Skip to content

Commit 9f78d3c

Browse files
Double-check and remove original bash throughout
1 parent 1316c55 commit 9f78d3c

File tree

7 files changed

+11
-150
lines changed

7 files changed

+11
-150
lines changed

src/content/docs/ssl/client-certificates/byo-ca.mdx

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -95,12 +95,6 @@ If you want to remove a CA that you have previously uploaded, you must first rem
9595

9696
You can also use the [API](/api/resources/certificate_authorities/subresources/hostname_associations/methods/get/) to list the hostname associations. Make sure you include the query parameter `mtls_certificate_id`, where `mtls_certificate_id` is the certificate ID of the uploaded CA (step 2 above).
9797

98-
```bash
99-
curl "https://api.cloudflare.com/client/v4/zones/zone_id/certificate_authorities/hostname_associations?mtls_certificate_id={id_from_step_2}" \
100-
--header "X-Auth-Email: <EMAIL>" \
101-
--header "X-Auth-Key: <API_KEY>"
102-
```
103-
10498
<APIRequest
10599
path="/zones/{zone_id}/certificate_authorities/hostname_associations"
106100
method="GET"

src/content/docs/ssl/edge-certificates/additional-options/minimum-tls.mdx

Lines changed: 1 addition & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -54,17 +54,6 @@ Use the [Edit zone setting](/api/resources/zones/subresources/settings/methods/e
5454

5555
In the following example, the minimum TLS version for the zone will be set to `1.2`. Replace the zone ID and API token placeholders with your information, and adjust the `value` field with your chosen TLS version.
5656

57-
```bash
58-
curl --request PATCH \
59-
"https://api.cloudflare.com/client/v4/zones/{zone_id}/settings/min_tls_version" \
60-
--header "Authorization: Bearer <API_TOKEN>" \
61-
--header "Content-Type: application/json" \
62-
--data '{
63-
"id": "min_tls_version",
64-
"value": "1.2"
65-
}'
66-
```
67-
6857
<APIRequest
6958
path="/zones/{zone_id}/settings/{setting_id}"
7059
method="PATCH"
@@ -90,17 +79,7 @@ This is currently only available via the API:
9079

9180
Cloudflare uses the [hostname priority logic](/ssl/reference/certificate-and-hostname-priority/) to determine which setting to apply.
9281

93-
In the following example, the minimum TLS version for a specific hostname will be set to `1.2`. Replace the zone ID, hostname, and API token placeholders with your information, and adjust the `value` field with your chosen TLS version.
94-
95-
```bash
96-
curl --request PUT \
97-
"https://api.cloudflare.com/client/v4/zones/{zone_id}/hostnames/settings/min_tls_version/{hostname}" \
98-
--header "Authorization: Bearer <API_TOKEN>" \
99-
--header "Content-Type: application/json" \
100-
--data '{
101-
"value": "1.2"
102-
}'
103-
```
82+
In the following example, the minimum TLS version for a specific hostname will be set to `1.2`. Replace the zone ID, hostname, and authentication placeholders with your information, and adjust the `value` field with your chosen TLS version.
10483

10584
<APIRequest
10685
path="/zones/{zone_id}/hostnames/settings/{setting_id}/{hostname}"

src/content/docs/ssl/edge-certificates/geokey-manager/setup.mdx

Lines changed: 10 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ description: Learn how to set up Geo Key Manager and choose the geographical
1010
boundaries of where your private encryption keys are stored.
1111
---
1212

13-
import { Render, TabItem, Tabs, InlineBadge, APIRequest } from "~/components";
13+
import { Render, TabItem, Tabs, InlineBadge, APIRequest, Example } from "~/components";
1414

1515
## Geo Key Manager v2 <InlineBadge preset="beta" />
1616

@@ -36,18 +36,9 @@ You also have access to the `geo_restrictions` parameter, which is mutually excl
3636

3737
### Examples
3838

39-
```bash title="Store private keys in the E.U. and the U.S."
40-
curl "https://api.cloudflare.com/client/v4/zones/{zone_id}/custom_certificates" \
41-
--header "X-Auth-Email: <EMAIL>" \
42-
--header "X-Auth-Key: <API_KEY>" \
43-
--header "Content-Type: application/json" \
44-
--data '{
45-
"certificate":"certificate",
46-
"private_key":"<PRIVATE_KEY>",
47-
"policy":"(country: US) and (region: EU)",
48-
"type": "sni_custom"
49-
}'
50-
```
39+
<Example>
40+
41+
Store private keys in the E.U. and the U.S.
5142

