summaryrefslogtreecommitdiff
path: root/client/client_test.go
AgeCommit message (Collapse)Author
2026-02-12All: Rename packages that sound useless or clash with stdJeroen Wijenbergh
2026-02-12All: Use eduoauth-go v2 and update other depsJeroen Wijenbergh
2025-12-15client: add Logger interface to give programs more controlSimon Ruderich
See https://codeberg.org/eduVPN/eduvpn-common/issues/102
2025-09-02All: Get rid of debug arg in RegisterJeroen Wijenbergh
2025-08-25All: Remove util packagesJeroen Wijenbergh
Was giving linting errors and it's not a good idea anyways
2025-05-06All: Run modernize --test --fixJeroen Wijenbergh
2024-11-21Replace all links from GitHub to Codebergjwijenbergh
2024-11-20FSM: Fix new keyword linting errorjwijenbergh
2024-07-17Client: Add test for getting ServerList in the main statejwijenbergh
2024-05-31Client Test: Fix error message with cause checkjwijenbergh
2024-05-24Client Test: Fix OpenVPN prefer TCP testsJeroen Wijenbergh
2024-05-08Server: Add a way to pass OAuth start timeJeroen Wijenbergh
2024-02-19All: Document everything to pass revive lintjwijenbergh
2024-02-19Client: Refactor to newest internal APIjwijenbergh
2023-09-25Client + l18n: Make some errors internal onlyjwijenbergh
2023-09-25Client + Exports + Python: Add a startup boolean to getconfigjwijenbergh
To be used for autoconnect on startup. If autoconnect on startup set to true This ignores any callbacks that require user input (profile, authorization & location callbacks)
2023-09-25Client Test: Only use temporary directoriesjwijenbergh
So that we do not clutter the filesystem without cleanup
2023-09-25Client Test: Remove OAuth parameter testsjwijenbergh
These are in the wrong place. Also they're now broken with the i18n custom error types. They should be implemented in the OAuth part of the code. This will be done in the separate OAuth repository that I am now building
2023-09-25Initial i18n implementationjwijenbergh
2023-09-25Refactor: Move client implementation to one filejwijenbergh
Much easier to oversee and it forces me to keep the client type as small as possible. This also uses the cookie for cancellation We also no longer require tokens inside arguments. We will later implement them with callbacks
2023-09-25Exports + Client: Refactor registering a clientjwijenbergh
- Make sure the global exports state is only set on successful creating - Only call discovery when adding a server to ensure we get the most up to date args. Creating a client should have no network calls. Fixes #12 - Split creating a client in New and Register in the GO api
2023-09-25Tests: Pass for V2 APIjwijenbergh
2023-03-01Client Test: Pass versionjwijenbergh
2023-02-16Format: Run gofumptjwijenbergh
2023-02-16HTTP: Incorporate util ensure valid url with clean pathjwijenbergh
2023-01-31Server: Add script-security 0 to the OpenVPN configjwijenbergh
This prevents scripts from being executed by default. Clients can override this by either using the OpenVPN --script-security flag or add a script-security setting themselves.
2023-01-31Client: Check if client ID is validjwijenbergh
2023-01-31Client Test: Fix construct URL argumentsjwijenbergh
2023-01-05Client Test: Fix prefer TCP suffix tests for arbitrary FQDNsjwijenbergh
2023-01-05Client Test: Fix config printjwijenbergh
2023-01-03Format: Run gofumptjwijenbergh
2022-12-21Linting: Fix config arguments and results + commentsjwijenbergh
2022-12-12simplify error handlingAleksandar Pesic
fixes #6 Signed-off-by: Aleksandar Pesic <peske.nis@gmail.com>
2022-11-28Formatting: Run golinesjwijenbergh
2022-11-28Formatting: Run gofumpt -wjwijenbergh
2022-11-28Refactor: Fix revive linter errors by deleting redundant prefixesjwijenbergh
2022-11-28OAuth: Refactor Token getting and do not save them in the configjwijenbergh
This commit refactors getting the tokens into receiver methods. This means that functions do not have to call the cryptic "EnsureTokens" method. The receiver getter then already verifier whether or not the tokens could be obtained (and refreshes too). The downside is that some things are now private, so testing for invalid tokens needs to be done somewhere else. This needs another patch such that clients can save the tokens themselves using a keyring.
2022-11-28Lint: Run godot fixjwijenbergh
Full command: golangci-lint run --disable-all -E godot --fix
2022-11-28Refactor: Remove most get prefixes for receiver functionsjwijenbergh
2022-11-25Client Test: Do not clash oauth name with packagejwijenbergh
2022-11-24Style: Use stylecheck and fix errorsjwijenbergh
2022-11-23FSM: Check unhandled transitionsjwijenbergh
2022-10-19Client Test: Fix selenium python script pathjwijenbergh
2022-10-18Client: Move to its own packagejwijenbergh