Age | Commit message (Collapse) | Author | |
---|---|---|---|
2023-08-26 | Merge pull request #2163 from sarthurdev/firewall_rpfilter | Christian Breunig | |
firewall: T3509: Add support for IPv6 reverse path filtering | |||
2023-08-25 | Merge pull request #2172 from nicolas-fort/T5502 | Christian Breunig | |
T5502: firewall: add validator for interface matcher | |||
2023-08-25 | T5502: firewall: add validator for interface matcher, and allow only ↵ | Nicolas Fort | |
interface-name or interface-group | |||
2023-08-25 | Merge pull request #2169 from sarthurdev/current | Christian Breunig | |
github: Add PR labels to easily identify base branches | |||
2023-08-25 | Merge pull request #2171 from sarthurdev/T5463_fix | Christian Breunig | |
container: T5463: Fixes indentation to publish all port nodes | |||
2023-08-25 | firewall: T5160: Remove unused zone template | sarthurdev | |
2023-08-25 | interface: T3509: Add per-interface IPv6 source validation | sarthurdev | |
2023-08-25 | firewall: T3509: Add support for IPv6 return path filtering | sarthurdev | |
2023-08-25 | container: T5463: Fix iteration to publish all port nodes | sarthurdev | |
2023-08-25 | github: Add PR labels to easily identify base branches | sarthurdev | |
2023-08-24 | Merge pull request #2164 from jestabro/save-config | John Estabrook | |
save-config: T4292: rewrite vyatta-save-config.pl to Python | |||
2023-08-24 | Merge pull request #2165 from sever-sever/T5506 | Christian Breunig | |
T5506: Add link-local IPv6 address for container interfaces | |||
2023-08-24 | T5506: Add link-local IPv6 address for container interfaces | Viacheslav Hletenko | |
Fix for add IPv6 link-local address for container interfaces set container network NET01 prefix '10.0.0.0/24' set container network NET01 prefix '2001:db8:2222::/64' % ip -6 addr show scope link dev pod-NET01 17: pod-NET01: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000 inet6 fe80::d89c:dfff:fe1a:8689/64 scope link | |||
2023-08-24 | smoketest: T5447: wpa_supplicant is only run if required | Christian Breunig | |
2023-08-24 | system: T5505: fix zebra route-map is not removed from FRR | Christian Breunig | |
Configuring "set system ip protocol ospf|bgp route-map foo" and commit it installs the route-map into FRR. Removing the CLI configuration "delete system ip protocol" does not remove the route-map from FRR - it stays active. This commit adds the fix and appropriate smoketests extenstion. | |||
2023-08-23 | save-config: T4292: rewrite vyatta-save-config.pl to Python | John Estabrook | |
2023-08-23 | Merge pull request #2139 from dmbaturin/T5449-mss-probing | Christian Breunig | |
system-ip: T5449: add TCP MSS probing options | |||
2023-08-23 | Merge pull request #2159 from c-po/t5491-wifi | Christian Breunig | |
wifi: T5491: allow white-/blacklisting station MAC addresses for security | |||
2023-08-23 | Merge pull request #2160 from sever-sever/T5448 | Christian Breunig | |
T5448: Add configuration host-name for zabbix-agent | |||
2023-08-23 | Merge pull request #2162 from nicolas-fort/T5472 | Christian Breunig | |
T5472: nat redirect: allow redirection without defining redirected port | |||
2023-08-23 | Merge pull request #2161 from sever-sever/T5463 | Christian Breunig | |
T5463: Container allow publish listen-addresses | |||
2023-08-23 | bgp: T3759: add l3vpn "import vrf default" completion helper | Christian Breunig | |
2023-08-23 | vrf: T5428: stop DHCP processes on VRf removal | Christian Breunig | |
This is a workaround for the priority inversion from T5492 ("CLI node priority is not inversed on node deletion"). As this is a corner case bug that's only triggered if an interface is removed from a VRF and also the VRF is removed in one commit, priorities are not honored. Thus we implement this workaround which stop the DHCP(v6) client processes on the VRF associated interfaces to get out the DHCP RELEASE message before interfaces are shut down. | |||
2023-08-23 | vrf: T5428: move helpers to common vyos.utils.network module | Christian Breunig | |
Helper functions can and will be re-use din different code places. | |||
2023-08-23 | Merge pull request #2142 from nicolas-fort/T5450 | Christian Breunig | |
T5450: allow inverted matcher for interface and interface-group | |||
2023-08-23 | T5472: nat redirect: allow redirection without defining redirected port | Nicolas Fort | |
2023-08-23 | T5463: Container allow publish listen-addresses | Viacheslav Hletenko | |
Ability to publish multiple IP/IPv6 addresses for container set container name c1 port web destination '80' set container name c1 port web listen-address '192.0.2.1' set container name c1 port web listen-address '2001:db8:1111::1' set container name c1 port web source '8080' --publish 192.0.2.1:8080:80/tcp --publish [2001:db8:1111::1]:8080:80/tcp | |||
2023-08-23 | T5450: update smoketest and interface definition in order to work with new ↵ | Nicolas Fort | |
firewall cli | |||
2023-08-23 | T5448: Add configuration host-name for zabbix-agent | Viacheslav Hletenko | |
Ability to configure host-name for zabbix-agent set service monitoring zabbix-agent host-name 'r-vyos' | |||
2023-08-23 | Merge pull request #2156 from giga1699/T5447 | Christian Breunig | |
T5447: Initial support for MACsec static keys | |||
2023-08-22 | Merge pull request #2149 from nicolas-fort/T5478 | Viacheslav Hletenko | |
T5478: remove config-trap configuration parser in firewall | |||
2023-08-20 | T5447: Adjust to positive logic in generare() | Giga Murphy | |
2023-08-20 | T5447: Remove redundant self.set_admin_state | Giga Murphy | |
2023-08-20 | T5447: Update copyright years | Giga Murphy | |
2023-08-20 | T5447: Corrected comment in _create header | Giga Murphy | |
2023-08-20 | T5447: Corrected comment for interface down | Giga Murphy | |
2023-08-20 | T5447: Implement maintainer feedback | Giga Murphy | |
2023-08-20 | netplug: T5491: invoke DHCP helpers also on wifi interfaces | Christian Breunig | |
2023-08-20 | wifi: T5491: import cleanup | Christian Breunig | |
2023-08-20 | wifi: T5491: allow white-/blacklisting station MAC addresses for security | Christian Breunig | |
Station MAC address-based authentication means: * 'allow' accept all clients except the one on the deny list * 'deny' accept only clients listed on the accept list New CLI commands: * set interfaces wireless wlan0 security station-address mode <accept|deny> * set interfaces wireless wlan0 security station-address accept mac <mac> * set interfaces wireless wlan0 security station-address deny mac <mac> | |||
2023-08-19 | wifi: T5470: improve error message | Christian Breunig | |
2023-08-19 | bgp: T5466: rename type on CLI per-nexhop -> per-nexthop for l3vpn MPLS labels | Christian Breunig | |
This fixes a CLI typo added in commit 77ef9f800 ("T5466: L3VPN label allocation mode"). | |||
2023-08-18 | T5447: Add verification of peer rx-key length | Giga Murphy | |
2023-08-18 | T5447: Add smoketest for MACsec static keys | Giga Murphy | |
2023-08-18 | smoketest: bgp: T5466: remove trailing whitespace | Christian Breunig | |
Commit 77ef9f800 ("T5466: L3VPN label allocation mode") added support for a new CLI node that is added "label vpn export allocation-mode per-nexthop" to FRRs running configuration. Unfortunately the smoketest contained a trailing whitespace and the above mentioned line could not be evaluated to true. | |||
2023-08-18 | login: T5490: allow . (dot) in user home-directory path | Christian Breunig | |
his extends commit b9655365b ("login: T5490: add stricter validation for home-directory path") by adding a dot to the REGEX allow list. This was previously allowed and covered in out smoketests which failed. | |||
2023-08-18 | T5447: MACsec static tx-key validation | Giga Murphy | |
2023-08-18 | T5447: Initial support for MACsec static keys | Giga Murphy | |
2023-08-17 | Merge pull request #2130 from aapostoliuk/T5409-sagitta | Christian Breunig | |
wireguard: T5409: Added 'set interfaces wireguard wgX threaded' | |||
2023-08-17 | wireless: T5409: add per-client-thread CLI option | Christian Breunig | |
Provides a per-device control to enable/disable the threaded mode for all the napi instances of the given network device, without the need for a device up/down. |