summaryrefslogtreecommitdiff
path: root/internal/server/server.go
AgeCommit message (Collapse)Author
2026-02-12All: Rename packages that sound useless or clash with stdJeroen Wijenbergh
2025-05-06All: Remove ProxyGuard integrationJeroen Wijenbergh
This should be done in WireGuard-go or in case of a linux a small daemon
2024-11-21Replace all links from GitHub to Codebergjwijenbergh
2024-10-29All: Refactor to latest ProxyGuardjwijenbergh
2024-06-04Server: Fix comment regarding profilesjwijenbergh
2024-03-14Client + Server: Cache secure internet profile choice per locationjwijenbergh
2024-03-14All: Make WireGuard support mandatoryjwijenbergh
2024-03-07Client + Server: Add a way to obtain the cached profiles listjwijenbergh
2024-03-07Server: Remove obsolete TODOjwijenbergh
2024-02-19Server: Only return should failover if prefer TCP was false toojwijenbergh
2024-02-19All: Document everything to pass revive lintjwijenbergh
2024-02-19Format: Run gofumptjwijenbergh
2024-02-19API + Server: Support vpn_proto_transport_listjwijenbergh
2024-02-19Server: Refactor internal server package to use new state filejwijenbergh
This completely rewrites the internal server package. Some advantages: - Caches less - Uses a callback interface so that the client package does not get so convoluted - Introduce a new API package that only deals with the server API and uses github.com/jwijenbergh/eduoauth-go
2023-09-29Client + Server + OAuth: Support mobile redirectsjwijenbergh
2023-09-25Server: Have separate implementations for refreshing endpointsjwijenbergh
2023-09-25Server: Set OAuth endpoints on refreshjwijenbergh
This fixes OAuth endpoints after e.g. an update from 2.x to 3.x
2023-09-25Client + Exports + Python: Add a startup boolean to getconfigjwijenbergh
To be used for autoconnect on startup. If autoconnect on startup set to true This ignores any callbacks that require user input (profile, authorization & location callbacks)
2023-09-25Initial i18n implementationjwijenbergh
2023-09-25All: Implement a token handlerjwijenbergh
This implements a token handler for OAuth tokens. Clients can use the SetTokenHandler function in exports to set a token handler. It needs two arguments, a getter and a setter. The getter is a callback with three arguments: - The server to get the tokens for, in types.server.current as JSON - The output buffer - The output buffer maximum length The tokens should be written to the output buffer with maximum length. The type should be types.server.Tokens and be marshalled as JSON. If no tokens are available, leave the output buffer intact The token setter is a callback with two arguments: - The server for which to set the tokens for, in types.server.Current as JSON - The tokens, defined in types.server.Tokens as JSON Breaking changes: - No more tokens as arguments, was already deprecated in previous commits - Tokens are no longer returned in types.server.Configuration
2023-09-25Refactor: Split internal server into multiple packagesjwijenbergh
- Pass contexts - Have separate packages for e.g. custom, institute and secure - internet servers, profiles.... - Return types from the public ./types package with a Public() method
2023-09-25Exports + Python + Server: Remove ShouldRenewButtonjwijenbergh
This is replace with expiry times
2023-09-01Client + Server: Increase endpoint update frequency and update secure ↵jwijenbergh
internet handling
2023-08-29Server: Set OAuth endpoints on refreshjwijenbergh
This fixes OAuth endpoints after e.g. an update from 2.x to 3.x
2023-04-18Client + Server: Implement a token updater callbackjwijenbergh
2023-02-17Refactor: Improve some errors by using errors.New and add contextjwijenbergh
2023-02-16Format: Run gofumptjwijenbergh
2023-02-16Server: Validate endpointsjwijenbergh
This commit validates the server endpoints by checking the Host and scheme of each URL to check if they match eachother. This is to prevent further mixup attacks
2023-02-15Server: Remove 75% requirement on renew buttonjwijenbergh
2023-01-31Server: Add script-security 0 to the OpenVPN configjwijenbergh
This prevents scripts from being executed by default. Clients can override this by either using the OpenVPN --script-security flag or add a script-security setting themselves.
2022-12-21Client + Exports: Forward tokens for /disconnectjwijenbergh
2022-12-21Exports + OAuth + Server: Forward tokens to getting a configjwijenbergh
2022-12-21Failover: Initial implementationjwijenbergh
2022-12-21Server: Implement forcing WireGuard selection through envjwijenbergh
2022-12-12Server: Minor style changesjwijenbergh
2022-12-12simplify error handlingAleksandar Pesic
fixes #6 Signed-off-by: Aleksandar Pesic <peske.nis@gmail.com>
2022-11-28Server: Split more into multiple implementation filesjwijenbergh
2022-07-19Server: Split CustomServer and split types into multiple filesjwijenbergh
2022-07-18Server: Remove useless sugar to clear out Secure Internet statejwijenbergh
2022-07-18Server: Add ServerType and Identifier to marshalled display JSONjwijenbergh
2022-07-18All: Run Gofumpt formatterjwijenbergh
2022-07-18Server + State + Types: Return marshalled JSON for display informationjwijenbergh
2022-07-12State + Server: Ensure the current secure location is re-initializedjwijenbergh
2022-07-08Server: Remove unused error return value in ShouldRenewButtonjwijenbergh
2022-07-07Format: Run gofumptjwijenbergh
2022-07-05Refactor: Handling of different servers and identifiersjwijenbergh
- Uses OrgID for Secure Internet and gets the data from discovery - Uses URL for Institute/Custom and gets the data from discovery - Implements SKIP WAYF as we now have the needed data - Implements an initial change location with a default location (NL right now)
2022-06-21Server: Add the ability to get the saved serversjwijenbergh
2022-06-20Refactor: Errors to have one custom type that is to be wrappedjwijenbergh
- For this an `internal/types` package is created with a custom error type - This custom error type can give back the cause and traceback of an error
2022-09-20Server: Implement function for checking renewal button visibilityjwijenbergh