From 90a4827284acd3cb072cdfeef323c522802c6449 Mon Sep 17 00:00:00 2001
From: sarthurdev <965089+sarthurdev@users.noreply.github.com>
Date: Wed, 9 Oct 2024 14:55:11 +0200
Subject: haproxy: T6745: Rename `reverse-proxy` to `haproxy`
---
.../include/version/reverseproxy-version.xml.i | 2 +-
.../load-balancing_haproxy.xml.in | 344 +++++++++++++++++++++
.../load-balancing_reverse-proxy.xml.in | 344 ---------------------
3 files changed, 345 insertions(+), 345 deletions(-)
create mode 100644 interface-definitions/load-balancing_haproxy.xml.in
delete mode 100644 interface-definitions/load-balancing_reverse-proxy.xml.in
(limited to 'interface-definitions')
diff --git a/interface-definitions/include/version/reverseproxy-version.xml.i b/interface-definitions/include/version/reverseproxy-version.xml.i
index 907ea1e5e..4f09f2848 100644
--- a/interface-definitions/include/version/reverseproxy-version.xml.i
+++ b/interface-definitions/include/version/reverseproxy-version.xml.i
@@ -1,3 +1,3 @@
-
+
diff --git a/interface-definitions/load-balancing_haproxy.xml.in b/interface-definitions/load-balancing_haproxy.xml.in
new file mode 100644
index 000000000..742272436
--- /dev/null
+++ b/interface-definitions/load-balancing_haproxy.xml.in
@@ -0,0 +1,344 @@
+
+
+
+
+
+
+ Configure haproxy
+ 900
+
+
+
+
+ Frontend service name
+
+ #include
+
+ Server name must be alphanumeric and can contain hyphen and underscores
+
+
+
+
+ Backend member
+
+ #include
+
+ Backend name must be alphanumeric and can contain hyphen and underscores
+
+ txt
+ Name of haproxy backend system
+
+
+ load-balancing haproxy backend
+
+
+
+
+ #include
+ #include
+ #include
+ #include
+ #include
+ #include
+ #include
+ #include
+
+
+ Redirect HTTP to HTTPS
+
+
+
+
+
+ SSL Certificate, SSL Key and CA
+
+
+ #include
+
+
+
+
+
+
+ Backend server name
+
+ #include
+
+ Backend name must be alphanumeric and can contain hyphen and underscores
+
+
+
+
+ Load-balancing algorithm
+
+ source-address round-robin least-connection
+
+
+ source-address
+ Based on hash of source IP address
+
+
+ round-robin
+ Round robin
+
+
+ least-connection
+ Least connection
+
+
+ (source-address|round-robin|least-connection)
+
+
+ round-robin
+
+ #include
+ #include
+ #include
+ #include
+
+
+ HTTP check configuration
+
+
+
+
+ HTTP method used for health check
+
+ options head get post put
+
+
+ options|head|get|post|put
+ HTTP method used for health checking
+
+
+ (options|head|get|post|put)
+
+
+
+
+
+ URI used for HTTP health check (Example: '/' or '/health')
+
+ ^\/([^?#\s]*)(\?[^#\s]*)?$
+
+
+
+
+
+ Expected response for the health check to pass
+
+
+
+
+ Expected response status code for the health check to pass
+
+ u32:200-399
+ Expected response code
+
+
+
+
+ Status code must be in range 200-399
+
+
+
+
+ Expected to be in response body for the health check to pass
+
+ txt
+ A string expected to be in the response
+
+
+
+
+
+
+
+
+
+ Non HTTP health check options
+
+ ldap mysql pgsql redis smtp
+
+
+ ldap
+ LDAP protocol check
+
+
+ mysql
+ MySQL protocol check
+
+
+ pgsql
+ PostgreSQL protocol check
+
+
+ redis
+ Redis protocol check
+
+
+ smtp
+ SMTP protocol check
+
+
+ (ldap|mysql|redis|pgsql|smtp)
+
+
+
+ #include
+
+
+ Backend server name
+
+
+
+
+ Backend server address
+
+ ipv4
+ IPv4 unicast peer address
+
+
+ ipv6
+ IPv6 unicast peer address
+
+
+
+
+
+
+
+
+ Use backup server if other servers are not available
+
+
+
+
+
+ Active health check backend server
+
+
+
+ #include
+
+
+ Send a Proxy Protocol version 1 header (text format)
+
+
+
+
+
+ Send a Proxy Protocol version 2 header (binary format)
+
+
+
+
+
+
+
+ SSL Certificate, SSL Key and CA
+
+
+ #include
+
+
+ Do not attempt to verify SSL certificates for backend servers
+
+
+
+
+
+ #include
+
+
+
+
+ Global perfomance parameters and limits
+
+
+ #include
+
+
+ Maximum allowed connections
+
+ u32:1-2000000
+ Maximum allowed connections
+
+
+
+
+
+
+
+
+ Cipher algorithms ("cipher suite") used during SSL/TLS handshake for all frontend servers
+
+ ecdhe-ecdsa-aes128-gcm-sha256 ecdhe-rsa-aes128-gcm-sha256 ecdhe-ecdsa-aes256-gcm-sha384 ecdhe-rsa-aes256-gcm-sha384 ecdhe-ecdsa-chacha20-poly1305 ecdhe-rsa-chacha20-poly1305 dhe-rsa-aes128-gcm-sha256 dhe-rsa-aes256-gcm-sha384
+
+
+ ecdhe-ecdsa-aes128-gcm-sha256
+ ecdhe-ecdsa-aes128-gcm-sha256
+
+
+ ecdhe-rsa-aes128-gcm-sha256
+ ecdhe-rsa-aes128-gcm-sha256
+
+
+ ecdhe-ecdsa-aes256-gcm-sha384
+ ecdhe-ecdsa-aes256-gcm-sha384
+
+
+ ecdhe-rsa-aes256-gcm-sha384
+ ecdhe-rsa-aes256-gcm-sha384
+
+
+ ecdhe-ecdsa-chacha20-poly1305
+ ecdhe-ecdsa-chacha20-poly1305
+
+
+ ecdhe-rsa-chacha20-poly1305
+ ecdhe-rsa-chacha20-poly1305
+
+
+ dhe-rsa-aes128-gcm-sha256
+ dhe-rsa-aes128-gcm-sha256
+
+
+ dhe-rsa-aes256-gcm-sha384
+ dhe-rsa-aes256-gcm-sha384
+
+
+ (ecdhe-ecdsa-aes128-gcm-sha256|ecdhe-rsa-aes128-gcm-sha256|ecdhe-ecdsa-aes256-gcm-sha384|ecdhe-rsa-aes256-gcm-sha384|ecdhe-ecdsa-chacha20-poly1305|ecdhe-rsa-chacha20-poly1305|dhe-rsa-aes128-gcm-sha256|dhe-rsa-aes256-gcm-sha384)
+
+
+
+ ecdhe-ecdsa-aes128-gcm-sha256 ecdhe-rsa-aes128-gcm-sha256 ecdhe-ecdsa-aes256-gcm-sha384 ecdhe-rsa-aes256-gcm-sha384 ecdhe-ecdsa-chacha20-poly1305 ecdhe-rsa-chacha20-poly1305 dhe-rsa-aes128-gcm-sha256 dhe-rsa-aes256-gcm-sha384
+
+
+
+ Specify the minimum required TLS version
+
+ 1.2 1.3
+
+
+ 1.2
+ TLS v1.2
+
+
+ 1.3
+ TLS v1.3
+
+
+ (1.2|1.3)
+
+
+ 1.3
+
+
+
+ #include
+
+
+
+
+
diff --git a/interface-definitions/load-balancing_reverse-proxy.xml.in b/interface-definitions/load-balancing_reverse-proxy.xml.in
deleted file mode 100644
index 18274622c..000000000
--- a/interface-definitions/load-balancing_reverse-proxy.xml.in
+++ /dev/null
@@ -1,344 +0,0 @@
-
-
-
-
-
-
- Configure reverse-proxy
- 900
-
-
-
-
- Frontend service name
-
- #include
-
- Server name must be alphanumeric and can contain hyphen and underscores
-
-
-
-
- Backend member
-
- #include
-
- Backend name must be alphanumeric and can contain hyphen and underscores
-
- txt
- Name of reverse-proxy backend system
-
-
- load-balancing reverse-proxy backend
-
-
-
-
- #include
- #include
- #include
- #include
- #include
- #include
- #include
- #include
-
-
- Redirect HTTP to HTTPS
-
-
-
-
-
- SSL Certificate, SSL Key and CA
-
-
- #include
-
-
-
-
-
-
- Backend server name
-
- #include
-
- Backend name must be alphanumeric and can contain hyphen and underscores
-
-
-
-
- Load-balancing algorithm
-
- source-address round-robin least-connection
-
-
- source-address
- Based on hash of source IP address
-
-
- round-robin
- Round robin
-
-
- least-connection
- Least connection
-
-
- (source-address|round-robin|least-connection)
-
-
- round-robin
-
- #include
- #include
- #include
- #include
-
-
- HTTP check configuration
-
-
-
-
- HTTP method used for health check
-
- options head get post put
-
-
- options|head|get|post|put
- HTTP method used for health checking
-
-
- (options|head|get|post|put)
-
-
-
-
-
- URI used for HTTP health check (Example: '/' or '/health')
-
- ^\/([^?#\s]*)(\?[^#\s]*)?$
-
-
-
-
-
- Expected response for the health check to pass
-
-
-
-
- Expected response status code for the health check to pass
-
- u32:200-399
- Expected response code
-
-
-
-
- Status code must be in range 200-399
-
-
-
-
- Expected to be in response body for the health check to pass
-
- txt
- A string expected to be in the response
-
-
-
-
-
-
-
-
-
- Non HTTP health check options
-
- ldap mysql pgsql redis smtp
-
-
- ldap
- LDAP protocol check
-
-
- mysql
- MySQL protocol check
-
-
- pgsql
- PostgreSQL protocol check
-
-
- redis
- Redis protocol check
-
-
- smtp
- SMTP protocol check
-
-
- (ldap|mysql|redis|pgsql|smtp)
-
-
-
- #include
-
-
- Backend server name
-
-
-
-
- Backend server address
-
- ipv4
- IPv4 unicast peer address
-
-
- ipv6
- IPv6 unicast peer address
-
-
-
-
-
-
-
-
- Use backup server if other servers are not available
-
-
-
-
-
- Active health check backend server
-
-
-
- #include
-
-
- Send a Proxy Protocol version 1 header (text format)
-
-
-
-
-
- Send a Proxy Protocol version 2 header (binary format)
-
-
-
-
-
-
-
- SSL Certificate, SSL Key and CA
-
-
- #include
-
-
- Do not attempt to verify SSL certificates for backend servers
-
-
-
-
-
- #include
-
-
-
-
- Global perfomance parameters and limits
-
-
- #include
-
-
- Maximum allowed connections
-
- u32:1-2000000
- Maximum allowed connections
-
-
-
-
-
-
-
-
- Cipher algorithms ("cipher suite") used during SSL/TLS handshake for all frontend servers
-
- ecdhe-ecdsa-aes128-gcm-sha256 ecdhe-rsa-aes128-gcm-sha256 ecdhe-ecdsa-aes256-gcm-sha384 ecdhe-rsa-aes256-gcm-sha384 ecdhe-ecdsa-chacha20-poly1305 ecdhe-rsa-chacha20-poly1305 dhe-rsa-aes128-gcm-sha256 dhe-rsa-aes256-gcm-sha384
-
-
- ecdhe-ecdsa-aes128-gcm-sha256
- ecdhe-ecdsa-aes128-gcm-sha256
-
-
- ecdhe-rsa-aes128-gcm-sha256
- ecdhe-rsa-aes128-gcm-sha256
-
-
- ecdhe-ecdsa-aes256-gcm-sha384
- ecdhe-ecdsa-aes256-gcm-sha384
-
-
- ecdhe-rsa-aes256-gcm-sha384
- ecdhe-rsa-aes256-gcm-sha384
-
-
- ecdhe-ecdsa-chacha20-poly1305
- ecdhe-ecdsa-chacha20-poly1305
-
-
- ecdhe-rsa-chacha20-poly1305
- ecdhe-rsa-chacha20-poly1305
-
-
- dhe-rsa-aes128-gcm-sha256
- dhe-rsa-aes128-gcm-sha256
-
-
- dhe-rsa-aes256-gcm-sha384
- dhe-rsa-aes256-gcm-sha384
-
-
- (ecdhe-ecdsa-aes128-gcm-sha256|ecdhe-rsa-aes128-gcm-sha256|ecdhe-ecdsa-aes256-gcm-sha384|ecdhe-rsa-aes256-gcm-sha384|ecdhe-ecdsa-chacha20-poly1305|ecdhe-rsa-chacha20-poly1305|dhe-rsa-aes128-gcm-sha256|dhe-rsa-aes256-gcm-sha384)
-
-
-
- ecdhe-ecdsa-aes128-gcm-sha256 ecdhe-rsa-aes128-gcm-sha256 ecdhe-ecdsa-aes256-gcm-sha384 ecdhe-rsa-aes256-gcm-sha384 ecdhe-ecdsa-chacha20-poly1305 ecdhe-rsa-chacha20-poly1305 dhe-rsa-aes128-gcm-sha256 dhe-rsa-aes256-gcm-sha384
-
-
-
- Specify the minimum required TLS version
-
- 1.2 1.3
-
-
- 1.2
- TLS v1.2
-
-
- 1.3
- TLS v1.3
-
-
- (1.2|1.3)
-
-
- 1.3
-
-
-
- #include
-
-
-
-
-
--
cgit v1.2.3