本文整理汇总了PHP中is_subsystem_dirty函数的典型用法代码示例。如果您正苦于以下问题:PHP is_subsystem_dirty函数的具体用法?PHP is_subsystem_dirty怎么用?PHP is_subsystem_dirty使用的例子?那么恭喜您, 这里精选的函数代码示例或许可以为您提供帮助。
在下文中一共展示了is_subsystem_dirty函数的15个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的PHP代码示例。
示例1: print_info_box
include "head.inc";
?>
<body link="#0000CC" vlink="#0000CC" alink="#0000CC">
<?php
include "fbegin.inc";
?>
<form action="vpn_pptp_users.php" method="post">
<?php
if ($savemsg) {
print_info_box($savemsg);
}
if (isset($config['pptpd']['radius']['enable'])) {
print_info_box(gettext("Warning: RADIUS is enabled. The local user database will not be used."));
}
if (is_subsystem_dirty('pptpusers')) {
?>
<br/>
<?php
print_info_box_np(gettext("The PPTP user list has been modified") . ".<br />" . gettext("You must apply the changes in order for them to take effect") . ".<br /></b><b>" . gettext("Warning: this will terminate all current PPTP sessions") . "!");
?>
<br />
<?php
}
?>
<table width="100%" border="0" cellpadding="0" cellspacing="0" summary="vpn pptp users">
<tr><td class="tabnavtbl">
<?php
$tab_array = array();
$tab_array[0] = array(gettext("Configuration"), false, "vpn_pptp.php");
$tab_array[1] = array(gettext("Users"), true, "vpn_pptp_users.php");
示例2: htmlspecialchars
$a_vs[$i]['sitedown'] = "<a href=\"/load_balancer_pool_edit.php?id={$poodex[$a_vs[$i]['sitedown']]}\">" . htmlspecialchars($a_vs[$i]['sitedown']) . "</a>";
} else {
$a_vs[$i]['sitedown'] = 'none';
}
}
}
$pgtitle = array(gettext("Services"), gettext("Load Balancer"), gettext("Virtual Servers"));
$shortcut_section = "relayd-virtualservers";
include "head.inc";
if ($input_errors) {
print_input_errors($input_errors);
}
if ($savemsg) {
print_info_box($savemsg);
}
if (is_subsystem_dirty('loadbalancer')) {
print_info_box_np(gettext("The virtual server configuration has been changed") . ".<br />" . gettext("You must apply the changes in order for them to take effect."));
}
/* active tabs */
$tab_array = array();
$tab_array[] = array(gettext("Pools"), false, "load_balancer_pool.php");
$tab_array[] = array(gettext("Virtual Servers"), true, "load_balancer_virtual_server.php");
$tab_array[] = array(gettext("Monitors"), false, "load_balancer_monitor.php");
$tab_array[] = array(gettext("Settings"), false, "load_balancer_setting.php");
display_top_tabs($tab_array);
?>
<form action="load_balancer_virtual_server.php" method="post">
<div class="panel panel-default">
<div class="panel-heading"><h2 class="panel-title"><?php
echo gettext('Virtual Servers');
示例3: build_gatewayv6_list
function build_gatewayv6_list()
{
global $a_gateways, $if;
$list = array("none" => "None");
foreach ($a_gateways as $gateway) {
if ($gateway['interface'] == $if && is_ipaddrv6($gateway['gateway'])) {
$list[$gateway['name']] = $gateway['name'] . " - " . $gateway['gateway'];
}
}
return $list;
}
include "head.inc";
if ($input_errors) {
print_input_errors($input_errors);
}
if (is_subsystem_dirty('interfaces')) {
print_info_box_np(sprintf(gettext("The %s configuration has been changed."), $wancfg['descr']) . "<br />" . gettext("You must apply the changes in order for them to take effect. Don't forget to adjust the DHCP Server range if needed after applying."));
}
if ($savemsg) {
print_info_box($savemsg, 'success');
}
require_once 'classes/Form.class.php';
require_once 'classes/Modal.class.php';
$form = new Form(new Form_Button('Submit', gettext("Save")));
$section = new Form_Section('General configuration');
$section->addInput(new Form_Checkbox('enable', 'Enable', 'Enable interface', $pconfig['enable'], 'yes'));
$section->addInput(new Form_Input('descr', 'Description', 'text', $pconfig['descr']))->setHelp('Enter a description (name) for the interface here.');
$section->addInput(new Form_Select('type', 'IPv4 Configuration Type', $pconfig['type'], $types4));
$section->addInput(new Form_Select('type6', 'IPv6 Configuration Type', $pconfig['type6'], $types6));
$macaddress = new Form_Input('mac', 'MAC Address', 'text', $pconfig['mac'], ['placeholder' => 'xx:xx:xx:xx:xx:xx']);
$btnmymac = new Form_Button('btnmymac', 'Copy My MAC');
示例4: mark_subsystem_dirty
$a_1to1[$_GET['id']]['disabled'] = true;
}
if (write_config(gettext("Firewall: NAT: 1:1, enable/disable NAT rule"))) {
mark_subsystem_dirty('natconf');
}
header("Location: firewall_nat_1to1.php");
exit;
}
}
}
$pgtitle = array(gettext("Firewall"), gettext("NAT"), gettext("1:1"));
include "head.inc";
if ($savemsg) {
print_info_box($savemsg, 'success');
}
if (is_subsystem_dirty('natconf')) {
print_apply_box(gettext('The NAT configuration has been changed.') . '<br />' . gettext('You must apply the changes in order for them to take effect.'));
}
$tab_array = array();
$tab_array[] = array(gettext("Port Forward"), false, "firewall_nat.php");
$tab_array[] = array(gettext("1:1"), true, "firewall_nat_1to1.php");
$tab_array[] = array(gettext("Outbound"), false, "firewall_nat_out.php");
$tab_array[] = array(gettext("NPt"), false, "firewall_nat_npt.php");
display_top_tabs($tab_array);
?>
<form action="firewall_nat_1to1.php" method="post">
<div class="panel panel-default">
<div class="panel-heading"><h2 class="panel-title"><?php
echo gettext("NAT 1:1 Mappings");
?>
</h2></div>
示例5: print_input_errors
include "fbegin.inc";
?>
<div id="inputerrors"></div>
<?php
if ($input_errors) {
print_input_errors($input_errors);
}
?>
<form action="firewall_shaper.php" method="post" id="iform" name="iform">
<?php
if ($savemsg) {
print_info_box($savemsg);
}
if (is_subsystem_dirty('shaper')) {
?>
<p>
<?php
print_info_box_np(gettext("The traffic shaper configuration has been changed.") . "<br>" . gettext("You must apply the changes in order for them to take effect."));
?>
<br>
<?php
}
?>
<table width="100%" border="0" cellpadding="0" cellspacing="0">
<tr><td>
<?php
$tab_array = array();
$tab_array[0] = array(gettext("By Interface"), true, "firewall_shaper.php");
$tab_array[1] = array(gettext("By Queue"), false, "firewall_shaper_queues.php");
示例6: print_info_box
<body>
<?php
include "fbegin.inc";
?>
<section class="page-content-main">
<div class="container-fluid">
<div class="row">
<?php
if ($savemsg) {
print_info_box($savemsg);
}
if (is_subsystem_dirty('ipsec')) {
print_info_box_np(gettext("The IPsec tunnel configuration has been changed") . ".<br />" . gettext("You must apply the changes in order for them to take effect."));
}
?>
<section class="col-xs-12">
<? $active_tab = "/vpn_ipsec_settings.php";
include('vpn_ipsec_tabs.inc'); ?>
<div class="tab-content content-box col-xs-12">
<form action="vpn_ipsec_keys.php" method="post">
<div class="table-responsive">
<table class="table table-striped table-sort">
示例7: ini_set
*
* ====================================================================
*
*/
##|+PRIV
##|*IDENT=page-system-packagemanager
##|*NAME=System: Package Manager
##|*DESCR=Allow access to the 'System: Package Manager' page.
##|*MATCH=pkg_mgr.php*
##|-PRIV
ini_set('max_execution_time', '0');
require_once "globals.inc";
require_once "guiconfig.inc";
require_once "pkg-utils.inc";
/* if upgrade in progress, alert user */
if (is_subsystem_dirty('packagelock')) {
$pgtitle = array(gettext("System"), gettext("Package Manager"));
include "head.inc";
print_info_box_np("Please wait while packages are reinstalled in the background.");
include "foot.inc";
exit;
}
$pkg_info = get_pkg_info();
$pgtitle = array(gettext("System"), gettext("Package Manager"), gettext("Available Packages"));
include "head.inc";
$tab_array = array();
$tab_array[] = array(gettext("Available Packages"), true, "pkg_mgr.php");
$tab_array[] = array(gettext("Installed Packages"), false, "pkg_mgr_installed.php");
display_top_tabs($tab_array);
if ($pkg_info) {
//Check categories
示例8: unset
}
}
unset($interface_addresses);
return $iflist;
}
$closehead = false;
$pgtitle = array(gettext("Services"), gettext("DNS Forwarder"));
$shortcut_section = "forwarder";
include "head.inc";
if ($input_errors) {
print_input_errors($input_errors);
}
if ($savemsg) {
print_info_box($savemsg, 'success');
}
if (is_subsystem_dirty('hosts')) {
print_info_box_np(gettext("The DNS forwarder configuration has been changed") . ".<br />" . gettext("You must apply the changes in order for them to take effect."));
}
$form = new Form();
$section = new Form_Section('General DNS Forwarder Options');
$section->addInput(new Form_Checkbox('enable', 'Enable', 'Enable DNS forwarder', $pconfig['enable']))->toggles('.toggle-dhcp', 'disable');
$section->addInput(new Form_Checkbox('regdhcp', 'DHCP Registration', 'Register DHCP leases in DNS forwarder', $pconfig['regdhcp']))->setHelp(sprintf("If this option is set, then machines that specify" . " their hostname when requesting a DHCP lease will be registered" . " in the DNS forwarder, so that their name can be resolved." . " You should also set the domain in %sSystem:" . " General setup%s to the proper value.", '<a href="system.php">', '</a>'))->addClass('toggle-dhcp');
$section->addInput(new Form_Checkbox('regdhcpstatic', 'Static DHCP', 'Register DHCP static mappings in DNS forwarder', $pconfig['regdhcpstatic']))->setHelp(sprintf("If this option is set, then DHCP static mappings will " . "be registered in the DNS forwarder, so that their name can be " . "resolved. You should also set the domain in %s" . "System: General setup%s to the proper value.", '<a href="system.php">', '</a>'))->addClass('toggle-dhcp');
$section->addInput(new Form_Checkbox('dhcpfirst', 'Prefer DHCP', 'Resolve DHCP mappings first', $pconfig['dhcpfirst']))->setHelp(sprintf("If this option is set, then DHCP mappings will " . "be resolved before the manual list of names below. This only " . "affects the name given for a reverse lookup (PTR)."))->addClass('toggle-dhcp');
$group = new Form_Group('DNS Query Forwarding');
$group->add(new Form_Checkbox('strict_order', 'DNS Query Forwarding', 'Query DNS servers sequentially', $pconfig['strict_order']))->setHelp(sprintf("If this option is set, %s DNS Forwarder (dnsmasq) will " . "query the DNS servers sequentially in the order specified (<i>System - General Setup - DNS Servers</i>), " . "rather than all at once in parallel. ", $g['product_name']));
$group->add(new Form_Checkbox('domain_needed', null, 'Require domain', $pconfig['domain_needed']))->setHelp(sprintf("If this option is set, %s DNS Forwarder (dnsmasq) will " . "not forward A or AAAA queries for plain names, without dots or domain parts, to upstream name servers.\t " . "If the name is not known from /etc/hosts or DHCP then a \"not found\" answer is returned. ", $g['product_name']));
$group->add(new Form_Checkbox('no_private_reverse', null, 'Do not forward private reverse lookups', $pconfig['no_private_reverse']))->setHelp(sprintf("If this option is set, %s DNS Forwarder (dnsmasq) will " . "not forward reverse DNS lookups (PTR) for private addresses (RFC 1918) to upstream name servers. " . "Any entries in the Domain Overrides section forwarding private \"n.n.n.in-addr.arpa\" names to a specific server are still forwarded. " . "If the IP to name is not known from /etc/hosts, DHCP or a specific domain override then a \"not found\" answer is immediately returned. ", $g['product_name']));
