From 53ab3b24afb7bb4e8522071a2a9d16b6c572ef43 Mon Sep 17 00:00:00 2001 From: ryepup <40441+ryepup@users.noreply.github.com> Date: Wed, 5 Mar 2025 14:08:29 +0000 Subject: [PATCH] update reference.json --- reference-lib/package-lock.json | 4 +-- reference-lib/package.json | 2 +- reference-lib/src/reference.json | 58 ++++++++++++++++---------------- 3 files changed, 32 insertions(+), 32 deletions(-) diff --git a/reference-lib/package-lock.json b/reference-lib/package-lock.json index 1584c34..e0de312 100644 --- a/reference-lib/package-lock.json +++ b/reference-lib/package-lock.json @@ -1,12 +1,12 @@ { "name": "@nginx/reference-lib", - "version": "1.1.10", + "version": "1.1.11", "lockfileVersion": 3, "requires": true, "packages": { "": { "name": "@nginx/reference-lib", - "version": "1.1.10", + "version": "1.1.11", "license": "Apache-2.0", "devDependencies": { "@rollup/plugin-json": "^6.1.0", diff --git a/reference-lib/package.json b/reference-lib/package.json index 981aad8..692498d 100644 --- a/reference-lib/package.json +++ b/reference-lib/package.json @@ -1,6 +1,6 @@ { "name": "@nginx/reference-lib", - "version": "1.1.10", + "version": "1.1.11", "description": "", "main": "dist/index.js", "type": "module", diff --git a/reference-lib/src/reference.json b/reference-lib/src/reference.json index 665b678..3e1bd99 100644 --- a/reference-lib/src/reference.json +++ b/reference-lib/src/reference.json @@ -4050,8 +4050,8 @@ "

on | off

\n" ], "isBlock": false, - "description_md": "Determines whether SSL sessions can be reused when working with\nthe gRPC server.\nIf the errors\n“`SSL3_GET_FINISHED:digest check failed`”\nappear in the logs, try disabling session reuse.", - "description_html": "

Determines whether SSL sessions can be reused when working with\nthe gRPC server.\nIf the errors\n“SSL3_GET_FINISHED:digest check failed”\nappear in the logs, try disabling session reuse.

\n" + "description_md": "Determines whether SSL sessions can be reused when working with\nthe gRPC server.\nIf the errors\n“`digest check failed`”\nappear in the logs, try disabling session reuse.", + "description_html": "

Determines whether SSL sessions can be reused when working with\nthe gRPC server.\nIf the errors\n“digest check failed”\nappear in the logs, try disabling session reuse.

\n" }, { "name": "grpc_ssl_trusted_certificate", @@ -7081,8 +7081,8 @@ "

on | off

\n" ], "isBlock": false, - "description_md": "Determines whether SSL sessions can be reused when working with\nthe proxied server.\nIf the errors\n“`SSL3_GET_FINISHED:digest check failed`”\nappear in the logs, try disabling session reuse.", - "description_html": "

Determines whether SSL sessions can be reused when working with\nthe proxied server.\nIf the errors\n“SSL3_GET_FINISHED:digest check failed”\nappear in the logs, try disabling session reuse.

\n" + "description_md": "Determines whether SSL sessions can be reused when working with\nthe proxied server.\nIf the errors\n“`digest check failed`”\nappear in the logs, try disabling session reuse.", + "description_html": "

Determines whether SSL sessions can be reused when working with\nthe proxied server.\nIf the errors\n“digest check failed”\nappear in the logs, try disabling session reuse.

\n" }, { "name": "proxy_ssl_trusted_certificate", @@ -8707,8 +8707,8 @@ "

file

\n" ], "isBlock": false, - "description_md": "Specifies a *`file`* with the certificate in the PEM format\nfor the given virtual server.\nIf intermediate certificates should be specified in addition to a primary\ncertificate, they should be specified in the same file in the following\norder: the primary certificate comes first, then the intermediate certificates.\nA secret key in the PEM format may be placed in the same file.\n\nSince version 1.11.0,\nthis directive can be specified multiple times\nto load certificates of different types, for example, RSA and ECDSA:\n```\nserver {\n listen 443 ssl;\n server_name example.com;\n\n ssl_certificate example.com.rsa.crt;\n ssl_certificate_key example.com.rsa.key;\n\n ssl_certificate example.com.ecdsa.crt;\n ssl_certificate_key example.com.ecdsa.key;\n\n ...\n}\n```\n> Only OpenSSL 1.0.2 or higher supports separate\n> [certificate chains](https://nginx.org/en/docs/http/configuring_https_servers.html#chains)\n> for different certificates.\n> With older versions, only one certificate chain can be used.\n\nSince version 1.15.9, variables can be used in the *`file`* name\nwhen using OpenSSL 1.0.2 or higher:\n```\nssl_certificate $ssl_server_name.crt;\nssl_certificate_key $ssl_server_name.key;\n```\nNote that using variables implies that\na certificate will be loaded for each SSL handshake,\nand this may have a negative impact on performance.\n\nThe value\n`data`:*`$variable`*\ncan be specified instead of the *`file`* (1.15.10),\nwhich loads a certificate from a variable\nwithout using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\n[error log](https://nginx.org/en/docs/ngx_core_module.html#error_log).\n\nIt should be kept in mind that due to the HTTPS protocol limitations\nfor maximum interoperability virtual servers should listen on\n[different IP addresses](https://nginx.org/en/docs/http/configuring_https_servers.html#name_based_https_servers).", - "description_html": "

