diff options
author | Jo-Philipp Wich <jow@openwrt.org> | 2014-12-03 15:17:05 +0100 |
---|---|---|
committer | Jo-Philipp Wich <jow@openwrt.org> | 2015-01-08 16:26:20 +0100 |
commit | 1bb4822dca6113f73e3bc89e2acf15935e6f8e92 (patch) | |
tree | 35e16f100466e4e00657199b38bb3d87d52bf73f /protocols/luci-proto-openconnect/luasrc/model/cbi | |
parent | 9edd0e46c3f880727738ce8ca6ff1c8b85f99ef4 (diff) |
Rework LuCI build system
* Rename subdirectories to their repective OpenWrt package names
* Make each LuCI module its own standalone package
* Deploy a shared luci.mk which is used by each module Makefile
Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
Diffstat (limited to 'protocols/luci-proto-openconnect/luasrc/model/cbi')
-rw-r--r-- | protocols/luci-proto-openconnect/luasrc/model/cbi/admin_network/proto_openconnect.lua | 78 |
1 files changed, 78 insertions, 0 deletions
diff --git a/protocols/luci-proto-openconnect/luasrc/model/cbi/admin_network/proto_openconnect.lua b/protocols/luci-proto-openconnect/luasrc/model/cbi/admin_network/proto_openconnect.lua new file mode 100644 index 0000000000..2e2eacee0a --- /dev/null +++ b/protocols/luci-proto-openconnect/luasrc/model/cbi/admin_network/proto_openconnect.lua @@ -0,0 +1,78 @@ +--[[ +LuCI - Lua Configuration Interface + +Copyright 2014 Nikos Mavrogiannopoulos <nmav@gnutls.org> + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 +]]-- + +local map, section, net = ... + +local server, username, password, cert, ca +local oc_cert_file, oc_key_file, oc_ca_file + +local ifc = net:get_interface():name() + +oc_cert_file = "/etc/openconnect/user-cert-" .. ifc .. ".pem" +oc_key_file = "/etc/openconnect/user-key-" .. ifc .. ".pem" +oc_ca_file = "/etc/openconnect/ca-" .. ifc .. ".pem" + +server = section:taboption("general", Value, "server", translate("VPN Server")) +server.datatype = "host" + +port = section:taboption("general", Value, "port", translate("VPN Server port")) +port.placeholder = "443" +port.datatype = "port" + +section:taboption("general", Value, "serverhash", translate("VPN Server's certificate SHA1 hash")) + +section:taboption("general", Value, "authgroup", translate("AuthGroup")) + +username = section:taboption("general", Value, "username", translate("Username")) +password = section:taboption("general", Value, "password", translate("Password")) +password.password = true + + +cert = section:taboption("advanced", Value, "usercert", translate("User certificate (PEM encoded)")) +cert.template = "cbi/tvalue" +cert.rows = 10 + +function cert.cfgvalue(self, section) + return nixio.fs.readfile(oc_cert_file) +end + +function cert.write(self, section, value) + value = value:gsub("\r\n?", "\n") + nixio.fs.writefile(oc_cert_file, value) +end + +cert = section:taboption("advanced", Value, "userkey", translate("User key (PEM encoded)")) +cert.template = "cbi/tvalue" +cert.rows = 10 + +function cert.cfgvalue(self, section) + return nixio.fs.readfile(oc_key_file) +end + +function cert.write(self, section, value) + value = value:gsub("\r\n?", "\n") + nixio.fs.writefile(oc_key_file, value) +end + + +ca = section:taboption("advanced", Value, "ca", translate("CA certificate; if empty it will be saved after the first connection.")) +ca.template = "cbi/tvalue" +ca.rows = 10 + +function ca.cfgvalue(self, section) + return nixio.fs.readfile(oc_ca_file) +end + +function ca.write(self, section, value) + value = value:gsub("\r\n?", "\n") + nixio.fs.writefile(oc_ca_file, value) +end |