summaryrefslogtreecommitdiff
path: root/python
AgeCommit message (Collapse)Author
2025-06-26build: T7578: fail the package build if there are non-unique op mode nodesDaniil Baturin
to ensure that the JSON cache is usable for command lookup
2025-06-24Merge pull request #4562 from jestabro/op-mode-dataDaniil Baturin
T7561: simplify op-mode-definitions XML cache generation
2025-06-24Merge pull request #4573 from c-po/pki-T7574Daniil Baturin
pki: T7574: add optional force argument to renew certbot-issued certificates
2025-06-23pki: T7574: add optional force argument to renew certbot-issued certificatesChristian Breunig
Certbot renewal command in op-mode "renew certbot" only works if any of the certificates is up for renewal. There is no CLI option to forcefully renew a certificate. This is about adding a force option to the CLI and with this addition move the entire certbot renew handling to new-style op-mode commands. vyos@vyos:~$ renew certbot force - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Processing /config/auth/letsencrypt/renewal/vyos.conf - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Renewing an existing certificate for vyos.io - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Congratulations, all renewals succeeded: /config/auth/letsencrypt/live/vyos/fullchain.pem (success) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Hook 'post-hook' ran with output: Updating certificates in /etc/ssl/certs... 0 added, 0 removed; done. Running hooks in /etc/ca-certificates/update.d... done.
2025-06-23T7355: periodical cleanup of unused Python3 import statementsChristian Breunig
2025-06-21T7561: generate json if no ambiguous paths in (a subset of) XML filesJohn Estabrook
2025-06-20T7561: add option --check-path-ambiguity to show duplicate pathsJohn Estabrook
2025-06-20T7561: refine xml consistency report to ignore children and file fieldsJohn Estabrook
2025-06-20T7561: minimize risk of collision with possible node namesJohn Estabrook
2025-06-20T7561: simplify op-mode-definitions XML cache and add interface methodsJohn Estabrook
The original implementation of the op-mode XML cache generation resulted in a structure that was difficult to use, for example, in documentation generation. The source of complication is that, unlike the XML of interface-definitions, path names are not unique: the same path may occur as both a regular node and as a tag node. Here we simplify the underlying structure by enriching path names with type information, thus disambiguating paths. An interface to the cache is provided by explicit generator and lookup functions.
2025-06-19Merge pull request #4564 from factor2431/fix-wireguard-fwmarkChristian Breunig
T7554: fix wireguard fwmark parsing
2025-06-19Merge pull request #4558 from natali-rs1985/T6951Daniil Baturin
firewall: T6951: Add a configuration command for ethertypes that bridge firewalls should always accept
2025-06-18T7554: fix wireguard fwmark parsingfactor2431
2025-06-17firewall: T6951: Add a configuration command for ethertypes that bridge ↵Nataliia Solomko
firewalls should always accept
2025-06-12Merge pull request #4552 from jestabro/reset-sectionViacheslav Hletenko
T7488: add utility for automatic rollback of section on apply stage error
2025-06-12Merge pull request #4497 from yzguy/T7432Daniil Baturin
T7432: RPKI VRF Support
2025-06-10T7488: add utility for automatic rollback of section on apply stage errJohn Estabrook
2025-06-09T7365: add env var used by post-commit scriptsJohn Estabrook
2025-06-09T7365: call commit hooks in vyconf sessionJohn Estabrook
2025-06-04Merge pull request #4533 from jestabro/api-commit-confirmViacheslav Hletenko
http-api: T3955: add commit-confirm to endpoints /configure /config-file
2025-05-30config-mgmt: T7508: use recursive defaults to read commit-confirm actionJohn Estabrook
2025-05-29http-api: T3955: add commit-confirm to endpoints /configure /config-fileJohn Estabrook
2025-05-29Merge pull request #4266 from takehaya/T6013-trusted-ca-keysChristian Breunig
T6013: Add support for AuthorizedPrincipalsFile to trusted_user_ca_key
2025-05-29Merge pull request #4531 from jestabro/commit-confirm-rebootChristian Breunig
config-mgmt: T7500: fix typo preventing commit-confirm hard rollback
2025-05-29Merge pull request #4530 from jestabro/api-extend-load-mergeChristian Breunig
http-api: T7498: allow passing config string in body of 'load' or 'merge' request
2025-05-29ssh: T6013: rename trusted-user-ca-key -> truster-user-caChristian Breunig
The current implementation for SSH CA based authentication uses "set service ssh trusted-user-ca-key ca-certificate <foo>" to define an X.509 certificate from "set pki ca <foo> ..." - fun fact, native OpenSSH does not support X.509 certificates and only runs with OpenSSH ssh-keygen generated RSA or EC keys. This commit changes the bahavior to support antive certificates generated using ssh-keygen and loaded to our PKI tree. As the previous implementation did not work at all, no migrations cript is used.
2025-05-28config-mgmt: T7500: fix typo preventing commit-confirm hard rollbackJohn Estabrook
2025-05-28http-api: T7498: allow passing config string in body of 'merge' requestJohn Estabrook
2025-05-28T7395: Add support for renew in REST ServerIDerr
2025-05-27T7432: RPKI VRF SupportAdam Smith
2025-05-27Merge pull request #4524 from sarthurdev/T7350Daniil Baturin
flowtable: T7350: Prevent interface deletion if referenced on flowtable
2025-05-27Merge pull request #4496 from l0crian1/add-root-bpdu-guardDaniil Baturin
Bridge: T7430: Add BPDU Guard and Root Guard support
2025-05-22T7363: retain generated files as imports for nosetestsJohn Estabrook
2025-05-22T7365: add POSIX-type lock to vyconf_session.commit for compatibilityJohn Estabrook
We maintain compatibility with the legacy commit lock file until all other references are resolved; this requires a POSIX-type lock instead of the BSD-type lock of vyos.utils.locking.
2025-05-22T7365: normalize formattingJohn Estabrook
2025-05-22T7363: populate ConfigSourceVyconfSession methodsJohn Estabrook
2025-05-22T7363: add initialization of Config from VyconfSessionJohn Estabrook
2025-05-22T7121: add missing default version string on init from internal cacheJohn Estabrook
2025-05-22T7363: distinguish config mode from op modeJohn Estabrook
2025-05-22T7352: add util for enabling vyconf backend for smoketestsJohn Estabrook
2025-05-22T7363: add pid aware initializationJohn Estabrook
2025-05-22T7363: use legacy environment variable to indicate config modeJohn Estabrook
In the absence of Cstore, the env var remains as the sole indication of config mode for the legacy CLI, and its emulation here.
2025-05-22T7363: add check for config mode that is independent from CstoreJohn Estabrook
The environment variable _OFR_CONFIGURE is used by bash completion to setup the config mode environment. We check this setting to coordinate vyconf config mode and CLI config mode, independent of the legacy backend Cstore check.
2025-05-21flowtable: T7350: Prevent interface deletion if referenced on flowtablesarthurdev
2025-05-21Merge pull request #4514 from natali-rs1985/T6997Daniil Baturin
ipoe_server: T6997: Do not require to create client ip pool when dhcp-relay is used
2025-05-21ipoe_server: T6997: Do not require to create client ip pool when dhcp-relay ↵Nataliia Solomko
is used
2025-05-20Merge pull request #4499 from sever-sever/T7348Daniil Baturin
T7348: Add config CPU thread-count for accel-ppp services
2025-05-20Merge pull request #4468 from sarthurdev/T5707Daniil Baturin
wireguard: T7387: Optimise wireguard peer handling
2025-05-16T7414: Fix conntrack ignore rules for using several portsViacheslav Hletenko
If we use several port for the `conntrack ignore` there have to be used curly braces for nftables Incorrect format: dport 500,4500 Correct format: dport { 500, 4500 }
2025-05-16T7348: Add config CPU thread-count for accel-ppp servicesViacheslav Hletenko
Accel-ppp services should not use all CPU cores to process requests. At the moment accel-ppp services use all available CPU cores to process requests from the subscribers (establish/update session/etc). During mass connection of sessions, this can lead to the fact that it utilizes all CPU, and for other services like FRR, there is not enough CPU time to process their own stable work. services: - L2TP - SSTP - PPPoE - IPoE - PPtP Add this option configurable and use all cores if not set: ``` set service pppoe-server thread-count < all | half | x > ``` The defaultValue `all`