Skip to content

Commit 43ce948

Browse files
committed
Merge commit '3a070fba7c46ed947ce13c6f277b84d549a823f4' into jun/do/ft-srs-ga
2 parents 906c31c + 3a070fb commit 43ce948

File tree

55 files changed

+751
-391
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

55 files changed

+751
-391
lines changed

bin/fetch-warp-releases.js

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,12 @@ for (let track of tracks) {
3535
track = track.replace("noble-intel", "linux");
3636
}
3737

38-
const path = `./src/content/warp-releases/${track}/${item.version}.yaml`;
38+
const folder = `./src/content/warp-releases/${track}`;
39+
const path = `${folder}/${item.version}.yaml`;
40+
41+
if (!fs.existsSync(folder)) {
42+
fs.mkdirSync(folder, { recursive: true });
43+
}
3944

4045
if (fs.existsSync(path)) {
4146
console.log(`${track} ${item.version} already exists.`);
@@ -66,13 +71,16 @@ for (let track of tracks) {
6671
});
6772

6873
const releaseNotes = tokens.reduce((s, t) => s + t.raw, "");
74+
const platformName = data.platformName.startsWith("noble-")
75+
? "Linux"
76+
: data.platformName;
6977

7078
fs.writeFileSync(
7179
`./src/content/warp-releases/${track}/${item.version}.yaml`,
7280
YAML.stringify({
7381
...item,
7482
releaseNotes,
75-
platformName: data.platformName,
83+
platformName,
7684
}),
7785
"utf-8",
7886
);

src/components/search/InstantSearch.tsx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ function SearchBox(props: UseSearchBoxProps) {
1515

1616
useEffect(() => {
1717
const params = new URLSearchParams(window.location.search);
18-
const query = params.get("query");
18+
const query = params.get("q") ?? params.get("query");
1919

2020
if (query) {
2121
refine(query);

src/content/docs/cloudflare-one/account-limits.mdx

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -65,12 +65,10 @@ This page lists the default account limits for rules, applications, fields, and
6565

6666
## Digital Experience Monitoring (DEX)
6767

68-
| Feature | Limit |
69-
| --------------------------------------------- | ----------------------------------------------------------------- |
70-
| Tests per account | Free Plan: 10, <br/>Pro & Business Plans: 30, <br/>Enterprise: 50 |
71-
| Remote captures per day (Free users) | 100 |
72-
| Remote captures per day (Pay-as-you-go users) | 200 |
73-
| Remote captures per day (Enterprise users) | 800 |
68+
| Feature | Limit |
69+
| ----------------------- | ------------------------------------------------------------------------------------------ |
70+
| DEX Tests per account | Zero Trust Free: 10 <br/> Zero Trust Standard: 30 <br/> Zero Trust Enterprise: 50 <br/> |
71+
| Remote captures per day | Zero Trust Free: 100 <br/> Zero Trust Standard: 200 <br/> Zero Trust Enterprise: 800 <br/> |
7472

7573
## Certificates
7674

src/content/docs/cloudflare-one/applications/non-http/self-hosted-private-app.mdx

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This feature replaces the legacy [private network app type](/cloudflare-one/appl
1818

1919
- Private IPs and hostnames are reachable over Cloudflare WARP, Magic WAN or Browser Isolation. For more details, refer to [Connect a private network](/cloudflare-one/connections/connect-networks/private-net/).
2020
- Private hostnames route to your custom DNS resolver through [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) or [Gateway resolver policies](/cloudflare-one/policies/gateway/resolver-policies/).
21-
- [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) must be enabled if you would like to present a login page in the browser and issue an authorization JWT to your origin. Otherwise, users will receive a pop-up notification from the WARP client and all session management will be handled in the WARP client.
21+
- (Optional) Turn on [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) if you want to use Access JWTs to manage [HTTPS application sessions](#https-applications).
2222

2323
## Add your application to Access
2424

@@ -58,7 +58,7 @@ This feature replaces the legacy [private network app type](/cloudflare-one/appl
5858

5959
12. Select **Next**.
6060

61-
13. (Optional) Configure advanced settings. These settings only apply to private hostnames and require Gateway TLS decryption.
61+
13. (Optional) Configure advanced settings. These settings only apply to private hostnames and require [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/).
6262

6363
- [**Cross-Origin Resource Sharing (CORS) settings**](/cloudflare-one/identity/authorization-cookie/cors/)
6464
- [**Cookie settings**](/cloudflare-one/identity/authorization-cookie/#cookie-settings)
@@ -71,6 +71,20 @@ This feature replaces the legacy [private network app type](/cloudflare-one/appl
7171

7272
Users can now connect to your private application after authenticating with Cloudflare Access.
7373

74+
## Authentication flow
75+
76+
### HTTPS applications
77+
78+
If [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) is turned on and a user is accessing an HTTPS application on port `443`, Cloudflare Access will present a login page in the browser and issue an [application token](/cloudflare-one/identity/authorization-cookie/application-token/) to your origin. This is the same cookie-based authentication flow used by [self-hosted public apps](/cloudflare-one/applications/configure-apps/self-hosted-public-app/).
79+
80+
If [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) is turned off, session management is [handled in the WARP client](#non-https-applications) instead of in the browser.
81+
82+
### Non-HTTPS applications
83+
84+
The WARP client manages sessions for all non-HTTPS applications. Users will receive an `Authentication required` pop-up notification from the WARP client. When the user selects the notification, WARP will open a browser window with your Access login page.
85+
86+
<Render file="gateway/client-notifications-os" product="cloudflare-one" />
87+
7488
## Modify order of precedence in Gateway
7589

