Fix capability report -- Simon Matter

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@622 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
teastep 2003-06-30 14:21:42 +00:00
parent 06e38b587d
commit fc1cc9b0eb
4 changed files with 9 additions and 4 deletions

View File

@ -25,3 +25,4 @@ Changes since 1.4.5
10) Added the SHOREWALL_SHELL configuraiton parameter.
11) Fixed capability reporting (thanks to Simon Matter).

View File

@ -3364,7 +3364,7 @@ report_capability() # $1 = Capability Name, $2 Capability Setting (if any)
{
local setting=
[ $1 = "Yes" ] && { setting="Available"; shift; } || setting="Not available"
[ x$1 = "xYes" ] && { setting="Available"; shift; } || setting="Not available"
echo " " $@: $setting
}

View File

@ -13,7 +13,11 @@ Problems Corrected:
Example:
ACCEPT fw net:206.124.146.0/24 tcp pop3
ACCEPT fw net:206.124.146.0/24 tcp pop3
3) A problem introduced in Snapshot 20030629 has been corrected whereby
the output of the capabilities report was corrupted in the case
where the capability was not available.
New Features:
@ -86,4 +90,4 @@ New Features:
7) The shell used to interpret the firewall script
(/usr/share/shorewall/firewall) may now be specified using the
SHOREWALL_SHELL parameter in shorewall.conf.
SHOREWALL_SHELL parameter in shorewall.conf.

View File

@ -417,7 +417,7 @@ MUTEX_TIMEOUT=60
#
# NEWNOTSYN
#
# If this variable is set to "No" or "no", then When a TCP packet that does
# If this variable is set to "No" or "no", then when a TCP packet that does
# not have the SYN flag set and the ACK and RST flags clear then unless the
# packet is part of an established connection, it will be dropped by the
# firewall