From 25fec9b35a8e5c84778358100ca326b72ac3eec5 Mon Sep 17 00:00:00 2001 From: jim-p Date: Tue, 28 Sep 2010 11:12:37 -0400 Subject: Test before working on what could be an empty value, otherwise it ends up set and causing an unexpected duplication. Fixes duplicate groups when editing users, as reported here: http://forum.pfsense.org/index.php/topic,26612.0.html --- etc/inc/auth.inc | 2 ++ 1 file changed, 2 insertions(+) diff --git a/etc/inc/auth.inc b/etc/inc/auth.inc index f5c84d8..ac1e4ec 100644 --- a/etc/inc/auth.inc +++ b/etc/inc/auth.inc @@ -454,6 +454,8 @@ function local_user_set_groups($user, $new_groups = NULL ) { foreach ($cur_groups as $groupname) { if (in_array($groupname,$new_groups)) continue; + if (!isset($config['system']['group'][$groupindex[$groupname]])) + continue; $group = & $config['system']['group'][$groupindex[$groupname]]; if (is_array($group['member'])) { $index = array_search($user['uid'], $group['member']); -- cgit v1.1 From 2f13b10c145bb9677adcd91745870f036190d1a7 Mon Sep 17 00:00:00 2001 From: jim-p Date: Tue, 28 Sep 2010 18:29:25 -0400 Subject: Carry aliases around as a global so that discover_pkg_rules() can see aliases/macros, otherwise package rules that reference aliases/macros will never properly pass verification. --- etc/inc/filter.inc | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/etc/inc/filter.inc b/etc/inc/filter.inc index 4ddece2..9924e7e 100644 --- a/etc/inc/filter.inc +++ b/etc/inc/filter.inc @@ -172,7 +172,7 @@ function filter_delete_states_for_down_gateways() { /* reload filter sync */ function filter_configure_sync() { global $config, $g, $after_filter_configure_run, $FilterIflist; - global $time_based_rules, $filterdns; + global $time_based_rules, $filterdns, $aliases; /* Use config lock to not allow recursion and config changes during this run. */ $filterlck = lock('config'); @@ -1093,7 +1093,7 @@ function filter_nat_rules_generate_if($if, $src = "any", $srcport = "", $dst = " } function filter_nat_rules_generate() { - global $config, $g, $after_filter_configure_run, $FilterIflist, $GatewaysList; + global $config, $g, $after_filter_configure_run, $FilterIflist, $GatewaysList, $aliases; $natrules = "nat-anchor \"natearly/*\"\n"; @@ -2687,7 +2687,7 @@ EOD; } function discover_pkg_rules($ruletype) { - global $config, $g; + global $config, $g, $aliases; /* Bail if there is no pkg directory, or if the package files might be out of sync. */ if(!is_dir("/usr/local/pkg") || file_exists('/conf/needs_package_sync')) @@ -2705,7 +2705,7 @@ function discover_pkg_rules($ruletype) { if(function_exists($pkg_generate_rules)) { update_filter_reload_status("Processing early {$ruletype} rules for package {$pkg_inc}"); $tmprules = $pkg_generate_rules("$ruletype"); - file_put_contents("{$g['tmp_path']}/rules.test.packages", $tmprules); + file_put_contents("{$g['tmp_path']}/rules.test.packages", $aliases . $tmprules); $status = mwexec("/sbin/pfctl -nf {$g['tmp_path']}/rules.test.packages"); if ($status <> 0) { $errorrules = "There was an error while parsing the package filter rules for {$pkg_inc}.