Skip to content

warp-tech/warpgate

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

1,085 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation


Shows a black logo in light color mode and a white one in dark color mode.


GitHub All Releases ย  ย  Discord


Warpgate is a smart & fully transparent SSH, HTTPS, MySQL and PostgreSQL bastion host that doesn't require a client app or an SSH wrapper.

  • Set it up in your DMZ, add user accounts and easily assign them to specific hosts and URLs within the network.
  • Warpgate will record every session for you to view (live) and replay later through a built-in admin web UI.
  • Not a jump host - forwards connection straight to the target in a way that's fully transparent to the client.
  • Native 2FA and SSO support (TOTP & OpenID Connect)
  • Single binary with no dependencies.
  • Written in 100% safe Rust.

Getting started & downloads

How is Warpgate different from a jump host / VPN / Teleport?

Warpgate SSH jump host VPN Teleport
โœ… Precise 1:1 assignment between users and services (Usually) full access to the network behind the jump host (Usually) full access to the network โœ… Precise 1:1 assignment between users and services
โœ… No custom client needed Jump host config needed โœ… No custom client needed Custom client required
โœ… 2FA out of the box ๐ŸŸก 2FA possible with additional PAM plugins ๐ŸŸก Depends on the provider โœ… 2FA out of the box
โœ… SSO out of the box ๐ŸŸก SSO possible with additional PAM plugins ๐ŸŸก Depends on the provider Paid
โœ… Command-level audit ๐ŸŸก Connection-level audit on the jump host, no secure audit on the target if root access is given No secure audit on the target if root access is given โœ… Command-level audit
โœ… Full session recording No secure recording possible on the target if root access is given No secure recording possible on the target if root access is given โœ… Full session recording
โœ… Non-interactive connections ๐ŸŸก Non-interactive connections are possible if the clients supports jump hosts natively โœ… Non-interactive connections Non-interactive connections require using an SSH client wrapper or running a tunnel
โœ… Self-hosted, you own the data โœ… Self-hosted, you own the data ๐ŸŸก Depends on the provider SaaS

image

Reporting security issues

Please use GitHub's vulnerability reporting system.

Project Status

The project is ready for production.

How it works

Warpgate is a service that you deploy on the bastion/DMZ host, which will accept SSH, HTTPS, MySQL and PostgreSQL connections and provide an (optional) web admin UI.

Run warpgate setup to interactively generate a config file, including port bindings. See Getting started for details.

It receives connections with specifically formatted credentials, authenticates the user locally, connects to the target itself, and then connects both parties together while (optionally) recording the session.

When connecting through HTTPS, Warpgate presents a selection of available targets, and will then proxy all traffic in a session to the selected target. You can switch between targets at any time.

You manage the target and user lists and assign them to each other through the admin UI, and the session history is stored in an SQLite database (default: in /var/lib/warpgate).

You can also use the admin web interface to view the live session list, review session recordings, logs and more.

Contributing / building from source

  • You'll need Rust, NodeJS and NPM
  • Clone the repo
  • Just is used to run tasks - install it: cargo install just
  • Install the admin UI deps: just npm install
  • Build the frontend: just npm run build
  • Build Warpgate: cargo build (optionally --release)

The binary is in target/{debug|release}.

Tech stack

  • Rust ๐Ÿฆ€
    • HTTP: poem-web
    • Database: SQLite via sea-orm + sqlx
    • SSH: russh
  • Typescript
    • Svelte
    • Bootstrap

Backend API

  • Warpgate admin and user facing APIs use autogenerated OpenAPI schemas and SDKs. To update the SDKs after changing the query/response structures, run just openapi-all.

Contributors โœจ

Thanks goes to these wonderful people (emoji key):

Eugeny
Eugeny

๐Ÿ’ป
Spencer Heywood
Spencer Heywood

๐Ÿ’ป
Andreas Piening
Andreas Piening

๐Ÿ’ป
Niklas
Niklas

๐Ÿ’ป
Nooblord
Nooblord

๐Ÿ’ป
Shea Smith
Shea Smith

๐Ÿ’ป
samtoxie
samtoxie

๐Ÿ’ป
Skyler Lewis
Skyler Lewis

๐Ÿ’ป
Mohammed Noureldin
Mohammed Noureldin

๐Ÿ’ป
Mourad Maatoug
Mourad Maatoug

๐Ÿ’ป
Justin
Justin

๐Ÿ’ป
liebermantodd
liebermantodd

๐Ÿ’ป
P Foundation
P Foundation

๐Ÿ’ต

This project follows the all-contributors specification. Contributions of any kind welcome!