mirror of
https://github.com/cloudflare/cloudflared.git
synced 2025-07-27 07:59:58 +00:00

This commit adds support for FedRAMP environments. Cloudflared will now dynamically configure the management hostname and API URL, switching to FedRAMP-specific values like `management.fed.argotunnel.com` and `https://api.fed.cloudflare.com/client/v4` when a FedRAMP endpoint is detected. Key to this is an enhanced `ParseToken` function, which now includes an `IsFed()` method to determine if a management token's issuer is `fed-tunnelstore`. This allows cloudflared to correctly identify and operate within a FedRAMP context, ensuring proper connectivity. Closes TUN-9583
64 lines
1.5 KiB
Go
64 lines
1.5 KiB
Go
package management
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/go-jose/go-jose/v4"
|
|
"github.com/go-jose/go-jose/v4/jwt"
|
|
)
|
|
|
|
const tunnelstoreFEDIssuer = "fed-tunnelstore"
|
|
|
|
type managementTokenClaims struct {
|
|
Tunnel tunnel `json:"tun"`
|
|
Actor actor `json:"actor"`
|
|
jwt.Claims
|
|
}
|
|
|
|
// VerifyTunnel compares the tun claim isn't empty
|
|
func (c *managementTokenClaims) verify() bool {
|
|
return c.Tunnel.verify() && c.Actor.verify()
|
|
}
|
|
|
|
type tunnel struct {
|
|
ID string `json:"id"`
|
|
AccountTag string `json:"account_tag"`
|
|
}
|
|
|
|
// verify compares the tun claim isn't empty
|
|
func (t *tunnel) verify() bool {
|
|
return t.AccountTag != "" && t.ID != ""
|
|
}
|
|
|
|
type actor struct {
|
|
ID string `json:"id"`
|
|
Support bool `json:"support"`
|
|
}
|
|
|
|
// verify checks the ID claim isn't empty
|
|
func (t *actor) verify() bool {
|
|
return t.ID != ""
|
|
}
|
|
|
|
func ParseToken(token string) (*managementTokenClaims, error) {
|
|
jwt, err := jwt.ParseSigned(token, []jose.SignatureAlgorithm{jose.ES256})
|
|
if err != nil {
|
|
return nil, fmt.Errorf("malformed jwt: %v", err)
|
|
}
|
|
|
|
var claims managementTokenClaims
|
|
// This is actually safe because we verify the token in the edge before it reaches cloudflared
|
|
err = jwt.UnsafeClaimsWithoutVerification(&claims)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("malformed jwt: %v", err)
|
|
}
|
|
if !claims.verify() {
|
|
return nil, fmt.Errorf("invalid management token format provided")
|
|
}
|
|
return &claims, nil
|
|
}
|
|
|
|
func (m *managementTokenClaims) IsFed() bool {
|
|
return m.Issuer == tunnelstoreFEDIssuer
|
|
}
|