summaryrefslogtreecommitdiff
path: root/src/op_mode
AgeCommit message (Collapse)Author
2021-07-07pki: T3642: Migrate rsa-keys to PKI configurationsarthurdev
2021-07-05pki: T3642: Support for adding SANs on certificate requestssarthurdev
2021-07-04pki: T3642: Add standard extensions to generated certificatessarthurdev
2021-07-03pki: T3642: Fix for correct method on encoding certificate requestsarthurdev
2021-07-03pki: T3642: Add support for signing and revoking subordinate CAssarthurdev
2021-07-02ipsec: T3656: T3659: Fix pass-through with ipv6. Fix op-mode ipsec commands. ↵sarthurdev
Remove python3-crypto dependency.
2021-06-29pki: ipsec: T3642: Migrate IPSec to use PKI configurationsarthurdev
2021-06-29pki: T3642: New PKI config and managementsarthurdev
2021-06-27op-mode: bond: T2546: implement "show interface bond * slaves" commandChristian Poessinger
Add implementation with XML and Python.
2021-06-26Revert "ipsec: T3643: move swanctl.conf to /run"Christian Poessinger
This reverts commit 95bbbb8bed92a60a320ff255c8b8656145f3c540.
2021-06-26nat: nat66: T3648: Fix script logic errors and missing logic handlingjack9603301
2021-06-24ipsec: T3643: move swanctl.conf to /runChristian Poessinger
This is the completion of commit 50a742b5 ("IPSec: T3643: Fix path for swanctl.conf file") that moves the generated swanctl file from non-volatile to a volatile (tmpfs backed) storage like we do for all out configuration files. Thus it is ensured after a reboot or service deprecation there are no accidential leftovers from previous configurations stored on the system.
2021-06-23IPSec: T3643: Fix path for swanctl.conf fileViacheslav
2021-06-22ipsec: T3643: T2816: Update IPSec VPN op-mode commandssarthurdev
2021-06-20Merge pull request #889 from erkin/currentChristian Poessinger
T3506: loadkey: Add `generate public-key-command` command
2021-06-20Add `save` lineerkin
2021-06-20ipsec: T3617: Correct typo on encryption variablesarthurdev
2021-06-20T3506: loadkey: Add `generate public-key-command` commanderkin
2021-06-18Merge pull request #884 from sarthurdev/opmode_ike_saChristian Poessinger
ipsec: T2816: Fix 'show vpn ike sa' when key-size is not set
2021-06-18ping: T3634: Adding do not fragment to Ping (#885)Cheeze-It
In this commit we add the do not fragment capability for ping commands. Co-authored-by: Cheeze_It <none@none.com>
2021-06-17ipsec: T2816: Fix 'show vpn ike sa' when key-size is not setsarthurdev
2021-06-15ipsec: T2816: T645: T3613: Migrated IPsec to swanctl, includes multiple ↵sarthurdev
selectors, and selectors with VTI.
2021-06-13wwan: T3620: rename "wirelessmodem wlm" interfaces to new wwan interface treeChristian Poessinger
2021-06-01op-mode: T3384: support UDP bandwidth testingJACK
2021-05-28ipsec: T2816: IPSec python rework, includes DMVPN and VTI supportSimon
2021-05-22nat66: T2518: op-mode typo fixupJACK
2021-05-18openconnect-server: T3559: Add restart op-commandDmitriyEshenko
2021-05-18ddns: T3254: fix incorrect update timeFileGo
This fixes a bug when show dynamic dns status returned (formatted) UNIX time 0. I have changed the code to use ddclient's mtime value in the cache file, which is updated on every successful sync with DDNS service as opposed to atime, which was previously used.
2021-05-17ddclient: T3557: fix FileNotFoundError when querying status informationChristian Poessinger
If ddclient is not problery configured it will start up but no status file is generated. This commit checks if the status file exists before reading it.
2021-05-15conntrack: T3535: add op-mode commands for tracked connections"Christian Poessinger
2021-05-14op-mode: conntrack: T3535: add XML command definitionsChristian Poessinger
2021-04-27op-mode: ospfv3: T3335: re-use common vtysh_wrapper.sh wrapperChristian Poessinger
Instead of renaming the OSPFv3 commands for every individual XML invocation, also re-use the common helper shell script. One source, one truth!
2021-04-27op-mode: T2946: only call 'stty size' if in terminalJohn Estabrook
2021-04-27ipsec: T3473: Decode byte csa-name for op-modesever-sever
2021-04-26dhcpv6-server: T3494: Get address from network to correct sortingDmitriyEshenko
2021-04-25wireguard: T1802: add client name to configurationChristian Poessinger
2021-04-24wireguard: T1802: generate QR code for clients on CLIChristian Poessinger
generate wireguard mobile-config wg0 server wg.vyos.net address 1.2.2.2/24 WireGuard client configuration for interface: wg0 [Interface] PrivateKey = AEXrZ4b3xFVLg1lql3hy/93+d43q3+3vPdSMUGI6/Fo= Address = 1.2.2.2/24 [Peer] PublicKey = h1HkYlSuHdJN6Qv4Hz4bBzjGg5WUty+U1L7DJsZy1iE= Endpoint = wg.vyos.net:41751 AllowedIPs = 0.0.0.0/0, ::/0 The servers public key and port are automatically extracter from the running config.
2021-04-21container: T2216: Rewrite op-mode to pythonsever-sever
2021-04-21containers: T2216: add op-mode "show container network" commandChristian Poessinger
2021-04-14ipsec: T3333: Fix status for SA state op-modesever-sever
2021-04-13Merge pull request #801 from sever-sever/T2216-podChristian Poessinger
containers: T2216: Add podman for containers
2021-04-12containers: T2216: Add podman for containerssever-sever
2021-04-04nat: op-mode: T3435: Improved validation logic for the output of operational ↵jack9603301
mode rules
2021-04-04nat: op-mode: T3435: Filter extra rules that should not be processedjack9603301
2021-03-27op-mode: ipsec: T3055: Fixed parsing peer name errorjack9603301
2021-03-21Merge pull request #778 from sever-sever/T3403Christian Poessinger
op-mode: T3403: Fix show pppoe sessions interupt
2021-03-21ntp: T3416: fix op-mode commands when running inside VRFChristian Poessinger
When NTP is executed inside a VRF context, we also must execute the op-mode commands inside the given VRF. This is a workaround until the op-mode programming library from T3402 is available.
2021-03-20op-mode: T3403: Fix show pppoe sessions interuptsever-sever
2021-03-17nat66: T2518: Modify NAT ruleid acquisition methodjack9603301
2021-03-17nat66: T2518: use Python3 format identifiersjack9603301