#SSL_SECURITY=2
#------------------------------------------------
#Defining SERVER mode Certificate data
-CA_ROOT_SRV="/etc/pki/tls/make-ca/ca-bundle.crt"
+#If certificate set via do_dns_tlsa.sh (letsencrypt)
+#CA_CERT_SRV="/etc/certbot/mailleur/mailleur-fullchain.pem"
+#CA_KEY_SRV="/etc/certbot/mailleur/mailleur-key.pem"
+#I certificate are self signedA (default installation)
CA_CERT_SRV="/etc/pki/mailleur/mailleur-cert.pem"
CA_KEY_SRV="/etc/pki/mailleur/mailleur-key.pem"
+CA_ROOT_SRV="/etc/pki/tls/make-ca/ca-bundle.crt"
CA_VERIFY_SRV=0 #to check PEER/client remote certificate
#------------------------------------------------
#Defining CLIENT mode Certificate data
-CA_ROOT_CLT="/etc/pki/tls/make-ca/ca-bundle.crt"
+#If certificate set via do_dns_tlsa.sh (letsencrypt)
+#CA_CERT_CLT="/etc/certbot/mailleur/mailleur-fullchain.pem"
+#CA_KEY_CLT="/etc/certbot/mailleur/mailleur-key.pem"
+#I certificate are self signedA (default installation)
CA_CERT_CLT="/etc/pki/mailleur/mailleur-cert.pem"
CA_KEY_CLT="/etc/pki/mailleur/mailleur-key.pem"
+CA_ROOT_CLT="/etc/pki/tls/make-ca/ca-bundle.crt"
CA_VERIFY_CLT=0 #to check PEER/server remote certificate
#------------------------------------------------
#Configured for Postgresql database
#public/private key
#-------------------------------------------------------------------
#comment in if working in production
-DRY_RUN="--dry-run"
+DRYRUN="--dry-run"
STAGING="--staging"
MRKR=`date +"%F"`
APPNAME=mailleur
-subj '/' \
-reqexts SAN \
-out ./request.csr \
- -keyout ./privkey.pem \
+ -keyout ./$APPNAME-key.pem \
-key ./ec_key.pem
}
--cert-path ./$MRKR-cert.pem \
--work-dir . \
--logs-dir ./logs \
- $STAGING
+ $STAGING \
+ $DRYRUN \
ln -nsf \
./$MRKR-fullchain.pem \