81c2055a1c02a1483662c549aea8cbd25c4553e1
10 'require tools.widgets as widgets';
12 var callHostHints
, callDUIDHints
, callDHCPLeases
, CBILeaseStatus
, CBILease6Status
;
14 callHostHints
= rpc
.declare({
16 method
: 'getHostHints',
20 callDUIDHints
= rpc
.declare({
22 method
: 'getDUIDHints',
26 callDHCPLeases
= rpc
.declare({
28 method
: 'getDHCPLeases',
32 CBILeaseStatus
= form
.DummyValue
.extend({
33 renderWidget: function(section_id
, option_id
, cfgvalue
) {
35 E('h4', _('Active DHCP Leases')),
36 E('table', { 'id': 'lease_status_table', 'class': 'table' }, [
37 E('tr', { 'class': 'tr table-titles' }, [
38 E('th', { 'class': 'th' }, _('Hostname')),
39 E('th', { 'class': 'th' }, _('IPv4 address')),
40 E('th', { 'class': 'th' }, _('MAC address')),
41 E('th', { 'class': 'th' }, _('Lease time remaining'))
43 E('tr', { 'class': 'tr placeholder' }, [
44 E('td', { 'class': 'td' }, E('em', _('Collecting data...')))
51 CBILease6Status
= form
.DummyValue
.extend({
52 renderWidget: function(section_id
, option_id
, cfgvalue
) {
54 E('h4', _('Active DHCPv6 Leases')),
55 E('table', { 'id': 'lease6_status_table', 'class': 'table' }, [
56 E('tr', { 'class': 'tr table-titles' }, [
57 E('th', { 'class': 'th' }, _('Host')),
58 E('th', { 'class': 'th' }, _('IPv6 address')),
59 E('th', { 'class': 'th' }, _('DUID')),
60 E('th', { 'class': 'th' }, _('Lease time remaining'))
62 E('tr', { 'class': 'tr placeholder' }, [
63 E('td', { 'class': 'td' }, E('em', _('Collecting data...')))
70 function calculateNetwork(addr
, mask
) {
71 addr
= validation
.parseIPv4(String(addr
));
74 mask
= validation
.parseIPv4(network
.prefixToMask(+mask
));
76 mask
= validation
.parseIPv4(String(mask
));
78 if (addr
== null || mask
== null)
83 addr
[0] & (mask
[0] >>> 0 & 255),
84 addr
[1] & (mask
[1] >>> 0 & 255),
85 addr
[2] & (mask
[2] >>> 0 & 255),
86 addr
[3] & (mask
[3] >>> 0 & 255)
92 function getDHCPPools() {
93 return uci
.load('dhcp').then(function() {
94 let sections
= uci
.sections('dhcp', 'dhcp'),
95 tasks
= [], pools
= [];
97 for (var i
= 0; i
< sections
.length
; i
++) {
98 if (sections
[i
].ignore
== '1' || !sections
[i
].interface)
101 tasks
.push(network
.getNetwork(sections
[i
].interface).then(L
.bind(function(section_id
, net
) {
102 var cidr
= net
? (net
.getIPAddrs()[0] || '').split('/') : null;
104 if (cidr
&& cidr
.length
== 2) {
105 var net_mask
= calculateNetwork(cidr
[0], cidr
[1]);
108 section_id
: section_id
,
109 network
: net_mask
[0],
113 }, null, sections
[i
]['.name'])));
116 return Promise
.all(tasks
).then(function() {
122 function validateHostname(sid
, s
) {
123 if (s
== null || s
== '')
127 return _('Expecting: %s').format(_('valid hostname'));
129 var labels
= s
.replace(/^\*?\.?|\.$/g, '').split(/\./);
131 for (var i
= 0; i
< labels
.length
; i
++)
132 if (!labels
[i
].match(/^[a-z0-9_](?:[a-z0-9-]{0,61}[a-z0-9])?$/i))
133 return _('Expecting: %s').format(_('valid hostname'));
138 function validateAddressList(sid
, s
) {
139 if (s
== null || s
== '')
142 var m
= s
.match(/^\/(.+)\/$/),
143 names
= m
? m
[1].split(/\//) : [ s
];
145 for (var i
= 0; i
< names
.length
; i
++) {
146 var res
= validateHostname(sid
, names
[i
]);
155 function validateServerSpec(sid
, s
) {
156 if (s
== null || s
== '')
159 var m
= s
.match(/^(\/.*\/)?(.*)$/);
161 return _('Expecting: %s').format(_('valid hostname'));
163 if (m
[1] != '//' && m
[1] != '/#/') {
164 var res
= validateAddressList(sid
, m
[1]);
169 if (m
[2] == '' || m
