1136 Commits

Author SHA1 Message Date
Franco Fichtner
ec68572f0f security/acme-client: rename class file name to match class name 2026-04-09 10:23:16 +02:00
Franco Fichtner
aa099c5901 security/q-feeds-connector: wrap up this revision 2026-04-09 09:50:45 +02:00
Franco Fichtner
35508e79e1 LICENSE: sync 2026-04-09 09:48:16 +02:00
Ad Schellevis
d1ebcc49ad security/q-feeds-connector - ignore "pass" log lines for qfeedsctl.py logs, closes https://github.com/opnsense/plugins/issues/5349 2026-03-29 10:42:41 +02:00
Konstantinos Spartalis
fd6d2de572 plugins: use Konstantinos' real name in historic mentions (#5352) 2026-03-26 16:57:34 +01:00
Frank Wall
8788b22a16 security/acme-client: update changelog 2026-03-24 17:52:54 +01:00
Frank Wall
af38ee45eb Merge pull request #5282 from pgerber/common-name
security/acme-client: always use configured cert name in cert description
2026-03-24 17:24:17 +01:00
Frank Wall
fe22642209 security/acme-client: fix truenas_ws filename, refs #5309 2026-03-24 17:17:42 +01:00
Konstantinos Spartalis
678a930dfb security/acme-client: add deploy hook truenas_ws (#5309) 2026-03-24 17:09:00 +01:00
Franco Fichtner
ca028fc1ce security/q-feeds-connector: annotate last fix 2026-03-11 09:00:03 +01:00
Ad Schellevis
78e3906a3e security/q-feeds-connector - on reconfigure, ensure alias cache is flushed to prevent consumers not knowing about our just registered dynamic entries. closes https://github.com/opnsense/plugins/issues/5288 2026-03-09 11:03:22 +01:00
Peter Gerber
8887a667fa security/acme-client: always use configured cert name in cert description
This a fix for the PHP warning below. I propose to simply never use the
certificate name because:

a) It's easier to understand if the description always has the same source.

b) The use of a common name is no longer recommended and will disappear
   sooner or later anyway [1,2].

[1]: https://letsencrypt.org/docs/glossary/#def-CN
[2]: https://letsencrypt.org/docs/profiles/#tlsserver

Related PHP warning:

[02-Mar-2026 15:02:54 Etc/UTC] PHP Warning:  Undefined array key "commonname" in /usr/local/opnsense/mvc/app/library/OPNsense/AcmeClient/LeCertificate.php on line 206
2026-03-02 16:14:45 +00:00
Franco Fichtner
542c5e8be8 security/q-feeds-connector: style 2026-02-27 15:13:49 +01:00
Franco Fichtner
3328414813 security/openvpn-legacy: drop this in from core 2026-02-26 12:02:52 +01:00
Frank Wall
267d2c7cb9 security/acme-client: fix buttons not working, closes #5123
While here, modernize UIBootgrid code and remove some dead code.
2026-02-26 00:36:21 +01:00
Franco Fichtner
f8694c7767 security/q-feeds-connector: style sweep 2026-02-25 12:22:11 +01:00
Frank Wall
52e09a6dd0 Merge pull request #5204 from fraenki/acme_414
security/acme-client: release 4.14
2026-02-25 12:03:29 +01:00
Bethuel Mmbaga
63fc5442ab security/netbird: Add SSH configuration options (#5113) 2026-02-24 16:00:57 +01:00
Franco Fichtner
cb77c1e616 security/tailscale: model changes, default validation message is enough 2026-02-24 15:55:19 +01:00
Sam Sheridan
11764a1dc4 security/tailscale: Set auth key to optional in UI (#5065) 2026-02-24 15:25:50 +01:00
Q-Feeds
58f0dfd86e q-feeds-connector: Update help text to mention DNScrypt-proxy blocklists (#5237)
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-19 09:06:10 +01:00
Ad Schellevis
de4c98eee2 Security: Q-Feeds Connect - add new options as available in integrated blocklists (#5226)
* Security: Q-Feeds Connect - add new options as available in integrated blocklists, closes https://github.com/opnsense/plugins/issues/5197

This adds allowlists (regex patterns), source_nets Q-Feeds applies on, address to return and optional NXDOMAIN responses.

Please note this version is only compatible with current community versions, business edition installs will have to wait for 26.4.

* Security: Q-Feeds Connect - update version and changelog
2026-02-16 16:58:17 +01:00
Frank Wall
a444a16214 security/acme-client: fix truenas automations, closes #5210
regression introduced in #5157
2026-02-11 16:11:03 +01:00
Frank Wall
911c1ab5fc security/acme-client: fix class name of Google Domains DNS API 2026-02-09 11:48:11 +01:00
Frank Wall
0a6ed55f61 security/acme-client: release 4.14 2026-02-09 11:27:46 +01:00
Q-Feeds
f64be105b0 Fix: Strip whitespace from API token to prevent 401 authentication errors (#5203) 2026-02-09 10:52:52 +01:00
Franco Fichtner
92fb6dcb2d security/q-feeds-connector: wrap up this revision 2026-02-09 07:51:37 +01:00
Franco Fichtner
630cd208ea LICENSE: fix a typo and sync 2026-02-06 10:57:50 +01:00
Ad Schellevis
8cafe71201 security/q-feeds-connector: track if qfeeds lists are loaded when deselected and reload unbounds blocklist in that case (via qfeedsctl.py), for https://github.com/opnsense/plugins/issues/5190 2026-02-05 21:19:22 +01:00
Franco Fichtner
4773ff712e security/wazuh-agent: bump revision 2026-01-30 15:55:28 +01:00
mbedworth
590bd9211c security/wazuh-agent: fix syntax error in opnsense-fw active response (#5174)
Fix critical syntax error in opnsense-fw active response script that prevents IPs from being added to the __wazuh_agent_drop alias.

## Problem
The script contains invalid Python syntax - a variable assignment inside a dictionary literal:
```python
"parameters":{
   unique_key = "%s-%s" % (...)  # Invalid Python syntax
   "keys": [unique_key]
}
```

This causes the script to fail with a SyntaxError on all 'add' commands, meaning attacking IPs are never blocked.

## Changes
- Move unique_key assignment outside dictionary literal (fixes SyntaxError)
- Fix typo: 'even' -> 'event' in error message
- Add debug logging for easier troubleshooting

## Testing
- Verified syntax with `python3 -m py_compile`
- Tested active response add/delete operations on OPNsense 26.1
2026-01-30 07:44:12 +01:00
Frank Wall
e011819532 security/acme-client: update changelog 2026-01-29 22:32:57 +01:00
Frank Wall
db0b943465 security/acme-client: remove duplicate slashes, refs #5166 2026-01-29 22:31:31 +01:00
Frank Wall
d18e09c78d security/acme-client: release 4.13 2026-01-29 22:31:31 +01:00
Frank Wall
728b97c87e Merge pull request #5168 from gigamonster256/push-rwxoyqsoyqlp
security/acme-client: allow always renew
2026-01-29 22:30:03 +01:00
Jeroen Kool
be5be59d60 security/acme-client: make it possible to obtain a global access token from TransIP (#5166)
* security/acme-client: Add option for global token to TransIP

The TransIP dns api and the acme.sh api for TransIP support the possibility to create a global access token.
With a global access token, the api call to TransIP can be amde from every ip adress.
There is a new button in the client configuration for TransIP, and this will be added to the account configuration file, which is used by acme.sh
2026-01-29 22:24:03 +01:00
Frank Wall
f3d86bb2d0 Merge pull request #5158 from Benno089/ISSUE-4959
security/acme-client: add support for DNS challenge Spaceship.com
2026-01-29 21:47:07 +01:00
Frank Wall
67977c43a8 Merge pull request #5157 from GutierrezJeremy/deploy-hook-ruckus
security/acme-client: add support for acme.sh deploy hook "Ruckus"
2026-01-29 21:46:32 +01:00
Frank Wall
268d504349 Merge pull request #5154 from apritcha1/master
security/acme-client: add support for ACME profiles
2026-01-29 21:46:03 +01:00
Caleb Norton
b23594e102 security/acme-client: allow always renew 2026-01-24 15:22:01 -06:00
Benno Kutschenreuter
93f434dc43 security/acme-client:add support for DNS challenge Spaceship.com 2026-01-23 14:54:05 +01:00
Jeremy Gutierrez
e9eb048a7c security/acme-client: add support for acme.sh deploy hook "Ruckus" 2026-01-23 14:17:16 +01:00
Franco Fichtner
e3bae8e72f security/tinc: update version 2026-01-21 07:51:20 +01:00
Alexander Pritchard
f2a122bdc8 security/acme-client: fallback display name for certs with no CN 2026-01-20 10:50:27 -06:00
Alexander Pritchard
20ff8e5af4 Add ACME profile support to acme-client 2026-01-20 10:22:47 -06:00
Thojo0
735eaa545e add disablesubnetroutes option (#5136)
closes https://github.com/opnsense/plugins/issues/5135
2026-01-20 14:45:40 +01:00
Frank Wall
3e0c77f252 Merge pull request #5153 from fraenki/acme_412
security/acme-client: release 4.12
2026-01-20 13:52:58 +01:00
Franco Fichtner
b4ae3dc4da security/q-feeds-connector: style 2026-01-20 12:55:38 +01:00
Franco Fichtner
a30717fa42 security/acme-client: style sweep 2026-01-20 12:21:50 +01:00
Frank Wall
d4cd3e3524 security/acme-client: release 4.12 2026-01-20 12:21:26 +01:00