This is an automated email from the ASF dual-hosted git repository.
maskit pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/trafficserver.git
The following commit(s) were added to refs/heads/master by this push:
new 0b8a88cdce Document records.yaml changes (#11702)
0b8a88cdce is described below
commit 0b8a88cdce15ab63ee7903cc5a629b62677c8532
Author: Damian Meden <[email protected]>
AuthorDate: Sat Aug 17 00:47:07 2024 +0200
Document records.yaml changes (#11702)
* Document records.yaml changes
* Update links
---------
Co-authored-by: Chris McFarlen <[email protected]>
---
doc/admin-guide/files/records.yaml.en.rst | 26 +++++++++++-----------
doc/admin-guide/files/sni.yaml.en.rst | 8 +++----
doc/admin-guide/performance/index.en.rst | 2 +-
.../api/functions/TSSslSession.en.rst | 2 +-
.../hooks-and-transactions/ssl-session-api.en.rst | 2 +-
doc/release-notes/upgrading.en.rst | 8 +++++++
6 files changed, 28 insertions(+), 20 deletions(-)
diff --git a/doc/admin-guide/files/records.yaml.en.rst
b/doc/admin-guide/files/records.yaml.en.rst
index 4b19da4798..2612ffed5b 100644
--- a/doc/admin-guide/files/records.yaml.en.rst
+++ b/doc/admin-guide/files/records.yaml.en.rst
@@ -281,14 +281,14 @@ System Variables
of the contents and interpretations of log files.
-.. ts:cv:: CONFIG proxy.config.output.logfile STRING traffic.out
+.. ts:cv:: CONFIG proxy.config.output.logfile.name STRING traffic.out
This is used for log rolling configuration so |TS| knows the path of the
output file that should be rolled. This configuration takes the name of the
file receiving :program:`traffic_server`
process output that is set via the ``--bind_stdout`` and ``--bind_stderr``
:ref:`command-line options <traffic_server>`.
- :ts:cv:`proxy.config.output.logfile` is used only to identify the name of
+ :ts:cv:`proxy.config.output.logfile.name` is used only to identify the name
of
the output file for log rolling purposes and does not override the values
set via ``--bind_stdout`` and ``--bind_stderr``.
@@ -3289,7 +3289,7 @@ Logging Configuration
If set to a non-zero value :arg:`N` then any connection that takes longer
than :arg:`N` milliseconds from accept to
completion will cause its timing stats to be written to the
:ts:cv:`debugging log file
- <proxy.config.output.logfile>`. This is identifying data about the
transaction and all of the :cpp:type:`transaction milestones
<TSMilestonesType>`.
+ <proxy.config.output.logfile.name>`. This is identifying data about the
transaction and all of the :cpp:type:`transaction milestones
<TSMilestonesType>`.
.. ts:cv:: CONFIG proxy.config.http2.connection.slow.log.threshold INT 0
:reloadable:
@@ -3298,7 +3298,7 @@ Logging Configuration
If set to a non-zero value :arg:`N` then any HTTP/2 connection
that takes longer than :arg:`N` milliseconds from open to close will cause
its timing stats to be written to the :ts:cv:`debugging log file
- <proxy.config.output.logfile>`. This is identifying data about the
+ <proxy.config.output.logfile.name>`. This is identifying data about the
transaction and all of the :cpp:type:`transaction milestones
<TSMilestonesType>`.
.. ts:cv:: CONFIG proxy.config.http2.stream.slow.log.threshold INT 0
@@ -3308,7 +3308,7 @@ Logging Configuration
If set to a non-zero value :arg:`N` then any HTTP/2 stream
that takes longer than :arg:`N` milliseconds from open to close will cause
its timing stats to be written to the :ts:cv:`debugging log file
- <proxy.config.output.logfile>`. This is identifying data about the
+ <proxy.config.output.logfile.name>`. This is identifying data about the
transaction and all of the :cpp:type:`transaction milestones
<TSMilestonesType>`.
.. ts:cv:: CONFIG proxy.config.log.config.filename STRING logging.yaml
@@ -3722,7 +3722,7 @@ SSL Termination
Enables (``1``) or disables (``0``) TLS v1.2. If not specified, enabled by
default. [Requires OpenSSL v1.0.1 and higher]
-.. ts:cv:: CONFIG proxy.config.ssl.TLSv1_3 INT 1
+.. ts:cv:: CONFIG proxy.config.ssl.TLSv1_3.enabled INT 1
:deprecated:
This setting is deprecated in favor of
:ts:cv:`proxy.config.ssl.server.version.min` and
@@ -3843,7 +3843,7 @@ SSL Termination
a single segment after ~1 second of inactivity and the record size ramping
mechanism is repeated again.
-.. ts:cv:: CONFIG proxy.config.ssl.origin_session_cache INT 1
+.. ts:cv:: CONFIG proxy.config.ssl.origin_session_cache.enabled INT 1
This configuration enables the SSL session cache for the origin server
when set to ``1``.
@@ -3858,7 +3858,7 @@ SSL Termination
Setting a value less than or equal to ``0`` effectively disables
SSL session cache for the origin server.
-.. ts:cv:: CONFIG proxy.config.ssl.session_cache INT 2
+.. ts:cv:: CONFIG proxy.config.ssl.session_cache.enabled INT 2
Enables the SSL session cache:
@@ -3878,7 +3878,7 @@ SSL Termination
entries in seconds. If it is ``0``, then the SSL library will use
a default value, typically 300 seconds. Note: This option has no affect
when using the |TS| session cache (option ``2`` in
- ``proxy.config.ssl.session_cache``)
+ ``proxy.config.ssl.session_cache.enabled``)
See :ref:`admin-performance-timeouts` for more discussion on |TS| timeouts.
@@ -3920,9 +3920,9 @@ SSL Termination
Take into account that setting the value to 0 will disable session caching
for TLSv1.3
connections.
- Lowering this setting to ``1`` can be interesting when
``proxy.config.ssl.session_cache`` is enabled because
+ Lowering this setting to ``1`` can be interesting when
``proxy.config.ssl.session_cache.enabled`` is enabled because
otherwise for every new TLSv1.3 connection two session IDs will be inserted
in the session cache.
- On the other hand, if ``proxy.config.ssl.session_cache`` is disabled, using
the default value is recommended.
+ On the other hand, if ``proxy.config.ssl.session_cache.enabled`` is
disabled, using the default value is recommended.
In those scenarios, increasing the number of tickets could be potentially
beneficial for clients performing
multiple requests over concurrent TLS connections as per RFC 8446 clients
SHOULDN'T reuse TLS Tickets.
@@ -4187,7 +4187,7 @@ Client-Related Configuration
Enables (``1``) or disables (``0``) TLSv1_2 in the ATS client context. If
not specified, enabled by default
-.. ts:cv:: CONFIG proxy.config.ssl.client.TLSv1_3 INT 1
+.. ts:cv:: CONFIG proxy.config.ssl.client.TLSv1_3.enabled INT 1
:deprecated:
This setting is deprecated in favor of
:ts:cv:`proxy.config.ssl.client.version.min` and
@@ -4293,7 +4293,7 @@ SNI Routing
Frequency of checking the activity of SNI Routing Tunnel. Set to ``0`` to
disable monitoring of the activity of the SNI tunnels.
The feature is disabled by default.
-.. ts:cv:: CONFIG proxy.config.tunnel.prewarm INT 0
+.. ts:cv:: CONFIG proxy.config.tunnel.prewarm.enabled INT 0
Enable :ref:`pre-warming-tls-tunnel`. The feature is disabled by default.
