back to home

warp-tech / warpgate

Fully transparent SSH, HTTPS, MySQL and Postgres bastion/PAM that doesn't need additional client-side software

6,633 stars
242 forks
172 issues
RustSveltePython

AI Architecture Analysis

This repository is indexed by RepoMind. By analyzing warp-tech/warpgate in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.

Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context on-demand, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.

Source files are only loaded when you start an analysis to optimize performance.

Embed this Badge

Showcase RepoMind's analysis directly in your repository's README.

[![Analyzed by RepoMind](https://img.shields.io/badge/Analyzed%20by-RepoMind-4F46E5?style=for-the-badge)](https://repomind.in/repo/warp-tech/warpgate)
Preview:Analyzed by RepoMind

Repository Summary (README)

Preview


Shows a black logo in light color mode and a white one in dark color mode.


GitHub All Releases     Discord


Warpgate is a smart & fully transparent SSH, HTTPS, MySQL and PostgreSQL bastion host that doesn't require a client app or an SSH wrapper.

  • Set it up in your DMZ, add user accounts and easily assign them to specific hosts and URLs within the network.
  • Warpgate will record every session for you to view (live) and replay later through a built-in admin web UI.
  • Not a jump host - forwards connection straight to the target in a way that's fully transparent to the client.
  • Native 2FA and SSO support (TOTP & OpenID Connect)
  • Single binary with no dependencies.
  • Written in 100% safe Rust.

Getting started & downloads

How is Warpgate different from a jump host / VPN / Teleport?

WarpgateSSH jump hostVPNTeleport
Precise 1:1 assignment between users and services(Usually) full access to the network behind the jump host(Usually) full access to the networkPrecise 1:1 assignment between users and services
No custom client neededJump host config neededNo custom client neededCustom client required
2FA out of the box🟡 2FA possible with additional PAM plugins🟡 Depends on the provider2FA out of the box
SSO out of the box🟡 SSO possible with additional PAM plugins🟡 Depends on the providerPaid
Command-level audit🟡 Connection-level audit on the jump host, no secure audit on the target if root access is givenNo secure audit on the target if root access is givenCommand-level audit
Full session recordingNo secure recording possible on the target if root access is givenNo secure recording possible on the target if root access is givenFull session recording
Non-interactive connections🟡 Non-interactive connections are possible if the clients supports jump hosts nativelyNon-interactive connectionsNon-interactive connections require using an SSH client wrapper or running a tunnel
Self-hosted, you own the dataSelf-hosted, you own the data🟡 Depends on the providerSaaS
image

Reporting security issues

Please use GitHub's vulnerability reporting system.

Project Status

The project is ready for production.

How it works

Warpgate is a service that you deploy on the bastion/DMZ host, which will accept SSH, HTTPS, MySQL and PostgreSQL connections and provide an (optional) web admin UI.

Run warpgate setup to interactively generate a config file, including port bindings. See Getting started for details.

It receives connections with specifically formatted credentials, authenticates the user locally, connects to the target itself, and then connects both parties together while (optionally) recording the session.

When connecting through HTTPS, Warpgate presents a selection of available targets, and will then proxy all traffic in a session to the selected target. You can switch between targets at any time.

You manage the target and user lists and assign them to each other through the admin UI, and the session history is stored in an SQLite database (default: in /var/lib/warpgate).

You can also use the admin web interface to view the live session list, review session recordings, logs and more.

Contributing / building from source

  • You'll need Rust, NodeJS and NPM
  • Clone the repo
  • Just is used to run tasks - install it: cargo install just
  • Install the admin UI deps: just npm install
  • Build the frontend: just npm run build
  • Build Warpgate: cargo build (optionally --release)

The binary is in target/{debug|release}.

Tech stack

  • Rust 🦀
    • HTTP: poem-web
    • Database: SQLite via sea-orm + sqlx
    • SSH: russh
  • Typescript
    • Svelte
    • Bootstrap

Backend API

  • Warpgate admin and user facing APIs use autogenerated OpenAPI schemas and SDKs. To update the SDKs after changing the query/response structures, run just openapi-all.

Contributors ✨

Thanks goes to these wonderful people (emoji key):

Eugeny
Eugeny

💻
Spencer Heywood
Spencer Heywood

💻
Andreas Piening
Andreas Piening

💻
Niklas
Niklas

💻
Nooblord
Nooblord

💻
Shea Smith
Shea Smith

💻
samtoxie
samtoxie

💻
Skyler Lewis
Skyler Lewis

💻
Mohammed Noureldin
Mohammed Noureldin

💻
Mourad Maatoug
Mourad Maatoug

💻
Justin
Justin

💻
liebermantodd
liebermantodd

💻
P Foundation
P Foundation

💵

This project follows the all-contributors specification. Contributions of any kind welcome!