Project

General

Profile

Download (24.3 KB) Statistics
| Branch: | Tag: | Revision:
1
<?php
2
/*
3
 * services_unbound.php
4
 *
5
 * part of pfSense (https://www.pfsense.org)
6
 * Copyright (c) 2004-2013 BSD Perimeter
7
 * Copyright (c) 2013-2016 Electric Sheep Fencing
8
 * Copyright (c) 2014-2020 Rubicon Communications, LLC (Netgate)
9
 * Copyright (c) 2014 Warren Baker (warren@pfsense.org)
10
 * All rights reserved.
11
 *
12
 * Licensed under the Apache License, Version 2.0 (the "License");
13
 * you may not use this file except in compliance with the License.
14
 * You may obtain a copy of the License at
15
 *
16
 * http://www.apache.org/licenses/LICENSE-2.0
17
 *
18
 * Unless required by applicable law or agreed to in writing, software
19
 * distributed under the License is distributed on an "AS IS" BASIS,
20
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
21
 * See the License for the specific language governing permissions and
22
 * limitations under the License.
23
 */
24

    
25
##|+PRIV
26
##|*IDENT=page-services-dnsresolver
27
##|*NAME=Services: DNS Resolver
28
##|*DESCR=Allow access to the 'Services: DNS Resolver' page.
29
##|*MATCH=services_unbound.php*
30
##|-PRIV
31

    
32
require_once("guiconfig.inc");
33
require_once("unbound.inc");
34
require_once("pfsense-utils.inc");
35
require_once("system.inc");
36

    
37
init_config_arr(array('unbound', 'hosts'));
38
init_config_arr(array('unbound', 'domainoverrides'));
39
$a_unboundcfg = &$config['unbound'];
40
$a_hosts = &$a_unboundcfg['hosts'];
41
$a_domainOverrides = &$a_unboundcfg['domainoverrides'];
42

    
43
if (isset($a_unboundcfg['enable'])) {
44
	$pconfig['enable'] = true;
45
}
46
if (isset($a_unboundcfg['enablessl'])) {
47
	$pconfig['enablessl'] = true;
48
}
49
if (isset($a_unboundcfg['dnssec'])) {
50
	$pconfig['dnssec'] = true;
51
}
52
if (isset($a_unboundcfg['python'])) {
53
	$pconfig['python'] = true;
54
}
55
if (isset($a_unboundcfg['forwarding'])) {
56
	$pconfig['forwarding'] = true;
57
}
58
if (isset($a_unboundcfg['forward_tls_upstream'])) {
59
	$pconfig['forward_tls_upstream'] = true;
60
}
61
if (isset($a_unboundcfg['regdhcp'])) {
62
	$pconfig['regdhcp'] = true;
63
}
64
if (isset($a_unboundcfg['regdhcpstatic'])) {
65
	$pconfig['regdhcpstatic'] = true;
66
}
67
if (isset($a_unboundcfg['regovpnclients'])) {
68
	$pconfig['regovpnclients'] = true;
69
}
70

    
71
$pconfig['python_order'] = $a_unboundcfg['python_order'];
72
$pconfig['python_script'] = $a_unboundcfg['python_script'];
73
$pconfig['port'] = $a_unboundcfg['port'];
74
$pconfig['sslport'] = $a_unboundcfg['sslport'];
75
$pconfig['sslcertref'] = $a_unboundcfg['sslcertref'];
76
$pconfig['custom_options'] = base64_decode($a_unboundcfg['custom_options']);
77

    
78
if (empty($a_unboundcfg['active_interface'])) {
79
	$pconfig['active_interface'] = array();
80
} else {
81
	$pconfig['active_interface'] = explode(",", $a_unboundcfg['active_interface']);
82
}
83

    
84
if (empty($a_unboundcfg['outgoing_interface'])) {
85
	$pconfig['outgoing_interface'] = array();
86
} else {
87
	$pconfig['outgoing_interface'] = explode(",", $a_unboundcfg['outgoing_interface']);
88
}
89

