From f5d5f695affd725c4431e9eb7c5d7f98169f375a Mon Sep 17 00:00:00 2001 From: ryepup <40441+ryepup@users.noreply.github.com> Date: Wed, 20 Nov 2024 14:08:21 +0000 Subject: [PATCH] update reference.json --- reference-lib/package-lock.json | 4 +- reference-lib/package.json | 2 +- reference-lib/src/reference.json | 345 ++++++++++++------------------- 3 files changed, 140 insertions(+), 211 deletions(-) diff --git a/reference-lib/package-lock.json b/reference-lib/package-lock.json index a9d2659..075305c 100644 --- a/reference-lib/package-lock.json +++ b/reference-lib/package-lock.json @@ -1,12 +1,12 @@ { "name": "@nginx/reference-lib", - "version": "1.1.4", + "version": "1.1.5", "lockfileVersion": 3, "requires": true, "packages": { "": { "name": "@nginx/reference-lib", - "version": "1.1.4", + "version": "1.1.5", "license": "Apache-2.0", "devDependencies": { "@rollup/plugin-json": "^6.1.0", diff --git a/reference-lib/package.json b/reference-lib/package.json index 7e79aef..c6198f5 100644 --- a/reference-lib/package.json +++ b/reference-lib/package.json @@ -1,6 +1,6 @@ { "name": "@nginx/reference-lib", - "version": "1.1.4", + "version": "1.1.5", "description": "", "main": "dist/index.js", "type": "module", diff --git a/reference-lib/src/reference.json b/reference-lib/src/reference.json index c073afe..b570162 100644 --- a/reference-lib/src/reference.json +++ b/reference-lib/src/reference.json @@ -3907,6 +3907,24 @@ "description_md": "Specifies a *`file`* with revoked certificates (CRL)\nin the PEM format used to [verify](https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_ssl_verify)\nthe certificate of the gRPC SSL server.", "description_html": "

Specifies a file with revoked certificates (CRL)\nin the PEM format used to verify\nthe certificate of the gRPC SSL server.

\n" }, + { + "name": "grpc_ssl_key_log", + "default": "", + "contexts": [ + "http", + "server", + "location" + ], + "syntax_md": [ + "path" + ], + "syntax_html": [ + "

path

\n" + ], + "isBlock": false, + "description_md": "Enables logging of gRPC SSL server connection SSL keys\nand specifies the path to the key log file.\nKeys are logged in the\n[SSLKEYLOGFILE](https://datatracker.ietf.org/doc/html/draft-ietf-tls-keylogfile)\nformat compatible with Wireshark.\n\n> This directive is available as part of our\n> [commercial subscription](https://nginx.com/products/).", + "description_html": "

Enables logging of gRPC SSL server connection SSL keys\nand specifies the path to the key log file.\nKeys are logged in the\nSSLKEYLOGFILE\nformat compatible with Wireshark.

\n\n
\n

This directive is available as part of our\ncommercial subscription.

\n
\n" + }, { "name": "grpc_ssl_name", "default": "host from grpc_pass", @@ -6900,6 +6918,24 @@ "description_md": "Specifies a *`file`* with revoked certificates (CRL)\nin the PEM format used to [verify](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_ssl_verify)\nthe certificate of the proxied HTTPS server.", "description_html": "

Specifies a file with revoked certificates (CRL)\nin the PEM format used to verify\nthe certificate of the proxied HTTPS server.

\n" }, + { + "name": "proxy_ssl_key_log", + "default": "", + "contexts": [ + "http", + "server", + "location" + ], + "syntax_md": [ + "path" + ], + "syntax_html": [ + "

path

\n" + ], + "isBlock": false, + "description_md": "Enables logging of proxied HTTPS server connection SSL keys\nand specifies the path to the key log file.\nKeys are logged in the\n[SSLKEYLOGFILE](https://datatracker.ietf.org/doc/html/draft-ietf-tls-keylogfile)\nformat compatible with Wireshark.\n\n> This directive is available as part of our\n> [commercial subscription](https://nginx.com/products/).", + "description_html": "

Enables logging of proxied HTTPS server connection SSL keys\nand specifies the path to the key log file.\nKeys are logged in the\nSSLKEYLOGFILE\nformat compatible with Wireshark.

