<feed xmlns='http://www.w3.org/2005/Atom'>
<title>vyos-1x.git/src/migration-scripts/firewall, branch T7065-pr-mirror-trigger-restrict</title>
<subtitle>VyOS command definitions, scripts, and utilities (mirror of https://github.com/vyos/vyos-1x.git)
</subtitle>
<id>https://git.amelek.net/vyos/vyos-1x.git/atom?h=T7065-pr-mirror-trigger-restrict</id>
<link rel='self' href='https://git.amelek.net/vyos/vyos-1x.git/atom?h=T7065-pr-mirror-trigger-restrict'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/'/>
<updated>2025-01-06T11:05:22+00:00</updated>
<entry>
<title>T6841: firewall: migrate existing VRF in zone based firewall</title>
<updated>2025-01-06T11:05:22+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2025-01-06T10:56:53+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=dda428fc42c44decb3e661a7b6ba4e55b178dc4f'/>
<id>urn:sha1:dda428fc42c44decb3e661a7b6ba4e55b178dc4f</id>
<content type='text'>
VRF support was introduced in VyOS 1.4.0. If a VRF is added as an interface in
the zone based firewall, it will be migrated to the new syntax.

OLD:
  set firewall zone FOO interface RED
  set firewall zone FOO interface eth0

NEW:
  set firewall zone FOO member vrf RED
  set firewall zone FOO member interface eth0
</content>
</entry>
<entry>
<title>T6841: firewall: Fixed issues in ZBF when using VRFs</title>
<updated>2025-01-06T11:05:22+00:00</updated>
<author>
<name>aapostoliuk</name>
<email>a.apostoliuk@vyos.io</email>
</author>
<published>2024-12-17T11:39:49+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=4a194b32509ffcd9574bb7571a5a6347f7dc4e42'/>
<id>urn:sha1:4a194b32509ffcd9574bb7571a5a6347f7dc4e42</id>
<content type='text'>
Improve config parsing for ZBF when using VRFs and interfaces attached to VRFs
</content>
</entry>
<entry>
<title>T6841: firewall: improve config parsing for ZBF when using VRFs and interfaces attached to VRFs</title>
<updated>2025-01-06T11:05:22+00:00</updated>
<author>
<name>Nicolas Fort</name>
<email>nicolasfort1988@gmail.com</email>
</author>
<published>2024-10-29T19:05:52+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=df176d9b9b4cc67ae509ae2ff17a02f2520cc881'/>
<id>urn:sha1:df176d9b9b4cc67ae509ae2ff17a02f2520cc881</id>
<content type='text'>
</content>
</entry>
<entry>
<title>firewall: T4694: incomplete node checks in migration script</title>
<updated>2024-07-29T15:05:21+00:00</updated>
<author>
<name>Andrew Topp</name>
<email>andrewt@telekinetica.net</email>
</author>
<published>2024-07-29T15:05:21+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=3d42009c0e3cf5ea7ea0ed167b4d8f655667edd8'/>
<id>urn:sha1:3d42009c0e3cf5ea7ea0ed167b4d8f655667edd8</id>
<content type='text'>
This patch on #3616 will only attempt to fix ipsec matches in rules if the
firewall config tree passed to migrate_chain() has rules attached.
</content>
</entry>
<entry>
<title>firewall: T4694: Adding rt ipsec exists/missing match to firewall configs (#3616)</title>
<updated>2024-07-28T11:47:07+00:00</updated>
<author>
<name>talmakion</name>
<email>andrewt@telekinetica.net</email>
</author>
<published>2024-07-28T11:47:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=e2bf8812f73a75356f56274968be8859a2186d73'/>
<id>urn:sha1:e2bf8812f73a75356f56274968be8859a2186d73</id>
<content type='text'>
* Change ipsec match-ipsec/none to match-ipsec-in and match-none-in for
   fw rules
 * Add ipsec match-ipsec-out and match-none-out
 * Change all the points where the match-ipsec.xml.i include was used
   before, making sure the new includes (match-ipsec-in/out.xml.i) are
   used appropriately. There were a handful of spots where match-ipsec.xml.i
   had snuck back in for output hooked chains already
   (the common-rule-* includes)
 * Add the -out generators to rendered templates
 * Heavy modification to firewall config validators:
   * I needed to check for ipsec-in matches no matter how deeply nested
     under an output-hook chain(via jump-target) - this always generates
     an error.
   * Ended up retrofitting the jump-targets validator from root chains
     and for named custom chains. It checks for recursive loops and improper
     IPsec matches.
 * Added "test_ipsec_metadata_match" and "test_cyclic_jump_validation"
   smoketests</content>
</entry>
<entry>
<title>T6536: change wildcard character from + to * - extend fix to interfaces defined in zone policy.</title>
<updated>2024-07-03T13:05:35+00:00</updated>
<author>
<name>Nicolas Fort</name>
<email>nicolasfort1988@gmail.com</email>
</author>
<published>2024-07-03T12:53:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=66ec278393dbabe71f320c543816f27797d51140'/>
<id>urn:sha1:66ec278393dbabe71f320c543816f27797d51140</id>
<content type='text'>
</content>
</entry>
<entry>
<title>migration: T6007: convert all migration scripts to load as module</title>
<updated>2024-06-26T20:38:41+00:00</updated>
<author>
<name>John Estabrook</name>
<email>jestabro@vyos.io</email>
</author>
<published>2024-06-20T01:16:05+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=26740a8d583f64dc0a27b59dd4ae303056972c0b'/>
<id>urn:sha1:26740a8d583f64dc0a27b59dd4ae303056972c0b</id>
<content type='text'>
</content>
</entry>
<entry>
<title>firewall: T3900: fix migration and smoketests</title>
<updated>2024-06-11T07:51:15+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2024-06-11T07:49:11+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=2cbc4eb005fc936e37a34a1ef539d164f21f90b5'/>
<id>urn:sha1:2cbc4eb005fc936e37a34a1ef539d164f21f90b5</id>
<content type='text'>
Commit 770edf016838523 ("T3900: T6394: extend functionalities in firewall")
changed the position in the CLI for conntrack timeout. This lead to failing
smoketests because of a regression in the migrator.
</content>
</entry>
<entry>
<title>T3900: T6394: extend functionalities in firewall; move netfilter sysctl timeout parameters defined in conntrack to firewall global-opton section.</title>
<updated>2024-06-04T13:22:24+00:00</updated>
<author>
<name>Nicolas Fort</name>
<email>nicolasfort1988@gmail.com</email>
</author>
<published>2024-05-24T16:44:41+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=770edf016838523c248e3c8a36c5f327a0b98415'/>
<id>urn:sha1:770edf016838523c248e3c8a36c5f327a0b98415</id>
<content type='text'>
</content>
</entry>
<entry>
<title>T5535: firewall: migrate command &lt;set system ip disable-directed-broadcast&gt; to firewall global-optinos</title>
<updated>2024-04-15T14:15:14+00:00</updated>
<author>
<name>Nicolas Fort</name>
<email>nicolasfort1988@gmail.com</email>
</author>
<published>2024-04-15T14:15:14+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=76dcecafca977b640dd16d8e68c4a050ca1af4fb'/>
<id>urn:sha1:76dcecafca977b640dd16d8e68c4a050ca1af4fb</id>
<content type='text'>
</content>
</entry>
</feed>
