5dc0ff42a5
Fix broken auto-generated Rego rule ( #769 )
...
Default Rego policy generated from the rules in some cases is broken.
This change fixes the Rego template for rules to generate policies.
Also, file store load constantly regenerates policy objects from rules.
It allows updating/fixing of the default Rego template during releases.
2023-04-01 12:02:08 +02:00
909f305728
Merge pull request #766 from netbirdio/feature/add_rest_endpoints_for_pat
...
Feature/add rest endpoints for pat
2023-03-30 15:55:48 +02:00
5e2f66d591
fix codacy
2023-03-30 15:23:24 +02:00
a7519859bc
fix test
2023-03-30 14:15:44 +02:00
5c1acdbf2f
move validation into account manager + func for get requests
2023-03-30 13:58:44 +02:00
ecc4f8a10d
fix Pat handler test
2023-03-29 19:13:01 +02:00
03abdfa112
return empty object on all handlers instead of empty string
2023-03-29 18:46:40 +02:00
9746a7f61a
remove debug logs
2023-03-29 18:27:01 +02:00
4ec6d5d20b
remove debug logs
2023-03-29 18:23:10 +02:00
3bab745142
last_used can be nil
2023-03-29 17:46:09 +02:00
0ca3d27a80
update account mock
2023-03-29 15:25:44 +02:00
c5942e6b33
store hashed token base64 encoded
2023-03-29 15:21:53 +02:00
726ffb5740
add comments for exported functions
2023-03-29 15:06:54 +02:00
42ba0765c8
fix linter
2023-03-28 14:54:06 +02:00
514403db37
use object instead of plain token for create response + handler test
2023-03-28 14:47:15 +02:00
6a75ec4ab7
fix http error codes
2023-03-27 17:42:05 +02:00
b66e984ddd
set limits for expiration
2023-03-27 17:28:24 +02:00
c65a934107
refactor to use name instead of description
2023-03-27 16:28:49 +02:00
9e74f30d2f
fix delete token parameter lookup
2023-03-27 15:19:19 +02:00
a27fe4326c
Add JWT middleware validation failure log ( #760 )
...
We will log the middleware log now, but in the next
releases we should provide a generic error that can be
parsed by the dashboard.
2023-03-23 18:26:41 +01:00
e6292e3124
Disable peer expiration of peers added with setup keys ( #758 )
2023-03-23 17:47:53 +01:00
628b497e81
Adjustments for the change server flow ( #756 )
...
Check SSO support by calling the internal.GetDeviceAuthorizationFlowInfo
Rename LoginSaveConfigIfSSOSupported to SaveConfigIfSSOSupported
Receive device name as input for setup-key login
have a default android name when no context value is provided
log non parsed errors from management registration calls
2023-03-23 16:35:06 +01:00
8f66dea11c
Add Keycloak Idp Manager ( #746 )
...
Added intergration with keycloak user API.
2023-03-23 14:54:31 +01:00
de8608f99f
add rest endpoints and update openapi doc
2023-03-21 16:02:19 +01:00
8e4710763e
use single line return for SaveAccount
2023-03-21 14:02:34 +01:00
82af60838e
use "ok" convention for check variables throughout files_store
2023-03-21 14:00:59 +01:00
311b67fe5a
change error messages
2023-03-21 13:56:31 +01:00
94d39ab48c
improve style for tests
2023-03-21 13:34:48 +01:00
41a47be379
add function comments, implement account mock functions and added error handling in tests
2023-03-20 16:38:17 +01:00
e30def175b
switch PATs to map and add deletion
2023-03-20 16:14:55 +01:00
e1ef091d45
remove unnecessary string conversion
2023-03-20 12:08:01 +01:00
511ba6d51f
Delete pat_handler.go
2023-03-20 11:47:54 +01:00
b852198f67
codacy and lint hints
2023-03-20 11:44:12 +01:00
628a201e31
fix PAT array split
2023-03-16 16:59:32 +01:00
453643683d
add method to account mock
2023-03-16 16:44:05 +01:00
b8cab2882b
storing and retrieving PATs
2023-03-16 15:57:44 +01:00
3b42d5e48a
fix imports after merge
2023-03-16 11:59:12 +01:00
f8db5742b5
Merge branch 'main' into feature/add_PAT_generation
2023-03-16 11:36:43 +01:00
bc3cec23ec
use slice copy
2023-03-16 11:32:55 +01:00
292ee260ad
Add version info command to signal server ( #739 )
...
Add version command to signal and management servers.
The version information will be filled during build time.
2023-03-15 07:54:51 +01:00
2a1efbd0fd
Don't drop Rules from file storage after migration to Policies ( #741 )
...
Rego policy migration clears the rules property of the file storage, but it does not allow rollback management upgrade, so this changes pre-saves rules in the file store and updates it from the policies.
2023-03-15 09:42:40 +04:00
3bfa26b13b
Feat rego default policy ( #700 )
...
Converts rules to Rego policies and allow users to write raw policies to set up connectivity and firewall on the clients.
2023-03-13 18:14:18 +04:00
221934447e
Send remote agents updates when peer re-authenticates ( #737 )
...
When peer login expires, all remote peers are updated to exclude the peer from connecting.
Once a peer re-authenticates, the remote peers are not updated.
This peer fixes the behavior.
2023-03-10 17:39:29 +01:00
9ce8056b17
Use global login expiration setting when sending network map ( #731 )
...
Peers were considered expired and not sent to remote peers
when global expiration was disabled.
2023-03-09 11:24:42 +01:00
62de082961
fix account test
2023-03-08 12:21:44 +01:00
c4d9b76634
add comment for exported const
2023-03-08 12:09:22 +01:00
b4bb5c6bb8
use const and do array copy
2023-03-08 11:54:10 +01:00
2b1965c941
switch secret generation to use lib
2023-03-08 11:36:03 +01:00
83e7e30218
store hashedToken as string
2023-03-08 11:30:09 +01:00
ed4f90b6aa
Report offline peers to agents ( #728 )
...
The peer login expiration ACL check introduced in #714
filters out peers that are expired and agents receive a network map
without that expired peers.
However, the agents should see those peers in status "Disconnected".
This PR extends the Agent <-> Management protocol
by introducing a new field OfflinePeers
that contain expired peers. Agents keep track of those and display
then just in the Status response.
2023-03-07 10:17:25 +01:00