[2] == '#')
172 // ipaddr%scopeid#srvport@source@interface#srcport
174 m
= m
[2].match(/^([0-9a-f:.]+)(?:%[^#@]+)?(?:#(\d+))?(?:@([0-9a-f:.]+)(?:@[^#]+)?(?:#(\d+))?)?$/);
177 return _('Expecting: %s').format(_('valid IP address'));
179 if (validation
.parseIPv4(m
[1])) {
180 if (m
[3] != null && !validation
.parseIPv4(m
[3]))
181 return _('Expecting: %s').format(_('valid IPv4 address'));
183 else if (validation
.parseIPv6(m
[1])) {
184 if (m
[3] != null && !validation
.parseIPv6(m
[3]))
185 return _('Expecting: %s').format(_('valid IPv6 address'));
188 return _('Expecting: %s').format(_('valid IP address'));
191 if ((m
[2] != null && +m
[2] > 65535) || (m
[4] != null && +m
[4] > 65535))
192 return _('Expecting: %s').format(_('valid port value'));
197 function validateMACAddr(pools
, sid
, s
) {
198 if (s
== null || s
== '')
201 var leases
= uci
.sections('dhcp', 'host'),
202 this_macs
= L
.toArray(s
).map(function(m
) { return m
.toUpperCase() });
204 for (var i
= 0; i
< pools
.length
; i
++) {
205 var this_net_mask
= calculateNetwork(this.section
.formvalue(sid
, 'ip'), pools
[i
].netmask
);
210 for (var j
= 0; j
< leases
.length
; j
++) {
211 if (leases
[j
]['.name'] == sid
|| !leases
[j
].ip
)
214 var lease_net_mask
= calculateNetwork(leases
[j
].ip
, pools
[i
].netmask
);
216 if (!lease_net_mask
|| this_net_mask
[0] != lease_net_mask
[0])
219 var lease_macs
= L
.toArray(leases
[j
].mac
).map(function(m
) { return m
.toUpperCase() });
221 for (var k
= 0; k
< lease_macs
.length
; k
++)
222 for (var l
= 0; l
< this_macs
.length
; l
++)
223 if (lease_macs
[k
] == this_macs
[l
])
224 return _('The MAC address %h is already used by another static lease in the same DHCP pool').format(this_macs
[l
]);
237 network
.getNetworks()
241 render: function(hosts_duids_pools
) {
242 var has_dhcpv6
= L
.hasSystemFeature('dnsmasq', 'dhcpv6') || L
.hasSystemFeature('odhcpd'),
243 hosts
= hosts_duids_pools
[0],
244 duids
= hosts_duids_pools
[1],
245 pools
= hosts_duids_pools
[2],
246 networks
= hosts_duids_pools
[3],
249 m
= new form
.Map('dhcp', _('DHCP and DNS'),
250 _('Dnsmasq is a lightweight <abbr title="Dynamic Host Configuration Protocol">DHCP</abbr> server and <abbr title="Domain Name System">DNS</abbr> forwarder.'));
252 s
= m
.section(form
.TypedSection
, 'dnsmasq');
258 s
.tab('general', _('General'));
259 s
.tab('devices', _('Devices & Ports'));
260 s
.tab('dnssecopt', _('DNSSEC'));
261 s
.tab('filteropts', _('Filter'));
262 s
.tab('forward', _('Forwards'));
263 s
.tab('limits', _('Limits'));
264 s
.tab('logging', _('Log'));
265 s
.tab('files', _('Resolv & Hosts Files'));
266 s
.tab('leases', _('Static Leases'));
267 s
.tab('hosts', _('Hostnames'));
268 s
.tab('ipsets', _('IP Sets'));
269 s
.tab('relay', _('Relay'));
270 s
.tab('srvhosts', _('SRV'));
271 s
.tab('mxhosts', _('MX'));
272 s
.tab('pxe_tftp', _('PXE/TFTP'));
274 s
.taboption('filteropts', form
.Flag
, 'domainneeded',
275 _('Domain required'),
276 _('Do not forward DNS queries without dots or domain parts.'));
278 s
.taboption('general', form
.Flag
, 'authoritative',
280 _('This is the only DHCP server in the local network.'));
282 s
.taboption('general', form
.Value
, 'local',
284 _('Never forward matching domains and subdomains, resolve from DHCP or hosts files only.'));
286 s
.taboption('general', form
.Value
, 'domain',
288 _('Local domain suffix appended to DHCP names and hosts file entries.'));
290 s
.taboption('general', form
.Flag
, 'expandhosts',
292 _('Add local domain suffix to names served from hosts files.'));
294 o
= s
.taboption('logging', form
.Flag
, 'logqueries',
296 _('Write received DNS queries to syslog.'));
299 o
= s
.taboption('logging', form
.Flag
, 'logdhcp',
300 _('Extra DHCP logging'),
301 _('Log all options sent to DHCP clients and the tags used to determine them.'));
304 o
= s
.taboption('logging', form
.Value
, 'logfacility',
306 _('Set log class/facility for syslog entries.'));
325 o
.value('-', _('stderr'));
327 o
= s
.taboption('forward', form
.DynamicList
, 'server',
328 _('DNS forwardings'),
329 _('List of upstream resolvers to forward queries to.'));
331 o
.placeholder
= '/example.org/10.1.2.3';
332 o
.validate
= validateServerSpec
;
334 o
= s
.taboption('general', form
.DynamicList
, 'address',
336 _('Resolve specified FQDNs to an IP.') + '<br />' +
337 _('Syntax: <code>/fqdn[/fqdn…]/[ipaddr]</code>.') + '<br />' +
338 _('<code>/#/</code> matches any domain. <code>/example.com/</code> returns NXDOMAIN.') + '<br />' +
339 _('<code>/example.com/#</code> returns NULL addresses (<code>0.0.0.0</code> and <code>::</code>) for example.com and its subdomains.'));
341 o
.placeholder
= '/router.local/router.lan/192.168.0.1';
343 o
= s
.taboption('general', form
.DynamicList
, 'ipset',
345 _('List of IP sets to populate with the IPs of DNS lookup results of the FQDNs also specified here.'));
347 o
.placeholder
= '/example.org/ipset,ipset6';
349 o
= s
.taboption('filteropts', form
.Flag
, 'rebind_protection',
350 _('Rebind protection'),
351 _('Discard upstream responses containing <a href="%s">RFC1918</a> addresses.').format('https://www.rfc-editor.org/rfc/rfc1918') + '<br />' +
352 _('Discard also upstream responses containing <a href="%s">RFC4193</a>, Link-Local and private IPv4-Mapped <a href="%s">RFC4291</a> IPv6 Addresses.').format('https://www.rfc-editor.org/rfc/rfc4193', 'https://www.rfc-editor.org/rfc/rfc4291'));
355 o
= s
.taboption('filteropts', form
.Flag
, 'rebind_localhost',
356 _('Allow localhost'),
357 _('Exempt <code>127.0.0.0/8</code> and <code>::1</code> from rebinding checks, e.g. for RBL services.'));
358 o
.depends('rebind_protection', '1');
360 o
= s
.taboption('filteropts', form
.DynamicList
, 'rebind_domain',
361 _('Domain whitelist'),
362 _('List of domains to allow RFC1918 responses for.'));
363 o
.depends('rebind_protection', '1');
365 o
.placeholder
= 'ihost.netflix.com';
366 o
.validate
= validateAddressList
;
368 o
= s
.taboption('filteropts', form
.Flag
, 'localservice',
369 _('Local service only'),
370 _('Accept DNS queries only from hosts whose address is on a local subnet.'));
374 o
= s
.taboption('devices', form
.Flag
, 'nonwildcard',
376 _('Bind dynamically to interfaces rather than wildcard address.'));
377 o
.default = o
.enabled
;
381 o
= s
.taboption('devices', widgets
.NetworkSelect
, 'interface',
382 _('Listen interfaces'),
383 _('Listen only on the specified interfaces, and loopback if not excluded explicitly.'));
387 o
= s
.taboption('devices', widgets
.NetworkSelect
, 'notinterface',
388 _('Exclude interfaces'),
389 _('Do not listen on the specified interfaces.'));
394 o
= s
.taboption('relay', form
.SectionValue
, '__relays__', form
.TableSection
, 'relay', null,
395 _('Relay DHCP requests elsewhere. OK: v4↔v4, v6↔v6. Not OK: v4↔v6, v6↔v4.')
396 + '<br />' + _('Note: you may also need a DHCP Proxy (currently unavailable) when specifying a non-standard Relay To port(<code>addr#port</code>).')
