8031 Commits

Author SHA1 Message Date
Ad Schellevis
12d174e79d firewall/rule engine, keep some behaviour from legacy code as long as we're not sure wrong data can enter the config. for https://github.com/opnsense/core/issues/1326 2017-12-27 18:27:34 +01:00
Franco Fichtner
19c4253b1c webgui: explain the confirm / recovery
PR: https://github.com/opnsense/core/issues/1347
2017-12-27 18:23:23 +01:00
Franco Fichtner
fa3ad8025a webgui: flip-flop on old and new URL in case something went wrong
The initial timeout of 20 seconds is long, but it's safer to wait so
that we're not bouncing back to the old web GUI before it goes down.

PR: https://github.com/opnsense/core/issues/1347
2017-12-27 17:55:20 +01:00
Franco Fichtner
e63299809a firmware: list installed plugins first
The markup is a bit too much now, but we can figure something
out sooner or later.
2017-12-27 14:26:42 +00:00
Franco Fichtner
4638791ef8 mvc: do not render empty toggle header, dialogs do the same 2017-12-27 14:15:52 +00:00
Franco Fichtner
533ccbde0c rc: backup DUID for /var MFS et al
Make sure to delete the backup prior to backing up to mimick
the current system state.  Same goes for restore, no backup
means remove the DUID to sync the system state to what it was.
2017-12-27 13:35:35 +00:00
Franco Fichtner
b64b378219 mvc: code sniffer sniffs code 2017-12-27 11:56:23 +00:00
Franco Fichtner
2b71525147 make: enable new sniff for codesniffer 2017-12-27 11:56:00 +00:00
Franco Fichtner
6c13cbf4dd interfaces: tweak previous
o do not escape execf shell escaping
o simplify the wording on the labels
2017-12-27 11:07:49 +00:00
marjohn56
e634186ae4 dhcp6c No Release Option
dhcp6c sends a release signal on exit by default. This can cause the loss of the allocated prefix or address and a new one on the next connection. This is especially the case with many ISPs.

This option allows the user to disable the release send.

I added the  -n option to the FreeBSD dhcp6c quite a while back.
2017-12-27 11:47:04 +01:00
Franco Fichtner
9425d3bdd0 wizard: cleanup closes #2007 2017-12-27 11:29:18 +01:00
Franco Fichtner
420cbc6e07 wizard: cleanup for #2007 2017-12-27 11:26:59 +01:00
Franco Fichtner
502db3ab8d system: cleanup for #2007 2017-12-27 11:24:56 +01:00
Franco Fichtner
55c989971c openvpn: cleanup for #2007 2017-12-27 11:23:43 +01:00
Franco Fichtner
5c31153d35 auth: cleanup for #2007 2017-12-27 11:21:40 +01:00
Franco Fichtner
ff8b1c77a8 interfaces: simplify previous
It's better to align this with the DHCP setting, remove explicit
mention of PPPoE as it pertains to other PPP types too.
2017-12-27 08:40:14 +01:00
Franco Fichtner
33e3545709 auth: revert a change for #1929
There will be time to work on this, but it is not now.
2017-12-27 08:26:17 +01:00
Franco Fichtner
adf34de710 pkg: fix plist 2017-12-27 08:25:06 +01:00
Ad Schellevis
1621d72899 Firewall/rule parser, work in progress snat, for https://github.com/opnsense/core/issues/1326 2017-12-26 19:59:17 +01:00
Ad Schellevis
d3afd68acb Firewall/rule parsing. add initial SNAT implementation, for https://github.com/opnsense/core/issues/1326 2017-12-26 19:20:24 +01:00
Ad Schellevis
8a0ac7ca25 Firewall/rule parsing, ok, someone thought it was a good idea to use the "network" field in outbound rules as the "address" field in all the other rule types.... not a big fan of duplicating code, but for now it's bett
er to keep the address conversion in one spot (which some duplicate code).

