From 808614b15380f6e4129ee0737b4f628688a0003f Mon Sep 17 00:00:00 2001 From: Renato Botelho Date: Wed, 30 Jun 2010 19:30:58 -0300 Subject: Review firewall_aliases.php --- usr/local/www/firewall_aliases.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_aliases.php b/usr/local/www/firewall_aliases.php index 1e69efd..910cf43 100755 --- a/usr/local/www/firewall_aliases.php +++ b/usr/local/www/firewall_aliases.php @@ -147,7 +147,7 @@ if ($_GET['act'] == "del") { } } if($is_alias_referenced == true) { - $savemsg = sprintf(gettext("Cannot delete rule. Currently in use by %s"), $referenced_by); + $savemsg = sprintf(gettext("Cannot delete rule. Currently in use by %s"), $referenced_by); } else { unset($a_aliases[$_GET['id']]); write_config(); @@ -169,7 +169,7 @@ include("head.inc");

-You must apply the changes in order for them to take effect.");?> +" . gettext("You must apply the changes in order for them to take effect."));?> @@ -214,7 +214,7 @@ include("head.inc");
- +
">">">
-- cgit v1.1 From bd413d7682da8d97f6d9616a3725eb96d9cb1eb4 Mon Sep 17 00:00:00 2001 From: Renato Botelho Date: Wed, 30 Jun 2010 19:38:18 -0300 Subject: Review firewall_aliases_edit.php --- usr/local/www/firewall_aliases_edit.php | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_aliases_edit.php b/usr/local/www/firewall_aliases_edit.php index a7e50b6..43a8f4e 100755 --- a/usr/local/www/firewall_aliases_edit.php +++ b/usr/local/www/firewall_aliases_edit.php @@ -130,7 +130,7 @@ if ($_POST) { /* input validation */ $reqdfields = explode(" ", "name"); - $reqdfieldsn = array(",", gettext("Name")); + $reqdfieldsn = array(gettext("Name")); do_input_validation($_POST, $reqdfields, $reqdfieldsn, &$input_errors); @@ -138,10 +138,10 @@ if ($_POST) { if (!isset($x)) { $input_errors[] = gettext("Reserved word used for alias name."); } else if ($_POST['type'] == "port" && (getservbyname($_POST['name'], "tcp") || getservbyname($_POST['name'], "udp"))) { - $input_errors[] = gettext("Reserved word used for alias name.)"; + $input_errors[] = gettext("Reserved word used for alias name."); } else { if (is_validaliasname($_POST['name']) == false) - $input_errors[] = gettext("The alias name may only consist of the characters a-z, A-Z, 0-9, _."); + $input_errors[] = gettext("The alias name may only consist of the characters") . " a-z, A-Z, 0-9, _."; } /* check for name conflicts */ if (empty($a_aliases[$id])) { @@ -450,7 +450,7 @@ $urltable_help = sprintf(gettext("Enter a single URL containing a large number o $openvpn_str = gettext("Username"); $openvpn_user_str = gettext("OpenVPN Users"); $openvpn_help = gettext("Enter as many usernames as you wish."); -$openvpn_freq = gettext(""); +$openvpn_freq = ""; $jscriptstr .= <<
- + @@ -583,7 +583,7 @@ EOD; - + -- cgit v1.1 From 7e3e8416ecd553e4b3516529131d609ba6ee54dd Mon Sep 17 00:00:00 2001 From: Renato Botelho Date: Wed, 30 Jun 2010 19:41:17 -0300 Subject: Review firewall_aliases_import.php --- usr/local/www/firewall_aliases_import.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_aliases_import.php b/usr/local/www/firewall_aliases_import.php index 47a22d0..e23c78c 100755 --- a/usr/local/www/firewall_aliases_import.php +++ b/usr/local/www/firewall_aliases_import.php @@ -55,12 +55,12 @@ $a_aliases = &$config['aliases']['alias']; if($_POST['aliasimport'] <> "") { $reqdfields = explode(" ", "name aliasimport"); - $reqdfieldsn = array(",", gettext("Name,Aliases")); + $reqdfieldsn = array(gettext("Name"),gettext("Aliases")); do_input_validation($_POST, $reqdfields, $reqdfieldsn, &$input_errors); if (is_validaliasname($_POST['name']) == false) - $input_errors[] = gettext("The alias name may only consist of the characters a-z, A-Z, 0-9, _."); + $input_errors[] = gettext("The alias name may only consist of the characters") . " a-z, A-Z, 0-9, _."; /* check for name duplicates */ if (is_alias($_POST['name'])) @@ -133,7 +133,7 @@ include("head.inc");
- + -- cgit v1.1 From 3337063da2fcaa9494c1813bbd1147816ab44880 Mon Sep 17 00:00:00 2001 From: Renato Botelho Date: Wed, 30 Jun 2010 19:49:47 -0300 Subject: Review firewall_aliases_edit.php - part 2 --- usr/local/www/firewall_aliases_edit.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_aliases_edit.php b/usr/local/www/firewall_aliases_edit.php index 43a8f4e..7e67c4d 100755 --- a/usr/local/www/firewall_aliases_edit.php +++ b/usr/local/www/firewall_aliases_edit.php @@ -259,7 +259,7 @@ if ($_POST) { if (!is_ipaddr($_POST["address{$x}"]) && !is_hostname($_POST["address{$x}"]) && !is_iprange($_POST["address{$x}"])) - $input_errors[] = sprintf(gettext("%s is not a valid %s alias."), $_POST["address{$x}"], $_POST['type']; + $input_errors[] = sprintf(gettext("%s is not a valid %s alias."), $_POST["address{$x}"], $_POST['type']); } if (is_iprange($_POST["address{$x}"])) { list($startip, $endip) = explode('-', $_POST["address{$x}"]); -- cgit v1.1 From 7fcd0934b9ab90b08e483a77182ac904e68dad22 Mon Sep 17 00:00:00 2001 From: Renato Botelho Date: Wed, 30 Jun 2010 19:50:46 -0300 Subject: Review firewall_nat.php --- usr/local/www/firewall_nat.php | 40 ++++++++++++++++++++-------------------- 1 file changed, 20 insertions(+), 20 deletions(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_nat.php b/usr/local/www/firewall_nat.php index 55e73df..8d3a1fb 100755 --- a/usr/local/www/firewall_nat.php +++ b/usr/local/www/firewall_nat.php @@ -158,7 +158,7 @@ if (isset($_POST['del_x'])) { } } -$pgtitle = array(gettext("Firewall","NAT","Port Forward")); +$pgtitle = array(gettext("Firewall"),gettext("NAT"),gettext("Port Forward")); include("head.inc"); echo ""; @@ -174,7 +174,7 @@ echo "

