11182 Commits

Author SHA1 Message Date
Ad Schellevis
3ee8e907fe add Base64Field type, closes https://github.com/opnsense/core/issues/4398 2020-10-24 01:14:47 +02:00
Franco Fichtner
74843e75b6 Revert "system: syslog_ng_pid replaced by syslog_ng_pidfile in FreeBSD ports"
This reverts commit 466b0de94dd2c61aebec6d53cd4adca26b7bba30.
2020-10-24 01:14:47 +02:00
ServiusHack
097a894c4e Auth/LDAP: Fix reading displayName attribute (#4418)
In 6f76b5f the displayName attribute was added as the first camel case
attribute being read from the search result. As various[^1] comments[^2]
for `ldap_search` mention the attribute names must be lower case, even
though the LDAP server might return them differently.

Using all lower case to access the returned attribute results in the
value of displayName actually being used as the full name of the user.

[^1]: https://www.php.net/manual/en/function.ldap-search.php#37317
[^2]: https://www.php.net/manual/en/function.ldap-search.php#28991
2020-10-24 01:14:47 +02:00
Ad Schellevis
4235c72900 Filter: associated nat rules miss state keyword and when they would, the tag wouldn't be processed properly ($rule['type'] --> pass)
The associated nat rules remain a terrible construct, ideally we would make sure the automated rule matches a regular one, but if they do, the firewall_rules_edit.php page has to handle all sorts of corner cases leading to other unexpected behaviour.

This fixes a bug, cleaning this up would either need proper validations in the filter page or no extra validations at all (create/update, only note the relation, but don't try to enforce anything when associated-rule-id is set.
2020-10-24 01:14:47 +02:00
Franco Fichtner
9ad7e5463f unbound: sort targets 2020-10-24 01:14:47 +02:00
Ad Schellevis
327850e1b0 firewall_nat_edit.php fix "PHP Warning: in_array() expects parameter 2 to be array, null given in /usr/local/www/firewall_nat_edit.php on line 542" when interface is missing, closes https://github.com/opnsense/core/pull/4407 2020-10-24 01:14:47 +02:00
Ad Schellevis
e7c01545bf event "auth user changed", optimize core_user_changed_groups() to only perform local_group_set() when there are changes needed. found while working on https://github.com/opnsense/core/issues/4411 2020-10-24 01:14:47 +02:00
Ad Schellevis
ad747cdff0 system - usermanager: signal "auth user changed" when a user is modified via the webui. This should be rather harmless (the event was added in ecfd53ac2f)
Eventually some of the functionality in user/group management maybe moved to this hook, but to ensure a fast path to production, we'll keep duplicate work for now.

for https://github.com/opnsense/core/issues/4411
2020-10-24 01:14:47 +02:00
Frank Wall
d3d352c21d ipsec: add description to reconfigure action (#4401)
refs https://github.com/opnsense/plugins/issues/2019
2020-10-24 01:14:47 +02:00
Ad Schellevis
ade287d61e interfaces / assignments: lexical sort interface keys, closes https://github.com/opnsense/core/issues/4394 2020-10-24 01:14:47 +02:00
Franco Fichtner
f04ce0de80 src: style sweep 2020-10-24 01:14:47 +02:00
Ad Schellevis
8830913bfe backup / history: keep backup count default in a single spot, as discussed with @fichtner 2020-10-24 01:14:47 +02:00
Ad Schellevis
6eb7a2da64 core / mvc: add new config changed event using syshook structure
o in order for this to work properly we need to change when a config backup is made, previously we performed a backup before the fact, now we backup afterwards. which means the top level always represents the current change (and can thus be signaled to an event handler). After upgrade one might lose a single backup file due to this change, but that should be a small price to pay for progress.
o config backup count was defined incorrect (60 instead of 100 according to the gui)
o the syslog-ng event structure is using the existing configd handler and filters relevant events within a small time frame (which prevents flooding configd)

Since the event is loosely coupled, the risk for releasing this into an existing environment should be rather low.

