Skip to content

Commit 5c8f3d1

Browse files
authored
Merge branch 'cloudflare:production' into production
2 parents b596eaf + 3d93da4 commit 5c8f3d1

File tree

28 files changed

+1108
-150
lines changed

28 files changed

+1108
-150
lines changed

bin/fetch-ai-models.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
import fs from "fs";
22

3-
fetch("https://ai.cloudflare.com/api/models")
3+
fetch("https://ai-cloudflare-com.pages.dev/api/models")
44
.then((res) => res.json())
55
.then((data) => {
66
data.models.map((model) => {

public/__redirects

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2393,6 +2393,7 @@
23932393
/cloudflare-one/connections/connect-apps/install-and-setup/deployment-guides/* /cloudflare-one/connections/connect-networks/deployment-guides/:splat 301
23942394
/cloudflare-one/connections/connect-networks/deploy-tunnels/deployment-guides/* /cloudflare-one/connections/connect-networks/deployment-guides/:splat 301
23952395
/cloudflare-one/connections/connect-networks/configure-tunnels/local-management/* /cloudflare-one/connections/connect-networks/do-more-with-tunnels/local-management/:splat 301
2396+
/cloudflare-one/networks/connectors/cloudflare-tunnel/install-and-setup/* /cloudflare-one/networks/connectors/cloudflare-tunnel/ 301
23962397
/cloudflare-one/analytics/logs/* /cloudflare-one/insights/logs/:splat 301
23972398
/cloudflare-one/applications/scan-apps/* /cloudflare-one/applications/casb/:splat 301
23982399
/cloudflare-one/connections/connect-apps/use_cases/* /cloudflare-one/connections/connect-networks/use-cases/:splat 301
209 KB
Loading
132 KB
Loading

