In T5657#162236, @bbabich wrote:Yep looks fine @Viacheslav
I've been using it like this for a while now but figure it may be useful as part of making 'VRFs' complete...$ sudo ip vrf exec RCS3 mtr 192.168.222.11
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
Feed All Stories
All Stories
All Stories
Oct 17 2023
Oct 17 2023
Yep looks fine @Viacheslav
I've been using it like this for a while now but figure it may be useful as part of making 'VRFs' complete...
Oct 16 2023
Oct 16 2023
Viacheslav changed the status of T5642: op cmd: generate tech-support archive: does not work from In progress to Needs testing.
@fsbof This change was accepted so it should end up in the 1.5 rolling soon. I suspect backporting to 1.4 wouldn't be an issue but that is a question for a more senior dev. But as for 1.3, I am unsure as I have never ran that version and don't know if there are any changes between those releases that would make it a pain to backport.
JeffWDH added a comment to T5661: Add show show ssh dynamic-protection attacker and show log ssh dynamic-protection.
Once accepted, I will update the documentation for this change as well as the ssh fingerprint change (T5653).
GitHub <noreply@github.com> committed rVYOSONEXc5627b3268b6: Merge pull request #2368 from vyos/mergify/bp/sagitta/pr-2367 (authored by c-po).
Mergify <37929162+mergify[bot]@users.noreply.github.com> committed rVYOSONEXeccad99d1388: op-mode: T5642: 'generate tech-support archive' moved to vyos-1x (authored by a.apostoliuk).
GitHub <noreply@github.com> committed rVYOSONEX69fb230ee022: op-mode: T5653: command to display SSH server public key fingerprints (authored by JeffWDH).
GitHub <noreply@github.com> committed rVYOSONEXbc0330808b21: Merge pull request #2367 from aapostoliuk/T5642-current (authored by c-po).
Viacheslav changed the status of T5232: Flow-accounting uacctd.service cannot restart correctly from In progress to Needs testing.
GitHub <noreply@github.com> committed rVYOSONEXb7359833c666: Merge pull request #2366 from sever-sever/T5634 (authored by c-po).
a.apostoliuk added a comment to T5337: MPLS/BGP: Route leak does not happen from the VPNv4 table to specific vrf.
In this case we can use the next solution:
Viacheslav closed T5137: show tech support command, a subtask of T3355: Remove all remaining legacy Vyatta code, as Resolved.
Viacheslav moved T5165: Policy local-route ability set protocol and port from Open to Finished on the VyOS 1.4 Sagitta board.
Still fails:
Oct 15 2023
Oct 15 2023
Looks like this issue may actually be resolved now.
GitHub <noreply@github.com> committed rVYOSONEXc345f83ed46f: Merge pull request #2356 from vyos/mergify/bp/sagitta/pr-2342 (authored by Viacheslav).
cf. T5027: the commit for this task necessarily removed the fix there, leading to failing of the same two tests. A fix is to specify a specific encryption cipher within test_openvpn_options and test_openvpn_site2site_interfaces_tun to avoid openvpn defaulting to bf.
Oct 14 2023
Oct 14 2023
I-n-d-y added a comment to T5652: Config migrate to image upgrade does not properly generate home directory.
I was also affected by this issue. I could only update to 1.5-rolling-202309280022. Updates to more recent versions had the effect that after login I coudn't manage VyOS as I only had a standard linux bash.
Did you test it in vrf? Is it really works as expected?
bbabich awarded T1797: Implement DPDK Fast-Path using FRR's Alternate Forwarding Planes and VPP a Like token.
@JeffWDH I am happy to download, build and test when you're ready if you point me to the right version(s)/location(s). I'm also very new to this but I managed to Build Equuleus in a docker container which has been working ok. Appreciate your efforts.
I've updated this to default to no ASCII art as I think it's cleaner, but added an option to show it if you want to see it:
GitHub <noreply@github.com> committed rVYOSONEXbdc5a7c12464: Merge pull request #2365 from vyos/mergify/bp/sagitta/pr-2359 (authored by dmbaturin).
Wow - you guys work quickly! 👍
I think it should be included, its often used during generation in Debian among other distros.
Mergify <37929162+mergify[bot]@users.noreply.github.com> committed rVYOSONEX8ab27f839a55: remote: T5650: Resize-aware progressbar implementation (authored by erkin).
GitHub <noreply@github.com> committed rVYOSONEX3b202fa469f5: Merge pull request #2364 from vyos/mergify/bp/sagitta/pr-2361 (authored by c-po).
Viacheslav closed T5629: Policy local-route bug after migration to destination node address, a subtask of T5165: Policy local-route ability set protocol and port, as Resolved.
Viacheslav closed T5629: Policy local-route bug after migration to destination node address as Resolved.
