依据青岛擎方整理的一整套docker部署方案, 包含emqx,lefaceSvr,web后台程序,redis,msql,nginx等,均使用docker部署。
Não pode escolher mais do que 25 tópicos Os tópicos devem começar com uma letra ou um número, podem incluir traços ('-') e podem ter até 35 caracteres.
 
 
 
 
 

177 linhas
5.7 KiB

  1. ##--------------------------------------------------------------------
  2. ## HTTP Auth/ACL Plugin
  3. ##--------------------------------------------------------------------
  4. ## HTTP URL API path for Auth Request
  5. ##
  6. ## Value: URL
  7. ##
  8. ## Examples: http://127.0.0.1:80/mqtt/auth, https://[::1]:80/mqtt/auth
  9. auth.http.auth_req.url = http://127.0.0.1:80/mqtt/auth
  10. ## HTTP Request Method for Auth Request
  11. ##
  12. ## Value: post | get
  13. auth.http.auth_req.method = post
  14. ## HTTP Request Headers for Auth Request, Content-Type header is configured by default.
  15. ## The possible values of the Content-Type header: application/x-www-form-urlencoded, application/json
  16. ##
  17. ## Examples: auth.http.auth_req.headers.accept = */*
  18. auth.http.auth_req.headers.content_type = application/x-www-form-urlencoded
  19. ## Parameters used to construct the request body or query string parameters
  20. ## When the request method is GET, these parameters will be converted into query string parameters
  21. ## When the request method is POST, the final format is determined by content-type
  22. ##
  23. ## Available Variables:
  24. ## - %u: username
  25. ## - %c: clientid
  26. ## - %a: ipaddress
  27. ## - %r: protocol
  28. ## - %P: password
  29. ## - %p: sockport of server accepted
  30. ## - %C: common name of client TLS cert
  31. ## - %d: subject of client TLS cert
  32. ##
  33. ## Value: <K1>=<V1>,<K2>=<V2>,...
  34. auth.http.auth_req.params = clientid=%c,username=%u,password=%P
  35. ## HTTP URL API path for SuperUser Request
  36. ##
  37. ## Value: URL
  38. ##
  39. ## Examples: http://127.0.0.1:80/mqtt/superuser, https://[::1]:80/mqtt/superuser
  40. auth.http.super_req.url = http://127.0.0.1:80/mqtt/superuser
  41. ## HTTP Request Method for SuperUser Request
  42. ##
  43. ## Value: post | get
  44. auth.http.super_req.method = post
  45. ## HTTP Request Headers for SuperUser Request, Content-Type header is configured by default.
  46. ## The possible values of the Content-Type header: application/x-www-form-urlencoded, application/json
  47. ##
  48. ## Examples: auth.http.super_req.headers.accept = */*
  49. auth.http.super_req.headers.content-type = application/x-www-form-urlencoded
  50. ## Parameters used to construct the request body or query string parameters
  51. ## When the request method is GET, these parameters will be converted into query string parameters
  52. ## When the request method is POST, the final format is determined by content-type
  53. ##
  54. ## Available Variables:
  55. ## - %u: username
  56. ## - %c: clientid
  57. ## - %a: ipaddress
  58. ## - %r: protocol
  59. ## - %P: password
  60. ## - %p: sockport of server accepted
  61. ## - %C: common name of client TLS cert
  62. ## - %d: subject of client TLS cert
  63. ##
  64. ## Value: <K1>=<V1>,<K2>=<V2>,...
  65. auth.http.super_req.params = clientid=%c,username=%u
  66. ## HTTP URL API path for ACL Request
  67. ## Comment out this config to disable ACL checks
  68. ##
  69. ## Value: URL
  70. ##
  71. ## Examples: http://127.0.0.1:80/mqtt/acl, https://[::1]:80/mqtt/acl
  72. auth.http.acl_req.url = http://127.0.0.1:80/mqtt/acl
  73. ## HTTP Request Method for ACL Request
  74. ##
  75. ## Value: post | get
  76. auth.http.acl_req.method = post
  77. ## HTTP Request Headers for ACL Request, Content-Type header is configured by default.
  78. ## The possible values of the Content-Type header: application/x-www-form-urlencoded, application/json
  79. ##
  80. ## Examples: auth.http.acl_req.headers.accept = */*
  81. auth.http.acl_req.headers.content-type = application/x-www-form-urlencoded
  82. ## Parameters used to construct the request body or query string parameters
  83. ## When the request method is GET, these parameters will be converted into query string parameters
  84. ## When the request method is POST, the final format is determined by content-type
  85. ##
  86. ## Available Variables:
  87. ## - %A: access (1 - subscribe, 2 - publish)
  88. ## - %u: username
  89. ## - %c: clientid
  90. ## - %a: ipaddress
  91. ## - %r: protocol
  92. ## - %P: password
  93. ## - %p: sockport of server accepted
  94. ## - %C: common name of client TLS cert
  95. ## - %d: subject of client TLS cert
  96. ## - %t: topic
  97. ##
  98. ## Value: <K1>=<V1>,<K2>=<V2>,...
  99. auth.http.acl_req.params = access=%A,username=%u,clientid=%c,ipaddr=%a,topic=%t,mountpoint=%m
  100. ## Time-out time for the request.
  101. ##
  102. ## Value: Duration
  103. ## -h: hour, e.g. '2h' for 2 hours
  104. ## -m: minute, e.g. '5m' for 5 minutes
  105. ## -s: second, e.g. '30s' for 30 seconds
  106. ##
  107. ## Default: 5s
  108. auth.http.timeout = 5s
  109. ## Connection time-out time, used during the initial request,
  110. ## when the client is connecting to the server.
  111. ##
  112. ## Value: Duration
  113. ## -h: hour, e.g. '2h' for 2 hours
  114. ## -m: minute, e.g. '5m' for 5 minutes
  115. ## -s: second, e.g. '30s' for 30 seconds
  116. ##
  117. ## Default: 5s
  118. auth.http.connect_timeout = 5s
  119. ## Connection process pool size
  120. ##
  121. ## Value: Number
  122. auth.http.pool_size = 32
  123. ## Whether to enable HTTP Pipelining
  124. ##
  125. ## See: https://en.wikipedia.org/wiki/HTTP_pipelining
  126. auth.http.enable_pipelining = true
  127. ##------------------------------------------------------------------------------
  128. ## SSL options
  129. ## Path to the file containing PEM-encoded CA certificates. The CA certificates
  130. ## are used during server authentication and when building the client certificate chain.
  131. ##
  132. ## Value: File
  133. ## auth.http.ssl.cacertfile = etc/certs/ca.pem
  134. ## The path to a file containing the client's certificate.
  135. ##
  136. ## Value: File
  137. ## auth.http.ssl.certfile = etc/certs/client-cert.pem
  138. ## Path to a file containing the client's private PEM-encoded key.
  139. ##
  140. ## Value: File
  141. ## auth.http.ssl.keyfile = etc/certs/client-key.pem
  142. ## In mode verify_none the default behavior is to allow all x509-path
  143. ## validation errors.
  144. ##
  145. ## Value: true | false
  146. ## auth.http.ssl.verify = false
  147. ## If not specified, the server's names returned in server's certificate is validated against
  148. ## what's provided `auth.http.auth_req.url` config's host part.
  149. ## Setting to 'disable' will make EMQ X ignore unmatched server names.
  150. ## If set with a host name, the server's names returned in server's certificate is validated
  151. ## against this value.
  152. ##
  153. ## Value: String | disable
  154. ## auth.http.ssl.server_name_indication = disable