149 lines
5.3 KiB
Lua
149 lines
5.3 KiB
Lua
local api = require "luci.model.cbi.passwall.api.api"
|
|
local appname = api.appname
|
|
local fs = api.fs
|
|
|
|
m = Map(appname)
|
|
|
|
-- [[ Delay Settings ]]--
|
|
s = m:section(TypedSection, "global_delay", translate("Delay Settings"))
|
|
s.anonymous = true
|
|
s.addremove = false
|
|
|
|
---- Delay Start
|
|
o = s:option(Value, "start_delay", translate("Delay Start"),
|
|
translate("Units:seconds"))
|
|
o.default = "1"
|
|
o.rmempty = true
|
|
|
|
---- Open and close Daemon
|
|
o = s:option(Flag, "start_daemon", translate("Open and close Daemon"))
|
|
o.default = 1
|
|
o.rmempty = false
|
|
|
|
--[[
|
|
---- Open and close automatically
|
|
o = s:option(Flag, "auto_on", translate("Open and close automatically"))
|
|
o.default = 0
|
|
o.rmempty = false
|
|
|
|
---- Automatically turn off time
|
|
o = s:option(ListValue, "time_off", translate("Automatically turn off time"))
|
|
o.default = nil
|
|
o:depends("auto_on", true)
|
|
o:value(nil, translate("Disable"))
|
|
for e = 0, 23 do o:value(e, e .. translate("oclock")) end
|
|
|
|
---- Automatically turn on time
|
|
o = s:option(ListValue, "time_on", translate("Automatically turn on time"))
|
|
o.default = nil
|
|
o:depends("auto_on", true)
|
|
o:value(nil, translate("Disable"))
|
|
for e = 0, 23 do o:value(e, e .. translate("oclock")) end
|
|
|
|
---- Automatically restart time
|
|
o = s:option(ListValue, "time_restart", translate("Automatically restart time"))
|
|
o.default = nil
|
|
o:depends("auto_on", true)
|
|
o:value(nil, translate("Disable"))
|
|
for e = 0, 23 do o:value(e, e .. translate("oclock")) end
|
|
--]]
|
|
|
|
-- [[ Forwarding Settings ]]--
|
|
s = m:section(TypedSection, "global_forwarding",
|
|
translate("Forwarding Settings"))
|
|
s.anonymous = true
|
|
s.addremove = false
|
|
|
|
---- TCP No Redir Ports
|
|
o = s:option(Value, "tcp_no_redir_ports", translate("TCP No Redir Ports"))
|
|
o.default = "disable"
|
|
o:value("disable", translate("No patterns are used"))
|
|
o:value("1:65535", translate("All"))
|
|
|
|
---- UDP No Redir Ports
|
|
o = s:option(Value, "udp_no_redir_ports", translate("UDP No Redir Ports"),
|
|
"<font color='red'>" .. translate(
|
|
"Fill in the ports you don't want to be forwarded by the agent, with the highest priority.") ..
|
|
"</font>")
|
|
o.default = "disable"
|
|
o:value("disable", translate("No patterns are used"))
|
|
o:value("1:65535", translate("All"))
|
|
|
|
---- TCP Proxy Drop Ports
|
|
o = s:option(Value, "tcp_proxy_drop_ports", translate("TCP Proxy Drop Ports"))
|
|
o.default = "disable"
|
|
o:value("disable", translate("No patterns are used"))
|
|
|
|
---- UDP Proxy Drop Ports
|
|
o = s:option(Value, "udp_proxy_drop_ports", translate("UDP Proxy Drop Ports"))
|
|
o.default = "80,443"
|
|
o:value("disable", translate("No patterns are used"))
|
|
o:value("80,443", translate("QUIC"))
|
|
|
|
---- TCP Redir Ports
|
|
o = s:option(Value, "tcp_redir_ports", translate("TCP Redir Ports"))
|
|
o.default = "22,25,53,143,465,587,853,993,995,80,443"
|
|
o:value("1:65535", translate("All"))
|
|
o:value("22,25,53,143,465,587,853,993,995,80,443", translate("Common Use"))
|
|
o:value("80,443", translate("Only Web"))
|
|
o:value("80:65535", "80 " .. translate("or more"))
|
|
o:value("1:443", "443 " .. translate("or less"))
|
|
|
|
---- UDP Redir Ports
|
|
o = s:option(Value, "udp_redir_ports", translate("UDP Redir Ports"))
|
|
o.default = "1:65535"
|
|
o:value("1:65535", translate("All"))
|
|
o:value("53", "DNS")
|
|
|
|
if os.execute("lsmod | grep -i REDIRECT >/dev/null") == 0 and os.execute("lsmod | grep -i TPROXY >/dev/null") == 0 then
|
|
o = s:option(ListValue, "tcp_proxy_way", translate("TCP Proxy Way"))
|
|
o.default = "redirect"
|
|
o:value("redirect", "REDIRECT")
|
|
o:value("tproxy", "TPROXY")
|
|
o:depends("ipv6_tproxy", false)
|
|
|
|
o = s:option(ListValue, "_tcp_proxy_way", translate("TCP Proxy Way"))
|
|
o.default = "tproxy"
|
|
o:value("tproxy", "TPROXY")
|
|
o:depends("ipv6_tproxy", true)
|
|
o.write = function(self, section, value)
|
|
return self.map:set(section, "tcp_proxy_way", value)
|
|
end
|
|
|
|
if os.execute("lsmod | grep -i ip6table_mangle >/dev/null") == 0 then
|
|
---- IPv6 TProxy
|
|
o = s:option(Flag, "ipv6_tproxy", translate("IPv6 TProxy"),
|
|
"<font color='red'>" .. translate(
|
|
"Experimental feature. Make sure that your node supports IPv6.") ..
|
|
"</font>")
|
|
o.default = 0
|
|
o.rmempty = false
|
|
end
|
|
end
|
|
|
|
o = s:option(Flag, "accept_icmp", translate("Hijacking ICMP (PING)"))
|
|
o.default = 0
|
|
|
|
o = s:option(Flag, "accept_icmpv6", translate("Hijacking ICMPv6 (IPv6 PING)"))
|
|
o:depends("ipv6_tproxy", true)
|
|
o.default = 0
|
|
|
|
o = s:option(Flag, "sniffing", translate("Sniffing (V2Ray/Xray)"), translate("When using the V2ray/Xray shunt, must be enabled, otherwise the shunt will invalid."))
|
|
o.default = 1
|
|
o.rmempty = false
|
|
|
|
o = s:option(Flag, "route_only", translate("Sniffing Route Only (Xray)"), translate("When enabled, the server not will resolve the domain name again."))
|
|
o.default = 0
|
|
o:depends("sniffing", true)
|
|
|
|
local domains_excluded = string.format("/usr/share/%s/rules/domains_excluded", appname)
|
|
o = s:option(TextValue, "no_sniffing_hosts", translate("No Sniffing Lists"), translate("Hosts added into No Sniffing Lists will not resolve again on server (Xray only)."))
|
|
o.rows = 15
|
|
o.wrap = "off"
|
|
o.cfgvalue = function(self, section) return fs.readfile(domains_excluded) or "" end
|
|
o.write = function(self, section, value) fs.writefile(domains_excluded, value:gsub("\r\n", "\n")) end
|
|
o.remove = function(self, section, value) fs.writefile(domains_excluded, "") end
|
|
o:depends({sniffing = true, route_only = false})
|
|
|
|
return m
|