You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/graphql-validation-policies.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ The policy for path=`/__*` is the [introspection](https://graphql.org/learn/intr
53
53
```xml
54
54
<validate-graphql-requesterror-variable-name="variable name"max-size="size in bytes"max-depth="query depth">
55
55
<authorize>
56
-
<rulepath="query path, for example: '/Query/listUsers' or '/__*'"action="string or policy expression that evaluates to 'allow|remove|reject|ignore'" />
56
+
<rulepath="query path, for example: '/listUsers' or '/__*'"action="string or policy expression that evaluates to 'allow|remove|reject|ignore'" />
57
57
</authorize>
58
58
</validate-graphql-request>
59
59
```
@@ -63,13 +63,13 @@ The policy for path=`/__*` is the [introspection](https://graphql.org/learn/intr
63
63
This example applies the following validation and authorization rules to a GraphQL query:
64
64
* Requests larger than 100 kb or with query depth greater than 4 are rejected.
65
65
* Requests to the introspection system are rejected.
66
-
* The `/ship/missions/name` field is removed from requests containing more than two headers.
66
+
* The `/Missions/name` field is removed from requests containing more than two headers.
@@ -103,7 +103,7 @@ This example applies the following validation and authorization rules to a Graph
103
103
|`error-variable-name`| Name of the variable in `context.Variables` to log validation errors to. | No | N/A |
104
104
|`max-size`| Maximum size of the request payload in bytes. Maximum allowed value: 102,400 bytes (100 KB). (Contact [support](https://azure.microsoft.com/support/options/) if you need to increase this limit.) | Yes | N/A |
105
105
|`max-depth`| An integer. Maximum query depth. | No | 6 |
106
-
|`path`| Path to execute authorization validation on. | Yes | N/A |
106
+
|`path`| Path to execute authorization validation on. It must follow the pattern: `/type/field`. | Yes | N/A |
107
107
|`action`|[Action](#request-actions) to perform if the rule applies. May be specified conditionally using a policy expression. | No | allow |
0 commit comments