Activity
From 10/16/2009 to 11/14/2009
11/14/2009
- 10:39 PM Revision 647a1090: Sanitize username and only return letters numbers and spaces on the username. This eliminates the error during login that was cosmetic only in nature. The previous two commits where edge cases as the webConfigurator would never allow a blank username or password and was revised just for completeness sakes.
- 07:59 PM Revision 7466951a: Disallow blank passwords
- 07:48 PM Revision 2b1e35e6: Disallow blank passwords
- 03:26 AM Revision a094d47c: Patch from Ron Lockard that fixed restore_chflags due to a STDOUT redirection issue
- 03:26 AM Revision d2307ffb: Patch from Ron Lockard that fixed restore_chflags due to a STDOUT redirection issue
11/13/2009
-
09:30 AM Bug #135 (Feedback): Connecting to FTP server causes panic
- Patch committed on 2.0
-
09:29 AM Bug #134 (Feedback): Active mode FTP causes a panic
- Patch committed in 2.0.
11/12/2009
11/11/2009
-
06:31 PM Revision 0bcff7b2: Allow udp only from/to our local dns server. If wanted pass through can be added.
-
12:27 PM Revision 6ec23212: Simplify divert port generation and make sure it is even to leave room to ipfw-classifyd to always open 2 divert sockets one for reading and one for writing.
- 02:27 AM Revision 06231a7d: Default to top -HS
11/10/2009
-
02:20 PM Revision 66f2dd0e: Second pass at updateing protocol definitions.
-
02:18 PM Revision c97ab82a: Update layer 7 protocol definitions and adding new regex definitions.
-
01:34 PM Revision 61c3a5af: Remove brain dead comment by another brain washed comment.
-
12:51 PM Revision bbc6768b: - Should fix captive portal on carps Issue #116
- - Should fix the captive portal not working reports and Issue #118
NOTE: Now Captive portal is open on dns so... -
12:38 PM Revision 564df7c2: Previous commit on carp was strange and breaking the distinction and usefulness of some functions.
- Make sure that the behaviour returns to the previous architecture and to keep things right.
Carp needs some more wor... -
11:40 AM Revision 51b14faa: Do not 'spam' a new ipfw-classifyd for each save. If we hit save for an existing configuration(did changes to existing one) just tell ipfw-classifyd to reload the config.
-
11:20 AM Revision 21d40ff9: Remove \r it makes editing in vi ugly.
-
10:08 AM Feature #132: update OLSRd to 0.5.6-r6
- Thank you for syncing ... when will a nanobsd snapshot be available to download? It looks like snapshot building has ...
-
06:01 AM Bug #116 (Feedback): Carp and Captive portal don't work together
- Patch commited on 2.0
-
06:00 AM Bug #118 (Feedback): Captive portal not work
- Patch commited.
11/09/2009
-
06:49 PM Revision 9eb60dcc: Fixes Issue #142
-
06:07 PM pfSense Packages Bug #133 (Feedback): console change lan ip causes fatal trap 12
- This should be fixed on newer snapshots.
-
01:16 PM Bug #142: Alias autocompletion broken
- It's working again, but it isn't case-insensitive like it is when nesting aliases. Can you fix that?
-
11:54 AM Bug #142 (Feedback): Alias autocompletion broken
- Patch commited.
- 12:56 AM Revision 6097246c: fix typo
- 12:36 AM Revision e89f2008: fix typo
- 12:07 AM Revision e3d345ab: err, this defeats the entire purpose of NAT-T for clients behind the firewall, let's not do this.
11/08/2009
- 11:58 PM Revision f9f160b1: clean up RADIUS issued IPs, shouldn't be two fields, and it wasn't properly checked/unchecked before. Fixes cvstrac # 1722
- 11:34 PM Revision ba9d3f07: Add explanation for additional fields.
