Releases: patrickhener/goshs
v1.1.4
New Feature
v1.1.4 adds a new feature where you can tunnel goshs to localhost.run to make it available online even if your network can not be reached directly from the internet. For more information look at https://localhost.run/.
Bug Fix
- Fixed an upload problem tracked in Issue #134.
v1.1.3
Changelog
- New Feature: Invisible mode. Read more on that at https://goshs.de/en/usage/restrictions/index.html#be-invisible-invisible-mode
- made mDNS opt-in instead of opt-out
Fixes
- fixed silent mode a bit
v1.1.2
v1.1.1
Smaller updates
- You can now disable mDNS
- Clipboard order is now reversed
- You can now specify a different upload folder
- Smaller bugfixes
v1.1.0
New Features
This release adds a new feature. When using authentication (basic auth or cert auth) you can now share files using a download limit or a time limit. So anyone with the link can now download the file (or a folder as zip file) when clicking the link, even without authentication.
Styleup
Also there is now a QRCode generator for general file or folder links, so you can easily grab files on a mobile device.
v1.0.9
Changelog
This release adds the functionality to whitelist IPs or ranges and restrict access. Also more Operating Systems are now supported with binary releases.
v1.0.8
Features
This version adds a better verbose logging and now supports webhook events for sftp, webdav and also implements verbose logging via webhook.
v1.0.7
Big Update
This version is a big update. There are mainly two new features. goshs now supports SFTP as protocol to connect. Be sure to read the help page or https://goshs.de/en/usage/sftp/index.html to see how it works.
Also now http, webdav and sftp are broadcasted as zeroconf mDNS broadcast on the local network. So now you can easily just access your instance for example at http://<hostname>.local:8000.
Under the hood
I increased a testing framework and polished all unit tests. So now goshs can be tested thoroughly throughout development
v1.0.6
v1.0.5
Changelog
This release fixes an unauthenticated remote code execution vulnerability that was addressed in the advisory GHSA-rwj2-w85g-5cmm by Guilhem7. Thanks again mate for discovering and disclosing this to me. Very appreciated.