Ad Schellevis
12d174e79d
firewall/rule engine, keep some behaviour from legacy code as long as we're not sure wrong data can enter the config. for https://github.com/opnsense/core/issues/1326
2017-12-27 18:27:34 +01:00
Franco Fichtner
19c4253b1c
webgui: explain the confirm / recovery
...
PR: https://github.com/opnsense/core/issues/1347
2017-12-27 18:23:23 +01:00
Franco Fichtner
fa3ad8025a
webgui: flip-flop on old and new URL in case something went wrong
...
The initial timeout of 20 seconds is long, but it's safer to wait so
that we're not bouncing back to the old web GUI before it goes down.
PR: https://github.com/opnsense/core/issues/1347
2017-12-27 17:55:20 +01:00
Franco Fichtner
e63299809a
firmware: list installed plugins first
...
The markup is a bit too much now, but we can figure something
out sooner or later.
2017-12-27 14:26:42 +00:00
Franco Fichtner
4638791ef8
mvc: do not render empty toggle header, dialogs do the same
2017-12-27 14:15:52 +00:00
Franco Fichtner
533ccbde0c
rc: backup DUID for /var MFS et al
...
Make sure to delete the backup prior to backing up to mimick
the current system state. Same goes for restore, no backup
means remove the DUID to sync the system state to what it was.
2017-12-27 13:35:35 +00:00
Franco Fichtner
b64b378219
mvc: code sniffer sniffs code
2017-12-27 11:56:23 +00:00
Franco Fichtner
2b71525147
make: enable new sniff for codesniffer
2017-12-27 11:56:00 +00:00
Franco Fichtner
6c13cbf4dd
interfaces: tweak previous
...
o do not escape execf shell escaping
o simplify the wording on the labels
2017-12-27 11:07:49 +00:00
marjohn56
e634186ae4
dhcp6c No Release Option
...
dhcp6c sends a release signal on exit by default. This can cause the loss of the allocated prefix or address and a new one on the next connection. This is especially the case with many ISPs.
This option allows the user to disable the release send.
I added the -n option to the FreeBSD dhcp6c quite a while back.
2017-12-27 11:47:04 +01:00
Franco Fichtner
9425d3bdd0
wizard: cleanup closes #2007
2017-12-27 11:29:18 +01:00
Franco Fichtner
420cbc6e07
wizard: cleanup for #2007
2017-12-27 11:26:59 +01:00
Franco Fichtner
502db3ab8d
system: cleanup for #2007
2017-12-27 11:24:56 +01:00
Franco Fichtner
55c989971c
openvpn: cleanup for #2007
2017-12-27 11:23:43 +01:00
Franco Fichtner
5c31153d35
auth: cleanup for #2007
2017-12-27 11:21:40 +01:00
Franco Fichtner
ff8b1c77a8
interfaces: simplify previous
...
It's better to align this with the DHCP setting, remove explicit
mention of PPPoE as it pertains to other PPP types too.
2017-12-27 08:40:14 +01:00
Franco Fichtner
33e3545709
auth: revert a change for #1929
...
There will be time to work on this, but it is not now.
2017-12-27 08:26:17 +01:00
Franco Fichtner
adf34de710
pkg: fix plist
2017-12-27 08:25:06 +01:00
Ad Schellevis
1621d72899
Firewall/rule parser, work in progress snat, for https://github.com/opnsense/core/issues/1326
2017-12-26 19:59:17 +01:00
Ad Schellevis
d3afd68acb
Firewall/rule parsing. add initial SNAT implementation, for https://github.com/opnsense/core/issues/1326
2017-12-26 19:20:24 +01:00
Ad Schellevis
8a0ac7ca25
Firewall/rule parsing, ok, someone thought it was a good idea to use the "network" field in outbound rules as the "address" field in all the other rule types.... not a big fan of duplicating code, but for now it's bett
...
er to keep the address conversion in one spot (which some duplicate code).
All still for https://github.com/opnsense/core/issues/1326
2017-12-26 18:45:24 +01:00
Ad Schellevis
50a0b8c39f
Firewall/rule parsing, improve naming, the 1:1 rules are destination nat rules, outbound will be source nat type. for https://github.com/opnsense/core/issues/1326
2017-12-26 18:10:20 +01:00
Ad Schellevis
b70880e33e
firewall/rule logic, some minor improvements for https://github.com/opnsense/core/issues/1326 , add parseStaticText() and remove duplicates
2017-12-26 18:00:36 +01:00
Franco Fichtner
4f9cbc83eb
web proxy: fix wrong character
2017-12-26 12:49:04 +01:00
Franco Fichtner
6f9c3177e1
mvc: pass form data, copy+paste for others but not quite ;(
2017-12-26 11:28:40 +00:00
Franco Fichtner
369721b818
mvc: rework for extensibility
2017-12-26 12:13:32 +01:00
Franco Fichtner
131dc9a340
mvc: (sub)tabs to partials
2017-12-26 11:56:05 +01:00
Franco Fichtner
8902ddb4c9
mvc: after further feedback...
...
The code for the Service controllers originated from IDS and
Web Proxy, not the Postfix plugin where this was originally
copied from before being turned into a mutabe variant with the
work from the mutable model class.
2017-12-25 22:53:29 +01:00
Franco Fichtner
85abd91c7c
mvc: rename controller internals
2017-12-25 16:38:44 +01:00
Ad Schellevis
f722081b87
interfaces, add "IPv6 Static over parent v4 PPPoE link" for https://github.com/opnsense/core/pull/2017 ditching some side affects from get_real_interface() in the process.
2017-12-25 13:40:48 +01:00
Franco Fichtner
9eac980047
web proxy: cache reconfigure detection for #2008
2017-12-24 23:20:28 +01:00
Franco Fichtner
7f7a96f758
mvc: fix call
2017-12-24 16:30:31 +01:00
Franco Fichtner
426cbdc5a0
mvc: we do not care about the model name
2017-12-24 16:23:41 +01:00
Franco Fichtner
e9e99cb254
mvc: further fixes :)
2017-12-24 16:17:03 +01:00
Franco Fichtner
a77c8535ef
mvc: fix class usage
2017-12-24 16:11:13 +01:00
Franco Fichtner
b83282f267
mvc: add a mutable service controller for easy reuse
2017-12-24 15:57:17 +01:00
Franco Fichtner
a46afb51a0
pkg: fix plist
2017-12-24 12:52:49 +01:00
Franco Fichtner
65b7fb6453
firmware: remove the hotfix backend support, discontinued
2017-12-24 12:52:14 +01:00
Franco Fichtner
db43f38d1c
firmware: allow to upgrade to 18.1.r1
...
Packages are not yet in place, but we need it for testing.
2017-12-24 10:32:19 +01:00
Ad Schellevis
b79ff62b6d
Firewall/nat. implement new rule generation for the sections done sofar. for https://github.com/opnsense/core/issues/1326
...
Moves most rule generation features in our filter, filter_generate_address() is only used in vpn_openvpn_export.php now, so to keep clearity we're going to move this out of the way for now too.
2017-12-23 17:36:03 +01:00
Ad Schellevis
8747cc94b4
Firewall/Nat, add Nat and Npt rule registrations, next step is to ditch the old code in filter.inc for these topics and then we only have to refactor the outbound code and some additional testing.
...
all for https://github.com/opnsense/core/issues/1326
2017-12-23 17:28:34 +01:00
Ad Schellevis
b6f8d5d67a
Firewall/rule parsing, missed a spot in isIpV4() https://github.com/opnsense/core/issues/1326
2017-12-23 16:40:20 +01:00
Ad Schellevis
4aea87fb24
Firewall/forward, check protocol for autogenerated rules. https://github.com/opnsense/core/issues/1326
2017-12-23 16:17:50 +01:00
Ad Schellevis
9479df5c8e
Firewall/rule parsing, some for some autogenerated rules we need to know for which protocol a rule is targeted. for https://github.com/opnsense/core/issues/1326
2017-12-23 16:15:22 +01:00
Ad Schellevis
054d69cd01
Firewall/forward, typo in ForwardRule.php https://github.com/opnsense/core/issues/1326
2017-12-23 15:37:53 +01:00
Franco Fichtner
160820d2df
pkg: fix plist
2017-12-23 15:24:43 +01:00
Ad Schellevis
b291345848
Firewall, rule parsing. move suffix to parameters for parsePlainCurly() , also for https://github.com/opnsense/core/issues/1326
2017-12-23 15:11:49 +01:00
Ad Schellevis
a347623b41
Firewall/forward, missed a spot in last refactor https://github.com/opnsense/core/issues/1326
2017-12-23 14:53:43 +01:00
Ad Schellevis
c77718cb6b
Firewall, portforward. https://github.com/opnsense/core/issues/1326
...
Rename NatRule to ForwardRule, it seems better to split the logic for the different nat types and reuse the functionality in the base class. A portforward is actually a rdr entry combined with nat if relection is enabled, 1-on-1 nat is the exact opposite (nat, optionally combined with rdr). Which would make the parse logic to complicated to read if combined.
2017-12-23 14:13:23 +01:00
Ad Schellevis
bc235a3a69
Firewall/rules parsing, add support for reuse of fieldnames in ruleToText(). for https://github.com/opnsense/core/issues/1326
2017-12-23 13:57:22 +01:00