1{
2  "format-version": 2,
3  "component": "bareos-tray-monitor",
4  "resource": {
5    "bareos-tray-monitor": {
6      "Monitor": {
7        "Name": {
8          "datatype": "NAME",
9          "code": 0,
10          "equals": true,
11          "required": true
12        },
13        "Description": {
14          "datatype": "STRING",
15          "code": 0,
16          "equals": true
17        },
18        "Password": {
19          "datatype": "MD5PASSWORD",
20          "code": 0,
21          "equals": true,
22          "required": true
23        },
24        "RefreshInterval": {
25          "datatype": "TIME",
26          "code": 0,
27          "default_value": "60",
28          "equals": true
29        },
30        "FdConnectTimeout": {
31          "datatype": "TIME",
32          "code": 0,
33          "default_value": "10",
34          "equals": true
35        },
36        "SdConnectTimeout": {
37          "datatype": "TIME",
38          "code": 0,
39          "default_value": "10",
40          "equals": true
41        },
42        "DirConnectTimeout": {
43          "datatype": "TIME",
44          "code": 0,
45          "default_value": "10",
46          "equals": true
47        },
48        "TlsAuthenticate": {
49          "datatype": "BOOLEAN",
50          "code": 0,
51          "default_value": "false",
52          "equals": true,
53          "description": "Use TLS only to authenticate, not for encryption."
54        },
55        "TlsEnable": {
56          "datatype": "BOOLEAN",
57          "code": 0,
58          "default_value": "true",
59          "equals": true,
60          "description": "Enable TLS support."
61        },
62        "TlsRequire": {
63          "datatype": "BOOLEAN",
64          "code": 0,
65          "default_value": "false",
66          "equals": true,
67          "description": "Without setting this to yes, Bareos can fall back to use unencrypted connections. Enabling this implicitly sets \"TLS Enable = yes\"."
68        },
69        "TlsCipherList": {
70          "datatype": "DIRECTORY",
71          "code": 0,
72          "platform_specific": true,
73          "equals": true,
74          "description": "List of valid TLS Ciphers."
75        },
76        "TlsDhFile": {
77          "datatype": "DIRECTORY",
78          "code": 0,
79          "equals": true,
80          "description": "Path to PEM encoded Diffie-Hellman parameter file. If this directive is specified, DH key exchange will be used for the ephemeral keying, allowing for forward secrecy of communications."
81        },
82        "TlsVerifyPeer": {
83          "datatype": "BOOLEAN",
84          "code": 0,
85          "default_value": "false",
86          "equals": true,
87          "description": "If disabled, all certificates signed by a known CA will be accepted. If enabled, the CN of a certificate must the Address or in the \"TLS Allowed CN\" list."
88        },
89        "TlsCaCertificateFile": {
90          "datatype": "DIRECTORY",
91          "code": 0,
92          "equals": true,
93          "description": "Path of a PEM encoded TLS CA certificate(s) file."
94        },
95        "TlsCaCertificateDir": {
96          "datatype": "DIRECTORY",
97          "code": 0,
98          "equals": true,
99          "description": "Path of a TLS CA certificate directory."
100        },
101        "TlsCertificateRevocationList": {
102          "datatype": "DIRECTORY",
103          "code": 0,
104          "equals": true,
105          "description": "Path of a Certificate Revocation List file."
106        },
107        "TlsCertificate": {
108          "datatype": "DIRECTORY",
109          "code": 0,
110          "equals": true,
111          "description": "Path of a PEM encoded TLS certificate."
112        },
113        "TlsKey": {
114          "datatype": "DIRECTORY",
115          "code": 0,
116          "equals": true,
117          "description": "Path of a PEM encoded private key. It must correspond to the specified \"TLS Certificate\"."
118        },
119        "TlsAllowedCn": {
120          "datatype": "STRING_LIST",
121          "code": 0,
122          "equals": true,
123          "description": "\"Common Name\"s (CNs) of the allowed peer certificates."
124        }
125      },
126      "Director": {
127        "Name": {
128          "datatype": "NAME",
129          "code": 0,
130          "equals": true,
131          "required": true
132        },
133        "Description": {
134          "datatype": "STRING",
135          "code": 0,
136          "equals": true
137        },
138        "DirPort": {
139          "datatype": "PINT32",
140          "code": 0,
141          "default_value": "9101",
142          "equals": true
143        },
144        "Address": {
145          "datatype": "STRING",
146          "code": 0,
147          "equals": true,
148          "required": true
149        },
150        "TlsAuthenticate": {
151          "datatype": "BOOLEAN",
152          "code": 0,
153          "default_value": "false",
154          "equals": true,
155          "description": "Use TLS only to authenticate, not for encryption."
156        },
157        "TlsEnable": {
158          "datatype": "BOOLEAN",
159          "code": 0,
160          "default_value": "true",
161          "equals": true,
162          "description": "Enable TLS support."
