1
22.1 Legacy Series / Re: Alias based firewall rules doesn't work after upgrade to 22.1.8
« on: May 26, 2022, 12:19:55 pm »Quote...This, added to the lack of proper release notifications
Yes, I know detailed release notes are published with every release; I routinely read them, but often after the instances were updated (by cron). My point was about release notifications, i.e. being notified when a new version is released, via GitHub, a mailing list, or anything. I suppose Twitter is fine for many people, but I don't use it.
Quote...We deployed it to power schools and care centers; we've...
Which is a vey good reason why you should at least test our development versions before their being merged, their available at every release included in the exact same version as you're installing now.... The alias additions have been in there for a couple of cycles now. (https://docs.opnsense.org/manual/firmware.html#settings)
Yes, this is something I'm considering, and/or maintaining a private update mirror and only pushing upgrades after they've been tested.
QuoteI'm sure someone will soon answer me that we've got no right to complain since this is a free product...
Sure you do, it just doesn't bring much to the table when not thinking about how to help out from your end as well.
Of course not... Sorry for the rant.
Quote...started with an underscore that I'd never seen before
It's a new feature collecting the networks attached to an interface so we can reuse these later in the "xxx_network" rules. This increases visibility and also offers the possibility to "nest" and combine these into derivatives.
A full list of added features is in this merged pull request https://github.com/opnsense/core/pull/5668.
Are those internal aliases excluded from the JSON import/export feature ? We use it internally (via the API) to propagate alias changes to sets of nodes, and we don't want to overwrite those internal aliases on remote nodes