commit 4d151bc63e634e1f64cfdba361d763d8a47573e2
Author: Nicolas Chauvet <kwizart(a)gmail.com>
Date: Thu Nov 3 17:42:49 2016 +0100
Switch to letsencrypt
roles/koji_hub/templates/koji-ssl.conf | 6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
---
diff --git a/roles/koji_hub/templates/koji-ssl.conf
b/roles/koji_hub/templates/koji-ssl.conf
index 47a08d6..6a0278d 100644
--- a/roles/koji_hub/templates/koji-ssl.conf
+++ b/roles/koji_hub/templates/koji-ssl.conf
@@ -98,7 +98,7 @@ SSLCipherSuite {{ ssl_ciphers }}
# pass phrase. Note that a kill -HUP will prompt again. A new
# certificate can be generated using the genkey(1) command.
#SSLCertificateFile /etc/pki/tls/certs/localhost.crt
-SSLCertificateFile /etc/pki/tls/certs/koji_cert.pem
+SSLCertificateFile /etc/pki/tls/certs/koji.rpmfusion.org.cert
# Server Private Key:
# If the key is not combined with the certificate, use this
@@ -106,7 +106,7 @@ SSLCertificateFile /etc/pki/tls/certs/koji_cert.pem
# you've both a RSA and a DSA private key you can configure
# both in parallel (to also allow the use of DSA ciphers, etc.)
#SSLCertificateKeyFile /etc/pki/tls/private/localhost.key
-SSLCertificateKeyFile /etc/pki/tls/private/koji_key.pem
+SSLCertificateKeyFile /etc/pki/tls/private/koji.rpmfusion.org.key
# Server Certificate Chain:
# Point SSLCertificateChainFile at a file containing the
@@ -116,7 +116,7 @@ SSLCertificateKeyFile /etc/pki/tls/private/koji_key.pem
# when the CA certificates are directly appended to the server
# certificate for convinience.
#SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
-SSLCertificateChainFile /etc/pki/tls/certs/extras_cacert.pem
+SSLCertificateChainFile /etc/pki/tls/certs/koji.rpmfusion.org-intermediate.cert
# Certificate Authority (CA):
# Set the CA certificate verification path where to find CA
Show replies by date