diff options
Diffstat (limited to 'protocols/luci-proto-openconnect/luasrc/model/cbi')
-rw-r--r-- | protocols/luci-proto-openconnect/luasrc/model/cbi/admin_network/proto_openconnect.lua | 78 |
1 files changed, 78 insertions, 0 deletions
diff --git a/protocols/luci-proto-openconnect/luasrc/model/cbi/admin_network/proto_openconnect.lua b/protocols/luci-proto-openconnect/luasrc/model/cbi/admin_network/proto_openconnect.lua new file mode 100644 index 0000000000..2e2eacee0a --- /dev/null +++ b/protocols/luci-proto-openconnect/luasrc/model/cbi/admin_network/proto_openconnect.lua @@ -0,0 +1,78 @@ +--[[ +LuCI - Lua Configuration Interface + +Copyright 2014 Nikos Mavrogiannopoulos <nmav@gnutls.org> + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 +]]-- + +local map, section, net = ... + +local server, username, password, cert, ca +local oc_cert_file, oc_key_file, oc_ca_file + +local ifc = net:get_interface():name() + +oc_cert_file = "/etc/openconnect/user-cert-" .. ifc .. ".pem" +oc_key_file = "/etc/openconnect/user-key-" .. ifc .. ".pem" +oc_ca_file = "/etc/openconnect/ca-" .. ifc .. ".pem" + +server = section:taboption("general", Value, "server", translate("VPN Server")) +server.datatype = "host" + +port = section:taboption("general", Value, "port", translate("VPN Server port")) +port.placeholder = "443" +port.datatype = "port" + +section:taboption("general", Value, "serverhash", translate("VPN Server's certificate SHA1 hash")) + +section:taboption("general", Value, "authgroup", translate("AuthGroup")) + +username = section:taboption("general", Value, "username", translate("Username")) +password = section:taboption("general", Value, "password", translate("Password")) +password.password = true + + +cert = section:taboption("advanced", Value, "usercert", translate("User certificate (PEM encoded)")) +cert.template = "cbi/tvalue" +cert.rows = 10 + +function cert.cfgvalue(self, section) + return nixio.fs.readfile(oc_cert_file) +end + +function cert.write(self, section, value) + value = value:gsub("\r\n?", "\n") + nixio.fs.writefile(oc_cert_file, value) +end + +cert = section:taboption("advanced", Value, "userkey", translate("User key (PEM encoded)")) +cert.template = "cbi/tvalue" +cert.rows = 10 + +function cert.cfgvalue(self, section) + return nixio.fs.readfile(oc_key_file) +end + +function cert.write(self, section, value) + value = value:gsub("\r\n?", "\n") + nixio.fs.writefile(oc_key_file, value) +end + + +ca = section:taboption("advanced", Value, "ca", translate("CA certificate; if empty it will be saved after the first connection.")) +ca.template = "cbi/tvalue" +ca.rows = 10 + +function ca.cfgvalue(self, section) + return nixio.fs.readfile(oc_ca_file) +end + +function ca.write(self, section, value) + value = value:gsub("\r\n?", "\n") + nixio.fs.writefile(oc_ca_file, value) +end |