[DigitalPoint] App for Cloudflare®

[DigitalPoint] App for Cloudflare® 1.8.7

No permission to download
Did Cloudflare resolve their HTTP/2 to origin bug that can cause 520 errors?

They have not.

@MattW just moved us to a new VPS running Alma/CloudLinux/cPanel/Apache. We had to disable HTTP/2 to Origin due to this.
 
When rebuilding the attachments in 2.3 to
Optimise them, it causes the process to stop if a file is missing

View attachment 305976
I suspect that’s going to be the same with or without R2. A missing attachment file (even if it’s in the local filesystem) seems like something you would wand to halt the process so it can be addressed instead of ignoring it and moving on/skipping it.
 
I suspect that’s going to be the same with or without R2. A missing attachment file (even if it’s in the local filesystem) seems like something you would wand to halt the process so it can be addressed instead of ignoring it and moving on/skipping it.
Yeah, I suppose so. I know that attachment is missing because of the optimize attachments plugin that started randomly deleting attachments.
 
They have not.

@MattW just moved us to a new VPS running Alma/CloudLinux/cPanel/Apache. We had to disable HTTP/2 to Origin due to this.
Another of my customers is having the same issue, I've ended up just removing the mod_http2 module from Apache to fix it.

Code:
dnf history info 86
Transaction ID : 86
Begin time     : Mon 15 Jul 2024 10:19:25 AM UTC
Begin rpmdb    : 2042:23941802daf0d80e07fd341c99473e47555d8d79
End time       : Mon 15 Jul 2024 10:19:25 AM UTC (0 seconds)
End rpmdb      : 2041:c04a8e73fe0f2409e7a2ac38142fa3ebb0d71857
User           : System <unset>
Return-Code    : Success
Releasever     : 8
Command Line   : -y --color=never --verbose shell /tmp/yILOz_MOj8
Comment        :
Packages Altered:
    Removed ea-apache24-mod_http2-2.4.61-1.1.1.cpanel.x86_64 @@System
 
FWIW, I’ve never had any 520 errors and Cloudflare is connecting to my origin servers via HTTP/2 (my setup is Nginx). They do have a little info about it in their docs:


If it’s something you want to figure out, I’d hop on Cloudflare’s developer Discord and ask about it there.
 
"Registration & contact forms are an overlay"

Could I request a feature to extend this option to the login and possibly DMs/Conversations?

My login page is getting his by bots. I'm able to make a firewall rule to put a managed captcha on the login, but that breaks the login overlay.
 
Honestly, now that Turnstile is a Captcha option, that’s a better way to do it than the system where Cloudflare adds a Captcha challenge before a page loads (it’s just using Turnstile to do that anyway). So using Turnstile as a captcha ends up being the same thing, except it’s cleaner (can do it within AJAX overlay and doesn’t require an extra page load). Also, captchas (including Turnstile) can already be used for the login form.
 
FWIW, I’ve never had any 520 errors and Cloudflare is connecting to my origin servers via HTTP/2 (my setup is Nginx). They do have a little info about it in their docs:


If it’s something you want to figure out, I’d hop on Cloudflare’s developer Discord and ask about it there.
I've only seen this issue with Apache, and not nginx.
 
I've only seen this issue with Apache, and not nginx.
Maybe something a little funky with Apache’s HTTP/2 implementation? Like okay enough that browsers will tolerate whatever the non-standard thing is, but Cloudflare wants a “to spec” implementation? 🤷🏻‍♂️
 
Honestly, now that Turnstile is a Captcha option, that’s a better way to do it than the system where Cloudflare adds a Captcha challenge before a page loads (it’s just using Turnstile to do that anyway). So using Turnstile as a captcha ends up being the same thing, except it’s cleaner (can do it within AJAX overlay and doesn’t require an extra page load). Also, captchas (including Turnstile) can already be used for the login form.

I'm a bit confused by the ACP option narrative and your comment above;
By default, XenForo registration and contact pages use an AJAX overlay rather than a new page. Disabling the overlay allows Cloudflare to present the user with a challenge prior to registering/contact (helps with blocking automated spam registrations & contact).
If you are using Turnstile as a CAPTCHA, you don't need to disable the overlay.


With this option ticked, you're saying the result is CF inserts a pre register/contact captcha, and then XF will present another captcha on the actual login/register page? I have Turnstile selected for XF captcha and have this option ticked, but don't experience multiple captcha when trying to register/contact on my site as a guest.
 
I'm a bit confused by the ACP option narrative and your comment above;
By default, XenForo registration and contact pages use an AJAX overlay rather than a new page. Disabling the overlay allows Cloudflare to present the user with a challenge prior to registering/contact (helps with blocking automated spam registrations & contact).
If you are using Turnstile as a CAPTCHA, you don't need to disable the overlay.


With this option ticked, you're saying the result is CF inserts a pre register/contact captcha, and then XF will present another captcha on the actual login/register page? I have Turnstile selected for XF captcha and have this option ticked, but don't experience multiple captcha when trying to register/contact on my site as a guest.
The option probably wouldn’t have been made if Turnstile was part of XenForo when I did it. As it stands now, the option just isn’t necessary any longer because Turnstile is a captcha option.
 
Does the addon adds a cache-control header on attachments allowing the user's browser, and CloudFlare to cache image attachments?
 
I need help setting up R2 in ACP for this app. I give up, completely confused. Please give price for this service. Thanks!

I've managed to block my avatar/images somehow and have to disable the app to get them back.
 
Last edited:
2 suggestion ideas ...

At /admin.php?cloudflare/firewall it would be helpful to see;

1. Rate limiting rule(s) from [CF dash]/security/waf/rate-limiting-rules

2. The 24hr activity level for each rule numbers/chart (like CF displays), if available by API request

I recently added a 50reqs/10sec rate limiting rule to abate a fairly aggressive scraping bot originating from China that was causing high server load and normal usage lag/delays. This was much easier, and more effective, than playing 'whack-a-mole' with IP address blocking, when it was persisting from changing IP addresses.
 
Back
Top Bottom