b2a81c0b524fee0a1713720462b6db5c302c3933 |
|
26-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
networkd: optinally use DHCP lease domain info for routing only
This changes the UseDomains= setting of .network files to take an optional third value "route", in addition to the
boolean values. If set, the passed domain information is used for routing rules only, but not for the search path
logic. |
3df9bec57c3e2d96f7e2a25961585cfa609b61eb |
|
26-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
networkd: rework Domains= setting
Previously, .network files only knew a vaguely defined "Domains=" concept, for which the documentation declared it was
the "DNS domain" for the network connection, without specifying what that means.
With this the Domains setting is reworked, so that there are now "routing" domains and "search" domains. The former are
to be used by resolved to route DNS request to specific network interfaces, the latter is to be used for searching
single-label hostnames with (in addition to being used for routing). Both settings are configured in the "Domains="
setting. Normal domain names listed in it are now considered search domains (for compatibility with existing setups),
while those prefixed with "~" are considered routing domains only. To route all lookups to a specific interface the
routing domain "." may be used, referring to the root domain. An alternative syntax for this is the "*", as was already
implemented before using the "wildcard" domain concept.
This commit adds proper parsers for this new logic, and exposes this via the sd-network API. This information is not
used by resolved yet, this will be added in a later commit. |
8a516214c4412e8a40544bd725a6d499a30cbbbf |
|
06-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
resolved: introduce support for per-interface negative trust anchors |
ad6c04756115809d615dede330213d73edf732a8 |
|
05-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
resolved,networkd: add a per-interface DNSSEC setting
This adds a DNSSEC= setting to .network files, and makes resolved honour
them. |
f41b446a7677c030250ccf318306dc637d1d9871 |
|
05-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
man: document that DNS= and Domains= is implemented by resolved |
aaa297d4e5401fd4466632555432774863457f1d |
|
05-Jan-2016 |
Lennart Poettering <lennart@poettering.net> |
networkd,resolved: add a per-interface mdns configuration option |
7f3fdb7f19a109fa3d1be92926bfe4cea1817da5 |
|
26-Dec-2015 |
Jakub Wilk <jwilk@jwilk.net> |
man: fix typos |
765afd5c4dbc71940d6dd6007ecc3eaa5a0b2aa1 |
|
13-Nov-2015 |
Lennart Poettering <lennart@poettering.net> |
networkd: stop managing per-interface IP forwarding settings
As it turns out the kernel does not support per-interface IPv6 packet
forwarding controls (unlike as it does for IPv4), but only supports a
global option (#1597). Also, the current per-interface management of the
setting isn't really useful, as you want it to propagate to at least one
more interface than the one you configure it on. This created much grief
(#1411, #1808).
Hence, let's roll this logic back and simplify this again, so that we
can expose the same behaviour on IPv4 and IPv6 and things start to work
automatically again for most folks: if a network with this setting set
is set up we propagate the setting into the global setting, but this is
strictly one-way: we never reset it again, and we do nothing for network
interfaces where this setting is not enabled.
Fixes: #1808, #1597. |
f5a8c43f39937d97c9ed75e3fe8621945b42b0db |
|
11-Nov-2015 |
Tom Gundersen <teg@jklm.no> |
networkd: IPv6 router discovery - follow IPv6AcceptRouterAdvertisemnt=
The previous behavior:
When DHCPv6 was enabled, router discover was performed first, and then DHCPv6 was
enabled only if the relevant flags were passed in the Router Advertisement message.
Moreover, router discovery was performed even if AcceptRouterAdvertisements=false,
moreover, even if router advertisements were accepted (by the kernel) the flags
indicating that DHCPv6 should be performed were ignored.
New behavior:
If RouterAdvertisements are accepted, and either no routers are found, or an
advertisement is received indicating DHCPv6 should be performed, the DHCPv6
client is started. Moreover, the DHCP option now truly enables the DHCPv6
client regardless of router discovery (though it will probably not be
very useful to get a lease withotu any routes, this seems the more consistent
approach).
