f22c9e2981f0aee4f7219143cbf5c346a1079dff
[cacert-puppet.git] / sitemodules / profiles / templates / sniproxy / sniproxy.conf.epp
1 <%- | Array[String] $https_forwards = [] | -%>
2 # sniproxy example configuration file
3 # lines that start with # are comments
4 # lines with only white space are ignored
5
6 user daemon
7
8 # PID file
9 pidfile /var/run/sniproxy.pid
10
11 error_log {
12 # Log to the daemon syslog facility
13 syslog daemon
14
15 # Alternatively we could log to file
16 #filename /var/log/sniproxy/sniproxy.log
17
18 # Control the verbosity of the log
19 priority notice
20 }
21
22 # blocks are delimited with {...}
23 #listen 80 {
24 # proto http
25 # table http_hosts
26 # # Fallback backend server to use if we can not parse the client request
27 # fallback localhost:8080
28 #
29 # access_log {
30 # filename /var/log/sniproxy/http_access.log
31 # priority notice
32 # }
33 #}
34
35 listen 443 {
36 proto tls
37 table https_hosts
38
39 access_log {
40 filename /var/log/sniproxy/https_access.log
41 priority notice
42 }
43 }
44
45 # named tables are defined with the table directive
46 #table http_hosts {
47 # example.com 192.0.2.10:8001
48 # example.net 192.0.2.10:8002
49 # example.org 192.0.2.10:8003
50
51 # pattern:
52 # valid Perl-compatible Regular Expression that matches the
53 # hostname
54 #
55 # target:
56 # - a DNS name
57 # - an IP address (with optional port)
58 # - '*' to use the hostname that the client requested
59 #
60 # pattern target
61 #.*\.itunes\.apple\.com$ *:443
62 #.* 127.0.0.1:4443
63 #}
64
65 # named tables are defined with the table directive
66 table https_hosts {
67 # When proxying to local sockets you should use different tables since the
68 # local socket server most likely will not autodetect which protocol is
69 # being used
70 <%- $https_forwards.each |$forward| { %>
71 <%= $forward -%>
72 <% } %>
73
74 # if no table specified the default 'default' table is defined
75 #table {
76 # if no port is specified default HTTP (80) and HTTPS (443) ports are
77 # assumed based on the protocol of the listen block using this table
78 #example.com 192.0.2.10
79 #example.net 192.0.2.20
80 #}