diff options
author | Lukas Voegl <lvoegl@tdt.de> | 2023-11-03 15:00:25 +0100 |
---|---|---|
committer | Lukas Voegl <lvoegl@tdt.de> | 2023-11-10 15:48:16 +0100 |
commit | 366f3fc1759dc5b82c0d4a4df2da304ecde12294 (patch) | |
tree | 47954206ff9d3099d52a555f03bb323687f3b2db /applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view | |
parent | 108cd004b609cab9c08ab6f63a3cd43414a99bf6 (diff) |
luci-app-strongswan-swanctl: reformat
Signed-off-by: Lukas Voegl <lvoegl@tdt.de>
Diffstat (limited to 'applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view')
-rw-r--r-- | applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view/strongswan-swanctl/swanctl.js | 350 |
1 files changed, 189 insertions, 161 deletions
diff --git a/applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view/strongswan-swanctl/swanctl.js b/applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view/strongswan-swanctl/swanctl.js index d2e7103afa..659461bbc6 100644 --- a/applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view/strongswan-swanctl/swanctl.js +++ b/applications/luci-app-strongswan-swanctl/htdocs/luci-static/resources/view/strongswan-swanctl/swanctl.js @@ -4,165 +4,193 @@ 'require tools.widgets as widgets'; return view.extend({ - render: function() { - var m, s, o; - - m = new form.Map('ipsec', - _('strongSwan Configuration'), - _("Configure strongSwan for secure VPN connections.")); - - // strongSwan General Settings - s = m.section(form.TypedSection, 'ipsec', _('strongSwan General Settings')); - s.anonymous = true; - - o = s.option(widgets.ZoneSelect, 'zone', _('Zone'), _('Firewall zone that has to match the defined firewall zone')); - o.default = 'lan'; - o.multiple = true; - - o = s.option(widgets.NetworkSelect, 'listen', _('Listen Interfaces'), _('Interfaces that accept VPN traffic')); - o.datatype = 'interface'; - o.placeholder = _('Select an interface or leave empty for all interfaces'); - o.default = 'wan'; - o.multiple = true; - - o = s.option(form.Value, 'debug', _('Debug Level'), _('Logs written to /var/log/charon.log')); - o.default = '0'; - o.datatype = "uinteger"; - - // Remote Configuration - s = m.section(form.TypedSection, 'remote', _('Remote Configuration')); - s.anonymous = false; - - o = s.option(form.Flag, 'enabled', _('Enabled'), _('Configuration is enabled or not')); - - o = s.option(form.Value, 'gateway', _('Gateway (Remote Endpoint)'), _('Public IP address or FQDN name of the tunnel remote endpoint')); - o.datatype = 'or(hostname,ipaddr)'; - - o = s.option(form.Value, 'local_gateway', _('Local Gateway'), _('IP address or FQDN of the tunnel local endpoint')); - o.datatype = 'or(hostname,ipaddr)'; - - o = s.option(form.Value, 'local_sourceip', _('Local Source IP'), _('Virtual IP(s) to request in IKEv2 configuration payloads requests')); - o.datatype = 'ipaddr'; - - o = s.option(form.Value, 'local_ip', _('Local IP'), _('Local address(es) to use in IKE negotiation')); - o.datatype = 'ipaddr'; - - o = s.option(form.Value, 'local_identifier', _('Local Identifier'), _('Local identifier for IKE (phase 1)')); - o.datatype = 'string'; - o.placeholder = "C=US, O=Acme Corporation, CN=headquarters" - - o = s.option(form.Value, 'remote_identifier', _('Remote Identifier'), _('Remote identifier for IKE (phase 1)')); - o.datatype = 'string'; - o.placeholder = "C=US, O=Acme Corporation, CN=soho" - - o = s.option(form.ListValue, 'authentication_method', _('Authentication Method'), _('IKE authentication (phase 1).')); - o.value('psk', "Pre-shared Key"); - o.value('pubkey', "Public Key"); - o.required = true; - - o = s.option(form.Value, 'pre_shared_key', _('Pre-Shared Key'), _('The pre-shared key for the tunnel if authentication is psk')); - o.datatype = 'string'; - o.password = true; - o.depends('authentication_method', 'psk'); - - o = s.option(form.Flag, 'mobike', _('MOBIKE'), _('MOBIKE (IKEv2 Mobility and Multihoming Protocol)')); - o.default = '1'; - - o = s.option(form.ListValue, 'fragmentation', _('IKE Fragmentation'), _('Use IKE fragmentation (yes, no, force, accept)')); - o.value('yes'); - o.value('no'); - o.value('force'); - o.value('accept') - o.default = 'yes'; - - o = s.option(form.ListValue, 'crypto_proposal', _('Crypto Proposal'), _('List of IKE (phase 1) proposals to use for authentication')); - o.value('encryption_algorithm'); - o.value('hash_algorithm'); - o.value('dh_group'); - o.value('prf_algorithm'); - - o = s.option(form.Value, 'tunnel', _('Tunnel'), _('Name of ESP/AH (phase 2) section')); - o.required = true - - o = s.option(form.Value, 'authentication_method', _('Authentication Method'), _('IKE authentication (phase 1)')); - o.datatype = 'string'; - - s = m.section(form.TypedSection, 'ipsec', _('strongSwan General Settings')); - s.anonymous = true; - - o = s.option(form.ListValue, 'encryption_algorithm', _('Encryption Algorithm'), _('Encryption method (aes128, aes192, aes256, 3des)')); - o.value('aes128'); - o.value('aes192'); - o.value('aes256'); - o.value('3des'); - o.required = true - - o = s.option(form.ListValue, 'hash_algorithm', _('Hash Algorithm'), _('Hash algorithm (md5, sha1, sha2, ...)')); - o.value('md5'); - o.value('sha1'); - o.value('sha2'); - o.value('sha256'); - o.value('sha384'); - o.value('sha512'); - o.value('sha3_256'); - o.value('sha3_384'); - o.value('sha3_512'); - o.value('blake2s256'); - o.value('blake2b512'); - o.value('blake2s256'); - o.value('blake2b512'); - o.value('whirlpool'); - o.value('tiger'); - o.required = true - - o = s.option(form.ListValue, 'dh_group', _('Diffie-Hellman Group'), _('Diffie-Hellman exponentiation (modp768, modp1024, ...)')); - o.value('modp768'); - o.value('modp1024'); - o.value('modp1536'); - o.value('modp2048'); - o.value('modp3072'); - o.value('modp4096'); - o.required = true - - o = s.option(form.ListValue, 'prf_algorithm', _('PRF Algorithm'), _('Pseudo-Random Functions to use with IKE')); - o.value('prf_hmac_md5'); - o.value('prfmd5') - o.value('prfsha1') - o.value('prfsha256') - o.value('pfsha384') - o.value('prfsha512') - - // Tunnel Configuration - s = m.section(form.TypedSection, 'tunnel', _('Tunnel Configuration')); - s.anonymous = false; - - o = s.option(form.Value, 'local_subnet', _('Local Subnet'), _('Local network(s)')); - o.placeholder = "192.168.1.1/24" - o.required = true - - o = s.option(form.Value, 'remote_subnet', _('Remote Subnet'), _('Remote network(s)')); - o.placeholder = "192.168.2.1/24" - o.required = true - - o = s.option(form.Value, 'local_nat', _('Local NAT'), _('NAT range for tunnels with overlapping IP addresses')); - o.datatype = 'subnet'; - - o = s.option(form.ListValue, 'crypto_proposal', _('Crypto Proposal (Phase 2)'), _('List of ESP (phase two) proposals')); - o.value('encryption_algorithm'); - o.value('hash_algorithm'); - o.value('dh_group'); - o.value('prf_algorithm'); - o.required = true - - o = s.option(form.ListValue, 'startaction', _('Start Action'), _('Action on initial configuration load')); - o.value('none'); - o.value('start'); - o.value('route'); - o.default = 'route'; - - o = s.option(form.Value, 'updown', _('Up/Down Script Path'), _('Path to script to run on CHILD_SA up/down events')); - o.datatype = 'filepath'; - - return m.render(); - } + render: function () { + var m, s, o; + + m = new form.Map('ipsec', _('strongSwan Configuration'), + _('Configure strongSwan for secure VPN connections.')); + + // strongSwan General Settings + s = m.section(form.TypedSection, 'ipsec', + _('strongSwan General Settings')); + s.anonymous = true; + + o = s.option(widgets.ZoneSelect, 'zone', _('Zone'), + _('Firewall zone that has to match the defined firewall zone')); + o.default = 'lan'; + o.multiple = true; + + o = s.option(widgets.NetworkSelect, 'listen', _('Listen Interfaces'), + _('Interfaces that accept VPN traffic')); + o.datatype = 'interface'; + o.placeholder = _('Select an interface or leave empty for all interfaces'); + o.default = 'wan'; + o.multiple = true; + + o = s.option(form.Value, 'debug', _('Debug Level'), + _('Logs written to /var/log/charon.log')); + o.default = '0'; + o.datatype = 'uinteger'; + + // Remote Configuration + s = m.section(form.TypedSection, 'remote', _('Remote Configuration')); + s.anonymous = false; + + o = s.option(form.Flag, 'enabled', _('Enabled'), + _('Configuration is enabled or not')); + + o = s.option(form.Value, 'gateway', _('Gateway (Remote Endpoint)'), + _('Public IP address or FQDN name of the tunnel remote endpoint')); + o.datatype = 'or(hostname,ipaddr)'; + + o = s.option(form.Value, 'local_gateway', _('Local Gateway'), + _('IP address or FQDN of the tunnel local endpoint')); + o.datatype = 'or(hostname,ipaddr)'; + + o = s.option(form.Value, 'local_sourceip', _('Local Source IP'), + _('Virtual IP(s) to request in IKEv2 configuration payloads requests')); + o.datatype = 'ipaddr'; + + o = s.option(form.Value, 'local_ip', _('Local IP'), + _('Local address(es) to use in IKE negotiation')); + o.datatype = 'ipaddr'; + + o = s.option(form.Value, 'local_identifier', _('Local Identifier'), + _('Local identifier for IKE (phase 1)')); + o.datatype = 'string'; + o.placeholder = 'C=US, O=Acme Corporation, CN=headquarters'; + + o = s.option(form.Value, 'remote_identifier', _('Remote Identifier'), + _('Remote identifier for IKE (phase 1)')); + o.datatype = 'string'; + o.placeholder = 'C=US, O=Acme Corporation, CN=soho'; + + o = s.option(form.ListValue, 'authentication_method', + _('Authentication Method'), _('IKE authentication (phase 1).')); + o.value('psk', 'Pre-shared Key'); + o.value('pubkey', 'Public Key'); + o.required = true; + + o = s.option(form.Value, 'pre_shared_key', _('Pre-Shared Key'), + _('The pre-shared key for the tunnel if authentication is psk')); + o.datatype = 'string'; + o.password = true; + o.depends('authentication_method', 'psk'); + + o = s.option(form.Flag, 'mobike', _('MOBIKE'), + _('MOBIKE (IKEv2 Mobility and Multihoming Protocol)')); + o.default = '1'; + + o = s.option(form.ListValue, 'fragmentation', _('IKE Fragmentation'), + _('Use IKE fragmentation (yes, no, force, accept)')); + o.value('yes'); + o.value('no'); + o.value('force'); + o.value('accept'); + o.default = 'yes'; + + o = s.option(form.ListValue, 'crypto_proposal', _('Crypto Proposal'), + _('List of IKE (phase 1) proposals to use for authentication')); + o.value('encryption_algorithm'); + o.value('hash_algorithm'); + o.value('dh_group'); + o.value('prf_algorithm'); + + o = s.option(form.Value, 'tunnel', _('Tunnel'), + _('Name of ESP/AH (phase 2) section')); + o.required = true; + + o = s.option(form.Value, 'authentication_method', + _('Authentication Method'), _('IKE authentication (phase 1)')); + o.datatype = 'string'; + + s = m.section(form.TypedSection, 'ipsec', + _('strongSwan General Settings')); + s.anonymous = true; + + o = s.option(form.ListValue, 'encryption_algorithm', + _('Encryption Algorithm'), _('Encryption method (aes128, aes192, aes256, 3des)')); + o.value('aes128'); + o.value('aes192'); + o.value('aes256'); + o.value('3des'); + o.required = true; + + o = s.option(form.ListValue, 'hash_algorithm', _('Hash Algorithm'), + _('Hash algorithm (md5, sha1, sha2, ...)')); + o.value('md5'); + o.value('sha1'); + o.value('sha2'); + o.value('sha256'); + o.value('sha384'); + o.value('sha512'); + o.value('sha3_256'); + o.value('sha3_384'); + o.value('sha3_512'); + o.value('blake2s256'); + o.value('blake2b512'); + o.value('blake2s256'); + o.value('blake2b512'); + o.value('whirlpool'); + o.value('tiger'); + o.required = true; + + o = s.option(form.ListValue, 'dh_group', _('Diffie-Hellman Group'), + _('Diffie-Hellman exponentiation (modp768, modp1024, ...)')); + o.value('modp768'); + o.value('modp1024'); + o.value('modp1536'); + o.value('modp2048'); + o.value('modp3072'); + o.value('modp4096'); + o.required = true; + + o = s.option(form.ListValue, 'prf_algorithm', _('PRF Algorithm'), + _('Pseudo-Random Functions to use with IKE')); + o.value('prf_hmac_md5'); + o.value('prfmd5'); + o.value('prfsha1'); + o.value('prfsha256'); + o.value('pfsha384'); + o.value('prfsha512'); + + // Tunnel Configuration + s = m.section(form.TypedSection, 'tunnel', _('Tunnel Configuration')); + s.anonymous = false; + + o = s.option(form.Value, 'local_subnet', _('Local Subnet'), + _('Local network(s)')); + o.placeholder = '192.168.1.1/24'; + o.required = true; + + o = s.option(form.Value, 'remote_subnet', _('Remote Subnet'), + _('Remote network(s)')); + o.placeholder = '192.168.2.1/24'; + o.required = true; + + o = s.option(form.Value, 'local_nat', _('Local NAT'), + _('NAT range for tunnels with overlapping IP addresses')); + o.datatype = 'subnet'; + + o = s.option(form.ListValue, 'crypto_proposal', + _('Crypto Proposal (Phase 2)'), _('List of ESP (phase two) proposals')); + o.value('encryption_algorithm'); + o.value('hash_algorithm'); + o.value('dh_group'); + o.value('prf_algorithm'); + o.required = true; + + o = s.option(form.ListValue, 'startaction', _('Start Action'), + _('Action on initial configuration load')); + o.value('none'); + o.value('start'); + o.value('route'); + o.default = 'route'; + + o = s.option(form.Value, 'updown', _('Up/Down Script Path'), + _('Path to script to run on CHILD_SA up/down events')); + o.datatype = 'filepath'; + + return m.render(); + } }); |