-- Copyright 2008 Steven Barth -- Copyright 2016 Eric Luehrsen -- Copyright 2016 Dan Luedtke -- Licensed to the public under the Apache License 2.0. local m1, s1 local ena, mcf, lci, lsv local rlh, rpv, vld, nvd, eds, prt, tlm local ctl, dlk, dom, dty, lfq, wfq, exa local dp6, d64, pfx, qry, qrs local pro, tgr, rsc, rsn, ag2, stt local rpn, din, dfw local ucl = luci.model.uci.cursor() local valman = ucl:get_first("unbound", "unbound", "manual_conf") m1 = Map("unbound") s1 = m1:section(TypedSection, "unbound") s1.addremove = false s1.anonymous = true --LuCI, Unbound, or Not s1:tab("basic", translate("Basic"), translatef("

Unbound Basic Settings

\n" .. "Unbound (link)" .. " is a validating, recursive, and caching DNS resolver. " .. "UCI documentation can be found on " .. "github (link).", "https://www.unbound.net/", "https://github.com/openwrt/packages/blob/master/net/unbound/files/README.md")) if valman ~= "1" then -- Not in manual configuration mode; show UCI s1:tab("advanced", translate("Advanced"), translatef("

Unbound Advanced Settings

\n" .. "Domain manipulation, lookup protection, and workarounds for " .. "Unbound " .. " DNS resolver.", "https://www.unbound.net/")) s1:tab("DHCP", translate("DHCP"), translatef("

Unbound DHCP Settings

\n" .. "Link your DHCP server to " .. "Unbound " .. " DNS resolver.", "https://www.unbound.net/ ")) s1:tab("resource", translate("Resource"), translatef("

Unbound Resource Settings

\n" .. "Memory and protocol setttings for " .. "Unbound " .. " DNS resolver.", "https://www.unbound.net/")) end s1:tab("trigger", translate("Trigger"), translatef("

Unbound Event Trigger Settings

\n" .. "Start, reload, and save RFC5011 DNSKEY records for " .. "Unbound " .. " DNS resolver.", "https://www.unbound.net/")) --Basic Tab, unconditional pieces ena = s1:taboption("basic", Flag, "enabled", translate("Enable Unbound:"), translate("Enable the initialization scripts for Unbound")) ena.rmempty = false mcf = s1:taboption("basic", Flag, "manual_conf", translate("Manual Conf:"), translate("Skip UCI and use /etc/unbound/unbound.conf")) mcf.rmempty = false lci = s1:taboption("basic", Flag, "extended_luci", translate("Extended Tabs:"), translate("See detailed tabs for statistics, debug, and manual configuration")) lci.rmempty = false if valman ~= "1" then -- Not in manual configuration mode; show UCI --Basic Tab lsv = s1:taboption("basic", Flag, "localservice", translate("Local Service:"), translate("Accept queries only from local subnets")) lsv.rmempty = false vld = s1:taboption("basic", Flag, "validator", translate("Enable DNSSEC:"), translate("Enable the DNSSEC validator module")) vld.rmempty = false nvd = s1:taboption("basic", Flag, "validator_ntp", translate("DNSSEC NTP Fix:"), translate("Break the loop where DNSSEC needs NTP and NTP needs DNS")) nvd.rmempty = false nvd:depends({ validator = true }) d64 = s1:taboption("basic", Flag, "dns64", translate("Enable DNS64:"), translate("Enable the DNS64 module")) d64.rmempty = false pfx = s1:taboption("basic", Value, "dns64_prefix", translate("DNS64 Prefix:"), translate("Prefix for generated DNS64 addresses")) pfx.datatype = "ip6addr" pfx.placeholder = "64:ff9b::/96" pfx.optional = true pfx:depends({ dns64 = true }) qry = s1:taboption("basic", Flag, "query_minimize", translate("Query Minimize:"), translate("Break down query components for limited added privacy")) qry.rmempty = false qrs = s1:taboption("basic", Flag, "query_min_strict", translate("Strict Minimize:"), translate("Strict version of 'query minimize' but it can break DNS")) qrs.rmempty = false qrs:depends({ query_minimize = true }) prt = s1:taboption("basic", Value, "listen_port", translate("Listening Port:"), translate("Choose Unbounds listening port")) prt.datatype = "port" prt.rmempty = false --Avanced Tab din = s1:taboption("advanced", DynamicList, "domain_insecure", translate("Domain Insecure:"), translate("List domains to bypass checks of DNSSEC")) din:depends({ validator = true }) dfw = s1:taboption("advanced", DynamicList, "domain_forward", translate("Domain Forward:"), translate("List domains to simply forward to stub resolvers in /tmp/resolve.auto")) rlh = s1:taboption("advanced", Flag, "rebind_localhost", translate("Filter Localhost Rebind:"), translate("Protect against upstream response of 127.0.0.0/8")) rlh.rmempty = false rpv = s1:taboption("advanced", ListValue, "rebind_protection", translate("Filter Private Rebind:"), translate("Protect against upstream responses within local subnets")) rpv:value("0", translate("No Filter")) rpv:value("1", translate("Filter RFC1918/4193")) rpv:value("2", translate("Filter Entire Subnet")) rpv.rmempty = false rpn = s1:taboption("advanced", Value, "rebind_interface", translate("Rebind Network Filter:"), translate("Network subnets to filter from upstream responses")) rpn.template = "cbi/network_netlist" rpn.widget = "checkbox" rpn.rmempty = true rpn.cast = "string" rpn.nocreate = true rpn:depends({ rebind_protection = 2 }) rpn:depends({ rebind_protection = 3 }) --DHCP Tab dlk = s1:taboption("DHCP", ListValue, "dhcp_link", translate("DHCP Link:"), translate("Link to supported programs to load DHCP into DNS")) dlk:value("none", translate("No Link")) dlk:value("dnsmasq", "dnsmasq") dlk:value("odhcpd", "odhcpd") dlk.rmempty = false dp6 = s1:taboption("DHCP", Flag, "dhcp4_slaac6", translate("DHCPv4 to SLAAC:"), translate("Use DHCPv4 MAC to discover IP6 hosts SLAAC (EUI64)")) dp6.rmempty = false dp6:depends({ dhcp_link = "odhcpd" }) dom = s1:taboption("DHCP", Value, "domain", translate("Local Domain:"), translate("Domain suffix for this router and DHCP clients")) dom.placeholder = "lan" dom:depends({ dhcp_link = "none" }) dom:depends({ dhcp_link = "odhcpd" }) dty = s1:taboption("DHCP", ListValue, "domain_type", translate("Local Domain Type:"), translate("How to treat queries of this local domain")) dty:value("deny", translate("Ignored")) dty:value("refuse", translate("Refused")) dty:value("static", translate("Only Local")) dty:value("transparent", translate("Also Forwarded")) dty:depends({ dhcp_link = "none" }) dty:depends({ dhcp_link = "odhcpd" }) lfq = s1:taboption("DHCP", ListValue, "add_local_fqdn", translate("LAN DNS:"), translate("How to enter the LAN or local network router in DNS")) lfq:value("0", translate("No