diff --git a/seed/mailman/dictionaries/31_mailman.xml b/seed/mailman/dictionaries/31_mailman.xml
index 575e133e..3ee89c0f 100644
--- a/seed/mailman/dictionaries/31_mailman.xml
+++ b/seed/mailman/dictionaries/31_mailman.xml
@@ -16,7 +16,8 @@
/tests/mailman.yml
- /etc/pki/tls/private/postgresql_postorius.key
+
+ /etc/pki/tls/private/postgresql_postorius.key
diff --git a/seed/mailman/templates/mailman.cfg b/seed/mailman/templates/mailman.cfg
index b5ec3acd..3690e6f5 100644
--- a/seed/mailman/templates/mailman.cfg
+++ b/seed/mailman/templates/mailman.cfg
@@ -24,7 +24,7 @@ layout: fhs
#>GNUNUX
[database]
class: mailman.database.postgresql.PostgreSQLDatabase
-url: postgresql://%%pg_client_username:%%pg_client_password@%%pg_client_server_domainname/%%pg_client_database?sslmode=verify-full&sslcert=/etc/pki/tls/certs/postgresql.crt&sslkey=/etc/pki/tls/private/postgresql.key&sslrootcert=/etc/pki/ca-trust/source/anchors/ca_PostgreSQL.crt
+url: postgresql://%%pg_client_username:%%pg_client_password@%%pg_client_server_domainname/%%pg_client_database?sslmode=verify-full&sslcert=%%pg_client_crt_file&sslkey=%%pg_client_key_file&sslrootcert=%%pg_client_ca_file
[mta]
lmtp_host: %%ip_eth0
diff --git a/seed/mailman/templates/postgresql_postorius.key b/seed/mailman/templates/postgresql_postorius.key
deleted file mode 100644
index f87d892a..00000000
--- a/seed/mailman/templates/postgresql_postorius.key
+++ /dev/null
@@ -1 +0,0 @@
-%%get_private_key(cn=%%domain_name_eth0, authority_cn=%%pg_client_server_domainname, authority_name='PostgreSQL', type="client", hide=%%hide_secret)
diff --git a/seed/mailman/templates/postorius-settings.py b/seed/mailman/templates/postorius-settings.py
index 64cf818b..a0aae369 100644
--- a/seed/mailman/templates/postorius-settings.py
+++ b/seed/mailman/templates/postorius-settings.py
@@ -10,7 +10,7 @@ DATABASES = {
'HOST': '%%pg_client_server_domainname', # Database server
'PORT': '', # Database port (leave blank for default)
'CONN_MAX_AGE': 300, # Max database connection age
- 'OPTIONS': {'sslmode': 'verify-full', 'sslcert': '/etc/pki/tls/certs/postgresql.crt', 'sslkey': '/etc/pki/tls/private/postgresql_postorius.key', 'sslrootcert': '/etc/pki/ca-trust/source/anchors/ca_PostgreSQL.crt'},
+ 'OPTIONS': {'sslmode': 'verify-full', 'sslcert': '%%pg_client_crt_file', 'sslkey': '/etc/pki/tls/private/postgresql_postorius.key', 'sslrootcert': '%%pg_client_ca_file'},
}
}
ALLOWED_HOSTS = ['%%{revprox_client_external_domainnames[0]}']
diff --git a/seed/nextcloud/templates/nextcloud-config.php b/seed/nextcloud/templates/nextcloud-config.php
index 7d6902b5..97cdc6c6 100644
--- a/seed/nextcloud/templates/nextcloud-config.php
+++ b/seed/nextcloud/templates/nextcloud-config.php
@@ -40,9 +40,9 @@ $CONFIG = array (
'dbdriveroptions' =>
array (
'sslmode' => 'verify-full',
- 'sslcert' => '/etc/pki/tls/certs/postgresql.crt',
- 'sslkey' => '/etc/pki/tls/private/postgresql.key',
- 'sslrootcert' => '/etc/pki/ca-trust/source/anchors/ca_PostgreSQL.crt',
+ 'sslcert' => '%%pg_client_crt_file',
+ 'sslkey' => '%%pg_client_key_file',
+ 'sslrootcert' => '%%pg_client_ca_file',
),
'passwordsalt' => '{{SALT}}',
'secret' => '{{SECRET}}',
diff --git a/seed/odoo/templates/odoo.service b/seed/odoo/templates/odoo.service
index 1c0f22f5..9ec8a1a2 100644
--- a/seed/odoo/templates/odoo.service
+++ b/seed/odoo/templates/odoo.service
@@ -2,9 +2,9 @@
After=risotto.target
[Service]
-Environment="PGSSLROOTCERT=/etc/pki/tls/certs/postgresql.crt"
-Environment="PGSSLCERT=/etc/pki/tls/certs/postgresql.crt"
-Environment="PGSSLKEY=/etc/pki/tls/private/postgresql.key"
+Environment="PGSSLROOTCERT=%%pg_client_crt_file"
+Environment="PGSSLCERT=%%pg_client_crt_file"
+Environment="PGSSLKEY=%%pg_client_key_file"
Environment="PGPASSFILE=/etc/odoo/postgresql.pass"
#if database not imported, imported it active addons
diff --git a/seed/odoo/templates/sysuser-odoo.conf b/seed/odoo/templates/sysuser-odoo.conf
index f22b1606..0c437c1b 100644
--- a/seed/odoo/templates/sysuser-odoo.conf
+++ b/seed/odoo/templates/sysuser-odoo.conf
@@ -1,2 +1,3 @@
g odoo 1000 -
u odoo 998:1000 "ODOO" /srv/odoo /bin/bash
+m odoo ssl-cert
