mirror of
https://github.com/eduardogsilva/wireguard_webadmin.git
synced 2025-08-04 18:24:31 +02:00
Port forwarding skeleton
This commit is contained in:
parent
32ff04fbf6
commit
f22c3d47da
15 changed files with 137 additions and 0 deletions
0
firewall/__init__.py
Normal file
0
firewall/__init__.py
Normal file
10
firewall/admin.py
Normal file
10
firewall/admin.py
Normal file
|
@ -0,0 +1,10 @@
|
|||
from django.contrib import admin
|
||||
from firewall.models import RedirectRule
|
||||
|
||||
|
||||
class RedirectRuleAdmin(admin.ModelAdmin):
|
||||
list_display = ('protocol', 'port', 'add_forward_rule', 'peer', 'wireguard_instance', 'ip_address', 'description', 'created', 'updated', 'uuid')
|
||||
search_fields = ('protocol', 'port', 'add_forward_rule', 'peer', 'wireguard_instance', 'ip_address', 'description', 'created', 'updated', 'uuid')
|
||||
|
||||
admin.site.register(RedirectRule, RedirectRuleAdmin)
|
||||
|
6
firewall/apps.py
Normal file
6
firewall/apps.py
Normal file
|
@ -0,0 +1,6 @@
|
|||
from django.apps import AppConfig
|
||||
|
||||
|
||||
class FirewallConfig(AppConfig):
|
||||
default_auto_field = 'django.db.models.BigAutoField'
|
||||
name = 'firewall'
|
0
firewall/forms.py
Normal file
0
firewall/forms.py
Normal file
35
firewall/migrations/0001_initial.py
Normal file
35
firewall/migrations/0001_initial.py
Normal file
|
@ -0,0 +1,35 @@
|
|||
# Generated by Django 5.0.2 on 2024-02-26 12:59
|
||||
|
||||
import django.db.models.deletion
|
||||
import uuid
|
||||
from django.db import migrations, models
|
||||
|
||||
|
||||
class Migration(migrations.Migration):
|
||||
|
||||
initial = True
|
||||
|
||||
dependencies = [
|
||||
('wireguard', '0014_alter_wireguardinstance_dns_primary_and_more'),
|
||||
]
|
||||
|
||||
operations = [
|
||||
migrations.CreateModel(
|
||||
name='RedirectRule',
|
||||
fields=[
|
||||
('description', models.CharField(blank=True, max_length=100, null=True)),
|
||||
('protocol', models.CharField(choices=[('tcp', 'TCP'), ('udp', 'UDP')], default='tcp', max_length=3)),
|
||||
('port', models.PositiveIntegerField(default=8080)),
|
||||
('add_forward_rule', models.BooleanField(default=True)),
|
||||
('ip_address', models.GenericIPAddressField(blank=True, null=True)),
|
||||
('created', models.DateTimeField(auto_now_add=True)),
|
||||
('updated', models.DateTimeField(auto_now=True)),
|
||||
('uuid', models.UUIDField(default=uuid.uuid4, editable=False, primary_key=True, serialize=False)),
|
||||
('peer', models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.CASCADE, to='wireguard.peer')),
|
||||
('wireguard_instance', models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.CASCADE, to='wireguard.wireguardinstance')),
|
||||
],
|
||||
options={
|
||||
'unique_together': {('port', 'protocol')},
|
||||
},
|
||||
),
|
||||
]
|
|
@ -0,0 +1,23 @@
|
|||
# Generated by Django 5.0.2 on 2024-02-26 13:35
|
||||
|
||||
from django.db import migrations, models
|
||||
|
||||
|
||||
class Migration(migrations.Migration):
|
||||
|
||||
dependencies = [
|
||||
('firewall', '0001_initial'),
|
||||
]
|
||||
|
||||
operations = [
|
||||
migrations.AddField(
|
||||
model_name='redirectrule',
|
||||
name='masquerade_source',
|
||||
field=models.BooleanField(default=False),
|
||||
),
|
||||
migrations.AlterField(
|
||||
model_name='redirectrule',
|
||||
name='ip_address',
|
||||
field=models.GenericIPAddressField(blank=True, null=True, protocol='IPv4'),
|
||||
),
|
||||
]
|
0
firewall/migrations/__init__.py
Normal file
0
firewall/migrations/__init__.py
Normal file
26
firewall/models.py
Normal file
26
firewall/models.py
Normal file
|
@ -0,0 +1,26 @@
|
|||
from django.db import models
|
||||
from wireguard.models import Peer, WireGuardInstance
|
||||
import uuid
|
||||
|
||||
|
||||
class RedirectRule(models.Model):
|
||||
description = models.CharField(max_length=100, blank=True, null=True)
|
||||
protocol = models.CharField(max_length=3, default='tcp', choices=[('tcp', 'TCP'), ('udp', 'UDP')])
|
||||
port = models.PositiveIntegerField(default=8080)
|
||||
add_forward_rule = models.BooleanField(default=True)
|
||||
masquerade_source = models.BooleanField(default=False)
|
||||
peer = models.ForeignKey(Peer, on_delete=models.CASCADE, blank=True, null=True)
|
||||
wireguard_instance = models.ForeignKey(WireGuardInstance, on_delete=models.CASCADE, blank=True, null=True)
|
||||
ip_address = models.GenericIPAddressField(blank=True, null=True, protocol='IPv4')
|
||||
|
||||
created = models.DateTimeField(auto_now_add=True)
|
||||
updated = models.DateTimeField(auto_now=True)
|
||||
uuid = models.UUIDField(primary_key=True, editable=False, default=uuid.uuid4)
|
||||
|
||||
def __str__(self):
|
||||
return self.protocol + '/' + str(self.port)
|
||||
|
||||
class Meta:
|
||||
unique_together = ['port', 'protocol']
|
||||
|
||||
|
3
firewall/tests.py
Normal file
3
firewall/tests.py
Normal file
|
@ -0,0 +1,3 @@
|
|||
from django.test import TestCase
|
||||
|
||||
# Create your tests here.
|
15
firewall/views.py
Normal file
15
firewall/views.py
Normal file
|
@ -0,0 +1,15 @@
|
|||
from django.shortcuts import render
|
||||
from firewall.models import RedirectRule
|
||||
|
||||
|
||||
def view_redirect_rule_list(request):
|
||||
context = {
|
||||
'page_title': 'Port Forward List',
|
||||
'redirect_rule_list': RedirectRule.objects.all().order_by('wireguard_instance', 'protocol', 'port')
|
||||
}
|
||||
return render(request, 'firewall/redirect_rule_list.html', context=context)
|
||||
|
||||
|
||||
def manage_redirect_rule(request):
|
||||
context = {'page_title': 'Manage Port Forward'}
|
||||
return render(request, 'firewall/manage_redirect_rule.html', context=context)
|
Loading…
Add table
Add a link
Reference in a new issue