diff --git a/doc/admin-guide/files/sni.yaml.en.rst
b/doc/admin-guide/files/sni.yaml.en.rst
index 191fefb010..569d176f9c 100644
--- a/doc/admin-guide/files/sni.yaml.en.rst
+++ b/doc/admin-guide/files/sni.yaml.en.rst
@@ -155,7 +155,7 @@ valid_tls_version_min_in Inbound This
specifies the minimum TL
the TLS negotiation. This
replaces the global settings in
:ts:cv:`proxy.config.ssl.server.version.min`,
:ts:cv:`proxy.config.ssl.TLSv1`, :ts:cv:`proxy.config.ssl.TLSv1_1`,
-
:ts:cv:`proxy.config.ssl.TLSv1_2`, and :ts:cv:`proxy.config.ssl.TLSv1_3`. The
potential
+
:ts:cv:`proxy.config.ssl.TLSv1_2`, and
:ts:cv:`proxy.config.ssl.TLSv1_3.enabled`. The potential
values are TLSv1, TLSv1_1,
TLSv1_2, and TLSv1_3. This key is only valid for OpenSSL
1.1.0 and later and
BoringSSL. Older versions of OpenSSL do not provide a hook early enough to
update
the SSL object. It is a
syntax error for |TS| built against earlier versions.
@@ -164,7 +164,7 @@ valid_tls_version_max_in Inbound This
specifies the minimum TL
the TLS negotiation. This
replaces the global settings in
:ts:cv:`proxy.config.ssl.server.version.max`,
:ts:cv:`proxy.config.ssl.TLSv1`, :ts:cv:`proxy.config.ssl.TLSv1_1`,
-
:ts:cv:`proxy.config.ssl.TLSv1_2`, and :ts:cv:`proxy.config.ssl.TLSv1_3`. The
potential
+
:ts:cv:`proxy.config.ssl.TLSv1_2`, and
:ts:cv:`proxy.config.ssl.TLSv1_3.enabled`. The potential
values are TLSv1, TLSv1_1,
TLSv1_2, and TLSv1_3. This key is only valid for OpenSSL
1.1.0 and later and
BoringSSL. Older versions of OpenSSL do not provide a hook early enough to
update
the SSL object. It is a
syntax error for |TS| built against earlier versions.
@@ -172,7 +172,7 @@ valid_tls_version_max_in Inbound This
specifies the minimum TL
valid_tls_versions_in Inbound Deprecated. This specifies
the list of TLS protocols that will be offered to user agents during
the TLS negotiation. This
replaces the global settings in
:ts:cv:`proxy.config.ssl.TLSv1`, :ts:cv:`proxy.config.ssl.TLSv1_1`,
-
:ts:cv:`proxy.config.ssl.TLSv1_2`, and :ts:cv:`proxy.config.ssl.TLSv1_3`. The
potential
+
:ts:cv:`proxy.config.ssl.TLSv1_2`, and
:ts:cv:`proxy.config.ssl.TLSv1_3.enabled`. The potential
values are TLSv1, TLSv1_1,
TLSv1_2, and TLSv1_3. You must list all protocols that |TS|
should offer to the client
when using this key. This key is only valid for OpenSSL
1.1.0 and later and
BoringSSL. Older versions of OpenSSL do not provide a hook early enough to
update
@@ -295,7 +295,7 @@ Pre-warming TLS Tunnel
===============================
========================================================================================
Key Meaning
===============================
========================================================================================
-tunnel_prewarm Override :ts:cv:`proxy.config.tunnel.prewarm`
in records.yaml.
+tunnel_prewarm Override
:ts:cv:`proxy.config.tunnel.prewarm.enabled` in records.yaml.
tunnel_prewarm_srv Enable SRV record lookup on pre-warming.
Default is ``false``.
diff --git a/doc/admin-guide/performance/index.en.rst
b/doc/admin-guide/performance/index.en.rst
index 797d543965..689ef41ea4 100644
--- a/doc/admin-guide/performance/index.en.rst
+++ b/doc/admin-guide/performance/index.en.rst
@@ -528,7 +528,7 @@ SSL-Specific Options
~~~~~~~~~~~~~~~~~~~~
:ts:cv:`proxy.config.ssl.max_record_size`
-:ts:cv:`proxy.config.ssl.session_cache`
+:ts:cv:`proxy.config.ssl.session_cache.enabled`
:ts:cv:`proxy.config.ssl.session_cache.size`
Thread Types
diff --git a/doc/developer-guide/api/functions/TSSslSession.en.rst
b/doc/developer-guide/api/functions/TSSslSession.en.rst
index 0c43b6faac..2e0ab9230b 100644
--- a/doc/developer-guide/api/functions/TSSslSession.en.rst
+++ b/doc/developer-guide/api/functions/TSSslSession.en.rst
@@ -38,7 +38,7 @@ Description
===========
These functions work with the internal ATS session cache. These functions are
only useful if the ATS internal
-session cache is enabled by setting :ts:cv:`proxy.config.ssl.session_cache`
has been set to 2.
