standardize on https://www.pfsense.org
standardize on www.pfsense.org and HTTPS, point package URLs topackages.pfsense.org
Make the Additional tags that may be supplied compliant with new schema
Make the parser more efficient to test for keys rather than searching inside the array
Unbreak listtags(), it should return regular array
Correct variable name, while here unset some large var
Fix #3521, show correct field descr
Provide upgrade code after changes done for Ticket #3441
Merge pull request #1025 from florian-asche/patch-5
Update dyndns.class
Merge pull request #1026 from PiBa-NL/plugin_array_item
fix plugin method for packages to allow for multiple plugins in an 'item' array as 'plugin' is not allowed as array item by xmlparse.inc
set package URL to https://packages.pfsense.org
use xmlrpcbaseurl here too, not product_website
fix text, remove product_website mentions here since that's not actually used anyway.
we actually use xmlrpcbaseurl here, not product_website
Merge pull request #1022 from PiBa-NL/carp_notification
rc.carpmaster/rc.carpbackup notification method for packages.
Only use IPv4_only function if ipv6 is false
Add removed file to obsolete list
Remove sasycnd remenant file
More removal of racoon from referenced in sources
Remove remeants of racoon
Generate nat rules for ipsec when needed
Be more efficient, and ordered about thae tags and also syncrhonize tags with xmlreader
Make this a bit more smart rather having the penalty going over explode
Use descr prepended to voucher fields containing descriptions to have them encoded as CDATA. Fixes #3441
Try a different strategy for fixing #3514 just send a HUP to dhcp6 to get it to reload.
-renamed function to pkg_call_plugins-added is_array()-added function header text-replaced fixed 'plugin_carp' by $plugin_type to allow for generic use
Improve checks for params 'id', 'dup' and other similar ones to make sure they are numeric integer, also, pass them through htmlspecialchars() before print
Pass id variable through htmlspecialchars before print it
Merge pull request #1021 from phil-davis/patch-6
Validate rule Advanced Options numeric entries, it should fix #3510
Validate rule Advanced Options numeric entries
This makes sure the user puts in ordinary positive integers like "1" and "42" in these advanced options fields. It prevents everything else, including dodgy-looking possibilities like "007" which might actually work OK, but it is safer to allow just plain "7"....
Make this a bit more efficient
Merge pull request #1010 from PiBa-NL/alias_allow_delete
firewall_virtual_ip , allow deleting last ip-alias if interface uses same the subnet. (while CARP-ip is present)
Merge pull request #1018 from florian-asche/patch-3
Update services.inc
Do not delete linklocal address
Merge pull request #1019 from florian-asche/patch-4
IPv4 ONLY? YEAH ;)
Added CURL setops from dyndns.class
IPv4 ONLY
Merge pull request #1012 from florian-asche/patch-1
Prepared to make $hosttocheck configureable
Fix order of parameters to explode() here
Merge pull request #1015 from phil-davis/patch-4
Fix OpenVPN XML section name
Forum https://forum.pfsense.org/index.php?topic=73479.0
Merge pull request #1003 from phil-davis/patch-2
Add all advanced options to rule table hover text
Fix for now 'IPv6 - LAN looses Prefix after link event'(forums) with a not elegant solution but works. Probably dhcpv6 client should solve this by itself and generate and event for it. For now just bump dhcpv6 client again to have the prefix interface reconfigured.
pfSense_interface_deladdress() only knows how to delete an ip address, not a subnet. It should fix #3513
Added missing usepublicip with dyndnsCheckIP
Bug #3512
update translate pt_BR gettext file
Make the voucher auth through xmlrpc work.
Properly use key here.
better make of gettext in expression (thanks rbgarga)
more fix some variables gettext
fix some variables gettext
Skip input validation when choosing an existing certificate, it should fix #3505
Remove unecessary quotes
Merge pull request #997 from phil-davis/master
Make Firewall Rules Advanced Options open if used
Refine check for existence of rule advanced options
default openssl to 2048
Better just use start here seems to be more reliable
Correct the step for phase2 algos as well
Correct the generation of the config for mobile tunnels as well
Merge pull request #995 from ayvis/master-syntax-errors
syntax errors correction
Remove not needed anymore function
update link for 2.2
Use a step of 64 here too to comply with what the daemon can parse/understand
bring up appropriate interface for GRE/GIF. Ticket #3281
Currently, if there are some settings defined in Firewall Rules Edit, Advanced Features, Advanced Options, the Advanced Options section is left minimized when the Firewall Edit screen is displayed. This makes it easy for a user to not notice that there are some Advanced Options settings....
syntax errors corrected
Merge pull request #984 from phil-davis/master
Return GWG IP protocol (version) when no gateway IP
Merge pull request #992 from Doncuppjr/master
Add UEFI support to Network Boot options.
Remove alert confirmation to delete a package, today user need to confirm twice
Fix syntax
s/unlink/unlink_if_exists/
Put added option in dhcp config instead of dhcpv6 config.Use empty function instead of <> "" for null test in dhcp network booting config section. modified: etc/inc/services.inc
Validate if src OR dst have IP address set when protocol is IPv4+v6. Fixes #3499
Remove broken 'dynamic6' gateway, we already have ipprotocol to tell us the IP version, leave it more simple using only 'dynamic'. It helps #3484
Fix typo on var name
Add missing option code for uefi booting modified: etc/inc/services.inc
Merge branch 'master' of https://github.com/Doncuppjr/pfsense
Added support for UEFI booting to Network Booting configuration. modified: conf.default/config.xml modified: etc/inc/services.inc modified: usr/local/www/services_dhcp.php
sync up ALTQ-capable interfaces list
Wrap this in an is_array() test, or else if you have no manually configured DNS servers, saving the DHCP settings produces a PHP error.
Merge pull request #986 from andrespetralli/master
Re-enabling static lease updates
Add a file flag to trigger the forced serial or else we may miss it during a firmware update and still end up with an accidentally disabled port.
Small correction for clear code
Ticket #3484 Correct the case for GRE tunnels as well since they behave the same. GRE seems to need the prefixlen 128 specified all the time so do it explicitly to be on safe side
Tidy up GWG dropdown selection tests
Tested this making a new rule, and editing existing IPv4, IPv6 and IPv4+Ipv6 rules, and switching the IP version on an existing rule. Seems to work!
Ticket #3484 Note that for now prefixlen is useless in ipv6 tunnels. IPv4 accepts them
Fixes #3484. Provide a dynamic gateway for gif v6 tunnels so it can be used on firewall rules etc. The guide for setting up this tunnels on docs need to change to leave the gif interface as none type. People upgrading need to fix this themselves with a not on release notes. This can be fixed if the kernel condition is relaxed to allow setting the prefixlen on the tunnel as ipv4
Tidy "gateway name - IP" in dropdown list
While I notice this also, for a plain gateway, the current IP address is also listed in the dropdown list text, like "WAN_DHCP - 10.42.11.1". If there is no IP address currently, it might say "WAN_DHCP - dynamic". But for some DHCP gateways that have not had any non-default manual settings done, it can say "OPT1_DHCP ". This gets rid of the silly-looking ""
Use return_gateway_groups_array() to build correct GWG list
Now return_gateway_groups_array() always returns at least the IP version 'ipprotocol' of each GWG, even if all its members are down at present. It is better to use this to check what IP version the GWG is. The previous check was using the IP address of the first member of the GWG to deduce 'ipprotocol'. That would fail if the WAN was DHCP and was down.
This is a resubmit of an older pull request I had closed. It came up again in the forum, with a user setting up a VM environment and wondering why he cannot make policy-routing rules to a gateway group. The gateway group names did not display because all his WANs were down at the time and so the existing code was too dumb to determine the IP protocol (version 4 or 6) when none of the WANs in the gateway group actually have an IP address yet.
Fix #3492, make sure filesystem is read-write