<feed xmlns='http://www.w3.org/2005/Atom'>
<title>vyos-1x.git/src/etc/systemd, branch syslog-typos-T6989</title>
<subtitle>VyOS command definitions, scripts, and utilities (mirror of https://github.com/vyos/vyos-1x.git)
</subtitle>
<id>https://git.amelek.net/vyos/vyos-1x.git/atom?h=syslog-typos-T6989</id>
<link rel='self' href='https://git.amelek.net/vyos/vyos-1x.git/atom?h=syslog-typos-T6989'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/'/>
<updated>2025-02-17T19:51:03+00:00</updated>
<entry>
<title>dhcp: T6948: systemd-service adjustment to invoke helper script</title>
<updated>2025-02-17T19:51:03+00:00</updated>
<author>
<name>Indrajit Raychaudhuri</name>
<email>irc@indrajit.com</email>
</author>
<published>2024-12-18T23:15:53+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=caaa35b28df8b9ae26afd0e4b32c489aa90ca932'/>
<id>urn:sha1:caaa35b28df8b9ae26afd0e4b32c489aa90ca932</id>
<content type='text'>
The helper script updates VyOS hostd records from
DHCP server leases. This ensures that hostd records
with the DHCP server leases are kept in sync with
VyOS hostd records right after the DHCP server is
started.

Note that `Restart` directive needs to be updated to
`on-failure` so that the service is restarted in case
of failure/timeout in interaction with hostd service.
</content>
</entry>
<entry>
<title>syslog: T6989: convert old configuration format to "advanced"</title>
<updated>2025-02-03T06:16:07+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2025-01-13T18:36:41+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=e143e496e28b9d6d5803278fa76a14bf2bc2304e'/>
<id>urn:sha1:e143e496e28b9d6d5803278fa76a14bf2bc2304e</id>
<content type='text'>
</content>
</entry>
<entry>
<title>dhcp: T5840: Merge systemd service overrides for kea-ctrl-agent</title>
<updated>2025-01-17T04:40:08+00:00</updated>
<author>
<name>Indrajit Raychaudhuri</name>
<email>irc@indrajit.com</email>
</author>
<published>2025-01-17T03:37:44+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=4c92ab9ff4ddf44f0d6a2bf4c7e724fc35629f0c'/>
<id>urn:sha1:4c92ab9ff4ddf44f0d6a2bf4c7e724fc35629f0c</id>
<content type='text'>
Default systemd service for kea-ctrl-agent expects
`/etc/kea/kea-api-password` which is not used in
VyOS.

The systemd unit override to remove the condition
does not need to be in a separate (templated and
dynamic) override file and can be merged into the
existing static override file.
</content>
</entry>
<entry>
<title>suricata: T751: Initial support for suricata</title>
<updated>2024-05-12T08:36:34+00:00</updated>
<author>
<name>Maxime THIEBAUT</name>
<email>46688461+0xThiebaut@users.noreply.github.com</email>
</author>
<published>2024-05-01T20:16:03+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=549089a970e39d1ea09c10af5eaf8f696dd19d40'/>
<id>urn:sha1:549089a970e39d1ea09c10af5eaf8f696dd19d40</id>
<content type='text'>
</content>
</entry>
<entry>
<title>ssh: T6192: allow binding to multiple VRF instances</title>
<updated>2024-04-01T19:26:16+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2024-04-01T18:40:16+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=e5af1f0905991103b12302892e6f0070bbb7b770'/>
<id>urn:sha1:e5af1f0905991103b12302892e6f0070bbb7b770</id>
<content type='text'>
Currently VyOS only supports binding a service to one individual VRF. It might
become handy to have the services (initially it will be VRF, NTP and SNMP) be
bound to multiple VRFs.

Changed VRF from leafNode to multi leafNode with defaultValue: default - which
is the name of the default VRF.
</content>
</entry>
<entry>
<title>dns: T5959: Streamline dns forwarding service</title>
<updated>2024-01-21T19:29:25+00:00</updated>
<author>
<name>Indrajit Raychaudhuri</name>
<email>irc@indrajit.com</email>
</author>
<published>2023-12-30T00:21:33+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=1c1fb5fb4bd7c0d205b28caf90357ad56423464f'/>
<id>urn:sha1:1c1fb5fb4bd7c0d205b28caf90357ad56423464f</id>
<content type='text'>
Streamline configuration and operation of dns forwarding service in
following ways:

