summaryrefslogtreecommitdiff
path: root/provider_base/services/mx.json
blob: 73bbea831536cd23513ae6a37c6b8424ccc5cde5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
{
  "mx": {
    "contact": "= global.provider.contacts.default"
  },
  "stunnel": {
    "couch_client": "= stunnel_client(nodes_like_me[:services => :couchdb], global.services[:couchdb].couch.port)"
  },
  "haproxy": {
    "local_ports": "= stunnel.couch_client.field(:accept_port)"
  },
  "x509": {
    "use": true,
    "ca_cert": "= file :ca_cert, :missing => 'provider CA. Run `leap cert ca`'",
    "client_ca_cert": "= file_path :client_ca_cert",
    "client_ca_key": "= file_path :client_ca_key",
    "commercial_cert": "= file [:commercial_cert, domain.full_suffix]",
    "commercial_key": "= file [:commercial_key, domain.full_suffix]",
    "commercial_ca_cert": "= try_file :commercial_ca_cert"
  },
  "service_type": "user_service"
}
  },
  "x509": {
    "use": true,
    "ca_cert": "= file :ca_cert, :missing => 'provider CA. Run `leap cert ca`'",
    "client_ca_cert": "= file_path :client_ca_cert",
    "client_ca_key": "= file_path :client_ca_key",
    "commercial_cert": "= file [:commercial_cert, domain.full_suffix]",
    "commercial_key": "= file [:commercial_key, domain.full_suffix]",
    "commercial_ca_cert": "= try_file :commercial_ca_cert"
  }
}