summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2021-06-18import cron.hourly script from vyatta-cfg-systemChristian Poessinger
2021-06-18Merge pull request #884 from sarthurdev/opmode_ike_saChristian Poessinger
ipsec: T2816: Fix 'show vpn ike sa' when key-size is not set
2021-06-18ping: T3634: Adding do not fragment to Ping (#885)Cheeze-It
In this commit we add the do not fragment capability for ping commands. Co-authored-by: Cheeze_It <none@none.com>
2021-06-17ipsec: T2816: Fix 'show vpn ike sa' when key-size is not setsarthurdev
2021-06-17policy: T3631: migrate "set extcommunity-rt|soo" to "set extcommunity rt|soo"Christian Poessinger
migrate "set extcommunity-rt" and "set extcommunity-soo" to "set extcommunity rt|soo" to match FRR syntax. This also makes it easier to implement the "bandwidth" extended community.
2021-06-16tunnel: T3555: fix configuration error message grammarChristian Poessinger
2021-06-15ipsec: T2816: T645: T3613: Migrated IPsec to swanctl, includes multiple ↵sarthurdev
selectors, and selectors with VTI.
2021-06-13wwan: T3620: auto detect IP protocol based on requested addressesChristian Poessinger
(cherry picked from commit 1eb6aee88f411127175fdab031d896af1e1adbc3)
2021-06-13wwan: T3622: add support for APN authenticationChristian Poessinger
Some APNs require a username/password. Add CLI nodes (matching the PPPoE syntax) for client authentication. One APN would be the IPv4/IPv6 APN from Deutsche Telekom (Germany) APN Name: Telekom Internet IPv6 APN: internet.v6.telekom Benutzername: telekom Passwort: tm (cherry picked from commit c667a45a8fb06cb76c907348c4f1e3ec708b6e03)
2021-06-13pppoe: T3621: validate that both username and password are setChristian Poessinger
A validator is missing checking that if authentication is used on a PPPoE interface, both username and password are set. (cherry picked from commit 0361c3ac449f183476f7aee31439417d9f7f8012)
2021-06-13wwan: T3620: reorder mirgation scripts for 1.3 backportChristian Poessinger
As the new WWAN interface style is backported to VyOS 1.3 we also need to shift the order of the interface migration scripts. so the same order from VyOS 1.4 also applies to VyOS 1.3. In short, 21-to-22 is renamed to 18-to-19 and all other migrators are shifted up one version.
2021-06-13wwan: T3620: adjust NAT inbound/outbound interfaces on config migrationChristian Poessinger
2021-06-13wwan: T3620: fix backup route metric in migration scriptChristian Poessinger
2021-06-13wwan: T3620: rename "wirelessmodem wlm" interfaces to new wwan interface treeChristian Poessinger
2021-06-12ipsec: T1501: Use vyos.validate.is_ipv6_link_localsarthurdev
2021-06-12Merge pull request #875 from sarthurdev/dhcp_address_waitChristian Poessinger
ipsec: T1501: T3617: Add handling for missing addresses on boot when using dhcp-interface
2021-06-12ipsec: T1501: T3617: Add handling for missing addresses on boot when using ↵sarthurdev
dhcp-interface
2021-06-12http-api: T3616: update for strict content-type check in FastAPI 0.65.2John Estabrook
FastAPI 0.65.2 checks content-type request header before assuming JSON, closing a well-known loophole. This requires a modification of the code providing backwards compatibility of multipart forms.
2021-06-11containers: T3614: Fix for network names with hyphensever-sever
Fix for containers and newtorks names with hyphen in names. We shouldn't mangle tagNode values.
2021-06-10wwan: T3611: switch to qmi/mbim modeChristian Poessinger
2021-06-10ipsec: T2816: add .py extenstion to dhclient helper script for processingChristian Poessinger
dhclient fails to execute the script without the extension.
2021-06-07vti: T3588: remove interfaces not bound to IPSec tunnelChristian Poessinger
A VTI interface also requires an IPSec configuration - VyOS 1.2 supported having a VTI interface in the CLI but no IPSec configuration - drop VTI configuration if this is the case for VyOS 1.4.