- Remove `dns_forwarding_reset.py` as its functionality is now covered
  by `dns.py`
- Adjust function names in `dns.py` to disambiguate between DNS
  forwarding and dynamic DNS
- Remove `dns_forwarding_restart.sh` as its functionality is inlined in
  `dns-forwarding.xml`
- Templatize systemd override for `pdns-recursor.service` and move the
  generated override files in /run. This ensures that the override files
  are always generated afresh after boot
- Simplify the systemd override file by removing the redundant overrides
- Relocate configuration path for pdns-recursor to `/run/pdns-recursor`
  and utilize the `RuntimeDirectory` default that pdns-recursor expects
- We do not need to use custom `--socket-dir` path anymore, the default
  path (viz., `/run/pdns-recursor` is fine)
</content>
</entry>
<entry>
<title>https: T5902: remove virtual-host configuration</title>
<updated>2024-01-09T06:29:16+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2024-01-06T09:55:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=d0d3071e99eb65edb888c26ef2fdc9e038438887'/>
<id>urn:sha1:d0d3071e99eb65edb888c26ef2fdc9e038438887</id>
<content type='text'>
We have not seen the adoption of the https virtual-host CLI option.

What it did?
* Create multiple webservers each listening on a different IP/port
  (but in the same VRF)
* All webservers shared one common document root
* All webservers shared the same SSL certificates
* All webservers could have had individual allow-client configurations
* API could be enabled for a particular virtual-host but was always enabled on
  the default host

This configuration tried to provide a full webserver via the CLI but VyOS is a
router and the Webserver is there for an API or to serve files for a local-ui.

Changes

Remove support for virtual-hosts as it's an incomplete and thus mostly useless
"thing". Migrate all allow-client statements to one top-level allow statement.
</content>
</entry>
<entry>
<title>pki: T5886: add support for ACME protocol (LetsEncrypt)</title>
<updated>2024-01-06T07:33:33+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2024-01-05T21:27:45+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=b8db1a9d7baf91b70c1b735e58710f1e2bc9fc7a'/>
<id>urn:sha1:b8db1a9d7baf91b70c1b735e58710f1e2bc9fc7a</id>
<content type='text'>
The "idea" of this PR is to add new CLI nodes under the pki subsystem to
activate ACME for any given certificate.

vyos@vyos# set pki certificate NAME acme
Possible completions:
+  domain-name          Domain Name
   email                Email address to associate with certificate
   listen-address       Local IPv4 addresses to listen on
   rsa-key-size         Size of the RSA key (default: 2048)
   url                  Remote URL (default:
                        https://acme-v02.api.letsencrypt.org/directory)

Users choose if the CLI based custom certificates are used
  set pki certificate EXAMPLE acme certificate &lt;base64&gt;
or if it should be generated via ACME.

The ACME server URL defaults to LetsEncrypt but can be changed to their staging
API for testing to not get blacklisted.
  set pki certificate EXAMPLE acme url https://acme-staging-v02.api.letsencrypt.org/directory

Certificate retrieval has a certbot --dry-run stage in verify() to see if it
can be generated.

After successful generation, the certificate is stored in under
/config/auth/letsencrypt. Once a certificate is referenced in the CLI (e.g. set
interfaces ethernet eth0 eapol certificate EXAMPLE) we call
vyos.config.get_config_dict() which will (if with_pki=True is set) blend in the
base64 encoded certificate into the JSON data structure normally used when
using a certificate set by the CLI.

Using this "design" does not need any change to any other code referencing the
PKI system, as the base64 encoded certificate is already there.

certbot renewal will call the PKI python script to trigger dependency updates.
</content>
</entry>
<entry>
<title>T5897: frr should be stopped before vyos-router</title>
<updated>2024-01-04T10:16:22+00:00</updated>
<author>
<name>Date Huang</name>
<email>tjjh89017@hotmail.com</email>
</author>
<published>2024-01-04T10:16:22+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=6d16ab081b70bc4ea837b66dfe032ec6bdb563d7'/>
<id>urn:sha1:6d16ab081b70bc4ea837b66dfe032ec6bdb563d7</id>
<content type='text'>
Signed-off-by: Date Huang &lt;tjjh89017@hotmail.com&gt;
</content>
</entry>
<entry>
<title>dhcp: T3316: Migrate dhcp/dhcpv6 server to Kea</title>
<updated>2023-12-07T23:29:38+00:00</updated>
<author>
<name>sarthurdev</name>
<email>965089+sarthurdev@users.noreply.github.com</email>
</author>
<published>2022-12-16T10:41:33+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=d95200e96763e4a7ed02577b1b177c84abb77838'/>
<id>urn:sha1:d95200e96763e4a7ed02577b1b177c84abb77838</id>
<content type='text'>
</content>
</entry>
</feed>
