149 Commits

Author SHA1 Message Date
Ad Schellevis
592a62b0df
wizard: reimplement system setup (#8378)
* wizard: reimplement system setup, for https://github.com/opnsense/core/issues/8352

This commit implements our replacement for the setup wizard. The questions are roughly the same as in the legacy version.
Some less relevant options have been removed (pppoe ondemand for example) and isc-dhcpd has been replaced with dnsmasq.

Only standard tools have been used, a memory model to validate the data and simple input forms in tabs.

The in memory model acts as a wrapper around a legacy configuration data and a couple of component models to apply the requested settings.

Some legacy settings using isset() have been altered to use their empty() equivalent.

* wizard: as we're changing to dnsmasq as default, we need to make sure the console setup configures the same (https://github.com/opnsense/core/issues/8352)

Fix some small php arnings in the process, but further than that just rewrite the dhcpd console handling to use dnsmasq instead of isc.
Eventually we will need to rewrite the console tools as well, but let's try to keep this compatible with minimal impact.

* wizard: change other occurrences of isset($config['dnsallowoverride']) for https://github.com/opnsense/core/issues/8352

* wizard: sort listtags() and some other minor review comments for https://github.com/opnsense/core/issues/8352
2025-03-03 15:26:16 +01:00
Stephan de Wit
b49b935bb9 system: general: handle picture deletion via hidden input 2024-10-03 09:39:27 +02:00
Franco Fichtner
5c7f4ab166 system: squelch warning 2024-09-16 14:12:43 +02:00
Stephan de Wit
b2bcd4c73f system: save immediately on picture removal 2024-09-13 14:30:37 +02:00
Stephan de Wit
3327890ab4
dashboard: add Picture widget (#7860)
---------

Co-authored-by: Franco Fichtner <franco@opnsense.org>
2024-09-12 16:54:53 +02:00
Ad Schellevis
0378c650d4
Add System: Trust: Settings page (#7854)
* System: Trust: Settings - add boilerplate and move existing store_intermediate_certs setting to new module including migration

* System: Trust: Settings - add configuration constraints and glue to flush CRL's to local trust store when requested.

This implements the following options:

* Enable/Disable legacy providers (enabled by default, which is the current default)
* Option to write specific configuration constraints, when enabled, CipherString, Ciphersuites and MinProtocol[DTS] can be configured

One last piece of the puzzle is the "crl" event action, which should deploy to the local trust store as well ehen requested.

* Update src/opnsense/mvc/app/models/OPNsense/Core/Menu/Menu.xml

Co-authored-by: Franco Fichtner <franco@opnsense.org>

* System: Trust: Settings - process review comments https://github.com/opnsense/core/pull/7854

* System: Trust: Settings - flush CRL's when "Store CRL's" is selected

---------

Co-authored-by: Franco Fichtner <franco@opnsense.org>
2024-09-10 21:15:11 +02:00
Franco Fichtner
cb05c53e0b system: make trust store reload conditional
PR: https://forum.opnsense.org/index.php?topic=36824.0
2023-11-06 10:01:42 +01:00
Franco Fichtner
5a125dcb83 system: bootstrap an empty string to theme to squelch a warning
The rest of the system knows to use "opnsense" already.  The page
throws the warning here but instead of hardcoding the theme name
just give it an empty string so the first one is selected even
though it might not be the right one.  Hardcoding this doesn't
feel right...
2023-10-13 08:35:04 +02:00
Franco Fichtner
15c0788e50 src: remove spurious ifconfig data pass 2023-08-29 11:51:13 +02:00
Franco Fichtner
c586bdb1a5 system: allow "." DNS search domain override; closes #6529
While here refactor get_searchdomain() a little to avoid complexity
in system_resolvconf_generate().
2023-05-24 09:30:38 +02:00
Franco Fichtner
603a6801f1 system: allow "." search domain for #6529 2023-05-15 13:21:52 +02:00
Franco Fichtner
ed6cd638ac system: create system_resolver_configure() to simplify callers
Replace a few easy spots.  Eventually we want to call both
functions for each spot instead of doing both (in switching order)
or only one of them.  They are both cheap operations since they
don't (re)start DNS processes any longer.
2023-03-01 08:56:16 +01:00
Franco Fichtner
16cce3bdef sytem: optional field, squelch error 2022-11-04 11:04:59 +01:00
Daniel Aleksandersen
3654c94572
Change system domain name suggestions (#5898)
* Don't suggest using unreserved top-level domains.
* Use the reserved example.com|net domains for other examples.
* Encourage adoption of the special-purpose internal/site home.arpa (RFC 8375) domain.
2022-10-18 13:48:41 +02:00
Josh Soref
20a3c3da38
Spelling (#5885) 2022-07-18 13:59:03 +02:00
Paul Kelso
37a1b761d7
Fix grammar. Missing period. (#5791)
Grammatical error - period missing.
2022-05-28 09:25:06 +02:00
Franco Fichtner
d4f4b48b06 system: prefer address family earlier on boot
Looking for things that could go wrong with root.key in Unbound
this could be one of those.  Still, at this point we may not have
received DNS servers from the ISP since these are registered much
later (10-newwanip).

