Commit Graph

24219 Commits

Author SHA1 Message Date
Chris Buechler bd0b5d2dc7 Remove the minimum NIC warning, this dates back to when minimum 2 NICs were supported and it made sense to throw this message at people. It's obvious a network appliance requires at least one NIC. 2014-10-07 23:33:55 -05:00
Ermal b4bd9c56c1 Update the URL for snapshots update 2014-10-07 20:17:14 +02:00
Renato Botelho 86ce2df7fd Be more strict when checking if olsrd is enabled, otherwise when package is deinstalled and configuration is kept dhcpd will consider it's always as enabled 2014-10-07 14:44:54 -03:00
Phil Davis 3b5707db5b Support up to 4 DNS Servers in DHCP 2014-10-07 07:45:19 +05:45
Phil Davis 81af6a0830 Support up to 4 DNS Servers in DHCP 2014-10-07 07:44:04 +05:45
Phil Davis 3d88ea11f2 Support up to 4 DNS Servers in DHCP 2014-10-07 07:42:12 +05:45
Phil Davis 6190312f27 Support up to 4 DNS Servers in DHCP 2014-10-07 07:40:28 +05:45
Phil Davis 8cbb140a5c Support up to 4 DNS Servers in DHCP 2014-10-07 07:37:44 +05:45
Ermal a3cc8dcc60 Add an option to restart php-fpm from console 2014-10-06 18:05:50 +02:00
Ermal 9c29682669 Fixes #3909 Properly report and detect carp_status 2014-10-06 12:31:59 +02:00
Ermal 2d5fd3c23c Remove function that is not implemented properly. Nothing seems to use it. 2014-10-06 08:22:10 +00:00
Ermal 4aa7f542a3 Merge pull request #1303 from PiBa-NL/carp_without_matching_subnet 2014-10-06 08:21:24 +00:00
Ermal 042f0d12b3 Merge pull request #1304 from sselph/powerd_normal_mode 2014-10-06 08:16:46 +00:00
Ermal 78aadc148c Merge pull request #1305 from phil-davis/patch-2 2014-10-06 08:15:22 +00:00
Phil Davis fb0a4e7a0e Fix not rules for OPTn network case
Reported in forum https://forum.pfsense.org/index.php?topic=82319.0
The "if (is_subnet($src)) ... filter_address_add_vips_subnets" code needs to go outside all of the if that checks for opt interfaces (not just in the else part). That makes filter_address_add_vips_subnets get called in all cases, including when optn network is specified. (line 2264, 2265)
Then filter_address_add_vips_subnets needs to process the "not" code early, before checking if there are any VIPs (which was causing the routine to exit early in simple cases) - lines 2093-2100 chunk. This should also fix cases of using "LANnet", "WANnet" and "not" in rules on an interface that has just a plain address (no VIPs).
Lines 2144 and 2158 are no functional change. The formatting of the multi-line statement was odd, so I put it back all on 1 line.
2014-10-06 10:33:10 +05:45
Steven Selph 3d77cc359f Add powerd normal mode flag (-n) 2014-10-05 18:35:08 -04:00
Renato Botelho 4665dbdd51 Make proper check if IP address is configured on another interfaces and ignore current one. It fixes #3807 2014-10-03 12:15:44 -03:00
Chris Buechler 3c4fc30bea get back to our standard RFC-defined capitalization of IPsec 2014-10-02 16:19:58 -05:00
PiBa-NL 80a261a27e CARP, allow carp ip to be outside interface and alias subnets (FreeBSD10 feature) 2014-10-02 22:56:06 +02:00
Renato Botelho 3258d44276 Merge pull request #1300 from jean-m-cyr/master 2014-10-02 17:09:35 -03:00
Renato Botelho 90a430c7b7 Merge pull request #1298 from PiBa-NL/vips_sort 2014-10-02 17:09:31 -03:00
PiBa-NL 8d3c338e5c firewall_virtual_ip make the table sortable remove double tfoot, but use 2 tr inside. 2014-10-02 22:01:54 +02:00
jim-p d4f4ebc7e3 Remove stray 'i'.
Reported-by: https://forum.pfsense.org/index.php?topic=82393.0
2014-10-01 13:06:50 -04:00
Jean Cyr c7fa58acbb Fix up NTP status page formatting
Number of columns is not the same for all table rows
2014-09-28 23:35:10 -04:00
PiBa-NL 547d76411e firewall_virtual_ip make the table sortable 2014-09-28 22:56:16 +02:00
Phil Davis 762a7b8947 Spelling 2014-09-28 21:08:48 +05:45
Renato Botelho e7b03bc1f4 Merge pull request #1295 from phil-davis/patch-21 2014-09-27 16:17:13 -03:00
Phil Davis 6b18c66b51 Clarify bracketing
to minimize risk of a problem when adding code here in the future.
2014-09-27 23:04:02 +05:45
Phil Davis 055a43d235 Allow extended alias inputs #3890
Currently if you enter a space-separated list of subnets in the IP address box when entering an alias, the code reports that the data is invalid. But it does actually expand the list of subnets into multiple rows, and enters the various subnet CIDRs into the CIDR column for the user. The user can press Save a second time and the data is now valid so the code saves it happily. This is rather odd, as reported in redmine #3890.
Also, if you input an IP range (e.g. 192.168.20.0-192.168.20.30) plus description and in the 2nd row put some other subnet and description, the range is correctly expanded, but the description only appears against the 1st subnet of the range. The description from the 2nd row ends up as the description against the 2nd subnet of the range, and the rest of the descriptions are blank. i.e. the descriptions do not get copied and pushed down as the IP ranges are expanded.
This change fixes all that stuff by first parsing the posted data and expanding any IP ranges and/or space-separated lists, building arrays that have all their entries lined up:
$input_addresses[]
$input_address_subnet[]
$final_address_details[]
which are then validated.