397 + '<br />' + _('You may add multiple unique Relay To on the same Listen addr.'));
405 ss
.nodescriptions
= true;
407 so
= ss
.option(form
.Value
, 'local_addr', _('Relay from'));
409 so
.datatype
= 'ipaddr';
411 for (var family
= 4; family
<= 6; family
+= 2) {
412 for (var i
= 0; i
< networks
.length
; i
++) {
413 if (networks
[i
].getName() != 'loopback') {
414 var addrs
= (family
== 6) ? networks
[i
].getIP6Addrs() : networks
[i
].getIPAddrs();
415 for (var j
= 0; j
< addrs
.length
; j
++) {
416 var addr
= addrs
[j
].split('/')[0];
417 so
.value(addr
, E([], [
419 widgets
.NetworkSelect
.prototype.renderIfaceBadge(networks
[i
]),
427 so
= ss
.option(form
.Value
, 'server_addr', _('Relay to address'));
430 so
.placeholder
= '192.168.10.1#535';
432 so
.validate = function(section
, value
) {
433 var m
= this.section
.formvalue(section
, 'local_addr'),
434 n
= this.section
.formvalue(section
, 'server_addr'),
438 return _('Both "Relay from" and "Relay to address" must be specified.');
442 if (p
.length
> 1 && !/^[0-9]+$/.test(p
[1]))
443 return _('Expected port number.');
447 if ((validation
.parseIPv6(m
) && validation
.parseIPv6(n
)) ||
448 validation
.parseIPv4(m
) && validation
.parseIPv4(n
))
451 return _('Address families of "Relay from" and "Relay to address" must match.')
456 so
= ss
.option(widgets
.NetworkSelect
, 'interface', _('Only accept replies via'));
459 so
.placeholder
= 'lan';
461 s
.taboption('files', form
.Flag
, 'readethers',
462 _('Use <code>/etc/ethers</code>'),
463 _('Read <code>/etc/ethers</code> to configure the DHCP server.'));
465 s
.taboption('files', form
.Value
, 'leasefile',
467 _('File to store DHCP lease information.'));
469 o
= s
.taboption('files', form
.Flag
, 'noresolv',
470 _('Ignore resolv file'));
473 o
= s
.taboption('files', form
.Value
, 'resolvfile',
475 _('File with upstream resolvers.'));
476 o
.depends('noresolv', '0');
477 o
.placeholder
= '/tmp/resolv.conf.d/resolv.conf.auto';
480 o
= s
.taboption('files', form
.Flag
, 'strictorder',
482 _('Query upstream resolvers in the order they appear in the resolv file.'));
485 o
= s
.taboption('files', form
.Flag
, 'nohosts',
486 _('Ignore <code>/etc/hosts</code>'));
489 o
= s
.taboption('files', form
.DynamicList
, 'addnhosts',
490 _('Additional hosts files'));
492 o
.placeholder
= '/etc/dnsmasq.hosts';
494 o
= s
.taboption('logging', form
.Flag
, 'quietdhcp',
495 _('Suppress logging'),
496 _('Suppress logging of the routine operation for the DHCP protocol.'));
498 o
.depends('logdhcp', '0');
500 o
= s
.taboption('general', form
.Flag
, 'sequential_ip',
501 _('Allocate IPs sequentially'),
502 _('Allocate IP addresses sequentially, starting from the lowest available address.'));
505 o
= s
.taboption('filteropts', form
.Flag
, 'boguspriv',
507 _('Do not forward reverse lookups for local networks.'));
508 o
.default = o
.enabled
;
510 s
.taboption('filteropts', form
.Flag
, 'filterwin2k',
511 _('Filter SRV/SOA service discovery'),
512 _('Filters SRV/SOA service discovery, to avoid triggering dial-on-demand links.') + '<br />' +
513 _('May prevent VoIP or other services from working.'));
515 o
= s
.taboption('filteropts', form
.Flag
, 'filter_aaaa',
516 _('Filter IPv6 AAAA records'),
517 _('Remove IPv6 addresses from the results and only return IPv4 addresses.') + '<br />' +
518 _('Can be useful if ISP has IPv6 nameservers but does not provide IPv6 routing.'));
521 o
= s
.taboption('filteropts', form
.Flag
, 'filter_a',
522 _('Filter IPv4 A records'),
523 _('Remove IPv4 addresses from the results and only return IPv6 addresses.'));
526 s
.taboption('filteropts', form
.Flag
, 'localise_queries',
527 _('Localise queries'),
528 _('Return answers to DNS queries matching the subnet from which the query was received if multiple IPs are available.'));
530 if (L
.hasSystemFeature('dnsmasq', 'dnssec')) {
531 o
= s
.taboption('dnssecopt', form
.Flag
, 'dnssec',
533 _('Validate DNS replies and cache DNSSEC data, requires upstream to support DNSSEC.'));
536 o
= s
.taboption('dnssecopt', form
.Flag
, 'dnsseccheckunsigned',
537 _('DNSSEC check unsigned'),
538 _('Verify unsigned domain responses really come from unsigned domains.'));
539 o
.default = o
.enabled
;
543 s
.taboption('filteropts', form
.Flag
, 'nonegcache',
544 _('No negative cache'),
545 _('Do not cache negative replies, e.g. for non-existent domains.'));
547 o
= s
.taboption('forward', form
.Value
, 'serversfile',
548 _('Additional servers file'),
549 _('File listing upstream resolvers, optionally domain-specific, e.g. <code>server=1.2.3.4</code>, <code>server=/domain/1.2.3.4</code>.'));
550 o
.placeholder
= '/etc/dnsmasq.servers';
552 o
= s
.taboption('general', form
.Flag
, 'allservers',
554 _('Query all available upstream resolvers.') + ' ' + _('First answer wins.'));
557 o
= s
.taboption('filteropts', form
.DynamicList
, 'bogusnxdomain',
558 _('IPs to override with NXDOMAIN'),
559 _('List of IP addresses to convert into NXDOMAIN responses.'));
561 o
.placeholder
= '64.94.110.11';
563 o
= s
.taboption('devices', form
.Value
, 'port',
564 _('DNS server port'),
565 _('Listening port for inbound DNS queries.'));
570 o
= s
.taboption('devices', form
.Value
, 'queryport',
572 _('Fixed source port for outbound DNS queries.'));
575 o
.placeholder
= _('any');
577 o
= s
.taboption('devices', form
.Value
, 'minport',
578 _('Minimum source port #'),
579 _('Min valid value %s.').format('<code>1024</code>') + ' ' + _('Useful for systems behind firewalls.'));
582 o
.placeholder
= 1024;
583 o
.depends('queryport', '');
585 o
= s
.taboption('devices', form
.Value
, 'maxport',
586 _('Maximum source port #'),
587 _('Max valid value %s.').format('<code>65535</code>') + ' ' + _('Useful for systems behind firewalls.'));
590 o
.placeholder
= 50000;
591 o
.depends('queryport', '');
593 o
= s
.taboption('limits', form
.Value
, 'dhcpleasemax',
594 _('Max. DHCP leases'),
595 _('Maximum allowed number of active DHCP leases.'));
597 o
.datatype
= 'uinteger';
600 o
= s
.taboption('limits', form
.Value
, 'ednspacket_max',
601 _('Max. EDNS0 packet size'),
602 _('Maximum allowed size of EDNS0 UDP packets.'));
604 o
.datatype
= 'uinteger';
605 o
.placeholder
= 1280;
607 o
= s
.taboption('limits', form
.Value
, 'dnsforwardmax',
608 _('Max. concurrent queries'),
609 _('Maximum allowed number of concurrent DNS queries.'));
611 o
.datatype
= 'uinteger';
614 o
= s
.taboption('limits', form
.Value
, 'cachesize',
615 _('Size of DNS query cache'),
616 _('Number of cached DNS entries, 10000 is maximum, 0 is no caching.'));
618 o
.datatype
= 'range(0,10000)';
621 o
= s
.taboption('limits', form
.Value
, 'min_cache_ttl',
623 _('Extend short TTL values to the seconds value given when caching them. Use with caution.') +
624 _(' (Max 1h == 3600)'));
628 o
= s
.taboption('limits', form
.Value
, 'max_cache_ttl',
630 _('Set a maximum seconds TTL value for entries in the cache.'));
632 o
.placeholder
= 3600;
634 o
= s
.taboption('pxe_tftp', form
.Flag
, 'enable_tftp',
635 _('Enable TFTP server'),
636 _('Enable the built-in single-instance TFTP server.'));
639 o
= s
.taboption('pxe_tftp', form
.Value
, 'tftp_root',
640 _('TFTP server root'),
641 _('Root directory for files served via TFTP. <em>Enable TFTP server</em> and <em>TFTP server root</em> turn on the TFTP server and serve files from <em>TFTP server root</em>.'));
642 o
.depends('enable_tftp', '1');
646 o
= s
.taboption('pxe_tftp', form
.Value
, 'dhcp_boot',
647 _('Network boot image'),
648 _('Filename of the boot image advertised to clients.'));
649 o
.depends('enable_tftp', '1');
651 o
.placeholder
= 'pxelinux.0';
653 /* PXE - https://openwrt.org/docs/guide-user/base-system/dhcp#booting_options */
654 o = s.taboption('pxe_tftp', form.SectionValue, '__pxe__', form.GridSection, 'boot', null,
655 _('Special <abbr title="Preboot eXecution Environment">PXE</abbr> boot options for Dnsmasq.'));
659 ss.modaltitle = _('Edit PXE/TFTP/BOOTP Host');
660 ss.nodescriptions = true;
662 so = ss.option(form.Value, 'filename',
664 _('Host requests this filename from the boot server.'));
666 so.placeholder = 'pxelinux.0';
668 so = ss.option(form.Value, 'servername',
670 _('The hostname of the boot server'));
672 so.placeholder = 'myNAS';
674 so = ss.option(form.Value, 'serveraddress',
676 _('The IP address of the boot server'));
678 so.placeholder = '192.168.1.2';
680 so = ss.option(form.DynamicList, 'dhcp_option',
682 _('Additional options to send to the below match tags.') + '<br />' +
683 _('%s means "the address of the system running dnsmasq".').format('<code>0.0.0.0</code>'));
685 so.placeholder = 'option:root-path,192.168.1.2:/data/netboot/root';
687 so = ss.option(form.Value, 'networkid',
689 _('Only DHCP Clients with this tag are sent this boot option.'));
693 so = ss.option(form.Flag, 'force',
695 _('Always send the chosen DHCP options. Sometimes needed, with e.g. PXELinux.'));
698 so = ss.option(form.Value, 'instance',
700 _('Dnsmasq instance to which this boot section is bound. If unspecified, the section is valid for all dnsmasq instances.'));
703 Object.values(L.uci.sections('dhcp', 'dnsmasq')).forEach(function(val, index) {
704 so.value(index, '%s (Domain: %s, Local: %s)'.format(index, val.domain || '?', val.local || '?'));
707 o = s.taboption('srvhosts', form.SectionValue, '__srvhosts__', form.TableSection, 'srvhost', null,
708 _('Bind service records to a domain name: specify the location of services. See <a href="%s">RFC2782</a>.').format('https://datatracker.ietf.org/doc/html/rfc2782')
709 + '<br />' + _('_service: _sip, _ldap, _imap, _stun, _xmpp-client, … . (Note: while _http is possible, no browsers support SRV records.)')
710 + '<br />' + _('_proto: _tcp, _udp, _sctp, _quic, … .')
711 + '<br />' + _('You may add multiple records for the same Target.')
712 + '<br />' + _('Larger weights (of the same prio) are given a proportionately higher probability of being selected.'));
721 so = ss.option(form.Value, 'srv', _('SRV'), _('Syntax: <code>_service._proto.example.com</code>.'));
723 so.datatype = 'hostname';
724 so.placeholder = '_sip._tcp.example.com';
726 so = ss.option(form.Value, 'target', _('Target'), _('CNAME or fqdn'));
728 so.datatype = 'hostname';
729 so.placeholder = 'sip.example.com';
731 so = ss.option(form.Value, 'port', _('Port'));
733 so.datatype = 'port';
734 so.placeholder = '5060';
736 so = ss.option(form.Value, 'class', _('Priority'), _('Ordinal: lower comes first.'));
738 so.datatype = 'range(0,65535)';
739 so.placeholder = '10';
741 so = ss.option(form.Value, 'weight', _('Weight'));
743 so.datatype = 'range(0,65535)';
744 so.placeholder = '50';
746 o = s.taboption('mxhosts', form.SectionValue, '__mxhosts__', form.TableSection, 'mxhost', null,
747 _('Bind service records to a domain name: specify the location of services.')
