@JeffWDH looks good to me. It definitely should fix this.
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
Nov 15 2023
Nov 14 2023
I wonder if we should use permanent API call queries that don't depend on the path.
@watson.ash Will be fixed in the next rolling release. Could you check it (after 2023-11-14)
And we can backport it to 1.4 if all works fine.
Thanks.
Changing this https://github.com/vyos/vyos-1x/blob/2e587c8329a1d32fc1ec601c7753211d0fedbf2c/python/vyos/remote.py#L356
to
download(local_path, urlstring, False, True, source_host, source_port)
Fixes the issue for API
Nov 13 2023
In T5167#164447, @JeffWDH wrote:What about using nginx which seems to be already leveraged by the web API?
Nov 12 2023
Nov 11 2023
@twan it was backported https://github.com/vyos/vyos-1x/pull/2400
Nov 10 2023
@indrajitr could you recheck smoketests?
DEBUG - ---------------------------------------------------------------------- DEBUG - Ran 3 tests in 7.616s DEBUG - DEBUG - OK DEBUG - Running Testcase: /usr/libexec/vyos/tests/smoke/cli/test_service_dns_dynamic.py DEBUG - test_01_dyndns_service_standard (__main__.TestServiceDDNS.test_01_dyndns_service_standard) ... ok DEBUG - test_02_dyndns_service_ipv6 (__main__.TestServiceDDNS.test_02_dyndns_service_ipv6) ... ok DEBUG - test_03_dyndns_service_dual_stack (__main__.TestServiceDDNS.test_03_dyndns_service_dual_stack) ... ok DEBUG - test_04_dyndns_rfc2136 (__main__.TestServiceDDNS.test_04_dyndns_rfc2136) ... ok DEBUG - test_05_dyndns_hostname (__main__.TestServiceDDNS.test_05_dyndns_hostname) ... ok DEBUG - test_06_dyndns_web_options (__main__.TestServiceDDNS.test_06_dyndns_web_options) ... ok DEBUG - test_07_dyndns_vrf (__main__.TestServiceDDNS.test_07_dyndns_vrf) ... ERROR DEBUG - test_07_dyndns_vrf (__main__.TestServiceDDNS.test_07_dyndns_vrf) ... FAIL DEBUG - DEBUG - ====================================================================== DEBUG - ERROR: test_07_dyndns_vrf (__main__.TestServiceDDNS.test_07_dyndns_vrf) DEBUG - ---------------------------------------------------------------------- DEBUG - Traceback (most recent call last): DEBUG - File "/usr/libexec/vyos/tests/smoke/cli/test_service_dns_dynamic.py", line 304, in test_07_dyndns_vrf DEBUG - self.cli_set(['vrf', 'name', vrf_name, 'table', vrf_table]) DEBUG - File "/usr/libexec/vyos/tests/smoke/cli/base_vyostest_shim.py", line 68, in cli_set DEBUG - self._session.set(config) DEBUG - File "/usr/lib/python3/dist-packages/vyos/configsession.py", line 150, in set DEBUG - self.__run_command([SET] + path + value) DEBUG - File "/usr/lib/python3/dist-packages/vyos/configsession.py", line 139, in __run_command DEBUG - raise ConfigSessionError(output) DEBUG - vyos.configsession.ConfigSessionError: Number is not in any of allowed ranges DEBUG - DEBUG - DEBUG - DEBUG - VRF routing table must be in range from 100 to 65535 DEBUG - Value validation failed DEBUG - Set failed DEBUG - DEBUG - DEBUG - ====================================================================== DEBUG - FAIL: test_07_dyndns_vrf (__main__.TestServiceDDNS.test_07_dyndns_vrf) DEBUG - ---------------------------------------------------------------------- DEBUG - Traceback (most recent call last): DEBUG - File "/usr/libexec/vyos/tests/smoke/cli/test_service_dns_dynamic.py", line 50, in tearDown DEBUG - self.assertTrue(process_running(DDCLIENT_PID)) DEBUG - AssertionError: False is not true DEBUG - DEBUG - ----------------------------------------------------------------------
Yes I mean sudo ip vrf exec FOO /usr/sbin/conntrackd -C /run/conntrackd/conntrackd.conf
PR https://github.com/vyos/vyos-1x/pull/2469
set service file-server listen-address 0.0.0.0 set service file-server port 8000 set service file-server directory '/tmp'
Nov 9 2023
It seems to be a bug in the FRR that delete isisd configuration completely
router isis VyOS net 49.0001.1920.0200.0011.00 lsp-mtu 1460 redistribute ipv4 connected level-2 ! ! interface eth1 ip router isis VyOS ipv6 router isis VyOS ! interface tun0 ip router isis VyOS ipv6 router isis VyOS !
check
r1# conf t r1(config)# router isis VyOS r1(config-router)# net 49.0001.1920.0200.0011.00 r1(config-router)# lsp-mtu 1460 r1(config-router)# redistribute ipv4 connected level-2 r1(config-router)# ! r1(config-router)# ! r1(config-router)# interface eth1 r1(config-if)# ip router isis VyOS r1(config-if)# ipv6 router isis VyOS r1(config-if)# ! r1(config-if)# interface tun0 r1(config-if)# ip router isis VyOS vtysh: error reading from isisd: Success (0)Warning: closing connection to isisd because of an I/O error! r1(config-if)# ipv6 router isis VyOS Warning: connecting to isisd...failed! isisd is not running r1(config-if)# ! r1(config-if)# end Warning: connecting to isisd...failed! r1# r1#
Did you try to start this service in VRF?
Create please a PR if it works for you.
Nov 8 2023
set protocols static neighbor-proxy arp 192.0.2.1 interface eth1
check
vyos@r4# sudo ip nei show proxy 192.0.2.1 dev eth1 proxy [edit] vyos@r4#
Nov 7 2023
@giuavo I didn't test "default route", only regular routes for some prefixes, and it worked.
Could you create a PR?
Backport to 1.4 https://github.com/vyos/vyos-1x/pull/2449
Nov 6 2023
Nov 5 2023
Nov 4 2023
PR https://github.com/vyos/vyos-1x/pull/2434
set service snmp community public client '127.0.0.1' set service snmp mib interface-max '25' set service snmp mib interface 'eth' set service snmp mib interface 'bond'
Nov 3 2023
To fix it
sudo nano -c /lib/udev/rules.d/99-systemd.rules
Find sysctl line
# Apply sysctl variables to network devices (and only to those) as they appear. ACTION=="add", SUBSYSTEM=="net", KERNEL!="lo", RUN+="/lib/systemd/systemd-sysctl --prefix=/net/ipv4/conf/$name --prefix=/net/ipv4/neigh/$name --prefix=/net/ipv6/conf/$name --prefix=/net/ipv6/neigh/$name"
Replace to:
# Apply sysctl variables to network devices (and only to those) as they appear. ACTION=="add", SUBSYSTEM=="net", KERNEL!="lo|ppp*|ipoe*", RUN+="/lib/systemd/systemd-sysctl --prefix=/net/ipv4/conf/$name --prefix=/net/ipv4/neigh/$name --prefix=/net/ipv6/conf/$name --prefix=/net/ipv6/neigh/$name"
vyos@r4:~$ sudo udevadm monitor KERNEL[717.626843] remove /devices/virtual/net/ppp3466/queues/rx-0 (queues) KERNEL[717.626859] remove /devices/virtual/net/ppp3466/queues/tx-0 (queues) KERNEL[717.626903] remove /devices/virtual/net/ppp3466 (net) KERNEL[717.635679] remove /devices/virtual/net/ppp3468/queues/rx-0 (queues) KERNEL[717.635695] remove /devices/virtual/net/ppp3468/queues/tx-0 (queues) KERNEL[717.635769] remove /devices/virtual/net/ppp3468 (net) KERNEL[717.636144] remove /devices/virtual/net/ppp3469/queues/rx-0 (queues) KERNEL[717.636155] remove /devices/virtual/net/ppp3469/queues/tx-0 (queues) KERNEL[717.636181] remove /devices/virtual/net/ppp3469 (net) KERNEL[717.636536] remove /devices/virtual/net/ppp3458/queues/rx-0 (queues) KERNEL[717.636548] remove /devices/virtual/net/ppp3458/queues/tx-0 (queues) KERNEL[717.636614] remove /devices/virtual/net/ppp3458 (net) KERNEL[717.648940] remove /devices/virtual/net/ppp3470/queues/rx-0 (queues) KERNEL[717.648965] remove /devices/virtual/net/ppp3470/queues/tx-0 (queues) KERNEL[717.649018] remove /devices/virtual/net/ppp3470 (net) KERNEL[717.662658] remove /devices/virtual/net/ppp3473/queues/rx-0 (queues) KERNEL[717.662694] remove /devices/virtual/net/ppp3473/queues/tx-0 (queues) KERNEL[717.662705] remove /devices/virtual/net/ppp3473 (net) KERNEL[717.663198] remove /devices/virtual/net/ppp3471/queues/rx-0 (queues) KERNEL[717.663211] remove /devices/virtual/net/ppp3471/queues/tx-0 (queues) KERNEL[717.663255] remove /devices/virtual/net/ppp3471 (net) KERNEL[717.663423] remove /devices/virtual/net/ppp3472/queues/rx-0 (queues) KERNEL[717.663436] remove /devices/virtual/net/ppp3472/queues/tx-0 (queues) KERNEL[717.663465] remove /devices/virtual/net/ppp3472 (net) ^C