cloudflare

📁 jakenuts/agent-skills 📅 6 days ago
9
总安装量
3
周安装量
#31809
全站排名
安装命令
npx skills add https://github.com/jakenuts/agent-skills --skill cloudflare

Agent 安装分布

codex 3
opencode 2
github-copilot 2
claude-code 2
amp 1
cursor 1

Skill 文档

Cloudflare Management Skill

Created by After Dark Systems, LLC

Overview

This skill provides comprehensive Cloudflare infrastructure management capabilities through the Cloudflare API v4. It enables full control over domains, DNS, security, performance, and serverless deployments.

Authentication

API credentials are stored at ~/cloudflare_global_key. The file contains:

  • Global API Key for legacy authentication
  • API Token (Bearer token) for modern authentication

Recommended: Use the Bearer token for API calls:

-H "Authorization: Bearer <token>"

To verify token validity:

./scripts/cf-api.sh verify-token

Available Scripts

All scripts are located in the scripts/ directory and use the credentials from ~/cloudflare_global_key.

Core API Client

  • cf-api.sh – Base API client with authentication handling

Zone Management

  • zones.sh – List, get, create, and manage zones
  • zone-settings.sh – Manage zone-level settings

DNS Management

  • dns.sh – Full DNS record CRUD operations
  • dns-import.sh – Bulk import DNS records
  • dns-export.sh – Export DNS records

Security & Firewall

  • firewall.sh – Firewall rules management
  • waf.sh – Web Application Firewall rules
  • rate-limiting.sh – Rate limiting rules
  • ip-access.sh – IP access rules (block/allow)
  • ssl.sh – SSL/TLS configuration

Performance & Caching

  • cache.sh – Cache purge and settings
  • page-rules.sh – Page rules management
  • speed.sh – Speed optimizations (minify, polish, etc.)

Workers & Pages

  • workers.sh – Cloudflare Workers management
  • pages.sh – Cloudflare Pages projects

Analytics & Logs

  • analytics.sh – Traffic and security analytics
  • logs.sh – Enterprise log access

Quick Start Examples

List All Zones

./scripts/zones.sh list

Get Zone Details

./scripts/zones.sh get <zone_id>
# or by domain name
./scripts/zones.sh get-by-name example.com

List DNS Records

./scripts/dns.sh list <zone_id>
# Filter by type
./scripts/dns.sh list <zone_id> --type A

Create DNS Record

./scripts/dns.sh create <zone_id> \
  --type A \
  --name subdomain \
  --content 192.0.2.1 \
  --ttl 3600 \
  --proxied true

Update DNS Record

./scripts/dns.sh update <zone_id> <record_id> \
  --content 192.0.2.2 \
  --ttl 1800

Delete DNS Record

./scripts/dns.sh delete <zone_id> <record_id>

Purge Cache

# Purge everything
./scripts/cache.sh purge-all <zone_id>

# Purge specific URLs
./scripts/cache.sh purge-urls <zone_id> "https://example.com/page1" "https://example.com/page2"

# Purge by cache tags
./scripts/cache.sh purge-tags <zone_id> tag1 tag2

SSL/TLS Settings

# Get current SSL mode
./scripts/ssl.sh get-mode <zone_id>

# Set SSL mode (off, flexible, full, strict)
./scripts/ssl.sh set-mode <zone_id> strict

Firewall Rules

# List firewall rules
./scripts/firewall.sh list <zone_id>

# Block an IP
./scripts/ip-access.sh block <zone_id> 192.0.2.100 "Suspicious activity"

# Allow an IP
./scripts/ip-access.sh allow <zone_id> 192.0.2.50 "Trusted server"

Workers

# List workers
./scripts/workers.sh list

# Deploy a worker
./scripts/workers.sh deploy <script_name> <script_file>

# Delete a worker
./scripts/workers.sh delete <script_name>

Common Workflows

Setting Up a New Domain

  1. Add the zone:
./scripts/zones.sh create example.com
  1. Get the zone ID:
ZONE_ID=$(./scripts/zones.sh get-by-name example.com --id-only)
  1. Add required DNS records:
./scripts/dns.sh create $ZONE_ID --type A --name @ --content 192.0.2.1 --proxied true
./scripts/dns.sh create $ZONE_ID --type CNAME --name www --content example.com --proxied true
./scripts/dns.sh create $ZONE_ID --type MX --name @ --content mail.example.com --priority 10
  1. Configure SSL:
./scripts/ssl.sh set-mode $ZONE_ID strict

Migrating DNS from Another Provider

  1. Export current records from the source provider
  2. Import to Cloudflare:
./scripts/dns-import.sh <zone_id> records.txt

Emergency: Block Attack Traffic

# Block specific IP
./scripts/ip-access.sh block <zone_id> <attacker_ip> "Attack mitigation"

# Enable Under Attack Mode
./scripts/zone-settings.sh set <zone_id> security_level under_attack

# Purge cache if compromised content was cached
./scripts/cache.sh purge-all <zone_id>

API Reference

See reference.md for complete Cloudflare API v4 documentation including:

  • All available endpoints
  • Request/response formats
  • Error codes and handling
  • Rate limiting information

Templates

The templates/ directory contains JSON templates for common operations:

  • dns-records.json – Common DNS record configurations
  • firewall-rules.json – Firewall rule templates
  • page-rules.json – Page rule templates
  • worker-config.json – Worker configuration template

Error Handling

All scripts return appropriate exit codes:

  • 0: Success
  • 1: API error (check stderr for details)
  • 2: Invalid arguments
  • 3: Authentication error
  • 4: Resource not found

Error responses include the Cloudflare error code and message for debugging.

Best Practices

  1. Always use proxied records when possible for DDoS protection
  2. Use strict SSL mode for full end-to-end encryption
  3. Set appropriate TTLs – shorter for dynamic content, longer for static
  4. Test firewall rules in log mode before enforcing
  5. Use API tokens with minimal required permissions
  6. Cache aggressively but purge when content changes
  7. Monitor analytics for unusual traffic patterns

Support

For issues with this skill, contact After Dark Systems, LLC.

For Cloudflare API documentation: https://developers.cloudflare.com/api/