luci-proto-wireguard: rewrite protocol handler
This commit rewrites large chunks of the WireGuard protocol handler in order to simplify the process of importing and exporting configuration. The major changes are: 1) The wireguard interface configuration tab (General Settings) gained an import assistant which allows dragging or pasting a native WireGuard configuration file in order to import required settrings into uci 2) The peer configuration tab gained a similar import assistant which allows importing the settings for a WireGuard peer from an existing native WireGuard configuration file 3) The QR code export feature has been rewritten to make the resulting codes actually useful for importing into a WireGuard client application. Additionally the plaintext native WireGuard configuration is displayed to allow copy-pasting it for use on a Linux or OS X system Signed-off-by: Jo-Philipp Wich <jo@mein.io>
This commit is contained in:
parent
c19020b2a4
commit
9ba20645b0
3 changed files with 626 additions and 160 deletions
|
@ -1,9 +1,12 @@
|
|||
'use strict';
|
||||
'require fs';
|
||||
'require ui';
|
||||
'require dom';
|
||||
'require uci';
|
||||
'require rpc';
|
||||
'require form';
|
||||
'require network';
|
||||
'require validation';
|
||||
|
||||
var generateKey = rpc.declare({
|
||||
object: 'luci.wireguard',
|
||||
|
@ -18,19 +21,14 @@ var getPublicAndPrivateKeyFromPrivate = rpc.declare({
|
|||
expect: { keys: {} }
|
||||
});
|
||||
|
||||
var generateQrCode = rpc.declare({
|
||||
object: 'luci.wireguard',
|
||||
method: 'generateQrCode',
|
||||
params: ['privkey', 'psk', 'allowed_ips'],
|
||||
expect: { qr_code: '' }
|
||||
});
|
||||
|
||||
var generatePsk = rpc.declare({
|
||||
object: 'luci.wireguard',
|
||||
method: 'generatePsk',
|
||||
expect: { psk: '' }
|
||||
});
|
||||
|
||||
var qrIcon = '<svg viewBox="0 0 29 29" xmlns="http://www.w3.org/2000/svg"><path fill="#fff" d="M0 0h29v29H0z"/><path d="M4 4h1v1H4zM5 4h1v1H5zM6 4h1v1H6zM7 4h1v1H7zM8 4h1v1H8zM9 4h1v1H9zM10 4h1v1h-1zM12 4h1v1h-1zM13 4h1v1h-1zM14 4h1v1h-1zM15 4h1v1h-1zM16 4h1v1h-1zM18 4h1v1h-1zM19 4h1v1h-1zM20 4h1v1h-1zM21 4h1v1h-1zM22 4h1v1h-1zM23 4h1v1h-1zM24 4h1v1h-1zM4 5h1v1H4zM10 5h1v1h-1zM12 5h1v1h-1zM14 5h1v1h-1zM16 5h1v1h-1zM18 5h1v1h-1zM24 5h1v1h-1zM4 6h1v1H4zM6 6h1v1H6zM7 6h1v1H7zM8 6h1v1H8zM10 6h1v1h-1zM12 6h1v1h-1zM18 6h1v1h-1zM20 6h1v1h-1zM21 6h1v1h-1zM22 6h1v1h-1zM24 6h1v1h-1zM4 7h1v1H4zM6 7h1v1H6zM7 7h1v1H7zM8 7h1v1H8zM10 7h1v1h-1zM12 7h1v1h-1zM13 7h1v1h-1zM14 7h1v1h-1zM15 7h1v1h-1zM18 7h1v1h-1zM20 7h1v1h-1zM21 7h1v1h-1zM22 7h1v1h-1zM24 7h1v1h-1zM4 8h1v1H4zM6 8h1v1H6zM7 8h1v1H7zM8 8h1v1H8zM10 8h1v1h-1zM16 8h1v1h-1zM18 8h1v1h-1zM20 8h1v1h-1zM21 8h1v1h-1zM22 8h1v1h-1zM24 8h1v1h-1zM4 9h1v1H4zM10 9h1v1h-1zM12 9h1v1h-1zM13 9h1v1h-1zM15 9h1v1h-1zM18 9h1v1h-1zM24 9h1v1h-1zM4 10h1v1H4zM5 10h1v1H5zM6 10h1v1H6zM7 10h1v1H7zM8 10h1v1H8zM9 10h1v1H9zM10 10h1v1h-1zM12 10h1v1h-1zM14 10h1v1h-1zM16 10h1v1h-1zM18 10h1v1h-1zM19 10h1v1h-1zM20 10h1v1h-1zM21 10h1v1h-1zM22 10h1v1h-1zM23 10h1v1h-1zM24 10h1v1h-1zM13 11h1v1h-1zM14 11h1v1h-1zM15 11h1v1h-1zM16 11h1v1h-1zM4 12h1v1H4zM5 12h1v1H5zM8 12h1v1H8zM9 12h1v1H9zM10 12h1v1h-1zM13 12h1v1h-1zM15 12h1v1h-1zM19 12h1v1h-1zM21 12h1v1h-1zM22 12h1v1h-1zM23 12h1v1h-1zM24 12h1v1h-1zM5 13h1v1H5zM6 13h1v1H6zM8 13h1v1H8zM11 13h1v1h-1zM13 13h1v1h-1zM14 13h1v1h-1zM15 13h1v1h-1zM16 13h1v1h-1zM19 13h1v1h-1zM22 13h1v1h-1zM4 14h1v1H4zM5 14h1v1H5zM9 14h1v1H9zM10 14h1v1h-1zM11 14h1v1h-1zM15 14h1v1h-1zM18 14h1v1h-1zM19 14h1v1h-1zM20 14h1v1h-1zM21 14h1v1h-1zM22 14h1v1h-1zM23 14h1v1h-1zM7 15h1v1H7zM8 15h1v1H8zM9 15h1v1H9zM11 15h1v1h-1zM12 15h1v1h-1zM13 15h1v1h-1zM17 15h1v1h-1zM18 15h1v1h-1zM20 15h1v1h-1zM21 15h1v1h-1zM23 15h1v1h-1zM4 16h1v1H4zM6 