chore(deps): update ghcr.io/warp-tech/warpgate docker tag to v0.12.0 #54
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v0.8.1
->v0.12.0
Release Notes
warp-tech/warpgate (ghcr.io/warp-tech/warpgate)
v0.12.0
Compare Source
Changes
Config -> Misc -> Global parameters
.external_host
(dbf96a8
/ #1093) - Warpgate now users theHost
header to resolve its own external URL and only falls back to theexternal_host
from the config file if the header is missing. If you're running behind a reverse proxy, make sure thathttp.trust_x_forwarded_headers
is set in the config and you're passing theX-Forwarded-Host
header. SSO logins will also dynamically construct their return URL from theHost
header. You can restrict the allowed return domains with the newsso_providers[].return_domain_whitelist
option (a list of hostnames).cc0b054
/ #1107) - Warpgate now passesx-warpgate-username
andx-warpgate-authentication-type
headers to HTTP targets.--enable-admin-token
option (9dd1c58
) - setting it allows passing a global admin token via the WARPGATE_ADMIN_TOKEN env variable. This token can be used to authenticate against the admin REST API (pass it in thex-warpgate-token
header).Other changes
ef46e75
: add keepalive_interval to ssh config (#1134) (Piotr Rotter)f1d565b
: Svelte 5 migration (#1101)a20fdb8
: Bumped russh (#1131)379b1bc
: fixed #983 - enable ssh-rsa when insecure algorithms are allowedb359838
: Separate DB models for credentials (#1143)Fixes
846e6d1
: fixed #1110 - Fix switch for insecure ssh algorithms option (#1111) (hashfunc)38dbb3b
: fixed #1096 - SEC1 EC private key file support for TLS80ee6cc
: fixed #1074 - strip trailing slash in SSO issuer URLs and log errors properly8acaaee
: show more detailed error messages for API errors3b29a3e
: fixed #929 - sso: brokenadditional_trusted_audiences
config option557921f
: postgres listener was incorrectly using the mysql certificate & key41d3158
: fixed #1039 - first DB migration failing on Postgres64d7194
: fixed #1150 - send thessh-rsa
client key when insecure algorithms are enabledv0.11.0
Compare Source
PostgreSQL
v0.11 adds experimental PostgreSQL target support.
Enable the PostgreSQL protocol in your config file (default:
/etc/warpgate.yaml
) if you didn't do so during the initial setup:You can reuse the same certificate and key that are used for the HTTP listener.
See [https://github.com/warp-tech/warpgate/wiki/Adding-a-PostgreSQL-target]\(Adding a PostgreSQL target) for more details.
Changes
00d3c36
: PostgreSQL support (#1021) #1021fe521f2
: OIDC RP-initiated logout (SSO single logout) support (#992) #9923c3b843
: Validate a TOTP code before saving it (#1055) (kekkon) #1055Fixes
116bf9f
: fixed SSO authentication getting incorrectly rejected when user has both an "any provider" and a provider specific SSO credential1f597a8
: fixed #1053 - prevent repeated consumption of the ticket uses within the same SSH session38bdbad
: fixed #1077 - handle non-standard PKCS8 EC private key PEMs7e49f13
: #1056 - auto-strip .well-known/openid-configuration from OIDC URLs9e3760e
: fixed #1082 - terminal replay crashing when the session is finishedv0.10.2
Compare Source
Security fixes
CVE-2024-43410 - SSH OOM DoS through malicious packet length
It was possible for an attacker to cause Warpgate to allocate an arbitrary amount of memory by sending a packet with a malformed length field, potentially causing the service to get killed due to excessive RAM usage.
Other fIxes
c328127
: fixed #941 - unnecessary port number showing up in external URLsv0.10.1
Compare Source
Fixes
ed6f68c
: fixed #1017 - fixed broken HTTP proxyingdaacd55
: fixed #972 - ssh: only offer available auth methods after a rejected public key offerv0.10.0
Compare Source
HTTP
remote_addr
to logs #945 (Néfix Estrada)SSH
5551c33
: Switch OOB SSO authentication for SSH to use the instructions instead of the name (#964) (Shea Smith) #964russh
tov0.44
8896bb3
: fixed #961 - added option to allow insecure ssh key exchanges (#971) #971SSO
916d51a
: Add support for role mappings on custom SSO providers. (#920) (Skyler Mansfield) #92075a2b8c
: fixed #929 - support additional trusted OIDC audiencesUI
257fb38
: Enhance ticket creation api and UI to support ticket expiry (#957) (Thibaud Lepretre) #957f3dc1ad
: Enhance ticket creation api and UI to support ticket number of usage (#959) (Thibaud Lepretre) #959Other changes
72236d0
: Added options to specify per-protocol external ports (#973) #97381cefeb
: fixed #966 - don't actually try to tighten config file permissions unless necessary7e45fa5
: migrate from moment to date-fns (#988) (Konstantin Nosov) #988b65a189
: Upgrade TypeScript and Svelte Versions (#995) (Yachen Mao) #995v0.9.1
Compare Source
Security fixes
CVE-2023-48795 - Terrapin Attack [
12fdf62
]A flaw in the SSH protocol itself allows an active MitM attacker to prevent the client & server from negotiating OpenSSH security extensions, or, with AsyncSSH, take control of the user's session.
This release adds the support for the
kex-strict-*-v00@​openssh.com
extensions designed by OpenSSH specifically to prevent this attack.More info: https://terrapin-attack.com
Changes
21d6ab4
: make HTTP session timeout and cookie age configurable in the config file (Nicolas SEYS) #922v0.9.0
Compare Source
Security fixes
CVE-2023-48712
This vulnerability allows a user to escalate their privileges if the admin account isn't protected by 2FA.
Migration
X-Forwarded-*
headers, sethttp.trust_x_forwarded_for
totrue
in the config file.Changes
b0a9130
: Add support for trustingX-Forwarded-For
header to get client IP (Skyler Mansfield) #921d9af747
: Add better support forX-Forward-*
headers when constructing external url (Skyler Mansfield) #921Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.