2002-02-25 15:08:51 +01:00
|
|
|
#!/usr/bin/env perl
|
2004-01-13 09:57:01 +01:00
|
|
|
#***************************************************************************
|
|
|
|
# _ _ ____ _
|
|
|
|
# Project ___| | | | _ \| |
|
|
|
|
# / __| | | | |_) | |
|
|
|
|
# | (__| |_| | _ <| |___
|
2004-01-13 08:37:29 +01:00
|
|
|
# \___|\___/|_| \_\_____|
|
|
|
|
#
|
2008-01-03 21:48:22 +01:00
|
|
|
# Copyright (C) 1998 - 2008, Daniel Stenberg, <daniel@haxx.se>, et al.
|
2004-01-13 08:37:29 +01:00
|
|
|
#
|
2004-01-13 09:57:01 +01:00
|
|
|
# This software is licensed as described in the file COPYING, which
|
|
|
|
# you should have received as part of this distribution. The terms
|
|
|
|
# are also available at http://curl.haxx.se/docs/copyright.html.
|
2000-11-13 17:06:16 +01:00
|
|
|
#
|
2004-01-13 08:37:29 +01:00
|
|
|
# You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
# copies of the Software, and permit persons to whom the Software is
|
2004-01-13 09:57:01 +01:00
|
|
|
# furnished to do so, under the terms of the COPYING file.
|
2000-11-13 17:06:16 +01:00
|
|
|
#
|
2004-01-13 08:37:29 +01:00
|
|
|
# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
# KIND, either express or implied.
|
|
|
|
#
|
|
|
|
# $Id$
|
2004-01-13 09:57:01 +01:00
|
|
|
###########################################################################
|
2007-09-17 23:42:01 +02:00
|
|
|
|
|
|
|
# Experimental hooks are available to run tests remotely on machines that
|
|
|
|
# are able to run curl but are unable to run the test harness.
|
|
|
|
# The following sections need to be modified:
|
2007-09-20 22:39:17 +02:00
|
|
|
#
|
2007-09-17 23:42:01 +02:00
|
|
|
# $HOSTIP, $HOST6IP - Set to the address of the host running the test suite
|
|
|
|
# $CLIENTIP, $CLIENT6IP - Set to the address of the host running curl
|
2007-09-20 22:39:17 +02:00
|
|
|
# runclient, runclientoutput - Modify to copy all the files in the log/
|
|
|
|
# directory to the system running curl, run the given command remotely
|
|
|
|
# and save the return code or returned stdout (respectively), then
|
|
|
|
# copy all the files from the remote system's log/ directory back to
|
|
|
|
# the host running the test suite. This can be done a few ways, such
|
|
|
|
# as using scp & ssh, rsync & telnet, or using a NFS shared directory
|
|
|
|
# and ssh.
|
|
|
|
#
|
|
|
|
# 'make && make test' needs to be done on both machines before making the
|
|
|
|
# above changes and running runtests.pl manually. In the shared NFS case,
|
|
|
|
# the contents of the tests/server/ directory must be from the host
|
|
|
|
# running the test suite, while the rest must be from the host running curl.
|
|
|
|
#
|
|
|
|
# Note that even with these changes a number of tests will still fail (mainly
|
|
|
|
# to do with cookies, those that set environment variables, or those that
|
|
|
|
# do more than touch the file system in a <precheck> or <postcheck>
|
|
|
|
# section). These can be added to the $TESTCASES line below,
|
2008-07-27 04:34:27 +02:00
|
|
|
# e.g. $TESTCASES="!8 !31 !63 !cookies..."
|
2007-09-20 22:39:17 +02:00
|
|
|
#
|
|
|
|
# Finally, to properly support -g and -n, checktestcmd needs to change
|
|
|
|
# to check the remote system's PATH, and the places in the code where
|
|
|
|
# the curl binary is read directly to determine its type also need to be
|
|
|
|
# fixed. As long as the -g option is never given, and the -n is always
|
|
|
|
# given, this won't be a problem.
|
2007-09-17 23:42:01 +02:00
|
|
|
|
|
|
|
|
2000-11-13 17:06:16 +01:00
|
|
|
# These should be the only variables that might be needed to get edited:
|
|
|
|
|
2008-01-04 04:05:33 +01:00
|
|
|
BEGIN {
|
|
|
|
@INC=(@INC, $ENV{'srcdir'}, ".");
|
|
|
|
}
|
|
|
|
|
2002-05-22 00:39:09 +02:00
|
|
|
use strict;
|
2005-05-25 14:26:20 +02:00
|
|
|
#use Time::HiRes qw( gettimeofday );
|
2002-05-22 00:20:52 +02:00
|
|
|
#use warnings;
|
2007-12-22 19:25:43 +01:00
|
|
|
use Cwd;
|
2000-11-15 08:09:37 +01:00
|
|
|
|
2008-01-03 21:48:22 +01:00
|
|
|
# Variables and subs imported from sshhelp module
|
|
|
|
use sshhelp qw(
|
2008-01-04 14:00:40 +01:00
|
|
|
$sshdexe
|
2008-01-03 21:48:22 +01:00
|
|
|
$sshexe
|
2008-02-08 14:54:02 +01:00
|
|
|
$sftpexe
|
2008-01-03 21:48:22 +01:00
|
|
|
$sshconfig
|
2008-02-08 14:54:02 +01:00
|
|
|
$sftpconfig
|
2008-01-03 21:48:22 +01:00
|
|
|
$sshlog
|
2008-02-08 14:54:02 +01:00
|
|
|
$sftplog
|
|
|
|
$sftpcmds
|
2008-01-08 01:39:31 +01:00
|
|
|
display_sshdconfig
|
2008-01-04 14:00:40 +01:00
|
|
|
display_sshconfig
|
2008-02-08 14:54:02 +01:00
|
|
|
display_sftpconfig
|
2008-01-08 01:39:31 +01:00
|
|
|
display_sshdlog
|
2008-01-03 21:48:22 +01:00
|
|
|
display_sshlog
|
2008-02-08 14:54:02 +01:00
|
|
|
display_sftplog
|
2008-01-04 14:00:40 +01:00
|
|
|
find_sshd
|
2008-01-03 21:48:22 +01:00
|
|
|
find_ssh
|
2008-02-08 14:54:02 +01:00
|
|
|
find_sftp
|
2008-01-03 21:48:22 +01:00
|
|
|
sshversioninfo
|
|
|
|
);
|
|
|
|
|
2001-05-23 17:02:58 +02:00
|
|
|
require "getpart.pm"; # array functions
|
2005-02-10 09:50:33 +01:00
|
|
|
require "valgrind.pm"; # valgrind report parser
|
2005-04-18 08:57:44 +02:00
|
|
|
require "ftp.pm";
|
2001-04-24 23:09:53 +02:00
|
|
|
|
2007-09-17 23:42:01 +02:00
|
|
|
my $HOSTIP="127.0.0.1"; # address on which the test server listens
|
|
|
|
my $HOST6IP="[::1]"; # address on which the test server listens
|
|
|
|
my $CLIENTIP="127.0.0.1"; # address which curl uses for incoming connections
|
|
|
|
my $CLIENT6IP="[::1]"; # address which curl uses for incoming connections
|
2004-09-08 10:08:38 +02:00
|
|
|
|
|
|
|
my $base = 8990; # base port number
|
|
|
|
|
|
|
|
my $HTTPPORT; # HTTP server port
|
2004-12-11 22:41:00 +01:00
|
|
|
my $HTTP6PORT; # HTTP IPv6 server port
|
2004-09-08 10:08:38 +02:00
|
|
|
my $HTTPSPORT; # HTTPS server port
|
|
|
|
my $FTPPORT; # FTP server port
|
2005-01-17 21:20:34 +01:00
|
|
|
my $FTP2PORT; # FTP server 2 port
|
2004-09-08 10:08:38 +02:00
|
|
|
my $FTPSPORT; # FTPS server port
|
2005-04-18 08:57:44 +02:00
|
|
|
my $FTP6PORT; # FTP IPv6 server port
|
2005-09-15 22:25:02 +02:00
|
|
|
my $TFTPPORT; # TFTP
|
|
|
|
my $TFTP6PORT; # TFTP
|
2007-03-24 02:01:28 +01:00
|
|
|
my $SSHPORT; # SCP/SFTP
|
2007-06-05 15:50:59 +02:00
|
|
|
my $SOCKSPORT; # SOCKS4/5 port
|
2004-09-08 10:08:38 +02:00
|
|
|
|
2007-09-17 23:42:01 +02:00
|
|
|
my $srcdir = $ENV{'srcdir'} || '.';
|
2007-11-23 10:50:44 +01:00
|
|
|
my $CURL="../src/curl"; # what curl executable to run on the tests
|
|
|
|
my $DBGCURL=$CURL; #"../src/.libs/curl"; # alternative for debugging
|
2000-11-15 08:09:37 +01:00
|
|
|
my $LOGDIR="log";
|
2004-02-12 15:40:08 +01:00
|
|
|
my $TESTDIR="$srcdir/data";
|
2007-11-23 10:50:44 +01:00
|
|
|
my $LIBDIR="./libtest";
|
2002-02-25 13:14:24 +01:00
|
|
|
my $SERVERIN="$LOGDIR/server.input"; # what curl sent the server
|
2005-01-20 23:48:43 +01:00
|
|
|
my $SERVER2IN="$LOGDIR/server2.input"; # what curl sent the second server
|
2000-11-21 18:07:16 +01:00
|
|
|
my $CURLLOG="$LOGDIR/curl.log"; # all command lines run
|
2000-11-27 13:53:50 +01:00
|
|
|
my $FTPDCMD="$LOGDIR/ftpserver.cmd"; # copy ftp server instructions here
|
2008-04-24 01:55:34 +02:00
|
|
|
my $SERVERLOGS_LOCK="$LOGDIR/serverlogs.lock"; # server logs advisor read lock
|
2000-11-13 17:06:16 +01:00
|
|
|
|
|
|
|
# Normally, all test cases should be run, but at times it is handy to
|
|
|
|
# simply run a particular one:
|
2000-11-15 08:09:37 +01:00
|
|
|
my $TESTCASES="all";
|
2000-11-13 17:06:16 +01:00
|
|
|
|
|
|
|
# To run specific test cases, set them like:
|
|
|
|
# $TESTCASES="1 2 3 7 8";
|
|
|
|
|
|
|
|
#######################################################################
|
|
|
|
# No variables below this point should need to be modified
|
|
|
|
#
|
|
|
|
|
2001-05-14 14:09:47 +02:00
|
|
|
my $HTTPPIDFILE=".http.pid";
|
2004-12-11 22:41:00 +01:00
|
|
|
my $HTTP6PIDFILE=".http6.pid";
|
2001-04-24 23:09:53 +02:00
|
|
|
my $HTTPSPIDFILE=".https.pid";
|
2001-05-14 14:09:47 +02:00
|
|
|
my $FTPPIDFILE=".ftp.pid";
|
2005-04-18 08:57:44 +02:00
|
|
|
my $FTP6PIDFILE=".ftp6.pid";
|
2005-01-17 21:20:34 +01:00
|
|
|
my $FTP2PIDFILE=".ftp2.pid";
|
2001-05-14 14:09:47 +02:00
|
|
|
my $FTPSPIDFILE=".ftps.pid";
|
2005-09-15 22:25:02 +02:00
|
|
|
my $TFTPPIDFILE=".tftpd.pid";
|
|
|
|
my $TFTP6PIDFILE=".tftp6.pid";
|
2007-03-24 02:01:28 +01:00
|
|
|
my $SSHPIDFILE=".ssh.pid";
|
2007-06-05 15:50:59 +02:00
|
|
|
my $SOCKSPIDFILE=".socks.pid";
|
2000-11-15 08:09:37 +01:00
|
|
|
|
2001-05-28 17:26:15 +02:00
|
|
|
# invoke perl like this:
|
|
|
|
my $perl="perl -I$srcdir";
|
2006-05-11 08:34:30 +02:00
|
|
|
my $server_response_maxtime=13;
|
2001-05-28 17:26:15 +02:00
|
|
|
|
2003-06-26 13:44:01 +02:00
|
|
|
# this gets set if curl is compiled with debugging:
|
|
|
|
my $curl_debug=0;
|
2006-03-03 15:37:44 +01:00
|
|
|
my $libtool;
|
2002-05-22 00:20:52 +02:00
|
|
|
|
2000-11-17 16:07:29 +01:00
|
|
|
# name of the file that the memory debugging creates:
|
2005-01-27 16:51:03 +01:00
|
|
|
my $memdump="$LOGDIR/memdump";
|
2000-11-17 16:07:29 +01:00
|
|
|
|
|
|
|
# the path to the script that analyzes the memory debug output file:
|
2006-09-06 12:03:34 +02:00
|
|
|
my $memanalyze="$perl $srcdir/memanalyze.pl";
|
2000-11-17 16:07:29 +01:00
|
|
|
|
2007-12-22 19:25:43 +01:00
|
|
|
my $pwd = getcwd(); # current working directory
|
2007-09-20 22:39:17 +02:00
|
|
|
|
2005-04-22 13:51:06 +02:00
|
|
|
my $start;
|
2006-04-10 15:03:20 +02:00
|
|
|
my $forkserver=0;
|
2006-05-11 08:34:30 +02:00
|
|
|
my $ftpchecktime; # time it took to verify our test FTP server
|
2004-07-26 17:45:03 +02:00
|
|
|
|
2007-09-20 22:39:17 +02:00
|
|
|
my $stunnel = checkcmd("stunnel4") || checkcmd("stunnel");
|
|
|
|
my $valgrind = checktestcmd("valgrind");
|
|
|
|
my $valgrind_logfile="--logfile";
|
2004-07-26 17:45:03 +02:00
|
|
|
my $valgrind_tool;
|
2007-09-17 23:42:01 +02:00
|
|
|
my $gdb = checktestcmd("gdb");
|
2001-04-24 23:09:53 +02:00
|
|
|
|
2001-05-21 15:38:38 +02:00
|
|
|
my $ssl_version; # set if libcurl is built with SSL support
|
2004-03-01 17:24:54 +01:00
|
|
|
my $large_file; # set if libcurl is built with large file support
|
2004-04-30 10:03:07 +02:00
|
|
|
my $has_idn; # set if libcurl is built with IDN support
|
2004-12-11 22:41:00 +01:00
|
|
|
my $http_ipv6; # set if HTTP server has IPv6 support
|
2005-04-18 08:57:44 +02:00
|
|
|
my $ftp_ipv6; # set if FTP server has IPv6 support
|
2005-09-15 22:25:02 +02:00
|
|
|
my $tftp_ipv6; # set if TFTP server has IPv6 support
|
2004-11-25 23:21:49 +01:00
|
|
|
my $has_ipv6; # set if libcurl is built with IPv6 support
|
2004-11-29 13:23:02 +01:00
|
|
|
my $has_libz; # set if libcurl is built with libz support
|
2004-11-22 23:26:46 +01:00
|
|
|
my $has_getrlimit; # set if system has getrlimit()
|
2005-03-21 09:14:32 +01:00
|
|
|
my $has_ntlm; # set if libcurl is built with NTLM support
|
2007-03-18 23:37:23 +01:00
|
|
|
|
|
|
|
my $has_openssl; # built with a lib using an OpenSSL-like API
|
|
|
|
my $has_gnutls; # built with GnuTLS
|
|
|
|
my $has_nss; # built with NSS
|
|
|
|
my $has_yassl; # built with yassl
|
|
|
|
|
|
|
|
my $ssllib; # name of the lib we use (for human presentation)
|
2007-03-10 00:39:42 +01:00
|
|
|
my $has_crypto; # set if libcurl is built with cryptographic support
|
2005-04-28 23:04:58 +02:00
|
|
|
my $has_textaware; # set if running on a system that has a text mode concept
|
|
|
|
# on files. Windows for example
|
2007-03-09 22:01:39 +01:00
|
|
|
my @protocols; # array of supported protocols
|
2001-05-21 15:38:38 +02:00
|
|
|
|
2003-03-15 17:43:58 +01:00
|
|
|
my $skipped=0; # number of tests skipped; reported in main loop
|
2003-06-26 13:44:01 +02:00
|
|
|
my %skipped; # skipped{reason}=counter, reasons for skip
|
|
|
|
my @teststat; # teststat[testnum]=reason, reasons for skip
|
2007-10-11 23:15:09 +02:00
|
|
|
my %disabled_keywords; # key words of tests to skip
|
2008-07-27 04:34:27 +02:00
|
|
|
my %enabled_keywords; # key words of tests to run
|
2002-05-22 00:20:52 +02:00
|
|
|
|
2008-01-04 14:00:40 +01:00
|
|
|
my $sshdid; # for socks server, ssh daemon version id
|
|
|
|
my $sshdvernum; # for socks server, ssh daemon version number
|
|
|
|
my $sshdverstr; # for socks server, ssh daemon version string
|
|
|
|
my $sshderror; # for socks server, ssh daemon version error
|
2008-01-03 21:48:22 +01:00
|
|
|
|
2008-04-25 06:19:50 +02:00
|
|
|
my $defserverlogslocktimeout = 20; # timeout to await server logs lock removal
|
|
|
|
my $defpostcommanddelay = 0; # delay between command and postcheck sections
|
2008-04-24 01:55:34 +02:00
|
|
|
|
2000-11-15 08:09:37 +01:00
|
|
|
#######################################################################
|
|
|
|
# variables the command line options may set
|
|
|
|
#
|
|
|
|
|
|
|
|
my $short;
|
|
|
|
my $verbose;
|
2001-01-27 19:50:54 +01:00
|
|
|
my $debugprotocol;
|
2000-11-17 16:15:48 +01:00
|
|
|
my $anyway;
|
2001-05-04 09:47:11 +02:00
|
|
|
my $gdbthis; # run test case with gdb debugger
|
|
|
|
my $keepoutfiles; # keep stdout and stderr files after tests
|
2002-01-04 14:20:17 +01:00
|
|
|
my $listonly; # only list the tests
|
2004-04-13 07:57:50 +02:00
|
|
|
my $postmortem; # display detailed info about failed tests
|
2002-01-04 14:20:17 +01:00
|
|
|
|
2007-11-17 00:06:53 +01:00
|
|
|
my %run; # running server
|
|
|
|
my %doesntrun; # servers that don't work, identified by pidfile
|
2003-04-01 10:41:49 +02:00
|
|
|
|
2003-10-24 10:53:59 +02:00
|
|
|
# torture test variables
|
|
|
|
my $torture;
|
|
|
|
my $tortnum;
|
|
|
|
my $tortalloc;
|
|
|
|
|
2005-05-25 14:26:20 +02:00
|
|
|
# open and close each time to allow removal at any time
|
|
|
|
sub logmsg {
|
|
|
|
# uncomment the Time::HiRes usage for this
|
|
|
|
# my ($seconds, $microseconds) = gettimeofday;
|
|
|
|
# my ($sec,$min,$hour,$mday,$mon,$year,$wday,$yday,$isdst) =
|
|
|
|
# localtime($seconds);
|
|
|
|
my $t;
|
|
|
|
if(1) {
|
|
|
|
# $t = sprintf ("%02d:%02d:%02d.%06d ", $hour, $min, $sec,
|
|
|
|
# $microseconds);
|
|
|
|
}
|
|
|
|
for(@_) {
|
|
|
|
print "${t}$_";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-03-24 02:01:28 +01:00
|
|
|
# get the name of the current user
|
|
|
|
my $USER = $ENV{USER}; # Linux
|
|
|
|
if (!$USER) {
|
|
|
|
$USER = $ENV{USERNAME}; # Windows
|
|
|
|
if (!$USER) {
|
|
|
|
$USER = $ENV{LOGNAME}; # Some UNIX (I think)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-02-28 13:36:25 +01:00
|
|
|
# enable memory debugging if curl is compiled with it
|
2005-01-27 16:51:03 +01:00
|
|
|
$ENV{'CURL_MEMDEBUG'} = $memdump;
|
2002-04-09 16:28:16 +02:00
|
|
|
$ENV{'HOME'}=$pwd;
|
2002-02-28 13:36:25 +01:00
|
|
|
|
2005-04-28 10:23:25 +02:00
|
|
|
sub catch_zap {
|
|
|
|
my $signame = shift;
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "runtests.pl received SIG$signame, exiting\n";
|
2006-11-20 17:58:04 +01:00
|
|
|
stopservers(1);
|
2005-04-28 10:23:25 +02:00
|
|
|
die "Somebody sent me a SIG$signame";
|
|
|
|
}
|
|
|
|
$SIG{INT} = \&catch_zap;
|
|
|
|
$SIG{KILL} = \&catch_zap;
|
|
|
|
|
2003-09-12 17:41:14 +02:00
|
|
|
##########################################################################
|
|
|
|
# Clear all possible '*_proxy' environment variables for various protocols
|
|
|
|
# to prevent them to interfere with our testing!
|
|
|
|
|
|
|
|
my $protocol;
|
2006-01-16 23:14:37 +01:00
|
|
|
foreach $protocol (('ftp', 'http', 'ftps', 'https', 'no')) {
|
2003-09-12 17:41:14 +02:00
|
|
|
my $proxy = "${protocol}_proxy";
|
|
|
|
# clear lowercase version
|
|
|
|
$ENV{$proxy}=undef;
|
|
|
|
# clear uppercase version
|
|
|
|
$ENV{uc($proxy)}=undef;
|
|
|
|
}
|
|
|
|
|
2005-05-02 09:54:25 +02:00
|
|
|
# make sure we don't get affected by other variables that control our
|
|
|
|
# behaviour
|
|
|
|
|
|
|
|
$ENV{'SSL_CERT_DIR'}=undef;
|
|
|
|
$ENV{'SSL_CERT_PATH'}=undef;
|
|
|
|
$ENV{'CURL_CA_BUNDLE'}=undef;
|
|
|
|
|
2007-03-24 02:01:28 +01:00
|
|
|
#######################################################################
|
|
|
|
# Check if a given child process has just died. Reaps it if so.
|
|
|
|
#
|
|
|
|
sub checkdied {
|
|
|
|
use POSIX ":sys_wait_h";
|
|
|
|
my $pid = $_[0];
|
2007-11-23 13:18:45 +01:00
|
|
|
if(not defined $pid || $pid <= 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
2007-03-24 02:01:28 +01:00
|
|
|
my $rc = waitpid($pid, &WNOHANG);
|
2007-11-23 13:18:45 +01:00
|
|
|
return ($rc == $pid)?1:0;
|
2007-03-24 02:01:28 +01:00
|
|
|
}
|
|
|
|
|
2005-05-01 15:20:53 +02:00
|
|
|
#######################################################################
|
|
|
|
# Start a new thread/process and run the given command line in there.
|
2006-11-20 17:58:04 +01:00
|
|
|
# Return the pids (yes plural) of the new child process to the parent.
|
2005-05-01 15:20:53 +02:00
|
|
|
#
|
|
|
|
sub startnew {
|
2007-11-25 04:55:53 +01:00
|
|
|
my ($cmd, $pidfile, $timeout, $fake)=@_;
|
2005-05-01 15:20:53 +02:00
|
|
|
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "startnew: $cmd\n" if ($verbose);
|
2005-05-01 15:20:53 +02:00
|
|
|
|
|
|
|
my $child = fork();
|
2008-01-14 20:28:54 +01:00
|
|
|
my $pid2 = 0;
|
2005-05-01 15:20:53 +02:00
|
|
|
|
2006-11-09 14:20:42 +01:00
|
|
|
if(not defined $child) {
|
2007-11-22 20:56:38 +01:00
|
|
|
logmsg "startnew: fork() failure detected\n";
|
2006-11-20 17:58:04 +01:00
|
|
|
return (-1,-1);
|
2006-11-09 14:20:42 +01:00
|
|
|
}
|
|
|
|
|
2005-05-01 15:20:53 +02:00
|
|
|
if(0 == $child) {
|
2006-11-09 14:20:42 +01:00
|
|
|
# Here we are the child. Run the given command.
|
2005-05-04 01:14:43 +02:00
|
|
|
|
2007-06-08 20:56:05 +02:00
|
|
|
# Put an "exec" in front of the command so that the child process
|
|
|
|
# keeps this child's process ID.
|
|
|
|
exec("exec $cmd") || die "Can't exec() $cmd: $!";
|
2005-05-04 01:14:43 +02:00
|
|
|
|
2006-11-09 14:20:42 +01:00
|
|
|
# exec() should never return back here to this process. We protect
|
2007-06-08 20:56:05 +02:00
|
|
|
# ourselves by calling die() just in case something goes really bad.
|
2007-04-03 14:27:03 +02:00
|
|
|
die "error: exec() has returned";
|
2005-05-01 15:20:53 +02:00
|
|
|
}
|
2005-05-04 01:14:43 +02:00
|
|
|
|
2008-01-03 21:48:22 +01:00
|
|
|
# Ugly hack but ssh client doesn't support pid files
|
2007-06-05 15:50:59 +02:00
|
|
|
if ($fake) {
|
2007-11-22 20:56:38 +01:00
|
|
|
if(open(OUT, ">$pidfile")) {
|
|
|
|
print OUT $child . "\n";
|
|
|
|
close(OUT);
|
|
|
|
logmsg "startnew: $pidfile faked with pid=$child\n" if($verbose);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
logmsg "startnew: failed to write fake $pidfile with pid=$child\n";
|
|
|
|
}
|
|
|
|
# could/should do a while connect fails sleep a bit and loop
|
2007-11-25 04:55:53 +01:00
|
|
|
sleep $timeout;
|
2007-06-07 21:49:09 +02:00
|
|
|
if (checkdied($child)) {
|
2008-01-08 21:12:43 +01:00
|
|
|
logmsg "startnew: child process has failed to start\n" if($verbose);
|
2007-06-07 21:49:09 +02:00
|
|
|
return (-1,-1);
|
|
|
|
}
|
2007-06-05 15:50:59 +02:00
|
|
|
}
|
2007-11-22 20:56:38 +01:00
|
|
|
|
2007-11-25 04:55:53 +01:00
|
|
|
my $count = $timeout;
|
2006-11-20 17:58:04 +01:00
|
|
|
while($count--) {
|
2008-01-14 20:28:54 +01:00
|
|
|
if(-f $pidfile && -s $pidfile && open(PID, "<$pidfile")) {
|
2007-06-08 00:42:26 +02:00
|
|
|
$pid2 = 0 + <PID>;
|
|
|
|
close(PID);
|
2007-11-22 20:56:38 +01:00
|
|
|
if(($pid2 > 0) && kill(0, $pid2)) {
|
2006-11-20 17:58:04 +01:00
|
|
|
# if $pid2 is valid, then make sure this pid is alive, as
|
|
|
|
# otherwise it is just likely to be the _previous_ pidfile or
|
|
|
|
# similar!
|
|
|
|
last;
|
|
|
|
}
|
2008-01-14 20:28:54 +01:00
|
|
|
# invalidate $pid2 if not actually alive
|
|
|
|
$pid2 = 0;
|
2006-11-20 17:58:04 +01:00
|
|
|
}
|
2007-03-24 02:01:28 +01:00
|
|
|
if (checkdied($child)) {
|
2008-01-08 21:12:43 +01:00
|
|
|
logmsg "startnew: child process has died, server might start up\n"
|
|
|
|
if($verbose);
|
2007-03-24 02:01:28 +01:00
|
|
|
# We can't just abort waiting for the server with a
|
|
|
|
# return (-1,-1);
|
|
|
|
# because the server might have forked and could still start
|
|
|
|
# up normally. Instead, just reduce the amount of time we remain
|
|
|
|
# waiting.
|
|
|
|
$count >>= 2;
|
|
|
|
}
|
2006-11-20 17:58:04 +01:00
|
|
|
sleep(1);
|
2005-05-04 01:14:43 +02:00
|
|
|
}
|
|
|
|
|
2007-06-08 20:56:05 +02:00
|
|
|
# Return two PIDs, the one for the child process we spawned and the one
|
|
|
|
# reported by the server itself (in case it forked again on its own).
|
|
|
|
# Both (potentially) need to be killed at the end of the test.
|
2006-11-20 17:58:04 +01:00
|
|
|
return ($child, $pid2);
|
2005-05-01 15:20:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-29 10:12:47 +01:00
|
|
|
#######################################################################
|
2007-09-17 23:42:01 +02:00
|
|
|
# Check for a command in the PATH of the test server.
|
2003-10-29 10:12:47 +01:00
|
|
|
#
|
|
|
|
sub checkcmd {
|
|
|
|
my ($cmd)=@_;
|
2008-01-16 23:08:37 +01:00
|
|
|
my @paths=(split(":", $ENV{'PATH'}), "/usr/sbin", "/usr/local/sbin",
|
2008-01-16 23:09:51 +01:00
|
|
|
"/sbin", "/usr/bin", "/usr/local/bin" );
|
2003-10-29 10:12:47 +01:00
|
|
|
for(@paths) {
|
2008-08-12 09:21:39 +02:00
|
|
|
if( -x "$_/$cmd" && ! -d "$_/$cmd") {
|
|
|
|
# executable bit but not a directory!
|
2003-10-29 10:12:47 +01:00
|
|
|
return "$_/$cmd";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-09-17 23:42:01 +02:00
|
|
|
#######################################################################
|
|
|
|
# Check for a command in the PATH of the machine running curl.
|
|
|
|
#
|
|
|
|
sub checktestcmd {
|
|
|
|
my ($cmd)=@_;
|
|
|
|
return checkcmd($cmd);
|
|
|
|
}
|
|
|
|
|
|
|
|
#######################################################################
|
2007-09-20 22:39:17 +02:00
|
|
|
# Run the application under test and return its return code
|
2007-09-17 23:42:01 +02:00
|
|
|
#
|
2007-09-20 22:39:17 +02:00
|
|
|
sub runclient {
|
2007-09-17 23:42:01 +02:00
|
|
|
my ($cmd)=@_;
|
|
|
|
return system($cmd);
|
2007-09-20 22:39:17 +02:00
|
|
|
|
|
|
|
# This is one way to test curl on a remote machine
|
|
|
|
# my $out = system("ssh $CLIENTIP cd \'$pwd\' \\; \'$cmd\'");
|
|
|
|
# sleep 2; # time to allow the NFS server to be updated
|
|
|
|
# return $out;
|
2007-09-17 23:42:01 +02:00
|
|
|
}
|
|
|
|
|
2007-09-20 22:39:17 +02:00
|
|
|
#######################################################################
|
|
|
|
# Run the application under test and return its stdout
|
|
|
|
#
|
|
|
|
sub runclientoutput {
|
|
|
|
my ($cmd)=@_;
|
|
|
|
return `$cmd`;