\n"; -- cgit v1.1 From 8d1cd2db1ea9b37d08888a9cf5b76ee9e2453fe7 Mon Sep 17 00:00:00 2001 From: jim-p Date: Tue, 28 Sep 2010 18:31:38 -0400 Subject: Use a glob here instead of a shell exec. --- etc/inc/filter.inc | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/etc/inc/filter.inc b/etc/inc/filter.inc index 9924e7e..685fbb3 100644 --- a/etc/inc/filter.inc +++ b/etc/inc/filter.inc @@ -2694,10 +2694,8 @@ function discover_pkg_rules($ruletype) { return ""; $rules = ""; - $files = split("\n", trim(`ls /usr/local/pkg/*.inc`)); + $files = glob("/usr/local/pkg/*.inc"); foreach($files as $pkg_inc) { - if($pkg_inc == "ls: No match.") - continue; update_filter_reload_status("Checking for {$ruletype} PF hooks in package {$pkg_inc}"); require_once($pkg_inc); $pkg = basename($pkg_inc, ".inc"); -- cgit v1.1 From 59fe0814ccb28e912dc3967951563c7f3adb8755 Mon Sep 17 00:00:00 2001 From: jim-p Date: Tue, 28 Sep 2010 18:39:07 -0400 Subject: Define and explain $aliases as a global. --- etc/inc/filter.inc | 3 +++ 1 file changed, 3 insertions(+) diff --git a/etc/inc/filter.inc b/etc/inc/filter.inc index 685fbb3..80e1d46 100644 --- a/etc/inc/filter.inc +++ b/etc/inc/filter.inc @@ -57,6 +57,9 @@ $GatewaysList = array(); /* Used for the hostname dns resolver */ $filterdns = ""; +/* Used for aliases and interface macros */ +$aliases = ""; + function flowtable_configure() { global $config, $g; return; -- cgit v1.1 From 727b04dfb73feaacc320fe7c6757ca1bcd4a68fd Mon Sep 17 00:00:00 2001 From: Erik Fonnesbeck Date: Tue, 28 Sep 2010 22:02:36 -0600 Subject: Revert "Remove unnecessary JS variable" - it had a purpose. This reverts commit ec325889dc8a9a9ee4476bea6cb17cc4b63e28fe. --- usr/local/www/javascript/firewall_nat_edit/firewall_nat_edit.js | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/usr/local/www/javascript/firewall_nat_edit/firewall_nat_edit.js b/usr/local/www/javascript/firewall_nat_edit/firewall_nat_edit.js index e75e192..9f21c2b 100644 --- a/usr/local/www/javascript/firewall_nat_edit/firewall_nat_edit.js +++ b/usr/local/www/javascript/firewall_nat_edit/firewall_nat_edit.js @@ -1,6 +1,7 @@ Date: Wed, 29 Sep 2010 00:38:45 -0600 Subject: Fix input validation with "no rdr" for ticket #570 --- usr/local/www/firewall_nat_edit.php | 31 +++++++++++++++++++++---------- 1 file changed, 21 insertions(+), 10 deletions(-) diff --git a/usr/local/www/firewall_nat_edit.php b/usr/local/www/firewall_nat_edit.php index c1dfaf7..c6c50a5 100755 --- a/usr/local/www/firewall_nat_edit.php +++ b/usr/local/www/firewall_nat_edit.php @@ -178,11 +178,11 @@ if ($_POST) { /* input validation */ if(strtoupper($_POST['proto']) == "TCP" or strtoupper($_POST['proto']) == "UDP" or strtoupper($_POST['proto']) == "TCP/UDP") { - $reqdfields = explode(" ", "interface proto dstbeginport dstendport localip"); - $reqdfieldsn = array(gettext("Interface"),gettext("Protocol"),gettext("Destination port from"),gettext("Destination port to"),gettext("NAT IP")); + $reqdfields = explode(" ", "interface proto dstbeginport dstendport"); + $reqdfieldsn = array(gettext("Interface"),gettext("Protocol"),gettext("Destination port from"),gettext("Destination port to")); } else { - $reqdfields = explode(" ", "interface proto localip"); - $reqdfieldsn = array(gettext("Interface"),gettext("Protocol"),gettext("NAT IP")); + $reqdfields = explode(" ", "interface proto"); + $reqdfieldsn = array(gettext("Interface"),gettext("Protocol")); } if ($_POST['srctype'] == "single" || $_POST['srctype'] == "network") { @@ -193,6 +193,10 @@ if ($_POST) { $reqdfields[] = "dst"; $reqdfieldsn[] = gettext("Destination address"); } + if (!isset($_POST['nordr'])) { + $reqdfields[] = "localip"; + $reqdfieldsn[] = gettext("Redirect target IP"); + } do_input_validation($_POST, $reqdfields, $reqdfieldsn, &$input_errors); @@ -205,8 +209,8 @@ if ($_POST) { $_POST['dstendport'] = 0; } - if (($_POST['localip'] && !is_ipaddroralias($_POST['localip']))) { - $input_errors[] = sprintf(gettext("\"%s\" is not valid NAT IP address or host alias."), $_POST['localip']); + if (!isset($_POST['nordr']) && ($_POST['localip'] && !is_ipaddroralias($_POST['localip']))) { + $input_errors[] = sprintf(gettext("\"%s\" is not a valid redirect target IP address or host alias."), $_POST['localip']); } if ($_POST['srcbeginport'] && !is_portoralias($_POST['srcbeginport'])) @@ -218,7 +222,7 @@ if ($_POST) { if ($_POST['dstendport'] && !is_portoralias($_POST['dstendport'])) $input_errors[] = sprintf(gettext("%s is not a valid end destination port. It must be a port alias or integer between 1 and 65535."), $_POST['dstendport']); - if ($_POST['localbeginport'] && !is_portoralias($_POST['localbeginport'])) { + if (!isset($_POST['nordr']) && $_POST['localbeginport'] && !is_portoralias($_POST['localbeginport'])) { $input_errors[] = sprintf(gettext("%s is not a valid local port. It must be a port alias or integer between 1 and 65535."), $_POST['localbeginport']); } @@ -259,7 +263,7 @@ if ($_POST) { } if (!$input_errors) { - if (($_POST['dstendport'] - $_POST['dstbeginport'] + $_POST['localbeginport']) > 65535) + if (!isset($_POST['nordr']) && ($_POST['dstendport'] - $_POST['dstbeginport'] + $_POST['localbeginport']) > 65535) $input_errors[] = gettext("The target port range must be an integer between 1 and 65535."); } @@ -292,6 +296,11 @@ if ($_POST) { $natent['disabled'] = isset($_POST['disabled']) ? true:false; $natent['nordr'] = isset($_POST['nordr']) ? true:false; + if ($natent['nordr']) { + $_POST['associated-rule-id'] = ''; + $_POST['filter-rule-association'] = ''; + } + pconfig_to_address($natent['source'], $_POST['src'], $_POST['srcmask'], $_POST['srcnot'], $_POST['srcbeginport'], $_POST['srcendport']); @@ -302,8 +311,10 @@ if ($_POST) { $natent['protocol'] = $_POST['proto']; - $natent['target'] = $_POST['localip']; - $natent['local-port'] = $_POST['localbeginport']; + if (!$natent['nordr']) { + $natent['target'] = $_POST['localip']; + $natent['local-port'] = $_POST['localbeginport']; + } $natent['interface'] = $_POST['interface']; $natent['descr'] = $_POST['descr']; $natent['associated-rule-id'] = $_POST['associated-rule-id']; -- cgit v1.1 From 295764d5a887e853d1e74186e3462a8a64941674 Mon Sep 17 00:00:00 2001 From: Erik Fonnesbeck Date: Wed, 29 Sep 2010 02:05:46 -0600 Subject: Clean up Firewall: NAT: 1:1: Edit page. - Change order of fields to be more consistent with the old order and the order shown on the rule listing, placing more relevant fields nearer to the top. - Make appearance of source and destination fields consistent. - Add a description for external subnet. - Fix description of the subnet size. - Change default destination to any. - Remove VIP list from destination, since the router is not going to be the destination. (the order of binat's syntax is based on outbound NAT, not inbound) - Add a description for destination. --- usr/local/www/firewall_nat_1to1_edit.php | 49 ++++++++++++-------------------- 1 file changed, 18 insertions(+), 31 deletions(-) diff --git a/usr/local/www/firewall_nat_1to1_edit.php b/usr/local/www/firewall_nat_1to1_edit.php index f04c736..8532755 100755 --- a/usr/local/www/firewall_nat_1to1_edit.php +++ b/usr/local/www/firewall_nat_1to1_edit.php @@ -304,7 +304,16 @@ function typesel_change() { .
.