The recommended default setting should be to set DHCP=ipv4 and to leave
IPv6AcceptRouterAdvertisements unset. |
a86cba89bebb4f5fd35841a6251c0baa321dc9a5 |
|
10-Nov-2015 |
Susant Sahani <ssahani@gmail.com> |
man: add man for IPV6 hop limit |
a8eaaee72a2f06e0fb64fb71de3b71ecba31dafb |
|
06-Nov-2015 |
Jan Engelhardt <jengelh@inai.de> |
doc: correct orthography, word forms and missing/extraneous words |
b938cb902c3b5bca807a94b277672c64d6767886 |
|
06-Nov-2015 |
Jan Engelhardt <jengelh@inai.de> |
doc: correct punctuation and improve typography in documentation |
44de7fb14f0fb5b8fe0f829f128c2c3e64114c0c |
|
16-Oct-2015 |
Susant Sahani <ssahani@gmail.com> |
man: add man for IPV6 DAD |
ebf9808112d7ed049f461e3ae8aad82b2d65f901 |
|
12-Oct-2015 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
man: describe IPv6AcceptRouterAdvertisements= better
With the previous description it wasn't clear that the
kernel default is being described.
Add link to kernel docs. |
6c1695be47b2830c79e128e4d05d760eb862184e |
|
03-Oct-2015 |
Lennart Poettering <lennart@poettering.net> |
man: include numeric prefixes in example file names for .link, .netdev, .network files
In order to avoid confusion with the default files we ship, let's use a
low prefix number for all examples.
Fixes #1409. |
0d07e595cc22379ec7388406c2f4f2a74eea9083 |
|
24-Sep-2015 |
Jens Kuske <jenskuske@gmail.com> |
networkd: add support to configure preferred source of static routes |
941d0aa8f4426b306e246b096175a28676259055 |
|
12-Sep-2015 |
Susant Sahani <ssahani@gmail.com> |
man: add support for accept ra man |
9b3a67c55b7df6642a0389306c513b17c211f280 |
|
31-Aug-2015 |
Tom Gundersen <teg@jklm.no> |
networkd: dhcp-server - allow configuration of the pool
The constraints we place on the pool is that it is a contiguous
sequence of addresses in the same subnet as the server address, not
including the subnet nor broadcast addresses, but possibly including
the server address itself. If the server address is included in the
pool it is (obviously) reserved and not handed out to clients. |
ad9437836f5d94b44d40ee702a0455a637c30322 |
|
27-Aug-2015 |
Lennart Poettering <lennart@poettering.net> |
man: document the new DHCP settings added in the past commits |
d94facdcaa8053768a2d190ee8dd6ff5114f8b33 |
|
21-Aug-2015 |
Major Hayden <major@mhtx.net> |
Adding bonding examples for systemd-networkd
This commit provides some basic bonding configuration examples for .netdev and .network files. |
dd2b607b7d1ce355e93f9f71cd256ec20b8ae9c4 |
|
25-Jul-2015 |
Thomas Hindoe Paaboel Andersen <phomes@gmail.com> |
man: typo fixes |
57e27ec0ada6775d85a5201cd25e989d92d0a1af |
|
25-Jul-2015 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
man: describe masking of .network files better
This should clear up some confusion in
https://github.com/systemd/systemd/issues/717.
This basically copies the description from systemd.unit to this
man page. Masking can happen also in /run, so strike the part
about /etc, and also add the magic work "mask". |
23da66bb402cc6d9bca2eb34e090ccc24dfbf3f5 |
|
25-Jul-2015 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
networkd: rename RootBlock to AllowPortToBeRoot
Justification is similar to BPDUGuard rename. "Positive" values
are easier. This is a rather uncommon option, so using a slightly
longer name should not be a problem, and may in fact may make it
easier to guess what the option does without reading the
documentation. |
072f9e4af4cf465aca6e263f4dfd6e07786786d2 |
|
25-Jul-2015 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
networkd: turn UnicastFlood on by default
Looking at the kernel commit, "on" seems to be the default value:
commit 867a59436fc35593ae0e0efcd56cc6d2f8506586
Author: Vlad Yasevich <vyasevic@redhat.com>
Date: Wed Jun 5 10:08:01 2013 -0400
bridge: Add a flag to control unicast packet flood.
Add a flag to control flood of unicast traffic. By default, flood is
on and the bridge will flood unicast traffic if it doesn't know
the destination. When the flag is turned off, unicast traffic
without an FDB will not be forwarded to the specified port.
