Port forwarding skeleton

This commit is contained in:
Eduardo Silva 2024-02-26 10:37:41 -03:00
parent 32ff04fbf6
commit f22c3d47da
15 changed files with 137 additions and 0 deletions

0
firewall/__init__.py Normal file
View file

10
firewall/admin.py Normal file
View file

@ -0,0 +1,10 @@
from django.contrib import admin
from firewall.models import RedirectRule
class RedirectRuleAdmin(admin.ModelAdmin):
list_display = ('protocol', 'port', 'add_forward_rule', 'peer', 'wireguard_instance', 'ip_address', 'description', 'created', 'updated', 'uuid')
search_fields = ('protocol', 'port', 'add_forward_rule', 'peer', 'wireguard_instance', 'ip_address', 'description', 'created', 'updated', 'uuid')
admin.site.register(RedirectRule, RedirectRuleAdmin)

6
firewall/apps.py Normal file
View file

@ -0,0 +1,6 @@
from django.apps import AppConfig
class FirewallConfig(AppConfig):
default_auto_field = 'django.db.models.BigAutoField'
name = 'firewall'

0
firewall/forms.py Normal file
View file

View file

@ -0,0 +1,35 @@
# Generated by Django 5.0.2 on 2024-02-26 12:59
import django.db.models.deletion
import uuid
from django.db import migrations, models
class Migration(migrations.Migration):
initial = True
dependencies = [
('wireguard', '0014_alter_wireguardinstance_dns_primary_and_more'),
]
operations = [
migrations.CreateModel(
name='RedirectRule',
fields=[
('description', models.CharField(blank=True, max_length=100, null=True)),
('protocol', models.CharField(choices=[('tcp', 'TCP'), ('udp', 'UDP')], default='tcp', max_length=3)),
('port', models.PositiveIntegerField(default=8080)),
('add_forward_rule', models.BooleanField(default=True)),
('ip_address', models.GenericIPAddressField(blank=True, null=True)),
('created', models.DateTimeField(auto_now_add=True)),
('updated', models.DateTimeField(auto_now=True)),
('uuid', models.UUIDField(default=uuid.uuid4, editable=False, primary_key=True, serialize=False)),
('peer', models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.CASCADE, to='wireguard.peer')),
('wireguard_instance', models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.CASCADE, to='wireguard.wireguardinstance')),
],
options={
'unique_together': {('port', 'protocol')},
},
),
]

View file

@ -0,0 +1,23 @@
# Generated by Django 5.0.2 on 2024-02-26 13:35
from django.db import migrations, models
class Migration(migrations.Migration):
dependencies = [
('firewall', '0001_initial'),
]
operations = [
migrations.AddField(
model_name='redirectrule',
name='masquerade_source',
field=models.BooleanField(default=False),
),
migrations.AlterField(
model_name='redirectrule',
name='ip_address',
field=models.GenericIPAddressField(blank=True, null=True, protocol='IPv4'),
),
]

View file

26
firewall/models.py Normal file
View file

@ -0,0 +1,26 @@
from django.db import models
from wireguard.models import Peer, WireGuardInstance
import uuid
class RedirectRule(models.Model):
description = models.CharField(max_length=100, blank=True, null=True)
protocol = models.CharField(max_length=3, default='tcp', choices=[('tcp', 'TCP'), ('udp', 'UDP')])
port = models.PositiveIntegerField(default=8080)
add_forward_rule = models.BooleanField(default=True)
masquerade_source = models.BooleanField(default=False)
peer = models.ForeignKey(Peer, on_delete=models.CASCADE, blank=True, null=True)
wireguard_instance = models.ForeignKey(WireGuardInstance, on_delete=models.CASCADE, blank=True, null=True)
ip_address = models.GenericIPAddressField(blank=True, null=True, protocol='IPv4')
created = models.DateTimeField(auto_now_add=True)
updated = models.DateTimeField(auto_now=True)
uuid = models.UUIDField(primary_key=True, editable=False, default=uuid.uuid4)
def __str__(self):
return self.protocol + '/' + str(self.port)
class Meta:
unique_together = ['port', 'protocol']

3
firewall/tests.py Normal file
View file

@ -0,0 +1,3 @@
from django.test import TestCase
# Create your tests here.

15
firewall/views.py Normal file
View file

@ -0,0 +1,15 @@
from django.shortcuts import render
from firewall.models import RedirectRule
def view_redirect_rule_list(request):
context = {
'page_title': 'Port Forward List',
'redirect_rule_list': RedirectRule.objects.all().order_by('wireguard_instance', 'protocol', 'port')
}
return render(request, 'firewall/redirect_rule_list.html', context=context)
def manage_redirect_rule(request):
context = {'page_title': 'Manage Port Forward'}
return render(request, 'firewall/manage_redirect_rule.html', context=context)