Age | Commit message (Collapse) | Author | |
---|---|---|---|
2023-09-15 | firewall: T4502: fix syntax error unexpected '}' | Christian Breunig | |
2023-09-15 | smoketests: drop nopool/net30 from testcases | Christian Breunig | |
After commit 0ccbbca01b ("openvpn: T3214: specify nopool on --server line only if needed") that removed the net30 option and nopool smoketests needed a fix. | |||
2023-09-14 | Merge pull request #2268 from nicolas-fort/T5579 | Christian Breunig | |
T5579: show log firewall - Fix and extend command | |||
2023-09-14 | T5579: show log firewall - Fix command in order to fit new firewall cli ↵ | Nicolas Fort | |
structure; extend command options so it can be used on every layer ; use journalctl to get the logs | |||
2023-09-14 | Merge pull request #2242 from nicolas-fort/T4072-op-mode | Christian Breunig | |
T4072: Firewall op-mode command: add bridge capabilities | |||
2023-09-14 | Merge pull request #2253 from nicolas-fort/T5561 | Christian Breunig | |
T5561: nat: inbound|outbound interface should not be mandatory | |||
2023-09-14 | Merge pull request #2255 from Apachez-/T5575 | Christian Breunig | |
T5575: ARP/NDP table-size isnt set properly | |||
2023-09-14 | Merge pull request #2262 from dmbaturin/T5582-ntp-force | Christian Breunig | |
op mode: T5582: Add 'force ntp synchronization' | |||
2023-09-14 | T5582: make "force ntp synchronisation" command VRF aware | Christian Breunig | |
2023-09-14 | Merge pull request #1637 from ordex/T3214 | Daniil Baturin | |
openvpn: T3214: fix server-ipv6 and nopool handling | |||
2023-09-14 | Merge pull request #2062 from vfreex/simple-fastpath-support | Viacheslav Hletenko | |
T4502: firewall: Add software flow offload using flowtable | |||
2023-09-14 | Merge pull request #2264 from Apachez-/T2044 | Christian Breunig | |
T2044: RPKI doesn't boot properly | |||
2023-09-14 | T2044: RPKI doesn't boot properly | Apachez | |
2023-09-13 | T5575: ARP/NDP table-size isnt set properly | Apachez | |
2023-09-13 | op mode: T5582: Add 'force ntp synchronization' | Daniil Baturin | |
2023-09-13 | Merge pull request #2260 from jestabro/legacy-tech-support | Christian Breunig | |
T671: do not preserve old tech-support report implementation | |||
2023-09-13 | T671: do not preserve old tech-support report implementation | John Estabrook | |
2023-09-13 | Merge pull request #2252 from sever-sever/T5576 | Christian Breunig | |
T5576: Add BGP remove-private-as all option | |||
2023-09-13 | Merge pull request #2257 from c-po/t5581-ip-nht | Christian Breunig | |
op-mode: T5581: add "show ip nht" command (IPv4 nexthop tracking table) | |||
2023-09-13 | op-mode: T5581: add "show ip nht" command (IPv4 nexthop tracking table) | Christian Breunig | |
vyos@vyos:~$ show ip nht 172.18.254.202 resolved via ospf via 172.18.201.254, eth0.201 (vrf default), weight 1 Client list: bgp(fd 28) | |||
2023-09-13 | T5575: ARP/NDP table-size isnt set properly | Apachez | |
2023-09-13 | Merge pull request #2245 from c-po/t5239-frr | Christian Breunig | |
frr: T5239: fix process startup order | |||
2023-09-13 | T5561: nat: defining inbound|outbound interface should not be mandatory ↵ | Nicolas Fort | |
while configuring dNAT|sNAT rule | |||
2023-09-13 | T5576: Add BGP remove-private-as all option | Viacheslav Hletenko | |
Add the ability to use the option all for remove-private-as. Remove private ASNs in outbound updates. all - Apply to all AS numbers set protocols bgp neighbor <tag> address-family ipv4-unicast remove-private-as all | |||
2023-09-12 | Merge pull request #2249 from sever-sever/T4309 | Christian Breunig | |
T4309: Conntrack ignore fix to handle interface any | |||
2023-09-12 | T4309: Conntrack ignore fix to handle interface any | Viacheslav Hletenko | |
Interface 'any' not expected in nft rules, it means that option iifname shouldn't exist at all set system conntrack ignore ipv4 rule 10 inbound-interface 'any' table ip raw { chain VYOS_CT_IGNORE { iifname "any" counter packets 0 bytes 0 notrack comment "ignore-10" return } } Fix it | |||
2023-09-12 | frr: T5239: T2061: prevent writing logs to /var/log/frr/frr.log | Christian Breunig | |
2023-09-11 | frr: T5239: fix process startup order | Christian Breunig | |