... and it seems to be the reasonable thing to do by default. |
84c3409631f48869dcb59c0a74eba6d4ac40ad93 |
|
25-Jul-2015 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
networkd: rename BPDUGuard to UseBPDU
Rename to follow the follow the style of other options.
In general "positive" options are preferred to "negative" ones,
because they are easier to describe and easier for humans to
parse (c.f. the shortening on the man page entry). |
47c7dfe275b30cb507108f08e471d2d9ef2baa56 |
|
25-Jul-2015 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
man: reword new Bridge descriptions |
d59be2cf702dd29d0bb228013cef801f2e9dd22f |
|
25-Jul-2015 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
man: reword description of Hostname=
Also add dots at the end of sentences. |
165c41a99ab6002ef3ba6bd1f9361abf32c077f2 |
|
23-Jul-2015 |
Susant Sahani <susant@redhat.com> |
man: add man for bridge params |
1adc5d0bcd17fc8a8cd22fcd03174bfd75306dcd |
|
11-Jul-2015 |
Susant Sahani <susant@redhat.com> |
man: add manual for DHCP override hostname |
1f0d9695125bf8e66d0e53e37d454755a84899bb |
|
06-Jul-2015 |
Lennart Poettering <lennart@poettering.net> |
networkd: various fixes for the IPv6 privacy extensions support
- Make sure that the IPv6PrivacyExtensions=yes results in
prefer-temporary, not prefer-public.
- Introduce special enum value "kernel" to leave setting unset, similar
how we have it for the IP forwarding settings.
- Bring the enum values in sync with the the strings we parse for them,
to the level this makes sense (specifically, rename "disabled" to
"no", and "prefer-temporary" to "yes").
- Make sure we really set the value to to "no" by default, the way it is
already documented in the man page.
- Fix whitespace error.
- Make sure link_ipv6_privacy_extensions() actually returns the correct
enum type, rather than implicitly casting it to "bool".
- properly size formatting buffer for ipv6 sysctl value
- Don't complain if /proc/sys isn't writable
- Document that the enum follows the kernel's own values (0 = off, 1 =
prefer-public, 2 = prefer-temporary)
- Drop redundant negating of error code passed to log_syntax()
- Manpage fixes
This fixes a number of issues from PR #417 |
a46e37cb1225a36a33e8728005693e825cdbc01a |
|
05-Jul-2015 |
Susant Sahani <susant@redhat.com> |
man: add manual for ipv6 privacy extension |
e2bccc9d9974eb1290653ecfa3ccfd03c313842b |
|
04-Jul-2015 |
David Herrmann <dh.herrmann@gmail.com> |
man: fix sysctl references in networkd-manpage
We refer to the same sysctl-setting twice, which is misleading. Correctly
list all global forwarding options. As we _always_ change the forwarding
setting on links, they will get disabled by default. The global sysctl
defaults thus will not have any effect. |
12b42c76672a66c2d4ea7212c14f8f1b5a62b78d |
|
18-Jun-2015 |
Tom Gundersen <teg@jklm.no> |
man: revert dynamic paths for split-usr setups
This did not really work out as we had hoped. Trying to do this upstream
introduced several problems that probably makes it better suited as a
downstream patch after all. At any rate, it is not releaseable in the
current state, so we at least need to revert this before the release.
* by adjusting the path to binaries, but not do the same thing to the
search path we end up with inconsistent man-pages. Adjusting the search
path too would be quite messy, and it is not at all obvious that this is
worth the effort, but at any rate it would have to be done before we
could ship this.
* this means that distributed man-pages does not make sense as they depend
on config options, and for better or worse we are still distributing
man pages, so that is something that definitely needs sorting out before
we could ship with this patch.
* we have long held that split-usr is only minimally supported in order
to boot, and something we hope will eventually go away. So before we start
adding even more magic/effort in order to make this work nicely, we should
probably question if it makes sense at all. |
2972cba11712c3bfbe9fa07d1f3c3c4330127733 |
|
11-Jun-2015 |
Nick Owens <nick.owens@coreos.com> |
man: document IPForward=kernel option |
ee0eb1d891eb0a41fb63368bff264f59cb2bb851 |
|
08-Jun-2015 |
Lennart Poettering <lennart@poettering.net> |
Revert "networkd: create "kernel" setting for IPForwarding" |
3ed7e9c735219456a9b6561f9ece617fec1a7aa1 |
|
03-Jun-2015 |
Nick Owens <nick.owens@coreos.com> |
man: document IPForward=kernel option |
7d2e33a416388f9fed5f357e55dcd41394651edc |
|
02-Jun-2015 |
Daniel Mack <daniel@zonque.org> |
man: replace hard-coded /usr/lib
Replace some /usr/lib occurences in man/ with &rootprefix;/lib. |
681eb9cf2b831293a4f3d4c48a748d2e4a25d69e |
|
28-May-2015 |
Filipe Brandenburger <filbranden@google.com> |
man: generate configured paths in manpages
In particular, use /lib/systemd instead of /usr/lib/systemd in distributions
like Debian which still have not adopted a /usr merge setup.
Use XML entities from man/custom-entities.ent to replace configured paths while
doing XSLT processing of the original XML files. There was precedent of some
files (such as systemd.generator.xml) which were already using this approach.
This addresses most of the (manual) fixes from this patch:
http://anonscm.debian.org/cgit/pkg-systemd/systemd.git/tree/debian/patches/Fix-paths-in-man-pages.patch?h=experimental-220
The idea of using generic XML entities was presented here:
http://lists.freedesktop.org/archives/systemd-devel/2015-May/032240.html
This patch solves almost all the issues, with the exception of:
- Path to /bin/mount and /bin/umount.
- Generic statements about preference of /lib over /etc.
These will be handled separately by follow up patches.
Tested:
- With default configure settings, ran "make install" to two separate
directories and compared the output to confirm they matched exactly.
- Used a set of configure flags including $CONFFLAGS from Debian:
http://anonscm.debian.org/cgit/pkg-systemd/systemd.git/tree/debian/rules
Installed the tree and confirmed the paths use /lib/systemd instead of
/usr/lib/systemd and that no other unexpected differences exist.
- Confirmed that `make distcheck` still passes. |
e88d8021ba34be32ef5ace32e7243da798b0d1c5 |
|
19-May-2015 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
man: explain UseDomains a bit more
https://bugs.freedesktop.org/show_bug.cgi?id=85397 |
5c82dd13e1eef502afcef209a3b14a2100966909 |
|
15-May-2015 |
Benedikt Morbach <benedikt.morbach@googlemail.com> |
man: IPMasquerade only implies IPForward=ipv4
at least that's what the code does. |
505c5f6de1a5c0afb238a46db94fe3571902cc9d |
|
15-May-2015 |
Benedikt Morbach <benedikt.morbach@googlemail.com> |
networkd: don't touch global forwarding setting
This reverts commit 43c6d5abacaebf813845934ec8d5e5ee3c431854
(and a small part of 4046d8361c55c80ab8577aea52523b9e6eab0d0c)
It turns out we don't actually need to set the global ip_forward setting.
The only relevant setting is the one on each interface.
What the global toggle actually does is switch forwarding on/off for all
currently present interfaces and change the default for new ones.
That means that by setting the global ip_forward we
- Introduce a race condition, because if the interface with IPForward=yes
is brought up after one with IPForward=no, both will have forwarding
enabled, because the global switch turns it on for all interfaces.
If the other interface comes up first networkd correctly sets forward=0
and it doesn't get overridden.
- Change the forwarding setting for interfaces that networkd is not
configured to touch, even if the user disabled forwarding via sysctl,
either globally or per-interface
As forwarding works fine without this, as long as all relevant interfacest
individually set IPForward=yes: just drop it
This means that non-networkd interfaces use the global default while
networkd interfaces default to off if IPForward isn't given. |
a22e1850c36e52cb9d593b99be59b6ba7639d80a |
|
28-Apr-2015 |
Lennart Poettering <lennart@poettering.net> |
man: clarify that only the first .network file with a matching [Match] matters
http://lists.freedesktop.org/archives/systemd-devel/2015-April/031294.html |
4046d8361c55c80ab8577aea52523b9e6eab0d0c |
|
24-Apr-2015 |
Lennart Poettering <lennart@poettering.net> |
man: extend documentation on IPForward= and IPMasquerade=
Mention the default values, and clarify how this relates to the
underlying sysctls. |
301f4073fe1c2757e602aef24cee9ccf5f81a3a3 |
|
15-Mar-2015 |
Michael Marineau <michael.marineau@coreos.com> |
network: add UseNTP DHCP option
Despite having the internal logic in place to enable/disable using NTP
servers provided by DHCP the network config didn't expose the option. |
3ba3a79df4ae094d1008c04a9af8d1ff970124c4 |
|
14-Mar-2015 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
man: fix a bunch of links
All hail linkchecker! |
9c8ca3f7a69f82ca181b3cd2d5e1d3e621938abb |
|
13-Mar-2015 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
man: update example 2 in systemd.network(5)
none/both/v4/v6 are deprecated in favour of no/yes/ipv4/ipv6.
