commit b256ed7fcfa5e36bfd29e08c479bd02b461b21f5
Author: Ad Schellevis <ad@opnsense.org>
Date: Sun Apr 12 14:31:54 2026 +0200
net/frr - Routing: STATIC, finish https://github.com/opnsense/plugins/pull/5390 and add diagnostics.
commit be8a53d3d2
Author: Sven Scholle <sven@shelldog.de>
Date: Sat Apr 11 14:50:56 2026 +0200
net/frr: add BFD dependency support for static routes
We redistribute static routes from staticd into OSPF via WireGuard tunnels.
We want the redistribution to depend on whether the tunnel is actually up.
Since WireGuard interfaces remain up even when the tunnel is not functional, BFD appears to be the simplest solution for detecting tunnel failures.
* dns/ddclient: add all-inkl.com KAS API DynDNS provider
Adds a new Python provider for all-inkl.com hosting using the KAS SOAP API
(KasApi.wsdl). Supports A and AAAA records, including root (@) and wildcard (*)
entries. Credentials are passed per-request (no separate auth step).
- allinkl.py: new provider class AllInkl, service key 'allinkl'
- dialogAccount.xml: show Zone field for service_allinkl
- DynDNS.xml: add allinkl to static service list (ddclient backend fallback)
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
* dns/ddclient: address review feedback for all-inkl.com provider
- Remove allinkl entry from DynDNS.xml; known_services() handles
registration automatically for Python providers
- Replace regex-based XML parsing with xml.etree.ElementTree:
fault detection, record lookup and update success check
- Also catches ET.ParseError for malformed responses
- Fix German comments in docstring to English
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
---------
Co-authored-by: Carsten <carsten@kallies-net.de>
Co-authored-by: Claude Sonnet 4.6 <noreply@anthropic.com>
* Update hetzner.py
Added workaround for API bug on update record. Thanks to @arcanconsulting
* Update hetzner.py
Added LOG_NOTICE for deletion.
* Update hetzner.py
Updated _update method. No workaround needed.
* Update hetzner.py
fix: correct indentation of return statement in _update_record
* Update hetzner.py
fix: removed ttl from _update_record as its not supported (thanks to Ollienator).
* Removed _get_record() and existence-check of zone to save API-Calls. Thanks to @TheRealBecks
* restored filepermissions to 755 and removed useless comment
* removed links and added original whitespaces.
* removed whitespace on line 62
---------
Co-authored-by: Julian Nikodemus <dev@nkdms.de>
For core the dashboard ACL holds all the dashboard related API
patterns but we don't want to taint it with plugin requirements.
So instead of adding a WoL-Dashboard privilege add the required
API endpoint to the standard ACL to unbreak. This is only relevant
for the plugin when installed and explicitly using the privilege.
This a fix for the PHP warning below. I propose to simply never use the
certificate name because:
a) It's easier to understand if the description always has the same source.
b) The use of a common name is no longer recommended and will disappear
sooner or later anyway [1,2].
[1]: https://letsencrypt.org/docs/glossary/#def-CN
[2]: https://letsencrypt.org/docs/profiles/#tlsserver
Related PHP warning:
[02-Mar-2026 15:02:54 Etc/UTC] PHP Warning: Undefined array key "commonname" in /usr/local/opnsense/mvc/app/library/OPNsense/AcmeClient/LeCertificate.php on line 206