|
|
|
|
|
|
|
|
# This is one way to test curl on a remote machine
|
|
|
|
# my @out = `ssh $CLIENTIP cd \'$pwd\' \\; \'$cmd\'`;
|
|
|
|
# sleep 2; # time to allow the NFS server to be updated
|
|
|
|
# return @out;
|
|
|
|
}
|
|
|
|
|
2003-10-24 10:53:59 +02:00
|
|
|
#######################################################################
|
|
|
|
# Memory allocation test and failure torture testing.
|
|
|
|
#
|
|
|
|
sub torture {
|
2004-05-10 11:01:45 +02:00
|
|
|
my $testcmd = shift;
|
|
|
|
my $gdbline = shift;
|
2003-10-24 10:53:59 +02:00
|
|
|
|
2004-05-10 11:01:45 +02:00
|
|
|
# remove memdump first to be sure we get a new nice and clean one
|
|
|
|
unlink($memdump);
|
2003-10-24 10:53:59 +02:00
|
|
|
|
2004-05-10 11:01:45 +02:00
|
|
|
# First get URL from test server, ignore the output/result
|
2007-09-20 22:39:17 +02:00
|
|
|
runclient($testcmd);
|
2003-10-24 10:53:59 +02:00
|
|
|
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg " CMD: $testcmd\n" if($verbose);
|
2004-05-17 12:53:34 +02:00
|
|
|
|
2004-05-10 11:01:45 +02:00
|
|
|
# memanalyze -v is our friend, get the number of allocations made
|
2004-05-13 09:52:33 +02:00
|
|
|
my $count=0;
|
2004-05-10 11:01:45 +02:00
|
|
|
my @out = `$memanalyze -v $memdump`;
|
|
|
|
for(@out) {
|
|
|
|
if(/^Allocations: (\d+)/) {
|
|
|
|
$count = $1;
|
|
|
|
last;
|
2003-10-24 10:53:59 +02:00
|
|
|
}
|
2004-05-10 11:01:45 +02:00
|
|
|
}
|
2004-05-13 09:52:33 +02:00
|
|
|
if(!$count) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg " found no allocs to make fail\n";
|
2004-05-13 09:52:33 +02:00
|
|
|
return 0;
|
|
|
|
}
|
2003-10-24 15:00:19 +02:00
|
|
|
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg " $count allocations to make fail\n";
|
2003-10-24 15:00:19 +02:00
|
|
|
|
2004-05-10 11:01:45 +02:00
|
|
|
for ( 1 .. $count ) {
|
|
|
|
my $limit = $_;
|
|
|
|
my $fail;
|
|
|
|
my $dumped_core;
|
2004-05-17 12:53:34 +02:00
|
|
|
|
2004-05-10 11:01:45 +02:00
|
|
|
if($tortalloc && ($tortalloc != $limit)) {
|
2003-10-24 10:53:59 +02:00
|
|
|
next;
|
|
|
|
}
|
2003-10-24 15:00:19 +02:00
|
|
|
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "Fail alloc no: $limit\r" if($verbose);
|
2004-05-17 12:53:34 +02:00
|
|
|
|
2004-05-10 11:01:45 +02:00
|
|
|
# make the memory allocation function number $limit return failure
|
|
|
|
$ENV{'CURL_MEMLIMIT'} = $limit;
|
2003-10-24 10:53:59 +02:00
|
|
|
|
2004-05-10 11:01:45 +02:00
|
|
|
# remove memdump first to be sure we get a new nice and clean one
|
|
|
|
unlink($memdump);
|
2004-05-17 12:53:34 +02:00
|
|
|
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "**> Alloc number $limit is now set to fail <**\n" if($gdbthis);
|
2003-10-24 10:53:59 +02:00
|
|
|
|
2004-05-10 11:01:45 +02:00
|
|
|
my $ret;
|
|
|
|
if($gdbthis) {
|
2007-09-20 22:39:17 +02:00
|
|
|
runclient($gdbline)
|
2004-05-17 12:53:34 +02:00
|
|
|
}
|
2004-05-10 11:01:45 +02:00
|
|
|
else {
|
2007-09-20 22:39:17 +02:00
|
|
|
$ret = runclient($testcmd);
|
2004-05-10 11:01:45 +02:00
|
|
|
}
|
2008-10-15 19:41:02 +02:00
|
|
|
#logmsg "$_ Returned " . $ret / 256 . "\n";
|
2003-10-24 10:53:59 +02:00
|
|
|
|
2004-05-13 09:52:33 +02:00
|
|
|
# Now clear the variable again
|
|
|
|
$ENV{'CURL_MEMLIMIT'} = undef;
|
|
|
|
|
2004-05-10 11:01:45 +02:00
|
|
|
if(-r "core") {
|
|
|
|
# there's core file present now!
|
2007-04-03 14:27:03 +02:00
|
|
|
logmsg " core dumped\n";
|
2004-05-10 11:01:45 +02:00
|
|
|
$dumped_core = 1;
|
|
|
|
$fail = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
# verify that it returns a proper error code, doesn't leak memory
|
|
|
|
# and doesn't core dump
|
|
|
|
if($ret & 255) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg " system() returned $ret\n";
|
2004-05-10 11:01:45 +02:00
|
|
|
$fail=1;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
my @memdata=`$memanalyze $memdump`;
|
|
|
|
my $leak=0;
|
|
|
|
for(@memdata) {
|
|
|
|
if($_ ne "") {
|
|
|
|
# well it could be other memory problems as well, but
|
|
|
|
# we call it leak for short here
|
|
|
|
$leak=1;
|
2003-10-24 10:53:59 +02:00
|
|
|
}
|
|
|
|
}
|
2004-05-10 11:01:45 +02:00
|
|
|
if($leak) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "** MEMORY FAILURE\n";
|
|
|
|
logmsg @memdata;
|
|
|
|
logmsg `$memanalyze -l $memdump`;
|
2004-05-10 11:01:45 +02:00
|
|
|
$fail = 1;
|
2003-10-24 10:53:59 +02:00
|
|
|
}
|
|
|
|
}
|
2004-05-10 11:01:45 +02:00
|
|
|
if($fail) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg " Failed on alloc number $limit in test.\n",
|
2004-05-10 11:01:45 +02:00
|
|
|
" invoke with -t$limit to repeat this single case.\n";
|
2006-11-20 17:58:04 +01:00
|
|
|
stopservers($verbose);
|
2007-04-10 02:37:56 +02:00
|
|
|
return 1;
|
2004-05-10 11:01:45 +02:00
|
|
|
}
|
2003-10-24 10:53:59 +02:00
|
|
|
}
|
2004-05-10 11:01:45 +02:00
|
|
|
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "torture OK\n";
|
2004-05-13 09:52:33 +02:00
|
|
|
return 0;
|
2003-10-24 10:53:59 +02:00
|
|
|
}
|
|
|
|
|
2000-11-14 11:18:44 +01:00
|
|
|
#######################################################################
|
2006-11-20 17:58:04 +01:00
|
|
|
# stop the given test server (pid)
|
2000-11-14 11:18:44 +01:00
|
|
|
#
|
2006-11-20 17:58:04 +01:00
|
|
|
sub stopserver {
|
|
|
|
my ($pid) = @_;
|
2005-05-04 01:14:43 +02:00
|
|
|
|
2007-06-07 21:49:09 +02:00
|
|
|
if(not defined $pid || $pid <= 0) {
|
2006-11-20 17:58:04 +01:00
|
|
|
return; # whad'da'ya wanna'da with no pid ?
|
2003-06-13 11:04:08 +02:00
|
|
|
}
|
2000-11-14 11:18:44 +01:00
|
|
|
|
2007-03-24 02:01:28 +01:00
|
|
|
# It might be more than one pid
|
|
|
|
# Send each one a SIGTERM to gracefully kill it
|
2006-11-20 17:58:04 +01:00
|
|
|
|
2007-03-24 02:01:28 +01:00
|
|
|
my @killed;
|
2006-11-20 17:58:04 +01:00
|
|
|
my @pids = split(/\s+/, $pid);
|
|
|
|
for (@pids) {
|
|
|
|
chomp($_);
|
|
|
|
if($_ =~ /^(\d+)$/) {
|
|
|
|
if(($1 > 0) && kill(0, $1)) {
|
|
|
|
if($verbose) {
|
|
|
|
logmsg "RUN: Test server pid $1 signalled to die\n";
|
2006-11-09 14:20:42 +01:00
|
|
|
}
|
2007-03-24 02:01:28 +01:00
|
|
|
kill(15, $1); # die!
|
|
|
|
push @killed, $1;
|
2006-11-09 14:20:42 +01:00
|
|
|
}
|
2006-11-20 11:35:25 +01:00
|
|
|
}
|
2006-11-17 17:44:22 +01:00
|
|
|
}
|
2007-03-24 02:01:28 +01:00
|
|
|
|
|
|
|
# Give each process killed up to a few seconds to die, then send
|
|
|
|
# a SIGKILL to finish it off for good.
|
|
|
|
for (@killed) {
|
|
|
|
my $count = 5; # wait for this many seconds for server to die
|
|
|
|
while($count--) {
|
|
|
|
if (!kill(0, $_) || checkdied($_)) {
|
|
|
|
last;
|
|
|
|
}
|
|
|
|
sleep(1);
|
|
|
|
}
|
|
|
|
if ($count < 0) {
|
|
|
|
logmsg "RUN: forcing pid $_ to die with SIGKILL\n";
|
|
|
|
kill(9, $_); # die!
|
|
|
|
}
|
|
|
|
}
|
2000-11-13 17:06:16 +01:00
|
|
|
}
|
|
|
|
|
2005-05-07 01:21:34 +02:00
|
|
|
#######################################################################
|
|
|
|
# Verify that the server that runs on $ip, $port is our server. This also
|
|
|
|
# implies that we can speak with it, as there might be occasions when the
|
|
|
|
# server runs fine but we cannot talk to it ("Failed to connect to ::1: Can't
|
|
|
|
# assign requested address" #
|
|
|
|
|
|
|
|
sub verifyhttp {
|
|
|
|
my ($proto, $ip, $port) = @_;
|
2008-06-19 03:12:02 +02:00
|
|
|
my $cmd = "$CURL --max-time $server_response_maxtime --output $LOGDIR/verifiedserver --insecure --silent --verbose --globoff \"$proto://$ip:$port/verifiedserver\" 2>$LOGDIR/verifyhttp";
|
2005-05-07 01:21:34 +02:00
|
|
|
my $pid;
|
|
|
|
|
|
|
|
# verify if our/any server is running on this port
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "CMD; $cmd\n" if ($verbose);
|
2007-09-20 22:39:17 +02:00
|
|
|
my $res = runclient($cmd);
|
2005-05-07 01:21:34 +02:00
|
|
|
|
|
|
|
$res >>= 8; # rotate the result
|
|
|
|
my $data;
|
|
|
|
|
|
|
|
if($res && $verbose) {
|
2008-06-19 03:12:02 +02:00
|
|
|
open(ERR, "<$LOGDIR/verifyhttp");
|
2005-05-07 01:21:34 +02:00
|
|
|
my @e = <ERR>;
|
|
|
|
close(ERR);
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "RUN: curl command returned $res\n";
|
2005-05-07 01:21:34 +02:00
|
|
|
for(@e) {
|
|
|
|
if($_ !~ /^([ \t]*)$/) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "RUN: $_";
|
2005-05-07 01:21:34 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2008-06-19 03:12:02 +02:00
|
|
|
open(FILE, "<$LOGDIR/verifiedserver");
|
2007-06-08 00:42:26 +02:00
|
|
|
my @file=<FILE>;
|
|
|
|
close(FILE);
|
2005-05-07 01:21:34 +02:00
|
|
|
$data=$file[0]; # first line
|
|
|
|
|
|
|
|
if ( $data =~ /WE ROOLZ: (\d+)/ ) {
|
|
|
|
$pid = 0+$1;
|
|
|
|
}
|
|
|
|
elsif($res == 6) {
|
|
|
|
# curl: (6) Couldn't resolve host '::1'
|
2007-07-15 00:33:46 +02:00
|
|
|
logmsg "RUN: failed to resolve host ($proto://$ip:$port/verifiedserver)\n";
|
|
|
|
return -1;
|
2005-05-07 01:21:34 +02:00
|
|
|
}
|
|
|
|
elsif($data || ($res != 7)) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "RUN: Unknown server is running on port $port\n";
|
2007-07-15 00:33:46 +02:00
|
|
|
return -1;
|
2005-05-07 01:21:34 +02:00
|
|
|
}
|
|
|
|
return $pid;
|
|
|
|
}
|
|
|
|
|
|
|
|
#######################################################################
|
|
|
|
# Verify that the server that runs on $ip, $port is our server. This also
|
|
|
|
# implies that we can speak with it, as there might be occasions when the
|
|
|
|
# server runs fine but we cannot talk to it ("Failed to connect to ::1: Can't
|
|
|
|
# assign requested address" #
|
|
|
|
|
|
|
|
sub verifyftp {
|
|
|
|
my ($proto, $ip, $port) = @_;
|
|
|
|
my $pid;
|
|
|
|
my $time=time();
|
2007-03-08 03:38:49 +01:00
|
|
|
my $extra;
|
|
|
|
if($proto eq "ftps") {
|
2008-06-08 22:53:49 +02:00
|
|
|
$extra = "--insecure --ftp-ssl-control ";
|
2007-03-08 03:38:49 +01:00
|
|
|
}
|
2008-06-19 03:12:02 +02:00
|
|
|
my $cmd="$CURL --max-time $server_response_maxtime --silent --verbose --globoff $extra\"$proto://$ip:$port/verifiedserver\" 2>$LOGDIR/verifyftp";
|
2005-05-07 01:21:34 +02:00
|
|
|
# check if this is our server running on this port:
|
2007-09-20 22:39:17 +02:00
|
|
|
my @data=runclientoutput($cmd);
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "RUN: $cmd\n" if($verbose);
|
2005-05-07 01:21:34 +02:00
|
|
|
my $line;
|
|
|
|
|
|
|
|
foreach $line (@data) {
|
|
|
|
if ( $line =~ /WE ROOLZ: (\d+)/ ) {
|
|
|
|
# this is our test server with a known pid!
|
|
|
|
$pid = 0+$1;
|
|
|
|
last;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if($pid <= 0 && $data[0]) {
|
|
|
|
# this is not a known server
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "RUN: Unknown server on our FTP port: $port\n";
|
2005-05-07 01:21:34 +02:00
|
|
|
return 0;
|
|
|
|
}
|
2006-05-11 08:34:30 +02:00
|
|
|
# we can/should use the time it took to verify the FTP server as a measure
|
|
|
|
# on how fast/slow this host/FTP is.
|
|
|
|
my $took = time()-$time;
|
|
|
|
|
|
|
|
if($verbose) {
|
2007-04-03 14:27:03 +02:00
|
|
|
logmsg "RUN: Verifying our test FTP server took $took seconds\n";
|
2006-05-11 08:34:30 +02:00
|
|
|
}
|
|
|
|
$ftpchecktime = $took?$took:1; # make sure it never is zero
|
|
|
|
|
2005-05-07 01:21:34 +02:00
|
|
|
return $pid;
