summaryrefslogtreecommitdiff
path: root/src/conf_mode
AgeCommit message (Collapse)Author
2019-09-04[service https] T1443: correct the listen-address option in the script.Daniil Baturin
2019-09-04Merge pull request #124 from c-po/t1614-bondingChristian Poessinger
T1614 bonding
2019-09-04bridge: T1615: can not add member interface to bridge if it is also part of ↵Christian Poessinger
a bond
2019-09-04bonding: T1614: T532: new commit validatorsChristian Poessinger
As in the past during the priority race of the bash script invalid configuration could appear in the CLI and are de-synced from the kernle state, e.g. some bonding modes do not support arp_interval. This is no longer allowed and added to the migration script so that the config again represents the truth.
2019-09-04[service https] T1443: create /etc/vyos if it doesn't exist.Daniil Baturin
2019-09-04bonding: T1614: add vif-c VLAN interface supportChristian Poessinger
Tested using: ============= set interfaces bonding bond0 address 192.0.2.1/24 set interfaces bonding bond0 description "VyOS bonding" set interfaces bonding bond0 disable-link-detect set interfaces bonding bond0 hash-policy layer2+3 set interfaces bonding bond0 ip arp-cache-timeout 86400 set interfaces bonding bond0 mac 00:91:00:00:00:01 set interfaces bonding bond0 mode active-backup set interfaces bonding bond0 mtu 9000 set interfaces bonding bond0 member interface eth1 set interfaces bonding bond0 member interface eth2 set interfaces bonding bond0 vif-s 100 address 192.168.10.1/24 set interfaces bonding bond0 vif-s 100 description "802.1ad service VLAN 100" set interfaces bonding bond0 vif-s 100 mtu 1500 set interfaces bonding bond0 vif-s 100 mac 00:91:00:00:00:02 set interfaces bonding bond0 vif-s 100 vif-c 110 address "192.168.110.1/24" set interfaces bonding bond0 vif-s 100 vif-c 110 description "client VLAN 110" set interfaces bonding bond0 vif-s 100 vif-c 120 address "192.168.120.1/24" set interfaces bonding bond0 vif-s 100 vif-c 120 description "client VLAN 120" set interfaces bonding bond0 vif-s 100 vif-c 130 address "192.168.130.1/24" set interfaces bonding bond0 vif-s 100 vif-c 130 description "client VLAN 130" set interfaces bonding bond0 vif 400 address 192.168.40.1/24 set interfaces bonding bond0 vif 400 description "802.1q VLAN 400" set interfaces bonding bond0 vif 400 mtu 1500 set interfaces bonding bond0 vif 400 mac 00:91:00:00:00:03
2019-09-04bonding: T1614: identical ID on vif and vif-s is not allowedChristian Poessinger
2019-09-04bonding: T1614: T1557: add vif/vif-s VLAN interface supportChristian Poessinger
Support for vif-c interfaces is still missing
2019-09-04bonding: T1614: remove obsolete 'member_remove' dict-keyChristian Poessinger
2019-09-04bonding: T1614: can not set primary interface when it's not part of the bondChristian Poessinger
2019-09-04bonding: T1614: Initial version in new style XML/Python interfaceChristian Poessinger
The node 'interfaces ethernet eth0 bond-group' has been changed and de-nested. Bond members are now configured in the bond interface itself. set interfaces bonding bond0 member interface eth0
2019-09-01bridge: T1615: remove is_ip import from vyos.validateChristian Poessinger
2019-09-01bridge: T1615: support deleting interface descriptionChristian Poessinger
2019-08-31loopback: T1601: support deleting interface descriptionChristian Poessinger
2019-08-31dummy: T1580: support deleting interface descriptionChristian Poessinger
2019-08-31Merge pull request #121 from c-po/t1557-ifconfigChristian Poessinger
T1557 Create generic abstraction for configuring interfaces e.g. IP address
2019-08-31loopback: T1601: migrate from pyroute2 -> vyos.ifconfigChristian Poessinger
2019-08-31dummy: T1580: migrate from pyroute2 -> vyos.ifconfigChristian Poessinger
2019-08-31bridge: T1615: replace pyroute2 by vyos.ifconfigChristian Poessinger
2019-08-31[l2tp ipsec] T1605: Changed ipsec marking only for inbound policy, all ↵DmitriyEshenko
functionality must saved
2019-08-30Python/ifconfig: rename interfaceconfig.py -> ifconfig.pyChristian Poessinger
2019-08-28bridge: T1615: add missing support for DHCP/DHCPv6 interface addressChristian Poessinger
This feature is not well supported by pyroute2 and thus uses the proof-of-concept vyos.interfaceconfig library. Maybe it's a better idea to write our own library from scratch.
