summaryrefslogtreecommitdiffstats
path: root/src/etc/inc/services.inc
Commit message (Collapse)AuthorAgeFilesLines
* Variable syntax correction. Fixes #7446.derelict-pf2017-04-031-1/+1
|
* Add separate bindip for usepublicip case. Fixes #7446.derelict-pf2017-04-031-1/+3
|
* Add local directive to nsupdate file. Fixes #7446.derelict-pf2017-04-031-0/+1
|
* cron, dont write_config() when nothing changed.PiBa-NL2017-03-271-0/+2
|
* Use the same cache filename pattern for RFC2136 IPv6 items as used by dyndnsRenato Botelho2017-03-021-1/+4
|
* Code with multiple %s in etcPhil Davis2017-02-011-1/+1
|
* Add a parameter to install_cron_job to stop it from performing its own ↵jim-p2017-01-201-5/+12
| | | | | | write_config. Adjust base system calls to match. Ticket #7146 Packages may still need the old behavior but need tested individually. Once all function calls are confirmed to work without the write, the write_config parameter and call can be removed from this function for good.
* Fix #6153Renato Botelho2017-01-121-0/+4
| | | | | | Initialize cached IP and Time on loop for RFC2136 items, without this the items used on last loop iteration will be used again and second item on the same interface will not be updated
* RAM Disk ManagementNOYB2017-01-081-33/+0
| | | | | | | | | | | | | | | 1) Treat the RAM disk more like a permanent storage device with content managed/restored by the system and made available at boot up, before needed by any services. a) Handle saving and restoring RAM disk content at reboot/shutdown/boot centrally in more of a system manged fashion. b) If it's in the RAM disk store it gets restored early in the pfSense startup so it's available for whatever needs to use it. c) Services utilizing RAM disk don't need to be aware that their content is on a RAM disk, and handling content restore individually. 2) Has the benefit of eliminating some issues with the previous code as well. Such as... a) Restoring RRD multiple times during boot, potentially at least 3 times, by rc.newwanip, rc.newwanipv6, and rc.boot. Some even overlapping. b) Not removing the backups if/when not being utilized. Such as on a full install with the RAM disk option not enabled. c) Eliminate some duplicate code. 3) Looking forward. a) The more centrally system managed approach may crack the door open to making it easier to include some of the logs in the RAM disk store. As well as anything else that may be useful/desirable to retain in the RAM disk across reboots.
* Don't allow SNMP hostres module to be selected or used with VMware VMs that ↵jim-p2017-01-071-1/+2
| | | | have a CD/DVD Drive device. Fixes #6882
* Handle the RA Search Domain List when writing out the RADVD config. Fixes #7081jim-p2017-01-051-2/+14
|
* Merge pull request #3132 from WorldTech-Solutions/masterRenato Botelho2017-01-041-0/+1
|\
| * Added support for CloudFlares Proxy.CarlGill2016-10-081-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Included a checkbox to enable and disable this feature when CloudeFlare type is selected. Included proxied variable in the update script as well. Defaults to false, as the is the current functionality Added help text Updated Last tested date Hope this helps other people. I use both dynDNS and the Proxy service. And by default without this feature, the proxy gets disabled. This is a huge problem, as I have all traffic blocked except for CloudFlare. And because I have certain other security features enabled, when the Proxy goes disabled, The Site goes down hard to end users. With this feature, I can ensure the proxy stays enabled.
