Separate string and '\n' to make it easier to translators
Add a missing gettext() call
Implement gettext()
Reviewing gettext()
Ticket #517. Fix saving of monitorip in dynamic interface cases.
Merge branch 'master' into gettext
Merge remote branch 'mainline/master'
Ticket #525. Correct message shown for a schedule now that the behviour has changed.
Actually correctly handle editing of vips with index 0.
Ticket #389. Correctly make the ldap object picker work and handle various errors.
Ticket #378. Correct text to reflect the allowed 0 value.
Ticket #378. Correctly handle a timeout of 0 to mean never timeout.
Rwviewing gettext()
Adding gettext() to save button
Merge branch 'gettext' of rcs.pfsense.org:pfsense/bluepex-clone into gettext
Add missing gettext() call
Automatically select destination as $Interface address when Interface is changed just for new rules, or, if previous rule has already the combination interface + interface address selected
Add binding support for row helper drop downs
Allow mapping a select drop down to any area of config.xml
Addin gettext functions do system::firmware
Addin gettext to page title
Fix test to not penalized variable value of 0.
Remove option 'any' from Destination Port Range
Gettext for System::Cert manager
Mark this just informative textarea as readonly
correctly go to interface for edit bogons/rfc1918
add note about 1:1s and interface IPs
remove unnecessary input validation checks
remove this check, the WAN IP can be used in binat now with no problems
remove bunk input validation
Improve NanoBSD slice updating/changing a bit, add some error checking. Resolves #534.
Relocate some NanoBSD functions to a central place. Change NanoBSD diagnostics and system info widget to use the new code. Ticket #533 and some prerequisite parts of Ticket #534.
Remove all code for directions it is not needed any more on passthrough ip's.
Add missing ;
Conflicts: etc/inc/filter.inc
Add a new alias type, urltable, which downloads a file of IP/CIDR addresses and loads them into a pf persist table instead of importing the addresses directly into a traditional alias. This allows for using huge tables of addresses that would otherwise break the GUI and/or fail to load into pf. Part of ticket #512
Validate imported URL data. Resolves #530.
Warn the user when we cannot get the MAC address on pass through auto add case. Also when a user does a logout through clicking the logout form exit after showing sending info on logout successful.
Allow a passthrough mac to be deleted by a POST. Take the neccessary actions to disconnect and remove the mac from CP.
Make pasthrough GUI code catch-up with the latest changes.
Use tables of ipfw for passthrough mac entries. This makes it scale way better than previously. Fix multiple entries on adding mac through entries automatically after login for the same user. The changes allow even pass through mac to be controlled from the Status->Captiveportal. Use serialize/unserialize on some files that keep temporary information to speed up calculations. Really allow mac passthrough to follow radius rules or time out rules when present.
Call dst_change with right param and on right place to use correct destination address for new rules
Consider VIPs on Destination Address and below few fixes
- Rename change_dst to dst_change to follow standards- Fix indent
changed destination type according to the selected interface
Validating Source address and Destination address
Hidding Redirect Target Port when using GRE and ESP
Disable redirect port field when a port different of (other) is selected
Add a new option which allows the admin user to configure CP so that it automatically enters an MAC passthru entry. The MAC is taken from login details and has to be removed manually. Also do improvements on rules handling and pipes. Add some optmizations. Teach the GUI/backend on ip/mac passthrough to configure a bw limit for this entries.
Show p2 items correctly (add missing td's)
Perform IP/Host and Port number validation for Authentication servers in the OpenVPN Wizard.
Restrict country code entry in the OpenVPN wizard to two letters.
Block source edit on associated firewall rules
Fix default port choices for LDAP/RADIUS server in OpenVPN wizard.
Fix OpenVPN port default choice in Wizard. Also fix protocol specification. (Should be Uppercase)
Revert "Fix finding next OpenVPN port. Protocol should be lowercase." - This was wrong in the wizard, apparently, and not the main page.
This reverts commit a48613a65d8d04dfec2aeefdb37440bdd399cdab.
Fix finding next OpenVPN port. Protocol should be lowercase.
Fix port range calculation
fix text
remove commented out bit that causes annoying pop ups in IE. Ticket #299
show port and proto
fix up text
clarify text
Fix growl issues.
Ticket #518Ticket #519
Submibtted-by: Blake Skinner
Ticket #508. Make TFTP proxy configurable by System Advanced->Firewall/NAT for several interfaces.
Do not use the presence of lan as an indicator of having only one interface. Actually deduce that from the count of interfaces. It is perfectly legal on 2.0 to not have a lan interface and only opt/wan ones.
Update system information widget to use new version checking mechanism.
Beef up the version comparison code. This should let us compare several combinations of local and remote versions and properly determine if the current version is older or the same as the remote version.
Fail over update check to report the supplied version from the remote server if it is not a build time/datestamp.
Fix whitespace
Fix CA cert dupe detection when no certs yet exist.
Add titles to wizard steps, change some wording to be more consistent.
Ticket #386. Add even the network address to the list of addresses on proxy arp vips to the naat out edit.
Ticket #483. Load the bcmath extension dynamically through PEAR for Radius accounting.