rio/README.md
Alexander "PapaTutuWawa b8eba55999
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
ci/woodpecker/pr/woodpecker Pipeline was successful
ci/woodpecker/pull_request_closed/woodpecker Pipeline was successful
docs: Update README
2024-01-11 20:58:47 +01:00

4.0 KiB

rio

A webserver similat to Github Pages using the Gitea API. Supports running in HTTP-only mode and running in HTTPS mode with automatic certificates using ACME HTTP01 challenges.

Setup

DNS

Assuming your pages domain is pages.example.org, you should add a wildcard DNS record (if your provider supports it) to allow clients to resolve any *.pages.example.org record:

; Example for an authoritative Bind nameserver
*.pages		3600	IN	A       <IPv4>
*.pages		3600	IN	AAAA	<IPv6>

If you have setup a CAA record to lock ACME certificates to a certain CA, make sure you allow certificates using the HTTP01 challenge type from the ACME CA configured in rio.

rio

To run rio, you can use environment variables or commandline flags. To see them, run rio --help or look at the main file.

If you run with --acme-disable (or ACME_DISABLE=1), then rio will not set up an HTTPS server and run with HTTP only on the configured host and port. In this configuration, only --gitea-url (GITEA_URL) and --pages-domain (PAEGS_DOMAIN) are required.

If you run without --acme-disable (default), then rio will set up a HTTPS server to listen on the configured host and port. Additionally, a DNS01 challenge solver will be created using the provider specified by --acme-dns-provider (ACME_DNS_PROVIDER). For a provider list and each provider's options, see the lego documentation. In this mode, --acme-email (ACME_EMAIL; The email to use to register an ACME account), --acme-file (ACME_FILE; Path to the file where ACME account data is stored), --certs-file (CERTS_FILE; Path to the file where certificates are stored in) are additionally required. --acme-server (ACME_SERVER) should also be set to your ACME CA's directory URL as this option defaults to the Let's Encrypt Staging Environment. Note that using this optional implies that you accept your configured ACME CA's Terms of Service. rio will also spawn an unencrypted HTTP server that is bound to the host specified with --http-host (HTTP_HOST) and the port specified with --http-port (HTTP_PORT). The functionality of this second HTTP server is to upgrade plain HTTP requests to HTTPS requests.

You can also run with --debug (DEBUG_ENABLE=1) to enable debug logging.

Usage

Plain Domains

When a user tries to access <user>.pages.example.org/some-repo/files.html, rio will first see if the repository some-repo exists for the user <user> on the configured Gitea server. If it does, then rio will try to proxy the file files.html from the repository <user>/some-repo. If that repository does not exist, then rio will try the repository <user>/<user>.pages.example.org next and look for the file some-repo/files.html.

Note that the files MUST reside in the repository's pages branch. Otherwise, rio will not find the files.

CNAME Domains

If you don't want to use <user>.pages.example.org and instead prefer to use your own domain (cooldomain.rio), you can add a CNAME record on your domain, redirecting to the pages domain:

; Example for Bind
cooldomain.rio.                 3600    IN  CNAME   <user>.pages.example.org
; For Let's Encrypt
_acme-challenge.cooldomain.rio. 3600    IN  CNAME   cooldomain.rio.pages.example.org

This additionally requires your repository to have a file named CNAME that contains the domain to use (cooldomain.rio in this case).

Repository Redirects

If you have multiple repositories with pages (and you use a CNAME), you can additionally add a TXT record to tell rio what repository to look for. For example, the following TXT record will tell rio to use the repository example-repository whenever example-repository.rio is accessed:

; Example for Bind
_rio-pages.example-repository.rio.  3600    IN  TXT "repo=example-repository"

For this to work, it is important that the record's value starts with repo=.

License

See LICENSE.