diff options
author | Nicholaos Mouzourakis <nevumx@gmail.com> | 2023-04-19 00:24:00 -0400 |
---|---|---|
committer | Paul Donald <newtwen@gmail.com> | 2023-12-05 00:08:33 +0100 |
commit | 5b26887c52097dc9364c9b4f4dfb2d6ba2f08818 (patch) | |
tree | 9e0bbb273a5fedc8252c004716c0160605cbfbb0 /protocols/luci-proto-wireguard | |
parent | 85ad07c59ee3ab82ac5b55732201d17e6cc3ab9c (diff) |
Adding a DNS option to the wireguard peer config generator.
Some clients like iOS require this explicitly, and so this change
adds the appropriate config with some sensible defaults.
Closes #6351
Signed-off-by: Nicholaos Mouzourakis <nevumx@gmail.com>
Signed-off-by: Paul Donald <newtwen@gmail.com>
Tested-by: Paul Donald <newtwen@gmail.com>
(cherry picked from commit 990696d73f982de015df7c7d552daef1a03f50c5)
Diffstat (limited to 'protocols/luci-proto-wireguard')
-rw-r--r-- | protocols/luci-proto-wireguard/htdocs/luci-static/resources/protocol/wireguard.js | 22 |
1 files changed, 18 insertions, 4 deletions
diff --git a/protocols/luci-proto-wireguard/htdocs/luci-static/resources/protocol/wireguard.js b/protocols/luci-proto-wireguard/htdocs/luci-static/resources/protocol/wireguard.js index 387ada9003..d05acfbe79 100644 --- a/protocols/luci-proto-wireguard/htdocs/luci-static/resources/protocol/wireguard.js +++ b/protocols/luci-proto-wireguard/htdocs/luci-static/resources/protocol/wireguard.js @@ -686,7 +686,7 @@ return network.registerProtocol('wireguard', { o.modalonly = true; - o.createPeerConfig = function(section_id, endpoint, ips, eips) { + o.createPeerConfig = function(section_id, endpoint, ips, eips, dns) { var pub = s.formvalue(s.section, 'public_key'), port = s.formvalue(s.section, 'listen_port') || '51820', prv = this.section.formvalue(section_id, 'private_key'), @@ -704,6 +704,7 @@ return network.registerProtocol('wireguard', { 'PrivateKey = ' + prv, eips && eips.length ? 'Address = ' + eips.join(', ') : '# Address not defined', eport ? 'ListenPort = ' + eport : '# ListenPort not defined', + dns && dns.length ? 'DNS = ' + dns.join(', ') : '# DNS not defined', '', '[Peer]', 'PublicKey = ' + pub, @@ -724,6 +725,7 @@ return network.registerProtocol('wireguard', { return Promise.all([ network.getWANNetworks(), network.getWAN6Networks(), + network.getNetwork('lan'), L.resolveDefault(uci.load('ddns')), L.resolveDefault(uci.load('system')), parent.save(null, true) @@ -748,9 +750,19 @@ return network.registerProtocol('wireguard', { var ips = [ '0.0.0.0/0', '::/0' ]; + var dns = []; + + var lan = data[2]; + if (lan) { + var lanIp = lan.getIPAddr(); + if (lanIp) { + dns.unshift(lanIp) + } + } + var qrm, qrs, qro; - qrm = new form.JSONMap({ config: { endpoint: hostnames[0], allowed_ips: ips, addresses: eips } }, null, _('The generated configuration can be imported into a WireGuard client application to set up a connection towards this device.')); + qrm = new form.JSONMap({ config: { endpoint: hostnames[0], allowed_ips: ips, addresses: eips, dns_servers: dns } }, null, _('The generated configuration can be imported into a WireGuard client application to set up a connection towards this device.')); qrm.parent = parent; qrs = qrm.section(form.NamedSection, 'config'); @@ -761,9 +773,10 @@ return network.registerProtocol('wireguard', { endpoint = this.section.getUIElement(section_id, 'endpoint'), ips = this.section.getUIElement(section_id, 'allowed_ips'); eips = this.section.getUIElement(section_id, 'addresses'); + dns = this.section.getUIElement(section_id, 'dns_servers'); if (this.isValid(section_id)) { - conf.firstChild.data = configGenerator(endpoint.getValue(), ips.getValue(), eips.getValue()); + conf.firstChild.data = configGenerator(endpoint.getValue(), ips.getValue(), eips.getValue(), dns.getValue()); code.style.opacity = '.5'; invokeQREncode(conf.firstChild.data, code); @@ -784,12 +797,13 @@ return network.registerProtocol('wireguard', { qro = qrs.option(form.DynamicList, 'addresses', _('Addresses'), _('IP addresses for the peer to use inside the tunnel. Some clients require this setting.')); qro.datatype = 'ipaddr'; qro.default = eips; + qro.default = dns; eips.forEach(function(eip) { qro.value(eip) }); qro.onchange = handleConfigChange; qro = qrs.option(form.DummyValue, 'output'); qro.renderWidget = function() { - var peer_config = configGenerator(hostnames[0], ips, eips); + var peer_config = configGenerator(hostnames[0], ips, eips, dns); var node = E('div', { 'style': 'display:flex;flex-wrap:wrap;align-items:center;gap:.5em;width:100%' |