-".gettext("You must apply the changes in order for them to take effect").".");?>
+".gettext("You must apply the changes in order for them to take effect."));?>
- - - - - - - - - + + + + + + + + + @@ -437,7 +437,7 @@ include("head.inc"); - +
@@ -305,7 +305,7 @@ echo "

-gettext("You must apply the changes in order for them to take effect."));?>
+You must apply the changes in order for them to take effect.");?>
@@ -323,15 +323,15 @@ include("head.inc");

Note:
-
gettext("If advanced outbound NAT is enabled, no outbound NAT - rules will be automatically generated any longer.") gettext("Instead, only the mappings - you specify below will be used.") gettext("With advanced outbound NAT disabled, +
If advanced outbound NAT is enabled, no outbound NAT + rules will be automatically generated any longer. Instead, only the mappings + you specify below will be used. With advanced outbound NAT disabled, a mapping is automatically created for each interface's subnet - (except WAN).") gettext("If you use target addresses other than the WAN interface's + (except WAN). If you use target addresses other than the WAN interface's IP address, then depending on the way your WAN connection is setup, you - may also need a") gettext("Virtual IP").
+ may also need a Virtual IP.

- gettext("You may enter your own mappings below.")

+ You may enter your own mappings below.

@@ -339,20 +339,20 @@ include("head.inc");

