mirror of
https://github.com/eduardogsilva/wireguard_webadmin.git
synced 2025-07-10 02:14:33 +02:00
translation for firewall rule management.
This commit is contained in:
parent
c60da36047
commit
0f0964765e
4 changed files with 336 additions and 85 deletions
|
@ -78,36 +78,62 @@ class FirewallRuleForm(forms.ModelForm):
|
|||
wireguard_instance_interface = 'wg'+ str(wireguard_instance.instance_id)
|
||||
interface_list.append((wireguard_instance_interface, wireguard_instance_interface))
|
||||
|
||||
interface_list.append(('wg+', 'wg+ (Any WireGuard Interface)'))
|
||||
interface_list.append(('wg+', _('wg+ (Any WireGuard Interface)')))
|
||||
|
||||
description = forms.CharField(label='Description', required=False)
|
||||
firewall_chain = forms.ChoiceField(label='Firewall Chain', choices=[('forward', 'FORWARD'), ('postrouting', 'POSTROUTING (nat)')])
|
||||
in_interface = forms.ChoiceField(label='In Interface', required=False)
|
||||
out_interface = forms.ChoiceField(label='Out Interface', required=False)
|
||||
source_ip = forms.GenericIPAddressField(label='Source IP', required=False)
|
||||
source_netmask = forms.IntegerField(label='Source Netmask', initial=32, min_value=0, max_value=32)
|
||||
source_peer = forms.ModelMultipleChoiceField(label='Source Peer', queryset=Peer.objects.all(), required=False)
|
||||
source_peer_include_networks = forms.BooleanField(label='Source Peer Include Networks', required=False)
|
||||
not_source = forms.BooleanField(label='Not Source', required=False)
|
||||
destination_ip = forms.GenericIPAddressField(label='Destination IP', required=False)
|
||||
destination_netmask = forms.IntegerField(label='Destination Netmask', initial=32, min_value=0, max_value=32)
|
||||
destination_peer = forms.ModelMultipleChoiceField(label='Destination Peer', queryset=Peer.objects.all(), required=False)
|
||||
destination_peer_include_networks = forms.BooleanField(label='Destination Peer Include Networks', required=False)
|
||||
not_destination = forms.BooleanField(label='Not Destination', required=False)
|
||||
protocol = forms.ChoiceField(label='Protocol', choices=[('', 'all'), ('tcp', 'TCP'), ('udp', 'UDP'), ('both', 'TCP+UDP'), ('icmp', 'ICMP')], required=False)
|
||||
destination_port = forms.CharField(label='Destination Port', required=False)
|
||||
state_new = forms.BooleanField(label='State NEW', required=False)
|
||||
state_related = forms.BooleanField(label='State RELATED', required=False)
|
||||
state_established = forms.BooleanField(label='State ESTABLISHED', required=False)
|
||||
state_invalid = forms.BooleanField(label='State INVALID', required=False)
|
||||
state_untracked = forms.BooleanField(label='State UNTRACKED', required=False)
|
||||
not_state = forms.BooleanField(label='Not State', required=False)
|
||||
rule_action = forms.ChoiceField(label='Rule Action', initial='accept', choices=[('accept', 'ACCEPT'), ('reject', 'REJECT'), ('drop', 'DROP'), ('masquerade', 'MASQUERADE')])
|
||||
sort_order = forms.IntegerField(label='Sort Order', initial=0, min_value=0)
|
||||
description = forms.CharField(required=False)
|
||||
firewall_chain = forms.ChoiceField(choices=[('forward', 'FORWARD'), ('postrouting', 'POSTROUTING (nat)')])
|
||||
in_interface = forms.ChoiceField(required=False)
|
||||
out_interface = forms.ChoiceField(required=False)
|
||||
source_ip = forms.GenericIPAddressField(required=False)
|
||||
source_netmask = forms.IntegerField(initial=32, min_value=0, max_value=32)
|
||||
source_peer = forms.ModelMultipleChoiceField(queryset=Peer.objects.all(), required=False)
|
||||
source_peer_include_networks = forms.BooleanField(required=False)
|
||||
not_source = forms.BooleanField(required=False)
|
||||
destination_ip = forms.GenericIPAddressField(required=False)
|
||||
destination_netmask = forms.IntegerField(initial=32, min_value=0, max_value=32)
|
||||
destination_peer = forms.ModelMultipleChoiceField(queryset=Peer.objects.all(), required=False)
|
||||
destination_peer_include_networks = forms.BooleanField(required=False)
|
||||
not_destination = forms.BooleanField(required=False)
|
||||
protocol = forms.ChoiceField(choices=[('', 'all'), ('tcp', 'TCP'), ('udp', 'UDP'), ('both', 'TCP+UDP'), ('icmp', 'ICMP')], required=False)
|
||||
destination_port = forms.CharField(required=False)
|
||||
state_new = forms.BooleanField(required=False)
|
||||
state_related = forms.BooleanField(required=False)
|
||||
state_established = forms.BooleanField(required=False)
|
||||
state_invalid = forms.BooleanField(required=False)
|
||||
state_untracked = forms.BooleanField(required=False)
|
||||
not_state = forms.BooleanField(required=False)
|
||||
rule_action = forms.ChoiceField(initial='accept', choices=[('accept', 'ACCEPT'), ('reject', 'REJECT'), ('drop', 'DROP'), ('masquerade', 'MASQUERADE')])
|
||||
sort_order = forms.IntegerField(initial=0, min_value=0)
|
||||
self.fields['firewall_chain'].initial = current_chain
|
||||
self.fields['in_interface'].choices = interface_list
|
||||
self.fields['out_interface'].choices = interface_list
|
||||
|
||||
self.fields['description'].label = _('Description')
|
||||
self.fields['firewall_chain'].label = _('Firewall Chain')
|
||||
self.fields['in_interface'].label = _('In Interface')
|
||||
self.fields['out_interface'].label = _('Out Interface')
|
||||
self.fields['source_ip'].label = _('Source IP')
|
||||
self.fields['source_netmask'].label = _('Netmask')
|
||||
self.fields['source_peer'].label = _('Source Peer')
|
||||
self.fields['source_peer_include_networks'].label = _('Source Peer Include Networks')
|
||||
self.fields['not_source'].label = _('Not Source')
|
||||
self.fields['destination_ip'].label = _('Destination IP')
|
||||
self.fields['destination_netmask'].label = _('Netmask')
|
||||
self.fields['destination_peer'].label = _('Destination Peer')
|
||||
self.fields['destination_peer_include_networks'].label = _('Destination Peer Include Networks')
|
||||
self.fields['not_destination'].label = _('Not Destination')
|
||||
self.fields['protocol'].label = _('Protocol')
|
||||
self.fields['destination_port'].label = _('Destination Port')
|
||||
self.fields['state_new'].label = _('New')
|
||||
self.fields['state_related'].label = _('Related')
|
||||
self.fields['state_established'].label = _('Established')
|
||||
self.fields['state_invalid'].label = _('Invalid')
|
||||
self.fields['state_untracked'].label = _('Untracked')
|
||||
self.fields['not_state'].label = _('Not State')
|
||||
self.fields['rule_action'].label = _('Rule Action')
|
||||
self.fields['sort_order'].label = _('Sort Order')
|
||||
|
||||
|
||||
class Meta:
|
||||
model = FirewallRule
|
||||
fields = ['description', 'firewall_chain', 'in_interface', 'out_interface', 'source_ip', 'source_netmask', 'source_peer', 'source_peer_include_networks', 'not_source', 'destination_ip', 'destination_netmask', 'destination_peer', 'destination_peer_include_networks', 'not_destination', 'protocol', 'destination_port', 'state_new', 'state_related', 'state_established', 'state_invalid', 'state_untracked', 'not_state', 'rule_action', 'sort_order']
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue