Skip to content

Commit 5eb0416

Browse files
authored
[ZT] Add warp-cli target list (#17382)
* add list-targets * update target list output * update feature availability * no mobile support * add back mobile support
1 parent ee8ebed commit 5eb0416

File tree

2 files changed

+52
-3
lines changed

2 files changed

+52
-3
lines changed

src/content/changelogs/warp.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ entries:
1111
A new GA release for the Linux WARP client is now available in the [package repository](https://pkg.cloudflareclient.com/). This release contains minor fixes and minor improvements.
1212
1313
Notable updates:
14-
- Added `list targets` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
14+
- Added `target list` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
1515
- Added the ability to customize PCAP options in the `warp-cli`.
1616
- Added a list of installed applications in `warp-diag`.
1717
- Added a `tunnel reset mtu` subcommand to the `warp-cli`.
@@ -36,7 +36,7 @@ entries:
3636
A new GA release for the Windows WARP client is now available in the [App Center](https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release). This release contains minor fixes and improvements.
3737
3838
Notable updates:
39-
- Added `list targets` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
39+
- Added `target list` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
4040
- Added [pre-login](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/windows-prelogin/) configuration details to the `warp-diag` output.
4141
- Added a `tunnel reset mtu` subcommand to the `warp-cli`.
4242
- Added a JSON output option to the `warp-cli`.
@@ -57,7 +57,7 @@ entries:
5757
All customers running macOS Ventura 13.0 and above (including Sequoia) are advised to upgrade to this release. This release fixes an incompatibility with the firewall found on macOS Sonoma 14.4 and above that could result in the firewall being disabled.
5858
5959
Notable updates:
60-
- Added `list targets` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
60+
- Added `target list` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
6161
- Added a `tunnel reset mtu` subcommand to the `warp-cli`.
6262
- Added the ability for `warp-cli` to use the team name provided in the MDM file for initial registration.
6363
- Added a JSON output option to the `warp-cli`.

src/content/docs/cloudflare-one/applications/non-http/infrastructure-apps.mdx

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,23 @@ sidebar:
1010

1111
import { Badge, Details, Tabs, TabItem, Render } from "~/components";
1212

13+
<Details header="Feature availability">
14+
15+
| [WARP modes](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/) | [Zero Trust plans](https://www.cloudflare.com/teams-pricing/) |
16+
| ----------------------------------------------------------------------------------------- | ------------------------------------------------------------- |
17+
| <ul><li> Gateway with WARP</li><li> Secure Web Gateway without DNS filtering </li></ul> | All plans |
18+
19+
| System | Availability |
20+
| -------- | ------------ |
21+
| Windows ||
22+
| macOS ||
23+
| Linux ||
24+
| iOS ||
25+
| Android ||
26+
| ChromeOS ||
27+
28+
</Details>
29+
1330
Access for Infrastructure allows you to have granular control over how users access individual servers, clusters, or databases in your private network. By adding an infrastructure application to Cloudflare Access, you can configure how users authenticate to the resource as well as control and authorize the ports, protocols, and usernames that they can connect with. Access and command logs ensure regulatory compliance and allow for auditing of user activity in case of a security breach.
1431

1532
:::note
@@ -64,6 +81,38 @@ To connect to targets that are in different VNETS, users will need to [switch th
6481
If a user is connected to a target in VNET-A and needs to connect to a target in VNET-B, switching their VNET will not break any existing connections to targets within VNET-A. At present, connections are maintained between VNETs.
6582
:::
6683

84+
### Display available targets
85+
86+
<Details header="Feature availability">
87+
88+
| System | Availability | Minimum WARP version |
89+
| -------- | ------------ | -------------------- |
90+
| Windows || 2024.9.346.0 |
91+
| macOS || 2024.9.346.0 |
92+
| Linux || 2024.9.346.0 |
93+
| iOS || |
94+
| Android || |
95+
| ChromeOS || |
96+
97+
98+
</Details>
99+
100+
Users can use `warp-cli` to display a list of targets they can access. On the WARP device, open a terminal and run the following command:
101+
102+
```sh
103+
warp-cli target list
104+
```
105+
106+
```sh output
107+
╭──────────────────────────────────────┬──────────┬──────┬────────────────────────────────┬───────────────────────────────────────────────────┬───────────╮
108+
│ Target ID │ Protocol │ Port │ Attributes │ IP (Virtual Network) │ Usernames │
109+
├──────────────────────────────────────┼──────────┼──────┼────────────────────────────────┼───────────────────────────────────────────────────┼───────────┤
110+
│ 0192027a-ef8a-7966-aff6-4576475db365 │ SSH │ 22 │ hostname: digital-ocean-target │ 10.116.0.3 (a663a21c-76e5-4e3c-8296-d856682269f9) │ root │
111+
├──────────────────────────────────────┼──────────┼──────┼────────────────────────────────┼───────────────────────────────────────────────────┼───────────┤
112+
│ 0192027a-ef8a-7966-aff6-4576475db365 │ SSH │ 23 │ hostname: digital-ocean-target │ 10.116.0.3 (a663a21c-76e5-4e3c-8296-d856682269f9) │ root │
113+
╰──────────────────────────────────────┴──────────┴──────┴────────────────────────────────┴───────────────────────────────────────────────────┴───────────╯
114+
```
115+
67116
## Revoke a user's session
68117

69118
To revoke a user's access to all infrastructure targets, you can either [revoke the user from Zero Trust](/cloudflare-one/identity/users/session-management/#per-user) or revoke their device. Cloudflare does not currently support revoking a user's session for a specific target.

0 commit comments

Comments
 (0)