Merge pull request #7732 from terry-xiaoyu/rule_bridges_api_docs2
emqx_schema i18n docs
This commit is contained in:
commit
b4b9853cfc
File diff suppressed because it is too large
Load Diff
|
@ -102,11 +102,6 @@
|
|||
|
||||
-elvis([{elvis_style, god_modules, disable}]).
|
||||
|
||||
-define(IDLE_TIMOUT_DESC,
|
||||
"Close transport-layer connections from the clients that have not sent MQTT CONNECT\n"
|
||||
"message within this interval."
|
||||
).
|
||||
|
||||
namespace() -> undefined.
|
||||
|
||||
roots() ->
|
||||
|
@ -295,11 +290,7 @@ fields("authorization") ->
|
|||
default => allow,
|
||||
required => true,
|
||||
%% TODO: make sources a reference link
|
||||
desc =>
|
||||
"Default access control action if the user or client matches no ACL rules,\n"
|
||||
"or if no such user or client is found by the configurable authorization\n"
|
||||
"sources such as built_in_database, an HTTP API, or a query against PostgreSQL.\n"
|
||||
"Find more details in 'authorization.sources' config."
|
||||
desc => ?DESC(fields_authorization_no_match)
|
||||
}
|
||||
)},
|
||||
{"deny_action",
|
||||
|
@ -308,7 +299,7 @@ fields("authorization") ->
|
|||
#{
|
||||
default => ignore,
|
||||
required => true,
|
||||
desc => "The action when the authorization check rejects an operation."
|
||||
desc => ?DESC(fields_authorization_deny_action)
|
||||
}
|
||||
)},
|
||||
{"cache",
|
||||
|
@ -324,7 +315,7 @@ fields("cache") ->
|
|||
boolean(),
|
||||
#{
|
||||
default => true,
|
||||
desc => "Enable or disable the authorization cache."
|
||||
desc => ?DESC(fields_cache_enable)
|
||||
}
|
||||
)},
|
||||
{"max_size",
|
||||
|
@ -332,7 +323,7 @@ fields("cache") ->
|
|||
range(1, 1048576),
|
||||
#{
|
||||
default => 32,
|
||||
desc => "Maximum number of cached items."
|
||||
desc => ?DESC(fields_cache_max_size)
|
||||
}
|
||||
)},
|
||||
{"ttl",
|
||||
|
@ -340,7 +331,7 @@ fields("cache") ->
|
|||
duration(),
|
||||
#{
|
||||
default => "1m",
|
||||
desc => "Time to live for the cached data."
|
||||
desc => ?DESC(fields_cache_ttl)
|
||||
}
|
||||
)}
|
||||
];
|
||||
|
@ -581,7 +572,7 @@ fields("rate_limit") ->
|
|||
hoconsc:union([infinity, integer()]),
|
||||
#{
|
||||
default => 1000,
|
||||
desc => "Maximum connections per second."
|
||||
desc => ?DESC(fields_rate_limit_max_conn_rate)
|
||||
}
|
||||
)},
|
||||
{"conn_messages_in",
|
||||
|
@ -589,7 +580,7 @@ fields("rate_limit") ->
|
|||
hoconsc:union([infinity, comma_separated_list()]),
|
||||
#{
|
||||
default => infinity,
|
||||
desc => "Message limit for the external MQTT connections."
|
||||
desc => ?DESC(fields_rate_limit_conn_messages_in)
|
||||
}
|
||||
)},
|
||||
{"conn_bytes_in",
|
||||
|
@ -597,9 +588,7 @@ fields("rate_limit") ->
|
|||
hoconsc:union([infinity, comma_separated_list()]),
|
||||
#{
|
||||
default => infinity,
|
||||
desc =>
|
||||
"Limit the rate of receiving packets for a MQTT connection.\n"
|
||||
"The rate is counted by bytes of packets per second."
|
||||
desc => ?DESC(fields_rate_limit_conn_bytes_in)
|
||||
}
|
||||
)}
|
||||
];
|
||||
|
@ -758,7 +747,7 @@ fields("listeners") ->
|
|||
sc(
|
||||
map(name, ref("mqtt_tcp_listener")),
|
||||
#{
|
||||
desc => "TCP listeners",
|
||||
desc => ?DESC(fields_listeners_tcp),
|
||||
required => {false, recursively}
|
||||
}
|
||||
)},
|
||||
|
@ -766,7 +755,7 @@ fields("listeners") ->
|
|||
sc(
|
||||
map(name, ref("mqtt_ssl_listener")),
|
||||
#{
|
||||
desc => "SSL listeners",
|
||||
desc => ?DESC(fields_listeners_ssl),
|
||||
required => {false, recursively}
|
||||
}
|
||||
)},
|
||||
|
@ -774,7 +763,7 @@ fields("listeners") ->
|
|||
sc(
|
||||
map(name, ref("mqtt_ws_listener")),
|
||||
#{
|
||||
desc => "HTTP websocket listeners",
|
||||
desc => ?DESC(fields_listeners_ws),
|
||||
required => {false, recursively}
|
||||
}
|
||||
)},
|
||||
|
@ -782,7 +771,7 @@ fields("listeners") ->
|
|||
sc(
|
||||
map(name, ref("mqtt_wss_listener")),
|
||||
#{
|
||||
desc => "HTTPS websocket listeners",
|
||||
desc => ?DESC(fields_listeners_wss),
|
||||
required => {false, recursively}
|
||||
}
|
||||
)},
|
||||
|
@ -790,7 +779,7 @@ fields("listeners") ->
|
|||
sc(
|
||||
map(name, ref("mqtt_quic_listener")),
|
||||
#{
|
||||
desc => "QUIC listeners",
|
||||
desc => ?DESC(fields_listeners_quic),
|
||||
required => {false, recursively}
|
||||
}
|
||||
)}
|
||||
|
@ -852,24 +841,30 @@ fields("mqtt_quic_listener") ->
|
|||
{"enabled",
|
||||
sc(
|
||||
boolean(),
|
||||
#{default => true, desc => "Enable QUIC listener."}
|
||||
#{
|
||||
default => true,
|
||||
desc => ?DESC(fields_mqtt_quic_listener_enabled)
|
||||
}
|
||||
)},
|
||||
%% TODO: ensure cacertfile is configurable
|
||||
{"certfile",
|
||||
sc(
|
||||
string(),
|
||||
#{desc => "Path to the certificate file."}
|
||||
#{desc => ?DESC(fields_mqtt_quic_listener_certfile)}
|
||||
)},
|
||||
{"keyfile",
|
||||
sc(
|
||||
string(),
|
||||
#{desc => "Path to the secret key file."}
|
||||
#{desc => ?DESC(fields_mqtt_quic_listener_keyfile)}
|
||||
)},
|
||||
{"ciphers", ciphers_schema(quic)},
|
||||
{"idle_timeout",
|
||||
sc(
|
||||
duration(),
|
||||
#{default => "15s", desc => ?IDLE_TIMOUT_DESC}
|
||||
#{
|
||||
default => "15s",
|
||||
desc => ?DESC(fields_mqtt_quic_listener_idle_timeout)
|
||||
}
|
||||
)}
|
||||
] ++ base_listener();
|
||||
fields("ws_opts") ->
|
||||
|
@ -879,9 +874,7 @@ fields("ws_opts") ->
|
|||
string(),
|
||||
#{
|
||||
default => "/mqtt",
|
||||
desc =>
|
||||
"WebSocket's MQTT protocol path. So the address of\n"
|
||||
" EMQX Broker's WebSocket is: <code>ws://{ip}:{port}/mqtt</code>"
|
||||
desc => ?DESC(fields_ws_opts_mqtt_path)
|
||||
}
|
||||
)},
|
||||
{"mqtt_piggyback",
|
||||
|
@ -889,8 +882,7 @@ fields("ws_opts") ->
|
|||
hoconsc:enum([single, multiple]),
|
||||
#{
|
||||
default => multiple,
|
||||
desc =>
|
||||
"Whether a WebSocket message is allowed to contain multiple MQTT packets."
|
||||
desc => ?DESC(fields_ws_opts_mqtt_piggyback)
|
||||
}
|
||||
)},
|
||||
{"compress",
|
||||
|
@ -898,10 +890,7 @@ fields("ws_opts") ->
|
|||
boolean(),
|
||||
#{
|
||||
default => false,
|
||||
desc =>
|
||||
"If <code>true</code>, compress WebSocket messages using <code>zlib</code>.<br/>\n"
|
||||
"The configuration items under <code>deflate_opts</code> "
|
||||
"belong to the compression-related parameter configuration."
|
||||
desc => ?DESC(fields_ws_opts_compress)
|
||||
}
|
||||
)},
|
||||
{"idle_timeout",
|
||||
|
@ -909,7 +898,7 @@ fields("ws_opts") ->
|
|||
duration(),
|
||||
#{
|
||||
default => "15s",
|
||||
desc => ?IDLE_TIMOUT_DESC
|
||||
desc => ?DESC(fields_mqtt_quic_listener_idle_timeout)
|
||||
}
|
||||
)},
|
||||
{"max_frame_size",
|
||||
|
@ -917,7 +906,7 @@ fields("ws_opts") ->
|
|||
hoconsc:union([infinity, integer()]),
|
||||
#{
|
||||
default => infinity,
|
||||
desc => "The maximum length of a single MQTT packet."
|
||||
desc => ?DESC(fields_ws_opts_max_frame_size)
|
||||
}
|
||||
)},
|
||||
{"fail_if_no_subprotocol",
|
||||
|
@ -925,10 +914,7 @@ fields("ws_opts") ->
|
|||
boolean(),
|
||||
#{
|
||||
default => true,
|
||||
desc =>
|
||||
"If <code>true</code>, the server will return an error when\n"
|
||||
" the client does not carry the <code>Sec-WebSocket-Protocol</code> field.\n"
|
||||
" <br/>Note: WeChat applet needs to disable this verification."
|
||||
desc => ?DESC(fields_ws_opts_fail_if_no_subprotocol)
|
||||
}
|
||||
)},
|
||||
{"supported_subprotocols",
|
||||
|
@ -936,7 +922,7 @@ fields("ws_opts") ->
|
|||
comma_separated_list(),
|
||||
#{
|
||||
default => "mqtt, mqtt-v3, mqtt-v3.1.1, mqtt-v5",
|
||||
desc => "Comma-separated list of supported subprotocols."
