mirror of
https://github.com/moparisthebest/curl
synced 2024-11-10 03:25:04 -05:00
1bfa7dfe39
supports only ftps:// URLs with --ftp-ssl-control specified, which implicitly encrypts the control channel but not the data channels. That allows stunnel to be used with an unmodified ftp server in exactly the same way that the test https server is set up. Added test case 400 as a basic FTPS test.
101 lines
2.0 KiB
Perl
101 lines
2.0 KiB
Perl
#!/usr/bin/env perl
|
|
#
|
|
# $Id$
|
|
# This is the HTTPS and FTPS server designed for the curl test suite.
|
|
#
|
|
# It is actually just a layer that runs stunnel properly.
|
|
|
|
use strict;
|
|
|
|
my $stunnel = "stunnel";
|
|
|
|
#
|
|
# -p pemfile
|
|
# -P pid dir
|
|
# -d listen port
|
|
# -r target port
|
|
# -s stunnel path
|
|
|
|
my $verbose=0; # set to 1 for debugging
|
|
|
|
my $port = 8991; # just our default, weird enough
|
|
my $target_port = 8999; # default test http-server port
|
|
|
|
my $path = `pwd`;
|
|
chomp $path;
|
|
|
|
my $srcdir=$path;
|
|
|
|
my $proto='https';
|
|
|
|
do {
|
|
if($ARGV[0] eq "-v") {
|
|
$verbose=1;
|
|
}
|
|
if($ARGV[0] eq "-w") {
|
|
return 0; # return success, means we have stunnel working!
|
|
}
|
|
elsif($ARGV[0] eq "-p") {
|
|
$proto=$ARGV[1];
|
|
shift @ARGV;
|
|
}
|
|
elsif($ARGV[0] eq "-r") {
|
|
$target_port=$ARGV[1];
|
|
shift @ARGV;
|
|
}
|
|
elsif($ARGV[0] eq "-s") {
|
|
$stunnel=$ARGV[1];
|
|
shift @ARGV;
|
|
}
|
|
elsif($ARGV[0] eq "-d") {
|
|
$srcdir=$ARGV[1];
|
|
shift @ARGV;
|
|
}
|
|
elsif($ARGV[0] =~ /^(\d+)$/) {
|
|
$port = $1;
|
|
}
|
|
} while(shift @ARGV);
|
|
|
|
my $conffile="$path/stunnel.conf"; # stunnel configuration data
|
|
my $certfile="$srcdir/stunnel.pem"; # stunnel server certificate
|
|
my $pidfile="$path/.$proto.pid"; # stunnel process pid file
|
|
|
|
open(CONF, ">$conffile") || return 1;
|
|
print CONF "
|
|
CApath=$path
|
|
cert = $certfile
|
|
pid = $pidfile
|
|
debug = 0
|
|
output = /dev/null
|
|
foreground = yes
|
|
|
|
[curltest]
|
|
accept = $port
|
|
connect = $target_port
|
|
";
|
|
close CONF;
|
|
#system("chmod go-rwx $conffile $certfile"); # secure permissions
|
|
|
|
# works only with stunnel versions < 4.00
|
|
my $cmd="$stunnel -p $certfile -P $pidfile -d $port -r $target_port 2>/dev/null";
|
|
|
|
# use some heuristics to determine stunnel version
|
|
my $version_ge_4=system("$stunnel -V 2>&1|grep '^stunnel.* on '>/dev/null 2>&1");
|
|
# works only with stunnel versions >= 4.00
|
|
if ($version_ge_4) { $cmd="$stunnel $conffile"; }
|
|
|
|
if($verbose) {
|
|
print uc($proto)." server: $cmd\n";
|
|
}
|
|
|
|
my $rc = system($cmd);
|
|
|
|
$rc >>= 8;
|
|
if($rc) {
|
|
print STDERR "stunnel exited with $rc!\n";
|
|
}
|
|
|
|
unlink $conffile;
|
|
|
|
exit $rc;
|