| Age | Commit message (Collapse) | Author | |
|---|---|---|---|
| 2023-09-25 | Custom: Use the hostname for custom servers display name | jwijenbergh | |
| 2023-09-25 | All: Implement a token handler | jwijenbergh | |
| This implements a token handler for OAuth tokens. Clients can use the SetTokenHandler function in exports to set a token handler. It needs two arguments, a getter and a setter. The getter is a callback with three arguments: - The server to get the tokens for, in types.server.current as JSON - The output buffer - The output buffer maximum length The tokens should be written to the output buffer with maximum length. The type should be types.server.Tokens and be marshalled as JSON. If no tokens are available, leave the output buffer intact The token setter is a callback with two arguments: - The server for which to set the tokens for, in types.server.Current as JSON - The tokens, defined in types.server.Tokens as JSON Breaking changes: - No more tokens as arguments, was already deprecated in previous commits - Tokens are no longer returned in types.server.Configuration | |||
| 2023-09-25 | Refactor: Split internal server into multiple packages | jwijenbergh | |
| - Pass contexts - Have separate packages for e.g. custom, institute and secure - internet servers, profiles.... - Return types from the public ./types package with a Public() method | |||
| 2023-09-25 | Exports + Python + Server: Remove ShouldRenewButton | jwijenbergh | |
| This is replace with expiry times | |||
| 2023-09-25 | Types: Split discovery into its own package | jwijenbergh | |
| 2023-09-25 | Server: Add a TODO note for custom server types | jwijenbergh | |
| 2023-09-25 | Institute Access: Add context to set errors | jwijenbergh | |
| 2023-09-25 | Server Base: Add functions for getting expiry times | jwijenbergh | |
| 2023-09-01 | Client + Server: Increase endpoint update frequency and update secure ↵ | jwijenbergh | |
| internet handling | |||
| 2023-08-29 | Server: Set OAuth endpoints on refresh | jwijenbergh | |
| This fixes OAuth endpoints after e.g. an update from 2.x to 3.x | |||
| 2023-04-18 | Client + Server: Set default secure internet location | jwijenbergh | |
| 2023-04-18 | Server Custom: Fix invalid wrap erorr | jwijenbergh | |
| 2023-04-18 | Client + Server: Implement a token updater callback | jwijenbergh | |
| 2023-02-28 | API + OAuth: Add some debug logging for tokens | jwijenbergh | |
| 2023-02-27 | Profile Test: format | jwijenbergh | |
| 2023-02-17 | Refactor: Improve some errors by using errors.New and add context | jwijenbergh | |
| 2023-02-16 | Server: Add test for profiles | jwijenbergh | |
| 2023-02-16 | Format: Run gofumpt | jwijenbergh | |
| 2023-02-16 | Server: Validate endpoints | jwijenbergh | |
| This commit validates the server endpoints by checking the Host and scheme of each URL to check if they match eachother. This is to prevent further mixup attacks | |||
| 2023-02-15 | Server: Remove 75% requirement on renew button | jwijenbergh | |
| 2023-01-31 | Server: Add script-security 0 to the OpenVPN config | jwijenbergh | |
| This prevents scripts from being executed by default. Clients can override this by either using the OpenVPN --script-security flag or add a script-security setting themselves. | |||
| 2023-01-13 | Server API: Set a lower timeout for disconnect | jwijenbergh | |
| 2023-01-10 | Client + Discovery: Implement further organizations expiry | jwijenbergh | |
| 2023-01-06 | Refactor: Re-use a HTTP client | jwijenbergh | |
| 2022-12-21 | Client + Exports: Forward tokens for /disconnect | jwijenbergh | |
| 2022-12-21 | Exports + OAuth + Server: Forward tokens to getting a config | jwijenbergh | |
| 2022-12-21 | Failover: Initial implementation | jwijenbergh | |
| 2022-12-21 | Server: Implement forcing WireGuard selection through env | jwijenbergh | |
| 2022-12-14 | Server: Fix revive lint error | jwijenbergh | |
| ``` internal/server/servers.go:51:9: indent-error-flow: if block ends with a return statement, so drop this else and outdent its block (move short variable declaration to its own line if necessary) (revive) } else { return srv, nil } ``` | |||
| 2022-12-12 | Format: Run gofumpt | jwijenbergh | |
| 2022-12-12 | Server + Exports: Rename and simplify GetCurrentProfileIndex | jwijenbergh | |
| 2022-12-12 | Server: Minor style changes | jwijenbergh | |
| 2022-12-12 | simplify error handling | Aleksandar Pesic | |
| fixes #6 Signed-off-by: Aleksandar Pesic <peske.nis@gmail.com> | |||
| 2022-11-28 | Server: Split more into multiple implementation files | jwijenbergh | |
| 2022-11-28 | Lint: Use gocritic linter and fix errors returned by it | jwijenbergh | |
| 2022-11-28 | Formatting: Run golines | jwijenbergh | |
| 2022-11-28 | Formatting: Run gofumpt -w | jwijenbergh | |
| 2022-11-28 | Refactor: Fix revive linter errors by deleting redundant prefixes | jwijenbergh | |
| 2022-11-28 | OAuth: Refactor Token getting and do not save them in the config | jwijenbergh | |
| This commit refactors getting the tokens into receiver methods. This means that functions do not have to call the cryptic "EnsureTokens" method. The receiver getter then already verifier whether or not the tokens could be obtained (and refreshes too). The downside is that some things are now private, so testing for invalid tokens needs to be done somewhere else. This needs another patch such that clients can save the tokens themselves using a keyring. | |||
| 2022-11-28 | Lint: Run godot fix | jwijenbergh | |
| Full command: golangci-lint run --disable-all -E godot --fix | |||
| 2022-11-28 | Refactor: Remove most get prefixes for receiver functions | jwijenbergh | |
| 2022-11-24 | Style: Use stylecheck and fix errors | jwijenbergh | |
| 2022-11-24 | Discovery + Server: Get rid of unused imports | jwijenbergh | |
| 2022-11-24 | Util: Get rid of current time helper | jwijenbergh | |
| Fixes #5 | |||
| 2022-11-14 | Client + Server: Refresh the endpoints before checking for a valid profile | jwijenbergh | |
| 2022-11-10 | Server: Re-initialize endpoints when getting a config | jwijenbergh | |
| 2022-10-24 | Client + Server + Exports: Implement optional WireGuard support | jwijenbergh | |
| 2022-10-19 | OAuth + Server: Fix ISS for secure internet | jwijenbergh | |
| The wrong base url was used. Use the one from the home server NOT the current location | |||
| 2022-10-19 | Refactor: Make errors use the parent's error level | jwijenbergh | |
| - All wrapped errors have to be created with types.NewWrappedError to inherit the error level from the parent - Or types.NewWrappedErrorLevel can be used which means a custom error level is given. For example this is done with cancelling OAuth - Client public errors are forwarded with handleError that also logs it with the error's level | |||
| 2022-10-19 | Discovery + Server: Remove unused 'Raw' strings | jwijenbergh | |
