| Age | Commit message (Collapse) | Author | |
|---|---|---|---|
| 2024-02-19 | API Profiles: Check for wireguard+proxy in VPNTransportList | jwijenbergh | |
| 2024-02-19 | API: Set accept header to application/x-wireguard+proxy-profile | jwijenbergh | |
| 2024-02-19 | WireGuard: Fix TCPEndpoint test | jwijenbergh | |
| 2024-02-19 | API: Add govVPN redirects | jwijenbergh | |
| 2024-02-19 | Server: Only return should failover if prefer TCP was false too | jwijenbergh | |
| 2024-02-19 | WireGuard: Latest proxyguard server API changes | jwijenbergh | |
| wireguard+proxy profile and ProxyEndpoint instead of TCPEndpoint as proxyguard now uses HTTP for the initial packet | |||
| 2024-02-19 | All: Document everything to pass revive lint | jwijenbergh | |
| 2024-02-19 | API: Include regular wireguard profile even when prefer TCP is true | jwijenbergh | |
| Otherwise breaks servers that only have wireguard support and we pass prefer tcp | |||
| 2024-02-19 | Ping windows: Add missing fmt import | jwijenbergh | |
| 2024-02-19 | Format: Run gofumpt | jwijenbergh | |
| 2024-02-19 | Discovery: Mark orgs expired on org by id error | jwijenbergh | |
| 2024-02-19 | FSM: Allow to always go to deregistered | jwijenbergh | |
| 2024-02-19 | API + Server: Support vpn_proto_transport_list | jwijenbergh | |
| 2024-02-19 | WireGuard: TCP support using proxyguard | jwijenbergh | |
| 2024-02-19 | WireGuard: Add an ini parser | jwijenbergh | |
| Needed to replace TCP endpoint and for adding the private key | |||
| 2024-02-19 | Discovery: Use new HTTP Client | jwijenbergh | |
| 2024-02-19 | HTTP: Make NewClient accept an underlying http client | jwijenbergh | |
| if the argument is nil, a fresh one is automatically created | |||
| 2024-02-19 | HTTP: Fix register agent to include version package | jwijenbergh | |
| 2024-02-19 | Server: Refactor internal server package to use new state file | jwijenbergh | |
| This completely rewrites the internal server package. Some advantages: - Caches less - Uses a callback interface so that the client package does not get so convoluted - Introduce a new API package that only deals with the server API and uses github.com/jwijenbergh/eduoauth-go | |||
| 2024-02-19 | Config: New state file | jwijenbergh | |
| Caches less. Also convert the V1 state file | |||
| 2024-02-19 | Server: Delete old files to prepare for new internal API | jwijenbergh | |
| 2024-02-19 | Util + OAuth: Delete internal OAuth implementation | jwijenbergh | |
| Preparing to move to github.com/jwijenbergh/eduoauth-go | |||
| 2024-02-19 | All: Prepare to get rid of go-errors/errors lib | jwijenbergh | |
| 2024-02-19 | HTTP: Make sure to add all headers | jwijenbergh | |
| Now needed as we do some of the header code differently. Previously it worked because e.g. the accept header had one value that was capitalized | |||
| 2024-02-19 | i18nerr + HTTP: Properly convert timeout errors | jwijenbergh | |
| 2024-02-19 | Test: Add an AssertError helper | jwijenbergh | |
| 2024-02-19 | Version: Initial package | jwijenbergh | |
| 2023-11-01 | OAuth + Server: Make ISS optional for custom servers | jwijenbergh | |
| 2023-09-29 | OAuth: Check for error parameter in authorization response | jwijenbergh | |
| 2023-09-29 | OAuth Test: Fix redirect URI + listener changes | jwijenbergh | |
| 2023-09-29 | OAuth: Correctly pass Redirect URI to token request | jwijenbergh | |
| 2023-09-29 | Client + Server + OAuth: Support mobile redirects | jwijenbergh | |
| 2023-09-25 | Server: Have separate implementations for refreshing endpoints | jwijenbergh | |
| 2023-09-25 | Server: Set OAuth endpoints on refresh | jwijenbergh | |
| This fixes OAuth endpoints after e.g. an update from 2.x to 3.x | |||
| 2023-09-25 | Client + Exports + Python: Add a startup boolean to getconfig | jwijenbergh | |
| To be used for autoconnect on startup. If autoconnect on startup set to true This ignores any callbacks that require user input (profile, authorization & location callbacks) | |||
| 2023-09-25 | Initial i18n implementation | jwijenbergh | |
| 2023-09-25 | FSM: Allow to always go back to the initial state | jwijenbergh | |
| 2023-09-25 | Client + FSM: Check transitions and add SetState | jwijenbergh | |
| Also make sure GotConfig can be used to go back to | |||
| 2023-09-25 | Discovery: Ignore embeded discovery files | Simon Rozman | |
| They are not part of the Git repository and are downloaded in the build process. Signed-off-by: Simon Rozman <simon@rozman.si> | |||
| 2023-09-25 | Client + OAuth + Server: Initialize the OAuth clientID on add | jwijenbergh | |
| 2023-09-25 | OAuth: Always set the scheme to HTTPS for the authorization URL | jwijenbergh | |
| Useful if the cache is busted | |||
| 2023-09-25 | API Test: Add test for invalid authorization endpoint scheme | jwijenbergh | |
| 2023-09-25 | Endpoints: Double check HTTPS scheme | jwijenbergh | |
| Now the note in the CLI is really not needed, but maybe wise to keep it there? | |||
| 2023-09-25 | Version: Update to 2.0.0 | jwijenbergh | |
| 2023-09-25 | Secure: Do not set current location as it is already done | jwijenbergh | |
| 2023-09-25 | Verify Test: Use callStr on error | jwijenbergh | |
| 2023-09-25 | OAuth Token: Set previous refresh token if new refresh token is empty | jwijenbergh | |
| This is for 2.x servers that return an empty refresh token after refreshing | |||
| 2023-09-25 | Custom: Use the hostname for custom servers display name | jwijenbergh | |
| 2023-09-25 | All: Implement a token handler | jwijenbergh | |
| This implements a token handler for OAuth tokens. Clients can use the SetTokenHandler function in exports to set a token handler. It needs two arguments, a getter and a setter. The getter is a callback with three arguments: - The server to get the tokens for, in types.server.current as JSON - The output buffer - The output buffer maximum length The tokens should be written to the output buffer with maximum length. The type should be types.server.Tokens and be marshalled as JSON. If no tokens are available, leave the output buffer intact The token setter is a callback with two arguments: - The server for which to set the tokens for, in types.server.Current as JSON - The tokens, defined in types.server.Tokens as JSON Breaking changes: - No more tokens as arguments, was already deprecated in previous commits - Tokens are no longer returned in types.server.Configuration | |||
| 2023-09-25 | OAuth: Implement the Public() method for tokens | jwijenbergh | |