Specifies a file with the certificate in the PEM format\nfor the given virtual server.\nIf intermediate certificates should be specified in addition to a primary\ncertificate, they should be specified in the same file in the following\norder: the primary certificate comes first, then the intermediate certificates.\nA secret key in the PEM format may be placed in the same file.

\n\n

Since version 1.11.0,\nthis directive can be specified multiple times\nto load certificates of different types, for example, RSA and ECDSA:

\n\n
server {\n    listen              443 ssl;\n    server_name         example.com;\n\n    ssl_certificate     example.com.rsa.crt;\n    ssl_certificate_key example.com.rsa.key;\n\n    ssl_certificate     example.com.ecdsa.crt;\n    ssl_certificate_key example.com.ecdsa.key;\n\n    ...\n}\n
\n\n
\n

Only OpenSSL 1.0.2 or higher supports separate\ncertificate chains\nfor different certificates.\nWith older versions, only one certificate chain can be used.

\n
\n\n

Since version 1.15.9, variables can be used in the file name\nwhen using OpenSSL 1.0.2 or higher:

\n\n
ssl_certificate     $ssl_server_name.crt;\nssl_certificate_key $ssl_server_name.key;\n
\n\n

Note that using variables implies that\na certificate will be loaded for each SSL handshake,\nand this may have a negative impact on performance.

\n\n

The value\ndata:$variable\ncan be specified instead of the file (1.15.10),\nwhich loads a certificate from a variable\nwithout using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\nerror log.

\n\n

It should be kept in mind that due to the HTTPS protocol limitations\nfor maximum interoperability virtual servers should listen on\ndifferent IP addresses.

\n" + "description_md": "Specifies a *`file`* with the certificate in the PEM format\nfor the given virtual server.\nIf intermediate certificates should be specified in addition to a primary\ncertificate, they should be specified in the same file in the following\norder: the primary certificate comes first, then the intermediate certificates.\nA secret key in the PEM format may be placed in the same file.\n\nSince version 1.11.0,\nthis directive can be specified multiple times\nto load certificates of different types, for example, RSA and ECDSA:\n```\nserver {\n listen 443 ssl;\n server_name example.com;\n\n ssl_certificate example.com.rsa.crt;\n ssl_certificate_key example.com.rsa.key;\n\n ssl_certificate example.com.ecdsa.crt;\n ssl_certificate_key example.com.ecdsa.key;\n\n ...\n}\n```\n> Only OpenSSL 1.0.2 or higher supports separate\n> [certificate chains](https://nginx.org/en/docs/http/configuring_https_servers.html#chains)\n> for different certificates.\n> With older versions, only one certificate chain can be used.\n\nSince version 1.15.9, variables can be used in the *`file`* name\nwhen using OpenSSL 1.0.2 or higher:\n```\nssl_certificate $ssl_server_name.crt;\nssl_certificate_key $ssl_server_name.key;\n```\nNote that using variables implies that\na certificate will be loaded for each SSL handshake,\nand this may have a negative impact on performance.\n\nThe value\n`data`:*`$variable`*\ncan be specified instead of the *`file`* (1.15.10),\nwhich loads a certificate from a variable\nwithout using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\n[error log](https://nginx.org/en/docs/ngx_core_module.html#error_log).\n\nIt should be kept in mind that due to the SSL/TLS protocol limitations,\nfor maximum interoperability with clients that do not use\n[SNI](http://en.wikipedia.org/wiki/Server_Name_Indication),\nvirtual servers with different certificates should listen on\n[different IP addresses](https://nginx.org/en/docs/http/configuring_https_servers.html#name_based_https_servers).", + "description_html": "

Specifies a file with the certificate in the PEM format\nfor the given virtual server.\nIf intermediate certificates should be specified in addition to a primary\ncertificate, they should be specified in the same file in the following\norder: the primary certificate comes first, then the intermediate certificates.\nA secret key in the PEM format may be placed in the same file.

\n\n

Since version 1.11.0,\nthis directive can be specified multiple times\nto load certificates of different types, for example, RSA and ECDSA:

\n\n
server {\n    listen              443 ssl;\n    server_name         example.com;\n\n    ssl_certificate     example.com.rsa.crt;\n    ssl_certificate_key example.com.rsa.key;\n\n    ssl_certificate     example.com.ecdsa.crt;\n    ssl_certificate_key example.com.ecdsa.key;\n\n    ...\n}\n
\n\n
\n

Only OpenSSL 1.0.2 or higher supports separate\ncertificate chains\nfor different certificates.\nWith older versions, only one certificate chain can be used.

