standardize URLs
standardize on https on www.pfsense.org
standardize on https://www.pfsense.org
standardize on www.pfsense.org and HTTPS, point package URLs topackages.pfsense.org
Fix #3521, show correct field descr
fix text, remove product_website mentions here since that's not actually used anyway.
Use descr prepended to voucher fields containing descriptions to have them encoded as CDATA. Fixes #3441
Improve checks for params 'id', 'dup' and other similar ones to make sure they are numeric integer, also, pass them through htmlspecialchars() before print
Pass id variable through htmlspecialchars before print it
Validate rule Advanced Options numeric entries
This makes sure the user puts in ordinary positive integers like "1" and "42" in these advanced options fields. It prevents everything else, including dodgy-looking possibilities like "007" which might actually work OK, but it is safer to allow just plain "7"....
Merge pull request #1010 from PiBa-NL/alias_allow_delete
firewall_virtual_ip , allow deleting last ip-alias if interface uses same the subnet. (while CARP-ip is present)
Fix order of parameters to explode() here
Fix OpenVPN XML section name
Forum https://forum.pfsense.org/index.php?topic=73479.0
Add all advanced options to rule table hover text
Bug #3512
Properly use key here.
better make of gettext in expression (thanks rbgarga)
more fix some variables gettext
fix some variables gettext
Skip input validation when choosing an existing certificate, it should fix #3505
Remove unecessary quotes
Merge pull request #997 from phil-davis/master
Make Firewall Rules Advanced Options open if used
Refine check for existence of rule advanced options
Merge pull request #995 from ayvis/master-syntax-errors
syntax errors correction
Remove not needed anymore function
Currently, if there are some settings defined in Firewall Rules Edit, Advanced Features, Advanced Options, the Advanced Options section is left minimized when the Firewall Edit screen is displayed. This makes it easy for a user to not notice that there are some Advanced Options settings....
syntax errors corrected
Merge pull request #984 from phil-davis/master
Return GWG IP protocol (version) when no gateway IP
Merge pull request #992 from Doncuppjr/master
Add UEFI support to Network Boot options.
Remove alert confirmation to delete a package, today user need to confirm twice
Validate if src OR dst have IP address set when protocol is IPv4+v6. Fixes #3499
Added support for UEFI booting to Network Booting configuration. modified: conf.default/config.xml modified: etc/inc/services.inc modified: usr/local/www/services_dhcp.php
Tidy up GWG dropdown selection tests
Tested this making a new rule, and editing existing IPv4, IPv6 and IPv4+Ipv6 rules, and switching the IP version on an existing rule. Seems to work!
Tidy "gateway name - IP" in dropdown list
While I notice this also, for a plain gateway, the current IP address is also listed in the dropdown list text, like "WAN_DHCP - 10.42.11.1". If there is no IP address currently, it might say "WAN_DHCP - dynamic". But for some DHCP gateways that have not had any non-default manual settings done, it can say "OPT1_DHCP ". This gets rid of the silly-looking ""
Use return_gateway_groups_array() to build correct GWG list
Now return_gateway_groups_array() always returns at least the IP version 'ipprotocol' of each GWG, even if all its members are down at present. It is better to use this to check what IP version the GWG is. The previous check was using the IP address of the first member of the GWG to deduce 'ipprotocol'. That would fail if the WAN was DHCP and was down.
Fix #3492, make sure filesystem is read-write
Make the IPSec status page work with strongswan
Fix #3486, delete /var/crash content when click 'No'
Add a function to read the status of connections/SAs/SPDs from smp plugin of StrongSWAN. No need to go through the setkey dumps
Port dropdowns: Put port no. after descrip
At the moment, even if a port number is entered, it's re-displayed only as a port name when editing. Users who don't have port names -> numbers lookup memorised can't easily confirm when editing a rule, that the port is as intended. Then, when they return to firewall_rules.php the same rules have ports displayed as numbers not names (inconsistent)....
Push log changes for IPSec and fix generation of strongswan.conf and ipsec.secrets to be properly considered
Fix #2302, save custom uploaded l7 pattern files on config.xml and replicate it to slave
Fix whitespaces and indent
This one too.
Element id's are to be unique. 'provider' used is elsewhere.
Better done globally here in the function.
XHTML Compliance
Interfaces
Update firewall_rules_edit.php
PIM protocol for firewall rules.
These are remenants of old 1.2 remove them from the wizard
Make a good copy of PHP_errors.log for crash reporter
Forum report https://forum.pfsense.org/index.php/topic,72877.0.html
Merge pull request #938 from nagyrobi/patch-12
Create ntp_status.widget.php
Merge pull request #937 from nagyrobi/patch-11
Create ntp_status.inc
Merge pull request #936 from nagyrobi/patch-10
Update status_rrd_graph_settings.php
Merge pull request #935 from nagyrobi/patch-9
Update status_rrd_graph_img.php
Merge pull request #934 from nagyrobi/patch-8
Update status_rrd_graph.php
Merge pull request #933 from nagyrobi/patch-7
Update status_ntpd.php
Make this usable
Merge pull request #932 from nagyrobi/patch-6
Create services_ntpd_pps.php
Correct some issues on status
Merge pull request #931 from nagyrobi/patch-5
Create services_ntpd_gps.php
Another fix even for XHTML compliance and proper selection
Fix some obvious problems in the code
Merge pull request #930 from nagyrobi/patch-4
Update services_ntpd.php
Merge pull request #947 from stilez/patch-2
Filter log - ensure IPv6 AJAX resolve works too
Using str_replace(array('.', ':') as asked
Filter log - ensure IPv6 works too
Remove old webguiport code
webguiport is managed in system_advanced_admin.php these days, not here in system.php. This validation is never executed, so might a well clean up old unused code.
Merge pull request #945 from phildd/master
Enhance interface gateway data entry descriptions
Merge pull request #939 from phil-davis/master
Dodgy-looking stuff in graph calculations
Merge pull request #659 from mss/extended-query-example-work
Improve LDAP DN examples
Merge pull request #943 from stilez/patch-1
AJAX-ify DNS lookups in standard firewall/filter
The msgbox is no longer needed since there will be a validation process per se
The standard firewall log has lookup ability but these open in a new tab/window, they don't show in the log, other places the same IP appears in the log aren't visibly resolved, - basically its begging for AJAX-ing....
Take single and double quotes into consideration
Fix issue with CSR generation. Ticket #2820
fixed tail path
Update ntp_status.widget.php
Fixes #3460. Ask for validation when real operation will be done and ask for the operation with POST to get protection from CRSF.
Remove code that is commented
I noticed that the graphs in this post - https://forum.pfsense.org/index.php/topic,72794.0.html - had numbers for in-block and out-block that had similar numbers to in-pass and out-pass. That seemed hard to believe. Found these calculations that look wrong.
Updated errorneous paths. Sorry.
Dedicated widget which has a javascript clock showing the server time accurately, and based on NTP's running state displays information about sync source, GPS state etc. It refreshes contents every minute, without reloading the entire page.
NTP widget helper
Add NTP graph to settings
Add NTP graph drawing
Add NTP graphing
A bit more informative NTP status page...
Separate page for other PPS sources config
Separate page to set GPS receiver pps sync
Extended options for NTPd
Fixes #3461. Remove any special char that can lead to shell/XSS compromises from submitted input.
Merge pull request #890 from N0YB/Gateway_Monitor
Gateway Monitor Advanced Settings
Move this global declaration to the proper file rather than backend code
Help ticket #3449:
Improve data validation to avoid save a host/subnet or a IPv4 withinvalid mask. The reported error is on javascript and only happen onIE8,but this fix will prevent the same issue happening in the future ona different browser.
Use correct parameter (bootfile-url) to configure netboot on DHCPdv6, it fixes #3421
Use htmlspecialchars(), a better solution for #2952