|
||||
desc => ?DESC(fields_ws_opts_supported_subprotocols)
|
||||
}
|
||||
)},
|
||||
{"check_origin_enable",
|
||||
|
@ -944,10 +930,7 @@ fields("ws_opts") ->
|
|||
boolean(),
|
||||
#{
|
||||
default => false,
|
||||
desc =>
|
||||
"If <code>true</code>, <code>origin</code> HTTP header will be\n"
|
||||
" validated against the list of allowed origins configured in <code>check_origins</code>\n"
|
||||
" parameter."
|
||||
desc => ?DESC(fields_ws_opts_check_origin_enable)
|
||||
}
|
||||
)},
|
||||
{"allow_origin_absence",
|
||||
|
@ -955,10 +938,7 @@ fields("ws_opts") ->
|
|||
boolean(),
|
||||
#{
|
||||
default => true,
|
||||
desc =>
|
||||
"If <code>false</code> and <code>check_origin_enable</code> is\n"
|
||||
" <code>true</code>, the server will reject requests that don't have <code>origin</code>\n"
|
||||
" HTTP header."
|
||||
desc => ?DESC(fields_ws_opts_allow_origin_absence)
|
||||
}
|
||||
)},
|
||||
{"check_origins",
|
||||
|
@ -966,7 +946,7 @@ fields("ws_opts") ->
|
|||
hoconsc:array(binary()),
|
||||
#{
|
||||
default => [],
|
||||
desc => "List of allowed origins.<br/>See <code>check_origin_enable</code>."
|
||||
desc => ?DESC(fields_ws_opts_check_origins)
|
||||
}
|
||||
)},
|
||||
{"proxy_address_header",
|
||||
|
@ -974,9 +954,7 @@ fields("ws_opts") ->
|
|||
string(),
|
||||
#{
|
||||
default => "x-forwarded-for",
|
||||
desc =>
|
||||
"HTTP header used to pass information about the client IP address.\n"
|
||||
" Relevant when the EMQX cluster is deployed behind a load-balancer."
|
||||
desc => ?DESC(fields_ws_opts_proxy_address_header)
|
||||
}
|
||||
)},
|
||||
{"proxy_port_header",
|
||||
|
@ -984,9 +962,7 @@ fields("ws_opts") ->
|
|||
string(),
|
||||
#{
|
||||
default => "x-forwarded-port",
|
||||
desc =>
|
||||
"HTTP header used to pass information about the client port.\n"
|
||||
" Relevant when the EMQX cluster is deployed behind a load-balancer."
|
||||
desc => ?DESC(fields_ws_opts_proxy_port_header)
|
||||
}
|
||||
)},
|
||||
{"deflate_opts",
|
||||
|
@ -1002,9 +978,7 @@ fields("tcp_opts") ->
|
|||
integer(),
|
||||
#{
|
||||
default => 100,
|
||||
desc =>
|
||||
"Specify the {active, N} option for this Socket.<br/>\n"
|
||||
" See: https://erlang.org/doc/man/inet.html#setopts-2"
|
||||
desc => ?DESC(fields_tcp_opts_active_n)
|
||||
}
|
||||
)},
|
||||
{"backlog",
|
||||
|
@ -1012,9 +986,7 @@ fields("tcp_opts") ->
|
|||
integer(),
|
||||
#{
|
||||
default => 1024,
|
||||
desc =>
|
||||
"TCP backlog defines the maximum length that the queue of\n"
|
||||
" pending connections can grow to."
|
||||
desc => ?DESC(fields_tcp_opts_backlog)
|
||||
}
|
||||
)},
|
||||
{"send_timeout",
|
||||
|
@ -1022,7 +994,7 @@ fields("tcp_opts") ->
|
|||
duration(),
|
||||
#{
|
||||
default => "15s",
|
||||
desc => "The TCP send timeout for the connections."
|
||||
desc => ?DESC(fields_tcp_opts_send_timeout)
|
||||
}
|
||||
)},
|
||||
{"send_timeout_close",
|
||||
|
@ -1030,32 +1002,30 @@ fields("tcp_opts") ->
|
|||
boolean(),
|
||||
#{
|
||||
default => true,
|
||||
desc => "Close the connection if send timeout."
|
||||
desc => ?DESC(fields_tcp_opts_send_timeout_close)
|
||||
}
|
||||
)},
|
||||
{"recbuf",
|
||||
sc(
|
||||
bytesize(),
|
||||
#{desc => "The TCP receive buffer (OS kernel) for the connections."}
|
||||
#{desc => ?DESC(fields_tcp_opts_recbuf)}
|
||||
)},
|
||||
{"sndbuf",
|
||||
sc(
|
||||
bytesize(),
|
||||
#{desc => "The TCP send buffer (OS kernel) for the connections."}
|
||||
#{desc => ?DESC(fields_tcp_opts_sndbuf)}
|
||||
)},
|
||||
{"buffer",
|
||||
sc(
|
||||
bytesize(),
|
||||
#{desc => "The size of the user-space buffer used by the driver."}
|
||||
#{desc => ?DESC(fields_tcp_opts_buffer)}
|
||||
)},
|
||||
{"high_watermark",
|
||||
sc(
|
||||
bytesize(),
|
||||
#{
|
||||
default => "1MB",
|
||||
desc =>
|
||||
"The socket is set to a busy state when the amount of data queued internally\n"
|
||||
" by the VM socket implementation reaches this limit."
|
||||
desc => ?DESC(fields_tcp_opts_high_watermark)
|
||||
}
|
||||
)},
|
||||
{"nodelay",
|
||||
|
@ -1063,7 +1033,7 @@ fields("tcp_opts") ->
|
|||
boolean(),
|
||||
#{
|
||||
default => false,
|
||||
desc => "The TCP_NODELAY flag for the connections."
|
||||
desc => ?DESC(fields_tcp_opts_nodelay)
|
||||
}
|
||||
)},
|
||||
{"reuseaddr",
|
||||
|
@ -1071,7 +1041,7 @@ fields("tcp_opts") ->
|
|||
boolean(),
|
||||
#{
|
||||
default => true,
|
||||
desc => "The SO_REUSEADDR flag for the connections."
|
||||
desc => ?DESC(fields_tcp_opts_reuseaddr)
|
||||
}
|
||||
)}
|
||||
];
|
||||
|
@ -1095,62 +1065,56 @@ fields("listener_wss_opts") ->
|
|||
},
|
||||
true
|
||||
);
|
||||
fields(ssl_client_opts) ->
|
||||
fields("ssl_client_opts") ->
|
||||
client_ssl_opts_schema(#{});
|
||||
fields("deflate_opts") ->
|
||||
[
|
||||
{"level",
|
||||
sc(
|
||||
hoconsc:enum([none, default, best_compression, best_speed]),
|
||||
#{desc => "Compression level."}
|
||||
#{desc => ?DESC(fields_deflate_opts_level)}
|
||||
)},
|
||||
{"mem_level",
|
||||
sc(
|
||||
range(1, 9),
|
||||
#{
|
||||
default => 8,
|
||||
desc =>
|
||||
"Specifies the size of the compression state.<br/>\n"
|
||||
" Lower values decrease memory usage per connection."
|
||||
desc => ?DESC(fields_deflate_opts_mem_level)
|
||||
}
|
||||
)},
|
||||
{"strategy",
|
||||
sc(
|
||||
hoconsc:enum([default, filtered, huffman_only, rle]),
|
||||
#{desc => "Specifies the compression strategy."}
|
||||
#{desc => ?DESC(fields_deflate_opts_strategy)}
|
||||
)},
|
||||
{"server_context_takeover",
|
||||
sc(
|
||||
hoconsc:enum([takeover, no_takeover]),
|
||||
#{
|
||||
desc =>
|
||||
"Takeover means the compression state is retained\n"
|
||||
" between server messages."
|
||||
desc => ?DESC(fields_deflate_opts_server_context_takeover)
|
||||
}
|
||||
)},
|
||||
{"client_context_takeover",
|
||||
sc(
|
||||
hoconsc:enum([takeover, no_takeover]),
|
||||
#{
|
||||
desc =>
|
||||
"Takeover means the compression state is retained\n"
|
||||
" between client messages."
|
||||
desc => ?DESC(fields_deflate_opts_client_context_takeover)
|
||||
}
|
||||
)},
|
||||
{"server_max_window_bits",
|
||||
sc(
|
||||
range(8, 15),
|
||||
#{
|
||||
default => 15,
|
||||
desc => "Specifies the size of the compression context for the server."
|
||||
desc => ?DESC(fields_deflate_opts_server_max_window_bits),
|
||||
default => 15
|
||||
}
|
||||
)},
|
||||
{"client_max_window_bits",
|
||||
sc(
|
||||
range(8, 15),
|
||||
#{
|
||||
default => 15,
|
||||
desc => "Specifies the size of the compression context for the client."
|
||||
desc => ?DESC(fields_deflate_opts_client_max_window_bits),
|
||||
default => 15
|
||||
}
|
||||
)}
|
||||
];
|
||||
|
@ -1526,13 +1490,7 @@ fields("trace") ->
|
|||
{"payload_encode",
|
||||
sc(hoconsc:enum([hex, text, hidden]), #{
|
||||
default => text,
|
||||
desc =>
|
||||
"Determine the format of the payload format in the trace file.<br>\n"
|
||||
"`text`: Text-based protocol or plain text protocol.\n"
|
||||
" It is recommended when payload is JSON encoded.<br>\n"
|
||||
"`hex`: Binary hexadecimal encode. It is recommended when payload is "
|
||||
"a custom binary protocol.<br>\n"
|
||||
"`hidden`: payload is obfuscated as `******`\n"
|
||||
desc => ?DESC(fields_trace_payload_encode)
|
||||
})}
|
||||
].
|
||||
|
||||
|
@ -1543,9 +1501,7 @@ mqtt_listener() ->
|
|||
sc(
|
||||
hoconsc:array(string()),
|
||||
#{
|
||||
desc =>
|
||||
"The access control rules for this listener.<br/>"
|
||||
"See: https://github.com/emqtt/esockd#allowdeny",
|
||||
desc => ?DESC(mqtt_listener_access_rules),
|
||||
default => [<<"allow all">>]
|
||||
}
|
||||
)},
|
||||
|
@ -1553,20 +1509,15 @@ mqtt_listener() ->
|
|||
sc(
|
||||
boolean(),
|
||||
#{
|
||||
default => false,
|
||||
desc =>
|
||||
"Enable the Proxy Protocol V1/2 if the EMQX cluster is deployed\n"
|
||||
" behind HAProxy or Nginx.<br/>"
|
||||
"See: https://www.haproxy.com/blog/haproxy/proxy-protocol/"
|
||||
desc => ?DESC(mqtt_listener_proxy_protocol),
|
||||
default => false
|
||||
}
|
||||
)},
|
||||
{"proxy_protocol_timeout",
|
||||
sc(
|
||||
duration(),
|
||||
#{
|
||||
desc =>
|
||||
"Timeout for proxy protocol. EMQX will close the TCP connection "
|
||||
"if proxy protocol packet is not received within the timeout.",
|
||||
desc => ?DESC(mqtt_listener_proxy_protocol_timeout),
|
||||
default => "3s"
|
||||
}
|
||||
)},
|
||||
|
@ -1580,8 +1531,8 @@ base_listener() ->
|
|||
sc(
|
||||
hoconsc:union([ip_port(), integer()]),
|
||||
#{
|
||||
required => true,
|
||||
desc => "IP address and port for the listening socket."
|
||||
desc => ?DESC(base_listener_bind),
|
||||
required => true
|
||||
}
|
||||
)},
|
||||
{"acceptors",
|
||||
|
@ -1589,7 +1540,7 @@ base_listener() ->
|
|||
integer(),
|
||||
#{
|
||||
default => 16,
|
||||
desc => "The size of the listener's receiving pool."
|
||||
desc => ?DESC(base_listener_acceptors)
|
||||
}
|
||||
)},
|
||||
{"max_connections",
|
||||
|
@ -1597,7 +1548,7 @@ base_listener() ->
|
|||
hoconsc:union([infinity, integer()]),
|
||||
#{
|
||||
default => infinity,
|
||||
desc => "The maximum number of concurrent connections allowed by the listener."
|
||||
desc => ?DESC(base_listener_max_connections)
|
||||
}
|
||||
)},
|
||||
{"mountpoint",
|
||||
|
@ -1605,38 +1556,23 @@ base_listener() ->
|
|||
binary(),
|
||||
#{
|
||||
default => <<>>,
|
||||
desc =>
|
||||
"When publishing or subscribing, prefix all topics with a mountpoint string.\n"
|
||||
" The prefixed string will be removed from the topic name when the message\n"
|
||||
" is delivered to the subscriber. The mountpoint is a way that users can use\n"
|
||||
" to implement isolation of message routing between different listeners.\n"
|
||||
" For example if a client A subscribes to `t` with `listeners.tcp.<name>.mountpoint`\n"
|
||||
" set to `some_tenant`, then the client actually subscribes to the topic\n"
|
||||
" `some_tenant/t`. Similarly, if another client B (connected to the same listener\n"
|
||||
" as the client A) sends a message to topic `t`, the message is routed\n"
|
||||
" to all the clients subscribed `some_tenant/t`, so client A will receive the\n"
|
||||
" message, with topic name `t`.<br/>\n"
|
||||
" Set to `\"\"` to disable the feature.<br/>\n"
|
||||
"\n"
|
||||
" Variables in mountpoint string:\n"
|
||||
" - <code>${clientid}</code>: clientid\n"
|
||||
" - <code>${username}</code>: username"
|
||||
desc => ?DESC(base_listener_mountpoint)
|
||||
}
|
||||
)},
|
||||
{"zone",
|
||||
sc(
|
||||
atom(),
|
||||
#{
|
||||
default => 'default',
|
||||
desc => "The configuration zone to which the listener belongs."
|
||||
desc => ?DESC(base_listener_zone),
|
||||
default => 'default'
|
||||
}
|
||||
)},
|
||||
{"limiter",
|
||||
sc(
|
||||
map("ratelimit's type", emqx_limiter_schema:bucket_name()),
|
||||
#{
|
||||
default => #{},
|
||||
desc => "Type of the rate limit."
|
||||
desc => ?DESC(base_listener_limiter),
|
||||
default => #{}
|
||||
}
|
||||
)}
|
||||
].
|
||||
|
@ -1738,7 +1674,7 @@ desc("listener_ssl_opts") ->
|
|||
"Socket options for SSL connections.";
|
||||
desc("listener_wss_opts") ->
|
||||
"Socket options for WebSocket/SSL connections.";
|
||||
desc(ssl_client_opts) ->
|
||||
desc("ssl_client_opts") ->
|
||||
"Socket options for SSL clients.";
|
||||
desc("deflate_opts") ->
|
||||
"Compression options.";
|
||||
|
@ -1814,7 +1750,7 @@ common_ssl_opts_schema(Defaults) ->
|
|||
boolean(),
|
||||
#{
|
||||
default => Df("enable", false),
|
||||
desc => "Enable TLS."
