acme_server: add docs of challenges and allow/deny policy

This commit is contained in:
Mohammed Al Sahaf 2024-04-23 17:26:32 +03:00 committed by GitHub
parent a823fbf393
commit 1dfddb9d70
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -18,9 +18,19 @@ Using ACME server defaults, ACME clients should simply be configured to use `htt
```caddy-d
acme_server [<matcher>] {
ca <id>
lifetime <duration>
resolvers <resolvers...>
ca <id>
lifetime <duration>
resolvers <resolvers...>
challenges <challenges...>
allow_wildcard_names
allow {
domains <domains...>
ip_ranges <addresses...>
}
deny {
domains <domains...>
ip_ranges <addresses...>
}
}
```
@ -30,6 +40,15 @@ acme_server [<matcher>] {
- **resolvers** are the addresses of DNS resolvers to use when looking up the TXT records for solving ACME DNS challenges. Accepts [network addresses](/docs/conventions#network-addresses) defaulting to UDP and port 53 unless specified. If the host is an IP address, it will be dialed directly to resolve the upstream server. If the hot is not an IP address, the addresses are resolved using the [name resolution convention](https://golang.org/pkg/net/#hdr-Name_Resolution) of the Go standard library. If multiple resolvers are specified, then one is chosen at random.
- **challenges** sets the enabled challenge types. If not set or the directive is used without values, then all challenge types are enabled. Accepted values are: http-01, tls-alpn-01, dns-01.
- **allow_wildcard_names** enables issuing of certificates with wildcard SAN (Subject Alternative Name)
- **allow**, **deny** configure the operational policy of the `acme_server`. The policy evaluation follows the criteria described by Step-CA [here](https://smallstep.com/docs/step-ca/policies/#policy-evaluation).
- **domains** sets the subject domain names to be allowed or denied per the policy evaluation criteria.
- **ip_ranges** sets the subject IP ranges to be allowed or denied per the policy evaluation criteria.
## Examples