You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -2080,6 +2085,87 @@ This directive was first introduced in the `v0.5.13` release.
2080
2085
2081
2086
[Back to TOC](#directives)
2082
2087
2088
+
lua_ssl_ciphers
2089
+
---------------
2090
+
2091
+
**syntax:***lua_ssl_ciphers <ciphers>*
2092
+
2093
+
**default:***lua_ssl_ciphers DEFAULT*
2094
+
2095
+
**context:***http, server, location*
2096
+
2097
+
Specifies the enabled ciphers for requests to a SSL/TLS server in the [tcpsock:sslhandshake](#tcpsocksslhandshake) method. The ciphers are specified in the format understood by the OpenSSL library.
2098
+
2099
+
The full list can be viewed using the “openssl ciphers” command.
2100
+
2101
+
This directive was first introduced in the `v0.9.11` release.
2102
+
2103
+
[Back to TOC](#directives)
2104
+
2105
+
lua_ssl_crl
2106
+
-----------
2107
+
2108
+
**syntax:***lua_ssl_crl <file>*
2109
+
2110
+
**default:***no*
2111
+
2112
+
**context:***http, server, location*
2113
+
2114
+
Specifies a file with revoked certificates (CRL) in the PEM format used to verify the certificate of the SSL/TLS server in the [tcpsock:sslhandshake](#tcpsocksslhandshake) method.
2115
+
2116
+
This directive was first introduced in the `v0.9.11` release.
Specifies a file path with trusted CA certificates in the PEM format used to verify the certificate of the SSL/TLS server in the [tcpsock:sslhandshake](#tcpsocksslhandshake) method.
2145
+
2146
+
This directive was first introduced in the `v0.9.11` release.
2147
+
2148
+
See also [lua_ssl_verify_depth](#lua_ssl_verify_depth).
2149
+
2150
+
[Back to TOC](#directives)
2151
+
2152
+
lua_ssl_verify_depth
2153
+
--------------------
2154
+
2155
+
**syntax:***lua_ssl_verify_depth <number>*
2156
+
2157
+
**default:***lua_ssl_verify_depth 1*
2158
+
2159
+
**context:***http, server, location*
2160
+
2161
+
Sets the verification depth in the server certificates chain.
2162
+
2163
+
This directive was first introduced in the `v0.9.11` release.
2164
+
2165
+
See also [lua_ssl_trusted_certificate](#lua_ssl_trusted_certificate).
2166
+
2167
+
[Back to TOC](#directives)
2168
+
2083
2169
lua_http10_buffering
2084
2170
--------------------
2085
2171
@@ -2303,6 +2389,7 @@ Nginx API for Lua
2303
2389
*[udpsock:settimeout](#udpsocksettimeout)
2304
2390
*[ngx.socket.tcp](#ngxsockettcp)
2305
2391
*[tcpsock:connect](#tcpsockconnect)
2392
+
*[tcpsock:sslhandshake](#tcpsocksslhandshake)
2306
2393
*[tcpsock:send](#tcpsocksend)
2307
2394
*[tcpsock:receive](#tcpsockreceive)
2308
2395
*[tcpsock:receiveuntil](#tcpsockreceiveuntil)
@@ -5660,6 +5747,7 @@ ngx.socket.tcp
5660
5747
Creates and returns a TCP or stream-oriented unix domain socket object (also known as one type of the "cosocket" objects). The following methods are supported on this object:
5661
5748
5662
5749
*[connect](#tcpsockconnect)
5750
+
*[sslhandshake](#tcpsocksslhandshake)
5663
5751
*[send](#tcpsocksend)
5664
5752
*[receive](#tcpsockreceive)
5665
5753
*[close](#tcpsockclose)
@@ -5762,6 +5850,48 @@ This method was first introduced in the `v0.5.0rc1` release.
Copy file name to clipboardExpand all lines: doc/HttpLuaModule.wiki
+106
Original file line number
Diff line number
Diff line change
@@ -1742,6 +1742,72 @@ This directive can be used to toggle error logging when a failure occurs for the
1742
1742
1743
1743
This directive was first introduced in the <code>v0.5.13</code> release.
1744
1744
1745
+
== lua_ssl_ciphers ==
1746
+
1747
+
'''syntax:''' ''lua_ssl_ciphers <ciphers>''
1748
+
1749
+
'''default:''' ''lua_ssl_ciphers DEFAULT''
1750
+
1751
+
'''context:''' ''http, server, location''
1752
+
1753
+
Specifies the enabled ciphers for requests to a SSL/TLS server in the [[#tcpsock:sslhandshake|tcpsock:sslhandshake]] method. The ciphers are specified in the format understood by the OpenSSL library.
1754
+
1755
+
The full list can be viewed using the “openssl ciphers” command.
1756
+
1757
+
This directive was first introduced in the <code>v0.9.11</code> release.
1758
+
1759
+
== lua_ssl_crl ==
1760
+
1761
+
'''syntax:''' ''lua_ssl_crl <file>''
1762
+
1763
+
'''default:''' ''no''
1764
+
1765
+
'''context:''' ''http, server, location''
1766
+
1767
+
Specifies a file with revoked certificates (CRL) in the PEM format used to verify the certificate of the SSL/TLS server in the [[#tcpsock:sslhandshake|tcpsock:sslhandshake]] method.
1768
+
1769
+
This directive was first introduced in the <code>v0.9.11</code> release.
Specifies a file path with trusted CA certificates in the PEM format used to verify the certificate of the SSL/TLS server in the [[#tcpsock:sslhandshake|tcpsock:sslhandshake]] method.
1792
+
1793
+
This directive was first introduced in the <code>v0.9.11</code> release.
1794
+
1795
+
See also [[#lua_ssl_verify_depth|lua_ssl_verify_depth]].
1796
+
1797
+
== lua_ssl_verify_depth ==
1798
+
1799
+
'''syntax:''' ''lua_ssl_verify_depth <number>''
1800
+
1801
+
'''default:''' ''lua_ssl_verify_depth 1''
1802
+
1803
+
'''context:''' ''http, server, location''
1804
+
1805
+
Sets the verification depth in the server certificates chain.
1806
+
1807
+
This directive was first introduced in the <code>v0.9.11</code> release.
1808
+
1809
+
See also [[#lua_ssl_trusted_certificate|lua_ssl_trusted_certificate]].
1810
+
1745
1811
== lua_http10_buffering ==
1746
1812
1747
1813
'''syntax:''' ''lua_http10_buffering on|off''
@@ -4740,6 +4806,7 @@ This feature was first introduced in the <code>v0.5.7</code> release.
4740
4806
Creates and returns a TCP or stream-oriented unix domain socket object (also known as one type of the "cosocket" objects). The following methods are supported on this object:
4741
4807
4742
4808
* [[#tcpsock:connect|connect]]
4809
+
* [[#tcpsock:sslhandshake|sslhandshake]]
4743
4810
* [[#tcpsock:send|send]]
4744
4811
* [[#tcpsock:receive|receive]]
4745
4812
* [[#tcpsock:close|close]]
@@ -4833,6 +4900,45 @@ The support for the options table argument was first introduced in the <code>v0.
4833
4900
4834
4901
This method was first introduced in the <code>v0.5.0rc1</code> release.
0 commit comments