-
11:19 PM Bug #66: Nanobsd does not work on WRAP
- Work around here.
http://doc.pfsense.org/index.php/NanoBSD_on_WRAP -
08:06 PM Bug #146 (Resolved): Missing validation for alias usage
- Aliases are allowed to be used in several ways that breaks the ruleset.
firewall_nat_edit.php needs a check to on... -
08:04 PM Bug #145 (Resolved): DHCP server available range is wrong
- The DHCP server range allows network and broadcast addresses.
-
07:50 PM Bug #144 (Closed): Syslog messages violate RFC 3164
- RFC 3164 ("The BSD Syslog Protocol") dictates that following the Timestamp field will be a space then the "HOSTNAME" ...
-
07:45 PM Bug #143 (Resolved): Apostrophe in alias description breaks mouse-over display
- An apostrophe in alias' descriptions (e.g., "ABC's LAN") prevents the mouse-over display from working (i.e., where it...
-
07:45 PM Bug #142 (Resolved): Alias autocompletion broken
- Alias autocompletion is broken in the firewall and NAT edit pages at a minimum, though it works for nesting aliases.
-
07:27 PM Bug #141 (Resolved): Reserved names cannot be used for aliases or interfaces
- If a reserved name, such as 'max', is used for an alias or interface it breaks the ruleset. Need either an alias blac...
-
07:24 PM Bug #140 (Resolved): Switching to AON should generate proper full NAT rules
- Switching to AON only adds an outbound NAT rule for the LAN subnet, for outbound traffic to WAN.
It should add th... -
06:38 PM Bug #139 (Resolved): PPTP Server subnet and clients needs combined
- The PPTP subnet size and number of users field needs to be combined as it is in m0n0wall, since the two are tied toge...
-
06:28 PM Bug #138 (Resolved): Missing input validation for aliases
- Aliases have nearly no input validation, making it very easy to create invalid rulesets.
- 03:37 AM Revision 7a6a0c0a: Stop spamming the logs with config_unlock() is depricated please use unlock().
- 03:22 AM Revision ddf2c940: Merge branch 'master' of git@rcs.pfsense.org:pfsense/mainline
- 03:22 AM Revision 8b0d920e: allow sending of same message twice when 'testing' smtp service
- 03:21 AM Revision 09725e76: add links to IPsec logs under IPsec status and other pages
- 02:34 AM Revision c20acc35: Kill racoon when disabling IPSEC. Restart it if re-enabled.
- 01:51 AM Revision 4937fc88: Don't add port on no nat rules. Fixes #120
- 01:29 AM Revision e979cfc6: Don't add port on no nat rules. Fixes #120
- 01:03 AM Revision 68b0c7eb: show what pass/linked icons mean
- 12:55 AM Revision 537dff78: show pass icon for rdr pass entries, fix editing of pass entries
- 12:34 AM Revision f891bf66: old version got committed accidentally, fix
11/07/2009
-
10:13 PM Bug #137 (Resolved): Change of IPsec remote gateway doesn't trigger SPD reload
- To replicate:
1) Add a IPsec VPN, check SPD
2) Change remote endpoint IP
3) Check SPD - old endpoint IP is used... -
09:07 PM Bug #136 (Resolved): Issues with linked filter/NAT rules
- 1) Multiple NAT rules can be assigned the same filter rule
2) when removing the link (i.e. switching to "pass" or "n... -
08:55 PM Bug #120 (Resolved): 1.2.3 RC3 NO NAT rules have ports 1024:65535 added to destination
- Applied in changeset commit:"4937fc88d1f0f9bf5b4d0268797de7a6e6ddcecc".
-
01:01 PM Bug #93 (Closed): Filter log parsing - potential 2.0 bug
- I can no longer reproduce this. It may have been a side effect of another bug, or something specific about the log en...
- 08:57 AM Revision 297ed624: Fix "Filter rule association" "Pass" option
-
04:46 AM Bug #135 (Resolved): Connecting to FTP server causes panic
- If you add a port forward for TCP 21 on WAN, and connect to the FTP server from the WAN side, the box panics.
FTP... -
04:10 AM Feature #132: update OLSRd to 0.5.6-r6
- Scott asked because we currently don't know of anyone using it. It's the only feature not in widespread use to our kn...
-
03:58 AM Feature #132: update OLSRd to 0.5.6-r6
- Currently not.
Our mesh network operators require the users to use r5 or r6, because of some problems in r4.
So... - 03:33 AM Revision 093bcebc: Move newer xmlreader code to xmlreader.inc. Restore old xmlparse code to xmlparse.inc. Default to the older xmlparse.inc but add a flag check if /cf/conf/use_xmlreader is present the newer code will be included instead until the remaining bugs can be resolved with it (see rcs for many).
- 03:28 AM Revision 26433cb8: Adding newer xmlreader code to it's own file so that it can be turned and off until remaining bugs are fixed
- 01:24 AM Revision d1f9da0a: Nuke old dev bootstrap code that is no longer in use
11/06/2009
-
11:36 PM Bug #134 (Resolved): Active mode FTP causes a panic
- To replicate, connect to any FTP server in active mode, and try a directory listing. The box will immediately panic w...
-
10:49 PM Bug #127: Empty config entries returned as array
- This is wrecking all kinds of things in 2.0, so the new xmlreader has been reverted for the time being.
If you wo... -
05:46 PM pfSense Packages Bug #133 (Resolved): console change lan ip causes fatal trap 12
- Reproduce:
1) Install pfsense-2.0-ALPHA-ALPHA-2009-10-25-1210 into vmware (esxi4) on 0.9gb HD, used default of smp e... -
04:02 PM Feature #132: update OLSRd to 0.5.6-r6
- Are you using OLSRd currently in pfS?
-
03:02 PM Feature #132 (Resolved): update OLSRd to 0.5.6-r6
- it looks like 0.5.6-r6 is out with some bugfixes ( http://www.olsr.org )
Is it possible to get it into the 1.2.3 r...
11/05/2009
-
03:47 PM Feature #129 (Closed): CNAME support for dnsmasq
-
09:07 AM Feature #129: CNAME support for dnsmasq
- I did some more research on this matter.
* There are reasons not to use CNAME records:
http://cr.yp.to/djbdns/n...
11/04/2009
-
09:42 PM Bug #131: "Static route filtering" doesn't add rules for routes on WAN
- It's intentionally skipped for WAN (and WAN only, OPT WANs are handled correctly - except in the case of a DHCP inter...
-
06:11 PM Bug #131: "Static route filtering" doesn't add rules for routes on WAN
- That code didn't paste well. Here's a second go at it:...
-
06:11 PM Bug #131 (Resolved): "Static route filtering" doesn't add rules for routes on WAN
- The "Static route filtering" option (under System -> Advanced) doesn't account for packets entering and leaving the s...
-
08:36 PM Bug #111 (Resolved): addresses ending in .224-239 will not policy route
-
08:35 PM Bug #81 (Resolved): Captive portal problems
-
01:53 PM Feature #130 (Closed): Add color picker to rules / nat rows
- Add a color picker widget and allow user to pick a color that will appear in the rule row.
-
11:53 AM Feature #129: CNAME support for dnsmasq
- No. We would loose too many features such as failover-dhcp (CARP).
-
11:51 AM Feature #129: CNAME support for dnsmasq
- I see. Would'nt it be possible to substitude isc dhcpd entirely with dnsmasq?
-
11:48 AM Feature #129: CNAME support for dnsmasq
- Thanks but we cannot migrate to the new version of DNSMASQ until someone writes a replacement for the isc log scannin...
-
11:46 AM Feature #129 (Closed): CNAME support for dnsmasq
- As of version 2.46 dnsmasq supports limited support for CNAME entries(1,2). When i was about to test the attached pat...