|
|
|
|
}
|
|
|
|
|
2007-03-24 02:01:28 +01:00
|
|
|
#######################################################################
|
2008-02-08 14:54:02 +01:00
|
|
|
# Verify that the ssh server has written out its pidfile, recovering
|
|
|
|
# the pid from the file and returning it if a process with that pid is
|
|
|
|
# actually alive.
|
2007-03-24 02:01:28 +01:00
|
|
|
|
|
|
|
sub verifyssh {
|
|
|
|
my ($proto, $ip, $port) = @_;
|
2008-01-11 21:17:33 +01:00
|
|
|
my $pid = 0;
|
2008-01-10 17:19:14 +01:00
|
|
|
if(open(FILE, "<$SSHPIDFILE")) {
|
|
|
|
$pid=0+<FILE>;
|
|
|
|
close(FILE);
|
|
|
|
}
|
2008-01-11 21:17:33 +01:00
|
|
|
if($pid > 0) {
|
|
|
|
# if we have a pid it is actually our ssh server,
|
|
|
|
# since runsshserver() unlinks previous pidfile
|
2008-01-11 22:59:05 +01:00
|
|
|
if(!kill(0, $pid)) {
|
2008-01-11 21:17:33 +01:00
|
|
|
logmsg "RUN: SSH server has died after starting up\n";
|
2008-01-12 01:12:16 +01:00
|
|
|
checkdied($pid);
|
2008-01-11 21:17:33 +01:00
|
|
|
unlink($SSHPIDFILE);
|
|
|
|
$pid = -1;
|
|
|
|
}
|
2008-01-10 17:19:14 +01:00
|
|
|
}
|
2007-06-05 15:50:59 +02:00
|
|
|
return $pid;
|
|
|
|
}
|
|
|
|
|
2008-02-08 14:54:02 +01:00
|
|
|
#######################################################################
|
|
|
|
# Verify that we can connect to the sftp server, properly authenticate
|
|
|
|
# with generated config and key files and run a simple remote pwd.
|
|
|
|
|
|
|
|
sub verifysftp {
|
|
|
|
my ($proto, $ip, $port) = @_;
|
|
|
|
my $verified = 0;
|
|
|
|
# Find out sftp client canonical file name
|
|
|
|
my $sftp = find_sftp();
|
|
|
|
if(!$sftp) {
|
|
|
|
logmsg "RUN: SFTP server cannot find $sftpexe\n";
|
|
|
|
return -1;
|
|
|
|
}
|
2008-02-10 03:52:17 +01:00
|
|
|
# Find out ssh client canonical file name
|
|
|
|
my $ssh = find_ssh();
|
|
|
|
if(!$ssh) {
|
|
|
|
logmsg "RUN: SFTP server cannot find $sshexe\n";
|
|
|
|
return -1;
|
|
|
|
}
|
2008-02-08 14:54:02 +01:00
|
|
|
# Connect to sftp server, authenticate and run a remote pwd
|
|
|
|
# command using our generated configuration and key files
|
2008-02-10 03:52:17 +01:00
|
|
|
my $cmd = "$sftp -b $sftpcmds -F $sftpconfig -S $ssh $ip > $sftplog 2>&1";
|
2008-02-08 14:54:02 +01:00
|
|
|
my $res = runclient($cmd);
|
|
|
|
# Search for pwd command response in log file
|
|
|
|
if(open(SFTPLOGFILE, "<$sftplog")) {
|
|
|
|
while(<SFTPLOGFILE>) {
|
|
|
|
if(/^Remote working directory: /) {
|
|
|
|
$verified = 1;
|
|
|
|
last;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
close(SFTPLOGFILE);
|
|
|
|
}
|
|
|
|
return $verified;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-06-05 15:50:59 +02:00
|
|
|
#######################################################################
|
|
|
|
# STUB for verifying socks
|
|
|
|
|
|
|
|
sub verifysocks {
|
|
|
|
my ($proto, $ip, $port) = @_;
|
2008-01-11 21:17:33 +01:00
|
|
|
my $pid = 0;
|
|
|
|
if(open(FILE, "<$SOCKSPIDFILE")) {
|
|
|
|
$pid=0+<FILE>;
|
|
|
|
close(FILE);
|
|
|
|
}
|
|
|
|
if($pid > 0) {
|
|
|
|
# if we have a pid it is actually our socks server,
|
|
|
|
# since runsocksserver() unlinks previous pidfile
|
2008-01-11 22:59:05 +01:00
|
|
|
if(!kill(0, $pid)) {
|
2008-01-11 21:17:33 +01:00
|
|
|
logmsg "RUN: SOCKS server has died after starting up\n";
|
2008-01-12 01:12:16 +01:00
|
|
|
checkdied($pid);
|
2008-01-11 21:17:33 +01:00
|
|
|
unlink($SOCKSPIDFILE);
|
|
|
|
$pid = -1;
|
|
|
|
}
|
|
|
|
}
|
2007-03-24 02:01:28 +01:00
|
|
|
return $pid;
|
|
|
|
}
|
|
|
|
|
2005-05-07 01:21:34 +02:00
|
|
|
#######################################################################
|
|
|
|
# Verify that the server that runs on $ip, $port is our server.
|
2007-06-11 19:53:10 +02:00
|
|
|
# Retry over several seconds before giving up. The ssh server in
|
|
|
|
# particular can take a long time to start if it needs to generate
|
|
|
|
# keys on a slow or loaded host.
|
2005-05-07 01:21:34 +02:00
|
|
|
#
|
|
|
|
|
|
|
|
my %protofunc = ('http' => \&verifyhttp,
|
|
|
|
'https' => \&verifyhttp,
|
2005-09-15 22:25:02 +02:00
|
|
|
'ftp' => \&verifyftp,
|
2007-03-08 03:38:49 +01:00
|
|
|
'ftps' => \&verifyftp,
|
2007-03-24 02:01:28 +01:00
|
|
|
'tftp' => \&verifyftp,
|
2007-06-05 15:50:59 +02:00
|
|
|
'ssh' => \&verifyssh,
|
|
|
|
'socks' => \&verifysocks);
|
2005-05-07 01:21:34 +02:00
|
|
|
|
|
|
|
sub verifyserver {
|
|
|
|
my ($proto, $ip, $port) = @_;
|
|
|
|
|
2007-06-11 19:53:10 +02:00
|
|
|
my $count = 30; # try for this many seconds
|
2005-05-07 01:21:34 +02:00
|
|
|
my $pid;
|
|
|
|
|
|
|
|
while($count--) {
|
|
|
|
my $fun = $protofunc{$proto};
|
|
|
|
|
|
|
|
$pid = &$fun($proto, $ip, $port);
|
|
|
|
|
2007-07-15 00:33:46 +02:00
|
|
|
if($pid > 0) {
|
2005-05-07 01:21:34 +02:00
|
|
|
last;
|
|
|
|
}
|
2007-07-15 00:33:46 +02:00
|
|
|
elsif($pid < 0) {
|
|
|
|
# a real failure, stop trying and bail out
|
|
|
|
return 0;
|
|
|
|
}
|
2005-05-07 01:21:34 +02:00
|
|
|
sleep(1);
|
|
|
|
}
|
|
|
|
return $pid;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
2001-04-24 23:09:53 +02:00
|
|
|
#######################################################################
|
2005-05-01 15:20:53 +02:00
|
|
|
# start the http server
|
2001-04-24 23:09:53 +02:00
|
|
|
#
|
|
|
|
sub runhttpserver {
|
2004-12-11 22:41:00 +01:00
|
|
|
my ($verbose, $ipv6) = @_;
|
2006-11-20 17:58:04 +01:00
|
|
|
my $RUNNING;
|
2004-12-11 22:41:00 +01:00
|
|
|
my $pidfile = $HTTPPIDFILE;
|
|
|
|
my $port = $HTTPPORT;
|
|
|
|
my $ip = $HOSTIP;
|
|
|
|
my $nameext;
|
2006-04-10 15:03:20 +02:00
|
|
|
my $fork = $forkserver?"--fork":"";
|
2004-12-11 22:41:00 +01:00
|
|
|
|
|
|
|
if($ipv6) {
|
|
|
|
# if IPv6, use a different setup
|
|
|
|
$pidfile = $HTTP6PIDFILE;
|
|
|
|
$port = $HTTP6PORT;
|
|
|
|
$ip = $HOST6IP;
|
|
|
|
$nameext="-ipv6";
|
|
|
|
}
|
|
|
|
|
2007-11-17 00:06:53 +01:00
|
|
|
# don't retry if the server doesn't work
|
|
|
|
if ($doesntrun{$pidfile}) {
|
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
|
2008-02-12 14:47:56 +01:00
|
|
|
my $pid = checkserver($pidfile);
|
2006-11-20 17:58:04 +01:00
|
|
|
if($pid > 0) {
|
|
|
|
stopserver($pid);
|
|
|
|
}
|
2008-02-12 14:47:56 +01:00
|
|
|
unlink($pidfile);
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2001-10-17 13:51:02 +02:00
|
|
|
my $flag=$debugprotocol?"-v ":"";
|
2004-02-12 15:40:08 +01:00
|
|
|
my $dir=$ENV{'srcdir'};
|
|
|
|
if($dir) {
|
|
|
|
$flag .= "-d \"$dir\" ";
|
|
|
|
}
|
2005-05-07 01:21:34 +02:00
|
|
|
|
2006-04-10 15:03:20 +02:00
|
|
|
my $cmd="$perl $srcdir/httpserver.pl -p $pidfile $fork$flag $port $ipv6";
|
2006-11-20 17:58:04 +01:00
|
|
|
my ($httppid, $pid2) =
|
2007-11-25 04:55:53 +01:00
|
|
|
startnew($cmd, $pidfile, 15, 0); # start the server in a new process
|
2005-04-28 15:54:48 +02:00
|
|
|
|
2007-06-11 19:53:10 +02:00
|
|
|
if($httppid <= 0 || !kill(0, $httppid)) {
|
2005-05-01 15:20:53 +02:00
|
|
|
# it is NOT alive
|
2007-11-15 23:41:31 +01:00
|
|
|
logmsg "RUN: failed to start the HTTP$nameext server\n";
|
2008-02-12 14:47:56 +01:00
|
|
|
stopserver("$pid2");
|
2007-11-17 00:06:53 +01:00
|
|
|
$doesntrun{$pidfile} = 1;
|
2006-11-20 17:58:04 +01:00
|
|
|
return (0,0);
|
2003-03-15 17:43:58 +01:00
|
|
|
}
|
|
|
|
|
2005-05-07 01:21:34 +02:00
|
|
|
# Server is up. Verify that we can speak to it.
|
2008-02-12 14:47:56 +01:00
|
|
|
my $pid3 = verifyserver("http", $ip, $port);
|
|
|
|
if(!$pid3) {
|
2006-11-20 17:58:04 +01:00
|
|
|
logmsg "RUN: HTTP$nameext server failed verification\n";
|
|
|
|
# failed to talk to it properly. Kill the server and return failure
|
|
|
|
stopserver("$httppid $pid2");
|
2007-11-17 00:06:53 +01:00
|
|
|
$doesntrun{$pidfile} = 1;
|
2006-11-20 17:58:04 +01:00
|
|
|
return (0,0);
|
2005-05-07 01:21:34 +02:00
|
|
|
}
|
2008-02-12 14:47:56 +01:00
|
|
|
$pid2 = $pid3;
|
2005-05-07 01:21:34 +02:00
|
|
|
|
2003-03-15 17:43:58 +01:00
|
|
|
if($verbose) {
|
2006-11-20 17:58:04 +01:00
|
|
|
logmsg "RUN: HTTP$nameext server is now running PID $httppid\n";
|
2003-03-15 17:43:58 +01:00
|
|
|
}
|
|
|
|
|
2005-05-01 15:20:53 +02:00
|
|
|
sleep(1);
|
|
|
|
|
2006-11-20 17:58:04 +01:00
|
|
|
return ($httppid, $pid2);
|
2000-11-13 17:06:16 +01:00
|
|
|
}
|
|
|
|
|
2001-04-24 23:09:53 +02:00
|
|
|
#######################################################################
|
2005-05-01 15:20:53 +02:00
|
|
|
# start the https server (or rather, tunnel)
|
2001-04-24 23:09:53 +02:00
|
|
|
#
|
|
|
|
sub runhttpsserver {
|
2005-05-07 01:21:34 +02:00
|
|
|
my ($verbose, $ipv6) = @_;
|
2006-11-20 17:58:04 +01:00
|
|
|
my $STATUS;
|
|
|
|
my $RUNNING;
|
2005-05-07 01:21:34 +02:00
|
|
|
my $ip = $HOSTIP;
|
2007-11-17 00:06:53 +01:00
|
|
|
my $pidfile = $HTTPSPIDFILE;
|
2001-04-24 23:09:53 +02:00
|
|
|
|
2003-10-29 17:27:43 +01:00
|
|
|
if(!$stunnel) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-05-07 01:21:34 +02:00
|
|
|
if($ipv6) {
|
|
|
|
# not complete yet
|
|
|
|
$ip = $HOST6IP;
|
|
|
|
}
|
|
|
|
|
2007-11-17 00:06:53 +01:00
|
|
|
# don't retry if the server doesn't work
|
|
|
|
if ($doesntrun{$pidfile}) {
|
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
|
2008-02-12 14:47:56 +01:00
|
|
|
my $pid = checkserver($pidfile);
|
2006-11-20 17:58:04 +01:00
|
|
|
if($pid > 0) {
|
|
|
|
# kill previous stunnel!
|
|
|
|
stopserver($pid);
|
|
|
|
}
|
2008-02-12 14:47:56 +01:00
|
|
|
unlink($pidfile);
|
2001-04-24 23:09:53 +02:00
|
|
|
|
|
|
|
my $flag=$debugprotocol?"-v ":"";
|
2007-03-08 03:38:49 +01:00
|
|
|
my $cmd="$perl $srcdir/httpsserver.pl $flag -p https -s \"$stunnel\" -d $srcdir -r $HTTPPORT $HTTPSPORT";
|
2004-01-12 15:34:48 +01:00
|
|
|
|
2007-11-25 04:55:53 +01:00
|
|
|
my ($httpspid, $pid2) = startnew($cmd, $pidfile, 15, 0);
|
2006-11-20 17:58:04 +01:00
|
|
|
|
2007-06-11 19:53:10 +02:00
|
|
|
if($httpspid <= 0 || !kill(0, $httpspid)) {
|
2005-05-01 15:20:53 +02:00
|
|
|
# it is NOT alive
|
2007-04-03 14:27:03 +02:00
|
|
|
logmsg "RUN: failed to start the HTTPS server\n";
|
2006-11-20 17:58:04 +01:00
|
|
|
stopservers($verbose);
|
2007-11-17 00:06:53 +01:00
|
|
|
$doesntrun{$pidfile} = 1;
|
2006-11-20 17:58:04 +01:00
|
|
|
return(0,0);
|
2005-05-01 15:20:53 +02:00
|
|
|
}
|
|
|
|
|
2005-05-07 01:21:34 +02:00
|
|
|
# Server is up. Verify that we can speak to it.
|
2008-02-12 14:47:56 +01:00
|
|
|
my $pid3 = verifyserver("https", $ip, $HTTPSPORT);
|
|
|
|
if(!$pid3) {
|
2006-11-20 17:58:04 +01:00
|
|
|
logmsg "RUN: HTTPS server failed verification\n";
|
|
|
|
# failed to talk to it properly. Kill the server and return failure
|
|
|
|
stopserver("$httpspid $pid2");
|
2007-11-17 00:06:53 +01:00
|
|
|
$doesntrun{$pidfile} = 1;
|
2006-11-20 17:58:04 +01:00
|
|
|
return (0,0);
|
2005-05-07 01:21:34 +02:00
|
|
|
}
|
2008-02-13 07:06:57 +01:00
|
|
|
# Here pid3 is actually the pid returned by the unsecure-http server.
|
2005-05-07 01:21:34 +02:00
|
|
|
|
2005-05-01 15:20:53 +02:00
|
|
|
if($verbose) {
|
2006-11-20 17:58:04 +01:00
|
|
|
logmsg "RUN: HTTPS server is now running PID $httpspid\n";
|
2004-01-12 15:34:48 +01:00
|
|
|
}
|
2003-06-13 11:04:08 +02:00
|
|
|
|
2005-05-01 15:20:53 +02:00
|
|
|
sleep(1);
|
|
|
|
|
2006-11-20 17:58:04 +01:00
|
|
|
return ($httpspid, $pid2);
|
2001-04-24 23:09:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#######################################################################
|
2005-05-01 15:20:53 +02:00
|
|
|
# start the ftp server
|
2001-04-24 23:09:53 +02:00
|
|
|
#
|
|
|
|
sub runftpserver {
|
2005-04-18 08:57:44 +02:00
|
|
|
my ($id, $verbose, $ipv6) = @_;
|
2006-11-20 17:58:04 +01:00
|
|
|
my $STATUS;
|
|
|
|
my $RUNNING;
|
2005-01-17 21:20:34 +01:00
|
|
|
my $port = $id?$FTP2PORT:$FTPPORT;
|
2001-04-24 23:09:53 +02:00
|
|
|
# check for pidfile
|
2005-04-18 08:57:44 +02:00
|
|
|
my $pidfile = $id?$FTP2PIDFILE:$FTPPIDFILE;
|
|
|
|
my $ip=$HOSTIP;
|
|
|
|
my $nameext;
|
2005-05-07 01:21:34 +02:00
|
|
|
my $cmd;
|
2005-04-18 08:57:44 +02:00
|
|
|
|
|
|
|
if($ipv6) {
|
|
|
|
# if IPv6, use a different setup
|
|
|
|
$pidfile = $FTP6PIDFILE;
|
|
|
|
$port = $FTP6PORT;
|
|
|
|
$ip = $HOST6IP;
|
|
|
|
$nameext="-ipv6";
|
|
|
|
}
|
|
|
|
|
2007-11-17 00:06:53 +01:00
|
|
|
# don't retry if the server doesn't work
|
|
|
|
if ($doesntrun{$pidfile}) {
|
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
|
2006-11-20 17:58:04 +01:00
|
|
|
my $pid = checkserver($pidfile);
|
2008-02-12 14:47:56 +01:00
|
|
|
if($pid > 0) {
|
2006-11-20 17:58:04 +01:00
|
|
|
stopserver($pid);
|
|
|
|
}
|
2008-02-12 14:47:56 +01:00
|
|
|
unlink($pidfile);
|
2004-05-17 12:53:34 +02:00
|
|
|
|
2005-05-07 01:21:34 +02:00
|
|
|
# start our server:
|
2003-03-15 17:43:58 +01:00
|
|
|
my $flag=$debugprotocol?"-v ":"";
|
2005-01-17 21:20:34 +01:00
|
|
|
$flag .= "-s \"$srcdir\" ";
|
2007-09-20 22:39:17 +02:00
|
|
|
my $addr;
|
2005-01-17 21:20:34 +01:00
|
|
|
if($id) {
|
|
|
|
$flag .="--id $id ";
|
|
|
|
}
|
2005-04-18 08:57:44 +02:00
|
|
|
if($ipv6) {
|
|
|
|
$flag .="--ipv6 ";
|
2007-09-20 22:39:17 +02:00
|
|
|
$addr = $HOST6IP;
|
|
|
|
} else {
|
|
|
|
$addr = $HOSTIP;
|
2005-04-18 08:57:44 +02:00
|
|
|
}
|
2006-11-20 17:58:04 +01:00
|
|
|
|
2008-02-12 14:47:56 +01:00
|
|
|
$cmd="$perl $srcdir/ftpserver.pl --pidfile $pidfile $flag --port $port --addr \"$addr\"";
|
2007-11-25 04:55:53 +01:00
|
|
|
my ($ftppid, $pid2) = startnew($cmd, $pidfile, 15, 0);
|
2006-11-20 17:58:04 +01:00
|
|
|
|
2007-06-11 19:53:10 +02:00
|
|
|
if($ftppid <= 0 || !kill(0, $ftppid)) {
|
2005-05-01 15:20:53 +02:00
|
|
|
# it is NOT alive
|
2007-04-03 14:27:03 +02:00
|
|
|
logmsg "RUN: failed to start the FTP$id$nameext server\n";
|
2008-02-12 14:47:56 +01:00
|
|
|
stopserver("$pid2");
|
2007-11-17 00:06:53 +01:00
|
|
|
$doesntrun{$pidfile} = 1;
|
|
|
|
return (0,0);
|
2005-05-02 11:08:44 +02:00
|
|
|
}
|
|
|
|
|
2005-05-07 01:21:34 +02:00
|
|
|
# Server is up. Verify that we can speak to it.
|
2008-02-12 14:47:56 +01:00
|
|
|
my $pid3 = verifyserver("ftp", $ip, $port);
|
|
|
|
if(!$pid3) {
|
2006-11-20 17:58:04 +01:00
|
|
|
logmsg "RUN: FTP$id$nameext server failed verification\n";
|
|
|
|
# failed to talk to it properly. Kill the server and return failure
|
|
|
|
stopserver("$ftppid $pid2");
|
2007-11-17 00:06:53 +01:00
|
|
|
$doesntrun{$pidfile} = 1;
|
2006-11-20 17:58:04 +01:00
|
|
|
return (0,0);
|
2003-03-15 17:43:58 +01:00
|
|
|
}
|
2008-02-12 14:47:56 +01:00
|
|
|
$pid2 = $pid3;
|
2003-03-15 17:43:58 +01:00
|
|
|
|
|
|
|
if($verbose) {
|
2006-11-20 17:58:04 +01:00
|
|
|
logmsg "RUN: FTP$id$nameext server is now running PID $ftppid\n";
|
2003-03-15 17:43:58 +01:00
|
|
|
}
|
|
|
|
|
2005-05-01 15:20:53 +02:00
|
|
|
sleep(1);
|
|
|
|
|
2006-11-20 17:58:04 +01:00
|
|
|
return ($pid2, $ftppid);
|
2001-04-24 23:09:53 +02:00
|
|
|
}
|
|
|
|
|
2007-03-08 03:38:49 +01:00
|
|
|
#######################################################################
|
|
|
|
# start the ftps server (or rather, tunnel)
|
|
|
|
#
|
|
|
|
sub runftpsserver {
|
|
|
|
my ($verbose, $ipv6) = @_;
|
|
|
|
my $STATUS;
|
|
|
|
my $RUNNING;
|
|
|
|
my $ip = $HOSTIP;
|
2007-11-17 00:06:53 +01:00
|
|
|
my $pidfile = $FTPSPIDFILE;
|
2007-03-08 03:38:49 +01:00
|
|
|
|
|
|
|
if(!$stunnel) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if($ipv6) {
|
|
|
|
# not complete yet
|
|
|
|
$ip = $HOST6IP;
|
|
|
|
}
|
|
|
|
|
2007-11-17 00:06:53 +01:00
|
|
|
# don't retry if the server doesn't work
|
|
|
|
if ($doesntrun{$pidfile}) {
|
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
|
2008-02-12 14:47:56 +01:00
|
|
|
my $pid = checkserver($pidfile);
|
2007-03-08 03:38:49 +01:00
|
|
|
if($pid > 0) {
|
|
|
|
# kill previous stunnel!
|
|
|
|
stopserver($pid);
|
|
|
|
}
|
2008-02-12 14:47:56 +01:00
|
|
|
unlink($pidfile);
|
2007-03-08 03:38:49 +01:00
|
|
|
|
|
|
|
my $flag=$debugprotocol?"-v ":"";
|
|
|
|
my $cmd="$perl $srcdir/httpsserver.pl $flag -p ftps -s \"$stunnel\" -d $srcdir -r $FTPPORT $FTPSPORT";
|
|
|
|
|
2007-11-25 04:55:53 +01:00
|
|
|
my ($ftpspid, $pid2) = startnew($cmd, $pidfile, 15, 0);
|
2007-03-08 03:38:49 +01:00
|
|
|
|
2007-06-11 19:53:10 +02:00
|
|
|
if($ftpspid <= 0 || !kill(0, $ftpspid)) {
|
2007-03-08 03:38:49 +01:00
|
|
|
# it is NOT alive
|
2007-04-03 14:27:03 +02:00
|
|
|
logmsg "RUN: failed to start the FTPS server\n";
|
2007-03-08 03:38:49 +01:00
|
|
|
stopservers($verbose);
|
2007-11-17 00:06:53 +01:00
|
|
|
$doesntrun{$pidfile} = 1;
|
2007-03-08 03:38:49 +01:00
|
|
|
return(0,0);
|
|
|
|
}
|
|
|
|
|
|
|
|
# Server is up. Verify that we can speak to it.
|
2008-02-12 14:47:56 +01:00
|
|
|
my $pid3 = verifyserver("ftps", $ip, $FTPSPORT);
|
|
|
|
if(!$pid3) {
|
2007-03-08 03:38:49 +01:00
|
|
|
logmsg "RUN: FTPS server failed verification\n";
|
|
|
|
# failed to talk to it properly. Kill the server and return failure
|
|
|
|
stopserver("$ftpspid $pid2");
|
2007-11-17 00:06:53 +01:00
|
|
|
$doesntrun{$pidfile} = 1;
|
2007-03-08 03:38:49 +01:00
|
|
|
return (0,0);
|
|
|
|
}
|
2008-02-13 07:06:57 +01:00
|
|
|
# Here pid3 is actually the pid returned by the unsecure-ftp server.
|
2007-03-08 03:38:49 +01:00
|
|
|
|
|
|
|
if($verbose) {
|
|
|
|
logmsg "RUN: FTPS server is now running PID $ftpspid\n";
|
|
|
|
}
|
|
|
|
|
|
|
|
sleep(1);
|
|
|
|
|
|
|
|
return ($ftpspid, $pid2);
|
|
|
|
}
|
|
|
|
|
2005-09-15 22:25:02 +02:00
|
|
|
#######################################################################
|
|
|
|
# start the tftp server
|
|
|
|
#
|
|
|
|
sub runtftpserver {
|
|
|
|
my ($id, $verbose, $ipv6) = @_;
|
2006-11-20 17:58:04 +01:00
|
|
|
my $STATUS;
|
|
|
|
my $RUNNING;
|
2005-09-15 22:25:02 +02:00
|
|
|
my $port = $TFTPPORT;
|
|
|
|
# check for pidfile
|
|
|
|
my $pidfile = $TFTPPIDFILE;
|
|
|
|
my $ip=$HOSTIP;
|
|
|
|
my $nameext;
|
|
|
|
my $cmd;
|
|
|
|
|
|
|
|
if($ipv6) {
|
|
|
|
# if IPv6, use a different setup
|
|
|
|
$pidfile = $TFTP6PIDFILE;
|
|
|
|
$port = $TFTP6PORT;
|
|
|
|
$ip = $HOST6IP;
|
|
|
|
$nameext="-ipv6";
|
|
|
|
}
|
|
|
|
|
2007-11-17 00:06:53 +01:00
|
|
|
# don't retry if the server doesn't work
|
|
|
|
if ($doesntrun{$pidfile}) {
|
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
|
2006-11-20 17:58:04 +01:00
|
|
|
my $pid = checkserver($pidfile);
|
2008-02-12 14:47:56 +01:00
|
|
|
if($pid > 0) {
|
2006-11-20 17:58:04 +01:00
|
|
|
stopserver($pid);
|
|
|
|
}
|
2008-02-12 14:47:56 +01:00
|
|
|
unlink($pidfile);
|
2005-09-15 22:25:02 +02:00
|
|
|
|
|
|
|
# start our server:
|
|
|
|
my $flag=$debugprotocol?"-v ":"";
|
|
|
|
$flag .= "-s \"$srcdir\" ";
|
|
|
|
if($id) {
|
|
|
|
$flag .="--id $id ";
|
|
|
|
}
|
|
|
|
if($ipv6) {
|
|
|
|
$flag .="--ipv6 ";
|
|
|
|
}
|
2006-11-20 17:58:04 +01:00
|
|
|
|
2008-02-12 14:47:56 +01:00
|
|
|
$cmd="./server/tftpd --pidfile $pidfile $flag $port";
|
2007-11-25 04:55:53 +01:00
|
|
|
my ($tftppid, $pid2) = startnew($cmd, $pidfile, 15, 0);
|
2006-11-20 17:58:04 +01:00
|
|
|
|
2007-06-11 19:53:10 +02:00
|
|
|
if($tftppid <= 0 || !kill(0, $tftppid)) {
|
2005-09-15 22:25:02 +02:00
|
|
|
# it is NOT alive
|
2007-11-17 00:06:53 +01:00
|
|
|
logmsg "RUN: failed to start the TFTP$id$nameext server\n";
|
2008-02-12 14:47:56 +01:00
|
|
|
stopserver("$pid2");
|
2007-11-17 00:06:53 +01:00
|
|
|
$doesntrun{$pidfile} = 1;
|
|
|
|
return (0,0);
|
2005-09-15 22:25:02 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
# Server is up. Verify that we can speak to it.
|
2008-02-12 14:47:56 +01:00
|
|
|
my $pid3 = verifyserver("tftp", $ip, $port);
|
|
|
|
if(!$pid3) {
|
2006-11-20 17:58:04 +01:00
|
|
|
logmsg "RUN: TFTP$id$nameext server failed verification\n";
|
|
|
|
# failed to talk to it properly. Kill the server and return failure
|
|
|
|
stopserver("$tftppid $pid2");
|
2007-11-17 00:06:53 +01:00
|
|
|
$doesntrun{$pidfile} = 1;
|
2006-11-20 17:58:04 +01:00
|
|
|
return (0,0);
|
2005-09-15 22:25:02 +02:00
|
|
|
}
|
2008-02-12 14:47:56 +01:00
|
|
|
$pid2 = $pid3;
|
2005-09-15 22:25:02 +02:00
|
|
|
|
|
|
|
if($verbose) {
|
2006-11-20 17:58:04 +01:00
|
|
|
logmsg "RUN: TFTP$id$nameext server is now running PID $tftppid\n";
|
2005-09-15 22:25:02 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
sleep(1);
|
|
|
|
|
2006-11-20 17:58:04 +01:00
|
|
|
return ($pid2, $tftppid);
|
2005-09-15 22:25:02 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-03-24 02:01:28 +01:00
|
|
|
#######################################################################
|
|
|
|
# Start the scp/sftp server
|
|
|
|
#
|
|
|
|
sub runsshserver {
|
|
|
|
my ($id, $verbose, $ipv6) = @_;
|
|
|
|
my $ip=$HOSTIP;
|
|
|
|
my $port = $SSHPORT;
|
2008-01-03 21:48:22 +01:00
|
|
|
my $socksport = $SOCKSPORT;
|
2007-03-24 02:01:28 +01:00
|
|
|
my $pidfile = $SSHPIDFILE;
|
|
|
|
|
2007-11-17 00:06:53 +01:00
|
|
|
# don't retry if the server doesn't work
|
|
|
|
if ($doesntrun{$pidfile}) {
|
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
|
2007-03-24 02:01:28 +01:00
|
|
|
my $pid = checkserver($pidfile);
|
|
|
|
if($pid > 0) {
|
|
|
|
stopserver($pid);
|
|
|
|
}
|
2008-01-10 17:19:14 +01:00
|
|
|
unlink($pidfile);
|
2007-03-24 02:01:28 +01:00
|
|
|
|
2008-01-03 21:48:22 +01:00
|
|
|
my $flag=$verbose?'-v ':'';
|
|
|
|
$flag .= '-d ' if($debugprotocol);
|
|
|
|
|
|
|
|
my $cmd="$perl $srcdir/sshserver.pl ${flag}-u $USER -l $ip -p $port -s $socksport";
|
|
|
|
my ($sshpid, $pid2) = startnew($cmd, $pidfile, 60, 0);
