Skip to content

Commit dd5796b

Browse files
authored
Merge branch 'cloudflare:production' into production
2 parents 658c99b + f197420 commit dd5796b

File tree

67 files changed

+797
-469
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

67 files changed

+797
-469
lines changed

.github/CODEOWNERS

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@
1717

1818
# AI
1919

20+
/src/content/docs/agents/ @irvinebroque @rita3ko @elithrar @thomasgauvin @threepointone
2021
/src/content/docs/ai-gateway/ @kathayl @G4brym @mchenco @daisyfaithauma @cloudflare/pcx-technical-writing
2122
/src/content/docs/workers-ai/ @rita3ko @craigsdennis @markdembo @mchenco @daisyfaithauma @cloudflare/pcx-technical-writing
2223
/src/content/docs/vectorize/ @elithrar @vy-ton @sejoker @mchenco @cloudflare/pcx-technical-writing

.gitignore

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,4 +25,6 @@ pnpm-debug.log*
2525

2626
.wrangler
2727
/assets/secrets
28-
/worker/functions/
28+
/worker/functions/
29+
30+
.idea

src/components/WranglerConfig.astro

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,10 +45,10 @@ if (language === "toml") {
4545
---
4646

4747
<Tabs syncKey="wranglerConfig">
48-
<TabItem label="wrangler.toml" icon="setting">
49-
<Code lang="toml" code={toml} />
50-
</TabItem>
5148
<TabItem label="wrangler.json" icon="seti:json">
5249
<Code lang="jsonc" code={json} />
5350
</TabItem>
51+
<TabItem label="wrangler.toml" icon="setting">
52+
<Code lang="toml" code={toml} />
53+
</TabItem>
5454
</Tabs>

src/content/changelogs/access.yaml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,18 @@ entries:
99
title: Access Applications support private hostnames/IPs and reusable Access policies.
1010
description: |-
1111
Cloudflare Access self-hosted applications can now be defined by [private IPs](/cloudflare-one/applications/non-http/self-hosted-private-app/), [private hostnames](/cloudflare-one/applications/non-http/self-hosted-private-app/) (on port 443) and [public hostnames](/cloudflare-one/applications/configure-apps/self-hosted-public-app/). Additionally, we made Access policies into their own object which can be reused across multiple applications. These updates involved significant updates to the overall Access dashboard experience. The updates will be slowly rolled out to different customer cohorts. If you are an Enterprise customer and would like early access, reach out to your account team.
12+
- publish_date: "2025-01-15"
13+
title: Logpush for SSH command logs
14+
description: |-
15+
Enterprise customers can now use Logpush to export SSH command logs for Access for Infrastructure targets.
1216
- publish_date: "2024-12-04"
1317
title: SCIM GA for Okta and Microsoft Entra ID
1418
description: |-
1519
Cloudflare's SCIM integrations with [Okta](/cloudflare-one/identity/idp-integration/okta/#synchronize-users-and-groups) and [Microsoft Entra ID](//cloudflare-one/identity/idp-integration/entra-id/#synchronize-users-and-groups) (formerly AzureAD) are now out of beta and generally available (GA) for all customers. These integrations can be used for Access and Gateway policies and Zero Trust user management. Note: This GA release does not include [Dashboard SSO SCIM](/fundamentals/setup/account/account-security/scim-setup/) support.
20+
- publish_date: "2024-10-23"
21+
title: SSH with Access for Infrastructure
22+
description: |-
23+
Admins can now use [Access for Infrastructure](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) to manage privileged access to SSH servers. Access for Infrastructure provides improved control and visibility over who accessed what service and what they did during their SSH session. Access for Infrastructure also eliminates the risk and overhead associated with managing SSH keys by using short-lived SSH certificates to access SSH servers.
1624
- publish_date: "2024-08-26"
1725
title: Reduce automatic seat deprovisioning minimum to 1 month, down from 2 months.
1826
description: |-

src/content/docs/api-shield/security/mtls/configure.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -41,22 +41,22 @@ The second expression uses the `http.request.uri.path` field, combined with the
4141

4242
Because the [action](/ruleset-engine/rules-language/actions/) for your rule is _Block_, only requests that present a valid client certificate can access the specified hosts.
4343

44-
For enhanced security, Cloudflare recommends that you validate the SHA-256 certificate hash alongside the verified certificate field. This ensures that only requests presenting a valid client certificate with a specific fingerprint are allowed.
44+
For enhanced security, Cloudflare recommends that you validate the issuer Subject Key Identifier (SKI) hash alongside the verified certificate field. This ensures that only requests presenting a valid client certificate with a specific issuer are allowed.
4545

4646
You can implement this by using an expression similar to the following:
4747

4848
```txt
49-
not (cf.tls_client_auth.cert_verified and cf.tls_client_auth.cert_fingerprint_sha256 eq "253E08C1AB67EB7630C61734D377D75D5DCCDE2F6E69986C221D66E848B64321")
49+
not (cf.tls_client_auth.cert_verified and cf.tls_client_auth.cert_issuer_ski eq "A5AC554235DBA6D963B9CDE0185CFAD6E3F55E9F")
5050
```
5151

