Root Schema : Oracle GoldenGate Service Configuration
Type: object
Title: Oracle GoldenGate Service Configuration
Configuration data for an OGG Microservice
Show Source
-
$schema:
Allowed Values: [
"ogg:service"
]
-
config:
object config
Service configuration data
-
configForce:
boolean
Default Value: false
Force the configuration data
-
critical:
boolean
Default Value: true
Indicates the service is critical to the deployment
-
enabled:
boolean
Default Value: true
Indicates the service is managed by the Service Manager
-
id:
string
Minimum Length: 36
Maximum Length: 36
Default Value: b8c774c1-76c6-4a0a-bd23-da6b8c5c38dc
Pattern: ^[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-4[0-9a-fA-F]{3}-[89ABab][0-9a-fA-F]{3}-[0-9a-fA-F]{12}$
An identifier that uniquely identifies this service
-
locked:
boolean
Default Value: false
Indicates the service is locked by a security administrator and cannot be started
-
quiet:
boolean
Default Value: false
Start the service in quiet mode
-
restart:
object restart
Control how the service is restarted if it terminates
-
status:
Default Value: stopped
Allowed Values: [
"starting",
"running",
"stopped",
"restart",
"killed",
"abended"
]
Indicates the status of the service
{
"title":"Oracle GoldenGate Service Configuration",
"description":"Configuration data for an OGG Microservice",
"type":"object",
"properties":{
"config":{
"description":"Service configuration data",
"type":"object",
"properties":{
"workerThreadCount":{
"description":"The number of worker threads for the service",
"type":"integer",
"default":"24",
"minimum":"1",
"maximum":"2048"
},
"security":{
"description":"Enable HTTPS protocol",
"type":"boolean",
"default":true
},
"umask":{
"description":"File mode creation mask",
"type":"string",
"pattern":"[0-7]{4}",
"default":"0027",
"minLength":"4",
"maxLength":"4"
},
"asynchronousOperationEnabled":{
"description":"Enable asynchronous REST API method execution",
"type":"boolean",
"default":true
},
"serviceDiscoveryEnabled":{
"description":"Enable UDP-based service discovery protocol",
"type":"boolean",
"default":true
},
"hstsEnabled":{
"description":"Enable HTTP Strict-Transport-Security (HSTS) headers in secured service responses.",
"type":"boolean",
"default":true
},
"network":{
"description":"Network configuration",
"type":"object",
"properties":{
"serviceListeningPort":{
"description":"Port number that the service will listen on",
"x-oneOf":[
{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
{
"description":"Port number for a specific IP address or host name",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"address":{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"name":{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"additionalProperties":false,
"x-anyOf":[
{
"required":[
"port"
]
},
{
"required":[
"port",
"address"
]
},
{
"required":[
"port",
"name"
]
}
]
},
{
"description":"Port number for a specific network interface",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"interface":{
"description":"Network interface for listener",
"type":"string",
"minLength":"1",
"maxLength":"32"
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"required":[
"port",
"interface"
],
"additionalProperties":false
},
{
"type":"array",
"description":"Array of listener specifications",
"items":{
"x-anyOf":[
{
"description":"Port number for a specific IP address or host name",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"address":{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"name":{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"additionalProperties":false,
"x-anyOf":[
{
"required":[
"port"
]
},
{
"required":[
"port",
"address"
]
},
{
"required":[
"port",
"name"
]
}
]
},
{
"description":"Port number for a specific network interface",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"interface":{
"description":"Network interface for listener",
"type":"string",
"minLength":"1",
"maxLength":"32"
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"required":[
"port",
"interface"
],
"additionalProperties":false
}
]
},
"minItems":"1",
"maxItems":"32"
}
]
}
},
"required":[
"serviceListeningPort"
]
},
"legacyProtocolEnabled":{
"description":"Enable legacy communications for services that support them",
"type":"boolean",
"default":false
},
"authorizationEnabled":{
"description":"User authentication is required for access",
"type":"boolean",
"default":true
},
"securityDetails":{
"description":"Detailed security configuration.",
"type":"object",
"properties":{
"network":{
"description":"Network security configuration.",
"type":"object",
"properties":{
"common":{
"description":"Common network security configuration.",
"type":"object",
"properties":{
"id":{
"description":"Security implementation identifier.",
"enum":[
"OracleSSL"
]
},
"fipsEnabled":{
"description":"Indicates whether a FIPS-140 compliant implementation module should be used.",
"type":"boolean",
"default":"false"
}
}
},
"inbound":{
"description":"Network security configuration for inbound requests from clients.",
"properties":{
"role":{
"description":"Defines the role the application is assuming.",
"enum":[
"server"
]
},
"authMode":{
"description":"Defines the authorization mode to use when accepting secured network connections.",
"enum":[
"server_only",
"clientOptional_server",
"client_server",
"client_only",
"anonymous"
]
},
"sessionCacheEnabled":{
"description":"Indicates whether session caching is enabled.",
"type":"boolean",
"default":true
},
"wrlPassword":{
"description":"Defines the Oracle wallet password if the wallet is declared as autologin.",
"type":"string",
"minLength":"0",
"maxLength":"255"
},
"crlEnabled":{
"description":"Indicates whether Certificate Revocation List handling is enabled.",
"type":"boolean",
"default":true
},
"sessionCacheDetails":{
"description":"Defines the control limits for session caching.",
"type":"object",
"properties":{
"limit":{
"description":"The maximum number of sessions to cache.",
"type":"integer",
"default":"20480",
"minimum":"1",
"maximum":"4294967295"
},
"timeoutSecs":{
"description":"The number of seconds before a session might be purged from the session cache.",
"type":"integer",
"default":"1800",
"minimum":"0",
"maximum":"4294967295"
}
}
},
"cipherSuites":{
"description":"Defines the cipher-suites that may be used when establishing secure network connections.",
"x-oneOf":[
{
"description":"Regular expression that qualifies the set of cipher-suites to select for use when establishing secure network connections.",
"type":"string",
"default":"^((?!anon|RC4|NULL|3DES).)*$",
"minLength":"1",
"maxLength":"255"
},
{
"description":"Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.",
"type":"array",
"items":{
"description":"Cipher-suite identifier",
"enum":[
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
},
"minItems":"1",
"maxItems":"36"
}
]
},
"wrl":{
"description":"Defines the path to an Oracle wallet.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"certACL":{
"description":"Array policies for accepting allowing or denying acceptance of a peer certificate.",
"type":"array",
"items":{
"description":"Certificate Access Control List Policy.",
"type":"object",
"properties":{
"name":{
"description":"Certificates SubjectName or SubjectAlternateName Identifier to match",
"type":"string",
"minLength":"1",
"maxLength":"255"
},
"permission":{
"description":"Binary allow or deny policy selection.",
"type":"string",
"enum":[
"allow",
"deny"
]
}
},
"required":[
"name",
"permission"
],
"additionalProperties":false
},
"minItems":"1",
"maxItems":"255"
},
"crlStore":{
"description":"Defines the path to the CRL file.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"protocolVersion":{
"description":"Defines the protocol version to use and accept when establishing secure network connections.",
"enum":[
"1_0",
"1_0_Or_3_0",
"1_1",
"1_1_Or_1_0",
"1_1_Or_1_0_Or_3_0",
"1_1_Or_3_0",
"1_2",
"1_2_Or_1_0",
"1_2_Or_1_0_Or_3_0",
"1_2_Or_1_1",
"1_2_Or_1_1_Or_1_0",
"1_2_Or_1_1_Or_1_0_Or_3_0",
"1_2_Or_1_1_Or_3_0",
"1_2_Or_3_0",
"3_0",
"3_0_Only",
"3_0_With_2_0_Hello"
]
}
}
},
"outbound":{
"description":"Network security configuration for outbound requests to servers.",
"properties":{
"role":{
"description":"Defines the role the application is assuming.",
"enum":[
"client"
]
},
"authMode":{
"description":"Defines the authorization mode to use when accepting secured network connections.",
"enum":[
"server_only",
"clientOptional_server",
"client_server",
"client_only",
"anonymous"
]
},
"sessionCacheEnabled":{
"description":"Indicates whether session caching is enabled.",
"type":"boolean",
"default":true
},
"wrlPassword":{
"description":"Defines the Oracle wallet password if the wallet is declared as autologin.",
"type":"string",
"minLength":"0",
"maxLength":"255"
},
"crlEnabled":{
"description":"Indicates whether Certificate Revocation List handling is enabled.",
"type":"boolean",
"default":true
},
"sessionCacheDetails":{
"description":"Defines the control limits for session caching.",
"type":"object",
"properties":{
"limit":{
"description":"The maximum number of sessions to cache.",
"type":"integer",
"default":"20480",
"minimum":"1",
"maximum":"4294967295"
},
"timeoutSecs":{
"description":"The number of seconds before a session might be purged from the session cache.",
"type":"integer",
"default":"1800",
"minimum":"0",
"maximum":"4294967295"
}
}
},
"cipherSuites":{
"description":"Defines the cipher-suites that may be used when establishing secure network connections.",
"x-oneOf":[
{
"description":"Regular expression that qualifies the set of cipher-suites to select for use when establishing secure network connections.",
"type":"string",
"default":"^((?!anon|RC4|NULL|3DES).)*$",
"minLength":"1",
"maxLength":"255"
},
{
"description":"Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.",
"type":"array",
"items":{
"description":"Cipher-suite identifier",
"enum":[
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
},
"minItems":"1",
"maxItems":"36"
}
]
},
"wrl":{
"description":"Defines the path to an Oracle wallet.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"crlStore":{
"description":"Defines the path to the CRL file.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"protocolVersion":{
"description":"Defines the protocol version to use and accept when establishing secure network connections.",
"enum":[
"1_0",
"1_0_Or_3_0",
"1_1",
"1_1_Or_1_0",
"1_1_Or_1_0_Or_3_0",
"1_1_Or_3_0",
"1_2",
"1_2_Or_1_0",
"1_2_Or_1_0_Or_3_0",
"1_2_Or_1_1",
"1_2_Or_1_1_Or_1_0",
"1_2_Or_1_1_Or_1_0_Or_3_0",
"1_2_Or_1_1_Or_3_0",
"1_2_Or_3_0",
"3_0",
"3_0_Only",
"3_0_With_2_0_Hello"
]
}
}
}
}
}
}
},
"csrfHeaderProtectionEnabled":{
"description":"Enable CSRF header-based protection.",
"type":"boolean",
"default":false
},
"contentUrlRewrite":{
"description":"Incoming URL rewriting rules.",
"x-oneOf":[
{
"description":"A comma-delimited key value string of rewriting rules",
"type":"string",