\n\n
\n

This directive is available as part of our\ncommercial subscription.

\n
\n" + }, { "name": "proxy_ssl_name", "default": "$proxy_host", @@ -8752,6 +8788,23 @@ "description_md": "Specifies a *`curve`* for ECDHE ciphers.\n\nWhen using OpenSSL 1.0.2 or higher,\nit is possible to specify multiple curves (1.11.0), for example:\n```\nssl_ecdh_curve prime256v1:secp384r1;\n```\n\nThe special value `auto` (1.11.0) instructs nginx to use\na list built into the OpenSSL library when using OpenSSL 1.0.2 or higher,\nor `prime256v1` with older versions.\n\n> Prior to version 1.11.0,\n> the `prime256v1` curve was used by default.\n\n> When using OpenSSL 1.0.2 or higher,\n> this directive sets the list of curves supported by the server.\n> Thus, in order for ECDSA certificates to work,\n> it is important to include the curves used in the certificates.", "description_html": "

Specifies a curve for ECDHE ciphers.

\n\n

When using OpenSSL 1.0.2 or higher,\nit is possible to specify multiple curves (1.11.0), for example:

\n\n
ssl_ecdh_curve prime256v1:secp384r1;\n
\n\n

The special value auto (1.11.0) instructs nginx to use\na list built into the OpenSSL library when using OpenSSL 1.0.2 or higher,\nor prime256v1 with older versions.

\n\n
\n

Prior to version 1.11.0,\nthe prime256v1 curve was used by default.

\n\n

When using OpenSSL 1.0.2 or higher,\nthis directive sets the list of curves supported by the server.\nThus, in order for ECDSA certificates to work,\nit is important to include the curves used in the certificates.

\n
\n" }, + { + "name": "ssl_key_log", + "default": "", + "contexts": [ + "http", + "server" + ], + "syntax_md": [ + "path" + ], + "syntax_html": [ + "

path

\n" + ], + "isBlock": false, + "description_md": "Enables logging of client connection SSL keys\nand specifies the path to the key log file.\nKeys are logged in the\n[SSLKEYLOGFILE](https://datatracker.ietf.org/doc/html/draft-ietf-tls-keylogfile)\nformat compatible with Wireshark.\n\n> This directive is available as part of our\n> [commercial subscription](https://nginx.com/products/).", + "description_html": "

Enables logging of client connection SSL keys\nand specifies the path to the key log file.\nKeys are logged in the\nSSLKEYLOGFILE\nformat compatible with Wireshark.

\n\n
\n

This directive is available as part of our\ncommercial subscription.

\n
\n" + }, { "name": "ssl_ocsp", "default": "off", @@ -10854,6 +10907,24 @@ "description_md": "Specifies a *`file`* with revoked certificates (CRL)\nin the PEM format used to [verify](https://nginx.org/en/docs/http/ngx_http_uwsgi_module.html#uwsgi_ssl_verify)\nthe certificate of the secured uwsgi server.", "description_html": "

Specifies a file with revoked certificates (CRL)\nin the PEM format used to verify\nthe certificate of the secured uwsgi server.

\n" }, + { + "name": "uwsgi_ssl_key_log", + "default": "", + "contexts": [ + "http", + "server", + "location" + ], + "syntax_md": [ + "path" + ], + "syntax_html": [ + "

path

\n" + ], + "isBlock": false, + "description_md": "Enables logging of secured uwsgi server connection SSL keys\nand specifies the path to the key log file.\nKeys are logged in the\n[SSLKEYLOGFILE](https://datatracker.ietf.org/doc/html/draft-ietf-tls-keylogfile)\nformat compatible with Wireshark.\n\n> This directive is available as part of our\n> [commercial subscription](https://nginx.com/products/).", + "description_html": "

Enables logging of secured uwsgi server connection SSL keys\nand specifies the path to the key log file.\nKeys are logged in the\nSSLKEYLOGFILE\nformat compatible with Wireshark.

\n\n
\n

This directive is available as part of our\ncommercial subscription.

\n
\n" + }, { "name": "uwsgi_ssl_name", "default": "host from uwsgi_pass", @@ -12967,22 +13038,6 @@ "id": "/en/docs/ngx_mgmt_module.html", "name": "ngx_mgmt_module", "directives": [ - { - "name": "connect_timeout", - "default": "15s", - "contexts": [ - "mgmt" - ], - "syntax_md": [ - "*`time`*" - ], - "syntax_html": [ - "

time

\n" - ], - "isBlock": false, - "description_md": "Defines a timeout for establishing a connection with the Instance Manager.", - "description_html": "

Defines a timeout for establishing a connection with the Instance Manager.

\n" - }, { "name": "mgmt", "default": "", @@ -12996,75 +13051,11 @@ "

{...}

\n" ], "isBlock": true, - "description_md": "Provides the configuration file context\nin which the management server directives are specified.", - "description_html": "

Provides the configuration file context\nin which the management server directives are specified.

\n" - }, - { - "name": "read_timeout", - "default": "60s", - "contexts": [ - "mgmt" - ], - "syntax_md": [ - "*`time`*" - ], - "syntax_html": [ - "

time

\n" - ], - "isBlock": false, - "description_md": "Defines a timeout for reading a response from the Instance Manager.\nThe timeout is set only between two successive read operations,\nnot for the transmission of the whole response.\nIf the Instance Manager does not transmit anything within this time,\nthe connection is closed.", - "description_html": "

Defines a timeout for reading a response from the Instance Manager.\nThe timeout is set only between two successive read operations,\nnot for the transmission of the whole response.\nIf the Instance Manager does not transmit anything within this time,\nthe connection is closed.

\n" - }, - { - "name": "resolver", - "default": "", - "contexts": [ - "mgmt" - ], - "syntax_md": [ - "*`address`* ... [`valid`=*`time`*] [`ipv4`=`on`|`off`] [`ipv6`=`on`|`off`] [`status_zone`=*`zone`*]" - ], - "syntax_html": [ - "

address … [valid=time] [ipv4=on|off] [ipv6=on|off] [status_zone=zone]

\n" - ], - "isBlock": false, - "description_md": "Configures name servers used to resolve names of the Instance Manager\ninto addresses, for example:\n```\nresolver 127.0.0.1 [::1]:5353;\n```\nThe address can be specified as a domain name or IP address,\nwith an optional port.\nIf port is not specified, the port 53 is used.\nName servers are queried in a round-robin fashion.\n\nBy default, nginx will look up both IPv4 and IPv6 addresses while resolving.\nIf looking up of IPv4 or IPv6 addresses is not desired,\nthe `ipv4=off` or\nthe `ipv6=off` parameter can be specified.\n\nBy default, nginx caches answers using the TTL value of a response.\nAn optional `valid` parameter allows overriding it:\n```\nresolver 127.0.0.1 [::1]:5353 valid=30s;\n```\n> To prevent DNS spoofing, it is recommended\n> configuring DNS servers in a properly secured trusted local network.\n\nThe optional `status_zone` parameter\nenables\n[collection](https://nginx.org/en/docs/ngx_mgmt_module.html#resolvers_)\nof DNS server statistics of requests and responses\nin the specified *`zone`*.", - "description_html": "

Configures name servers used to resolve names of the Instance Manager\ninto addresses, for example:

\n\n
resolver 127.0.0.1 [::1]:5353;\n
\n\n

The address can be specified as a domain name or IP address,\nwith an optional port.\nIf port is not specified, the port 53 is used.\nName servers are queried in a round-robin fashion.

\n\n

By default, nginx will look up both IPv4 and IPv6 addresses while resolving.\nIf looking up of IPv4 or IPv6 addresses is not desired,\nthe ipv4=off or\nthe ipv6=off parameter can be specified.

\n\n

By default, nginx caches answers using the TTL value of a response.\nAn optional valid parameter allows overriding it:

\n\n
resolver 127.0.0.1 [::1]:5353 valid=30s;\n
\n\n
\n

To prevent DNS spoofing, it is recommended\nconfiguring DNS servers in a properly secured trusted local network.

\n
\n\n

The optional status_zone parameter\nenables\ncollection\nof DNS server statistics of requests and responses\nin the specified zone.

\n" - }, - { - "name": "resolver_timeout", - "default": "30s", - "contexts": [ - "mgmt" - ], - "syntax_md": [ - "*`time`*" - ], - "syntax_html": [ - "

time

\n" - ], - "isBlock": false, - "description_md": "Sets a timeout for name resolution.", - "description_html": "

Sets a timeout for name resolution.

\n" - }, - { - "name": "send_timeout", - "default": "60s", - "contexts": [ - "mgmt" - ], - "syntax_md": [ - "*`time`*" - ], - "syntax_html": [ - "

time

\n" - ], - "isBlock": false, - "description_md": "Sets a timeout for transmitting a request to the Instance Manager.\nThe timeout is set only between two successive write operations,\nnot for the transmission of the whole request.\nIf the Instance Manager does not receive anything within this time,\nthe connection is closed.", - "description_html": "

Sets a timeout for transmitting a request to the Instance Manager.\nThe timeout is set only between two successive write operations,\nnot for the transmission of the whole request.\nIf the Instance Manager does not receive anything within this time,\nthe connection is closed.

\n" + "description_md": "Provides the configuration file context in which\nusage reporting and license management directives\nare specified.", + "description_html": "

Provides the configuration file context in which\nusage reporting and license management directives\nare specified.

\n" }, { - "name": "ssl", + "name": "enforce_initial_report", "default": "on", "contexts": [ "mgmt" @@ -13076,12 +13067,12 @@ "

on | off

\n" ], "isBlock": false, - "description_md": "Enables the HTTPS protocol for all\nconnections to the Instance Manager.", - "description_html": "

Enables the HTTPS protocol for all\nconnections to the Instance Manager.

\n" + "description_md": "Enables or disables the 180-day grace period\nfor sending the initial usage report.\n\nThe initial usage report is sent immediately\nupon nginx first start after installation.\nBy default, if the initial report is not received by F5 licensing endpoint,\nnginx stops processing traffic until the report is successfully delivered.\nSetting the directive value to `off` enables\nthe 180-day grace period during which\nthe initial usage report must be received by F5 licensing endpoint.", + "description_html": "

Enables or disables the 180-day grace period\nfor sending the initial usage report.

\n\n

The initial usage report is sent immediately\nupon nginx first start after installation.\nBy default, if the initial report is not received by F5 licensing endpoint,\nnginx stops processing traffic until the report is successfully delivered.\nSetting the directive value to off enables\nthe 180-day grace period during which\nthe initial usage report must be received by F5 licensing endpoint.

\n" }, { - "name": "ssl_certificate", - "default": "", + "name": "license_token", + "default": "license.jwt", "contexts": [ "mgmt" ], @@ -13092,40 +13083,24 @@ "

file

\n" ], "isBlock": false, - "description_md": "Specifies a *`file`* with the certificate in the PEM format\nused for authentication to the Instance Manager.", - "description_html": "

Specifies a file with the certificate in the PEM format\nused for authentication to the Instance Manager.

\n" + "description_md": "Specifies a JWT license *`file`*.\nBy default, the *`license.jwt`* file is expected to be at\n`/etc/nginx/` for Linux or at\n`/usr/local/etc/nginx/` for FreeBSD.", + "description_html": "

Specifies a JWT license file.\nBy default, the license.jwt file is expected to be at\n/etc/nginx/ for Linux or at\n/usr/local/etc/nginx/ for FreeBSD.

\n" }, { - "name": "ssl_certificate_key", + "name": "resolver", "default": "", "contexts": [ "mgmt" ], "syntax_md": [ - "*`file`*" - ], - "syntax_html": [ - "

file

\n" - ], - "isBlock": false, - "description_md": "Specifies a *`file`* with the secret key in the PEM format\nused for authentication to the Instance Manager.", - "description_html": "

Specifies a file with the secret key in the PEM format\nused for authentication to the Instance Manager.

\n" - }, - { - "name": "ssl_ciphers", - "default": "DEFAULT", - "contexts": [ - "mgmt" - ], - "syntax_md": [ - "*`ciphers`*" + "*`address`* ... [`valid`=*`time`*] [`ipv4`=`on`|`off`] [`ipv6`=`on`|`off`] [`status_zone`=*`zone`*]" ], "syntax_html": [ - "

ciphers

\n" + "

address … [valid=time] [ipv4=on|off] [ipv6=on|off] [status_zone=zone]

\n" ], "isBlock": false, - "description_md": "Specifies the enabled ciphers for requests to the Instance Manager.\nThe ciphers are specified in the format understood by the OpenSSL library.\n\nThe full list can be viewed using the\nā€œ`openssl ciphers`ā€ command.", - "description_html": "

Specifies the enabled ciphers for requests to the Instance Manager.\nThe ciphers are specified in the format understood by the OpenSSL library.

\n\n

The full list can be viewed using the\nā€œopenssl ciphersā€ command.

\n" + "description_md": "Configures name servers used to resolve usage reporting endpoint name.\nBy default, the system resolver is used.\n\nSee [`resolver`](https://nginx.org/en/docs/http/ngx_http_core_module.html#resolver) for details.", + "description_html": "

Configures name servers used to resolve usage reporting endpoint name.\nBy default, the system resolver is used.

\n\n

See resolver for details.

\n" }, { "name": "ssl_crl", @@ -13140,76 +13115,12 @@ "

file

\n" ], "isBlock": false, - "description_md": "Specifies a *`file`* with revoked certificates (CRL)\nin the PEM format used to [verify](https://nginx.org/en/docs/ngx_mgmt_module.html#ssl_verify)\nthe certificate of the Instance Manager.", - "description_html": "

Specifies a file with revoked certificates (CRL)\nin the PEM format used to verify\nthe certificate of the Instance Manager.

\n" - }, - { - "name": "ssl_name", - "default": "ssl_name host", - "contexts": [ - "mgmt" - ], - "syntax_md": [ - "*`name`*" - ], - "syntax_html": [ - "

name

\n" - ], - "isBlock": false, - "description_md": "Allows overriding the server name used to\n[verify](https://nginx.org/en/docs/ngx_mgmt_module.html#ssl_verify)\nthe certificate of the Instance Manager and to be\n[passed through SNI](https://nginx.org/en/docs/ngx_mgmt_module.html#ssl_server_name)\nwhen establishing a connection with the Instance Manager.", - "description_html": "

Allows overriding the server name used to\nverify\nthe certificate of the Instance Manager and to be\npassed through SNI\nwhen establishing a connection with the Instance Manager.

\n" - }, - { - "name": "ssl_password_file", - "default": "", - "contexts": [ - "mgmt" - ], - "syntax_md": [ - "*`file`*" - ], - "syntax_html": [ - "

file

\n" - ], - "isBlock": false, - "description_md": "Specifies a *`file`* with passphrases for\n[secret keys](https://nginx.org/en/docs/ngx_mgmt_module.html#ssl_certificate_key)\nwhere each passphrase is specified on a separate line.\nPassphrases are tried in turn when loading the key.", - "description_html": "

Specifies a file with passphrases for\nsecret keys\nwhere each passphrase is specified on a separate line.\nPassphrases are tried in turn when loading the key.

\n" - }, - { - "name": "ssl_protocols", - "default": "TLSv1 TLSv1.1 TLSv1.2 TLSv1.3", - "contexts": [ - "mgmt" - ], - "syntax_md": [ - "[`SSLv2`] [`SSLv3`] [`TLSv1`] [`TLSv1.1`] [`TLSv1.2`] [`TLSv1.3`]" - ], - "syntax_html": [ - "

[SSLv2] [SSLv3] [TLSv1] [TLSv1.1] [TLSv1.2] [TLSv1.3]

\n" - ], - "isBlock": false, - "description_md": "Enables the specified protocols for requests to the Instance Manager.", - "description_html": "

Enables the specified protocols for requests to the Instance Manager.

\n" - }, - { - "name": "ssl_server_name", - "default": "off", - "contexts": [ - "mgmt" - ], - "syntax_md": [ - "`on` | `off`" - ], - "syntax_html": [ - "

on | off

\n" - ], - "isBlock": false, - "description_md": "Enables or disables passing of the server name through\n[TLS Server Name Indication extension](http://en.wikipedia.org/wiki/Server_Name_Indication) (SNI, RFC 6066)\nwhen establishing a connection with the Instance Manager.", - "description_html": "

Enables or disables passing of the server name through\nTLS Server Name Indication extension (SNI, RFC 6066)\nwhen establishing a connection with the Instance Manager.

