Commit Graph

223 Commits

Author SHA1 Message Date
5dc0ff42a5 Fix broken auto-generated Rego rule (#769)
Default Rego policy generated from the rules in some cases is broken.
This change fixes the Rego template for rules to generate policies.

Also, file store load constantly regenerates policy objects from rules.
It allows updating/fixing of the default Rego template during releases.
2023-04-01 12:02:08 +02:00
909f305728 Merge pull request #766 from netbirdio/feature/add_rest_endpoints_for_pat
Feature/add rest endpoints for pat
2023-03-30 15:55:48 +02:00
5e2f66d591 fix codacy 2023-03-30 15:23:24 +02:00
a7519859bc fix test 2023-03-30 14:15:44 +02:00
5c1acdbf2f move validation into account manager + func for get requests 2023-03-30 13:58:44 +02:00
ecc4f8a10d fix Pat handler test 2023-03-29 19:13:01 +02:00
03abdfa112 return empty object on all handlers instead of empty string 2023-03-29 18:46:40 +02:00
9746a7f61a remove debug logs 2023-03-29 18:27:01 +02:00
4ec6d5d20b remove debug logs 2023-03-29 18:23:10 +02:00
3bab745142 last_used can be nil 2023-03-29 17:46:09 +02:00
0ca3d27a80 update account mock 2023-03-29 15:25:44 +02:00
c5942e6b33 store hashed token base64 encoded 2023-03-29 15:21:53 +02:00
726ffb5740 add comments for exported functions 2023-03-29 15:06:54 +02:00
42ba0765c8 fix linter 2023-03-28 14:54:06 +02:00
514403db37 use object instead of plain token for create response + handler test 2023-03-28 14:47:15 +02:00
6a75ec4ab7 fix http error codes 2023-03-27 17:42:05 +02:00
b66e984ddd set limits for expiration 2023-03-27 17:28:24 +02:00
c65a934107 refactor to use name instead of description 2023-03-27 16:28:49 +02:00
9e74f30d2f fix delete token parameter lookup 2023-03-27 15:19:19 +02:00
a27fe4326c Add JWT middleware validation failure log (#760)
We will log the middleware log now, but in the next
releases we should provide a generic error that can be
parsed by the dashboard.
2023-03-23 18:26:41 +01:00
e6292e3124 Disable peer expiration of peers added with setup keys (#758) 2023-03-23 17:47:53 +01:00
628b497e81 Adjustments for the change server flow (#756)
Check SSO support by calling the internal.GetDeviceAuthorizationFlowInfo

Rename LoginSaveConfigIfSSOSupported to SaveConfigIfSSOSupported

Receive device name as input for setup-key login

have a default android name when no context value is provided

log non parsed errors from management registration calls
2023-03-23 16:35:06 +01:00
8f66dea11c Add Keycloak Idp Manager (#746)
Added intergration with keycloak user API.
2023-03-23 14:54:31 +01:00
de8608f99f add rest endpoints and update openapi doc 2023-03-21 16:02:19 +01:00
8e4710763e use single line return for SaveAccount 2023-03-21 14:02:34 +01:00
82af60838e use "ok" convention for check variables throughout files_store 2023-03-21 14:00:59 +01:00
311b67fe5a change error messages 2023-03-21 13:56:31 +01:00
94d39ab48c improve style for tests 2023-03-21 13:34:48 +01:00
41a47be379 add function comments, implement account mock functions and added error handling in tests 2023-03-20 16:38:17 +01:00
e30def175b switch PATs to map and add deletion 2023-03-20 16:14:55 +01:00
e1ef091d45 remove unnecessary string conversion 2023-03-20 12:08:01 +01:00
511ba6d51f Delete pat_handler.go 2023-03-20 11:47:54 +01:00
b852198f67 codacy and lint hints 2023-03-20 11:44:12 +01:00
628a201e31 fix PAT array split 2023-03-16 16:59:32 +01:00
453643683d add method to account mock 2023-03-16 16:44:05 +01:00
b8cab2882b storing and retrieving PATs 2023-03-16 15:57:44 +01:00
3b42d5e48a fix imports after merge 2023-03-16 11:59:12 +01:00
f8db5742b5 Merge branch 'main' into feature/add_PAT_generation 2023-03-16 11:36:43 +01:00
bc3cec23ec use slice copy 2023-03-16 11:32:55 +01:00
292ee260ad Add version info command to signal server (#739)
Add version command to signal and management servers.

The version information will be filled during build time.
2023-03-15 07:54:51 +01:00
2a1efbd0fd Don't drop Rules from file storage after migration to Policies (#741)
Rego policy migration clears the rules property of the file storage, but it does not allow rollback management upgrade, so this changes pre-saves rules in the file store and updates it from the policies.
2023-03-15 09:42:40 +04:00
3bfa26b13b Feat rego default policy (#700)
Converts rules to Rego policies and allow users to write raw policies to set up connectivity and firewall on the clients.
2023-03-13 18:14:18 +04:00
221934447e Send remote agents updates when peer re-authenticates (#737)
When peer login expires, all remote peers are updated to exclude the peer from connecting.
Once a peer re-authenticates, the remote peers are not updated.
This peer fixes the behavior.
2023-03-10 17:39:29 +01:00
9ce8056b17 Use global login expiration setting when sending network map (#731)
Peers were considered expired and not sent to remote peers
when global expiration was disabled.
2023-03-09 11:24:42 +01:00
62de082961 fix account test 2023-03-08 12:21:44 +01:00
c4d9b76634 add comment for exported const 2023-03-08 12:09:22 +01:00
b4bb5c6bb8 use const and do array copy 2023-03-08 11:54:10 +01:00
2b1965c941 switch secret generation to use lib 2023-03-08 11:36:03 +01:00
83e7e30218 store hashedToken as string 2023-03-08 11:30:09 +01:00
ed4f90b6aa Report offline peers to agents (#728)
The peer login expiration ACL check introduced in #714
filters out peers that are expired and agents receive a network map 
without that expired peers.
However, the agents should see those peers in status "Disconnected".

This PR extends the Agent <-> Management protocol 
by introducing a new field OfflinePeers
that contain expired peers. Agents keep track of those and display 
then just in the Status response.
2023-03-07 10:17:25 +01:00