Skip to content

Commit c41337a

Browse files
committed
Merge branch 'production' into kian/PCX-16740
2 parents 9cd3619 + fb7d483 commit c41337a

File tree

198 files changed

+641
-514
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

198 files changed

+641
-514
lines changed

.github/workflows/publish-production.yml

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,23 +41,36 @@ jobs:
4141
cd distmd && zip -r markdown.zip .
4242
npx wrangler r2 object put vendored-markdown/markdown.zip --file=markdown.zip --remote
4343
rm markdown.zip
44+
cd ..
4445
4546
cd distllms
4647
for file in $(find . -type f); do
4748
npx wrangler r2 object put vendored-markdown/$file --file=$file --remote
4849
done
50+
- name: Install rclone
51+
run: sudo -v ; curl https://rclone.org/install.sh | sudo bash
4952
- name: Upload vendored Markdown files to ZT DevDocs bucket
5053
env:
5154
AWS_ACCESS_KEY_ID: ${{ secrets.ZT_DEVDOCS_ACCESS_KEY_ID }}
5255
AWS_SECRET_ACCESS_KEY: ${{ secrets.ZT_DEVDOCS_SECRET_ACCESS_KEY }}
5356
run: |
54-
sudo -v ; curl https://rclone.org/install.sh | sudo bash
5557
rclone sync \
5658
--s3-env-auth \
5759
--s3-provider="Cloudflare" \
5860
--s3-endpoint="https://e76c849bd111ee7d3006b6625713991e.r2.cloudflarestorage.com" \
5961
distmd \
6062
:s3:/zt-dashboard-dev-docs
63+
- name: Upload vendored Markdown files to AutoRAG DevDocs bucket
64+
env:
65+
AWS_ACCESS_KEY_ID: ${{ secrets.AUTORAG_DEVDOCS_ACCESS_KEY_ID }}
66+
AWS_SECRET_ACCESS_KEY: ${{ secrets.AUTORAG_DEVDOCS_SECRET_ACCESS_KEY }}
67+
run: |
68+
rclone sync \
69+
--s3-env-auth \
70+
--s3-provider="Cloudflare" \
71+
--s3-endpoint="https://cf9267a5bf4f6b3cceca48d554d81679.r2.cloudflarestorage.com" \
72+
distmd \
73+
:s3:/developer-docs-full
6174
- uses: actions/cache/save@v4
6275
if: always()
6376
with:

astro.config.ts

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -137,6 +137,8 @@ export default defineConfig({
137137
"/api/**",
138138
"/changelog/**",
139139
"/http/resources/**",
140+
"/llms.txt",
141+
"/llms-full.txt",
140142
"{props.*}",
141143
"/",
142144
"/glossary/",
@@ -146,7 +148,12 @@ export default defineConfig({
146148
"/ruleset-engine/rules-language/fields/reference/**",
147149
"/workers/examples/?languages=*",
148150
"/workers/examples/?tags=*",
151+
"/workers/llms-full.txt",
149152
"/workers-ai/models/**",
153+
"**index.md",
154+
"/markdown.zip",
155+
"/style-guide/index.md",
156+
"/style-guide/fixtures/markdown/index.md",
150157
],
151158
}),
152159
]
49.7 KB
Loading

src/components/PartialsUsage.astro

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,10 @@ const partials = await getPartialsUsage();
1212
[...Object.entries(partials)]
1313
.sort((a, b) => a[0].localeCompare(b[0]))
1414
.map(([name, usage]) => (
15-
<Details header={`${name} (${usage.pages.size} usages)`} id={name}>
15+
<Details
16+
header={`${name} (${usage.count} uses on ${usage.pages.size} pages)`}
17+
id={name}
18+
>
1619
<UsageList usage={usage} />
1720
</Details>
1821
))

