Skip to content

Commit 73f49de

Browse files
author
test
committed
test: verify CRLF hook
1 parent 0f46abd commit 73f49de

File tree

5 files changed

+44
-22
lines changed

5 files changed

+44
-22
lines changed

package-lock.json

Lines changed: 17 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,8 @@
2828
"ai-setup:import-from-opencode": "npx rulesync import --targets opencode --features rules,commands,subagents",
2929
"ai-setup:claudecode": "npm run ai-setup:import-from-opencode && npx rulesync generate --targets claudecode --features rules,commands,subagents",
3030
"ai-setup:cursor": "npm run ai-setup:import-from-opencode && npx rulesync generate --targets cursor --features commands,subagents",
31-
"ai-setup:copilot": "npm run ai-setup:import-from-opencode && npx rulesync generate --targets copilot --features commands,subagents"
31+
"ai-setup:copilot": "npm run ai-setup:import-from-opencode && npx rulesync generate --targets copilot --features commands,subagents",
32+
"prepare": "husky"
3233
},
3334
"devDependencies": {
3435
"@actions/core": "1.11.1",
@@ -86,6 +87,7 @@
8687
"hast-util-select": "6.0.4",
8788
"hastscript": "9.0.1",
8889
"he": "1.2.0",
90+
"husky": "9.1.7",
8991
"jsonc-parser": "3.3.1",
9092
"ldrs": "1.1.7",
9193
"lz-string": "1.5.0",
Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,20 @@
1-
---
2-
title: SCIM provisioning for Authentik is now Generally Available
3-
description: Provision users and groups to the Cloudflare Dashboard using Authentik as your identity provider.
4-
products:
5-
- fundamentals
6-
date: 2026-03-18
7-
---
8-
9-
Cloudflare dashboard SCIM provisioning now supports [Authentik](https://goauthentik.io/) as an identity provider, joining Okta and Microsoft Entra ID as explicitly supported providers.
10-
11-
Customers can now sync users and group information from Authentik to Cloudflare, apply Permission Policies to those groups, and manage the lifecycle of users & groups directly from your Authentik Identity Provider.
12-
13-
:::note
14-
SCIM provisioning for the Cloudflare dashboard is available to Enterprise customers. You must be a Super Administrator to complete the initial setup.
15-
:::
16-
17-
For more information:
18-
19-
- [SCIM provisioning overview](/fundamentals/account/account-security/scim-setup/)
20-
- [Provision with Authentik](/fundamentals/account/account-security/scim-setup/authentik/)
1+
---
2+
title: SCIM provisioning for Authentik is now Generally Available
3+
description: Provision users and groups to the Cloudflare Dashboard using Authentik as your identity provider.
4+
products:
5+
- fundamentals
6+
date: 2026-03-18
7+
---
8+
9+
Cloudflare dashboard SCIM provisioning now supports [Authentik](https://goauthentik.io/) as an identity provider, joining Okta and Microsoft Entra ID as explicitly supported providers.
10+
11+
Customers can now sync users and group information from Authentik to Cloudflare, apply Permission Policies to those groups, and manage the lifecycle of users & groups directly from your Authentik Identity Provider.
12+
13+
:::note
14+
SCIM provisioning for the Cloudflare dashboard is available to Enterprise customers. You must be a Super Administrator to complete the initial setup.
15+
:::
16+
17+
For more information:
18+
19+
- [SCIM provisioning overview](/fundamentals/account/account-security/scim-setup/)
20+
- [Provision with Authentik](/fundamentals/account/account-security/scim-setup/authentik/)
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
line one
2+
line two
3+
line three

src/content/docs/waf/concepts.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Currently, you cannot manage the [bot score](/bots/concepts/bot-score/) and [att
6262

6363
## Rule execution order
6464

65-
Cloudflare evaluates different types of rules when processing incoming requests. The first rule with a [terminating action](/ruleset-engine/rules-language/actions/) (such as _Block_, _Managed Challenge_, or _Redirect_) stops all further evaluation. For example, an IP Access rule that blocks a request prevents custom rules from running. The rule execution order is the following:
65+
Cloudflare evaluates different types of rules when processing incoming requests. The first rule with a [terminating action](/ruleset-engine/rules-language/actions/) (such as _Block_, _Managed Challenge_, or _Redirect_) stops all further evaluation. For example, an IP Access rule that blocks a request prevents custom rules from running. The rule execution order is the following:
6666

6767
1. [IP Access rules](/waf/tools/ip-access-rules/)
6868
2. [Firewall rules](/firewall/cf-firewall-rules/) (deprecated)

0 commit comments

Comments
 (0)