Eugene
5813862d97
log more specific errors when protocol servers fail
2025-07-03 23:06:43 +02:00
Eugene
009a601de7
Bump version: 0.14.1 → 0.15.0-beta.1
2025-07-02 09:23:04 +02:00
Eugene
8ff3e9a5cf
fixed #1104 - SNI support ( #1402 )
2025-07-02 08:11:22 +02:00
Jose Luis Gonzalez Calvo
834ae138e1
fix(auth): filter web approval auth method only if there are other authentication methods available ( #1390 )
2025-06-27 20:16:13 +02:00
Jose Luis Gonzalez Calvo
09140a36b8
fix(logs): normalize logs timestamp format with fixed sub-second digits ( #1387 )
2025-06-27 20:13:13 +02:00
Eugene
aa13534dc5
Bump version: 0.14.0 → 0.14.1
2025-06-05 10:29:16 +02:00
Eugene
c0de2f02b6
fixed #1366 - API crash
2025-06-05 10:16:34 +02:00
Eugene
fa0a0d19be
Disable default dep features ( #1364 )
2025-06-04 10:12:02 +02:00
Eugene
450b3066d8
dependency bumps ( #1362 )
2025-06-04 08:44:48 +02:00
Eugene
331af972bc
fixed #1356 - generate config schema ( #1357 )
2025-06-03 00:37:25 +02:00
Eugene
39182a685e
Bump version: 0.13.2 → 0.14.0-beta.1
2025-05-23 21:32:07 +02:00
Eugene
6cb156df1f
exclude WebUserApproval from "any credential" policy
2025-05-23 17:20:23 +02:00
Eugene
2381f55696
fixed #972 - SSH server not offering keyboard-interactive when only OOB or SSO auth is enabled for a user
2025-05-21 20:20:10 +02:00
Eugene
53971dc8ed
fixed #1334 - show web auth requests on the homepage ( #1335 )
2025-05-18 13:20:18 +02:00
Eugene
cea7acc918
#1281 - added description fields ( #1294 )
2025-03-22 12:00:20 +01:00
Eugene
664dbda65a
Bump version: 0.13.1 → 0.13.2
2025-02-26 10:40:54 +01:00
Eugene
1a07694409
lint
2025-02-26 10:40:49 +01:00
Eugene
299ec932fc
Bump version: 0.13.0 → 0.13.1
2025-02-19 21:44:58 +01:00
Eugene
43604ac649
Bump version: 0.14.0 → 0.13.0
2025-02-18 23:04:06 +01:00
Eugene
d7651fb1a3
Bump version: 0.13.0-beta.2 → 0.14.0
2025-02-18 23:02:03 +01:00
Eugene
b76872febe
fixed #952 - auto create sso users ( #1245 )
2025-02-10 01:12:50 +01:00
Eugene
55dcd11a17
added streamlocal-forward support (remote UNIX socket forwarding) ( #1243 )
2025-02-09 15:28:22 +01:00
Eugene
2cdf8babae
bump vulnerable deps ( #1241 )
2025-02-09 00:08:59 +01:00
Eugene
f3b7a5808c
Bump version: 0.12.0 → 0.13.0-beta.1
2025-02-02 21:22:55 +01:00
Eugene
c2208f4c87
docker fix ( #1229 )
2025-01-30 14:16:37 +01:00
Eugene
6ade841378
correctly bind to both ipv4 and ipv6 when [::] is set as listen endpoint ( #1193 )
2024-12-27 10:16:36 +01:00
Eugene
e9b43d0547
lint
2024-12-26 19:37:39 +01:00
Eugene
9953447c5a
ignore expired tokens
2024-12-26 19:36:55 +01:00
Eugene
010534a12f
API tokens ( #1191 )
2024-12-24 23:33:49 +01:00
Mohammad Al Shakoush
59884fbbe9
Add More Metadata to public ssh keys ( #1182 )
...
Co-authored-by: Eugene <inbox@null.page>
2024-12-22 19:13:42 +01:00
Eugene
fb1babcb41
Bump version: 0.11.0 → 0.12.0-beta.1
2024-12-07 23:42:58 +01:00
Eugene
f217b5da04
Self-service credentials management ( #1145 )
2024-11-26 23:13:48 +01:00
Eugene
b35983837f
Separate DB models for credentials ( #1143 )
2024-11-24 19:35:31 +01:00
Eugene
64011e45da
use aws_lc_rs since it's required anyway, reduce dependencies some more
2024-10-18 00:09:41 +02:00
Eugene
837cc2d515
Bump version: 0.10.2 → 0.11.0
2024-10-09 00:24:38 +02:00
Eugene
00d3c36bbb
PostgreSQL support ( #1021 )
...
Fixes #938
2024-10-09 00:08:33 +02:00
Eugene
c191e54c07
bumped rustls & related pkgs ( #1066 )
2024-09-18 11:28:39 +02:00
Eugene
116bf9fd4d
fixed SSO authentication getting incorrectly rejected when user has both an "any provider" and a provider specific SSO credential
2024-09-10 23:12:44 +02:00
Eugene
53b0a9095b
Bump version: 0.10.1 → 0.10.2
2024-08-14 22:59:52 +02:00
Eugene
a0465174a7
Bump version: 0.10.0 → 0.10.1
2024-07-26 18:18:39 +02:00
Eugene
c83a70c730
Bump version: 0.9.1 → 0.10.0
2024-07-18 09:55:42 +02:00
Eugene
f07b9246a8
switch to rustls
2024-07-16 12:56:42 +02:00
Eugene
4afa979de2
bump rust some more
2024-07-16 10:40:27 +02:00
Eugene
47c943d201
lint
2024-03-23 12:24:52 +01:00
Skyler Mansfield
916d51a4e8
Add support for role mappings on custom SSO providers. ( #920 )
...
This is done using the `role_mappings` property.
Roles to be mapped are gotten from the 'warp_groups` oidc claim:
```sso_providers:
- name: custom_sso
label: Custom SSO
provider:
type: custom
client_id: <client_id>
client_secret: <client_secret>
issuer_url: <issuer_url>
scopes: ["email", "profile", "openid", "warp_groups"] #warp_groups is scope name to request for my demo case, which adds a "warpgate_groups" claim to the userinfo
role_mappings:
- ["warpgate:admin", "warpgate:admin"]
```
This maps the `warpgate:admin` group from OIDC to the `warpgate:admin`
role.
This [video on YouTube](https://youtu.be/XCYSGGCgk9Q ) demonstrates the
functionality
---------
Co-authored-by: Eugene <inbox@null.page>
2024-03-23 12:05:12 +01:00
Eugene
bcba6763ae
cargo fmt
2024-03-04 10:15:27 +01:00
Eugene
2d6621f5c8
bumped rust
2024-01-23 12:05:59 +01:00
Eugene
7e260e84e6
Bump version: 0.9.0 → 0.9.1
2023-12-18 16:24:44 +01:00
Eugene
0baf2e3b97
Bump version: 0.8.1 → 0.9.0
2023-11-23 19:41:07 +01:00
Eugene
6cace24fe8
lint
2023-11-23 19:40:53 +01:00