Eugene
9bc1c9d40a
fixed #1346 - changing own password does not remove existing passwors
2025-05-23 22:04:00 +02:00
Eugene
39182a685e
Bump version: 0.13.2 → 0.14.0-beta.1
2025-05-23 21:32:07 +02:00
Eugene
45334014b6
fixed #1196 - correctly forward HTTP basic auth from the target URL ( #1343 )
2025-05-23 19:35:50 +02:00
Eugene
74ca553ee0
Add a "getting started" hint ( #1344 )
2025-05-23 19:35:43 +02:00
Eugene
1ab66a6c30
added Postgres OOB auth test
2025-05-21 22:25:18 +02:00
Eugene
53971dc8ed
fixed #1334 - show web auth requests on the homepage ( #1335 )
2025-05-18 13:20:18 +02:00
Eugene
822d176d0a
mark dev builds in the version number ( #1315 )
2025-04-11 08:18:03 +02:00
Eugene
cea7acc918
#1281 - added description fields ( #1294 )
2025-03-22 12:00:20 +01:00
Eugene
6b223994ae
SBOMs ( #1289 )
2025-03-20 16:11:14 +01:00
Eugene
664dbda65a
Bump version: 0.13.1 → 0.13.2
2025-02-26 10:40:54 +01:00
Eugene
1a07694409
lint
2025-02-26 10:40:49 +01:00
Eugene
299ec932fc
Bump version: 0.13.0 → 0.13.1
2025-02-19 21:44:58 +01:00
Eugene
43604ac649
Bump version: 0.14.0 → 0.13.0
2025-02-18 23:04:06 +01:00
Eugene
d7651fb1a3
Bump version: 0.13.0-beta.2 → 0.14.0
2025-02-18 23:02:03 +01:00
Eugene
7e154224c1
fixed #1258 - hide the version info until logged in
2025-02-18 23:01:50 +01:00
Eugene
b76872febe
fixed #952 - auto create sso users ( #1245 )
2025-02-10 01:12:50 +01:00
Eugene
2cdf8babae
bump vulnerable deps ( #1241 )
2025-02-09 00:08:59 +01:00
Thibaud Lepretre
40e49a2c8e
Fixed SSO not respecting the OS' trusted TLS CAs ( #1233 )
...
Co-authored-by: Eugene <inbox@null.page>
2025-02-04 19:52:18 +01:00
Eugene
f3b7a5808c
Bump version: 0.12.0 → 0.13.0-beta.1
2025-02-02 21:22:55 +01:00
Eugene
c2208f4c87
docker fix ( #1229 )
2025-01-30 14:16:37 +01:00
Eugene
e89bc036d5
fixed #1218 - make target search case insensitive
2025-01-27 15:56:19 +01:00
Eugene
6ade841378
correctly bind to both ipv4 and ipv6 when [::] is set as listen endpoint ( #1193 )
2024-12-27 10:16:36 +01:00
Eugene
010534a12f
API tokens ( #1191 )
2024-12-24 23:33:49 +01:00
Mohammad Al Shakoush
59884fbbe9
Add More Metadata to public ssh keys ( #1182 )
...
Co-authored-by: Eugene <inbox@null.page>
2024-12-22 19:13:42 +01:00
Mohammad Al Shakoush
1dec4c98d4
Add title when adding public keys ( #1171 )
2024-12-18 21:53:26 +01:00
Eugene
409b382e8f
UI update ( #1175 )
2024-12-18 00:07:46 +01:00
Eugene
efcb2205ff
Bump russh for ssh-key/ssh-encoding backend ( #1144 )
2024-12-12 21:44:54 +01:00
Eugene
fb1babcb41
Bump version: 0.11.0 → 0.12.0-beta.1
2024-12-07 23:42:58 +01:00
Eugene
f217b5da04
Self-service credentials management ( #1145 )
2024-11-26 23:13:48 +01:00
Eugene
b35983837f
Separate DB models for credentials ( #1143 )
2024-11-24 19:35:31 +01:00
Eugene
a20fdb8cc9
Bump russh ( #1131 )
2024-11-18 10:31:39 +01:00
Eugene
cc0b054cc9
fixed #1107 - pass user-identifying headers to HTTP targets
2024-11-03 23:23:59 +01:00
Eugene
ebc03133ff
Update info.rs
2024-10-24 11:15:24 +02:00
Eugene
e8e13454cc
do not crash the info endpoint on missing external host
2024-10-24 10:34:46 +02:00
Eugene
dbf96a8fee
fixed #1093 - allow multiple return domains for SSO, prefer host header over external_host
2024-10-24 00:04:37 +02:00
Eugene
80ee6ccc83
fixed #1074 - strip trailing slash in SSO issuer URLs and log errors properly
2024-10-14 10:18:19 +02:00
Eugene
837cc2d515
Bump version: 0.10.2 → 0.11.0
2024-10-09 00:24:38 +02:00
Eugene
00d3c36bbb
PostgreSQL support ( #1021 )
...
Fixes #938
2024-10-09 00:08:33 +02:00
Eugene
2f30c5c113
lint
2024-09-27 18:18:15 +02:00
Eugene
2fb4c4730c
lint
2024-09-27 18:15:09 +02:00
Eugene
c191e54c07
bumped rustls & related pkgs ( #1066 )
2024-09-18 11:28:39 +02:00
Eugene
fe521f2a39
OIDC RP-initiated logout (SSO single logout) support ( #992 )
...
Fixes #935
2024-09-10 23:16:42 +02:00
Eugene
53b0a9095b
Bump version: 0.10.1 → 0.10.2
2024-08-14 22:59:52 +02:00
Eugene
a0465174a7
Bump version: 0.10.0 → 0.10.1
2024-07-26 18:18:39 +02:00
Eugene
c83a70c730
Bump version: 0.9.1 → 0.10.0
2024-07-18 09:55:42 +02:00
Eugene
f07b9246a8
switch to rustls
2024-07-16 12:56:42 +02:00
Eugene
4afa979de2
bump rust some more
2024-07-16 10:40:27 +02:00
Eugene
72236d004a
fixed #748 - per-protocol external ports ( #973 )
2024-03-26 10:16:22 +01:00
Eugene
47c943d201
lint
2024-03-23 12:24:52 +01:00
Skyler Mansfield
916d51a4e8
Add support for role mappings on custom SSO providers. ( #920 )
...
This is done using the `role_mappings` property.
Roles to be mapped are gotten from the 'warp_groups` oidc claim:
```sso_providers:
- name: custom_sso
label: Custom SSO
provider:
type: custom
client_id: <client_id>
client_secret: <client_secret>
issuer_url: <issuer_url>
scopes: ["email", "profile", "openid", "warp_groups"] #warp_groups is scope name to request for my demo case, which adds a "warpgate_groups" claim to the userinfo
role_mappings:
- ["warpgate:admin", "warpgate:admin"]
```
This maps the `warpgate:admin` group from OIDC to the `warpgate:admin`
role.
This [video on YouTube](https://youtu.be/XCYSGGCgk9Q ) demonstrates the
functionality
---------
Co-authored-by: Eugene <inbox@null.page>
2024-03-23 12:05:12 +01:00