2020-04-07 17:45:16 +00:00
|
|
|
import base64
|
|
|
|
|
2020-04-03 17:27:49 +00:00
|
|
|
from django.contrib.auth import get_user_model
|
2020-04-07 17:45:16 +00:00
|
|
|
from django.utils.translation import gettext_lazy as _
|
2020-04-03 17:27:49 +00:00
|
|
|
from rest_framework import serializers
|
|
|
|
|
|
|
|
from .models import *
|
2020-12-13 12:28:43 +00:00
|
|
|
from .services import *
|
|
|
|
|
|
|
|
class WireGuardVPNSerializer(serializers.ModelSerializer):
|
2020-12-13 16:59:35 +00:00
|
|
|
address = serializers.CharField(read_only=True)
|
2020-12-13 17:05:48 +00:00
|
|
|
vpn_server = serializers.CharField(read_only=True)
|
|
|
|
vpn_server_public_key = serializers.CharField(read_only=True)
|
2020-12-13 16:59:35 +00:00
|
|
|
network_mask = serializers.IntegerField()
|
|
|
|
|
2020-12-13 12:28:43 +00:00
|
|
|
class Meta:
|
|
|
|
model = WireGuardVPN
|
2020-12-13 17:05:48 +00:00
|
|
|
fields = [ 'wireguard_public_key', 'address', 'network_mask', 'vpn_server',
|
|
|
|
'vpn_server_public_key' ]
|
2020-12-13 12:28:43 +00:00
|
|
|
|
2020-12-13 16:59:35 +00:00
|
|
|
extra_kwargs = {
|
|
|
|
'network_mask': {'write_only': True }
|
|
|
|
}
|
2020-04-12 20:55:22 +00:00
|
|
|
|
|
|
|
|
2020-12-20 18:37:12 +00:00
|
|
|
def validate_wireguard_public_key(self, value):
|
|
|
|
msg = _("Supplied key is not a valid wireguard public key")
|
2020-04-07 17:45:16 +00:00
|
|
|
|
2020-12-20 18:37:12 +00:00
|
|
|
"""
|
|
|
|
FIXME: verify that this does not create broken wireguard config files,
|
|
|
|
i.e. contains \n or similar!
|
|
|
|
We might even need to be more strict to not break wireguard...
|
|
|
|
"""
|
2020-04-07 17:45:16 +00:00
|
|
|
|
2020-12-20 18:37:12 +00:00
|
|
|
try:
|
|
|
|
base64.standard_b64decode(value)
|
|
|
|
except Exception as e:
|
|
|
|
raise serializers.ValidationError(msg)
|
2020-04-07 17:45:16 +00:00
|
|
|
|
2020-12-20 18:37:12 +00:00
|
|
|
if '\n' in value:
|
|
|
|
raise serializers.ValidationError(msg)
|
2020-04-07 17:45:16 +00:00
|
|
|
|
2020-12-20 18:37:12 +00:00
|
|
|
return value
|