID should be unique per device. To not make it more complicated for users - only use the global SNMP engine ID. (cherry picked from commit d523111279b3a9a5266b442db5f04049a31685f7)
2019-10-19dhcp-server: T1745: bugfix corner case on static-assignmentsChristian Poessinger
There was a bug when refactoring this with commits 5848a4d ("dhcp-server: T1707: remove DHCP static-mappings from address pool") and 1182b44 ("dhcp-server: T1707: bugfix on subsequent DHCP exclude addresses") that when a static address assignemnt was using the last IP address from the specified range. This triggered the following error: "DHCP range stop address x must be greater or equal to the range start address y!" (cherry picked from commit 735d73e162634d598aa6b8ee13197aa231eefedb)
2019-10-03dhcp-server: T1707: remove DHCP static-mappings from address poolChristian Poessinger
Previously when static-mappings have been created the address was still within the DHCP pool resulting in log entries as follows: dhcpd: Dynamic and static leases present for 192.0.2.51 dhcpd: Remove host declaration DMZ_PC2 or remove 192.0.2.51 dhcpd: from the dynamic address pool for DMZ
2019-10-03dhcp-server: only import ip_address and ip_network from ipaddress classChristian Poessinger
2019-10-03dhcp-server: T1707: bugfix on subsequent DHCP exclude addressesChristian Poessinger
Moved the code for splicing a DHCP range into its dedicated function as this will later be required again. Having subsequent DHCP exclude addresses e.g. 192.0.2.70 and 192.0.2.71 did not work as the previous algorithm created a range whose start address was after the end address.
2019-09-04T1439: remove quotes around dhcp6.client-idJernej Jakob
(cherry picked from commit b04a9791226f7953cfa740804ec0d43745605f49)
2019-09-04[service https] T1443: rename "server-names" option to "server-name".Daniil Baturin
2019-09-04[service https] T1443: correct the listen-address option in the script.Daniil Baturin
2019-09-04[service https] T1443: create /etc/vyos if it doesn't exist.Daniil Baturin
2019-09-04T1443: backport the HTTP API to crux.Daniil Baturin
Implementation by Daniil Baturin and John Estabrook.
2019-08-31[wireguard] T1428: Add handling of fwmark setting (#70)Matthias Fetzer
[wireguard] T1428: correct handling of the fwmark option
2019-08-31[syslog] T1530 - "set system syslog global archive file" doesn't workhagbard
2019-08-31[VRRP] T1362: quote VRRP password strings to avoid config parse errors.Daniil Baturin
2019-08-29T1598: import the new host_name.py from current.Daniil Baturin
2019-08-27T1598: make dns_forwarding.py retrieve name servers from vyos-hostsd.Daniil Baturin
2019-08-25powerdns: T1524: support setting allow-from networkChristian Poessinger
Netmasks (both IPv4 and IPv6) that are allowed to use the server. The default allows access only from RFC 1918 private IP addresses. Due to the aggressive nature of the internet these days, it is highly recommended to not open up the recursor for the entire internet. Questions from IP addresses not listed here are ignored and do not get an answer. https://docs.powerdns.com/recursor/settings.html#allow-from Imagine an ISP network with non RFC1918 IP adresses - they can't make use of PowerDNS recursor. As of now VyOS hat allow-from set to 0.0.0.0/0 and ::/0 which created an open resolver. If there is no allow-from statement a config-migrator will add the appropriate nodes to the configuration, resulting in: service { dns { forwarding { allow-from 0.0.0.0/0 allow-from ::/0 cache-size 0 ignore-hosts-file listen-address 192.0.2.1 } } } (cherry picked from commit dc0f641956d002fa8588ef8d1213791cf36e92f2)
2019-07-25T1541 Fix: adding additional checkEshenko Dmitriy
(cherry picked from commit 3945b2259aaa64eb9f4d61334126235f2d641293)
2019-07-21[dns-forwarding] T1333: handle domain forward and general recursion in one ↵Christian Poessinger
configuration line In the past we used the PowerDNS cofniguration option forward-zones and forward-zones-recurse, but only the latter one sets the recursion bit in the DNS query. Thus all recursions have been moved to this config statement. (cherry picked from commit 5886dd27cbc65f8cda04752bbd39a960b0887523)