Port forwarding skeleton

This commit is contained in:
Eduardo Silva 2024-02-26 10:37:41 -03:00
parent 32ff04fbf6
commit f22c3d47da
15 changed files with 137 additions and 0 deletions

0
firewall/__init__.py Normal file
View File

10
firewall/admin.py Normal file
View File

@ -0,0 +1,10 @@
from django.contrib import admin
from firewall.models import RedirectRule
class RedirectRuleAdmin(admin.ModelAdmin):
list_display = ('protocol', 'port', 'add_forward_rule', 'peer', 'wireguard_instance', 'ip_address', 'description', 'created', 'updated', 'uuid')
search_fields = ('protocol', 'port', 'add_forward_rule', 'peer', 'wireguard_instance', 'ip_address', 'description', 'created', 'updated', 'uuid')
admin.site.register(RedirectRule, RedirectRuleAdmin)

6
firewall/apps.py Normal file
View File

@ -0,0 +1,6 @@
from django.apps import AppConfig
class FirewallConfig(AppConfig):
default_auto_field = 'django.db.models.BigAutoField'
name = 'firewall'

0
firewall/forms.py Normal file
View File

View File

@ -0,0 +1,35 @@
# Generated by Django 5.0.2 on 2024-02-26 12:59
import django.db.models.deletion
import uuid
from django.db import migrations, models
class Migration(migrations.Migration):
initial = True
dependencies = [
('wireguard', '0014_alter_wireguardinstance_dns_primary_and_more'),
]
operations = [
migrations.CreateModel(
name='RedirectRule',
fields=[
('description', models.CharField(blank=True, max_length=100, null=True)),
('protocol', models.CharField(choices=[('tcp', 'TCP'), ('udp', 'UDP')], default='tcp', max_length=3)),
('port', models.PositiveIntegerField(default=8080)),
('add_forward_rule', models.BooleanField(default=True)),
('ip_address', models.GenericIPAddressField(blank=True, null=True)),
('created', models.DateTimeField(auto_now_add=True)),
('updated', models.DateTimeField(auto_now=True)),
('uuid', models.UUIDField(default=uuid.uuid4, editable=False, primary_key=True, serialize=False)),
('peer', models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.CASCADE, to='wireguard.peer')),
('wireguard_instance', models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.CASCADE, to='wireguard.wireguardinstance')),
],
options={
'unique_together': {('port', 'protocol')},
},
),
]

View File

@ -0,0 +1,23 @@
# Generated by Django 5.0.2 on 2024-02-26 13:35
from django.db import migrations, models
class Migration(migrations.Migration):
dependencies = [
('firewall', '0001_initial'),
]
operations = [
migrations.AddField(
model_name='redirectrule',
name='masquerade_source',
field=models.BooleanField(default=False),
),
migrations.AlterField(
model_name='redirectrule',
name='ip_address',
field=models.GenericIPAddressField(blank=True, null=True, protocol='IPv4'),
),
]

View File

26
firewall/models.py Normal file
View File

@ -0,0 +1,26 @@
from django.db import models
from wireguard.models import Peer, WireGuardInstance
import uuid
class RedirectRule(models.Model):
description = models.CharField(max_length=100, blank=True, null=True)
protocol = models.CharField(max_length=3, default='tcp', choices=[('tcp', 'TCP'), ('udp', 'UDP')])
port = models.PositiveIntegerField(default=8080)
add_forward_rule = models.BooleanField(default=True)
masquerade_source = models.BooleanField(default=False)
peer = models.ForeignKey(Peer, on_delete=models.CASCADE, blank=True, null=True)
wireguard_instance = models.ForeignKey(WireGuardInstance, on_delete=models.CASCADE, blank=True, null=True)
ip_address = models.GenericIPAddressField(blank=True, null=True, protocol='IPv4')
created = models.DateTimeField(auto_now_add=True)
updated = models.DateTimeField(auto_now=True)
uuid = models.UUIDField(primary_key=True, editable=False, default=uuid.uuid4)
def __str__(self):
return self.protocol + '/' + str(self.port)
class Meta:
unique_together = ['port', 'protocol']

3
firewall/tests.py Normal file
View File

@ -0,0 +1,3 @@
from django.test import TestCase
# Create your tests here.

15
firewall/views.py Normal file
View File

@ -0,0 +1,15 @@
from django.shortcuts import render
from firewall.models import RedirectRule
def view_redirect_rule_list(request):
context = {
'page_title': 'Port Forward List',
'redirect_rule_list': RedirectRule.objects.all().order_by('wireguard_instance', 'protocol', 'port')
}
return render(request, 'firewall/redirect_rule_list.html', context=context)
def manage_redirect_rule(request):
context = {'page_title': 'Manage Port Forward'}
return render(request, 'firewall/manage_redirect_rule.html', context=context)

View File

@ -102,6 +102,15 @@
</a>
</li>
<li class="nav-item">
<a href="/firewall/port_forward/" class="nav-link {% if '/firewall/' in request.path %}active{% endif %}">
<i class="fas fa-directions nav-icon"></i>
<p>
Port Forwarding
</p>
</a>
</li>
<li class="nav-item">
<a href="/console/" class="nav-link {% if '/console/' in request.path %}active{% endif %}">
<i class="fas fa-terminal nav-icon"></i>

View File

@ -0,0 +1,3 @@
{% extends 'base.html' %}
{% block content %}gerenciar regra{%endblock%}

View File

@ -0,0 +1,3 @@
{% extends 'base.html' %}
{% block content %}Lista{%endblock%}

View File

@ -39,6 +39,7 @@ INSTALLED_APPS = [
'wireguard',
'user_manager',
'wireguard_tools',
'firewall',
]
MIDDLEWARE = [

View File

@ -23,6 +23,7 @@ from user_manager.views import view_user_list, view_manage_user
from accounts.views import view_create_first_user, view_login, view_logout
from wireguard_tools.views import export_wireguard_configs, download_config_or_qrcode, restart_wireguard_interfaces
from api.views import wireguard_status, cron_check_updates, cron_update_peer_latest_handshake
from firewall.views import view_redirect_rule_list, manage_redirect_rule
urlpatterns = [
@ -45,5 +46,7 @@ urlpatterns = [
path('api/wireguard_status/', wireguard_status, name='api_wireguard_status'),
path('api/cron_check_updates/', cron_check_updates, name='cron_check_updates'),
path('api/cron_update_peer_latest_handshake/', cron_update_peer_latest_handshake, name='cron_update_peer_latest_handshake'),
path('firewall/port_forward/', view_redirect_rule_list, name='redirect_rule_list'),
path('firewall/manage_port_forward_rule/', manage_redirect_rule, name='manage_redirect_rule'),
]