10198 Commits

Author SHA1 Message Date
Ad Schellevis
3d1617b2bd netflow, minor type issue, parameter received as bytes in get_timeseries.py 2019-05-17 16:50:32 +02:00
Ad Schellevis
918e4671ea netflow, fix rc script for flowd_aggregate 2019-05-17 16:42:19 +02:00
Ad Schellevis
31982e2872 netflow, migrate flowd aggregator to python 3 2019-05-17 16:41:08 +02:00
Northguy
0b40897fd3 Fix dhcp leases help text (#3488) 2019-05-17 15:26:25 +02:00
Ad Schellevis
17e4e9c0fc netflow, aggregator replace flowd with our new implementation 2019-05-16 18:32:55 +02:00
Ad Schellevis
8aecf38f2e netflow, log parser. for backwards compatibility add copy of recv_sec field in recv 2019-05-16 18:29:16 +02:00
Franco Fichtner
6cd82973ec ipsec: always reset to defaults; closes #3486 2019-05-16 18:11:43 +02:00
Ad Schellevis
5eef7248a8 netflow, flow log parser improvements
- faster / cleaner ipv4 conversion
- ipv6 conversion in compressed format, which equals flowd previous output
- unpack source and dest ports
2019-05-16 16:20:34 +02:00
Ad Schellevis
0bdbdf7d21 netflow, improve log parser performance, cache some calculations.
In theory we could probably increase performance even more by limitting the number of calls to struct.unpack, but this will make it more difficult to read.
This version is about 30% faster then the original C version shipped with flowd.

Some more testing todo, but preliminary results look good.
2019-05-16 13:54:24 +02:00
Ad Schellevis
93f7cff3d8 netflow, flowparser.py performance improvement in parsing ipv4/ipv6 addresses. 2019-05-15 22:01:27 +02:00
Ad Schellevis
a99d1ecf8e netflow, minor type issue in previous 2019-05-14 22:08:52 +02:00
Ad Schellevis
7e55ef5218 netflow, work in progress pure python replacement to parse /var/log/flowd.log files 2019-05-14 22:06:53 +02:00
Franco Fichtner
aa9c83571f dashboard: use cache_safe() for last unprotected logo instance
Placement is debatable here, but for the sake of consistency
do it like all the other spots already do.  It's cool.
2019-05-14 08:52:55 +02:00
Ad Schellevis
1dfc0e250a CaptivePortal, convert scripts from python 2 --> 3 2019-05-13 19:29:06 +02:00
Ad Schellevis
64186cca48 python3, minor compatibility fix in sqlite3_helper.py 2019-05-13 18:43:27 +02:00
Ad Schellevis
2ee18896f2 CaptivePortal, remove unused listARPtable.py script 2019-05-13 18:42:56 +02:00
Ad Schellevis
a06ad6a5d0 netflow, convert parts that don't depend on flowd to python 3 2019-05-13 15:48:33 +02:00
Ad Schellevis
645fdcffd6 proxy, remote access control convert to python 3 2019-05-13 15:30:12 +02:00
Franco Fichtner
0766615b89 system: use our symlink in configd interpreter 2019-05-13 14:24:39 +02:00
Ad Schellevis
df63625418 list ssl ciphers script, python 2 -> 3 conversion 2019-05-13 14:10:01 +02:00
Ad Schellevis
bb2d31ed20 configd, module doesn't need to know interpreter, cleanup. 2019-05-13 14:06:05 +02:00
Ad Schellevis
e41aa9a74b status interfaces, list_interrupts.py convert python 2 -> 3 2019-05-13 14:03:18 +02:00
Ad Schellevis
71cdb25d96 Routing/status, python 2-->3 conversion 2019-05-13 13:57:32 +02:00
Ad Schellevis
a4a70fdfbc python 2->3 ipsec scripts 2019-05-13 13:42:35 +02:00
Ad Schellevis
ad7d6df09c unbound:dhcp helper. convert to python3, fix startup read known addresses in the process.
It seems that unbound_known_addresses() wasn't working, since output_stream was ignored. only init with /dev/null when None.
2019-05-13 13:27:23 +02:00
Ad Schellevis
d756b13f52 python 2->3 scripts/dhcp/get_leases.py 2019-05-13 13:17:48 +02:00
Ad Schellevis
11d64579ce python3, use symlink in already converted scripts 2019-05-13 13:00:49 +02:00
Franco Fichtner
297d8ddd9d pkg: pull (relative) symlink into package #3461 2019-05-13 10:39:02 +00:00
Ad Schellevis
0af2c26c80 python3, use symlink (rename python3.6 to python3) for the files already in stable/19.1 2019-05-13 12:33:01 +02:00
Ad Schellevis
8bb082ab90 python3, add symlink to default python 3, closes https://github.com/opnsense/core/issues/3461 2019-05-13 12:00:54 +02:00
Ad Schellevis
404f796eb8 python2->3 scripts in src/opnsense/scripts/interfaces 2019-05-13 11:37:01 +02:00
Franco Fichtner
65e31e7bbf system: login not using cache-safe image yet 2019-05-13 10:24:45 +02:00
Ad Schellevis
2795dc6127 theme, revert background/text color change in 63065a9f1f as discussed with @fichtner 2019-05-13 09:19:34 +02:00
Franco Fichtner
e9f0e26a9c system: use absolute path in widget ACLs 2019-05-12 09:42:23 +02:00
Franco Fichtner
79b0050c16 Revert "interfaces: IPv6 only reset trackers on new IPv6 #3415"
This reverts commit 8279f282880d566beb179f11f15ba8ab90b369a5.
Not very fond of this change.  Revert before it becomes "the law".
2019-05-11 19:34:30 +02:00
Franco Fichtner
be2d13512a interfaces: also delete DHCPv6/RA server on interface delete 2019-05-11 18:55:35 +02:00
Franco Fichtner
bd981d88dc system: work through previous style update
Several subtle improvements along the way.
2019-05-11 18:38:13 +02:00
Franco Fichtner
3786a300cf openvpn: a couple of hours spend on tidying up the status page 2019-05-11 15:07:27 +02:00
Franco Fichtner
135305347d firewall: use "*" in automatic rules for schedule as well
Although "N/A" is true, "*" is more consistent.
2019-05-11 13:03:46 +02:00
Franco Fichtner
f0495cdedc system: only show crash reports to admins
We could check admin or page access rights, but in the end we just
want to avoid showing a banner that links to a page that is not
accessible in 99% of the cases if specific dashboard access was
granted.
2019-05-11 10:40:23 +02:00
Franco Fichtner
296822c070 network time: throws error on validation fail with empty interface 2019-05-11 10:25:54 +02:00
Franco Fichtner
48244819b5 system: tweak this message further, 'page-all' is not visible in the GUI
"All pages" is there, but this may get lost in translation.
2019-05-11 10:22:52 +02:00
Ad Schellevis
b54a1cab8c OpenVPN, kill another spot of free text impossible to protect input (in the wizard). For the time being, an admin user could still change this after wizard execution in the server page. 2019-05-10 20:58:01 +02:00
Ad Schellevis
d62015df1c security, better guard free text inputs, only allow admin groups and signal the user about its likely disappearance in the future.
In some cases users would be able to execute arbitrary commands, which is impossible to protect against.
2019-05-10 20:45:30 +02:00
Ad Schellevis
7af6473081 filter, port forward. support multiple interfaces per rule, when used and an automatic filter rule association is created it will be set as "Floating" + quick. closes https://github.com/opnsense/core/issues/1242 2019-05-10 16:59:32 +02:00
Ad Schellevis
24b90841d1 Auth/LDAP: group sync, add support to limit groups which are in scope for sync. closes https://github.com/opnsense/core/issues/3471 2019-05-09 20:21:17 +02:00
Franco Fichtner
1d7f873528 src: style sweep 2019-05-09 12:27:17 +02:00
Franco Fichtner
ca5140cbf7 system: use userIsAdmin() even if we have to resolve again 2019-05-09 12:13:46 +02:00
Ad Schellevis
d6a5db4f63 auth, add small legacy helper function to check if user is full admin. 2019-05-09 11:48:28 +02:00
Franco Fichtner
abe6b092e0 firewall: kill hover, we have proper striping now 2019-05-09 11:28:22 +02:00