1{
2  "format-version": 2,
3  "component": "bconsole",
4  "resource": {
5    "bconsole": {
6      "Console": {
7        "Name": {
8          "datatype": "NAME",
9          "code": 0,
10          "equals": true,
11          "required": true,
12          "description": "The name of this resource."
13        },
14        "Description": {
15          "datatype": "STRING",
16          "code": 0,
17          "equals": true
18        },
19        "RcFile": {
20          "datatype": "DIRECTORY",
21          "code": 0,
22          "equals": true
23        },
24        "HistoryFile": {
25          "datatype": "DIRECTORY",
26          "code": 0,
27          "equals": true
28        },
29        "HistoryLength": {
30          "datatype": "PINT32",
31          "code": 0,
32          "default_value": "100",
33          "equals": true
34        },
35        "Password": {
36          "datatype": "MD5PASSWORD",
37          "code": 0,
38          "equals": true,
39          "required": true
40        },
41        "Director": {
42          "datatype": "STRING",
43          "code": 0,
44          "equals": true
45        },
46        "HeartbeatInterval": {
47          "datatype": "TIME",
48          "code": 0,
49          "default_value": "0",
50          "equals": true
51        },
52        "TlsAuthenticate": {
53          "datatype": "BOOLEAN",
54          "code": 0,
55          "default_value": "false",
56          "equals": true,
57          "description": "Use TLS only to authenticate, not for encryption."
58        },
59        "TlsEnable": {
60          "datatype": "BOOLEAN",
61          "code": 0,
62          "default_value": "true",
63          "equals": true,
64          "description": "Enable TLS support."
65        },
66        "TlsRequire": {
67          "datatype": "BOOLEAN",
68          "code": 0,
69          "default_value": "false",
70          "equals": true,
71          "description": "Without setting this to yes, Bareos can fall back to use unencrypted connections. Enabling this implicitly sets \"TLS Enable = yes\"."
72        },
73        "TlsCipherList": {
74          "datatype": "DIRECTORY",
75          "code": 0,
76          "platform_specific": true,
77          "equals": true,
78          "description": "List of valid TLS Ciphers."
79        },
80        "TlsDhFile": {
81          "datatype": "DIRECTORY",
82          "code": 0,
83          "equals": true,
84          "description": "Path to PEM encoded Diffie-Hellman parameter file. If this directive is specified, DH key exchange will be used for the ephemeral keying, allowing for forward secrecy of communications."
85        },
86        "TlsVerifyPeer": {
87          "datatype": "BOOLEAN",
88          "code": 0,
89          "default_value": "false",
90          "equals": true,
91          "description": "If disabled, all certificates signed by a known CA will be accepted. If enabled, the CN of a certificate must the Address or in the \"TLS Allowed CN\" list."
92        },
93        "TlsCaCertificateFile": {
94          "datatype": "DIRECTORY",
95          "code": 0,
96          "equals": true,
97          "description": "Path of a PEM encoded TLS CA certificate(s) file."
98        },
99        "TlsCaCertificateDir": {
100          "datatype": "DIRECTORY",
101          "code": 0,
102          "equals": true,
103          "description": "Path of a TLS CA certificate directory."
104        },
105        "TlsCertificateRevocationList": {
106          "datatype": "DIRECTORY",
107          "code": 0,
108          "equals": true,
109          "description": "Path of a Certificate Revocation List file."
110        },
111        "TlsCertificate": {
112          "datatype": "DIRECTORY",
113          "code": 0,
114          "equals": true,
115          "description": "Path of a PEM encoded TLS certificate."
116        },
117        "TlsKey": {
118          "datatype": "DIRECTORY",
119          "code": 0,
120          "equals": true,
121          "description": "Path of a PEM encoded private key. It must correspond to the specified \"TLS Certificate\"."
122        },
123        "TlsAllowedCn": {
124          "datatype": "STRING_LIST",
125          "code": 0,
126          "equals": true,
127          "description": "\"Common Name\"s (CNs) of the allowed peer certificates."
128        }
129      },
130      "Director": {
131        "Name": {
132          "datatype": "NAME",
133          "code": 0,
134          "equals": true,
135          "required": true
136        },
137        "Description": {
138          "datatype": "STRING",
139          "code": 0,
140          "equals": true
141        },
142        "DirPort": {
143          "datatype": "PINT32",
144          "code": 0,
145          "default_value": "9101",
146          "equals": true
147        },
148        "Address": {
149          "datatype": "STRING",
150          "code": 0,
151          "equals": true
152        },
153        "Password": {
154          "datatype": "MD5PASSWORD",
155          "code": 0,
156          "equals": true,
157          "required": true
158        },
159        "HeartbeatInterval": {
160          "datatype": "TIME",
161          "code": 0,
162          "default_value": "0",
163          "equals": true
164        },
165        "TlsAuthenticate": {
166          "datatype": "BOOLEAN",
167          "code": 0,
168          "default_value": "false",
169          "equals": true,
170          "description": "Use TLS only to authenticate, not for encryption."
171        },
172        "TlsEnable": {
173          "datatype": "BOOLEAN",
174          "code": 0,
175          "default_value": "true",
176          "equals": true,
177          "description": "Enable TLS support."
178        },
179        "TlsRequire": {
180          "datatype": "BOOLEAN",
181          "code": 0,
182          "default_value": "false",
183          "equals": true,
184          "description": "Without setting this to yes, Bareos can fall back to use unencrypted connections. Enabling this implicitly sets \"TLS Enable = yes\"."
185        },
186        "TlsCipherList": {
187          "datatype": "DIRECTORY",
188          "code": 0,
189          "platform_specific": true,
190          "equals": true,
191          "description": "List of valid TLS Ciphers."
192        },
193        "TlsDhFile": {
194          "datatype": "DIRECTORY",
195          "code": 0,
196          "equals": true,
197          "description": "Path to PEM encoded Diffie-Hellman parameter file. If this directive is specified, DH key exchange will be used for the ephemeral keying, allowing for forward secrecy of communications."
198        },
199        "TlsVerifyPeer": {
200          "datatype": "BOOLEAN",
201          "code": 0,
202          "default_value": "false",
203          "equals": true,
204          "description": "If disabled, all certificates signed by a known CA will be accepted. If enabled, the CN of a certificate must the Address or in the \"TLS Allowed CN\" list."
205        },
206        "TlsCaCertificateFile": {
207          "datatype": "DIRECTORY",
208          "code": 0,
209          "equals": true,
210          "description": "Path of a PEM encoded TLS CA certificate(s) file."
211        },
212        "TlsCaCertificateDir": {
213          "datatype": "DIRECTORY",
214          "code": 0,
215          "equals": true,
216          "description": "Path of a TLS CA certificate directory."
217        },
218        "TlsCertificateRevocationList": {
219          "datatype": "DIRECTORY",
220          "code": 0,
221          "equals": true,
222          "description": "Path of a Certificate Revocation List file."
223        },
224        "TlsCertificate": {
225          "datatype": "DIRECTORY",
226          "code": 0,
227          "equals": true,
228          "description": "Path of a PEM encoded TLS certificate."
229        },
230        "TlsKey": {
231          "datatype": "DIRECTORY",
232          "code": 0,
233          "equals": true,
234          "description": "Path of a PEM encoded private key. It must correspond to the specified \"TLS Certificate\"."
235        },
236        "TlsAllowedCn": {
237          "datatype": "STRING_LIST",
238          "code": 0,
239          "equals": true,
240          "description": "\"Common Name\"s (CNs) of the allowed peer certificates."
241        }
242      }
243    }
244  }
245}
246