|
2007-03-24 02:01:28 +01:00
|
|
|
|
2008-01-18 10:18:59 +01:00
|
|
|
# on loaded systems sshserver start up can take longer than the timeout
|
|
|
|
# passed to startnew, when this happens startnew completes without being
|
|
|
|
# able to read the pidfile and consequently returns a zero pid2 above.
|
|
|
|
|
2007-06-11 19:53:10 +02:00
|
|
|
if($sshpid <= 0 || !kill(0, $sshpid)) {
|
2007-03-24 02:01:28 +01:00
|
|
|
# it is NOT alive
|
2007-04-03 14:27:03 +02:00
|
|
|
logmsg "RUN: failed to start the SSH server\n";
|
2007-11-26 15:26:40 +01:00
|
|
|
stopserver("$pid2");
|
2007-11-17 00:06:53 +01:00
|
|
|
$doesntrun{$pidfile} = 1;
|
|
|
|
return (0,0);
|
2007-03-24 02:01:28 +01:00
|
|
|
}
|
|
|
|
|
2008-02-08 14:54:02 +01:00
|
|
|
# ssh server verification allows some extra time for the server to start up
|
|
|
|
# and gives us the opportunity of recovering the pid from the pidfile, when
|
|
|
|
# this verification succeeds the recovered pid is assigned to pid2.
|
2008-01-18 10:18:59 +01:00
|
|
|
|
|
|
|
my $pid3 = verifyserver("ssh",$ip,$port);
|
|
|
|
if(!$pid3) {
|
2007-03-24 02:01:28 +01:00
|
|
|
logmsg "RUN: SSH server failed verification\n";
|
2008-02-08 14:54:02 +01:00
|
|
|
# failed to fetch server pid. Kill the server and return failure
|
|
|
|
stopserver("$sshpid $pid2");
|
|
|
|
$doesntrun{$pidfile} = 1;
|
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
$pid2 = $pid3;
|
|
|
|
|
|
|
|
# once it is known that the ssh server is alive, sftp server verification
|
|
|
|
# is performed actually connecting to it, authenticating and performing a
|
2008-02-10 03:52:17 +01:00
|
|
|
# very simple remote command. This verification is tried only one time.
|
2008-02-08 14:54:02 +01:00
|
|
|
|
2008-02-10 03:52:17 +01:00
|
|
|
if(verifysftp("sftp",$ip,$port) < 1) {
|
2008-02-08 14:54:02 +01:00
|
|
|
logmsg "RUN: SFTP server failed verification\n";
|
2007-11-26 15:26:40 +01:00
|
|
|
# failed to talk to it properly. Kill the server and return failure
|
2008-02-08 14:54:02 +01:00
|
|
|
display_sftplog();
|
|
|
|
display_sftpconfig();
|
|
|
|
display_sshdlog();
|
|
|
|
display_sshdconfig();
|
2007-11-26 15:26:40 +01:00
|
|
|
stopserver("$sshpid $pid2");
|
2007-11-17 00:06:53 +01:00
|
|
|
$doesntrun{$pidfile} = 1;
|
2007-03-24 02:01:28 +01:00
|
|
|
return (0,0);
|
|
|
|
}
|
2008-01-18 10:18:59 +01:00
|
|
|
|
2007-03-24 02:01:28 +01:00
|
|
|
if($verbose) {
|
2008-01-18 10:18:59 +01:00
|
|
|
logmsg "RUN: SSH server is now running PID $pid2\n";
|
2007-03-24 02:01:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return ($pid2, $sshpid);
|
|
|
|
}
|
|
|
|
|
2007-06-05 15:50:59 +02:00
|
|
|
#######################################################################
|
|
|
|
# Start the socks server
|
|
|
|
#
|
|
|
|
sub runsocksserver {
|
|
|
|
my ($id, $verbose, $ipv6) = @_;
|
|
|
|
my $ip=$HOSTIP;
|
|
|
|
my $port = $SOCKSPORT;
|
|
|
|
my $pidfile = $SOCKSPIDFILE;
|
|
|
|
|
2007-11-17 00:06:53 +01:00
|
|
|
# don't retry if the server doesn't work
|
|
|
|
if ($doesntrun{$pidfile}) {
|
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
|
2008-01-03 21:48:22 +01:00
|
|
|
my $pid = checkserver($pidfile);
|
|
|
|
if($pid > 0) {
|
|
|
|
stopserver($pid);
|
|
|
|
}
|
|
|
|
unlink($pidfile);
|
|
|
|
|
|
|
|
# The ssh server must be already running
|
|
|
|
if(!$run{'ssh'}) {
|
|
|
|
logmsg "RUN: SOCKS server cannot find running SSH server\n";
|
|
|
|
$doesntrun{$pidfile} = 1;
|
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
|
2008-01-04 14:00:40 +01:00
|
|
|
# Find out ssh daemon canonical file name
|
|
|
|
my $sshd = find_sshd();
|
|
|
|
if(!$sshd) {
|
|
|
|
logmsg "RUN: SOCKS server cannot find $sshdexe\n";
|
|
|
|
$doesntrun{$pidfile} = 1;
|
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
|
|
|
|
# Find out ssh daemon version info
|
|
|
|
($sshdid, $sshdvernum, $sshdverstr, $sshderror) = sshversioninfo($sshd);
|
|
|
|
if(!$sshdid) {
|
|
|
|
# Not an OpenSSH or SunSSH ssh daemon
|
|
|
|
logmsg "$sshderror\n" if($verbose);
|
|
|
|
logmsg "SCP, SFTP and SOCKS tests require OpenSSH 2.9.9 or later\n";
|
|
|
|
$doesntrun{$pidfile} = 1;
|
|
|
|
return (0,0);
|
|
|
|
}
|
2008-01-04 20:56:56 +01:00
|
|
|
logmsg "ssh server found $sshd is $sshdverstr\n" if($verbose);
|
2008-01-04 14:00:40 +01:00
|
|
|
|
2008-01-03 21:48:22 +01:00
|
|
|
# Find out ssh client canonical file name
|
|
|
|
my $ssh = find_ssh();
|
|
|
|
if(!$ssh) {
|
|
|
|
logmsg "RUN: SOCKS server cannot find $sshexe\n";
|
|
|
|
$doesntrun{$pidfile} = 1;
|
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
|
|
|
|
# Find out ssh client version info
|
2008-01-04 14:00:40 +01:00
|
|
|
my ($sshid, $sshvernum, $sshverstr, $ssherror) = sshversioninfo($ssh);
|
2008-01-03 21:48:22 +01:00
|
|
|
if(!$sshid) {
|
|
|
|
# Not an OpenSSH or SunSSH ssh client
|
|
|
|
logmsg "$ssherror\n" if($verbose);
|
|
|
|
logmsg "SCP, SFTP and SOCKS tests require OpenSSH 2.9.9 or later\n";
|
|
|
|
$doesntrun{$pidfile} = 1;
|
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
|
|
|
|
# Verify minimum ssh client version
|
|
|
|
if((($sshid =~ /OpenSSH/) && ($sshvernum < 299)) ||
|
|
|
|
(($sshid =~ /SunSSH/) && ($sshvernum < 100))) {
|
|
|
|
logmsg "ssh client found $ssh is $sshverstr\n";
|
|
|
|
logmsg "SCP, SFTP and SOCKS tests require OpenSSH 2.9.9 or later\n";
|
|
|
|
$doesntrun{$pidfile} = 1;
|
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
logmsg "ssh client found $ssh is $sshverstr\n" if($verbose);
|
|
|
|
|
2008-01-04 14:00:40 +01:00
|
|
|
# Verify if ssh client and ssh daemon versions match
|
|
|
|
if(($sshdid ne $sshid) || ($sshdvernum != $sshvernum)) {
|
2008-01-08 21:12:43 +01:00
|
|
|
# Our test harness might work with slightly mismatched versions
|
|
|
|
logmsg "Warning: version mismatch: sshd $sshdverstr - ssh $sshverstr\n"
|
2008-01-04 14:00:40 +01:00
|
|
|
if($verbose);
|
|
|
|
}
|
|
|
|
|
2008-01-03 21:48:22 +01:00
|
|
|
# Config file options for ssh client are previously set from sshserver.pl
|
|
|
|
if(! -e $sshconfig) {
|
|
|
|
logmsg "RUN: SOCKS server cannot find $sshconfig\n";
|
|
|
|
$doesntrun{$pidfile} = 1;
|
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
|
|
|
|
# start our socks server
|
|
|
|
my $cmd="$ssh -N -F $sshconfig $ip > $sshlog 2>&1";
|
|
|
|
my ($sshpid, $pid2) = startnew($cmd, $pidfile, 30, 1);
|
2007-06-05 15:50:59 +02:00
|
|
|
|
2007-06-07 21:49:09 +02:00
|
|
|
if($sshpid <= 0 || !kill(0, $sshpid)) {
|
2007-06-05 15:50:59 +02:00
|
|
|
# it is NOT alive
|
|
|
|
logmsg "RUN: failed to start the SOCKS server\n";
|
2008-01-03 21:48:22 +01:00
|
|
|
display_sshlog();
|
2008-01-04 14:00:40 +01:00
|
|
|
display_sshconfig();
|
2008-01-08 01:39:31 +01:00
|
|
|
display_sshdlog();
|
|
|
|
display_sshdconfig();
|
2007-11-26 15:26:40 +01:00
|
|
|
stopserver("$pid2");
|
2007-11-17 00:06:53 +01:00
|
|
|
$doesntrun{$pidfile} = 1;
|
2007-06-05 15:50:59 +02:00
|
|
|
return (0,0);
|
|
|
|
}
|
|
|
|
|
|
|
|
# Ugly hack but ssh doesn't support pid files
|
2008-01-18 10:18:59 +01:00
|
|
|
my $pid3 = verifyserver("socks",$ip,$port);
|
|
|
|
if(!$pid3) {
|
2007-06-05 15:50:59 +02:00
|
|
|
logmsg "RUN: SOCKS server failed verification\n";
|
2007-11-26 15:26:40 +01:00
|
|
|
# failed to talk to it properly. Kill the server and return failure
|
|
|
|
stopserver("$sshpid $pid2");
|
2007-11-17 00:06:53 +01:00
|
|
|
$doesntrun{$pidfile} = 1;
|
2007-06-05 15:50:59 +02:00
|
|
|
return (0,0);
|
|
|
|
}
|
2008-02-12 14:47:56 +01:00
|
|
|
$pid2 = $pid3;
|
2008-01-18 10:18:59 +01:00
|
|
|
|
2007-06-05 15:50:59 +02:00
|
|
|
if($verbose) {
|
2008-01-18 10:18:59 +01:00
|
|
|
logmsg "RUN: SOCKS server is now running PID $pid2\n";
|
2007-06-05 15:50:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return ($pid2, $sshpid);
|
|
|
|
}
|
|
|
|
|
2000-11-14 11:18:44 +01:00
|
|
|
#######################################################################
|
|
|
|
# Remove all files in the specified directory
|
|
|
|
#
|
|
|
|
sub cleardir {
|
|
|
|
my $dir = $_[0];
|
|
|
|
my $count;
|
2000-11-15 08:09:37 +01:00
|
|
|
my $file;
|
2000-11-14 11:18:44 +01:00
|
|
|
|
|
|
|
# Get all files
|
|
|
|
opendir(DIR, $dir) ||
|
|
|
|
return 0; # can't open dir
|
|
|
|
while($file = readdir(DIR)) {
|
|
|
|
if($file !~ /^\./) {
|
|
|
|
unlink("$dir/$file");
|
|
|
|
$count++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
closedir DIR;
|
|
|
|
return $count;
|
|
|
|
}
|
|
|
|
|
|
|
|
#######################################################################
|
|
|
|
# filter out the specified pattern from the given input file and store the
|
|
|
|
# results in the given output file
|
|
|
|
#
|
2000-11-13 17:06:16 +01:00
|
|
|
sub filteroff {
|
|
|
|
my $infile=$_[0];
|
|
|
|
my $filter=$_[1];
|
|
|
|
my $ofile=$_[2];
|
|
|
|
|
2007-06-08 19:03:50 +02:00
|
|
|
open(IN, "<$infile")
|
2000-11-13 17:06:16 +01:00
|
|
|
|| return 1;
|
|
|
|
|
2007-06-08 19:03:50 +02:00
|
|
|
open(OUT, ">$ofile")
|
2000-11-13 17:06:16 +01:00
|
|
|
|| return 1;
|
|
|
|
|
2005-05-25 14:26:20 +02:00
|
|
|
# logmsg "FILTER: off $filter from $infile to $ofile\n";
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2007-06-08 00:42:26 +02:00
|
|
|
while(<IN>) {
|
2000-11-13 17:06:16 +01:00
|
|
|
$_ =~ s/$filter//;
|
2007-06-08 00:42:26 +02:00
|
|
|
print OUT $_;
|
2000-11-13 17:06:16 +01:00
|
|
|
}
|
2007-06-08 00:42:26 +02:00
|
|
|
close(IN);
|
|
|
|
close(OUT);
|
2000-11-13 17:06:16 +01:00
|
|
|
return 0;
|
|
|
|
}
|
2000-11-14 11:18:44 +01:00
|
|
|
|
|
|
|
#######################################################################
|
|
|
|
# compare test results with the expected output, we might filter off
|
|
|
|
# some pattern that is allowed to differ, output test results
|
|
|
|
#
|
|
|
|
|
2000-11-13 17:06:16 +01:00
|
|
|
sub compare {
|
2001-05-28 17:26:15 +02:00
|
|
|
# filter off patterns _before_ this comparison!
|
2003-04-30 19:15:38 +02:00
|
|
|
my ($subject, $firstref, $secondref)=@_;
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2001-05-23 17:02:58 +02:00
|
|
|
my $result = compareparts($firstref, $secondref);
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2003-04-30 19:15:38 +02:00
|
|
|
if($result) {
|
|
|
|
if(!$short) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "\n $subject FAILED:\n";
|
|
|
|
logmsg showdiff($LOGDIR, $firstref, $secondref);
|
2003-04-30 19:15:38 +02:00
|
|
|
}
|
|
|
|
else {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "FAILED\n";
|
2003-04-30 19:15:38 +02:00
|
|
|
}
|
2000-11-17 16:15:48 +01:00
|
|
|
}
|
2001-05-23 17:02:58 +02:00
|
|
|
return $result;
|
2000-11-13 17:06:16 +01:00
|
|
|
}
|
|
|
|
|
2000-11-14 11:18:44 +01:00
|
|
|
#######################################################################
|
|
|
|
# display information about curl and the host the test suite runs on
|
|
|
|
#
|
2005-04-28 23:04:58 +02:00
|
|
|
sub checksystem {
|
2000-11-17 16:07:29 +01:00
|
|
|
|
|
|
|
unlink($memdump); # remove this if there was one left
|
|
|
|
|
2004-11-26 09:41:39 +01:00
|
|
|
my $feat;
|
2003-06-26 13:44:01 +02:00
|
|
|
my $curl;
|
|
|
|
my $libcurl;
|
2005-12-08 12:29:47 +01:00
|
|
|
my $versretval;
|
|
|
|
my $versnoexec;
|
|
|
|
my @version=();
|
|
|
|
|
|
|
|
my $curlverout="$LOGDIR/curlverout.log";
|
|
|
|
my $curlvererr="$LOGDIR/curlvererr.log";
|
|
|
|
my $versioncmd="$CURL --version 1>$curlverout 2>$curlvererr";
|
|
|
|
|
|
|
|
unlink($curlverout);
|
|
|
|
unlink($curlvererr);
|
|
|
|
|
2007-09-20 22:39:17 +02:00
|
|
|
$versretval = runclient($versioncmd);
|
2005-12-08 12:29:47 +01:00
|
|
|
$versnoexec = $!;
|
|
|
|
|
2007-06-08 19:03:50 +02:00
|
|
|
open(VERSOUT, "<$curlverout");
|
2007-06-08 00:42:26 +02:00
|
|
|
@version = <VERSOUT>;
|
|
|
|
close(VERSOUT);
|
2005-12-08 12:29:47 +01:00
|
|
|
|
2003-06-26 13:44:01 +02:00
|
|
|
for(@version) {
|
|
|
|
chomp;
|
2001-04-26 10:32:12 +02:00
|
|
|
|
2003-06-26 13:44:01 +02:00
|
|
|
if($_ =~ /^curl/) {
|
|
|
|
$curl = $_;
|
|
|
|
$curl =~ s/^(.*)(libcurl.*)/$1/g;
|
2005-04-27 11:59:29 +02:00
|
|
|
|
2003-06-26 13:44:01 +02:00
|
|
|
$libcurl = $2;
|
2004-03-29 11:26:31 +02:00
|
|
|
if($curl =~ /mingw32/) {
|
|
|
|
# This is a windows minw32 build, we need to translate the
|
|
|
|
# given path to the "actual" windows path.
|
|
|
|
|
|
|
|
my @m = `mount`;
|
|
|
|
my $matchlen;
|
|
|
|
my $bestmatch;
|
|
|
|
my $mount;
|
|
|
|
|
|
|
|
# example mount output:
|
|
|
|
# C:\DOCUME~1\Temp on /tmp type user (binmode,noumount)
|
|
|
|
# c:\ActiveState\perl on /perl type user (binmode)
|
|
|
|
# C:\msys\1.0\bin on /usr/bin type user (binmode,cygexec,noumount)
|
|
|
|
# C:\msys\1.0\bin on /bin type user (binmode,cygexec,noumount)
|
|
|
|
|
|
|
|
foreach $mount (@m) {
|
|
|
|
if( $mount =~ /(.*) on ([^ ]*) type /) {
|
|
|
|
my ($mingw, $real)=($2, $1);
|
|
|
|
if($pwd =~ /^$mingw/) {
|
|
|
|
# the path we got from pwd starts with the path
|
|
|
|
# we found on this line in the mount output
|
|
|
|
|
|
|
|
my $len = length($real);
|
|
|
|
if($len > $matchlen) {
|
|
|
|
# we remember the match that is the longest
|
|
|
|
$matchlen = $len;
|
|
|
|
$bestmatch = $real;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if(!$matchlen) {
|
2007-04-03 14:27:03 +02:00
|
|
|
logmsg "Serious error, can't find our \"real\" path\n";
|
2004-03-29 11:26:31 +02:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
# now prepend the prefix from the mount command to build
|
|
|
|
# our "actual path"
|
|
|
|
$pwd = "$bestmatch$pwd";
|
|
|
|
}
|
|
|
|
$pwd =~ s#\\#/#g;
|
|
|
|
}
|
2005-04-12 09:18:48 +02:00
|
|
|
elsif ($curl =~ /win32/) {
|
2003-08-12 23:18:39 +02:00
|
|
|
# Native Windows builds don't understand the
|
|
|
|
# output of cygwin's pwd. It will be
|
|
|
|
# something like /cygdrive/c/<some path>.
|
|
|
|
#
|
|
|
|
# Use the cygpath utility to convert the
|
|
|
|
# working directory to a Windows friendly
|
|
|
|
# path. The -m option converts to use drive
|
|
|
|
# letter:, but it uses / instead \. Forward
|
|
|
|
# slashes (/) are easier for us. We don't
|
|
|
|
# have to escape them to get them to curl
|
|
|
|
# through a shell.
|
|
|
|
chomp($pwd = `cygpath -m $pwd`);
|
|
|
|
}
|
2005-04-27 11:59:29 +02:00
|
|
|
elsif ($libcurl =~ /openssl/i) {
|
2005-04-12 09:18:48 +02:00
|
|
|
$has_openssl=1;
|
2007-03-18 23:37:23 +01:00
|
|
|
$ssllib="OpenSSL";
|
2005-04-12 09:18:48 +02:00
|
|
|
}
|
2005-04-27 11:59:29 +02:00
|
|
|
elsif ($libcurl =~ /gnutls/i) {
|
2005-04-12 09:18:48 +02:00
|
|
|
$has_gnutls=1;
|
2007-03-18 23:37:23 +01:00
|
|
|
$ssllib="GnuTLS";
|
2005-04-12 09:18:48 +02:00
|
|
|
}
|
2007-02-12 23:32:37 +01:00
|
|
|
elsif ($libcurl =~ /nss/i) {
|
|
|
|
$has_nss=1;
|
2007-03-18 23:37:23 +01:00
|
|
|
$ssllib="NSS";
|
|
|
|
}
|
|
|
|
elsif ($libcurl =~ /yassl/i) {
|
|
|
|
$has_yassl=1;
|
|
|
|
$has_openssl=1;
|
|
|
|
$ssllib="yassl";
|
2007-02-12 23:32:37 +01:00
|
|
|
}
|
2003-06-26 13:44:01 +02:00
|
|
|
}
|
|
|
|
elsif($_ =~ /^Protocols: (.*)/i) {
|
2007-03-09 22:01:39 +01:00
|
|
|
# these are the protocols compiled in to this libcurl
|
|
|
|
@protocols = split(' ', $1);
|
|
|
|
|
|
|
|
# Generate a "proto-ipv6" version of each protocol to match the
|
|
|
|
# IPv6 <server> name. This works even if IPv6 support isn't
|
|
|
|
# compiled in because the <features> test will fail.
|
|
|
|
push @protocols, map($_ . "-ipv6", @protocols);
|
|
|
|
|
|
|
|
# 'none' is used in test cases to mean no server
|
|
|
|
push @protocols, ('none');
|
2003-06-26 13:44:01 +02:00
|
|
|
}
|
|
|
|
elsif($_ =~ /^Features: (.*)/i) {
|
2004-11-26 09:41:39 +01:00
|
|
|
$feat = $1;
|
2003-06-26 13:44:01 +02:00
|
|
|
if($feat =~ /debug/i) {
|
|
|
|
# debug is a listed "feature", use that knowledge
|
|
|
|
$curl_debug = 1;
|
|
|
|
# set the NETRC debug env
|
2008-06-19 03:12:02 +02:00
|
|
|
$ENV{'CURL_DEBUG_NETRC'} = "$LOGDIR/netrc";
|
2003-06-26 13:44:01 +02:00
|
|
|
}
|
|
|
|
if($feat =~ /SSL/i) {
|
|
|
|
# ssl enabled
|
|
|
|
$ssl_version=1;
|
|
|
|
}
|
2004-03-01 17:24:54 +01:00
|
|
|
if($feat =~ /Largefile/i) {
|
|
|
|
# large file support
|
|
|
|
$large_file=1;
|
|
|
|
}
|
2004-04-30 10:03:07 +02:00
|
|
|
if($feat =~ /IDN/i) {
|
|
|
|
# IDN support
|
|
|
|
$has_idn=1;
|
|
|
|
}
|
2004-11-25 23:21:49 +01:00
|
|
|
if($feat =~ /IPv6/i) {
|
|
|
|
$has_ipv6 = 1;
|
|
|
|
}
|
2004-11-29 13:23:02 +01:00
|
|
|
if($feat =~ /libz/i) {
|
|
|
|
$has_libz = 1;
|
|
|
|
}
|
2005-03-21 09:14:32 +01:00
|
|
|
if($feat =~ /NTLM/i) {
|
|
|
|
# NTLM enabled
|
|
|
|
$has_ntlm=1;
|
|
|
|
}
|
2003-06-26 13:44:01 +02:00
|
|
|
}
|
|
|
|
}
|
2004-02-12 15:40:08 +01:00
|
|
|
if(!$curl) {
|
2007-04-03 14:27:03 +02:00
|
|
|
logmsg "unable to get curl's version, further details are:\n";
|
2005-12-08 12:29:47 +01:00
|
|
|
logmsg "issued command: \n";
|
2005-12-05 20:23:56 +01:00
|
|
|
logmsg "$versioncmd \n";
|
2005-12-08 12:29:47 +01:00
|
|
|
if ($versretval == -1) {
|
|
|
|
logmsg "command failed with: \n";
|
|
|
|
logmsg "$versnoexec \n";
|
|
|
|
}
|
|
|
|
elsif ($versretval & 127) {
|
2006-09-06 12:03:34 +02:00
|
|
|
logmsg sprintf("command died with signal %d, and %s coredump.\n",
|
2005-12-08 12:29:47 +01:00
|
|
|
($versretval & 127), ($versretval & 128)?"a":"no");
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
logmsg sprintf("command exited with value %d \n", $versretval >> 8);
|
2005-12-05 20:23:56 +01:00
|
|
|
}
|
2005-12-08 12:29:47 +01:00
|
|
|
logmsg "contents of $curlverout: \n";
|
|
|
|
displaylogcontent("$curlverout");
|
|
|
|
logmsg "contents of $curlvererr: \n";
|
|
|
|
displaylogcontent("$curlvererr");
|
2007-04-03 14:27:03 +02:00
|
|
|
die "couldn't get curl's version";
|
2004-02-12 15:40:08 +01:00
|
|
|
}
|
2001-04-26 10:32:12 +02:00
|
|
|
|
2004-11-22 23:26:46 +01:00
|
|
|
if(-r "../lib/config.h") {
|
2007-06-08 19:03:50 +02:00
|
|
|
open(CONF, "<../lib/config.h");
|
2007-06-08 00:42:26 +02:00
|
|
|
while(<CONF>) {
|
2004-11-22 23:26:46 +01:00
|
|
|
if($_ =~ /^\#define HAVE_GETRLIMIT/) {
|
|
|
|
$has_getrlimit = 1;
|
|
|
|
}
|
|
|
|
}
|
2007-06-08 00:42:26 +02:00
|
|
|
close(CONF);
|
2004-11-22 23:26:46 +01:00
|
|
|
}
|
|
|
|
|
2004-12-11 22:41:00 +01:00
|
|
|
if($has_ipv6) {
|
2005-04-18 08:57:44 +02:00
|
|
|
# client has ipv6 support
|
|
|
|
|
|
|
|
# check if the HTTP server has it!
|
2004-12-11 22:41:00 +01:00
|
|
|
my @sws = `server/sws --version`;
|
|
|
|
if($sws[0] =~ /IPv6/) {
|
|
|
|
# HTTP server has ipv6 support!
|
|
|
|
$http_ipv6 = 1;
|
|
|
|
}
|
2005-04-18 08:57:44 +02:00
|
|
|
|
|
|
|
# check if the FTP server has it!
|
2005-04-28 10:23:25 +02:00
|
|
|
@sws = `server/sockfilt --version`;