For https://github.com/opnsense/core/issues/4388

sponsored by : Modirum (https://www.modirum.com/)
2020-10-24 01:14:47 +02:00
Franco Fichtner
d7670dc4dd system: syslog_ng_pid replaced by syslog_ng_pidfile in FreeBSD ports
Since the setting is the default we simply migrate by removing the
explicit use.
2020-10-24 01:14:47 +02:00
Franco Fichtner
76dacdc62c dhcp: RA MTU only written once 2020-10-24 01:14:47 +02:00
Ad Schellevis
161f948cdd Unbound: rebuild unbound blacklist download, fix previous (.conf files are being imported by unbound so we need to use another suffix for our config files) 2020-10-24 01:14:47 +02:00
Ad Schellevis
b9c1e0f630 Unbound: rebuild unbound blacklist download
o move all templates into one standard ini file containing all required info for the blacklists
o add syslog output (in unbound log view) about processing and error handling
o validate "whitelist" regexp entries before usage
o lock process while performing download task
o don't try to download in parallel, the gain is relatively small and adds complexity.
o remove last unboundplus action, migrate cron jobs if they exist
2020-10-24 01:14:47 +02:00
Ad Schellevis
8902dd560b interfaces: change max mtu value to 65535 in accordance with rfc791 (https://tools.ietf.org/html/rfc791). closes https://github.com/opnsense/core/issues/4359 2020-10-24 01:14:47 +02:00
Ad Schellevis
2269f1d302 Unbound / blacklists: remove unmaintained lists and add the other lists from https://github.com/blocklistproject/Lists while here. 2020-10-24 01:14:47 +02:00
Ad Schellevis
5b193c083a Unbound / Blacklist : move "URLs of Blacklists" to advanced 2020-10-24 01:14:47 +02:00
nowyouseeit
522c21e780 Add toggle for pinger service in proxy settings 2020-09-29 00:10:58 +10:00
Franco Fichtner
0b379917ae system: bump config backup default
This should be replaced with something more clever so for now
use this to keep an eye on the change until a strategy is clear.

We could remove the default and store unlimited backups although
that might hit a directory file limit sooner or later.
2020-09-24 23:51:35 +02:00
Ad Schellevis
e4ee28c373 System: Trust: Certificates : replace removeAttr usage to deselect option, although it probably still works with the single item selection, we better use the same construct as in system_advanced_admin.php 2020-09-24 14:21:57 +02:00
Franco Fichtner
dd526ac8b8 system: small follow-up for correct preset on page load #4373 2020-09-24 14:10:33 +02:00
Ad Schellevis
6cac461e6e System / Settings / Administration: fix defunct "use default" button on Listen Interfaces 2020-09-24 13:59:56 +02:00
Franco Fichtner
d8cc0bb123 system: switch order to unbreak server.bind in IPv6 first case; closes #4372 2020-09-24 10:19:18 +02:00
Franco Fichtner
a4bcbd5a92 interfaces: update wireless prefixes, make it more maintainable
PR: https://forum.opnsense.org/index.php?topic=19247.0
2020-09-23 13:22:24 +02:00
Franco Fichtner
c556975baa src: whitespace sweep 2020-09-23 10:14:21 +02:00
Ad Schellevis
59c1a95bfa Firewall / live log: omit group type interfaces in fast selection. closes https://github.com/opnsense/core/issues/4369 2020-09-23 10:03:29 +02:00
Mathieu St-Pierre
369bec4dce Fix for opnsense/core #4356
Adding DDNS values of each additional pool to the $ddns_zones array.
2020-09-22 22:29:39 -04:00
Franco Fichtner
cf1f4e00b9 rc: support id in pluginctl -s mode
PR: https://forum.opnsense.org/index.php?topic=19240.0
2020-09-22 14:40:21 +02:00
Ad Schellevis
496c4bbc0e interfaces: list mac addresses, phase out netaddr.eui.ieee.OUI_REGISTRY_PATH. closes https://github.com/opnsense/core/issues/4364 2020-09-21 16:28:33 +02:00
bobpaul
e87717c23d
Help text implied the opposite of what the checkbox did. Closes #4354 (#4357) 2020-09-21 12:32:53 +02:00
Ad Schellevis
281f319904 firewall / live log: allow "or" conditions, closes https://github.com/opnsense/core/issues/4361 2020-09-20 15:43:12 +02:00
Ad Schellevis
09eec2755b Firewall / scrubbing: fix two parsing bugs:
o port aliases not being prefixed with $
o special proto type "tcp/udp" not translated to {tcp udp}

closes https://github.com/opnsense/core/issues/4363
2020-09-19 17:18:55 +02:00
Ad Schellevis
8855e26867 Revert "Improve IPS mode help to avoid blocking network access, issue #4257 (#4271)"
This reverts commit 02d05f7278ccbfff6a2f3691d0663cb03c1767a8.
2020-09-18 14:25:43 +02:00
OliverO2
02d05f7278
Improve IPS mode help to avoid blocking network access, issue #4257 (#4271) 2020-09-18 10:42:36 +02:00
Ad Schellevis
09f8216559 Unbound: add "unbound-plus" section to xmlrpc sync, closes https://github.com/opnsense/core/issues/4352 2020-09-17 10:59:09 +02:00
Ad Schellevis
cfd5949995 IDPS: re-create rule cache after rule deployment, used update_local_changes() before, but this has the downside of missing the database changes, although create() is slower, it simplifies code to just rebuild after depolym
ent. ref a222eda2c7 (commitcomment-42320374)
2020-09-15 11:50:45 +02:00
Ad Schellevis
a222eda2c7 IDS: ignore pkill exit status when performing ids update, if suri is inactive we can safely ignore it. closes https://github.com/opnsense/core/issues/4346 2020-09-07 00:47:33 +02:00
Franco Fichtner
5d6aff7af2 system: missing control widget from log pages
Just as a POC shuffle known service controllers into the
page making sure to correctly translate their names.

Can't be the final state but it's a start.  Should probably
move all service monitoring to a separate API under the
"correct" (well, "matching" anyway) name.
2020-09-15 09:54:45 +02:00
kulikov-a
7ac50f9f8d
Add "Nat" tab to Firewall->Diagnostics->pfInfo menu (#4330) 2020-09-14 14:29:16 +02:00
Franco Fichtner
c8ad3c8b54 system: use different shell gateway name to appease wizard
PR: https://github.com/opnsense/core/issues/4347
2020-09-14 11:31:45 +02:00
Franco Fichtner
61c6bfa6be unbound: restructure reconfigure so that we always flush config 2020-09-10 10:15:03 +02:00
Franco Fichtner
d727353c25 router advertisements: tricky, way to little coffee #4328 2020-09-07 10:59:47 +02:00
Franco Fichtner
9548413d4d router advertisements: whoops ;) #4328 2020-09-07 10:48:59 +02:00
Franco Fichtner
66dc0e9b29 router advertisements: add static interface mode for #4328 2020-09-07 10:39:25 +02:00
Ad Schellevis
9fba75cc70 Firewall / Aliases - add mac type to top right selection, missed a spot 2020-09-06 18:36:10 +02:00
Ad Schellevis
905bdadc12 Firewall / Alias, allow ! on hosts too, closes https://github.com/opnsense/core/issues/4318 2020-09-06 11:20:32 +02:00
Franco Fichtner
5c58dd08c3 dnsmasq: remove advanced configuration; closes #3973
While here remove too much of implementation magic that is
expected from the system but may change subtly over time
when requirements in the software change.  Such things are
better suited for the documentation.
2020-09-06 10:53:52 +02:00