16h1v1H6zM10 16h1v1h-1zM11 16h1v1h-1zM13 16h1v1h-1zM14 16h1v1h-1zM16 16h1v1h-1zM17 16h1v1h-1zM18 16h1v1h-1zM22 16h1v1h-1zM23 16h1v1h-1zM24 16h1v1h-1zM12 17h1v1h-1zM16 17h1v1h-1zM17 17h1v1h-1zM18 17h1v1h-1zM4 18h1v1H4zM5 18h1v1H5zM6 18h1v1H6zM7 18h1v1H7zM8 18h1v1H8zM9 18h1v1H9zM10 18h1v1h-1zM14 18h1v1h-1zM16 18h1v1h-1zM17 18h1v1h-1zM21 18h1v1h-1zM22 18h1v1h-1zM23 18h1v1h-1zM4 19h1v1H4zM10 19h1v1h-1zM12 19h1v1h-1zM13 19h1v1h-1zM15 19h1v1h-1zM16 19h1v1h-1zM19 19h1v1h-1zM21 19h1v1h-1zM23 19h1v1h-1zM24 19h1v1h-1zM4 20h1v1H4zM6 20h1v1H6zM7 20h1v1H7zM8 20h1v1H8zM10 20h1v1h-1zM12 20h1v1h-1zM13 20h1v1h-1zM15 20h1v1h-1zM18 20h1v1h-1zM19 20h1v1h-1zM20 20h1v1h-1zM22 20h1v1h-1zM23 20h1v1h-1zM24 20h1v1h-1zM4 21h1v1H4zM6 21h1v1H6zM7 21h1v1H7zM8 21h1v1H8zM10 21h1v1h-1zM13 21h1v1h-1zM15 21h1v1h-1zM16 21h1v1h-1zM19 21h1v1h-1zM21 21h1v1h-1zM23 21h1v1h-1zM24 21h1v1h-1zM4 22h1v1H4zM6 22h1v1H6zM7 22h1v1H7zM8 22h1v1H8zM10 22h1v1h-1zM13 22h1v1h-1zM15 22h1v1h-1zM18 22h1v1h-1zM19 22h1v1h-1zM20 22h1v1h-1zM21 22h1v1h-1zM22 22h1v1h-1zM4 23h1v1H4zM10 23h1v1h-1zM12 23h1v1h-1zM13 23h1v1h-1zM14 23h1v1h-1zM17 23h1v1h-1zM18 23h1v1h-1zM20 23h1v1h-1zM22 23h1v1h-1zM4 24h1v1H4zM5 24h1v1H5zM6 24h1v1H6zM7 24h1v1H7zM8 24h1v1H8zM9 24h1v1H9zM10 24h1v1h-1zM12 24h1v1h-1zM13 24h1v1h-1zM14 24h1v1h-1zM16 24h1v1h-1zM17 24h1v1h-1zM18 24h1v1h-1zM22 24h1v1h-1zM24 24h1v1h-1z"/></svg>';
|
||||
|
||||
function validateBase64(section_id, value) {
|
||||
if (value.length == 0)
|
||||
return true;
|
||||
|
@ -44,14 +42,18 @@ function validateBase64(section_id, value) {
|
|||
return true;
|
||||
}
|
||||
|
||||
function findSection(sections, name) {
|
||||
for (var i = 0; i < sections.length; i++) {
|
||||
var section = sections[i];
|
||||
if (section['.name'] == name) return section;
|
||||
}
|
||||
var stubValidator = {
|
||||
factory: validation,
|
||||
apply: function(type, value, args) {
|
||||
if (value != null)
|
||||
this.value = value;
|
||||
|
||||
return null;
|
||||
}
|
||||
return validation.types[type].apply(this, args);
|
||||
},
|
||||
assert: function(condition) {
|
||||
return !!condition;
|
||||
}
|
||||
};
|
||||
|
||||
function generateDescription(name, texts) {
|
||||
return E('li', { 'style': 'color: inherit;' }, [
|
||||
|
@ -62,6 +64,56 @@ function generateDescription(name, texts) {
|
|||
]);
|
||||
}
|
||||
|
||||
function invokeQREncode(data, code) {
|
||||
return fs.exec_direct('/usr/bin/qrencode', [
|
||||
'--inline', '--8bit', '--type=SVG',
|
||||
'--output=-', '--', data
|
||||
]).then(function(svg) {
|
||||
code.style.opacity = '';
|
||||
dom.content(code, Object.assign(E(svg), { style: 'width:100%;height:auto' }));
|
||||
}).catch(function(error) {
|
||||
code.style.opacity = '';
|
||||
|
||||
if (L.isObject(error) && error.name == 'NotFoundError') {
|
||||
dom.content(code, [
|
||||
Object.assign(E(qrIcon), { style: 'width:32px;height:32px;opacity:.2' }),
|
||||
E('p', _('The <em>qrencode</em> package is required for generating an QR code image of the configuration.'))
|
||||
]);
|
||||
}
|
||||
else {
|
||||
dom.content(code, [
|
||||
_('Unable to generate QR code: %s').format(L.isObject(error) ? error.message : error)
|
||||
]);
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
var cbiKeyPairGenerate = form.DummyValue.extend({
|
||||
cfgvalue: function(section_id, value) {
|
||||
return E('button', {
|
||||
'class': 'btn',
|
||||
'click': ui.createHandlerFn(this, function(section_id, ev) {
|
||||
var prv = this.section.getUIElement(section_id, 'private_key'),
|
||||
pub = this.section.getUIElement(section_id, 'public_key'),
|
||||
map = this.map;
|
||||
|
||||
if ((prv.getValue() || pub.getValue()) && !confirm(_('Do you want to replace the current keys?')))
