Thanks for catching this
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
All Stories
Nov 5 2022
Relevant PRs:
Nov 4 2022
Nov 3 2022
After a few hours of digging I do think this request would be very similar to geoip, only ipv4, and ipv6 groups would be required per list.
PR adds groups to NAT: https://github.com/vyos/vyos-1x/pull/1633
Reopened, as this was never backported to 1.3; set for 1.3.3.
I didn't look deep into the nft groups, so I wasn't sure if we could mix ipv4/6 and addresses and networks, if we can then I agree one group would be best, though I'm sure ipv4/6 would still need to separate but checking each line for : makes that task super easy and fast.
From my point of fiew, looks interesting.
The proposed structure and behaviour doesn't look that different than what is currently in geoip filtering: external URLs with data, and sync from time to time.
The enhanced linux-cp plugin (from IPng) is since 21.06 an official part of VPP, so the integration should be simple:
https://vpp.flirble.org/master/aboutvpp/releasenotes/v21.06.html#linux-control-plane-plugin-linux-cp
A patch to the WIDE DHCPv6 client seems to be sufficient to resolve this issue with respect to the way VyOS currently uses the daemon (one daemon per configured interface), PRs below:
Nov 2 2022
Sure, it is fully compatible with 1.3. If no problems are found after the changes in 1.4 it must be backported.
Requires rewriting function show to python-systemd
on nightly build nftables v1.0.5 and kernel 5.15.76
As a first step, we need a wrapper script to control the start, stop and restart of socat, because socat sometimes exits automatically
As a first step, we need a wrapper script to control the start, stop and restart of socat, because socat sometimes exits automatically
Nov 1 2022
I created a PR to solve this specific issue (and some more related to this): https://github.com/vyos/vyos-1x/pull/1637
normally, when I want to make an empty-base config, I save config.boot another place. So I load it when I need to restart the configuration. I was thinking that we can make something like it by cli, it should be saved in the first config.boot file and restored.
Maybe a simplified and interactive cli, as when adding new image? So user can decide what to do with other images and containers.
Adds firewall node rule N source/destination fqdn domain.com for single domains per rule and refactors resolver daemon.
In addition to the configuration, you also need to reset all logs/custom scripts and boot from the base image.
What will be if you have several images? Should we delete all other images?
What will be if you have container images? Should we delete them?
And there are many other nuances.