Merge pull request #6550 from stokito/devices_unspecified
Devices unspecified
This commit is contained in:
commit
96b11ae111
7 changed files with 0 additions and 16 deletions
|
@ -311,7 +311,6 @@ return view.extend({
|
|||
|
||||
o = s.taboption('general', widgets.NetworkSelect, 'adb_trigger', _('Startup Trigger Interface'), _('List of available network interfaces to trigger the adblock start. \
|
||||
Choose \'unspecified\' to use a classic startup timeout instead of a network trigger.'));
|
||||
o.unspecified = true;
|
||||
o.nocreate = true;
|
||||
o.rmempty = true;
|
||||
|
||||
|
@ -320,14 +319,12 @@ return view.extend({
|
|||
|
||||
o = s.taboption('general', widgets.ZoneSelect, 'adb_zonelist', _('Forced Zones'), _('Firewall source zones that should be forced locally.'));
|
||||
o.depends('adb_forcedns', '1');
|
||||
o.unspecified = true;
|
||||
o.multiple = true;
|
||||
o.nocreate = true;
|
||||
o.rmempty = true;
|
||||
|
||||
o = s.taboption('general', form.DynamicList, 'adb_portlist', _('Forced Ports'), _('Firewall ports that should be forced locally.'));
|
||||
o.depends('adb_forcedns', '1');
|
||||
o.unspecified = true;
|
||||
o.multiple = true;
|
||||
o.nocreate = false;
|
||||
o.datatype = 'port';
|
||||
|
@ -484,7 +481,6 @@ return view.extend({
|
|||
o.default = '<em><b>Changes on this tab needs a full adblock service restart to take effect.</b></em>';
|
||||
|
||||
o = s.taboption('adv_report', widgets.DeviceSelect, 'adb_repiface', _('Report Interface'), _('List of available network devices used by tcpdump.'));
|
||||
o.unspecified = true;
|
||||
o.nocreate = false;
|
||||
o.rmempty = true;
|
||||
|
||||
|
|
|
@ -264,7 +264,6 @@ return view.extend({
|
|||
|
||||
o = s.taboption('general', widgets.DeviceSelect, 'ban_dev', _('Network Devices'), _('Select the WAN network device(s).'));
|
||||
o.depends('ban_autodetect', '0');
|
||||
o.unspecified = true;
|
||||
o.multiple = true;
|
||||
o.nocreate = true;
|
||||
o.optional = true;
|
||||
|
@ -272,7 +271,6 @@ return view.extend({
|
|||
|
||||
o = s.taboption('general', widgets.NetworkSelect, 'ban_ifv4', _('Network Interfaces'), _('Select the logical WAN IPv4 network interface(s).'));
|
||||
o.depends('ban_autodetect', '0');
|
||||
o.unspecified = true;
|
||||
o.multiple = true;
|
||||
o.nocreate = true;
|
||||
o.optional = true;
|
||||
|
@ -280,7 +278,6 @@ return view.extend({
|
|||
|
||||
o = s.taboption('general', widgets.NetworkSelect, 'ban_ifv6', _('Network Interfaces'), _('Select the logical WAN IPv6 network interface(s).'));
|
||||
o.depends('ban_autodetect', '0');
|
||||
o.unspecified = true;
|
||||
o.multiple = true;
|
||||
o.nocreate = true;
|
||||
o.optional = true;
|
||||
|
@ -301,7 +298,6 @@ return view.extend({
|
|||
o.retain = true;
|
||||
|
||||
o = s.taboption('general', widgets.NetworkSelect, 'ban_trigger', _('Startup Trigger Interface'), _('List of available network interfaces to trigger the banIP start.'));
|
||||
o.unspecified = true;
|
||||
o.multiple = true;
|
||||
o.nocreate = true;
|
||||
o.rmempty = true;
|
||||
|
@ -415,14 +411,12 @@ return view.extend({
|
|||
o.rmempty = true;
|
||||
|
||||
o = s.taboption('adv_chain', widgets.DeviceSelect, 'ban_vlanallow', _('Allow VLAN Forwads'), _('Always allow certain VLAN forwards.'));
|
||||
o.unspecified = true;
|
||||
o.multiple = true;
|
||||
o.nocreate = true;
|
||||
o.optional = true;
|
||||
o.rmempty = true;
|
||||
|
||||
o = s.taboption('adv_chain', widgets.DeviceSelect, 'ban_vlanblock', _('Block VLAN Forwads'), _('Always block certain VLAN forwards.'));
|
||||
o.unspecified = true;
|
||||
o.multiple = true;
|
||||
o.nocreate = true;
|
||||
o.optional = true;
|
||||
|
|
|
@ -22,7 +22,6 @@ s:option(Value, "device", translate("Device")).rmempty = true
|
|||
b = s:option(Value, "bind", translate("Interface"), translate("Specifies the interface to listen on."))
|
||||
b.template = "cbi/network_netlist"
|
||||
b.nocreate = true
|
||||
b.unspecified = true
|
||||
|
||||
function b.cfgvalue(...)
|
||||
local v = Value.cfgvalue(...)
|
||||
|
|
|
@ -321,7 +321,6 @@ return view.extend({
|
|||
|
||||
o = s.taboption('general', widgets.NetworkSelect, 'trm_vpnifacelist', _('Limit VPN processing'), _('Limit VPN processing to certain interfaces.'));
|
||||
o.depends('trm_vpn', '1');
|
||||
o.unspecified = true;
|
||||
o.multiple = true;
|
||||
o.nocreate = true;
|
||||
o.rmempty = true;
|
||||
|
|
|
@ -557,7 +557,6 @@ return view.extend({
|
|||
o.ucisection = 'uplink';
|
||||
o.ucioption = 'macaddr';
|
||||
o.nocreate = false;
|
||||
o.unspecified = true;
|
||||
o.rmempty = true;
|
||||
o.datatype = 'macaddr';
|
||||
o.cfgvalue = function (section_id) {
|
||||
|
@ -699,7 +698,6 @@ return view.extend({
|
|||
}
|
||||
|
||||
o = s.taboption('vpn', widgets.NetworkSelect, '_vpniface', _('VPN Interface'), _('The logical vpn network interface like \'wg0\'.'));
|
||||
o.unspecified = false;
|
||||
o.nocreate = true;
|
||||
o.optional = true;
|
||||
o.modalonly = true;
|
||||
|
|
|
@ -23,7 +23,6 @@ return view.extend({
|
|||
|
||||
o = s.option(widgets.DeviceSelect, 'interface', _('Interface'), _('Network interface to bind (eg: eth0), or UNIX domain socket path (eg: /var/run/ttyd.sock)'));
|
||||
o.nocreate = true;
|
||||
o.unspecified = true;
|
||||
|
||||
o = s.option(form.Value, 'credential', _('Credential'), _('Credential for Basic Authentication'));
|
||||
o.placeholder = 'username:password';
|
||||
|
|
|
@ -16,7 +16,6 @@ return view.extend({
|
|||
|
||||
o = s.option(widgets.NetworkSelect, 'Interface', _('Interface'), _('Listen only on the given interface or, if unspecified, on all'));
|
||||
o.nocreate = true;
|
||||
o.unspecified = true;
|
||||
|
||||
o = s.option(form.Value, 'Port', _('Port'));
|
||||
o.datatype = 'port';
|
||||
|
|
Loading…
Reference in a new issue