Understood, thanks. I’m going to guess that with all the stuff yall have to do, pandering to weird Japanese setups isn’t going to be _too_ high on the list, hehe … Is there anything I can do in the meantime as far as a manual hack goes? I suppose I could write some kind of a script that runs as a cron job or something, but ideally I want to just patch into the boot process somewhere. [edit] browsing through forums, I came across a, what I think, was a similar issue:https://forum.opnsense.org/index.php?topic=35876.0and there was a patch issued, https://github.com/opnsense/core/commit/315153a07Was this ever deployed into subsequent releases? I looked through src/etc/inc/interfaces.inc and I don't think I see the code referenced in that patch, and it's for an older version, so I don't know if I should risk it or not.[edit] one more edit. i managed to make it come up on boot by editing 10-newwanip, adding a sleep timer of 30 seconds (to allow WAN to come up), doing the gif config, and then adding a new script all the way at the end of the boot, doing another 10 second sleep, and adding a configctl service restart strongswan to restart the IPSec tunnel. This survived the last two reboots, so it might be an OK hack at the moment.
Adding it to a _new_ script did not work
Quote from: jbourne on May 26, 2024, 04:57:04 amAdding it to a _new_ script did not workNo executable permission most likely.
Command to test was posted here: https://github.com/opnsense/core/issues/5630#issuecomment-2154825737Cheers,Franco