|
|
@@ -107,7 +107,7 @@ emqx_schema {
|
|
|
"milliseconds passed since the last time we considered the connection 'congested'.<br/>"
|
|
|
"This is to avoid clearing and raising the alarm again too often."
|
|
|
zh: "清除警报前的最短时间。<br/>"
|
|
|
- "只有当队列中没有挂起的数据,并且连接至少被堵塞了 <code>min_alarm_sustain_duration</code> 毫秒时,</br>"
|
|
|
+ "只有当队列中没有挂起的数据,并且连接至少被堵塞了 <code>min_alarm_sustain_duration</code> 毫秒时,<br/>"
|
|
|
"报警才会被清除。这是为了避免太频繁地清除和再次发出警报。"
|
|
|
}
|
|
|
label {
|
|
|
@@ -403,7 +403,7 @@ emqx_schema {
|
|
|
|
|
|
alarm_actions {
|
|
|
desc {
|
|
|
- en: "The actions triggered when the alarm is activated.</br>\n"
|
|
|
+ en: "The actions triggered when the alarm is activated.<br/>"
|
|
|
"Currently, the following actions are supported: <code>log</code> and "
|
|
|
"<code>publish</code>.\n"
|
|
|
"<code>log</code> is to write the alarm to log (console or file).\n"
|
|
|
@@ -411,7 +411,7 @@ emqx_schema {
|
|
|
"the system topics:\n"
|
|
|
"<code>$SYS/brokers/emqx@xx.xx.xx.x/alarms/activate</code> and\n"
|
|
|
"<code>$SYS/brokers/emqx@xx.xx.xx.x/alarms/deactivate</code>"
|
|
|
- zh: "警报激活时触发的动作。</br>\n"
|
|
|
+ zh: "警报激活时触发的动作。<br/>"
|
|
|
"目前,支持以下操作:<code>log</code> 和 "
|
|
|
"<code>publish</code>.\n"
|
|
|
"<code>log</code> 将告警写入日志 (控制台或者文件).\n"
|
|
|
@@ -427,7 +427,7 @@ emqx_schema {
|
|
|
|
|
|
alarm_size_limit {
|
|
|
desc {
|
|
|
- en: "The maximum total number of deactivated alarms to keep as history.</br>\n"
|
|
|
+ en: "The maximum total number of deactivated alarms to keep as history.<br/>"
|
|
|
"When this limit is exceeded, the oldest deactivated alarms are "
|
|
|
"deleted to cap the total number.\n"
|
|
|
zh: "要保留为历史记录的已停用报警的最大总数。当超过此限制时,将删除最旧的停用报警,以限制总数。"
|
|
|
@@ -1325,11 +1325,11 @@ fields_deflate_opts_level {
|
|
|
fields_deflate_opts_mem_level {
|
|
|
desc {
|
|
|
en: """
|
|
|
-Specifies the size of the compression state.</br>
|
|
|
+Specifies the size of the compression state.<br/>
|
|
|
Lower values decrease memory usage per connection.
|
|
|
"""
|
|
|
zh: """
|
|
|
-指定压缩状态的大小</br>
|
|
|
+指定压缩状态的大小<br/>
|
|
|
较低的值会减少每个连接的内存使用。
|
|
|
"""
|
|
|
}
|
|
|
@@ -1408,19 +1408,19 @@ client_ssl_opts_schema_enable {
|
|
|
common_ssl_opts_schema_cacertfile {
|
|
|
desc {
|
|
|
en: """
|
|
|
-Trusted PEM format CA certificates bundle file.</br>
|
|
|
+Trusted PEM format CA certificates bundle file.<br/>
|
|
|
The certificates in this file are used to verify the TLS peer's certificates.
|
|
|
Append new certificates to the file if new CAs are to be trusted.
|
|
|
There is no need to restart EMQX to have the updated file loaded, because
|
|
|
-the system regularly checks if file has been updated (and reload).</br>
|
|
|
+the system regularly checks if file has been updated (and reload).<br/>
|
|
|
NOTE: invalidating (deleting) a certificate from the file will not affect
|
|
|
already established connections.
|
|
|
"""
|
|
|
zh: """
|
|
|
-受信任的PEM格式CA证书捆绑文件</br>
|
|
|
+受信任的PEM格式 CA 证书捆绑文件<br/>
|
|
|
此文件中的证书用于验证TLS对等方的证书。
|
|
|
-如果要信任新CA,请将新证书附加到文件中。
|
|
|
-无需重启EMQX即可加载更新的文件,因为系统会定期检查文件是否已更新(并重新加载)</br>
|
|
|
+如果要信任新 CA,请将新证书附加到文件中。
|
|
|
+无需重启EMQX即可加载更新的文件,因为系统会定期检查文件是否已更新(并重新加载)<br/>
|
|
|
注意:从文件中失效(删除)证书不会影响已建立的连接。
|
|
|
"""
|
|
|
}
|
|
|
@@ -1433,7 +1433,7 @@ already established connections.
|
|
|
common_ssl_opts_schema_certfile {
|
|
|
desc {
|
|
|
en: """
|
|
|
-PEM format certificates chain file.</br>
|
|
|
+PEM format certificates chain file.<br/>
|
|
|
The certificates in this file should be in reversed order of the certificate
|
|
|
issue chain. That is, the host's certificate should be placed in the beginning
|
|
|
of the file, followed by the immediate issuer certificate and so on.
|
|
|
@@ -1441,10 +1441,10 @@ Although the root CA certificate is optional, it should be placed at the end of
|
|
|
the file if it is to be added.
|
|
|
"""
|
|
|
zh: """
|
|
|
-PEM格式证书链文件</br>
|
|
|
-此文件中的证书应与证书颁发链的顺序相反。也就是说,主机的证书应该放在文件的开头,然后是直接颁发者证书,依此类推。
|
|
|
-虽然根CA证书是可选的,但它应该放在
|
|
|
-如果要添加文件,请将其删除。
|
|
|
+PEM格式证书链文件<br/>
|
|
|
+此文件中的证书应与证书颁发链的顺序相反。也就是说,主机的证书应该放在文件的开头,
|
|
|
+然后是直接颁发者 CA 证书,依此类推,一直到根 CA 证书。
|
|
|
+根 CA 证书是可选的,如果想要添加,应加到文件到最末端。
|
|
|
"""
|
|
|
}
|
|
|
label: {
|
|
|
@@ -1490,10 +1490,15 @@ common_ssl_opts_schema_depth {
|
|
|
desc {
|
|
|
en: """
|
|
|
Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path.
|
|
|
-So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly; if 1 the path can be PEER, CA, ROOT-CA; if 2 the path can be PEER, CA, CA, ROOT-CA, and so on. The default value is 10.
|
|
|
+So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;<br/>
|
|
|
+if 1 the path can be PEER, Intermediate-CA, ROOT-CA;<br/>
|
|
|
+if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.<br/>
|
|
|
"""
|
|
|
zh: """
|
|
|
-在有效的证书路径中,可以跟随对等证书的非自颁发中间证书的最大数量。因此,如果深度为0,则对等方必须由受信任的根CA直接签名;如果1,路径可以是PEER、CA、ROOT-CA;如果是2,则路径可以是PEER、CA、CA、ROOT-CA等等。默认值为10。
|
|
|
+在有效的证书路径中,可以跟随对等证书的非自颁发中间证书的最大数量。
|
|
|
+因此,如果深度为0,则对等方必须由受信任的根 CA 直接签名;<br/>
|
|
|
+如果是1,路径可以是 PEER、中间 CA、ROOT-CA;<br/>
|
|
|
+如果是2,则路径可以是PEER、中间 CA1、中间 CA2、ROOT-CA。
|
|
|
"""
|
|
|
}
|
|
|
label: {
|
|
|
@@ -1522,13 +1527,13 @@ Only used if the private key file is password-protected.
|
|
|
common_ssl_opts_schema_versions {
|
|
|
desc {
|
|
|
en: """
|
|
|
-All TLS/DTLS versions to be supported.</br>
|
|
|
-NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.</br>
|
|
|
+All TLS/DTLS versions to be supported.<br/>
|
|
|
+NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.<br/>
|
|
|
In case PSK cipher suites are intended, make sure to configured
|
|
|
<code>['tlsv1.2', 'tlsv1.1']</code> here.
|
|
|
"""
|
|
|
zh: """
|
|
|
-支持所有TLS/DTLS版本</br>
|
|
|
+支持所有TLS/DTLS版本<br/>
|
|
|
|
|
|
注:PSK 的 Ciphers 无法在 <code>tlsv1.3</code> 中使用,如果打算使用 PSK 密码套件,请确保这里配置为 <code>["tlsv1.2","tlsv1.1"]</code>。
|
|
|
"""
|
|
|
@@ -1546,7 +1551,7 @@ This config holds TLS cipher suite names separated by comma,
|
|
|
or as an array of strings. e.g.
|
|
|
<code>"TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256"</code> or
|
|
|
<code>["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"]</code>.
|
|
|
-</br>
|
|
|
+<br/>
|
|
|
Ciphers (and their ordering) define the way in which the
|
|
|
client and server encrypts information over the network connection.
|
|
|
Selecting a good cipher suite is critical for the
|
|
|
@@ -1554,47 +1559,47 @@ application's data security, confidentiality and performance.
|
|
|
|
|
|
The names should be in OpenSSL string format (not RFC format).
|
|
|
All default values and examples provided by EMQX config
|
|
|
-documentation are all in OpenSSL format.</br>
|
|
|
+documentation are all in OpenSSL format.<br/>
|
|
|
|
|
|
NOTE: Certain cipher suites are only compatible with
|
|
|
specific TLS <code>versions</code> ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3')
|
|
|
incompatible cipher suites will be silently dropped.
|
|
|
For instance, if only 'tlsv1.3' is given in the <code>versions</code>,
|
|
|
configuring cipher suites for other versions will have no effect.
|
|
|
-</br>
|
|
|
+<br/>
|
|
|
|
|
|
-NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config</br>
|
|
|
-If PSK cipher suites are intended, 'tlsv1.3' should be disabled from <code>versions</code>.</br>
|
|
|
+NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config<br/>
|
|
|
+If PSK cipher suites are intended, 'tlsv1.3' should be disabled from <code>versions</code>.<br/>
|
|
|
PSK cipher suites: <code>"RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384,
|
|
|
RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256,
|
|
|
RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA,
|
|
|
-RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"</code></br>
|
|
|
+RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"</code><br/>
|
|
|
"""
|
|
|
zh: """
|
|
|
此配置保存由逗号分隔的 TLS 密码套件名称,或作为字符串数组。例如
|
|
|
<code>"TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256"</code>或
|
|
|
<code>["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"]</code>。
|
|
|
-</br>
|
|
|
+<br/>
|
|
|
密码(及其顺序)定义了客户端和服务器通过网络连接加密信息的方式。
|
|
|
选择一个好的密码套件对于应用程序的数据安全性、机密性和性能至关重要。
|
|
|
|
|
|
名称应为 OpenSSL 字符串格式(而不是 RFC 格式)。
|
|
|
-EMQX 配置文档提供的所有默认值和示例都是 OpenSSL 格式</br>
|
|
|
+EMQX 配置文档提供的所有默认值和示例都是 OpenSSL 格式<br/>
|
|
|
注意:某些密码套件仅与特定的 TLS <code>版本</code>兼容('tlsv1.1'、'tlsv1.2'或'tlsv1.3')。
|
|
|
不兼容的密码套件将被自动删除。
|
|
|
|
|
|
例如,如果只有 <code>versions</code> 仅配置为 <code>tlsv1.3</code>。为其他版本配置密码套件将无效。
|
|
|
|
|
|
-</br>
|
|
|
-注:PSK 的 Ciphers 不支持 tlsv1.3</br>
|
|
|
+<br/>
|
|
|
+注:PSK 的 Ciphers 不支持 tlsv1.3<br/>
|
|
|
如果打算使用PSK密码套件 <code>tlsv1.3</code>。应在<code>ssl.versions</code>中禁用。
|
|
|
|
|
|
-</br>
|
|
|
+<br/>
|
|
|
PSK 密码套件:
|
|
|
<code>"RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384,
|
|
|
RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256,
|
|
|
RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA,
|
|
|
-RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"</code></br>
|
|
|
+RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"</code><br/>
|
|
|
"""
|
|
|
}
|
|
|
label: {
|
|
|
@@ -1610,7 +1615,7 @@ This config holds TLS cipher suite names separated by comma,
|
|
|
or as an array of strings. e.g.
