So my feeling tells me that the offender is here.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Mar 31 2021
Hmm, where should the documentation for "gretap" be now? I checked the following and it's still missing:
Parent task: https://phabricator.vyos.net/T3356
Does anyone follow up on this?
Expect
vyos@r5-roll# set protocols ospf redistribute isis Possible completions: metric OSPF default metric metric-type OSPF metric type for default routes (default: 2) route-map Route map reference
Update: It turns out the md5sum.txt files are put there by Debian's Live Build. Checksums are added on lb binary_checksums step of the build, which defaults to MD5 if no variable is provided to tell it otherwise. As Daniil suggested, we can put a second checksum step with SHA256 variable to produce both checksums, then check for sha256sum.txt files on new images. This way, old update scripts can still find an md5sum.txt in images.
Mar 30 2021
@dtoux show ipv6 route vrf foo
I still see it in frr after the reboot but it is not showing in the output of show ipv6 route, so it seems like just a visualization problem.
To reproduce, on clean install 1.3.-rc3
set interfaces ethernet eth1 address '2620:18:6000:aa10::2/64' set interfaces ethernet eth1 vrf 'foo' set protocols vrf foo static route6 ::/0 next-hop 2620:18:6000:aa10::1 set vrf name foo table '1050'
@dtoux vtysh -c "show run"
Also, it doesn't show a directly connected ipv6 route.
What command do you use to get this?
The route present in the frr
! vrf foo ipv6 route ::/0 2620:18:6000:aa10::1 exit-vrf !
The workaround for save command does not seem to work, have you tried for commit-archive option ?
Turns out vyatta-remote-copy.pl has been broken for a while. It fails to exchange encryption keys when it tries to establish an SSH connection (for SFTP or SCP), possibly because of the old libssh it relies on.
I tried using ssh-keyscan and it's still didn't work for me and it still having the same curl error 60
Mar 29 2021
Looks good on 1.3-rolling-202103280642:
Looks good on 1.3-rolling-202103280642:
Looks good on 1.3-rolling-202103280642:
This command is used to generate the ssh fingerprint of your host when vyos cannot verify the legitimacy of the remote server
Mar 28 2021
Possible reason "> 2" in description "Ruby > 2.3"
vyos@r5:~$ echo "Package versions:"; dpkg -l | grep ruby-curse -A 2 Package versions: ii ruby-curses 1.2.4-1+b1 amd64 curses binding for Ruby ii ruby-did-you-mean 1.2.1-1 all smart error messages for Ruby > 2.3
Mar 27 2021
Mar 26 2021
This would require editing the template at https://github.com/vyos/vyos-1x/blob/current/data/templates/openvpn/server.conf.tmpl#L77
This is resolved by T3412.
@trystan Can you re-check it ?
Do we need "awscli" for it?
Fixed VyOS 1.4-rolling-202103251004