Commit graph

152 commits

Author SHA1 Message Date
Eugene
088d254c9a
wip 2025-04-10 22:41:19 -07:00
Eugene
cea7acc918
#1281 - added description fields (#1294) 2025-03-22 12:00:20 +01:00
Eugene
664dbda65a
Bump version: 0.13.1 → 0.13.2 2025-02-26 10:40:54 +01:00
Eugene
1a07694409
lint 2025-02-26 10:40:49 +01:00
hashfunc
5b050e5cbd
Fixed #1264 - permission error in kubernetes (#1265) 2025-02-20 18:50:42 +01:00
Eugene
299ec932fc
Bump version: 0.13.0 → 0.13.1 2025-02-19 21:44:58 +01:00
Eugene
43604ac649
Bump version: 0.14.0 → 0.13.0 2025-02-18 23:04:06 +01:00
Eugene
d7651fb1a3
Bump version: 0.13.0-beta.2 → 0.14.0 2025-02-18 23:02:03 +01:00
Eugene
2cdf8babae
bump vulnerable deps (#1241) 2025-02-09 00:08:59 +01:00
Eugene
f3b7a5808c
Bump version: 0.12.0 → 0.13.0-beta.1 2025-02-02 21:22:55 +01:00
Eugene
c2208f4c87
docker fix (#1229) 2025-01-30 14:16:37 +01:00
Eugene
b7a1a1801b
bumped russh (#1210) 2025-01-14 18:50:40 +01:00
Eugene
6ade841378
correctly bind to both ipv4 and ipv6 when [::] is set as listen endpoint (#1193) 2024-12-27 10:16:36 +01:00
Eugene
e9b43d0547
lint 2024-12-26 19:37:39 +01:00
Eugene
d51d882ffe
fixed #1189 - update default config to listen on IPv6 as well 2024-12-25 11:23:20 +01:00
Eugene
efcb2205ff
Bump russh for ssh-key/ssh-encoding backend (#1144) 2024-12-12 21:44:54 +01:00
Eugene
fb1babcb41
Bump version: 0.11.0 → 0.12.0-beta.1 2024-12-07 23:42:58 +01:00
Eugene
f217b5da04
Self-service credentials management (#1145) 2024-11-26 23:13:48 +01:00
Eugene
b35983837f
Separate DB models for credentials (#1143) 2024-11-24 19:35:31 +01:00
Piotr Rotter
ef46e75d5b
add keepalive_interval to ssh config (#1134) 2024-11-19 22:24:21 +01:00
Eugene
38dbb3b717
fixed #1096 - SEC1 EC private key file support for TLS 2024-10-24 15:50:17 +02:00
Eugene
dbf96a8fee
fixed #1093 - allow multiple return domains for SSO, prefer host header over external_host 2024-10-24 00:04:37 +02:00
Eugene
64011e45da
use aws_lc_rs since it's required anyway, reduce dependencies some more 2024-10-18 00:09:41 +02:00
Eugene
837cc2d515
Bump version: 0.10.2 → 0.11.0 2024-10-09 00:24:38 +02:00
Eugene
00d3c36bbb
PostgreSQL support (#1021)
Fixes #938
2024-10-09 00:08:33 +02:00
Eugene
38bdbade69
fixed #1077 - handle non-standard PKCS8 EC private key PEMs 2024-10-04 17:18:43 +02:00
Eugene
c191e54c07
bumped rustls & related pkgs (#1066) 2024-09-18 11:28:39 +02:00
Eugene
53b0a9095b
Bump version: 0.10.1 → 0.10.2 2024-08-14 22:59:52 +02:00
Eugene
c328127493
fixed #941 - unnecessary port in external URLs 2024-07-26 19:33:28 +02:00
Eugene
a0465174a7
Bump version: 0.10.0 → 0.10.1 2024-07-26 18:18:39 +02:00
Eugene
c83a70c730
Bump version: 0.9.1 → 0.10.0 2024-07-18 09:55:42 +02:00
Eugene
f07b9246a8
switch to rustls 2024-07-16 12:56:42 +02:00
Eugene
4afa979de2
bump rust some more 2024-07-16 10:40:27 +02:00
Eugene
841bbe85da
bumped rust 2024-07-10 10:55:18 +02:00
Néfix Estrada
9582a6e0ae
feat(ssh): make inactivity timeout configurable (#990)
With this change, the SSH inactivity timeout is now configurable. By
default, is set at 5 minutes (300 seconds), which was the already
existing value.

Solves #943
2024-05-31 12:52:27 +02:00
Eugene
72236d004a
fixed #748 - per-protocol external ports (#973) 2024-03-26 10:16:22 +01:00
Eugene
8896bb361e
fixed #961 - added option to allow insecure ssh kex (#971) 2024-03-24 14:09:20 +01:00
Eugene
81cefebe96
fixed #966 - don't try to change config permissions unless necessary 2024-03-23 22:03:18 +01:00
Skyler Mansfield
916d51a4e8
Add support for role mappings on custom SSO providers. (#920)
This is done using the `role_mappings` property.
Roles to be mapped are gotten from the 'warp_groups` oidc claim:
```sso_providers: 
  - name: custom_sso
    label: Custom SSO
    provider:
      type: custom
      client_id: <client_id>
      client_secret: <client_secret>
      issuer_url: <issuer_url>
      scopes: ["email", "profile", "openid", "warp_groups"] #warp_groups is scope name to request for my demo case, which adds a "warpgate_groups" claim to the userinfo
      role_mappings: 
        - ["warpgate:admin", "warpgate:admin"]
```
This maps the `warpgate:admin` group from OIDC to the `warpgate:admin`
role.

This [video on YouTube](https://youtu.be/XCYSGGCgk9Q) demonstrates the
functionality

---------

Co-authored-by: Eugene <inbox@null.page>
2024-03-23 12:05:12 +01:00
Eugene
2d6621f5c8
bumped rust 2024-01-23 12:05:59 +01:00
Eugene
7e260e84e6
Bump version: 0.9.0 → 0.9.1 2023-12-18 16:24:44 +01:00
Nicolas SEYS
8c1dab63c5 Move session and cookie age in http config section 2023-11-29 11:03:17 +01:00
Nicolas SEYS
21d6ab4beb Make session and cookie age configurable 2023-11-29 11:03:17 +01:00
Eugene
0baf2e3b97
Bump version: 0.8.1 → 0.9.0 2023-11-23 19:41:07 +01:00
Eugene
f55fcc3972 clean up #921 for readability 2023-11-16 19:53:14 +01:00
Skyler Mansfield
b982abb5fd fix port in external host causing url parse fail 2023-11-16 19:53:14 +01:00
Skyler Mansfield
d9af7470a4 Add better support for X-Forward- headers when constructing external url 2023-11-16 19:53:14 +01:00
Skyler Mansfield
b0a9130a51 Add support for trusting X-Forwarded-For header to get client IP
falls back to remote ip if header unavailable
2023-11-16 19:53:14 +01:00
Eugene
8b91e4a328
Bump version: 0.8.0 → 0.8.1 2023-09-27 22:09:03 +02:00
Eugene Pankov
4ecc6b653f
Bump version: 0.7.4 → 0.8.0 2023-08-20 19:06:49 +02:00