I wonder if we need the ASCII art though or not the plain fingerprints only (first line of the command)
Mergify <37929162+mergify[bot]@users.noreply.github.com> committed rVYOSONEX6cb00c9a7eb7: pmacct: T5232: Fixed pmacct service control via systemctl (authored by zsdc).
GitHub <noreply@github.com> committed rVYOSONEX39bc608060ea: Merge pull request #2359 from erkin/progressbar (authored by c-po).
GitHub <noreply@github.com> committed rVYOSONEX656f9ccad10e: Merge pull request #2361 from zdc/T5232-circinus (authored by c-po).
c-po renamed T5656: commit-archive password does not allow for all special characters from commit-archive password doe not allow for all special characters to commit-archive password does not allow for all special characters.
Oct 13 2023
Oct 13 2023
Implementation complete
Implementation complete
indrajitr closed T5112: Enable support for Network Time Security (NTS) for chrony, a subtask of T3008: Migrate from ntpd to chronyd, as Resolved.
Implementation complete
Implementation complete
indrajitr closed T5227: mDNS reflector should allow additional domains to browse and allow filtering services as Resolved.
Implementation complete
Implementation complete
Implementation complete
$ show ssh fingerprints SSH server public key fingerprints:
OpenVPN cannot pass the smoketest
DEBUG - ====================================================================== DEBUG - FAIL: test_openvpn_options (__main__.TestInterfacesOpenVPN.test_openvpn_options) DEBUG - ---------------------------------------------------------------------- DEBUG - Traceback (most recent call last): DEBUG - File "/usr/libexec/vyos/tests/smoke/cli/test_interfaces_openvpn.py", line 525, in test_openvpn_options DEBUG - self.assertNotEqual(cur_pid, new_pid) DEBUG - AssertionError: None == None DEBUG - DEBUG - ====================================================================== DEBUG - FAIL: test_openvpn_site2site_interfaces_tun (__main__.TestInterfacesOpenVPN.test_openvpn_site2site_interfaces_tun) DEBUG - ---------------------------------------------------------------------- DEBUG - Traceback (most recent call last): DEBUG - File "/usr/libexec/vyos/tests/smoke/cli/test_interfaces_openvpn.py", line 601, in test_openvpn_site2site_interfaces_tun DEBUG - self.assertTrue(process_named_running(PROCESS_NAME)) DEBUG - AssertionError: None is not true
n.fort changed the status of T5541: Zone-Based Firewalling in VyOS Sagitta 1.4 from Open to In progress.
JeffWDH added a comment to T5652: Config migrate to image upgrade does not properly generate home directory.
I had a similar issue going from 1.5-rolling-202309250022 to 1.5-rolling-202310090023.
a.apostoliuk changed the status of T5254: Modification of any interface setting sets MTU back to default when MTU has been inherited from a bond from In progress to Needs testing.
GitHub <noreply@github.com> committed rVYOSONEX688bde775690: Merge pull request #2350 from vyos/mergify/bp/sagitta/pr-2349 (authored by c-po).
Oct 12 2023
Oct 12 2023
GitHub <noreply@github.com> committed rVYOSONEX4c062a3217d0: Merge pull request #2360 from vyos/mergify/bp/sagitta/pr-2358 (authored by jestabro).
Then this task can be set to closed and invalid :-)
PR updated: https://github.com/vyos/vyos-build/pull/435
If you don't use the firewall (statefully at least) then it will go through the FW_CONNTRACK chain and the NAT_CONNTRACK and/or WLB_CONNTRACK chains will be reached, or fall through to the notrack.
But the NAT_CONNTRACK and WLB_CONNTRACK chains are never evaluted because FW_CONNTRACK always set action to accept?
zsdc changed the status of T5232: Flow-accounting uacctd.service cannot restart correctly from Open to In progress.
zsdc changed the status of T5233: Op-mode flow-accounting netflow with disable-imt errors from Open to In progress.
This should fix the problem: https://github.com/vyos/vyos-1x/pull/2361
That is how the conntrack enabling system works. FW_CONNTRACK verdict is set to accept when it is determined the firewall needs conntracking (state rules, flowtable etc.), same for NAT_/WLB_ chains. If none require conntrack - all chains will be return and it falls down the chain to the final notrack and conntrack is not enabled.
Mergify <37929162+mergify[bot]@users.noreply.github.com> committed rVYOSONEXea35feb50082: xml: T5649: catch errors from schema validation before generating cache (authored by jestabro).
GitHub <noreply@github.com> committed rVYOSONEXc4bea386c662: Merge pull request #2357 from devon-mar/ldpd-template-errors (authored by c-po).
GitHub <noreply@github.com> committed rVYOSONEXbf0ade04be9f: Merge pull request #2358 from jestabro/schema-check (authored by c-po).
erkin added a subtask for T3356: Script for remote file transfers: T5650: Progressbars suffer from staircasing effect.
erkin added a parent task for T5650: Progressbars suffer from staircasing effect: T3356: Script for remote file transfers.