This is for master (2.2) branch. Actually it was not too difficult to integrate.
2014-09-27 22:55:00 +05:45
Phil Davis da7f658862 Spelling 2014-09-27 17:53:17 +05:45
Phil Davis ff5fa75992 Spelling 2014-09-27 17:49:54 +05:45
Phil Davis 3c4cddc748 Spelling 2014-09-27 17:47:11 +05:45
Phil Davis 0a97a7bb31 Spelling 2014-09-27 17:44:03 +05:45
Phil Davis 51dc66c953 Spelling 2014-09-27 17:36:36 +05:45
Phil Davis ec074a86a5 Spelling 2014-09-27 17:34:17 +05:45
Phil Davis f64b0b8e1d Spelling 2014-09-27 17:32:28 +05:45
Phil Davis 15c58806a5 Spelling 2014-09-27 17:30:33 +05:45
Phil Davis abe6317615 Spelling 2014-09-27 17:23:35 +05:45
Phil Davis fb3b7640ff Spelling 2014-09-27 17:22:13 +05:45
Phil Davis 4304dd978e Spelling 2014-09-27 17:20:51 +05:45
Phil Davis 8913533d29 Spelling 2014-09-27 17:19:17 +05:45
Phil Davis 47e1f0d487 Spelling 2014-09-27 17:11:01 +05:45
Renato Botelho 45cd176a2b Merge pull request #1293 from phil-davis/patch-20 2014-09-26 13:56:07 -03:00
Phil Davis bbd1f7834b firewall_aliases_edit UI text changes
If type URL Table then the heading "Description" on the 3rd column gets suppressed (I am not really sure why that is, since the description data entry box still appears - I guess someone intended that the data entry box itself also be suppressed, since URL Table takes just a single line entry, the overall description of the alias should be enough - no need for a per-line description.)
In any case, if the user then selects some other Alias Type, the "Description" heading on the 3rd column is not re-enabled.
This change fixes that.
I also implemented what is suggested in Redmine #3893 - making the 1st column heading say "IP or FQDN", "Network or FQDN". IMHO that looks fine on the UI and cannot do any harm. (and yes, the longer explanatory text  already tells the user that an FQDN is allowed in these cases.)
2014-09-26 22:03:21 +05:45
Renato Botelho ace5483e2a Merge pull request #1292 from phil-davis/patch-18 2014-09-26 07:13:53 -03:00
Phil Davis 62218b4dc4 Remove useless check for alias description matching an interface description
While looking at other checks in the code I noticed this check. It was not effective anyway, because the first line inside "if ($_POST)" below does
unset($input_errors);
which undoes this check anyway.

In any case the check is not relevant. For example I might have interface WAN with description (which is really the alternate/display name for an interface) as MYISP.

I cannot also have an Alias with name MYISP - that is checked for already later in the code.
But I can have an Alias with description MYISP - in the case of an Alias the description really is just helpful text for the user, it is the name that really counts for use in the pf configuration.
So the code is not needed.
2014-09-26 08:25:41 +05:45
Renato Botelho 7ea27b0d8b Be more strict on removing groups checking group id and group name, it avoids issues like happened to users on ticket #3856. While I'm here, replace GET by POST 2014-09-25 09:55:20 -03:00
Renato Botelho fbe0d6986a Be more strict on user removal checking array id and also username to avoid removing wrong users when browser back button is used. It should fix #3856 2014-09-25 09:29:57 -03:00
Renato Botelho e45e3bf48c Merge pull request #1290 from jean-m-cyr/master 2014-09-25 08:18:05 -03:00
Renato Botelho b4db2d0e24 Remove also old unbound startup script 2014-09-25 08:13:19 -03:00