OPNsense GUI and system management
The OPNsense project invites developers to start contributing to the code base. For your own purpose or even better to join us in creating the best open source firewall available.
The build process has been designed to make it easy for anyone to build and write code. The main outline of the new codebase is available at:
Our aim is to gradually evolve to a new codebase instead of using a big bang approach into something new.
To create working software like OPNsense you need the sources and the tools to build it. The build tools for OPNsense are freely available.
Notes on how to build OPNsense can be found in the tools repository:
You can contribute to the project in many ways, e.g. testing functionality, sending in bug reports or creating pull requests directly via GitHub. Any help is always very welcome!
OPNsense is and will always be available under the 2-Clause BSD license:
Every contribution made to the project must be licensed under the same conditions in order to keep OPNsense truly free and accessible for everybody.
The repository offers a couple of targets that either tie into tools.git build processes or are aimed at fast development.
A package of the current state of the repository can be created using this target. It may require several packages to be installed. The target will try to assist in case of failure, e.g. when a missing file needs to be fetched from an external location.
Several OPTIONS exist to customise the package, e.g.:
- CORE_DEPENDS: a list of required dependencies for the package
- CORE_ORIGIN: sets a FreeBSD compatible package/ports origin
- FLAVOUR: can be set to "OpenSSL" (default) or "LibreSSL"
- CORE_COMMENT: a short description of the package
- CORE_MAINTAINER: email of the package maintainer
- CORE_WWW: web url of the package
- CORE_NAME: sets a package name
Options are passed in the following form:
# make package CORE_NAME=my_new_name
Upgrade will run the package build and attempt to replace the currently installed package in the system. Safety measures may prevent the target from succeeding. Instructions on how to proceed in case of failures are given inline.
Run serveral syntax checks on the repository. This is recommended before issuing a pull request on GitHub.
Run the CodeSniffer PSR2 style checks on the MVC code base.
Run Linux Kernel cleanfile witespace sanitiser on all files.