Age | Commit message (Collapse) | Author |
|
T681: Fix QoS DSCP filter
|
|
Fixed opmode command help strings
|
|
dhcp: T5840: Merge systemd service overrides for kea-ctrl-agent
|
|
Method is not referenced in the code base, remove dead code.
|
|
Extend ConfigTreeQuery().get_config_dict() with arguments to read in default
CLI values, too. This removes the need for hardcoded default values at
multiple places like:
if max_dns_retry is None:
max_dns_retry = 3
in this case.
|
|
|
|
Retrieving the config dict sets key_mangling(), thus we need to look for
host_name instead of host-name.
|
|
WireGuard performs a handshake every WIREGUARD_REKEY_AFTER_TIME if data is
being transmitted between the peers. If no data is transmitted, the handshake
will not be initiated unless new data begins to flow. Each handshake generates
a new session key, and the key is rotated at least every 120 seconds or upon
data transmission after a prolonged silence.
|
|
|
|
|
|
|
|
* set interfaces wireguard wgXX peer YY hostname <fqdn>
|
|
remote: T7048: merge git environment with the os environment
|
|
nhrp: T2326: Fixed network-id migration
|
|
Fixed network-id migration.
Every tunnel should have its own nhrp network-id.
|
|
|
|
|
|
Relocate the kea dhcp op-mode functions to kea helper
functions in vyos.kea. This allows the functions to
be reused by other scripts, not just op-mode wrappers.
This moves the source of truth for the op-mode
commands to the actual running kea instance,
rather than VyOS config path.
Also, apply some minor code cleanup and make some
of the mappings consistent across the functions.
|
|
|
|
Default systemd service for kea-ctrl-agent expects
`/etc/kea/kea-api-password` which is not used in
VyOS.
The systemd unit override to remove the condition
does not need to be in a separate (templated and
dynamic) override file and can be merged into the
existing static override file.
|
|
|
|
|
|
allows utilizing ssh-agent and other environment-variable-based behavior
customizations
|
|
T7038: T7039: fix broken RADIUS IPv6 source address and add smoketests
|
|
kea: T7041: Check lease hostname string is not empty
|
|
nhrp: T2326: NHRP migration to FRR
|
|
The left shift operation aligns the DSCP/TOS value with its bit position in the IP header.
TC expects a DSCP value with this shift
|
|
|
|
T7042: drop use of inspect module in favor of ast for source analysis
|
|
When configuring RADIUS to use IPv6 as connection to the server with an
optional source-address
set system login radius server 2001:db8::4 key '9LMVCtPYpG'
set system login radius source-address '2001:db8::1'
It will error out:
pam_radius_auth(sshd:auth): Failed looking up source IP address [2001:db8::1]
for server [2001:db8::4]:1812 (error=System error)
The source address is not allowed to be in [] - thus the brackets need to be
removed.
|
|
RADIUS is pretty sensible to its configuration. Instead of manual testing,
extend the smoketest platform to ship a freeradius container and perform logins
against a locally running freeradius server in a container.
|
|
This avoids importing the config mode script as a module, with requisite
dependencies, which may be inconvenient.
|
|
Debian: T7023: download smoketest container images only once
|
|
ddclient: T5791: Relocate process params to ExecStart
|
|
NHRP migration to FRR
|
|
Pull up all the global parameters controlling
process behavior to systemd service.
Also remove `syslog=yes`` as it is not needed with
`exec` type service.
|
|
xml: T5738: reuse existing alpha-numeric-hyphen-underscore building block
|
|
|
|
haproxy: T5222: Enable backend completion in service ruleset
|
|
xml: T5738: Reuse predefined regex constraint
|
|
smoketest: T7033: nat source group test should use an existing interface
|
|
|
|
|
|
Enable completion for backend in haproxy service ruleset like so:
```
set load-balancing haproxy service NAME rule 10 set backend
```
|
|
xml: T7029: allow wildcard in include directive
|
|
|
|
When setting up vyos-1x-smoketest package, the required container images will
be fetched from the appropriate registry. During development one will re-install
the vyos-1x generated packages periodically. In the past this triggered a
re-download of the container images for every set-up of the package.
Getting image source signatures
Copying blob sha256:d3a4026919f923f4e0bb9a23a1e5c2d3c5593d31cbac8d2d6d032285b4852945
Copying config sha256:c1f39daffdeffeb97987901406e2ecef0fb2c2ca236fdfaf570d088426294d91
Writing manifest to image destination
Storing signatures
Getting image source signatures
Copying blob sha256:a0d0a0d46f8b52473982a3c466318f479767577551a53ffc9074c9fa7035982e
Copying blob sha256:064e2154c8ec1ddeb114ebc9db9a3876ee8883e9a14fe8622c31cb6f17b759f6
Copying blob sha256:7e3fbb46165bc5a98b12c136087a13992e30fe00ab4fab2bbe6c7edd657d8c5b
Copying blob sha256:80a416511ac029206f3f824a15b1c94845c410242a1e463c466a1b3081f7e20f
Copying blob sha256:339be6688c410f9851f6f09cf0c9d63819f8ca5f2bb09d93ce8c42714842f5ed
Copying config sha256:6950ba3bd4492642b6c6c0c5f5bb88a5f2a48f700974a2bdba74333a65d9324e
Writing manifest to image destination
Storing signatures
This change will download the container images only if the image is not present
on the system.
|
|
vrf: T7024: instance name "up" and "down" are reserved and should not be used
|
|
|
|
T7016: Simplify logic for force deleting dynamic IPv4 address from interface
|