+session cache is enabled by setting
:ts:cv:`proxy.config.ssl.session_cache.enabled` has been set to 2.
These functions tend to be used with the :enumerator:`TS_SSL_SESSION_HOOK`.
diff --git
a/doc/developer-guide/plugins/hooks-and-transactions/ssl-session-api.en.rst
b/doc/developer-guide/plugins/hooks-and-transactions/ssl-session-api.en.rst
index 32b89a570a..d6f050872d 100644
--- a/doc/developer-guide/plugins/hooks-and-transactions/ssl-session-api.en.rst
+++ b/doc/developer-guide/plugins/hooks-and-transactions/ssl-session-api.en.rst
@@ -31,7 +31,7 @@ to enable the plugin to update the session cache based on
outside information, e
This hook is invoked when a change has been made to the ATS session cache or a
session has been accessed
from ATS via OpenSSL. These hooks are only activated if the ATS
implementation of the session cache is in
-use. This means :ts:cv:`proxy.config.ssl.session_cache` has been set to 2.
+use. This means :ts:cv:`proxy.config.ssl.session_cache.enabled` has been set
to 2.
The hook callback has the following signature
diff --git a/doc/release-notes/upgrading.en.rst
b/doc/release-notes/upgrading.en.rst
index 59330e35ad..3a2e96f277 100644
--- a/doc/release-notes/upgrading.en.rst
+++ b/doc/release-notes/upgrading.en.rst
@@ -131,6 +131,7 @@ Configuration Changes
The following incompatible changes to the configurations have been made in
this version of ATS.
The ``records.config`` file has been renamed to :file:`records.yaml` and now
it is structured in YAML format.
+Check :ref:`rec-config-to-yaml` and :file:`records.yaml` for more details.
The following :file:`records.yaml` changes have been made:
@@ -160,6 +161,13 @@ The following :file:`records.yaml` changes have been made:
same as :ts:cv:`proxy.config.http.per_server.connection.max`
- The records.yaml entry
:ts:cv:`proxy.config.http.no_dns_just_forward_to_parent` is
not overridable
+- The records.yaml entry ``proxy.config.output.logfile`` has been renamed to
:ts:cv:`proxy.config.output.logfile.name`.
+- The records.yaml entry ``proxy.config.exec_thread.autoconfig`` has been
renamed to :ts:cv:`proxy.config.exec_thread.autoconfig.enabled`.
+- The records.yaml entry ``proxy.config.tunnel.prewarm`` has been renamed to
:ts:cv:`proxy.config.tunnel.prewarm.enabled`.
+- The records.yaml entry ``proxy.config.ssl.origin_session_cache`` has been
renamed to :ts:cv:`proxy.config.ssl.origin_session_cache.enabled`.
+- The records.yaml entry ``proxy.config.ssl.session_cache`` has been renamed
to :ts:cv:`proxy.config.ssl.session_cache.enabled`.
+- The records.yaml entry ``proxy.config.ssl.TLSv1_3`` has been renamed to
:ts:cv:`proxy.config.ssl.TLSv1_3.enabled`.
+- The records.yaml entry ``proxy.config.ssl.client.TLSv1_3`` has been renamed
to :ts:cv:`proxy.config.ssl.client.TLSv1_3.enabled`.
- The records.yaml entry :ts:cv:`proxy.config.allocator.iobuf_chunk_sizes` has
been added
to enable more control of iobuffer allocation.
- The records.yaml entry :ts:cv:`proxy.config.allocator.hugepages` will enable