security/openconnect: support different protocols (#2512)

This commit is contained in:
Zixian Cai
2021-10-22 18:49:16 +11:00
committed by GitHub
parent 220fb4c8ea
commit 4df8b686f5
5 changed files with 29 additions and 3 deletions

View File

@@ -1,6 +1,5 @@
PLUGIN_NAME= openconnect
PLUGIN_VERSION= 1.4.0
PLUGIN_REVISION= 2
PLUGIN_VERSION= 1.4.1
PLUGIN_COMMENT= OpenConnect Client
PLUGIN_DEPENDS= openconnect
PLUGIN_MAINTAINER= m.muenz@gmail.com

View File

@@ -6,6 +6,10 @@ the Juniper SSL VPN which is now known as Pulse Connect Secure.
Plugin Changelog
================
1.4.1
* Allow selection of different protocols
1.4.0
* Add "pin-sha256" certificate hash

View File

@@ -47,4 +47,10 @@
<type>dropdown</type>
<help>Select the client certificate to use.</help>
</field>
<field>
<id>general.protocol</id>
<label>Protocl</label>
<type>dropdown</type>
<help>Select the protocol to use.</help>
</field>
</form>

View File

@@ -1,7 +1,7 @@
<model>
<mount>//OPNsense/openconnect/general</mount>
<description>Openconnect configuration</description>
<version>1.0.1</version>
<version>1.0.2</version>
<items>
<enabled type="BooleanField">
<default>0</default>
@@ -47,5 +47,19 @@
<Type>cert</Type>
<Required>N</Required>
</clientcertificate>
<protocol type="OptionField">
<default>anyconnect</default>
<multiple>N</multiple>
<Required>Y</Required>
<OptionValues>
<anyconnect>Cisco AnyConnect</anyconnect>
<nc>Juniper</nc>
<pulse>Pulse Connect Secure</pulse>
<gp>Palo Alto Networks GlobalProtect</gp>
<f5>F5 Big-IP</f5>
<fortinet>Fortinet Fortigate</fortinet>
<array>Array Networks AG</array>
</OptionValues>
</protocol>
</items>
</model>

View File

@@ -19,4 +19,7 @@ authgroup={{ OPNsense.openconnect.general.group }}
certificate=/usr/local/etc/openconnect_cert.pem
sslkey=/usr/local/etc/openconnect_key.pem
{% endif %}
{% if helpers.exists('OPNsense.openconnect.general.protocol') and OPNsense.openconnect.general.protocol != '' %}
protocol={{ OPNsense.openconnect.general.protocol }}
{% endif %}
{% endif %}