Great opportunity to ditch prefer_ipv4_or_ipv6() since we need it
for resolving which we set up alongside and in the right spot.
2022-03-11 11:18:04 +01:00
Franco Fichtner
68775a50e8 system: fix warnings that only appear when validation fails 2022-01-17 17:35:05 +01:00
Pierre Fèvre
981373b4cd system: allow additional search domain; closes #5102 2022-01-17 17:35:05 +01:00
Ad Schellevis
56e66ec809 System / Trust / Authorities - flush certs when "Store intermediate" changes. closes https://github.com/opnsense/core/issues/5257 2021-10-06 15:53:35 +02:00
Ad Schellevis
5b9d7baccb System / Trust / Authorities - do not flush intermediate certificates by default into the local trust store. as discussed in https://github.com/opnsense/core/issues/5257
When someone adds an intermediate certificate into the trust store leading either into a missing or expired root, other paths aren't being evaluated anymore, leading into verification errors.
In case someone would like to enforce saving the intermediates, System->Settings->General introduces a new trust section to revert back to the old behaviour.
2021-10-06 12:43:29 +02:00
Ad Schellevis
0268363d0c system_general. empty dnsallowoverride_exclude causes PHP Warning: implode(): Invalid arguments passed ... 2020-02-05 10:21:29 +01:00
Ad Schellevis
38b613614b opt-out on "Allow DNS server list to be overridden by DHCP/PPP on WAN" for selected interfaces. for https://github.com/opnsense/core/issues/3701 2019-11-21 18:08:06 +01:00
Ad Schellevis
c94c09e92c System->Settings->General:DNS gateway, remove disfunctional fuzzy logic and just save the correct gateway content. Since we always redirect after POST, there's absolutely no need to prepare $pconfig. closes https://github.com/opnsense/core/issues/3599 2019-07-26 12:06:08 +02:00
Franco Fichtner
b2294eae1b firewall: pflog is doing strange things lately
Try to reload in case it can't open syslog and keep fully
reloading it to make sure that it stays operational.
2019-07-09 08:22:57 +02:00
Franco Fichtner
ba0c82dd54 dhcpd: naming convention, plugins_configure() use 2019-04-29 07:49:26 +02:00
Franco Fichtner
316e988459 system: avoid use of interface_has_gateway()
A number of sanity cleanups while here...
2019-04-26 08:39:36 +02:00
Franco Fichtner
708e00b7f1 system: remove reference to removed functionality 2019-04-11 15:41:17 +02:00
Ad Schellevis
65facfb695 Routing, gateways. kill fixup_default_gateway() and replace with new logic from Gateways() class, remove gw_switch_group[4|6] while at it. for https://github.com/opnsense/core/issues/2279 2019-04-11 13:10:12 +02:00
Ad Schellevis
b7ce18e24d Gateways, move setIfconfig to constructor, since its required for proper use anyway. for https://github.com/opnsense/core/issues/2279 2019-04-11 09:50:24 +02:00
Ad Schellevis
34514fa454 routing, gateways. hook new gateway list into system_general.php for https://github.com/opnsense/core/issues/2279 2019-04-10 18:01:54 +02:00
Ad Schellevis
883063c49c get_std_save_message() with hasync enabled mangles some redirected save messages, although we do want to ditch the function at some point, we probably better fix the issue introduced with https://github.com/opnsense/core/issues/3165 first. 2019-03-14 20:13:15 +01:00
nhirokinet
d19b778571 Not to translate hostname example (#3307) 2019-03-10 16:11:07 +01:00
Ad Schellevis
4a8e737ced fix some gettext() + html_safe, discussed c4c7f8d732 2019-02-03 20:04:08 +01:00
Michael Steenbeek
88c28e3258 Fix typos and mismatched HTML tags (#2998) 2018-12-03 13:19:11 +01:00
Franco Fichtner
723d97bbdf system: move settings as per #2279
Not the perfect spot either as this is for gateway groups
now but still better than firewall and actually the original
spot where the setting could be found.
2018-12-03 08:40:42 +01:00
Franco Fichtner
b94b00212f system: small cleanups / indent 2018-11-25 23:36:49 +01:00
Franco Fichtner
a4b4db95b3 dnsmasq: add DNSSEC option, several cleanups; closes #2275
* As discussed a long time ago stop mentioning "DNS Forwarder"
* Remove strong tags from Dnsmasq form
* DNSSEC option, off by default
* Some GUI elements flattened
* Advanced button tweaks