diff --git a/seed/odoo/templates/tmpfile-odoo.conf b/seed/odoo/templates/tmpfile-odoo.conf
index 0fd203cc..f3d6d23c 100644
--- a/seed/odoo/templates/tmpfile-odoo.conf
+++ b/seed/odoo/templates/tmpfile-odoo.conf
@@ -1 +1,2 @@
d /srv/odoo 750 odoo odoo - -
+d /etc/ssl/private 750 root ssl-cert - -
diff --git a/seed/peertube/templates/production.yaml b/seed/peertube/templates/production.yaml
index 96f7361b..b7a056bd 100644
--- a/seed/peertube/templates/production.yaml
+++ b/seed/peertube/templates/production.yaml
@@ -72,7 +72,7 @@ smtp:
password: '%%smtp_relay_password'
tls: false # If you use StartTLS: false
disable_starttls: false
- ca_file: '/etc/pki/ca-trust/source/anchors/ca_MailRelay.crt' # Used for self signed certificates
+ ca_file: '%%smtp_ca_file' # Used for self signed certificates
from_address: '%%peertube_admin_email'
email:
diff --git a/seed/pleroma/templates/production.yaml b/seed/pleroma/templates/production.yaml
index d9b1e315..32fdf84b 100644
--- a/seed/pleroma/templates/production.yaml
+++ b/seed/pleroma/templates/production.yaml
@@ -68,7 +68,7 @@ smtp:
password: '%%smtp_relay_password'
tls: false # If you use StartTLS: false
disable_starttls: false
- ca_file: '/etc/pki/ca-trust/source/anchors/ca_MailRelay.crt' # Used for self signed certificates
+ ca_file: '%%smtp_ca_file' # Used for self signed certificates
from_address: '%%peertube_admin_email'
email:
diff --git a/seed/postgresql-client/dictionaries/23_postgresql.xml b/seed/postgresql-client/dictionaries/23_postgresql.xml
index 58dfcb60..9bdf204b 100644
--- a/seed/postgresql-client/dictionaries/23_postgresql.xml
+++ b/seed/postgresql-client/dictionaries/23_postgresql.xml
@@ -3,9 +3,9 @@
/secrets/postgresql.pass
- /etc/pki/ca-trust/source/anchors/ca_PostgreSQL.crt
- /etc/pki/tls/certs/postgresql.crt
- /etc/pki/tls/private/postgresql.key
+ pg_client_ca_file
+ pg_client_crt_file
+ pg_client_key_file
/sysusers.d/0postgresqlclient.conf
@@ -18,6 +18,9 @@
apache
+
+
+
@@ -42,6 +45,24 @@
pg_client_username
pg_client_database
+
+ tls_ca_directory
+ ca_PostgreSQL.crt
+ /
+ pg_client_ca_file
+
+
+ tls_cert_directory
+ postgresql.crt
+ /
+ pg_client_crt_file
+
+
+ tls_key_directory
+ postgresql.key
+ /
+ pg_client_key_file
+
Debian
postgresql_debian
diff --git a/seed/relay-mail-client/dictionaries/20_smtp_client.xml b/seed/relay-mail-client/dictionaries/20_smtp_client.xml
index f04bfc3f..5fb01e09 100644
--- a/seed/relay-mail-client/dictionaries/20_smtp_client.xml
+++ b/seed/relay-mail-client/dictionaries/20_smtp_client.xml
@@ -2,7 +2,7 @@
- /etc/pki/ca-trust/source/anchors/ca_MailRelay.crt
+ smtp_ca_file
@@ -10,6 +10,7 @@
+
@@ -25,5 +26,11 @@
hide_secret
smtp_relay_password
+
+ tls_ca_directory
+ ca_MailRelay.crt
+ /
+ smtp_ca_file
+
diff --git a/seed/roundcube/templates/config.inc.php b/seed/roundcube/templates/config.inc.php
index 9fc53716..46a9f021 100644
--- a/seed/roundcube/templates/config.inc.php
+++ b/seed/roundcube/templates/config.inc.php
@@ -31,7 +31,7 @@ $config = [];
// e.g. 'mysql://roundcube:@localhost/roundcubemail?verify_server_cert=false'
// GNUNUX $config['db_dsnw'] = 'mysql://roundcube:@localhost/roundcubemail';
//>GNUNUX
-$config['db_dsnw'] = 'pgsql://%%pg_client_username:%%pg_client_password@%%pg_client_server_domainname/%%pg_client_database?sslmode=verify-full&sslcert=/etc/pki/tls/certs/postgresql.crt&sslkey=/etc/pki/tls/private/postgresql.key&sslrootcert=/etc/pki/ca-trust/source/anchors/ca_PostgreSQL.crt';
+$config['db_dsnw'] = 'pgsql://%%pg_client_username:%%pg_client_password@%%pg_client_server_domainname/%%pg_client_database?sslmode=verify-full&sslcert=%%pg_client_crt_file&sslkey=%%pg_client_key_file&sslrootcert=%%pg_client_ca_file';
//GNUNUX
-DATABASE_URL=postgresql://%%pg_client_username:%%pg_client_password@%%pg_client_server_domainname/%%pg_client_database?sslmode=verify-full&sslcert=/etc/pki/tls/certs/postgresql.crt&sslkey=/etc/pki/tls/private/postgresql.key&sslrootcert=/etc/pki/ca-trust/source/anchors/ca_PostgreSQL.crt
+DATABASE_URL=postgresql://%%pg_client_username:%%pg_client_password@%%pg_client_server_domainname/%%pg_client_database?sslmode=verify-full&sslcert=%%pg_client_crt_file&sslkey=%%pg_client_key_file&sslrootcert=%%pg_client_ca_file
#