Prohibit adding aliases containing FQDNs in static routes. Fixes #2941
Tidy up "firewall_aliases*.php" XHTML
Add CDATA sections to SCRIPT tagsClose INPUT and BR tagsUpdate HTML boolean operatorsMove NOWRAP to class statementAdd missing closing TD tag
Fix URL add when you break sequence for addresses and details, shile I'm here, simplify logic
Preserve all URLs when one of them is invalid
Back to previous tab when click on Cancel
Preserve old URLs when an error happens, also, fix descriptions save for URLs
Simplify logic
Return to correct tab after save or delete an alias
Save URLs and URL Table details
Fix whitespaces and indent
Use class tabcont for table
Fix: Repopulate field
Refine saving/applying on more pages - don't show apply or take an action unless the user is allowed to do that.
Return the user to the tab they were working originally working on
Fix hardcodded alias type so alias suggestion works as expected while creating nested aliases.
Overcome laziness to avoid unnecessary loop
Fix of bug #2374 "When entering values in firewall rules leading andtrailing spaces are not deleted"
cleanup: code for building arrays for autocompleted fields
Add _ to the list of are allowed characters
When the "OpenVPN" users type was commented out of the drop-down, this function wasn't adjusted so it was off by one in its counts, making the URL table update frequency box disabled.
feature #2320: JS helper to toggle subnet mask for ipv4/v6 during input
http://redmine.pfsense.org/issues/2320
prep work for feature #2320: tag fields for ipv4v6
Update help text for Host alaises to indicate FQDNs are allowed.
The function split() is replaced by the function explode(). Starting with PHP 5.3 this is deprecated and with version 6 gone.Replacing it surpresses all the warnings
Adding hook
Add hooks
Add alias edit hook
Merge remote branch 'upstream/master'
Feature #1603. Correct nested urltable alias code to be more fullproof to errors and does not break the ruleset on large lists of urltables. Though this needs a revisit to work properly since it breaks urltable alias property of reloading contents.
Merge remote-tracking branch 'upstream/master'
Feature#1603. URL table aliases should be usable within network type aliases.
Reject alias names that are too long. Fixes #1510
Conflicts: etc/inc/rrd.inc usr/local/www/interfaces.php
Add all to the reserved keywords
add subnet mask clarification for IPv6 and correct default count to 128 bits
Add alias support for source and destination ports on outbound NAT.
Check for aliases in 1:1 and outbound NAT rules, too.
In update_alias_names_upon_change function add capability to access more deeply nested sections and fields.
Resolves #1224. Correctly change name on port alias in firewall rules if the alias name changes.
Conflicts: etc/inc/interfaces.inc etc/inc/system.inc
Ticket #1183. Skip call to filter_configure() here, this will be done when user will click on 'apply changes' button in firewall_aliases.php
Don't run mb_convert_encoding on descr field, it's cdata protected in the config now and this just causes some characters to be lost on input. Ticket #1168
comment out unfinished OpenVPN Users alias option, can finish for a post-2.0 release
Conflicts: etc/inc/interfaces.inc etc/inc/vslb.inc usr/local/www/interfaces.php
Move to index.php.
Conflicts: etc/inc/filter.inc etc/inc/system.inc usr/local/www/interfaces.php usr/local/www/interfaces_gif_edit.php
Fix XSS issues
Bring in XSS id fixes from m0n0wall
up the subnet bits from 32 to 128 so that the access can be locked down to the host for ipv6.This will require a javascript routine that prevents a subnet mask higher then 32 bits for a ipv4 address.
Alternatively the subnet bits should be steered by javascript to prevent use of more then 32 bits on a ipv4 address. When a hostname is used all bets are off, even worse if the hostname is a combined ipv4/ipv6.
Use a list that includes WAN and LAN here rather than only OPT.
Fix the delete button and a couple other small errors. Ticket #891
Simplify sprintf
Modify various (s)printf format strings to allow translations to change the order of the inserted strings.
Fix text
Fixing gettext calls on firewall_aliases_edit.php
Merge remote branch 'mainline/master' into 2_firewall
Conflicts: usr/local/www/diag_nanobsd.php usr/local/www/diag_packet_capture.php usr/local/www/firewall_shaper.php
Change these to lower-case to match the lower-case names from the previous revert.
Update the VPN names in the reserved keywords list for aliases.
Checked gettext() implementation on firewall_aliases_edit.php
Corrections gettext implementation on firewall_aliases_edit.php
Fixes #698. Always check if we are dealing with an ip value to then store the subnet in the config.
Review firewall_aliases_edit.php - part 2
Review firewall_aliases_edit.php
Revert "Implemment gettext() calls"
This reverts commit 49031495b501e4477941fa6248fe94cc698f9dcd.A lot of mistakes
Conflicts:
usr/local/www/firewall_nat.php
Implemment gettext() calls
Implement gettext() calls
Merge remote branch 'mainline/master'
Conflicts: etc/inc/filter.inc
Add a new alias type, urltable, which downloads a file of IP/CIDR addresses and loads them into a pf persist table instead of importing the addresses directly into a traditional alias. This allows for using huge tables of addresses that would otherwise break the GUI and/or fail to load into pf. Part of ticket #512
Validate imported URL data. Resolves #530.
When renaming or removing aliases, deal with new NAT Port Forwarding fields
Use url consistently
Disable update freqency
Use URL
Add alias data url option. This code existed but lacked a backend daemon to update the data every 24 hours. Adding this as well.
Unbreak ranges.
Improve aliases a little bit to show large aliases.
Allow editing aliases. Pointyhat-to: ?!
Add myself to the copyright
Add some verbage to the on-screen message stating that IP ranges are available for use as well as CIDR networks in aliases.
Ticket #421. Do not allow blank alias names in firewall_aliases_edit.php
Fix a slight bug. This would have caused an empty description in some cases.
Adding support for using IP ranges aliases. If you input an IP Range such as 192.168.0.1-192.168.0.254, it will instead turn that into a number of CIDR networks which will completely fill the range.
Ticket #338. Remove aliases_sort function and keep the list always sorted in config.xml. This reverts to previous behaviour.
Ticket #261 Do not consider ports as hostnames. This changes the is_port function to consider ':'(ranges) as ports. This seems a previous feature i do not agree with much, but users decide right?!
Ticket #258 fix regression.
Fix type handling to save what was choosen end not to guess it. Save the cidr when specified with hostnames seems people used this feature in 1.2.x branch.
More special meaning words.
Add listtopic and note that only ip addresses may be imported.
Add the same checks to the aliases import functionality as the ones that are done during creation/editing of aliases. Ticket #146
Use is_port here.
Add one more check for port aliases now that /etc/services can be used in port names.
Resolves #138 Add propper input validation to aliases. Do not allow to nested different types of aliases. Do not allow on ports to enter something that is not in the range 0-65535.
Please pretty please use the interfaces function rather than than growing yet again the horrendous custom made things. Thank you. Ticket #141
Correct typo Resolves #141