"description": "EDNS(0) padding of queries and answers sent over an encrypted channel.",
"default": true
},
- "whitelist": {
+ "whitelist-file": {
"type": [
"string",
"null"
],
- "description": "Path to certificate authority whitelist file",
+ "description": "Path to certificate authority whitelist.",
"default": null
}
},
"sticket_secret_file": null,
"auto_discovery": false,
"padding": true,
- "whitelist": null
+ "whitelist_file": null
}
},
"proxy-protocol": {
"sticket_secret_file": null,
"auto_discovery": false,
"padding": true,
- "whitelist": null
+ "whitelist_file": null
},
"proxy_protocol": false,
"listen": [
sticket_secret_file: Path to file with secret for TLS session resumption via tickets. (RFC 5077).
auto_discovery: Experimental automatic discovery of authoritative servers supporting DNS-over-TLS.
padding: EDNS(0) padding of queries and answers sent over an encrypted channel.
- whitelist: Path to certificate authority whitelist file
+ whitelist_file: Path to certificate authority whitelist.
"""
files_watchdog: Union[Literal["auto"], bool] = "auto"
sticket_secret_file: Optional[ReadableFile] = None
auto_discovery: bool = False
padding: Union[bool, Int0_512] = True
- whitelist: Optional[ReadableFile] = None
+ whitelist_file: Optional[ReadableFile] = None
_LAYER = Raw
sticket_secret_file: Optional[ReadableFile] = None
auto_discovery: bool = False
padding: Union[bool, Int0_512] = True
- whitelist: Optional[ReadableFile] = None
+ whitelist_file: Optional[ReadableFile] = None
def _files_watchdog(self, obj: Raw) -> Any:
if obj.files_watchdog == "auto":
net.tls('{{ cfg.network.tls.cert_file }}', '{{ cfg.network.tls.key_file }}')
{% endif %}
-{% if cfg.network.tls.whitelist %}
--- network.tls_whitelist
-net.tls_whitelist('{{ cfg.network.tls.whitelist }}')
+{% if cfg.network.tls.whitelist_file %}
+-- network.tls.whitelist-file
+net.tls_whitelist('{{ cfg.network.tls.whitelist_file }}')
{% endif %}
{% if cfg.network.tls.sticket_secret %}