summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorjim-p <jimp@pfsense.org>2010-09-28 18:29:25 -0400
committerjim-p <jimp@pfsense.org>2010-09-28 18:29:25 -0400
commit2f13b10c145bb9677adcd91745870f036190d1a7 (patch)
tree72e0714dcfc0faa9407c6a838cce73b0db44374b
parent25fec9b35a8e5c84778358100ca326b72ac3eec5 (diff)
downloadpfsense-2f13b10c145bb9677adcd91745870f036190d1a7.zip
pfsense-2f13b10c145bb9677adcd91745870f036190d1a7.tar.gz
Carry aliases around as a global so that discover_pkg_rules() can see aliases/macros, otherwise package rules that reference aliases/macros will never properly pass verification.
-rw-r--r--etc/inc/filter.inc8
1 files changed, 4 insertions, 4 deletions
diff --git a/etc/inc/filter.inc b/etc/inc/filter.inc
index 4ddece2..9924e7e 100644
--- a/etc/inc/filter.inc
+++ b/etc/inc/filter.inc
@@ -172,7 +172,7 @@ function filter_delete_states_for_down_gateways() {
/* reload filter sync */
function filter_configure_sync() {
global $config, $g, $after_filter_configure_run, $FilterIflist;
- global $time_based_rules, $filterdns;
+ global $time_based_rules, $filterdns, $aliases;
/* Use config lock to not allow recursion and config changes during this run. */
$filterlck = lock('config');
@@ -1093,7 +1093,7 @@ function filter_nat_rules_generate_if($if, $src = "any", $srcport = "", $dst = "
}
function filter_nat_rules_generate() {
- global $config, $g, $after_filter_configure_run, $FilterIflist, $GatewaysList;
+ global $config, $g, $after_filter_configure_run, $FilterIflist, $GatewaysList, $aliases;
$natrules = "nat-anchor \"natearly/*\"\n";
@@ -2687,7 +2687,7 @@ EOD;
}
function discover_pkg_rules($ruletype) {
- global $config, $g;
+ global $config, $g, $aliases;
/* Bail if there is no pkg directory, or if the package files might be out of sync. */
if(!is_dir("/usr/local/pkg") || file_exists('/conf/needs_package_sync'))
@@ -2705,7 +2705,7 @@ function discover_pkg_rules($ruletype) {
if(function_exists($pkg_generate_rules)) {
update_filter_reload_status("Processing early {$ruletype} rules for package {$pkg_inc}");
$tmprules = $pkg_generate_rules("$ruletype");
- file_put_contents("{$g['tmp_path']}/rules.test.packages", $tmprules);
+ file_put_contents("{$g['tmp_path']}/rules.test.packages", $aliases . $tmprules);
$status = mwexec("/sbin/pfctl -nf {$g['tmp_path']}/rules.test.packages");
if ($status <> 0) {
$errorrules = "There was an error while parsing the package filter rules for {$pkg_inc}.\n";
OpenPOWER on IntegriCloud