In T3871#141847, @jestabro wrote:Before adopting the approach mentioned above, there was development of an alternative using pyudev within an 'interface-monitor' daemon; the following branches contain (a version of) the rebased code. It would need a few hours of attention to check the logic and add the is_persistent check from vyos-interface-rescan.py; it could use some refactoring as well.
https://github.com/vyos/vyos-1x/compare/current...jestabro:vyos-1x:interface-monitor
https://github.com/vyos/vyatta-cfg/compare/current...jestabro:vyatta-cfg:interface-monitor
https://github.com/vyos/vyos-build/compare/current...jestabro:vyos-build:interface-monitor
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
Feed Search
Feb 13 2023
Feb 13 2023
sarthurdev moved T5003: Upgrade base system to Debian 12 "Bookworm" from Open to In Progress on the VyOS 1.4 Sagitta board.
sarthurdev changed the status of T5003: Upgrade base system to Debian 12 "Bookworm" from Open to In progress.
Feb 3 2023
Feb 3 2023
Jan 29 2023
Jan 29 2023
Jan 7 2023
Jan 7 2023
c-po awarded T4919: TPM-backed config encryption a 100 token.
Jan 6 2023
Jan 6 2023
Dec 23 2022
Dec 23 2022
Dec 3 2022
Dec 3 2022
PR to fix recursion check: https://github.com/vyos/vyos-1x/pull/1691
Nov 22 2022
Nov 22 2022
sarthurdev changed the status of T4834: Limit container network name to 15 characters from In progress to Needs testing.
sarthurdev changed the status of T4834: Limit container network name to 15 characters from Open to In progress.
Nov 17 2022
Nov 17 2022
Nov 11 2022
Nov 11 2022
PR for policy route refactor updates to vyos_mangle: https://github.com/vyos/vyos-1x/pull/1654
Nov 7 2022
Nov 7 2022
Nov 3 2022
Nov 3 2022
sarthurdev triaged T4797: External address/network lists for firewall (Local and remote) as Wishlist priority.
sarthurdev changed the status of T1097: Make firewall groups work everywhere that's appropropriate from Open to In progress.
PR adds groups to NAT: https://github.com/vyos/vyos-1x/pull/1633
sarthurdev changed the status of T1097: Make firewall groups work everywhere that's appropropriate, a subtask of T2199: Rewrite firewall in new XML/Python style, from Open to In progress.
Nov 1 2022
Nov 1 2022
sarthurdev changed the status of T1877: Feature Request: Allow NAT to use network and address groups from In progress to Needs testing.
Adds firewall node rule N source/destination fqdn domain.com for single domains per rule and refactors resolver daemon.
sarthurdev moved T4759: domain-group on policy route not working from Open to In Progress on the VyOS 1.4 Sagitta board.
sarthurdev changed the status of T4759: domain-group on policy route not working from Open to In progress.
sarthurdev closed T4774: Disallow duplicate pubkey on peers of a wireguard interface as Unknown Status.
Oct 31 2022
Oct 31 2022
sarthurdev changed the status of T1877: Feature Request: Allow NAT to use network and address groups from Open to In progress.
Oct 29 2022
Oct 29 2022
sarthurdev moved T4764: NAT tables vyos_nat and vyos_static_nat not deleting after deleting nat from Open to In Progress on the VyOS 1.4 Sagitta board.
sarthurdev changed the status of T4782: Allow multiple CA certificates (on e.g. EAPoL) from Open to Confirmed.
Good point, I'll try and look into this and see if it can be handled everywhere the new PKI nodes are used.
sarthurdev changed the status of T3903: Containers: after command "reboot" the host system will reboot after 1.5 minutes from Open to Needs testing.
Oct 28 2022
Oct 28 2022
sarthurdev added a comment to T3903: Containers: after command "reboot" the host system will reboot after 1.5 minutes.
Best suggestion seems to be introducing a script to call podman stop -t N on shutdown/reboot to reduce the timeout before SIGKILL is sent.
Oct 27 2022
Oct 27 2022
sarthurdev changed the status of T4774: Disallow duplicate pubkey on peers of a wireguard interface from Open to In progress.
Oct 26 2022
Oct 26 2022
Oct 25 2022
Oct 25 2022
sarthurdev changed the status of T4764: NAT tables vyos_nat and vyos_static_nat not deleting after deleting nat from In progress to Needs testing.
sarthurdev changed the status of T4764: NAT tables vyos_nat and vyos_static_nat not deleting after deleting nat from Open to In progress.
Oct 11 2022
Oct 11 2022
Oct 10 2022
Oct 10 2022
sarthurdev changed the status of T4742: Autocomplete in policy route rule x set table / does not show the tables created in the static protocols from Open to Needs testing.
sarthurdev changed the status of T4741: set firewall zone Local local-zone failed from Open to Needs testing.
Sep 29 2022
Sep 29 2022
Sep 28 2022
Sep 28 2022
sarthurdev changed the status of T4713: vyos@vyos:~$ show nat destination rules | doesn't work from Confirmed to Needs testing.
sarthurdev changed the status of T4713: vyos@vyos:~$ show nat destination rules | doesn't work from Open to Confirmed.
Sep 27 2022
Sep 27 2022
Can we see example destination NAT config with the issue?
Sep 22 2022
Sep 22 2022
Sep 21 2022
Sep 21 2022
Included a fix for this in NAT refactor: https://github.com/vyos/vyos-1x/pull/1552
PR for NAT included with refactor: https://github.com/vyos/vyos-1x/pull/1552
Sep 14 2022
Sep 14 2022
Sep 12 2022
Sep 12 2022
Refactor PR: https://github.com/vyos/vyos-1x/pull/1534
PR for filter tables: https://github.com/vyos/vyos-1x/pull/1534
Sep 10 2022
Sep 10 2022
In T1185#133941, @roedie wrote:Just a suggestion, would it be a weird idea to move the firewall config from the interface section to the firewall section? A bit like the zone config. So something like:
set firewall local interface eth0 name <firewall-filter> set firewall in interface eth0 name <firewall-filter> set firewall out interface eth0 name <firewall-filter> set firewall local interface bond0.10v22v6 ipv6-name <firewall-filter>The problem is that using zone-policy firewall is a bit overkill for a pure router or even a router with async routing. In which scenario I guess only the local variant would be useful.
Aug 17 2022
Aug 17 2022
Not supported at the moment, but we can look into adding it for both ipv4/v6 in 1.4
While I'm for changing to prefixed tables, I think the issue of tailscale and custom apps should fall under the accepted risk of running custom scripts outside of the config.
Any config available to test against?
Jul 7 2022
Jul 7 2022
Jul 6 2022
Jul 6 2022
I think there's still a problem possible with /var/log/messages handling:
Confirmed issue, seems to be a problem in rsyslog/logrotate. Possibly related to T4250
Jul 5 2022
Jul 5 2022
sarthurdev closed T478: Firewall address group (multi and nesting), a subtask of T2199: Rewrite firewall in new XML/Python style, as Resolved.
sarthurdev changed the status of T4512: enable-default-log on zone-policy from In progress to Needs testing.
Jul 4 2022
Jul 4 2022
Jul 2 2022
Jul 2 2022
Inverse match PR: https://github.com/vyos/vyos-1x/pull/1386
Jul 1 2022
Jul 1 2022
If the counters are visible and incrementing when checking with nft list table ip filter then I don't think this is an implementation issue. Wondering if its a problem with the syslog daemon.
Jun 29 2022
Jun 29 2022
Jun 27 2022
Jun 27 2022
Jun 26 2022
Jun 26 2022
Jun 25 2022
Jun 25 2022
sarthurdev changed the status of T4485: OpenVPN: Allow multiple CAs certificates from Open to In progress.
sarthurdev changed the status of T4484: Firewall op-mode summary doesn't correctly handle address group containing ranges from In progress to Needs testing.