\n
\n\n

Since version 1.15.9, variables can be used in the file name\nwhen using OpenSSL 1.0.2 or higher:

\n\n
ssl_certificate     $ssl_server_name.crt;\nssl_certificate_key $ssl_server_name.key;\n
\n\n

Note that using variables implies that\na certificate will be loaded for each SSL handshake,\nand this may have a negative impact on performance.

\n\n

The value\ndata:$variable\ncan be specified instead of the file (1.15.10),\nwhich loads a certificate from a variable\nwithout using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\nerror log.

\n\n

It should be kept in mind that due to the SSL/TLS protocol limitations,\nfor maximum interoperability with clients that do not use\nSNI,\nvirtual servers with different certificates should listen on\ndifferent IP addresses.

\n" }, { "name": "ssl_certificate_cache", @@ -8913,8 +8913,8 @@ "

off | [shared:name:size]

\n" ], "isBlock": false, - "description_md": "Sets `name` and `size` of the cache\nthat stores client certificates status for OCSP validation.\nThe cache is shared between all worker processes.\nA cache with the same name can be used in several virtual servers.\n\nThe `off` parameter prohibits the use of the cache.", - "description_html": "

Sets name and size of the cache\nthat stores client certificates status for OCSP validation.\nThe cache is shared between all worker processes.\nA cache with the same name can be used in several virtual servers.

\n\n

The off parameter prohibits the use of the cache.

\n" + "description_md": "Sets `name` and `size` of the cache\nthat stores client certificates status for OCSP validation.\nThe cache is shared between all worker processes.\nA cache with the same name can be used in several\nvirtual servers.\n\nThe `off` parameter prohibits the use of the cache.", + "description_html": "

Sets name and size of the cache\nthat stores client certificates status for OCSP validation.\nThe cache is shared between all worker processes.\nA cache with the same name can be used in several\nvirtual servers.

\n\n

The off parameter prohibits the use of the cache.

\n" }, { "name": "ssl_ocsp_responder", @@ -8964,8 +8964,8 @@ "

on | off

\n" ], "isBlock": false, - "description_md": "Specifies that server ciphers should be preferred over client\nciphers when using the SSLv3 and TLS protocols.", - "description_html": "

Specifies that server ciphers should be preferred over client\nciphers when using the SSLv3 and TLS protocols.

\n" + "description_md": "Specifies that server ciphers should be preferred over client ciphers\nwhen the SSLv3 and TLS protocols are used.", + "description_html": "

Specifies that server ciphers should be preferred over client ciphers\nwhen the SSLv3 and TLS protocols are used.

\n" }, { "name": "ssl_protocols", @@ -9015,8 +9015,8 @@ "

off | none | [builtin[:size]] [shared:name:size]

\n" ], "isBlock": false, - "description_md": "Sets the types and sizes of caches that store session parameters.\nA cache can be of any of the following types:\n- `off`\n\n the use of a session cache is strictly prohibited:\n nginx explicitly tells a client that sessions may not be reused.\n- `none`\n\n the use of a session cache is gently disallowed:\n nginx tells a client that sessions may be reused, but does not\n actually store session parameters in the cache.\n- `builtin`\n\n a cache built in OpenSSL; used by one worker process only.\n The cache size is specified in sessions.\n If size is not given, it is equal to 20480 sessions.\n Use of the built-in cache can cause memory fragmentation.\n- `shared`\n\n a cache shared between all worker processes.\n The cache size is specified in bytes; one megabyte can store\n about 4000 sessions.\n Each shared cache should have an arbitrary name.\n A cache with the same name can be used in several virtual servers.\n It is also used to automatically generate, store, and\n periodically rotate TLS session ticket keys (1.23.2)\n unless configured explicitly\n using the [`ssl_session_ticket_key`](https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_ticket_key) directive.\n\nBoth cache types can be used simultaneously, for example:\n```\nssl_session_cache builtin:1000 shared:SSL:10m;\n```\nbut using only shared cache without the built-in cache should\nbe more efficient.", - "description_html": "

Sets the types and sizes of caches that store session parameters.\nA cache can be of any of the following types:

\n\n\n\n

Both cache types can be used simultaneously, for example:

\n\n
ssl_session_cache builtin:1000 shared:SSL:10m;\n
\n\n

but using only shared cache without the built-in cache should\nbe more efficient.