|
|
|
<code>"TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256"</code> or
|
|
|
<code>["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"]</code>.
|
|
|
-</br>
|
|
|
+<br/>
|
|
|
Ciphers (and their ordering) define the way in which the
|
|
|
client and server encrypts information over the network connection.
|
|
|
Selecting a good cipher suite is critical for the
|
|
|
@@ -1618,49 +1623,49 @@ application's data security, confidentiality and performance.
|
|
|
|
|
|
The names should be in OpenSSL string format (not RFC format).
|
|
|
All default values and examples provided by EMQX config
|
|
|
-documentation are all in OpenSSL format.</br>
|
|
|
+documentation are all in OpenSSL format.<br/>
|
|
|
|
|
|
NOTE: Certain cipher suites are only compatible with
|
|
|
specific TLS <code>versions</code> ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3')
|
|
|
incompatible cipher suites will be silently dropped.
|
|
|
For instance, if only 'tlsv1.3' is given in the <code>versions</code>,
|
|
|
configuring cipher suites for other versions will have no effect.
|
|
|
-</br>
|
|
|
+<br/>
|
|
|
|
|
|
-NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config</br>
|
|
|
-If PSK cipher suites are intended, 'tlsv1.3' should be disabled from <code>versions</code>.</br>
|
|
|
+NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config<br/>
|
|
|
+If PSK cipher suites are intended, 'tlsv1.3' should be disabled from <code>versions</code>.<br/>
|
|
|
PSK cipher suites: <code>"RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384,
|
|
|
RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256,
|
|
|
RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA,
|
|
|
-RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"</code></br>
|
|
|
+RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"</code><br/>
|
|
|
|
|
|
-NOTE: QUIC listener supports only 'tlsv1.3' ciphers</br>
|
|
|
+NOTE: QUIC listener supports only 'tlsv1.3' ciphers<br/>
|
|
|
"""
|
|
|
zh: """
|
|
|
此配置保存由逗号分隔的 TLS 密码套件名称,或作为字符串数组。例如
|
|
|
<code>"TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256"</code>或
|
|
|
<code>["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"]</code>。
|
|
|
-</br>
|
|
|
+<br/>
|
|
|
密码(及其顺序)定义了客户端和服务器通过网络连接加密信息的方式。
|
|
|
选择一个好的密码套件对于应用程序的数据安全性、机密性和性能至关重要。
|
|
|
|
|
|
名称应为 OpenSSL 字符串格式(而不是 RFC 格式)。
|
|
|
-EMQX 配置文档提供的所有默认值和示例都是 OpenSSL 格式</br>
|
|
|
+EMQX 配置文档提供的所有默认值和示例都是 OpenSSL 格式<br/>
|
|
|
注意:某些密码套件仅与特定的 TLS <code>版本</code>兼容('tlsv1.1'、'tlsv1.2'或'tlsv1.3')。
|
|
|
不兼容的密码套件将被自动删除。
|
|
|
|
|
|
例如,如果只有 <code>versions</code> 仅配置为 <code>tlsv1.3</code>。为其他版本配置密码套件将无效。
|
|
|
|
|
|
-</br>
|
|
|
-注:PSK 的 Ciphers 不支持 tlsv1.3</br>
|
|
|
+<br/>
|
|
|
+注:PSK 的 Ciphers 不支持 tlsv1.3<br/>
|
|
|
如果打算使用PSK密码套件,<code>tlsv1.3</code>。应在<code>ssl.versions</code>中禁用。
|
|
|
|
|
|
-</br>
|
|
|
+<br/>
|
|
|
PSK 密码套件:
|
|
|
<code>"RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384,
|
|
|
RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256,
|
|
|
RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA,
|
|
|
-RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"</code></br>
|
|
|
+RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"</code><br/>
|
|
|
|
|
|
注:QUIC 监听器不支持 tlsv1.3 的 ciphers
|
|
|
"""
|
|
|
@@ -1707,11 +1712,11 @@ server_ssl_opts_schema_dhfile {
|
|
|
Path to a file containing PEM-encoded Diffie-Hellman parameters
|
|
|
to be used by the server if a cipher suite using Diffie-Hellman
|
|
|
key exchange is negotiated. If not specified, default parameters
|
|
|
-are used.</br>
|
|
|
+are used.<br/>
|
|
|
NOTE: The <code>dhfile</code> option is not supported by TLS 1.3.