|
||||
return;
|
||||
|
||||
return generateKey().then(function(keypair) {
|
||||
prv.setValue(keypair.priv);
|
||||
pub.setValue(keypair.pub);
|
||||
map.save(null, true);
|
||||
});
|
||||
}, section_id)
|
||||
}, [ _('Generate new key pair') ]);
|
||||
}
|
||||
});
|
||||
|
||||
function handleWindowDragDropIgnore(ev) {
|
||||
ev.preventDefault()
|
||||
}
|
||||
|
||||
return network.registerProtocol('wireguard', {
|
||||
getI18n: function() {
|
||||
return _('WireGuard VPN');
|
||||
|
@ -92,7 +144,7 @@ return network.registerProtocol('wireguard', {
|
|||
},
|
||||
|
||||
renderFormOptions: function(s) {
|
||||
var o, ss;
|
||||
var o, ss, ss2;
|
||||
|
||||
// -- general ---------------------------------------------------------------------
|
||||
|
||||
|
@ -101,37 +153,25 @@ return network.registerProtocol('wireguard', {
|
|||
o.validate = validateBase64;
|
||||
o.rmempty = false;
|
||||
|
||||
var sections = uci.sections('network');
|
||||
var serverName = this.getIfname();
|
||||
var server = findSection(sections, serverName);
|
||||
|
||||
o = s.taboption('general', form.Value, 'public_key', _('Public Key'), _('Base64-encoded public key of this interface for sharing.'));
|
||||
o.rmempty = false;
|
||||
o.write = function() {/* write nothing */};
|
||||
|
||||
o.load = function(s) {
|
||||
return getPublicAndPrivateKeyFromPrivate(server.private_key).then(
|
||||
o.load = function(section_id) {
|
||||
var privKey = s.formvalue(section_id, 'private_key') || uci.get('network', section_id, 'private_key');
|
||||
|
||||
return getPublicAndPrivateKeyFromPrivate(privKey).then(
|
||||
function(keypair) {
|
||||
return keypair.pub || '';
|
||||
},
|
||||
function(error){
|
||||
},
|
||||
function(error) {
|
||||
return _('Error getting PublicKey');
|
||||
}, this)
|
||||
};
|
||||
|
||||
o = s.taboption('general', form.Button, 'generate_key', _('Generate Key'));
|
||||
o.inputstyle = 'apply';
|
||||
o.onclick = ui.createHandlerFn(this, function(section_id, ev) {
|
||||
return generateKey().then(function(keypair) {
|
||||
var keyInput = document.getElementById('widget.cbid.network.%s.private_key'.format(section_id)),
|
||||
changeEvent = new Event('change'),
|
||||
pubKeyInput = document.getElementById('widget.cbid.network.%s.public_key'.format(section_id));
|
||||
|
||||
keyInput.value = keypair.priv || '';
|
||||
pubKeyInput.value = keypair.pub || '';
|
||||
keyInput.dispatchEvent(changeEvent);
|
||||
});
|
||||
}, s.section);
|
||||
s.taboption('general', cbiKeyPairGenerate, '_gen_server_keypair', ' ');
|
||||
|
||||
o = s.taboption('general', form.Value, 'listen_port', _('Listen Port'), _('Optional. UDP port used for outgoing and incoming packets.'));
|
||||
o.datatype = 'port';
|
||||
|
@ -145,6 +185,12 @@ return network.registerProtocol('wireguard', {
|
|||
o = s.taboption('general', form.Flag, 'nohostroute', _('No Host Routes'), _('Optional. Do not create host routes to peers.'));
|
||||
o.optional = true;
|
||||
|
||||
o = s.taboption('general', form.Button, '_import', _('Import configuration'), _('Imports settings from an existing WireGuard configuration file'));
|
||||
o.inputtitle = _('Load configuration…');
|
||||
o.onclick = function() {
|
||||
return ss.handleConfigImport('client');
|
||||
};
|
||||
|
||||
// -- advanced --------------------------------------------------------------------
|
||||
|
||||
o = s.taboption('advanced', form.Value, 'mtu', _('MTU'), _('Optional. Maximum Transmission Unit of tunnel interface.'));
|
||||
|
@ -179,121 +225,398 @@ return network.registerProtocol('wireguard', {
|
|||
ss.nodescriptions = true;
|
||||
ss.modaltitle = _('Edit peer');
|
||||
|
||||
ss.renderSectionPlaceholder = function() {
|
||||
return E([], [
|
||||
E('br'),
|
||||
E('em', _('No peers defined yet'))
|
||||
ss.handleDragConfig = function(ev) {
|
||||
ev.stopPropagation();
|
||||
ev.preventDefault();
|
||||
ev.dataTransfer.dropEffect = 'copy';
|
||||
};
|
||||
|
||||
ss.handleDropConfig = function(mode, ev) {
|
||||
var file = ev.dataTransfer.files[0],
|
||||
nodes = ev.currentTarget,
|
||||
input = nodes.querySelector('textarea'),
|
||||
reader = new FileReader();
|
||||
|
||||
if (file) {
|
||||
reader.onload = function(rev) {
|
||||
input.value = rev.target.result.trim();
|
||||
ss.handleApplyConfig(mode, nodes, file.name, ev);
|
||||
};
|
||||
|
||||
reader.readAsText(file);
|
||||
}
|
||||
|
||||
ev.stopPropagation();
|
||||
ev.preventDefault();
|
||||
};
|
||||
|
||||
ss.parseConfig = function(data) {
|
||||
var lines = String(data).split(/(\r?\n)+/),
|
||||
section = null,
|
||||
config = {};
|
||||
|
||||
for (var i = 0; i < lines.length; i++) {
|
||||
var line = lines[i].replace(/#.*$/, '').trim();
|
||||
|
||||
if (line.match(/^\[(\w+)\]$/)) {
|
||||
section = RegExp.$1.toLowerCase();
|
||||
}
|
||||
else if (section && line.match(/^(\w+)\s*=\s*(.+)$/)) {
|
||||
var key = RegExp.$1,
|
||||
val = RegExp.$2.trim();
|
||||
|
||||
if (val.length)
|
||||
config[section + '_' + key.toLowerCase()] = val;
|
||||
}
|
||||
}
|
||||
|
||||
if (config.interface_address) {
|
||||
config.interface_address = config.interface_address.split(/[, ]+/);
|
||||
|
||||
for (var i = 0; i < config.interface_address.length; i++)
|
||||
if (!stubValidator.apply('ipaddr', config.interface_address[i]))
|
||||
return _('Address setting is invalid');
|
||||
}
|
||||
|
||||
if (config.interface_dns) {
|
||||
config.interface_dns = config.interface_dns.split(/[, ]+/);
|
||||
|
||||
for (var i = 0; i < config.interface_dns.length; i++)
|
||||
if (!stubValidator.apply('ipaddr', config.interface_dns[i], ['nomask']))
|
||||
return _('DNS setting is invalid');
|
||||
}
|
||||
|
||||
if (!config.interface_privatekey || validateBase64(null, config.interface_privatekey) !== true)
|
||||
return _('PrivateKey setting is missing or invalid');
|
||||
|
||||
if (!stubValidator.apply('port', config.interface_listenport || '0'))
|
||||
return _('ListenPort setting is invalid');
|
||||
|
||||
if (!config.peer_publickey || validateBase64(null, config.peer_publickey) !== true)
|
||||
return _('PublicKey setting is missing or invalid');
|
||||
|
||||
if (config.peer_presharedkey != null && validateBase64(null, config.peer_presharedkey) !== true)
|
||||
return _('PresharedKey setting is invalid');
|
||||
|
||||
if (config.peer_allowedips) {
|
||||
config.peer_allowedips = config.peer_allowedips.split(/[, ]+/);
|
||||
|
||||
for (var i = 0; i < config.peer_allowedips.length; i++)
|
||||
if (!stubValidator.apply('ipaddr', config.peer_allowedips[i]))
|
||||
return _('AllowedIPs setting is invalid');
|
||||
}
|
||||
else {
|
||||
config.peer_allowedips = [ '0.0.0.0/0', '::/0' ];
|
||||
}
|
||||
|
||||
if (config.peer_endpoint) {
|
||||
var host_port = config.peer_endpoint.match(/^\[([a-fA-F0-9:]+)\]:(\d+)$/) || config.peer_endpoint.match(/^(.+):(\d+)$/);
|
||||
|
||||
if (!host_port || !stubValidator.apply('host', host_port[1]) || !stubValidator.apply('port', host_port[2]))
|
||||
return _('Endpoint setting is invalid');
|
||||
|
||||
config.peer_endpoint = [ host_port[1], host_port[2] ];
|
||||
}
|
||||
|
||||
if (config.peer_persistentkeepalive == 'off' || config.peer_persistentkeepalive == '0')
|
||||
delete config.peer_persistentkeepalive;
|
||||
|
||||
if (!stubValidator.apply('port', config.peer_persistentkeepalive || '0'))
|
||||
return _('PersistentKeepAlive setting is invalid');
|
||||
|
||||
return config;
|
||||
};
|
||||
|
||||
ss.handleApplyConfig = function(mode, nodes, comment, ev) {
|
||||
var input = nodes.querySelector('textarea').value,
|
||||
error = nodes.querySelector('.alert-message'),
|
||||
cancel = nodes.nextElementSibling.querySelector('.btn'),
|
||||
config = this.parseConfig(input);
|
||||
|
||||
if (typeof(config) == 'string') {
|
||||
error.firstChild.data = _('Cannot parse configuration: %s').format(config);
|
||||
error.style.display = 'block';
|
||||
return;
|
||||
}
|
||||
|
||||
if (mode == 'client') {
|
||||
var prv = s.formvalue(s.section, 'private_key');
|
||||
|
||||
if (prv && prv != config.interface_privatekey && !confirm(_('Overwrite the current settings with the imported configuration?')))
|
||||
return;
|
||||
|
||||
return getPublicAndPrivateKeyFromPrivate(config.interface_privatekey).then(function(keypair) {
|
||||
s.getOption('private_key').getUIElement(s.section).setValue(keypair.priv);
|
||||
s.getOption('public_key').getUIElement(s.section).setValue(keypair.pub);
|
||||
s.getOption('listen_port').getUIElement(s.section).setValue(config.interface_listenport || '');
|
||||
s.getOption('addresses').getUIElement(s.section).setValue(config.interface_address);
|
||||
|
||||
if (config.interface_dns) {
|
||||
s.getOption('peerdns').getUIElement(s.section).setValue('0');
|
||||
s.getOption('dns').getUIElement(s.section).setValue(config.interface_dns);
|
||||
}
|
||||
|
||||
var sid = uci.add('network', 'wireguard_' + s.section);
|
||||
|
||||
uci.sections('network', 'wireguard_' + s.section, function(peer) {
|
||||
if (peer.public_key == config.peer_publickey)
|
||||
uci.remove('network', peer['.name']);
|
||||
});
|
||||
|
||||
uci.set('network', sid, 'description', comment || _('Imported peer configuration'));
|
||||
uci.set('network', sid, 'public_key', config.peer_publickey);
|
||||
uci.set('network', sid, 'preshared_key', config.peer_presharedkey);
|
||||
uci.set('network', sid, 'allowed_ips', config.peer_allowedips);
|
||||
uci.set('network', sid, 'persistent_keepalive', config.peer_persistentkeepalive);
|
||||
|
||||
if (config.peer_endpoint) {
|
||||
uci.set('network', sid, 'endpoint_host', config.peer_endpoint[0]);
|
||||
uci.set('network', sid, 'endpoint_port', config.peer_endpoint[1]);
|
||||
}
|
||||
|
||||
return s.map.save(null, true);
|
||||
}).then(function() {
|
||||
cancel.click();
|
||||
});
|
||||
}
|
||||
else {
|
||||
return getPublicAndPrivateKeyFromPrivate(config.interface_privatekey).then(function(keypair) {
|
||||
var sid = uci.add('network', 'wireguard_' + s.section);
|
||||
|
||||
uci.sections('network', 'wireguard_' + s.section, function(peer) {
|
||||
if (peer.public_key == keypair.pub)
|
||||
uci.remove('network', peer['.name']);
|
||||
});
|
||||
|
||||
uci.set('network', sid, 'description', comment || _('Imported peer configuration'));
|
||||
uci.set('network', sid, 'public_key', keypair.pub);
|
||||
uci.set('network', sid, 'private_key', keypair.priv);
|
||||
uci.set('network', sid, 'preshared_key', config.peer_presharedkey);
|
||||
uci.set('network', sid, 'allowed_ips', config.peer_allowedips);
|
||||
uci.set('network', sid, 'persistent_keepalive', config.peer_persistentkeepalive);
|
||||
|
||||
return s.map.save(null, true);
|
||||
}).then(function() {
|
||||
cancel.click();
|
||||
});
|
||||
}
|
||||
};
|
||||
|
||||
ss.handleConfigImport = function(mode) {
|
||||
var mapNode = ss.getActiveModalMap(),
|
||||
headNode = mapNode.parentNode.querySelector('h4'),
|
||||
parent = this.map;
|
||||
|
||||
var nodes = E('div', {
|
||||
'dragover': this.handleDragConfig,
|
||||
'drop': this.handleDropConfig.bind(this, mode)
|
||||
}, [
|
||||
E('p', _('To import a WireGuard client configuration, e.g. provided by a commercial VPN provider, drag the <em>*.conf</em> file or paste its contents into the text field below. The relevant settings will be automatically extracted from the configuration.')),
|
||||
E('p', [
|
||||
E('textarea', {
|
||||
'placeholder': _('Paste or drag WireGuard configuration file…'),
|
||||
'style': 'height:5em;width:100%;white-space:pre'
|
||||
})
|
||||
]),
|
||||
E('div', {
|
||||
'class': 'alert-message',
|
||||
'style': 'display:none'
|
||||
}, [''])
|
||||
]);
|
||||
|
||||
mapNode.classList.add('hidden');
|
||||
mapNode.nextElementSibling.classList.add('hidden');
|
||||
|
||||
headNode.appendChild(E('span', [ ' » ', _('Import configuration') ]));
|
||||
mapNode.parentNode.appendChild(E([], [
|
||||
nodes,
|
||||
E('div', {
|
||||
'class': 'right'
|
||||
}, [
|
||||
E('button', {
|
||||
'class': 'btn',
|
||||
'click': function() {
|
||||
nodes.parentNode.removeChild(nodes.nextSibling);
|
||||
nodes.parentNode.removeChild(nodes);
|
||||
mapNode.classList.remove('hidden');
|
||||
mapNode.nextSibling.classList.remove('hidden');
|
||||
headNode.removeChild(headNode.lastChild);
|
||||
window.removeEventListener('dragover', handleWindowDragDropIgnore);
|
||||
window.removeEventListener('drop', handleWindowDragDropIgnore);
|
||||
}
|
||||
}, [ _('Cancel') ]),
|
||||
' ',
|
||||
E('button', {
|
||||
'class': 'btn primary',
|
||||
'click': ui.createHandlerFn(this, 'handleApplyConfig', mode, nodes, null)
|
||||
}, [ _('Import settings') ])
|
||||
])
|
||||
]));
|
||||
|
||||
window.addEventListener('dragover', handleWindowDragDropIgnore);
|
||||
window.addEventListener('drop', handleWindowDragDropIgnore);
|
||||
};
|
||||
|
||||
ss.renderSectionAdd = function(/* ... */) {
|
||||
var nodes = this.super('renderSectionAdd', arguments);
|
||||
|
||||
nodes.appendChild(E('button', {
|
||||
'class': 'btn',
|
||||
'click': ui.createHandlerFn(this, 'handleConfigImport', 'peer')
|
||||
}, [ _('Import peer configuration…') ]));
|
||||
|
||||
return nodes;
|
||||
};
|
||||
|
||||
ss.renderSectionPlaceholder = function() {
|
||||
return E('em', _('No peers defined yet.'));
|
||||
};
|
||||
|
||||
o = ss.option(form.Flag, 'disabled', _('Peer disabled'), _('Enable / Disable peer. Restart wireguard interface to apply changes.'));
|
||||
o.modalonly = true;
|
||||
o.optional = true;
|
||||
o.editable = true;
|
||||
|
||||
o = ss.option(form.Value, 'description', _('Description'), _('Optional. Description of peer.'));
|
||||
o.placeholder = 'My Peer';
|
||||
o.datatype = 'string';
|
||||
o.optional = true;
|
||||
o.width = '30%';
|
||||
o.textvalue = function(section_id) {
|
||||
var dis = ss.getOption('disabled'),
|
||||
pub = ss.getOption('public_key'),
|
||||
prv = ss.getOption('private_key'),
|
||||
psk = ss.getOption('preshared_key'),
|
||||
name = this.cfgvalue(section_id),
|
||||
key = pub.cfgvalue(section_id);
|
||||
|
||||
o = ss.option(form.Value, 'description', _('QR-Code'));
|
||||
o.modalonly = true;
|
||||
o.render = L.bind(function (view, section_id) {
|
||||
var sections = uci.sections('network');
|
||||
var client = findSection(sections, section_id);
|
||||
var serverName = this.getIfname();
|
||||
var server = findSection(sections, serverName);
|
||||
|
||||
var interfaceTexts = [
|
||||
'PrivateKey: ' + _('A random, on the fly generated "PrivateKey", the key will not be saved on the router')
|
||||
];
|
||||
|
||||
var peerTexts = [
|
||||
'PublicKey: ' + _('The "PublicKey" of that wg interface'),
|
||||
'AllowedIPs: ' + _('The list of this client\'s "AllowedIPs" or "0.0.0.0/0, ::/0" if not configured'),
|
||||
'PresharedKey: ' + _('If available, the client\'s "PresharedKey"')
|
||||
];
|
||||
|
||||
var description = [
|
||||
E('span', [
|
||||
_('If there are any unsaved changes for this client, please save the configuration before generating a QR-Code'),
|
||||
E('br'),
|
||||
_('The QR-Code works per wg interface, it will be refreshed with every button click and transfers the following information:')
|
||||
]),
|
||||
E('ul', [
|
||||
generateDescription('[Interface]', interfaceTexts),
|
||||
generateDescription('[Peer]', peerTexts)
|
||||
var desc = [
|
||||
E('p', [
|
||||
name ? E('span', [ name ]) : E('em', [ _('Untitled peer') ])
|
||||
])
|
||||
];
|
||||
|
||||
return E('div', { 'class': 'cbi-value' }, [
|
||||
E('label', { 'class': 'cbi-value-title' }, _('QR-Code')),
|
||||
E('div', {
|
||||
'class': 'cbi-value-field',
