Skip to content

Commit d23711d

Browse files
committed
version tags update in docs
1 parent 07225c8 commit d23711d

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

docs/configuration-guides/allowlist.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ docker run --rm -it --network api-firewall-network --network-alias api-firewall
3333
-e APIFW_URL=<API_FIREWALL_URL> -e APIFW_SERVER_URL=<PROTECTED_APP_URL> \
3434
-e APIFW_REQUEST_VALIDATION=<REQUEST_VALIDATION_MODE> -e APIFW_RESPONSE_VALIDATION=<RESPONSE_VALIDATION_MODE> \
3535
-e APIFW_ALLOW_IP_FILE=/opt/ip-allowlist.txt -e APIFW_ALLOW_IP_HEADER_NAME="X-Real-IP" \
36-
-p 8088:8088 wallarm/api-firewall:v0.8.0
36+
-p 8088:8088 wallarm/api-firewall:v0.8.6
3737
```
3838
3939
| Environment variable | Description |

docs/installation-guides/api-mode.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Use the following command to run the API Firewall container:
3838

3939
```
4040
docker run --rm -it -v <PATH_TO_SQLITE_DATABASE>:/var/lib/wallarm-api/1/wallarm_api.db \
41-
-e APIFW_MODE=API -p 8282:8282 wallarm/api-firewall:v0.8.0
41+
-e APIFW_MODE=API -p 8282:8282 wallarm/api-firewall:v0.8.6
4242
```
4343

4444
You can pass to the container the following variables:

docs/installation-guides/docker-container.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ networks:
2727
services:
2828
api-firewall:
2929
container_name: api-firewall
30-
image: wallarm/api-firewall:v0.8.0
30+
image: wallarm/api-firewall:v0.8.6
3131
restart: on-failure
3232
volumes:
3333
- <HOST_PATH_TO_SPEC>:<CONTAINER_PATH_TO_SPEC>
@@ -159,6 +159,6 @@ To start API Firewall on Docker, you can also use regular Docker commands as in
159159
-v <HOST_PATH_TO_SPEC>:<CONTAINER_PATH_TO_SPEC> -e APIFW_API_SPECS=<PATH_TO_MOUNTED_SPEC> \
160160
-e APIFW_URL=<API_FIREWALL_URL> -e APIFW_SERVER_URL=<PROTECTED_APP_URL> \
161161
-e APIFW_REQUEST_VALIDATION=<REQUEST_VALIDATION_MODE> -e APIFW_RESPONSE_VALIDATION=<RESPONSE_VALIDATION_MODE> \
162-
-p 8088:8088 wallarm/api-firewall:v0.8.0
162+
-p 8088:8088 wallarm/api-firewall:v0.8.6
163163
```
164164
4. When the environment is started, test it and enable traffic on API Firewall following steps 6 and 7.

docs/installation-guides/graphql/docker-container.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ networks:
2929
services:
3030
api-firewall:
3131
container_name: api-firewall
32-
image: wallarm/api-firewall:v0.8.0
32+
image: wallarm/api-firewall:v0.8.6
3333
restart: on-failure
3434
volumes:
3535
- <HOST_PATH_TO_SPEC>:<CONTAINER_PATH_TO_SPEC>
@@ -200,6 +200,6 @@ To start API Firewall on Docker, you can also use regular Docker commands as in
200200
-e APIFW_GRAPHQL_MAX_QUERY_COMPLEXITY=<MAX_QUERY_COMPLEXITY> \
201201
-e APIFW_GRAPHQL_MAX_QUERY_DEPTH=<MAX_QUERY_DEPTH> -e APIFW_GRAPHQL_NODE_COUNT_LIMIT=<NODE_COUNT_LIMIT> \
202202
-e APIFW_GRAPHQL_INTROSPECTION=<ALLOW_INTROSPECTION_OR_NOT> \
203-
-p 8088:8088 wallarm/api-firewall:v0.8.0
203+
-p 8088:8088 wallarm/api-firewall:v0.8.6
204204
```
205205
4. When the environment is started, test it and enable traffic on API Firewall following steps 6 and 7.

0 commit comments

Comments
 (0)