blob: 6777682ced5ef839a259cb18160bb7b8fad56790 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
|
#!/usr/bin/perl
#
# $Id$
# This is the FTPS server designed for the curl test suite.
#
# It is actually just a layer that runs stunnel properly.
use strict;
use stunnel;
my $stunnel = &checkstunnel;
if(!$stunnel) {
exit;
}
#
# -p pemfile
# -P pid dir
# -d listen port
# -r target port
my $verbose=0; # set to 1 for debugging
my $port = 8821; # just our default, weird enough
my $remote_port = 8921; # test ftp-server port
do {
if($ARGV[0] eq "-v") {
$verbose=1;
}
elsif($ARGV[0] eq "-r") {
$remote_port=$ARGV[1];
shift @ARGV;
}
elsif($ARGV[0] =~ /^(\d+)$/) {
$port = $1;
}
} while(shift @ARGV);
my $path = `pwd`;
chomp $path;
my $conffile="$path/stunnel.conf"; # stunnel configuration data
my $certfile="$path/stunnel.pem"; # stunnel server certificate
my $pidfile="$path/.ftps.pid"; # stunnel process pid file
open(CONF, ">$conffile") || return 1;
print CONF "
CApath=$path
cert = $certfile
pid = $pidfile
debug = 0
output = /dev/null
foreground = yes
[curltest]
accept = $port
connect = $remote_port
";
close CONF;
system("chmod go-rwx $conffile $path/stunnel.pem"); # secure permissions
# works only with stunnel versions < 4.00
my $cmd="$stunnel -p $certfile -P $pidfile -d $port -r $remote_port 2>/dev/null";
# use some heuristics to determine stunnel version
my $version_ge_4=system("$stunnel -V 2>&1|grep '^stunnel.* on '>/dev/null 2>&1");
# works only with stunnel versions >= 4.00
if ($version_ge_4) { $cmd="$stunnel $conffile"; }
if($verbose) {
print "FTPS server: $cmd\n";
}
system($cmd);
unlink $conffile;
|