include destination port information when used

This commit is contained in:
Eduardo Silva 2025-03-13 09:46:39 -03:00
parent e386b3f269
commit c574607173

View File

@ -1,7 +1,6 @@
{% extends 'base.html' %}
{% block content %}
<div class="card card-primary card-outline">
<div class="card-body">
{% include "firewall/firewall_nav_tabs.html" %}
@ -28,25 +27,18 @@
<td>
{% if redirect_rule.peer %}
<a href="/peer/manage/?peer={{ redirect_rule.peer.uuid }}">
{% if redirect_rule.peer.name %}
{{ redirect_rule.peer.name }}
{% else %}
{{ redirect_rule.peer.public_key|slice:":16" }}{% if redirect_rule.peer.public_key|length > 16 %}...{% endif %}
{% endif %}
{{ redirect_rule.peer }}{% if redirect_rule.port_forward %}:{{ redirect_rule.port_forward }}{% endif %}
</a>
{% else %}
{{ redirect_rule.ip_address }}
{{ redirect_rule.ip_address }}{% if redirect_rule.port_forward %}:{{ redirect_rule.port_forward }}{% endif %}
{% endif %}
</td>
<td>
{% if redirect_rule.add_forward_rule %}
<i class="fas fa-check"></i>
{% else %}
<i class="fas fa-times"></i>
{% endif %}
</td>
<td>
{% if redirect_rule.masquerade_source %}
@ -54,16 +46,13 @@
<i class="fas fa-exclamation-triangle" title="This serves as a temporary solution when a peer does not use the VPN as its default gateway. It's important to note that this configuration is not recommended, as it alters the source address of all connections to match the IP address of the WireGuard instance."></i>
{% else %}
<i class="fas fa-times"></i>
{% endif %}
</td>
<td style="width: 1%; white-space: nowrap;">
<a href="/firewall/manage_port_forward_rule/?uuid={{ redirect_rule.uuid }}" ><i class="far fa-edit"></i></a>
</td>
</tr>
{% endfor %}
</tbody>
</table>
<a href="/firewall/manage_port_forward_rule/" class='btn btn-primary'>Create Port forwarding Rule</a>
@ -72,9 +61,4 @@
</div>
</div>
</div>
{% endblock %}