summaryrefslogtreecommitdiff
path: root/src/conf_mode
AgeCommit message (Collapse)Author
2019-11-23wireless: T1627: support station modeChristian Poessinger
Tested using: ------------- set interfaces wireless wlan0 address 'dhcp' set interfaces wireless wlan0 channel '0' set interfaces wireless wlan0 description '1' set interfaces wireless wlan0 physical-device 'phy0' set interfaces wireless wlan0 security wpa passphrase '12345678' set interfaces wireless wlan0 ssid 'VyOS-TEST' set interfaces wireless wlan0 type 'station'
2019-11-23wireless: T1627: RADIUS servers must have a key specifiedChristian Poessinger
2019-11-23wireless: T1627: change RADIUS CLI syntaxChristian Poessinger
Adopt RADIUS configuration and harmonize it with the rest of VyOS. Move the following configuration block: security { wpa { cipher CCMP mode wpa2 radius-server 172.16.100.10 { port 1812 secret secretkey } radius-server 172.16.100.11 { port 1812 secret secretkey } } } to the harmonized version of: security { wpa { cipher CCMP mode wpa2 radius { server 172.16.100.10 { port 1812 secret secretkey } server 172.16.100.11 { port 1812 secret secretkey } } } } And add the new "set interfaces wireless wlan0 security wpa radius source-address" CLI command to specify the origin of any RADIUS query on systems having multiple IP addresses.
2019-11-23wireless: T1627: re-order WPA key in hostapd configChristian Poessinger
2019-11-23wireless: T1627: fix generated ht_capab and vht_capabChristian Poessinger
If no capabilities are configured on the CLI - there should also be no ht_capab or vht_capab entry in the resulting hostapd.conf
2019-11-23wireless: T1627: initial rewrite in XML/Python styleChristian Poessinger
Working: - Wireless modes b, g, n, ac - WPA/WPA2 psk and RADIUS (tested using Microsoft NPS)
2019-11-14[service https] T1443: add setting of HTTPS listen portJohn Estabrook
2019-11-11[OpenVPN]: T1704: Added uppercase entries of ncp-ciphers, since there seems ↵vindenesen
to be a bug in OpenVPN client when comparing pushed cipher with local ncp cipher list
2019-11-11[OpenVPN]: T1704: Moved ncp-ciphers out of encryption block in config templatevindenesen
2019-11-11[OpenVPN]: T1704: Added function for ncp-ciphers, and ability to disable it.vindenesen
[OpenVPN]: T1704: Changed config structure for OpenVPN encryption to support ncp-ciphers. [OpenVPN]: T1704: Added migration scripts for interface 2-to-3
2019-11-11Merge pull request #159 from DmitriyEshenko/QAT-curDaniil Baturin
QAT: T1788: Intel QAT implementation
2019-11-10Merge pull request #158 from DmitriyEshenko/cur-fix-l2tpChristian Poessinger
l2tp: T1747: automatically calculate gw-ip-address.
2019-11-10l2tp: T1747: automatically calculate gw-ip-addressDmitriyEshenko
2019-11-08ddclient: T1789: fix RFC2136 generated configChristian Poessinger
Commit 967067970494c1800f ("ddclient: T1030: adjust to latest syntax") was under the impression that ddclient 3.9.0 now handles every config item with a comma in the end. This is unfortunately not true on RFC2136 dynamic DNS entries. Remove commas on config template.
2019-11-08QAT: T1788: Intel QAT implementationDmitriyEshenko
2019-11-02bridge: T1783: bugfix removal of member interfaceChristian Poessinger
Fix error when deleting a member with: delete interfaces bridge br0 member interface eth1 Traceback (most recent call last): File "/usr/libexec/vyos/conf_mode/interfaces-bridge.py", line 304, in <module> apply(c) File "/usr/libexec/vyos/conf_mode/interfaces-bridge.py", line 267, in apply br.del_port( intf['name'] ) TypeError: string indices must be integers
2019-10-27snmp: make script extension code more readableChristian Poessinger
2019-10-27snmp: use proper stat literals on chmod()Christian Poessinger
2019-10-27snmp: fix verify() indent on script extensionsChristian Poessinger
2019-10-27snmp: fix verify() bail out early orderChristian Poessinger
2019-10-27snmp: T1738: cleanup import statementsChristian Poessinger
2019-10-27snmp: T1769: remove TSM (Transport Security Mode) supportChristian Poessinger
The SNMPv3 TSM is very complex and I know 0 users of it. Also this is untested and I know no way how it could be tested. Instead of carrying on dead and unused code we should favour a drop of it using a proper config migration script.
2019-10-27snmp: T818: T1738: remove per user/trap engine idChristian Poessinger
As of the SNMP specification an SNMP engine ID should be unique per device. To not make it more complicated for users - only use the global SNMP engine ID.
2019-10-24T1762: adjust the set_level() calls to use the new list representation.Daniil Baturin
2019-10-23ddclient: T1030: add cloudflare zone config entryChristian Poessinger
2019-10-23[service https] T1443: organize internal data by server blockJohn Estabrook
2019-10-23[HTTP API] Add endpoints for config file and image management.Daniil Baturin
2019-10-23ddclient: T1030: adjust to latest syntaxChristian Poessinger
2019-10-23ddclient: T1030: auto create runtime directoriesChristian Poessinger
2019-10-23ddclient: T1030: use new default configuration file pathChristian Poessinger
2019-10-19dhcp-server: T1745: bugfix corner case on static-assignmentsChristian Poessinger
There was a bug when refactoring this with commits 5848a4d ("dhcp-server: T1707: remove DHCP static-mappings from address pool") and 1182b44 ("dhcp-server: T1707: bugfix on subsequent DHCP exclude addresses") that when a static address assignemnt was using the last IP address from the specified range. This triggered the following error: "DHCP range stop address x must be greater or equal to the range start address y!"
2019-10-18system-proxy: T1741 - Add system wide proxy settinghagbard
* removed subprocess as it is not required, script is executed via sudo * pep8 formatted
2019-10-18wireguard - remove endpoint check to enable roaming connectionshagbard
2019-10-18system-proxy: T1741 - Add system wide proxy setting CLI implementationhagbard
2019-10-15snmpd: T1705 - High CPU usage by bgpd when snmp is activehagbard
* typo fixed
2019-10-13Revert "snmpd: T1705 - High CPU usage by bgpd when snmp is active"Christian Poessinger
Systems not runing BGP won't boot anymore. Syslog shows: snmpd[5404]: getaddrinfo: inetCidrRouteTable Name or service not known snmpd[5404]: getaddrinfo("inetCidrRouteTable", NULL, ...): Name or service not known snmpd[5404]: Error opening specified endpoint "inetCidrRouteTable" snmpd[5404]: Server Exiting with code 1 snmpd[5401]: Starting SNMP services:: systemd[1]: snmpd.service: control process exited, code=exited status=1 systemd[1]: Failed to start LSB: SNMP agents. systemd[1]: Unit snmpd.service entered failed state. This reverts commit e45648cdd5a52569be7f3ac30473b0c7474a7894.
2019-10-13openvpn: T1548: clean out import statementsChristian Poessinger
2019-10-13ssh.py: check if file exists before deleting itChristian Poessinger
2019-10-13Sync XML interface description source file pattern and conf script nameChristian Poessinger
renamed: interface-bonding.py -> interfaces-bonding.py renamed: interface-bridge.py -> interfaces-bridge.py renamed: interface-dummy.py -> interfaces-dummy.py renamed: interface-ethernet.py -> interfaces-ethernet.py renamed: interface-loopback.py -> interfaces-loopback.py renamed: interface-openvpn.py -> interfaces-openvpn.py renamed: interface-vxlan.py -> interfaces-vxlan.py renamed: interface-wireguard.py -> interfaces-wireguard.py
2019-10-13Python/ifconfig: T1557: add support for DHCPv6 client optionsChristian Poessinger
2019-10-13bonding: T1614: support DHCP options on VLAN interfacesChristian Poessinger
2019-10-12conf_mode: bonding/ethernet fix commentsChristian Poessinger
2019-10-11wireguard: T1724 - add check for option endpointhagbard
2019-10-10snmpd: T1705 - High CPU usage by bgpd when snmp is activehagbard
2019-10-09T1430: add dhcp vendor-class-id client optionChristian Poessinger
2019-10-09Python/ifconfig: T1557: add generic support for DHCP client optionsChristian Poessinger
2019-10-06ethernet: T1637: bugfix on wrong dict key in verify()Christian Poessinger
This resulted in a commit error when Bonding interfaces have been involved.
2019-10-03dhcp-server: T1707: remove DHCP static-mappings from address poolChristian Poessinger
Previously when static-mappings have been created the address was still within the DHCP pool resulting in log entries as follows: dhcpd: Dynamic and static leases present for 192.0.2.51 dhcpd: Remove host declaration DMZ_PC2 or remove 192.0.2.51 dhcpd: from the dynamic address pool for DMZ (cherry picked from commit 6f954ab56768af9a07d8a1dc086f54ddefa58da7)
2019-10-03dhcp-server: only import ip_address and ip_network from ipaddress classChristian Poessinger
(cherry picked from commit bdf890cca40157b3f2a2386685e043e0fa220fac)
2019-10-03dhcp-server: T1707: bugfix on subsequent DHCP exclude addressesChristian Poessinger
Moved the code for splicing a DHCP range into its dedicated function as this will later be required again. Having subsequent DHCP exclude addresses e.g. 192.0.2.70 and 192.0.2.71 did not work as the previous algorithm created a range whose start address was after the end address. (cherry picked from commit 0f0f9f2835cf85c1fd3652ec83368528754764cd)