mirror of
https://git.haproxy.org/git/haproxy.git/
synced 2025-08-07 07:37:02 +02:00
DOC: config: fix alphabetical ordering of layer 6 sample fetch functions
Some misordering has been accumulating over time, making some of them hard to spot.
This commit is contained in:
parent
e9248243e9
commit
5261e35b8f
@ -24753,34 +24753,34 @@ distcc_body(<token>[,<occ>]) binary
|
|||||||
distcc_param(<token>[,<occ>]) integer
|
distcc_param(<token>[,<occ>]) integer
|
||||||
payload(<offset>,<length>) binary
|
payload(<offset>,<length>) binary
|
||||||
payload_lv(<offset1>,<length>[,<offset2>]) binary
|
payload_lv(<offset1>,<length>[,<offset2>]) binary
|
||||||
|
rdp_cookie([<name>]) string
|
||||||
|
rdp_cookie_cnt([name]) integer
|
||||||
|
rep_ssl_hello_type integer
|
||||||
req.len integer
|
req.len integer
|
||||||
req_len integer
|
|
||||||
req.payload(<offset>,<length>) binary
|
req.payload(<offset>,<length>) binary
|
||||||
req.payload_lv(<offset1>,<length>[,<offset2>]) binary
|
req.payload_lv(<offset1>,<length>[,<offset2>]) binary
|
||||||
req.proto_http boolean
|
req.proto_http boolean
|
||||||
req_proto_http boolean
|
|
||||||
req.rdp_cookie([<name>]) string
|
req.rdp_cookie([<name>]) string
|
||||||
rdp_cookie([<name>]) string
|
|
||||||
req.rdp_cookie_cnt([name]) integer
|
req.rdp_cookie_cnt([name]) integer
|
||||||
rdp_cookie_cnt([name]) integer
|
|
||||||
req.ssl_alpn string
|
req.ssl_alpn string
|
||||||
|
req.ssl_cipherlist binary
|
||||||
req.ssl_ec_ext boolean
|
req.ssl_ec_ext boolean
|
||||||
req.ssl_hello_type integer
|
req.ssl_hello_type integer
|
||||||
req_ssl_hello_type integer
|
|
||||||
req.ssl_sni string
|
|
||||||
req_ssl_sni string
|
|
||||||
req.ssl_st_ext integer
|
|
||||||
req.ssl_ver integer
|
|
||||||
req_ssl_ver integer
|
|
||||||
req.ssl_cipherlist binary
|
|
||||||
req.ssl_sigalgs binary
|
|
||||||
req.ssl_keyshare_groups binary
|
req.ssl_keyshare_groups binary
|
||||||
|
req.ssl_sigalgs binary
|
||||||
|
req.ssl_sni string
|
||||||
|
req.ssl_st_ext integer
|
||||||
req.ssl_supported_groups binary
|
req.ssl_supported_groups binary
|
||||||
|
req.ssl_ver integer
|
||||||
|
req_len integer
|
||||||
|
req_proto_http boolean
|
||||||
|
req_ssl_hello_type integer
|
||||||
|
req_ssl_sni string
|
||||||
|
req_ssl_ver integer
|
||||||
res.len integer
|
res.len integer
|
||||||
res.payload(<offset>,<length>) binary
|
res.payload(<offset>,<length>) binary
|
||||||
res.payload_lv(<offset1>,<length>[,<offset2>]) binary
|
res.payload_lv(<offset1>,<length>[,<offset2>]) binary
|
||||||
res.ssl_hello_type integer
|
res.ssl_hello_type integer
|
||||||
rep_ssl_hello_type integer
|
|
||||||
----------------------------------------------------+-------------
|
----------------------------------------------------+-------------
|
||||||
|
|
||||||
Detailed list:
|
Detailed list:
|
||||||
@ -24934,6 +24934,21 @@ req.ssl_alpn : string
|
|||||||
use_backend bk_acme if { req.ssl_alpn acme-tls/1 }
|
use_backend bk_acme if { req.ssl_alpn acme-tls/1 }
|
||||||
default_backend bk_default
|
default_backend bk_default
|
||||||
|
|
||||||
|
req.ssl_cipherlist binary
|
||||||
|
Returns the binary form of the list of symmetric cipher options supported by
|
||||||
|
the client as reported in the contents of a TLS ClientHello. Note that this
|
||||||
|
only applies to raw contents found in the request buffer and not to contents
|
||||||
|
deciphered via an SSL data layer, so this will not work with "bind" lines
|
||||||
|
having the "ssl" option. Refer to "ssl_fc_cipherlist_bin" which is the SSL
|
||||||
|
bind equivalent that can be used when the "ssl" option is specified.
