mirror of
https://github.com/vbatts/srvdav.git
synced 2024-11-22 00:25:40 +00:00
87 lines
2.5 KiB
Markdown
87 lines
2.5 KiB
Markdown
# srvdav
|
|
|
|
dangerously simple webdav server for a local filesystem
|
|
|
|
# Building
|
|
|
|
```bash
|
|
go get git.thisco.de/vbatts/srvdav
|
|
```
|
|
|
|
# Basic use
|
|
|
|
This daemon can serve up [WebDAV](https://en.wikipedia.org/wiki/WebDAV) for a local directory without any auth, nor encryption.
|
|
*DO NOT DO THIS*
|
|
|
|
|
|
# More proper use
|
|
|
|
Produce an x.509 certificate and accompanying key.
|
|
For development use case use can use the generator in golang's stdlib.
|
|
|
|
```bash
|
|
> go run $(go env GOROOT)/src/crypto/tls/generate_cert.go -h
|
|
> go run $(go env GOROOT)/src/crypto/tls/generate_cert.go -host="localhost,example.com"
|
|
2016/09/22 09:46:19 written cert.pem
|
|
2016/09/22 09:46:19 written key.pem
|
|
```
|
|
|
|
Produce a password list for users.
|
|
The `htpasswd(1)` utility creates the password file nicely.
|
|
|
|
```bash
|
|
> htpasswd -bc srvdav.passwd vbatts topsecretpassword
|
|
```
|
|
|
|
Then launch `srvdav` with these credentials.
|
|
|
|
```bash
|
|
> mkdir -p ./test/
|
|
> srvdav -htpasswd ./srvdav.passwd -cert ./cert.pem -key ./key.pem
|
|
Serving HTTPS:// :9999
|
|
[...]
|
|
```
|
|
|
|
# Accompanying Clients
|
|
|
|
There are a number of [webdav clients](http://www.webdav.org/projects/).
|
|
|
|
## ChromeOS
|
|
|
|
For my specific use case, I am working with ChromeOS and there is a [WebDAV Storage Provider](https://chrome.google.com/webstore/detail/webdav-file-system/hmckflbfniicjijmdoffagjkpnjgbieh?hl=en).
|
|
|
|
## Linux
|
|
|
|
For Linux hosts, there is a package commonly `davfs2`, that provides a `mount.davfs` command.
|
|
See `mount.davfs(8)` man page for more information.
|
|
|
|
Basic example:
|
|
```bash
|
|
[vbatts@valse] {master} ~$ sudo mount.davfs https://bananaboat.usersys:9999/ ./x
|
|
Please enter the username to authenticate with server
|
|
https://bananaboat.usersys:9999/ or hit enter for none.
|
|
Username: vbatts
|
|
Please enter the password to authenticate user vbatts with server
|
|
https://bananaboat.usersys:9999/ or hit enter for none.
|
|
Password:
|
|
mount.davfs: the server certificate is not trusted
|
|
issuer: Acme Co
|
|
subject: Acme Co
|
|
identity: localhost
|
|
fingerprint: ce:19:a6:e7:0a:85:c2:01:fb:71:a6:bf:dd:56:3a:47:30:a8:7a:37
|
|
You only should accept this certificate, if you can
|
|
verify the fingerprint! The server might be faked
|
|
or there might be a man-in-the-middle-attack.
|
|
Accept certificate for this session? [y,N] y
|
|
[vbatts@valse] {master} ~$ ls x/file
|
|
x/file
|
|
[vbatts@valse] {master} ~$ cat !$
|
|
cat x/file
|
|
[vbatts@valse] {master} ~$ echo Howdy > !$
|
|
echo Howdy > x/file
|
|
[vbatts@valse] {master} ~$ cat x/file
|
|
Howdy
|
|
[vbatts@valse] {master} ~$ sudo umount ./x
|
|
/sbin/umount.davfs: waiting while mount.davfs (pid 8931) synchronizes the cache .. OK
|
|
```
|
|
|