Skip to content

Commit 21d6f9c

Browse files
authored
Merge pull request #260 from hongquan/fix-whitespace
Fix inconsistent whitespace
2 parents 66b8cf6 + 14005ab commit 21d6f9c

File tree

1 file changed

+22
-22
lines changed

1 file changed

+22
-22
lines changed

wifidog.conf

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
# Default: NONE
1919
# Optional
2020
#
21-
# Set this to the external interface (the one going out to the Inernet or your larger LAN).
21+
# Set this to the external interface (the one going out to the Inernet or your larger LAN).
2222
# Typically vlan1 for OpenWrt, and eth0 or ppp0 otherwise,
2323
# Normally autodetected
2424

@@ -28,7 +28,7 @@
2828
# Default: NONE
2929
# Mandatory
3030
#
31-
# Set this to the internal interface (typically your wifi interface).
31+
# Set this to the internal interface (typically your wifi interface).
3232
# Typically br-lan for Openwrt (by default the wifi interface is bridged with wired lan in openwrt)
3333
# and eth1, wlan0, ath0, etc. otherwise
3434
# You can get this interface with the ifconfig command and finding your wifi interface
@@ -61,11 +61,11 @@ GatewayInterface br-lan
6161
# Set this to the hostname or IP of your auth server(s), the path where
6262
# WiFiDog-auth resides in and the port it listens on.
6363
#AuthServer {
64-
# Hostname (Mandatory; Default: NONE)
65-
# SSLAvailable (Optional; Default: no; Possible values: yes, no)
66-
# SSLPort (Optional; Default: 443)
67-
# HTTPPort (Optional; Default: 80)
68-
# Path (Optional; Default: /wifidog/ Note: The path must be both prefixed and suffixed by /. Use a single / for server root.)
64+
# Hostname (Mandatory; Default: NONE)
65+
# SSLAvailable (Optional; Default: no; Possible values: yes, no)
66+
# SSLPort (Optional; Default: 443)
67+
# HTTPPort (Optional; Default: 80)
68+
# Path (Optional; Default: /wifidog/ Note: The path must be both prefixed and suffixed by /. Use a single / for server root.)
6969
# LoginScriptPathFragment (Optional; Default: login/? Note: This is the script the user will be sent to for login.)
7070
# PortalScriptPathFragment (Optional; Default: portal/? Note: This is the script the user will be sent to after a successfull login.)
7171
# MsgScriptPathFragment (Optional; Default: gw_message.php? Note: This is the script the user will be sent to upon error to read a readable message.)
@@ -95,7 +95,7 @@ GatewayInterface br-lan
9595
# Optional
9696
#
9797
# Set this to true if you want to reset each user's traffic (Outgoing and Incoming) value after each Auth operation.
98-
# If this is enabled, Wifidog will add two new parameters to the AuthScriptPathFragment: Incoming_Delta, Outgoing_delta.
98+
# If this is enabled, Wifidog will add two new parameters to the AuthScriptPathFragment: Incoming_Delta, Outgoing_delta.
9999
# DeltaTraffic no
100100

101101
# Parameter: Daemon
@@ -159,7 +159,7 @@ GatewayInterface br-lan
159159
# How many seconds should we wait between timeout checks. This is also
160160
# how often the gateway will ping the auth server and how often it will
161161
# update the traffic counters on the auth server. Setting this too low
162-
# wastes bandwidth, setting this too high will cause the gateway to take
162+
# wastes bandwidth, setting this too high will cause the gateway to take
163163
# a long time to switch to it's backup auth server(s).
164164

165165
# CheckInterval 60
@@ -203,13 +203,13 @@ ClientTimeout 5
203203
#
204204
# The certificates in this directory must be named by their hash
205205
# value. For OpenWRT, you need a ca-certificates package newer
206-
# than what is shipped in Barrier Breaker (see
206+
# than what is shipped in Barrier Breaker (see
207207
# https://dev.openwrt.org/ticket/16537).
208208
#
209209
# This setting requires that WifiDog is compiled with SSL support.
210210
# It will be ignored otherwise.
211211
#
212-
# SSLCertPath /etc/ssl/certs/
212+
# SSLCertPath /etc/ssl/certs/
213213

214214
# Parameter: SSLAllowedCipherList
215215
# Default: all ciphers supported
@@ -261,11 +261,11 @@ PopularServers kernel.org,ieee.org
261261

262262
# Parameter: FirewallRule
263263
# Default: none
264-
#
264+
#
265265
# Define one firewall rule in a rule set.
266266

267267
# Rule Set: global
268-
#
268+
#
269269
# Used for rules to be applied to all other rulesets except locked.
270270
FirewallRuleSet global {
271271

@@ -274,15 +274,15 @@ FirewallRuleSet global {
274274

275275
## To block SMTP out, as it's a tech support nightmare, and a legal liability
276276
#FirewallRule block tcp port 25
277-
278-
## Use the following if you don't want clients to be able to access machines on
277+
278+
## Use the following if you don't want clients to be able to access machines on
279279
## the private LAN that gives internet access to wifidog. Note that this is not
280280
## client isolation; The laptops will still be able to talk to one another, as
281281
## well as to any machine bridged to the wifi of the router.
282282
# FirewallRule block to 192.168.0.0/16
283283
# FirewallRule block to 172.16.0.0/12
284284
# FirewallRule block to 10.0.0.0/8
285-
285+
286286
## This is an example ruleset for the Teliphone service.
287287
#FirewallRule allow udp to 69.90.89.192/27
288288
#FirewallRule allow udp to 69.90.85.0/27
@@ -299,7 +299,7 @@ FirewallRuleSet global {
299299

300300
## Use the following to log or ulog the traffic you want to allow or block.
301301
# For OPENWRT: use of these feature requires modules ipt_LOG or ipt_ULOG present in dependencies
302-
# iptables-mod-extra and iptables-mod-ulog (to adapt it to the linux distribution).
302+
# iptables-mod-extra and iptables-mod-ulog (to adapt it to the linux distribution).
303303
# Note: the log or ulog rule must be passed before, the rule you want to match.
304304
# for openwrt: use of these feature requires modules ipt_LOG or ipt_ULOG present in dependencies
305305
# iptables-mod-extra and iptables-mod-ulog
@@ -340,13 +340,13 @@ FirewallRuleSet known-users {
340340
#
341341
# XXX The redirect code adds the Default DROP clause.
342342
FirewallRuleSet unknown-users {
343-
# Use to-ipset to block or allow externally specified hosts.
344-
# Ipsets are created with the ipset utility. This is useful to
343+
# Use to-ipset to block or allow externally specified hosts.
344+
# Ipsets are created with the ipset utility. This is useful to
345345
# block or allow hosts at runtime externally.
346-
# For example, if your auth server requires users to log in
347-
# via Facebook, use the ipset feature built into dnsmasq to
346+
# For example, if your auth server requires users to log in
347+
# via Facebook, use the ipset feature built into dnsmasq to
348348
# to populate a list of various IPs used by the Facebook networks.
349-
#FirewallRule allow to-ipset fb
349+
#FirewallRule allow to-ipset fb
350350
FirewallRule allow udp port 53
351351
FirewallRule allow tcp port 53
352352
FirewallRule allow udp port 67

0 commit comments

Comments
 (0)