https://bugs.freedesktop.org/show_bug.cgi?id=89221 |
4a6970c5354cd367b1fa62114057d8e084a20403 |
|
09-Mar-2015 |
Torstein Husebø <torstein@huseboe.net> |
Fix typos |
3e43b2cd97bd82efe6a09e8b9b2e6b5f33f578a0 |
|
04-Mar-2015 |
Jan Janssen <medhefgo@web.de> |
networkd: Make DHCP client ID creation configurable |
0d4ad91dd4fc831c31a9775b0eadf97fea6cd7f6 |
|
27-Feb-2015 |
Alin Rauta <alin.rauta@intel.com> |
networkd: add support for Uplink Failure Detection
Introduce BindCarrier= to indicate the set of links that determine if
the current link should be brought UP or DOWN.
[tomegun: add a bit to commit message] |
56fd6bf795926409b087bce406ea851ad89f9fe8 |
|
14-Feb-2015 |
Tom Gundersen <teg@jklm.no> |
networkd: .network - rename LinkLocal to LinkLocalAddressing
Makes it a bit less ambiguous. |
113bfde15f9393fa8bc22cbd839c0bc64e733ee2 |
|
14-Feb-2015 |
Tom Gundersen <teg@jklm.no> |
man: systemd.network - document IPv6Token |
5256e00e8b9015dd1a976d647fc71dc7efbd8cf8 |
|
10-Feb-2015 |
Tom Gundersen <teg@jklm.no> |
net: support globbing and disjunction in Match logic
Match{Name,OrginalName,Type,Driver,Path} can now take a space-separated glob of matches. |
769b56a308c3f3d3952eda87fd4fb004207f4f49 |
|
09-Feb-2015 |
Tom Gundersen <teg@jklm.no> |
networkd: support route scopes
For now we only support the hardcoded values RT_SCOPE_{UNIVERSE,LOCAL,HOST},
and not numerical values or values from /etc/iproute2/rt_scopes.
This addresses https://bugs.freedesktop.org/show_bug.cgi?id=88508. |
d0d6a4cd70477970812bff0a37e70f66208d7c14 |
|
09-Feb-2015 |
Tom Gundersen <teg@jklm.no> |
networkd: generalize IPv4LL to LinkLocal
This allows both IPv4 and IPv6 link-local addresses to be enabled or disabled. By default
we still enable IPv6LL and disable IPv4LL. The old config option is kept for backwards
compatibility, but removed from the documentation. |
798d3a524ea57aaf40cb53858aaa45ec702f012d |
|
04-Feb-2015 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
Reindent man pages to 2ch |
769d324c99aab129148bd25f5f663ef441287d86 |
|
13-Jan-2015 |
Lennart Poettering <lennart@poettering.net> |
networkd: make IP forwarding for IPv4 and IPv6 individually configurable |
cb9fc36a1211967e8c58b0502a26c42552ac8060 |
|
13-Jan-2015 |
Lennart Poettering <lennart@poettering.net> |
networkd: introduce an AddressFamilyBoolean enum type
This introduces am AddressFamilyBoolean type that works more or less
like a booleaan, but can optionally turn on/off things for ipv4 and ipv6
independently. THis also ports the DHCP field over to it. |
bd763d350c7e8bf8b934bd45bc34ac35cdba2a63 |
|
13-Jan-2015 |
Jan Engelhardt <jengelh@inai.de> |
doc: add cross-references between systemd.{link, netdev, network} |
5a8bcb674f71a20e95df55319b34c556638378ce |
|
13-Jan-2015 |
Lennart Poettering <lennart@poettering.net> |
networkd: add minimal IP forwarding and masquerading support to .network files
This adds two new settings to networkd's .network files:
IPForwarding=yes and IPMasquerade=yes. The former controls the
"forwarding" sysctl setting of the interface, thus controlling whether
IP forwarding shall be enabled on the specific interface. The latter
controls whether a firewall rule shall be installed that exposes traffic
coming from the interface as coming from the local host to all other
interfaces.
This also enables both options by default for container network
interfaces, thus making "systemd-nspawn --network-veth" have network
connectivity out of the box. |
ce43e484465050c619ea9a1991d49b3d6215028b |
|
19-Dec-2014 |
Susant Sahani <susant@redhat.com> |
networkd: integrate LLDP
This patch integrates LLDP with networkd.
Example conf:
file : lldp.network
[Match]
Name=em1
[Network]
LLDP=yes |
b98b483bac585af754e8a22ea890db8486905d8a |
|
18-Dec-2014 |
Alin Rauta <alin.rauta@intel.com> |
networkd: add FDB support |
7303ec8f3009d6630a994644ad9e539813badc52 |
|
10-Dec-2014 |
Lennart Poettering <lennart@poettering.net> |
networkd: rename section [BridgePort] → [Bridge]
Let's stick to generic sections that describe the general technology,
instead of specific per-object sections, unless we really have a reason
to do that otherwise. |
8c12bb073d43b0e985cc2ced0650950ea59113c9 |
|
08-Dec-2014 |
Mantas Mikulėnas <grawity@gmail.com> |
networkd: update manpage for optional Gateway=
Following commit 59580681f5f. |
c106cc36b9b8e8998eb95299b02f1db9c1209122 |
|
05-Dec-2014 |
Tom Gundersen <teg@jklm.no> |
networkd: add basic [Link] settings to .network files
This allows the default link settings (set in .link files) to be overridden per Network. Only MTU and MACAddress is supported for now. |
9e7e440835c43d81ffdbc299d2c07daaa641ed50 |
|
04-Dec-2014 |
Tom Gundersen <teg@jklm.no> |
networkd: add support for source routing |
e1853b00ef7cb56cafd908327dd44b3ab48b402c |
|
04-Dec-2014 |
Susant Sahani <susant@redhat.com> |
networkd: Add bridge port path cost
This patch add support to specify path cost of the
bridge port to be configured via conf file.
Exampe: conf
file: br.netdev
[NetDev]
Name=br-test
Kind=bridge
file: br.network
[Match]
Name=em1
[Network]
Bridge=br-test
[BridgePort]
Cost=332
bridge link
2: em1 state UP : <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 master
br-test state disabled priority 32 cost 332 |
84b5b79a8f7b423c5b7cad4170eb68d57fe5e26c |
|
08-Sep-2014 |
Angus Gibson <angus@agibson.me> |
networkd: allow specification of DHCP route metric
This lets the routing metric for links to be specified per-network,
still defaulting to DHCP_ROUTE_METRIC (1024) if unspecified. Hopefully
this helps with multiple interfaces configured via DHCP. |
0566ef68b816f094c3bc1c6c3921c8c35bc6d87f |
|
20-Aug-2014 |
Ronny Chevalier <chevalier.ronny@gmail.com> |
man: fix typos |
6192b846ca0d15602e94ddb5da4420b7c60d64a5 |
|
15-Aug-2014 |
Tom Gundersen <teg@jklm.no> |
networkd: add support for Domains= to .network files
This allows the search/routing domanis to be specified per link/network and be passed
on to resolved. |
ad0734e890b25751ef8229e47210ff11ae8fa3f3 |
|
15-Aug-2014 |
Tom Gundersen <teg@jklm.no> |
networkd: rename UseDomainName to UseDomains
This option will also apply to the search domains, so make it plural. |
1bd27a45d04639190fc91ad2552b72ea759c0c27 |
|
15-Aug-2014 |
Tom Gundersen <teg@jklm.no> |
networkd: don't respect domainname from DHCP by default
Most routers will send garbage, so make this opt-in only. |
ccf1c0299fbe5f6b59e494aabc9883948b7a9df1 |
|
12-Aug-2014 |
Tom Gundersen <teg@jklm.no> |
networkd: disable ipv4ll default routes by default
This causes machines without connectivity to hang where they would otherwise fail. Keep it
opt-in for now, but consider whether we sholud just drop it. |
bd8f65387673e29f46136a4ed172097035002c23 |
|
04-Aug-2014 |
Tom Gundersen <teg@jklm.no> |
networkd: add and expose per-link LLMNR config option |
b85595b511d3d9f67940f7de0265fb78d672fe81 |
|
30-Jul-2014 |
Hong Shick Pak <hong@hspak.com> |
man: fix outdated example in systemd.network
The docs for the DHCP= was updated, but not the example. |
ba17915457271cc13d46cbafc876277d037acd67 |
|
30-Jul-2014 |
Tom Gundersen <teg@jklm.no> |
networkd: ipv4ll - configure link-local address independently of DHCPv4
This changes the behavior when both DHCPv4 and IPv4LL are enabled. Before,
we would disable IPv4LL when we got a DHCPv4 lease and enable it if the
lease was lost.