src/components/overrides/Footer.astro

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ if (
117117
<ul
118118
class="text-cl1-gray-4! dark:text-cl1-gray-7! flex list-inside flex-wrap items-center justify-center gap-3 gap-y-4 pl-0 text-xs"
119119
>
120-
<li class="list-none">2025 Cloudflare, Inc.</li>
120+
<li class="list-none">© 2025 Cloudflare, Inc.</li>
121121
{
122122
links.map(([text, href]) => (
123123
<li>

src/content/changelog/access/2024-10-01-ssh-with-access-for-infrastructure.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,15 @@
11
---
22
title: Eliminate long-lived credentials and enhance SSH security with Cloudflare Access for Infrastructure
33
description: Use short-lived SSH certificates and fine-grained policy to secure access to your SSH servers.
4-
date: 2024-10-01T6:00:00Z
4+
date: 2024-10-01
55
---
66

77
Organizations can now eliminate long-lived credentials from their SSH setup and enable strong multi-factor authentication for SSH access, similar to other Access applications, all while generating access and command logs.
88

99
SSH with [Access for Infrastructure](/cloudflare-one/applications/non-http/infrastructure-apps/) uses short-lived SSH certificates from Cloudflare, eliminating SSH key management and reducing the security risks associated with lost or stolen keys. It also leverages a common deployment model for Cloudflare One customers: [WARP-to-Tunnel](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-warp-to-tunnel/).
1010

1111
SSH with Access for Infrastructure enables you to:
12+
1213
- **Author fine-grained policy** to control who may access your SSH servers, including specific ports, protocols, and SSH users.
1314
- **Monitor infrastructure access** with Access and SSH command logs, supporting regulatory compliance and providing visibility in case of security breach.
1415
- **Preserve your end users' workflows.** SSH with Access for Infrastructure supports native SSH clients and does not require any modifications to users’ SSH configs.

src/content/changelog/access/2025-01-15-ssh-logs-and-logpush.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Export SSH command logs with Access for Infrastructure using Logpush
33
description: Easily configure automatic export of SSH command logs to third-party storage destinations or to security information and event management (SIEM) tools.
4-
date: 2025-01-15T6:00:00Z
4+
date: 2025-01-15
55
---
66

77
:::note[Availability]

src/content/changelog/access/2025-03-03-saml-oidc-fields-saml-transformations.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: New SAML and OIDC Fields and SAML transforms for Access for SaaS
33
description: Access for SaaS new SAML and OIDC Fields and SAML transforms
4-
date: 2025-03-03T6:00:00Z
4+
date: 2025-03-03
55
---
66

77
[Access for SaaS applications](/cloudflare-one/applications/configure-apps/saas-apps/) now include more configuration options to support a wider array of SaaS applications.

src/content/changelog/access/2025-04-09-SCIM-provisioning-logs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Cloudflare Zero Trust SCIM User and Group Provisioning Logs
33
description: View all user and group updates, creation and deletion events made via SCIM across all of your IdP instances in one place
4-
date: 2025-04-09T6:00:00Z
4+
date: 2025-04-09
55
---
66

77
[Cloudflare Zero Trust SCIM provisioning](/cloudflare-one/identity/users/scim) now has a full audit log of all create, update and delete event from any SCIM Enabled IdP. The [SCIM logs](/cloudflare-one/insights/logs/scim-logs/) support filtering by IdP, Event type, Result and many more fields. This will help with debugging user and group update issues and questions.
Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,9 @@
11
---
22
title: Access bulk policy tester
33
description: Test and simulate Access policies before deploying them to production. The Access bulk policy tester allows you to test your policies against your entire user population before and after deploying them.
4-
date: 2025-04-21T6:00:00Z
4+
date: 2025-04-21
55
---
66

77
The [Access bulk policy tester](/cloudflare-one/policies/access/policy-management/#test-all-policies-in-an-application) is now available in the Cloudflare Zero Trust dashboard. The bulk policy tester allows you to simulate Access policies against your entire user base before and after deploying any changes. The policy tester will simulate the configured policy against each user's last seen identity and device posture (if applicable).
88

99
![Example policy tester](~/assets/images/changelog/access/example-policy-tester.png)
10-

0 commit comments

Comments
 (0)