2019-08-27openvpn: T1617: bugfix for server push-routeChristian Poessinger
2019-08-27Merge branch 't1614-bonding' into currentChristian Poessinger
* t1614-bonding: Python/VyOS validate: add is_ip() to check for IPv4 or IPv4 address bridge: T1556: remove unused function freeze() list-interfaces: T1614: support listing interfaces which can be bonded
2019-08-27[service https] T1443: Correct the use of listen/server_name directivesJohn Estabrook
2019-08-27bridge: T1556: remove unused function freeze()Christian Poessinger
2019-08-27dummy: T1580: migrate implementation to pyroute2Christian Poessinger
2019-08-26Merge pull request #118 from c-po/pyroute2Christian Poessinger
loopback: T1601: migrate to pyroute2
2019-08-26loopback: T1601: migrate to pyroute2Christian Poessinger
2019-08-26bridge: T1556: fix commentChristian Poessinger
2019-08-26Merge pull request #117 from c-po/pyroute2Christian Poessinger
bridge: T1556: migrate to pyroute2
2019-08-26bridge: T1556: migrate interface configuration to pyroute2Christian Poessinger
Tested with: set interfaces bridge br0 address '192.0.2.1/24' set interfaces bridge br0 aging '500' set interfaces bridge br0 disable-link-detect set interfaces bridge br0 forwarding-delay '11' set interfaces bridge br0 hello-time '5' set interfaces bridge br0 igmp querier set interfaces bridge br0 max-age '11' set interfaces bridge br0 member interface eth1 cost '1000' set interfaces bridge br0 member interface eth1 priority '4' set interfaces bridge br0 member interface eth2 cost '1001' set interfaces bridge br0 member interface eth2 priority '56'
2019-08-26T1598: make dns_forwarding.py retrieve name servers from vyos-hostsd.Daniil Baturin
2019-08-26bridge: T1608: deny adding non existing interfaces to bridge configChristian Poessinger
2019-08-26bridge: T1556: reword exception error when beeing member of multiple bridgesChristian Poessinger
2019-08-23[dummy] T1609 migrate to vyos.interfaceconfig, adding check ip-cidr, adding ↵DmitriyEshenko
vyos.interfaceconfig common ipv4/ipv6 functions
2019-08-23[dummy] T1609 Fixing dummy interface stateDmitriyEshenko
2019-08-21dummy: T1580: remove superfluous if statementsChristian Poessinger
2019-08-21bridge: T1556: remove superfluous if statementsChristian Poessinger
2019-08-21loopback: T1601: rewrite using XML/Python definitionsChristian Poessinger
2019-08-21T1598: redo host_name.py to use vyos-hostsd.Daniil Baturin
2019-08-20powerdns: T1595: remove 'listen-on' CLI optionChristian Poessinger
2019-08-20powerdns: T1524: support setting allow-from networkChristian Poessinger
Netmasks (both IPv4 and IPv6) that are allowed to use the server. The default allows access only from RFC 1918 private IP addresses. Due to the aggressive nature of the internet these days, it is highly recommended to not open up the recursor for the entire internet. Questions from IP addresses not listed here are ignored and do not get an answer. https://docs.powerdns.com/recursor/settings.html#allow-from Imagine an ISP network with non RFC1918 IP adresses - they can't make use of PowerDNS recursor. As of now VyOS hat allow-from set to 0.0.0.0/0 and ::/0 which created an open resolver. If there is no allow-from statement a config-migrator will add the appropriate nodes to the configuration, resulting in: service { dns { forwarding { allow-from 0.0.0.0/0 allow-from ::/0 cache-size 0 ignore-hosts-file listen-address 192.0.2.1 } } }
2019-08-19dummy: T1580: rewrite in new style XML/PythonChristian Poessinger
2019-08-19openvpn: T1548: remove authy 2fa providerChristian Poessinger
According to https://github.com/twilio/authy-openvpn commit 3e5dc73: > This plugin is no longer actively maintained. If you're interested in becoming a maintainer, we welcome forks of this project. In addition this plugin was always missing in the current branch ov VyOS and did not make it into VyOS 1.2 (crux) If 2FA for OpenVPN is required we should probably opt for Google Authenticator or if possible a U2F device.
2019-08-18openvpn: T1548: support creating L2 bridgesChristian Poessinger
2019-08-17openvpn: T1548: fix generated topology statement for 'server point-to-point'Christian Poessinger
2019-08-17openvpn: T1548: don't generate config if instance is disabledChristian Poessinger
2019-08-17openvpn: T1548: fix generated client subnet mask for topology 'server'Christian Poessinger
2019-08-17openvpn: T1548: widen generated folder permission to 755Christian Poessinger