dashboard-with-https.conf.example 3.1 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091
  1. ##--------------------------------------------------------------------
  2. ## Dashboard with HTTPS Listener
  3. ##
  4. ## Configuration for EMQX dashboard
  5. ##--------------------------------------------------------------------
  6. ## Note: This is an example of how to configure this feature
  7. ## you should copy and paste the below data into the emqx.conf for working
  8. dashboard {
  9. ## JWT token expiration time
  10. token_expired_time = 60m
  11. ## Support Cross-Origin Resource Sharing (CORS)
  12. cors = false
  13. listeners.https {
  14. ## Whether to enable the listener
  15. enable = true
  16. ## Port or Address to listen on
  17. bind = "0.0.0.0:18084" ## or just a port number, e.g. 18084
  18. ## Socket acceptor pool size for TCP protocols
  19. num_acceptors = 8
  20. ## Maximum number of simultaneous connections
  21. max_connections = 512
  22. ## Defines the maximum length that the queue of pending connections can grow to
  23. backlog = 1024
  24. ## Send timeout for the socket
  25. send_timeout = 10s
  26. ## Enable IPv6 support, default is false, which means IPv4 only
  27. inet6 = false
  28. ## Disable IPv4-to-IPv6 mapping for the listener
  29. ipv6_v6only = false
  30. ## Enable support for `HAProxy` header
  31. proxy_header = false
  32. ## Trusted PEM format CA certificates bundle file
  33. cacertfile = "data/certs/cacert.pem"
  34. ## PEM format certificates chain file
  35. certfile = "data/certs/cert.pem"
  36. ## PEM format private key file
  37. keyfile = "data/certs/key.pem"
  38. ## Enable or disable peer verification
  39. verify = verify_none ## use verify_peer to enable
  40. ## if `verify' is ebabled, whit true, the connection fails if the client does not have a certificate to send
  41. fail_if_no_peer_cert = false
  42. ## Enable TLS session reuse
  43. reuse_sessions = true
  44. ## Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path
  45. depth = 10
  46. ## Which versions are to be supported
  47. versions = [tlsv1.3, tlsv1.2]
  48. ## TLS cipher suite names
  49. ## Note: By default, all available suites are supported, you do not need to set this
  50. ciphers = ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"]
  51. ## Allows a client and a server to renegotiate the parameters of the SSL connection on the fly
  52. secure_renegotiate = true
  53. ## Log level for SSL communication
  54. ## Type: emergency | alert | critical | error | warning | notice | info | debug | none | all
  55. log_level = notice
  56. ## Hibernate the SSL process after idling for amount of time reducing its memory footprint
  57. hibernate_after = 5s
  58. ## Forces the cipher to be set based on the server-specified order instead of the client-specified order
  59. honor_cipher_order = true
  60. ## Setting this to false to disable client-initiated renegotiation
  61. client_renegotiation = true
  62. ## Maximum time duration allowed for the handshake to complete
  63. handshake_timeout = 15s
  64. }
  65. }