Now we just always set up both, if both are enabled, but the DHCPv4
addresses and routes will always take precedence due to their metric
and scope. |
bfa695b5cc37aeb78737c57c84e9e69ea08152c0 |
|
25-Jul-2014 |
Tom Gundersen <teg@jklm.no> |
networkd: ipv4ll - default to setting up ipv4ll routes
This is necessary for non-ipv4ll hosts to communicate with ipv4ll-only hosts on the same link. Defaults
to being enabled, but can be opted out.
See: <http://avahi.org/wiki/AvahiAutoipd#Routes> |
f5de5b00204f041aaec828d336c8afd9e860a5c3 |
|
15-Jul-2014 |
Tom Gundersen <teg@jklm.no> |
sd-dhcp-client: make request broadcasts opt-in
It appears there is no good way to decide whether or not broadcasts should be enabled,
there is hardware that must have broadcast, and there are networks that only allow
unicast. So we give up and make this configurable.
By default, unicast is used, but if the kernel were to inform us abotu certain
interfaces requiring broadcast, we could change this to opt-in by default in
those cases. |
edb85f0d8d0a84f27308a3728f3fde3c52b9dce2 |
|
14-Jul-2014 |
Susant Sahani <susant@redhat.com> |
networkd: dhcp add vendor class indentifier option 60
Vendor Class Identifier be used by DHCP clients to identify
their vendor type and configuration. When using this option,
vendors can define their own specific identifier values, such
as to convey a particular hardware or operating system
configuration or other identifying information.
Vendor-specified DHCP options—features that let administrators assign
separate options to clients with similar configuration requirements.
For example, if DHCP-aware clients for example we want to separate
different gateway and option for different set of people
(dev/test/hr/finance) in a org or devices for example web/database
servers or let's say in a embedded device etc and require a different
default gateway or DNS server than the rest of clients. |
5d8e593dce074bff966fc0a46579c61b4f3bc33a |
|
14-Jul-2014 |
Susant Sahani <susant@redhat.com> |
networkd: make metric of routes configurable
Now route metric can be configuted via conf file:
example conf:
[Match]
Name=em1
[Route]
Gateway=192.168.1.12
Metric=10
Test:
ip route output
default via 192.168.1.12 dev em1 metric 10
[tomegun: squash TODO update and reword man page a bit] |
1a43ddc8b1323a6815bbb20db9655ee4aef33e6c |
|
07-Jul-2014 |
Tom Gundersen <teg@jklm.no> |
man: network - document Peer key |
4cc7a82c9490a3c5ae03b1d6d168ce40ba499e23 |
|
01-Jul-2014 |
Eugene Yakubovich <eugene.yakubovich@coreos.com> |
networkd: send hostname to dhcp server
Send hostname (option 12) in DISCOVER and REQUEST messages so the
DHCP server could use it to register with dynamic DNS and such.
To opt-out of this behaviour set SendHostname to false in [DHCP]
section of .network file
[tomegun: rebased, made sure a failing set_hostname is a noop and moved
config from DHCPv4 to DHCP] |
0a8a0fad010018be0f46d1c2e077ade0eb27c7db |
|
01-Jul-2014 |
Tom Gundersen <teg@jklm.no> |
man: bring systemd.network(5) up-to-date
Based on diff by 'poma'. |
e1ea665edac17d75fce01b72dadfa3211b60df2c |
|
29-Jun-2014 |
Eugene Yakubovich <eyakubovich@gmail.com> |
Add support for DHCP static route options
This adds support for DHCP options 33 and 121: Static Route and
Classless Static Route. To enable this feature, set UseRoutes=true
in .network file. Returned routes are added to the routing table. |
ed942a9eb22d50f667909ad6184b45015d28d054 |
|
29-Jun-2014 |
Tom Gundersen <teg@jklm.no> |
networkd: merge DHCPv4 and DHCPv6 config
If there are v4 or v6 specific options we can keep those in separate sections,
but for the common options, we will use only one.
Moreovere only use DHCP=[yes/both|no/none|v4|v6] to enable or disable the clients. |
45df8656ebb1b0559a75993d1508fc61c2d39829 |
|
28-Jun-2014 |
Jan Engelhardt <jengelh@inai.de> |
doc: typographical improvements and choice of words |
8d0e0ddda6501479eb69164687c83c1a7667b33a |
|
28-Jun-2014 |
Jan Engelhardt <jengelh@inai.de> |
doc: grammatical corrections |
102bd40e1ed71c7ab980a90435a1c23d4c786c63 |
|
27-Jun-2014 |
Lennart Poettering <lennart@poettering.net> |
man: split systemd.network(5) and related into various sections for better readability |
4bb278e51e81ea3c5c62e1f7e296309b0fac8e3d |
|
27-Jun-2014 |
Lennart Poettering <lennart@poettering.net> |
man: document automatic networkd IP range allocation |
b8bde11658366290521e3d03316378b482600323 |
|
08-May-2014 |
Jan Engelhardt <jengelh@inai.de> |
doc: comma placement corrections and word order
Set commas where there should be some.
Some improvements to word order. |
70a44afee385c4afadaab9a002b3f9dd44aedf4a |
|
06-May-2014 |
Jan Engelhardt <jengelh@inai.de> |
doc: typographical fine tuning |
d28315e4aff91560ed4c2fc9f876ec8bfc559f2d |
|
06-May-2014 |
Jan Engelhardt <jengelh@inai.de> |
doc: use non-contracted forms in written documents |
aba496a58acf9d9c61314de71353550e579f85ee |
|
03-Apr-2014 |
Umut Tezduyar Lindskog <umut.tezduyar@axis.com> |
networkd: smooth transition from ipv4ll to dhcp address
Currently when both ipv4ll and dhcp are enabled, ipv4ll
address (if one has been claimed) is removed when dhcp
address is aquired. This is not the best thing to do
since there might be clients unaware of the removal
trying to communicate.
This patch provides a smooth transition between ipv4ll
and dhcp. If ipv4ll address was claimed [1] before dhcp,
address is marked as deprecated. Deprecated address is still
a valid address and packets can be received on it but address
cannot be selected as a source address. If dhcp lease cannot
be extended, then ipv4ll address is marked as valid again.
[1] If there is no collision, claiming IPv4LL takes between 4 to
7 seconds. |
f47c5c47d1a7bcfa1842ff7cc52b1f7fc1d86bcf |
|
17-Mar-2014 |
poma <pomidorabelisima@gmail.com> |
man: networkd - additional examples related to bridging |
cb44f25c12f6203ad1f173d5b32d4059f446508e |
|
14-Mar-2014 |
Tom Gundersen <teg@jklm.no> |
man: network - clarify which options may be specified more than once. |
06f021a8048583d66202e3ac5cd0a12386d33ac2 |
|
14-Mar-2014 |
Tom Gundersen <teg@jklm.no> |
networkd: allow more than one static DNS server |
848e3e24b00a61130f20226ef5f051433d478c69 |
|
05-Mar-2014 |
Umut Tezduyar Lindskog <umut.tezduyar@axis.com> |
man: ipv4 link-local |
fe6b2d55bcb379d01664ed28cea40634cb6b52e3 |
|
25-Feb-2014 |
Tom Gundersen <teg@jklm.no> |
networkd: add basic support for MACVLANs |
eac684ef1c29684b1bcd27a89c38c202e568e469 |
|
25-Feb-2014 |
Tom Gundersen <teg@jklm.no> |
man: split out systemd.net{work,dev}(5) from systemd-networkd(8) |