Commit 4ad74d20 authored by Franco Fichtner's avatar Franco Fichtner

src: whitespace sweep

parent 019443e8
...@@ -184,10 +184,10 @@ ...@@ -184,10 +184,10 @@
<label>Enable Transparent HTTP proxy</label> <label>Enable Transparent HTTP proxy</label>
<type>checkbox</type> <type>checkbox</type>
<help><![CDATA[ <help><![CDATA[
Enable transparent proxy mode. You will need a firewall rule to forward traffic from the firewall to the proxy server. Enable transparent proxy mode. You will need a firewall rule to forward traffic from the firewall to the proxy server.
You may leave the proxy interfaces empty, but remember to set a valid ACL in that case. You may leave the proxy interfaces empty, but remember to set a valid ACL in that case.
<br/> <br/>
<a href="/firewall_nat_edit.php?template=transparant_proxy"> add a new firewall rule </a> <a href="/firewall_nat_edit.php?template=transparant_proxy"> add a new firewall rule </a>
]]></help> ]]></help>
</field> </field>
<field> <field>
......
...@@ -12,7 +12,7 @@ http_port 127.0.0.1:{{ OPNsense.proxy.forward.port }} intercept ...@@ -12,7 +12,7 @@ http_port 127.0.0.1:{{ OPNsense.proxy.forward.port }} intercept
{% for interface in OPNsense.proxy.forward.interfaces.split(",") %} {% for interface in OPNsense.proxy.forward.interfaces.split(",") %}
{% for intf_key,intf_item in interfaces.iteritems() %} {% for intf_key,intf_item in interfaces.iteritems() %}
{% if intf_key == interface and intf_item.ipaddr != 'dhcp' %} {% if intf_key == interface and intf_item.ipaddr != 'dhcp' %}
http_port {{intf_item.ipaddr}}:{{ OPNsense.proxy.forward.port }} http_port {{intf_item.ipaddr}}:{{ OPNsense.proxy.forward.port }}
{% endif %} {% endif %}
{% endfor %} {% endfor %}
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment