Blame SOURCES/stunnel-4-sample.patch

4e5299
diff -urNp stunnel-4.56-patched/tools/stunnel.conf-sample.in stunnel-4.56-current/tools/stunnel.conf-sample.in
4e5299
--- stunnel-4.56-patched/tools/stunnel.conf-sample.in	2013-03-28 14:38:34.992698440 -0400
4e5299
+++ stunnel-4.56-current/tools/stunnel.conf-sample.in	2013-03-28 14:40:31.423595815 -0400
4e5299
@@ -9,7 +9,7 @@
4e5299
 
4e5299
 ; A copy of some devices and system files is needed within the chroot jail
4e5299
 ; Chroot conflicts with configuration file reload and many other features
4e5299
-chroot = @prefix@/var/lib/stunnel/
4e5299
+chroot = @localstatedir@/run/stunnel/
4e5299
 ; Chroot jail can be escaped if setuid option is not used
4e5299
 setuid = nobody
4e5299
 setgid = @DEFAULT_GROUP@
4e5299
@@ -26,8 +26,8 @@ pid = /stunnel.pid
4e5299
 ; **************************************************************************
4e5299
 
4e5299
 ; Certificate/key is needed in server mode and optional in client mode
4e5299
-cert = @prefix@/etc/stunnel/mail.pem
4e5299
-;key = @prefix@/etc/stunnel/mail.pem
4e5299
+cert = @sysconfdir@/stunnel/mail.pem
4e5299
+;key = @sysconfdir@/stunnel/mail.pem
4e5299
 
4e5299
 ; Authentication stuff needs to be configured to prevent MITM attacks
4e5299
 ; It is not enabled by default!
4e5299
@@ -36,12 +36,13 @@ cert = @prefix@/etc/stunnel/mail.pem
4e5299
 ; CApath is located inside chroot jail
4e5299
 ;CApath = /certs
4e5299
 ; It's often easier to use CAfile
4e5299
-;CAfile = @prefix@/etc/stunnel/certs.pem
4e5299
+;CAfile = @sysconfdir@/stunnel/certs.pem
4e5299
+;CAfile = @sysconfdir@/pki/tls/certs/ca-bundle.crt
4e5299
 ; Don't forget to c_rehash CRLpath
4e5299
 ; CRLpath is located inside chroot jail
4e5299
 ;CRLpath = /crls
4e5299
 ; Alternatively CRLfile can be used
4e5299
-;CRLfile = @prefix@/etc/stunnel/crls.pem
4e5299
+;CRLfile = @sysconfdir@/stunnel/crls.pem
4e5299
 
4e5299
 ; Disable support for insecure SSLv2 protocol
4e5299
 options = NO_SSLv2