* | Break some long lines, no functional changesRenato Botelho2017-01-031-27/+70
| |
* | Rework logic and reduce indent levels. No functional changesRenato Botelho2017-01-031-141/+148
| |
* | Fix #6357: Validate if RFC2136 dyndns updates succeededRenato Botelho2017-01-031-10/+25
| |
* | Merge pull request #3307 from blkeller/ignore-client-uidsRenato Botelho2016-12-271-0/+5
|\ \
| * | Add new "Ignore client identifiers" DHCP featureBrett Keller2016-12-221-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Exposes the underlying dhcpd configuration option "ignore-client-uids" in the pfSense "Services / DHCP Server" GUI by adding an "Ignore client identifiers" checkbox. As of ISC dhcpd version 4.3.0+, there is a new configuration statement available, "ignore-client-uids". According to the ISC's documentation, "If the 'ignore-client-uids' statement is present and has a value of 'true' or 'on', the UID for clients will not be recorded." While this behavior does not strictly adhere to the DHCP specification, it can be very useful in environments where devices on the network dual boot or PXE boot. Normally, if the network stacks in a single device's different operating systems (including PXE firmware) make DHCP requests with differing client identifiers, the server will treat each request with a unique identifier as having come from a unique client, even when they come from the same device. Thus, different operating systems on the same device and NIC might hold different leases with different IP addresses. Once activated, the "ignore-client-uids" option tells the DHCP server not to record client identifiers in new DHCP leases, which forces the server to fall back on hardware (MAC) addresses to uniquely identify clients. Now different operating systems on the same device and NIC will hold the same lease (based on MAC address), which should keep a device's IP address consistent regardless of its currently running operating system. Same as with most other general and pool-specific DHCP server options in pfSense, note that turning on this option only affects new leases. Any leases that existed prior to enabling this option will still contain their respective client identifiers. Manually deleting older leases or flushing the entire lease table can expedite a full migration to the new server behavior, if desired.
* | | Fix #3560 correctly handle disabled static routesPhil Davis2016-12-271-1/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 1) util.inc - add parameter to get_staticroutes() so the caller can choose to see all static routes or only the ones that are currently enabled. 2) filter.inc - just process enabled static routes when making direct networks list, tonathosts etc. 3) services.inc - only include enabled static routes when making confogs for DHCP(6) Relay. 4) unbound.inc - only include enable static routes in unbound_acls_config 5) rc.newroutedns - only trigger if there is an enabled static route. Note: GUI validation has been left as-is. e.g. in system_gateways we don not allow to delete a gateway if there is a disabled static route using it... If people want to delete "higher level" stuff, then they need to first delete the disabled static route(s). Otherwise it will get rather "risky" having disabled static routes in the config that refer to gateways that no longer exist, or have a subnet range that now matches a local interafce or...
* | | Save the igmpproxy configuration in /var/etc and not on /tmp.Luiz Otavio O Souza2016-12-231-3/+3
|/ /
* | Populate the HTTP_PROXY_AUTH env var. Ticket #6949jim-p2016-12-071-0/+4
| |
* | Fix indentjim-p2016-12-021-1/+1
| |
* | Merge pull request #3145 from skrude61/masterjim-p2016-12-021-7/+17
|\ \
| * | Allow snmpd to bind to multiple interfaces.skrude612016-09-201-7/+17
| | |
* | | Create a dummy /etc/printcap when starting bsnmpd so it it will not log ↵jim-p2016-12-021-0/+5
| | | | | | | | | | | | errors. Fixes #6838
* | | Removed TODO commentRoss Williams2016-11-301-1/+0
| | |
* | | Put DDNS hostname config in the wrong placeRoss Williams2016-11-291-6/+4
| | | | | | | | | | | | It is relevant to the interface, not just the per-static-mapping DDNS config.
* | | Implement ddns-hostname option emission for static hosts in services.inc.Ross Williams2016-11-291-0/+6
| | |
* | | - added support for duiadns.net ipv4 and ipv6Ionut2016-11-251-2/+2
| | |
* | | Merge pull request #3223 from filnko/patch-1Renato Botelho2016-11-251-2/+2
|\ \ \
| * | | add All-Inkl to services.classChristoph Filnkößl2016-11-121-2/+2
| | | |
* | | | Remove config files symlinks from /etc to /var/etc. Fixes #5538Renato Botelho2016-11-211-1/+1
| | | |
* | | | Revert "Apply the fix for ticket #6589 also into dhcpdv6 config"Renato Botelho2016-11-181-1/+0
| | | | | | | | | | | | | | | | | | | | | | | | Reverted after upgrade dhcpd server to 4.3.5 This reverts commit 20350989db5d66ffb827beaed5ef5738cd62fc9d.
* | | | Revert "Set dhcp-cache-threshold to 0 to avoid a bug in dhcpd 4.3.x where it ↵Renato Botelho2016-11-181-1/+0
|/ / / | | | | | | | | | | | | | | | | | | | | | omits client-hostname where the cache threshold is reached. Ticket #6589" Removed after upgrade dhcpd server to 4.3.5 This reverts commit 318e0383829daac934424879ccfce09395e80025.
* | | Restore accidentally removed blockRenato Botelho2016-10-131-0/+16
| | | | | | | | | | | | | | | | | | | | | | | | | | | On dc61252ae the code used to restore dhcp6 leases when platform was nanobsd was removed, but this code is supposed to run on full install when it's configured to use MFS /tmp. Restored it, adjusting indent, and add the correct conditional to run on MFS /tmp Spotted-by: @phil-davis
* | | Deprecate nanobsd platform and remove all conditionals that uses itRenato Botelho2016-10-121-21/+2
| | |
* | | Remove all calls to conf_mount_r* functionsRenato Botelho2016-10-121-4/+0
| | |
* | | Fix #6768 IPv6 static mapping on delegated prefixesPhil Davis2016-09-121-6/+5
|/ / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | For example, WAN receives a /48 delegated from the upstream (ISP...), e.g. "2001:470:abcd::" pfSense then uses this as a starting point to calculate the addresses on LAN, OPT1, OPT2 etc where they have been specified asa "track interface WAN". Actually each local interface gets just a /64 taken out of the /48, using the chunk specified by "IPv6 Prefix Id" for that local interface. e.g. if "IPv6 Prefix Id" is set to "a1" on LAN, then the LAN would be: 2001:470:abcd:00a1::/64 Then when we specify a static-mapped address in LAN, or other things that live in LAN, e.g. "::4242" we mean 4242 on from the base LAN address, so "2001:470:abcd:00a1::4242" i.e. we always have a CIDR of 64 when calculating this stuff. We do not want the logic that was in this code that was using the upstream prefix delegation size (like /48). Note: The code in services.inc "worked" because var $ifname was not set, and so $trackifname was blank, $trackcfg was blank, and so the attempted calculation of $pdlen always came out as 64 anyway. That tricked me for a while trying to understand why the use in service.inc worked. system.inc did not work, because it actually claculated $pdlen and got a number like 48 - which actually we do not want here.
* | Move copyright from ESF to NetgateRenato Botelho2016-09-061-1/+1
|/
* Merge pull request #3103 from NewEraCracker/patch-7Renato Botelho2016-09-021-0/+4
|\
| * Ensure only one instance of services_dhcpd_configure runs concurrentlyNewEraCracker2016-08-201-0/+4
| | | | | | | | This way kill and respawn will behave as they should for the dhcpd processes
* | Merge pull request #3107 from NewEraCracker/patch-10Renato Botelho2016-08-291-0/+1
|\ \
| * | Apply the fix for ticket #6589 also into dhcpdv6 configNewEraCracker2016-08-201-0/+1
| |/
* | Merge pull request #3112 from phil-davis/patch-1Renato Botelho2016-08-291-1/+32
|\ \
| * | Indent dhcpd.conf option customPhil Davis2016-08-181-2/+2
| | |
| * | Fix #6720 DHCP options by poolPhil Davis2016-08-171-1/+32
| | | | | | | | | | | | It is a little bit tricky having to generate the unique "option custom-if-n-m code ..." lines at first where n = pool index and m = item index in the items of the pool. Then make sure to reference that later, getting the same pool index into the array of pools. The $all_pools array as the "overall" or "base" pool first (at index 0), followed by the user-specified pools at index 1, 2, 3,... - which are actually at indexes 0, 1, 2,... in the ordinary array of pools in the config. So the -1 at line 910 has to happen. But it works for me.
* | | Merge pull request #3110 from phil-davis/patch-2Renato Botelho2016-08-291-3/+0
|\ \ \ | |_|/ |/| |
| * | Fix double domain-name-servers for poolPhil Davis2016-08-161-3/+0
| |/ | | | | | | | | Add a pool and specify something in 1 or more of the DNS servers boxes for the pool. The "option domain-name-servers 1.2.3.4" line appears twice in dhcpd.conf The first bit of code to do it is at lines 787-799. I have deleted this 2nd time that it is done at lines 854-856.
* | Use "-C /dev/null" when starting dnsmasq to avoid it picking up an incorrect ↵jim-p2016-08-191-2/+2
|/ | | | default config which would override our command line parameters. Fixes #6730
* Fix DDNS domain for static map DHCP entriesPhil Davis2016-08-161-2/+2
| | | | If you specify DDNS Domain in a DHCP static map entry, it does not make its way through to dhcpd.conf This is because the var name $pdnscfg is wrong from an old copy-paste that first made this code.
OpenPOWER on IntegriCloud