Skip to content

Commit 3928efb

Browse files
committed
Support ACME challenges for unknown virtual hosts
Currently any ACME challenge for unknown virtual host returns 503. This is inconvenient because if the user does not use wildcard certificates, then the user must match the configuration of certificate renewal script to what virtual hosts are enabled at the time. This must be done automatically, because due to short certificate lifetime the renewal script runs automatically. Additionally, enabling a previously disabled virtual host forces certificate renewal. Under certain circumstances this may lead to rate limiting from Let's Encrypt, because only 5 certificates for exact same set of domains can be issued per week. Accordingly, it's worthwhile supporting unknown virtual hosts for the purposes of passing ACME challenges.
1 parent 3c59be7 commit 3928efb

File tree

5 files changed

+23
-6
lines changed

5 files changed

+23
-6
lines changed

docs/README.md

+2
Original file line numberDiff line numberDiff line change
@@ -431,6 +431,8 @@ By default nginx-proxy generates location blocks to handle ACME HTTP Challenge.
431431
- `false`: do not handle ACME HTTP Challenge at all.
432432
- `legacy`: legacy behavior for compatibility with older (<= `2.3`) versions of acme-companion, only handle ACME HTTP challenge when there is a certificate for the domain and `HTTPS_METHOD=redirect`.
433433

434+
By default nginx-proxy generates a location block to handle ACME HTTP Challenge for unknown virtual hosts as well. This can be disabled by setting global `ACME_HTTP_CHALLENGE_LOCATION` environment variable to `false`.
435+
434436
### Diffie-Hellman Groups
435437

436438
[RFC7919 groups](https://datatracker.ietf.org/doc/html/rfc7919#appendix-A) with key lengths of 2048, 3072, and 4096 bits are [provided by `nginx-proxy`](https://github.com/nginx-proxy/nginx-proxy/dhparam). The ENV `DHPARAM_BITS` can be set to `2048` or `3072` to change from the default 4096-bit key. The DH key file will be located in the container at `/etc/nginx/dhparam/dhparam.pem`. Mounting a different `dhparam.pem` file at that location will override the RFC7919 key.

nginx.tmpl

+16
Original file line numberDiff line numberDiff line change
@@ -858,6 +858,22 @@ server {
858858
ssl_reject_handshake on;
859859
{{- end }}
860860

861+
{{- $acme_http_challenge := $globals.config.acme_http_challenge }}
862+
{{- $acme_http_challenge_legacy := eq $acme_http_challenge "legacy" }}
863+
{{- $acme_http_challenge_enabled := false }}
864+
{{- if (not $acme_http_challenge_legacy) }}
865+
{{- $acme_http_challenge_enabled = parseBool $acme_http_challenge }}
866+
{{- end }}
867+
{{- if (or $acme_http_challenge_legacy $acme_http_challenge_enabled) }}
868+
location ^~ /.well-known/acme-challenge/ {
869+
auth_basic off;
870+
allow all;
871+
root /usr/share/nginx/html;
872+
try_files $uri =404;
873+
break;
874+
}
875+
{{- end }}
876+
861877
{{- if (exists "/usr/share/nginx/html/errors/50x.html") }}
862878
error_page 500 502 503 504 /50x.html;
863879
location /50x.html {

test/test_acme-http-challenge-location/test_acme-http-challenge-location-enabled-is-default.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -31,4 +31,4 @@ def test_unknown_domain_acme_challenge_location_default_enabled(docker_compose,
3131
f"http://web-unknown.nginx-proxy.tld/{acme_challenge_path}",
3232
allow_redirects=False
3333
)
34-
assert r.status_code == 503
34+
assert r.status_code == 200

test/test_acme-http-challenge-location/test_acme-http-challenge-location-legacy.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@ def test_unknown_domain_acme_challenge_location_legacy(docker_compose, nginxprox
1717
f"http://web-unknown.nginx-proxy.tld/{acme_challenge_path}",
1818
allow_redirects=False
1919
)
20-
assert r.status_code == 503
20+
assert r.status_code == 200

test/test_ssl/test_nohttp.py

+3-4
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,10 @@ def test_web2_http_is_connection_refused(docker_compose, nginxproxy):
33
assert r.status_code == 503
44

55

6-
def test_web2_http_is_connection_refused_for_acme_challenge(
7-
docker_compose, nginxproxy, acme_challenge_path
8-
):
6+
def test_web2_acme_challenge_does_work(docker_compose, nginxproxy, acme_challenge_path):
7+
# By default, ACME challenges are handled in all cases
98
r = nginxproxy.get(f"http://web2.nginx-proxy.tld/{acme_challenge_path}", allow_redirects=False)
10-
assert r.status_code == 503
9+
assert r.status_code == 200
1110

1211

1312
def test_web2_https_is_forwarded(docker_compose, nginxproxy):

0 commit comments

Comments
 (0)