Commit graph

88 commits

Author SHA1 Message Date
Eugene
5813862d97
log more specific errors when protocol servers fail 2025-07-03 23:06:43 +02:00
Eugene
009a601de7
Bump version: 0.14.1 → 0.15.0-beta.1 2025-07-02 09:23:04 +02:00
Eugene
8ff3e9a5cf
fixed #1104 - SNI support (#1402) 2025-07-02 08:11:22 +02:00
Jose Luis Gonzalez Calvo
834ae138e1
fix(auth): filter web approval auth method only if there are other authentication methods available (#1390) 2025-06-27 20:16:13 +02:00
Jose Luis Gonzalez Calvo
09140a36b8
fix(logs): normalize logs timestamp format with fixed sub-second digits (#1387) 2025-06-27 20:13:13 +02:00
Eugene
aa13534dc5
Bump version: 0.14.0 → 0.14.1 2025-06-05 10:29:16 +02:00
Eugene
c0de2f02b6
fixed #1366 - API crash 2025-06-05 10:16:34 +02:00
Eugene
fa0a0d19be
Disable default dep features (#1364) 2025-06-04 10:12:02 +02:00
Eugene
450b3066d8
dependency bumps (#1362) 2025-06-04 08:44:48 +02:00
Eugene
331af972bc
fixed #1356 - generate config schema (#1357) 2025-06-03 00:37:25 +02:00
Eugene
39182a685e
Bump version: 0.13.2 → 0.14.0-beta.1 2025-05-23 21:32:07 +02:00
Eugene
6cb156df1f
exclude WebUserApproval from "any credential" policy 2025-05-23 17:20:23 +02:00
Eugene
2381f55696
fixed #972 - SSH server not offering keyboard-interactive when only OOB or SSO auth is enabled for a user 2025-05-21 20:20:10 +02:00
Eugene
53971dc8ed
fixed #1334 - show web auth requests on the homepage (#1335) 2025-05-18 13:20:18 +02:00
Eugene
cea7acc918
#1281 - added description fields (#1294) 2025-03-22 12:00:20 +01:00
Eugene
664dbda65a
Bump version: 0.13.1 → 0.13.2 2025-02-26 10:40:54 +01:00
Eugene
1a07694409
lint 2025-02-26 10:40:49 +01:00
Eugene
299ec932fc
Bump version: 0.13.0 → 0.13.1 2025-02-19 21:44:58 +01:00
Eugene
43604ac649
Bump version: 0.14.0 → 0.13.0 2025-02-18 23:04:06 +01:00
Eugene
d7651fb1a3
Bump version: 0.13.0-beta.2 → 0.14.0 2025-02-18 23:02:03 +01:00
Eugene
b76872febe
fixed #952 - auto create sso users (#1245) 2025-02-10 01:12:50 +01:00
Eugene
55dcd11a17
added streamlocal-forward support (remote UNIX socket forwarding) (#1243) 2025-02-09 15:28:22 +01:00
Eugene
2cdf8babae
bump vulnerable deps (#1241) 2025-02-09 00:08:59 +01:00
Eugene
f3b7a5808c
Bump version: 0.12.0 → 0.13.0-beta.1 2025-02-02 21:22:55 +01:00
Eugene
c2208f4c87
docker fix (#1229) 2025-01-30 14:16:37 +01:00
Eugene
6ade841378
correctly bind to both ipv4 and ipv6 when [::] is set as listen endpoint (#1193) 2024-12-27 10:16:36 +01:00
Eugene
e9b43d0547
lint 2024-12-26 19:37:39 +01:00
Eugene
9953447c5a
ignore expired tokens 2024-12-26 19:36:55 +01:00
Eugene
010534a12f
API tokens (#1191) 2024-12-24 23:33:49 +01:00
Mohammad Al Shakoush
59884fbbe9
Add More Metadata to public ssh keys (#1182)
Co-authored-by: Eugene <inbox@null.page>
2024-12-22 19:13:42 +01:00
Eugene
fb1babcb41
Bump version: 0.11.0 → 0.12.0-beta.1 2024-12-07 23:42:58 +01:00
Eugene
f217b5da04
Self-service credentials management (#1145) 2024-11-26 23:13:48 +01:00
Eugene
b35983837f
Separate DB models for credentials (#1143) 2024-11-24 19:35:31 +01:00
Eugene
64011e45da
use aws_lc_rs since it's required anyway, reduce dependencies some more 2024-10-18 00:09:41 +02:00
Eugene
837cc2d515
Bump version: 0.10.2 → 0.11.0 2024-10-09 00:24:38 +02:00
Eugene
00d3c36bbb
PostgreSQL support (#1021)
Fixes #938
2024-10-09 00:08:33 +02:00
Eugene
c191e54c07
bumped rustls & related pkgs (#1066) 2024-09-18 11:28:39 +02:00
Eugene
116bf9fd4d
fixed SSO authentication getting incorrectly rejected when user has both an "any provider" and a provider specific SSO credential 2024-09-10 23:12:44 +02:00
Eugene
53b0a9095b
Bump version: 0.10.1 → 0.10.2 2024-08-14 22:59:52 +02:00
Eugene
a0465174a7
Bump version: 0.10.0 → 0.10.1 2024-07-26 18:18:39 +02:00
Eugene
c83a70c730
Bump version: 0.9.1 → 0.10.0 2024-07-18 09:55:42 +02:00
Eugene
f07b9246a8
switch to rustls 2024-07-16 12:56:42 +02:00
Eugene
4afa979de2
bump rust some more 2024-07-16 10:40:27 +02:00
Eugene
47c943d201
lint 2024-03-23 12:24:52 +01:00
Skyler Mansfield
916d51a4e8
Add support for role mappings on custom SSO providers. (#920)
This is done using the `role_mappings` property.
Roles to be mapped are gotten from the 'warp_groups` oidc claim:
```sso_providers: 
  - name: custom_sso
    label: Custom SSO
    provider:
      type: custom
      client_id: <client_id>
      client_secret: <client_secret>
      issuer_url: <issuer_url>
      scopes: ["email", "profile", "openid", "warp_groups"] #warp_groups is scope name to request for my demo case, which adds a "warpgate_groups" claim to the userinfo
      role_mappings: 
        - ["warpgate:admin", "warpgate:admin"]
```
This maps the `warpgate:admin` group from OIDC to the `warpgate:admin`
role.

This [video on YouTube](https://youtu.be/XCYSGGCgk9Q) demonstrates the
functionality

---------

Co-authored-by: Eugene <inbox@null.page>
2024-03-23 12:05:12 +01:00
Eugene
bcba6763ae
cargo fmt 2024-03-04 10:15:27 +01:00
Eugene
2d6621f5c8
bumped rust 2024-01-23 12:05:59 +01:00
Eugene
7e260e84e6
Bump version: 0.9.0 → 0.9.1 2023-12-18 16:24:44 +01:00
Eugene
0baf2e3b97
Bump version: 0.8.1 → 0.9.0 2023-11-23 19:41:07 +01:00
Eugene
6cace24fe8
lint 2023-11-23 19:40:53 +01:00