2006-08-24 01:20:00 +04:00
|
|
|
#!/usr/bin/env perl
|
2001-04-25 01:09:53 +04:00
|
|
|
#
|
|
|
|
# $Id$
|
|
|
|
# This is the HTTPS server designed for the curl test suite.
|
|
|
|
#
|
|
|
|
# It is actually just a layer that runs stunnel properly.
|
|
|
|
|
|
|
|
use strict;
|
|
|
|
|
2003-10-29 19:27:43 +03:00
|
|
|
my $stunnel = "stunnel";
|
2001-04-25 01:09:53 +04:00
|
|
|
|
|
|
|
#
|
|
|
|
# -p pemfile
|
|
|
|
# -P pid dir
|
|
|
|
# -d listen port
|
|
|
|
# -r target port
|
2003-10-29 19:27:43 +03:00
|
|
|
# -s stunnel path
|
2001-04-25 01:09:53 +04:00
|
|
|
|
|
|
|
my $verbose=0; # set to 1 for debugging
|
|
|
|
|
2002-10-23 18:07:34 +04:00
|
|
|
my $port = 8433; # just our default, weird enough
|
|
|
|
my $target_port = 8999; # test http-server port
|
2003-01-21 13:14:25 +03:00
|
|
|
|
|
|
|
my $path = `pwd`;
|
|
|
|
chomp $path;
|
|
|
|
|
|
|
|
my $srcdir=$path;
|
|
|
|
|
2001-04-25 01:09:53 +04:00
|
|
|
do {
|
|
|
|
if($ARGV[0] eq "-v") {
|
|
|
|
$verbose=1;
|
|
|
|
}
|
|
|
|
if($ARGV[0] eq "-w") {
|
|
|
|
return 0; # return success, means we have stunnel working!
|
|
|
|
}
|
|
|
|
elsif($ARGV[0] eq "-r") {
|
2002-10-23 18:07:34 +04:00
|
|
|
$target_port=$ARGV[1];
|
2001-04-25 01:09:53 +04:00
|
|
|
shift @ARGV;
|
|
|
|
}
|
2003-10-29 19:27:43 +03:00
|
|
|
elsif($ARGV[0] eq "-s") {
|
|
|
|
$stunnel=$ARGV[1];
|
|
|
|
shift @ARGV;
|
|
|
|
}
|
2003-01-21 13:14:25 +03:00
|
|
|
elsif($ARGV[0] eq "-d") {
|
|
|
|
$srcdir=$ARGV[1];
|
|
|
|
shift @ARGV;
|
|
|
|
}
|
2001-04-25 01:09:53 +04:00
|
|
|
elsif($ARGV[0] =~ /^(\d+)$/) {
|
|
|
|
$port = $1;
|
|
|
|
}
|
|
|
|
} while(shift @ARGV);
|
|
|
|
|
2002-10-23 18:07:34 +04:00
|
|
|
my $conffile="$path/stunnel.conf"; # stunnel configuration data
|
2003-01-21 13:14:25 +03:00
|
|
|
my $certfile="$srcdir/stunnel.pem"; # stunnel server certificate
|
2002-10-23 18:07:34 +04:00
|
|
|
my $pidfile="$path/.https.pid"; # stunnel process pid file
|
|
|
|
|
|
|
|
open(CONF, ">$conffile") || return 1;
|
|
|
|
print CONF "
|
|
|
|
CApath=$path
|
|
|
|
cert = $certfile
|
|
|
|
pid = $pidfile
|
|
|
|
debug = 0
|
|
|
|
output = /dev/null
|
|
|
|
foreground = yes
|
|
|
|
|
|
|
|
[curltest]
|
|
|
|
accept = $port
|
|
|
|
connect = $target_port
|
|
|
|
";
|
|
|
|
close CONF;
|
2003-01-21 18:09:20 +03:00
|
|
|
#system("chmod go-rwx $conffile $certfile"); # secure permissions
|
2002-10-23 18:07:34 +04:00
|
|
|
|
|
|
|
# works only with stunnel versions < 4.00
|
|
|
|
my $cmd="$stunnel -p $certfile -P $pidfile -d $port -r $target_port 2>/dev/null";
|
|
|
|
|
|
|
|
# use some heuristics to determine stunnel version
|
|
|
|
my $version_ge_4=system("$stunnel -V 2>&1|grep '^stunnel.* on '>/dev/null 2>&1");
|
|
|
|
# works only with stunnel versions >= 4.00
|
|
|
|
if ($version_ge_4) { $cmd="$stunnel $conffile"; }
|
2001-04-25 01:09:53 +04:00
|
|
|
|
|
|
|
if($verbose) {
|
2002-10-23 18:07:34 +04:00
|
|
|
print "HTTPS server: $cmd\n";
|
2001-04-25 01:09:53 +04:00
|
|
|
}
|
2002-10-23 18:07:34 +04:00
|
|
|
|
2006-04-10 17:10:25 +04:00
|
|
|
my $rc = system($cmd);
|
|
|
|
|
|
|
|
$rc >>= 8;
|
|
|
|
if($rc) {
|
|
|
|
print STDERR "stunnel exited with $rc!\n";
|
|
|
|
}
|
2002-10-23 18:07:34 +04:00
|
|
|
|
|
|
|
unlink $conffile;
|
2006-04-10 17:10:25 +04:00
|
|
|
|
|
|
|
exit $rc;
|