Skip to content

Commit 169c88e

Browse files
TechWrite48mjang
andauthored
Update resource-validation.md (#507)
* Update resource-validation.md Readability checked on Datayze.com, returned a Flesch-Kincaid Score of 7.87. Text was edited for "Rare Words" and sentence length to bring reported score to 7.82. * Update content/ngf/overview/resource-validation.md Co-authored-by: Mike Jang <[email protected]> --------- Co-authored-by: Mike Jang <[email protected]>
1 parent 43331c2 commit 169c88e

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

content/ngf/overview/resource-validation.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,8 @@ More information on CEL in Kubernetes can be found [here](https://kubernetes.io/
6262
This step catches the following cases of invalid values:
6363

6464
- Valid values from the Gateway API perspective but not supported by NGINX Gateway Fabric yet. For example, a feature in an HTTPRoute routing rule. For the list of supported features see [Gateway API Compatibility]({{< relref "./gateway-api-compatibility.md" >}}) doc.
65-
- Valid values from the Gateway API perspective, but invalid for NGINX, because NGINX has stricter validation requirements for certain fields. These values will cause NGINX to fail to reload or operate erroneously.
66-
- Invalid values (both from the Gateway API and NGINX perspectives) that were not rejected because Step 1 was bypassed. Similar to the previous case, these values will cause NGINX to fail to reload or operate erroneously.
65+
- Valid values from the Gateway API perspective, but invalid for NGINX. NGINX has stricter validation requirements for certain fields. These values will cause NGINX to fail to reload or operate erroneously.
66+
- Invalid values (both from the Gateway API and NGINX perspectives) that were not rejected because Step 1 was bypassed. These values will cause NGINX to fail to reload or operate incorrectly.
6767
- Malicious values that inject unrestricted NGINX config into the NGINX configuration (similar to an SQL injection attack).
6868

6969
Below is an example of how NGINX Gateway Fabric rejects an invalid resource. The validation error is reported via the status:

0 commit comments

Comments
 (0)