You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/aleph/http.clj
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@
35
35
| `port` | the port the server will bind to. If `0`, the server will bind to a random port.
36
36
| `socket-address` | a `java.net.SocketAddress` specifying both the port and interface to bind to.
37
37
| `bootstrap-transform` | a function that takes an `io.netty.bootstrap.ServerBootstrap` object, which represents the server, and modifies it.
38
-
| `ssl-context` | an `io.netty.handler.ssl.SslContext` object if an SSL connection is desired |
38
+
| `ssl-context` | an `io.netty.handler.ssl.SslContext` object or a map of SSL context options (see `aleph.netty/ssl-server-context` for more details) if an SSL connection is desired |
39
39
| `manual-ssl?` | set to `true` to indicate that SSL is active, but the caller is managing it (this implies `:ssl-context` is nil). For example, this can be used if you want to use configure SNI (perhaps in `:pipeline-transform`) to select the SSL context based on the client's indicated host name. |
40
40
| `pipeline-transform` | a function that takes an `io.netty.channel.ChannelPipeline` object, which represents a connection, and modifies it.
41
41
| `executor` | a `java.util.concurrent.Executor` which is used to handle individual requests. To avoid this indirection you may specify `:none`, but in this case extreme care must be taken to avoid blocking operations on the handler's thread.
@@ -107,7 +107,7 @@
107
107
the `connection-options` are a map describing behavior across all connections:
108
108
109
109
|:---|:---
110
-
| `ssl-context` | an `io.netty.handler.ssl.SslContext` object, only required if a custom context is required
110
+
| `ssl-context` | an `io.netty.handler.ssl.SslContext` object or a map of SSL context options (see `aleph.netty/ssl-client-context` for more details), only required if a custom context is required
111
111
| `local-address` | an optional `java.net.SocketAddress` describing which local interface should be used
112
112
| `bootstrap-transform` | a function that takes an `io.netty.bootstrap.Bootstrap` object and modifies it.
113
113
| `pipeline-transform` | a function that takes an `io.netty.channel.ChannelPipeline` object, which represents a connection, and modifies it.
| `private-key` | a `java.io.File`, `java.io.InputStream`, or `java.security.PrivateKey` containing the client-side private key.
767
+
| `certificate-chain` | a `java.io.File`, `java.io.InputStream`, sequence of `java.security.cert.X509Certificate`, or array of `java.security.cert.X509Certificate` containing the client's certificate chain.
768
+
| `private-key-password` | a string, the private key's password (optional).
769
+
| `trust-store` | a `java.io.File`, `java.io.InputStream`, array of `java.security.cert.X509Certificate`, `javax.net.ssl.TrustManager`, or a `javax.net.ssl.TrustManagerFactory` to initialize the context's trust manager.
770
+
| `ssl-provider` | `SslContext` implementation to use, on of `:jdk`, `:openssl` or `:openssl-refcnt`. Note, that when using OpenSSL based implementations, the library should be installed and linked properly.
771
+
| `ciphers` | a sequence of strings, the cipher suites to enable, in the order of preference.
772
+
| `protocols` | a sequence of strings, the TLS protocol versions to enable.
773
+
| `session-cache-size` | the size of the cache used for storing SSL session objects.
774
+
| `session-timeout` | the timeout for the cached SSL session objects, in seconds.
775
+
Note that if specified, the types of `private-key` and `certificate-chain` must be \"compatible\": either both input streams, both files, or a private key and an array of certificates."
| `private-key` | a `java.io.File`, `java.io.InputStream`, or `java.security.PrivateKey` containing the server-side private key.
849
+
| `certificate-chain` | a `java.io.File`, `java.io.InputStream`, or array of `java.security.cert.X509Certificate` containing the server's certificate chain.
850
+
| `private-key-password` | a string, the private key's password (optional).
851
+
| `trust-store` | a `java.io.File`, `java.io.InputStream`, sequence of `java.security.cert.X509Certificate`, array of `java.security.cert.X509Certificate`, `javax.net.ssl.TrustManager`, or a `javax.net.ssl.TrustManagerFactory` to initialize the context's trust manager.
852
+
| `ssl-provider` | `SslContext` implementation to use, on of `:jdk`, `:openssl` or `:openssl-refcnt`. Note, that when using OpenSSL based implementations, the library should be installed and linked properly.
853
+
| `ciphers` | a sequence of strings, the cipher suites to enable, in the order of preference.
854
+
| `protocols` | a sequence of strings, the TLS protocol versions to enable.
855
+
| `session-cache-size` | the size of the cache used for storing SSL session objects.
856
+
| `session-timeout` | the timeout for the cached SSL session objects, in seconds.
857
+
| `start-tls` | if the first write request shouldn't be encrypted.
858
+
| `client-auth` | the client authentication mode, one of `:none`, `:optional` or `:require`.
859
+
Note that if specified, the types of `private-key` and `certificate-chain` must be \"compatible\": either both input streams, both files, or a private key and an array of certificates."
| `private-key` | A `java.io.File`, `java.io.InputStream`, or `java.security.PrivateKey` containing the client-side private key.
758
-
| `certificate-chain` | A `java.io.File`, `java.io.InputStream`, or array of `java.security.cert.X509Certificate` containing the client's certificate chain.
759
-
| `private-key-password` | A string, the private key's password (optional).
760
-
| `trust-store` | A `java.io.File`, `java.io.InputStream`, array of `java.security.cert.X509Certificate`, or a `javax.net.ssl.TrustManagerFactory` to initialize the context's trust manager.
761
-
762
-
Note that if specified, the types of `private-key` and `certificate-chain` must be
763
-
\"compatible\": either both input streams, both files, or a private key and an array
0 commit comments