Tested using: http://en.conn.internet.nl/connection/
2018-11-24 15:30:19 +01:00
Franco Fichtner
c99cfaa006 src: more manual cleanups 2018-11-23 14:50:53 +01:00
Michael Steenbeek
7ad3d8dff6 Replace some trivial double quotes with single ones 2018-11-23 14:36:44 +01:00
Michael Steenbeek
19ce1c57a4 Replace uncommon <> notation with != 2018-11-23 14:36:44 +01:00
Northguy
4f6a3d108a Fix small typo
Unbund -> Unbound
2018-11-17 09:32:30 +01:00
Franco Fichtner
a07dca958f system: safety belts for dnsallowoverride #2751
bindsto wizard magic may be faulty still.  Shell scripts do stupid
things as well...
2018-09-23 11:14:40 +02:00
Franco Fichtner
4be8af3938 system: EXPLAIN! EXPLAIN! EXPLAIN!
PR: https://twitter.com/platymew/status/1021325814816755712
2018-07-23 16:54:56 +02:00
Franco Fichtner
e741b9e450 system: unify selectpicker width 2018-06-02 12:38:10 +00:00
Franco Fichtner
e9c3be35d6 www: visual cleanups, unused class/style zapping #2290 2018-03-25 13:10:27 +00:00
Franco Fichtner
b074216e93 www: style updates, less strong/bold markup #2290 2018-03-25 10:08:53 +00:00
NOYB
9d96bdcbc7 Help For - Data For Attribute
Use original element (<div>/<small>) with "data-for" attribute.

The old jquery "for" attribute selectors can be removed once conversion to "data-for" attribute is complete (including plugins).

The old jquery selectors to remove once conversion is complete.
  opnsense_ui.js & head.inc
  $("*[for='" + $(this).attr('id') + "']")....
  $('[for*="help_for"]')....
2018-03-17 16:12:55 +01:00
NOYB
4a7bcae7af HTML Compliance - Attribute "for" on Element <div>
Error: Attribute "for" not allowed on element "div" at this point.
Attributes for element "div": http://www.w3.org/html/wg/drafts/html/master/single-page.html#the-div-element

HTML attribute reference: https://developer.mozilla.org/en-US/docs/Web/HTML/Attributes
The "Output" element: https://developer.mozilla.org/en-US/docs/Web/HTML/Element/output

Attributes for element "output": http://www.w3.org/html/wg/drafts/html/master/single-page.html#the-output-element
2018-01-06 10:52:17 +01:00
NOYB
b2f4cfa7c1 HTML Compliance - Attribute "type" on Element <i>
Error: Attribute "type" not allowed on element <i> at this point.
2018-01-05 08:36:26 +01:00