<p>Squid supports reading configuration option parameters from external
files using the syntax <em>parameters("/path/filename")</em>. For example:
<verb>
- acl whitelist dstdomain parameters("/etc/squid/whitelist.txt")
+ acl allowlist dstdomain parameters("/etc/squid/allowlist.txt")
</verb>
<p>There have also been changes to individual directives in the config file.
<p>Squid can be configured by adding an <em>http_port</em>
with the <em>require-proxy-header</em> mode flag. The <em>proxy_protocol_access</em>
- must also be configured with <em>src</em> ACLs to whitelist proxies which are
+ must also be configured with <em>src</em> ACLs to permit proxies which are
trusted to send correct client details.
<p>Forward-proxy traffic from a client proxy:
<p>Squid supports reading configuration option parameters from external
files using the syntax <em>parameters("/path/filename")</em>. For example:
<verb>
- acl whitelist dstdomain parameters("/etc/squid/whitelist.txt")
+ acl allowlist dstdomain parameters("/etc/squid/allowlist.txt")
</verb>
<p>The squid.conf macro <em>${service_name}</em> is added to provide the service name
}
const Notes::Keys &
-Notes::BlackList()
+Notes::ReservedKeys()
{
// these keys are used for internal Squid-helper communication
static const char *names[] = {
return keys;
}
-Notes::Notes(const char *aDescr, const Keys *extraBlacklist, bool allowFormatted):
+Notes::Notes(const char *aDescr, const Keys *extraReservedKeys, bool allowFormatted):
descr(aDescr),
formattedValues(allowFormatted)
{
- if (extraBlacklist)
- blacklist = *extraBlacklist;
+ if (extraReservedKeys)
+ reservedKeys = *extraReservedKeys;
}
Note::Pointer
void
Notes::validateKey(const SBuf &key) const
{
- banReservedKey(key, BlackList());
- banReservedKey(key, blacklist);
+ banReservedKey(key, ReservedKeys());
+ banReservedKey(key, reservedKeys);
// TODO: fix code duplication: the same set of specials is produced
// by isKeyNameChar().
typedef NotesList::iterator iterator; ///< iterates over the notes list
typedef NotesList::const_iterator const_iterator; ///< iterates over the notes list
- explicit Notes(const char *aDescr, const Keys *extraBlacklist = nullptr, bool allowFormatted = true);
+ explicit Notes(const char *aDescr, const Keys *extraReservedKeys = nullptr, bool allowFormatted = true);
Notes() = default;
~Notes() { notes.clear(); }
Notes(const Notes&) = delete;
/// Makes sure the given key is not on the given list of banned names.
void banReservedKey(const SBuf &key, const Keys &banned) const;
- /// Verifies that the key is not blacklisted (fatal error) and
+ /// Verifies that the key is not reserved (fatal error) and
/// does not contain special characters (non-fatal error).
void validateKey(const SBuf &key) const;
NotesList notes; ///< The Note::Pointer objects array list
const char *descr = nullptr; ///< identifies note source in error messages
- Keys blacklist; ///< a list of additional prohibited key names
+ Keys reservedKeys; ///< a list of additional prohibited key names
bool formattedValues = false; ///< whether to expand quoted logformat %codes
- static const Notes::Keys &BlackList(); ///< always prohibited key names
+ static const Notes::Keys &ReservedKeys(); ///< always prohibited key names
};
/**
files using the syntax:
parameters("/path/filename")
For example:
- acl whitelist dstdomain parameters("/etc/squid/whitelist.txt")
+ acl allowlist dstdomain parameters("/etc/squid/allowlist.txt")
Conditional configuration
require-proxy-header
Require PROXY protocol version 1 or 2 connections.
- The proxy_protocol_access is required to whitelist
+ The proxy_protocol_access is required to permit
downstream proxies which can be trusted.
worker-queues
static bool
Ftp::SupportedCommand(const SBuf &name)
{
- static std::set<SBuf> BlackList;
- if (BlackList.empty()) {
+ static std::set<SBuf> BlockList;
+ if (BlockList.empty()) {
/* Add FTP commands that Squid cannot relay correctly. */
// We probably do not support AUTH TLS.* and AUTH SSL,
// but let's disclaim all AUTH support to KISS, for now.
- BlackList.insert(cmdAuth());
+ BlockList.insert(cmdAuth());
}
// we claim support for all commands that we do not know about
- return BlackList.find(name) == BlackList.end();
+ return BlockList.find(name) == BlockList.end();
}