# Each non-default section refer to separate certificate issuance # requests. Settings in the default section apply to each sections. # Message digest to sign the Certificate Signing Request with, # overriding the req(1ssl) default. # #hash = # Comma-separated list of Key Usages, for instance "digitalSignature, # keyEncipherment", to include in the Certificate Signing Request. # See x509v3_config(5ssl) for a list of possible values. Note that the # ACME might override the value provided here. # #keyUsage = # Path to the bundle of trusted issuer certificates. This is used for # validating each certificate after issuance or renewal. Specifying an # empty value skips certificate validation. # #CAfile = @@datadir@@/lacme/ca-certificates.crt # For an existing certificate, the minimum number of days before its # expiration date the section is considered for re-issuance. # #min-days = 21 #[www] # Path the service's private key. This setting is required. # #certificate-key = /etc/nginx/ssl/srv.key # Where to store the issued certificate (in PEM format). # #certificate = /etc/nginx/ssl/srv.crt # Where to store the issued certificate along with its chain of trust # (in PEM format). # #certificate-chain = /etc/nginx/ssl/srv.chain.crt # Subject field of the Certificate Signing Request. This setting is # required. # #subject = /CN=example.org # Comma-separated list of Subject Alternative Names. # #subjectAltName = DNS:example.org,DNS:www.example.org # username[:groupname] to chown the issued certificate and # certificate-chain with. # #owner = root:root # Octal mode to chmod the issued certificate and certificate-chain with. # #mode = 0644 # Command to pass the the system's command shell ("/bin/sh -c") after # successful installation of the certificate and/or certificate-chain. # #notify = /bin/systemctl reload nginx #[smtp] #certificate-key = /etc/postfix/ssl/srv.key #certificate-chain = /etc/postfix/ssl/srv.crt #subject = /CN=smtp.example.org #notify = /bin/systemctl reload postfix ; vim:ft=dosini