From e2826c1c67bab707f0b824000e9e95df9439e641 Mon Sep 17 00:00:00 2001
From: Kapil Agrawal <7047165+netops2devops@users.noreply.github.com>
Date: Thu, 16 Apr 2026 19:31:05 -0500
Subject: [PATCH] github pages with Hugo static site docs
---
docs/content/_index.md | 6 ++++--
docs/public/index.html | 27 ++++++++++++++++-----------
docs/public/sitemap.xml | 2 +-
3 files changed, 21 insertions(+), 14 deletions(-)
diff --git a/docs/content/_index.md b/docs/content/_index.md
index abc5076..f253f08 100644
--- a/docs/content/_index.md
+++ b/docs/content/_index.md
@@ -6,7 +6,9 @@ title = 'ACME Proxy'
`acme-proxy` is a standalone ACME server built on [step-ca](https://github.com/smallstep/certificates) that operates in [registration authority (RA)](https://smallstep.com/docs/registration-authorities/) mode. It runs as a standalone server inside your enterprise environment, acting as an intermediary between your internal infrastructure and an external certificate authority service (such as Sectigo). It accepts certificate orders and validates certificate requests using the ACME protocol (RFC 8555), but does **NOT** sign certificates or store private keys.
-**Certificate Request Flow:**
+{{< image src="/assets/highlevel-flow.png" alt="sequence" >}}
+
+# Certificate Request Flow
1. Your internal server (behind a firewall perimeter) requests a certificate from `acme-proxy` using standard ACME clients like certbot, acme.sh or cert-manager.io if you're using Kubernetes.
2. `acme-proxy` presents cryptographic challenges to verify domain ownership
@@ -14,4 +16,4 @@ title = 'ACME Proxy'
4. The external CA signs the certificate
5. `acme-proxy` retrieves the certificate bundle and returns it to your server
-{{< image src="../assets/highlevel-flow.png" alt="sequence" >}}
+{{< image src="/assets/sequence.png" alt="sequence" >}}
diff --git a/docs/public/index.html b/docs/public/index.html
index c424685..4377b22 100644
--- a/docs/public/index.html
+++ b/docs/public/index.html
@@ -10,23 +10,22 @@
+Certificate Request Flow# Your internal server (behind a firewall perimeter) requests a certificate from acme-proxy using standard ACME clients like certbot, acme.sh or cert-manager.io if you’re using Kubernetes. acme-proxy presents cryptographic challenges to verify domain ownership Once validation succeeds, acme-proxy forwards the certificate signing request to your external CA using External Account Binding (EAB) The external CA signs the certificate acme-proxy retrieves the certificate bundle and returns it to your server ">
+Certificate Request Flow# Your internal server (behind a firewall perimeter) requests a certificate from acme-proxy using standard ACME clients like certbot, acme.sh or cert-manager.io if you’re using Kubernetes. acme-proxy presents cryptographic challenges to verify domain ownership Once validation succeeds, acme-proxy forwards the certificate signing request to your external CA using External Account Binding (EAB) The external CA signs the certificate acme-proxy retrieves the certificate bundle and returns it to your server">
-
+Certificate Request Flow# Your internal server (behind a firewall perimeter) requests a certificate from acme-proxy using standard ACME clients like certbot, acme.sh or cert-manager.io if you’re using Kubernetes. acme-proxy presents cryptographic challenges to verify domain ownership Once validation succeeds, acme-proxy forwards the certificate signing request to your external CA using External Account Binding (EAB) The external CA signs the certificate acme-proxy retrieves the certificate bundle and returns it to your server">
+
acme-proxy is a standalone ACME server built on step-ca that operates in registration authority (RA) mode. It runs as a standalone server inside your enterprise environment, acting as an intermediary between your internal infrastructure and an external certificate authority service (such as Sectigo). It accepts certificate orders and validates certificate requests using the ACME protocol (RFC 8555), but does NOT sign certificates or store private keys.
Your internal server (behind a firewall perimeter) requests a certificate from acme-proxy using standard ACME clients like certbot, acme.sh or cert-manager.io if you’re using Kubernetes.
acme-proxy presents cryptographic challenges to verify domain ownership
@@ -250,9 +254,9 @@
ACME Proxy
The external CA signs the certificate
acme-proxy retrieves the certificate bundle and returns it to your server