803bbe0fff
Fix validation for ACL policy rules ports ( #938 )
2023-06-07 08:57:43 +02:00
8817765aeb
Add comment clarifying AddPeer race check ( #927 )
2023-06-02 18:04:24 +02:00
51502af218
Support IDP manager configuration with configure.sh ( #843 )
...
support IDP management configuration using configure.sh script
Add initial Zitadel configuration script
2023-06-02 17:34:36 +02:00
612ae253fe
Reject adding peer if already exists with the pub key ( #925 )
2023-06-02 17:32:55 +02:00
5028450133
add examples
2023-06-02 01:50:15 +02:00
2dcfa1efa3
fix summary
2023-06-02 01:32:48 +02:00
75fbaf811b
update openapi
2023-06-02 01:09:18 +02:00
293499c3c0
Extend protocol and firewall manager to handle old management ( #915 )
...
* Extend protocol and firewall manager to handle old management
* Send correct empty firewall rules list when delete peer
* Add extra tests for firewall manager and uspfilter
* Work with inconsistent state
* Review note
* Update comment
2023-05-31 19:04:38 +02:00
e87647c853
Merge pull request #913 from netbirdio/feature/add_selfhosted_metrics_for_pat_and_service_user
...
Add selfhosted metrics for PATs and service users
2023-05-31 14:41:34 +02:00
9e045479cc
fix pats counting
2023-05-30 19:44:40 +02:00
fe596c38c6
update rules count
2023-05-30 19:36:09 +02:00
6fd13f563e
use new policy-rule object
2023-05-30 19:09:16 +02:00
22e81f493b
fix metric creation from maps
2023-05-30 19:07:00 +02:00
51f780dae9
initialize maps
2023-05-30 18:53:23 +02:00
f164fad2c2
add some more metrics
2023-05-30 18:49:50 +02:00
452b045bb0
expose service users metrics
2023-05-30 16:40:48 +02:00
874c290205
Exclude second last IP from allocation to use it in the Fake DNS ( #912 )
2023-05-30 18:26:44 +04:00
7a9b05c56d
add selfhosted metric for pat and service users
2023-05-30 16:22:34 +02:00
79736197cd
Read config from generic configs ( #909 )
2023-05-29 16:01:04 +02:00
ba7a39a4fc
Feat linux firewall support ( #805 )
...
Update the client's engine to apply firewall rules received from the manager (results of ACL policy).
2023-05-29 16:00:18 +02:00
2eb9a97fee
Add Okta IdP ( #859 )
2023-05-29 14:52:04 +02:00
49c71b9b9d
Add Authentik IdP ( #897 )
2023-05-29 14:35:30 +02:00
3bebbe0409
Refactor IdP Config Structure ( #879 )
2023-05-29 13:48:19 +02:00
7bdb0dd358
merge openapi with version from docs repo
2023-05-26 15:32:52 +02:00
f66574b094
Count only successful HTTP request durations ( #886 )
2023-05-22 16:26:36 +02:00
48265b32f3
Measure write requests separately from read requests ( #880 )
2023-05-19 16:56:15 +02:00
03a42de5a0
Add telemetry to measure app durations ( #878 )
2023-05-19 11:42:25 +02:00
48a8b52740
Avoid storing account if no peer meta or expiration change ( #875 )
...
* Avoid storing account if no peer meta or expiration change
* remove extra log
* Update management/server/peer.go
Co-authored-by: Misha Bragin <bangvalo@gmail.com >
* Clarify why we need to skip account update
---------
Co-authored-by: Misha Bragin <bangvalo@gmail.com >
2023-05-18 19:31:35 +02:00
6e9f7531f5
Track user block/unblock activity event ( #865 )
2023-05-17 09:54:20 +02:00
873abc43bf
move into separate package
2023-05-16 12:57:56 +02:00
2fef52b856
remove dependency to external base62 package and create own methods in utils
2023-05-16 12:44:26 +02:00
2570363861
fix assign correct issuer url to auth0 AuthIssuer
2023-05-12 18:07:11 +03:00
e3d2b6a408
Block user through HTTP API ( #846 )
...
The new functionality allows blocking a user in the Management service.
Blocked users lose access to the Dashboard, aren't able to modify the network map,
and all of their connected devices disconnect and are set to the "login expired" state.
Technically all above was achieved with the updated PUT /api/users endpoint,
that was extended with the is_blocked field.
2023-05-11 18:09:36 +02:00
2c50d7af1e
Automatically load IdP OIDC configuration ( #847 )
2023-05-11 15:14:00 +02:00
e4c28f64fa
Fix user cache lookup filtering for service users ( #849 )
2023-05-10 19:27:17 +02:00
f4ec1699ca
Add Zitadel IdP ( #833 )
...
Added intergration with Zitadel management API.
Use the steps in zitadel.md for configuration.
2023-05-05 19:27:28 +02:00
873b56f856
Add Azure Idp Manager ( #822 )
...
Added intergration with Azure IDP user API.
Use the steps in azure-ad.md for configuration:
cb03373f8f/docs/integrations/identity-providers/self-hosted/azure-ad.md
2023-05-03 14:51:44 +02:00
59372ee159
API cleanup ( #824 )
...
removed all PATCH endpoints
updated path parameters for all endpoints
removed not implemented endpoints for api doc
minor description updates
2023-05-03 00:15:25 +02:00
08db5f5a42
Merge pull request #831 from netbirdio/fix/issue_with_account_creation_after_auth_refactor
...
FIx account creation issue after auth refactor
2023-05-02 19:14:54 +02:00
88678ef364
Merge pull request #808 from bcmmbaga/main
...
Add support for refreshing signing keys on expiry
2023-05-02 17:17:09 +02:00
f1da4fd55d
using old isAdmin function to create account
2023-05-02 16:49:29 +02:00
7f5e1c623e
Use forked Wireguard-go for custom bind ( #823 )
...
Update go version to 1.20
Use forked wireguard-go repo because of custom Bind implementation
2023-04-27 17:50:45 +02:00
6fec0c682e
Merging full service user feature into main ( #819 )
...
Merging full feature branch into main.
Adding full support for service users including backend objects, persistence, verification and api endpoints.
2023-04-22 12:57:51 +02:00
45224e76d0
fallback to olde keys if failing to fetch refreshed keys
2023-04-21 13:34:52 +03:00
90c8cfd863
synchronize access to the signing keys
2023-04-19 17:11:38 +03:00
f7196cd9a5
refactoring
2023-04-15 03:44:42 +03:00
9f352c1b7e
validate keys for idp's with key rotation mechanism
2023-04-14 12:20:34 +03:00
a89808ecae
initialize jwt validator with keys rotation state
2023-04-14 12:17:28 +03:00
0343c5f239
Rollback simple ACL rules processing. ( #803 )
2023-04-12 09:39:17 +02:00
251f2d7bc2
Pass newly generated ID to network map when adding peer ( #800 )
2023-04-11 14:28:22 +02:00