\n" + "description_md": "Specifies a *`file`* with revoked certificates (CRL)\nin the PEM format used to [verify](https://nginx.org/en/docs/ngx_mgmt_module.html#ssl_verify)\nthe certificate of the usage reporting endpoint.", + "description_html": "

Specifies a file with revoked certificates (CRL)\nin the PEM format used to verify\nthe certificate of the usage reporting endpoint.

\n" }, { "name": "ssl_trusted_certificate", - "default": "", + "default": "system CA bundle", "contexts": [ "mgmt" ], @@ -13220,12 +13131,12 @@ "

file

\n" ], "isBlock": false, - "description_md": "Specifies a *`file`* with trusted CA certificates in the PEM format\nused to [verify](https://nginx.org/en/docs/ngx_mgmt_module.html#ssl_verify)\nthe certificate of the Instance Manager.", - "description_html": "

Specifies a file with trusted CA certificates in the PEM format\nused to verify\nthe certificate of the Instance Manager.

\n" + "description_md": "Specifies a *`file`* with trusted CA certificates in the PEM format\nused to [verify](https://nginx.org/en/docs/ngx_mgmt_module.html#ssl_verify)\nthe certificate of the usage reporting endpoint.", + "description_html": "

Specifies a file with trusted CA certificates in the PEM format\nused to verify\nthe certificate of the usage reporting endpoint.

\n" }, { "name": "ssl_verify", - "default": "off", + "default": "on", "contexts": [ "mgmt" ], @@ -13236,28 +13147,28 @@ "

on | off

\n" ], "isBlock": false, - "description_md": "Enables or disables verification of the Instance Manager certificate.", - "description_html": "

Enables or disables verification of the Instance Manager certificate.

\n" + "description_md": "Enables or disables verification of the usage reporting endpoint certificate.\n\n> Before 1.27.2, the default value was `off`.", + "description_html": "

Enables or disables verification of the usage reporting endpoint certificate.

\n\n
\n

Before 1.27.2, the default value was off.

\n
\n" }, { - "name": "ssl_verify_depth", - "default": "1", + "name": "state_path", + "default": "", "contexts": [ "mgmt" ], "syntax_md": [ - "*`number`*" + "*`path`*" ], "syntax_html": [ - "

number

\n" + "

path

\n" ], "isBlock": false, - "description_md": "Sets the verification depth in the Instance Manager certificates chain.", - "description_html": "

Sets the verification depth in the Instance Manager certificates chain.

\n" + "description_md": "Defines a directory for storing state files\n(`nginx-mgmt-*`)\ncreated by the `ngx_mgmt_module` module.\nThe default directory\nfor Linux is `/var/lib/nginx/state`,\nfor FreeBSD is `/var/db/nginx/state`.", + "description_html": "

Defines a directory for storing state files\n(nginx-mgmt-*)\ncreated by the ngx_mgmt_module module.\nThe default directory\nfor Linux is /var/lib/nginx/state,\nfor FreeBSD is /var/db/nginx/state.

\n" }, { "name": "usage_report", - "default": "", + "default": "endpoint=product.connect.nginx.com interval=1h", "contexts": [ "mgmt" ], @@ -13268,24 +13179,8 @@ "

[endpoint=address] [interval=time]

\n" ], "isBlock": false, - "description_md": "Sets the *`address`* and *`port`* for IP,\nor the *`path`* for a UNIX-domain socket on which\nthe Instance Manager is installed,\nby default `nginx-mgmt.local`.\nThe `interval` sets an interval between reports\nto the Instance Manager, by default 30m.", - "description_html": "

Sets the address and port for IP,\nor the path for a UNIX-domain socket on which\nthe Instance Manager is installed,\nby default nginx-mgmt.local.\nThe interval sets an interval between reports\nto the Instance Manager, by default 30m.

\n" - }, - { - "name": "uuid_file", - "default": "logs/uuid", - "contexts": [ - "mgmt" - ], - "syntax_md": [ - "*`file`*" - ], - "syntax_html": [ - "

file

\n" - ], - "isBlock": false, - "description_md": "Specifies a *`file`* that keeps the ID of nginx instance.\n\nExamples:\n```\nuuid_file /var/lib/nginx/nginx.id; # path for Linux\nuuid_file /var/db/nginx/nginx.id; # path for FreeBSD\n```\n\nChanging the file content directly should be avoided.", - "description_html": "

Specifies a file that keeps the ID of nginx instance.

\n\n

Examples:

\n\n
uuid_file /var/lib/nginx/nginx.id; # path for Linux\nuuid_file /var/db/nginx/nginx.id;  # path for FreeBSD\n
\n\n

Changing the file content directly should be avoided.

\n" + "description_md": "Sets the *`address`* and *`port`*\nof the usage reporting endpoint.\nThe `interval` parameter sets an interval between\ntwo consecutive reports.\n> Before 1.27.2, the default values were\n> `nginx-mgmt.local` and\n> `30m`.", + "description_html": "

Sets the address and port\nof the usage reporting endpoint.\nThe interval parameter sets an interval between\ntwo consecutive reports.

\n\n
\n

Before 1.27.2, the default values were\nnginx-mgmt.local and\n30m.

\n
\n" } ] }, @@ -14949,6 +14844,23 @@ "description_md": "Specifies a *`file`* with revoked certificates (CRL)\nin the PEM format used to [verify](https://nginx.org/en/docs/stream/ngx_stream_proxy_module.html#proxy_ssl_verify)\nthe certificate of the proxied server.", "description_html": "

Specifies a file with revoked certificates (CRL)\nin the PEM format used to verify\nthe certificate of the proxied server.

\n" }, + { + "name": "proxy_ssl_key_log", + "default": "", + "contexts": [ + "stream", + "server" + ], + "syntax_md": [ + "path" + ], + "syntax_html": [ + "

path

\n" + ], + "isBlock": false, + "description_md": "Enables logging of proxied server connection SSL keys\nand specifies the path to the key log file.\nKeys are logged in the\n[SSLKEYLOGFILE](https://datatracker.ietf.org/doc/html/draft-ietf-tls-keylogfile)\nformat compatible with Wireshark.\n\n> This directive is available as part of our\n> [commercial subscription](https://nginx.com/products/).", + "description_html": "

Enables logging of proxied server connection SSL keys\nand specifies the path to the key log file.\nKeys are logged in the\nSSLKEYLOGFILE\nformat compatible with Wireshark.

\n\n
\n

This directive is available as part of our\ncommercial subscription.

\n
\n" + }, { "name": "proxy_ssl_name", "default": "host from proxy_pass", @@ -15396,6 +15308,23 @@ "description_md": "Specifies a timeout for the SSL handshake to complete.", "description_html": "

Specifies a timeout for the SSL handshake to complete.

\n" }, + { + "name": "ssl_key_log", + "default": "", + "contexts": [ + "stream", + "server" + ], + "syntax_md": [ + "path" + ], + "syntax_html": [ + "

path

\n" + ], + "isBlock": false, + "description_md": "Enables logging of client connection SSL keys\nand specifies the path to the key log file.\nKeys are logged in the\n[SSLKEYLOGFILE](https://datatracker.ietf.org/doc/html/draft-ietf-tls-keylogfile)\nformat compatible with Wireshark.\n\n> This directive is available as part of our\n> [commercial subscription](https://nginx.com/products/).", + "description_html": "

Enables logging of client connection SSL keys\nand specifies the path to the key log file.\nKeys are logged in the\nSSLKEYLOGFILE\nformat compatible with Wireshark.

\n\n
\n

This directive is available as part of our\ncommercial subscription.

\n
\n" + }, { "name": "ssl_ocsp", "default": "off", @@ -16456,5 +16385,5 @@ ] } ], - "version": "https://github.com/nginx/nginx.org/commit/120efa0a24ae3e19529f7c94a11603699ced5472" + "version": "https://github.com/nginx/nginx.org/commit/3aad6b0f8f073986c4114a57cb42395a0d1b18ad" }