Skip to content

Commit f27fa31

Browse files
committed
Merge remote-tracking branch 'origin' into internal/nim-release-2.20.0
2 parents 11ed4be + 40af4bd commit f27fa31

File tree

13 files changed

+95
-97
lines changed

13 files changed

+95
-97
lines changed

content/includes/ngf/installation/expose-nginx-gateway-fabric.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,4 +50,4 @@ There are two options for accessing NGINX Gateway Fabric depending on the type o
5050

5151
NGINX Gateway Fabric uses the created service to update the **Addresses** field in the **Gateway Status** resource. Using a **LoadBalancer** service sets this field to the IP address and/or hostname of that service. Without a service, the pod IP address is used.
5252

53-
This gateway is associated with the NGINX Gateway Fabric through the **gatewayClassName** field. The default installation of NGINX Gateway Fabric creates a **GatewayClass** with the name **nginx**. NGINX Gateway Fabric will only configure gateways with a **gatewayClassName** of **nginx** unless you change the name via the `--gatewayclass` [command-line flag]({{< ref "/ngf/reference/cli-help.md#static-mode">}}).
53+
This gateway is associated with the NGINX Gateway Fabric through the **gatewayClassName** field. The default installation of NGINX Gateway Fabric creates a **GatewayClass** with the name **nginx**. NGINX Gateway Fabric will only configure gateways with a **gatewayClassName** of **nginx** unless you change the name via the `--gatewayclass` [command-line flag]({{< ref "/ngf/reference/cli-help.md#controller">}}).

content/ngf/overview/gateway-api-compatibility.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ For a description of each field, visit the [Gateway API documentation](https://g
5757

5858
{{< /bootstrap-table >}}
5959

60-
NGINX Gateway Fabric supports a single GatewayClass resource configured with the `--gatewayclass` flag of the [static-mode]({{< ref "/ngf/reference/cli-help.md#static-mode">}}) command.
60+
NGINX Gateway Fabric supports a single GatewayClass resource configured with the `--gatewayclass` flag of the [controller]({{< ref "/ngf/reference/cli-help.md#controller">}}) command.
6161

6262
**Fields**:
6363

@@ -87,7 +87,7 @@ NGINX Gateway Fabric supports a single GatewayClass resource configured with the
8787

8888
NGINX Gateway Fabric supports multiple Gateway resources. The Gateway resources must reference NGINX Gateway Fabric's corresponding GatewayClass.
8989

90-
See the [static-mode]({{< ref "/ngf/reference/cli-help.md#static-mode">}}) command for more information.
90+
See the [controller]({{< ref "/ngf/reference/cli-help.md#controller">}}) command for more information.
9191

9292
**Fields**:
9393

content/ngf/traffic-management/basic-routing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ In a production environment, you should have a DNS record for the external IP ad
148148

149149
{{< /note >}}
150150

151-
This Gateway is associated with NGINX Gateway Fabric through the **gatewayClassName** field. The default installation of NGINX Gateway Fabric creates a GatewayClass with the name **nginx**. NGINX Gateway Fabric will only configure Gateways with a **gatewayClassName** of **nginx** unless you change the name via the `--gatewayclass` [command-line flag]({{< ref "/ngf/reference/cli-help.md#static-mode" >}}).
151+
This Gateway is associated with NGINX Gateway Fabric through the **gatewayClassName** field. The default installation of NGINX Gateway Fabric creates a GatewayClass with the name **nginx**. NGINX Gateway Fabric will only configure Gateways with a **gatewayClassName** of **nginx** unless you change the name via the `--gatewayclass` [command-line flag]({{< ref "/ngf/reference/cli-help.md#controller" >}}).
152152

153153
We specify a [listener](https://gateway-api.sigs.k8s.io/references/spec/#gateway.networking.k8s.io/v1.Listener) on the Gateway to open an entry point on the cluster. In this case, since the coffee application accepts HTTP requests, we create an HTTP listener, named **http**, that listens on port 80.
154154

content/nginx/admin-guide/load-balancer/http-load-balancer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -427,7 +427,7 @@ http {
427427
listen 443 ssl;
428428
ssl_certificate /etc/nginx/ssl/company.com.crt;
429429
ssl_certificate_key /etc/nginx/ssl/company.com.key;
430-
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
430+
ssl_protocols TLSv1.2 TLSv1.3;
431431
432432
location / {
433433
proxy_pass https://exchange;

content/nginx/admin-guide/mail-proxy/mail-proxy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ To enable SSL/TLS for the mail proxy:
166166
```nginx
167167
mail {
168168
#...
169-
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
169+
ssl_protocols TLSv1.2 TLSv1.3;
170170
ssl_ciphers HIGH:!aNULL:!MD5;
171171
}
172172
```
@@ -223,7 +223,7 @@ mail {
223223
ssl on;
224224
ssl_certificate /etc/ssl/certs/server.crt;
225225
ssl_certificate_key /etc/ssl/certs/server.key;
226-
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
226+
ssl_protocols TLSv1.2 TLSv1.3;
227227
ssl_ciphers HIGH:!aNULL:!MD5;
228228
ssl_session_cache shared:SSL:10m;
229229
ssl_session_timeout 10m;

content/nginx/admin-guide/security-controls/securing-http-traffic-upstream.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Optionally, you can specify which SSL protocols and ciphers are used:
7777
```nginx
7878
location /upstream {
7979
#...
80-
proxy_ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
80+
proxy_ssl_protocols TLSv1.2 TLSv1.3;
8181
proxy_ssl_ciphers HIGH:!aNULL:!MD5;
8282
}
8383
```
@@ -133,7 +133,7 @@ http {
133133
proxy_pass https://backend.example.com;
134134
proxy_ssl_certificate /etc/nginx/client.pem;
135135
proxy_ssl_certificate_key /etc/nginx/client.key;
136-
proxy_ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
136+
proxy_ssl_protocols TLSv1.2 TLSv1.3;
137137
proxy_ssl_ciphers HIGH:!aNULL:!MD5;
138138
proxy_ssl_trusted_certificate /etc/nginx/trusted_ca_cert.crt;
139139

content/nginx/admin-guide/security-controls/securing-tcp-traffic-upstream.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Optionally, specify which SSL protocols and ciphers to use:
5858
```nginx
5959
server {
6060
...
61-
proxy_ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
61+
proxy_ssl_protocols TLSv1.2 TLSv1.3;
6262
proxy_ssl_ciphers HIGH:!aNULL:!MD5;
6363
}
6464
```
@@ -98,7 +98,7 @@ stream {
9898
9999
proxy_ssl_certificate /etc/ssl/certs/backend.crt;
100100
proxy_ssl_certificate_key /etc/ssl/certs/backend.key;
101-
proxy_ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
101+
proxy_ssl_protocols TLSv1.2 TLSv1.3;
102102
proxy_ssl_ciphers HIGH:!aNULL:!MD5;
103103
proxy_ssl_trusted_certificate /etc/ssl/certs/trusted_ca_cert.crt;
104104

content/nginx/admin-guide/security-controls/terminating-ssl-http.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ server {
2222
server_name www.example.com;
2323
ssl_certificate www.example.com.crt;
2424
ssl_certificate_key www.example.com.key;
25-
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
25+
ssl_protocols TLSv1.2 TLSv1.3;
2626
ssl_ciphers HIGH:!aNULL:!MD5;
2727
#...
2828
}
@@ -39,10 +39,10 @@ In this case it is important to restrict access to the file. Note that although
3939

4040
The [ssl_protocols](https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_protocols) and [ssl_ciphers](https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_ciphers ) directives can be used to require that clients use only the strong versions and ciphers of SSL/TLS when establishing connections.
4141

42-
Since version 1.9.1, NGINX uses these defaults:
42+
Since version 1.23.4, NGINX uses these defaults:
4343

4444
```nginx
45-
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
45+
ssl_protocols TLSv1.2 TLSv1.3;
4646
ssl_ciphers HIGH:!aNULL:!MD5;
4747
```
4848

@@ -118,7 +118,7 @@ http {
118118
119119
ssl_certificate www.example.com.crt;
120120
ssl_certificate_key www.example.com.key;
121-
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
121+
ssl_protocols TLSv1.2 TLSv1.3;
122122
ssl_ciphers HIGH:!aNULL:!MD5;
123123
#...
124124
}

content/nginx/admin-guide/security-controls/terminating-ssl-tcp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Additionally, the [ssl_protocols](https://nginx.org/en/docs/stream/ngx_stream_ss
6262
```nginx
6363
server {
6464
#...
65-
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
65+
ssl_protocols TLSv1.2 TLSv1.3;
6666
ssl_ciphers HIGH:!aNULL:!MD5;
6767
}
6868
```
@@ -152,7 +152,7 @@ stream {
152152
153153
ssl_certificate /etc/ssl/certs/server.crt;
154154
ssl_certificate_key /etc/ssl/certs/server.key;
155-
ssl_protocols SSLv3 TLSv1 TLSv1.1 TLSv1.2;
155+
ssl_protocols TLSv1.2 TLSv1.3;
156156
ssl_ciphers HIGH:!aNULL:!MD5;
157157
ssl_session_cache shared:SSL:20m;
158158
ssl_session_timeout 4h;

0 commit comments

Comments
 (0)