Skip to content

Harden signed user token identity forwarding#2

Open
stainlu wants to merge 1 commit intoopenclaw:mainfrom
stainlu:fix/scope-coordinator-user-data
Open

Harden signed user token identity forwarding#2
stainlu wants to merge 1 commit intoopenclaw:mainfrom
stainlu:fix/scope-coordinator-user-data

Conversation

@stainlu
Copy link
Copy Markdown

@stainlu stainlu commented May 1, 2026

Summary

  • Strip caller-supplied cf-access-authenticated-user-email before forwarding authenticated requests to the Fleet Durable Object.
  • Prefer the authenticated x-crabbox-owner context when resolving request ownership, while keeping the Access email header as a fallback.
  • Document the signed-token forwarding behavior and add a regression test for spoofed identity headers.

Verification

  • npm run format:check --prefix worker
  • npm run lint --prefix worker
  • npm run check --prefix worker
  • npm test --prefix worker
  • npm run build --prefix worker
  • node scripts/build-docs-site.mjs
  • npm run check
  • git diff --check

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant