Age | Commit message (Collapse) | Author |
|
Commit dd5908eac ("T6539: add logging options to load-balancer reverse-proxy")
added CLI commands to add custom log entries for frontend and backend servers
as well as a global log directive.
Remove explicit test code for no longer always present "global log" directive.
(cherry picked from commit b71481f7de93d43ff7208ff76cbc6b829b8951b2)
|
|
console: T3334: remove unused directories imported from vyos.defaults (backport #3923)
|
|
This command helps to generate users `.ovpn` files
Rewrite `generate openvpn client-config` to use Config()
It needs to get the default values as `ConfigTreeQuery` is
not supporting default values.
Fixed "ignores configured protocol type" if TCP is used
Fixed lzo, was used even if lzo not configured
Fixed encryption is not parse the dict
(cherry picked from commit fe50f1a9292b34e168b35453f2cfc2aee2ca4843)
Co-authored-by: Viacheslav Hletenko <v.gletenko@vyos.io>
|
|
T6617: T6618: vpn ipsec remote-access: fix profile generators (backport #3903)
|
|
vrf: T6603: conntrack ct_iface_map must only contain one entry for iifname/oifname (backport #3883)
|
|
(cherry picked from commit 4055090a8d4fd64288eab7ae41aa9440f5de4ece)
|
|
(cherry picked from commit e97d86e619e134f4dfda06efb7df4a3296d17b95)
|
|
smoketest: T6592: remove unused "import os" (backport #3874)
|
|
ipsec: T6148: Removed unused imports (backport #3915)
|
|
T6313: Add "NAT" to "generate" command for rule resequence (backport #3715)
|
|
Removed unused pprint module
(cherry picked from commit cb1834742f4ed01d99d6396af8339dd59788ef65)
|
|
(#3909)
Strongswan does not initiate session after termination via vici.
Added an CHILD SAs initialization on the initiator side
of the tunnel.
(cherry picked from commit 8838b29180ccc26d2aca0c22c9c8ca5e274825b2)
Co-authored-by: aapostoliuk <108394744+aapostoliuk@users.noreply.github.com>
|
|
system: op-mode: T3334: allow delayed getty restart when configuring serial ports (backport #3698)
|
|
T6539: add logging options to load-balancer reverse-proxy (backport #3753)
|
|
(cherry picked from commit 4717139174a869141a71cd28d10018e0cfcaece0)
|
|
(cherry picked from commit dd5908eac390294ea178953fc0e6821d803d62f6)
|
|
Make it more obvious for the user aber the severity of his action.
(cherry picked from commit b3b31153963cc4338e8229f9f94b339682dd73a0)
|
|
ports
* Created op-mode command "restart serial console"
* Relocated service control to vyos.utils.serial helpers, used by conf- and
op-mode serial console handling
* Checking for logged-in serial sessions that may be affected by getty reconfig
* Warning the user when changes are committed and serial sessions are active,
otherwise restart services as normal. No prompts issued during commit,
all config gen/commit steps still occur except for the service restarts
(everything remains consistent)
* To apply committed changes, user will need to run "restart serial console"
to complete the process or reboot the whole router
* Added additional flags and target filtering for generic use of helpers.
(cherry picked from commit bc9049ebd76576d727fa87b10b96d1616950237c)
|
|
(cherry picked from commit 142545b0535d0a994182389c99b7bcd6d7c37c24)
|
|
(cherry picked from commit 31acb42ecdf4ecf0f636f831f42a845b8a00d367)
|
|
iifname/oifname
When any of the following features NAT, NAT66 or Firewall is enabled, for every
VRF on the CLI we install one rule into nftables for conntrack:
chain vrf_zones_ct_in {
type filter hook prerouting priority raw; policy accept;
counter packets 3113 bytes 32227 ct original zone set iifname map @ct_iface_map
counter packets 8550 bytes 80739 ct original zone set iifname map @ct_iface_map
counter packets 5644 bytes 67697 ct original zone set iifname map @ct_iface_map
}
This is superfluous.
(cherry picked from commit d6e9824f1612bd8c876437c071f31a1a0f44af5d)
|
|
smoketest: T5705: use locally connected remote syslog servers (backport #3889)
|
|
smoketest: T6614: initial support for op-mode command testing (backport #3888)
|
|
system_option: T5552: Apply IPv4 and IPv6 options after reapplying sysctls by TuneD (backport #3853)
|
|
(#3878)
(cherry picked from commit 645f24908c9b338adc56ecc83f8c44d0b0206550)
Co-authored-by: John Estabrook <jestabro@vyos.io>
|
|
(cherry picked from commit 33156c675f1bce0d2b3b1836a7d85abe25cd7f61)
|
|
Debian: T6598: depend on podman version >=4.9.5 (backport #3873)
|
|
As there has been no route to the configured syslog servers, smoketests produced:
rsyslogd: omfwd: socket 8: error 101 sending via udp: Network is unreachable
Rather use some fake syslog servers from 127.0.0.0/8 which are directly
connected and we do not need to look up a route, which will suppress the above
error message.
(cherry picked from commit 744ecfe60ed3633775feeb3da767a88709fd626c)
|
|
(cherry picked from commit b9daaaa38abc08d27158ea44e016752b3cb45400)
|
|
vxlan: T6505: Support VXLAN VLAN-VNI range mapping in CLI (backport #3756)
|
|
(cherry picked from commit 115e99630a317cab62c6f99e0461f6ce2c1edaf3)
|
|
smoketest: T6425: fix wireless smoketest CLI from invalid backport
|
|
interface: T6592: remove interface from conntrack ct_iface_map on deletion (backport #3857)
|
|
New CLI syntax got backported via commit 6fb600f3c ("wireless: T6320: add
802.11ax at 6GHz")
Revert back to the stable CLI syntax in the 1.4 (sagitta) release.
|
|
deletion
Now that interfaces are deleted from ct_iface_map during deletion it's time to
also add a smoketest ensuring there is no entry in the ct_iface_map once an
interface was deleted from the CLI.
(cherry picked from commit 1c42ee9d16dd49fff2cbde652bf24a38f364526c)
|
|
We always have had stale interface entries in the ct_iface_map of nftables/
conntrack for any interface that once belonged to a VRF.
This commit will always clean the nftables interface map when the interface
is deleted from the system.
(cherry picked from commit 17c12bde5c6f314311e7524842fd1ddc254009b4)
|
|
T6599: ipsec: support disabling rekey of CHILD_SA, converge and fix defaults (backport #3841)
|
|
by TuneD
(cherry picked from commit 7b82e4005724683c6311fab22358746f2cca4c1b)
|
|
T6594: Add missed pppd_compat module (backport #3832)
|
|
smoketest: T6600: ospf: enable MPLS LDP on dummy interfaces (backport #3838)
|
|
op_mode: T6593: Release DHCP interface does not work (backport #3861)
|
|
vrf: T6602: verify supplied VRF name on all interface types (backport #3856)
|
|
Only some (e.g. ethernet or wireguard) interfaces validate if the supplied VRF
actually exists. If this is not validated, one can pass an invalid VRF to the
system which generates an OSError exception.
To reproduce
set interfaces vxlan vxlan1 vni 1000
set interfaces vxlan vxlan1 remote 1.2.3.4
set interfaces vxlan vxlan1 vrf smoketest
results in
OSError: [Errno 255] failed to run command: ip link set dev vxlan1 master smoketest_mgmt
This commit adds the missing verify_vrf() call to the missing interface types
and an appropriate smoketest for all interfaces supporting VRF assignment.
(cherry picked from commit dd0ebffa33728e452ac6e11737c2283f0e390359)
|
|
wireless: T6597: improve hostapd startup and corresponding smoketests (backport #3833)
|
|
(cherry picked from commit 92461c35c7ef131940c885aca894a2d8b3c89592)
|
|
(cherry picked from commit 71926f64385d7ab66431c60afa1fc8554ad7e2dc)
|
|
This was found during smoketesting as thoase started to repeadingly fail in the last weeks
File "/usr/libexec/vyos/tests/smoke/cli/test_interfaces_wireless.py", line 534, in test_wireless_security_station_address
self.assertTrue(process_named_running('hostapd'))
AssertionError: None is not true
Digging into this revealed that this is NOT related to the smoketest coding but
to hostapd/systemd instead. With a configured WIFI interface and calling:
"sudo systemctl reload-or-restart hostapd@wlan1" multiple times in a short
period caused systemd to report:
"Jul 18 16:15:32 systemd[1]: hostapd@wlan1.service: Deactivated successfully."
According to the internal systemd logic used in our version this is explained by:
/* If there's a stop job queued before we enter the DEAD state, we shouldn't act on Restart=, in order to not
* undo what has already been enqueued. */
if (unit_stop_pending(UNIT(s)))
allow_restart = false;
if (s->result == SERVICE_SUCCESS)
s->result = f;
if (s->result == SERVICE_SUCCESS) {
unit_log_success(UNIT(s));
end_state = SERVICE_DEAD;`
Where unit_log_success() generates the log message in question.
Improve the restart login in the wireless interface script and an upgrade to
hostapd solved the issue.
(cherry picked from commit a67f49d99eda00998c425f9a663e138dbd0f7755)
|
|
(cherry picked from commit 8bf6687b5276589e64988c3c54dbf61a628ee2a0)
|
|
(cherry picked from commit f6485f7df8713298d81ec0d45c548417db111523)
|
|
(cherry picked from commit 11b273108d78ab1588be3c077f40b2ac876369a4)
|