Skip to content

Commit bb6b25a

Browse files
committed
Replace learning path env vars
1 parent 494bb2e commit bb6b25a

File tree

8 files changed

+21
-21
lines changed

8 files changed

+21
-21
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/device-information-only.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ To set up Device Information Only mode:
1515

1616
```bash
1717
curl --request PATCH \
18-
"https://api.cloudflare.com/client/v4/zones/{zone_id}/devices/policy/certificates" \
18+
"https://api.cloudflare.com/client/v4/zones/$ZONE_ID/devices/policy/certificates" \
1919
--header "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \
2020
--header "Content-Type: application/json" \
2121
--data '{"enabled": true}'

src/content/docs/learning-paths/replace-vpn/build-policies/create-policy.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ To create a new policy, open [Zero Trust](https://one.dash.cloudflare.com/) and
3838
<TabItem label="API">
3939

4040
```bash
41-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
41+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
4242
--header "X-Auth-Email: <EMAIL>" \
4343
--header "X-Auth-Key: <API_KEY>" \
4444
--header "Content-Type: application/json" \
@@ -101,7 +101,7 @@ curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
101101
<TabItem label="API">
102102

103103
```bash
104-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
104+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
105105
--header "X-Auth-Email: <EMAIL>" \
106106
--header "X-Auth-Key: <API_KEY>" \
107107
--header "Content-Type: application/json" \
@@ -159,7 +159,7 @@ We recommend adding a catch-all policy to the bottom of your network policy list
159159
<TabItem label="API">
160160

161161
```bash
162-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
162+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
163163
--header "X-Auth-Email: <EMAIL>" \
164164
--header "X-Auth-Key: <API_KEY>" \
165165
--header "Content-Type: application/json" \

src/content/docs/learning-paths/secure-internet-traffic/build-egress-policies/deploy-egress-ips.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ We recommend building baseline egress policies that can cover a majority of your
4242
<TabItem label="API">
4343

4444
```bash
45-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
45+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
4646
--header "Authorization: Bearer <API_TOKEN>" \
4747
--header "Content-Type: application/json" \
4848
--data '{

src/content/docs/learning-paths/secure-internet-traffic/build-http-policies/browser-isolation.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ You can control potential risk and shape user behavior without applying heavy-ha
4848
</TabItem> <TabItem label="API">
4949

5050
```bash
51-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
51+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
5252
--header "X-Auth-Email: <EMAIL>" \
5353
--header "X-Auth-Key: <API_KEY>" \
5454
--header "Content-Type: application/json" \
@@ -117,7 +117,7 @@ In this context, if some traffic is unknown to your organization, Cloudflare wil
117117
</TabItem> <TabItem label="API">
118118

119119
```bash title="Allow known applications and websites"
120-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
120+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
121121
--header "X-Auth-Email: <EMAIL>" \
122122
--header "X-Auth-Key: <API_KEY>" \
123123
--header "Content-Type: application/json" \
@@ -142,7 +142,7 @@ curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
142142
```
143143

144144
```bash title="Block security risks"
145-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
145+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
146146
--header "X-Auth-Email: <EMAIL>" \
147147
--header "X-Auth-Key: <API_KEY>" \
148148
--header "Content-Type: application/json" \
@@ -167,7 +167,7 @@ curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
167167
```
168168

169169
```bash title="Isolate all other traffic"
170-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
170+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
171171
--header "X-Auth-Email: <EMAIL>" \
172172
--header "X-Auth-Key: <API_KEY>" \
173173
--header "Content-Type: application/json" \

src/content/docs/learning-paths/secure-internet-traffic/build-http-policies/data-loss-prevention.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ To help this better match the needs of your organization, you can also build a c
4646
</TabItem> <TabItem label="API">
4747

4848
```bash
49-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
49+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
5050
--header "X-Auth-Email: <EMAIL>" \
5151
--header "X-Auth-Key: <API_KEY>" \
5252
--header "Content-Type: application/json" \
@@ -98,7 +98,7 @@ For example, you can use a custom expression to detect when your users share pro
9898
<TabItem label="API">
9999

