Merge pull request #4047 from TDT-AG/pr/20200513-wireguard
luci-proto-wireguard: fix value validation
This commit is contained in:
commit
39861cc25d
1 changed files with 11 additions and 1 deletions
|
@ -10,6 +10,9 @@ function validateBase64(section_id, value) {
|
|||
if (value.length != 44 || !value.match(/^(?:[A-Za-z0-9+\/]{4})*(?:[A-Za-z0-9+\/]{2}==|[A-Za-z0-9+\/]{3}=)?$/))
|
||||
return _('Invalid Base64 key string');
|
||||
|
||||
if (value[43] != "=" )
|
||||
return _('Invalid Base64 key string');
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
|
@ -124,7 +127,14 @@ return network.registerProtocol('wireguard', {
|
|||
|
||||
o = ss.option(form.DynamicList, 'allowed_ips', _('Allowed IPs'), _("Required. IP addresses and prefixes that this peer is allowed to use inside the tunnel. Usually the peer's tunnel IP addresses and the networks the peer routes through the tunnel."));
|
||||
o.datatype = 'ipaddr';
|
||||
o.rmempty = false;
|
||||
o.validate = function(section, value) {
|
||||
var opt = this.map.lookupOption('allowed_ips', section);
|
||||
var ips = opt[0].formvalue(section);
|
||||
if (ips.length == 0) {
|
||||
return _('Value must not be empty');
|
||||
}
|
||||
return true;
|
||||
};
|
||||
|
||||
o = ss.option(form.Flag, 'route_allowed_ips', _('Route Allowed IPs'), _('Optional. Create routes for Allowed IPs for this peer.'));
|
||||
|
||||
|
|
Loading…
Reference in a new issue