-
08:32 AM pfSense Packages Bug #128: squid upstream proxy
- https://rcs.pfsense.org/projects/pfsense-packages/repos/mainline/commits/4c09ba4183f227ffc827f08c74e929738796e883
-
08:30 AM pfSense Packages Bug #128: squid upstream proxy
- fixed !
11/03/2009
-
05:27 PM Revision cf222376: Relax some very strict cases.
-
05:12 PM Revision f5881023: Be more strict on shaper checking and what is written to config. Clean up whitespace while here.
-
12:30 PM Revision 154deb02: Unbreak returning the real mem and web interface in general. Pointy-hat-to: Scott.
-
12:26 PM Revision 101ccd14: Unbreak the wizards. Some one enabled this disabled parts without even testing! Pointy-hat-to: scott@?!
-
10:53 AM pfSense Packages Bug #128 (Resolved): squid upstream proxy
- Using Squid with an upstream proxy, the GUI says to use port 7 to disable ICP protocol, but the config file does not ...
- 02:35 AM Revision 8217d34d: Fallback to using hw.realmem and hw.physmem sysctl's when we cannot probe the available memory from bootup log file. RouterStationPRO is an example
11/02/2009
- 09:27 PM Revision 08b17c6d: Add default load balancing monitor types for ICMP, TCP, HTTP, HTTPS and SMTP from BillM
-
05:57 PM Revision 361a1b3e: The wizards do not set the rule type and queues should be enabled even on block rules so add the queues to the rules even if the type of rule is not set(which means pass btw). This unbreaks the traffic shaper wizards and block shaping rules.
- 12:38 PM Revision 3b52c5af: Woops, remove accidental debugging line.
- 09:41 AM Revision 2580f584: remove unnecessary cat
- 09:27 AM Revision 5d412624: Cleanup of firewall_nat_out_edit.php, whitespace changes, add curlies
- for statements. Unset dstport and natport so the firewall rules do not
break. -
03:31 AM Bug #126: XML parser errors when enabling SSH
- This also happens when adding a new interface under Interfaces -> Assign.
Warning: XMLReader::read(): /cf/conf/ba... -
02:24 AM Bug #126 (Resolved): XML parser errors when enabling SSH
- Enabling SSH under System -> Advanced results in this at the top of the screen after saving:
Warning: XMLReader::... -
02:47 AM Bug #127: Empty config entries returned as array
- Here's another instance of something being returned as "Array" when it shouldn't be.
php: : There were error(s) l... -
02:26 AM Bug #127 (Resolved): Empty config entries returned as array
- I've seen this pop up in many text boxes of the web interface, for instance by browsing to Interfaces -> WAN, with th...
-
02:08 AM Bug #125 (Resolved): Erroneous "interface not present" alert
- after booting a fresh install and logging into the web interface, an alert is erroneously shown:
[interfaces] vr1 i... -
02:04 AM Bug #124 (Resolved): Polling problems with 8
- in system logs after boot with default config.xml:
php: : The command 'sysctl kern.polling.enable=0' returned exi...
10/29/2009
-
12:45 PM pfSense Packages Bug #123 (Resolved): apache_mod_security_settings.xml bad formating.
- Applied in changeset commit:"5804c04459a7746b0b73caf42e2e937fcc640f8b".
-
12:05 PM pfSense Packages Bug #123: apache_mod_security_settings.xml bad formating.
- Scott Ullrich wrote:
> Which field tag? The file looks OK at first glance.
Look at line 155 on the repository li... -
11:45 AM pfSense Packages Bug #123: apache_mod_security_settings.xml bad formating.
- Which field tag? The file looks OK at first glance.
-
11:38 AM pfSense Packages Bug #123 (Resolved): apache_mod_security_settings.xml bad formating.
- On http://redmine.pfsense.org/repositories/entry/pfsense-packages/config/apache_mod_security/apache_mod_security_sett...
