Skip to content

Releases: warp-tech/warpgate

v0.14.0-beta.2

27 May 08:29
Compare
Choose a tag to compare
v0.14.0-beta.2 Pre-release
Pre-release

Changes

  • UI updates

Fixes

  • 9bc1c9d: fixed #1346 - changing own password does not remove existing passwors

v0.14.0-beta.1

23 May 19:44
Compare
Choose a tag to compare
v0.14.0-beta.1 Pre-release
Pre-release

Changes

Fixes

  • Fixed Warpgate attempting RSA key auth against a target too many times, exhausting the OpenSSH limits (#1274) #1274 (Eugene)
  • 95dce41: Fix SSH Client to respond to keyboard-interactive when target has optional 2FA (#1273) (samtoxie) #1273
  • 51c8937: fixed frontend crash in list pagination
  • 5d3a8ac: Force the config file format to YAML (#1299) (Mice7R) #1299
  • 4b74303: #1271 - modals are invisible with prefers-reduced-motion
  • 0a3e444: fixed #1285 - unable to add public keys via credentials self-service
  • 26a9c99: fixed #1326 - UI allowing duplicate target names (#1328) #1328
  • d465586: fixed enter key handling in the "create target" form
  • b4076ef: fixed #1320 - JDBC based Postgres clients not connecting
  • 87b409b: SQL content of prepared Postgres queries were not logged
  • 5ee29b9: fixed #1337 - automatically strip the public key comment when setting via the API
  • 2381f55: fixed #972 - SSH server not offering keyboard-interactive when only OOB or SSO auth is enabled for a user

v0.13.3

04 Mar 15:51
Compare
Choose a tag to compare

Changes

  • 306138f: reenabled HTTP/2 support as client (both for HTTP targets and OIDC)

v0.13.2

26 Feb 10:04
Compare
Choose a tag to compare

Changes

  • ee05440: pasting a public key will automatically fill out the label field now if the key has a comment

Fixes

v0.13.1

19 Feb 21:03
Compare
Choose a tag to compare

Changes

Fixes

  • 2e75b28: fixed #1261 - reenable accidentally disabled Postgres TLS support

v0.13.0

18 Feb 22:56
Compare
Choose a tag to compare

Changes

Fixes

  • 40e49a2: Fixed SSO not respecting the OS' trusted TLS CAs (Thibaud Lepretre) #1233
  • 2abe104: fixed #1234 - rustls panic in tokio-tungstenite
  • 2cdf8ba: bump vulnerable deps (#1241) #1241
  • 8d53f7b: bumped russh for the mlock() fix
  • 7e15422: fixed #1258 - hide the version info until logged in (Eugene)
  • 6ade841: correctly bind to both ipv4 and ipv6 when [::] is set as listen endpoint (#1193)
  • create and canonicalize relative data_path (#1180) (willow)
  • e89bc03: fixed #1218 - make target search case insensitive
  • b665ca1: fixed #1197 - ticket creation on non-sqlite databases

v0.13.0-beta.2

18 Feb 11:14
Compare
Choose a tag to compare
v0.13.0-beta.2 Pre-release
Pre-release

Changes

Fixes

v0.13.0-beta.1

02 Feb 21:30
Compare
Choose a tag to compare
v0.13.0-beta.1 Pre-release
Pre-release

Changes

  • 409b382: UI facelift (#1175)
  • 010534a: added support for user API tokens and an API playground (#1191)
  • 1dec4c9: added a title field for public keys (#1171) (Mohammad Al Shakoush)
  • 59884fb: added "last used" and "date created" fields for public keys (#1182) (Mohammad Al Shakoush)
  • d51d882: fixed #1189 - updated default config to listen on IPv6 as well

Fixes

  • 6ade841: correctly bind to both ipv4 and ipv6 when [::] is set as listen endpoint (#1193)
  • create and canonicalize relative data_path (#1180) (willow)
  • e89bc03: fixed #1218 - make target search case insensitive
  • b665ca1: fixed #1197 - ticket creation on non-sqlite databases

v0.12.0

12 Dec 23:17
Compare
Choose a tag to compare

Changes

  • Self-service credentials management (#1145) - you can now allow users to manage their own credentials. Enable it in Config -> Misc -> Global parameters.
  • Multiple return domains for SSO, prefer host header over external_host (dbf96a8 / #1093) - Warpgate now users the Host header to resolve its own external URL and only falls back to the external_host from the config file if the header is missing. If you're running behind a reverse proxy, make sure that http.trust_x_forwarded_headers is set in the config and you're passing the X-Forwarded-Host header. SSO logins will also dynamically construct their return URL from the Host header. You can restrict the allowed return domains with the new sso_providers[].return_domain_whitelist option (a list of hostnames).
  • Passing user-identifying headers to HTTP targets (cc0b054 / #1107) - Warpgate now passes x-warpgate-username and x-warpgate-authentication-type headers to HTTP targets.
  • --enable-admin-token option (9dd1c58) - setting it allows passing a global admin token via the WARPGATE_ADMIN_TOKEN env variable. This token can be used to authenticate against the admin REST API (pass it in the x-warpgate-token header).

Other changes

Fixes

  • 846e6d1: fixed #1110 - Fix switch for insecure ssh algorithms option (#1111) (hashfunc)
  • 38dbb3b: fixed #1096 - SEC1 EC private key file support for TLS
  • 80ee6cc: fixed #1074 - strip trailing slash in SSO issuer URLs and log errors properly
  • 8acaaee: show more detailed error messages for API errors
  • 3b29a3e: fixed #929 - sso: broken additional_trusted_audiences config option
  • 557921f: postgres listener was incorrectly using the mysql certificate & key
  • 41d3158: fixed #1039 - first DB migration failing on Postgres
  • 64d7194: fixed #1150 - send the ssh-rsa client key when insecure algorithms are enabled

v0.12.0-beta.1

07 Dec 22:54
Compare
Choose a tag to compare
v0.12.0-beta.1 Pre-release
Pre-release

Changes

  • Self-service credentials management (#1145) - you can now allow users to manage their own credentials. Enable it in Config -> Misc -> Global parameters.
  • Multiple return domains for SSO, prefer host header over external_host (dbf96a8 / #1093) - Warpgate now users the Host header to resolve its own external URL and only falls back to the external_host from the config file if the header is missing. If you're running behind a reverse proxy, make sure that http.trust_x_forwarded_headers is set in the config and you're passing the X-Forwarded-Host header. SSO logins will also dynamically construct their return URL from the Host header. You can restrict the allowed return domains with the new sso_providers[].return_domain_whitelist option (a list of hostnames).
  • Passing user-identifying headers to HTTP targets (cc0b054 / #1107) - Warpgate now passes x-warpgate-username and x-warpgate-authentication-type headers to HTTP targets.
  • --enable-admin-token option (9dd1c58) - setting it allows passing a global admin token via the WARPGATE_ADMIN_TOKEN env variable. This token can be used to authenticate against the admin REST API (pass it in the x-warpgate-token header).

Other changes

Fixes

  • 846e6d1: fixed #1110 - Fix switch for insecure ssh algorithms option (#1111) (hashfunc)
  • 38dbb3b: fixed #1096 - SEC1 EC private key file support for TLS
  • 80ee6cc: fixed #1074 - strip trailing slash in SSO issuer URLs and log errors properly
  • 8acaaee: show more detailed error messages for API errors
  • 3b29a3e: fixed #929 - sso: broken additional_trusted_audiences config option
  • 557921f: postgres listener was incorrectly using the mysql certificate & key
  • 41d3158: fixed #1039 - first DB migration failing on Postgres