- + + + + +
+
+
+ + + > @@ -346,7 +355,7 @@ function typesel_change() {    - / + / - + - + @@ -394,25 +403,7 @@ function typesel_change() { - - - - - + @@ -431,13 +422,8 @@ function typesel_change() {
- - - - - -
- +
+
@@ -496,6 +482,7 @@ if($config['aliases']['alias'] <> "") var addressarray=new Array(); var oTextbox1 = new AutoSuggestControl(document.getElementById("external"), new StateSuggestions(addressarray)); + var oTextbox2 = new AutoSuggestControl(document.getElementById("src"), new StateSuggestions(addressarray)); var oTextbox3 = new AutoSuggestControl(document.getElementById("dst"), new StateSuggestions(addressarray)); //--> -- cgit v1.1 From 433ebfab75400133708adcdf48c3f5a9317cefab Mon Sep 17 00:00:00 2001 From: Vinicius Coque Date: Wed, 29 Sep 2010 11:00:53 -0300 Subject: Update serviceproviders.xml to a newer version --- .../serviceproviders.xml | 463 +++++++++++++++++++-- 1 file changed, 428 insertions(+), 35 deletions(-) diff --git a/usr/local/share/mobile-broadband-provider-info/serviceproviders.xml b/usr/local/share/mobile-broadband-provider-info/serviceproviders.xml index 5429421..a7222c3 100644 --- a/usr/local/share/mobile-broadband-provider-info/serviceproviders.xml +++ b/usr/local/share/mobile-broadband-provider-info/serviceproviders.xml @@ -58,6 +58,27 @@ conceived. + + du + + + + + + + + + + + AWCC + + + + awcc + 1111 + + + @@ -148,11 +169,17 @@ conceived. + 3G Internet clarogprs clarogprs999 170.51.255.100 170.51.242.18 + + GPRS + clarogprs + clarogprs999 + @@ -250,7 +277,7 @@ conceived. - Three + Drei (3) Drei @@ -274,6 +301,18 @@ conceived. + Internode + + + + NodeMobile Data + + + Old NodeMobile Data (before 2009-08-26) + + + + Optus @@ -298,6 +337,11 @@ conceived. Telstra + + 125111 + 1258888 + *100# + 139.130.4.4 203.50.2.71 @@ -369,6 +413,13 @@ conceived. + + Crazy John's + + + + + @@ -832,6 +883,24 @@ conceived. + + + + Leo/UCom + + + + + + + Tempo/Africell + + + + + + + @@ -954,7 +1023,24 @@ conceived. WIND Mobile - + + Mobile Internet + + + Mobile Broadband + + + + + Mobilicity + + + + Mobile Web + + + Mobile Broadband + @@ -1388,6 +1474,17 @@ conceived. + Tchibo-Mobil + + + + + + Tagesflat / Monats-Flatrate L / Monats-Flatrate XL + + + + T-mobile (D1) @@ -1428,7 +1525,10 @@ conceived. - + + fonic + fonic + @@ -1537,6 +1637,32 @@ conceived. + + Alice + + + + Option Mobile + 193.189.244.225 + 193.189.244.206 + + + + + 1&1 + + + + + + + Mobile Broadband + + + Mobile Web + + + @@ -1546,13 +1672,16 @@ conceived. - Bredbånd + Bredbånd (standard) Bredbånd Premium Kontant - 3 (Mobil Abonnement) + 3 (standard for mobilkunder; spærret for indgående trafik) + + + 3 (statisk IP) @@ -1584,6 +1713,16 @@ conceived. + + + + CBB Mobil + + + + + + TDC @@ -1616,6 +1755,29 @@ conceived. + + + Telmore + + + + 194.239.134.83 + 193.162.153.164 + + + + + Unotel + + + + + + happiimobil + + + + @@ -2066,7 +2228,11 @@ conceived. - + 901 + + *#10# + 4444 + Contract o2web @@ -2107,6 +2273,12 @@ conceived. T-Mobile + 222 + + 150 + 150 + 150 + User mms @@ -2130,6 +2302,11 @@ conceived. Vodafone + 121 + + *#1345# + 2345 + Contract web @@ -2166,7 +2343,10 @@ conceived. - + 123 + + 453 + Contract orange @@ -2417,7 +2597,7 @@ conceived. T-Mobile - + 10.12.0.1 @@ -2438,7 +2618,7 @@ conceived. 