Skip to content

[EDU-6407] fix: replaced api v3 in secure-journey - EN #1669

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 8 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -70,29 +70,31 @@ To configure an edge firewall to protect an specific domain, [go to the Protect
1. Run the following `GET` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/) to retrieve your `<edge_firewall_id>`:

```bash
curl --location 'https://api.azionapi.net/edge_firewall \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token [TOKEN VALUE]'
curl --request GET \
--url https://api.azion.com/v4/edge_firewall/firewalls \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]'
```

2. You'll receive a response with all your existing edge firewalls. Copy the value of the `<id>` that you want to configure.
3. Run a `PATCH` request to modify the firewall as follows:

```bash
curl --location --request PATCH 'https://api.azionapi.net/edge_firewall/<edge_firewall_id>' \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"name": "My edge firewall",
"domains": [
<domains_id>
],
"is_active": true,
"edge_functions_enabled": true,
"network_protection_enabled": true,
"waf_enabled": true,
"debug_rules": true
curl --request PATCH \
--url https://api.azion.com/v4/edge_firewall/firewalls/{id}\
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"name": "string",
"modules": {
"ddos_protection_enabled": true,
"edge_functions_enabled": true,
"network_protection_enabled": true,
"waf_enabled": true
},
"debug_rules": false,
"active": true
}'
```

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -58,22 +58,27 @@ Once your application receives a request generated from one of the countries in
1. Run the following `PATCH` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/) and the `<edge_firewall_id>` variable with [your edge firewall ID](https://api.azion.com/#090fa5b0-3d68-4521-9a90-f4d93773f6d9) to activate the **Edge Functions** module:

```bash
curl --location --request PATCH 'https://api.azionapi.net/edge_firewall/<edge_firewall_id>' \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"edge_functions_enabled": true
}'
curl --request PATCH \
--url https://api.azion.com/v4/edge_firewall/firewalls/{id} \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"name": "string",
"modules": {
"edge_functions_enabled": true
}
}'
```

2. You'll receive a response with the updated value.
3. Run the following `GET` request to retrieve the `edge_function_id` of the `Deny Geoip function` function:
1. You'll receive a response with the updated value.
2. Run the following `GET` request to retrieve the `edge_function_id` of the `Deny Geoip function` function:

```bash
curl --location 'https://api.azionapi.net/edge_functions' \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token [TOKEN VALUE]'
curl --request GET \
--url https://api.azion.com/v4/edge_functions/functions \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]'
```

4. You'll receive a response similar to this:
Expand Down Expand Up @@ -112,18 +117,21 @@ curl --location 'https://api.azionapi.net/edge_functions' \
6. Run the following `POST` request, replacing the `<edge_firewall_id>` variable with [your edge firewall ID](https://api.azion.com/#090fa5b0-3d68-4521-9a90-f4d93773f6d9) and the `<edge_function_id>` value with the value you received in the previous response:

```bash
curl --location 'https://api.azionapi.net/edge_firewall/<edge_firewall_id>/functions_instances' \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"name": "Deny Geoip",
"edge_function": <edge_function_id>,
"json_args": {}
curl --request POST \
--url https://api.azion.com/v4/edge_firewall/firewalls/edgeFirewallId/functions \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"name": "Deny Geoip",
"json_args": {},
"edge_function": <edge_function_id>,
"active": true
}'

```

7. You'll receive a response similar to this:
6. You'll receive a response similar to this:

```json
{
Expand All @@ -148,9 +156,10 @@ curl --location 'https://api.azionapi.net/edge_firewall/<edge_firewall_id>/funct
8. Run the following `GET` to retrieve the `id` of the `Blocked Countries Geoip` network list:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Se a linha 134 mudou pro número 6, aqui não deveria ser 7?


```bash
curl --location 'https://api.azionapi.net/network_lists' \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token [TOKEN VALUE]'
curl --request GET \
--url https://api.azion.com/v4/workspace/network_lists \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]'
```

9. You'll receive a response similar to this:
Expand Down Expand Up @@ -191,10 +200,11 @@ curl --location 'https://api.azionapi.net/network_lists' \
10. Run the following `POST` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/), the `<edge_firewall_id>` variable with your edge firewall ID, the `<edge_function_instance_id>` value with the function instance ID, and the `<<network_list_id>>` value with the network list ID:

```bash
curl --location 'https://api.azionapi.net/edge_firewall/<edge_firewall_id>/rules_engine' \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
curl --request POST \
--url https://api.azion.com/v4/edge_firewall/firewalls/<edge_firewall_id>/rules \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"name": "Create rule",
"is_active": true,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -49,10 +49,11 @@ To create a rule:
1. Run the following `POST` request to create a rule, replacing `[TOKEN VALUE]` with with your [personal token](/en/documentation/products/guides/personal-tokens/) and the `<edge_firewall_id>` variable with your [edge firewall id](https://api.azion.com/#090fa5b0-3d68-4521-9a90-f4d93773f6d9) value:

```bash
curl --location 'https://api.azionapi.net/edge_firewall/<edge_firewall_id>/rules_engine' \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
curl --request POST \
--url https://api.azion.com/v4/edge_firewall/firewalls/<edge_firewall_id>/rules \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"name": "SSL Verification",
"is_active": true,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -40,20 +40,22 @@ After defining your [Edge DNS main settings](/en/documentation/products/guides/s
1. Run the following `GET` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/) to retrieve your `<hosted_zone_id>`:

```bash
curl --location 'https://api.azionapi.net/intelligent_dns' \
--header 'Authorization: Token [TOKEN VALUE]' \
--header 'Accept: application/json; version=3'
curl --request GET \
--url https://api.azion.com/v4/dns/zones \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]'
```

2. You'll receive a response with all your existing edge firewalls. Copy the value of the `<id>` that you want to use.
2. You'll receive a response with all your existing DNS Zones. Copy the value of the `<id>` that you want to use.
3. Run the following `POST` request, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/) and the `<hosted_zone_id>` value you copied:

```bash
curl --location 'https://api.azionapi.net/intelligent_dns/<hosted_zone_id>/records' \
--header 'Content-Type: application/json' \
--header 'Authorization: Token [TOKEN VALUE]' \
--header 'Accept: application/json; version=3' \
--data-raw '{
curl --request POST \
--url https://api.azion.com/v4/dns/zones/<hosted_zone_id>/records \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"record_type": "CNAME",
"entry": "www",
"answers_list": [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -53,13 +53,16 @@ Once you host your domain on Azion Edge DNS, you must change your domain's autho
</Fragment>

<Fragment slot="panel.api">
### Creating a new zone

1. Run the following `POST` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/) to create a new zone:

```bash
curl --location 'https://api.azionapi.net/intelligent_dns' \
--header 'Authorization: Token [TOKEN VALUE]' \
--header 'Accept: application/json; version=3' \
--header 'Content-Type: application/json' \
curl --request POST \
--url https://api.azion.com/v4/dns/zones \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"name": "New zone",
"domain": "yourdomain.com",
Expand Down Expand Up @@ -110,8 +113,42 @@ Check the [Azion API documentation](https://api.azion.com/) and the [OpenAPI spe
Once you're done configuring your main settings, you can add records to your Edge DNS.

<LinkButton link="/en/documentation/products/guides/secure/add-records/" label="go to add records guide" severity="secondary" />

### Editing an existing zone

1. Run the following `GET` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/) to retrieve your `<zoneId>`:

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Precisa da linha extra (120 e 121)?


```bash
curl --request GET \
--url https://api.azion.com/v4/dns/zones \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]'
```

2. Run the following `PATCH` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/) and `<zoneId>` with the id of the DNS Zone to edit an existing zone:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Onde aparece id nos arquivos não deveria ser ID?

Suggested change
2. Run the following `PATCH` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/) and `<zoneId>` with the id of the DNS Zone to edit an existing zone:
2. Run the following `PATCH` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/) and `<zoneId>` with the ID of the DNS Zone to edit an existing zone:


```bash
curl --request PATCH \
--url https://api.azion.com/v4/dns/zones/<zoneId> \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"name": "string",
"domain": "string",
"active": true,
"soa_ttl": 1,
"refresh": 1,
"retry": 1,
"expiry": 1,
"nx_ttl": 1
}'
```


</Fragment>

</Tabs>

---
---
Original file line number Diff line number Diff line change
Expand Up @@ -46,9 +46,10 @@ If your application receives a request generated from an IP that is in the list,
1. Run the following `GET` request to retrieve the `id` of the **Azion IP Tor Exit Nodes** list:

```bash
curl --location 'https://api.azionapi.net/network_lists' \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token [TOKEN VALUE]'
curl --request GET \
--url https://api.azion.com/v4/workspace/network_lists \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]'
```

2. You'll receive a response similar to this:
Expand Down Expand Up @@ -81,10 +82,11 @@ curl --location 'https://api.azionapi.net/network_lists' \
3. Run the following `POST` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/), the `<edge_firewall_id>` variable with your [edge firewall ID](https://api.azion.com/#58376993-e0dd-4b51-9cd3-41d86122728f), and the `<network_list_id>` value with the IP Tor Exit Nodes list ID:

```bash
curl --location 'https://api.azionapi.net/edge_firewall/<edge_firewall_id>/rules_engine' \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
curl --request POST \
--url https://api.azion.com/v4/edge_firewall/firewalls/<edge_firewall_id>/rules \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"name": "Block Tor Exit Nodes",
"is_active": true,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -43,9 +43,10 @@ To access the Origin Shield list, you must have:
1. Run the following `GET` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/)

```bash
curl --location 'https://api.azionapi.net/network_lists' \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token [TOKEN VALUE]'
curl --request GET \
--url https://api.azion.com/v4/workspace/network_lists \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]'
```

