<p>Squid supports reading configuration option parameters from external
files using the syntax <em>parameters("/path/filename")</em>. For example:
<verb>
- acl whitelist dstdomain parameters("/etc/squid/whitelist.txt")
+ acl allowlist dstdomain parameters("/etc/squid/allowlist.txt")
</verb>
<p>There have also been changes to individual directives in the config file.
<p>Squid can be configured by adding an <em>http_port</em>
with the <em>require-proxy-header</em> mode flag. The <em>proxy_protocol_access</em>
- must also be configured with <em>src</em> ACLs to whitelist proxies which are
+ must also be configured with <em>src</em> ACLs to permit proxies which are
trusted to send correct client details.
<p>Forward-proxy traffic from a client proxy:
<p>Squid supports reading configuration option parameters from external
files using the syntax <em>parameters("/path/filename")</em>. For example:
<verb>
- acl whitelist dstdomain parameters("/etc/squid/whitelist.txt")
+ acl allowlist dstdomain parameters("/etc/squid/allowlist.txt")
</verb>
<p>The squid.conf macro <em>${service_name}</em> is added to provide the service name
#
# By default, a hand-picked subset of Squid repository sources is fixed.
#
-# See ${WHITE_LIST} below for the list of allowed misspellings.
+# See ${ALLOW_LIST} below for the list of allowed misspellings.
#
set -e
exit 1
fi
-WHITE_LIST=scripts/codespell-whitelist.txt
-if test ! -f "${WHITE_LIST}"; then
- echo "${WHITE_LIST} does not exist"
+IGNORE_LIST=scripts/codespell-ignorelist.txt
+if test ! -f "${IGNORE_LIST}"; then
+ echo "${IGNORE_LIST} does not exist"
exit 1
fi
*.sql|\
errors/templates/ERR_*|\
INSTALL|README|QUICKSTART)
- if ! codespell -d -q 3 -w -I "${WHITE_LIST}" ${FILENAME}; then
+ if ! codespell -d -q 3 -w -I "${IGNORE_LIST}" ${FILENAME}; then
echo "codespell failed for ${FILENAME}"
exit 1
fi
}
const Notes::Keys &
-Notes::BlackList()
+Notes::ReservedKeys()
{
// these keys are used for internal Squid-helper communication
static const char *names[] = {
return keys;
}
-Notes::Notes(const char *aDescr, const Keys *extraBlacklist, bool allowFormatted):
+Notes::Notes(const char *aDescr, const Keys *extraReservedKeys, bool allowFormatted):
descr(aDescr),
formattedValues(allowFormatted)
{
- if (extraBlacklist)
- blacklist = *extraBlacklist;
+ if (extraReservedKeys)
+ reservedKeys = *extraReservedKeys;
}
Note::Pointer
void
Notes::validateKey(const SBuf &key) const
{
- banReservedKey(key, BlackList());
- banReservedKey(key, blacklist);
+ banReservedKey(key, ReservedKeys());
+ banReservedKey(key, reservedKeys);
// TODO: fix code duplication: the same set of specials is produced
// by isKeyNameChar().
typedef NotesList::iterator iterator; ///< iterates over the notes list
typedef NotesList::const_iterator const_iterator; ///< iterates over the notes list
- explicit Notes(const char *aDescr, const Keys *extraBlacklist = nullptr, bool allowFormatted = true);
+ explicit Notes(const char *aDescr, const Keys *extraReservedKeys = nullptr, bool allowFormatted = true);
Notes() = default;
~Notes() { notes.clear(); }
Notes(const Notes&) = delete;
/// Makes sure the given key is not on the given list of banned names.
void banReservedKey(const SBuf &key, const Keys &banned) const;
- /// Verifies that the key is not blacklisted (fatal error) and
+ /// Verifies that the key is not reserved (fatal error) and
/// does not contain special characters (non-fatal error).
void validateKey(const SBuf &key) const;
NotesList notes; ///< The Note::Pointer objects array list
const char *descr = nullptr; ///< identifies note source in error messages
- Keys blacklist; ///< a list of additional prohibited key names
+ Keys reservedKeys; ///< a list of additional prohibited key names
bool formattedValues = false; ///< whether to expand quoted logformat %codes
- static const Notes::Keys &BlackList(); ///< always prohibited key names
+ static const Notes::Keys &ReservedKeys(); ///< always prohibited key names
};
/**
files using the syntax:
parameters("/path/filename")
For example:
- acl whitelist dstdomain parameters("/etc/squid/whitelist.txt")
+ acl allowlist dstdomain parameters("/etc/squid/allowlist.txt")
Conditional configuration
require-proxy-header
Require PROXY protocol version 1 or 2 connections.
- The proxy_protocol_access is required to whitelist
+ The proxy_protocol_access is required to permit
downstream proxies which can be trusted.
worker-queues
static bool
Ftp::SupportedCommand(const SBuf &name)
{
- static std::set<SBuf> BlackList;
- if (BlackList.empty()) {
+ static std::set<SBuf> BlockList;
+ if (BlockList.empty()) {
/* Add FTP commands that Squid cannot relay correctly. */
// We probably do not support AUTH TLS.* and AUTH SSL,
// but let's disclaim all AUTH support to KISS, for now.
- BlackList.insert(cmdAuth());
+ BlockList.insert(cmdAuth());
}
// we claim support for all commands that we do not know about
- return BlackList.find(name) == BlackList.end();
+ return BlockList.find(name) == BlockList.end();
}