@@ -120,7 +120,7 @@ The current workaround is to move the project directory onto a different partiti
120
120
121
121
The default database for testing etc is H2. PostgreSQL is used for the sandboxes (user accounts, metadata, transaction cache).
122
122
123
- ### Minimal notes on using Postgres with SSL (work in progress) :
123
+ ### Notes on using Postgres with SSL:
124
124
125
125
Postgres needs to be compiled with SSL support.
126
126
@@ -131,7 +131,9 @@ For the steps, see: https://www.howtoforge.com/postgresql-ssl-certificates
131
131
In short, edit postgresql.conf
132
132
133
133
ssl = on
134
+
134
135
ssl_cert_file = '/etc/YOUR-DIR/server.crt'
136
+
135
137
ssl_key_file = '/etc/YOUR-DIR/server.key'
136
138
137
139
And restart postgres.
@@ -140,7 +142,9 @@ Now, this should enable SSL (on the same port that Postgres normally listens on)
140
142
To force SSL, edit pg_hba.conf replacing the host entries with hostssl
141
143
142
144
Now in OBP-API Props, edit your db.url and add &ssl=true
145
+
143
146
e.g.
147
+
144
148
db.url=jdbc:postgresql://localhost:5432/my_obp_database?user=my_obp_user&password=the_password&ssl=true
145
149
146
150
Note: Your Java environment may need to be setup correctly to use SSL
@@ -152,7 +156,9 @@ Note you can change the log level in /src/main/resources/default.logback.xml (tr
152
156
There is a gist / tool which is useful for this. Search the web for SSLPoke. Note this is an external repository.
153
157
154
158
e.g. https://gist.github.com/4ndrej/4547029
159
+
155
160
or
161
+
156
162
git clone https://github.com/MichalHecko/SSLPoke.git .
157
163
158
164
gradle jar
@@ -174,7 +180,7 @@ keytool -import -storepass changeit -noprompt -alias localhost_postgres_cert -ke
174
180
To get certificate from the server / get further debug information:
175
181
openssl s_client -connect ip: port
176
182
177
- - The above section is work in progress. -
183
+ The above section is work in progress.
178
184
179
185
180
186
0 commit comments