Timotej Lazar
d123db4e64
I have tried every possible permutation and I think this is the one. NetBox-managed IP prefixes are pushed with ansible to firewall master. The managed prefixes are added to custom IP sets defined in the app, but only NAT addresses and VPN groups can be configured for them. This way all NAT and VPN policy is (again) configured in the app. Also both NetBox-managed and user-defined networks are treated the same. Also improve^Wtweak config generation. Also templates.
71 lines
1 KiB
HTML
71 lines
1 KiB
HTML
<!DOCTYPE html>
|
|
<html>
|
|
<meta charset="utf-8" />
|
|
|
|
<style>
|
|
body {
|
|
hyphens: auto;
|
|
max-width: 66em;
|
|
margin: 1em auto;
|
|
}
|
|
code {
|
|
background-color: #eeeeee;
|
|
}
|
|
details {
|
|
margin: 0.5em 1em;
|
|
}
|
|
details > summary {
|
|
cursor: pointer;
|
|
}
|
|
details > p {
|
|
margin: 0.5em;
|
|
}
|
|
h1 {
|
|
margin-bottom: 0.5em;
|
|
}
|
|
h1 > a {
|
|
color: unset;
|
|
text-decoration: none;
|
|
}
|
|
input:read-only {
|
|
border-style: dotted;
|
|
}
|
|
pre {
|
|
background-color: #eeeeee;
|
|
border: 1px solid black;
|
|
padding: 0.5em;
|
|
margin: 0;
|
|
}
|
|
th {
|
|
text-align: left;
|
|
}
|
|
th, td {
|
|
padding-right: 1em;
|
|
}
|
|
th {
|
|
border-bottom: 1px solid black;
|
|
}
|
|
ul.keys {
|
|
margin: 0 0.5em 0.5em;
|
|
padding-left: 1em;
|
|
}
|
|
ul.keys a {
|
|
text-decoration: none;
|
|
}
|
|
</style>
|
|
|
|
{% block header %}{% endblock %}
|
|
|
|
<title>FRIwall</title>
|
|
|
|
{% if current_user.is_authenticated %}
|
|
<div style="float:right;">
|
|
{{ current_user['username'] }} |
|
|
<a href="{{ url_for('logout') }}">Odjava</a>
|
|
</div>
|
|
{% endif %}
|
|
|
|
<h1><a href="/">FRIwall</a></h1>
|
|
|
|
{% block content %}{% endblock %}
|