2021-06-07ipsec: T3588: remove site-to-site tunnel CLI options only valid in OpenswanChristian Poessinger
2021-06-07nhrp: T3599: Update config path to new /run directorysarthurdev
2021-06-06ipsec: T3588: remove CLI options deprecated by strongSwanChristian Poessinger
- set vpn ipsec nat-traversal - set vpn ipsec nat-networks allowed-network
2021-06-06T1168: ipsec: add copyright header to migration scriptChristian Poessinger
2021-06-06Merge pull request #865 from sarthurdev/currentChristian Poessinger
nhrp: T3599: Migrate NHRP to XML/Python
2021-06-06nhrp: T3599: Migrate NHRP to XML/Pythonsarthurdev
2021-06-05Merge pull request #866 from sarthurdev/fix-ipsecChristian Poessinger
ipsec: T2816: Fix typo from refactor
2021-06-04ipsec: T2816: Fix typo from refactorsarthurdev
2021-06-04vti: T3595: error out when adding VTI interface withouth IPSecChristian Poessinger
2021-06-04flow-accounting: T3132: fix egress iptables chainJan-Philipp Benecke
(cherry picked from commit 95cc2e4b4c11414cc71749af12abb575e96e5bd4)
2021-06-01op-mode: T3384: support UDP bandwidth testingJACK
2021-05-31conntrack: T3579: add module disable optionsChristian Poessinger
Some application layer gateway (ALG) modules can be disabled during runtime if requireq.
2021-05-31ipsec: T2816: Continued refactor, added proper ipsec-interfaces handlingSimon
2021-05-30ipsec: T2816: Refactor to remove global variable and tidy upSimon
2021-05-29vpn: ipsec: T3093: test for VTI interface availability the easy wayChristian Poessinger
We do not need to query the actual configuration if the VTI peer is configured or not. This can be done in a much more simples way by just checking if the desired interface exists on the running system. This is safe to do as the VTI priority is less then IPSec.
2021-05-29ipsec: vti: T2816: Update to use correct VTI mark, code cleanupSimon
2021-05-29vpn: ipsec: T3093: drop obsolete cleanup_vti_interfaces() functionChristian Poessinger
2021-05-29vti: T1579: only remove the interface when it existsChristian Poessinger
2021-05-29vti: ipsec: T2816: Fix vti-up-downsarthurdev
2021-05-28ipsec: T2816: drop absolute path on calls to iproute2Christian Poessinger
2021-05-28vti: ipsec: T2816: interfaces must be created using the vyos.ifconfig libraryChristian Poessinger
2021-05-28ipsec: T2816: fix executable permission on vti-up-down helperChristian Poessinger
2021-05-28vti: T1579: implement Virtual Tunnel Interfaces using XML and PythonChristian Poessinger
2021-05-28dummy: T2241: minor code cleanupChristian Poessinger
No need to call .keys() on a dict when searching for a key. Also drop the unused "import os" call.
2021-05-28ipsec: T2816: IPSec python rework, includes DMVPN and VTI supportSimon
2021-05-27dhcp-server: T2669: do not allow overlapping ranges to be createdChristian Poessinger
set service dhcp-server shared-network-name NET01 authoritative set service dhcp-server shared-network-name NET01 subnet 10.0.0.0/24 default-router '10.0.0.1' set service dhcp-server shared-network-name NET01 subnet 10.0.0.0/24 lease '86400' set service dhcp-server shared-network-name NET01 subnet 10.0.0.0/24 range RNG01 start '10.0.0.60' set service dhcp-server shared-network-name NET01 subnet 10.0.0.0/24 range RNG01 stop '10.0.0.70' set service dhcp-server shared-network-name NET01 subnet 10.0.0.0/24 range RNG02 start '10.0.0.55' set service dhcp-server shared-network-name NET01 subnet 10.0.0.0/24 range RNG02 stop '10.0.0.65' Will result in a dhcpd.conf: shared-network NET01 { authoritative; subnet 10.0.0.0 netmask 255.255.255.0 { option routers 10.0.0.1; default-lease-time 86400; max-lease-time 86400; range 10.0.0.60 10.0.0.70; range 10.0.0.55 10.0.0.65; } on commit { set shared-networkname = "NET01"; } } This is not allowed by ISC DHCPd: dhcpd[3307]: /run/dhcp-server/dhcpd.conf line 25: lease 10.0.0.63 is declared twice! dhcpd[3307]: range 10.0.0.55 10.0.0.65;
2021-05-27Merge branch 't3579-conntrack' into currentChristian Poessinger
* t3579-conntrack: conntrack: T3535: add conntrack-sync supported vyos-configd services conntrack: T3579: initial implementation with XML and Python
2021-05-27conntrack: T3579: initial implementation with XML and PythonChristian Poessinger