Entry")) lfq:value("1", translate("Hostname, Primary Address")) lfq:value("2", translate("Hostname, All Addresses")) lfq:value("3", translate("Host FQDN, All Addresses")) lfq:value("4", translate("Interface FQDN, All Addresses")) lfq:depends({ dhcp_link = "none" }) lfq:depends({ dhcp_link = "odhcpd" }) wfq = s1:taboption("DHCP", ListValue, "add_wan_fqdn", translate("WAN DNS:"), translate("Override the WAN side router entry in DNS")) wfq:value("0", translate("Use Upstream")) wfq:value("1", translate("Hostname, Primary Address")) wfq:value("2", translate("Hostname, All Addresses")) wfq:value("3", translate("Host FQDN, All Addresses")) wfq:value("4", translate("Interface FQDN, All Addresses")) wfq:depends({ dhcp_link = "none" }) wfq:depends({ dhcp_link = "odhcpd" }) exa = s1:taboption("DHCP", ListValue, "add_extra_dns", translate("Extra DNS:"), translate("Use extra DNS entries found in /etc/config/dhcp")) exa:value("0", translate("Ignore")) exa:value("1", translate("Include Network/Hostnames")) exa:value("2", translate("Advanced MX/SRV RR")) exa:value("3", translate("Advanced CNAME RR")) exa:depends({ dhcp_link = "none" }) exa:depends({ dhcp_link = "odhcpd" }) --TODO: dnsmasq needs to not reference resolve-file and get off port 53. --Resource Tuning Tab ctl = s1:taboption("resource", ListValue, "unbound_control", translate("Unbound Control App:"), translate("Enable access for unbound-control")) ctl.rmempty = false ctl:value("0", translate("No Remote Control")) ctl:value("1", translate("Local Host, No Encryption")) ctl:value("2", translate("Local Host, Encrypted")) ctl:value("3", translate("Local Subnet, Encrypted")) ctl:value("4", translate("Local Subnet, Static Encryption")) pro = s1:taboption("resource", ListValue, "protocol", translate("Recursion Protocol:"), translate("Chose the protocol recursion queries leave on")) pro:value("mixed", translate("IP4 and IP6")) pro:value("ip6_prefer", translate("IP6 Preferred")) pro:value("ip4_only", translate("IP4 Only")) pro:value("ip6_only", translate("IP6 Only")) pro.rmempty = false rsn = s1:taboption("resource", ListValue, "recursion", translate("Recursion Strength:"), translate("Recursion activity affects memory growth and CPU load")) rsn:value("aggressive", translate("Aggressive")) rsn:value("default", translate("Default")) rsn:value("passive", translate("Passive")) rsn.rmempty = false rsc = s1:taboption("resource", ListValue, "resource", translate("Memory Resource:"), translate("Use menu System/Processes to observe any memory growth")) rsc:value("large", translate("Large")) rsc:value("medium", translate("Medium")) rsc:value("small", translate("Small")) rsc:value("tiny", translate("Tiny")) rsc.rmempty = false eds = s1:taboption("resource", Value, "edns_size", translate("EDNS Size:"), translate("Limit extended DNS packet size")) eds.datatype = "and(uinteger,min(512),max(4096))" eds.rmempty = false tlm = s1:taboption("resource", Value, "ttl_min", translate("TTL Minimum:"), translate("Prevent excessively short cache periods")) tlm.datatype = "and(uinteger,min(0),max(600))" tlm.rmempty = false stt = s1:taboption("resource", Flag, "extended_stats", translate("Extended Statistics:"), translate("Extended statistics are printed from unbound-control")) stt.rmempty = false end --Trigger Tab, always unconditional ag2 = s1:taboption("trigger", Value, "root_age", translate("Root DSKEY Age:"), translate("Limit days between RFC5011 copies to reduce flash writes")) ag2.datatype = "and(uinteger,min(1),max(99))" ag2:value("3", "3") ag2:value("9", "9 ("..translate("default")..")") ag2:value("12", "12") ag2:value("24", "24") ag2:value("99", "99 ("..translate("never")..")") tgr = s1:taboption("trigger", Value, "trigger_interface", translate("Trigger Networks:"), translate("Networks that may trigger Unbound to reload (avoid wan6)")) tgr.template = "cbi/network_netlist" tgr.widget = "checkbox" tgr.rmempty = true tgr.cast = "string" tgr.nocreate = true function ena.cfgvalue(self, section) return luci.sys.init.enabled("unbound") and self.enabled or self.disabled end function ena.write(self, section, value) if value == "1" then luci.sys.init.enable("unbound") luci.sys.call("/etc/init.d/unbound start >/dev/null") else luci.sys.call("/etc/init.d/unbound stop >/dev/null") luci.sys.init.disable("unbound") end return Flag.write(self, section, value) end function m1.on_apply(self) function ena.validate(self, value) if value ~= "0" then luci.sys.call("/etc/init.d/unbound restart >/dev/null 2>&1") else luci.sys.call("/etc/init.d/unbound stop >/dev/null 2>&1") end end -- Restart Unbound with configuration and reload the page (some options hide) luci.http.redirect(luci.dispatcher.build_url("admin", "services", "unbound")) end return m1