blob: 95ba103172ee25e503861bdd8aefefa25c691cc5 [file] [log] [blame]
#!/usr/bin/env perl
#
# $Id$
# This is the HTTPS and FTPS server designed for the curl test suite.
#
# It is actually just a layer that runs stunnel properly.
use strict;
use Cwd;
my $stunnel = "stunnel";
#
# -p pemfile
# -P pid dir
# -d listen port
# -r target port
# -s stunnel path
my $verbose=0; # set to 1 for debugging
my $port = 8991; # just our default, weird enough
my $target_port = 8999; # default test http-server port
my $path = getcwd();
my $srcdir=$path;
my $proto='https';
do {
if($ARGV[0] eq "-v") {
$verbose=1;
}
if($ARGV[0] eq "-w") {
return 0; # return success, means we have stunnel working!
}
elsif($ARGV[0] eq "-p") {
$proto=$ARGV[1];
shift @ARGV;
}
elsif($ARGV[0] eq "-r") {
$target_port=$ARGV[1];
shift @ARGV;
}
elsif($ARGV[0] eq "-s") {
$stunnel=$ARGV[1];
shift @ARGV;
}
elsif($ARGV[0] eq "-d") {
$srcdir=$ARGV[1];
shift @ARGV;
}
elsif($ARGV[0] =~ /^(\d+)$/) {
$port = $1;
}
} while(shift @ARGV);
my $conffile="$path/stunnel.conf"; # stunnel configuration data
my $certfile="$srcdir/stunnel.pem"; # stunnel server certificate
my $pidfile="$path/.$proto.pid"; # stunnel process pid file
open(CONF, ">$conffile") || exit 1;
print CONF "
CApath=$path
cert = $certfile
pid = $pidfile
debug = 0
output = /dev/null
foreground = yes
[curltest]
accept = $port
connect = $target_port
";
close CONF;
#system("chmod go-rwx $conffile $certfile"); # secure permissions
# works only with stunnel versions < 4.00
my $cmd="$stunnel -p $certfile -P $pidfile -d $port -r $target_port 2>/dev/null";
# use some heuristics to determine stunnel version
my $version_ge_4=system("$stunnel -V 2>&1|grep '^stunnel.* on '>/dev/null 2>&1");
# works only with stunnel versions >= 4.00
if ($version_ge_4) { $cmd="$stunnel $conffile"; }
if($verbose) {
print uc($proto)." server: $cmd\n";
}
my $rc = system($cmd);
$rc >>= 8;
if($rc) {
print STDERR "stunnel exited with $rc!\n";
}
unlink $conffile;
exit $rc;