"minLength":"0",
"maxLength":"10240"
},
{
"description":"An array of rewriting rules.",
"type":"array",
"items":{
"description":"URL rewriting rule.",
"type":"object",
"properties":{
"srcUrl":{
"description":"Source URL",
"type":"string",
"minLength":"1",
"maxLength":"255"
},
"targetUrl":{
"description":"Target URL",
"type":"string",
"minLength":"1",
"maxLength":"255"
}
},
"required":[
"srcUrl",
"targetUrl"
],
"additionalProperties":false
},
"minItems":"1",
"maxItems":"2048"
}
]
},
"authorizationDetails":{
"description":"Authorization configuration details.",
"type":"object",
"properties":{
"sessionDurationSecs":{
"description":"Duration of the authorizations.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295",
"default":"3600"
},
"sessionInactiveSecs":{
"description":"The maximum number of seconds an unexpired authorization session may be inactive before expiring. A session's inactivity time will be unlimited when sessionInactiveSeconds is set to 0.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295",
"default":"1800"
},
"sessionReauthorizationLimit":{
"description":"The maximum number of times unexpired authorization sessions may be reauthorized. Session reauthorization request are not allowed when sessionReauthorizationLimit is set to 0.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295",
"default":"12"
},
"useMovingExpirationWindow":{
"description":"Enable the use of moving expiration window over fix expiration time value.",
"type":"boolean",
"default":false
},
"movingExpirationWindowSecs":{
"description":"Width of the expiration window in seconds.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295"
},
"common":{
"description":"Common authorization configuration settings.",
"type":"object",
"properties":{
"allow":{
"description":"Authorization modes allowed.",
"type":"array",
"items":{
"description":"Name of authorization modes allowed.",
"enum":[
"Basic",
"Digest-SHA-256",
"Digest",
"x-Cert",
"Bearer"
]
},
"minItems":"1",
"maxItems":"5"
},
"customAuthorizationEnabled":{
"description":"Enable use of OGG custom authorization modes.",
"type":"boolean",
"default":true
}
},
"additionalProperties":false
},
"validityDurationSecs":{
"description":"The number of seconds for which an authorization digest remains valid.",
"type":"integer",
"default":"300",
"minimum":"0",
"maximum":"4294967295"
}
},
"additionalProperties":false
},
"taskManagerEnabled":{
"description":"Enable task management for services that provide it",
"type":"boolean",
"default":true
},
"hstsDetails":{
"description":"Defines the HTTP Strict-Transport-Security (HSTS) policy parameters",
"x-oneOf":[
{
"description":"HSTS policy object.",
"type":"object",
"properties":{
"maxAge":{
"description":"Maximum time in seconds the HTST policy should remain in effect.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295"
},
"includeSubDomains":{
"description":"Option indicating that the target domain's subdomain should be included when evaluating the HSTS policy.",
"type":"boolean",
"default":true
}
},
"required":[
"maxAge"
],
"additionalProperties":false
},
{
"description":"HSTS policy string.",
"type":"string",
"minLength":"9",
"maxLength":"255"
}
]
},
"cors":{
"description":"Cross-Origin Resource Sharing",
"x-oneOf":[
{
"description":"Allow anonymous access from any origin",
"type":"object",
"properties":{
"allowOrigin":{
"description":"Allow any origin to access service resources",
"enum":[
"*"
]
},
"allowCredentials":{
"description":"Credentials are not allowed for a wildcard origin",
"enum":[
false
]
}
},
"required":[
"allowOrigin"
],
"additionalProperties":false
},
{
"description":"Allow credentialed access from a specific origin",
"type":"object",
"properties":{
"allowOrigin":{
"description":"Specific origin allowed to access service resources",
"type":"string",
"pattern":"^[a-zA-Z][a-zA-Z0-9+-.]*:[^ \\t]*$",
"minLength":"2",
"maxLength":"4095"
},
"allowCredentials":{
"description":"Credentials are allowed for a non-wildcard origin",
"type":"boolean"
}
},
"required":[
"allowOrigin",
"allowCredentials"
],
"additionalProperties":false
}
]
},
"defaultSynchronousWait":{
"description":"The default number of seconds the service will wait before responding with an asynchronous REST API response",
"type":"integer",
"minimum":"0",
"maximum":"3600",
"default":"30"
},
"childProcessPriorityDecrease":{
"description":"Amount that any child process priority is decreased",
"type":"integer",
"default":"0",
"minimum":"0",
"maximum":"20"
},
"csrfTokenProtectionEnabled":{
"description":"Enable CSRF token-based protection.",
"type":"boolean",
"default":true
}
}
},
"quiet":{
"description":"Start the service in quiet mode",
"type":"boolean",
"default":false
},
"enabled":{
"description":"Indicates the service is managed by the Service Manager",
"type":"boolean",
"default":true
},
"id":{
"description":"An identifier that uniquely identifies this service",
"default":"b8c774c1-76c6-4a0a-bd23-da6b8c5c38dc",
"type":"string",
"pattern":"^[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-4[0-9a-fA-F]{3}-[89ABab][0-9a-fA-F]{3}-[0-9a-fA-F]{12}$",
"minLength":"36",
"maxLength":"36"
},
"$schema":{
"enum":[
"ogg:service"
]
},
"status":{
"description":"Indicates the status of the service",
"enum":[
"starting",
"running",
"stopped",
"restart",
"killed",
"abended"
],
"default":"stopped"
},
"critical":{
"description":"Indicates the service is critical to the deployment",
"type":"boolean",
"default":true
},
"restart":{
"description":"Control how the service is restarted if it terminates",
"default":{
"enabled":true,
"onSuccess":true,
"delay":"0",
"retries":"9",
"window":"60",
"disableOnFailure":true
},
"type":"object",
"properties":{
"$schema":{
"enum":[
"ogg:taskRestart"
]
},
"enabled":{
"description":"If set, the task can be restarted if it terminates.",
"type":"boolean",
"default":true
},
"onSuccess":{
"description":"If false, the task is only restarted if it fails.",
"type":"boolean",
"default":true
},
"delay":{
"description":"The amount of time, in seconds, to pause between discovering that a process has terminated abnormally and restarting the process.",
"type":"integer",
"minimum":"0",
"default":"0",
"maximum":"3600"
},
"retries":{
"description":"The maximum number of times the task should be restarted before aborting retry efforts.",
"type":"integer",
"minimum":"0",
"default":"9",
"maximum":"3600"
},
"window":{
"description":"The window of time, in seconds, during which retries are counted.",
"type":"integer",
"minimum":"0",
"default":"60",
"maximum":"604800"
},
"disableOnFailure":{
"description":"If true, the task is disabled when it fails all execution attempts in an execution window.",
"type":"boolean",
"default":true
},
"failures":{
"description":"The number of times the task failed in the current window.",
"type":"integer",
"minimum":"0",
"maximum":"3600"
}
},
"additionalProperties":false
},
"locked":{
"description":"Indicates the service is locked by a security administrator and cannot be started",
"type":"boolean",
"default":false
},
"configForce":{
"description":"Force the configuration data",
"type":"boolean",
"default":false
}
},
"additionalProperties":false
}
Nested Schema : config
Type: object
Service configuration data
Show Source
{
"description":"Service configuration data",
"type":"object",
"properties":{
"workerThreadCount":{
"description":"The number of worker threads for the service",
"type":"integer",
"default":"24",
"minimum":"1",
"maximum":"2048"
},
"security":{
"description":"Enable HTTPS protocol",
"type":"boolean",
"default":true
},
"umask":{
"description":"File mode creation mask",
"type":"string",
"pattern":"[0-7]{4}",
"default":"0027",
"minLength":"4",
"maxLength":"4"
},
"asynchronousOperationEnabled":{
"description":"Enable asynchronous REST API method execution",
"type":"boolean",
"default":true
},
"serviceDiscoveryEnabled":{
"description":"Enable UDP-based service discovery protocol",
"type":"boolean",
"default":true
},
"hstsEnabled":{
"description":"Enable HTTP Strict-Transport-Security (HSTS) headers in secured service responses.",
"type":"boolean",
"default":true
},
"network":{
"description":"Network configuration",
"type":"object",
"properties":{
"serviceListeningPort":{
"description":"Port number that the service will listen on",
"x-oneOf":[
{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
{
"description":"Port number for a specific IP address or host name",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"address":{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"name":{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"additionalProperties":false,
"x-anyOf":[
{
"required":[
"port"
]
},
{
"required":[
"port",
"address"
]
},
{
"required":[
"port",
"name"
]
}
]
},
{
"description":"Port number for a specific network interface",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"interface":{
"description":"Network interface for listener",
"type":"string",
"minLength":"1",
"maxLength":"32"
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"required":[
"port",
"interface"
],
"additionalProperties":false
},
{
"type":"array",
"description":"Array of listener specifications",
"items":{
"x-anyOf":[
{
"description":"Port number for a specific IP address or host name",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"address":{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"name":{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"additionalProperties":false,
"x-anyOf":[
{
"required":[
"port"
]
},
{
"required":[
"port",
"address"
]
},
{
"required":[
"port",
"name"
]
}
]
},
{
"description":"Port number for a specific network interface",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"interface":{
"description":"Network interface for listener",
"type":"string",
"minLength":"1",
"maxLength":"32"
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"required":[
"port",
"interface"
],
"additionalProperties":false
}
]
},
"minItems":"1",
"maxItems":"32"
}
]
}
},
"required":[
"serviceListeningPort"
]
},
"legacyProtocolEnabled":{
"description":"Enable legacy communications for services that support them",
"type":"boolean",
"default":false
},
"authorizationEnabled":{
"description":"User authentication is required for access",
"type":"boolean",
"default":true
},
"securityDetails":{
"description":"Detailed security configuration.",
"type":"object",
"properties":{
"network":{
"description":"Network security configuration.",
"type":"object",
"properties":{
"common":{
"description":"Common network security configuration.",
"type":"object",
"properties":{
"id":{
"description":"Security implementation identifier.",
"enum":[
"OracleSSL"
]
},
"fipsEnabled":{
"description":"Indicates whether a FIPS-140 compliant implementation module should be used.",
"type":"boolean",
"default":"false"
}
}
},
"inbound":{
"description":"Network security configuration for inbound requests from clients.",
"properties":{
"role":{
"description":"Defines the role the application is assuming.",
"enum":[
"server"
]
},
"authMode":{
"description":"Defines the authorization mode to use when accepting secured network connections.",
"enum":[
"server_only",
"clientOptional_server",
"client_server",
"client_only",
"anonymous"
]
},
"sessionCacheEnabled":{
"description":"Indicates whether session caching is enabled.",
"type":"boolean",
"default":true
},
"wrlPassword":{
"description":"Defines the Oracle wallet password if the wallet is declared as autologin.",
"type":"string",
"minLength":"0",
"maxLength":"255"
},
"crlEnabled":{
"description":"Indicates whether Certificate Revocation List handling is enabled.",
"type":"boolean",
"default":true
},
"sessionCacheDetails":{
"description":"Defines the control limits for session caching.",
"type":"object",
"properties":{
"limit":{
"description":"The maximum number of sessions to cache.",
"type":"integer",
"default":"20480",
"minimum":"1",
"maximum":"4294967295"
},
"timeoutSecs":{
"description":"The number of seconds before a session might be purged from the session cache.",
"type":"integer",
"default":"1800",
"minimum":"0",
"maximum":"4294967295"
}
}
},
"cipherSuites":{
"description":"Defines the cipher-suites that may be used when establishing secure network connections.",
"x-oneOf":[
{
"description":"Regular expression that qualifies the set of cipher-suites to select for use when establishing secure network connections.",
"type":"string",
"default":"^((?!anon|RC4|NULL|3DES).)*$",
"minLength":"1",
"maxLength":"255"
},
{
"description":"Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.",
"type":"array",
"items":{
"description":"Cipher-suite identifier",
"enum":[
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
},
"minItems":"1",
"maxItems":"36"
}
]
},
"wrl":{
"description":"Defines the path to an Oracle wallet.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"certACL":{
"description":"Array policies for accepting allowing or denying acceptance of a peer certificate.",
"type":"array",
"items":{
"description":"Certificate Access Control List Policy.",
"type":"object",
"properties":{
"name":{
"description":"Certificates SubjectName or SubjectAlternateName Identifier to match",
"type":"string",
"minLength":"1",
"maxLength":"255"
},
"permission":{
"description":"Binary allow or deny policy selection.",
"type":"string",
"enum":[
"allow",
"deny"
]
}
},
"required":[
"name",
"permission"
],
"additionalProperties":false
},
"minItems":"1",
"maxItems":"255"
},
"crlStore":{
"description":"Defines the path to the CRL file.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"protocolVersion":{
"description":"Defines the protocol version to use and accept when establishing secure network connections.",
"enum":[
"1_0",
"1_0_Or_3_0",
"1_1",
"1_1_Or_1_0",
"1_1_Or_1_0_Or_3_0",
"1_1_Or_3_0",
"1_2",
"1_2_Or_1_0",
"1_2_Or_1_0_Or_3_0",
"1_2_Or_1_1",
"1_2_Or_1_1_Or_1_0",
"1_2_Or_1_1_Or_1_0_Or_3_0",
"1_2_Or_1_1_Or_3_0",
"1_2_Or_3_0",
"3_0",
"3_0_Only",
"3_0_With_2_0_Hello"
]
}
}
},
"outbound":{
"description":"Network security configuration for outbound requests to servers.",
"properties":{
"role":{
"description":"Defines the role the application is assuming.",
"enum":[
"client"
]
},
"authMode":{
"description":"Defines the authorization mode to use when accepting secured network connections.",
"enum":[
"server_only",
"clientOptional_server",
"client_server",
"client_only",
"anonymous"
]
},
"sessionCacheEnabled":{
"description":"Indicates whether session caching is enabled.",
"type":"boolean",
"default":true
},
"wrlPassword":{
"description":"Defines the Oracle wallet password if the wallet is declared as autologin.",
"type":"string",
"minLength":"0",
"maxLength":"255"
},
"crlEnabled":{
"description":"Indicates whether Certificate Revocation List handling is enabled.",
"type":"boolean",
"default":true
},
"sessionCacheDetails":{
"description":"Defines the control limits for session caching.",
"type":"object",
"properties":{
"limit":{
"description":"The maximum number of sessions to cache.",
"type":"integer",
"default":"20480",
"minimum":"1",
"maximum":"4294967295"
},
"timeoutSecs":{
"description":"The number of seconds before a session might be purged from the session cache.",
"type":"integer",
"default":"1800",
"minimum":"0",
"maximum":"4294967295"
}
}
},
"cipherSuites":{
"description":"Defines the cipher-suites that may be used when establishing secure network connections.",
"x-oneOf":[
{
"description":"Regular expression that qualifies the set of cipher-suites to select for use when establishing secure network connections.",
"type":"string",
"default":"^((?!anon|RC4|NULL|3DES).)*$",
"minLength":"1",
"maxLength":"255"
},
{
"description":"Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.",
"type":"array",
"items":{
"description":"Cipher-suite identifier",
"enum":[
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
},
"minItems":"1",
"maxItems":"36"
}
]
},
"wrl":{
"description":"Defines the path to an Oracle wallet.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"crlStore":{
"description":"Defines the path to the CRL file.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"protocolVersion":{
"description":"Defines the protocol version to use and accept when establishing secure network connections.",
"enum":[
"1_0",
"1_0_Or_3_0",
"1_1",
"1_1_Or_1_0",
"1_1_Or_1_0_Or_3_0",
"1_1_Or_3_0",
"1_2",
"1_2_Or_1_0",
"1_2_Or_1_0_Or_3_0",
"1_2_Or_1_1",
"1_2_Or_1_1_Or_1_0",
"1_2_Or_1_1_Or_1_0_Or_3_0",
"1_2_Or_1_1_Or_3_0",
"1_2_Or_3_0",
"3_0",
"3_0_Only",
"3_0_With_2_0_Hello"
]
}
}
}
}
}
}
},
"csrfHeaderProtectionEnabled":{
"description":"Enable CSRF header-based protection.",
"type":"boolean",
"default":false
},
"contentUrlRewrite":{
"description":"Incoming URL rewriting rules.",
"x-oneOf":[
{
"description":"A comma-delimited key value string of rewriting rules",
"type":"string",
"minLength":"0",
"maxLength":"10240"
},
{
"description":"An array of rewriting rules.",
"type":"array",
"items":{
"description":"URL rewriting rule.",
"type":"object",
"properties":{
"srcUrl":{
"description":"Source URL",
"type":"string",
"minLength":"1",
"maxLength":"255"
},
"targetUrl":{
"description":"Target URL",
"type":"string",
"minLength":"1",
"maxLength":"255"
}
},
"required":[
"srcUrl",
"targetUrl"
],
"additionalProperties":false
},
"minItems":"1",
"maxItems":"2048"
}
]
},
"authorizationDetails":{
"description":"Authorization configuration details.",
"type":"object",
"properties":{
"sessionDurationSecs":{
"description":"Duration of the authorizations.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295",
"default":"3600"
},
"sessionInactiveSecs":{
"description":"The maximum number of seconds an unexpired authorization session may be inactive before expiring. A session's inactivity time will be unlimited when sessionInactiveSeconds is set to 0.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295",
"default":"1800"
},
"sessionReauthorizationLimit":{
"description":"The maximum number of times unexpired authorization sessions may be reauthorized. Session reauthorization request are not allowed when sessionReauthorizationLimit is set to 0.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295",
"default":"12"
},
"useMovingExpirationWindow":{
"description":"Enable the use of moving expiration window over fix expiration time value.",
"type":"boolean",
"default":false
},
"movingExpirationWindowSecs":{
"description":"Width of the expiration window in seconds.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295"
},
"common":{
"description":"Common authorization configuration settings.",
"type":"object",
"properties":{
"allow":{
"description":"Authorization modes allowed.",
"type":"array",
"items":{
"description":"Name of authorization modes allowed.",
"enum":[
"Basic",
"Digest-SHA-256",
"Digest",
"x-Cert",
"Bearer"
]
},
"minItems":"1",
"maxItems":"5"
},
"customAuthorizationEnabled":{
"description":"Enable use of OGG custom authorization modes.",
"type":"boolean",
"default":true
}
},
"additionalProperties":false
},
"validityDurationSecs":{
"description":"The number of seconds for which an authorization digest remains valid.",
"type":"integer",
"default":"300",
"minimum":"0",
"maximum":"4294967295"
}
},
"additionalProperties":false
},
"taskManagerEnabled":{
"description":"Enable task management for services that provide it",
"type":"boolean",
"default":true
},
"hstsDetails":{
"description":"Defines the HTTP Strict-Transport-Security (HSTS) policy parameters",
"x-oneOf":[
{
"description":"HSTS policy object.",
"type":"object",
"properties":{
"maxAge":{
"description":"Maximum time in seconds the HTST policy should remain in effect.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295"
},
"includeSubDomains":{
"description":"Option indicating that the target domain's subdomain should be included when evaluating the HSTS policy.",
"type":"boolean",
"default":true
}
},
"required":[
"maxAge"
],
"additionalProperties":false
},
{
"description":"HSTS policy string.",
"type":"string",
"minLength":"9",
"maxLength":"255"
}
]
},
"cors":{
"description":"Cross-Origin Resource Sharing",
"x-oneOf":[
{
"description":"Allow anonymous access from any origin",
"type":"object",
"properties":{
"allowOrigin":{
"description":"Allow any origin to access service resources",
"enum":[
"*"
]
},
"allowCredentials":{
"description":"Credentials are not allowed for a wildcard origin",
"enum":[
false
]
}
},
"required":[
"allowOrigin"
],
"additionalProperties":false
},
{
"description":"Allow credentialed access from a specific origin",
"type":"object",
"properties":{
"allowOrigin":{
"description":"Specific origin allowed to access service resources",
"type":"string",
"pattern":"^[a-zA-Z][a-zA-Z0-9+-.]*:[^ \\t]*$",
"minLength":"2",
"maxLength":"4095"
},
"allowCredentials":{
"description":"Credentials are allowed for a non-wildcard origin",
"type":"boolean"
}
},
"required":[
"allowOrigin",
"allowCredentials"
],
"additionalProperties":false
}
]
},
"defaultSynchronousWait":{
"description":"The default number of seconds the service will wait before responding with an asynchronous REST API response",
"type":"integer",
"minimum":"0",
"maximum":"3600",
"default":"30"
},
"childProcessPriorityDecrease":{
"description":"Amount that any child process priority is decreased",
"type":"integer",
"default":"0",
"minimum":"0",
"maximum":"20"
},
"csrfTokenProtectionEnabled":{
"description":"Enable CSRF token-based protection.",
"type":"boolean",
"default":true
}
}
}
Nested Schema : restart
Type: object
Control how the service is restarted if it terminates
Default Value: {
"enabled":true,
"onSuccess":true,
"delay":"0",
"retries":"9",
"window":"60",
"disableOnFailure":true
}
Show Source
-
$schema:
Allowed Values: [
"ogg:taskRestart"
]
-
delay:
integer
Minimum Value: 0
Maximum Value: 3600
Default Value: 0
The amount of time, in seconds, to pause between discovering that a process has terminated abnormally and restarting the process.