5243
<APIRequest
5344
path="/zones/{zone_id}/custom_certificates"
@@ -60,18 +51,10 @@ curl "https://api.cloudflare.com/client/v4/zones/{zone_id}/custom_certificates"
6051
}}
6152
/>
6253

63-
```bash title="Store private keys in the E.U., but not in France"
64-
curl "https://api.cloudflare.com/client/v4/zones/{zone_id}/custom_certificates" \
65-
--header "X-Auth-Email: <EMAIL>" \
66-
--header "X-Auth-Key: <API_KEY>" \
67-
--header "Content-Type: application/json" \
68-
--data '{
69-
"certificate":"certificate",
70-
"private_key":"<PRIVATE_KEY>",
71-
"policy":"(region: EU) and (not country: FR)",
72-
"type": "sni_custom"
73-
}'
74-
```
54+
</Example>
55+
56+
<Example>
57+
Store private keys in the E.U., but not in France
7558

7659
<APIRequest
7760
path="/zones/{zone_id}/custom_certificates"
@@ -84,6 +67,8 @@ curl "https://api.cloudflare.com/client/v4/zones/{zone_id}/custom_certificates"
8467
}}
8568
/>
8669

70+
</Example>
71+
8772
:::note
8873

8974
For more information on the `policy` field, refer to [Supported options](/ssl/edge-certificates/geokey-manager/supported-options/).

src/content/docs/ssl/origin-configuration/authenticated-origin-pull/aws-alb-integration.mdx

Lines changed: 0 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -71,23 +71,6 @@ curl --verbose https://<your-application-load-balancer>
7171

7272
2.[Associate the certificate with the hostname](/api/resources/origin_tls_client_auth/subresources/hostnames/methods/update/) that should use it.
7373

74-
```bash
75-
curl --silent --request PUT \
76-
"https://api.cloudflare.com/client/v4/zones/$ZONEID/origin_tls_client_auth/hostnames" \
77-
--header "Content-Type: application/json" \
78-
--header "X-Auth-Email: $MYAUTHEMAIL" \
79-
--header "X-Auth-Key: $MYAUTHKEY" \
80-
--data '{
81-
"config": [
82-
{
83-
"enabled": true,
84-
"cert_id": "<CERT_ID>",
85-
"hostname": "<YOUR_HOSTNAME>"
86-
}
87-
]
88-
}'
89-
```
90-
9174
<APIRequest
9275
path="/zones/{zone_id}/origin_tls_client_auth/hostnames"
9376
method="PUT"
@@ -105,17 +88,6 @@ curl --silent --request PUT \
10588

10689
3. [Enable the Authenticated Origin Pulls](/ssl/origin-configuration/authenticated-origin-pull/set-up/per-hostname/#3-enable-authenticated-origin-pulls-globally) feature on your zone.
10790

108-
```bash
109-
curl --request PATCH \
110-
"https://api.cloudflare.com/client/v4/zones/$ZONEID/settings/tls_client_auth" \
111-
--header "X-Auth-Email: $MYAUTHEMAIL" \
112-
--header "X-Auth-Key: $MYAUTHKEY" \
113-
--header "Content-Type: application/json" \
114-
--data '{
115-
"value": "on"
116-
}'
117-
```
118-
11991
<APIRequest
12092
path="/zones/{zone_id}/settings/{setting_id}"
12193
method="PATCH"
@@ -139,23 +111,6 @@ Make sure your [encryption mode](/ssl/origin-configuration/ssl-modes/) is set to
139111

140112
1. Use a [`PUT` request](/api/resources/origin_tls_client_auth/subresources/hostnames/methods/update/) to disable Authenticated Origin Pulls on the hostname.
141113

142-
```bash
143-
curl -s --request PUT \
144-
"https://api.cloudflare.com/client/v4/zones/$ZONEID/origin_tls_client_auth/hostnames" \
145-
--header "Content-Type: application/json" \
146-
--header "X-Auth-Email: $MYAUTHEMAIL" \
147-
--header "X-Auth-Key: $MYAUTHKEY" \
148-
--data '{
149-
"config": [
150-
{
151-
"enabled": false,
152-
"cert_id": "<CERT_ID>",
153-
"hostname": "<YOUR_HOSTNAME>"
154-
}
155-
]
156-
}'
157-
```
158-
159114
<APIRequest
160115
path="/zones/{zone_id}/origin_tls_client_auth/hostnames"
161116
method="PUT"
@@ -173,27 +128,13 @@ curl -s --request PUT \
173128

174129
2. (Optional) Use a [`GET` request](/api/resources/origin_tls_client_auth/subresources/hostnames/subresources/certificates/methods/list/) to obtain a list of the client certificate IDs. You will need the ID of the certificate you want to remove for the following step.
175130

176-
```bash
177-
curl "https://api.cloudflare.com/client/v4/zones/$ZONEID/origin_tls_client_auth/hostnames/certificates" \
178-
--header "X-Auth-Email: $MYAUTHEMAIL" \
179-
--header "X-Auth-Key: $MYAUTHKEY"
180-
```
181-
182131
<APIRequest
183132
path="/zones/{zone_id}/origin_tls_client_auth/hostnames/certificates"
184133
method="GET"
185134
/>
186135

187-
188136
3. Use the [Delete hostname client certificate](/api/resources/origin_tls_client_auth/subresources/hostnames/subresources/certificates/methods/delete/) endpoint to remove the certificate you had uploaded.
189137

190-
```bash
191-
curl --request DELETE \
192-
"https://api.cloudflare.com/client/v4/zones/$ZONEID/origin_tls_client_auth/hostnames/certificates/$CERTID" \
193-
--header "X-Auth-Email: $MYAUTHEMAIL" \
194-
--header "X-Auth-Key: $MYAUTHKEY"
195-
```
196-
197138
<APIRequest
198139
path="/zones/{zone_id}/origin_tls_client_auth/hostnames/certificates/{certificate_id}"
199140
method="DELETE"

src/content/docs/ssl/origin-configuration/ssl-modes/index.mdx

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -52,15 +52,6 @@ Automatic SSL/TLS will not change your setting to a less secure encryption mode.
5252

5353
If you want to opt a zone out via the API, you can make this API call on or before the grace period expiration date.
5454

55-
```bash
56-
curl --request PATCH \
57-
--url https://api.cloudflare.com/client/v4/zones/<ZONE_ID>/settings/ssl_automatic_mode \
58-
--header 'Authorization: Bearer <CF_API_TOKEN>' \
59-
--header 'Content-Type: application/json' \
60-
--data '{"value":"custom"}'
61-
```
62-
63-
6455
<APIRequest
6556
path="/zones/{zone_id}/settings/{setting_id}"
6657
method="PATCH"
@@ -72,7 +63,6 @@ If you want to opt a zone out via the API, you can make this API call on or befo
7263
}}
7364
/>
7465

75-
7666
#### Opt out multiple zones
7767

7868
If you wanted to opt out multiple zones:

src/content/docs/ssl/post-quantum-cryptography/pqc-to-origin.mdx

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -36,16 +36,6 @@ It is also possible to opt out of PQC using the same API endpoint.
3636
This setting affects all outbound connections from the zone you specify in the API call, including `fetch()` requests made by [Workers](/workers/) on your zone.
3737
:::
3838

39-
```bash
40-
curl --request PUT \
41-
"https://api.cloudflare.com/client/v4/zones/{zone_id}/cache/origin_post_quantum_encryption" \
42-
--header "Authorization: Bearer <API_TOKEN>" \
43-
--header "Content-Type: application/json" \
44-
--data '{
45-
"value": "<YOUR_CHOSEN_SETTING>"
46-
}'
47-
```
48-
4939
<APIRequest
5040
path="/zones/{zone_id}/cache/origin_post_quantum_encryption"
5141
method="PUT"

src/content/partials/ssl/forward-client-certificate.mdx

Lines changed: 0 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -19,23 +19,6 @@ This process is only available on accounts with [Cloudflare Access](/cloudflare-
1919

2020
The most common approach to forwarding a certificate is to use the Cloudflare API to [update an mTLS certificate's hostname settings](/api/resources/zero_trust/subresources/access/subresources/certificates/subresources/settings/methods/update/).
2121

22-
```bash title="Request" {11}
23-
curl --request PUT \
24-
https://api.cloudflare.com/client/v4/zones/{zone_id}/access/certificates/settings \
25-
--header "X-Auth-Email: <EMAIL>" \
26-
--header "X-Auth-Key: <API_KEY>" \
27-
--header "Content-Type: application/json" \
28-
--data '{
29-
"settings": [
30-
{
31-
"hostname": "<HOSTNAME>",
32-
"china_network": false,
33-
"client_certificate_forwarding": true
34-
}
35-
]
36-
}'
37-
```
38-
3922
<APIRequest
4023
path="/zones/{zone_id}/access/certificates/settings"
4124
method="PUT"
@@ -53,7 +36,6 @@ https://api.cloudflare.com/client/v4/zones/{zone_id}/access/certificates/setting
5336
}}
5437
/>
5538

56-
5739
Once `client_certificate_forwarding` is set to `true`, the first request of an mTLS connection will now include the following headers:
5840

5941
* `Cf-Client-Cert-Der-Base64`

0 commit comments

Comments
 (0)