summaryrefslogtreecommitdiffstats
path: root/usr/local/www
Commit message (Collapse)AuthorAgeFilesLines
* Improve processing of DNS server changesPhil Davis2014-02-151-8/+35
| | | | What a pain this was. The user can blank out a DNS server from a position in the middle of the list. e.g. they had all 4 entries previously filled, and then they blank out DNS server #3. The way the DNS servers are stored in the config, they are just the defined ones in an "un-indexed" array. So actually entries 1, 2 and 4 on the screen become 1st, 2nd and 3rd in the config. The selected gateways for 1, 2 and 4 then have to end up in positions 1, 2 and 3 to match the stored DNS servers. This fixes all that up, as well as allowing the user to leave a gateway selected against a blanked-out DNS server entry - in that case the whole entry is "removed/ignored".
* Enhanced validation of general DNS servers and gatewaysPhil Davis2014-02-141-8/+27
|
* Change string to "Maximum new connections per host / per second(s)"Daniel Aleksandersen2014-02-131-4/+4
| | | | | | | Clarifying the setting's meaning. As suggested by forum member "Senser" on https://forum.pfsense.org/index.php/topic,65472.msg356024.html#msg356024
* Catch a validation issue reported on the mailing list thread: IPv6 address ↵Ermal2014-02-111-2/+2
| | | | data validation from: Brian Candler. It prevents putting a subnet in the address field since it then breaks the whole filter generation process
* Fixup pkg_nochecksig optionjim-p2014-02-101-3/+3
|
* Fix for #3416Brian Candler2014-02-101-1/+1
| | | | | Correct javascript error which prevents PPP/PPPoE per-link settings from being displayed (bandwidth, MTU, MRU, MRRU).
* Make Local the default filter for Traffic GraphPhil Davis2014-02-081-1/+1
| | | to preserve the previous standard behavior that shows "Local" when Traffic Graph starts.
* Make Local the default filter for Traffic GraphPhil Davis2014-02-081-2/+5
| | | to preserve the old behavior, that it shows "Local" traffic when first started.
* Return all when all or remote is selected on Traffic GraphPhil Davis2014-02-081-6/+18
|
* Add specific permission for easyrule.jim-p2014-02-071-1/+8
|
* Remove this sort. It's unnecessary and causes problems when editing and ↵jim-p2014-02-071-10/+0
| | | | saving privileges, it can reorder users and cause edits to the wrong account.
* s/http/https/ for doc.pfsense.orgChris Buechler2014-02-072-4/+4
|
* Add support for signed PBI, help ticket #3365:Renato Botelho2014-02-071-0/+18
| | | | | | - Add an option to allow user to accept unsigned packages - The only missing part is public key, that needs to be added to /var/db/pbi/keys/pfSense.ssl
* Standardise LAN net displayPhil Davis2014-02-071-2/+2
|
* Standardise LAN net displayPhil Davis2014-02-071-2/+2
|
* Standardise LAN net displayPhil Davis2014-02-071-2/+2
| | | On the main firewall rules multi-rule display it shows "LAN net" "WAN net" etc. But on the edit screen it shows "LAN subnet" "WAN subnet" etc. Make the edit screen have the same text as the main screen - this has ben a source of enough little questions/queries on the forum.
* First swing at converting from racoon to StrongSWAN.Ermal2014-02-063-13/+0
| | | | | | | | | | | | | | | | | | | | | | It allows to use existing configurations on xml to generate StrongSWAN configurations. So its only IKEv1 * Missing support for dynamic ips(hostnames) - resolver plugin of StrongSWAN needs to be configured in strongswan.conf * Authentication plugin with pfSense authentication framework - New plugin almost completed * More testing hence this being pushed now to have more broader look TODO * Integrate IKEv2 * Move dynamic IP allocation to an SQLite backend * Provide more options in authenticating as a client(initiator) * Restrict interfaces where StrongSWAN listens for incoming connections to only those configured FUTUTE * Move all configuration to SQLite backend * Integrate more authentication scenarios of IKEv2
* Fix some wrong escapeshellarg() callsRenato Botelho2014-02-041-1/+1
|
* Simplify logic calling grep less times, as done on mail_reports.inc on 2c6efc9Renato Botelho2014-02-041-8/+4
|
* Use unlink_if_exists or @unlink to avoid PHP errors when file doesn't existRenato Botelho2014-02-041-2/+2
|
* Merge pull request #900 from Klaws--/patch-1Ermal Luçi2014-02-041-0/+1
|\ | | | | Added previously missing DSCP VA (requires kernel patch patch submitted ...
| * Added previously missing DSCP VA (requires kernel patch patch submitted by me)Klaws--2014-02-041-0/+1
| |
* | Add escapeshellarg() calls on exec parameters. While I'm here, replace some ↵Renato Botelho2014-02-048-27/+27
|/ | | | exec() calls by php functions like symlink, copy, unlink, mkdir
* Add link to Unbound under the menu item name of 'DNS Resolver'Warren Baker2014-01-311-0/+1
|
* Dig is no longer available, drill is now the toolWarren Baker2014-01-301-5/+5
|
* Some grammer fixes spotted by Phil DavisWarren Baker2014-01-302-2/+2
|
* Make sure ACLs are saved correctlyWarren Baker2014-01-291-19/+23
|
* Reference right service reconfig functionWarren Baker2014-01-291-8/+5
|
* More html formattingWarren Baker2014-01-291-199/+200
|
* FormattingWarren Baker2014-01-291-232/+262
|
* Table summary fixWarren Baker2014-01-291-1/+1
|
* Rename ACL fileWarren Baker2014-01-291-0/+0
|
* Add GUI components for UnboundWarren Baker2014-01-293-0/+1176
|
* Really fix #3376Phil Davis2014-01-271-3/+3
| | | Thanks to Grischa Zengel for spotting the semi-colon at the end of the "if" line that was the real cause. Please also back merge this to 2.1 branch.
* Fix openssl pathRenato Botelho2014-01-241-3/+3
|
* Revert "Fix #3350. Do not destroy an interface when it's being disabled"Renato Botelho2014-01-211-2/+4
| | | | | | | | Ermal reported issues when changes are made on VLAN parent interface with this patch. He did other changes and interface_configure() will now be able to re-create VLAN interface This reverts commit 5bc623536d8bb3b93e68a1b1535c9de582721a09.
* added input hidden with tracker valuebruno2014-01-161-4/+6
|
* ports ntp moved to sbin, followjim-p2014-01-151-3/+3
|
* updates to license.phpChris Buechler2014-01-131-79/+7
|
* Check for vertical bar at start or end of descriptionPhil Davis2014-01-071-2/+2
|
* Check for vertical bars in alias detail descriptionsPhil Davis2014-01-071-11/+45
| | | | The descriptions of each entry in an alias are stored in config.xml as a list delimited by "||". So you cannot have "||" in the actual description (or the description effectively splits into the next entry). Also you cannot start or end the description with "|" or it will be very confusing having the config with "|||" in it. This code validates all that sort of invalid input.
* Merge pull request #879 from phil-davis/masterRenato Botelho2014-01-071-2/+8
|\ | | | | Update reserved_keywords checks to match firewall_aliases_edit
| * Update reserved_keywords checks to match firewall_aliases_editPhil Davis2014-01-061-2/+8
| | | | | | | | | | firewall_aliases_import should have the same checks for reserved names as firewall_aliases_edit This code should really be in a function in a common include file, but which one is the appropriate one? For now I made the checks the same.
* | Add an option to force a gateway to be down, it fixes #2847Renato Botelho2014-01-063-2/+19
|/
* Merge pull request #871 from phildd/masterErmal Luçi2014-01-061-7/+23
|\ | | | | Dynamic DNS: List GWGs in Interface to send update from
| * DyndDNS edit: unset vars when no longer usedphildd2014-01-021-0/+4
| |
| * List GWGs in Interface to send update fromphildd2013-12-301-7/+19
| |
* | Bulk Import: fix copy-paste var name errorPhil Davis2014-01-051-1/+1
| |
* | Allow individual line descriptions on alias bulk importPhil Davis2014-01-051-15/+50
| | | | | | | | | | This enhancement allows the user to make a text file of IP addresses, IP subnets and/or IP ranges, like they have always been able to do, but with this they can put a description after each IP number and that description text will be saved in the alias. All existing functionality without specifying a description is unchanged, so it is backward-compatible. This is handy when having aliases that are on all my pfSense boxes, I can make 1 text file, bulk import it on every system and now include descriptions of each chunk of IP address space. Note: The artificial limit of 200 character descriptions is to catch the case where a user pastes a long list or IP addresses, but they are all on 1 line. An error message is given, rather than importing the 1st IP and considered the remaining ones as the description.
* | Generate a tracker id for the filter rules for now. Maybe for nat rules as well?Ermal2013-12-311-0/+4
|/
OpenPOWER on IntegriCloud