-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Configure PostgreSQL ssl by default #162
Conversation
This is only used when clientcert = 1 in pg_hba.conf We never set clientcert so we don't need this. ref: https://www.postgresql.org/docs/9.5/static/ssl-tcp.html
…ript This will allow us to generate new postgres certs with the following command: NEW_CERT_FILE=/var/www/miq/vmdb/certs/postgres.crt \ NEW_KEY_FILE=/var/www/miq/vmdb/certs/postgres.key \ generate_miq_server_cert.sh
There is no reason we can't use the default location
Should be merged with ManageIQ/manageiq-appliance_console#22 |
Checked commits carbonin/manageiq-appliance@2ee33b1~...afd8e04 with ruby 2.3.3, rubocop 0.47.1, haml-lint 0.20.0, and yamllint 1.10.0 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍 LGTM
Configure PostgreSQL ssl by default (cherry picked from commit c64f84a)
Gaprindashvili backport details:
|
This PR adds the ability to use
generate_miq_server_cert.sh
for generating certs in arbitrary locations by providing theNEW_CERT_FILE
andNEW_KEY_FILE
environment variables.It also removes the conditional logic around using ssl in the postgres configuration files.
We will now generate certs in the default location when initializing the database so we will always set
ssl
toon
, can remove the erb from pg_hba.conf and no-longer need to specify alternate cert locations.