748 + '<br />' + _('You may add multiple records for the same domain.'));
756 ss.nodescriptions = true;
758 so = ss.option(form.Value, 'domain', _('Domain'));
760 so.datatype = 'hostname';
761 so.placeholder = 'example.com';
763 so = ss.option(form.Value, 'relay', _('Relay'));
765 so.datatype = 'hostname';
766 so.placeholder = 'relay.example.com';
768 so = ss.option(form.Value, 'pref', _('Priority'), _('Ordinal: lower comes first.'));
770 so.datatype = 'range(0,65535)';
771 so.placeholder = '0';
773 o = s.taboption('hosts', form.SectionValue, '__hosts__', form.GridSection, 'domain', null,
774 _('Hostnames are used to bind a domain name to an IP address. This setting is redundant for hostnames already configured with static leases, but it can be useful to rebind an FQDN.'));
782 so = ss.option(form.Value, 'name', _('Hostname'));
784 so.datatype = 'hostname';
786 so = ss.option(form.Value, 'ip', _('IP address'));
788 so.datatype = 'ipaddr';
792 Object.keys(hosts).forEach(function(mac) {
793 var addrs = L.toArray(hosts[mac].ipaddrs || hosts[mac].ipv4);
795 for (var i = 0; i < addrs.length; i++)
796 ipaddrs[addrs[i]] = hosts[mac].name || mac;
799 L.sortedKeys(ipaddrs, null, 'addr').forEach(function(ipv4) {
800 so.value(ipv4, '%s (%s)'.format(ipv4, ipaddrs[ipv4]));
803 o = s.taboption('ipsets', form.SectionValue, '__ipsets__', form.GridSection, 'ipset', null,
804 _('List of IP sets to populate with the IPs of DNS lookup results of the FQDNs also specified here.') + '<br />' +
805 _('The netfilter components below are only regarded when running fw4.'));
813 ss.nodescriptions = true;
814 ss.modaltitle = _('Edit IP set');
816 so = ss.option(form.DynamicList, 'name', _('Name of the set'));
819 so.datatype = 'string';
821 so = ss.option(form.DynamicList, 'domain', _('FQDN'));
824 so.datatype = 'hostname';
826 so = ss.option(form.Value, 'table', _('Netfilter table name'), _('Defaults to fw4.'));
828 so.placeholder = 'fw4';
831 so = ss.option(form.ListValue, 'table_family', _('Table IP family'), _('Defaults to IPv4+6.') + ' ' + _('Can be hinted by adding 4 or 6 to the name.') + '<br />' +
832 _('Adding an IPv6 to an IPv4 set and vice-versa silently fails.'));
835 so.value('inet', _('IPv4+6'));
836 so.value('ip', _('IPv4'));
837 so.value('ip6', _('IPv6'));
839 o = s.taboption('leases', form.SectionValue, '__leases__', form.GridSection, 'host', null,
840 _('Static leases are used to assign fixed IP addresses and symbolic hostnames to DHCP clients. They are also required for non-dynamic interface configurations where only hosts with a corresponding lease are served.') + '<br />' +
841 _('Use the <em>Add</em> Button to add a new lease entry. The <em>MAC address</em> identifies the host, the <em>IPv4 address</em> specifies the fixed address to use, and the <em>Hostname</em> is assigned as a symbolic name to the requesting host. The optional <em>Lease time</em> can be used to set non-standard host-specific lease time, e.g. 12h, 3d or infinite.'));
849 so = ss.option(form.Value, 'name', _('Hostname'));
850 so.validate = validateHostname;
852 so.write = function(section, value) {
853 uci.set('dhcp', section, 'name', value);
854 uci.set('dhcp', section, 'dns', '1');
856 so.remove = function(section) {
857 uci.unset('dhcp', section, 'name');
858 uci.unset('dhcp', section, 'dns');
861 so = ss.option(form.Value, 'mac', _('MAC address'));
862 so.datatype = 'list(macaddr)';
864 so.cfgvalue = function(section) {
865 var macs = L.toArray(uci.get('dhcp', section, 'mac')),
868 for (var i = 0, mac; (mac = macs[i]) != null; i++)
869 if (/^([0-9a-fA-F]{1,2}):([0-9a-fA-F]{1,2}):([0-9a-fA-F]{1,2}):([0-9a-fA-F]{1,2}):([0-9a-fA-F]{1,2}):([0-9a-fA-F]{1,2})$/.test(mac))
870 result.push('%02X:%02X:%02X:%02X:%02X:%02X'.format(
871 parseInt(RegExp.$1, 16), parseInt(RegExp.$2, 16),
872 parseInt(RegExp.$3, 16), parseInt(RegExp.$4, 16),
873 parseInt(RegExp.$5, 16), parseInt(RegExp.$6, 16)));
875 return result.length ? result.join(' ') : null;
877 so.renderWidget = function(section_id, option_index, cfgvalue) {
