summaryrefslogtreecommitdiffhomepage
path: root/applications/luci-app-firewall/htdocs/luci-static/resources/view/firewall
diff options
context:
space:
mode:
authorPaul Dee <itsascambutmailmeanyway@gmail.com>2023-02-17 14:44:00 +0100
committerJo-Philipp Wich <jo@mein.io>2023-03-29 15:33:37 +0200
commit0484343903e9c284766044c2542fed1bc89b34e3 (patch)
treea1f010272f1624997bfe33b3b642de8d58b343f5 /applications/luci-app-firewall/htdocs/luci-static/resources/view/firewall
parentf464199be131d43fca953337d37169f9be25187e (diff)
luci-app-firewall: implement IPsets GUI
Enable it and place it between snats and custom tabs Tested on 22.03.2, 22.03.3 Signed-off-by: Paul Dee <itsascambutmailmeanyway@gmail.com>
Diffstat (limited to 'applications/luci-app-firewall/htdocs/luci-static/resources/view/firewall')
-rw-r--r--applications/luci-app-firewall/htdocs/luci-static/resources/view/firewall/ipsets.js212
1 files changed, 212 insertions, 0 deletions
diff --git a/applications/luci-app-firewall/htdocs/luci-static/resources/view/firewall/ipsets.js b/applications/luci-app-firewall/htdocs/luci-static/resources/view/firewall/ipsets.js
new file mode 100644
index 0000000000..c9f3e1131a
--- /dev/null
+++ b/applications/luci-app-firewall/htdocs/luci-static/resources/view/firewall/ipsets.js
@@ -0,0 +1,212 @@
+'use strict';
+'require view';
+'require uci';
+'require form';
+'require firewall';
+'require tools.firewall as fwtool';
+
+
+return view.extend({
+
+ load: function() {
+ return Promise.all([
+ uci.load('firewall')
+ ]);
+ },
+
+ render: function(data) {
+ var m, s, o;
+
+ m = new form.Map('firewall', _('Firewall - IP sets'),
+ _('firewall4 supports referencing and creating IP sets to simplify matching of large address lists without the need to create one rule per item to match. Port ranges in ipsets are unsupported by firewall4.<br />'));
+
+ var have_fw4 = L.hasSystemFeature('firewall4');
+
+ if (have_fw4) {
+ s = m.section(form.NamedSection, 'fwver', 'fwver', '', _('Your device runs firewall4.'));
+ } else {
+ s = m.section(form.NamedSection, 'fwver', 'fwver', '', _('Your device does not run firewall4.'));
+ }
+
+
+ s = m.section(form.GridSection, 'ipset', _('IP Sets'));
+ s.addremove = true;
+ s.anonymous = true;
+ s.sortable = true;
+ s.nodescriptions = true;
+
+
+ /* refer to: https://ipset.netfilter.org/ipset.man.html */
+ if (have_fw4) {
+ o = s.option(form.Value, 'name', _('Name'));
+ o.optional = false;
+ o.rmempty = false;
+ } else {
+ o = s.option(form.Value, 'name', _('Name'));
+ o.depends({ external: '' });
+ /* Default: (none) if external is unset
+ value of external if external is set */
+ }
+ o.placeholder = _('Unnamed set');
+
+
+ /* comment requires https://git.openwrt.org/?p=project/firewall4.git;a=commitdiff;h=39e8c70957c795bf0c12f04299170ae86c6efdf8 */
+ o = s.option(form.Value, 'comment', _('Comment'));
+ o.placeholder = _('Comment');
+ o.modalonly = true;
+ o.rmempty = true;
+
+
+ o = s.option(form.ListValue, 'family', _('Family'));
+ o.value('ipv4', _('IPv4'));
+ o.value('ipv6', _('IPv6'));
+ o.default = _('ipv4');
+
+
+ /* Direction src, dst; (Data)Types: ip, port, mac, net or set
+ Tuples: direction_datatype e.g. src_port, dest_net */
+ o = s.option(form.DynamicList, 'match', _('Packet Field Match'),
+ _('Packet fields to match upon.<br />' +
+ 'Syntax: <em>direction_datatype</em>. e.g.: <code>src_port, dest_net</code>.<br />' +
+ 'Directions: <code>src, dst</code>. Datatypes: <code>ip, port, mac, net, set</code>.<br />' +
+ 'Direction prefixes are optional.<br />' +
+ '*Note: datatype <code>set</code> is unsupported in fw4.'));
+ o.value('ip', _('ip: IP addr'));
+ o.value('port', _('port: Port'));
+ o.value('mac', _('mac: MAC addr'));
+ o.value('net', _('net: (sub)net'));
+ if (!have_fw4)
+ o.value('set', _('set: ipset*'));
+ o.value('src_ip', _('src_ip: Source IP'));
+ o.value('src_port', _('src_port: Source Port'));
+ o.value('src_mac', _('src_mac: Source MAC addr'));
+ o.value('src_net', _('src_net: Source (sub)net'));
+ if (!have_fw4)
+ o.value('src_set', _('src_Set: Source ipset*')); // fw4 unsupported
+ o.value('dest_ip', _('dest_ip: Destination IP'));
+ o.value('dest_port', _('dest_port: Destination Port'));
+ o.value('dest_mac', _('dest_mac: Destination MAC addr'));
+ o.value('dest_net', _('dest_net: Destination (sub)net'));
+ if (!have_fw4)
+ o.value('dest_set', _('dest_set: Destination ipset*')); // fw4 unsupported
+ o.optional = false;
+ o.rmempty = false;
+
+
+ // TODO: if/when firewall5 arrives, this 'else' check must change.
+ if (have_fw4) {
+
+ //we have fw4
+ o = s.option(form.DynamicList, 'entry', _('IPs/Networks/MACs'),
+ _('macaddr|ip[/cidr]<br />'));
+ o.datatype = 'or(ipaddr,macaddr)';
+ o.rmempty = true;
+
+
+ o = s.option(form.Value, 'maxelem', _('Max Entries'),
+ _('up to 65536 entries.'));
+ o.datatype = 'port'; //covers 16 bit size
+ o.modalonly = true;
+ o.rmempty = true;
+
+ } else {
+ // this else section is intended to handle firewall3
+
+ o = s.option(form.Value, 'external', _('Refer To External Set'));
+ /* Todo: loop to fill o.values with all other ipset names except itself */
+ o.rmempty = true;
+ o.optional = true;
+
+
+ /* 'storage' depends on fw3. It must be removed for fw4 */
+ //aka 'method' in netfilter terminology.
+ o = s.option(form.ListValue, 'storage', _('Storage Method'));
+ o.value('bitmap', _('bitmap')); //ipv4 only
+ o.value('hash', _('hash'));
+ o.value('list', _('list'));
+ o.validate = function(section_id, value) {
+ var family = this.section.formvalue(section_id, 'family');
+ if (value.match(/bitmap/) && !family.match(/ipv4/))
+ return _('bitmap is ipv4 only');
+ return true;
+ }
+
+ /* this iprange differs from netfilters range fromip-toip|ip/cidr:
+ uci enforces a datatype = cidr in order to be able to enter
+ an IP for all storage/data types. */
+ o = s.option(form.Value, 'iprange', _('IP (range)'),
+ _('ip[/cidr]<br />'+
+ 'For use with Match datatypes: <code>*_ip</code>.'));
+ o.datatype = 'ipaddr';
+ o.depends({family: 'ipv4', storage: 'bitmap', match: /_ip|_mac/ });
+ o.depends({storage: 'hash', match: /_ip/ });
+
+
+ o = s.option(form.DynamicList, 'entry', _('IPs/Networks'),
+ _('ip[/cidr]<br />'));
+ o.datatype = 'or(ipaddr,macaddr)';
+ o.depends({storage: 'hash', match: /_ip|_net|_mac/ });
+
+
+ o = s.option(form.Value, 'portrange', _('Port range'),
+ _('fromport-toport'));
+ o.datatype = 'neg(portrange)';
+ o.depends({family: 'ipv4', storage: 'bitmap', match: /_port/ });
+ o.depends({family: 'ipv4', storage: 'hash', match: /_port/ });
+ o.depends({family: 'ipv6', storage: 'hash', match: /_port/ });
+
+
+ o = s.option(form.Value, 'netmask', _('Netmask'));
+ o.datatype = 'or(ip4prefix,ip6prefix)';
+ o.depends({family: 'ipv4', storage: 'bitmap', match: /_ip/ });
+ o.depends({storage: 'hash', match: /_ip/});
+
+
+ o = s.option(form.Value, 'maxelem', _('Max Length'),
+ _('up to 65536 entries.'));
+ o.datatype = 'port'; //covers 16 bit size
+ o.depends('storage', 'hash');
+ o.depends('storage', 'list');
+ o.modalonly = true;
+
+
+ o = s.option(form.Value, 'hashsize', _('Initial Hash Size'));
+ o.depends('storage', 'hash');
+ o.placeholder = _('1024');
+ o.modalonly = true;
+
+ }
+
+ o = s.option(form.FileUpload, 'loadfile', _('Include File'),
+ _('Path to file of CIDRs, subnets, host IPs, etc.<br />'));
+ o.root_directory = '/etc/luci-uploads';
+ o.enable_delete = true;
+ o.enable_upload = true;
+ o.datatype = 'file';
+ o.rmempty = true;
+
+
+ o = s.option(form.Value, 'timeout', _('Timeout'),
+ _('Unit: seconds. Default <code>0</code> means the entry is added permanently to the set.<br />' +
+ 'Max: 2147483 seconds.'));
+ o.placeholder = _('0');
+ o.modalonly = true;
+ o.rmempty = true;
+
+
+ o = s.option(form.Flag, 'counters', _('Counters'),
+ _('Enables packet and byte count tracking for the set.'));
+ o.modalonly = true;
+ o.rmempty = true;
+ o.default = false;
+
+
+ o = s.option(form.Flag, 'enabled', _('Enabled'));
+ o.default = true;
+ o.editable = true;
+ o.modalonly = false;
+
+
+ return m.render();
+ }
+});