Commit graph

790 commits

Author SHA1 Message Date
Eugene
4f9255cc60
bumps 2025-04-10 22:16:57 -07:00
Eugene
ba4d1bfe79
Update README.md 2025-04-10 22:14:38 -07:00
Eugene
ec98c3dbd1
Offer checking and accepting SSH host keys in the admin UI (#1307) 2025-04-05 04:05:21 +02:00
Eugene
0a3e4448ce
fixed #1285 - unable to add public keys via credentials self-service 2025-04-01 09:27:56 -04:00
Eugene
4b743033c8
fixed #1271 - invisible modals with prefers-reduced-motion is on 2025-04-01 09:25:30 -04:00
Mice7R
5d3a8ac7f5
Set the config file format (#1299)
This sets the file format to be yaml instead of let the config to figure
it out by extension. The problem is that it guesses file format by
extension and some tools - eg ansible - create tempfiles without
extension to validate the config changes before applying them, that
makes the validation always fail.

This PR changes how the config file is loaded so that it doesn't guess
file type.

---------

Co-authored-by: Eugene <inbox@null.page>
2025-03-27 23:18:48 +01:00
Chinmay Pai
6a5c80e79f
fix: Remove SSH known hosts entry when deleting SSH targets (#1300)
When a target is deleted from the admin UI, any associated SSH known
hosts entries are now also removed. This prevents orphaned host key
entries from remaining in the database after a target is deleted, which
could cause confusion if a new target with the same hostname is created
later.

closes: #1251

Signed-off-by: Chinmay D. Pai <chinmaydpai@gmail.com>
2025-03-27 10:04:15 +01:00
Eugene
51c8937eb5
fixed frontend crash in list pagination 2025-03-24 10:58:05 +01:00
Eugene
9841421211
fixed #1281 - list role contents (#1295)
Dep on #1294
2025-03-22 15:31:01 +01:00
Eugene
cea7acc918
#1281 - added description fields (#1294) 2025-03-22 12:00:20 +01:00
Eugene
64ec2a8b4b
reproducible build test 2025-03-21 23:47:06 +01:00
Eugene
6b223994ae
SBOMs (#1289) 2025-03-20 16:11:14 +01:00
Eugene
ed0d5255c0
Update README.md 2025-03-20 15:59:39 +01:00
Eugene
816e4209a5
Update SECURITY.md 2025-03-20 15:58:02 +01:00
Eugene
da2965db15
Create SECURITY.md 2025-03-06 21:03:51 +01:00
Eugene
22092dead4
Update README.md 2025-03-06 09:43:03 +01:00
Eugene
56711f623c
publish HTML coverage 2025-03-03 22:10:37 +01:00
Eugene
e05f0635ec
publish coverage artifacts 2025-03-03 22:09:03 +01:00
Eugene
72d6cbb902
slight log viewer UI cleanup 2025-02-27 17:20:36 +01:00
samtoxie
95dce41ce1
Fix SSH Client to respond to keyboard-interactive when target has optional 2FA (#1273)
Co-authored-by: Eugene <inbox@null.page>
2025-02-27 16:03:58 +01:00
Eugene
7985f80a91
removed a dbg! 2025-02-27 15:42:23 +01:00
Eugene
8d8973b4e4
ssh: only attempt the RSA key auth once (#1274) 2025-02-27 15:02:29 +01:00
Eugene
7ad11d9222
ui: prefer SSO provider name over label in the login UI 2025-02-27 12:56:26 +01:00
Eugene
84d7e189f3
Merge branch 'main' of https://github.com/warp-tech/warpgate 2025-02-27 11:40:58 +01:00
Eugene
f7627fac63
Update README.md 2025-02-26 17:15:37 +01:00
Eugene
42798eed6e
ui: font smoothing 2025-02-26 16:50:32 +01:00
Eugene
fda8e15e8d
word 2025-02-26 16:46:42 +01:00
Eugene
5e4d535b4a
Update Cargo.lock 2025-02-26 10:58:57 +01:00
Eugene
664dbda65a
Bump version: 0.13.1 → 0.13.2 2025-02-26 10:40:54 +01:00
Eugene
1a07694409
lint 2025-02-26 10:40:49 +01:00
Eugene
93609ae174
#1270 - change the column type early in the migrations 2025-02-26 10:31:44 +01:00
Eugene
549ddbaf8c
fixed #1270 - incorrect PK value field type on MySQL 2025-02-26 10:29:03 +01:00
Eugene
e4d7b2c905
ci: pin cargo-deny 2025-02-26 10:15:07 +01:00
Eugene
ee05440bf4
automatically fill out PK label field when pasting a key 2025-02-26 10:04:52 +01:00
Eugene
17726016f0
#1263 skip modify column on SQLite 2025-02-26 09:56:41 +01:00
Eugene
91c4a5a322
fixed #1263 - broken PK.last_used column on Postgres 2025-02-26 09:51:42 +01:00
hashfunc
5b050e5cbd
Fixed #1264 - permission error in kubernetes (#1265) 2025-02-20 18:50:42 +01:00
Eugene
299ec932fc
Bump version: 0.13.0 → 0.13.1 2025-02-19 21:44:58 +01:00
Eugene
2e75b280c2
fixed #1261 - reenable accidentally disabled Postgres TLS support 2025-02-19 21:33:43 +01:00
samtoxie
5dfa02555e
Implement option to trust unknown audiences (#1254)
Currently Warpgate implements openidconnect_rs in a way where the OIDC
audience has to be either just the warpgate client id or you have to
explicitly trust every additional client id. Some IdP's
([ZITADEL](https://zitadel.com/) in my case) however don't let you limit
the audience for a specific client on the IdP side, and in my usecase
clients in the IdP project are often added or removed. Having to update
the warpgate config every time this happens is undoable for me, as such
I would like to explicitly trust any unknown client via config.

This PR implements that via an added optional setting
(`trust_unknown_audiences`) for the OIDC-custom provider.
2025-02-18 23:14:34 +01:00
Eugene
43604ac649
Bump version: 0.14.0 → 0.13.0 2025-02-18 23:04:06 +01:00
Eugene
d7651fb1a3
Bump version: 0.13.0-beta.2 → 0.14.0 2025-02-18 23:02:03 +01:00
Eugene
1ceb7e99c2
cleanup 2025-02-18 23:01:57 +01:00
Eugene
7e154224c1
fixed #1258 - hide the version info until logged in 2025-02-18 23:01:50 +01:00
Eugene
a0a93942da
add nightly docker tag 2025-02-18 22:37:42 +01:00
Eugene
1849924a64
Bump version: 0.13.0-beta.1 → 0.13.0-beta.2 2025-02-18 12:05:06 +01:00
Eugene
650fa10ab7
fixed docker builds (#1259)
fixes #1255
2025-02-18 12:03:09 +01:00
Eugene
14ff0ae516
Update docker.yml 2025-02-18 10:29:46 +01:00
Eugene
d6a6f86062
Merge branch 'main' of https://github.com/warp-tech/warpgate 2025-02-18 10:06:12 +01:00
Eugene
c4905f7708
disable Docker provenance (#1255) 2025-02-18 10:06:09 +01:00