   gettext("Interface")gettext("Source")gettext("Source Port")gettext("Destination")gettext("Destination Port")gettext("NAT Address")gettext("NAT Port")gettext("Static Port")gettext("Description")InterfaceSourceSource PortDestinationDestination PortNAT AddressNAT PortStatic PortDescription - +
@@ -447,11 +447,11 @@ include("head.inc"); - + - +
diff --git a/usr/local/www/firewall_nat_out_edit.php b/usr/local/www/firewall_nat_out_edit.php index 5b22a00..df0487f 100755 --- a/usr/local/www/firewall_nat_out_edit.php +++ b/usr/local/www/firewall_nat_out_edit.php @@ -108,51 +108,51 @@ if ($_POST) { $pconfig = $_POST; /* input validation */ - $reqdfields = explode(" ", gettext("interface protocol source source_subnet destination destination_subnet")); - $reqdfieldsn = explode(",", gettext("Interface,Protocol,Source,Source bit count,Destination,Destination bit count")); + $reqdfields = explode(" ", "interface protocol source source_subnet destination destination_subnet"); + $reqdfieldsn = explode(",", "Interface,Protocol,Source,Source bit count,Destination,Destination bit count"); do_input_validation($_POST, $reqdfields, $reqdfieldsn, &$input_errors); if($_POST['sourceport'] <> "" && !is_port($_POST['sourceport'])) - $input_errors[] = gettext("You must supply either a valid port for the source port entry."); + $input_errors[] = "You must supply either a valid port for the source port entry."; if($_POST['dstport'] <> "" and !is_port($_POST['dstport'])) - $input_errors[] = gettext("You must supply either a valid port for the destination port entry."); + $input_errors[] = "You must supply either a valid port for the destination port entry."; if($_POST['natport'] <> "" and !is_port($_POST['natport'])) - $input_errors[] = gettext("You must supply either a valid port for the nat port entry."); + $input_errors[] = "You must supply either a valid port for the nat port entry."; if ($_POST['source_type'] != "any") { if ($_POST['source'] && !is_ipaddr($_POST['source']) && $_POST['source'] <> "any") { - $input_errors[] = gettext("A valid source must be specified."); + $input_errors[] = "A valid source must be specified."; } } if ($_POST['source_subnet'] && !is_numericint($_POST['source_subnet'])) { - $input_errors[] = gettext("A valid source bit count must be specified."); + $input_errors[] = "A valid source bit count must be specified."; } if ($_POST['sourceport'] && !is_numericint($_POST['sourceport'])) { - $input_errors[] = gettext("A valid source port must be specified."); + $input_errors[] = "A valid source port must be specified."; } if ($_POST['destination_type'] != "any") { if ($_POST['destination'] && !is_ipaddr($_POST['destination'])) { - $input_errors[] = gettext("A valid destination must be specified."); + $input_errors[] = "A valid destination must be specified."; } } if ($_POST['destination_subnet'] && !is_numericint($_POST['destination_subnet'])) { - $input_errors[] = gettext("A valid destination bit count must be specified."); + $input_errors[] = "A valid destination bit count must be specified."; } if ($_POST['destination_type'] == "any") { if ($_POST['destination_not']) { - $input_errors[] = gettext("Negating destination address of \"any\" is invalid."); + $input_errors[] = "Negating destination address of \"any\" is invalid."; } } if ($_POST['nonat'] && $_POST['staticnatport']) { - $input_errors[] = gettext("Static port cannot be used with No NAT."); + $input_errors[] = "Static port cannot be used with No NAT."; } if ($_POST['target'] && !is_ipaddr($_POST['target'])) { - $input_errors[] = gettext("A valid target IP address must be specified."); + $input_errors[] = "A valid target IP address must be specified."; } /* if user has selected any as source, set it here */ @@ -249,7 +249,7 @@ if ($_POST) { } } -$pgtitle = array(gettext("Firewall","NAT","Outbound","Edit")); +$pgtitle = array("Firewall","NAT","Outbound","Edit"); $closehead = false; include("head.inc"); @@ -304,14 +304,14 @@ function sourcesel_change() { - + + Enabling this option will disable NAT for traffic matching this rule and stop processing Outbound NAT rules. +
Hint: in most cases, you won't use this option.
@@ -325,8 +325,8 @@ function sourcesel_change() {
- gettext("Choose which interface this rule applies to.")
- gettext("Hint: in most cases, you'll want to use WAN here.")
+ Choose which interface this rule applies to.
+ Hint: in most cases, you'll want to use WAN here.
@@ -336,8 +336,8 @@ function sourcesel_change() { foreach ($protocols as $proto): ?> -
gettext("Choose which protocol this rule should match.")
- gettext("Hint: in most cases, you should specify any  here.")
+
Choose which protocol this rule should match.
+ Hint: in most cases, you should specify any  here.
@@ -355,13 +355,13 @@ function sourcesel_change() { - + @@ -371,11 +371,11 @@ blank for any)
gettext("Edit Advanced Outbound NAT entry")Edit Advanced Outbound NAT entry
Do not NAT > - gettext("Enabling this option will disable NAT for traffic matching this rule and stop processing Outbound NAT rules.") -
gettext("Hint: in most cases, you won't use this option.")
Interface
Protocol
Address:   /
 gettext("Enter the source network for the outbound NAT mapping.")Enter the source network for the outbound NAT mapping.
Source port:  
- gettext("Destination") + Destination > not
- gettext("Use this option to invert the sense of the match.")
+ Use this option to invert the sense of the match.

@@ -399,8 +399,8 @@ blank for any) - + @@ -411,13 +411,13 @@ any) - + - - - - - - - - - + + + + + + + + + @@ -423,9 +423,9 @@ include("head.inc"); -- cgit v1.1 From 72fae0711454187cf50b7e73c35f8e0df234129a Mon Sep 17 00:00:00 2001 From: Vinicius Coque Date: Fri, 2 Jul 2010 17:39:54 -0300 Subject: Implement gettext() calls on firewall_nat_out_edit.php --- usr/local/www/firewall_nat_out_edit.php | 122 ++++++++++++++++---------------- 1 file changed, 61 insertions(+), 61 deletions(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_nat_out_edit.php b/usr/local/www/firewall_nat_out_edit.php index df0487f..312af25 100755 --- a/usr/local/www/firewall_nat_out_edit.php +++ b/usr/local/www/firewall_nat_out_edit.php @@ -109,50 +109,50 @@ if ($_POST) { /* input validation */ $reqdfields = explode(" ", "interface protocol source source_subnet destination destination_subnet"); - $reqdfieldsn = explode(",", "Interface,Protocol,Source,Source bit count,Destination,Destination bit count"); + $reqdfieldsn = array(gettext("Interface"),gettext("Protocol"),gettext("Source"),gettext("Source bit count"),gettext("Destination"),gettext("Destination bit count")); do_input_validation($_POST, $reqdfields, $reqdfieldsn, &$input_errors); if($_POST['sourceport'] <> "" && !is_port($_POST['sourceport'])) - $input_errors[] = "You must supply either a valid port for the source port entry."; + $input_errors[] = gettext("You must supply either a valid port for the source port entry."); if($_POST['dstport'] <> "" and !is_port($_POST['dstport'])) - $input_errors[] = "You must supply either a valid port for the destination port entry."; + $input_errors[] = gettext("You must supply either a valid port for the destination port entry."); if($_POST['natport'] <> "" and !is_port($_POST['natport'])) - $input_errors[] = "You must supply either a valid port for the nat port entry."; + $input_errors[] = gettext("You must supply either a valid port for the nat port entry."); if ($_POST['source_type'] != "any") { if ($_POST['source'] && !is_ipaddr($_POST['source']) && $_POST['source'] <> "any") { - $input_errors[] = "A valid source must be specified."; + $input_errors[] = gettext("A valid source must be specified."); } } if ($_POST['source_subnet'] && !is_numericint($_POST['source_subnet'])) { - $input_errors[] = "A valid source bit count must be specified."; + $input_errors[] = gettext("A valid source bit count must be specified."); } if ($_POST['sourceport'] && !is_numericint($_POST['sourceport'])) { - $input_errors[] = "A valid source port must be specified."; + $input_errors[] = gettext("A valid source port must be specified."); } if ($_POST['destination_type'] != "any") { if ($_POST['destination'] && !is_ipaddr($_POST['destination'])) { - $input_errors[] = "A valid destination must be specified."; + $input_errors[] = gettext("A valid destination must be specified."); } } if ($_POST['destination_subnet'] && !is_numericint($_POST['destination_subnet'])) { - $input_errors[] = "A valid destination bit count must be specified."; + $input_errors[] = gettext("A valid destination bit count must be specified."); } if ($_POST['destination_type'] == "any") { if ($_POST['destination_not']) { - $input_errors[] = "Negating destination address of \"any\" is invalid."; + $input_errors[] = gettext("Negating destination address of \"any\" is invalid."); } } if ($_POST['nonat'] && $_POST['staticnatport']) { - $input_errors[] = "Static port cannot be used with No NAT."; + $input_errors[] = gettext("Static port cannot be used with No NAT."); } if ($_POST['target'] && !is_ipaddr($_POST['target'])) { - $input_errors[] = "A valid target IP address must be specified."; + $input_errors[] = gettext("A valid target IP address must be specified."); } /* if user has selected any as source, set it here */ @@ -249,7 +249,7 @@ if ($_POST) { } } -$pgtitle = array("Firewall","NAT","Outbound","Edit"); +$pgtitle = array(gettext("Firewall"),gettext("NAT"),gettext("Outbound"),gettext("Edit")); $closehead = false; include("head.inc"); @@ -304,17 +304,17 @@ function sourcesel_change() {
 gettext("Enter the destination network for - the outbound NAT mapping.")Enter the destination network for + the outbound NAT mapping.
