|
2 | 2 | <html lang="en"> |
3 | 3 | <head> |
4 | 4 | <meta charset="utf-8" /> |
5 | | - <title>HAProxy version 3.3-dev10-82 - Configuration Manual</title> |
| 5 | + <title>HAProxy version 3.3-dev11-5 - Configuration Manual</title> |
6 | 6 | <link href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/css/bootstrap.min.css" rel="stylesheet" /> |
7 | 7 | <link href="https://raw.githubusercontent.com/thomaspark/bootswatch/v3.3.7/cerulean/bootstrap.min.css" rel="stylesheet" /> |
8 | 8 | <link href="../css/page.css?0.4.2-15" rel="stylesheet" /> |
|
4689 | 4689 | You can use <strong>left</strong> and <strong>right</strong> arrow keys to navigate between chapters.<br> |
4690 | 4690 | </p> |
4691 | 4691 | <p class="text-right"> |
4692 | | - <small>Converted with <a href="https://github.com/cbonte/haproxy-dconv">haproxy-dconv</a> v<b>0.4.2-15</b> on <b>2025/10/30</b></small> |
| 4692 | + <small>Converted with <a href="https://github.com/cbonte/haproxy-dconv">haproxy-dconv</a> v<b>0.4.2-15</b> on <b>2025/10/31</b></small> |
4693 | 4693 | </p> |
4694 | 4694 | </div> |
4695 | 4695 | <!-- /.sidebar --> |
|
4700 | 4700 | <div class="text-center"> |
4701 | 4701 | <h1><a href="http://www.haproxy.org/" title="HAProxy"><img src="../img/HAProxyCommunityEdition_60px.png?0.4.2-15" /></a></h1> |
4702 | 4702 | <h2>Configuration Manual</h2> |
4703 | | - <p><strong>version 3.3-dev10-82</strong></p> |
| 4703 | + <p><strong>version 3.3-dev11-5</strong></p> |
4704 | 4704 | <p> |
4705 | | - 2025/10/18<br> |
| 4705 | + 2025/10/31<br> |
4706 | 4706 |
|
4707 | 4707 | </p> |
4708 | 4708 | </div> |
@@ -22011,7 +22011,9 @@ <h2 id="chapter-5.2" data-target="5.2"><small><a class="small" href="#5.2">5.2.< |
22011 | 22011 | delimited list of protocol names, for instance: "http/1.1,http/1.0" (without |
22012 | 22012 | quotes). This requires that the SSL library is built with support for TLS |
22013 | 22013 | extensions enabled (check with haproxy -vv). The ALPN extension replaces the |
22014 | | -initial NPN extension. ALPN is required to connect to HTTP/2 servers. |
| 22014 | +initial NPN extension. ALPN is required to connect to HTTP/2 servers. It is |
| 22015 | +also required to be able to use HTTP/3 via a QUIC server, "h3" serves as a |
| 22016 | +default value for QUIC servers without "<span class="dropdown"><a class="dropdown-toggle" data-toggle="dropdown" href="#">alpn<span class="caret"></span></a><ul class="dropdown-menu"><li class="dropdown-header">This keyword is available in sections :</li><li><a href="#alpn%20%28Bind%20options%29">Bind options</a></li><li><a href="#alpn%20%28Server%20and%20default-server%20options%29">Server and default-server options</a></li></ul></span>" setting. |
22015 | 22017 | Versions of OpenSSL prior to 1.0.2 didn't support ALPN and only supposed the |
22016 | 22018 | now obsolete NPN extension. |
22017 | 22019 | If both HTTP/2 and HTTP/1.1 are expected to be supported, both versions can |
@@ -24287,8 +24289,8 @@ <h3 id="chapter-7.3.1" data-target="7.3.1"><small><a class="small" href="#7.3.1" |
24287 | 24289 | <tr><td ><a href="#7-51d.single">51d.single(prop[,prop*])</a></td><td >string</td><td >string</td></tr> |
24288 | 24290 | <tr><td ><a href="#7-add">add(value)</a></td><td >integer</td><td >integer</td></tr> |
24289 | 24291 | <tr><td ><a href="#7-add_item">add_item(delim[,var[,suff]])</a></td><td >string</td><td >string</td></tr> |
