Pull request: 5208-dhcp-range
Merge in DNS/adguard-home from 5208-dhcp-range to master Closes #5208. Squashed commit of the following: commit b7bd646823545d5d1f3c42c5461ec65b874e2bbc Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Dec 6 18:55:03 2022 +0300 client: restore non-en locales commit 8e306201c2a35eccb525b84aef5d7e3aa54b5446 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Dec 6 18:45:51 2022 +0300 client: rm unused locales commit 087cf2e3fe48245686a7e9631afe5322323e5add Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Dec 6 18:25:54 2022 +0300 all: log changes commit f1f9d7908226e5ecce3a33d82f2ba32200f6af31 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Dec 6 18:23:06 2022 +0300 client: imp dhcp err msgs commit b9d8d7029756a9ee482c7c855f48b0ca6136e833 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Dec 6 15:44:44 2022 +0300 WIP
This commit is contained in:
@@ -77,11 +77,11 @@ export const validateNotInRange = (value, allValues) => {
|
||||
const { range_start, range_end } = allValues.v4;
|
||||
|
||||
if (range_start && validateIpv4(range_start)) {
|
||||
return 'form_error_ip4_range_start_format';
|
||||
return undefined;
|
||||
}
|
||||
|
||||
if (range_end && validateIpv4(range_end)) {
|
||||
return 'form_error_ip4_range_end_format';
|
||||
return undefined;
|
||||
}
|
||||
|
||||
const isAboveMin = range_start && ip4ToInt(value) >= ip4ToInt(range_start);
|
||||
@@ -94,14 +94,6 @@ export const validateNotInRange = (value, allValues) => {
|
||||
});
|
||||
}
|
||||
|
||||
if (!range_end && isAboveMin) {
|
||||
return 'lower_range_start_error';
|
||||
}
|
||||
|
||||
if (!range_start && isBelowMax) {
|
||||
return 'greater_range_end_error';
|
||||
}
|
||||
|
||||
return undefined;
|
||||
};
|
||||
|
||||
@@ -118,7 +110,7 @@ export const validateGatewaySubnetMask = (_, allValues) => {
|
||||
const { subnet_mask, gateway_ip } = allValues.v4;
|
||||
|
||||
if (validateIpv4(gateway_ip)) {
|
||||
return 'form_error_ip4_gateway_format';
|
||||
return 'gateway_or_subnet_invalid';
|
||||
}
|
||||
|
||||
return parseSubnetMask(subnet_mask) ? undefined : 'gateway_or_subnet_invalid';
|
||||
@@ -138,6 +130,10 @@ export const validateIpForGatewaySubnetMask = (value, allValues) => {
|
||||
gateway_ip, subnet_mask,
|
||||
} = allValues.v4;
|
||||
|
||||
if ((gateway_ip && validateIpv4(gateway_ip)) || (subnet_mask && validateIpv4(subnet_mask))) {
|
||||
return undefined;
|
||||
}
|
||||
|
||||
const subnetPrefix = parseSubnetMask(subnet_mask);
|
||||
|
||||
if (!isIpInCidr(value, `${gateway_ip}/${subnetPrefix}`)) {
|
||||
|
||||
Reference in New Issue
Block a user