Skip to content

Commit

Permalink
Fix sasl_external
Browse files Browse the repository at this point in the history
This will probably be possible to revert once c2s does'n require
`fast_tls` and so all components really have the same configs here.
  • Loading branch information
NelsonVides committed Jan 7, 2025
1 parent b3aa6d2 commit 69764e3
Show file tree
Hide file tree
Showing 8 changed files with 33 additions and 4 deletions.
5 changes: 4 additions & 1 deletion big_tests/tests/sasl_external_SUITE.erl
Original file line number Diff line number Diff line change
Expand Up @@ -158,7 +158,10 @@ modify_config_and_restart(CyrsaslExternalConfig, Config) ->
" tls.certfile = \"priv/ssl/fake_server.pem\"\n"
" tls.cacertfile = \"" ++ CACertFile ++ "\""
++ SSLOpts},
{https_config, "tls.certfile = \"priv/ssl/fake_cert.pem\"\n"
{s2s_tls_config, "tls.certfile = \"priv/ssl/fake_server.pem\"\n"
" tls.cacertfile = \"" ++ CACertFile ++ "\""
++ SSLOpts},
{https_config, "tls.certfile = \"priv/ssl/fake_cert.pem\"\n"
" tls.keyfile = \"priv/ssl/fake_key.pem\"\n"
" tls.password = \"\"\n"
" tls.cacertfile = \"" ++ CACertFile ++ "\""
Expand Down
5 changes: 5 additions & 0 deletions rel/fed1.vars-toml.config
Original file line number Diff line number Diff line change
Expand Up @@ -48,6 +48,11 @@
tls.mode = \"starttls\"
tls.ciphers = \"ECDHE-RSA-AES256-GCM-SHA384\""}.

{s2s_tls_config, "tls.verify_mode = \"none\"
tls.certfile = \"priv/ssl/fake_server.pem\"
tls.mode = \"starttls\"
tls.ciphers = \"ECDHE-RSA-AES256-GCM-SHA384\""}.

{instrumentation, "[instrumentation.exometer]

[instrumentation.prometheus]
Expand Down
6 changes: 3 additions & 3 deletions rel/files/mongooseim.toml
Original file line number Diff line number Diff line change
Expand Up @@ -148,9 +148,9 @@
port = {{{incoming_s2s_port}}}
shaper = "s2s_shaper"
max_stanza_size = 131072
{{#tls_config}}
{{{tls_config}}}
{{/tls_config}}
{{#s2s_tls_config}}
{{{s2s_tls_config}}}
{{/s2s_tls_config}}
{{#s2s_dhfile}}
tls.dhfile = {{{s2s_dhfile}}}
{{/s2s_dhfile}}
Expand Down
3 changes: 3 additions & 0 deletions rel/mim1.vars-toml.config
Original file line number Diff line number Diff line change
Expand Up @@ -63,6 +63,9 @@
{tls_config, "tls.verify_mode = \"none\"
tls.certfile = \"priv/ssl/fake_server.pem\""}.

{s2s_tls_config, "tls.verify_mode = \"none\"
tls.certfile = \"priv/ssl/fake_server.pem\""}.

{secondary_c2s,
"[[listen.c2s]]
port = {{ c2s_tls_port }}
Expand Down
5 changes: 5 additions & 0 deletions rel/mim2.vars-toml.config
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,11 @@
tls.mode = \"starttls\"
tls.ciphers = \"ECDHE-RSA-AES256-GCM-SHA384\""}.

{s2s_tls_config, "tls.verify_mode = \"none\"
tls.certfile = \"priv/ssl/fake_server.pem\"
tls.mode = \"starttls\"
tls.ciphers = \"ECDHE-RSA-AES256-GCM-SHA384\""}.

{secondary_c2s,
"[[listen.c2s]]
port = {{ c2s_tls_port }}
Expand Down
5 changes: 5 additions & 0 deletions rel/mim3.vars-toml.config
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,11 @@
tls.mode = \"starttls\"
tls.ciphers = \"ECDHE-RSA-AES256-GCM-SHA384\""}.

{s2s_tls_config, "tls.verify_mode = \"none\"
tls.certfile = \"priv/ssl/fake_server.pem\"
tls.mode = \"starttls\"
tls.ciphers = \"ECDHE-RSA-AES256-GCM-SHA384\""}.

{instrumentation, "[instrumentation.exometer]

[instrumentation.prometheus]
Expand Down
3 changes: 3 additions & 0 deletions rel/prod.vars-toml.config
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,9 @@
{tls_config, "tls.verify_mode = \"none\"
tls.certfile = \"priv/ssl/fake_server.pem\""}.

{s2s_tls_config, "tls.verify_mode = \"none\"
tls.certfile = \"priv/ssl/fake_server.pem\""}.

{instrumentation, "[instrumentation.prometheus]

[instrumentation.log]"}.
Expand Down
5 changes: 5 additions & 0 deletions rel/reg1.vars-toml.config
Original file line number Diff line number Diff line change
Expand Up @@ -45,6 +45,11 @@
tls.mode = \"starttls\"
tls.ciphers = \"ECDHE-RSA-AES256-GCM-SHA384\""}.

{s2s_tls_config, "tls.verify_mode = \"none\"
tls.certfile = \"priv/ssl/fake_server.pem\"
tls.mode = \"starttls\"
tls.ciphers = \"ECDHE-RSA-AES256-GCM-SHA384\""}.

{instrumentation, "[instrumentation.exometer]

[instrumentation.prometheus]
Expand Down

0 comments on commit 69764e3

Please sign in to comment.