100100
```bash
101-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
101+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
102102
--header "X-Auth-Email: <EMAIL>" \
103103
--header "X-Auth-Key: <API_KEY>" \
104104
--header "Content-Type: application/json" \
@@ -158,7 +158,7 @@ Many organizations want to detect and log financial information egressing from u
158158
<TabItem label="API">
159159

160160
```bash title="Block financial information shared with AI"
161-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
161+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
162162
--header "Authorization: Bearer <API_TOKEN>" \
163163
--header "Content-Type: application/json" \
164164
--data '{

src/content/docs/learning-paths/secure-internet-traffic/build-http-policies/tls-inspection.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ For example, if users are issued a corporate-managed iPhone with limited permiss
7777
1. Create a list of device serial numbers that you do not want to inspect.
7878

7979
```bash
80-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/lists \
80+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/lists \
8181
--header "X-Auth-Email: <EMAIL>" \
8282
--header "X-Auth-Key: <API_KEY>" \
8383
--header "Content-Type: application/json" \
@@ -96,7 +96,7 @@ For example, if users are issued a corporate-managed iPhone with limited permiss
9696
2. Create a Do Not Inspect policy that checks the device against the list of serial numbers.
9797

9898
```bash
99-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
99+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
100100
--header "X-Auth-Email: <EMAIL>" \
101101
--header "X-Auth-Key: <API_KEY>" \
102102
--header "Content-Type: application/json" \
@@ -141,7 +141,7 @@ If you filter your network-connected devices with Magic WAN tunnels, the WARP Co
141141
</TabItem> <TabItem label="API">
142142

143143
```bash
144-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
144+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
145145
--header "X-Auth-Email: <EMAIL>" \
146146
--header "X-Auth-Key: <API_KEY>" \
147147
--header "Content-Type: application/json" \

src/content/docs/learning-paths/zero-trust-web-access/advanced-workflows/isolate-application.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ with HTTP policies applied"]
6767
<TabItem label="API">
6868

6969
```bash
70-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/access/apps/{app_uuid}/policies \
70+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/access/apps/$APP_UUID/policies \
7171
--header "X-Auth-Email: <EMAIL>" \
7272
--header "X-Auth-Key: <API_KEY>" \
7373
--header "Content-Type: application/json" \
@@ -114,7 +114,7 @@ To create a list of serial numbers, refer to [Create Zero Trust list](/api/resou
114114
<TabItem label="API">
115115

116116
```bash
117-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/access/apps/{app_uuid}/policies \
117+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/access/apps/$APP_UUID/policies \
118118
--header "X-Auth-Email: <EMAIL>" \
119119
--header "X-Auth-Key: <API_KEY>" \
120120
--header "Content-Type: application/json" \
@@ -164,7 +164,7 @@ Prevents users on unmanaged devices from downloading any files from your private
164164
<TabItem label="API">
165165

166166
```bash
167-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
167+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
168168
--header "X-Auth-Email: <EMAIL>" \
169169
--header "X-Auth-Key: <API_KEY>" \
170170
--header "Content-Type: application/json" \
@@ -250,7 +250,7 @@ Block users on unmanaged devices from downloading files that contain credit card
250250
<TabItem label="API">
251251

252252
```bash
253-
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
253+
curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
254254
--header "X-Auth-Email: <EMAIL>" \
255255
--header "X-Auth-Key: <API_KEY>" \
256256
--header "Content-Type: application/json" \

src/content/partials/learning-paths/zero-trust/device-profiles.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ To customize the default settings:
4848

4949
```bash
5050
curl --request PATCH \
51-
https://api.cloudflare.com/client/v4/accounts/{account_id}/devices/policy \
51+
https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/devices/policy \
5252
--header "X-Auth-Email: <EMAIL>" \
5353
--header "X-Auth-Key: <API_KEY>" \
5454
--header "Content-Type: application/json" \
@@ -72,7 +72,7 @@ https://api.cloudflare.com/client/v4/accounts/{account_id}/devices/policy \
7272

7373
```bash
7474
curl --request PUT \
75-
https://api.cloudflare.com/client/v4/accounts/{account_id}/devices/settings \
75+
https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/devices/settings \
7676
--header "X-Auth-Email: <EMAIL>" \
7777
--header "X-Auth-Key: <API_KEY>" \
7878
--header "Content-Type: application/json" \

0 commit comments

Comments
 (0)