    
90
if (empty($a_unboundcfg['system_domain_local_zone_type'])) {
91
	$pconfig['system_domain_local_zone_type'] = "transparent";
92
} else {
93
	$pconfig['system_domain_local_zone_type'] = $a_unboundcfg['system_domain_local_zone_type'];
94
}
95

    
96
init_config_arr(array('cert'));
97
$a_cert = &$config['cert'];
98
$certs_available = false;
99

    
100
if (is_array($a_cert) && count($a_cert)) {
101
	$certs_available = true;
102
} else {
103
	$a_cert = array();
104
}
105

    
106
if ($_POST['apply']) {
107
	$retval = 0;
108
	$retval |= services_unbound_configure();
109
	if ($retval == 0) {
110
		clear_subsystem_dirty('unbound');
111
	}
112
	/* Update resolv.conf in case the interface bindings exclude localhost. */
113
	system_resolvconf_generate();
114
	/* Start or restart dhcpleases when it's necessary */
115
	system_dhcpleases_configure();
116
}
117

    
118
if ($_POST['save']) {
119
	$pconfig = $_POST;
120
	unset($input_errors);
121

    
122
	if (isset($pconfig['enable']) && isset($config['dnsmasq']['enable'])) {
123
		if ($pconfig['port'] == $config['dnsmasq']['port']) {
124
			$input_errors[] = gettext("The DNS Forwarder is enabled using this port. Choose a non-conflicting port, or disable the DNS Forwarder.");
125
		}
126
	}
127

    
128
	if (isset($pconfig['enablessl']) && (!$certs_available || empty($pconfig['sslcertref']))) {
129
		$input_errors[] = gettext("Acting as an SSL/TLS server requires a valid server certificate");
130
	}
131

    
132
	// forwarding mode requires having valid DNS servers
133
	if (isset($pconfig['forwarding'])) {
134
		$founddns = false;
135
		if (isset($config['system']['dnsallowoverride'])) {
136
			$dns_servers = get_dns_servers();
137
			if (is_array($dns_servers)) {
138
				foreach ($dns_servers as $dns_server) {
139
					if (!ip_in_subnet($dns_server, "127.0.0.0/8")) {
140
						$founddns = true;
141
					}
142
				}
143
			}
144
		}
145
		if (is_array($config['system']['dnsserver'])) {
146
			foreach ($config['system']['dnsserver'] as $dnsserver) {
147
				if (is_ipaddr($dnsserver)) {
148
					$founddns = true;
149
				}
150
			}
151
		}
152
		if ($founddns == false) {
153
			$input_errors[] = gettext("At least one DNS server must be specified under System &gt; General Setup to enable Forwarding mode.");
154
		}
155
	}
156

    
157
	if (empty($pconfig['active_interface'])) {
158
		$input_errors[] = gettext("One or more Network Interfaces must be selected for binding.");
159
	} else if (!isset($config['system']['dnslocalhost']) && (!in_array("lo0", $pconfig['active_interface']) && !in_array("all", $pconfig['active_interface']))) {
160
		$input_errors[] = gettext("This system is configured to use the DNS Resolver as its DNS server, so Localhost or All must be selected in Network Interfaces.");
161
	}
162

    
163
	if (empty($pconfig['outgoing_interface'])) {
164
		$input_errors[] = gettext("One or more Outgoing Network Interfaces must be selected.");
165
	}
166

    
167
	if ($pconfig['port'] && !is_port($pconfig['port'])) {
168
		$input_errors[] = gettext("A valid port number must be specified.");
169
	}
170
	if ($pconfig['sslport'] && !is_port($pconfig['sslport'])) {
171
		$input_errors[] = gettext("A valid SSL/TLS port number must be specified.");
172
	}
173

    
174
	if (is_array($pconfig['active_interface']) && !empty($pconfig['active_interface'])) {
175
		$display_active_interface = $pconfig['active_interface'];
176
		$pconfig['active_interface'] = implode(",", $pconfig['active_interface']);
177
	}
178

    
179
	if ((isset($pconfig['regdhcp']) || isset($pconfig['regdhcpstatic'])) && !is_dhcp_server_enabled()) {
180
		$input_errors[] = gettext("DHCP Server must be enabled for DHCP Registration to work in DNS Resolver.");
181
	}
182

    
183
	if (($pconfig['system_domain_local_zone_type'] == "redirect") && isset($pconfig['regdhcp'])) {
184
		$input_errors[] = gettext('A System Domain Local Zone Type of "redirect" is not compatible with dynamic DHCP Registration.');
185
	}
186

    
187
	$display_custom_options = $pconfig['custom_options'];
188
	$pconfig['custom_options'] = base64_encode(str_replace("\r\n", "\n", $pconfig['custom_options']));
189

    
190
	if (is_array($pconfig['outgoing_interface']) && !empty($pconfig['outgoing_interface'])) {
191
		$display_outgoing_interface = $pconfig['outgoing_interface'];
192
		$pconfig['outgoing_interface'] = implode(",", $pconfig['outgoing_interface']);
193
	}
194

    
195
	$test_output = array();
196
	if (test_unbound_config($pconfig, $test_output)) {
197
		$input_errors[] = gettext("The generated config file cannot be parsed by unbound. Please correct the following errors:");
198
		$input_errors = array_merge($input_errors, $test_output);
199
	}
200

    
201
	if (!$input_errors) {
202
		$a_unboundcfg['enable'] = isset($pconfig['enable']);
203
		$a_unboundcfg['enablessl'] = isset($pconfig['enablessl']);
204
		$a_unboundcfg['port'] = $pconfig['port'];
205
		$a_unboundcfg['sslport'] = $pconfig['sslport'];
206
		$a_unboundcfg['sslcertref'] = $pconfig['sslcertref'];
207
		$a_unboundcfg['dnssec'] = isset($pconfig['dnssec']);
208

    
209
		$a_unboundcfg['python'] = isset($pconfig['python']);
210
		if (isset($pconfig['python'])) {
211
			$a_unboundcfg['python_order'] = $pconfig['python_order'];
212
			$a_unboundcfg['python_script'] = $pconfig['python_script'];
213
		} else {
214
			if (isset($a_unboundcfg['python_order'])) {
215
				unset($a_unboundcfg['python_order']);
216
			}
217
			if (isset($a_unboundcfg['python_script'])) {
218
				unset($a_unboundcfg['python_script']);
219
			}
220
		}
221

    
222
		$a_unboundcfg['forwarding'] = isset($pconfig['forwarding']);
223
		$a_unboundcfg['forward_tls_upstream'] = isset($pconfig['forward_tls_upstream']);
224
		$a_unboundcfg['regdhcp'] = isset($pconfig['regdhcp']);
225
		$a_unboundcfg['regdhcpstatic'] = isset($pconfig['regdhcpstatic']);
226
		$a_unboundcfg['regovpnclients'] = isset($pconfig['regovpnclients']);
227
		$a_unboundcfg['active_interface'] = $pconfig['active_interface'];
228
		$a_unboundcfg['outgoing_interface'] = $pconfig['outgoing_interface'];
229
		$a_unboundcfg['system_domain_local_zone_type'] = $pconfig['system_domain_local_zone_type'];
230
		$a_unboundcfg['custom_options'] = $pconfig['custom_options'];
231

    
232
		write_config(gettext("DNS Resolver configured."));
233
		mark_subsystem_dirty('unbound');
234
	}
235

    
236
	$pconfig['active_interface'] = $display_active_interface;
237
	$pconfig['outgoing_interface'] = $display_outgoing_interface;
238
	$pconfig['custom_options'] = $display_custom_options;
239
}
240

    
241

    
242
if ($pconfig['custom_options']) {
243
	$customoptions = true;
244
} else {
245
	$customoptions = false;
246
}
247

    
248
if ($_POST['act'] == "del") {
249
	if ($_POST['type'] == 'host') {
250
		if ($a_hosts[$_POST['id']]) {
251
			unset($a_hosts[$_POST['id']]);
252
			write_config(gettext("Host override deleted from DNS Resolver."));
253
			mark_subsystem_dirty('unbound');
254
			header("Location: services_unbound.php");
255
			exit;
256
		}
257
	} elseif ($_POST['type'] == 'doverride') {
258
		if ($a_domainOverrides[$_POST['id']]) {
259
			unset($a_domainOverrides[$_POST['id']]);
260
			write_config(gettext("Domain override deleted from DNS Resolver."));
261
			mark_subsystem_dirty('unbound');
262
			header("Location: services_unbound.php");
263
			exit;
264
		}
265
	}
266
}
267

    
268
function build_if_list($selectedifs) {
269
	$interface_addresses = get_possible_listen_ips(true);
270
	$iflist = array('options' => array(), 'selected' => array());
271

    
272
	$iflist['options']['all']	= gettext("All");
273
	if (empty($selectedifs) || empty($selectedifs[0]) || in_array("all", $selectedifs)) {
274
		array_push($iflist['selected'], "all");
275
	}
276

    
277
	foreach ($interface_addresses as $laddr => $ldescr) {
278
		$iflist['options'][$laddr] = htmlspecialchars($ldescr);
279

    
280
		if ($selectedifs && in_array($laddr, $selectedifs)) {
281
			array_push($iflist['selected'], $laddr);
282
		}
283
	}
284

    
285
	unset($interface_addresses);
286

    
287
	return($iflist);
288
}
289

    
290
$pgtitle = array(gettext("Services"), gettext("DNS Resolver"), gettext("General Settings"));
291
$pglinks = array("", "@self", "@self");
292
$shortcut_section = "resolver";
293

    
294
include_once("head.inc");
295

    
296
if ($input_errors) {
297
	print_input_errors($input_errors);
298
}
299

    
300
if ($_POST['apply']) {
301
	print_apply_result_box($retval);
302
}
303

    
304
if (is_subsystem_dirty('unbound')) {
305
	print_apply_box(gettext("The DNS resolver configuration has been changed.") . "<br />" . gettext("The changes must be applied for them to take effect."));
306
}
307

    
308
$tab_array = array();
309
$tab_array[] = array(gettext("General Settings"), true, "services_unbound.php");
310
$tab_array[] = array(gettext("Advanced Settings"), false, "services_unbound_advanced.php");
311
$tab_array[] = array(gettext("Access Lists"), false, "/services_unbound_acls.php");
312
display_top_tabs($tab_array, true);
313

    
314
$form = new Form();
315

    
316
$section = new Form_Section('General DNS Resolver Options');
317

    
318
$section->addInput(new Form_Checkbox(
319
	'enable',
320
	'Enable',
321
	'Enable DNS resolver',
322
	$pconfig['enable']
323
));
324

    
325
$section->addInput(new Form_Input(
326
	'port',
327
	'Listen Port',
328
	'number',
329
	$pconfig['port'],
330
	['placeholder' => '53']
331
))->setHelp('The port used for responding to DNS queries. It should normally be left blank unless another service needs to bind to TCP/UDP port 53.');
332

    
333
$section->addInput(new Form_Checkbox(
334
	'enablessl',
335
	'Enable SSL/TLS Service',
336
	'Respond to incoming SSL/TLS queries from local clients',
337
	$pconfig['enablessl']
338
))->setHelp('Configures the DNS Resolver to act as a DNS over SSL/TLS server which can answer queries from clients which also support DNS over TLS. ' .
339
		'Activating this option disables automatic interface response routing behavior, thus it works best with specific interface bindings.' );
340

    
341
if ($certs_available) {
342
	$section->addInput($input = new Form_Select(
343
		'sslcertref',
344
		'SSL/TLS Certificate',
345
		$pconfig['sslcertref'],
346
		cert_build_list('cert', 'IPsec')
347
	))->setHelp('The server certificate to use for SSL/TLS service. The CA chain will be determined automatically.');
348
} else {
349
	$section->addInput(new Form_StaticText(
350
		'SSL/TLS Certificate',
351
		sprintf('No Certificates have been defined. A certificate is required before SSL/TLS can be enabled. %1$s Create or Import %2$s a Certificate.',
352
		'<a href="system_certmanager.php">', '</a>')
353
	));
354
}
355

    
356
$section->addInput(new Form_Input(
357
	'sslport',
358
	'SSL/TLS Listen Port',
359
	'number',
360
	$pconfig['sslport'],
361
	['placeholder' => '853']
362
))->setHelp('The port used for responding to SSL/TLS DNS queries. It should normally be left blank unless another service needs to bind to TCP/UDP port 853.');
363

    
364
$activeiflist = build_if_list($pconfig['active_interface']);
365

    
366
$section->addInput(new Form_Select(
367
	'active_interface',
368
	'*Network Interfaces',
369
	$activeiflist['selected'],
370
	$activeiflist['options'],
371
	true
372
))->addClass('general', 'resizable')->setHelp('Interface IPs used by the DNS Resolver for responding to queries from clients. If an interface has both IPv4 and IPv6 IPs, both are used. Queries to other interface IPs not selected below are discarded. ' .
373
			'The default behavior is to respond to queries on every available IPv4 and IPv6 address.');
374

    
375
$outiflist = build_if_list($pconfig['outgoing_interface']);
376

    
377
$section->addInput(new Form_Select(
378
	'outgoing_interface',
379
	'*Outgoing Network Interfaces',
380
	$outiflist['selected'],
381
	$outiflist['options'],
382
	true
383
))->addClass('general', 'resizable')->setHelp('Utilize different network interface(s) that the DNS Resolver will use to send queries to authoritative servers and receive their replies. By default all interfaces are used.');
384

    
385
$section->addInput(new Form_Select(
386
	'system_domain_local_zone_type',
387
	'*System Domain Local Zone Type',
388
	$pconfig['system_domain_local_zone_type'],
389
	unbound_local_zone_types()
390
))->setHelp('The local-zone type used for the pfSense system domain (System | General Setup | Domain).  Transparent is the default.  Local-Zone type descriptions are available in the unbound.conf(5) manual pages.');
391

    
392
$section->addInput(new Form_Checkbox(
393
	'dnssec',
394
	'DNSSEC',
395
	'Enable DNSSEC Support',
396
	$pconfig['dnssec']
397
));
398

    
399
$section->addInput(new Form_Checkbox(
400
	'python',
401
	'Python Module',
402
	'Enable Python Module',
403
	$pconfig['python']
404
))->setHelp('Enable the Python Module.');
405

    
406
$python_files = glob("{$g['unbound_chroot_path']}/*.py");
407
$python_scripts = array();
408
if (!empty($python_files)) {
409
	foreach ($python_files as $file) {
410
		$file = pathinfo($file, PATHINFO_FILENAME);
411
		$python_scripts[$file] = $file;
412
	}
413
}
414
else {
415
	$python_scripts = array('' => 'No Python Module scripts found');
416
}
417

    
418
$section->addInput(new Form_Select(
419
	'python_order',
420
	'Python Module Order',
421
	$pconfig['python_order'],
422
	[ 'pre_validator' => 'Pre Validator', 'post_validator' => 'Post Validator' ]
423
))->setHelp('Select the Python Module ordering.');
424

    
425
$section->addInput(new Form_Select(
426
	'python_script',
427
	'Python Module Script',
428
	$pconfig['python_script'],
429
	$python_scripts
430
))->setHelp('Select the Python module script to utilize.');
431

    
432
$section->addInput(new Form_Checkbox(
433
	'forwarding',
434
	'DNS Query Forwarding',
435
	'Enable Forwarding Mode',
436
	$pconfig['forwarding']
437
))->setHelp('If this option is set, DNS queries will be forwarded to the upstream DNS servers defined under'.
438
					' %1$sSystem &gt; General Setup%2$s or those obtained via DHCP/PPP on WAN'.
439
					' (if DNS Server Override is enabled there).','<a href="system.php">','</a>');
440

    
441
$section->addInput(new Form_Checkbox(
442
	'forward_tls_upstream',
443
	null,
444
	'Use SSL/TLS for outgoing DNS Queries to Forwarding Servers',
445
	$pconfig['forward_tls_upstream']
446
))->setHelp('When set in conjunction with DNS Query Forwarding, queries to all upstream forwarding DNS servers will be sent using SSL/TLS on the default port of 853. Note that ALL configured forwarding servers MUST support SSL/TLS queries on port 853.');
447

    
448
$section->addInput(new Form_Checkbox(
449
	'regdhcp',
450
	'DHCP Registration',
451
	'Register DHCP leases in the DNS Resolver',
452
	$pconfig['regdhcp']
453
))->setHelp('If this option is set, then machines that specify their hostname when requesting an IPv4 DHCP lease will be registered'.
454
					' in the DNS Resolver so that their name can be resolved.'.
455
					' The domain in %1$sSystem &gt; General Setup%2$s should also be set to the proper value.','<a href="system.php">','</a>');
456

    
457
$section->addInput(new Form_Checkbox(
458
	'regdhcpstatic',
459
	'Static DHCP',
460
	'Register DHCP static mappings in the DNS Resolver',
461
	$pconfig['regdhcpstatic']
462
))->setHelp('If this option is set, then DHCP static mappings will be registered in the DNS Resolver, so that their name can be resolved. '.
463
					'The domain in %1$sSystem &gt; General Setup%2$s should also be set to the proper value.','<a href="system.php">','</a>');
464

    
465
$section->addInput(new Form_Checkbox(
466
	'regovpnclients',
467
	'OpenVPN Clients',
468
	'Register connected OpenVPN clients in the DNS Resolver',
469
	$pconfig['regovpnclients']
470
))->setHelp(sprintf('If this option is set, then the common name (CN) of connected OpenVPN clients will be registered in the DNS Resolver, so that their name can be resolved. This only works for OpenVPN servers (Remote Access SSL/TLS) operating in "tun" mode. '.
471
					'The domain in %sSystem: General Setup%s should also be set to the proper value.','<a href="system.php">','</a>'));
472

    
473
$btnadv = new Form_Button(
474
	'btnadvcustom',
475
	'Custom options',
476
	null,
477
	'fa-cog'
478
);
479

    
480
$btnadv->setAttribute('type','button')->addClass('btn-info btn-sm');
481

    
482
$section->addInput(new Form_StaticText(
483
	'Display Custom Options',
484
	$btnadv
485
));
486

    
487
$section->addInput(new Form_Textarea (
488
	'custom_options',
489
	'Custom options',
490
	$pconfig['custom_options']
491
))->setHelp('Enter any additional configuration parameters to add to the DNS Resolver configuration here, separated by a newline.');
492

    
493
$form->add($section);
494
print($form);
495
?>
496

    
497
<script type="text/javascript">
498
//<![CDATA[
499
events.push(function() {
500

    
501
	// Show advanced custom options ==============================================
502
	var showadvcustom = false;
503

    
504
	function show_advcustom(ispageload) {
505
		var text;
506
		// On page load decide the initial state based on the data.
507
		if (ispageload) {
508
			showadvcustom = <?=($customoptions ? 'true' : 'false');?>;
509
		} else {
510
			// It was a click, swap the state.
511
			showadvcustom = !showadvcustom;
512
		}
513

    
514
		hideInput('custom_options', !showadvcustom);
515

    
516
		if (showadvcustom) {
517
			text = "<?=gettext('Hide Custom Options');?>";
518
		} else {
519
			text = "<?=gettext('Display Custom Options');?>";
520
		}
521
		$('#btnadvcustom').html('<i class="fa fa-cog"></i> ' + text);
522
	}
523

    
524
	// If the enable checkbox is not checked, hide all inputs
525
	function hideGeneral() {
526
		var hide = ! $('#enable').prop('checked');
527

    
528
		hideMultiClass('general', hide);
529
		hideInput('port', hide);
530
		hideSelect('system_domain_local_zone_type', hide);
531
		hideCheckbox('dnssec', hide);
532
		hideCheckbox('forwarding', hide);
533
		hideCheckbox('regdhcp', hide);
534
		hideCheckbox('regdhcpstatic', hide);
535
		hideCheckbox('regovpnclients', hide);
536
		hideInput('btnadvcustom', hide);
537
		hideInput('custom_options', hide || !showadvcustom);
538
	}
539

    
540
	// Un-hide additional controls
541
	$('#btnadvcustom').click(function(event) {
542
		show_advcustom();
543
	});
544

    
545
	// When 'enable' is clicked, disable/enable the following hide inputs
546
	$('#enable').click(function() {
547
		hideGeneral();
548
	});
549

    
550
	// On initial load
551
	if ($('#custom_options').val().length == 0) {
552
		hideInput('custom_options', true);
553
	}
554

    
555
	hideGeneral();
556
	show_advcustom(true);
557

    
558
	// When the Python Module 'enable' is clicked, disable/enable the Python Module options
559
	function show_python_script() {
560
		var python = $('#python').prop('checked');
561
		hideInput('python_order', !python);
562
		hideInput('python_script', !python);
563
	}
564
	show_python_script();
565
	$('#python').click(function () {
566
		show_python_script();
567
	});
568

    
569
});
570
//]]>
571
</script>
572

    
573
<div class="panel panel-default">
574
	<div class="panel-heading"><h2 class="panel-title"><?=gettext("Host Overrides")?></h2></div>
575
	<div class="panel-body table-responsive">
576
		<table class="table table-striped table-hover table-condensed sortable-theme-bootstrap table-rowdblclickedit" data-sortable>
577
			<thead>
578
				<tr>
579
					<th><?=gettext("Host")?></th>
580
					<th><?=gettext("Parent domain of host")?></th>
581
					<th><?=gettext("IP to return for host")?></th>
582
					<th><?=gettext("Description")?></th>
583
					<th><?=gettext("Actions")?></th>
584
				</tr>
585
			</thead>
586
			<tbody>
587
<?php
588
$i = 0;
589
foreach ($a_hosts as $hostent):
590
?>
591
				<tr>
592
					<td>
593
						<?=$hostent['host']?>
594
					</td>
595
					<td>
596
						<?=$hostent['domain']?>
597
					</td>
598
					<td>
599
						<?=$hostent['ip']?>
600
					</td>
601
					<td>
602
						<?=htmlspecialchars($hostent['descr'])?>
603
					</td>
604
					<td>
605
						<a class="fa fa-pencil"	title="<?=gettext('Edit host override')?>" href="services_unbound_host_edit.php?id=<?=$i?>"></a>
606
						<a class="fa fa-trash"	title="<?=gettext('Delete host override')?>" href="services_unbound.php?type=host&amp;act=del&amp;id=<?=$i?>" usepost></a>
607
					</td>
608
				</tr>
609

    
610
<?php
611
	if ($hostent['aliases']['item'] && is_array($hostent['aliases']['item'])):
612
		foreach ($hostent['aliases']['item'] as $alias):
613
?>
614
				<tr>
615
					<td>
616
						<?=$alias['host']?>
617
					</td>
618
					<td>
619
						<?=$alias['domain']?>
620
					</td>
621
					<td>
622
						<?=gettext("Alias for ");?><?=$hostent['host'] ? $hostent['host'] . '.' . $hostent['domain'] : $hostent['domain']?>
623
					</td>
624
					<td>
625
						<i class="fa fa-angle-double-right text-info"></i>
626
						<?=htmlspecialchars($alias['description'])?>
627
					</td>
628
					<td>
629
						<a class="fa fa-pencil"	title="<?=gettext('Edit host override')?>" 	href="services_unbound_host_edit.php?id=<?=$i?>"></a>
630
					</td>
631
				</tr>
632
<?php
633
		endforeach;
634
	endif;
635
	$i++;
636
endforeach;
637
?>
638
			</tbody>
639
		</table>
640
	</div>
641
</div>
642

