Skip to content

Commit eb15203

Browse files
Merge branch 'production'
2 parents 2259d32 + 03eb7df commit eb15203

File tree

23 files changed

+196
-61
lines changed

23 files changed

+196
-61
lines changed

public/__redirects

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2444,6 +2444,9 @@
24442444
/cloudflare-one/email-security/reference/domain-information/ /cloudflare-one/email-security/settings/domain-management/domain/ 301
24452445
/cloudflare-one/insights/email-monitoring/phish-submissions/* /cloudflare-one/email-security/settings/phish-submissions/:splat 301
24462446
/cloudflare-one/email-security/phish-guard/* /cloudflare-one/email-security/phishguard/:splat 301
2447+
/cloudflare-one/email-security/settings/trusted-domains/ /cloudflare-one/email-security/settings/detection-settings/trusted-domains/ 301
2448+
/cloudflare-one/email-security/detection-settings/additional-detections/ /cloudflare-one/email-security/settings/detection-settings/additional-detections/ 301
2449+
/cloudflare-one/email-security/settings/configure-text-add-ons/ /cloudflare-one/email-security/settings/detection-settings/configure-text-add-ons/ 301
24472450

24482451
# Learning paths
24492452

src/components/WranglerConfig.astro

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,10 @@ let toml, json;
3838
3939
if (language === "toml") {
4040
toml = code;
41-
json = JSON.stringify(TOML.parse(code), null, 2);
41+
json = JSON.stringify({
42+
"$schema": "./node_modules/wrangler/config-schema.json",
43+
...TOML.parse(code),
44+
}, null, 2);
4245
} else {
4346
json = code;
4447
toml = TOML.stringify(jsoncParse(code));
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: "WAF Release - 2025-10-30 - Emergency"
3+
description: Cloudflare WAF managed rulesets 2025-10-30 emergency release
4+
date: 2025-10-30
5+
---
6+
7+
import { RuleID } from "~/components";
8+
9+
This week’s release introduces a new detection signature that enhances coverage for a critical vulnerability in Oracle E-Business Suite, tracked as CVE-2025-61884.
10+
11+
**Key Findings**
12+
13+
The flaw is easily exploitable and allows an unauthenticated attacker with network access to compromise Oracle Configurator, which can grant access to sensitive resources and configuration data. The affected versions include 12.2.3 through 12.2.14.
14+
15+
**Impact**
16+
17+
Successful exploitation of CVE-2025-61884 may result in unauthorized access to critical business data or full exposure of information accessible through Oracle Configurator. Administrators are strongly advised to apply vendor's patches and recommended mitigations to reduce this exposure.
18+
19+
<table style="width: 100%">
20+
<thead>
21+
<tr>
22+
<th>Ruleset</th>
23+
<th>Rule ID</th>
24+
<th>Legacy Rule ID</th>
25+
<th>Description</th>
26+
<th>Previous Action</th>
27+
<th>New Action</th>
28+
<th>Comments</th>
29+
</tr>
30+
</thead>
31+
<tbody>
32+
<tr>
33+
<td>Cloudflare Managed Ruleset</td>
34+
<td>
35+
<RuleID id="2749f13f8cb34a3dbd49c8c48827402f" />
36+
</td>
37+
<td>N/A</td>
38+
<td>Oracle E-Business Suite - SSRF - CVE:CVE-2025-61884</td>
39+
<td>N/A</td>
40+
<td>Block</td>
41+
<td>This is a New Detection</td>
42+
</tr>
43+
</tbody>
44+
</table>
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
---
2+
title: Build TanStack Start apps with the Cloudflare Vite plugin
3+
description: TanStack Start can now be used with the Cloudflare Vite plugin
4+
products:
5+
- workers
6+
date: 2025-10-24
7+
---
8+
9+
import { PackageManagers, WranglerConfig } from "~/components";
10+
11+
The [Cloudflare Vite plugin](/workers/vite-plugin/) now supports [TanStack Start](https://tanstack.com/start/) apps.
12+
Get started with new or existing projects.
13+
14+
## New projects
15+
16+
Create a new TanStack Start project that uses the Cloudflare Vite plugin via the `create-cloudflare` CLI:
17+
18+
<PackageManagers
19+
type="create"
20+
pkg="cloudflare@latest"
21+
args="my-tanstack-start-app --framework=tanstack-start"
22+
/>
23+
24+
## Existing projects
25+
26+
Migrate an existing TanStack Start project to use the Cloudflare Vite plugin:
27+
28+
1. Install `@cloudflare/vite-plugin` and `wrangler`
29+
30+
<PackageManagers type="add" pkg="@cloudflare/vite-plugin wrangler" dev />
31+
32+
2. Add the Cloudflare plugin to your Vite config
33+
34+
```ts {4, 8} title="vite.config.ts"
35+
import { defineConfig } from "vite";
36+
import { tanstackStart } from "@tanstack/react-start/plugin/vite";
37+
import viteReact from "@vitejs/plugin-react";
38+
import { cloudflare } from "@cloudflare/vite-plugin";
39+
40+
export default defineConfig({
41+
plugins: [
42+
cloudflare({ viteEnvironment: { name: "ssr" } }),
43+
tanstackStart(),
44+
viteReact(),
45+
],
46+
});
47+
```
48+
49+
3. Add your Worker config file
50+
51+
<WranglerConfig>
52+
53+
```toml
54+
name = "my-tanstack-start-app"
55+
compatibility_date = "2025-10-11"
56+
compatibility_flags = ["nodejs_compat"]
57+
main = "@tanstack/react-start/server-entry"
58+
```
59+
60+
</WranglerConfig>
61+
62+
4. Modify the scripts in your `package.json`
63+
64+
```json title="package.json" del={5} ins={6-8}
65+
{
66+
"scripts": {
67+
"dev": "vite dev",
68+
"build": "vite build && tsc --noEmit",
69+
"start": "node .output/server/index.mjs",
70+
"preview": "vite preview",
71+
"deploy": "npm run build && wrangler deploy",
72+
"cf-typegen": "wrangler types"
73+
}
74+
}
75+
```
76+
77+
See the [TanStack Start framework guide](/workers/framework-guides/web-apps/tanstack-start/) for more info.

src/content/docs/browser-rendering/rest-api/pdf-endpoint.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,8 @@ curl -X POST 'https://api.cloudflare.com/client/v4/accounts/<accountId>/browser-
192192
"left": "30px"
193193
},
194194
"timeout": 30000
195-
}
195+
}`
196+
```
196197
197198
<Render
198199
file="setting-custom-user-agent"

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/domain-support/migrating-custom-hostnames.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,6 @@ The custom hostname can activate on the new zone even if the certificate is stil
7070

7171
:::note
7272

73-
Verify that the custom hostname successfully activated after the migration in the Cloudflare dashboard by selecting **SSL/TLS** > **Custom hostnames** > **`{your custom hostname}`**.
73+
Verify that the custom hostname successfully activated after the migration on the [**Custom Hostnames**](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/custom-hostnames) page.
7474

7575
:::

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/performance/early-hints-for-saas.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Before you can employ Early Hints for SaaS, you need to create a custom hostname
2222

2323
1. [Locate your zone ID](/fundamentals/account/find-account-and-zone-ids/), available in the Cloudflare dashboard.
2424

25-
2. Locate your Authentication Key by selecting **My Profile** > **API tokens** > **Global API Key**.
25+
2. Locate your Authentication Key on the [**API Tokens**](https://dash.cloudflare.com/?to=/:account/profile/api-tokens) page, under **Global API Key**.
2626

2727
3. If you are [creating a new custom hostname](/api/resources/custom_hostnames/methods/create/), make an API call such as the example below, specifying `"early_hints": "on"`:
2828

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/saas-customers/provider-guides/salesforce-commerce-cloud.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ head:
77
description: Learn how to configure your Enterprise zone with Salesforce Commerce Cloud.
88
---
99

10-
import { Details, Render } from "~/components";
10+
import { Details, Render, DashButton } from "~/components";
1111

1212
<Render
1313
file="provider-guide-intro"
@@ -104,11 +104,11 @@ If you do have a `CAA` record, verify that it permits SSL certificates to be iss
104104
### Best practice Zone-level configuration
105105

106106
1. Set **Minimum TLS version** to **TLS 1.2**
107-
1. Navigate to **SSL/TLS > Edge Certificates**, scroll down the page to find **Minimum TLS Version**, and set it to _TLS 1.2_. This setting applies to every Proxied DNS record in your Zone.
107+
1. Go to the [**Edge Certificates**](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/edge-certificates) page, scroll down to find **Minimum TLS Version**, and set it to _TLS 1.2_. This setting applies to every Proxied DNS record in your Zone.
108108
2. Match the **Security Level** set in **SFCC Business Manager**
109-
1. _Option 1: Zone-level_ - Navigate to **Security > Settings**, find **Security Level** and set **Security Level** to match what is configured in **SFCC Business Manager**. This setting applies to every Proxied DNS record in your Cloudflare zone.
109+
1. _Option 1: Zone-level_ - Go to the [**Settings**](https://dash.cloudflare.com/?to=/:account/:zone/security/settings) page under Security, find **Security Level** and set **Security Level** to match what is configured in **SFCC Business Manager**. This setting applies to every Proxied DNS record in your Cloudflare zone.
110110
2. _Option 2: Per Proxied DNS record_ - If the **Security Level** differs between the Proxied DNS records targeting your SFCC environment and other Proxied DNS records in your Cloudflare zone, use a **Configuration Rule** to set the **Security Level** specifically for the Proxied DNS records targeting your SFCC environment. For example:
111-
1. Create a new **Configuration Rule** by navigating to **Rules** > **Overview** and selecting **Create rule** next to **Configuration Rules**:
111+
1. Create a new **Configuration Rule** on the [**Rules Overview**](https://dash.cloudflare.com/?to=/:account/:zone/rules/overview) page by selecting **Create rule** next to **Configuration Rules**:
112112
1. **Rule name:** `Match Security Level on SFCC hostnames`
113113
2. **Field:** _Hostname_
114114
3. **Operator:** _is in_ (this will match against multiple hostnames specified in the **Value** field)
@@ -117,9 +117,9 @@ If you do have a `CAA` record, verify that it permits SSL certificates to be iss
117117
1. **Select Security Level:** _Medium_ (this should match the **Security Level** set in **SFCC Business Manager**)
118118
6. Scroll to the bottom of the page and click **Deploy**
119119
3. Disable **Browser Integrity Check**
120-
1. _Option 1: Zone-level_ - Navigate to **Security > Settings**, find **Browser Integrity Check** and toggle it off to disable it. This setting applies to every Proxied DNS record in your Cloudflare zone.
120+
1. _Option 1: Zone-level_ - Go to the [**Settings**](https://dash.cloudflare.com/?to=/:account/:zone/security/settings) page under Security, find **Browser Integrity Check** and toggle it off to disable it. This setting applies to every Proxied DNS record in your Cloudflare zone.
121121
2. _Option 2: Per Proxied DNS record_ - If you want to keep **Browser Integrity Check** enabled for other Proxied DNS records in your Cloudflare zone but want to disable it on Proxied DNS records targeting your SFCC environment, keep the Zone-level **Browser Integrity Check** feature enabled and use a **Configuration Rule** to disable **Browser Integrity Check** specifically for the hostnames targeting your SFCC environment. For example:
122-
1. Create a new **Configuration Rule** by navigating to **Rules** > **Overview** and selecting **Create rule** next to **Configuration Rules**:
122+
1. Create a new **Configuration Rule** on the [**Rules Overview**](https://dash.cloudflare.com/?to=/:account/:zone/rules/overview) page by selecting **Create rule** next to **Configuration Rules**:
123123
1. **Rule name:** `Disable Browser Integrity Check on SFCC hostnames`
124124
2. **Field:** _Hostname_
125125
3. **Operator:** _is in_ (this will match against multiple hostnames specified in the **Value** field)
@@ -131,7 +131,7 @@ If you do have a `CAA` record, verify that it permits SSL certificates to be iss
131131
1. Your SFCC environment, also called a **Realm**, will contain one to many SFCC Proxy Zones, which is where caching will always occur. In the corresponding SFCC Proxy Zone for your domain, SFCC performs their own cache optimization, so it is recommended to bypass the cache on the Proxied DNS records in your Cloudflare zone which target your SFCC environment to prevent a "double caching" scenario. This can be accomplished with a **Cache Rule**.
132132
2. If the **Cache Rule** is not created, caching will occur in both your Cloudflare zone and your corresponding SFCC Proxy Zone, which can cause issues if and when the cache is invalidated or purged in your SFCC environment.
133133
1. Additional information on caching in your SFCC environment can be found in [SFCC's Content Cache Documentation](https://developer.salesforce.com/docs/commerce/b2c-commerce/guide/b2c-content-cache.html)
134-
3. Create a new **Cache Rule** by navigating to **Rules** > **Overview** and selecting **Create rule** next to **Cache Rules**:
134+
3. Create a new **Cache Rule** on the [**Rules Overview**](https://dash.cloudflare.com/?to=/:account/:zone/rules/overview) page by selecting **Create rule** next to **Cache Rules**:
135135
1. **Rule name:** `Bypass cache on SFCC hostnames`
136136
2. **Field:** _Hostname_
137137
3. **Operator:** _is in_ (this will match against multiple hostnames specified in the **Value** field)

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/enforce-mtls.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ While TLS 1.3 is the most recent and secure version, it is not supported by some
4040

4141
### Scope
4242

43-
Minimum TLS version exists both as a [zone-level setting](/ssl/edge-certificates/additional-options/minimum-tls/) (under **Edge certificates** > **Minimum TLS Version**) and as a custom hostname setting. What this implies is:
43+
Minimum TLS version exists both as a [zone-level setting](/ssl/edge-certificates/additional-options/minimum-tls/) (on the [**Edge Certificates**](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/edge-certificates) page under **Minimum TLS Version**) and as a custom hostname setting. What this implies is:
4444

4545
- For custom hostnames created via API, it is possible not to explicitly define a value for `min_tls_version`. When that is the case, whatever value is defined as your zone's minimum TLS version will be applied. To confirm whether a given custom hostname has a specific minimum TLS version set, use the following API call.
4646

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/delegated-dcv.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ DCV Delegation requires your customers to place a one-time record at their autho
2222
To set up Delegated DCV:
2323

2424
1. Add a [custom hostname](/cloudflare-for-platforms/cloudflare-for-saas/domain-support/create-custom-hostnames/) for your zone, choosing `TXT` as the **Certificate validation method**.
25-
2. On **SSL/TLS** > **Custom Hostnames**, go to **DCV Delegation for Custom Hostnames**.
25+
2. On the [**Custom Hostnames**](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/custom-hostnames) page, go to **DCV Delegation for Custom Hostnames**.
2626
3. Copy the hostname value.
2727
4. For each hostname, the domain owner needs to place a `CNAME` record at their authoritative DNS. In this example, the SaaS zone is `example.com`.
2828
```txt

0 commit comments

Comments
 (0)