7690
By default, Cloudflare will evaluate a private application's Access policies after evaluating all Gateway network policies. To evaluate Access private applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):

src/content/docs/cloudflare-one/insights/logs/logpush.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ Refer to [Logpush log fields](/logs/reference/log-fields/) for a list of all ava
4141
| -------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------- |
4242
| [Access Requests](/logs/reference/log-fields/account/access_requests/) | HTTP requests to sites protected by Cloudflare Access |
4343
| [Audit Logs](/logs/reference/log-fields/account/audit_logs/) | Authentication events through Cloudflare Access |
44+
| [Browser Isolation User Actions](/logs/reference/log-fields/account/biso_user_actions/) | Data transfer actions performed by a user in the remote browser |
4445
| [CASB Findings](/logs/reference/log-fields/account/casb_findings/) | Security issues detected by Cloudflare CASB |
4546
| [Device Posture Results](/logs/reference/log-fields/account/device_posture_results/) | Device posture status from the WARP client |
4647
| [DLP Forensic Copies](/logs/reference/log-fields/account/dlp_forensic_copies/) | Entire HTTP requests or payloads of HTTP requests captured by [Cloudflare DLP](/cloudflare-one/policies/data-loss-prevention/dlp-policies/logging-options/) |

src/content/docs/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -106,6 +106,7 @@ To turn on or off the address bar, users can right-click on any isolated page an
106106
- **Authentication events**: User login events are available in [Access audit logs](/cloudflare-one/insights/logs/audit-logs/).
107107
- **HTTP requests**: Traffic from the remote browser to the Internet is logged in [Gateway activity logs](/cloudflare-one/insights/logs/gateway-logs/).
108108
- **DNS queries**: DNS queries from the remote browser are shown in [Gateway activity logs](/cloudflare-one/insights/logs/gateway-logs/).
109+
- **User actions**: Track copy/paste, download/upload, and print actions initiated by users in the remote browser (only available in [Logpush](/cloudflare-one/insights/logs/logpush/)).
109110

110111
## Redirect traffic to the remote browser
111112

src/content/docs/cloudflare-one/policies/gateway/dns-policies/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ When choosing the Block action, turn on **Display custom block page** to respond
142142

143143
#### WARP client block notifications
144144

145-
<Render file="gateway/client-notifications" />
145+
<Render file="gateway/client-notifications-os" product="cloudflare-one" />
146146

147147
### Override
148148

src/content/docs/cloudflare-one/policies/gateway/http-policies/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ The Block action blocks outbound traffic from reaching destinations you specify
155155

156156
#### WARP client block notifications
157157

158-
<Render file="gateway/client-notifications" />
158+
<Render file="gateway/client-notifications-os" product="cloudflare-one" />
159159

160160
### Isolate
161161

src/content/docs/cloudflare-one/policies/gateway/network-policies/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ Policies with Block actions block network traffic from reaching certain IPs or p
179179

180180
#### WARP client block notifications
181181

182-
<Render file="gateway/client-notifications" />
182+
<Render file="gateway/client-notifications-os" product="cloudflare-one" />
183183

184184
### Network Override
185185

src/content/docs/data-localization/compatibility.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -126,10 +126,10 @@ The table below provides a summary of the Data Localization Suite product's beha
126126
[^12]: Logpull not available when using Customer Metadata Boundary outside US region. Logs may be stored and retrieved with [Logs Engine](https://blog.cloudflare.com/announcing-logs-engine/) which is adding region support in 2025.
127127
[^13]: Logpush available with Customer Metadata Boundary for [these datasets](/data-localization/metadata-boundary/logpush-datasets/). Contact your account team if you need another dataset.
128128
[^14]: Access App SSL keys can use Geo Key Manager. [Access JWT](/cloudflare-one/identity/authorization-cookie/validating-json/) is not yet localized.
129-
[^15]: Can be localized to US FedRAMP region only. More regions coming in 2024.
129+
[^15]: Can be localized to US FedRAMP Moderate Domestic region only.
130130
[^16]: Customer Metadata Boundary can be used to limit data transfer outside region, but Access User Logs will not be available outside US region.
131131
[^17]: Currently may only be used with US FedRAMP region.
132-
[^18]: The only connectivity option is [US FedRAMP region](/cloudflare-one/connections/connect-networks/configure-tunnels/cloudflared-parameters/run-parameters/#region). Regional Services only applies when using [Public Hostnames](/cloudflare-one/connections/connect-networks/routing-to-tunnel/) set to a region.
132+
[^18]: The only connectivity option is [US FedRAMP Moderate Domestic region](/cloudflare-one/connections/connect-networks/configure-tunnels/cloudflared-parameters/run-parameters/#region). Regional Services only applies when using [Public Hostnames](/cloudflare-one/connections/connect-networks/routing-to-tunnel/) set to a region.
133133
[^19]: Uses Gateway HTTP and CASB.
134134
[^20]: You can [bring your own certificate](https://blog.cloudflare.com/bring-your-certificates-cloudflare-gateway/) to Gateway but these cannot yet be restricted to a specific region.
135135
[^21]: Gateway HTTP supports Regional Services. Gateway DNS does not yet support regionalization. <br/> ICMP proxy and WARP-to-WARP proxy are not available to Regional Services users.

0 commit comments

Comments
 (0)