Michael Stapelberg
|
0fa71a6018
|
display the EEPROM SHA256 hashes (shortened)
related to https://github.com/gokrazy/gokrazy/issues/48
|
2020-06-19 08:50:32 +02:00 |
|
Michael Stapelberg
|
2398e37f70
|
status: use partuuid-based path in mkfs instruction
fixes https://github.com/gokrazy/gokrazy/issues/12
|
2020-05-30 18:47:48 +02:00 |
|
Michael Stapelberg
|
b93a58e5c8
|
status: print module info details
fixes https://github.com/gokrazy/gokrazy/issues/59
|
2020-05-30 18:17:38 +02:00 |
|
Michael Stapelberg
|
3a6c5f85d2
|
header: include model name on supported platforms
|
2020-04-08 15:24:36 +02:00 |
|
Michael Stapelberg
|
25d06ba514
|
gofmt GENERATED_bundled.go
|
2019-11-09 09:59:25 +01:00 |
|
Michael Stapelberg
|
09fbdb123e
|
bundle bootstrap, bootstrap-table and jquery assets
This way, the UI works even when the user is offline, which is handy for
router7.
|
2019-11-09 09:37:23 +01:00 |
|
Michael Stapelberg
|
a6ce446055
|
format GENERATED_bundled.go with newer gofmt
|
2018-11-01 18:44:10 +01:00 |
|
Michael Stapelberg
|
1c16b3b4eb
|
serve favicon.ico
|
2018-07-15 18:32:46 +02:00 |
|
Michael Stapelberg
|
c74265523b
|
implement XSRF/CSRF protection for /stop and /restart
While stopping/restarting processes seems like a nuisance at best, it’s good
style to prevent these attacks.
This commit the Double-Submit Cookie protection, which seems appropriate for our
architecture and demands. See also:
https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet#Double_Submit_Cookie
|
2018-06-25 18:38:08 +02:00 |
|
Michael Stapelberg
|
59b99bc704
|
remove hard-coded mmcblk0 from all places
|
2018-06-17 09:31:14 +02:00 |
|
Michael Stapelberg
|
9063e4526a
|
add hostname to title
This makes it easier to deal with multiple tabs on multiple devices :)
|
2018-05-17 09:11:44 +02:00 |
|
Michael Stapelberg
|
b5d7cb2fcf
|
add PublicInterfaceAddrs and display them on the status page
|
2018-03-20 19:34:36 +01:00 |
|
Michael Stapelberg
|
38af7fd18d
|
Initial commit
|
2017-03-04 11:22:48 +01:00 |
|