\n" + "description_md": "Sets the types and sizes of caches that store session parameters.\nA cache can be of any of the following types:\n- `off`\n\n the use of a session cache is strictly prohibited:\n nginx explicitly tells a client that sessions may not be reused.\n- `none`\n\n the use of a session cache is gently disallowed:\n nginx tells a client that sessions may be reused, but does not\n actually store session parameters in the cache.\n- `builtin`\n\n a cache built in OpenSSL; used by one worker process only.\n The cache size is specified in sessions.\n If size is not given, it is equal to 20480 sessions.\n Use of the built-in cache can cause memory fragmentation.\n- `shared`\n\n a cache shared between all worker processes.\n The cache size is specified in bytes; one megabyte can store\n about 4000 sessions.\n Each shared cache should have an arbitrary name.\n A cache with the same name can be used in several\n virtual servers.\n It is also used to automatically generate, store, and\n periodically rotate TLS session ticket keys (1.23.2)\n unless configured explicitly\n using the [`ssl_session_ticket_key`](https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_ticket_key) directive.\n\nBoth cache types can be used simultaneously, for example:\n```\nssl_session_cache builtin:1000 shared:SSL:10m;\n```\nbut using only shared cache without the built-in cache should\nbe more efficient.", + "description_html": "

Sets the types and sizes of caches that store session parameters.\nA cache can be of any of the following types:

\n\n\n\n

Both cache types can be used simultaneously, for example:

\n\n
ssl_session_cache builtin:1000 shared:SSL:10m;\n
\n\n

but using only shared cache without the built-in cache should\nbe more efficient.

\n" }, { "name": "ssl_session_ticket_key", @@ -11109,8 +11109,8 @@ "

on | off

\n" ], "isBlock": false, - "description_md": "Determines whether SSL sessions can be reused when working with\na secured uwsgi server.\nIf the errors\n“`SSL3_GET_FINISHED:digest check failed`”\nappear in the logs, try disabling session reuse.", - "description_html": "

Determines whether SSL sessions can be reused when working with\na secured uwsgi server.\nIf the errors\n“SSL3_GET_FINISHED:digest check failed”\nappear in the logs, try disabling session reuse.

\n" + "description_md": "Determines whether SSL sessions can be reused when working with\na secured uwsgi server.\nIf the errors\n“`digest check failed`”\nappear in the logs, try disabling session reuse.", + "description_html": "

Determines whether SSL sessions can be reused when working with\na secured uwsgi server.\nIf the errors\n“digest check failed”\nappear in the logs, try disabling session reuse.

\n" }, { "name": "uwsgi_ssl_trusted_certificate", @@ -12321,8 +12321,8 @@ "

file

\n" ], "isBlock": false, - "description_md": "Specifies a *`file`* with the certificate in the PEM format\nfor the given server.\nIf intermediate certificates should be specified in addition to a primary\ncertificate, they should be specified in the same file in the following\norder: the primary certificate comes first, then the intermediate certificates.\nA secret key in the PEM format may be placed in the same file.\n\nSince version 1.11.0,\nthis directive can be specified multiple times\nto load certificates of different types, for example, RSA and ECDSA:\n```\nserver {\n listen 993 ssl;\n\n ssl_certificate example.com.rsa.crt;\n ssl_certificate_key example.com.rsa.key;\n\n ssl_certificate example.com.ecdsa.crt;\n ssl_certificate_key example.com.ecdsa.key;\n\n ...\n}\n```\n> Only OpenSSL 1.0.2 or higher supports separate certificate chains\n> for different certificates.\n> With older versions, only one certificate chain can be used.\n\nThe value\n`data`:*`certificate`*\ncan be specified instead of the *`file`* (1.15.10),\nwhich loads a certificate without using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\n[error log](https://nginx.org/en/docs/ngx_core_module.html#error_log).", - "description_html": "

Specifies a file with the certificate in the PEM format\nfor the given server.\nIf intermediate certificates should be specified in addition to a primary\ncertificate, they should be specified in the same file in the following\norder: the primary certificate comes first, then the intermediate certificates.\nA secret key in the PEM format may be placed in the same file.

\n\n

Since version 1.11.0,\nthis directive can be specified multiple times\nto load certificates of different types, for example, RSA and ECDSA:

\n\n
server {\n    listen              993 ssl;\n\n    ssl_certificate     example.com.rsa.crt;\n    ssl_certificate_key example.com.rsa.key;\n\n    ssl_certificate     example.com.ecdsa.crt;\n    ssl_certificate_key example.com.ecdsa.key;\n\n    ...\n}\n
\n\n
\n

Only OpenSSL 1.0.2 or higher supports separate certificate chains\nfor different certificates.\nWith older versions, only one certificate chain can be used.

\n
\n\n

The value\ndata:certificate\ncan be specified instead of the file (1.15.10),\nwhich loads a certificate without using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\nerror log.

