summaryrefslogtreecommitdiff
path: root/src/conf_mode
AgeCommit message (Collapse)Author
2020-03-07pppoe: T1493: rename variables on ipv6-up scriptChristian Poessinger
2020-03-07vrf: T31: move to Python3 f-strings where possibleChristian Poessinger
2020-03-07vrf: T31: ensure VRF can not be deleted with an attached routing protocolChristian Poessinger
2020-03-07vrf: T31: rephrase error messagesChristian Poessinger
2020-03-07vrf: T31: reuse Config in interfaces_with_vrf()Christian Poessinger
2020-03-07vrf: T31: properly set configuration level when parsingChristian Poessinger
2020-03-06vrf: T31: enable vrf support for bridge interfaceChristian Poessinger
2020-03-06vrf: T31: enable vrf support for bonding interfaceChristian Poessinger
2020-03-06vrf: T31: enable vrf support for ethernet interfaceChristian Poessinger
2020-03-06Merge pull request #242 from thomas-mangin/splitChristian Poessinger
ifconfig: T2104: splt ifconfig.py into multiple files
2020-03-06ifconfig: T2104: splt ifconfig.py into multiple filesThomas Mangin
2020-03-06wireless: T2105: Add check interface stateDmitriyEshenko
2020-03-05vrf: T31: improve kernel rule lookup table codeChristian Poessinger
2020-03-05vrf: T31: modify kernel rule lookup table only onceChristian Poessinger
2020-03-05vrf: T31: add more documentation linksChristian Poessinger
2020-03-05vrf: T31: use subprocess check_output over check_callChristian Poessinger
2020-03-05pppoe: T1493: fix for fix of invalid reference of ipv6-up script fileChristian Poessinger
Commit d161cbb ("pppoe: T1493: fix invalid reference of ipv6-up script file") actually introduced another bug instead of fixing it. It was catched by vyos-smoketest ... luckily! Sorry!
2020-03-05vrf: T31: routing table IDs must be uniqueChristian Poessinger
2020-03-05vrf: T31: use vyos.ifconfig to set ifaliasChristian Poessinger
2020-03-05vrf: T31: table id is mandatoryChristian Poessinger
2020-03-05pppoe: T1493: fix invalid reference of ipv6-up script fileChristian Poessinger
2020-03-05login: T2050: extend verify() on public-keysChristian Poessinger
* A type must be present for any one public-key element * A key must be present for any one public-key element
2020-03-05pppoe: T1493: support IPv6 address negotiation which is required for DHCPv6-PDChristian Poessinger
2020-03-05macvlan: T1635: ensure 'link' interface really existsChristian Poessinger
2020-03-05vxlan: T1636: ensure 'link' interface really existsChristian Poessinger
2020-03-04pppoe: T1318: IPv6 supportChristian Poessinger
2020-03-04vrf: T31: remove pass in exception handlerChristian Poessinger
2020-03-04banner: T2099: accept empty pre-/post-login bannerChristian Poessinger
2020-03-04vrf: T31: enable vrf support for dummy interfaceChristian Poessinger
2020-03-04vrf: T31: reorder routing table lookupsChristian Poessinger
Linux routing uses rules to find tables - routing targets are then looked up in those tables. If the lookup got a matching route, the process ends. TL;DR; first table with a matching entry wins! You can see your routing table lookup rules using "ip rule", sadly the local lookup is hit before any VRF lookup. Pinging an addresses from the VRF will usually find a hit in the local table, and never reach the VRF routing table - this is usually not what you want. Thus we will re-arrange the tables and move the local lookup furhter down once VRFs are enabled.
2020-03-04vrf: T31: adding unreachable routes to the routing tablesChristian Poessinger
2020-03-04vrf: T31: prior to the v4.8 kernel iif and oif rules are neededChristian Poessinger
.. we run on 4.19 thus this is no longer needed.
2020-03-04vrf: T31: create iproute2 table to name mapping referenceChristian Poessinger
2020-03-04vrf: T31: rename 'vrf disable-bind-to-all ipv4' to 'vrf bind-to-all'Christian Poessinger
By default the scope of the port bindings for unbound sockets is limited to the default VRF. That is, it will not be matched by packets arriving on interfaces enslaved to an l3mdev and processes may bind to the same port if they bind to an l3mdev. TCP & UDP services running in the default VRF context (ie., not bound to any VRF device) can work across all VRF domains by enabling the 'vrf bind-to-all' option.
2020-03-04vrf: T31: support add/remove of interfaces from vrfChristian Poessinger
2020-03-04vrf: T31: remove superfluous vyos.vrf library functionsChristian Poessinger
vyos.vrf.list_vrfs() was only used in one function thus building a library is no longer needed. If it is needed in the future it should be placed into a library again.
2020-03-04vrf: T31: reduce script complexityChristian Poessinger
Keep it simple and stupid :)
2020-03-04vrf: T31: no need to use sudo calls in vrf.pyChristian Poessinger
All configuration mode scripts are already run with sudo.
2020-03-04vrf: T31: initial support for a VRF backend in XML/PythonThomas Mangin
This is a work in progress to complete T31 whoever thought it was less than 1 hour of work was ..... optimistic. Only VRF vreation and show is supported right now. No interface can be bound to any one VRF.
2020-03-03interfaces: T1579: fix c/p error when evaluating ↵Christian Poessinger
os.environ['VYOS_TAGNODE_VALUE'] This has been only a theoretical problem but then the error condition was triggered - only an error has been printed instead of raising an Exception.
2020-03-03dhcp-server: T2092: add default route to rfc3442-static-route optionAndras Elso
2020-03-03dhcp-server: T2062: Fix static route bytesAndras Elso
2020-03-01pppoe: T2087: enable unlimited connection attemptsChristian Poessinger
2020-02-27Merge pull request #227 from thomas-mangin/T2057Christian Poessinger
ifconfig: T2057: generalised Interface configuration
2020-02-27openvpn: T2075: add support for OpenVPN tls-crypt file optionChristian Poessinger
Encrypt and authenticate all control channel packets with the key from keyfile. Encrypting (and authenticating) control channel packets: * provides more privacy by hiding the certificate used for the TLS connection * makes it harder to identify OpenVPN traffic as such * provides "poor-man's" post-quantum security, against attackers who will never know the pre-shared key (i.e. no forward secrecy)
2020-02-27login: T2050: retrieve home directory for SSH keys from OS and not guess itChristian Poessinger
We should not rely on the home dir value stored in user['home_dir'] as if a crazy user will choose username root or any other system user this will fail. Should be deny using root at all?
2020-02-25[service https] T1443: set default HTTPS listen portJohn Estabrook
2020-02-25login: T1948: migrade local and radius configurationsChristian Poessinger
Splitting was not a good idea. By combining both we can create a RADIUS server XML include file which can be reused by multiple implementations to get a uniformed CLI for the users.
2020-02-25login: radius: T2071: support disabling individual serverChristian Poessinger
2020-02-25pppoe: T2055: verify logfile really existsChristian Poessinger