    
643
<span class="help-block">
644
	Enter any individual hosts for which the resolver's standard DNS lookup process should be overridden and a specific
645
	IPv4 or IPv6 address should automatically be returned by the resolver. Standard and also non-standard names and parent domains
646
	can be entered, such as 'test', 'mycompany.localdomain', '1.168.192.in-addr.arpa', or 'somesite.com'. Any lookup attempt for
647
	the host will automatically return the given IP address, and the usual lookup server for the domain will not be queried for
648
	the host's records.
649
</span>
650

    
651
<nav class="action-buttons">
652
	<a href="services_unbound_host_edit.php" class="btn btn-sm btn-success">
653
		<i class="fa fa-plus icon-embed-btn"></i>
654
		<?=gettext('Add')?>
655
	</a>
656
</nav>
657

    
658
<div class="panel panel-default">
659
	<div class="panel-heading"><h2 class="panel-title"><?=gettext("Domain Overrides")?></h2></div>
660
	<div class="panel-body table-responsive">
661
		<table class="table table-striped table-hover table-condensed sortable-theme-bootstrap table-rowdblclickedit" data-sortable>
662
			<thead>
663
				<tr>
664
					<th><?=gettext("Domain")?></th>
665
					<th><?=gettext("Lookup Server IP Address")?></th>
666
					<th><?=gettext("Description")?></th>
667
					<th><?=gettext("Actions")?></th>
668
				</tr>
669
			</thead>
670

    
671
			<tbody>
672
<?php
673
$i = 0;
674
foreach ($a_domainOverrides as $doment):
675
?>
676
				<tr>
677
					<td>
678
						<?=$doment['domain']?>&nbsp;
679
					</td>
680
					<td>
681
						<?=$doment['ip']?>&nbsp;
682
					</td>
683
					<td>
684
						<?=htmlspecialchars($doment['descr'])?>&nbsp;
685
					</td>
686
					<td>
687
						<a class="fa fa-pencil"	title="<?=gettext('Edit domain override')?>" href="services_unbound_domainoverride_edit.php?id=<?=$i?>"></a>
688
						<a class="fa fa-trash"	title="<?=gettext('Delete domain override')?>" href="services_unbound.php?act=del&amp;type=doverride&amp;id=<?=$i?>" usepost></a>
689
					</td>
690
				</tr>
691
<?php
692
	$i++;
693
endforeach;
694
?>
695
			</tbody>
696
		</table>
697
	</div>
698
</div>
699

    
700
<span class="help-block">
701
	Enter any domains for which the resolver's standard DNS lookup process should be overridden and a different (non-standard)
702
	lookup server should be queried instead. Non-standard, 'invalid' and local domains, and subdomains, can also be entered,
703
	such as 'test', 'mycompany.localdomain', '1.168.192.in-addr.arpa', or 'somesite.com'. The IP address is treated as the
704
	authoritative lookup server for the domain (including all of its subdomains), and other lookup servers will not be queried.
705
</span>
706

    
707
<nav class="action-buttons">
708
	<a href="services_unbound_domainoverride_edit.php" class="btn btn-sm btn-success">
709
		<i class="fa fa-plus icon-embed-btn"></i>
710
		<?=gettext('Add')?>
711
	</a>
712
</nav>
713

    
714
<div class="infoblock">
715
	<?php print_info_box(sprintf(gettext('If the DNS Resolver is enabled, the DHCP'.
716
		' service (if enabled) will automatically serve the LAN IP'.
717
		' address as a DNS server to DHCP clients so they will use'.
718
		' the DNS Resolver. If Forwarding is enabled, the DNS Resolver will use the DNS servers'.
719
		' entered in %1$sSystem &gt; General Setup%2$s'.
720
		' or those obtained via DHCP or PPP on WAN if &quot;Allow'.
721
		' DNS server list to be overridden by DHCP/PPP on WAN&quot;'.
722
		' is checked.'), '<a href="system.php">', '</a>'), 'info', false); ?>
723
</div>
724

    
725
<?php include("foot.inc");
(141-141/227)