163        },
164        "TlsRequire": {
165          "datatype": "BOOLEAN",
166          "code": 0,
167          "default_value": "false",
168          "equals": true,
169          "description": "Without setting this to yes, Bareos can fall back to use unencrypted connections. Enabling this implicitly sets \"TLS Enable = yes\"."
170        },
171        "TlsCipherList": {
172          "datatype": "DIRECTORY",
173          "code": 0,
174          "platform_specific": true,
175          "equals": true,
176          "description": "List of valid TLS Ciphers."
177        },
178        "TlsDhFile": {
179          "datatype": "DIRECTORY",
180          "code": 0,
181          "equals": true,
182          "description": "Path to PEM encoded Diffie-Hellman parameter file. If this directive is specified, DH key exchange will be used for the ephemeral keying, allowing for forward secrecy of communications."
183        },
184        "TlsVerifyPeer": {
185          "datatype": "BOOLEAN",
186          "code": 0,
187          "default_value": "false",
188          "equals": true,
189          "description": "If disabled, all certificates signed by a known CA will be accepted. If enabled, the CN of a certificate must the Address or in the \"TLS Allowed CN\" list."
190        },
191        "TlsCaCertificateFile": {
192          "datatype": "DIRECTORY",
193          "code": 0,
194          "equals": true,
195          "description": "Path of a PEM encoded TLS CA certificate(s) file."
196        },
197        "TlsCaCertificateDir": {
198          "datatype": "DIRECTORY",
199          "code": 0,
200          "equals": true,
201          "description": "Path of a TLS CA certificate directory."
202        },
203        "TlsCertificateRevocationList": {
204          "datatype": "DIRECTORY",
205          "code": 0,
206          "equals": true,
207          "description": "Path of a Certificate Revocation List file."
208        },
209        "TlsCertificate": {
210          "datatype": "DIRECTORY",
211          "code": 0,
212          "equals": true,
213          "description": "Path of a PEM encoded TLS certificate."
214        },
215        "TlsKey": {
216          "datatype": "DIRECTORY",
217          "code": 0,
218          "equals": true,
219          "description": "Path of a PEM encoded private key. It must correspond to the specified \"TLS Certificate\"."
220        },
221        "TlsAllowedCn": {
222          "datatype": "STRING_LIST",
223          "code": 0,
224          "equals": true,
225          "description": "\"Common Name\"s (CNs) of the allowed peer certificates."
226        }
227      },
228      "Client": {
229        "Name": {
230          "datatype": "NAME",
231          "code": 0,
232          "equals": true,
233          "required": true
234        },
235        "Description": {
236          "datatype": "STRING",
237          "code": 0,
238          "equals": true
239        },
240        "Address": {
241          "datatype": "STRING",
242          "code": 0,
243          "equals": true,
244          "required": true
245        },
246        "FdPort": {
247          "datatype": "PINT32",
248          "code": 0,
249          "default_value": "9102",
250          "equals": true
251        },
252        "Password": {
253          "datatype": "MD5PASSWORD",
254          "code": 0,
255          "equals": true,
256          "required": true
257        },
258        "TlsAuthenticate": {
259          "datatype": "BOOLEAN",
260          "code": 0,
261          "default_value": "false",
262          "equals": true,
263          "description": "Use TLS only to authenticate, not for encryption."
264        },
265        "TlsEnable": {
266          "datatype": "BOOLEAN",
267          "code": 0,
268          "default_value": "true",
269          "equals": true,
270          "description": "Enable TLS support."
271        },
272        "TlsRequire": {
273          "datatype": "BOOLEAN",
274          "code": 0,
275          "default_value": "false",
276          "equals": true,
277          "description": "Without setting this to yes, Bareos can fall back to use unencrypted connections. Enabling this implicitly sets \"TLS Enable = yes\"."
278        },
279        "TlsCipherList": {
280          "datatype": "DIRECTORY",
281          "code": 0,
282          "platform_specific": true,
283          "equals": true,
284          "description": "List of valid TLS Ciphers."
285        },
286        "TlsDhFile": {
287          "datatype": "DIRECTORY",
288          "code": 0,
289          "equals": true,
290          "description": "Path to PEM encoded Diffie-Hellman parameter file. If this directive is specified, DH key exchange will be used for the ephemeral keying, allowing for forward secrecy of communications."
291        },
292        "TlsVerifyPeer": {
293          "datatype": "BOOLEAN",
294          "code": 0,
295          "default_value": "false",
296          "equals": true,
297          "description": "If disabled, all certificates signed by a known CA will be accepted. If enabled, the CN of a certificate must the Address or in the \"TLS Allowed CN\" list."
298        },
299        "TlsCaCertificateFile": {
300          "datatype": "DIRECTORY",
301          "code": 0,
302          "equals": true,
303          "description": "Path of a PEM encoded TLS CA certificate(s) file."
304        },
305        "TlsCaCertificateDir": {
306          "datatype": "DIRECTORY",
307          "code": 0,
308          "equals": true,
309          "description": "Path of a TLS CA certificate directory."