Destination port:  
gettext("Translation")Translation @@ -451,7 +451,7 @@ any) @@ -461,18 +461,18 @@ any) - + - + +
You may enter a description here + for your reference (not parsed). -- cgit v1.1 From ff01cbffcfd663ad7485c889848563d01c0a38c7 Mon Sep 17 00:00:00 2001 From: Vinicius Coque Date: Fri, 2 Jul 2010 16:43:56 -0300 Subject: Implement gettext() calls on firewall_nat_out.php --- usr/local/www/firewall_nat_out.php | 78 +++++++++++++++++++------------------- 1 file changed, 39 insertions(+), 39 deletions(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_nat_out.php b/usr/local/www/firewall_nat_out.php index c4f21c1..efa49d3 100755 --- a/usr/local/www/firewall_nat_out.php +++ b/usr/local/www/firewall_nat_out.php @@ -108,7 +108,7 @@ if (isset($_POST['save']) && $_POST['save'] == "Save") { $natent = array(); $natent['source']['network'] = "{$osn}/{$ossubnet}"; $natent['dstport'] = "500"; - $natent['descr'] = "Auto created rule for ISAKMP - {$ifdesc} to {$ifdesc2}"; + $natent['descr'] = sprintf(gettext("Auto created rule for ISAKMP - %s to %s"),$ifdesc,$ifdesc2); $natent['target'] = ""; $natent['interface'] = $if2; $natent['destination']['any'] = true; @@ -118,7 +118,7 @@ if (isset($_POST['save']) && $_POST['save'] == "Save") { $natent = array(); $natent['source']['network'] = "{$osn}/{$ossubnet}"; $natent['dstport'] = "5060"; - $natent['descr'] = "Auto created rule for SIP - {$ifdesc} to {$ifdesc2}"; + $natent['descr'] = sprintf(gettext("Auto created rule for SIP - %s to %s"),$ifdesc,$ifdesc2); $natent['target'] = ""; $natent['interface'] = $if2; $natent['destination']['any'] = true; @@ -128,7 +128,7 @@ if (isset($_POST['save']) && $_POST['save'] == "Save") { $natent = array(); $natent['source']['network'] = "{$osn}/{$ossubnet}"; $natent['sourceport'] = ""; - $natent['descr'] = "Auto created rule for {$ifdesc} to {$ifdesc2}"; + $natent['descr'] = sprintf(gettext("Auto created rule for %s to %s"),$ifdesc,$ifdesc2); $natent['target'] = ""; $natent['interface'] = $if2; $natent['destination']['any'] = true; @@ -146,7 +146,7 @@ if (isset($_POST['save']) && $_POST['save'] == "Save") { $natent = array(); $natent['source']['network'] = "{$osn}/{$ossubnet}"; $natent['sourceport'] = ""; - $natent['descr'] = "Auto created rule for PPTP server"; + $natent['descr'] = gettext("Auto created rule for PPTP server"); $natent['target'] = ""; $natent['interface'] = $if2; $natent['destination']['any'] = true; @@ -165,7 +165,7 @@ if (isset($_POST['save']) && $_POST['save'] == "Save") { $natent = array(); $natent['source']['network'] = "{$osn}/{$ossubnet}"; $natent['sourceport'] = ""; - $natent['descr'] = "Auto created rule for PPPoE server"; + $natent['descr'] = gettext("Auto created rule for PPPoE server"); $natent['target'] = ""; $natent['interface'] = $if2; $natent['destination']['any'] = true; @@ -184,7 +184,7 @@ if (isset($_POST['save']) && $_POST['save'] == "Save") { $natent = array(); $natent['source']['network'] = "{$osn}/{$ossubnet}"; $natent['sourceport'] = ""; - $natent['descr'] = "Auto created rule for L2TP server"; + $natent['descr'] = gettext("Auto created rule for L2TP server"); $natent['target'] = ""; $natent['interface'] = $if2; $natent['destination']['any'] = true; @@ -198,7 +198,7 @@ if (isset($_POST['save']) && $_POST['save'] == "Save") { $natent = array(); $natent['source']['network'] = $ovpnsrv['tunnel_network']; $natent['sourceport'] = ""; - $natent['descr'] = "Auto created rule for OpenVPN server"; + $natent['descr'] = gettext("Auto created rule for OpenVPN server"); $natent['target'] = ""; $natent['interface'] = $if2; $natent['destination']['any'] = true; @@ -209,7 +209,7 @@ if (isset($_POST['save']) && $_POST['save'] == "Save") { } } - $savemsg = "Default rules for each interface have been created."; + $savemsg = gettext("Default rules for each interface have been created."); } break; } @@ -280,7 +280,7 @@ if (isset($_POST['del_x'])) { } -$pgtitle = array("Firewall","NAT","Outbound"); +$pgtitle = array(gettext("Firewall"),gettext("NAT"),gettext("Outbound")); include("head.inc"); ?> @@ -291,14 +291,14 @@ include("head.inc");