\n" + "description_md": "Specifies a *`file`* with the certificate in the PEM format\nfor the given server.\nIf intermediate certificates should be specified in addition to a primary\ncertificate, they should be specified in the same file in the following\norder: the primary certificate comes first, then the intermediate certificates.\nA secret key in the PEM format may be placed in the same file.\n\nSince version 1.11.0,\nthis directive can be specified multiple times\nto load certificates of different types, for example, RSA and ECDSA:\n```\nserver {\n listen 993 ssl;\n\n ssl_certificate example.com.rsa.crt;\n ssl_certificate_key example.com.rsa.key;\n\n ssl_certificate example.com.ecdsa.crt;\n ssl_certificate_key example.com.ecdsa.key;\n\n ...\n}\n```\n> Only OpenSSL 1.0.2 or higher supports separate\n> [certificate chains](https://nginx.org/en/docs/http/configuring_https_servers.html#chains)\n> for different certificates.\n> With older versions, only one certificate chain can be used.\n\nThe value\n`data`:*`certificate`*\ncan be specified instead of the *`file`* (1.15.10),\nwhich loads a certificate\nwithout using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\n[error log](https://nginx.org/en/docs/ngx_core_module.html#error_log).", + "description_html": "

Specifies a file with the certificate in the PEM format\nfor the given server.\nIf intermediate certificates should be specified in addition to a primary\ncertificate, they should be specified in the same file in the following\norder: the primary certificate comes first, then the intermediate certificates.\nA secret key in the PEM format may be placed in the same file.

\n\n

Since version 1.11.0,\nthis directive can be specified multiple times\nto load certificates of different types, for example, RSA and ECDSA:

\n\n
server {\n    listen              993 ssl;\n\n    ssl_certificate     example.com.rsa.crt;\n    ssl_certificate_key example.com.rsa.key;\n\n    ssl_certificate     example.com.ecdsa.crt;\n    ssl_certificate_key example.com.ecdsa.key;\n\n    ...\n}\n
\n\n
\n

Only OpenSSL 1.0.2 or higher supports separate\ncertificate chains\nfor different certificates.\nWith older versions, only one certificate chain can be used.

\n
\n\n

The value\ndata:certificate\ncan be specified instead of the file (1.15.10),\nwhich loads a certificate\nwithout using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\nerror log.

\n" }, { "name": "ssl_certificate_key", @@ -15075,8 +15075,8 @@ "

on | off

\n" ], "isBlock": false, - "description_md": "Determines whether SSL sessions can be reused when working with\nthe proxied server.\nIf the errors\n“`SSL3_GET_FINISHED:digest check failed`”\nappear in the logs, try disabling session reuse.", - "description_html": "

Determines whether SSL sessions can be reused when working with\nthe proxied server.\nIf the errors\n“SSL3_GET_FINISHED:digest check failed”\nappear in the logs, try disabling session reuse.

\n" + "description_md": "Determines whether SSL sessions can be reused when working with\nthe proxied server.\nIf the errors\n“`digest check failed`”\nappear in the logs, try disabling session reuse.", + "description_html": "

Determines whether SSL sessions can be reused when working with\nthe proxied server.\nIf the errors\n“digest check failed”\nappear in the logs, try disabling session reuse.

\n" }, { "name": "proxy_ssl_trusted_certificate", @@ -15301,8 +15301,8 @@ "

file

\n" ], "isBlock": false, - "description_md": "Specifies a *`file`* with the certificate in the PEM format\nfor the given server.\nIf intermediate certificates should be specified in addition to a primary\ncertificate, they should be specified in the same file in the following\norder: the primary certificate comes first, then the intermediate certificates.\nA secret key in the PEM format may be placed in the same file.\n\nSince version 1.11.0,\nthis directive can be specified multiple times\nto load certificates of different types, for example, RSA and ECDSA:\n```\nserver {\n listen 12345 ssl;\n\n ssl_certificate example.com.rsa.crt;\n ssl_certificate_key example.com.rsa.key;\n\n ssl_certificate example.com.ecdsa.crt;\n ssl_certificate_key example.com.ecdsa.key;\n\n ...\n}\n```\n> Only OpenSSL 1.0.2 or higher supports separate certificate chains\n> for different certificates.\n> With older versions, only one certificate chain can be used.\n\nSince version 1.15.9, variables can be used in the *`file`* name\nwhen using OpenSSL 1.0.2 or higher:\n```\nssl_certificate $ssl_server_name.crt;\nssl_certificate_key $ssl_server_name.key;\n```\nNote that using variables implies that\na certificate will be loaded for each SSL handshake,\nand this may have a negative impact on performance.\n\nThe value\n`data`:*`$variable`*\ncan be specified instead of the *`file`* (1.15.10),\nwhich loads a certificate from a variable without using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\n[error log](https://nginx.org/en/docs/ngx_core_module.html#error_log).", - "description_html": "

Specifies a file with the certificate in the PEM format\nfor the given server.\nIf intermediate certificates should be specified in addition to a primary\ncertificate, they should be specified in the same file in the following\norder: the primary certificate comes first, then the intermediate certificates.\nA secret key in the PEM format may be placed in the same file.

\n\n

Since version 1.11.0,\nthis directive can be specified multiple times\nto load certificates of different types, for example, RSA and ECDSA:

\n\n
server {\n    listen              12345 ssl;\n\n    ssl_certificate     example.com.rsa.crt;\n    ssl_certificate_key example.com.rsa.key;\n\n    ssl_certificate     example.com.ecdsa.crt;\n    ssl_certificate_key example.com.ecdsa.key;\n\n    ...\n}\n
\n\n
\n

Only OpenSSL 1.0.2 or higher supports separate certificate chains\nfor different certificates.\nWith older versions, only one certificate chain can be used.

\n
\n\n

Since version 1.15.9, variables can be used in the file name\nwhen using OpenSSL 1.0.2 or higher:

\n\n
ssl_certificate     $ssl_server_name.crt;\nssl_certificate_key $ssl_server_name.key;\n
\n\n

Note that using variables implies that\na certificate will be loaded for each SSL handshake,\nand this may have a negative impact on performance.

\n\n

The value\ndata:$variable\ncan be specified instead of the file (1.15.10),\nwhich loads a certificate from a variable without using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\nerror log.

\n" + "description_md": "Specifies a *`file`* with the certificate in the PEM format\nfor the given virtual server.\nIf intermediate certificates should be specified in addition to a primary\ncertificate, they should be specified in the same file in the following\norder: the primary certificate comes first, then the intermediate certificates.\nA secret key in the PEM format may be placed in the same file.\n\nSince version 1.11.0,\nthis directive can be specified multiple times\nto load certificates of different types, for example, RSA and ECDSA:\n```\nserver {\n listen 12345 ssl;\n\n ssl_certificate example.com.rsa.crt;\n ssl_certificate_key example.com.rsa.key;\n\n ssl_certificate example.com.ecdsa.crt;\n ssl_certificate_key example.com.ecdsa.key;\n\n ...\n}\n```\n> Only OpenSSL 1.0.2 or higher supports separate\n> [certificate chains](https://nginx.org/en/docs/http/configuring_https_servers.html#chains)\n> for different certificates.\n> With older versions, only one certificate chain can be used.\n\nSince version 1.15.9, variables can be used in the *`file`* name\nwhen using OpenSSL 1.0.2 or higher:\n```\nssl_certificate $ssl_server_name.crt;\nssl_certificate_key $ssl_server_name.key;\n```\nNote that using variables implies that\na certificate will be loaded for each SSL handshake,\nand this may have a negative impact on performance.\n\nThe value\n`data`:*`$variable`*\ncan be specified instead of the *`file`* (1.15.10),\nwhich loads a certificate from a variable\nwithout using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\n[error log](https://nginx.org/en/docs/ngx_core_module.html#error_log).\n\nIt should be kept in mind that due to the SSL/TLS protocol limitations,\nfor maximum interoperability with clients that do not use\n[SNI](http://en.wikipedia.org/wiki/Server_Name_Indication),\nvirtual servers with different certificates should listen on\n[different IP addresses](https://nginx.org/en/docs/http/configuring_https_servers.html#name_based_https_servers).", + "description_html": "

Specifies a file with the certificate in the PEM format\nfor the given virtual server.\nIf intermediate certificates should be specified in addition to a primary\ncertificate, they should be specified in the same file in the following\norder: the primary certificate comes first, then the intermediate certificates.\nA secret key in the PEM format may be placed in the same file.

\n\n

Since version 1.11.0,\nthis directive can be specified multiple times\nto load certificates of different types, for example, RSA and ECDSA:

\n\n
server {\n    listen              12345 ssl;\n\n    ssl_certificate     example.com.rsa.crt;\n    ssl_certificate_key example.com.rsa.key;\n\n    ssl_certificate     example.com.ecdsa.crt;\n    ssl_certificate_key example.com.ecdsa.key;\n\n    ...\n}\n
\n\n
\n

Only OpenSSL 1.0.2 or higher supports separate\ncertificate chains\nfor different certificates.\nWith older versions, only one certificate chain can be used.

\n
\n\n

Since version 1.15.9, variables can be used in the file name\nwhen using OpenSSL 1.0.2 or higher:

\n\n
ssl_certificate     $ssl_server_name.crt;\nssl_certificate_key $ssl_server_name.key;\n
\n\n

Note that using variables implies that\na certificate will be loaded for each SSL handshake,\nand this may have a negative impact on performance.

\n\n

The value\ndata:$variable\ncan be specified instead of the file (1.15.10),\nwhich loads a certificate from a variable\nwithout using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\nerror log.

\n\n

It should be kept in mind that due to the SSL/TLS protocol limitations,\nfor maximum interoperability with clients that do not use\nSNI,\nvirtual servers with different certificates should listen on\ndifferent IP addresses.

