summaryrefslogtreecommitdiffhomepage
path: root/applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view
diff options
context:
space:
mode:
authorLukas Voegl <lvoegl@tdt.de>2023-11-03 15:00:25 +0100
committerLukas Voegl <lvoegl@tdt.de>2023-11-10 15:48:16 +0100
commit366f3fc1759dc5b82c0d4a4df2da304ecde12294 (patch)
tree47954206ff9d3099d52a555f03bb323687f3b2db /applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view
parent108cd004b609cab9c08ab6f63a3cd43414a99bf6 (diff)
luci-app-strongswan-swanctl: reformat
Signed-off-by: Lukas Voegl <lvoegl@tdt.de>
Diffstat (limited to 'applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view')
-rw-r--r--applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view/strongswan-swanctl/swanctl.js350
1 files changed, 189 insertions, 161 deletions
diff --git a/applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view/strongswan-swanctl/swanctl.js b/applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view/strongswan-swanctl/swanctl.js
index d2e7103afa..659461bbc6 100644
--- a/applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view/strongswan-swanctl/swanctl.js
+++ b/applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view/strongswan-swanctl/swanctl.js
@@ -4,165 +4,193 @@
'require tools.widgets as widgets';
return view.extend({
- render: function() {
- var m, s, o;
-
- m = new form.Map('ipsec',
- _('strongSwan Configuration'),
- _("Configure strongSwan for secure VPN connections."));
-
- // strongSwan General Settings
- s = m.section(form.TypedSection, 'ipsec', _('strongSwan General Settings'));
- s.anonymous = true;
-
- o = s.option(widgets.ZoneSelect, 'zone', _('Zone'), _('Firewall zone that has to match the defined firewall zone'));
- o.default = 'lan';
- o.multiple = true;
-
- o = s.option(widgets.NetworkSelect, 'listen', _('Listen Interfaces'), _('Interfaces that accept VPN traffic'));
- o.datatype = 'interface';
- o.placeholder = _('Select an interface or leave empty for all interfaces');
- o.default = 'wan';
- o.multiple = true;
-
- o = s.option(form.Value, 'debug', _('Debug Level'), _('Logs written to /var/log/charon.log'));
- o.default = '0';
- o.datatype = "uinteger";
-
- // Remote Configuration
- s = m.section(form.TypedSection, 'remote', _('Remote Configuration'));
- s.anonymous = false;
-
- o = s.option(form.Flag, 'enabled', _('Enabled'), _('Configuration is enabled or not'));
-
- o = s.option(form.Value, 'gateway', _('Gateway (Remote Endpoint)'), _('Public IP address or FQDN name of the tunnel remote endpoint'));
- o.datatype = 'or(hostname,ipaddr)';
-
- o = s.option(form.Value, 'local_gateway', _('Local Gateway'), _('IP address or FQDN of the tunnel local endpoint'));
- o.datatype = 'or(hostname,ipaddr)';
-
- o = s.option(form.Value, 'local_sourceip', _('Local Source IP'), _('Virtual IP(s) to request in IKEv2 configuration payloads requests'));
- o.datatype = 'ipaddr';
-
- o = s.option(form.Value, 'local_ip', _('Local IP'), _('Local address(es) to use in IKE negotiation'));
- o.datatype = 'ipaddr';
-
- o = s.option(form.Value, 'local_identifier', _('Local Identifier'), _('Local identifier for IKE (phase 1)'));
- o.datatype = 'string';
- o.placeholder = "C=US, O=Acme Corporation, CN=headquarters"
-
- o = s.option(form.Value, 'remote_identifier', _('Remote Identifier'), _('Remote identifier for IKE (phase 1)'));
- o.datatype = 'string';
- o.placeholder = "C=US, O=Acme Corporation, CN=soho"
-
- o = s.option(form.ListValue, 'authentication_method', _('Authentication Method'), _('IKE authentication (phase 1).'));
- o.value('psk', "Pre-shared Key");
- o.value('pubkey', "Public Key");
- o.required = true;
-
- o = s.option(form.Value, 'pre_shared_key', _('Pre-Shared Key'), _('The pre-shared key for the tunnel if authentication is psk'));
- o.datatype = 'string';
- o.password = true;
- o.depends('authentication_method', 'psk');
-
- o = s.option(form.Flag, 'mobike', _('MOBIKE'), _('MOBIKE (IKEv2 Mobility and Multihoming Protocol)'));
- o.default = '1';
-
- o = s.option(form.ListValue, 'fragmentation', _('IKE Fragmentation'), _('Use IKE fragmentation (yes, no, force, accept)'));
- o.value('yes');
- o.value('no');
- o.value('force');
- o.value('accept')
- o.default = 'yes';
-
- o = s.option(form.ListValue, 'crypto_proposal', _('Crypto Proposal'), _('List of IKE (phase 1) proposals to use for authentication'));
- o.value('encryption_algorithm');
- o.value('hash_algorithm');
- o.value('dh_group');
- o.value('prf_algorithm');
-
- o = s.option(form.Value, 'tunnel', _('Tunnel'), _('Name of ESP/AH (phase 2) section'));
- o.required = true
-
- o = s.option(form.Value, 'authentication_method', _('Authentication Method'), _('IKE authentication (phase 1)'));
- o.datatype = 'string';
-
- s = m.section(form.TypedSection, 'ipsec', _('strongSwan General Settings'));
- s.anonymous = true;
-
- o = s.option(form.ListValue, 'encryption_algorithm', _('Encryption Algorithm'), _('Encryption method (aes128, aes192, aes256, 3des)'));
- o.value('aes128');
- o.value('aes192');
- o.value('aes256');
- o.value('3des');
- o.required = true
-
- o = s.option(form.ListValue, 'hash_algorithm', _('Hash Algorithm'), _('Hash algorithm (md5, sha1, sha2, ...)'));
- o.value('md5');
- o.value('sha1');
- o.value('sha2');
- o.value('sha256');
- o.value('sha384');
- o.value('sha512');
- o.value('sha3_256');
- o.value('sha3_384');
- o.value('sha3_512');
- o.value('blake2s256');
- o.value('blake2b512');
- o.value('blake2s256');
- o.value('blake2b512');
- o.value('whirlpool');
- o.value('tiger');
- o.required = true
-
- o = s.option(form.ListValue, 'dh_group', _('Diffie-Hellman Group'), _('Diffie-Hellman exponentiation (modp768, modp1024, ...)'));
- o.value('modp768');
- o.value('modp1024');
- o.value('modp1536');
- o.value('modp2048');
- o.value('modp3072');
- o.value('modp4096');
- o.required = true
-
- o = s.option(form.ListValue, 'prf_algorithm', _('PRF Algorithm'), _('Pseudo-Random Functions to use with IKE'));
- o.value('prf_hmac_md5');
- o.value('prfmd5')
- o.value('prfsha1')
- o.value('prfsha256')
- o.value('pfsha384')
- o.value('prfsha512')
-
- // Tunnel Configuration
- s = m.section(form.TypedSection, 'tunnel', _('Tunnel Configuration'));
- s.anonymous = false;
-
- o = s.option(form.Value, 'local_subnet', _('Local Subnet'), _('Local network(s)'));
- o.placeholder = "192.168.1.1/24"
- o.required = true
-
- o = s.option(form.Value, 'remote_subnet', _('Remote Subnet'), _('Remote network(s)'));
- o.placeholder = "192.168.2.1/24"
- o.required = true
-
- o = s.option(form.Value, 'local_nat', _('Local NAT'), _('NAT range for tunnels with overlapping IP addresses'));
- o.datatype = 'subnet';
-
- o = s.option(form.ListValue, 'crypto_proposal', _('Crypto Proposal (Phase 2)'), _('List of ESP (phase two) proposals'));
- o.value('encryption_algorithm');
- o.value('hash_algorithm');
- o.value('dh_group');
- o.value('prf_algorithm');
- o.required = true
-
- o = s.option(form.ListValue, 'startaction', _('Start Action'), _('Action on initial configuration load'));
- o.value('none');
- o.value('start');
- o.value('route');
- o.default = 'route';
-
- o = s.option(form.Value, 'updown', _('Up/Down Script Path'), _('Path to script to run on CHILD_SA up/down events'));
- o.datatype = 'filepath';
-
- return m.render();
- }
+ render: function () {
+ var m, s, o;
+
+ m = new form.Map('ipsec', _('strongSwan Configuration'),
+ _('Configure strongSwan for secure VPN connections.'));
+
+ // strongSwan General Settings
+ s = m.section(form.TypedSection, 'ipsec',
+ _('strongSwan General Settings'));
+ s.anonymous = true;
+
+ o = s.option(widgets.ZoneSelect, 'zone', _('Zone'),
+ _('Firewall zone that has to match the defined firewall zone'));
+ o.default = 'lan';
+ o.multiple = true;
+
+ o = s.option(widgets.NetworkSelect, 'listen', _('Listen Interfaces'),
+ _('Interfaces that accept VPN traffic'));
+ o.datatype = 'interface';
+ o.placeholder = _('Select an interface or leave empty for all interfaces');
+ o.default = 'wan';
+ o.multiple = true;
+
+ o = s.option(form.Value, 'debug', _('Debug Level'),
+ _('Logs written to /var/log/charon.log'));
+ o.default = '0';
+ o.datatype = 'uinteger';
+
+ // Remote Configuration
+ s = m.section(form.TypedSection, 'remote', _('Remote Configuration'));
+ s.anonymous = false;
+
+ o = s.option(form.Flag, 'enabled', _('Enabled'),
+ _('Configuration is enabled or not'));
+
+ o = s.option(form.Value, 'gateway', _('Gateway (Remote Endpoint)'),
+ _('Public IP address or FQDN name of the tunnel remote endpoint'));
+ o.datatype = 'or(hostname,ipaddr)';
+
+ o = s.option(form.Value, 'local_gateway', _('Local Gateway'),
+ _('IP address or FQDN of the tunnel local endpoint'));
+ o.datatype = 'or(hostname,ipaddr)';
+
+ o = s.option(form.Value, 'local_sourceip', _('Local Source IP'),
+ _('Virtual IP(s) to request in IKEv2 configuration payloads requests'));
+ o.datatype = 'ipaddr';
+
+ o = s.option(form.Value, 'local_ip', _('Local IP'),
+ _('Local address(es) to use in IKE negotiation'));
+ o.datatype = 'ipaddr';
+
+ o = s.option(form.Value, 'local_identifier', _('Local Identifier'),
+ _('Local identifier for IKE (phase 1)'));
+ o.datatype = 'string';
+ o.placeholder = 'C=US, O=Acme Corporation, CN=headquarters';
+
+ o = s.option(form.Value, 'remote_identifier', _('Remote Identifier'),
+ _('Remote identifier for IKE (phase 1)'));
+ o.datatype = 'string';
+ o.placeholder = 'C=US, O=Acme Corporation, CN=soho';
+
+ o = s.option(form.ListValue, 'authentication_method',
+ _('Authentication Method'), _('IKE authentication (phase 1).'));
+ o.value('psk', 'Pre-shared Key');
+ o.value('pubkey', 'Public Key');
+ o.required = true;
+
+ o = s.option(form.Value, 'pre_shared_key', _('Pre-Shared Key'),
+ _('The pre-shared key for the tunnel if authentication is psk'));
+ o.datatype = 'string';
+ o.password = true;
+ o.depends('authentication_method', 'psk');
+
+ o = s.option(form.Flag, 'mobike', _('MOBIKE'),
+ _('MOBIKE (IKEv2 Mobility and Multihoming Protocol)'));
+ o.default = '1';
+
+ o = s.option(form.ListValue, 'fragmentation', _('IKE Fragmentation'),
+ _('Use IKE fragmentation (yes, no, force, accept)'));
+ o.value('yes');
+ o.value('no');
+ o.value('force');
+ o.value('accept');
+ o.default = 'yes';
+
+ o = s.option(form.ListValue, 'crypto_proposal', _('Crypto Proposal'),
+ _('List of IKE (phase 1) proposals to use for authentication'));
+ o.value('encryption_algorithm');
+ o.value('hash_algorithm');
+ o.value('dh_group');
+ o.value('prf_algorithm');
+
+ o = s.option(form.Value, 'tunnel', _('Tunnel'),
+ _('Name of ESP/AH (phase 2) section'));
+ o.required = true;
+
+ o = s.option(form.Value, 'authentication_method',
+ _('Authentication Method'), _('IKE authentication (phase 1)'));
+ o.datatype = 'string';
+
+ s = m.section(form.TypedSection, 'ipsec',
+ _('strongSwan General Settings'));
+ s.anonymous = true;
+
+ o = s.option(form.ListValue, 'encryption_algorithm',
+ _('Encryption Algorithm'), _('Encryption method (aes128, aes192, aes256, 3des)'));
+ o.value('aes128');
+ o.value('aes192');
+ o.value('aes256');
+ o.value('3des');
+ o.required = true;
+
+ o = s.option(form.ListValue, 'hash_algorithm', _('Hash Algorithm'),
+ _('Hash algorithm (md5, sha1, sha2, ...)'));
+ o.value('md5');
+ o.value('sha1');
+ o.value('sha2');
+ o.value('sha256');
+ o.value('sha384');
+ o.value('sha512');
+ o.value('sha3_256');
+ o.value('sha3_384');
+ o.value('sha3_512');
+ o.value('blake2s256');
+ o.value('blake2b512');
+ o.value('blake2s256');
+ o.value('blake2b512');
+ o.value('whirlpool');
+ o.value('tiger');
+ o.required = true;
+
+ o = s.option(form.ListValue, 'dh_group', _('Diffie-Hellman Group'),
+ _('Diffie-Hellman exponentiation (modp768, modp1024, ...)'));
+ o.value('modp768');
+ o.value('modp1024');
+ o.value('modp1536');
+ o.value('modp2048');
+ o.value('modp3072');
+ o.value('modp4096');
+ o.required = true;
+
+ o = s.option(form.ListValue, 'prf_algorithm', _('PRF Algorithm'),
+ _('Pseudo-Random Functions to use with IKE'));
+ o.value('prf_hmac_md5');
+ o.value('prfmd5');
+ o.value('prfsha1');
+ o.value('prfsha256');
+ o.value('pfsha384');
+ o.value('prfsha512');
+
+ // Tunnel Configuration
+ s = m.section(form.TypedSection, 'tunnel', _('Tunnel Configuration'));
+ s.anonymous = false;
+
+ o = s.option(form.Value, 'local_subnet', _('Local Subnet'),
+ _('Local network(s)'));
+ o.placeholder = '192.168.1.1/24';
+ o.required = true;
+
+ o = s.option(form.Value, 'remote_subnet', _('Remote Subnet'),
+ _('Remote network(s)'));
+ o.placeholder = '192.168.2.1/24';
+ o.required = true;
+
+ o = s.option(form.Value, 'local_nat', _('Local NAT'),
+ _('NAT range for tunnels with overlapping IP addresses'));
+ o.datatype = 'subnet';
+
+ o = s.option(form.ListValue, 'crypto_proposal',
+ _('Crypto Proposal (Phase 2)'), _('List of ESP (phase two) proposals'));
+ o.value('encryption_algorithm');
+ o.value('hash_algorithm');
+ o.value('dh_group');
+ o.value('prf_algorithm');
+ o.required = true;
+
+ o = s.option(form.ListValue, 'startaction', _('Start Action'),
+ _('Action on initial configuration load'));
+ o.value('none');
+ o.value('start');
+ o.value('route');
+ o.default = 'route';
+
+ o = s.option(form.Value, 'updown', _('Up/Down Script Path'),
+ _('Path to script to run on CHILD_SA up/down events'));
+ o.datatype = 'filepath';
+
+ return m.render();
+ }
});