38591 195.29.159.15 - + 3G 38591 38591 @@ -2447,28 +2627,47 @@ conceived. + + CARNet VIPNET + + + + AAIEDU + + + + + + CARNet Tele2 + + + + AAIEDU + + + + + + Tele2 + + + + 212.247.156.66 + + + - Pannon + Telenor - - átalánydíjas - 193.225.155.254 - 194.149.0.157 - - Normál - 193.225.153.17 - 195.56.172.113 - - - Tömörített - 193.225.153.17 - 194.149.0.157 + mobilinternet + 217.79.128.40 + 217.79.128.45 @@ -2518,6 +2717,15 @@ conceived. + + Invitel + + + + net.and.go + + + @@ -2593,6 +2801,9 @@ conceived. O2 + + *#100# + Contract gprs @@ -2669,7 +2880,8 @@ conceived. Orange - + + 3G Internet 158.43.192.1 158.43.128.1 @@ -2679,7 +2891,7 @@ conceived. Pelephone - + 3G pcl@3g pcl @@ -3054,6 +3266,26 @@ conceived. + + + + همراه اول + + + + + + + + ایرانسل + + + + + + + + @@ -3143,10 +3375,10 @@ conceived. - Standard + Ricaricabile - Tre.Dati + Abbonamento @@ -3168,6 +3400,15 @@ conceived. + + CoopVoce + + + + Internet Mobile + + + @@ -3352,11 +3593,22 @@ conceived. - Econet + yu (Econet) + + + Orange + + + + + + Orange Fixed Plus + + @@ -3793,7 +4045,22 @@ conceived. T-Mobile - + + Mobile Broadband + 38267 + 38267 + + + GPRS + 38267 + 38267 + + + Postpaid (old) + + + Prepaid (old) + @@ -3921,7 +4188,6 @@ conceived. webgprs webgprs2002 - 148.233.151.245 @@ -4169,7 +4435,10 @@ conceived. XS4ALL Mobiel Internet - + + xs4all + xs4all + @@ -4216,6 +4485,10 @@ conceived. Telenor + + 220 + 222 + 212.17.131.3 148.122.161.2 @@ -4413,6 +4686,17 @@ conceived. + + + + Vini + + + + + + + @@ -4596,10 +4880,22 @@ conceived. + + Clix + + + + + + Optimus + + 3G + + GPRS 194.79.69.129 @@ -4609,6 +4905,8 @@ conceived. + tmn + tmn 194.65.3.20 194.65.3.21 @@ -4775,6 +5073,18 @@ conceived. + + + + MTN + + + + + + + + @@ -5158,6 +5468,10 @@ conceived. + + *111# + 211 + Mobilt Internet @@ -5214,7 +5528,10 @@ conceived. - + + *120# + *121# + @@ -5497,6 +5814,22 @@ conceived. + + + + Orange + + + + Internet Everywhere Prepaid + + + Internet Everywhere Professional + + + + + @@ -6102,6 +6435,7 @@ conceived. + @@ -6258,6 +6592,10 @@ conceived. Alltel + + + + @@ -6328,6 +6666,7 @@ conceived. + @@ -6362,6 +6701,7 @@ conceived. + @@ -6390,6 +6730,8 @@ conceived. + + @@ -6462,6 +6804,7 @@ conceived. + @@ -6528,6 +6871,19 @@ conceived. + + MTPCS (Cellular One) + + + + + + + Mid-Rivers Cellular + + + + @@ -6624,6 +6980,26 @@ conceived. + + Movilnet + + + + 200.44.32.12 + 200.11.248.12 + + + + + Movistar + + + + 200.35.65.3 + 200.35.65.4 + + + @@ -6632,7 +7008,7 @@ conceived. MobiFone - + mms mms @@ -6643,6 +7019,12 @@ conceived. + Mobile Internet + mms + mms + + + Mobile Broadband mms mms @@ -6663,7 +7045,12 @@ conceived. Viettel Mobile - + + Mobile Internet + + + D-com 3G + @@ -6674,7 +7061,13 @@ conceived. - E-Mobile + EVNTelecom/E-Mobile + + + + EVNTelecomNet + + evntelecom evntelecom -- cgit v1.1 From 5b3f9124df1c7c2d242d5dbad36a610836d0e3ec Mon Sep 17 00:00:00 2001 From: jim-p Date: Wed, 29 Sep 2010 13:08:53 -0400 Subject: Fix state sorting --- usr/local/www/diag_dump_states.php | 16 ++++++++++------ 1 file changed, 10 insertions(+), 6 deletions(-) diff --git a/usr/local/www/diag_dump_states.php b/usr/local/www/diag_dump_states.php index 108f138..a2009c9 100755 --- a/usr/local/www/diag_dump_states.php +++ b/usr/local/www/diag_dump_states.php @@ -126,7 +126,7 @@ include("head.inc"); $current_statecount=`pfctl -si | grep "current entries" | awk '{ print $3 }'`; ?> - +
-- cgit v1.1 From 9fd19334bf105ae1ad5604d4fea8cad48d3be293 Mon Sep 17 00:00:00 2001 From: gnhb Date: Thu, 30 Sep 2010 19:20:07 +0700 Subject: Don't refer to non-existent variable. Reported in forum http://forum.pfsense.org/index.php/topic,28643.0.html --- etc/inc/gwlb.inc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/etc/inc/gwlb.inc b/etc/inc/gwlb.inc index ab72831..4a5b306 100644 --- a/etc/inc/gwlb.inc +++ b/etc/inc/gwlb.inc @@ -478,7 +478,7 @@ function lookup_gateway_monitor_ip_by_name($name) { if(!is_ipaddr($gateway['monitor'])) return $gateway['gateway']; - return ($monitorip); + return $gateway['monitor']; } return (false); -- cgit v1.1 From bb849003af1824db6f89d5df1409e3d5ffe3e527 Mon Sep 17 00:00:00 2001 From: Ermal Date: Thu, 30 Sep 2010 15:14:32 +0000 Subject: Initialize variable properly. Handle the case when the interfaces select box is disabled and it will not be posted(Reported-by: ghnb --- usr/local/www/system_gateways_edit.php | 15 ++++++++++----- 1 file changed, 10 insertions(+), 5 deletions(-) diff --git a/usr/local/www/system_gateways_edit.php b/usr/local/www/system_gateways_edit.php index b9ea2fe..cc979a6 100755 --- a/usr/local/www/system_gateways_edit.php +++ b/usr/local/www/system_gateways_edit.php @@ -63,6 +63,7 @@ if (isset($_GET['dup'])) { } if (isset($id) && $a_gateways[$id]) { + $pconfig = array(); $pconfig['name'] = $a_gateways[$id]['name']; $pconfig['weight'] = $a_gateways[$id]['weight']; $pconfig['interface'] = $a_gateways[$id]['interface']; @@ -222,8 +223,6 @@ if ($_POST) { $gateway['descr'] = $_POST['descr']; if (is_ipaddr($_POST['monitor'])) $gateway['monitor'] = $_POST['monitor']; - else - unset($gateway['monitor']); if ($_POST['defaultgw'] == "yes" || $_POST['defaultgw'] == "on") { $i = 0; @@ -233,8 +232,7 @@ if ($_POST) { } $gateway['defaultgw'] = true; $reloadif = true; - } else - unset($gateway['defaultgw']); + } if ($_POST['latencylow']) $gateway['latencylow'] = $_POST['latencylow']; @@ -315,8 +313,15 @@ function show_advanced_gateway() {
@@ -145,13 +145,16 @@ include("head.inc");
- +
+ - - - - + + + + + + 0) { @@ -194,6 +197,7 @@ else { "; } ?> +
Router -> Destination");?> Router -> Destination");?>
- \n"; + } else + echo " "; echo "
- "; - echo "\n"; + Date: Thu, 30 Sep 2010 15:42:27 +0000 Subject: Remove support for this legacy code. The upgrade path handles this. --- etc/inc/interfaces.inc | 3 --- 1 file changed, 3 deletions(-) diff --git a/etc/inc/interfaces.inc b/etc/inc/interfaces.inc index d1d2fc0..a49c4da 100644 --- a/etc/inc/interfaces.inc +++ b/etc/inc/interfaces.inc @@ -2499,9 +2499,6 @@ function interface_configure($interface = "wan", $reloadall = false, $linkupeven } else if (substr($realif, 0, 4) == "ovpn") { /* XXX: Should be done anything?! */ } - - if (is_ipaddr($wancfg['gateway'])) - file_put_contents("{$g['tmp_path']}/{$realif}_router", $wancfg['gateway']); break; } -- cgit v1.1 From a63d867a9fe8eed2fbeec412e949e1580e21b32e Mon Sep 17 00:00:00 2001 From: Ermal Date: Thu, 30 Sep 2010 15:49:37 +0000 Subject: Catch up with gateway changes on static routes. --- usr/local/www/system_routes_edit.php | 12 +++--------- 1 file changed, 3 insertions(+), 9 deletions(-) diff --git a/usr/local/www/system_routes_edit.php b/usr/local/www/system_routes_edit.php index 9895d0e..96d24d5 100755 --- a/usr/local/www/system_routes_edit.php +++ b/usr/local/www/system_routes_edit.php @@ -182,15 +182,9 @@ include("head.inc");