2. You'll receive a response similar to this:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -53,11 +53,12 @@ Ensure that the subject name and the subject alternate names (SAN) listed are th
1. Run the following `POST` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/) and the placeholders in the body with the desired values:

```bash
curl --location 'https://api.azionapi.net/digital_certificates/csr' \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token {{[TOKEN VALUE]}}' \
--header 'Content-Type: application/json' \
--data-raw '{
curl --request POST \
--url https://api.azion.com/v4/digital_certificates/csr \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"name": "New CSR",
"common_name": "domain.net",
"country": "US",
Expand Down Expand Up @@ -161,11 +162,12 @@ Once you receive a certificate issued by your CA, you must associate it with the
1. Run the following `PATCH` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/), the `<digital_certificate_id>` with the ID you got in the previous response and the certificate in the `certificate_content` key:

```bash
curl --location 'https://api.azionapi.net/digital_certificates/<digital_certificate_id>' \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token {{[TOKEN VALUE]}}' \
--header 'Content-Type: application/json' \
--data-raw '{
curl --request PATCH \
--url https://api.azion.com/v4/digital_certificates/certificates/<digital_certificate_id>\
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"certificate_content": "-----BEGIN CERTIFICATE——\nADgPIWMQBAKIAMSACGAgI3fGBMTHXI0bDTCIGIVCGuMgNAEGABQsBApCBqMJUwSx\nA2RFjv0gdbMhM0MA0hzAbAIHE53WMwwBMHpjwNwj35MzgNtTbIiywTMOWdcMWcje\gaBkDAkjQcGi0bB9WI0A1IdRjDA3bQlBXkqwWFOD4B2wwh3I2hMMVtu9YuYbNkBT\AQEFAAOCAQ8AMIIBCgKCAQEAt25cziDBsHbZzZhy9BPLApPf9OmE67k9pr7VezsR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\Lahvmz0plDObtDb8DnqbDP8OnxKxBIsNT1WJdlS9dgB4+0YOhmpfQXM3nDuP06v7m+fnK8bF6lW0jwIA87/u5b/RVOz1htMNLoF8BvLi6\7ODLTv5oZ6Wwhf1tNADmSHz3l\n6ra9d8oa6jK1fe2/5A7LY41acjbbNrLbFDYP7hcx02TmCfSMut+ysaZ/blay4Sbb\nwNlt92KhJw07UEKgXXbgyXGoFQkU8V+r2AZcgt0XM9jvwTc01Sbq/gegd2GMAj3x\nrTwkn5UNzFs56FCgNg==\n-----END CERTIFICATE-----"
}'
```
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -57,10 +57,11 @@ The **Permissive** mode is recommended when testing access to your application u
1. Run the following `POST` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/) and the certificate in the `certificate` property:

```bash
curl --location 'https://api.azionapi.net/digital_certificates' \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
curl --request POST \
--url https://api.azion.com/v4/digital_certificates/certificates \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"name": "Trusted CA - mydomain.com",
"certificate": "-----BEGIN CERTIFICATE-----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\nrTwkn5UNzFs56FCgNg==\n-----END CERTIFICATE-----",
Expand Down Expand Up @@ -180,10 +181,11 @@ To configure a firewall to block access to a domain using the **Permissive** mod
1. Run the following `POST` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/) and the `<edge_firewall_id>` with the ID of the firewall associated with the mTLS domain:

```bash
curl --location 'https://api.azionapi.net/edge_firewall/<edge_firewall_id>/rules_engine' \
--header 'Accept: application/json; version=3' \
--header 'Authorization: Token [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
curl --request POST \
--url https://api.azion.com/v4/edge_firewall/firewalls/<edge_firewall_id>/rules \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"name": "403 Host=mydomain.com and CCV!=true",
"description": "Delivers a 403 if the hostname does not match mydomain.com and if the certificate validation fails.",
Expand Down Expand Up @@ -304,10 +306,11 @@ The use of the prefix `X-` in the header name of custom HTTP variables is discou
1. Run the following `POST` request in your terminal, replacing `[TOKEN VALUE]` with your [personal token](/en/documentation/products/guides/personal-tokens/) and the `<edge_application_id>` with the ID of the application associated with the mTLS domain:

```bash
curl --location 'https://api.azionapi.net/edge_applications/<edge_application_id>/rules_engine/request/rules' \
--header 'Accept: application/json; version=3' \
--header 'Content-Type: application/json' \
--header 'Authorization: Token [TOKEN VALUE]' \
curl --request POST \
--url https://api.azion.com/v4/edge_application/applications/<edge_application_id>/rules \
--header 'Accept: application/json' \
--header 'Authorization: [TOKEN VALUE]' \
--header 'Content-Type: application/json' \
--data '{
"name": "mTLS variables",
"description": "Adds certificate values according to Open Banking standards",
Expand Down
Loading