Skip to content

Commit c593f4a

Browse files
Add note about HTTP DCV to Rules docs
1 parent d317546 commit c593f4a

File tree

3 files changed

+14
-9
lines changed

3 files changed

+14
-9
lines changed

src/content/docs/rules/reference/troubleshooting.mdx

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ description: Review common troubleshooting scenarios for Rules features.
1010

1111
---
1212

13-
import { Example } from "~/components"
13+
import { Example, Render } from "~/components"
1414

1515
## Interaction between Cloudflare challenges and Rules features
1616

@@ -22,6 +22,12 @@ For example, define a compound expression for your rule using the `and` operator
2222
<OTHER_RULE_CONDITIONS> and not starts_with(http.request.uri, "/cdn-cgi/challenge-platform/")
2323
```
2424

25+
## HTTP DCV and redirects
26+
27+
<Render file="dcv-definition" product="ssl" />
28+
29+
If you are using [HTTP DCV](/ssl/edge-certificates/changing-dcv-method/methods/http/) and also have [Single Redirects](/rules/url-forwarding/single-redirects/) set up in your zone, consider excluding the `/.well-known/*` path from your rule to avoid DCV issues. For details and other resources refer to the [SSL/TLS documentation](/ssl/edge-certificates/changing-dcv-method/).
30+
2531
## URL rewrites affect other Rules features executed later
2632

2733
If you rewrite a URI path using a [URL rewrite](/rules/transform/url-rewrite/), this may affect other Rules features executed later — such as [Origin Rules](/rules/origin-rules/) — if they include the URI path in their filter expression.
@@ -31,7 +37,7 @@ Consider the following origin rule configuration:
3137
<Example>
3238

3339
* Rule expression: `http.host == "example.com" and starts_with(http.request.uri.path, "/downloads/")`
34-
* **Host header** > **Rewrite to**: `assets.example.com`
40+
* **Host header** > **Rewrite to**: `assets.example.com`
3541

3642
</Example>
3743

@@ -40,7 +46,7 @@ If you configure a new URL rewrite with the following configuration:
4046
<Example>
4147

4248
* Rule expression: `http.host == "example.com" and starts_with(http.request.uri.path, "/downloads/")`
43-
* **Path** > **Rewrite to** > **Dynamic**: `regex_replace(http.request.uri.path, "^/downloads/", "/")`
49+
* **Path** > **Rewrite to** > **Dynamic**: `regex_replace(http.request.uri.path, "^/downloads/", "/")`
4450

4551
</Example>
4652

@@ -57,7 +63,7 @@ In the current example, you could use the `raw.http.request.uri.path` field in b
5763
<Example>
5864

5965
* Rule expression: `http.host == "example.com" and starts_with(raw.http.request.uri.path, "/downloads/")`
60-
* **Path** > **Rewrite to** > **Dynamic**: `regex_replace(raw.http.request.uri.path, "^/downloads/", "/")`
66+
* **Path** > **Rewrite to** > **Dynamic**: `regex_replace(raw.http.request.uri.path, "^/downloads/", "/")`
6167

6268
</Example>
6369

@@ -66,7 +72,7 @@ In the current example, you could use the `raw.http.request.uri.path` field in b
6672
<Example>
6773

6874
* Rule expression: `http.host == "example.com" and starts_with(raw.http.request.uri.path, "/downloads/")`
69-
* **Host header** > **Rewrite to**: `assets.example.com`
75+
* **Host header** > **Rewrite to**: `assets.example.com`
7076

7177
</Example>
7278

src/content/docs/ssl/edge-certificates/changing-dcv-method/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ description: Learn when and how to perform Domain Control Validation when using
1313

1414
import { Render } from "~/components"
1515

16-
<Render file="dcv-definition" /> <br/>
16+
<Render file="dcv-definition" />
1717

1818
:::note
1919

src/content/docs/ssl/edge-certificates/changing-dcv-method/troubleshooting.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Taking into account the [steps involved in DCV](/ssl/edge-certificates/changing-
1717

1818
:::note
1919

20-
If you are using the Cloudflare API, error messages are presented under the `validation_errors` parameter.
20+
If you are using the Cloudflare API, error messages are presented under the `validation_errors` parameter.
2121
:::
2222

2323
## Blocked validation URL
@@ -29,7 +29,7 @@ If you have issues while HTTP DCV is in place, review the following settings:
2929
* **Cloudflare Account Settings** and **Page Rules**: Review your [account settings](/fundamentals/reference/under-attack-mode/), [Configuration Rules](/rules/configuration-rules/), and [Page Rules](/rules/page-rules/) to ensure you have not enabled **I'm Under Attack Mode** on the validation URL.
3030

3131
:::caution
32-
<Render file="dcv-path-security" />
32+
<Render file="dcv-path-security" />
3333
:::
3434

3535
## Redirection
@@ -40,7 +40,6 @@ In a [Partial (CNAME) setup](/ssl/edge-certificates/changing-dcv-method/#partial
4040

4141
When using [Redirect Rules](/rules/url-forwarding/single-redirects/) the `/.well-known/*` path should be excluded from redirections.
4242

43-
4443
## DNS settings and records
4544

4645
The errors below refer to situations that have to be addressed at the authoritative DNS provider:

0 commit comments

Comments
 (0)