Commit graph

147 commits

Author SHA1 Message Date
Eugene
9bc1c9d40a
fixed #1346 - changing own password does not remove existing passwors 2025-05-23 22:04:00 +02:00
Eugene
39182a685e
Bump version: 0.13.2 → 0.14.0-beta.1 2025-05-23 21:32:07 +02:00
Eugene
45334014b6
fixed #1196 - correctly forward HTTP basic auth from the target URL (#1343) 2025-05-23 19:35:50 +02:00
Eugene
74ca553ee0
Add a "getting started" hint (#1344) 2025-05-23 19:35:43 +02:00
Eugene
1ab66a6c30
added Postgres OOB auth test 2025-05-21 22:25:18 +02:00
Eugene
53971dc8ed
fixed #1334 - show web auth requests on the homepage (#1335) 2025-05-18 13:20:18 +02:00
Eugene
822d176d0a
mark dev builds in the version number (#1315) 2025-04-11 08:18:03 +02:00
Eugene
cea7acc918
#1281 - added description fields (#1294) 2025-03-22 12:00:20 +01:00
Eugene
6b223994ae
SBOMs (#1289) 2025-03-20 16:11:14 +01:00
Eugene
664dbda65a
Bump version: 0.13.1 → 0.13.2 2025-02-26 10:40:54 +01:00
Eugene
1a07694409
lint 2025-02-26 10:40:49 +01:00
Eugene
299ec932fc
Bump version: 0.13.0 → 0.13.1 2025-02-19 21:44:58 +01:00
Eugene
43604ac649
Bump version: 0.14.0 → 0.13.0 2025-02-18 23:04:06 +01:00
Eugene
d7651fb1a3
Bump version: 0.13.0-beta.2 → 0.14.0 2025-02-18 23:02:03 +01:00
Eugene
7e154224c1
fixed #1258 - hide the version info until logged in 2025-02-18 23:01:50 +01:00
Eugene
b76872febe
fixed #952 - auto create sso users (#1245) 2025-02-10 01:12:50 +01:00
Eugene
2cdf8babae
bump vulnerable deps (#1241) 2025-02-09 00:08:59 +01:00
Thibaud Lepretre
40e49a2c8e
Fixed SSO not respecting the OS' trusted TLS CAs (#1233)
Co-authored-by: Eugene <inbox@null.page>
2025-02-04 19:52:18 +01:00
Eugene
f3b7a5808c
Bump version: 0.12.0 → 0.13.0-beta.1 2025-02-02 21:22:55 +01:00
Eugene
c2208f4c87
docker fix (#1229) 2025-01-30 14:16:37 +01:00
Eugene
e89bc036d5
fixed #1218 - make target search case insensitive 2025-01-27 15:56:19 +01:00
Eugene
6ade841378
correctly bind to both ipv4 and ipv6 when [::] is set as listen endpoint (#1193) 2024-12-27 10:16:36 +01:00
Eugene
010534a12f
API tokens (#1191) 2024-12-24 23:33:49 +01:00
Mohammad Al Shakoush
59884fbbe9
Add More Metadata to public ssh keys (#1182)
Co-authored-by: Eugene <inbox@null.page>
2024-12-22 19:13:42 +01:00
Mohammad Al Shakoush
1dec4c98d4
Add title when adding public keys (#1171) 2024-12-18 21:53:26 +01:00
Eugene
409b382e8f
UI update (#1175) 2024-12-18 00:07:46 +01:00
Eugene
efcb2205ff
Bump russh for ssh-key/ssh-encoding backend (#1144) 2024-12-12 21:44:54 +01:00
Eugene
fb1babcb41
Bump version: 0.11.0 → 0.12.0-beta.1 2024-12-07 23:42:58 +01:00
Eugene
f217b5da04
Self-service credentials management (#1145) 2024-11-26 23:13:48 +01:00
Eugene
b35983837f
Separate DB models for credentials (#1143) 2024-11-24 19:35:31 +01:00
Eugene
a20fdb8cc9
Bump russh (#1131) 2024-11-18 10:31:39 +01:00
Eugene
cc0b054cc9
fixed #1107 - pass user-identifying headers to HTTP targets 2024-11-03 23:23:59 +01:00
Eugene
ebc03133ff
Update info.rs 2024-10-24 11:15:24 +02:00
Eugene
e8e13454cc
do not crash the info endpoint on missing external host 2024-10-24 10:34:46 +02:00
Eugene
dbf96a8fee
fixed #1093 - allow multiple return domains for SSO, prefer host header over external_host 2024-10-24 00:04:37 +02:00
Eugene
80ee6ccc83
fixed #1074 - strip trailing slash in SSO issuer URLs and log errors properly 2024-10-14 10:18:19 +02:00
Eugene
837cc2d515
Bump version: 0.10.2 → 0.11.0 2024-10-09 00:24:38 +02:00
Eugene
00d3c36bbb
PostgreSQL support (#1021)
Fixes #938
2024-10-09 00:08:33 +02:00
Eugene
2f30c5c113
lint 2024-09-27 18:18:15 +02:00
Eugene
2fb4c4730c
lint 2024-09-27 18:15:09 +02:00
Eugene
c191e54c07
bumped rustls & related pkgs (#1066) 2024-09-18 11:28:39 +02:00
Eugene
fe521f2a39
OIDC RP-initiated logout (SSO single logout) support (#992)
Fixes #935
2024-09-10 23:16:42 +02:00
Eugene
53b0a9095b
Bump version: 0.10.1 → 0.10.2 2024-08-14 22:59:52 +02:00
Eugene
a0465174a7
Bump version: 0.10.0 → 0.10.1 2024-07-26 18:18:39 +02:00
Eugene
c83a70c730
Bump version: 0.9.1 → 0.10.0 2024-07-18 09:55:42 +02:00
Eugene
f07b9246a8
switch to rustls 2024-07-16 12:56:42 +02:00
Eugene
4afa979de2
bump rust some more 2024-07-16 10:40:27 +02:00
Eugene
72236d004a
fixed #748 - per-protocol external ports (#973) 2024-03-26 10:16:22 +01:00
Eugene
47c943d201
lint 2024-03-23 12:24:52 +01:00
Skyler Mansfield
916d51a4e8
Add support for role mappings on custom SSO providers. (#920)
This is done using the `role_mappings` property.
Roles to be mapped are gotten from the 'warp_groups` oidc claim:
```sso_providers: 
  - name: custom_sso
    label: Custom SSO
    provider:
      type: custom
      client_id: <client_id>
      client_secret: <client_secret>
      issuer_url: <issuer_url>
      scopes: ["email", "profile", "openid", "warp_groups"] #warp_groups is scope name to request for my demo case, which adds a "warpgate_groups" claim to the userinfo
      role_mappings: 
        - ["warpgate:admin", "warpgate:admin"]
```
This maps the `warpgate:admin` group from OIDC to the `warpgate:admin`
role.

This [video on YouTube](https://youtu.be/XCYSGGCgk9Q) demonstrates the
functionality

---------

Co-authored-by: Eugene <inbox@null.page>
2024-03-23 12:05:12 +01:00