- Reuse existing utility functions to check if a boot is ongoing (boot_configuration_complete()) - Run system_frr.py script to configure FRR daemon before initial launch - Add safety net to always have FRR running on the system This does yet not solve the error in T5239 but it's a small step towards the solution. | |||
2023-09-11 | GitHub: fix workflow folder for MergifyIo | Christian Breunig | |
2023-09-11 | GitHub: add MergifyIo action | Christian Breunig | |
2023-09-11 | T4072: Firewall op-mode command: add bridge capabilities | Nicolas Fort | |
2023-09-11 | init: remove dependency on frr.service - required for router shutdown | Christian Breunig | |
2023-09-11 | T5241: Revert change to vyos.utils.process.cmd | Christian Breunig | |
2023-09-11 | Merge pull request #2238 from sarthurdev/current | Christian Breunig | |
vxlan: T3700: Revert change to `vyos.utils.process.cmd` | |||
2023-09-10 | vxlan: T3700: Revert change to `vyos.utils.process.cmd` | sarthurdev | |
2023-09-10 | Merge pull request #2236 from vfreex/fix-nat-problem-with-vrf | Christian Breunig | |
T3655: Fix NAT problem with VRF | |||
2023-09-11 | T3655: Fix NAT problem with VRF | Yuxiang Zhu | |
Linux netfilter patch https://patchwork.ozlabs.org/project/netfilter-devel/patch/d0f84a97f9c86bec4d537536a26d0150873e640d.1439559328.git.daniel@iogearbox.net/ adds direction support for conntrack zones, which makes it possible to do NAT with conflicting IP address/port tuples from multiple, isolated tenants on a host. According to the description of the kernel patch: > ... overlapping tuples can be made unique with the zone identifier in original direction, where the NAT engine will then allocate a unique tuple in the commonly shared default zone for the reply direction. I did some basic tests in my lab and it worked fine to forward packets from eth0 to pppoe0. - eth0 192.168.1.1/24 in VRF red - pppoe0 dynamic public IP from ISP VRF default - set vrf name red protocols static route 0.0.0.0/0 interface pppoe0 vrf 'default' - set protocols static route 192.168.1.0/24 interface eth0 vrf 'red' `conntrack -L` shows something like: ``` tcp 6 113 ESTABLISHED src=192.168.1.2 dst=1.1.1.1 sport=58946 dport=80 zone-orig=250 packets=6 bytes=391 src=1.1.1.1 dst=<my-public-ip> sport=80 dport=58946 packets=4 bytes=602 [ASSURED] mark=0 helper=tns use=1 ``` It would be much appreciated if someone could test this with more complex VRF setup. | |||
2023-09-10 | Debian: bump package version to 1.5dev0 | Christian Breunig | |
2023-09-10 | Merge pull request #2232 from alainlamar/T5567 | Christian Breunig | |
T5567: Increase allowed range for maximum-object-size to 1GB for webproxy | |||
2023-09-10 | Merge pull request #2235 from sever-sever/T5564 | Christian Breunig | |
T5564: Fix show firewall group and show firewall summary | |||
2023-09-10 | T5564: Fix show firewall group and show firewall summary | Viacheslav Hletenko | |
The `rule` key could be not exists in the entry of the dictionary for examppe `{'default_action': 'drop'}` Fix it | |||
2023-09-10 | Merge pull request #2234 from sever-sever/T4309 | Viacheslav Hletenko | |
T4309: Fix conntrack teamplate group | |||
2023-09-10 | T4309: Fix conntrack teamplate group | Viacheslav Hletenko | |
2023-09-10 | Merge pull request #2233 from vfreex/fix-mld-smoketests | Christian Breunig | |
T5518: pim6: Fix smoketests | |||
2023-09-10 | T5518: pim6: Fix smoketests | Yuxiang Zhu | |
2023-09-09 | T5567: Increase allowed range for maximum-object-size to 1000000 KB for the ↵ | Alain Lamar | |
webproxy service | |||
2023-09-09 | Merge pull request #2179 from vfreex/add-mld | Christian Breunig | |
T5518: Add basic MLD support | |||
2023-09-09 | Merge pull request #2230 from sever-sever/T5562 | Christian Breunig | |
T5562: Cleanup netns for smoketest load-balancing wan | |||
2023-09-09 | T5562: Cleanup netns for smoketest load-balancing wan | Viacheslav Hletenko | |
Cleanup nets for the smoketest load-balancing Remove deleting container interfaces from default netns as those interfaces leave inly in netns. | |||
2023-09-09 | T4754: Fix path for popen moved to utils process | Viacheslav Hletenko | |