mirror of
https://github.com/Ysurac/openmptcprouter-feeds.git
synced 2025-02-15 03:51:51 +00:00
83 lines
2.8 KiB
Lua
83 lines
2.8 KiB
Lua
local o = require "luci.dispatcher"
|
|
local fs = require "nixio.fs"
|
|
local jsonc = require "luci.jsonc"
|
|
|
|
local sessions = {}
|
|
local session_path = "/var/etc/xl2tpd/session"
|
|
if fs.access(session_path) then
|
|
for filename in fs.dir(session_path) do
|
|
local session_file = session_path .. "/" .. filename
|
|
local file = io.open(session_file, "r")
|
|
local t = jsonc.parse(file:read("*a"))
|
|
if t then
|
|
t.session_file = session_file
|
|
sessions[#sessions + 1] = t
|
|
end
|
|
file:close()
|
|
end
|
|
end
|
|
|
|
local blacklist = {}
|
|
local firewall_user_path = "/etc/firewall.user"
|
|
if fs.access(firewall_user_path) then
|
|
for line in io.lines(firewall_user_path) do
|
|
local m = line:match('xl2tpd%-blacklist%-([^\n]+)')
|
|
if m then
|
|
local t = {}
|
|
t.ip = m
|
|
blacklist[#blacklist + 1] = t
|
|
end
|
|
end
|
|
end
|
|
|
|
f = SimpleForm("processes")
|
|
f.reset = false
|
|
f.submit = false
|
|
|
|
t = f:section(Table, sessions, translate("L2TP Online Users"))
|
|
t:option(DummyValue, "username", translate("Username"))
|
|
t:option(DummyValue, "interface", translate("Interface"))
|
|
t:option(DummyValue, "ip", translate("Client IP"))
|
|
t:option(DummyValue, "remote_ip", translate("IP address"))
|
|
t:option(DummyValue, "login_time", translate("Login Time"))
|
|
|
|
_blacklist = t:option(Button, "_blacklist", translate("Blacklist"))
|
|
function _blacklist.render(e, t, a)
|
|
e.title = translate("Add to Blacklist")
|
|
e.inputstyle = "remove"
|
|
Button.render(e, t, a)
|
|
end
|
|
function _blacklist.write(t, s)
|
|
local e = t.map:get(s, "remote_ip")
|
|
luci.util.execi("echo 'iptables -I INPUT -s %s -p udp -m multiport --dports 500,4500,1701 -j DROP ## xl2tpd-blacklist-%s' >> /etc/firewall.user" % {e, e})
|
|
luci.util.execi("iptables -I INPUT -s %s -p udp -m multiport --dports 500,4500,1701 -j DROP" % {e})
|
|
luci.util.execi("rm -f " .. t.map:get(s, "session_file"))
|
|
null, t.tag_error[s] = luci.sys.process.signal(t.map:get(s, "pid"), 9)
|
|
luci.http.redirect(o.build_url("admin/vpn/ipsec-server/online"))
|
|
end
|
|
|
|
_kill = t:option(Button, "_kill", translate("Forced offline"))
|
|
_kill.inputstyle = "remove"
|
|
function _kill.write(t, s)
|
|
luci.util.execi("rm -f " .. t.map:get(s, "session_file"))
|
|
null, t.tag_error[t] = luci.sys.process.signal(t.map:get(s, "pid"), 9)
|
|
luci.http.redirect(o.build_url("admin/vpn/ipsec-server/online"))
|
|
end
|
|
|
|
t = f:section(Table, blacklist, translate("Blacklist"))
|
|
t:option(DummyValue, "ip", translate("IP address"))
|
|
|
|
_blacklist2 = t:option(Button, "_blacklist2", translate("Blacklist"))
|
|
function _blacklist2.render(e, t, a)
|
|
e.title = translate("Remove from Blacklist")
|
|
e.inputstyle = "apply"
|
|
Button.render(e, t, a)
|
|
end
|
|
function _blacklist2.write(t, s)
|
|
local e = t.map:get(s, "ip")
|
|
luci.util.execi("sed -i -e '/## xl2tpd-blacklist-%s/d' /etc/firewall.user" % {e})
|
|
luci.util.execi("iptables -D INPUT -s %s -p udp -m multiport --dports 500,4500,1701 -j DROP" % {e})
|
|
luci.http.redirect(o.build_url("admin/vpn/ipsec-server/online"))
|
|
end
|
|
|
|
return f
|