$section->add($group);
$section->addInput(new Form_Input('port', 'Listen Port', 'number', $pconfig['port'], ['placeholder' => '53']))->setHelp('The port used for responding to DNS queries. It should normally be left blank unless another service needs to bind to TCP/UDP port 53.');
$iflist = build_if_list();
示例9: array
$pgtitle = array(gettext("VPN"), gettext("IPsec"));
$shortcut_section = "ipsec";
include "head.inc";
?>
<body link="#0000CC" vlink="#0000CC" alink="#0000CC">
<?php
include "fbegin.inc";
?>
<form action="vpn_ipsec.php" method="post">
<script type="text/javascript" src="/javascript/row_toggle.js"></script>
<?php
if ($savemsg) {
print_info_box($savemsg);
}
if ($pconfig['enable'] && is_subsystem_dirty('ipsec')) {
print_info_box_np(gettext("The IPsec tunnel configuration has been changed") . ".<br />" . gettext("You must apply the changes in order for them to take effect."));
}
?>
<table width="100%" border="0" cellpadding="0" cellspacing="0" summary="vpn ipsec">
<tr>
<td class="tabnavtbl">
<?php
$tab_array = array();
$tab_array[0] = array(gettext("Tunnels"), true, "vpn_ipsec.php");
$tab_array[1] = array(gettext("Mobile clients"), false, "vpn_ipsec_mobile.php");
$tab_array[2] = array(gettext("Pre-Shared Keys"), false, "vpn_ipsec_keys.php");
$tab_array[3] = array(gettext("Advanced Settings"), false, "vpn_ipsec_settings.php");
display_top_tabs($tab_array);
?>
</td>
示例10: unset
}
if ($_GET['act'] == "del") {
if ($a_igmpproxy[$_GET['id']]) {
unset($a_igmpproxy[$_GET['id']]);
write_config();
mark_subsystem_dirty('igmpproxy');
header("Location: services_igmpproxy.php");
exit;
}
}
$pgtitle = array(gettext("Services"), gettext("IGMP Proxy"));
include "head.inc";
if ($savemsg) {
print_info_box($savemsg, 'success');
}
if (is_subsystem_dirty('igmpproxy')) {
print_info_box_np(gettext('The IGMP entry list has been changed.' . '<br />' . 'You must apply the changes in order for them to take effect.'));
}
?>
<form action="services_igmpproxy.php" method="post">
<div class="panel panel-default">
<div class="panel-heading"><h2 class="panel-title"><?php
echo gettext('IGMP Proxy');
?>
</h2></div>
<div class="panel-body">
<div class="table-responsive">
<table class="table table-striped table-hover table-condensed">
示例11: gettext
?>
<script type="text/javascript" src="/javascript/autosuggest.js">
</script>
<script type="text/javascript" src="/javascript/suggestions.js">
</script>
<form action="snort_preprocessors.php" method="post" enctype="multipart/form-data" name="iform" id="iform">
<input name="id" type="hidden" value="<?php
echo $id;
?>
"/>
<input name="eng_id" id="eng_id" type="hidden" value=""/>
<?php
if (is_subsystem_dirty('snort_preprocessors')) {
?>
<p>
<?php
print_info_box_np(gettext("A change has been made to the preprocessors configuration.") . "<br/>" . gettext("Click SAVE when finished to apply the change to the Snort configuration."));
}
?>
<table width="100%" border="0" cellpadding="0" cellspacing="0">
<tr><td>
<?php
$tab_array = array();
$tab_array[0] = array(gettext("Snort Interfaces"), true, "/snort/snort_interfaces.php");
$tab_array[1] = array(gettext("Global Settings"), false, "/snort/snort_interfaces_global.php");
$tab_array[2] = array(gettext("Updates"), false, "/snort/snort_download_updates.php");
$tab_array[3] = array(gettext("Alerts"), false, "/snort/snort_alerts.php?instance={$id}");
示例12: gettext
?>
<form action="/snort/snort_rules.php" method="post" name="iform" id="iform">
<input type='hidden' name='id' id='id' value='<?php
echo $id;
?>
'/>
<input type='hidden' name='openruleset' id='openruleset' value='<?php
echo $currentruleset;
?>
'/>
<input type='hidden' name='sid' id='sid' value=''/>
<input type='hidden' name='gid' id='gid' value=''/>
<?php
if (is_subsystem_dirty('snort_rules')) {
?>
<p>
<?php
print_info_box_np(gettext("A change has been made to a rule state.") . "<br/>" . gettext("Click APPLY when finished to send the changes to the running configuration."));
}
?>
<table width="100%" border="0" cellpadding="0" cellspacing="0">
<tr><td>
<?php
$tab_array = array();
$tab_array[0] = array(gettext("Snort Interfaces"), true, "/snort/snort_interfaces.php");
$tab_array[1] = array(gettext("Global Settings"), false, "/snort/snort_interfaces_global.php");
$tab_array[2] = array(gettext("Updates"), false, "/snort/snort_download_updates.php");
$tab_array[3] = array(gettext("Alerts"), false, "/snort/snort_alerts.php?instance={$id}");
示例13: print_info_box
<section class="page-content-main">
<div class="container-fluid">
<div class="row">
<?php
if (isset($savemsg)) {
print_info_box($savemsg);
}
?>
<?php
if (isset($config['l2tp']['radius']['enable'])) {
print_info_box(gettext("Warning: RADIUS is enabled. The local user database will not be used."));
}
?>
<?php
if (is_subsystem_dirty('l2tpusers')) {
?>
<br/>
<?php
print_info_box_apply(gettext("The l2tp user list has been modified") . ".<br />" . gettext("You must apply the changes in order for them to take effect") . ".<br /><b>" . gettext("Warning: this will terminate all current l2tp sessions!") . "</b>");
?>
<?php
}
?>
<div id="inputerrors"></div>
<section class="col-xs-12">
<div class="tab-content content-box col-xs-12">
示例14: include
mark_subsystem_dirty('loadbalancer');
write_config("Updated load balancer pools via status screen.");
}
}
?>
<body>
<?php include("fbegin.inc"); ?>
<section class="page-content-main">
<div class="container-fluid">
<div class="row">
<?php if (is_subsystem_dirty('loadbalancer')): ?><br/>
<?php print_info_box_np(sprintf(gettext("The load balancer configuration has been changed%sYou must apply the changes in order for them to take effect."), "<br />"));?>
<? endif; ?>
<section class="col-xs-12">
<?php
/* active tabs */
$tab_array = array();
$tab_array[] = array(gettext("Pools"), true, "status_lb_pool.php");
$tab_array[] = array(gettext("Virtual Servers"), false, "status_lb_vs.php");
display_top_tabs($tab_array);
?>
<div class="tab-content content-box col-xs-12">
示例15:
$snortdownload = $config['installedpackages']['suricata']['config'][0]['enable_vrt_rules'] == 'on' ? 'on' : 'off';
$etpro = $config['installedpackages']['suricata']['config'][0]['enable_etpro_rules'] == 'on' ? 'on' : 'off';
$eto = $config['installedpackages']['suricata']['config'][0]['enable_etopen_rules'] == 'on' ? 'on' : 'off';
$vrt_enabled = $config['installedpackages']['suricata']['config'][0]['enable_vrt_rules'] == 'on' ? 'on' : 'off';
$snortcommunityrules = $config['installedpackages']['suricata']['config'][0]['snortcommunityrules'] == 'on' ? 'on' : 'off';
/* Working directory for downloaded rules tarballs */
$tmpfname = "{$g['tmp_path']}/suricata_rules_up";
/* Snort VRT Rules filenames and URL */
$snort_filename_md5 = "{$snort_filename}.md5";
$snort_rule_url = VRT_DNLD_URL;
/* Snort GPLv2 Community Rules filenames and URL */
$snort_community_rules_filename = GPLV2_DNLD_FILENAME;
$snort_community_rules_filename_md5 = GPLV2_DNLD_FILENAME . ".md5";
$snort_community_rules_url = GPLV2_DNLD_URL;
/* Mount the Suricata conf directories R/W so we can modify files there */
if (!is_subsystem_dirty('mount')) {
conf_mount_rw();
$mounted_rw = TRUE;
}
/* Set up Emerging Threats rules filenames and URL */
if ($etpro == "on") {
$emergingthreats_filename = ETPRO_DNLD_FILENAME;
$emergingthreats_filename_md5 = ETPRO_DNLD_FILENAME . ".md5";
$emergingthreats_url = ETPRO_BASE_DNLD_URL;
$emergingthreats_url .= "{$etproid}/suricata/";
$et_name = "Emerging Threats Pro";
$et_md5_remove = ET_DNLD_FILENAME . ".md5";
unlink_if_exists("{$suricatadir}{$et_md5_remove}");
} else {
$emergingthreats_filename = ET_DNLD_FILENAME;
$emergingthreats_filename_md5 = ET_DNLD_FILENAME . ".md5";