|
||||||
|
|
||||||
|
Examples :
|
||||||
|
# Wait for a client hello for at most 5 seconds
|
||||||
|
tcp-request inspect-delay 5s
|
||||||
|
tcp-request content accept if { req.ssl_hello_type 1 }
|
||||||
|
use-server fe3 if { req.ssl_cipherlist,be2hex(:,2),lower -m sub 1302:009f }
|
||||||
|
server fe3 ${htst_fe3_addr}:${htst_fe3_port}
|
||||||
|
|
||||||
req.ssl_ec_ext : boolean
|
req.ssl_ec_ext : boolean
|
||||||
Returns a boolean identifying if client sent the Supported Elliptic Curves
|
Returns a boolean identifying if client sent the Supported Elliptic Curves
|
||||||
Extension as defined in RFC4492, section 5.1. within the SSL ClientHello
|
Extension as defined in RFC4492, section 5.1. within the SSL ClientHello
|
||||||
@ -24953,6 +24968,37 @@ req_ssl_hello_type : integer (deprecated)
|
|||||||
option. This is mostly used in ACL to detect presence of an SSL hello message
|
option. This is mostly used in ACL to detect presence of an SSL hello message
|
||||||
that is supposed to contain an SSL session ID usable for stickiness.
|
that is supposed to contain an SSL session ID usable for stickiness.
|
||||||
|
|
||||||
|
req.ssl_keyshare_groups binary
|
||||||
|
Return the binary format of the list of cryptographic parameters for key exchange
|
||||||
|
supported by the client as reported in the TLS ClientHello. In TLS v1.3, keyshare
|
||||||
|
is part of the ClientHello message and is the final client hello extension. Note
|
||||||
|
that this only applies to raw contents found in the request buffer and not to
|
||||||
|
contents deciphered via an SSL data layer, so this will not work with "bind"
|
||||||
|
lines having the "ssl" option.
|
||||||
|
|
||||||
|
Examples :
|
||||||
|
# Wait for a client hello for at most 5 seconds
|
||||||
|
tcp-request inspect-delay 5s
|
||||||
|
tcp-request content accept if { req.ssl_hello_type 1 }
|
||||||
|
use-server fe3 if { req.ssl_keyshare_groups,be2hex(:,2),lower -m sub 001d }
|
||||||
|
server fe3 ${htst_fe3_addr}:${htst_fe3_port}
|
||||||
|
|
||||||
|
req.ssl_sigalgs binary
|
||||||
|
Returns the binary form of the list of signature algorithms supported by the
|
||||||
|
client as reported in the TLS ClientHello. This is available as a client hello
|
||||||
|
extension. Note that this only applies to raw contents found in the request
|
||||||
|
buffer and not to contents deciphered via an SSL data layer, so this will not
|
||||||
|
work with "bind" lines having the "ssl" option. Refer to "ssl_fc_sigalgs_bin"
|
||||||
|
which is the SSL bind equivalent that can be used when the "ssl" option is
|
||||||
|
specified.
|
||||||
|
|
||||||
|
Examples :
|
||||||
|
# Wait for a client hello for at most 5 seconds
|
||||||
|
tcp-request inspect-delay 5s
|
||||||
|
tcp-request content accept if { req.ssl_hello_type 1 }
|
||||||
|
use-server fe4 if { req.ssl_sigalgs,be2hex(:,2),lower -m sub 0403:0805 }
|
||||||
|
server fe4 ${htst_fe4_addr}:${htst_fe4_port}
|
||||||
|
|
||||||
req.ssl_sni : string
|
req.ssl_sni : string
|
||||||
req_ssl_sni : string (deprecated)
|
req_ssl_sni : string (deprecated)
|
||||||
Returns a string containing the value of the Server Name TLS extension sent
|
Returns a string containing the value of the Server Name TLS extension sent
|
||||||
@ -24980,51 +25026,16 @@ req_ssl_sni : string (deprecated)
|
|||||||
use_backend bk_allow if { req.ssl_sni -f allowed_sites }
|
use_backend bk_allow if { req.ssl_sni -f allowed_sites }
|
||||||
default_backend bk_sorry_page
|
default_backend bk_sorry_page
|
||||||
|
|
||||||
req.ssl_cipherlist binary
|
req.ssl_st_ext : integer
|
||||||
Returns the binary form of the list of symmetric cipher options supported by
|
Returns 0 if the client didn't send a SessionTicket TLS Extension (RFC5077)
|
||||||
the client as reported in the contents of a TLS ClientHello. Note that this
|
Returns 1 if the client sent SessionTicket TLS Extension
|
||||||
only applies to raw contents found in the request buffer and not to contents
|
Returns 2 if the client also sent non-zero length TLS SessionTicket
|
||||||
deciphered via an SSL data layer, so this will not work with "bind" lines
|
Note that this only applies to raw contents found in the request buffer and
|
||||||
having the "ssl" option. Refer to "ssl_fc_cipherlist_bin" which is the SSL
|
not to contents deciphered via an SSL data layer, so this will not work with
|
||||||
bind equivalent that can be used when the "ssl" option is specified.