310        },
311        "TlsCertificateRevocationList": {
312          "datatype": "DIRECTORY",
313          "code": 0,
314          "equals": true,
315          "description": "Path of a Certificate Revocation List file."
316        },
317        "TlsCertificate": {
318          "datatype": "DIRECTORY",
319          "code": 0,
320          "equals": true,
321          "description": "Path of a PEM encoded TLS certificate."
322        },
323        "TlsKey": {
324          "datatype": "DIRECTORY",
325          "code": 0,
326          "equals": true,
327          "description": "Path of a PEM encoded private key. It must correspond to the specified \"TLS Certificate\"."
328        },
329        "TlsAllowedCn": {
330          "datatype": "STRING_LIST",
331          "code": 0,
332          "equals": true,
333          "description": "\"Common Name\"s (CNs) of the allowed peer certificates."
334        }
335      },
336      "Storage": {
337        "Name": {
338          "datatype": "NAME",
339          "code": 0,
340          "equals": true,
341          "required": true
342        },
343        "Description": {
344          "datatype": "STRING",
345          "code": 0,
346          "equals": true
347        },
348        "SdPort": {
349          "datatype": "PINT32",
350          "code": 0,
351          "default_value": "9103",
352          "equals": true
353        },
354        "Address": {
355          "datatype": "STRING",
356          "code": 0,
357          "equals": true,
358          "required": true
359        },
360        "SdAddress": {
361          "datatype": "STRING",
362          "code": 0,
363          "equals": true
364        },
365        "Password": {
366          "datatype": "MD5PASSWORD",
367          "code": 0,
368          "equals": true,
369          "required": true
370        },
371        "SdPassword": {
372          "datatype": "MD5PASSWORD",
373          "code": 0,
374          "equals": true
375        },
376        "TlsAuthenticate": {
377          "datatype": "BOOLEAN",
378          "code": 0,
379          "default_value": "false",
380          "equals": true,
381          "description": "Use TLS only to authenticate, not for encryption."
382        },
383        "TlsEnable": {
384          "datatype": "BOOLEAN",
385          "code": 0,
386          "default_value": "true",
387          "equals": true,
388          "description": "Enable TLS support."
389        },
390        "TlsRequire": {
391          "datatype": "BOOLEAN",
392          "code": 0,
393          "default_value": "false",
394          "equals": true,
395          "description": "Without setting this to yes, Bareos can fall back to use unencrypted connections. Enabling this implicitly sets \"TLS Enable = yes\"."
396        },
397        "TlsCipherList": {
398          "datatype": "DIRECTORY",
399          "code": 0,
400          "platform_specific": true,
401          "equals": true,
402          "description": "List of valid TLS Ciphers."
403        },
404        "TlsDhFile": {
405          "datatype": "DIRECTORY",
406          "code": 0,
407          "equals": true,
408          "description": "Path to PEM encoded Diffie-Hellman parameter file. If this directive is specified, DH key exchange will be used for the ephemeral keying, allowing for forward secrecy of communications."
409        },
410        "TlsVerifyPeer": {
411          "datatype": "BOOLEAN",
412          "code": 0,
413          "default_value": "false",
414          "equals": true,
415          "description": "If disabled, all certificates signed by a known CA will be accepted. If enabled, the CN of a certificate must the Address or in the \"TLS Allowed CN\" list."
416        },
417        "TlsCaCertificateFile": {
418          "datatype": "DIRECTORY",
419          "code": 0,
420          "equals": true,
421          "description": "Path of a PEM encoded TLS CA certificate(s) file."
422        },
423        "TlsCaCertificateDir": {
424          "datatype": "DIRECTORY",
425          "code": 0,
426          "equals": true,
427          "description": "Path of a TLS CA certificate directory."
428        },
429        "TlsCertificateRevocationList": {
430          "datatype": "DIRECTORY",
431          "code": 0,
432          "equals": true,
433          "description": "Path of a Certificate Revocation List file."
434        },
435        "TlsCertificate": {
436          "datatype": "DIRECTORY",
437          "code": 0,
438          "equals": true,
439          "description": "Path of a PEM encoded TLS certificate."
440        },
441        "TlsKey": {
442          "datatype": "DIRECTORY",
443          "code": 0,
444          "equals": true,
445          "description": "Path of a PEM encoded private key. It must correspond to the specified \"TLS Certificate\"."
446        },
447        "TlsAllowedCn": {
448          "datatype": "STRING_LIST",
449          "code": 0,
450          "equals": true,
451          "description": "\"Common Name\"s (CNs) of the allowed peer certificates."
452        }
453      },
454      "ConsoleFont": {
455        "Name": {
456          "datatype": "NAME",
457          "code": 0,
458          "equals": true,
459          "required": true
460        },
461        "Description": {
462          "datatype": "STRING",
463          "code": 0,
464          "equals": true
465        },
466        "Font": {
467          "datatype": "STRING",
468          "code": 0,
469          "equals": true
470        }
471      }
472    }
473  }
474}
475