Releases: rcmcdonald91/pfSense-pkg-WireGuard
Releases · rcmcdonald91/pfSense-pkg-WireGuard
v0.1.6
- [FEATURE] Configurable peer status visibility. (#144, #147)
- [FEATURE] New peer validation to prevent duplicate default routes. (#149)
- [BUGFIX] Resolves pages flickering & public key cursor on hover. (#146)
- [BUGFIX] Resolves treegrid flickering. (#148)
- [BUGFIX] Allow clipboard APIs on HTTP. (#150)
- [BUGFIX] Keepalive validation and allowing 0 value. (#151)
- [BUGFIX] Automatically enable/disable assigned tunnel gateways in response to service start/stop events.
This project is sponsored by Rubicon Communications LLC (d.b.a Netgate)
v0.1.5
v0.1.4_3
(This should fix service startup problems)
v0.1.4_1
(Testing)
v0.1.3
v0.1.2_6
v0.1.2_3
v0.1.2_1
(revision with some minor fixes)
For general overview of changes, see the update video here : https://youtu.be/yF_ir3Uf8SA
v0.1.2
Fixes:
- Properly handle flock and fclose calls with null file handle : https://redmine.pfsense.org/issues/11950
- Fixed lingering code due to refactoring efforts : #87
Improvements/Features:
- Service reliability improvements. We are now doing a better job at ensuring that the service doesn't run a muck.
- Change queuing. You can now make many changes to tunnel and/or peer configurations and only apply these changes in mass at once. Re-saving a configuration that is unchanged no longer requires a service restart.
- Groundwork for logging system. We are now inspecting every step of tunnel build/teardown and service start/stop/etc. and are able to properly identify and report failure points. This isn't useful yet (outside of debugging), but this will pave the way for a proper logging facility coming soon. This work did identify a few instances where things were failing (silently) and we are now properly handling these situations!
- UI Improvements. There are subtle changes throughout the UI. For example, address entry will now automatically squash any whitespace.
v0.1.1
Another major update.
Please find the details on the update here : https://www.youtube.com/watch?v=F0NHJnuvw7E
Highlights:
- Proper Unbound integration. Tunnel networks are now automatically added to the Unbound ACL.
- WireGuard Service. We now have a proper service/daemon that can be used for service monitoring, watchdog, reporting, etc. We are also automatically restarting dpinger and unbound when the WireGuard service is restarted.
Our internal WireGuard service is named wireguardd
.
You can start, stop and restart the service from the command line using service(8)
:
service wireguardd start | stop | restart