52-
To obtain the SHA-256 fingerprint of a client certificate stored in the `mtls.crt` file, you can run the following OpenSSL command:
52+
To obtain the issuer Subject Key Identifier (SKI) hash of a client certificate stored in the `mtls.crt` file, you can run the following OpenSSL command:
5353

5454
```sh
55-
openssl x509 -noout -fingerprint -sha256 -inform pem -in mtls.crt | cut -d "=" -f 2 | tr -d ':'
55+
openssl x509 -noout -ext authorityKeyIdentifier -in mtls.crt | tail -n1 | tr -d ': '
5656
```
5757

5858
```txt output
59-
253E08C1AB67EB7630C61734D377D75D5DCCDE2F6E69986C221D66E848B64321
59+
A5AC554235DBA6D963B9CDE0185CFAD6E3F55E9F
6060
```
6161

6262
### Check for revoked certificates

src/content/docs/calls/pricing.mdx

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
pcx_content_type: concept
3+
title: Pricing
4+
sidebar:
5+
order: 15
6+
---
7+
8+
Cloudflare Calls billing is based on data sent from Cloudflare edge to your application.
9+
10+
Cloudflare Calls SFU and TURN services cost $0.05 per GB of data egress.
11+
12+
There is a free tier of 1,000 GB before any charges start. This free tier includes usage from both SFU and TURN services, not two independent free tiers. Cloudflare Calls billing appears as a single line item on your Cloudflare bill, covering both SFU and TURN.
13+
14+
Traffic between Cloudflare Calls TURN and Cloudflare Calls SFU or Cloudflare Stream (WHIP/WHEP) does not get double charged, so if you are using both SFU and TURN at the same time, you will get charged for only one.
15+
16+
### TURN
17+
18+
Please see the [TURN FAQ page](/calls/turn/faq), where there is additional information on speficially which traffic path from RFC8656 is measured and counts towards billing.
19+
20+
### SFU
21+
22+
Only traffic originating from Cloudflare towards clients incurs charges. Traffic pushed to Cloudflare incurs no charge even if there is no client pulling same traffic from Cloudflare.

src/content/docs/cloudflare-one/applications/non-http/infrastructure-apps.mdx

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -88,19 +88,21 @@ warp-cli target list
8888
```
8989

9090
```sh output
91-
╭──────────────────────────────────────┬──────────┬──────┬────────────────────────────────┬───────────────────────────────────────────────────┬───────────╮
92-
│ Target ID │ Protocol │ Port │ Attributes │ IP (Virtual Network) │ Usernames │
93-
├──────────────────────────────────────┼──────────┼──────┼────────────────────────────────┼───────────────────────────────────────────────────┼───────────┤
94-
│ 0192027a-ef8a-7966-aff6-4576475db365 │ SSH │ 22 │ hostname: digital-ocean-target │ 10.116.0.3 (a663a21c-76e5-4e3c-8296-d856682269f9) │ root │
95-
├──────────────────────────────────────┼──────────┼──────┼────────────────────────────────┼───────────────────────────────────────────────────┼───────────┤
96-
│ 0192027a-ef8a-7966-aff6-4576475db365 │ SSH │ 23 │ hostname: digital-ocean-target │ 10.116.0.3 (a663a21c-76e5-4e3c-8296-d856682269f9) │ root │
97-
╰──────────────────────────────────────┴──────────┴──────┴────────────────────────────────┴───────────────────────────────────────────────────┴───────────╯
91+
╭──────────────────────────────────────┬──────────┬───────┬───────────────────────┬──────────────────────┬────────────╮
92+
│ Target ID │ Protocol │ Port │ Attributes │ IP (Virtual Network) │ Usernames │
93+
├──────────────────────────────────────┼──────────┼───────┼───────────────────────┼──────────────────────┼────────────┤
94+
│ 0193f22a-9df3-78e3-b5bb-7ab631903306 │ SSH │ 22 │ hostname: do-target │ 10.116.0.3 (a1net) │ alice │
95+
├──────────────────────────────────────┼──────────┼───────┼───────────────────────┼──────────────────────┼────────────┤
96+
│ 0193f22a-9df3-78e3-b5bb-7ab631903306 │ SSH │ 23 │ hostname: do-target │ 10.116.0.3 (a1net) │ root │
97+
├──────────────────────────────────────┼──────────┼───────┼───────────────────────┼──────────────────────┼────────────┤
98+
│ 01943cff-6130-7989-8bff-cbc02b59a2b1 │ SSH │ 80 │ hostname: az-target │ 172.16.0.0 (b1net) │ alice, bob │
99+
╰──────────────────────────────────────┴──────────┴───────┴───────────────────────┴──────────────────────┴────────────╯
98100
```
99101

100102
You can optionally add flags to filter the output. For example:
101103

102104
```sh
103-
warp-cli target list --attribute hostname=digital-ocean-target --username root
105+
warp-cli target list --attribute hostname=do-target --username root
104106
```
105107

106108
To view all available filters, type `warp-cli target list --help`.

0 commit comments

Comments
 (0)