All still for https://github.com/opnsense/core/issues/1326
2017-12-26 18:45:24 +01:00
Ad Schellevis
50a0b8c39f Firewall/rule parsing, improve naming, the 1:1 rules are destination nat rules, outbound will be source nat type. for https://github.com/opnsense/core/issues/1326 2017-12-26 18:10:20 +01:00
Ad Schellevis
b70880e33e firewall/rule logic, some minor improvements for https://github.com/opnsense/core/issues/1326 , add parseStaticText() and remove duplicates 2017-12-26 18:00:36 +01:00
Franco Fichtner
4f9cbc83eb web proxy: fix wrong character 2017-12-26 12:49:04 +01:00
Franco Fichtner
6f9c3177e1 mvc: pass form data, copy+paste for others but not quite ;( 2017-12-26 11:28:40 +00:00
Franco Fichtner
369721b818 mvc: rework for extensibility 2017-12-26 12:13:32 +01:00
Franco Fichtner
131dc9a340 mvc: (sub)tabs to partials 2017-12-26 11:56:05 +01:00
Franco Fichtner
8902ddb4c9 mvc: after further feedback...
The code for the Service controllers originated from IDS and
Web Proxy, not the Postfix plugin where this was originally
copied from before being turned into a mutabe variant with the
work from the mutable model class.
2017-12-25 22:53:29 +01:00
Franco Fichtner
85abd91c7c mvc: rename controller internals 2017-12-25 16:38:44 +01:00
Ad Schellevis
f722081b87 interfaces, add "IPv6 Static over parent v4 PPPoE link" for https://github.com/opnsense/core/pull/2017 ditching some side affects from get_real_interface() in the process. 2017-12-25 13:40:48 +01:00
Franco Fichtner
9eac980047 web proxy: cache reconfigure detection for #2008 2017-12-24 23:20:28 +01:00
Franco Fichtner
7f7a96f758 mvc: fix call 2017-12-24 16:30:31 +01:00
Franco Fichtner
426cbdc5a0 mvc: we do not care about the model name 2017-12-24 16:23:41 +01:00
Franco Fichtner
e9e99cb254 mvc: further fixes :) 2017-12-24 16:17:03 +01:00
Franco Fichtner
a77c8535ef mvc: fix class usage 2017-12-24 16:11:13 +01:00
Franco Fichtner
b83282f267 mvc: add a mutable service controller for easy reuse 2017-12-24 15:57:17 +01:00
Franco Fichtner
a46afb51a0 pkg: fix plist 2017-12-24 12:52:49 +01:00
Franco Fichtner
65b7fb6453 firmware: remove the hotfix backend support, discontinued 2017-12-24 12:52:14 +01:00
Franco Fichtner
db43f38d1c firmware: allow to upgrade to 18.1.r1
Packages are not yet in place, but we need it for testing.
2017-12-24 10:32:19 +01:00
Ad Schellevis
b79ff62b6d Firewall/nat. implement new rule generation for the sections done sofar. for https://github.com/opnsense/core/issues/1326
Moves most rule generation features in our filter, filter_generate_address() is only used in vpn_openvpn_export.php now, so to keep clearity we're going to move this out of the way for now too.
2017-12-23 17:36:03 +01:00
Ad Schellevis
8747cc94b4 Firewall/Nat, add Nat and Npt rule registrations, next step is to ditch the old code in filter.inc for these topics and then we only have to refactor the outbound code and some additional testing.
all for https://github.com/opnsense/core/issues/1326
2017-12-23 17:28:34 +01:00
Ad Schellevis
b6f8d5d67a Firewall/rule parsing, missed a spot in isIpV4() https://github.com/opnsense/core/issues/1326 2017-12-23 16:40:20 +01:00
Ad Schellevis
4aea87fb24 Firewall/forward, check protocol for autogenerated rules. https://github.com/opnsense/core/issues/1326 2017-12-23 16:17:50 +01:00
Ad Schellevis
9479df5c8e Firewall/rule parsing, some for some autogenerated rules we need to know for which protocol a rule is targeted. for https://github.com/opnsense/core/issues/1326 2017-12-23 16:15:22 +01:00
Ad Schellevis
054d69cd01 Firewall/forward, typo in ForwardRule.php https://github.com/opnsense/core/issues/1326 2017-12-23 15:37:53 +01:00
Franco Fichtner
160820d2df pkg: fix plist 2017-12-23 15:24:43 +01:00
Ad Schellevis
b291345848 Firewall, rule parsing. move suffix to parameters for parsePlainCurly() , also for https://github.com/opnsense/core/issues/1326 2017-12-23 15:11:49 +01:00
Ad Schellevis
a347623b41 Firewall/forward, missed a spot in last refactor https://github.com/opnsense/core/issues/1326 2017-12-23 14:53:43 +01:00
Ad Schellevis
c77718cb6b Firewall, portforward. https://github.com/opnsense/core/issues/1326
Rename NatRule to ForwardRule, it seems better to split the logic for the different nat types and reuse the functionality in the base class. A portforward is actually a rdr entry combined with nat if relection is enabled, 1-on-1 nat is the exact opposite (nat, optionally combined with rdr). Which would make the parse logic to complicated to read if combined.
2017-12-23 14:13:23 +01:00
Ad Schellevis
bc235a3a69 Firewall/rules parsing, add support for reuse of fieldnames in ruleToText(). for https://github.com/opnsense/core/issues/1326 2017-12-23 13:57:22 +01:00