|
||||
'style': 'display: flex; flex-direction: column; align-items: baseline;',
|
||||
'id': 'qr-' + section_id
|
||||
if (dis.cfgvalue(section_id) == '1')
|
||||
desc.push(E('span', {
|
||||
'class': 'ifacebadge',
|
||||
'data-tooltip': _('WireGuard peer is disabled')
|
||||
}, [
|
||||
E('button', {
|
||||
'class': 'btn cbi-button cbi-button-apply',
|
||||
'click': ui.createHandlerFn(this, function (server, client, section_id) {
|
||||
var qrDiv = document.getElementById('qr-' + section_id);
|
||||
var qrEl = qrDiv.querySelector('value');
|
||||
var qrBtn = qrDiv.querySelector('button');
|
||||
var qrencodeErr = '<b>%q</b>'.format(
|
||||
_('For QR-Code support please install the qrencode package!'));
|
||||
E('em', [ _('Disabled', 'Label indicating that WireGuard peer is disabled') ])
|
||||
]), ' ');
|
||||
|
||||
if (qrEl.innerHTML != '' && qrEl.innerHTML != qrencodeErr) {
|
||||
qrEl.innerHTML = '';
|
||||
qrBtn.innerHTML = _('Generate New QR-Code')
|
||||
} else {
|
||||
qrEl.innerHTML = _('Loading QR-Code...');
|
||||
if (!key || !pub.isValid(section_id)) {
|
||||
desc.push(E('span', {
|
||||
'class': 'ifacebadge',
|
||||
'data-tooltip': _('Public key is missing')
|
||||
}, [
|
||||
E('em', [ _('Key missing', 'Label indicating that WireGuard peer lacks public key') ])
|
||||
]));
|
||||
}
|
||||
else {
|
||||
desc.push(
|
||||
E('span', {
|
||||
'class': 'ifacebadge',
|
||||
'data-tooltip': _('Public key: %h', 'Tooltip displaying full WireGuard peer public key').format(key)
|
||||
}, [
|
||||
E('code', [ key.replace(/^(.{5}).+(.{6})$/, '$1…$2') ])
|
||||
]),
|
||||
' ',
|
||||
(prv.cfgvalue(section_id) && prv.isValid(section_id))
|
||||
? E('span', {
|
||||
'class': 'ifacebadge',
|
||||
'data-tooltip': _('Private key present')
|
||||
}, [ _('Private', 'Label indicating that WireGuard peer private key is stored') ]) : '',
|
||||
' ',
|
||||
(psk.cfgvalue(section_id) && psk.isValid(section_id))
|
||||
? E('span', {
|
||||
'class': 'ifacebadge',
|
||||
'data-tooltip': _('Preshared key in use')
|
||||
}, [ _('PSK', 'Label indicating that WireGuard peer uses a PSK') ]) : ''
|
||||
);
|
||||
}
|
||||
|
||||
generateQrCode(server.private_key, client.preshared_key,
|
||||
client.allowed_ips).then(function (qrCode) {
|
||||
if (qrCode == '') {
|
||||
qrEl.innerHTML = qrencodeErr;
|
||||
} else {
|
||||
qrEl.innerHTML = qrCode;
|
||||
qrBtn.innerHTML = _('Hide QR-Code');
|
||||
}
|
||||
});
|
||||
}
|
||||
}, server, client, section_id)
|
||||
}, _('Generate new QR-Code')),
|
||||
E('value', {
|
||||
'class': 'cbi-section',
|
||||
'style': 'margin: 0;'
|
||||
}),
|
||||
E('div', { 'class': 'cbi-value-description' }, description)
|
||||
])
|
||||
]);
|
||||
}, this);
|
||||
return E([], desc);
|
||||
};
|
||||
|
||||
o = ss.option(form.Value, 'public_key', _('Public Key'), _('Required. Base64-encoded public key of peer.'));
|
||||
function handleKeyChange(ev, section_id, value) {
|
||||
var prv = this.section.getUIElement(section_id, 'private_key'),
|
||||
btn = this.map.findElement('.btn.qr-code');
|
||||
|
||||
btn.disabled = (!prv.isValid() || !prv.getValue());
|
||||
}
|
||||
|
||||
o = ss.option(form.Value, 'public_key', _('Public Key'), _('Required. Public key of the WireGuard peer.'));
|
||||
o.modalonly = true;
|
||||
o.validate = validateBase64;
|
||||
o.rmempty = false;
|
||||
o.onchange = handleKeyChange;
|
||||
|
||||
o = ss.option(form.Value, 'private_key', _('Private Key'), _('Optional. Private key of the WireGuard peer. The key is not required for establishing a connection but allows generating a peer configuration or QR code if available. It can be removed after the configuration has been exported.'));
|
||||
o.modalonly = true;
|
||||
o.validate = validateBase64;
|
||||
o.onchange = handleKeyChange;
|
||||
o.password = true;
|
||||
|
||||
o = ss.option(cbiKeyPairGenerate, '_gen_peer_keypair', ' ');
|
||||
o.modalonly = true;
|
||||
|
||||
o = ss.option(form.Value, 'preshared_key', _('Preshared Key'), _('Optional. Base64-encoded preshared key. Adds in an additional layer of symmetric-key cryptography for post-quantum resistance.'));
|
||||
o.modalonly = true;
|
||||
o.password = true;
|
||||
o.validate = validateBase64;
|
||||
o.optional = true;
|
||||
o.password = true;
|
||||
|
||||
o = ss.option(form.Button, 'generate_key', _('Generate Key'));
|
||||
o.inputstyle = 'apply';
|
||||
o.onclick = ui.createHandlerFn(this, function (section_id, ev, peer_id) {
|
||||
return generatePsk().then(function (psk) {
|
||||
var keyInput = document.getElementById('widget.cbid.network.%s.preshared_key'.format(peer_id)),
|
||||
changeEvent = new Event('change');
|
||||
o = ss.option(form.DummyValue, '_gen_psk', ' ');
|
||||
o.modalonly = true;
|
||||
o.cfgvalue = function(section_id, value) {
|
||||
return E('button', {
|
||||
'class': 'btn',
|
||||
'click': ui.createHandlerFn(this, function(section_id, ev) {
|
||||
var psk = this.section.getUIElement(section_id, 'preshared_key'),
|
||||
map = this.map;
|
||||
|
||||
keyInput.value = psk;
|
||||
keyInput.dispatchEvent(changeEvent);
|
||||
});
|
||||
}, s.section);
|
||||
if (psk.getValue() && !confirm(_('Do you want to replace the current PSK?')))
|
||||
return;
|
||||
|
||||
return generatePsk().then(function(key) {
|
||||
psk.setValue(key);
|
||||
map.save(null, true);
|
||||
});
|
||||
}, section_id)
|
||||
}, [ _('Generate preshared key') ]);
|
||||
};
|
||||
|
||||
o = ss.option(form.DynamicList, 'allowed_ips', _('Allowed IPs'), _("Optional. IP addresses and prefixes that this peer is allowed to use inside the tunnel. Usually the peer's tunnel IP addresses and the networks the peer routes through the tunnel."));
|
||||
o.datatype = 'ipaddr';
|
||||
o.optional = true;
|
||||
o.textvalue = function(section_id) {
|
||||
var ips = L.toArray(this.cfgvalue(section_id)),
|
||||
list = [];
|
||||
|
||||
for (var i = 0; i < ips.length; i++) {
|
||||
if (i > 7) {
|
||||
list.push(E('em', {
|
||||
'class': 'ifacebadge cbi-tooltip-container'
|
||||
}, [
|
||||
_('+ %d more', 'Label indicating further amount of allowed ips').format(ips.length - i),
|
||||
E('span', {
|
||||
'class': 'cbi-tooltip'
|
||||
}, [
|
||||
E('ul', ips.map(function(ip) {
|
||||
return E('li', [
|
||||
E('span', { 'class': 'ifacebadge' }, [ ip ])
|
||||
]);
|
||||
}))
|
||||
])
|
||||
]));
|
||||
|
||||
break;
|
||||
}
|
||||
|
||||
list.push(E('span', { 'class': 'ifacebadge' }, [ ips[i] ]));
|
||||
}
|
||||
|
||||
if (!list.length)
|
||||
list.push('*');
|
||||
|
||||
return E('span', { 'style': 'display:inline-flex;flex-wrap:wrap;gap:.125em' }, list);
|
||||
};
|
||||
|
||||
o = ss.option(form.Flag, 'route_allowed_ips', _('Route Allowed IPs'), _('Optional. Create routes for Allowed IPs for this peer.'));
|
||||
o.modalonly = true;
|
||||
|
@ -301,8 +624,21 @@ return network.registerProtocol('wireguard', {
|
|||
o = ss.option(form.Value, 'endpoint_host', _('Endpoint Host'), _('Optional. Host of peer. Names are resolved prior to bringing up the interface.'));
|
||||
o.placeholder = 'vpn.example.com';
|
||||
o.datatype = 'host';
|
||||
o.textvalue = function(section_id) {
|
||||
var host = this.cfgvalue(section_id),
|
||||
port = this.section.cfgvalue(section_id, 'endpoint_port');
|
||||
|
||||
return (host && port)
|
||||
? '%h:%d'.format(host, port)
|
||||
: (host
|
||||
? '%h:*'.format(host)
|
||||
: (port
|
||||
? '*:%d'.format(port)
|
||||
: '*'));
|
||||
};
|
||||
|
||||
o = ss.option(form.Value, 'endpoint_port', _('Endpoint Port'), _('Optional. Port of peer.'));
|
||||
o.modalonly = true;
|
||||
o.placeholder = '51820';
|
||||
o.datatype = 'port';
|
||||
|
||||
|
@ -310,6 +646,171 @@ return network.registerProtocol('wireguard', {
|
|||
o.modalonly = true;
|
||||
o.datatype = 'range(0,65535)';
|
||||
o.placeholder = '0';
|
||||
|
||||
|
||||
|
||||
o = ss.option(form.DummyValue, '_keyops', _('Configuration Export'),
|
||||
_('Generates a configuration suitable for import on a WireGuard peer'));
|
||||
|
||||
o.modalonly = true;
|
||||
|
||||
o.createPeerConfig = function(section_id, endpoint) {
|
||||
var pub = s.formvalue(s.section, 'public_key'),
|
||||
port = s.formvalue(s.section, 'listen_port') || '51820',
|
||||
prv = this.section.formvalue(section_id, 'private_key'),
|
||||
psk = this.section.formvalue(section_id, 'preshared_key'),
|
||||
ips = L.toArray(this.section.formvalue(section_id, 'allowed_ips')),
|
||||
eport = this.section.formvalue(section_id, 'endpoint_port'),
|
||||
keep = this.section.formvalue(section_id, 'persistent_keepalive');
|
||||
|
||||
return [
|
||||
'[Interface]',
|
||||
'PrivateKey = ' + prv,
|
||||
eport ? 'ListenPort = ' + eport : '# ListenPort not defined',
|
||||
'',
|
||||
'[Peer]',
|
||||
'PublicKey = ' + pub,
|
||||
psk ? 'PresharedKey = ' + psk : '# PresharedKey not used',
|
||||
'AllowedIPs = ' + (ips.length ? ips.join(', ') : '0.0.0.0/0, ::/0'),
|
||||
endpoint ? 'Endpoint = ' + endpoint + ':' + port : '# Endpoint not defined',
|
||||
keep ? 'PersistentKeepAlive = ' + keep : '# PersistentKeepAlive not defined'
|
||||
].join('\n');
|
||||
};
|
||||
|
||||
o.handleGenerateQR = function(section_id, ev) {
|
||||
var mapNode = ss.getActiveModalMap(),
|
||||
headNode = mapNode.parentNode.querySelector('h4'),
|
||||
configGenerator = this.createPeerConfig.bind(this, section_id),
|
||||
parent = this.map;
|
||||
|
||||
return Promise.all([
|
||||
network.getWANNetworks(),
|
||||
network.getWAN6Networks(),
|
||||
uci.load('ddns'),
|
||||
uci.load('system'),
|
||||
parent.save(null, true)
|
||||
]).then(function(data) {
|
||||
var hostnames = [];
|
||||
|
||||
uci.sections('ddns', 'service', function(s) {
|
||||
if (typeof(s.domain) == 'string' && s.enabled == '1')
|
||||
hostnames.push(s.domain);
|
||||
});
|
||||
|
||||
uci.sections('system', 'system', function(s) {
|
||||
if (typeof(s.hostname) == 'string' && s.hostname.indexOf('.') > 0)
|
||||
hostnames.push(s.hostname);
|
||||
});
|
||||
|
||||
for (var i = 0; i < data[0].length; i++)
|
||||
hostnames.push.apply(hostnames, data[0][i].getIPAddrs().map(function(ip) { return ip.split('/')[0] }));
|
||||
|
||||
for (var i = 0; i < data[1].length; i++)
|
||||
hostnames.push.apply(hostnames, data[1][i].getIP6Addrs().map(function(ip) { return ip.split('/')[0] }));
|
||||
|
||||
|
||||
var qrm, qrs, qro;
|
||||
|
||||
qrm = new form.JSONMap({ endpoint: { endpoint: hostnames[0] } }, null, _('The generated configuration can be imported into a WireGuard client application to setup a connection towards this device.'));
|
||||
qrm.parent = parent;
|
||||
|
||||
qrs = qrm.section(form.NamedSection, 'endpoint');
