Age | Commit message (Collapse) | Author | |
---|---|---|---|
2022-07-11 | smoketest: bridge: also test QinQ bridge member interfaces | Christian Poessinger | |
2022-07-10 | bond: T4522: add ability to specify mii monitor interval via CLI | Christian Poessinger | |
Linux Kernel supports to specify the MII link monitoring frequency in milliseconds. This determines how often the link state of each slave is inspected for link failures. A value of zero disables MII link monitoring. A value of 100 is a good starting point. The default value is 100. set interfaces bonding bond0 mii-mon-interval <n> | |||
2022-07-10 | smoketest: bond: remove second instance of layer2+3 hash-policy test | Christian Poessinger | |
2022-07-10 | smoketest: bond: add testcase for conflicting bridge member | Christian Poessinger | |
A bond member can not also be used as a member of a bridge interface. | |||
2022-07-10 | smoketest: bond: add testcase for source-interface re-use | Christian Poessinger | |
A bond member is not allowed to also be used as a source interface for e.g. PPPoE or MACsec. | |||
2022-07-09 | ip: T4517: drop forwarding from CLI "system ip ↵ | Christian Poessinger | |
disable-directed-broadcast-forwarding" | |||
2022-07-09 | ip: T4517: add option to enable directed broadcast forwarding | Yuxiang Zhu | |
Directed broadcast is described in rfc1812#section-5.3.5.2 and rfc2644. By default Linux kernel doesn't forward directed broadcast packets unless both of `/proc/sys/net/ipv4/conf/all/bc_forwarding` and `/proc/sys/net/ipv4/conf/$iface/bc_forwarding` are set to 1. | |||
2022-07-07 | smoketest: T4411: Add influxdb node | Viacheslav Hletenko | |
2022-07-07 | smoketest: dns: T4509: use dedicated 6to4 testcase | Christian Poessinger | |
2022-07-07 | smoketest: dns: forwarding: use setUpClass() | Christian Poessinger | |
2022-07-07 | syslog: T4500: Remove max-size from rsyslog leaving rotation to logrotate | sarthurdev | |
After discussion with @zsdc this was decided the better long term fix * Removes hourly logrotate cron in favour of systemd timer override | |||
2022-07-05 | firewall: T2199: Fix migration when `icmpv6 type` is an integer | sarthurdev | |
2022-07-05 | Merge pull request #1389 from sever-sever/T4509 | Christian Poessinger | |
dns: T4509: Add dns64-prefix option | |||
2022-07-05 | dns: T4509: Add dns64-prefix option | Viacheslav Hletenko | |
rfc6147: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers set service dns forwarding dns64-prefix 2001:db8:aabb::/96 | |||
2022-07-04 | Merge pull request #1386 from sarthurdev/geoip_negate | Christian Poessinger | |
firewall: T4299: Add ability to inverse match country-codes | |||
2022-07-04 | firewall: T4299: Add ability to inverse match country codes | sarthurdev | |
2022-07-04 | ntp: T4456: support listening on specified interface | Christian Poessinger | |
When clients only use DHCP for interface addressing we can not bind NTPd to an address - as it will fail if the address changes. This commit adds support to bind ntpd to a given interface in addition to a given address. set system ntp interface <name> | |||
2022-07-04 | smoketest: bridge: T4498: add IGMP testcase | Christian Poessinger | |
2022-07-04 | Merge pull request #1385 from sarthurdev/ovpn-test-pki | Christian Poessinger | |
smoketest: T4485: Add CRL for configtest, add script for configtest PKI objects | |||
2022-07-01 | smoketest: T4485: Move smoketest PKI generation to vyos-1x | sarthurdev | |
Allows easy creation of test PKI objects using `vyos.pki` module Generates objects for PKI migration tests | |||
2022-07-01 | smoketest: T2455: add interface smoketests | Christian Poessinger | |
2022-07-01 | openvpn: T4485: Add CRL to OpenVPN config test | sarthurdev | |
2022-07-01 | Merge pull request #1380 from sarthurdev/ovpn-multi-ca | Christian Poessinger | |
openvpn: T4485: Accept multiple tls ca-certificate values | |||
2022-06-29 | router-advert: T4477: support RDNSS lifetime option | Christian Poessinger | |
set service router-advert interface eth0 name-server-lifetime <value> | |||
2022-06-29 | openvpn: T4485: Update PKI migrator to handle full CA chain migration | sarthurdev | |
* Also determines and maps to correct CA for migrated CRL | |||
2022-06-22 | Policy: T4475: add support for matching ipv6 addresses on peer option in ↵ | Nicolas Fort | |
route-map | |||
2022-06-16 | smoketest: policy: T4467: validate relative route-map metric | Christian Poessinger | |
2022-06-14 | firewall: T970: Use set prefix to domain groups | sarthurdev | |
2022-06-14 | firewall: T4147: Use named sets for firewall groups | sarthurdev | |
* Refactor nftables clean-up code * Adds policy route test for using firewall groups | |||
2022-06-10 | Merge pull request #1356 from sarthurdev/nested_groups | Christian Poessinger | |
firewall: T478: Add support for nesting groups | |||
2022-06-10 | firewall: T478: Add support for nesting groups | sarthurdev | |
2022-06-10 | Firewall:T4458: Add ttl match option in firewall | Nicolas Fort | |
2022-06-10 | Merge pull request #1322 from nicolas-fort/T3907-fwall-log | Daniil Baturin | |
Firewall: T3907: add log-level options in firewall | |||
2022-06-10 | smoketest: T970: Add commit after static-host-mapping | Viacheslav Hletenko | |
Staic-host-mapping 'example.com' should be exists before we configure firewall domain-group FOO address example.com | |||
2022-06-09 | smoketest: sstp: T4444: verify port can be changed | Christian Poessinger | |
2022-06-09 | Merge pull request #1327 from sever-sever/T970 | Christian Poessinger | |
firewall: T970: Add firewall group domain-group | |||
2022-06-05 | T4387: add more firewall checks for WLB smoketests. | Nicolas Fort | |
2022-06-05 | Merge pull request #1346 from sever-sever/T4387-curr | Viacheslav Hletenko | |
smoketest: T4387: Add test for load-balancing wan | |||
2022-06-04 | Policy: T3976-T4449-nexthop: add - match ipv6 nexthop type - as available ↵ | Nicolas Fort | |
for ipv4 | |||
2022-06-02 | smoketest: T4387: Add test for load-balancing wan | Viacheslav Hletenko | |
Create 2 network namespaces which allow us to emulate 2 ISP with different static addresses Check routing table 201 for the first ISP and table 202 for the second ISP. Each table must contain default route (cherry picked from commit 6b75cbb0575ca95806e969f5d7f219c0cbeea334) | |||
2022-05-31 | Merge pull request #1344 from sarthurdev/pki_update | Christian Poessinger | |
pki: T3642: Update conf scripts using changed PKI objects | |||
2022-05-31 | pki: T3642: Update conf scripts using changed PKI objects | sarthurdev | |
2022-05-31 | smoketest: policy: T3976: add migratable config snippet | Christian Poessinger | |
2022-05-31 | IPv6: T3976: add prefix-list and access-list option from ipv6 route-map | fett0 | |
2022-05-29 | Policy: T4450: Expand options for ip|ipv6 address match. Now support ↵ | Nicolas Fort | |
prefix-len on both matches. Also change help properties of route-source node. | |||
2022-05-29 | rip: T4448: remove default version for RIP | Christian Poessinger | |
Commit f9e38622 ("rip: T4448: add support to set protocol version on an interface level") also added the versionspecified on a per interface level. the RIp version carried a default value of 2 which makes RIPv1 and RIPv2 no longer working which is dthe default for FRR. Remove the default "2" from the RIP version specifier to make this behavior work again. | |||
2022-05-29 | Merge branch 'T4449' of https://github.com/nicolas-fort/vyos-1x into current | Christian Poessinger | |
* 'T4449' of https://github.com/nicolas-fort/vyos-1x: Policy: T4449: Extend matching options for route-map ip nexthop | |||
2022-05-28 | rip: T4448: add support to set protocol version on an interface level | Christian Poessinger | |
2022-05-28 | firewall: T970: Add firewall group domain-group | Viacheslav Hletenko | |
Domain group allows to filter addresses by domain main Resolved addresses as elements are stored to named "nft set" that used in the nftables rules Also added a dynamic "resolver" systemd daemon vyos-domain-group-resolve.service which starts python script for the domain-group addresses resolving by timeout 300 sec set firewall group domain-group DOMAINS address 'example.com' set firewall group domain-group DOMAINS address 'example.org' set firewall name FOO rule 10 action 'drop' set firewall name FOO rule 10 source group domain-group 'DOMAINS' set interfaces ethernet eth0 firewall local name 'FOO' nft list table ip filter table ip filter { set DOMAINS { type ipv4_addr flags interval elements = { 192.0.2.1, 192.0.2.85, 203.0.113.55, 203.0.113.58 } } chain NAME_FOO { ip saddr @DOMAINS counter packets 0 bytes 0 drop comment "FOO-10" counter packets 0 bytes 0 return comment "FOO default-action accept" } } | |||
2022-05-28 | Policy: T4449: Extend matching options for route-map ip nexthop | Nicolas Fort | |