\n" }, { "name": "ssl_certificate_cache", @@ -15337,8 +15337,8 @@ "

file

\n" ], "isBlock": false, - "description_md": "Specifies a *`file`* with the secret key in the PEM format\nfor the given server.\n\nThe value\n`engine`:*`name`*:*`id`*\ncan be specified instead of the *`file`*,\nwhich loads a secret key with a specified *`id`*\nfrom the OpenSSL engine *`name`*.\n\nThe value\n`data`:*`$variable`*\ncan be specified instead of the *`file`* (1.15.10),\nwhich loads a secret key from a variable without using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\n[error log](https://nginx.org/en/docs/ngx_core_module.html#error_log).\n\nSince version 1.15.9, variables can be used in the *`file`* name\nwhen using OpenSSL 1.0.2 or higher.", - "description_html": "

Specifies a file with the secret key in the PEM format\nfor the given server.

\n\n

The value\nengine:name:id\ncan be specified instead of the file,\nwhich loads a secret key with a specified id\nfrom the OpenSSL engine name.

\n\n

The value\ndata:$variable\ncan be specified instead of the file (1.15.10),\nwhich loads a secret key from a variable without using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\nerror log.

\n\n

Since version 1.15.9, variables can be used in the file name\nwhen using OpenSSL 1.0.2 or higher.

\n" + "description_md": "Specifies a *`file`* with the secret key in the PEM format\nfor the given virtual server.\n\nThe value\n`engine`:*`name`*:*`id`*\ncan be specified instead of the *`file`*,\nwhich loads a secret key with a specified *`id`*\nfrom the OpenSSL engine *`name`*.\n\nThe value\n`data`:*`$variable`*\ncan be specified instead of the *`file`* (1.15.10),\nwhich loads a secret key from a variable without using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\n[error log](https://nginx.org/en/docs/ngx_core_module.html#error_log).\n\nSince version 1.15.9, variables can be used in the *`file`* name\nwhen using OpenSSL 1.0.2 or higher.", + "description_html": "

Specifies a file with the secret key in the PEM format\nfor the given virtual server.

\n\n

The value\nengine:name:id\ncan be specified instead of the file,\nwhich loads a secret key with a specified id\nfrom the OpenSSL engine name.

\n\n

The value\ndata:$variable\ncan be specified instead of the file (1.15.10),\nwhich loads a secret key from a variable without using intermediate files.\nNote that inappropriate use of this syntax may have its security implications,\nsuch as writing secret key data to\nerror log.

\n\n

Since version 1.15.9, variables can be used in the file name\nwhen using OpenSSL 1.0.2 or higher.

\n" }, { "name": "ssl_ciphers", @@ -15507,8 +15507,8 @@ "

off | [shared:name:size]

\n" ], "isBlock": false, - "description_md": "Sets `name` and `size` of the cache\nthat stores client certificates status for OCSP validation.\nThe cache is shared between all worker processes.\nA cache with the same name can be used in several virtual servers.\n\nThe `off` parameter prohibits the use of the cache.", - "description_html": "

Sets name and size of the cache\nthat stores client certificates status for OCSP validation.\nThe cache is shared between all worker processes.\nA cache with the same name can be used in several virtual servers.

\n\n

The off parameter prohibits the use of the cache.

\n" + "description_md": "Sets `name` and `size` of the cache\nthat stores client certificates status for OCSP validation.\nThe cache is shared between all worker processes.\nA cache with the same name can be used in several\nvirtual servers.\n\nThe `off` parameter prohibits the use of the cache.", + "description_html": "

Sets name and size of the cache\nthat stores client certificates status for OCSP validation.\nThe cache is shared between all worker processes.\nA cache with the same name can be used in several\nvirtual servers.

\n\n

The off parameter prohibits the use of the cache.

\n" }, { "name": "ssl_ocsp_responder", @@ -15575,8 +15575,8 @@ "

[SSLv2] [SSLv3] [TLSv1] [TLSv1.1] [TLSv1.2] [TLSv1.3]

\n" ], "isBlock": false, - "description_md": "Enables the specified protocols.\n\nIf the directive is specified\non the [`server`](https://nginx.org/en/docs/stream/ngx_stream_core_module.html#server) level,\nthe value from the default server can be used.\n\n> The `TLSv1.1` and `TLSv1.2` parameters work\n> only when OpenSSL 1.0.1 or higher is used.\n\n> The `TLSv1.3` parameter (1.13.0) works only when\n> OpenSSL 1.1.1 or higher is used.\n\n> The `TLSv1.3` parameter is used by default\n> since 1.23.4.", - "description_html": "

Enables the specified protocols.

\n\n

If the directive is specified\non the server level,\nthe value from the default server can be used.

\n\n
\n

The TLSv1.1 and TLSv1.2 parameters work\nonly when OpenSSL 1.0.1 or higher is used.

\n\n

The TLSv1.3 parameter (1.13.0) works only when\nOpenSSL 1.1.1 or higher is used.

\n\n

The TLSv1.3 parameter is used by default\nsince 1.23.4.