|
||||
|
||||
qro = qrs.option(form.Value, 'endpoint', _('Connection endpoint'), _('The public hostname or IP address of this system the peer should connect to. This usually is a static public IP address, a static hostname or a DDNS domain.'));
|
||||
qro.datatype = 'or(ipaddr,hostname)';
|
||||
hostnames.forEach(function(hostname) { qro.value(hostname) });
|
||||
qro.onchange = function(ev, section_id, value) {
|
||||
var code = this.map.findElement('.qr-code'),
|
||||
conf = this.map.findElement('.client-config');
|
||||
|
||||
if (this.isValid(section_id)) {
|
||||
conf.firstChild.data = configGenerator(value);
|
||||
code.style.opacity = '.5';
|
||||
|
||||
invokeQREncode(conf.firstChild.data, code);
|
||||
}
|
||||
};
|
||||
|
||||
qro = qrs.option(form.DummyValue, 'output');
|
||||
qro.renderWidget = function() {
|
||||
var peer_config = configGenerator(hostnames[0]);
|
||||
|
||||
var node = E('div', {
|
||||
'style': 'display:flex;flex-wrap:wrap;align-items:center;gap:.5em;width:100%'
|
||||
}, [
|
||||
E('div', {
|
||||
'class': 'qr-code',
|
||||
'style': 'width:320px;flex:0 1 320px;text-align:center'
|
||||
}, [
|
||||
E('em', { 'class': 'spinning' }, [ _('Generating QR code…') ])
|
||||
]),
|
||||
E('pre', {
|
||||
'class': 'client-config',
|
||||
'style': 'flex:1;white-space:pre;overflow:auto',
|
||||
'click': function(ev) {
|
||||
var sel = window.getSelection(),
|
||||
range = document.createRange();
|
||||
|
||||
range.selectNodeContents(ev.currentTarget);
|
||||
|
||||
sel.removeAllRanges();
|
||||
sel.addRange(range);
|
||||
}
|
||||
}, [ peer_config ])
|
||||
]);
|
||||
|
||||
invokeQREncode(peer_config, node.firstChild);
|
||||
|
||||
return node;
|
||||
};
|
||||
|
||||
return qrm.render().then(function(nodes) {
|
||||
mapNode.classList.add('hidden');
|
||||
mapNode.nextElementSibling.classList.add('hidden');
|
||||
|
||||
headNode.appendChild(E('span', [ ' » ', _('Generate configuration') ]));
|
||||
mapNode.parentNode.appendChild(E([], [
|
||||
nodes,
|
||||
E('div', {
|
||||
'class': 'right'
|
||||
}, [
|
||||
E('button', {
|
||||
'class': 'btn',
|
||||
'click': function() {
|
||||
nodes.parentNode.removeChild(nodes.nextSibling);
|
||||
nodes.parentNode.removeChild(nodes);
|
||||
mapNode.classList.remove('hidden');
|
||||
mapNode.nextSibling.classList.remove('hidden');
|
||||
headNode.removeChild(headNode.lastChild);
|
||||
}
|
||||
}, [ _('Back to peer configuration') ])
|
||||
])
|
||||
]));
|
||||
|
||||
if (!s.formvalue(s.section, 'listen_port')) {
|
||||
nodes.appendChild(E('div', { 'class': 'alert-message' }, [
|
||||
E('p', [
|
||||
_('No fixed interface listening port defined, peers might not be able to initiate connections to this WireGuard instance!')
|
||||
])
|
||||
]));
|
||||
}
|
||||
});
|
||||
});
|
||||
};
|
||||
|
||||
o.cfgvalue = function(section_id, value) {
|
||||
var privkey = this.section.cfgvalue(section_id, 'private_key');
|
||||
|
||||
return E('button', {
|
||||
'class': 'btn qr-code',
|
||||
'style': 'display:inline-flex;align-items:center;gap:.5em',
|
||||
'click': ui.createHandlerFn(this, 'handleGenerateQR', section_id),
|
||||
'disabled': privkey ? null : ''
|
||||
}, [
|
||||
Object.assign(E(qrIcon), { style: 'width:22px;height:22px' }),
|
||||
_('Generate configuration…')
|
||||
]);
|
||||
};
|
||||
},
|
||||
|
||||
deleteConfiguration: function() {
|
||||
|
|
|
@ -31,45 +31,6 @@ local methods = {
|
|||
return {keys = {priv = args.privkey, pub = pubkey}}
|
||||
end
|
||||
},
|
||||
generateQrCode = {
|
||||
args = {privkey = "privkey", psk = "psk", allowed_ips = {"allowed_ips"}},
|
||||
call = function(args)
|
||||
local qr_code
|
||||
|
||||
if fs.access("/usr/bin/qrencode") then
|
||||
local psk = args.psk
|
||||
local listen_port = args.listen_port
|
||||
local allowed_ips = args.allowed_ips
|
||||
|
||||
local pubkey = sys.exec("echo %s | wg pubkey 2>/dev/null" % util.shellquote(args.privkey)):sub(1, -2)
|
||||
local client_privkey = sys.exec("wg genkey 2>/dev/null"):sub(1, -2)
|
||||
|
||||
local iface_qr = {
|
||||
"[Interface]",
|
||||
"PrivateKey = " .. client_privkey,
|
||||
}
|
||||
|
||||
local peer_qr = {
|
||||
"[Peer]",
|
||||
"PublicKey = " .. pubkey,
|
||||
}
|
||||
|
||||
if not allowed_ips or next(allowed_ips) == nil then
|
||||
allowed_ips = {"0.0.0.0/0", "::/0"}
|
||||
end
|
||||
table.insert(peer_qr, "AllowedIPs = " .. table.concat(allowed_ips, ", "))
|
||||
|
||||
if psk then
|
||||
table.insert(peer_qr, "PresharedKey = " .. psk)
|
||||
end
|
||||
|
||||
qr_enc = table.concat(iface_qr, "\n") .. "\n\n" .. table.concat(peer_qr, "\n")
|
||||
qr_code = sys.exec("/usr/bin/qrencode --inline --8bit --type=SVG --output=- %s 2>/dev/null" % util.shellquote(qr_enc))
|
||||
end
|
||||
|
||||
return {qr_code = qr_code}
|
||||
end
|
||||
},
|
||||
getWgInstances = {
|
||||
call = function()
|
||||
local data = {}
|
||||
|
|
|
@ -1,12 +1,16 @@
|
|||
{
|
||||
"luci-proto-wireguard": {
|
||||
"description": "Grant access to LuCI Wireguard procedures",
|
||||
"read": {
|
||||
"file": {
|
||||
"/usr/bin/qrencode --inline --8bit --type=SVG --output=- -- *": [ "exec" ]
|
||||
}
|
||||
},
|
||||
"write": {
|
||||
"ubus": {
|
||||
"luci.wireguard": [
|
||||
"generateKeyPair",
|
||||
"getPublicAndPrivateKeyFromPrivate",
|
||||
"generateQrCode",
|
||||
"generatePsk"
|
||||
]
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue