Skip to content

Releases: mysteriumnetwork/node

Raspberry Sunrise

17 May 15:35
3232eda

Choose a tag to compare

0.9.0

Dont override /etc/default/mysterium-node on each run

Raspberry auto updates and NAT fixes

17 May 13:05
c7fdce1

Choose a tag to compare

  • Start from TTL 2 for windows to be happy
  • Protect session client ID map with lock while reading
  • Autoupdates for myst on raspberry
  • Run autoupdates only for stable releases
  • Do not exit if pinger read fails

NAT hole punching fixes

15 May 13:06
421d66e

Choose a tag to compare

  • bootstrap now checks for presence of node before starting
  • Move command flag to entrypoint
  • Fix builder package build (gem install issues)
  • Restore TTL for remote conn just after hole is punched
  • Remove timeout from consumer pinger

Start provider natproxy session immediately after hole punch

15 May 08:08
7e3d093

Choose a tag to compare

Merge pull request #1065 from mysteriumnetwork/master

Update 0.8 release with fixes

Make desktop consumer connect without NAT proxy

14 May 11:31
12bf2f4

Choose a tag to compare

Raspberry Spring

13 May 11:10
87e869f

Choose a tag to compare

Raspberry Spring Pre-release
Pre-release
0.8.0

Merge pull request #1054 from mysteriumnetwork/feature/proposal-compo…

NAT status endpoint and CLI command

26 Apr 11:08
85b311d

Choose a tag to compare

Full Changelog

Closed issues:

  • Provider sends metrics about NAT traversal local status #890
  • Node integration with LocationOracle #863

Merged pull requests:

  • 0.7.1 #917 (soffokl)
  • Add CLI command for retrieving NAT status #916 (donce)
  • openvpn get config for android implemented #915 (zolia)
  • do not block if ping target is not received #913 (zolia)
  • Add tequilapi endpoint for NAT traversal status #911 (donce)

Bicycle time

25 Apr 07:46
38a630d

Choose a tag to compare

Full Changelog

Implemented enhancements:

Fixed bugs:

  • Openvpn: empty IP in config provided to client #887
  • Fixed panic of tequilapi client on incorrect request creation #886 (soffokl)
  • Cleaning ICS config only on Start and Stop of the service #873 (soffokl)

Closed issues:

  • Cache access policies #903
  • Report router information #901
  • Add ability to filter proposals by access policies #881
  • Block incoming connection requests which are not allowed by current access lists #878
  • Use trust oracle for GET /access-policies #865
  • Node autodetects IP attributes of Proposal #862
  • Build DEB package for linux/arm #842
  • Provider adds to Proposal specific field accessListId=mysterium #838
  • Start having Cocoa Pods frozen releases #472

Merged pull requests:

  • Fix NAT events sending to ELK #906 (donce)
  • Report UPnP network gateways to stdout #904 (tadaskay)
  • Fail service start endpoint with unknown params #902 (donce)
  • Extend NAT events (ELK and message bus) to support different stages #900 (donce)
  • Fix access policy params when starting service #899 (donce)
  • sane message is printed if peer does not support NAT punching #898 (zolia)
  • always honour static port flag #896 (zolia)
  • fixed ProvideConfig method annotation #895 (zolia)
  • Location resolution through oracle #894 (vkuznecovas)
  • Fix missed wireguard refactorings in win version #892 (tadaskay)
  • Propagate IP to location info in DBResolver #889 (tadaskay)
  • congrats soffokl #888 (zolia)
  • we can now filter the proposals by whitelist #885 (vkuznecovas)
  • Use real trust oracle in access policies endpoint #884 (donce)
  • Block incoming connection requests which are not allowed by current access lists #882 (soffokl)
  • Generate service ports dynamically for wireguard #880 (tadaskay)
  • Feature/add access policies to proposals #877 (vkuznecovas)
  • renamed access lists to access-policies #876 (vkuznecovas)
  • Remove redundant protocol requirement for acquiring a port #874 (tadaskay)
  • proxy config for releasing artifacts to sonatype #871 (zolia)
  • Dynamically generate service port for OpenVPN #866 (tadaskay)
  • NAT proxy for OpenVPN #850 (zolia)

Backwards desktop application compatibility fixes

09 Apr 11:20
7f59138

Choose a tag to compare

0.6.1

Merge pull request #870 from mysteriumnetwork/empty-consumer-config-b…

Winter calm

28 Mar 13:20
a1b5668

Choose a tag to compare

Full Changelog

Implemented enhancements:

  • Support for Windows firewall auto configuration #757
  • Allow using multiple TUN devices for Windows #756
  • Rewrite /bin helpers to Golang in /ci package #361
  • Added Windows firewall configuration #817 (soffokl)
  • Wireguard provider for Windows uses a single interface #804 (soffokl)
  • Windows ICS now supports single internal interface #802 (soffokl)

Fixed bugs:

  • Service crashes after 6th client connected (panic: runtime error: index out of range) #814
  • When consumer disconnects and tries to connect back, handshake doesn't go through #783
  • Internet Connection Sharing for Windows automatically set IP-address configuration for internal interface #768
  • Fixed overwriting pfctl IP forwarding rules #824 (soffokl)
  • Reassign interface address for Windows ICS #806 (soffokl)

Closed issues:

  • OpenVPN provider for Windows #792
  • Service endpoints should return service parameters in serviceInfo DTOs #764
  • NAT and IP-forwarding for windows #749
  • investigate TINC as PT alternative #504
  • Failing CI should mark PR with specific label #501
  • Openvpn transport #493
  • SDK for JS #490
  • kill switch for Android #488
  • Start having myst as NPM release #435
  • Quality Oracle #426
  • Debian packages support (.deb) #419
  • Wireguard transport #387
  • Kill switch #372
  • Mysterium node for IOS as Network extention POC #365

Merged pull requests: