summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* | | Pass id variable through htmlspecialchars before print itRenato Botelho2014-03-111-1/+1
| | |
* | | Merge pull request #1021 from phil-davis/patch-6Renato Botelho2014-03-111-7/+35
|\ \ \ | | | | | | | | Validate rule Advanced Options numeric entries, it should fix #3510
| * | | Validate rule Advanced Options numeric entriesPhil Davis2014-03-111-7/+35
|/ / / | | | | | | | | | | | | | | | | | | | | | This makes sure the user puts in ordinary positive integers like "1" and "42" in these advanced options fields. It prevents everything else, including dodgy-looking possibilities like "007" which might actually work OK, but it is safer to allow just plain "7". Note 1: The tests in function is_aoadv_used($rule_config) had to be changed back from using empty() to use $var != "" because if the user enters "0" in one of those fields and presses save, they get an error message, but the Advanced Options block on the GUI is closed (the "0" was considered empty()). That seemed rather confusing - the user would have had to click on the Advanced Options "Advanced" button again to open up that block and see the "0" they had entered. Note 2: I have prohibited 2 things that "pf" allows into the ruleset without generating an error: (max 0) (tcp.established 0) Both of these seem (IMHO) to have no valid use case. They would prevent states from ever happening, and so would effectively be block rules, which could be implemented easily as block rules.
* | | Make this a bit more efficientErmal2014-03-111-3/+5
| | |
* | | Merge pull request #1010 from PiBa-NL/alias_allow_deleteRenato Botelho2014-03-111-2/+7
|\ \ \ | | | | | | | | firewall_virtual_ip , allow deleting last ip-alias if interface uses same the subnet. (while CARP-ip is present)
| * | | firewall_virtual_ip , allow deleting last ip-alias if interface uses same ↵PiBa-NL2014-03-091-2/+7
| | |/ | |/| | | | | | | the subnet. (while CARP-ip is present)
* | | Merge pull request #1018 from florian-asche/patch-3Renato Botelho2014-03-111-3/+5
|\ \ \ | | | | | | | | Update services.inc
| * | | Update services.incFlorian Asche2014-03-101-0/+2
| | | | | | | | | | | | Added CURL setops from dyndns.class
| * | | Update services.incFlorian Asche2014-03-101-0/+1
| | | | | | | | | | | | IPv4 ONLY
| * | | Update services.incFlorian Asche2014-03-101-3/+2
| | | | | | | | | | | | Prepared to make $hosttocheck configureable
* | | | Do not delete linklocal addressRenato Botelho2014-03-111-3/+4
| | | |
* | | | Merge pull request #1019 from florian-asche/patch-4Ermal Luçi2014-03-101-0/+1
|\ \ \ \ | | | | | | | | | | Update dyndns.class
| * | | | Update dyndns.classFlorian Asche2014-03-101-0/+1
|/ / / / | | | | | | | | IPv4 ONLY? YEAH ;)
* | | | Merge pull request #1012 from florian-asche/patch-1Renato Botelho2014-03-101-5/+6
|\ \ \ \ | |/ / / |/| | | Update services.inc
| * | | Update services.incFlorian Asche2014-03-101-5/+0
| | | |
| * | | Update services.incFlorian Asche2014-03-101-1/+7
| | | | | | | | | | | | Added missing usepublicip with dyndnsCheckIP
* | | | Fix order of parameters to explode() herejim-p2014-03-101-1/+1
| | | |
* | | | Merge pull request #1015 from phil-davis/patch-4Ermal Luçi2014-03-101-1/+1
|\ \ \ \ | | | | | | | | | | Fix OpenVPN XML section name
| * | | | Fix OpenVPN XML section namePhil Davis2014-03-101-1/+1
|/ / / / | | | | | | | | Forum https://forum.pfsense.org/index.php?topic=73479.0
* | | | Merge pull request #1003 from phil-davis/patch-2Renato Botelho2014-03-101-2/+16
|\ \ \ \ | | | | | | | | | | Add all advanced options to rule table hover text
| * | | | Add all advanced options to rule table hover textPhil Davis2014-03-081-2/+16
| |/ / / | | | | | | | | Bug #3512
* | | | Fix for now 'IPv6 - LAN looses Prefix after link event'(forums) with a not ↵Ermal2014-03-101-3/+14
| | | | | | | | | | | | | | | | elegant solution but works. Probably dhcpv6 client should solve this by itself and generate and event for it. For now just bump dhcpv6 client again to have the prefix interface reconfigured.
