| Age | Commit message (Collapse) | Author | |
|---|---|---|---|
| 2023-09-01 | Client + Server: Increase endpoint update frequency and update secure ↵ | jwijenbergh | |
| internet handling | |||
| 2023-08-29 | Server: Set OAuth endpoints on refresh | jwijenbergh | |
| This fixes OAuth endpoints after e.g. an update from 2.x to 3.x | |||
| 2023-04-18 | Client + Server: Set default secure internet location | jwijenbergh | |
| 2023-04-18 | Server Custom: Fix invalid wrap erorr | jwijenbergh | |
| 2023-04-18 | Client + Server: Implement a token updater callback | jwijenbergh | |
| 2023-02-28 | API + OAuth: Add some debug logging for tokens | jwijenbergh | |
| 2023-02-27 | Profile Test: format | jwijenbergh | |
| 2023-02-17 | Refactor: Improve some errors by using errors.New and add context | jwijenbergh | |
| 2023-02-16 | Server: Add test for profiles | jwijenbergh | |
| 2023-02-16 | Format: Run gofumpt | jwijenbergh | |
| 2023-02-16 | Server: Validate endpoints | jwijenbergh | |
| This commit validates the server endpoints by checking the Host and scheme of each URL to check if they match eachother. This is to prevent further mixup attacks | |||
| 2023-02-15 | Server: Remove 75% requirement on renew button | jwijenbergh | |
| 2023-01-31 | Server: Add script-security 0 to the OpenVPN config | jwijenbergh | |
| This prevents scripts from being executed by default. Clients can override this by either using the OpenVPN --script-security flag or add a script-security setting themselves. | |||
| 2023-01-13 | Server API: Set a lower timeout for disconnect | jwijenbergh | |
| 2023-01-10 | Client + Discovery: Implement further organizations expiry | jwijenbergh | |
| 2023-01-06 | Refactor: Re-use a HTTP client | jwijenbergh | |
| 2022-12-21 | Client + Exports: Forward tokens for /disconnect | jwijenbergh | |
| 2022-12-21 | Exports + OAuth + Server: Forward tokens to getting a config | jwijenbergh | |
| 2022-12-21 | Failover: Initial implementation | jwijenbergh | |
| 2022-12-21 | Server: Implement forcing WireGuard selection through env | jwijenbergh | |
| 2022-12-14 | Server: Fix revive lint error | jwijenbergh | |
| ``` internal/server/servers.go:51:9: indent-error-flow: if block ends with a return statement, so drop this else and outdent its block (move short variable declaration to its own line if necessary) (revive) } else { return srv, nil } ``` | |||
| 2022-12-12 | Format: Run gofumpt | jwijenbergh | |
| 2022-12-12 | Server + Exports: Rename and simplify GetCurrentProfileIndex | jwijenbergh | |
| 2022-12-12 | Server: Minor style changes | jwijenbergh | |
| 2022-12-12 | simplify error handling | Aleksandar Pesic | |
| fixes #6 Signed-off-by: Aleksandar Pesic <peske.nis@gmail.com> | |||
| 2022-11-28 | Server: Split more into multiple implementation files | jwijenbergh | |
| 2022-11-28 | Lint: Use gocritic linter and fix errors returned by it | jwijenbergh | |
| 2022-11-28 | Formatting: Run golines | jwijenbergh | |
| 2022-11-28 | Formatting: Run gofumpt -w | jwijenbergh | |
| 2022-11-28 | Refactor: Fix revive linter errors by deleting redundant prefixes | jwijenbergh | |
| 2022-11-28 | OAuth: Refactor Token getting and do not save them in the config | jwijenbergh | |
| This commit refactors getting the tokens into receiver methods. This means that functions do not have to call the cryptic "EnsureTokens" method. The receiver getter then already verifier whether or not the tokens could be obtained (and refreshes too). The downside is that some things are now private, so testing for invalid tokens needs to be done somewhere else. This needs another patch such that clients can save the tokens themselves using a keyring. | |||
| 2022-11-28 | Lint: Run godot fix | jwijenbergh | |
| Full command: golangci-lint run --disable-all -E godot --fix | |||
| 2022-11-28 | Refactor: Remove most get prefixes for receiver functions | jwijenbergh | |
| 2022-11-24 | Style: Use stylecheck and fix errors | jwijenbergh | |
| 2022-11-24 | Discovery + Server: Get rid of unused imports | jwijenbergh | |
| 2022-11-24 | Util: Get rid of current time helper | jwijenbergh | |
| Fixes #5 | |||
| 2022-11-14 | Client + Server: Refresh the endpoints before checking for a valid profile | jwijenbergh | |
| 2022-11-10 | Server: Re-initialize endpoints when getting a config | jwijenbergh | |
| 2022-10-24 | Client + Server + Exports: Implement optional WireGuard support | jwijenbergh | |
| 2022-10-19 | OAuth + Server: Fix ISS for secure internet | jwijenbergh | |
| The wrong base url was used. Use the one from the home server NOT the current location | |||
| 2022-10-19 | Refactor: Make errors use the parent's error level | jwijenbergh | |
| - All wrapped errors have to be created with types.NewWrappedError to inherit the error level from the parent - Or types.NewWrappedErrorLevel can be used which means a custom error level is given. For example this is done with cancelling OAuth - Client public errors are forwarded with handleError that also logs it with the error's level | |||
| 2022-10-19 | Discovery + Server: Remove unused 'Raw' strings | jwijenbergh | |
| 2022-10-17 | Client + Server: Delete tokens before attempting a login for renew | jwijenbergh | |
| 2022-10-17 | Server + Util: Ensure the base URL already ends with a / | jwijenbergh | |
| 2022-10-17 | OAuth: Implement Authorization Server Issuer Identification (ISS) | jwijenbergh | |
| - This patch implements ISS checking according to RFC 9207 https://datatracker.ietf.org/doc/html/rfc9207 - This tries to prevent so called "mix-up" attacks where the client is fooled into authorizing with an honest AS through a malicious entity | |||
| 2022-10-13 | Server API: Use default timeout for /disconnect | jwijenbergh | |
| 2022-10-13 | Format: Run gofumpt | jwijenbergh | |
| 2022-10-11 | Client + Server: Set the current institute / custom server on adding | jwijenbergh | |
| 2022-10-11 | Client: Refactor out adding a Server from getting a config | jwijenbergh | |
| 2022-10-04 | Server: Implement `prefer_tcp` according to spec | jwijenbergh | |
