I've created a PR for this: https://github.com/vyos/vyos-1x/pull/3655
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
Jun 15 2024
I've created a PR with a very simple fix: https://github.com/vyos/vyos-1x/pull/3654
Jun 14 2024
I can now reproduce the issue. The reason I was unable to reproduce this was I missed out that you use an ACME certificate
vyos@vyos:~$ generate ipsec profile windows-remote-access support remote ipsec.somedomain
Traceback (most recent call last):
File "/usr/libexec/vyos/op_mode/ikev2_profile_generator.py", line 153, in <module>
cert_data = load_certificate(pki['certificate'][cert_name]['certificate'])
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^
KeyError: 'certificate'
vyos@vyos:~$ show ver | match Version:
Version: VyOS 1.5-rolling-202406130020
vyos@vyos:~$Jun 13 2024
This is not the latest image. Please use 1.5-rolling-202406130020
The only reason I see why this can happen is that the config.boot format can be unexpected. But this should not happen anymore, because now Cloud-init always runs migrations before doing any work, which should always add required metadata if the original file is a valid VyOS config.
Jun 12 2024
For 1.5-rolling-202406120020 it doesnt work even without having a vrf:
vyos@vyos-a# run update geoip Downloaded GeoIP database Error: GeoIP failed to update firewall [edit] vyos@vyos-a#
Unfortunately there is no explaining logging (at least I didn't found any).
In upgrade process
Jun 11 2024
Can you please retest with the latest ISO as additional fixes got added to the code.
@a.apostoliuk this one should be resolved in the current rolling release, if you're able to check it out?
I have https://github.com/vyos/vyos-1x/pull/3616 and https://github.com/vyos/vyos-1x/pull/3637 as works in progress.
Jun 10 2024
vyos@vyos:~$ dpkg -l | grep vyos-1x ii vyos-1x 1.5dev0-1669-g77cb661d8 amd64 VyOS configuration scripts and data ii vyos-1x-vmware 1.5dev0-1669-g77cb661d8 amd64 VyOS configuration scripts and data for VMware vyos@vyos:~$
Jun 9 2024
Please share the output of dpkg -l | grep vyos-1x
vyos@vyos# show vpn ipsec | commands set esp-group vpn lifetime '3600' set esp-group vpn pfs 'enable' set esp-group vpn proposal 10 encryption 'aes128gcm128' set esp-group vpn proposal 10 hash 'sha256' set ike-group vpn key-exchange 'ikev2' set ike-group vpn lifetime '7200' set ike-group vpn proposal 10 dh-group '14' set ike-group vpn proposal 10 encryption 'aes128gcm128' set ike-group vpn proposal 10 hash 'sha256' set interface 'eth0' set options virtual-ip set remote-access connection support authentication client-mode 'eap-mschapv2' set remote-access connection support authentication local-id 'ipsec.somedomain' set remote-access connection support authentication local-users username test password 'test' set remote-access connection support authentication server-mode 'x509' set remote-access connection support authentication x509 ca-certificate 'isrgrootx1' set remote-access connection support authentication x509 ca-certificate 'lets-encrypt-r3' set remote-access connection support authentication x509 certificate 'vpn2' set remote-access connection support description 'support remote access' set remote-access connection support esp-group 'vpn' set remote-access connection support ike-group 'vpn' set remote-access connection support local-address 'ip on eth0' set remote-access connection support pool 'support' set remote-access pool support name-server '1.1.1.1' set remote-access pool support name-server '9.9.9.9' set remote-access pool support prefix '192.168.120.64/27' [edit] vyos@vyos#
Please share your full ipsec configuration
vyos@vyos:~$ generate ipsec profile windows-remote-access support remote ipsec.somedomain
Traceback (most recent call last):
File "/usr/libexec/vyos/op_mode/ikev2_profile_generator.py", line 154, in <module>
cert = load_certificate(pki['certificate'][cert_name]['certificate'])
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^
KeyError: 'certificate'
vyos@vyos:~$ show ver
Version: VyOS 1.5-rolling-202406060020
Release train: current
Release flavor: genericThis was merged Thu May 30 16:35:43 2024 +0200 and your image is from 2024-05-30.
I may have figured something out in https://vyos.dev/T4694.
It looks like outbound encap can be matched via routing expressions:
Jun 7 2024
In T6448#191159, @Viacheslav wrote:In T6448#191156, @HappyShr00m wrote:I have not used it since I thought it would delete even running instances or stop them. if it doesn't, then may I suggest adding a description to the command to indicate that it will not impact the running containers. thanks
It should not affect running container images.
Try it on some test instance.
Jun 6 2024
I don't know how to solve this problem. I suggest rejecting the problem.
In T6448#191156, @HappyShr00m wrote:I have not used it since I thought it would delete even running instances or stop them. if it doesn't, then may I suggest adding a description to the command to indicate that it will not impact the running containers. thanks
In T6448#191124, @Viacheslav wrote:It will delete all unused images
Did you try this command, as the command does not work?Which original podman command are you expecting?
It will delete all unused images
Did you try this command, as the command does not work?
Jun 5 2024
Jun 3 2024
If you add this config after the server is configured, it works as it requires a restart of the service
sudo systemctl restart accel-ppp@pppoe.service
Or reconfigure the service again
Add the set of commands to reproduce.
Jun 2 2024
Jun 1 2024
May 31 2024
I've created a PR for this that fixed a mistake with my original patch: https://github.com/vyos/vyos-1x/pull/3570
May 30 2024
Apple IOS now recognizes multiple CAs inside the profile
With this change all CAs in the list are rendered into the template.
May 29 2024
Tested as working in: VyOS 1.5-rolling-202405280020
@mersl thanks for confirm.
just some show commands with test results on my lab
very cool! I just rebuild a 1.5-rolling and upgraded my lab router and voila - works as expected ;-)
we've added this ability to configure the topology on isis :
Are you sure your DHCP server honors the no-default-route option?
I may be wrong, but I think the no-default-route just sets an option in the DHCP request, asking the DHCP server to not send back the default route.
I have the same issue with my ISP, and they told me they will always send a default route via DHCP.
I have solved the issue using DHCP hooks.
We will bind the code to a new command in operating mode (for example show ports). This will allow you to use the nmap command from operating mode. Just a convenient feature.