summaryrefslogtreecommitdiff
path: root/src/conf_mode
AgeCommit message (Collapse)Author
2025-02-04defaults: T6989: provide single source of systemd servicesChristian Breunig
Some systemd services are re-used over multiple configuration files. Keep a single source of the real systemd names and only reference them by dictionary keys.
2025-02-04syslog: T6989: add possibility to define VRF per remoteChristian Breunig
Rsyslog supports individual VRFs per omfwd remote entry - so we should support this, too.
2025-02-03syslog: T6989: rename "global" to "local"Christian Breunig
The previously "global" options actually were only relevant for the local logging to /var/log/messages.
2025-02-03syslog: T6989: move up "global preserve-fqdn" one level in CLIChristian Breunig
Move "global preserve-fqdn" one CLI level up, as it relates to all logging targets (console, global and remote).
2025-02-03syslog: T6989: add new source-address CLI option for outgoing connectionsChristian Breunig
2025-02-03syslog: T6989: convert old configuration format to "advanced"Christian Breunig
2025-01-27haproxy: T7081: Support HTTP compression (#4314)Alex W
2025-01-24Merge pull request #4200 from sskaje/T4930-1Daniil Baturin
T4930: Allow WireGuard peers via DNS hostname
2025-01-24Merge pull request #4216 from HollyGurza/T6641Daniil Baturin
T6641: Add vyos-network-event-logger Service
2025-01-21T6895: Merge the hsflowd-based sFlow and uacctd-based sFlow (#4310)Nataliia S.
2025-01-21T6641: Add vyos-network-event-logger Servicekhramshinr
The service parses and logs network events for improved monitoring and diagnostics. Supported event types include: - `RTM_NEWROUTE`, `RTM_DELROUTE` - `RTM_NEWLINK`, `RTM_DELLINK` - `RTM_NEWADDR`, `RTM_DELADDR` - `RTM_NEWNEIGH`, `RTM_DELNEIGH`, `RTM_GETNEIGH` - `RTM_NEWRULE`, `RTM_DELRULE` Added operational mode commands for filtered log retrieval: - `show log network-event <event-type> <interface>`: Retrieve logs filtered by event type and interface. - `show interfaces <type> <name> event-log <event-type>`: Display interface-specific logs filtered by event type.
2025-01-19wireguard: T4930: use common error message patternChristian Breunig
2025-01-19wireguard: T4930: allow peers via FQDNsskaje
* set interfaces wireguard wgXX peer YY hostname <fqdn>
2025-01-16ruff: T6583: Reformat to comply with code styleIndrajit Raychaudhuri
2025-01-16dhcp: T5840: Merge systemd service overrides for kea-ctrl-agentIndrajit Raychaudhuri
Default systemd service for kea-ctrl-agent expects `/etc/kea/kea-api-password` which is not used in VyOS. The systemd unit override to remove the condition does not need to be in a separate (templated and dynamic) override file and can be merged into the existing static override file.
2025-01-09nhrp: T2326: NHRP migration to FRRaapostoliuk
NHRP migration to FRR
2025-01-07vrf: T7024: instance name "up" and "down" are reserved and should not be usedChristian Breunig
2025-01-06T6841: firewall: Fixed issues in ZBF when using VRFsaapostoliuk
Improve config parsing for ZBF when using VRFs and interfaces attached to VRFs
2025-01-06T6841: firewall: improve config parsing for ZBF when using VRFs and ↵Nicolas Fort
interfaces attached to VRFs
2025-01-02T6994: Add textfile collector config optionNicolas Vollmar
2024-12-31T6949: adds blackbox exporter (#4255)Nicolas Vollmar
* T6949: adds blackbox exporter * T6949: adds basic config generation * T6949: extract shared module config options * T6949: switch to ipv4/6 literals * T6949: moves config file to /run * T6949: adds dns query name option * T6949: adds dns query type values * T6949: adds blackbox exporter to debian/control
2024-12-31T6896: OpenVPN change CRL revoke without restart (#4245)Roman Khramshin
Do not restart service when changed only CRL. Service still restart when cert revoke first time
2024-12-30T6983: treat vyos-domain-resolver as a real service (#4261)Christian Breunig
* op-mode: T6983: add "show log" and "monitor log" commands for vyos-domain-resolver * firewall: T6983: drop unused variable domain_resolver_usage_nat * T6983: introduce Python logging module in vyos-domain-resolver * T6983: treat vyos-domain-resolver as a real service
2024-12-23T6013: Remove trusted_user_ca_key when the configuration does not existTakeru Hayasaka
Co-authored-by: Simon <965089+sarthurdev@users.noreply.github.com>
2024-12-23T6013: Remove unused variables to make it lint-friendlyTakeru Hayasaka
2024-12-23T6013: Add support for configuring TrustedUserCAKeys in SSH service with ↵Takeru Hayasaka
local and remote CA keys
2024-12-20Merge pull request #4242 from nvollmar/T6953Christian Breunig
T6953: merges node and frr exporter under prometheus section
2024-12-20T6953: simplify config handlingNicolas Vollmar
2024-12-19Merge pull request #4243 from c-po/frr-10Christian Breunig
frrender: T6746: runtime improvements
2024-12-19T6953: merges node and frr exporter under prometheus sectionNicolas Vollmar
2024-12-18frrender: T6746: move get_frrender_dict from vyos.configdict to this moduleChristian Breunig
Keep all FRRender stuff in one place.
2024-12-18Merge pull request #4233 from HollyGurza/T6934Christian Breunig
T6934: Add preshared key for zabbix-agent monitoring service
2024-12-17bgp: T6746: remove debug codeChristian Breunig
2024-12-16frr: T6746: do not use FRRender apply() method when vyos-configd is runningChristian Breunig
2024-12-16rpki: T6746: FRRender needs to calculate SSH key pathChristian Breunig
2024-12-16vrf: T6746: bugfix change of VNIChristian Breunig
VNI was always retrieved via effective configuration and not active configuration.
2024-12-16frr: T6746: handle "system ip" and "system ipv6" with FRRender classChristian Breunig
FRR 10.2 will use "[no] ip forwarding" and "[no] ipv6 forwarding" to enable or disable IP(v6) forwarding. We no longer rely on sysctl as this was overridden by FRR later on. Remove code path for sysctl setting and solely rely on FRR.
2024-12-16configd: T6746: handle FRR config reload as last step in commitChristian Breunig
2024-12-16frr: T6746: integrate FRRender class into vyos-configdChristian Breunig
When running under vyos-configd only a single apply() is done as last step in the commit algorithm. FRRender class address is provided via an attribute from vyos-configd process.
2024-12-16frr: T6747: migrate protocols to unified FRRender classChristian Breunig
With FRR 10.0 daemons started to be migrated to integrated FRR mgmtd and a northbound interface. This led to some drawbacks in the current state how changes to FRR are handled. The current implementation will use frr-reload.py and specifies excatly WHICH daemon needs a config update and will only replace this part inside FRR. With FRR10 and mgmtd when a partial configuration is sent to mgmtd, it will remove configuration parts from other daemons like bgpd or ospfd which have not yet been migrated to mgmtd. It's not possible to call frr-reload.py with daemon mgmtd - it will error out. This commit will also change the CLI for static routes: CLI command "set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd multi-hop source 1.1.1.1" will be split into: * set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd source-address 1.1.1.1 * set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd multi-hop To make the XML blocks reusable, and comply with the FRR CLI - this was actually a wrong implementation from the beginning as you can not have multiple BFD source addresses. CLI command "set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd multi-hop source 1.1.1.1 profile bar" is changed to: * set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd profile bar CLI commands "set protocols static multicast interface-route" is moved to: * set protocols static multicast route <x.x.x.x/x> interface To have an identical look and feel with regular static routes.
2024-12-16pim6: T6747: adjust template to new "router pim6" FRR CLIChristian Breunig
2024-12-16pim: T6747: adjust template to new "router pim" FRR CLIChristian Breunig
2024-12-16vrf: T6747: ensure VNIs are unique on the systemChristian Breunig
2024-12-16frr: T6747: make daemon definitions re-usable for both conf-mode and smoketestsChristian Breunig
2024-12-16T6934: Add preshared key for zabbix-agent monitoring servicekhramshinr
- Allow configure preshared key for zabbix-agent - Added op mode command for generatre random psk secret - Removed duplicate xml definition for psk settings Configure authentication mode: ``` # set service monitoring zabbix-agent authentication mode Possible completions: pre-shared-secret Use a pre-shared secret key ``` Configure PSK Settings: ``` # set service monitoring zabbix-agent authentication psk Possible completions: id ID for authentication secret pre-shared secret key ``` Generate Random PSK: ``` $ generate psk random Possible completions: <Enter> Execute the current command size Key size in bytes ```
2024-12-15tacacs: T6613: dynamically build exclude_users list to avoid TACACS trafficChristian Breunig
There is no need to send local base OS accounts like root or daemon to the tacacs server. This will only make the CLI experience sluggish. Build up a dynamic list of user accounts to exclude from TACACS lookup.
2024-12-10T6927: add name server validationNicolas Vollmar
2024-12-08T6927: adds option to set container name serverNicolas Vollmar
2024-12-02config-mgmt: T6925: return from verify function on config object None (#4213)John Estabrook
2024-11-29Merge pull request #4204 from sarthurdev/T6809Simon