878 var node = form.Value.prototype.renderWidget.apply(this, [section_id, option_index, cfgvalue]),
879 ipopt = this.section.children.filter(function(o) { return o.option == 'ip' })[0];
881 node.addEventListener('cbi-dropdown-change', L.bind(function(ipopt, section_id, ev) {
882 var mac = ev.detail.value.value;
883 if (mac == null || mac == '' || !hosts[mac])
886 var iphint = L.toArray(hosts[mac].ipaddrs || hosts[mac].ipv4)[0];
890 var ip = ipopt.formvalue(section_id);
891 if (ip != null && ip != '')
894 var node = ipopt.map.findElement('id', ipopt.cbid(section_id));
896 dom.callClassMethod(node, 'setValue', iphint);
897 }, this, ipopt, section_id));
901 so.validate = validateMACAddr.bind(so, pools);
902 Object.keys(hosts).forEach(function(mac) {
903 var hint = hosts[mac].name || L.toArray(hosts[mac].ipaddrs || hosts[mac].ipv4)[0];
904 so.value(mac, hint ? '%s (%s)'.format(mac, hint) : mac);
907 so = ss.option(form.Value, 'ip', _('IPv4 address'));
908 so.datatype = 'or(ip4addr,"ignore")';
909 so.validate = function(section, value) {
910 var m = this.section.formvalue(section, 'mac'),
911 n = this.section.formvalue(section, 'name');
913 if ((m && !m.length > 0) && !n)
914 return _('One of hostname or MAC address must be specified!');
916 if (!value || value == 'ignore')
919 var leases = uci.sections('dhcp', 'host');
921 for (var i = 0; i < leases.length; i++)
922 if (leases[i]['.name'] != section && leases[i].ip == value)
923 return _('The IP address %h is already used by another static lease').format(value);
925 for (var i = 0; i < pools.length; i++) {
926 var net_mask = calculateNetwork(value, pools[i].netmask);
928 if (net_mask && net_mask[0] == pools[i].network)
932 return _('The IP address is outside of any DHCP pool address range');
935 L.sortedKeys(ipaddrs, null, 'addr').forEach(function(ipv4) {
936 so.value(ipv4, ipaddrs[ipv4] ? '%s (%s)'.format(ipv4, ipaddrs[ipv4]) : ipv4);
939 so = ss.option(form.Value, 'leasetime', _('Lease time'));
942 so = ss.option(form.Value, 'duid', _('DUID'));
943 so.datatype = 'and(rangelength(20,36),hexstring)';
944 Object.keys(duids).forEach(function(duid) {
945 so.value(duid, '%s (%s)'.format(duid, duids[duid].hostname || duids[duid].macaddr || duids[duid].ip6addr || '?'));
948 so = ss.option(form.Value, 'hostid', _('IPv6 suffix (hex)'));
950 o = s.taboption('leases', CBILeaseStatus, '__status__');
953 o = s.taboption('leases', CBILease6Status, '__status6__');
955 return m.render().then(function(mapEl) {
956 poll.add(function() {
957 return callDHCPLeases().then(function(leaseinfo) {
958 var leases = Array.isArray(leaseinfo.dhcp_leases) ? leaseinfo.dhcp_leases : [],
959 leases6 = Array.isArray(leaseinfo.dhcp6_leases) ? leaseinfo.dhcp6_leases : [];
961 cbi_update_table(mapEl.querySelector('#lease_status_table'),
962 leases.map(function(lease) {
965 if (lease.expires === false)
966 exp = E('em', _('unlimited'));
967 else if (lease.expires <= 0)
968 exp = E('em', _('expired'));
970 exp = '%t'.format(lease.expires);
972 var hint = lease.macaddr ? hosts[lease.macaddr] : null,
973 name = hint ? hint.name : null,
976 if (name && lease.hostname && lease.hostname != name)
977 host = '%s (%s)'.format(lease.hostname, name);
978 else if (lease.hostname)
979 host = lease.hostname;
988 E('em', _('There are no active leases')));
991 cbi_update_table(mapEl.querySelector('#lease6_status_table'),
992 leases6.map(function(lease) {
995 if (lease.expires === false)
996 exp = E('em', _('unlimited'));
997 else if (lease.expires <= 0)
998 exp = E('em', _('expired'));
1000 exp = '%t'.format(lease.expires);
1002 var hint = lease.macaddr ? hosts[lease.macaddr] : null,
1003 name = hint ? (hint.name || L.toArray(hint.ipaddrs || hint.ipv4)[0] || L.toArray(hint.ip6addrs || hint.ipv6)[0]) : null,
1006 if (name && lease.hostname && lease.hostname != name && lease.ip6addr != name)
1007 host = '%s (%s)'.format(lease.hostname, name);
1008 else if (lease.hostname)
1009 host = lease.hostname;
1015 lease.ip6addrs ? lease.ip6addrs.join(' ') : lease.ip6addr,
1020 E('em', _('There are no active leases')));