mirror of
https://github.com/eduardogsilva/wireguard_webadmin.git
synced 2025-04-19 00:45:16 +00:00
Port forwarding skeleton
This commit is contained in:
parent
32ff04fbf6
commit
f22c3d47da
0
firewall/__init__.py
Normal file
0
firewall/__init__.py
Normal file
10
firewall/admin.py
Normal file
10
firewall/admin.py
Normal file
@ -0,0 +1,10 @@
|
||||
from django.contrib import admin
|
||||
from firewall.models import RedirectRule
|
||||
|
||||
|
||||
class RedirectRuleAdmin(admin.ModelAdmin):
|
||||
list_display = ('protocol', 'port', 'add_forward_rule', 'peer', 'wireguard_instance', 'ip_address', 'description', 'created', 'updated', 'uuid')
|
||||
search_fields = ('protocol', 'port', 'add_forward_rule', 'peer', 'wireguard_instance', 'ip_address', 'description', 'created', 'updated', 'uuid')
|
||||
|
||||
admin.site.register(RedirectRule, RedirectRuleAdmin)
|
||||
|
6
firewall/apps.py
Normal file
6
firewall/apps.py
Normal file
@ -0,0 +1,6 @@
|
||||
from django.apps import AppConfig
|
||||
|
||||
|
||||
class FirewallConfig(AppConfig):
|
||||
default_auto_field = 'django.db.models.BigAutoField'
|
||||
name = 'firewall'
|
0
firewall/forms.py
Normal file
0
firewall/forms.py
Normal file
35
firewall/migrations/0001_initial.py
Normal file
35
firewall/migrations/0001_initial.py
Normal file
@ -0,0 +1,35 @@
|
||||
# Generated by Django 5.0.2 on 2024-02-26 12:59
|
||||
|
||||
import django.db.models.deletion
|
||||
import uuid
|
||||
from django.db import migrations, models
|
||||
|
||||
|
||||
class Migration(migrations.Migration):
|
||||
|
||||
initial = True
|
||||
|
||||
dependencies = [
|
||||
('wireguard', '0014_alter_wireguardinstance_dns_primary_and_more'),
|
||||
]
|
||||
|
||||
operations = [
|
||||
migrations.CreateModel(
|
||||
name='RedirectRule',
|
||||
fields=[
|
||||
('description', models.CharField(blank=True, max_length=100, null=True)),
|
||||
('protocol', models.CharField(choices=[('tcp', 'TCP'), ('udp', 'UDP')], default='tcp', max_length=3)),
|
||||
('port', models.PositiveIntegerField(default=8080)),
|
||||
('add_forward_rule', models.BooleanField(default=True)),
|
||||
('ip_address', models.GenericIPAddressField(blank=True, null=True)),
|
||||
('created', models.DateTimeField(auto_now_add=True)),
|
||||
('updated', models.DateTimeField(auto_now=True)),
|
||||
('uuid', models.UUIDField(default=uuid.uuid4, editable=False, primary_key=True, serialize=False)),
|
||||
('peer', models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.CASCADE, to='wireguard.peer')),
|
||||
('wireguard_instance', models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.CASCADE, to='wireguard.wireguardinstance')),
|
||||
],
|
||||
options={
|
||||
'unique_together': {('port', 'protocol')},
|
||||
},
|
||||
),
|
||||
]
|
@ -0,0 +1,23 @@
|
||||
# Generated by Django 5.0.2 on 2024-02-26 13:35
|
||||
|
||||
from django.db import migrations, models
|
||||
|
||||
|
||||
class Migration(migrations.Migration):
|
||||
|
||||
dependencies = [
|
||||
('firewall', '0001_initial'),
|
||||
]
|
||||
|
||||
operations = [
|
||||
migrations.AddField(
|
||||
model_name='redirectrule',
|
||||
name='masquerade_source',
|
||||
field=models.BooleanField(default=False),
|
||||
),
|
||||
migrations.AlterField(
|
||||
model_name='redirectrule',
|
||||
name='ip_address',
|
||||
field=models.GenericIPAddressField(blank=True, null=True, protocol='IPv4'),
|
||||
),
|
||||
]
|
0
firewall/migrations/__init__.py
Normal file
0
firewall/migrations/__init__.py
Normal file
26
firewall/models.py
Normal file
26
firewall/models.py
Normal file
@ -0,0 +1,26 @@
|
||||
from django.db import models
|
||||
from wireguard.models import Peer, WireGuardInstance
|
||||
import uuid
|
||||
|
||||
|
||||
class RedirectRule(models.Model):
|
||||
description = models.CharField(max_length=100, blank=True, null=True)
|
||||
protocol = models.CharField(max_length=3, default='tcp', choices=[('tcp', 'TCP'), ('udp', 'UDP')])
|
||||
port = models.PositiveIntegerField(default=8080)
|
||||
add_forward_rule = models.BooleanField(default=True)
|
||||
masquerade_source = models.BooleanField(default=False)
|
||||
peer = models.ForeignKey(Peer, on_delete=models.CASCADE, blank=True, null=True)
|
||||
wireguard_instance = models.ForeignKey(WireGuardInstance, on_delete=models.CASCADE, blank=True, null=True)
|
||||
ip_address = models.GenericIPAddressField(blank=True, null=True, protocol='IPv4')
|
||||
|
||||
created = models.DateTimeField(auto_now_add=True)
|
||||
updated = models.DateTimeField(auto_now=True)
|
||||
uuid = models.UUIDField(primary_key=True, editable=False, default=uuid.uuid4)
|
||||
|
||||
def __str__(self):
|
||||
return self.protocol + '/' + str(self.port)
|
||||
|
||||
class Meta:
|
||||
unique_together = ['port', 'protocol']
