Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-11-23 | wireless: T1627: support station mode | Christian Poessinger | |
Tested using: ------------- set interfaces wireless wlan0 address 'dhcp' set interfaces wireless wlan0 channel '0' set interfaces wireless wlan0 description '1' set interfaces wireless wlan0 physical-device 'phy0' set interfaces wireless wlan0 security wpa passphrase '12345678' set interfaces wireless wlan0 ssid 'VyOS-TEST' set interfaces wireless wlan0 type 'station' | |||
2019-11-23 | wireless: T1627: RADIUS servers must have a key specified | Christian Poessinger | |
2019-11-23 | wireless: T1627: change RADIUS CLI syntax | Christian Poessinger | |
Adopt RADIUS configuration and harmonize it with the rest of VyOS. Move the following configuration block: security { wpa { cipher CCMP mode wpa2 radius-server 172.16.100.10 { port 1812 secret secretkey } radius-server 172.16.100.11 { port 1812 secret secretkey } } } to the harmonized version of: security { wpa { cipher CCMP mode wpa2 radius { server 172.16.100.10 { port 1812 secret secretkey } server 172.16.100.11 { port 1812 secret secretkey } } } } And add the new "set interfaces wireless wlan0 security wpa radius source-address" CLI command to specify the origin of any RADIUS query on systems having multiple IP addresses. | |||
2019-11-23 | wireless: T1627: re-order WPA key in hostapd config | Christian Poessinger | |
2019-11-23 | wireless: T1627: fix generated ht_capab and vht_capab | Christian Poessinger | |
If no capabilities are configured on the CLI - there should also be no ht_capab or vht_capab entry in the resulting hostapd.conf | |||
2019-11-23 | wireless: T1627: config migrator does not support camel casing | Christian Poessinger | |
convert all nodes to lowercase | |||
2019-11-23 | wireless: T1627: initial rewrite of show-wireless.pl in Python | Christian Poessinger | |
2019-11-23 | wireless: T1627: initial rewrite in XML/Python style | Christian Poessinger | |
Working: - Wireless modes b, g, n, ac - WPA/WPA2 psk and RADIUS (tested using Microsoft NPS) | |||
2019-11-14 | [service https] T1443: add setting of HTTPS listen port | John Estabrook | |
2019-11-11 | [OpenVPN]: T1704: Added uppercase entries of ncp-ciphers, since there seems ↵ | vindenesen | |
to be a bug in OpenVPN client when comparing pushed cipher with local ncp cipher list | |||
2019-11-11 | [OpenVPN]: T1704: Moved ncp-ciphers out of encryption block in config template | vindenesen | |
2019-11-11 | [OpenVPN]: T1704: Added function for ncp-ciphers, and ability to disable it. | vindenesen | |
[OpenVPN]: T1704: Changed config structure for OpenVPN encryption to support ncp-ciphers. [OpenVPN]: T1704: Added migration scripts for interface 2-to-3 | |||
2019-11-11 | Merge pull request #159 from DmitriyEshenko/QAT-cur | Daniil Baturin | |
QAT: T1788: Intel QAT implementation | |||
2019-11-10 | Merge pull request #158 from DmitriyEshenko/cur-fix-l2tp | Christian Poessinger | |
l2tp: T1747: automatically calculate gw-ip-address. | |||
2019-11-10 | l2tp: T1747: automatically calculate gw-ip-address | DmitriyEshenko | |
2019-11-08 | ddclient: T1789: fix RFC2136 generated config | Christian Poessinger | |
Commit 967067970494c1800f ("ddclient: T1030: adjust to latest syntax") was under the impression that ddclient 3.9.0 now handles every config item with a comma in the end. This is unfortunately not true on RFC2136 dynamic DNS entries. Remove commas on config template. | |||
2019-11-08 | QAT: T1788: Intel QAT implementation | DmitriyEshenko | |
2019-11-05 | T1774: fix error output | John Estabrook | |
2019-11-04 | list_interfaces: add wifi interfaces to bridgeable interfaces | Christian Poessinger | |
2019-11-02 | bridge: T1783: bugfix removal of member interface | Christian Poessinger | |
Fix error when deleting a member with: delete interfaces bridge br0 member interface eth1 Traceback (most recent call last): File "/usr/libexec/vyos/conf_mode/interfaces-bridge.py", line 304, in <module> apply(c) File "/usr/libexec/vyos/conf_mode/interfaces-bridge.py", line 267, in apply br.del_port( intf['name'] ) TypeError: string indices must be integers | |||
2019-10-30 | [conf completion]: T1779: Add tunnels to completion | kroy | |
2019-10-27 | snmp: make script extension code more readable | Christian Poessinger | |
2019-10-27 | snmp: use proper stat literals on chmod() | Christian Poessinger | |
2019-10-27 | snmp: fix verify() indent on script extensions | Christian Poessinger | |
2019-10-27 | snmp: fix verify() bail out early order | Christian Poessinger | |
2019-10-27 | snmp: T1738: cleanup import statements | Christian Poessinger | |
2019-10-27 | Merge pull request #155 from kroy-the-rabbit/py-interface | Christian Poessinger | |
T1759: Merging interface.py into ifconfig.py | |||
2019-10-27 | T1773, T1774: add a show config operation with JSON and raw options. | Daniil Baturin | |
2019-10-27 | T1759: Merging interface.py into ifconfig.py | kroy | |
2019-10-27 | T1773: add a script for converting the config to JSON. | Daniil Baturin | |
It also exposes those functions in vyos.configtree | |||
2019-10-27 | snmp: T1769: remove TSM (Transport Security Mode) support | Christian Poessinger | |
The SNMPv3 TSM is very complex and I know 0 users of it. Also this is untested and I know no way how it could be tested. Instead of carrying on dead and unused code we should favour a drop of it using a proper config migration script. | |||
2019-10-27 | snmp: T818: T1738: remove per user/trap engine id | Christian Poessinger | |
As of the SNMP specification an SNMP engine ID should be unique per device. To not make it more complicated for users - only use the global SNMP engine ID. | |||
2019-10-24 | T1762: adjust the set_level() calls to use the new list representation. | Daniil Baturin | |
2019-10-23 | ddclient: T1030: add cloudflare zone config entry | Christian Poessinger | |
2019-10-23 | [service https] T1443: organize internal data by server block | John Estabrook | |
2019-10-23 | [HTTP API] Add endpoints for config file and image management. | Daniil Baturin | |
2019-10-23 | [HTTP API] Use a decorator for functions that require authentication. | Daniil Baturin | |
2019-10-23 | ddclient: T1030: adjust to latest syntax | Christian Poessinger | |
2019-10-23 | ddclient: T1030: auto create runtime directories | Christian Poessinger | |
2019-10-23 | ddclient: T1030: use new default configuration file path | Christian Poessinger | |
2019-10-22 | T1759: Migrating interfaces | kroy | |
2019-10-21 | Merge pull request #147 from jdmac87/current | Christian Poessinger | |
T1755: Python KeyError exceptions raised with 'show vpn ipsec sa' command under use of certain IPSEC cipher suites. | |||
2019-10-21 | T1755: fixes issue with 'show vpn ipsec sa' command where lack of keysize ↵ | Jason McAllister | |
(encr-keysize) will result in KeyError - such as for CHACHA20_POLY1305 | |||
2019-10-21 | T1755: fixes issue with 'show vpn ipsec sa' command where lack of hash ↵ | Jason McAllister | |
(integ-alg) will result in KeyError - such as with GCM based options | |||
2019-10-21 | T1756 More output for WG | kroy | |
2019-10-19 | T1749: support multiple ranges in the numeric validator. | Daniil Baturin | |
2019-10-19 | dhcp-server: T1745: bugfix corner case on static-assignments | Christian Poessinger | |
There was a bug when refactoring this with commits 5848a4d ("dhcp-server: T1707: remove DHCP static-mappings from address pool") and 1182b44 ("dhcp-server: T1707: bugfix on subsequent DHCP exclude addresses") that when a static address assignemnt was using the last IP address from the specified range. This triggered the following error: "DHCP range stop address x must be greater or equal to the range start address y!" | |||
2019-10-18 | system-proxy: T1741 - Add system wide proxy setting | hagbard | |
* removed subprocess as it is not required, script is executed via sudo * pep8 formatted | |||
2019-10-18 | wireguard - remove endpoint check to enable roaming connections | hagbard | |
2019-10-18 | system-proxy: T1741 - Add system wide proxy setting CLI implementation | hagbard | |