summaryrefslogtreecommitdiff
path: root/src/conf_mode
AgeCommit message (Collapse)Author
2024-12-23T6013: Remove trusted_user_ca_key when the configuration does not existTakeru Hayasaka
Co-authored-by: Simon <965089+sarthurdev@users.noreply.github.com>
2024-12-23T6013: Remove unused variables to make it lint-friendlyTakeru Hayasaka
2024-12-23T6013: Add support for configuring TrustedUserCAKeys in SSH service with ↵Takeru Hayasaka
local and remote CA keys
2024-12-20Merge pull request #4242 from nvollmar/T6953Christian Breunig
T6953: merges node and frr exporter under prometheus section
2024-12-20T6953: simplify config handlingNicolas Vollmar
2024-12-19Merge pull request #4243 from c-po/frr-10Christian Breunig
frrender: T6746: runtime improvements
2024-12-19T6953: merges node and frr exporter under prometheus sectionNicolas Vollmar
2024-12-18frrender: T6746: move get_frrender_dict from vyos.configdict to this moduleChristian Breunig
Keep all FRRender stuff in one place.
2024-12-18Merge pull request #4233 from HollyGurza/T6934Christian Breunig
T6934: Add preshared key for zabbix-agent monitoring service
2024-12-17bgp: T6746: remove debug codeChristian Breunig
2024-12-16frr: T6746: do not use FRRender apply() method when vyos-configd is runningChristian Breunig
2024-12-16rpki: T6746: FRRender needs to calculate SSH key pathChristian Breunig
2024-12-16vrf: T6746: bugfix change of VNIChristian Breunig
VNI was always retrieved via effective configuration and not active configuration.
2024-12-16frr: T6746: handle "system ip" and "system ipv6" with FRRender classChristian Breunig
FRR 10.2 will use "[no] ip forwarding" and "[no] ipv6 forwarding" to enable or disable IP(v6) forwarding. We no longer rely on sysctl as this was overridden by FRR later on. Remove code path for sysctl setting and solely rely on FRR.
2024-12-16configd: T6746: handle FRR config reload as last step in commitChristian Breunig
2024-12-16frr: T6746: integrate FRRender class into vyos-configdChristian Breunig
When running under vyos-configd only a single apply() is done as last step in the commit algorithm. FRRender class address is provided via an attribute from vyos-configd process.
2024-12-16frr: T6747: migrate protocols to unified FRRender classChristian Breunig
With FRR 10.0 daemons started to be migrated to integrated FRR mgmtd and a northbound interface. This led to some drawbacks in the current state how changes to FRR are handled. The current implementation will use frr-reload.py and specifies excatly WHICH daemon needs a config update and will only replace this part inside FRR. With FRR10 and mgmtd when a partial configuration is sent to mgmtd, it will remove configuration parts from other daemons like bgpd or ospfd which have not yet been migrated to mgmtd. It's not possible to call frr-reload.py with daemon mgmtd - it will error out. This commit will also change the CLI for static routes: CLI command "set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd multi-hop source 1.1.1.1" will be split into: * set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd source-address 1.1.1.1 * set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd multi-hop To make the XML blocks reusable, and comply with the FRR CLI - this was actually a wrong implementation from the beginning as you can not have multiple BFD source addresses. CLI command "set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd multi-hop source 1.1.1.1 profile bar" is changed to: * set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd profile bar CLI commands "set protocols static multicast interface-route" is moved to: * set protocols static multicast route <x.x.x.x/x> interface To have an identical look and feel with regular static routes.
2024-12-16pim6: T6747: adjust template to new "router pim6" FRR CLIChristian Breunig
2024-12-16pim: T6747: adjust template to new "router pim" FRR CLIChristian Breunig
2024-12-16vrf: T6747: ensure VNIs are unique on the systemChristian Breunig
2024-12-16frr: T6747: make daemon definitions re-usable for both conf-mode and smoketestsChristian Breunig
2024-12-16T6934: Add preshared key for zabbix-agent monitoring servicekhramshinr
- Allow configure preshared key for zabbix-agent - Added op mode command for generatre random psk secret - Removed duplicate xml definition for psk settings Configure authentication mode: ``` # set service monitoring zabbix-agent authentication mode Possible completions: pre-shared-secret Use a pre-shared secret key ``` Configure PSK Settings: ``` # set service monitoring zabbix-agent authentication psk Possible completions: id ID for authentication secret pre-shared secret key ``` Generate Random PSK: ``` $ generate psk random Possible completions: <Enter> Execute the current command size Key size in bytes ```
2024-12-15tacacs: T6613: dynamically build exclude_users list to avoid TACACS trafficChristian Breunig
There is no need to send local base OS accounts like root or daemon to the tacacs server. This will only make the CLI experience sluggish. Build up a dynamic list of user accounts to exclude from TACACS lookup.