|
||||
|
||||
|
3
firewall/tests.py
Normal file
3
firewall/tests.py
Normal file
@ -0,0 +1,3 @@
|
||||
from django.test import TestCase
|
||||
|
||||
# Create your tests here.
|
15
firewall/views.py
Normal file
15
firewall/views.py
Normal file
@ -0,0 +1,15 @@
|
||||
from django.shortcuts import render
|
||||
from firewall.models import RedirectRule
|
||||
|
||||
|
||||
def view_redirect_rule_list(request):
|
||||
context = {
|
||||
'page_title': 'Port Forward List',
|
||||
'redirect_rule_list': RedirectRule.objects.all().order_by('wireguard_instance', 'protocol', 'port')
|
||||
}
|
||||
return render(request, 'firewall/redirect_rule_list.html', context=context)
|
||||
|
||||
|
||||
def manage_redirect_rule(request):
|
||||
context = {'page_title': 'Manage Port Forward'}
|
||||
return render(request, 'firewall/manage_redirect_rule.html', context=context)
|
@ -102,6 +102,15 @@
|
||||
</a>
|
||||
</li>
|
||||
|
||||
<li class="nav-item">
|
||||
<a href="/firewall/port_forward/" class="nav-link {% if '/firewall/' in request.path %}active{% endif %}">
|
||||
<i class="fas fa-directions nav-icon"></i>
|
||||
<p>
|
||||
Port Forwarding
|
||||
</p>
|
||||
</a>
|
||||
</li>
|
||||
|
||||
<li class="nav-item">
|
||||
<a href="/console/" class="nav-link {% if '/console/' in request.path %}active{% endif %}">
|
||||
<i class="fas fa-terminal nav-icon"></i>
|
||||
|
3
templates/firewall/manage_redirect_rule.html
Normal file
3
templates/firewall/manage_redirect_rule.html
Normal file
@ -0,0 +1,3 @@
|
||||
{% extends 'base.html' %}
|
||||
|
||||
{% block content %}gerenciar regra{%endblock%}
|
3
templates/firewall/redirect_rule_list.html
Normal file
3
templates/firewall/redirect_rule_list.html
Normal file
@ -0,0 +1,3 @@
|
||||
{% extends 'base.html' %}
|
||||
|
||||
{% block content %}Lista{%endblock%}
|
@ -39,6 +39,7 @@ INSTALLED_APPS = [
|
||||
'wireguard',
|
||||
'user_manager',
|
||||
'wireguard_tools',
|
||||
'firewall',
|
||||
]
|
||||
|
||||
MIDDLEWARE = [
|
||||
|
@ -23,6 +23,7 @@ from user_manager.views import view_user_list, view_manage_user
|
||||
from accounts.views import view_create_first_user, view_login, view_logout
|
||||
from wireguard_tools.views import export_wireguard_configs, download_config_or_qrcode, restart_wireguard_interfaces
|
||||
from api.views import wireguard_status, cron_check_updates, cron_update_peer_latest_handshake
|
||||
from firewall.views import view_redirect_rule_list, manage_redirect_rule
|
||||
|
||||
|
||||
urlpatterns = [
|
||||
@ -45,5 +46,7 @@ urlpatterns = [
|
||||
path('api/wireguard_status/', wireguard_status, name='api_wireguard_status'),
|
||||
path('api/cron_check_updates/', cron_check_updates, name='cron_check_updates'),
|
||||
path('api/cron_update_peer_latest_handshake/', cron_update_peer_latest_handshake, name='cron_update_peer_latest_handshake'),
|
||||
path('firewall/port_forward/', view_redirect_rule_list, name='redirect_rule_list'),
|
||||
path('firewall/manage_port_forward_rule/', manage_redirect_rule, name='manage_redirect_rule'),
|
||||
|
||||
]
|
||||
|
Loading…
x
Reference in New Issue
Block a user