src/assets/images/realtime/realtimekit/peer-lifecycle.svg

Lines changed: 1 addition & 0 deletions
Loading
45.2 KB
Loading

src/components/WranglerConfig.astro

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,13 @@ import { parse } from "node-html-parser";
33
import { Code, Tabs, TabItem } from "@astrojs/starlight/components";
44
import TOML from "@iarna/toml";
55
import { parse as jsoncParse } from "jsonc-parser";
6+
import { z } from "astro:schema";
7+
8+
const props = z.object({
9+
removeSchema: z.boolean().optional().default(false),
10+
});
11+
12+
const { removeSchema } = props.parse(Astro.props);
613
714
const slot = await Astro.slots.render("default");
815
@@ -12,15 +19,15 @@ const copy = html.querySelector("div.copy > button");
1219
1320
if (!copy) {
1421
throw new Error(
15-
`[WranglerConfig] Unable to find copy button in rendered code block HTML.`,
22+
`[WranglerConfig] Unable to find copy button in rendered code block HTML.`
1623
);
1724
}
1825
1926
let code = copy.attributes["data-code"];
2027
2128
if (!code) {
2229
throw new Error(
23-
`[WranglerConfig] Unable to find data-code attribute on copy button.`,
30+
`[WranglerConfig] Unable to find data-code attribute on copy button.`
2431
);
2532
}
2633
@@ -38,10 +45,11 @@ let toml, json;
3845
3946
if (language === "toml") {
4047
toml = code;
41-
json = JSON.stringify({
42-
"$schema": "./node_modules/wrangler/config-schema.json",
43-
...TOML.parse(code),
44-
}, null, 2);
48+
const parsedToml = TOML.parse(code);
49+
const jsonObj = removeSchema
50+
? parsedToml
51+
: { $schema: "./node_modules/wrangler/config-schema.json", ...parsedToml };
52+
json = JSON.stringify(jsonObj, null, 2);
4553
} else {
4654
json = code;
4755
toml = TOML.stringify(jsoncParse(code));
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Crawler drilldowns with extended actions menu
3+
description: Drill down into individual crawler behavior with status code charts and export data for use in WAF rules, Redirect Rules, and robots.txt files.
4+
date: 2025-11-10
5+
---
6+
7+
AI Crawl Control now supports per-crawler drilldowns with an extended actions menu and status code analytics. Drill down into Metrics, Cloudflare Radar, and Security Analytics, or export crawler data for use in [WAF custom rules](/waf/custom-rules/), [Redirect Rules](/rules/url-forwarding/), and robots.txt files.
8+
9+
## What's new
10+
11+
### Status code distribution chart
12+
13+
The **Metrics** tab includes a status code distribution chart showing HTTP response codes (2xx, 3xx, 4xx, 5xx) over time. Filter by individual crawler, category, operator, or time range to analyze how specific crawlers interact with your site.
14+
15+
![AI Crawl Control status code distribution chart](~/assets/images/ai-crawl-control/ai-crawl-control-status-codes.png)
16+
17+
### Extended actions menu
18+
19+
Each crawler row includes a three-dot menu with per-crawler actions:
20+
21+
- **View Metrics** — Filter the AI Crawl Control Metrics page to the selected crawler.
22+
- **View on Cloudflare Radar** — Access verified crawler details on Cloudflare Radar.
23+
- **Copy User Agent** — Copy user agent strings for use in WAF custom rules, Redirect Rules, or robots.txt files.
24+
- **View in Security Analytics** — Filter Security Analytics by detection IDs (Bot Management customers).
25+
- **Copy Detection ID** — Copy detection IDs for use in WAF custom rules (Bot Management customers).
26+
27+
![AI Crawl Control crawler actions menu](~/assets/images/ai-crawl-control/ai-crawl-control-crawler-info.png)
28+
29+
## Get started
30+
31+
1. Log in to the Cloudflare dashboard, and select your account and domain.
32+
2. Go to **AI Crawl Control** > **Metrics** to access the status code distribution chart.
33+
3. Go to **AI Crawl Control** > **Crawlers** and select the three-dot menu for any crawler to access per-crawler actions.
34+
4. Select multiple crawlers to use bulk copy buttons for user agents or detection IDs.
35+
36+
Learn more about [AI Crawl Control](/ai-crawl-control/).
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
---
2+
title: "WAF Release - 2025-11-10"
3+
description: Cloudflare WAF managed rulesets 2025-11-10 release
4+
date: 2025-11-10
5+
---
6+
7+
import { RuleID } from "~/components";
8+
9+
This week’s release introduces new detections for Prototype Pollution across three common vectors: URI, Body, and Header/Form.
10+
11+
**Key Findings**
12+
13+
- These attacks can affect both API and web applications by altering normal behavior or bypassing security controls.
14+
15+
**Impact**
16+
17+
Exploitation may allow attackers to change internal logic or cause unexpected behavior in applications using JavaScript or Node.js frameworks. Developers should sanitize input keys and avoid merging untrusted data structures.
18+
19+
<table style="width: 100%">
20+
<thead>
21+
<tr>
22+
<th>Ruleset</th>
23+
<th>Rule ID</th>
24+
<th>Legacy Rule ID</th>
25+
<th>Description</th>
26+
<th>Previous Action</th>
27+
<th>New Action</th>
28+
<th>Comments</th>
29+
</tr>
30+
</thead>
31+
<tbody>
32+
<tr>
33+
<td>Cloudflare Managed Ruleset</td>
34+
<td>
35+
<RuleID id="32405a50728746dd8caa057b606285e6" />
36+
</td>
37+
<td>N/A</td>
38+
<td>Generic Rules - Prototype Pollution - URI</td>
39+
<td>Log</td>
40+
<td>Disabled</td>
41+
<td>This is a new detection</td>
42+
</tr>
43+
<tr>
44+
<td>Cloudflare Managed Ruleset</td>
45+
<td>
46+
<RuleID id="a7da00c63c4243d2a72456fe4f59ff26" />
47+
</td>
48+
<td>N/A</td>
49+
<td>Generic Rules - Prototype Pollution - Body</td>
50+
<td>Log</td>
51+
<td>Disabled</td>
52+
<td>This is a new detection</td>
53+
</tr>
54+
<tr>
55+
<td>Cloudflare Managed Ruleset</td>
56+
<td>
57+
<RuleID id="833078bdcfa04bb7aa7b8fb67efbeb39" />
58+
</td>
59+
<td>N/A</td>
60+
<td>Generic Rules - Prototype Pollution - Header - Form</td>
61+
<td>Log</td>
62+
<td>Disabled</td>
63+
<td>This is a new detection</td>
64+
</tr>
65+
</tbody>
66+
</table>
Lines changed: 27 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -1,68 +1,35 @@
11
---
2-
title: WAF Release - Scheduled changes for 2025-11-10
3-
description: WAF managed ruleset changes scheduled for 2025-11-10
4-
date: 2025-11-03
2+
title: WAF Release - Scheduled changes for 2025-11-17
3+
description: WAF managed ruleset changes scheduled for 2025-11-17
4+
date: 2025-11-10
55
scheduled: true
66
---
77

88
import { RuleID } from "~/components";
99

1010
<table style="width: 100%">
11-
<thead>
12-
<tr>
13-
<th>Announcement Date</th>
14-
<th>Release Date</th>
15-
<th>Release Behavior</th>
16-
<th>Legacy Rule ID</th>
17-
<th>Rule ID</th>
18-
<th>Description</th>
19-
<th>Comments</th>
20-
</tr>
21-
</thead>
22-
<tbody>
23-
<tr>
24-
<td>2025-10-27</td>
25-
<td>2025-11-10</td>
26-
<td>Log</td>
27-
<td>N/A</td>
28-
<td>
29-
<RuleID id="32405a50728746dd8caa057b606285e6" />
30-
</td>
31-
<td>Generic Rules - Prototype Pollution - URI</td>
32-
<td>This is a new detection</td>
33-
</tr>
34-
<tr>
35-
<td>2025-10-27</td>
36-
<td>2025-11-10</td>
37-
<td>Log</td>
38-
<td>N/A</td>
39-
<td>
40-
<RuleID id="a7da00c63c4243d2a72456fe4f59ff26" />
41-
</td>
42-
<td>Generic Rules - Prototype Pollution - Body</td>
43-
<td>This is a new detection</td>
44-
</tr>
45-
<tr>
46-
<td>2025-10-27</td>
47-
<td>2025-11-10</td>
48-
<td>Log</td>
49-
<td>N/A</td>
50-
<td>
51-
<RuleID id="833078bdcfa04bb7aa7b8fb67efbeb39" />
52-
</td>
53-
<td>Generic Rules - Prototype Pollution - Header - Form</td>
54-
<td>This is a new detection</td>
55-
</tr>
56-
<tr>
57-
<td>2025-10-27</td>
58-
<td>2025-11-10</td>
59-
<td>Log</td>
60-
<td>N/A</td>
61-
<td>
62-
<RuleID id="818d92d370654c3d8f1adc7c9029cd61" />
63-
</td>
64-
<td>HTTP Truncated Beta</td>
65-
<td>This is a beta detection and will replace the action on original detection (ID: <RuleID id="646bccf7e9dc46918a4150d6c22b51d3" />) </td>
66-
</tr>
67-
</tbody>
11+
<thead>
12+
<tr>
13+
<th>Announcement Date</th>
14+
<th>Release Date</th>
15+
<th>Release Behavior</th>
16+
<th>Legacy Rule ID</th>
17+
<th>Rule ID</th>
18+
<th>Description</th>
19+
<th>Comments</th>
20+
</tr>
21+
</thead>
22+
<tbody>
23+
<tr>
24+
<td>2025-11-10</td>
25+
<td>2025-11-17</td>
26+
<td>Log</td>
27+
<td>N/A</td>
28+
<td>
29+
<RuleID id="ec1e2aa190e64e7cb468e16dd256f4bc" />
30+
</td>
31+
<td>DELMIA Apriso - Auth Bypass - CVE:CVE-2025-6205</td>
32+
<td>This is a new detection</td>
33+
</tr>
34+
</tbody>
6835
</table>

0 commit comments

Comments
 (0)