24290 | | -<tr><td ><a href="#7-aes_gcm_dec">aes_gcm_dec(bits,nonce,key,aead_tag)</a></td><td >binary</td><td >binary</td></tr> |
24291 | | -<tr><td ><a href="#7-aes_gcm_enc">aes_gcm_enc(bits,nonce,key,aead_tag)</a></td><td >binary</td><td >binary</td></tr> |
| 24292 | +<tr><td ><a href="#7-aes_gcm_dec">aes_gcm_dec(bits,nonce,key,aead_tag[,aad])</a></td><td >binary</td><td >binary</td></tr> |
| 24293 | +<tr><td ><a href="#7-aes_gcm_enc">aes_gcm_enc(bits,nonce,key,aead_tag[,aad])</a></td><td >binary</td><td >binary</td></tr> |
24292 | 24294 | <tr><td ><a href="#7-and">and(value)</a></td><td >integer</td><td >integer</td></tr> |
24293 | 24295 | <tr><td ><a href="#7-b64dec">b64dec</a></td><td >string</td><td >binary</td></tr> |
24294 | 24296 | <tr><td ><a href="#7-base2">base2</a></td><td >binary</td><td >string</td></tr> |
@@ -24478,24 +24480,26 @@ <h3 id="chapter-7.3.1" data-target="7.3.1"><small><a class="small" href="#7.3.1" |
24478 | 24480 | http-request set-var(req.tagged) 'var(req.tagged),add_item(",",req.score1),add_item(",",req.score2)' |
24479 | 24481 | http-request set-var(req.tagged) 'var(req.tagged),add_item(",",,(site1))' if src,in_table(site1) |
24480 | 24482 | </code></pre> |
24481 | | -</div><a class="anchor" name="aes_gcm_dec"></a><a class="anchor" name="7-aes_gcm_dec"></a><a class="anchor" name="7.3.1-aes_gcm_dec"></a><a class="anchor" name="aes_gcm_dec (Using ACLs and fetching samples)"></a><a class="anchor" name="aes_gcm_dec (Converters)"></a><div class="keyword"><b><a class="anchor" name="aes_gcm_dec"></a><a href="#7.3.1-aes_gcm_dec">aes_gcm_dec</a></b>(<span style="color: #080"><bits></span>,<span style="color: #080"><nonce></span>,<span style="color: #080"><key></span>,<span style="color: #080"><aead_tag></span>)</div><pre class="text">Decrypts the raw byte input using the AES128-GCM, AES192-GCM or |
24482 | | -AES256-GCM algorithm, depending on the <bits> parameter. All other parameters |
24483 | | -need to be base64 encoded and the returned result is in raw byte format. |
24484 | | -If the <aead_tag> validation fails, the converter doesn't return any data. |
24485 | | -The <nonce>, <key> and <aead_tag> can either be strings or variables. This |
24486 | | -converter requires at least OpenSSL 1.0.1. |
| 24483 | +</div><a class="anchor" name="aes_gcm_dec"></a><a class="anchor" name="7-aes_gcm_dec"></a><a class="anchor" name="7.3.1-aes_gcm_dec"></a><a class="anchor" name="aes_gcm_dec (Using ACLs and fetching samples)"></a><a class="anchor" name="aes_gcm_dec (Converters)"></a><div class="keyword"><b><a class="anchor" name="aes_gcm_dec"></a><a href="#7.3.1-aes_gcm_dec">aes_gcm_dec</a></b>(<span style="color: #080"><bits></span>,<span style="color: #080"><nonce></span>,<span style="color: #080"><key></span>,<span style="color: #080"><aead_tag></span><span style="color: #008">[,<span style="color: #080"><aad></span>]</span>)</div><pre class="text">Decrypts the raw byte input using the AES128-GCM, AES192-GCM or AES256-GCM |
| 24484 | +algorithm, depending on the <bits> parameter. All other parameters need to be |
| 24485 | +base64 encoded and the returned result is in raw byte format. If the |
| 24486 | +<aead_tag> or <aad> validation fails, the converter doesn't return any data. |
| 24487 | +The <aad> parameter is optional. The <nonce>, <key>, <aead_tag> and <aad> can |
| 24488 | +either be strings or variables. This converter requires at least OpenSSL |
| 24489 | +1.0.1. |
24487 | 24490 | </pre><div class="separator"> |
24488 | 24491 | <span class="label label-success">Example:</span> |
24489 | 24492 | <pre class="prettyprint"> |
24490 | 24493 | <code>http-response set-header X-Decrypted-Text %[var(txn.enc),\ |
24491 | 24494 | aes_gcm_dec(128,txn.nonce,Zm9vb2Zvb29mb29wZm9vbw==,txn.aead_tag)] |
24492 | 24495 | </code></pre> |
24493 | | -</div><a class="anchor" name="aes_gcm_enc"></a><a class="anchor" name="7-aes_gcm_enc"></a><a class="anchor" name="7.3.1-aes_gcm_enc"></a><a class="anchor" name="aes_gcm_enc (Using ACLs and fetching samples)"></a><a class="anchor" name="aes_gcm_enc (Converters)"></a><div class="keyword"><b><a class="anchor" name="aes_gcm_enc"></a><a href="#7.3.1-aes_gcm_enc">aes_gcm_enc</a></b>(<span style="color: #080"><bits></span>,<span style="color: #080"><nonce></span>,<span style="color: #080"><key></span>,<span style="color: #080"><aead_tag></span>)</div><pre class="text">Encrypts the raw byte input using the AES128-GCM, AES192-GCM or |
24494 | | -AES256-GCM algorithm, depending on the <bits> parameter. <nonce> and <key> |
24495 | | -parameters must be base64 encoded. Last parameter, <aead_tag>, must be a |
24496 | | -variable. The AEAD tag will be stored base64 encoded into that variable. |
24497 | | -The returned result is in raw byte format. The <nonce> and <key> can either |
24498 | | -be strings or variables. This converter requires at least OpenSSL 1.0.1. |
| 24496 | +</div><a class="anchor" name="aes_gcm_enc"></a><a class="anchor" name="7-aes_gcm_enc"></a><a class="anchor" name="7.3.1-aes_gcm_enc"></a><a class="anchor" name="aes_gcm_enc (Using ACLs and fetching samples)"></a><a class="anchor" name="aes_gcm_enc (Converters)"></a><div class="keyword"><b><a class="anchor" name="aes_gcm_enc"></a><a href="#7.3.1-aes_gcm_enc">aes_gcm_enc</a></b>(<span style="color: #080"><bits></span>,<span style="color: #080"><nonce></span>,<span style="color: #080"><key></span>,<span style="color: #080"><aead_tag></span><span style="color: #008">[,<span style="color: #080"><aad></span>]</span>)</div><pre class="text">Encrypts the raw byte input using the AES128-GCM, AES192-GCM or |
| 24497 | +AES256-GCM algorithm, depending on the <bits> parameter. <nonce>, <key> and |
| 24498 | +<aad> parameters must be base64 encoded. Parameter <aead_tag> must be a |
| 24499 | +variable. The AEAD tag will be stored base64 encoded into that variable. The |
| 24500 | +<aad> parameter is optional. The returned result is in raw byte format. The |
| 24501 | +<nonce>, <key> and <aad> can either be strings or variables. This converter |
| 24502 | +requires at least OpenSSL 1.0.1. |
24499 | 24503 | </pre><div class="separator"> |
24500 | 24504 | <span class="label label-success">Example:</span> |
24501 | 24505 | <pre class="prettyprint"> |
@@ -33690,8 +33694,8 @@ <h2 id="chapter-12.8" data-target="12.8"><small><a class="small" href="#12.8">12 |
33690 | 33694 | <br> |
33691 | 33695 | <hr> |
33692 | 33696 | <div class="text-right"> |
33693 | | - HAProxy 3.3-dev10-82 – Configuration Manual<br> |
33694 | | - <small>, 2025/10/18</small> |
| 33697 | + HAProxy 3.3-dev11-5 – Configuration Manual<br> |
| 33698 | + <small>, 2025/10/31</small> |
33695 | 33699 | </div> |
33696 | 33700 | </div> |
33697 | 33701 | <!-- /.col-lg-12 --> |
|
0 commit comments