* | | | pfSense_interface_deladdress() only knows how to delete an ip address, not a ↵Renato Botelho2014-03-101-2/+8
|/ / / | | | | | | | | | subnet. It should fix #3513
* | | update translate pt_BR gettext fileLuiz Gustavo Costa2014-03-082-7127/+4788
| | |
* | | Make the voucher auth through xmlrpc work.Ermal2014-03-071-1/+4
| | |
* | | Properly use key here.Ermal2014-03-071-1/+2
| | |
* | | better make of gettext in expression (thanks rbgarga)Luiz Gustavo Costa2014-03-071-2/+2
| | |
* | | more fix some variables gettextLuiz Gustavo Costa2014-03-072-7/+7
| | |
* | | fix some variables gettextLuiz Gustavo Costa2014-03-071-15/+14
| | |
* | | Skip input validation when choosing an existing certificate, it should fix #3505Renato Botelho2014-03-071-1/+1
| | |
* | | Remove unecessary quotesRenato Botelho2014-03-071-3/+3
| | |
* | | Merge pull request #997 from phil-davis/masterRenato Botelho2014-03-071-2/+19
|\ \ \ | | | | | | | | Make Firewall Rules Advanced Options open if used
| * | | Refine check for existence of rule advanced optionsPhil Davis2014-03-061-9/+10
| | | |
| * | | Make Firewall Rules Advanced Options open if usedPhil Davis2014-03-041-2/+18
| | | | | | | | | | | | | | | | Currently, if there are some settings defined in Firewall Rules Edit, Advanced Features, Advanced Options, the Advanced Options section is left minimized when the Firewall Edit screen is displayed. This makes it easy for a user to not notice that there are some Advanced Options settings. This change makes the Advanced Options section be displayed if any of the settings are defined, in the same way it is done for all the other Advanced Features sections.
* | | | default openssl to 2048Chris Buechler2014-03-061-1/+1
| | | |
* | | | Better just use start here seems to be more reliableErmal2014-03-061-1/+1
| | | |
* | | | Correct the step for phase2 algos as wellErmal2014-03-061-1/+1
| | | |
* | | | Correct the generation of the config for mobile tunnels as wellErmal2014-03-061-4/+3
| | | |
* | | | Merge pull request #995 from ayvis/master-syntax-errorsRenato Botelho2014-03-0616-31/+30
|\ \ \ \ | | | | | | | | | | syntax errors correction
| * | | | syntax errors correctedayvis2014-03-0416-31/+30
| | | | |
* | | | | update link for 2.2Chris Buechler2014-03-061-1/+1
| | | | |
* | | | | Remove not needed anymore functionErmal2014-03-063-13/+0
| | | | |
* | | | | Use a step of 64 here too to comply with what the daemon can parse/understandErmal2014-03-061-1/+1
| | | | |
* | | | | bring up appropriate interface for GRE/GIF. Ticket #3281Chris Buechler2014-03-061-2/+2
|/ / / /
* | | | Merge pull request #984 from phil-davis/masterRenato Botelho2014-03-042-26/+22
|\ \ \ \ | |/ / / | | | | Return GWG IP protocol (version) when no gateway IP
| * | | Tidy up GWG dropdown selection testsPhil Davis2014-02-281-11/+7
| | | | | | | | | | | | Tested this making a new rule, and editing existing IPv4, IPv6 and IPv4+Ipv6 rules, and switching the IP version on an existing rule. Seems to work!
| * | | Tidy "gateway name - IP" in dropdown listPhil Davis2014-02-281-1/+2
| | | | | | | | | | | | While I notice this also, for a plain gateway, the current IP address is also listed in the dropdown list text, like "WAN_DHCP - 10.42.11.1". If there is no IP address currently, it might say "WAN_DHCP - dynamic". But for some DHCP gateways that have not had any non-default manual settings done, it can say "OPT1_DHCP -". This gets rid of the silly-looking "-"
| * | | Use return_gateway_groups_array() to build correct GWG listPhil Davis2014-02-271-10/+7
| | | | | | | | | | | | Now return_gateway_groups_array() always returns at least the IP version 'ipprotocol' of each GWG, even if all its members are down at present. It is better to use this to check what IP version the GWG is. The previous check was using the IP address of the first member of the GWG to deduce 'ipprotocol'. That would fail if the WAN was DHCP and was down.
| * | | Return GWG IP protocol (version) when no gateway IPPhil Davis2014-02-271-8/+10
| | | | | | | | | | | | This is a resubmit of an older pull request I had closed. It came up again in the forum, with a user setting up a VM environment and wondering why he cannot make policy-routing rules to a gateway group. The gateway group names did not display because all his WANs were down at the time and so the existing code was too dumb to determine the IP protocol (version 4 or 6) when none of the WANs in the gateway group actually have an IP address yet.
* | | | Merge pull request #992 from Doncuppjr/masterRenato Botelho2014-03-043-5/+27
|\ \ \ \ | | | | | | | | | | Add UEFI support to Network Boot options.
OpenPOWER on IntegriCloud