-
disableOnFailure:
boolean
Default Value: true
If true, the task is disabled when it fails all execution attempts in an execution window.
-
enabled:
boolean
Default Value: true
If set, the task can be restarted if it terminates.
-
failures:
integer
Minimum Value: 0
Maximum Value: 3600
The number of times the task failed in the current window.
-
onSuccess:
boolean
Default Value: true
If false, the task is only restarted if it fails.
-
retries:
integer
Minimum Value: 0
Maximum Value: 3600
Default Value: 9
The maximum number of times the task should be restarted before aborting retry efforts.
-
window:
integer
Minimum Value: 0
Maximum Value: 604800
Default Value: 60
The window of time, in seconds, during which retries are counted.
{
"description":"Control how the service is restarted if it terminates",
"default":{
"enabled":true,
"onSuccess":true,
"delay":"0",
"retries":"9",
"window":"60",
"disableOnFailure":true
},
"type":"object",
"properties":{
"$schema":{
"enum":[
"ogg:taskRestart"
]
},
"enabled":{
"description":"If set, the task can be restarted if it terminates.",
"type":"boolean",
"default":true
},
"onSuccess":{
"description":"If false, the task is only restarted if it fails.",
"type":"boolean",
"default":true
},
"delay":{
"description":"The amount of time, in seconds, to pause between discovering that a process has terminated abnormally and restarting the process.",
"type":"integer",
"minimum":"0",
"default":"0",
"maximum":"3600"
},
"retries":{
"description":"The maximum number of times the task should be restarted before aborting retry efforts.",
"type":"integer",
"minimum":"0",
"default":"9",
"maximum":"3600"
},
"window":{
"description":"The window of time, in seconds, during which retries are counted.",
"type":"integer",
"minimum":"0",
"default":"60",
"maximum":"604800"
},
"disableOnFailure":{
"description":"If true, the task is disabled when it fails all execution attempts in an execution window.",
"type":"boolean",
"default":true
},
"failures":{
"description":"The number of times the task failed in the current window.",
"type":"integer",
"minimum":"0",
"maximum":"3600"
}
},
"additionalProperties":false
}
Nested Schema : authorizationDetails
Type: object
Authorization configuration details.
Show Source
-
common:
object common
Common authorization configuration settings.
-
movingExpirationWindowSecs:
integer
Minimum Value: 0
Maximum Value: 4294967295
Width of the expiration window in seconds.
-
sessionDurationSecs:
integer
Minimum Value: 0
Maximum Value: 4294967295
Default Value: 3600
Duration of the authorizations.
-
sessionInactiveSecs:
integer
Minimum Value: 0
Maximum Value: 4294967295
Default Value: 1800
The maximum number of seconds an unexpired authorization session may be inactive before expiring. A session's inactivity time will be unlimited when sessionInactiveSeconds is set to 0.
-
sessionReauthorizationLimit:
integer
Minimum Value: 0
Maximum Value: 4294967295
Default Value: 12
The maximum number of times unexpired authorization sessions may be reauthorized. Session reauthorization request are not allowed when sessionReauthorizationLimit is set to 0.
-
useMovingExpirationWindow:
boolean
Default Value: false
Enable the use of moving expiration window over fix expiration time value.
-
validityDurationSecs:
integer
Minimum Value: 0
Maximum Value: 4294967295
Default Value: 300
The number of seconds for which an authorization digest remains valid.
{
"description":"Authorization configuration details.",
"type":"object",
"properties":{
"sessionDurationSecs":{
"description":"Duration of the authorizations.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295",
"default":"3600"
},
"sessionInactiveSecs":{
"description":"The maximum number of seconds an unexpired authorization session may be inactive before expiring. A session's inactivity time will be unlimited when sessionInactiveSeconds is set to 0.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295",
"default":"1800"
},
"sessionReauthorizationLimit":{
"description":"The maximum number of times unexpired authorization sessions may be reauthorized. Session reauthorization request are not allowed when sessionReauthorizationLimit is set to 0.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295",
"default":"12"
},
"useMovingExpirationWindow":{
"description":"Enable the use of moving expiration window over fix expiration time value.",
"type":"boolean",
"default":false
},
"movingExpirationWindowSecs":{
"description":"Width of the expiration window in seconds.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295"
},
"common":{
"description":"Common authorization configuration settings.",
"type":"object",
"properties":{
"allow":{
"description":"Authorization modes allowed.",
"type":"array",
"items":{
"description":"Name of authorization modes allowed.",
"enum":[
"Basic",
"Digest-SHA-256",
"Digest",
"x-Cert",
"Bearer"
]
},
"minItems":"1",
"maxItems":"5"
},
"customAuthorizationEnabled":{
"description":"Enable use of OGG custom authorization modes.",
"type":"boolean",
"default":true
}
},
"additionalProperties":false
},
"validityDurationSecs":{
"description":"The number of seconds for which an authorization digest remains valid.",
"type":"integer",
"default":"300",
"minimum":"0",
"maximum":"4294967295"
}
},
"additionalProperties":false
}
Nested Schema : contentUrlRewrite
Incoming URL rewriting rules.
Match One
Show Source
-
string
Minimum Length: 0
Maximum Length: 10240
A comma-delimited key value string of rewriting rules
-
array contentUrlRewrite-x-oneOf[1]
Minimum Number of Items: 1
Maximum Number of Items: 2048
An array of rewriting rules.
{
"description":"Incoming URL rewriting rules.",
"x-oneOf":[
{
"description":"A comma-delimited key value string of rewriting rules",
"type":"string",
"minLength":"0",
"maxLength":"10240"
},
{
"description":"An array of rewriting rules.",
"type":"array",
"items":{
"description":"URL rewriting rule.",
"type":"object",
"properties":{
"srcUrl":{
"description":"Source URL",
"type":"string",
"minLength":"1",
"maxLength":"255"
},
"targetUrl":{
"description":"Target URL",
"type":"string",
"minLength":"1",
"maxLength":"255"
}
},
"required":[
"srcUrl",
"targetUrl"
],
"additionalProperties":false
},
"minItems":"1",
"maxItems":"2048"
}
]
}
Nested Schema : cors
Cross-Origin Resource Sharing
Match One
Show Source
{
"description":"Cross-Origin Resource Sharing",
"x-oneOf":[
{
"description":"Allow anonymous access from any origin",
"type":"object",
"properties":{
"allowOrigin":{
"description":"Allow any origin to access service resources",
"enum":[
"*"
]
},
"allowCredentials":{
"description":"Credentials are not allowed for a wildcard origin",
"enum":[
false
]
}
},
"required":[
"allowOrigin"
],
"additionalProperties":false
},
{
"description":"Allow credentialed access from a specific origin",
"type":"object",
"properties":{
"allowOrigin":{
"description":"Specific origin allowed to access service resources",
"type":"string",
"pattern":"^[a-zA-Z][a-zA-Z0-9+-.]*:[^ \\t]*$",
"minLength":"2",
"maxLength":"4095"
},
"allowCredentials":{
"description":"Credentials are allowed for a non-wildcard origin",
"type":"boolean"
}
},
"required":[
"allowOrigin",
"allowCredentials"
],
"additionalProperties":false
}
]
}
Nested Schema : hstsDetails
Defines the HTTP Strict-Transport-Security (HSTS) policy parameters
Match One
Show Source
{
"description":"Defines the HTTP Strict-Transport-Security (HSTS) policy parameters",
"x-oneOf":[
{
"description":"HSTS policy object.",
"type":"object",
"properties":{
"maxAge":{
"description":"Maximum time in seconds the HTST policy should remain in effect.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295"
},
"includeSubDomains":{
"description":"Option indicating that the target domain's subdomain should be included when evaluating the HSTS policy.",
"type":"boolean",
"default":true
}
},
"required":[
"maxAge"
],
"additionalProperties":false
},
{
"description":"HSTS policy string.",
"type":"string",
"minLength":"9",
"maxLength":"255"
}
]
}
Nested Schema : network
Type: object
Network configuration
Show Source
{
"description":"Network configuration",
"type":"object",
"properties":{
"serviceListeningPort":{
"description":"Port number that the service will listen on",
"x-oneOf":[
{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
{
"description":"Port number for a specific IP address or host name",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"address":{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"name":{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"additionalProperties":false,
"x-anyOf":[
{
"required":[
"port"
]
},
{
"required":[
"port",
"address"
]
},
{
"required":[
"port",
"name"
]
}
]
},
{
"description":"Port number for a specific network interface",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"interface":{
"description":"Network interface for listener",
"type":"string",
"minLength":"1",
"maxLength":"32"
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"required":[
"port",
"interface"
],
"additionalProperties":false
},
{
"type":"array",
"description":"Array of listener specifications",
"items":{
"x-anyOf":[
{
"description":"Port number for a specific IP address or host name",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"address":{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"name":{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"additionalProperties":false,
"x-anyOf":[
{
"required":[
"port"
]
},
{
"required":[
"port",
"address"
]
},
{
"required":[
"port",
"name"
]
}
]
},
{
"description":"Port number for a specific network interface",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"interface":{
"description":"Network interface for listener",
"type":"string",
"minLength":"1",
"maxLength":"32"
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"required":[
"port",
"interface"
],
"additionalProperties":false
}
]
},
"minItems":"1",
"maxItems":"32"
}
]
}
},
"required":[
"serviceListeningPort"
]
}
Nested Schema : securityDetails
Type: object
Detailed security configuration.
Show Source
{
"description":"Detailed security configuration.",
"type":"object",
"properties":{
"network":{
"description":"Network security configuration.",
"type":"object",
"properties":{
"common":{
"description":"Common network security configuration.",
"type":"object",
"properties":{
"id":{
"description":"Security implementation identifier.",
"enum":[
"OracleSSL"
]
},
"fipsEnabled":{
"description":"Indicates whether a FIPS-140 compliant implementation module should be used.",
"type":"boolean",
"default":"false"
}
}
},
"inbound":{
"description":"Network security configuration for inbound requests from clients.",
"properties":{
"role":{
"description":"Defines the role the application is assuming.",
"enum":[
"server"
]
},
"authMode":{
"description":"Defines the authorization mode to use when accepting secured network connections.",
"enum":[
"server_only",
"clientOptional_server",
"client_server",
"client_only",
"anonymous"
]
},
"sessionCacheEnabled":{
"description":"Indicates whether session caching is enabled.",
"type":"boolean",
"default":true
},
"wrlPassword":{
"description":"Defines the Oracle wallet password if the wallet is declared as autologin.",
"type":"string",
"minLength":"0",
"maxLength":"255"
},
"crlEnabled":{
"description":"Indicates whether Certificate Revocation List handling is enabled.",
"type":"boolean",
"default":true
},
"sessionCacheDetails":{
"description":"Defines the control limits for session caching.",
"type":"object",
"properties":{
"limit":{
"description":"The maximum number of sessions to cache.",
"type":"integer",
"default":"20480",
"minimum":"1",
"maximum":"4294967295"
},
"timeoutSecs":{
"description":"The number of seconds before a session might be purged from the session cache.",
"type":"integer",
"default":"1800",
"minimum":"0",
"maximum":"4294967295"
}
}
},
"cipherSuites":{
"description":"Defines the cipher-suites that may be used when establishing secure network connections.",
"x-oneOf":[
{
"description":"Regular expression that qualifies the set of cipher-suites to select for use when establishing secure network connections.",
"type":"string",
"default":"^((?!anon|RC4|NULL|3DES).)*$",
"minLength":"1",
"maxLength":"255"
},
{
"description":"Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.",
"type":"array",
"items":{
"description":"Cipher-suite identifier",
"enum":[
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
},
"minItems":"1",
"maxItems":"36"
}
]
},
"wrl":{
"description":"Defines the path to an Oracle wallet.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"certACL":{
"description":"Array policies for accepting allowing or denying acceptance of a peer certificate.",
"type":"array",
"items":{
"description":"Certificate Access Control List Policy.",
"type":"object",
"properties":{
"name":{
"description":"Certificates SubjectName or SubjectAlternateName Identifier to match",
"type":"string",
"minLength":"1",
"maxLength":"255"
},
"permission":{
"description":"Binary allow or deny policy selection.",
"type":"string",
"enum":[
"allow",
"deny"
]
}
},
"required":[
"name",
"permission"
],
"additionalProperties":false
},
"minItems":"1",
"maxItems":"255"
},
"crlStore":{
"description":"Defines the path to the CRL file.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"protocolVersion":{
"description":"Defines the protocol version to use and accept when establishing secure network connections.",
"enum":[
"1_0",
"1_0_Or_3_0",
"1_1",
"1_1_Or_1_0",
"1_1_Or_1_0_Or_3_0",
"1_1_Or_3_0",
"1_2",
"1_2_Or_1_0",
"1_2_Or_1_0_Or_3_0",
"1_2_Or_1_1",
"1_2_Or_1_1_Or_1_0",
"1_2_Or_1_1_Or_1_0_Or_3_0",
"1_2_Or_1_1_Or_3_0",
"1_2_Or_3_0",
"3_0",
"3_0_Only",
"3_0_With_2_0_Hello"
]
}
}
},
"outbound":{
"description":"Network security configuration for outbound requests to servers.",
"properties":{
"role":{
"description":"Defines the role the application is assuming.",
"enum":[
"client"
]
},
"authMode":{
"description":"Defines the authorization mode to use when accepting secured network connections.",
"enum":[
"server_only",
"clientOptional_server",
"client_server",
"client_only",
"anonymous"
]
},
"sessionCacheEnabled":{
"description":"Indicates whether session caching is enabled.",
"type":"boolean",
"default":true
},
"wrlPassword":{
"description":"Defines the Oracle wallet password if the wallet is declared as autologin.",
"type":"string",
"minLength":"0",
"maxLength":"255"
},
"crlEnabled":{
"description":"Indicates whether Certificate Revocation List handling is enabled.",
"type":"boolean",
"default":true
},
"sessionCacheDetails":{
"description":"Defines the control limits for session caching.",
"type":"object",
"properties":{
"limit":{
"description":"The maximum number of sessions to cache.",
"type":"integer",
"default":"20480",
"minimum":"1",
"maximum":"4294967295"
},
"timeoutSecs":{
"description":"The number of seconds before a session might be purged from the session cache.",
"type":"integer",
"default":"1800",
"minimum":"0",
"maximum":"4294967295"
}
}
},
"cipherSuites":{
"description":"Defines the cipher-suites that may be used when establishing secure network connections.",
"x-oneOf":[
{
"description":"Regular expression that qualifies the set of cipher-suites to select for use when establishing secure network connections.",
"type":"string",
"default":"^((?!anon|RC4|NULL|3DES).)*$",
"minLength":"1",
"maxLength":"255"
},
{
"description":"Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.",
"type":"array",
"items":{
"description":"Cipher-suite identifier",
"enum":[
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
},
"minItems":"1",
"maxItems":"36"
}
]
},
"wrl":{
"description":"Defines the path to an Oracle wallet.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"crlStore":{
"description":"Defines the path to the CRL file.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"protocolVersion":{
"description":"Defines the protocol version to use and accept when establishing secure network connections.",
"enum":[
"1_0",
"1_0_Or_3_0",
"1_1",
"1_1_Or_1_0",
"1_1_Or_1_0_Or_3_0",
"1_1_Or_3_0",
"1_2",
"1_2_Or_1_0",
"1_2_Or_1_0_Or_3_0",
"1_2_Or_1_1",
"1_2_Or_1_1_Or_1_0",
"1_2_Or_1_1_Or_1_0_Or_3_0",
"1_2_Or_1_1_Or_3_0",
"1_2_Or_3_0",
"3_0",
"3_0_Only",
"3_0_With_2_0_Hello"
]
}
}
}
}
}
}
}
Nested Schema : common
Type: object
Common authorization configuration settings.
Show Source
{
"description":"Common authorization configuration settings.",
"type":"object",
"properties":{
"allow":{
"description":"Authorization modes allowed.",
"type":"array",
"items":{
"description":"Name of authorization modes allowed.",
"enum":[
"Basic",
"Digest-SHA-256",
"Digest",
"x-Cert",
"Bearer"
]
},
"minItems":"1",
"maxItems":"5"
},
"customAuthorizationEnabled":{
"description":"Enable use of OGG custom authorization modes.",
"type":"boolean",
"default":true
}
},
"additionalProperties":false
}
Nested Schema : allow
Type: array
Minimum Number of Items: 1
Maximum Number of Items: 5
Authorization modes allowed.
Show Source
-
Array of:
Allowed Values: [
"Basic",
"Digest-SHA-256",
"Digest",
"x-Cert",
"Bearer"
]
Name of authorization modes allowed.
{
"description":"Authorization modes allowed.",
"type":"array",
"items":{
"description":"Name of authorization modes allowed.",
"enum":[
"Basic",
"Digest-SHA-256",
"Digest",
"x-Cert",
"Bearer"
]
},
"minItems":"1",
"maxItems":"5"
}
Nested Schema : contentUrlRewrite-x-oneOf[1]
Type: array
Minimum Number of Items: 1
Maximum Number of Items: 2048
An array of rewriting rules.
Show Source
{
"description":"An array of rewriting rules.",
"type":"array",
"items":{
"description":"URL rewriting rule.",
"type":"object",
"properties":{
"srcUrl":{
"description":"Source URL",
"type":"string",
"minLength":"1",
"maxLength":"255"
},
"targetUrl":{
"description":"Target URL",
"type":"string",
"minLength":"1",
"maxLength":"255"
}
},
"required":[
"srcUrl",
"targetUrl"
],
"additionalProperties":false
},
"minItems":"1",
"maxItems":"2048"
}
Nested Schema : items
Type: object
URL rewriting rule.
Show Source
{
"description":"URL rewriting rule.",
"type":"object",
"properties":{
"srcUrl":{
"description":"Source URL",
"type":"string",
"minLength":"1",
"maxLength":"255"
},
"targetUrl":{
"description":"Target URL",
"type":"string",
"minLength":"1",
"maxLength":"255"
}
},
"required":[
"srcUrl",
"targetUrl"
],
"additionalProperties":false
}
Nested Schema : cors-x-oneOf[0]
Type: object
Allow anonymous access from any origin
Show Source
{
"description":"Allow anonymous access from any origin",
"type":"object",
"properties":{
"allowOrigin":{
"description":"Allow any origin to access service resources",
"enum":[
"*"
]
},
"allowCredentials":{
"description":"Credentials are not allowed for a wildcard origin",
"enum":[
false
]
}
},
"required":[
"allowOrigin"
],
"additionalProperties":false
}
Nested Schema : cors-x-oneOf[1]
Type: object
Allow credentialed access from a specific origin
Show Source
{
"description":"Allow credentialed access from a specific origin",
"type":"object",
"properties":{
"allowOrigin":{
"description":"Specific origin allowed to access service resources",
"type":"string",
"pattern":"^[a-zA-Z][a-zA-Z0-9+-.]*:[^ \\t]*$",
"minLength":"2",
"maxLength":"4095"
},
"allowCredentials":{
"description":"Credentials are allowed for a non-wildcard origin",
"type":"boolean"
}
},
"required":[
"allowOrigin",
"allowCredentials"
],
"additionalProperties":false
}
Nested Schema : hstsDetails-x-oneOf[0]
Type: object
HSTS policy object.
Show Source
-
includeSubDomains:
boolean
Default Value: true
Option indicating that the target domain's subdomain should be included when evaluating the HSTS policy.
-
maxAge(required):
integer
Minimum Value: 0
Maximum Value: 4294967295
Maximum time in seconds the HTST policy should remain in effect.
{
"description":"HSTS policy object.",
"type":"object",
"properties":{
"maxAge":{
"description":"Maximum time in seconds the HTST policy should remain in effect.",
"type":"integer",
"minimum":"0",
"maximum":"4294967295"
},
"includeSubDomains":{
"description":"Option indicating that the target domain's subdomain should be included when evaluating the HSTS policy.",
"type":"boolean",
"default":true
}
},
"required":[
"maxAge"
],
"additionalProperties":false
}
Nested Schema : serviceListeningPort
Port number that the service will listen on
Match One
Show Source
{
"description":"Port number that the service will listen on",
"x-oneOf":[
{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
{
"description":"Port number for a specific IP address or host name",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"address":{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"name":{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"additionalProperties":false,
"x-anyOf":[
{
"required":[
"port"
]
},
{
"required":[
"port",
"address"
]
},
{
"required":[
"port",
"name"
]
}
]
},
{
"description":"Port number for a specific network interface",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"interface":{
"description":"Network interface for listener",
"type":"string",
"minLength":"1",
"maxLength":"32"
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"required":[
"port",
"interface"
],
"additionalProperties":false
},
{
"type":"array",
"description":"Array of listener specifications",
"items":{
"x-anyOf":[
{
"description":"Port number for a specific IP address or host name",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"address":{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"name":{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"additionalProperties":false,
"x-anyOf":[
{
"required":[
"port"
]
},
{
"required":[
"port",
"address"
]
},
{
"required":[
"port",
"name"
]
}
]
},
{
"description":"Port number for a specific network interface",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"interface":{
"description":"Network interface for listener",
"type":"string",
"minLength":"1",
"maxLength":"32"
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"required":[
"port",
"interface"
],
"additionalProperties":false
}
]
},
"minItems":"1",
"maxItems":"32"
}
]
}
Nested Schema : serviceListeningPort-x-oneOf[0]
Listener TCP/IP port number
Match One
Show Source
-
integer
Minimum Value: 1
Maximum Value: 65535
-
string
Minimum Length: 1
Maximum Length: 32
{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
}
Nested Schema : serviceListeningPort-x-oneOf[1]
Type: object
Port number for a specific IP address or host name
Show Source
{
"description":"Port number for a specific IP address or host name",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"address":{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"name":{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"additionalProperties":false,
"x-anyOf":[
{
"required":[
"port"
]
},
{
"required":[
"port",
"address"
]
},
{
"required":[
"port",
"name"
]
}
]
}
Match Any
Show Source
{
"description":"Port number for a specific IP address or host name",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"address":{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"name":{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"additionalProperties":false,
"x-anyOf":[
{
"required":[
"port"
]
},
{
"required":[
"port",
"address"
]
},
{
"required":[
"port",
"name"
]
}
]
}
Nested Schema : serviceListeningPort-x-oneOf[2]
Type: object
Port number for a specific network interface
Show Source
{
"description":"Port number for a specific network interface",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"interface":{
"description":"Network interface for listener",
"type":"string",
"minLength":"1",
"maxLength":"32"
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"required":[
"port",
"interface"
],
"additionalProperties":false
}
Nested Schema : serviceListeningPort-x-oneOf[3]
Type: array
Minimum Number of Items: 1
Maximum Number of Items: 32
Array of listener specifications
Show Source
{
"type":"array",
"description":"Array of listener specifications",
"items":{
"x-anyOf":[
{
"description":"Port number for a specific IP address or host name",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"address":{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"name":{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"additionalProperties":false,
"x-anyOf":[
{
"required":[
"port"
]
},
{
"required":[
"port",
"address"
]
},
{
"required":[
"port",
"name"
]
}
]
},
{
"description":"Port number for a specific network interface",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"interface":{
"description":"Network interface for listener",
"type":"string",
"minLength":"1",
"maxLength":"32"
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"required":[
"port",
"interface"
],
"additionalProperties":false
}
]
},
"minItems":"1",
"maxItems":"32"
}
Nested Schema : address
IP address for listener
Match One
Show Source
-
string
Minimum Length: 1
Maximum Length: 4095
Pattern: ^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$
Network host name
-
address-x-oneOf[1]
{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
}
Nested Schema : name
Host name for listener
Match One
Show Source
-
string
Minimum Length: 1
Maximum Length: 4095
Pattern: ^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$
Network host name
-
name-x-oneOf[1]
{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
}
Nested Schema : port
Listener TCP/IP port number
Match One
Show Source
-
integer
Minimum Value: 1
Maximum Value: 65535
-
string
Minimum Length: 1
Maximum Length: 32
{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
}
Nested Schema : address-x-oneOf[1]
Network IP address
Match One
Show Source
-
string
Minimum Length: 7
Maximum Length: 15
Pattern: ^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$
Network IPv4 address
-
string
Minimum Length: 1
Maximum Length: 256
Pattern: ^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$
Network IPv6 address
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
Nested Schema : name-x-oneOf[1]
Network IP address
Match One
Show Source
-
string
Minimum Length: 7
Maximum Length: 15
Pattern: ^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$
Network IPv4 address
-
string
Minimum Length: 1
Maximum Length: 256
Pattern: ^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$
Network IPv6 address
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
Nested Schema : port
Listener TCP/IP port number
Match One
Show Source
-
integer
Minimum Value: 1
Maximum Value: 65535
-
string
Minimum Length: 1
Maximum Length: 32
{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
}
Nested Schema : items
Match Any
Show Source
{
"x-anyOf":[
{
"description":"Port number for a specific IP address or host name",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"address":{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"name":{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"additionalProperties":false,
"x-anyOf":[
{
"required":[
"port"
]
},
{
"required":[
"port",
"address"
]
},
{
"required":[
"port",
"name"
]
}
]
},
{
"description":"Port number for a specific network interface",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"interface":{
"description":"Network interface for listener",
"type":"string",
"minLength":"1",
"maxLength":"32"
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"required":[
"port",
"interface"
],
"additionalProperties":false
}
]
}
Nested Schema : items-x-anyOf[0]
Type: object
Port number for a specific IP address or host name
Show Source
{
"description":"Port number for a specific IP address or host name",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"address":{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"name":{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"additionalProperties":false,
"x-anyOf":[
{
"required":[
"port"
]
},
{
"required":[
"port",
"address"
]
},
{
"required":[
"port",
"name"
]
}
]
}
Match Any
Show Source
{
"description":"Port number for a specific IP address or host name",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"address":{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"name":{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"additionalProperties":false,
"x-anyOf":[
{
"required":[
"port"
]
},
{
"required":[
"port",
"address"
]
},
{
"required":[
"port",
"name"
]
}
]
}
Nested Schema : items-x-anyOf[1]
Type: object
Port number for a specific network interface
Show Source
{
"description":"Port number for a specific network interface",
"type":"object",
"properties":{
"port":{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
},
"interface":{
"description":"Network interface for listener",
"type":"string",
"minLength":"1",
"maxLength":"32"
},
"options":{
"description":"Listener option",
"enum":[
"IPV4_ONLY",
"IPV6_ONLY"
]
}
},
"required":[
"port",
"interface"
],
"additionalProperties":false
}
Nested Schema : address
IP address for listener
Match One
Show Source
-
string
Minimum Length: 1
Maximum Length: 4095
Pattern: ^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$
Network host name
-
address-x-oneOf[1]
{
"description":"IP address for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
}
Nested Schema : name
Host name for listener
Match One
Show Source
-
string
Minimum Length: 1
Maximum Length: 4095
Pattern: ^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$
Network host name
-
name-x-oneOf[1]
{
"description":"Host name for listener",
"x-oneOf":[
{
"description":"Network host name",
"type":"string",
"pattern":"^(((([a-zA-Z0-9][-a-zA-Z0-9]{0,61})?[a-zA-Z0-9])[.])*([a-zA-Z][-a-zA-Z0-9]{0,61}[a-zA-Z0-9]|[a-zA-Z])[.]?)$",
"minLength":"1",
"maxLength":"4095"
},
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
]
}
Nested Schema : port
Listener TCP/IP port number
Match One
Show Source
-
integer
Minimum Value: 1
Maximum Value: 65535
-
string
Minimum Length: 1
Maximum Length: 32
{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
}
Nested Schema : address-x-oneOf[1]
Network IP address
Match One
Show Source
-
string
Minimum Length: 7
Maximum Length: 15
Pattern: ^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$
Network IPv4 address
-
string
Minimum Length: 1
Maximum Length: 256
Pattern: ^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$
Network IPv6 address
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
Nested Schema : name-x-oneOf[1]
Network IP address
Match One
Show Source
-
string
Minimum Length: 7
Maximum Length: 15
Pattern: ^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$
Network IPv4 address
-
string
Minimum Length: 1
Maximum Length: 256
Pattern: ^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$
Network IPv6 address
{
"description":"Network IP address",
"x-oneOf":[
{
"description":"Network IPv4 address",
"type":"string",
"pattern":"^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)[.]){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$",
"minLength":"7",
"maxLength":"15"
},
{
"description":"Network IPv6 address",
"type":"string",
"pattern":"^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])([.](25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))|:)))(%.+)?$",
"minLength":"1",
"maxLength":"256"
}
]
}
Nested Schema : port
Listener TCP/IP port number
Match One
Show Source
-
integer
Minimum Value: 1
Maximum Value: 65535
-
string
Minimum Length: 1
Maximum Length: 32
{
"description":"Listener TCP/IP port number",
"x-oneOf":[
{
"type":"integer",
"minimum":"1",
"maximum":"65535"
},
{
"type":"string",
"minLength":"1",
"maxLength":"32"
}
]
}
Nested Schema : network
Type: object
Network security configuration.
Show Source
{
"description":"Network security configuration.",
"type":"object",
"properties":{
"common":{
"description":"Common network security configuration.",
"type":"object",
"properties":{
"id":{
"description":"Security implementation identifier.",
"enum":[
"OracleSSL"
]
},
"fipsEnabled":{
"description":"Indicates whether a FIPS-140 compliant implementation module should be used.",
"type":"boolean",
"default":"false"
}
}
},
"inbound":{
"description":"Network security configuration for inbound requests from clients.",
"properties":{
"role":{
"description":"Defines the role the application is assuming.",
"enum":[
"server"
]
},
"authMode":{
"description":"Defines the authorization mode to use when accepting secured network connections.",
"enum":[
"server_only",
"clientOptional_server",
"client_server",
"client_only",
"anonymous"
]
},
"sessionCacheEnabled":{
"description":"Indicates whether session caching is enabled.",
"type":"boolean",
"default":true
},
"wrlPassword":{
"description":"Defines the Oracle wallet password if the wallet is declared as autologin.",
"type":"string",
"minLength":"0",
"maxLength":"255"
},
"crlEnabled":{
"description":"Indicates whether Certificate Revocation List handling is enabled.",
"type":"boolean",
"default":true
},
"sessionCacheDetails":{
"description":"Defines the control limits for session caching.",
"type":"object",
"properties":{
"limit":{
"description":"The maximum number of sessions to cache.",
"type":"integer",
"default":"20480",
"minimum":"1",
"maximum":"4294967295"
},
"timeoutSecs":{
"description":"The number of seconds before a session might be purged from the session cache.",
"type":"integer",
"default":"1800",
"minimum":"0",
"maximum":"4294967295"
}
}
},
"cipherSuites":{
"description":"Defines the cipher-suites that may be used when establishing secure network connections.",
"x-oneOf":[
{
"description":"Regular expression that qualifies the set of cipher-suites to select for use when establishing secure network connections.",
"type":"string",
"default":"^((?!anon|RC4|NULL|3DES).)*$",
"minLength":"1",
"maxLength":"255"
},
{
"description":"Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.",
"type":"array",
"items":{
"description":"Cipher-suite identifier",
"enum":[
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
},
"minItems":"1",
"maxItems":"36"
}
]
},
"wrl":{
"description":"Defines the path to an Oracle wallet.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"certACL":{
"description":"Array policies for accepting allowing or denying acceptance of a peer certificate.",
"type":"array",
"items":{
"description":"Certificate Access Control List Policy.",
"type":"object",
"properties":{
"name":{
"description":"Certificates SubjectName or SubjectAlternateName Identifier to match",
"type":"string",
"minLength":"1",
"maxLength":"255"
},
"permission":{
"description":"Binary allow or deny policy selection.",
"type":"string",
"enum":[
"allow",
"deny"
]
}
},
"required":[
"name",
"permission"
],
"additionalProperties":false
},
"minItems":"1",
"maxItems":"255"
},
"crlStore":{
"description":"Defines the path to the CRL file.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"protocolVersion":{
"description":"Defines the protocol version to use and accept when establishing secure network connections.",
"enum":[
"1_0",
"1_0_Or_3_0",
"1_1",
"1_1_Or_1_0",
"1_1_Or_1_0_Or_3_0",
"1_1_Or_3_0",
"1_2",
"1_2_Or_1_0",
"1_2_Or_1_0_Or_3_0",
"1_2_Or_1_1",
"1_2_Or_1_1_Or_1_0",
"1_2_Or_1_1_Or_1_0_Or_3_0",
"1_2_Or_1_1_Or_3_0",
"1_2_Or_3_0",
"3_0",
"3_0_Only",
"3_0_With_2_0_Hello"
]
}
}
},
"outbound":{
"description":"Network security configuration for outbound requests to servers.",
"properties":{
"role":{
"description":"Defines the role the application is assuming.",
"enum":[
"client"
]
},
"authMode":{
"description":"Defines the authorization mode to use when accepting secured network connections.",
"enum":[
"server_only",
"clientOptional_server",
"client_server",
"client_only",
"anonymous"
]
},
"sessionCacheEnabled":{
"description":"Indicates whether session caching is enabled.",
"type":"boolean",
"default":true
},
"wrlPassword":{
"description":"Defines the Oracle wallet password if the wallet is declared as autologin.",
"type":"string",
"minLength":"0",
"maxLength":"255"
},
"crlEnabled":{
"description":"Indicates whether Certificate Revocation List handling is enabled.",
"type":"boolean",
"default":true
},
"sessionCacheDetails":{
"description":"Defines the control limits for session caching.",
"type":"object",
"properties":{
"limit":{
"description":"The maximum number of sessions to cache.",
"type":"integer",
"default":"20480",
"minimum":"1",
"maximum":"4294967295"
},
"timeoutSecs":{
"description":"The number of seconds before a session might be purged from the session cache.",
"type":"integer",
"default":"1800",
"minimum":"0",
"maximum":"4294967295"
}
}
},
"cipherSuites":{
"description":"Defines the cipher-suites that may be used when establishing secure network connections.",
"x-oneOf":[
{
"description":"Regular expression that qualifies the set of cipher-suites to select for use when establishing secure network connections.",
"type":"string",
"default":"^((?!anon|RC4|NULL|3DES).)*$",
"minLength":"1",
"maxLength":"255"
},
{
"description":"Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.",
"type":"array",
"items":{
"description":"Cipher-suite identifier",
"enum":[
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
},
"minItems":"1",
"maxItems":"36"
}
]
},
"wrl":{
"description":"Defines the path to an Oracle wallet.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"crlStore":{
"description":"Defines the path to the CRL file.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"protocolVersion":{
"description":"Defines the protocol version to use and accept when establishing secure network connections.",
"enum":[
"1_0",
"1_0_Or_3_0",
"1_1",
"1_1_Or_1_0",
"1_1_Or_1_0_Or_3_0",
"1_1_Or_3_0",
"1_2",
"1_2_Or_1_0",
"1_2_Or_1_0_Or_3_0",
"1_2_Or_1_1",
"1_2_Or_1_1_Or_1_0",
"1_2_Or_1_1_Or_1_0_Or_3_0",
"1_2_Or_1_1_Or_3_0",
"1_2_Or_3_0",
"3_0",
"3_0_Only",
"3_0_With_2_0_Hello"
]
}
}
}
}
}
Nested Schema : common
Type: object
Common network security configuration.
Show Source
-
fipsEnabled:
boolean
Default Value: false
Indicates whether a FIPS-140 compliant implementation module should be used.
-
id:
Allowed Values: [
"OracleSSL"
]
Security implementation identifier.
{
"description":"Common network security configuration.",
"type":"object",
"properties":{
"id":{
"description":"Security implementation identifier.",
"enum":[
"OracleSSL"
]
},
"fipsEnabled":{
"description":"Indicates whether a FIPS-140 compliant implementation module should be used.",
"type":"boolean",
"default":"false"
}
}
}
Nested Schema : inbound
Type: object
Network security configuration for inbound requests from clients.
Show Source
-
authMode:
Allowed Values: [
"server_only",
"clientOptional_server",
"client_server",
"client_only",
"anonymous"
]
Defines the authorization mode to use when accepting secured network connections.
-
certACL:
array certACL
Minimum Number of Items: 1
Maximum Number of Items: 255
Array policies for accepting allowing or denying acceptance of a peer certificate.
-
cipherSuites:
cipherSuites
Defines the cipher-suites that may be used when establishing secure network connections.
-
crlEnabled:
boolean
Default Value: true
Indicates whether Certificate Revocation List handling is enabled.
-
crlStore:
string
Minimum Length: 5
Maximum Length: 4096
Pattern: ^file:.*$
Defines the path to the CRL file.
-
protocolVersion:
Allowed Values: [
"1_0",
"1_0_Or_3_0",
"1_1",
"1_1_Or_1_0",
"1_1_Or_1_0_Or_3_0",
"1_1_Or_3_0",
"1_2",
"1_2_Or_1_0",
"1_2_Or_1_0_Or_3_0",
"1_2_Or_1_1",
"1_2_Or_1_1_Or_1_0",
"1_2_Or_1_1_Or_1_0_Or_3_0",
"1_2_Or_1_1_Or_3_0",
"1_2_Or_3_0",
"3_0",
"3_0_Only",
"3_0_With_2_0_Hello"
]
Defines the protocol version to use and accept when establishing secure network connections.
-
role:
Allowed Values: [
"server"
]
Defines the role the application is assuming.
-
sessionCacheDetails:
object sessionCacheDetails
Defines the control limits for session caching.
-
sessionCacheEnabled:
boolean
Default Value: true
Indicates whether session caching is enabled.
-
wrl:
string
Minimum Length: 5
Maximum Length: 4096
Pattern: ^file:.*$
Defines the path to an Oracle wallet.
-
wrlPassword:
string
Minimum Length: 0
Maximum Length: 255
Defines the Oracle wallet password if the wallet is declared as autologin.
{
"description":"Network security configuration for inbound requests from clients.",
"properties":{
"role":{
"description":"Defines the role the application is assuming.",
"enum":[
"server"
]
},
"authMode":{
"description":"Defines the authorization mode to use when accepting secured network connections.",
"enum":[
"server_only",
"clientOptional_server",
"client_server",
"client_only",
"anonymous"
]
},
"sessionCacheEnabled":{
"description":"Indicates whether session caching is enabled.",
"type":"boolean",
"default":true
},
"wrlPassword":{
"description":"Defines the Oracle wallet password if the wallet is declared as autologin.",
"type":"string",
"minLength":"0",
"maxLength":"255"
},
"crlEnabled":{
"description":"Indicates whether Certificate Revocation List handling is enabled.",
"type":"boolean",
"default":true
},
"sessionCacheDetails":{
"description":"Defines the control limits for session caching.",
"type":"object",
"properties":{
"limit":{
"description":"The maximum number of sessions to cache.",
"type":"integer",
"default":"20480",
"minimum":"1",
"maximum":"4294967295"
},
"timeoutSecs":{
"description":"The number of seconds before a session might be purged from the session cache.",
"type":"integer",
"default":"1800",
"minimum":"0",
"maximum":"4294967295"
}
}
},
"cipherSuites":{
"description":"Defines the cipher-suites that may be used when establishing secure network connections.",
"x-oneOf":[
{
"description":"Regular expression that qualifies the set of cipher-suites to select for use when establishing secure network connections.",
"type":"string",
"default":"^((?!anon|RC4|NULL|3DES).)*$",
"minLength":"1",
"maxLength":"255"
},
{
"description":"Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.",
"type":"array",
"items":{
"description":"Cipher-suite identifier",
"enum":[
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
},
"minItems":"1",
"maxItems":"36"
}
]
},
"wrl":{
"description":"Defines the path to an Oracle wallet.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"certACL":{
"description":"Array policies for accepting allowing or denying acceptance of a peer certificate.",
"type":"array",
"items":{
"description":"Certificate Access Control List Policy.",
"type":"object",
"properties":{
"name":{
"description":"Certificates SubjectName or SubjectAlternateName Identifier to match",
"type":"string",
"minLength":"1",
"maxLength":"255"
},
"permission":{
"description":"Binary allow or deny policy selection.",
"type":"string",
"enum":[
"allow",
"deny"
]
}
},
"required":[
"name",
"permission"
],
"additionalProperties":false
},
"minItems":"1",
"maxItems":"255"
},
"crlStore":{
"description":"Defines the path to the CRL file.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"protocolVersion":{
"description":"Defines the protocol version to use and accept when establishing secure network connections.",
"enum":[
"1_0",
"1_0_Or_3_0",
"1_1",
"1_1_Or_1_0",
"1_1_Or_1_0_Or_3_0",
"1_1_Or_3_0",
"1_2",
"1_2_Or_1_0",
"1_2_Or_1_0_Or_3_0",
"1_2_Or_1_1",
"1_2_Or_1_1_Or_1_0",
"1_2_Or_1_1_Or_1_0_Or_3_0",
"1_2_Or_1_1_Or_3_0",
"1_2_Or_3_0",
"3_0",
"3_0_Only",
"3_0_With_2_0_Hello"
]
}
}
}
Nested Schema : outbound
Type: object
Network security configuration for outbound requests to servers.
Show Source
-
authMode:
Allowed Values: [
"server_only",
"clientOptional_server",
"client_server",
"client_only",
"anonymous"
]
Defines the authorization mode to use when accepting secured network connections.
-
cipherSuites:
cipherSuites
Defines the cipher-suites that may be used when establishing secure network connections.
-
crlEnabled:
boolean
Default Value: true
Indicates whether Certificate Revocation List handling is enabled.
-
crlStore:
string
Minimum Length: 5
Maximum Length: 4096
Pattern: ^file:.*$
Defines the path to the CRL file.
-
protocolVersion:
Allowed Values: [
"1_0",
"1_0_Or_3_0",
"1_1",
"1_1_Or_1_0",
"1_1_Or_1_0_Or_3_0",
"1_1_Or_3_0",
"1_2",
"1_2_Or_1_0",
"1_2_Or_1_0_Or_3_0",
"1_2_Or_1_1",
"1_2_Or_1_1_Or_1_0",
"1_2_Or_1_1_Or_1_0_Or_3_0",
"1_2_Or_1_1_Or_3_0",
"1_2_Or_3_0",
"3_0",
"3_0_Only",
"3_0_With_2_0_Hello"
]
Defines the protocol version to use and accept when establishing secure network connections.
-
role:
Allowed Values: [
"client"
]
Defines the role the application is assuming.
-
sessionCacheDetails:
object sessionCacheDetails
Defines the control limits for session caching.
-
sessionCacheEnabled:
boolean
Default Value: true
Indicates whether session caching is enabled.
-
wrl:
string
Minimum Length: 5
Maximum Length: 4096
Pattern: ^file:.*$
Defines the path to an Oracle wallet.
-
wrlPassword:
string
Minimum Length: 0
Maximum Length: 255
Defines the Oracle wallet password if the wallet is declared as autologin.
{
"description":"Network security configuration for outbound requests to servers.",
"properties":{
"role":{
"description":"Defines the role the application is assuming.",
"enum":[
"client"
]
},
"authMode":{
"description":"Defines the authorization mode to use when accepting secured network connections.",
"enum":[
"server_only",
"clientOptional_server",
"client_server",
"client_only",
"anonymous"
]
},
"sessionCacheEnabled":{
"description":"Indicates whether session caching is enabled.",
"type":"boolean",
"default":true
},
"wrlPassword":{
"description":"Defines the Oracle wallet password if the wallet is declared as autologin.",
"type":"string",
"minLength":"0",
"maxLength":"255"
},
"crlEnabled":{
"description":"Indicates whether Certificate Revocation List handling is enabled.",
"type":"boolean",
"default":true
},
"sessionCacheDetails":{
"description":"Defines the control limits for session caching.",
"type":"object",
"properties":{
"limit":{
"description":"The maximum number of sessions to cache.",
"type":"integer",
"default":"20480",
"minimum":"1",
"maximum":"4294967295"
},
"timeoutSecs":{
"description":"The number of seconds before a session might be purged from the session cache.",
"type":"integer",
"default":"1800",
"minimum":"0",
"maximum":"4294967295"
}
}
},
"cipherSuites":{
"description":"Defines the cipher-suites that may be used when establishing secure network connections.",
"x-oneOf":[
{
"description":"Regular expression that qualifies the set of cipher-suites to select for use when establishing secure network connections.",
"type":"string",
"default":"^((?!anon|RC4|NULL|3DES).)*$",
"minLength":"1",
"maxLength":"255"
},
{
"description":"Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.",
"type":"array",
"items":{
"description":"Cipher-suite identifier",
"enum":[
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
},
"minItems":"1",
"maxItems":"36"
}
]
},
"wrl":{
"description":"Defines the path to an Oracle wallet.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"crlStore":{
"description":"Defines the path to the CRL file.",
"type":"string",
"pattern":"^file:.*$",
"minLength":"5",
"maxLength":"4096"
},
"protocolVersion":{
"description":"Defines the protocol version to use and accept when establishing secure network connections.",
"enum":[
"1_0",
"1_0_Or_3_0",
"1_1",
"1_1_Or_1_0",
"1_1_Or_1_0_Or_3_0",
"1_1_Or_3_0",
"1_2",
"1_2_Or_1_0",
"1_2_Or_1_0_Or_3_0",
"1_2_Or_1_1",
"1_2_Or_1_1_Or_1_0",
"1_2_Or_1_1_Or_1_0_Or_3_0",
"1_2_Or_1_1_Or_3_0",
"1_2_Or_3_0",
"3_0",
"3_0_Only",
"3_0_With_2_0_Hello"
]
}
}
}
Nested Schema : certACL
Type: array
Minimum Number of Items: 1
Maximum Number of Items: 255
Array policies for accepting allowing or denying acceptance of a peer certificate.
Show Source
{
"description":"Array policies for accepting allowing or denying acceptance of a peer certificate.",
"type":"array",
"items":{
"description":"Certificate Access Control List Policy.",
"type":"object",
"properties":{
"name":{
"description":"Certificates SubjectName or SubjectAlternateName Identifier to match",
"type":"string",
"minLength":"1",
"maxLength":"255"
},
"permission":{
"description":"Binary allow or deny policy selection.",
"type":"string",
"enum":[
"allow",
"deny"
]
}
},
"required":[
"name",
"permission"
],
"additionalProperties":false
},
"minItems":"1",
"maxItems":"255"
}
Nested Schema : cipherSuites
Defines the cipher-suites that may be used when establishing secure network connections.
Match One
Show Source
-
string
Minimum Length: 1
Maximum Length: 255
Default Value: ^((?!anon|RC4|NULL|3DES).)*$
Regular expression that qualifies the set of cipher-suites to select for use when establishing secure network connections.
-
array cipherSuites-x-oneOf[1]
Minimum Number of Items: 1
Maximum Number of Items: 36
Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.
{
"description":"Defines the cipher-suites that may be used when establishing secure network connections.",
"x-oneOf":[
{
"description":"Regular expression that qualifies the set of cipher-suites to select for use when establishing secure network connections.",
"type":"string",
"default":"^((?!anon|RC4|NULL|3DES).)*$",
"minLength":"1",
"maxLength":"255"
},
{
"description":"Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.",
"type":"array",
"items":{
"description":"Cipher-suite identifier",
"enum":[
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
},
"minItems":"1",
"maxItems":"36"
}
]
}
Nested Schema : sessionCacheDetails
Type: object
Defines the control limits for session caching.
Show Source
-
limit:
integer
Minimum Value: 1
Maximum Value: 4294967295
Default Value: 20480
The maximum number of sessions to cache.
-
timeoutSecs:
integer
Minimum Value: 0
Maximum Value: 4294967295
Default Value: 1800
The number of seconds before a session might be purged from the session cache.
{
"description":"Defines the control limits for session caching.",
"type":"object",
"properties":{
"limit":{
"description":"The maximum number of sessions to cache.",
"type":"integer",
"default":"20480",
"minimum":"1",
"maximum":"4294967295"
},
"timeoutSecs":{
"description":"The number of seconds before a session might be purged from the session cache.",
"type":"integer",
"default":"1800",
"minimum":"0",
"maximum":"4294967295"
}
}
}
Nested Schema : items
Type: object
Certificate Access Control List Policy.
Show Source
{
"description":"Certificate Access Control List Policy.",
"type":"object",
"properties":{
"name":{
"description":"Certificates SubjectName or SubjectAlternateName Identifier to match",
"type":"string",
"minLength":"1",
"maxLength":"255"
},
"permission":{
"description":"Binary allow or deny policy selection.",
"type":"string",
"enum":[
"allow",
"deny"
]
}
},
"required":[
"name",
"permission"
],
"additionalProperties":false
}
Nested Schema : cipherSuites-x-oneOf[1]
Type: array
Minimum Number of Items: 1
Maximum Number of Items: 36
Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.
Show Source
-
Array of:
Allowed Values: [
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
Cipher-suite identifier
{
"description":"Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.",
"type":"array",
"items":{
"description":"Cipher-suite identifier",
"enum":[
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
},
"minItems":"1",
"maxItems":"36"
}
Nested Schema : cipherSuites
Defines the cipher-suites that may be used when establishing secure network connections.
Match One
Show Source
-
string
Minimum Length: 1
Maximum Length: 255
Default Value: ^((?!anon|RC4|NULL|3DES).)*$
Regular expression that qualifies the set of cipher-suites to select for use when establishing secure network connections.
-
array cipherSuites-x-oneOf[1]
Minimum Number of Items: 1
Maximum Number of Items: 36
Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.
{
"description":"Defines the cipher-suites that may be used when establishing secure network connections.",
"x-oneOf":[
{
"description":"Regular expression that qualifies the set of cipher-suites to select for use when establishing secure network connections.",
"type":"string",
"default":"^((?!anon|RC4|NULL|3DES).)*$",
"minLength":"1",
"maxLength":"255"
},
{
"description":"Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.",
"type":"array",
"items":{
"description":"Cipher-suite identifier",
"enum":[
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
},
"minItems":"1",
"maxItems":"36"
}
]
}
Nested Schema : sessionCacheDetails
Type: object
Defines the control limits for session caching.
Show Source
-
limit:
integer
Minimum Value: 1
Maximum Value: 4294967295
Default Value: 20480
The maximum number of sessions to cache.
-
timeoutSecs:
integer
Minimum Value: 0
Maximum Value: 4294967295
Default Value: 1800
The number of seconds before a session might be purged from the session cache.
{
"description":"Defines the control limits for session caching.",
"type":"object",
"properties":{
"limit":{
"description":"The maximum number of sessions to cache.",
"type":"integer",
"default":"20480",
"minimum":"1",
"maximum":"4294967295"
},
"timeoutSecs":{
"description":"The number of seconds before a session might be purged from the session cache.",
"type":"integer",
"default":"1800",
"minimum":"0",
"maximum":"4294967295"
}
}
}
Nested Schema : cipherSuites-x-oneOf[1]
Type: array
Minimum Number of Items: 1
Maximum Number of Items: 36
Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.
Show Source
-
Array of:
Allowed Values: [
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
Cipher-suite identifier
{
"description":"Array of discrete cipher-suite identifiers that may be used when establishing secure network connections.",
"type":"array",
"items":{
"description":"Cipher-suite identifier",
"enum":[
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256",
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384",
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384",
"TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256",
"TLS_RSA_WITH_AES_128_GCM_SHA256",
"TLS_RSA_WITH_AES_256_CBC_SHA",
"TLS_RSA_WITH_AES_256_CBC_SHA256",
"TLS_RSA_WITH_AES_256_GCM_SHA384"
]
},
"minItems":"1",
"maxItems":"36"
}