Fix certificate for lego
All checks were successful
continuous-integration/drone/push Build is passing

This commit is contained in:
Adrien Reslinger 2021-01-04 01:30:44 +01:00
parent 8e87df7a5e
commit c09e206bdb
Signed by: adrien
GPG key ID: DA7B27055C66D6DE

View file

@ -11,8 +11,8 @@ ssl = required
# dropping root privileges, so keep the key file unreadable by anyone but # dropping root privileges, so keep the key file unreadable by anyone but
# root. Included doc/mkcert.sh can be used to easily generate self-signed # root. Included doc/mkcert.sh can be used to easily generate self-signed
# certificate, just make sure to update the domains in dovecot-openssl.cnf # certificate, just make sure to update the domains in dovecot-openssl.cnf
ssl_cert = </etc/letsencrypt/live/{{ postfix_myhostname }}/cert.pem ssl_cert = </etc/lego/certificates/{{ postfix_myhostname }}.crt
ssl_key = </etc/letsencrypt/live/{{ postfix_myhostname }}/privkey.pem ssl_key = </etc/lego/certificates/{{ postfix_myhostname }}.key
# If key file is password protected, give the password here. Alternatively # If key file is password protected, give the password here. Alternatively
# give it when starting dovecot with -p parameter. Since this file is often # give it when starting dovecot with -p parameter. Since this file is often
@ -23,7 +23,7 @@ ssl_key = </etc/letsencrypt/live/{{ postfix_myhostname }}/privkey.pem
# PEM encoded trusted certificate authority. Set this only if you intend to use # PEM encoded trusted certificate authority. Set this only if you intend to use
# ssl_verify_client_cert=yes. The file should contain the CA certificate(s) # ssl_verify_client_cert=yes. The file should contain the CA certificate(s)
# followed by the matching CRL(s). (e.g. ssl_ca = </etc/pki/dovecot/certs/ca.pem) # followed by the matching CRL(s). (e.g. ssl_ca = </etc/pki/dovecot/certs/ca.pem)
ssl_ca = /etc/letsencrypt/live/{{ postfix_myhostname }}/chain.pem ssl_ca = /etc/lego/certificates/{{ postfix_myhostname }}.issuer.crt
# Require that CRL check succeeds for peer certificates. # Require that CRL check succeeds for peer certificates.
#ssl_require_crl = yes #ssl_require_crl = yes