From e50021f77fbc593cee841a02ad66c4bfea072f9e Mon Sep 17 00:00:00 2001 From: Dirk Brenken Date: Sat, 10 Nov 2018 11:19:50 +0100 Subject: luci-app-banip: new package for details & LuCI screenshots see base package desprition/PR: https://github.com/openwrt/packages/pull/7373 Signed-off-by: Dirk Brenken --- .../luasrc/model/cbi/banip/overview_tab.lua | 200 +++++++++++++++++++++ 1 file changed, 200 insertions(+) create mode 100644 applications/luci-app-banip/luasrc/model/cbi/banip/overview_tab.lua (limited to 'applications/luci-app-banip/luasrc/model/cbi/banip/overview_tab.lua') diff --git a/applications/luci-app-banip/luasrc/model/cbi/banip/overview_tab.lua b/applications/luci-app-banip/luasrc/model/cbi/banip/overview_tab.lua new file mode 100644 index 000000000..00bb5e426 --- /dev/null +++ b/applications/luci-app-banip/luasrc/model/cbi/banip/overview_tab.lua @@ -0,0 +1,200 @@ +-- Copyright 2018 Dirk Brenken (dev@brenken.org) +-- This is free software, licensed under the Apache License, Version 2.0 + +local fs = require("nixio.fs") +local uci = require("luci.model.uci").cursor() +local sys = require("luci.sys") +local net = require "luci.model.network".init() +local util = require("luci.util") +local dump = util.ubus("network.interface", "dump", {}) +local devices = sys.net:devices() + +m = Map("banip", translate("banIP"), + translate("Configuration of the banIP package to block ip adresses/subnets via IPSet. ") + .. translatef("For further information " + .. "" + .. "check the online documentation", "https://github.com/openwrt/packages/blob/master/net/banip/files/README.md")) + +-- Main banIP Options + +s = m:section(NamedSection, "global", "banip") + +o1 = s:option(Flag, "ban_enabled", translate("Enable banIP")) +o1.default = o1.disabled +o1.rmempty = false + +o2 = s:option(Flag, "ban_automatic", translate("Automatic WAN Interface Detection")) +o2.default = o2.enabled +o2.rmempty = false + +o3 = s:option(ListValue, "ban_iface", " ") +for _, dev in ipairs(devices) do + if dev ~= "lo" and dev ~= "br-lan" then + local iface = net:get_interface(dev) + if iface then + iface = iface:get_networks() or {} + for k, v in pairs(iface) do + iface[k] = iface[k].sid + if iface[k] ~= "lan" then + o3:value(iface[k], iface[k].. " (" ..dev.. ")") + end + end + end + end +end +o3.default = ban_iface +o3.rmempty = false + +o4 = s:option(ListValue, "ban_fetchutil", translate("Download Utility"), + translate("List of supported and fully pre-configured download utilities.")) +o4:value("uclient-fetch") +o4:value("wget") +o4:value("curl") +o4:value("aria2c") +o4:value("wget-nossl", "wget-nossl (noSSL)") +o4:value("busybox", "wget-busybox (noSSL)") +o4.default = "uclient-fetch" +o4.rmempty = false + +-- Runtime Information + +ds = s:option(DummyValue, "_dummy") +ds.template = "banip/runtime" + +-- Source Table + +bl = m:section(TypedSection, "source", translate("IP Blocklist Sources")) +bl.template = "banip/sourcelist" + +ssl = bl:option(DummyValue, "ban_src", translate("SSL req.")) +function ssl.cfgvalue(self, section) + local source = self.map:get(section, "ban_src") or self.map:get(section, "ban_src_6") + if source then + if source:match("https://") then + return translate("Yes") + else + return translate("No") + end + end + return translate("n/a") +end + +name_4 = bl:option(Flag, "ban_src_on", translate("enable IPv4")) +name_4.rmempty = false + +name_6 = bl:option(Flag, "ban_src_on_6", translate("enable IPv6")) +name_6.rmempty = false + +type = bl:option(ListValue, "ban_src_ruletype", translate("SRC/DST")) +type:value("src") +type:value("dst") +type:value("src+dst") +type.default = "src" +type.rmempty = false + +des = bl:option(DummyValue, "ban_src_desc", translate("Description")) + +cat = bl:option(DynamicList, "ban_src_cat", translate("ASN/Country")) +cat.datatype = "uciname" +cat.optional = true + +-- Extra options + +e = m:section(NamedSection, "extra", "banip", translate("Extra Options"), + translate("Options for further tweaking in case the defaults are not suitable for you.")) + +e1 = e:option(Flag, "ban_debug", translate("Verbose Debug Logging"), + translate("Enable verbose debug logging in case of any processing error.")) +e1.default = e1.disabled +e1.rmempty = false + +e2 = e:option(Flag, "ban_nice", translate("Low Priority Service"), + translate("Set the nice level to 'low priority' and banIP background processing will take less resources from the system. ") + ..translate("This change requires a manual service stop/re-start to take effect.")) +e2.default = e2.disabled +e2.disabled = "0" +e2.enabled = "10" +e2.rmempty = false + +e3 = e:option(Value, "ban_maxqueue", translate("Max. Download Queue"), + translate("Size of the download queue to handle downloads & IPset processing in parallel (default '8'). ") + .. translate("For further performance improvements you can raise this value, e.g. '16' or '32' should be safe.")) +e3.default = 8 +e3.datatype = "range(1,32)" +e3.rmempty = false + +e4 = e:option(Value, "ban_triggerdelay", translate("Trigger Delay"), + translate("Additional trigger delay in seconds before banIP processing begins.")) +e4.default = 2 +e4.datatype = "range(1,60)" +e4.optional = true + +e5 = e:option(Value, "ban_fetchparm", translate("Download Options"), + translate("Special options for the selected download utility, e.g. '--timeout=20 --no-check-certificate -O'.")) +e5.optional = true + +e10 = e:option(Value, "ban_wan_input_chain", translate("WAN Input Chain IPv4")) +e10.default = "input_wan_rule" +e10.datatype = "uciname" +e10.optional = true + +e11 = e:option(Value, "ban_wan_forward_chain", translate("WAN Forward Chain IPv4")) +e11.default = "forwarding_wan_rule" +e11.datatype = "uciname" +e11.optional = true + +e12 = e:option(Value, "ban_lan_input_chain", translate("LAN Input Chain IPv4")) +e12.default = "input_lan_rule" +e12.datatype = "uciname" +e12.optional = true + +e13 = e:option(Value, "ban_lan_forward_chain", translate("LAN Forward Chain IPv4")) +e13.default = "forwarding_lan_rule" +e13.datatype = "uciname" +e13.optional = true + +e14 = e:option(ListValue, "ban_target_src", translate("SRC Target IPv4")) +e14:value("REJECT") +e14:value("DROP") +e14.default = "DROP" +e14.optional = true + +e15 = e:option(ListValue, "ban_target_dst", translate("DST Target IPv4")) +e15:value("REJECT") +e15:value("DROP") +e15.default = "REJECT" +e15.optional = true + +e16 = e:option(Value, "ban_wan_input_chain_6", translate("WAN Input Chain IPv6")) +e16.default = "input_wan_rule" +e16.datatype = "uciname" +e16.optional = true + +e17 = e:option(Value, "ban_wan_forward_chain_6", translate("WAN Forward Chain IPv6")) +e17.default = "forwarding_wan_rule" +e17.datatype = "uciname" +e17.optional = true + +e18 = e:option(Value, "ban_lan_input_chain_6", translate("LAN Input Chain IPv6")) +e18.default = "input_lan_rule" +e18.datatype = "uciname" +e18.optional = true + +e19 = e:option(Value, "ban_lan_forward_chain_6", translate("LAN Forward Chain IPv6")) +e19.default = "forwarding_lan_rule" +e19.datatype = "uciname" +e19.optional = true + +e20 = e:option(ListValue, "ban_target_src_6", translate("SRC Target IPv6")) +e20:value("REJECT") +e20:value("DROP") +e20.default = "DROP" +e20.optional = true + +e21 = e:option(ListValue, "ban_target_dst_6", translate("DST Target IPv6")) +e21:value("REJECT") +e21:value("DROP") +e21.default = "REJECT" +e21.optional = true + +return m -- cgit v1.2.3