-
03:23 AM Todo #122 (Resolved): Update the miniupnpd pfPort after the 1.2.3 release
- There is a typo in miniupnpd, and might as well update the current miniupnpd in the process.
Oct 29 08:18:32 miniup...
10/28/2009
-
08:06 PM pfSense Packages Bug #121 (Rejected): Problem with VIA Veloctiy NetworkCard
- Hi,
my Via Velocity network card (onboard of my VIA EPIA EN1200EG) runs in this error when I install 1.2.3RC3 new:... - 07:46 PM Revision 84fa0d60: Turn off IPSEC net.inet.ip.ipsec_in_use when IPSEC is disabled
- 02:56 PM Revision ad6722c5: Set sysctl net.inet.ip.ipsec_in_use=1 when starting racoon
- 01:14 AM Revision 4e3cdd2e: Revert "Fix no nat rules where ports 1024:65535 is added Resolves #120"
- This reverts commit 395a0413858c2301732e82d89f6a1b94ea0886f4.
- 01:13 AM Revision 6734081a: Revert "Fix no nat rules where ports 1024:65535 is added Resolves #120"
- This reverts commit 8763e56d20eec74f1c4caaea80ac1cfcb46bbe03.
- 12:40 AM Revision 8763e56d: Fix no nat rules where ports 1024:65535 is added Resolves #120
- 12:40 AM Revision 395a0413: Fix no nat rules where ports 1024:65535 is added Resolves #120
10/27/2009
-
09:15 PM Bug #120 (New): 1.2.3 RC3 NO NAT rules have ports 1024:65535 added to destination
-
08:45 PM Bug #120 (Resolved): 1.2.3 RC3 NO NAT rules have ports 1024:65535 added to destination
- Applied in changeset commit:"8763e56d20eec74f1c4caaea80ac1cfcb46bbe03".
-
08:16 PM Bug #120: 1.2.3 RC3 NO NAT rules have ports 1024:65535 added to destination
- I'm not sure if this is the proper method for fixing this issue, but I modified my /etc/inc/filter.inc file with the ...
-
07:57 PM Bug #120 (Resolved): 1.2.3 RC3 NO NAT rules have ports 1024:65535 added to destination
- In 1.2.3 RC3, when creating a NO NAT rule, ports 1024:65535 are added to the destination portion of the statement. F...
10/26/2009
- 05:14 PM Revision 9694e102: Automatically populate linespeed when prefilling
- 04:50 PM Revision 9d933d94: Handle secondary DNS correctly for 3G
- 04:43 PM Revision 1d894eaf: Switch over to handling DNS from ppp.linkup allowing mulitple 3G cards to coexist on the same box
- 06:08 AM Revision d0c04c77: Kill foreach error
- 06:06 AM Revision 5870589c: Adding diag_logs_ppp.php
- 06:02 AM Revision 220ee0de: s/IPsec VPN/IPsec/ to keep the tab behavior
- 06:00 AM Revision 16bc1e31: Set correct tab title
- 05:59 AM Revision beb26389: Set title
- 05:48 AM Revision 295e19dd: Add PPP logging tab
- 05:40 AM Revision ffeb5acf: Handle uping interfaces a bit more sanely
- 05:27 AM Revision 7284d850: Revert interfaces_bring_up changes
- 05:26 AM Revision 2ebf3945: Check to see if interface exists
- 05:09 AM Revision a6bce436: Add space between interface and real interface brackets
- 04:55 AM Revision 70af94d7: Add ppp endpoints IP as gateway
- 04:25 AM Revision 36bf235e: Add and use ppp-script
- 03:53 AM Revision bb26581c: Move "
- 03:48 AM Revision f532da19: Remove extra "
- 03:41 AM Revision 08f03cdf: Add newline
- 03:29 AM Revision 55563f1b: Give more room to the interfaces td (40%)
- 03:22 AM Revision 87519eb7: Fix typo (missing ])
- 03:17 AM Revision 7a6f7c55: Show when configuring interfaces on bootup for newly added interfaces (qinq, ppp, etc)
- 02:49 AM Revision 5ad9b2a7: Call rc.linkup after up event
- 02:26 AM Revision b8103b06: Return up instead of running
- 02:03 AM Revision 2a1226ad: Simplify logic
- 01:47 AM Revision 30cee7b2: Add dns server discovered with ppp
- 01:07 AM Revision 8995a99c: Remove booting newline:
- 12:55 AM Revision 410cdac4: Set booting to true.. not TRUE
- 12:37 AM Revision 568b1358: When a real interface is passed to get_real_interface() simply pass it back
- 12:06 AM Revision 77ccab82: On second look, turn on PPP interfaces at the get_interfaces_with_gateway level
10/25/2009
- 11:57 PM Revision 23557bc3: Add nat on rules for PPP
- 11:24 PM Revision ec054b7c: s/interface_bring_up/interfaces_bring_up/
- 11:15 PM Revision 891546ea: Full wlan name is returned now. Use it
- 11:02 PM Revision b99256c1: Add misc comments
- 11:02 PM Revision a2934331: Use get_real_interface() and does_interface_exist()
- 10:31 PM Revision cddb1be2: Do not specify a wlan # and let freebsd decide and return the interface that was created before renaming.
- 09:31 PM Revision 19e83210: Refactor wireless code a hair making it work on 8.x
- 09:04 PM Revision 88157f66: Take into account hostap type interfaces
- 08:37 PM Revision 10394059: Unbreak wireless on 8.x
- 07:38 PM Revision 46c3f09a: Add links to prefill ATT and Spring settings
10/23/2009
- 06:24 PM Revision 064b183b: Silence foreach() error when no PPP interfaces exist
- 06:16 PM Revision 58ebf6bb: Setting the VIP to the VHID ID has to be the
- single most brain-headed decision in the history
of man-kind. Do this correctly by finding the first
available vip i... - 05:44 PM Revision 00380613: Unbreak find_interface_ip for normal interfaces
- 05:38 PM Revision a71b32d2: Unbreak CARP Enable/Disable button
- 05:29 PM Revision 27625b39: Unbreak status -> interfaces. TODO: Unbreak Disable Carp button
- 05:17 PM Revision 6a423903: Unbreak find_interface_ip(). test case: echo find_interface_ip(lan);
-
04:49 PM pfSense Packages Bug #119 (Resolved): axfrdns not working in dns-server package
- Zone transfers are not working in the dns-server package.
I have traced the problem out to these issues:
1. tin...
10/22/2009
- 10:34 PM Revision 214630ed: Correctly fix the function so that the table expands again.
- Whoever rewrote this must have been sleep deprived or really lost.
- 10:24 PM Revision da82a94a: Unbreak filter_get_direct_networks()
- Check if the array is empty
- 10:11 PM Revision 340de029: Remove double dollar sign
- 10:07 PM Revision 21729218: Restore the filter_get_vpns_list() functionality
- Increase readability
-
05:35 PM Revision efdf0b9c: Correctly note that the pfSenseupgrade is starting
-
05:35 PM Revision 4459ceba: Correctly note that the pfSenseupgrade is starting
-
08:26 AM Bug #118 (Resolved): Captive portal not work
- Dear Sir
I use this version "2.0-ALPHA-ALPHA built on Tue Oct 20 04:02:07 UTC 2009
FreeBS...
10/21/2009
- 11:53 PM Revision 020d757a: Reload filter in case we need to sync CARP data
- 11:53 PM Revision ced6d6df: Reload filter in case we need to sync CARP data
-
08:35 PM Bug #117 (Resolved): dns forewarder + carp not working properly
- sullrich pushed 020d757a to pfsense/mainline on branch master
Reload filter in case we need to sync CARP data
sullr... -
07:03 PM Bug #117 (Resolved): dns forewarder + carp not working properly
- I have two pfsense boxes: core-01a and core-01b. The two boxes have a working carp setup on the LAN side. IP's are:
...
10/20/2009
- 03:34 AM Revision e0d47cb9: Size is already formatted in bytes
- 03:29 AM Revision 42f98354: Instead of showing just <AES for Hardware crypto show the entire supported family. EX: o AES-CBC,SHA1,SHA256
- 03:21 AM Revision 3e743abe: Only launch ppp once for each connection at a time
- 03:18 AM Revision c8914ce6: Use sh -c
- 03:17 AM Revision bb992eb3: Writw out ppp.linkup file
- 03:00 AM Revision a469927d: Handle PPP interfaces
- 02:54 AM Revision 92b88c1a: Correctly handle PPP interfaces with get_interface_info()
- 02:45 AM Revision 85945169: Add support for PPP cards to get_real_interface()
- 02:19 AM Revision b4d36392: Reload filter after applying (what if user changed the interface name, etc)
- 02:16 AM Revision 4aca19b3: Use useland pppd for ppp connections
- 02:16 AM Revision 58ed68e5: Fix typo
- 02:16 AM Revision 04b4f4e3: Adding uuid generator. More information:
- http://www.shapeshifter.se/2008/09/29/uuid-generator-for-php/
10/19/2009
-
11:33 AM Bug #116 (Resolved): Carp and Captive portal don't work together
- I've set CARP to work between two servers, using the WAN interface for synchronization, and it works fine.
Problem...
10/18/2009
10/17/2009
-
11:13 AM Feature #115 (Rejected): PPTP Idle Timeout Options
- I would like to request the ability to set an idle timeout for a PPTP session. This way the session would be disconn...
- 05:45 AM Revision 8273ea35: Do not attempt to send notices when booting
- 04:11 AM Revision 5ac70f13: When a user clicks on System -> Packages take them to the installed packages tab by default. This will help remind them of package updates that are needed before insalling a new package
- 12:19 AM Revision fd9ba63c: Remove msort()
10/16/2009
- 09:51 PM Revision 536dd117: Catch up to muli interface changes and really turn off bogons on WAN
- 09:46 PM Revision 9c426e33: Do not write out <sitedown></sitedown> if the Fall Back Pool is set to none.. Simply unset() it.
- 09:31 PM Revision a780bd66: Prevent the error: Warning: Illegal offset type in /usr/local/www/load_balancer_virtual_server.php on line 84
- 07:57 PM Revision 21cc2022: Seperate screen into three areas: Add item to pool, add /edit load balancer pool entry and current pool members
- 07:47 PM Revision 7889db96: Adjust sizing of items that appear when setting the type dropdown: do not use vncell, use vtable so that it does not look so strange.
- 07:35 PM Revision 791d1c59: Move description line item underneath Name
- 07:26 PM Revision 0b289dca: Default to the Load Balancer Monitors tab
- 07:22 PM Revision 45c20bba: Move description line item under Name
- 07:10 PM Revision 791a5dbe: Reorder tabs again. Protocols should be the last tab. Cleanup the Relay protocols form adding a listtopic item seperating the page. Misc centers
- 07:04 PM Revision c47d0c30: Reorder tabs with Monitors being first in the order that items should be created. IE: Monitor items should be created, then pools and then finally virtual servers and relay protocols, relay actions
- 07:01 PM Revision b5407fde: Misc page cleanups. Do not tag every item on page as a NOTE as this will overwhelm the user upon first glance. Add notes that a pool member needs to be created first instead of showing an empty select box for server pool and fall back pool items. Make sure the listtopic uses a colspan=3 so that the header reaches across the page
- 06:52 PM Revision 2898a440: Misc HTML cleanups. Space out elements of add/delete pool memeber area. Seperate add/remove area with a listtopic element. Add descriptive text for Server IP address in order to make page a little more user friendly for the uninitiated.
Also available in: Atom