Depending on the database configuration, it is also possible to verify whether the system user matches the
database username. Consult the MySQL or PostgreSQL manual for details.
-Kea supports client SSL/TLS settings for MySQL database and it must be
-configured explicitly for all used connections (configuration,
-reservations, leases, forensic logging).
+Kea supports client SSL/TLS settings for MySQL and PostgreSQL database
+and it must be configured explicitly for all used connections (configuration,
+reservations, leases, forensic logging). See the Database Connectivity
+section (:ref:`database-connectivity`) for details.
Information Leakage Through Logging
-----------------------------------
--- /dev/null
+# PostgreSQL requires restricted permissions on the key files.
+current_source_dir = meson.current_source_dir()
+configure_file(
+ command: ['chmod', 'og-rwx', f'@current_source_dir@/kea-client.key'],
+ input: 'kea-client.key',
+ output: 'kea-client.key',
+)
+configure_file(
+ command: ['chmod', 'og-rwx', f'@current_source_dir@/kea-other.key'],
+ input: 'kea-other.key',
+ output: 'kea-other.key',
+)
)
endif
-# PostgreSQL requires restricted permissions on the key files.
-configure_file(
- command: ['chmod', 'og-rwx', f'@TEST_CA_DIR@/kea-client.key'],
- output: f'kea-client.key',
-)
-configure_file(
- command: ['chmod', 'og-rwx', f'@TEST_CA_DIR@/kea-other.key'],
- output: f'kea-other.key',
-)
+subdir('ca')