|
"bind" lines having the "ssl" option. This can for example be used to detect
|
||||||
|
whether the client sent a SessionTicket or not and stick it accordingly, if
|
||||||
Examples :
|
no SessionTicket then stick on SessionID or don't stick as there's no server
|
||||||
# Wait for a client hello for at most 5 seconds
|
side state is there when SessionTickets are in use.
|
||||||
tcp-request inspect-delay 5s
|
|
||||||
tcp-request content accept if { req.ssl_hello_type 1 }
|
|
||||||
use-server fe3 if { req.ssl_cipherlist,be2hex(:,2),lower -m sub 1302:009f }
|
|
||||||
server fe3 ${htst_fe3_addr}:${htst_fe3_port}
|
|
||||||
|
|
||||||
req.ssl_sigalgs binary
|
|
||||||
Returns the binary form of the list of signature algorithms supported by the
|
|
||||||
client as reported in the TLS ClientHello. This is available as a client hello
|
|
||||||
extension. Note that this only applies to raw contents found in the request
|
|
||||||
buffer and not to contents deciphered via an SSL data layer, so this will not
|
|
||||||
work with "bind" lines having the "ssl" option. Refer to "ssl_fc_sigalgs_bin"
|
|
||||||
which is the SSL bind equivalent that can be used when the "ssl" option is
|
|
||||||
specified.
|
|
||||||
|
|
||||||
Examples :
|
|
||||||
# Wait for a client hello for at most 5 seconds
|
|
||||||
tcp-request inspect-delay 5s
|
|
||||||
tcp-request content accept if { req.ssl_hello_type 1 }
|
|
||||||
use-server fe4 if { req.ssl_sigalgs,be2hex(:,2),lower -m sub 0403:0805 }
|
|
||||||
server fe4 ${htst_fe4_addr}:${htst_fe4_port}
|
|
||||||
|
|
||||||
req.ssl_keyshare_groups binary
|
|
||||||
Return the binary format of the list of cryptographic parameters for key exchange
|
|
||||||
supported by the client as reported in the TLS ClientHello. In TLS v1.3, keyshare
|
|
||||||
is part of the ClientHello message and is the final client hello extension. Note
|
|
||||||
that this only applies to raw contents found in the request buffer and not to
|
|
||||||
contents deciphered via an SSL data layer, so this will not work with "bind"
|
|
||||||
lines having the "ssl" option.
|
|
||||||
|
|
||||||
Examples :
|
|
||||||
# Wait for a client hello for at most 5 seconds
|
|
||||||
tcp-request inspect-delay 5s
|
|
||||||
tcp-request content accept if { req.ssl_hello_type 1 }
|
|
||||||
use-server fe3 if { req.ssl_keyshare_groups,be2hex(:,2),lower -m sub 001d }
|
|
||||||
server fe3 ${htst_fe3_addr}:${htst_fe3_port}
|
|
||||||
|
|
||||||
req.ssl_supported_groups binary
|
req.ssl_supported_groups binary
|
||||||
Returns the binary form of the list of supported groups supported by the client
|
Returns the binary form of the list of supported groups supported by the client
|
||||||
@ -25042,17 +25053,6 @@ req.ssl_supported_groups binary
|
|||||||
use-server fe3 if { req.ssl_supported_groups, be2hex(:,2),lower -m sub 0017 }
|
use-server fe3 if { req.ssl_supported_groups, be2hex(:,2),lower -m sub 0017 }
|
||||||
server fe3 ${htst_fe3_addr}:${htst_fe3_port}
|
server fe3 ${htst_fe3_addr}:${htst_fe3_port}
|
||||||
|
|
||||||
req.ssl_st_ext : integer
|
|
||||||
Returns 0 if the client didn't send a SessionTicket TLS Extension (RFC5077)
|
|
||||||
Returns 1 if the client sent SessionTicket TLS Extension
|
|
||||||
Returns 2 if the client also sent non-zero length TLS SessionTicket
|
|
||||||
Note that this only applies to raw contents found in the request buffer and
|
|
||||||
not to contents deciphered via an SSL data layer, so this will not work with
|
|
||||||
"bind" lines having the "ssl" option. This can for example be used to detect
|
|
||||||
whether the client sent a SessionTicket or not and stick it accordingly, if
|
|
||||||
no SessionTicket then stick on SessionID or don't stick as there's no server
|
|
||||||
side state is there when SessionTickets are in use.
|
|
||||||
|
|
||||||
req.ssl_ver : integer
|
req.ssl_ver : integer
|
||||||
req_ssl_ver : integer (deprecated)
|
req_ssl_ver : integer (deprecated)
|
||||||
Returns an integer value containing the version of the SSL/TLS protocol of a
|
Returns an integer value containing the version of the SSL/TLS protocol of a
|
||||||
|
Loading…
Reference in New Issue
Block a user