summaryrefslogtreecommitdiff
path: root/src/conf_mode
AgeCommit message (Collapse)Author
2018-08-28dhcp_server.py: rename dictionary key 'disable' to 'disabled'Christian Poessinger
2018-08-27Merge branch 'dhcp-server-rewrite' into currentChristian Poessinger
2018-08-27T778: T782: dhcp-server: XML and Python rewriteChristian Poessinger
This commit changes in addtion the DHCP server config syntax as defined in "T782: Cleanup dhcp-server configuration". Replace boolean parameter from the folowing nodes and make it valueless. This requires a migration script which is tracked with this task * set service dhcp-server shared-network-name <xyz> subnet 172.31.0.0/24 ip-forwarding enable (true|false) * set service dhcp-server shared-network-name <xyz> authoritative (true|false) * set service dhcp-server disabled (true|false) * set service dhcp-server dynamic-dns-update enable (true|fals) * set service dhcp-server hostfile-update (enable|disable) Replace the nested start/stop ip address from "subnet 172.31.0.0/24 start 172.31.0.101 stop 172.31.0.149" to "subnet 172.31.0.0/24 range <foo> start" and "subnet 172.31.0.0/24 range <foo> stop" where foo can be any character or number. In addition the vyatta-cfg-dhcp-server package used it's own init/config file for service startup. This has been migrated to the vanilla Debian files. Copy 'on-dhcp-event.sh' from vyatta-cfg-shcp-server package commit 4749e648bca6.
2018-08-26Merge remote-tracking branch 'upstream/current' into currenthagbard
2018-08-26T427: changed option listen-port to only porthagbard
2018-08-26tftp_server.py: change umask for created filesChristian Poessinger
2018-08-26Merge remote-tracking branch 'upstream/current' into currenthagbard
2018-08-26tftp_server.py: fix copy-paste commentChristian Poessinger
2018-08-26tftp_server.py: fix indention and add more verbose commentsChristian Poessinger
2018-08-26T792: add TFTP server functionalityChristian Poessinger
2018-08-26ssh.py: start/stop service via systemctlChristian Poessinger
2018-08-26ntp.py: start/stop service via systemctlChristian Poessinger
2018-08-25Merge remote-tracking branch 'upstream/current' into currenthagbard
2018-08-25idents fixed (sonarcloud complains)hagbard
2018-08-25ntp.py: fix typo in commentChristian Poessinger
2018-08-24T791: endpoint pattern doesn't need to be checked, wg returns an error ↵hagbard
message if it's not IP:port
2018-08-24T791: mtu size implementationhagbard
2018-08-23T793: fwmark implementationhagbard
2018-08-23listen-port for update mode needs to be 0 to switch back to randomly chosen ↵hagbard
if previously configured
2018-08-23T791: implementationhagbard
TODO: fwmark, mtu and pre-shared key
2018-08-20bugfix: if config and effective value are equal, there is no change ↵hagbard
required, deleting it from the dict will result in a keyerror if not aset at all
2018-08-17T783: to disable keepalive is has to be set to 0.hagbard
2018-08-17T783: conf mode persistent-keepalive implementationhagbard
2018-08-17T427: endpoint is only required for client mode, it's now an optional parameterhagbard
2018-08-17remove endpoint check, which is optional. server mode find the endpoint from ↵hagbard
an authenticated package.
2018-08-14Merge pull request #27 from hagbard-01/currentDaniil Baturin
T427, T773 adding wirguard support
2018-08-12T427: wireguard supporthagbard
2018-08-12T772: fixup for keepalived not understanding escaped quotes.Daniil Baturin
Since it does not understand escaped quotes inside notify_* options, until we fix that, we have to put the script and its arguments in positional arguments and join inside the transition script runner.
2018-08-10T666, T616: fix messed up variables in hello source/peer address checking.Daniil Baturin
2018-08-07T733: snmp.py: set IPv6 community stringJules Taplin
Also fixed it to correctly set an IPv6 community string, even if you don't specify the network it's working on.
2018-08-05T71: rename IPsec "settings" to "options" for consistency with the rest of ↵Daniil Baturin
the system.
2018-08-05T71: initial implementation of global IPsec settings.Daniil Baturin
Only disable-route-autoinstall (install_routes = yes/no) for now.
2018-08-02T754: add DNSSEC to DNS forwardermb300sd
2018-07-29Merge branch 'dyndns-refactoring' into currentChristian Poessinger
* dyndns-refactoring: T758: refactor ddclient configuration file amd startup T758: add configuration validator T758: XML/Python implementation for 'service dns dynamic'
2018-07-29T758: refactor ddclient configuration file amd startupChristian Poessinger
Since version 3.8.0 ddclient support the update of multiple ip's. The need for running multiple ddclient instances with different configuration files is thus no longer necessary. More information can be found on the ddclient forum: https://sourceforge.net/p/ddclient/mailman/message/20383414/
2018-07-29T758: add configuration validatorChristian Poessinger
2018-07-30Merge branch 'current' into currentDaniil Baturin
2018-07-29T758: XML/Python implementation for 'service dns dynamic'Christian Poessinger
2018-07-27T666, T616: new implementation of the VRRP CLI.Daniil Baturin
2018-07-24T736: bugfix, if facility is not set by the user, it defaults to *.err,in ↵hagbard
hosts proto wouldn't have a default, actually it wouldn't exist.
2018-07-24T736: import order changed, invoke-rc.d replaced by systemctl commandhagbard
2018-07-24T736: Rewrite remote logging (syslog) to XML/Pythonhagbard
2018-07-05T733: snmp.py: set IPv6 community stringjules-vyos
* Fixed snmp.py to correctly supply 'community6' community strings, so that ipv6 will work.
2018-07-02T652: SNMP: bugfix initial specification of v3 engine id missingChristian Poessinger
2018-07-02T713: bugfix incorrect parsing of seclevelChristian Poessinger
... there was a coding error in the if clause.
2018-07-02T652: SNMP: bugfix for default auth and priv typeChristian Poessinger
If no auth or no priv type was specified for a v3 user this resulted in a commit error, but CLI said there would be ssane defaults. * auth type defaults to 'md5' * priv type defaults to 'des'
2018-06-30T714: SNMP: make user auth type mandatoryChristian Poessinger
... if seclevel for group is auth or priv where the user belongs to
2018-06-30T713: bugfix incorrect parsing of seclevelChristian Poessinger
SNMP v3 group seclevel was not taken into account when validating existance of user auth or priv keys.
2018-06-30T652: SNMP: bugfix preserving users engineidChristian Poessinger
In VyOS 1.1.x every user was forced to the systems engine ID when using SNMPv3, even when a user wanted to have a custom engineID, thus the node 'service snmp v3 user foo engineid' itself is useless.
2018-06-24T201: remove systemd dependency which is unneededChristian Poessinger