-You must apply the changes in order for them to take effect.");?>
+You must apply the changes in order for them to take effect."));?>

Address:  
  - gettext("Packets matching this rule will be mapped to the IP address given here.")
- gettext("If you want this rule to apply to another IP address than the IP address of the interface chosen above, - select it here (you need to define Virtual IP addresses on the first)"). - gettext("Also note that if you are trying to redirect connections on the LAN select the "any" option.") + Packets matching this rule will be mapped to the IP address given here.
+ If you want this rule to apply to another IP address than the IP address of the interface chosen above, + select it here (you need to define Virtual IP addresses on the first). + Also note that if you are trying to redirect connections on the LAN select the "any" option.
  - gettext("Enter the source port for the outbound NAT mapping.") + Enter the source port for the outbound NAT mapping.
Static-port:  
gettext("No XMLRPC Sync")No XMLRPC Sync >
- gettext("HINT: This prevents the rule from automatically syncing to other CARP members.") + HINT: This prevents the rule from automatically syncing to other CARP members.
gettext("Description")Description -
gettext("You may enter a description here - for your reference (not parsed).")
 
@@ -318,20 +318,20 @@ include("head.inc");

-
+ ">

Note:
-
If advanced outbound NAT is enabled, no outbound NAT - rules will be automatically generated any longer. Instead, only the mappings - you specify below will be used. With advanced outbound NAT disabled, - a mapping is automatically created for each interface's subnet - (except WAN). If you use target addresses other than the WAN interface's - IP address, then depending on the way your WAN connection is setup, you - may also need a Virtual IP.

+ .

- You may enter your own mappings below.

+

@@ -339,20 +339,20 @@ include("head.inc");
   InterfaceSourceSource PortDestinationDestination PortNAT AddressNAT PortStatic PortDescription - +
">
YES"; + echo "
" . gettext("YES") . "
"; else - echo "
NO
"; + echo "
" . gettext("NO") . "
"; ?>
@@ -434,11 +434,11 @@ include("head.inc"); - + - - + +
">
" height="17" type="image" width="17" border="0">" width="17" height="17" border="0">
@@ -447,11 +447,11 @@ include("head.inc");
- - + + - +
" border="0">" border="0">">
" border="0">" onclick="return confirm('')">
- + - + + +
- + +
+
- + - + - + - + - + - + +
@@ -1256,7 +1256,7 @@ include("head.inc"); ?>
- The Out selection is applied to traffic going out the interface the rule is created, In is the incoming one.
If you are creating a rule on the Floating tab if the direction is In then the same rules apply, if the direction is out the selections are reverted Out is for incoming and In is for outgoing and if you do not select any direction use only the In since the Out selection does not make sense in there to prevent oddities.");?>
+ ".gettext("The Out selection is applied to traffic going out the interface the rule is created, In is the incoming one.")."
".gettext("If you are creating a rule on the Floating tab if the direction is In then the same rules apply, if the direction is out the selections are reverted Out is for incoming and In is for outgoing and if you do not select any direction use only the In since the Out selection does not make sense in there to prevent oddities.");?>
-- cgit v1.1 From e336a1956bd1216add980f6af8a50308ee6d1114 Mon Sep 17 00:00:00 2001 From: Vinicius Coque Date: Fri, 2 Jul 2010 17:55:26 -0300 Subject: Fixing gettext() calls on firewall_shaper.php --- usr/local/www/firewall_shaper.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_shaper.php b/usr/local/www/firewall_shaper.php index 3365a08..a7d2e88 100755 --- a/usr/local/www/firewall_shaper.php +++ b/usr/local/www/firewall_shaper.php @@ -402,7 +402,7 @@ include("fbegin.inc");

-You must apply the changes in order for them to take effect."));?>
+".gettext("You must apply the changes in order for them to take effect."));?>

Edit Advanced Outbound NAT entry
Do not NAT > - Enabling this option will disable NAT for traffic matching this rule and stop processing Outbound NAT rules. -
Hint: in most cases, you won't use this option.
Interface
- Choose which interface this rule applies to.
- Hint: in most cases, you'll want to use WAN here.
Protocol
Choose which protocol this rule should match.
- Hint: in most cases, you should specify any  here.
+

+ "," ");?>
Source - + - + - + - - + +
Type:  :  
Address:  :   /
 Enter the source network for the outbound NAT mapping.
Source port:   (leave -blank for any):  
Destination > - not
- Use this option to invert the sense of the match.
+
+

- + - + - + - - + +
Type:  :  
Address:  :   /
 Enter the destination network for - the outbound NAT mapping.
Destination port:   (leave blank for -any):  
Translation - + - + - +
Address:  :  
  - Packets matching this rule will be mapped to the IP address given here.
- If you want this rule to apply to another IP address than the IP address of the interface chosen above, - select it here (you need to define Virtual IP addresses on the first). - Also note that if you are trying to redirect connections on the LAN select the "any" option. +
+ +
Port:  :  
  - Enter the source port for the outbound NAT mapping. +
Static-port:  :   >
No XMLRPC Sync >
- HINT: This prevents the rule from automatically syncing to other CARP members. +
Description -
You may enter a description here - for your reference (not parsed).
  - + " onclick="history.back()"> -- cgit v1.1 From fe71087774f2178acfe70d5c7a1f15092fe9e519 Mon Sep 17 00:00:00 2001 From: Vinicius Coque Date: Fri, 2 Jul 2010 17:55:08 -0300 Subject: Fixing gettext() calls on firewall_nat_out.php --- usr/local/www/firewall_nat_out.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_nat_out.php b/usr/local/www/firewall_nat_out.php index efa49d3..296fb4b 100755 --- a/usr/local/www/firewall_nat_out.php +++ b/usr/local/www/firewall_nat_out.php @@ -291,7 +291,7 @@ include("head.inc");

