| Age | Commit message (Collapse) | Author | |
|---|---|---|---|
| 2026-02-12 | All: Rename packages that sound useless or clash with std | Jeroen Wijenbergh | |
| 2026-02-12 | All: Use eduoauth-go v2 and update other deps | Jeroen Wijenbergh | |
| 2025-08-29 | Discovery: Remove manager and DiscoveryStartup | Jeroen Wijenbergh | |
| 2025-08-29 | Discovery: Add cache argument and embed unmarshal on startup | Jeroen Wijenbergh | |
| 2025-08-25 | All: Remove util packages | Jeroen Wijenbergh | |
| Was giving linting errors and it's not a good idea anyways | |||
| 2025-05-06 | All: Move to log/slog | Jeroen Wijenbergh | |
| 2025-05-06 | All: Remove ProxyGuard integration | Jeroen Wijenbergh | |
| This should be done in WireGuard-go or in case of a linux a small daemon | |||
| 2024-11-21 | Replace all links from GitHub to Codeberg | jwijenbergh | |
| 2024-10-29 | All: Refactor to latest ProxyGuard | jwijenbergh | |
| 2024-07-18 | Server: Go to GettingConfig after InvalidProfile | jwijenbergh | |
| Could be we have just done OAuth and are in state main... | |||
| 2024-07-17 | Client + Server: Pass discovery manager and lock when needed | jwijenbergh | |
| 2024-07-17 | Client + Discovery: Fetch dscovery at startup using DiscoveryStartup | jwijenbergh | |
| With a manager that locks and copies such that no race conditions happen | |||
| 2024-07-17 | Client + API: Mark organizations expired *before* processing url | jwijenbergh | |
| 2024-06-06 | Discovery: Organization list cache updates | jwijenbergh | |
| 2024-06-04 | Server: Fix comment regarding profiles | jwijenbergh | |
| 2024-05-08 | Server: Add a way to pass OAuth start time | Jeroen Wijenbergh | |
| 2024-03-22 | Format: Run gofumpt | jwijenbergh | |
| 2024-03-14 | Client + Server: Cache secure internet profile choice per location | jwijenbergh | |
| 2024-03-14 | All: Make WireGuard support mandatory | jwijenbergh | |
| 2024-03-13 | Server: Log on remove after failed authorization error | jwijenbergh | |
| 2024-03-13 | Client + Server: Refactor adding a server by first adding then auth | jwijenbergh | |
| Otherwise we go to the main state after auth is done and the server is not yet added | |||
| 2024-03-07 | Client + Server: Add a way to obtain the cached profiles list | jwijenbergh | |
| 2024-03-07 | Server: Remove obsolete TODO | jwijenbergh | |
| 2024-02-19 | Server: Only return should failover if prefer TCP was false too | jwijenbergh | |
| 2024-02-19 | All: Document everything to pass revive lint | jwijenbergh | |
| 2024-02-19 | Format: Run gofumpt | jwijenbergh | |
| 2024-02-19 | API + Server: Support vpn_proto_transport_list | jwijenbergh | |
| 2024-02-19 | Server: Refactor internal server package to use new state file | jwijenbergh | |
| This completely rewrites the internal server package. Some advantages: - Caches less - Uses a callback interface so that the client package does not get so convoluted - Introduce a new API package that only deals with the server API and uses github.com/jwijenbergh/eduoauth-go | |||
| 2024-02-19 | Server: Delete old files to prepare for new internal API | jwijenbergh | |
| 2023-11-01 | OAuth + Server: Make ISS optional for custom servers | jwijenbergh | |
| 2023-09-29 | Client + Server + OAuth: Support mobile redirects | jwijenbergh | |
| 2023-09-25 | Server: Have separate implementations for refreshing endpoints | jwijenbergh | |
| 2023-09-25 | Server: Set OAuth endpoints on refresh | jwijenbergh | |
| This fixes OAuth endpoints after e.g. an update from 2.x to 3.x | |||
| 2023-09-25 | Client + Exports + Python: Add a startup boolean to getconfig | jwijenbergh | |
| To be used for autoconnect on startup. If autoconnect on startup set to true This ignores any callbacks that require user input (profile, authorization & location callbacks) | |||
| 2023-09-25 | Initial i18n implementation | jwijenbergh | |
| 2023-09-25 | Client + OAuth + Server: Initialize the OAuth clientID on add | jwijenbergh | |
| 2023-09-25 | API Test: Add test for invalid authorization endpoint scheme | jwijenbergh | |
| 2023-09-25 | Endpoints: Double check HTTPS scheme | jwijenbergh | |
| Now the note in the CLI is really not needed, but maybe wise to keep it there? | |||
| 2023-09-25 | Secure: Do not set current location as it is already done | jwijenbergh | |
| 2023-09-25 | Custom: Use the hostname for custom servers display name | jwijenbergh | |
| 2023-09-25 | All: Implement a token handler | jwijenbergh | |
| This implements a token handler for OAuth tokens. Clients can use the SetTokenHandler function in exports to set a token handler. It needs two arguments, a getter and a setter. The getter is a callback with three arguments: - The server to get the tokens for, in types.server.current as JSON - The output buffer - The output buffer maximum length The tokens should be written to the output buffer with maximum length. The type should be types.server.Tokens and be marshalled as JSON. If no tokens are available, leave the output buffer intact The token setter is a callback with two arguments: - The server for which to set the tokens for, in types.server.Current as JSON - The tokens, defined in types.server.Tokens as JSON Breaking changes: - No more tokens as arguments, was already deprecated in previous commits - Tokens are no longer returned in types.server.Configuration | |||
| 2023-09-25 | Refactor: Split internal server into multiple packages | jwijenbergh | |
| - Pass contexts - Have separate packages for e.g. custom, institute and secure - internet servers, profiles.... - Return types from the public ./types package with a Public() method | |||
| 2023-09-25 | Exports + Python + Server: Remove ShouldRenewButton | jwijenbergh | |
| This is replace with expiry times | |||
| 2023-09-25 | Types: Split discovery into its own package | jwijenbergh | |
| 2023-09-25 | Server: Add a TODO note for custom server types | jwijenbergh | |
| 2023-09-25 | Institute Access: Add context to set errors | jwijenbergh | |
| 2023-09-25 | Server Base: Add functions for getting expiry times | jwijenbergh | |
| 2023-09-01 | Client + Server: Increase endpoint update frequency and update secure ↵ | jwijenbergh | |
| internet handling | |||
| 2023-08-29 | Server: Set OAuth endpoints on refresh | jwijenbergh | |
| This fixes OAuth endpoints after e.g. an update from 2.x to 3.x | |||
| 2023-04-18 | Client + Server: Set default secure internet location | jwijenbergh | |
