blob: 6b9080c39e675aa2a9d3b4dbdc3ca8d391e4a2a6 [file] [log] [blame]
# sni.yaml
#
# This configuration file
# - sets the SSL actions to be performed based on the servername provided during SSL handhshake phase (SNI extension)
# - sets the SSL properties required to make SSL connection with the next hop or origin server.
#
# YAML-based Configuration file
# Format :
# Actions available:
# disable_h2 - removes H2 from the protocol list advertised by ATS; parameter required = None, parameters = true or false
# verify_client - sets the verification flag for verifying the client certificate; parameters = one of 'NONE', 'MODERATE' or 'STRICT'
# verify_origin_server - sets the verification flag for verifying the server certificate; parameters = one of 'NONE', 'MODERATE' or 'STRICT'
# client_cert - sets the client certificate to present to the server specified in dest_host; parameters = certificate file .
# The location of the certificate file is relative to proxy.config.ssl.server.cert.path directory.
# tunnel_route - sets the e2e tunnel route
# ip_allow - lists or range of client IP addresses, subnets that are allowed for this connection. This accepts CIDR format
# for subnet specification.
#
# Example:
# sni:
# - fqdn: one.com
# disable_h2: true
# verify_origin_server: STRICT
# client_cert: somepem.pem
# verify_client: MODERATE
# - fqdn: two.com
# tunnel_route: two.com
# ip_allow = '10.0.0.1-10.0.0.255'