|
|
|
"""
|
|
|
zh: """
|
|
|
-如果协商使用Diffie-Hellman密钥交换的密码套件,则服务器将使用包含PEM编码的Diffie-Hellman参数的文件的路径。如果未指定,则使用默认参数。</br>
|
|
|
+如果协商使用Diffie-Hellman密钥交换的密码套件,则服务器将使用包含PEM编码的Diffie-Hellman参数的文件的路径。如果未指定,则使用默认参数。<br/>
|
|
|
|
|
|
注意:TLS 1.3不支持<code>dhfile</code>选项。
|
|
|
"""
|
|
|
@@ -1992,8 +1997,8 @@ set to `some_tenant`, then the client actually subscribes to the topic
|
|
|
`some_tenant/t`. Similarly, if another client B (connected to the same listener
|
|
|
as the client A) sends a message to topic `t`, the message is routed
|
|
|
to all the clients subscribed `some_tenant/t`, so client A will receive the
|
|
|
-message, with topic name `t`.</br>
|
|
|
-Set to `""` to disable the feature.</br>
|
|
|
+message, with topic name `t`.<br/>
|
|
|
+Set to `""` to disable the feature.<br/>
|
|
|
|
|
|
Variables in mountpoint string:
|
|
|
- <code>${clientid}</code>: clientid
|
|
|
@@ -2004,10 +2009,10 @@ Variables in mountpoint string:
|
|
|
|
|
|
将消息传递给订阅者时,将从主题名称中删除带前缀的字符串。挂载点是一种用户可以用来实现不同侦听器之间消息路由隔离的方法。
|
|
|
|
|
|
-例如,如果客户机 A 使用 <code>listeners.tcp.\<name>.mountpoint</code> 设置为'some_tenant',那么客户端实际上订阅了主题'some_tenant/t'。</br>
|
|
|
-类似地,如果另一个客户端B(与客户端A连接到同一个侦听器)向主题 't' 发送消息,该消息将路由到所有订阅了'some_租户/t'的客户端,因此客户端 A 将接收主题名为't'的消息</br>
|
|
|
+例如,如果客户机 A 使用 <code>listeners.tcp.\<name>.mountpoint</code> 设置为'some_tenant',那么客户端实际上订阅了主题'some_tenant/t'。<br/>
|
|
|
+类似地,如果另一个客户端B(与客户端A连接到同一个侦听器)向主题 't' 发送消息,该消息将路由到所有订阅了'some_租户/t'的客户端,因此客户端 A 将接收主题名为't'的消息<br/>
|
|
|
|
|
|
-设置为<code>""</code> 以禁用该功能</br>
|
|
|
+设置为<code>""</code> 以禁用该功能<br/>
|
|
|
|
|
|
mountpoint 字符串中的变量:
|
|
|
- <code>${clientid}</code>: clientid
|
|
|
@@ -2070,7 +2075,7 @@ When set to <code>false</code> clients will be allowed to connect without authen
|
|
|
mqtt_listener_access_rules {
|
|
|
desc {
|
|
|
en: """
|
|
|
-The access control rules for this listener.</br>See: https://github.com/emqtt/esockd#allowdeny
|
|
|
+The access control rules for this listener.<br/>See: https://github.com/emqtt/esockd#allowdeny
|
|
|
"""
|
|
|
zh: """此监听器的访问控制规则。"""
|
|
|
}
|
|
|
@@ -2083,11 +2088,11 @@ The access control rules for this listener.</br>See: https://github.com/emqtt/es
|
|
|
mqtt_listener_proxy_protocol {
|
|
|
desc {
|
|
|
en: """
|
|
|
-Enable the Proxy Protocol V1/2 if the EMQX cluster is deployed behind HAProxy or Nginx.</br>
|
|
|
+Enable the Proxy Protocol V1/2 if the EMQX cluster is deployed behind HAProxy or Nginx.<br/>
|
|
|
See: https://www.haproxy.com/blog/haproxy/proxy-protocol/
|
|
|
"""
|
|
|
zh: """
|
|
|
-如果EMQX集群部署在 HAProxy 或 Nginx 之后,请启用代理协议 V1/2 </br>
|
|
|
+如果EMQX集群部署在 HAProxy 或 Nginx 之后,请启用代理协议 V1/2 <br/>
|
|
|
详情见: https://www.haproxy.com/blog/haproxy/proxy-protocol/
|
|
|
"""
|
|
|
}
|
|
|
@@ -2150,7 +2155,7 @@ listener_authentication {
|
|
|
en: """
|
|
|
Per-listener authentication override.
|
|
|
Authentication can be one single authenticator instance or a chain of authenticators as an array.
|
|
|
-When authenticating a login (username, client ID, etc.) the authenticators are checked in the configured order.</br>
|
|
|
+When authenticating a login (username, client ID, etc.) the authenticators are checked in the configured order.<br/>
|
|
|
|
|
|
"""
|
|
|
zh: """
|
|
|
@@ -2208,25 +2213,25 @@ The rate is counted by bytes of packets per second.
|
|
|
client_ssl_opts_schema_server_name_indication {
|
|
|
desc {
|
|
|
en: """
|
|
|
-Specify the host name to be used in TLS Server Name Indication extension.</br>
|
|
|
+Specify the host name to be used in TLS Server Name Indication extension.<br/>
|
|
|
For instance, when connecting to "server.example.net", the genuine server
|
|
|
which accepts the connection and performs TLS handshake may differ from the
|
|
|
host the TLS client initially connects to, e.g. when connecting to an IP address
|
|
|
-or when the host has multiple resolvable DNS records </br>
|
|
|
+or when the host has multiple resolvable DNS records <br/>
|
|
|
If not specified, it will default to the host name string which is used
|
|
|
-to establish the connection, unless it is IP addressed used.</br>
|
|
|
+to establish the connection, unless it is IP addressed used.<br/>
|
|
|
The host name is then also used in the host name verification of the peer
|
|
|
-certificate.</br> The special value 'disable' prevents the Server Name
|
|
|
+certificate.<br/> The special value 'disable' prevents the Server Name
|
|
|
Indication extension from being sent and disables the hostname
|
|
|
verification check.
|
|
|
"""
|
|
|
zh: """
|
|
|
-指定要在 TLS 服务器名称指示扩展中使用的主机名。</br>
|
|
|
+指定要在 TLS 服务器名称指示扩展中使用的主机名。<br/>
|
|
|
例如,当连接到 "server.example.net" 时,接受连接并执行 TLS 握手的真正服务器可能与 TLS 客户端最初连接到的主机不同,
|
|
|
-例如,当连接到 IP 地址时,或者当主机具有多个可解析的 DNS 记录时</br>
|
|
|
+例如,当连接到 IP 地址时,或者当主机具有多个可解析的 DNS 记录时<br/>
|
|
|
如果未指定,它将默认为使用的主机名字符串
|
|
|
-建立连接,除非使用 IP 地址</br>
|
|
|
-然后,主机名也用于对等机的主机名验证证书</br>
|
|
|
+建立连接,除非使用 IP 地址<br/>
|
|
|
+然后,主机名也用于对等机的主机名验证证书<br/>
|
|
|
特殊值 <code>disable</code> 阻止发送服务器名称指示扩展,并禁用主机名验证检查。
|
|
|
"""
|
|
|
}
|
|
|
@@ -2239,11 +2244,11 @@ verification check.
|
|
|
fields_tcp_opts_active_n {
|
|
|
desc {
|
|
|
en: """
|
|
|
-Specify the {active, N} option for this Socket.</br>
|
|
|
+Specify the {active, N} option for this Socket.<br/>
|
|
|
See: https://erlang.org/doc/man/inet.html#setopts-2
|
|
|
"""
|
|
|
zh: """
|
|
|
-为此套接字指定{active,N}选项</br>
|
|
|
+为此套接字指定{active,N}选项<br/>
|
|
|
See: https://erlang.org/doc/man/inet.html#setopts-2
|
|
|
"""
|
|
|
}
|
|
|
@@ -2389,18 +2394,18 @@ The SO_REUSEADDR flag for the connections.
|
|
|
fields_trace_payload_encode {
|
|
|
desc {
|
|
|
en: """
|
|
|
-Determine the format of the payload format in the trace file.</br>
|
|
|
+Determine the format of the payload format in the trace file.<br/>
|
|
|
`text`: Text-based protocol or plain text protocol.
|
|
|
- It is recommended when payload is JSON encoded.</br>
|
|
|
-`hex`: Binary hexadecimal encode. It is recommended when payload is a custom binary protocol.</br>
|
|
|
+ It is recommended when payload is JSON encoded.<br/>
|
|
|
+`hex`: Binary hexadecimal encode. It is recommended when payload is a custom binary protocol.<br/>
|
|
|
`hidden`: payload is obfuscated as `******`
|
|
|
|
|
|
"""
|
|
|
zh: """
|
|
|
-确定跟踪文件中有效负载格式的格式。</br>
|
|
|
+确定跟踪文件中有效负载格式的格式。<br/>
|
|
|
`text`:基于文本的协议或纯文本协议。
|
|
|
-建议在有效负载为JSON编码时使用</br>
|
|
|
-`hex`:二进制十六进制编码。当有效负载是自定义二进制协议时,建议使用此选项</br>
|
|
|
+建议在有效负载为JSON编码时使用<br/>
|
|
|
+`hex`:二进制十六进制编码。当有效负载是自定义二进制协议时,建议使用此选项<br/>
|
|
|
`hidden`:有效负载被模糊化为 `******`
|
|
|
"""
|
|
|
}
|
|
|
@@ -2445,11 +2450,11 @@ WebSocket消息是否允许包含多个 MQTT 数据包。
|
|
|
fields_ws_opts_compress {
|
|
|
desc {
|
|
|
en: """
|
|
|
-If <code>true</code>, compress WebSocket messages using <code>zlib</code>.</br>
|
|
|
+If <code>true</code>, compress WebSocket messages using <code>zlib</code>.<br/>
|
|
|
The configuration items under <code>deflate_opts</code> belong to the compression-related parameter configuration.
|
|
|
"""
|
|
|
zh: """
|
|
|
-如果 <code>true</code>,则使用<code>zlib</code> 压缩 WebSocket 消息</br>
|
|
|
+如果 <code>true</code>,则使用<code>zlib</code> 压缩 WebSocket 消息<br/>
|
|
|
<code>deflate_opts</code> 下的配置项属于压缩相关参数配置。
|
|
|
"""
|
|
|
}
|
|
|
@@ -2495,11 +2500,11 @@ fields_ws_opts_fail_if_no_subprotocol {
|
|
|
en: """
|
|
|
If <code>true</code>, the server will return an error when
|
|
|
the client does not carry the <code>Sec-WebSocket-Protocol</code> field.
|
|
|
- </br>Note: WeChat applet needs to disable this verification.
|
|
|
+ <br/>Note: WeChat applet needs to disable this verification.
|
|
|
"""
|
|
|
zh: """
|
|
|
如果<code>true</code>,当客户端未携带<code>Sec WebSocket Protocol</code>字段时,服务器将返回一个错误。
|
|
|
-</br>注意:微信小程序需要禁用此验证。
|
|
|
+<br/>注意:微信小程序需要禁用此验证。
|
|
|
"""
|
|
|
}
|
|
|
label: {
|
|
|
@@ -2560,7 +2565,7 @@ If <code>false</code> and <code>check_origin_enable</code> is <code>true</code>,
|
|
|
fields_ws_opts_check_origins {
|
|
|
desc {
|
|
|
en: """
|
|
|
-List of allowed origins.</br>See <code>check_origin_enable</code>.
|
|
|
+List of allowed origins.<br/>See <code>check_origin_enable</code>.
|
|
|
"""
|
|
|
zh: """
|
|
|
允许的 origins 列表
|