Revert monkey patch since it is not clear whether this is an issue at all.
This commit is contained in:
parent
94fbae4732
commit
4a98b26537
|
@ -58,8 +58,7 @@ func NewIPv4Addr(ipv4Str string) (IPv4Addr, error) {
|
|||
// Strip off any bogus hex-encoded netmasks that will be mis-parsed by Go. In
|
||||
// particular, clients with the Barracuda VPN client will see something like:
|
||||
// `192.168.3.51/00ffffff` as their IP address.
|
||||
// trailingHexNetmaskRe := trailingHexNetmaskRE.Copy()
|
||||
trailingHexNetmaskRe := regexp.MustCompile(`/([0f]{8})$`)
|
||||
trailingHexNetmaskRe := trailingHexNetmaskRE.Copy()
|
||||
if match := trailingHexNetmaskRe.FindStringIndex(ipv4Str); match != nil {
|
||||
ipv4Str = ipv4Str[:match[0]]
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue