Skip to content

Commit 2add07b

Browse files
committed
Merge branch 'main' of github.com:nginx/documentation
2 parents c43e934 + 24cfa28 commit 2add07b

File tree

16 files changed

+145
-143
lines changed

16 files changed

+145
-143
lines changed

.github/workflows/ossf_scorecard.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,6 @@ jobs:
5656

5757
# Upload the results to GitHub's code scanning dashboard.
5858
- name: Upload SARIF results to code scanning
59-
uses: github/codeql-action/upload-sarif@fca7ace96b7d713c7035871441bd52efbe39e27e # v3.28.19
59+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
6060
with:
6161
sarif_file: results.sarif

content/includes/ngf/installation/expose-nginx-gateway-fabric.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,4 +50,4 @@ There are two options for accessing NGINX Gateway Fabric depending on the type o
5050

5151
NGINX Gateway Fabric uses the created service to update the **Addresses** field in the **Gateway Status** resource. Using a **LoadBalancer** service sets this field to the IP address and/or hostname of that service. Without a service, the pod IP address is used.
5252

53-
This gateway is associated with the NGINX Gateway Fabric through the **gatewayClassName** field. The default installation of NGINX Gateway Fabric creates a **GatewayClass** with the name **nginx**. NGINX Gateway Fabric will only configure gateways with a **gatewayClassName** of **nginx** unless you change the name via the `--gatewayclass` [command-line flag]({{< ref "/ngf/reference/cli-help.md#static-mode">}}).
53+
This gateway is associated with the NGINX Gateway Fabric through the **gatewayClassName** field. The default installation of NGINX Gateway Fabric creates a **GatewayClass** with the name **nginx**. NGINX Gateway Fabric will only configure gateways with a **gatewayClassName** of **nginx** unless you change the name via the `--gatewayclass` [command-line flag]({{< ref "/ngf/reference/cli-help.md#controller">}}).

content/includes/ngf/installation/nginx-plus/docker-registry-secret.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
docs: "DOCS-000"
33
---
44

5-
{{< note >}} If you would rather pull the NGINX Plus image and push to a private registry, you can skip this specific step and instead follow [this step]({{< ref "/ngf/install/nginx-plus.md#pulling-an-image-for-local-use" >}}). {{< /note >}}
5+
{{< note >}} If you would rather pull the NGINX Plus image and push to a private registry, you can skip this specific step and instead follow [this step]({{< ref "/ngf/install/nginx-plus.md#pull-an-image-for-local-use" >}}). {{< /note >}}
66

77
If the `nginx-gateway` namespace does not yet exist, create it:
88

content/ngf/overview/gateway-api-compatibility.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ For a description of each field, visit the [Gateway API documentation](https://g
5757

5858
{{< /bootstrap-table >}}
5959

60-
NGINX Gateway Fabric supports a single GatewayClass resource configured with the `--gatewayclass` flag of the [static-mode]({{< ref "/ngf/reference/cli-help.md#static-mode">}}) command.
60+
NGINX Gateway Fabric supports a single GatewayClass resource configured with the `--gatewayclass` flag of the [controller]({{< ref "/ngf/reference/cli-help.md#controller">}}) command.
6161

6262
**Fields**:
6363

@@ -87,7 +87,7 @@ NGINX Gateway Fabric supports a single GatewayClass resource configured with the
8787

8888
NGINX Gateway Fabric supports multiple Gateway resources. The Gateway resources must reference NGINX Gateway Fabric's corresponding GatewayClass.
8989

90-
See the [static-mode]({{< ref "/ngf/reference/cli-help.md#static-mode">}}) command for more information.
90+
See the [controller]({{< ref "/ngf/reference/cli-help.md#controller">}}) command for more information.
9191

9292
**Fields**:
9393

content/ngf/traffic-management/basic-routing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ In a production environment, you should have a DNS record for the external IP ad
148148

149149
{{< /note >}}
150150

151-
This Gateway is associated with NGINX Gateway Fabric through the **gatewayClassName** field. The default installation of NGINX Gateway Fabric creates a GatewayClass with the name **nginx**. NGINX Gateway Fabric will only configure Gateways with a **gatewayClassName** of **nginx** unless you change the name via the `--gatewayclass` [command-line flag]({{< ref "/ngf/reference/cli-help.md#static-mode" >}}).
151+
This Gateway is associated with NGINX Gateway Fabric through the **gatewayClassName** field. The default installation of NGINX Gateway Fabric creates a GatewayClass with the name **nginx**. NGINX Gateway Fabric will only configure Gateways with a **gatewayClassName** of **nginx** unless you change the name via the `--gatewayclass` [command-line flag]({{< ref "/ngf/reference/cli-help.md#controller" >}}).
152152

153153
We specify a [listener](https://gateway-api.sigs.k8s.io/references/spec/#gateway.networking.k8s.io/v1.Listener) on the Gateway to open an entry point on the cluster. In this case, since the coffee application accepts HTTP requests, we create an HTTP listener, named **http**, that listens on port 80.
154154

content/nginx/admin-guide/load-balancer/http-load-balancer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -427,7 +427,7 @@ http {
427427
listen 443 ssl;
428428
ssl_certificate /etc/nginx/ssl/company.com.crt;
429429
ssl_certificate_key /etc/nginx/ssl/company.com.key;
430-
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
430+
ssl_protocols TLSv1.2 TLSv1.3;
431431
432432
location / {
433433
proxy_pass https://exchange;

content/nginx/admin-guide/mail-proxy/mail-proxy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ To enable SSL/TLS for the mail proxy:
166166
```nginx
167167
mail {
168168
#...
169-
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
169+
ssl_protocols TLSv1.2 TLSv1.3;
170170
ssl_ciphers HIGH:!aNULL:!MD5;
171171
}
172172
```
@@ -223,7 +223,7 @@ mail {
223223
ssl on;
224224
ssl_certificate /etc/ssl/certs/server.crt;
225225
ssl_certificate_key /etc/ssl/certs/server.key;
226-
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
226+
ssl_protocols TLSv1.2 TLSv1.3;
227227
ssl_ciphers HIGH:!aNULL:!MD5;
228228
ssl_session_cache shared:SSL:10m;
229229
ssl_session_timeout 10m;

content/nginx/admin-guide/security-controls/securing-http-traffic-upstream.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Optionally, you can specify which SSL protocols and ciphers are used:
7777
```nginx
7878
location /upstream {
7979
#...
80-
proxy_ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
80+
proxy_ssl_protocols TLSv1.2 TLSv1.3;
8181
proxy_ssl_ciphers HIGH:!aNULL:!MD5;
8282
}
8383
```
@@ -133,7 +133,7 @@ http {
133133
proxy_pass https://backend.example.com;
134134
proxy_ssl_certificate /etc/nginx/client.pem;
135135
proxy_ssl_certificate_key /etc/nginx/client.key;
136-
proxy_ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
136+
proxy_ssl_protocols TLSv1.2 TLSv1.3;
137137
proxy_ssl_ciphers HIGH:!aNULL:!MD5;
138138
proxy_ssl_trusted_certificate /etc/nginx/trusted_ca_cert.crt;
139139

content/nginx/admin-guide/security-controls/securing-tcp-traffic-upstream.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Optionally, specify which SSL protocols and ciphers to use:
5858
```nginx
5959
server {
6060
...
61-
proxy_ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
61+
proxy_ssl_protocols TLSv1.2 TLSv1.3;
6262
proxy_ssl_ciphers HIGH:!aNULL:!MD5;
6363
}
6464
```
@@ -98,7 +98,7 @@ stream {
9898
9999
proxy_ssl_certificate /etc/ssl/certs/backend.crt;
100100
proxy_ssl_certificate_key /etc/ssl/certs/backend.key;
101-
proxy_ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
101+
proxy_ssl_protocols TLSv1.2 TLSv1.3;
102102
proxy_ssl_ciphers HIGH:!aNULL:!MD5;
103103
proxy_ssl_trusted_certificate /etc/ssl/certs/trusted_ca_cert.crt;
104104

0 commit comments

Comments
 (0)