|
||||
desc => ?DESC(common_ssl_opts_schema_enable)
|
||||
}
|
||||
)},
|
||||
{"cacertfile",
|
||||
|
@ -1823,14 +1759,7 @@ common_ssl_opts_schema(Defaults) ->
|
|||
#{
|
||||
default => D("cacertfile"),
|
||||
required => false,
|
||||
desc =>
|
||||
"Trusted PEM format CA certificates bundle file.<br>\n"
|
||||
"The certificates in this file are used to verify the TLS peer's certificates.\n"
|
||||
"Append new certificates to the file if new CAs are to be trusted.\n"
|
||||
"There is no need to restart EMQX to have the updated file loaded, because\n"
|
||||
"the system regularly checks if file has been updated (and reload).<br>\n"
|
||||
"NOTE: invalidating (deleting) a certificate from the file will not affect\n"
|
||||
"already established connections.\n"
|
||||
desc => ?DESC(common_ssl_opts_schema_cacertfile)
|
||||
}
|
||||
)},
|
||||
{"certfile",
|
||||
|
@ -1839,13 +1768,7 @@ common_ssl_opts_schema(Defaults) ->
|
|||
#{
|
||||
default => D("certfile"),
|
||||
required => false,
|
||||
desc =>
|
||||
"PEM format certificates chain file.<br>\n"
|
||||
"The certificates in this file should be in reversed order of the certificate\n"
|
||||
"issue chain. That is, the host's certificate should be placed in the beginning\n"
|
||||
"of the file, followed by the immediate issuer certificate and so on.\n"
|
||||
"Although the root CA certificate is optional, it should be placed at the end of\n"
|
||||
"the file if it is to be added."
|
||||
desc => ?DESC(common_ssl_opts_schema_certfile)
|
||||
}
|
||||
)},
|
||||
{"keyfile",
|
||||
|
@ -1854,8 +1777,7 @@ common_ssl_opts_schema(Defaults) ->
|
|||
#{
|
||||
default => D("keyfile"),
|
||||
required => false,
|
||||
desc =>
|
||||
"PEM format private key file."
|
||||
desc => ?DESC(common_ssl_opts_schema_keyfile)
|
||||
}
|
||||
)},
|
||||
{"verify",
|
||||
|
@ -1863,8 +1785,7 @@ common_ssl_opts_schema(Defaults) ->
|
|||
hoconsc:enum([verify_peer, verify_none]),
|
||||
#{
|
||||
default => Df("verify", verify_none),
|
||||
desc =>
|
||||
"Enable or disable peer verification."
|
||||
desc => ?DESC(common_ssl_opts_schema_verify)
|
||||
}
|
||||
)},
|
||||
{"reuse_sessions",
|
||||
|
@ -1872,8 +1793,7 @@ common_ssl_opts_schema(Defaults) ->
|
|||
boolean(),
|
||||
#{
|
||||
default => Df("reuse_sessions", true),
|
||||
desc =>
|
||||
"Enable TLS session reuse."
|
||||
desc => ?DESC(common_ssl_opts_schema_reuse_sessions)
|
||||
}
|
||||
)},
|
||||
{"depth",
|
||||
|
@ -1881,12 +1801,7 @@ common_ssl_opts_schema(Defaults) ->
|
|||
integer(),
|
||||
#{
|
||||
default => Df("depth", 10),
|
||||
desc =>
|
||||
"Maximum number of non-self-issued intermediate certificates that can follow "
|
||||
"the peer certificate in a valid certification path. "
|
||||
"So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly; "
|
||||
"if 1 the path can be PEER, CA, ROOT-CA; if 2 the path can be PEER, CA, CA, ROOT-CA, "
|
||||
"and so on. The default value is 10."
|
||||
desc => ?DESC(common_ssl_opts_schema_depth)
|
||||
}
|
||||
)},
|
||||
{"password",
|
||||
|
@ -1895,9 +1810,7 @@ common_ssl_opts_schema(Defaults) ->
|
|||
#{
|
||||
sensitive => true,
|
||||
required => false,
|
||||
desc =>
|
||||
"String containing the user's password. Only used if the private\n"
|
||||
"key file is password-protected."
|
||||
desc => ?DESC(common_ssl_opts_schema_password)
|
||||
}
|
||||
)},
|
||||
{"versions",
|
||||
|
@ -1905,23 +1818,18 @@ common_ssl_opts_schema(Defaults) ->
|
|||
hoconsc:array(typerefl:atom()),
|
||||
#{
|
||||
default => default_tls_vsns(maps:get(versions, Defaults, tls_all_available)),
|
||||
desc =>
|
||||
"All TLS/DTLS versions to be supported.<br>\n"
|
||||
"NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config<br>\n"
|
||||
"In case PSK cipher suites are intended, make sure to configured\n"
|
||||
"<code>['tlsv1.2', 'tlsv1.1']</code> here.",
|
||||
desc => ?DESC(common_ssl_opts_schema_versions),
|
||||
validator => fun validate_tls_versions/1
|
||||
}
|
||||
)},
|
||||
{"ciphers", ciphers_schema(D("ciphers"))},
|
||||
{user_lookup_fun,
|
||||
{"user_lookup_fun",
|
||||
sc(
|
||||
typerefl:alias("string", any()),
|
||||
#{
|
||||
default => <<"emqx_tls_psk:lookup">>,
|
||||
converter => fun ?MODULE:parse_user_lookup_fun/1,
|
||||
desc =>
|
||||
"EMQX-internal callback that is used to lookup pre-shared key (PSK) identity."
|
||||
desc => ?DESC(common_ssl_opts_schema_user_lookup_fun)
|
||||
}
|
||||
)},
|
||||
{"secure_renegotiate",
|
||||
|
@ -1929,11 +1837,7 @@ common_ssl_opts_schema(Defaults) ->
|
|||
boolean(),
|
||||
#{
|
||||
default => Df("secure_renegotiate", true),
|
||||
desc =>
|
||||
"SSL parameter renegotiation is a feature that allows a client and a server\n"
|
||||
"to renegotiate the parameters of the SSL connection on the fly.\n"
|
||||
"RFC 5746 defines a more secure way of doing this. By enabling secure renegotiation,\n"
|
||||
"you drop support for the insecure renegotiation, prone to MitM attacks."
|
||||
desc => ?DESC(common_ssl_opts_schema_secure_renegotiate)
|
||||
}
|
||||
)}
|
||||
].
|
||||
|
@ -1958,12 +1862,7 @@ server_ssl_opts_schema(Defaults1, IsRanchListener) ->
|
|||
#{
|
||||
default => D("dhfile"),
|
||||
required => false,
|
||||
desc =>
|
||||
"Path to a file containing PEM-encoded Diffie-Hellman parameters\n"
|
||||
"to be used by the server if a cipher suite using Diffie-Hellman\n"
|
||||
"key exchange is negotiated. If not specified, default parameters\n"
|
||||
"are used.<br>\n"
|
||||
"NOTE: The <code>dhfile</code> option is not supported by TLS 1.3."
|
||||
desc => ?DESC(server_ssl_opts_schema_dhfile)
|
||||
}
|
||||
)},
|
||||
{"fail_if_no_peer_cert",
|
||||
|
@ -1971,12 +1870,7 @@ server_ssl_opts_schema(Defaults1, IsRanchListener) ->
|
|||
boolean(),
|
||||
#{
|
||||
default => Df("fail_if_no_peer_cert", false),
|
||||
desc =>
|
||||
"Used together with {verify, verify_peer} by an TLS/DTLS server.\n"
|
||||
"If set to true, the server fails if the client does not have a\n"
|
||||
"certificate to send, that is, sends an empty certificate.\n"
|
||||
"If set to false, it fails only if the client sends an invalid\n"
|
||||
"certificate (an empty certificate is considered valid)."
|
||||
desc => ?DESC(server_ssl_opts_schema_fail_if_no_peer_cert)
|
||||
}
|
||||
)},
|
||||
{"honor_cipher_order",
|
||||
|
@ -1984,11 +1878,7 @@ server_ssl_opts_schema(Defaults1, IsRanchListener) ->
|
|||
boolean(),
|
||||
#{
|
||||
default => Df("honor_cipher_order", true),
|
||||
desc =>
|
||||
"An important security setting, it forces the cipher to be set based\n"
|
||||
" on the server-specified order instead of the client-specified order,\n"
|
||||
" hence enforcing the (usually more properly configured) security\n"
|
||||
" ordering of the server administrator."
|
||||
desc => ?DESC(server_ssl_opts_schema_honor_cipher_order)
|
||||
}
|
||||
)},
|
||||
{"client_renegotiation",
|
||||
|
@ -1996,17 +1886,7 @@ server_ssl_opts_schema(Defaults1, IsRanchListener) ->
|
|||
boolean(),
|
||||
#{
|
||||
default => Df("client_renegotiation", true),
|
||||
desc =>
|
||||
"In protocols that support client-initiated renegotiation,\n"
|
||||
"the cost of resources of such an operation is higher for the "
|
||||
"server than the client.\n"
|
||||
"This can act as a vector for denial of service attacks.\n"
|
||||
"The SSL application already takes measures to counter-act such attempts,\n"
|
||||
"but client-initiated renegotiation can be strictly disabled by setting "
|
||||
"this option to false.\n"
|
||||
"The default value is true. Note that disabling renegotiation can result in\n"
|
||||
"long-lived connections becoming unusable due to limits on\n"
|
||||
"the number of messages the underlying cipher suite can encipher."
|
||||
desc => ?DESC(server_ssl_opts_schema_client_renegotiation)
|
||||
}
|
||||
)}
|
||||
| [
|
||||
|
@ -2015,7 +1895,7 @@ server_ssl_opts_schema(Defaults1, IsRanchListener) ->
|
|||
duration(),
|
||||
#{
|
||||
default => Df("handshake_timeout", "15s"),
|
||||
desc => "Maximum time duration allowed for the handshake to complete"
|
||||
desc => ?DESC(server_ssl_opts_schema_handshake_timeout)
|
||||
}
|
||||
)}
|
||||
|| IsRanchListener
|
||||
|
@ -2040,18 +1920,7 @@ client_ssl_opts_schema(Defaults1) ->
|
|||
hoconsc:union([disable, string()]),
|
||||
#{
|
||||
required => false,
|
||||
desc =>
|
||||
"Specify the host name to be used in TLS Server Name Indication extension.<br>\n"
|
||||
"For instance, when connecting to \"server.example.net\", the genuine server\n"
|
||||
"which accepts the connection and performs TLS handshake may differ from the\n"
|
||||
"host the TLS client initially connects to, e.g. when connecting to an IP address\n"
|
||||
"or when the host has multiple resolvable DNS records <br>\n"
|
||||
"If not specified, it will default to the host name string which is used\n"
|
||||
"to establish the connection, unless it is IP addressed used.<br>\n"
|
||||
"The host name is then also used in the host name verification of the peer\n"
|
||||
"certificate.<br> The special value 'disable' prevents the Server Name\n"
|
||||
"Indication extension from being sent and disables the hostname\n"
|
||||
"verification check."
|
||||
desc => ?DESC(client_ssl_opts_schema_server_name_indication)
|
||||
}
|
||||
)}
|
||||
].
|
||||
|
@ -2080,7 +1949,12 @@ ciphers_schema(Default) ->
|
|||
true -> undefined;
|
||||
false -> fun validate_ciphers/1
|
||||
end,
|
||||
desc =>
|
||||
desc_id => "ciphers_schema_" ++
|
||||
case Default of
|
||||
quic -> "quic";
|
||||
_ -> "0"
|
||||
end,
|
||||
desc_en =>
|
||||
"This config holds TLS cipher suite names separated by comma,\n"
|
||||
"or as an array of strings. e.g.\n"
|
||||
"<code>\"TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256\"</code> or\n"
|
||||
|
@ -2345,6 +2219,7 @@ authentication(Desc) ->
|
|||
undefined -> Default;
|
||||
Module -> hoconsc:lazy(Module:root_type())
|
||||
end,
|
||||
desc_id => authentication_0,
|
||||
desc => iolist_to_binary([
|
||||
Desc,
|
||||
"\nAuthentication can be one single authenticator instance or a chain of "
|
||||
|
|
|
@ -251,7 +251,7 @@ fields(cluster_etcd) ->
|
|||
, desc => ?DESC(cluster_etcd_node_ttl)
|
||||
})}
|
||||
, {"ssl",
|
||||
sc(hoconsc:ref(emqx_schema, ssl_client_opts),
|
||||
sc(hoconsc:ref(emqx_schema, "ssl_client_opts"),
|
||||
#{ desc => ?DESC(cluster_etcd_ssl)
|
||||
, 'readOnly' => true
|
||||
})}
|
||||
|
|
|
@ -7,8 +7,22 @@
|
|||
-include_lib("eunit/include/eunit.hrl").
|
||||
|
||||
doc_gen_test() ->
|
||||
%% the json file too large to encode.
|
||||
{
|
||||
timeout,
|
||||
60,
|
||||
fun() ->
|
||||
Dir = "tmp",
|
||||
ok = filelib:ensure_dir(filename:join("tmp", foo)),
|
||||
I18nFile = filename:join(["_build", "test", "lib", "emqx_dashboard", "etc", "i18n.conf.all"]),
|
||||
I18nFile = filename:join([
|
||||
"_build",
|
||||
"test",
|
||||
"lib",
|
||||
"emqx_dashboard",
|
||||
"etc",
|
||||
"i18n.conf.all"
|
||||
]),
|
||||
_ = emqx_conf:dump_schema(Dir, emqx_conf_schema, I18nFile),
|
||||
ok.
|
||||
ok
|
||||
end
|
||||
}.
|
||||
|
|
|
@ -53,7 +53,7 @@ roots() -> [].
|
|||
fields(_) -> [].
|
||||
|
||||
ssl_fields() ->
|
||||
[ {ssl, #{type => hoconsc:ref(emqx_schema, ssl_client_opts),
|
||||
[ {ssl, #{type => hoconsc:ref(emqx_schema, "ssl_client_opts"),
|
||||
default => #{<<"enable">> => false},
|
||||
desc => ?DESC("ssl")
|
||||
}
|
||||
|
|
|
@ -100,7 +100,7 @@ fields(server) ->
|
|||
];
|
||||
fields(ssl_conf) ->
|
||||
Schema = emqx_schema:client_ssl_opts_schema(#{}),
|
||||
lists:keydelete(user_lookup_fun, 1, Schema).
|
||||
lists:keydelete("user_lookup_fun", 1, Schema).
|
||||
|
||||
desc(exhook) ->
|
||||
"External hook (exhook) configuration.";
|
||||
|
|
|
@ -348,7 +348,7 @@ fields(exproto_grpc_handler) ->
|
|||
{address, sc(binary(), #{required => true, desc => ?DESC(exproto_grpc_handler_address)})},
|
||||
{ssl,
|
||||
sc(
|
||||
ref(emqx_schema, ssl_client_opts),
|
||||
ref(emqx_schema, "ssl_client_opts"),
|
||||
#{
|
||||
required => {false, recursively},
|
||||
desc => ?DESC(exproto_grpc_handler_ssl)
|
||||
|
|
|
@ -7,8 +7,22 @@
|
|||
-include_lib("eunit/include/eunit.hrl").
|
||||
|
||||
doc_gen_test() ->
|
||||
%% the json file too large to encode.
|
||||
{
|
||||
timeout,
|
||||
60,
|
||||
fun() ->
|
||||
Dir = "tmp",
|
||||
ok = filelib:ensure_dir(filename:join("tmp", foo)),
|
||||
I18nFile = filename:join(["_build", "test", "lib", "emqx_dashboard", "etc", "i18n.conf.all"]),
|
||||
I18nFile = filename:join([
|
||||
"_build",
|
||||
"test",
|
||||
"lib",
|
||||
"emqx_dashboard",
|
||||
"etc",
|
||||
"i18n.conf.all"
|
||||
]),
|
||||
_ = emqx_conf:dump_schema(Dir, emqx_enterprise_conf_schema, I18nFile),
|
||||
ok.
|
||||
ok
|
||||
end
|
||||
}.
|
||||
|
|
Loading…
Reference in New Issue