| Age | Commit message (Collapse) | Author | |
|---|---|---|---|
| 2024-05-24 | API + Client: Fix linting errors | jwijenbergh | |
| 2023-12-08 | API: Only check if scheme is https | jwijenbergh | |
| 2023-12-08 | OAuth: Remove ISS check | jwijenbergh | |
| Too many issues with upstream servers. Needs disco v3 changes | |||
| 2023-12-08 | Client + Server: Base the renew button 30 min window on OAuth start | jwijenbergh | |
| 2023-12-08 | Server: remove old, no longer relevant comment | jwijenbergh | |
| 2023-10-30 | Server Renew Button: Log warning when error and set default case to true | jwijenbergh | |
| 2023-10-25 | Format: Run Gofumpt | jwijenbergh | |
| 2023-10-11 | Exports + Server + Python: Expose dns_search_domains | jwijenbergh | |
| See: https://git.sr.ht/~fkooman/vpn-user-portal/commit/f22c736c28fafec19f44f0b70d2b372be93b0f8b Needed for Linux client | |||
| 2023-09-01 | Client + Server: Increase endpoint update frequency and update secure ↵ | jwijenbergh | |
| internet handling | |||
| 2023-08-29 | Server: Set OAuth endpoints on refresh | jwijenbergh | |
| This fixes OAuth endpoints after e.g. an update from 2.x to 3.x | |||
| 2023-04-18 | Client + Server: Set default secure internet location | jwijenbergh | |
| 2023-04-18 | Server Custom: Fix invalid wrap erorr | jwijenbergh | |
| 2023-04-18 | Client + Server: Implement a token updater callback | jwijenbergh | |
| 2023-02-28 | API + OAuth: Add some debug logging for tokens | jwijenbergh | |
| 2023-02-27 | Profile Test: format | jwijenbergh | |
| 2023-02-17 | Refactor: Improve some errors by using errors.New and add context | jwijenbergh | |
| 2023-02-16 | Server: Add test for profiles | jwijenbergh | |
| 2023-02-16 | Format: Run gofumpt | jwijenbergh | |
| 2023-02-16 | Server: Validate endpoints | jwijenbergh | |
| This commit validates the server endpoints by checking the Host and scheme of each URL to check if they match eachother. This is to prevent further mixup attacks | |||
| 2023-02-15 | Server: Remove 75% requirement on renew button | jwijenbergh | |
| 2023-01-31 | Server: Add script-security 0 to the OpenVPN config | jwijenbergh | |
| This prevents scripts from being executed by default. Clients can override this by either using the OpenVPN --script-security flag or add a script-security setting themselves. | |||
| 2023-01-13 | Server API: Set a lower timeout for disconnect | jwijenbergh | |
| 2023-01-10 | Client + Discovery: Implement further organizations expiry | jwijenbergh | |
| 2023-01-06 | Refactor: Re-use a HTTP client | jwijenbergh | |
| 2022-12-21 | Client + Exports: Forward tokens for /disconnect | jwijenbergh | |
| 2022-12-21 | Exports + OAuth + Server: Forward tokens to getting a config | jwijenbergh | |
| 2022-12-21 | Failover: Initial implementation | jwijenbergh | |
| 2022-12-21 | Server: Implement forcing WireGuard selection through env | jwijenbergh | |
| 2022-12-14 | Server: Fix revive lint error | jwijenbergh | |
| ``` internal/server/servers.go:51:9: indent-error-flow: if block ends with a return statement, so drop this else and outdent its block (move short variable declaration to its own line if necessary) (revive) } else { return srv, nil } ``` | |||
| 2022-12-12 | Format: Run gofumpt | jwijenbergh | |
| 2022-12-12 | Server + Exports: Rename and simplify GetCurrentProfileIndex | jwijenbergh | |
| 2022-12-12 | Server: Minor style changes | jwijenbergh | |
| 2022-12-12 | simplify error handling | Aleksandar Pesic | |
| fixes #6 Signed-off-by: Aleksandar Pesic <peske.nis@gmail.com> | |||
| 2022-11-28 | Server: Split more into multiple implementation files | jwijenbergh | |
| 2022-11-28 | Lint: Use gocritic linter and fix errors returned by it | jwijenbergh | |
| 2022-11-28 | Formatting: Run golines | jwijenbergh | |
| 2022-11-28 | Formatting: Run gofumpt -w | jwijenbergh | |
| 2022-11-28 | Refactor: Fix revive linter errors by deleting redundant prefixes | jwijenbergh | |
| 2022-11-28 | OAuth: Refactor Token getting and do not save them in the config | jwijenbergh | |
| This commit refactors getting the tokens into receiver methods. This means that functions do not have to call the cryptic "EnsureTokens" method. The receiver getter then already verifier whether or not the tokens could be obtained (and refreshes too). The downside is that some things are now private, so testing for invalid tokens needs to be done somewhere else. This needs another patch such that clients can save the tokens themselves using a keyring. | |||
| 2022-11-28 | Lint: Run godot fix | jwijenbergh | |
| Full command: golangci-lint run --disable-all -E godot --fix | |||
| 2022-11-28 | Refactor: Remove most get prefixes for receiver functions | jwijenbergh | |
| 2022-11-24 | Style: Use stylecheck and fix errors | jwijenbergh | |
| 2022-11-24 | Discovery + Server: Get rid of unused imports | jwijenbergh | |
| 2022-11-24 | Util: Get rid of current time helper | jwijenbergh | |
| Fixes #5 | |||
| 2022-11-14 | Client + Server: Refresh the endpoints before checking for a valid profile | jwijenbergh | |
| 2022-11-10 | Server: Re-initialize endpoints when getting a config | jwijenbergh | |
| 2022-10-24 | Client + Server + Exports: Implement optional WireGuard support | jwijenbergh | |
| 2022-10-19 | OAuth + Server: Fix ISS for secure internet | jwijenbergh | |
| The wrong base url was used. Use the one from the home server NOT the current location | |||
| 2022-10-19 | Refactor: Make errors use the parent's error level | jwijenbergh | |
| - All wrapped errors have to be created with types.NewWrappedError to inherit the error level from the parent - Or types.NewWrappedErrorLevel can be used which means a custom error level is given. For example this is done with cancelling OAuth - Client public errors are forwarded with handleError that also logs it with the error's level | |||
| 2022-10-19 | Discovery + Server: Remove unused 'Raw' strings | jwijenbergh | |