-You must apply the changes in order for them to take effect."));?>
+".gettext("You must apply the changes in order for them to take effect."));?>
Date: Fri, 2 Jul 2010 17:55:16 -0300 Subject: Fixing gettext() calls on firewall_rules_edit.php --- usr/local/www/firewall_rules_edit.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_rules_edit.php b/usr/local/www/firewall_rules_edit.php index 6e9d453..e4e9312 100755 --- a/usr/local/www/firewall_rules_edit.php +++ b/usr/local/www/firewall_rules_edit.php @@ -830,7 +830,7 @@ include("head.inc");

- This is usually random and almost never equal to the destination port range (and should usually be "any").
Hint: you can leave the 'to' field empty if you only want to filter a single port.");?>

+ This is usually random and almost never equal to the destination port range (and should usually be "any").")."
".gettext("Hint: you can leave the 'to' field empty if you only want to filter a single port.");?>

-- cgit v1.1 From a38cb9d06504842bf28cde4f89fe6f16f7e83cc5 Mon Sep 17 00:00:00 2001 From: Vinicius Coque Date: Fri, 2 Jul 2010 17:55:38 -0300 Subject: Fixing gettext() calls on firewall_shaper_vinterface.php --- usr/local/www/firewall_shaper_vinterface.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_shaper_vinterface.php b/usr/local/www/firewall_shaper_vinterface.php index 3028e12..8405186 100644 --- a/usr/local/www/firewall_shaper_vinterface.php +++ b/usr/local/www/firewall_shaper_vinterface.php @@ -348,7 +348,7 @@ include("fbegin.inc");

-You must apply the changes in order for them to take effect."));?>
+".gettext("You must apply the changes in order for them to take effect."));?>
-- cgit v1.1 From 3c7b2c1eb010d630b11826e98e8ca867ac257e35 Mon Sep 17 00:00:00 2001 From: Vinicius Coque Date: Fri, 2 Jul 2010 17:55:47 -0300 Subject: Fixing gettext() calls on firewall_virtual_ip.php --- usr/local/www/firewall_virtual_ip.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_virtual_ip.php b/usr/local/www/firewall_virtual_ip.php index 541a6ed..a4337b8 100755 --- a/usr/local/www/firewall_virtual_ip.php +++ b/usr/local/www/firewall_virtual_ip.php @@ -143,7 +143,7 @@ include("head.inc"); print_info_box($savemsg); else if (is_subsystem_dirty('vip')) - print_info_box_np(gettext("The VIP configuration has been changed.
You must apply the changes in order for them to take effect.")); + print_info_box_np(gettext("The VIP configuration has been changed.")."
".gettext("You must apply the changes in order for them to take effect.")); ?>
-- cgit v1.1 From 731df1afc9743c31c7b8e9a88d69d3bf18ec9777 Mon Sep 17 00:00:00 2001 From: Carlos Eduardo Ramos Date: Thu, 8 Jul 2010 13:29:35 -0300 Subject: Corrections gettext implementation on firewall_aliases_edit.php --- usr/local/www/firewall_aliases_edit.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_aliases_edit.php b/usr/local/www/firewall_aliases_edit.php index 6bad83e..ebae16a 100755 --- a/usr/local/www/firewall_aliases_edit.php +++ b/usr/local/www/firewall_aliases_edit.php @@ -561,7 +561,7 @@ EOD;
- + @@ -579,7 +579,7 @@ EOD;
- +
Host(s)
-- cgit v1.1 From 9dc65295522e548d02c6e2904aabc2d45056e652 Mon Sep 17 00:00:00 2001 From: Carlos Eduardo Ramos Date: Thu, 8 Jul 2010 13:33:55 -0300 Subject: Corrections gettext implementation on firewall_aliases.php --- usr/local/www/firewall_aliases.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_aliases.php b/usr/local/www/firewall_aliases.php index 910cf43..c06f6fa 100755 --- a/usr/local/www/firewall_aliases.php +++ b/usr/local/www/firewall_aliases.php @@ -159,7 +159,7 @@ if ($_GET['act'] == "del") { } } -$pgtitle = array("Firewall","Aliases"); +$pgtitle = array(gettext("Firewall"),gettext("Aliases")); include("head.inc"); ?> -- cgit v1.1 From 5e76292a1eca4fdcea18f495ad4895f0995cfe8f Mon Sep 17 00:00:00 2001 From: Carlos Eduardo Ramos Date: Thu, 8 Jul 2010 13:37:36 -0300 Subject: Corrections gettext implementation on firewall_aliases_import.php --- usr/local/www/firewall_aliases_import.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_aliases_import.php b/usr/local/www/firewall_aliases_import.php index e23c78c..76246a6 100755 --- a/usr/local/www/firewall_aliases_import.php +++ b/usr/local/www/firewall_aliases_import.php @@ -133,7 +133,7 @@ include("head.inc"); + -- cgit v1.1 From ebe08ebe448249c6e6efd28550d506f7fbb58205 Mon Sep 17 00:00:00 2001 From: Carlos Eduardo Ramos Date: Thu, 8 Jul 2010 13:51:24 -0300 Subject: Corrections gettext implementation on firewall_nat.php --- usr/local/www/firewall_nat.php | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) (limited to 'usr/local/www') diff --git a/usr/local/www/firewall_nat.php b/usr/local/www/firewall_nat.php index 8d3a1fb..4cab5d6 100755 --- a/usr/local/www/firewall_nat.php +++ b/usr/local/www/firewall_nat.php @@ -212,7 +212,7 @@ echo " -Table: +: - + @@ -126,14 +126,14 @@ Table: "; + echo ""; ?>

-
IP Address
No entries exist in this table.
" . gettext("No entries exist in this table.") . "
0) - echo "

Delete all entries in this table." + echo "

" . gettext("Delete") . " " . gettext("all") . " " . gettext("entries in this table."); ?> diff --git a/usr/local/www/diag_packet_capture.php b/usr/local/www/diag_packet_capture.php index bfdb52d..de314a9 100644 --- a/usr/local/www/diag_packet_capture.php +++ b/usr/local/www/diag_packet_capture.php @@ -35,7 +35,7 @@ ##|*MATCH=diag_packet_capture.php* ##|-PRIV -$pgtitle = array("Diagnostics", "Packet Capture"); +$pgtitle = array(gettext("Diagnostics"), gettext("Packet Capture")); require_once("guiconfig.inc"); require_once("pfsense-utils.inc"); @@ -64,7 +64,7 @@ if ($_POST) { } if ($_POST['startbtn'] != "" ) { - $action = "Start"; + $action = gettext("Start"); //delete previous packet capture if it exists if (file_exists($fp.$fn)) @@ -95,7 +95,6 @@ if ($_POST) { } else { $do_tcpdump = false; } -$pgtitle = "Diagnostics: Packet Capture"; include("head.inc"); ?> @@ -110,10 +109,10 @@ include("fbegin.inc"); - + - + - + - + - + - + - + - + @@ -190,14 +191,14 @@ include("fbegin.inc"); if ($processcheck != false) $processisrunning = true; - if (($action == "Stop" or $action == "") and $processisrunning != true) - echo " "; + if (($action == gettext("Stop") or $action == "") and $processisrunning != true) + echo " "; else { - echo " "; + echo " "; } if (file_exists($fp.$fn) and $processisrunning != true) { - echo ""; - echo "  (The packet capture file was last updated: " . date("F jS, Y g:i:s a.", filemtime($fp.$fn)) . ")"; + echo ""; + echo "  (" . gettext("The packet capture file was last updated") . ": " . date("F jS, Y g:i:s a.", filemtime($fp.$fn)) . ")"; } ?> @@ -207,7 +208,7 @@ include("fbegin.inc"); "; if ($processisrunning == true) - echo("Packet Capture is running.
"); + echo("" . gettext("Packet Capture is running.") . "
"); if ($do_tcpdump) { @@ -234,12 +235,12 @@ include("fbegin.inc"); $selectedif = convert_friendly_interface_to_real_interface_name($selectedif); - if ($action == "Start") { - echo("Packet Capture is running.
"); + if ($action == gettext("Start")) { + echo("" . gettext("Packet Capture is running.") . "
"); mwexec_bg ("/usr/sbin/tcpdump -i $selectedif $searchcount -s $packetlength -w $fp$fn $searchhost $searchport"); } else { //action = stop - echo("Packet Capture stopped.

Packets Captured:

"); + echo("" . gettext("Packet Capture stopped.") . "

" . gettext("Packets Captured") . ":

"); ?>
Packet capture
Interface
Host Address -
This value is either the Source or Destination IP address. The packet capture will look for this address in either field. -
This value can be a domain name or IP address. -
If you leave this field blank, all packets on the specified interface will be captured. +
+
+
Port -
The port can be either the source or destination port. The packet capture will look for this port in either field. -
Leave blank if you do not want to filter by port. +
+
Packet Length
Count -
This is the number of packets the packet capture will grab. Default value is 100.
Enter 0 (zero) for no count limit. +
" . gettext("Enter 0 (zero) for no count limit.");?>
Level of Detail -
This is the level of detail that will be displayed after hitting 'Stop' when the packets have been captured.
Note: This option does not affect the level of detail when downloading the packet capture. +
" . + gettext("Note") . ": " . + gettext("This option does not affect the level of detail when downloading the packet capture.");?>
Reverse DNS Lookup > -
This check box will cause the packet capture to perform a reverse DNS lookup associated with all IP addresses. -
Note: This option can cause delays for large packet captures. +
+
: