gmid/README.md

148 lines
3.9 KiB
Markdown
Raw Permalink Normal View History

2021-01-11 13:51:25 +01:00
# gmid
2020-10-02 19:39:00 +02:00
gmid is a full-featured Gemini server written with security in mind.
It can serve static files, has optional FastCGI and proxying support,
and a rich configuration syntax.
2020-10-02 19:39:00 +02:00
A few helper programs are shipped as part of gmid:
- `gg` is a simple command-line Gemini client.
- `gemexp` is a stripped-down config-less version of gmid to quickly
serve a directory from the command line.
- `titan` is a command-line titan client.
2023-06-24 15:19:26 +02:00
2020-10-03 17:49:09 +02:00
## Internationalisation (IRIs, UNICODE, punycode, all that stuff)
Even thought the current Gemini specification doesn't mention anything
2021-01-30 12:49:48 +01:00
in this regard, I do think these are important things and so I tried
to implement them in the most user-friendly way I could think of.
2021-01-30 12:49:48 +01:00
For starters, gmid has full support for IRI (RFC3987 —
2021-01-29 18:07:26 +01:00
Internationalized Resource Identifiers). IRIs are a superset of URIs,
so there aren't incompatibilities with URI-only clients.
2021-01-30 12:49:48 +01:00
There is full support also for punycode. In theory, the user doesn't
even need to know that punycode is a thing. The hostname in the
2021-01-30 12:49:48 +01:00
configuration file can (and must be) in the decoded form (e.g. `naïve`
and not `xn--nave-6pa`), gmid will do the rest.
2021-01-30 12:49:48 +01:00
The only missing piece is UNICODE normalisation of the IRI path: gmid
doesn't do that (yet).
## Configuration
[httpd]: https://man.openbsd.org/httpd.8
gmid has a rich configuration file, heavily inspired by OpenBSD'
[httpd(8)][httpd], with every detail carefully documented in the
manpage. Here's a minimal example of a config file:
2021-04-29 21:46:51 +02:00
```conf
server "example.com" {
listen on * port 1965
2021-04-29 21:46:51 +02:00
cert "/path/to/cert.pem"
key "/path/to/key.pem"
root "/var/gemini/example.com"
}
```
2021-07-06 13:41:24 +02:00
and a slightly more complex one
```conf
2021-07-06 13:41:24 +02:00
cert_root = "/path/to/keys"
server "example.com" {
listen on * port 1965
2021-04-29 21:46:51 +02:00
alias "foobar.com"
2021-07-06 13:41:24 +02:00
cert $cert_root "/example.com.crt"
key $cert_root "/example.com.pem"
2021-04-29 21:46:51 +02:00
root "/var/gemini/example.com"
# lang for text/gemini files
2021-07-06 13:41:24 +02:00
lang "en"
2021-04-29 21:46:51 +02:00
# only for locations that matches /files/*
location "/files/*" {
# generate directory listings
auto index on
}
location "/repo/*" {
# change the index file name
index "README.gmi"
2021-07-06 13:41:24 +02:00
lang "it"
2021-04-29 21:46:51 +02:00
}
}
```
2021-01-11 13:51:25 +01:00
## Building
2020-10-02 19:39:00 +02:00
gmid depends on libevent2, LibreSSL or OpenSSL, and yacc or GNU bison.
2020-10-02 19:39:00 +02:00
The build is as simple as
2020-10-02 19:39:00 +02:00
$ ./configure
$ make
2021-03-29 12:13:17 +02:00
If the configure scripts fails to pick up something, please open an
2021-01-21 14:16:14 +01:00
issue or notify me via email.
To install execute:
# make install
2021-04-25 14:01:34 +02:00
Please keep in mind that the master branch, from time to time, may be
accidentally broken on some platforms. gmid is developed primarily on
OpenBSD/amd64 and commits on the master branch don't get always tested
in other OSes. Before tagging a release however, a comprehensive
2021-04-27 09:14:00 +02:00
testing on various platform is done to ensure that everything is
working as intended.
2021-04-25 14:01:34 +02:00
2021-01-22 18:28:39 +01:00
### Testing
Execute
2021-01-22 18:28:39 +01:00
$ make regress
2021-01-22 18:28:39 +01:00
to start the suite. Keep in mind that the regression tests needs to
create a few file inside the `regress` directory and bind the 10965
port.
2021-01-22 18:28:39 +01:00
2022-03-29 14:25:18 +02:00
## Contributing
Any form of contribution is welcome, not only patches or bug reports.
If you have a sample configuration for some specific use-case, a
script or anything that could be useful to others, consider adding it
to the `contrib` directory.
## Architecture/Security considerations
The internal architecture was revisited for the 2.0 release. For
2024-01-11 11:40:42 +01:00
earlier releases, please refer to previous revision of this file.
gmid has a privsep design, where the operations done by the daemon are
splitted into multiple processes:
- main: the main process is the only one that keeps the original
privileges. It opens the TLS certificates on the behalf of the
`server` and `crypto` processes, reloads the configuration upon
`SIGHUP` and re-opens the log files upon `SIGUSR1`.
2023-08-23 22:34:06 +02:00
- logger: handles the logging with syslog and/or local files.
2021-01-17 10:33:45 +01:00
- server: listens for connections and serves the request. It also
speaks FastCGI and do the proxying.
2021-01-17 10:42:10 +01:00
2023-08-23 22:34:06 +02:00
- crypto: holds the TLS private keys to avoid a compromised `server`
process to disclose them.