public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Michael Tremer <michael.tremer@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [PATCH v2] BUG 11696: VPN Subnets missing from wpad.dat
Date: Thu, 23 May 2019 09:27:31 +0100	[thread overview]
Message-ID: <E57FAA02-1594-4F21-9AF8-BAB31FEECBA3@ipfire.org> (raw)
In-Reply-To: <00a401d510d7$f4cb60c0$de622240$@bluewin.ch>

[-- Attachment #1: Type: text/plain, Size: 3754 bytes --]

Do you have a dev account and yet?

Do you want one to have your Git repos on git.ipfire.org?

-Michael

> On 22 May 2019, at 20:52, Oliver Fuhrer <oliver.fuhrer(a)bluewin.ch> wrote:
> 
> Hi Michael
> 
>> Yes please.
>> 
>> It would be great to have this all coming in one patchset in the future. That
>> keeps noise on the list down and allows us to review the whole thing in one
>> go.
>> 
> OK, I'll then combine this enhancement patch with a fix for Bug #11047 and some code improvement for #11614, however it might take a couple of days until this ready to be sent.
> 
>> Are you planning to move this into a function that you will call from the
>> various CGI files?
>> 
> I had a look at the code and I think, I hopefully got it right by moving my code to general-functions.pl
> 
> Oliver
>> -Michael
>> 
>>> On 20 May 2019, at 16:31, Oliver Fuhrer <oliver.fuhrer(a)bluewin.ch> wrote:
>>> 
>>> Hi Michael,
>>> You're welcome.
>>> I have been poking around in vpnmain.cgi and ovpnmain.cgi to
>> automatically update the wpad.dat file upon tunnel
>> add/delete/enable/disable.
>>> Should I send this one as feature?
>>> 
>>> Regards
>>> Oliver
>>> 
>>>> 
>>>> Hi,
>>>> 
>>>> Thank you for rebasing this patch. It applies and is merged!
>>>> 
>>>> -Michael
>>>> 
>>>>> On 19 May 2019, at 14:30, Oliver Fuhrer <oliver.fuhrer(a)bluewin.ch>
>> wrote:
>>>>> 
>>>>> This patch fixes the behavior in 11696 and adds IPSEC and OpenVPN n2n
>>>> subnets to wpad.dat so they don't pass through the proxy.
>>>>> ---
>>>>> Hi List,
>>>>> New version of the patch, this one has been created against next branch
>>>> and successfully tested on a fresh build.
>>>>> 
>>>>> Regards
>>>>> Oliver
>>>>> 
>>>>> html/cgi-bin/proxy.cgi | 25 +++++++++++++++++++++++++
>>>>> 1 file changed, 25 insertions(+)
>>>>> 
>>>>> diff --git a/html/cgi-bin/proxy.cgi b/html/cgi-bin/proxy.cgi
>>>>> index 91e4fce..b639640 100644
>>>>> --- a/html/cgi-bin/proxy.cgi
>>>>> +++ b/html/cgi-bin/proxy.cgi
>>>>> @@ -2848,6 +2848,10 @@ sub write_acls
>>>>> 
>>>>> sub writepacfile
>>>>> {
>>>>> +	my %vpnconfig=();
>>>>> +	my %ovpnconfig=();
>>>>> +	&General::readhasharray("${General::swroot}/vpn/config",
>>>> \%vpnconfig);
>>>>> +	&General::readhasharray("${General::swroot}/ovpn/ovpnconfig",
>>>> \%ovpnconfig);
>>>>> 	open(FILE, ">/srv/web/ipfire/html/proxy.pac");
>>>>> 	flock(FILE, 2);
>>>>> 	print FILE "function FindProxyForURL(url, host)\n";
>>>>> @@ -2910,6 +2914,27 @@ END
>>>>> 		}
>>>>> 	}
>>>>> 
>>>>> +	foreach my $key (sort { uc($vpnconfig{$a}[1]) cmp
>>>> uc($vpnconfig{$b}[1]) } keys %vpnconfig) {
>>>>> +		if ($vpnconfig{$key}[0] eq 'on' && $vpnconfig{$key}[3] ne
>>>> 'host') {
>>>>> +			my @networks = split(/\|/, $vpnconfig{$key}[11]);
>>>>> +			foreach my $network (@networks) {
>>>>> +				my ($vpnip, $vpnsub) = split("/", $network);
>>>>> +				$vpnsub =
>>>> &Network::convert_prefix2netmask($vpnsub) || $vpnsub;
>>>>> +				print FILE "     (isInNet(host, \"$vpnip\",
>>>> \"$vpnsub\")) ||\n";
>>>>> +			}
>>>>> +		}
>>>>> +	}
>>>>> +
>>>>> +	foreach my $key (sort { uc($ovpnconfig{$a}[1]) cmp
>>>> uc($ovpnconfig{$b}[1]) } keys %ovpnconfig) {
>>>>> +		if ($ovpnconfig{$key}[0] eq 'on' && $ovpnconfig{$key}[3] ne
>>>> 'host') {
>>>>> +			my @networks = split(/\|/, $ovpnconfig{$key}[11]);
>>>>> +			foreach my $network (@networks) {
>>>>> +				my ($vpnip, $vpnsub) = split("/", $network);
>>>>> +				print FILE "     (isInNet(host, \"$vpnip\",
>>>> \"$vpnsub\")) ||\n";
>>>>> +			}
>>>>> +		}
>>>>> +	}
>>>>> +
>>>>> 	print FILE <<END
>>>>>    (isInNet(host, "169.254.0.0", "255.255.0.0"))
>>>>>  )
>>>>> --
>>>>> 1.8.3.1
>>>>> 
>>> 
>>> 
> 
> 


      reply	other threads:[~2019-05-23  8:27 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-05-19 13:30 Oliver Fuhrer
2019-05-20  9:41 ` Michael Tremer
2019-05-20 15:31   ` Oliver Fuhrer
2019-05-20 21:48     ` Michael Tremer
2019-05-22 19:52       ` Oliver Fuhrer
2019-05-23  8:27         ` Michael Tremer [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=E57FAA02-1594-4F21-9AF8-BAB31FEECBA3@ipfire.org \
    --to=michael.tremer@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox