summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorLaurent Bercot <ska-skaware@skarnet.org>2023-09-20 09:29:16 +0000
committerLaurent Bercot <ska@appnovation.com>2023-09-20 09:29:16 +0000
commit6be5496f8a5660875c5f45f915210f69496d231b (patch)
treec1b609b1c40b03494c1f999b2fdd7fe7907d422a /doc
parent4724a590413fc351d72211fd99df6c41decd0fa8 (diff)
downloadtipidee-6be5496f8a5660875c5f45f915210f69496d231b.tar.xz
More doc
Signed-off-by: Laurent Bercot <ska@appnovation.com>
Diffstat (limited to 'doc')
-rw-r--r--doc/tipideed.html41
1 files changed, 35 insertions, 6 deletions
diff --git a/doc/tipideed.html b/doc/tipideed.html
index b6b39f6..b11a63c 100644
--- a/doc/tipideed.html
+++ b/doc/tipideed.html
@@ -84,19 +84,19 @@ of the tipidee package provides service templates to help you run tipideed under
<h2> Exit codes </h2>
<dl>
- <dt> 0 </dt> <dd> clean exit. The client closed the connection after a stream of
+ <dt> 0 </dt> <dd> Clean exit. The client closed the connection after a stream of
HTTP exchanges. </dd>
<dt> 1 </dt> <dd> Illicit client behaviour. tipideed exited because it could
not serve the client in good faith. </dd>
<dt> 2 </dt> <dd> Illicit CGI script behaviour. tipideed exited because the invoked
CGI script made it impossible to continue. Before exiting, tipideed likely has
sent a 502 (Bad Gateway) response to the client. </dd>
- <dt> 100 </dt> <dd> bad usage. tipideed has been run in an incorrect way: bad command
+ <dt> 100 </dt> <dd> Bad usage. tipideed has been run in an incorrect way: bad command
line options, or missing environment variables, etc. </dd>
- <dt> 101 </dt> <dd> cannot happen. This signals a bug in tipideed, and comes with an
+ <dt> 101 </dt> <dd> Cannot happen. This signals a bug in tipideed, and comes with an
error message asking you to report the bug. Please do so, on the
<a href="//skarnet.org/lists/#skaware">skaware mailing-list</a>. </dd>
- <dt> 111 </dt> <dd> system call failed. If this happens while serving a request,
+ <dt> 111 </dt> <dd> System call failed. If this happens while serving a request,
tipideed likely has sent a 500 (Internal Server Error) response to the
client before exiting. </dd>
</dl>
@@ -182,11 +182,40 @@ not rely on.
<dl>
<dt> -v <em>verbosity</em> </dt>
<dd> The level of log verbosity. This is the same as the <tt>global verbosity</tt>
-setting in the <a href="tipidee.conf.html">configuration file</a>; an explicit
+setting in the <a href="tipidee.conf.html#verbosity">configuration file</a>; an explicit
command line option overrides any setting present in the configuration file.</dd>
<dt> -f <em>file</em> </dt>
- <dd> </dd>
+ <dd> Use <em>file</em> as the compiled configuration database, typically obtained
+by running <tt><a href="tipidee-config.html">tipidee-config</a> -o <em>file</em></tt>.
+The default is <tt>/etc/tipidee.conf.cdb</tt>. </dd>
+
+ <dt> -d <em>docroot</em> </dt>
+ <dd> Change the working directory to <em>docroot</em> before serving. Default
+is serving from the current working directory. Note that documents need to
+be located in <strong>subdirectories</strong> of <em>docroot</em>, one subdirectory
+per virtual domain tipideed is serving. </dd>
+
+ <dt> -R </dt>
+ <dd> chroot. If the underlying operating system has the
+<a href="https://man7.org/linux/man-pages/man2/chroot.2.html">chroot()</a>
+system call, use it before serving. This always happens <em>after</em> opening
+the configuration database, <em>after</em> changing the working directory,
+and <em>before</em> dropping privileges. The idea is that chrooting helps
+with security, but the configuration database should be located outside of the
+document space. </dd>
+
+ <dt> -U </dt>
+ <dd> Drop root privileges. If this option is given, tipideed expects two
+additional environment variables, UID and GID, containing the uid and gid
+it should run as; it will drop its privileges to $UID:$GID before serving.
+This option is mainly useful when paired with <tt>-R</tt>, because chrooting
+can only be performed as root, so root privileges need to be kept all the
+way to tipideed then dropped after tipideed has chrooted. In a non-chrooted
+setup, it is simpler and more secure to run the <em>super-server</em> with
+the <tt>-U</tt> option instead: root privileges will be dropped as soon as
+the super-server has bound to its socket, and all the subsequent operations,
+including the spawning of tipideed processes, are performed as a normal user. </dd>
</dl>
<h2> Detailed operation </h2>