Skip to content

Commit 9b3d5fb

Browse files
Replace remaining /zones/{zone_id}/dnssec PATCH examples
1 parent a629a9b commit 9b3d5fb

File tree

2 files changed

+32
-39
lines changed

2 files changed

+32
-39
lines changed

src/content/docs/dns/dnssec/dnssec-active-migration.mdx

Lines changed: 15 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ head:
99
content: DNSSEC migration tutorial
1010
---
1111

12-
import { Details } from "~/components";
12+
import { Details, APIRequest } from "~/components";
1313

1414
Follow this tutorial to migrate an existing DNS zone to Cloudflare without having to disable DNSSEC.
1515

@@ -36,25 +36,23 @@ The provider you are migrating from must allow you to add DNSKEY records on the
3636

3737
3. Go to **DNS** > **Settings**, and select **Enable DNSSEC**. Or use the following [API request](/api/resources/dns/subresources/dnssec/methods/edit/).
3838

39-
```bash
40-
curl --request PATCH \
41-
https://api.cloudflare.com/client/v4/zones/{zone_id}/dnssec \
42-
--header "X-Auth-Email: <EMAIL>" \
43-
--header "X-Auth-Key: <API_KEY>" \
44-
--header "Content-Type: application/json" \
45-
--data '{"status": "active"}'
46-
```
39+
<APIRequest
40+
path="/zones/{zone_id}/dnssec"
41+
method="PATCH"
42+
json={{
43+
"status": "active",
44+
}}
45+
/>
4746

4847
4. Go to **DNS** > **Settings**, and enable **Multi-signer DNSSEC**. Or use the following [API request](/api/resources/dns/subresources/dnssec/methods/edit/).
4948

50-
```bash
51-
curl --request PATCH \
52-
https://api.cloudflare.com/client/v4/zones/{zone_id}/dnssec \
53-
--header "X-Auth-Email: <EMAIL>" \
54-
--header "X-Auth-Key: <API_KEY>" \
55-
--header "Content-Type: application/json" \
56-
--data '{"dnssec_multi_signer": true}'
57-
```
49+
<APIRequest
50+
path="/zones/{zone_id}/dnssec"
51+
method="PATCH"
52+
json={{
53+
"dnssec_multi_signer": true,
54+
}}
55+
/>
5856

5957
## 2. Cross-import ZSKs
6058

src/content/docs/dns/dnssec/multi-signer-dnssec/setup.mdx

Lines changed: 17 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ sidebar:
66
label: Setup
77
---
88

9-
import { Tabs, TabItem } from "~/components";
9+
import { Tabs, TabItem, APIRequest } from "~/components";
1010

1111
This page explains how you can enable [multi-signer DNSSEC](/dns/dnssec/multi-signer-dnssec/about/) with Cloudflare, using the [model 2](/dns/dnssec/multi-signer-dnssec/about/#model-2) as described in [RFC 8901](https://www.rfc-editor.org/rfc/rfc8901.html).
1212

@@ -44,17 +44,14 @@ For the purpose of this tutorial, you will update your registrar with the DS rec
4444

4545
1. Use the [Edit DNSSEC Status endpoint](/api/resources/dns/subresources/dnssec/methods/edit/) to enable DNSSEC and activate multi-signer DNSSEC for your zone. Set `status` to `active` and `dnssec_multi_signer` to `true`, as in the following example.
4646

47-
```bash
48-
curl --request PATCH \
49-
"https://api.cloudflare.com/client/v4/zones/{zone_id}/dnssec" \
50-
--header "X-Auth-Email: <EMAIL>" \
51-
--header "X-Auth-Key: <API_KEY>" \
52-
--header "Content-Type: application/json" \
53-
--data '{
54-
"status": "active",
55-
"dnssec_multi_signer": true
56-
}'
57-
```
47+
<APIRequest
48+
path="/zones/{zone_id}/dnssec"
49+
method="PATCH"
50+
json={{
51+
"status": "active",
52+
"dnssec_multi_signer": true,
53+
}}
54+
/>
5855

5956
2. Add the ZSK(s) of your external provider(s) to Cloudflare by creating a DNSKEY record on your zone.
6057

@@ -135,16 +132,14 @@ For the purpose of this tutorial, you will update your registrar with the DS rec
135132

136133
1. Use the [Edit DNSSEC Status endpoint](/api/resources/dns/subresources/dnssec/methods/edit/) to enable DNSSEC and activate multi-signer DNSSEC for your zone. Set `status` to `active` and `dnssec_multi_signer` to `true`, as in the following example.
137134

138-
```bash
139-
$ curl --request PATCH 'https://api.cloudflare.com/client/v4/zones/{zone_id}/dnssec' \
140-
--header "X-Auth-Email: <EMAIL>" \
141-
--header "X-Auth-Key: <API_KEY>" \
142-
--header "Content-Type: application/json" \
143-
--data '{
144-
"status": "active",
145-
"dnssec_multi_signer": true
146-
}'
147-
```
135+
<APIRequest
136+
path="/zones/{zone_id}/dnssec"
137+
method="PATCH"
138+
json={{
139+
"status": "active",
140+
"dnssec_multi_signer": true,
141+
}}
142+
/>
148143

149144
2. Add the ZSK(s) of your external provider(s) to a DNSKEY record at your primary DNS provider. This record should be transferred successfully to Cloudflare.
150145

0 commit comments

Comments
 (0)