2024-12-10T6927: add name server validationNicolas Vollmar
2024-12-08T6927: adds option to set container name serverNicolas Vollmar
2024-12-02config-mgmt: T6925: return from verify function on config object None (#4213)John Estabrook
2024-11-29Merge pull request #4204 from sarthurdev/T6809Simon
2024-11-28multicast: T6920: static multicast routing throws TypeError (#4210)Nataliia S.
2024-11-26Merge pull request #4196 from natali-rs1985/T6872Christian Breunig
ipoe_server: T6872: Add the ability to configure LUA scripts and username
2024-11-25Merge pull request #4203 from sarthurdev/T6692Simon
dhcp: T6692: Fix range options not present when `exclude` is used
2024-11-22pki: T6809: Support system install of CA certificatessarthurdev
2024-11-21pki: T3642: Minimize `node_changed` codesarthurdev
2024-11-21dhcp: T6692: Fix range options not present when `exclude` is usedsarthurdev
Add smoketest to verify range options are present with `exclude`
2024-11-21ipoe_server: T6872: Add the ability to configure LUA scripts and usernameNataliia Solomko
2024-11-21T6806: Rework QoS Policy for HFSC Shaper (#4181)Roman Khramshin
- Removed default `m1` and `m2` values from interface definitions - Adjusted filter priorities for shapers - Fixed SFQ qdisc and HFSC class creation to fully support `m1`, `d`, and `m2` parameters - Added validation logic similar to VyOS 1.3 to improve error handling and user experience
2024-11-21T6796: QoS: match filter by interface(iif) (#4188)Roman Khramshin
2024-11-19T6490: Allow creation of wireguard interfaces without requiring peers (#4194)sskaje
* T6490: Allow creation of wireguard interfaces without requiring peers
2024-11-18T6884: adds mtu option for container networksNicolas Vollmar
2024-11-15Merge pull request #4191 from HollyGurza/T6801Christian Breunig
T6801: QoS: Policy rate-control is broken by default
2024-11-15T6878: Stop conntrack logging servicekhramshinr
2024-11-14T6801: QoS: Policy rate-control is broken by defaultkhramshinr
- Fixed unhandled exception for policy rate-control without params
2024-11-07T3501: Allow using more than one tuned profileNataliia Solomko
2024-10-17T973: add basic frr_exporter implementation (#4150)Robert Göhler
2024-10-11T6712: Add nonproduction banner (#4149)mergify[bot]
(cherry picked from commit 3abe7c72c95c3d9b825db08b092c555786e9fbcf) Co-authored-by: Viacheslav Hletenko <v.gletenko@vyos.io>
2024-10-09haproxy: T6745: Rename `reverse-proxy` to `haproxy`sarthurdev
2024-10-08Merge pull request #4128 from jestabro/commit-confirm-soft-rollbackJohn Estabrook
config-mgmt: T5976: add option for commit-confirm to use 'soft' rollback
2024-10-07config-mgmt: T5976: move commit-confirm revert action to subnodeJohn Estabrook
2024-10-07Merge pull request #3938 from talmakion/feature/T6430-local-pbrChristian Breunig
pbr: T6430: Local IP rules targeting VRFs by name as well as route table IDs
2024-10-07pbr: T6430: Local IP rules routing into VRFs by nameAndrew Topp
* This is the `policy local-route*` part of T6430, manipulating ip rules, another PR covers firewall-backed `policy route*` for similar functionality * Local PBR (policy local-route*) can only target table IDs up to 200 and the previous PR to extend the range was rejected * PBR with this PR can now also target VRFs directly by name, working around targeting problems for VRF table IDs outside the overlapping 100-200 range * Validation ensures rules can't target both a table ID and a VRF name (internally they are handled the same) * Relocated TestPolicyRoute.verify_rules() into VyOSUnitTestSHIM.TestCase, extended to allow lookups in other address families (IPv6 in the new tests). verify_rules() is used by original pbr and new lpbr smoketests in this PR.
2024-10-07Merge pull request #4118 from c-po/acme-ca-certDaniil Baturin
pki: T6481: auto import ACME certificate chain into CLI