\n
\n" + "description_md": "Enables the specified protocols.\n\nIf the directive is specified\non the [`server`](https://nginx.org/en/docs/stream/ngx_stream_core_module.html#server) level,\nthe value from the default server can be used.\nDetails are provided in the\n“[Virtual server selection](https://nginx.org/en/docs/http/server_names.html#virtual_server_selection)” section.\n\n> The `TLSv1.1` and `TLSv1.2` parameters\n> work only when OpenSSL 1.0.1 or higher is used.\n\n> The `TLSv1.3` parameter (1.13.0) works only when\n> OpenSSL 1.1.1 or higher is used.\n\n> The `TLSv1.3` parameter is used by default\n> since 1.23.4.", + "description_html": "

Enables the specified protocols.

\n\n

If the directive is specified\non the server level,\nthe value from the default server can be used.\nDetails are provided in the\n“Virtual server selection” section.

\n\n
\n

The TLSv1.1 and TLSv1.2 parameters\nwork only when OpenSSL 1.0.1 or higher is used.

\n\n

The TLSv1.3 parameter (1.13.0) works only when\nOpenSSL 1.1.1 or higher is used.

\n\n

The TLSv1.3 parameter is used by default\nsince 1.23.4.

\n
\n" }, { "name": "ssl_reject_handshake", @@ -15609,8 +15609,8 @@ "

off | none | [builtin[:size]] [shared:name:size]

\n" ], "isBlock": false, - "description_md": "Sets the types and sizes of caches that store session parameters.\nA cache can be of any of the following types:\n- `off`\n\n the use of a session cache is strictly prohibited:\n nginx explicitly tells a client that sessions may not be reused.\n- `none`\n\n the use of a session cache is gently disallowed:\n nginx tells a client that sessions may be reused, but does not\n actually store session parameters in the cache.\n- `builtin`\n\n a cache built in OpenSSL; used by one worker process only.\n The cache size is specified in sessions.\n If size is not given, it is equal to 20480 sessions.\n Use of the built-in cache can cause memory fragmentation.\n- `shared`\n\n a cache shared between all worker processes.\n The cache size is specified in bytes; one megabyte can store\n about 4000 sessions.\n Each shared cache should have an arbitrary name.\n A cache with the same name can be used in several\n servers.\n It is also used to automatically generate, store, and\n periodically rotate TLS session ticket keys (1.23.2)\n unless configured explicitly\n using the [`ssl_session_ticket_key`](https://nginx.org/en/docs/stream/ngx_stream_ssl_module.html#ssl_session_ticket_key) directive.\n\nBoth cache types can be used simultaneously, for example:\n```\nssl_session_cache builtin:1000 shared:SSL:10m;\n```\nbut using only shared cache without the built-in cache should\nbe more efficient.", - "description_html": "

Sets the types and sizes of caches that store session parameters.\nA cache can be of any of the following types:

\n\n\n\n

Both cache types can be used simultaneously, for example:

\n\n
ssl_session_cache builtin:1000 shared:SSL:10m;\n
\n\n

but using only shared cache without the built-in cache should\nbe more efficient.

\n" + "description_md": "Sets the types and sizes of caches that store session parameters.\nA cache can be of any of the following types:\n- `off`\n\n the use of a session cache is strictly prohibited:\n nginx explicitly tells a client that sessions may not be reused.\n- `none`\n\n the use of a session cache is gently disallowed:\n nginx tells a client that sessions may be reused, but does not\n actually store session parameters in the cache.\n- `builtin`\n\n a cache built in OpenSSL; used by one worker process only.\n The cache size is specified in sessions.\n If size is not given, it is equal to 20480 sessions.\n Use of the built-in cache can cause memory fragmentation.\n- `shared`\n\n a cache shared between all worker processes.\n The cache size is specified in bytes; one megabyte can store\n about 4000 sessions.\n Each shared cache should have an arbitrary name.\n A cache with the same name can be used in several\n virtual servers.\n It is also used to automatically generate, store, and\n periodically rotate TLS session ticket keys (1.23.2)\n unless configured explicitly\n using the [`ssl_session_ticket_key`](https://nginx.org/en/docs/stream/ngx_stream_ssl_module.html#ssl_session_ticket_key) directive.\n\nBoth cache types can be used simultaneously, for example:\n```\nssl_session_cache builtin:1000 shared:SSL:10m;\n```\nbut using only shared cache without the built-in cache should\nbe more efficient.", + "description_html": "

Sets the types and sizes of caches that store session parameters.\nA cache can be of any of the following types:

\n\n\n\n

Both cache types can be used simultaneously, for example:

\n\n
ssl_session_cache builtin:1000 shared:SSL:10m;\n
\n\n

but using only shared cache without the built-in cache should\nbe more efficient.

\n" }, { "name": "ssl_session_ticket_key", @@ -16536,5 +16536,5 @@ ] } ], - "version": "https://github.com/nginx/nginx.org/commit/7ce55f6a9579d4b928d03f94e3a7901767ea9a50" + "version": "https://github.com/nginx/nginx.org/commit/602b6808b4d5ebe0d52b366bb95015116523cf54" }