+ %= dumper $rua_data ++ % } + % my $btn = l('rua_APPLY'); + + %= form_for "remoteuseraccessu" => (method => 'POST') => begin + % param 'trt' => $rua_data->{trt} unless param 'trt'; + %= hidden_field 'trt' => $rua_data->{trt} + %= hidden_field 'Selected' => $c->param('Selected') + %# Inputs etc in here. + +
+ %=l('rua_Enabling_bash_shell_access_for') +
+ ++ %=l('rua_Sudo_access_allows_users_to') +
+ ++ %=l('rua_SHELL,_VPN_&_FTP_access') +
+ ++ %=l('rua_Select_an_FTP_Chroot_path') +
+ ++ %=l('rua_Enter_the_public_SSH_Keys') +
+ +
+ %=l('rua_Account')
+
+ % param 'Account' => $rua_data->{Account} unless param 'Account';
+ %= text_field 'Account', size => '50', class => 'textinput Account' , pattern=>'.*' , placeholder=>'Account', title =>'Pattern regex mismatch', id => 'Account_text'
+
+ %=l('rua_User_Name')
+
+ % param 'User_Name' => $rua_data->{User_Name} unless param 'User_Name';
+ %= text_field 'User_Name', size => '50', class => 'textinput User_Name' , pattern=>'.*' , placeholder=>'User_Name', title =>'Pattern regex mismatch', id => 'User_Name_text'
+
+ %=l('rua_Shell_Access')
+
+ % my @Shell_options = [['' => ''], ['/bin/bash' => '/bin/bash']];
+ % param 'Shell' => $rua_data->{Shell} unless param 'Shell';
+ %= select_field 'Shell' => @Shell_options, class => 'input', id => 'Shell_select'
+
+ %=l('rua_Sudo_Access')
+
+ % my @Sudoer_options = [['No' => 'no'], ['Yes' => 'yes']];
+ % param 'Sudoer' => $rua_data->{Sudoer} unless param 'Sudoer';
+ %= select_field 'Sudoer' => @Sudoer_options, class => 'input', id => 'Sudoer_select'
+
+ %=l('rua_RSSH_+_VPN__ClientAccess')
+
+ % my @VPNClientAccess_options = [['No' => 'no'], ['Yes' => 'yes']];
+ % param 'VPNClientAccess' => $rua_data->{VPNClientAccess} unless param 'VPNClientAccess';
+ %= select_field 'VPNClientAccess' => @VPNClientAccess_options, class => 'input', id => 'VPNClientAccess_select'
+
+ %=l('rua_Select_Chroot_path')
+
+ % my @ChrootDir2_options = $c->get_chroot_dirs();
+ % param 'ChrootDir2' => $rua_data->{ChrootDir2} unless param 'ChrootDir2';
+ %= select_field 'ChrootDir2' => @ChrootDir2_options, class => 'input', id => 'ChrootDir2_select'
+
+ %=l('rua_ChrootDir')
+
+ % param 'ChrootDir' => $rua_data->{ChrootDir} unless param 'ChrootDir';
+ %= text_field 'ChrootDir', size => '50', class => 'textinput ChrootDir' , pattern=>'.*' , placeholder=>'ChrootDir', title =>'Pattern regex mismatch', id => 'ChrootDir_text'
+
+ %=l('rua_SSH_Keys')
+
+ % param 'ssh_keys' => $rua_data->{ssh_keys} unless param 'ssh_keys';
+ %= text_area 'ssh_keys', cols=>40, rows=>10
+
+ %= dumper $rua_data ++ % } + % my $btn = l('rua_APPLY'); + + % $c->param(Selected => undef); + + %= form_for "remoteuseraccessu" => (method => 'POST') => begin + % param 'trt' => $rua_data->{trt} unless param 'trt'; + %= hidden_field 'trt' => $rua_data->{trt} + %# Inputs etc in here. + +
<%=l('rua_Account')%> | +<%=l('rua_User_Name')%> | +<%=l('rua_Shell_Access')%> | +<%=l('rua_Sudo')%> | +<%=l('rua_SSH_Keys')%> | +<%=l('rua_Chroot_Path')%> | +<%=l('rua_RSSH_+_VPN_Access')%> | +<%=l('rua_Modify')%> | +
---|---|---|---|---|---|---|---|
<%=$c->render_to_string(inline=>$row->{'Account'})%> | +<%=$c->render_to_string(inline=>$row->{'User_Name'})%> | +<%=$c->render_to_string(inline=>$row->{'Shell_Access'})%> | +<%=$c->render_to_string(inline=>$row->{'Sudo'})%> | +<%=$c->render_to_string(inline=>$row->{'SSH_Keys'})%> | +<%=$c->render_to_string(inline=>$row->{'Chroot_Path'})%> | +<%=$c->render_to_string(inline=>$row->{'RSSH_+_VPN_Access'})%> | +<%=$c->render_to_string(inline=>$row->{'Modify'})%> | +
+ %= dumper $c->current_route + %= dumper $rua_data->{trt} ++ % } + +
+ %=$c->render_to_string(inline =>$c->l($c->stash('first'))) +
+ + %} elsif ($c->stash('success')) { ++ %= $c->l($c->stash('success')); +
++ %= $c->l($c->stash('error')); +
+