|
2005-04-18 08:57:44 +02:00
|
|
|
if($sws[0] =~ /IPv6/) {
|
|
|
|
# FTP server has ipv6 support!
|
|
|
|
$ftp_ipv6 = 1;
|
|
|
|
}
|
2004-12-11 22:41:00 +01:00
|
|
|
}
|
|
|
|
|
2004-06-14 10:25:54 +02:00
|
|
|
if(!$curl_debug && $torture) {
|
|
|
|
die "can't run torture tests since curl was not build with debug";
|
|
|
|
}
|
|
|
|
|
2007-03-12 21:50:16 +01:00
|
|
|
# curl doesn't list cryptographic support separately, so assume it's
|
|
|
|
# always available
|
|
|
|
$has_crypto=1;
|
|
|
|
|
2007-09-20 22:39:17 +02:00
|
|
|
my $hostname=join(' ', runclientoutput("hostname"));
|
|
|
|
my $hosttype=join(' ', runclientoutput("uname -a"));
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg ("********* System characteristics ******** \n",
|
2001-04-26 10:32:12 +02:00
|
|
|
"* $curl\n",
|
|
|
|
"* $libcurl\n",
|
2004-11-26 09:41:39 +01:00
|
|
|
"* Features: $feat\n",
|
2000-11-17 16:15:48 +01:00
|
|
|
"* Host: $hostname",
|
2005-05-25 14:26:20 +02:00
|
|
|
"* System: $hosttype");
|
|
|
|
|
|
|
|
logmsg sprintf("* Server SSL: %s\n", $stunnel?"ON":"OFF");
|
|
|
|
logmsg sprintf("* libcurl SSL: %s\n", $ssl_version?"ON":"OFF");
|
|
|
|
logmsg sprintf("* libcurl debug: %s\n", $curl_debug?"ON":"OFF");
|
|
|
|
logmsg sprintf("* valgrind: %s\n", $valgrind?"ON":"OFF");
|
|
|
|
logmsg sprintf("* HTTP IPv6 %s\n", $http_ipv6?"ON":"OFF");
|
|
|
|
logmsg sprintf("* FTP IPv6 %s\n", $ftp_ipv6?"ON":"OFF");
|
|
|
|
|
|
|
|
logmsg sprintf("* HTTP port: %d\n", $HTTPPORT);
|
|
|
|
logmsg sprintf("* FTP port: %d\n", $FTPPORT);
|
|
|
|
logmsg sprintf("* FTP port 2: %d\n", $FTP2PORT);
|
2004-09-08 10:08:38 +02:00
|
|
|
if($stunnel) {
|
2007-03-08 03:38:49 +01:00
|
|
|
logmsg sprintf("* FTPS port: %d\n", $FTPSPORT);
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg sprintf("* HTTPS port: %d\n", $HTTPSPORT);
|
2004-12-11 22:41:00 +01:00
|
|
|
}
|
|
|
|
if($http_ipv6) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg sprintf("* HTTP IPv6 port: %d\n", $HTTP6PORT);
|
2004-09-08 10:08:38 +02:00
|
|
|
}
|
2005-04-18 08:57:44 +02:00
|
|
|
if($ftp_ipv6) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg sprintf("* FTP IPv6 port: %d\n", $FTP6PORT);
|
2005-04-18 08:57:44 +02:00
|
|
|
}
|
2005-09-15 22:25:02 +02:00
|
|
|
logmsg sprintf("* TFTP port: %d\n", $TFTPPORT);
|
|
|
|
if($tftp_ipv6) {
|
|
|
|
logmsg sprintf("* TFTP IPv6 port: %d\n", $TFTP6PORT);
|
|
|
|
}
|
2007-03-24 02:01:28 +01:00
|
|
|
logmsg sprintf("* SCP/SFTP port: %d\n", $SSHPORT);
|
2007-06-05 15:50:59 +02:00
|
|
|
logmsg sprintf("* SOCKS port: %d\n", $SOCKSPORT);
|
2006-09-06 12:03:34 +02:00
|
|
|
|
2005-04-27 11:59:29 +02:00
|
|
|
if($ssl_version) {
|
2007-03-24 02:01:28 +01:00
|
|
|
logmsg sprintf("* SSL library: %s\n", $ssllib);
|
2005-04-27 11:59:29 +02:00
|
|
|
}
|
|
|
|
|
2005-04-28 23:04:58 +02:00
|
|
|
$has_textaware = ($^O eq 'MSWin32') || ($^O eq 'msys');
|
|
|
|
|
2006-03-03 15:37:44 +01:00
|
|
|
logmsg sprintf("* Libtool lib: %s\n", $libtool?"ON":"OFF");
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "***************************************** \n";
|
2000-11-13 17:06:16 +01:00
|
|
|
}
|
|
|
|
|
2002-05-22 00:20:52 +02:00
|
|
|
#######################################################################
|
2004-05-17 12:53:34 +02:00
|
|
|
# substitute the variable stuff into either a joined up file or
|
2002-05-22 00:20:52 +02:00
|
|
|
# a command, in either case passed by reference
|
|
|
|
#
|
|
|
|
sub subVariables {
|
|
|
|
my ($thing) = @_;
|
|
|
|
$$thing =~ s/%HOSTIP/$HOSTIP/g;
|
2004-09-08 10:08:38 +02:00
|
|
|
$$thing =~ s/%HTTPPORT/$HTTPPORT/g;
|
2004-12-11 22:41:00 +01:00
|
|
|
$$thing =~ s/%HOST6IP/$HOST6IP/g;
|
|
|
|
$$thing =~ s/%HTTP6PORT/$HTTP6PORT/g;
|
2002-05-22 00:20:52 +02:00
|
|
|
$$thing =~ s/%HTTPSPORT/$HTTPSPORT/g;
|
|
|
|
$$thing =~ s/%FTPPORT/$FTPPORT/g;
|
2005-04-18 08:57:44 +02:00
|
|
|
$$thing =~ s/%FTP6PORT/$FTP6PORT/g;
|
2005-01-17 21:20:34 +01:00
|
|
|
$$thing =~ s/%FTP2PORT/$FTP2PORT/g;
|
2002-05-22 00:20:52 +02:00
|
|
|
$$thing =~ s/%FTPSPORT/$FTPSPORT/g;
|
|
|
|
$$thing =~ s/%SRCDIR/$srcdir/g;
|
|
|
|
$$thing =~ s/%PWD/$pwd/g;
|
2005-09-15 22:25:02 +02:00
|
|
|
$$thing =~ s/%TFTPPORT/$TFTPPORT/g;
|
|
|
|
$$thing =~ s/%TFTP6PORT/$TFTP6PORT/g;
|
2007-03-24 02:01:28 +01:00
|
|
|
$$thing =~ s/%SSHPORT/$SSHPORT/g;
|
2007-06-05 15:50:59 +02:00
|
|
|
$$thing =~ s/%SOCKSPORT/$SOCKSPORT/g;
|
2007-01-18 19:04:20 +01:00
|
|
|
$$thing =~ s/%CURL/$CURL/g;
|
2007-03-24 02:01:28 +01:00
|
|
|
$$thing =~ s/%USER/$USER/g;
|
2007-09-17 23:42:01 +02:00
|
|
|
$$thing =~ s/%CLIENTIP/$CLIENTIP/g;
|
|
|
|
$$thing =~ s/%CLIENT6IP/$CLIENT6IP/g;
|
2006-05-11 08:34:30 +02:00
|
|
|
|
|
|
|
# The purpose of FTPTIME2 and FTPTIME3 is to provide times that can be
|
|
|
|
# used for time-out tests and that whould work on most hosts as these
|
|
|
|
# adjust for the startup/check time for this particular host. We needed
|
|
|
|
# to do this to make the test suite run better on very slow hosts.
|
|
|
|
|
|
|
|
my $ftp2 = $ftpchecktime * 2;
|
|
|
|
my $ftp3 = $ftpchecktime * 3;
|
|
|
|
|
|
|
|
$$thing =~ s/%FTPTIME2/$ftp2/g;
|
|
|
|
$$thing =~ s/%FTPTIME3/$ftp3/g;
|
2002-05-22 00:20:52 +02:00
|
|
|
}
|
|
|
|
|
2004-09-08 10:08:38 +02:00
|
|
|
sub fixarray {
|
|
|
|
my @in = @_;
|
|
|
|
|
|
|
|
for(@in) {
|
|
|
|
subVariables \$_;
|
|
|
|
}
|
|
|
|
return @in;
|
|
|
|
}
|
|
|
|
|
2000-11-14 11:18:44 +01:00
|
|
|
#######################################################################
|
|
|
|
# Run a single specified test case
|
|
|
|
#
|
|
|
|
|
2000-11-13 17:06:16 +01:00
|
|
|
sub singletest {
|
2005-04-22 13:51:06 +02:00
|
|
|
my ($testnum, $count, $total)=@_;
|
2001-05-23 17:02:58 +02:00
|
|
|
|
2003-06-26 13:44:01 +02:00
|
|
|
my @what;
|
|
|
|
my $why;
|
2005-01-30 13:56:36 +01:00
|
|
|
my %feature;
|
2005-05-07 01:21:34 +02:00
|
|
|
my $cmd;
|
2003-06-26 13:44:01 +02:00
|
|
|
|
2001-05-23 17:02:58 +02:00
|
|
|
# load the test case file definition
|
|
|
|
if(loadtest("${TESTDIR}/test${testnum}")) {
|
|
|
|
if($verbose) {
|
|
|
|
# this is not a test
|
2007-04-03 14:27:03 +02:00
|
|
|
logmsg "RUN: $testnum doesn't look like a test case\n";
|
2001-05-23 17:02:58 +02:00
|
|
|
}
|
2004-12-16 15:18:11 +01:00
|
|
|
$why = "no test";
|
2003-06-26 13:44:01 +02:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
@what = getpart("client", "features");
|
2001-05-23 17:02:58 +02:00
|
|
|
}
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2003-06-12 18:38:14 +02:00
|
|
|
for(@what) {
|
|
|
|
my $f = $_;
|
|
|
|
$f =~ s/\s//g;
|
|
|
|
|
2005-01-30 13:56:36 +01:00
|
|
|
$feature{$f}=$f; # we require this feature
|
|
|
|
|
2003-06-12 18:38:14 +02:00
|
|
|
if($f eq "SSL") {
|
|
|
|
if($ssl_version) {
|
|
|
|
next;
|
|
|
|
}
|
|
|
|
}
|
2005-04-12 09:18:48 +02:00
|
|
|
elsif($f eq "OpenSSL") {
|
|
|
|
if($has_openssl) {
|
|
|
|
next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
elsif($f eq "GnuTLS") {
|
|
|
|
if($has_gnutls) {
|
|
|
|
next;
|
|
|
|
}
|
|
|
|
}
|
2007-02-12 23:32:37 +01:00
|
|
|
elsif($f eq "NSS") {
|
|
|
|
if($has_nss) {
|
|
|
|
next;
|
|
|
|
}
|
|
|
|
}
|
2003-06-12 18:38:14 +02:00
|
|
|
elsif($f eq "netrc_debug") {
|
2003-06-26 13:44:01 +02:00
|
|
|
if($curl_debug) {
|
2003-06-12 18:38:14 +02:00
|
|
|
next;
|
|
|
|
}
|
|
|
|
}
|
2004-03-01 17:24:54 +01:00
|
|
|
elsif($f eq "large_file") {
|
|
|
|
if($large_file) {
|
|
|
|
next;
|
|
|
|
}
|
|
|
|
}
|
2004-04-30 10:03:07 +02:00
|
|
|
elsif($f eq "idn") {
|
|
|
|
if($has_idn) {
|
|
|
|
next;
|
|
|
|
}
|
|
|
|
}
|
2004-11-25 23:21:49 +01:00
|
|
|
elsif($f eq "ipv6") {
|
|
|
|
if($has_ipv6) {
|
|
|
|
next;
|
|
|
|
}
|
|
|
|
}
|
2004-11-29 13:23:02 +01:00
|
|
|
elsif($f eq "libz") {
|
|
|
|
if($has_libz) {
|
|
|
|
next;
|
|
|
|
}
|
|
|
|
}
|
2005-03-21 09:14:32 +01:00
|
|
|
elsif($f eq "NTLM") {
|
|
|
|
if($has_ntlm) {
|
|
|
|
next;
|
|
|
|
}
|
|
|
|
}
|
2004-11-22 23:26:46 +01:00
|
|
|
elsif($f eq "getrlimit") {
|
|
|
|
if($has_getrlimit) {
|
|
|
|
next;
|
2007-03-10 00:39:42 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
elsif($f eq "crypto") {
|
|
|
|
if($has_crypto) {
|
|
|
|
next;
|
2004-11-22 23:26:46 +01:00
|
|
|
}
|
|
|
|
}
|
2007-06-05 15:50:59 +02:00
|
|
|
elsif($f eq "socks") {
|
|
|
|
next;
|
|
|
|
}
|
2007-03-09 22:01:39 +01:00
|
|
|
# See if this "feature" is in the list of supported protocols
|
|
|
|
elsif (grep /^$f$/, @protocols) {
|
|
|
|
next;
|
|
|
|
}
|
2003-06-12 18:38:14 +02:00
|
|
|
|
2004-01-12 15:34:48 +01:00
|
|
|
$why = "curl lacks $f support";
|
2003-06-26 13:44:01 +02:00
|
|
|
last;
|
2003-06-12 18:38:14 +02:00
|
|
|
}
|
|
|
|
|
2008-09-08 18:50:04 +02:00
|
|
|
my $dbghosttype=join(' ', runclientoutput("uname -a"));
|
|
|
|
if(($dbghosttype =~ /SMP PREEMPT/) && ($dbghosttype =~ /i686 GNU/)) {
|
2008-10-22 17:03:15 +02:00
|
|
|
if(!$curl_debug) {
|
|
|
|
if(($testnum != 1) && ($testnum != 100) &&
|
|
|
|
($testnum != 500) && ($testnum != 507) &&
|
|
|
|
($testnum != 517) && ($testnum != 534) &&
|
2008-10-26 04:03:29 +01:00
|
|
|
($testnum != 558) &&
|
2008-10-22 17:03:15 +02:00
|
|
|
($testnum != 557) && ($testnum != 1013)) {
|
|
|
|
$why = "debugging icc build";
|
|
|
|
}
|
|
|
|
}
|
2008-09-08 18:50:04 +02:00
|
|
|
}
|
|
|
|
|
2007-10-11 23:15:09 +02:00
|
|
|
if(!$why) {
|
|
|
|
my @keywords = getpart("info", "keywords");
|
2008-07-27 04:34:27 +02:00
|
|
|
my $match;
|
2007-10-11 23:15:09 +02:00
|
|
|
my $k;
|
|
|
|
for $k (@keywords) {
|
|
|
|
chomp $k;
|
|
|
|
if ($disabled_keywords{$k}) {
|
|
|
|
$why = "disabled by keyword";
|
2008-07-27 04:34:27 +02:00
|
|
|
} elsif ($enabled_keywords{$k}) {
|
|
|
|
$match = 1;
|
2007-10-11 23:15:09 +02:00
|
|
|
}
|
|
|
|
}
|
2008-07-27 04:34:27 +02:00
|
|
|
|
|
|
|
if(!$why && !$match && %enabled_keywords) {
|
|
|
|
$why = "disabled by missing keyword";
|
|
|
|
}
|
2007-10-11 23:15:09 +02:00
|
|
|
}
|
|
|
|
|
2008-02-11 21:10:36 +01:00
|
|
|
if(!$why) {
|
|
|
|
$why = serverfortest($testnum);
|
|
|
|
}
|
|
|
|
|
2004-12-16 15:18:11 +01:00
|
|
|
if(!$why) {
|
2004-11-23 10:50:16 +01:00
|
|
|
my @precheck = getpart("client", "precheck");
|
2005-05-07 01:21:34 +02:00
|
|
|
$cmd = $precheck[0];
|
2004-11-23 10:50:16 +01:00
|
|
|
chomp $cmd;
|
2007-01-18 19:04:20 +01:00
|
|
|
subVariables \$cmd;
|
2004-11-23 10:50:16 +01:00
|
|
|
if($cmd) {
|
2006-11-09 14:20:42 +01:00
|
|
|
my @o = `$cmd 2>/dev/null`;
|
2004-11-23 10:50:16 +01:00
|
|
|
if($o[0]) {
|
|
|
|
$why = $o[0];
|
|
|
|
chomp $why;
|
2008-10-15 19:41:02 +02:00
|
|
|
} elsif($?) {
|
|
|
|
$why = "precheck command error";
|
2004-11-23 10:50:16 +01:00
|
|
|
}
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "prechecked $cmd\n" if($verbose);
|
2004-11-23 10:50:16 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-10-11 23:15:09 +02:00
|
|
|
if($why && !$listonly) {
|
2004-12-16 15:18:11 +01:00
|
|
|
# there's a problem, count it as "skipped"
|
2003-06-26 13:44:01 +02:00
|
|
|
$skipped++;
|
|
|
|
$skipped{$why}++;
|
|
|
|
$teststat[$testnum]=$why; # store reason for this test case
|
2004-05-17 12:53:34 +02:00
|
|
|
|
2003-06-26 13:44:01 +02:00
|
|
|
if(!$short) {
|
2004-12-16 15:18:11 +01:00
|
|
|
printf "test %03d SKIPPED: $why\n", $testnum;
|
2003-06-26 13:44:01 +02:00
|
|
|
}
|
|
|
|
|
2003-01-27 14:51:35 +01:00
|
|
|
return -1;
|
|
|
|
}
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg sprintf("test %03d...", $testnum);
|
2003-01-27 14:51:35 +01:00
|
|
|
|
2001-05-23 17:02:58 +02:00
|
|
|
# extract the reply data
|
|
|
|
my @reply = getpart("reply", "data");
|
|
|
|
my @replycheck = getpart("reply", "datacheck");
|
|
|
|
|
|
|
|
if (@replycheck) {
|
2000-11-13 17:06:16 +01:00
|
|
|
# we use this file instead to check the final output against
|
2002-06-11 17:11:41 +02:00
|
|
|
|
|
|
|
my %hash = getpartattr("reply", "datacheck");
|
|
|
|
if($hash{'nonewline'}) {
|
|
|
|
# Yes, we must cut off the final newline from the final line
|
|
|
|
# of the datacheck
|
|
|
|
chomp($replycheck[$#replycheck]);
|
|
|
|
}
|
2004-05-17 12:53:34 +02:00
|
|
|
|
2001-05-23 17:02:58 +02:00
|
|
|
@reply=@replycheck;
|
2000-11-13 17:06:16 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
# curl command to run
|
2004-09-08 10:08:38 +02:00
|
|
|
my @curlcmd= fixarray ( getpart("client", "command") );
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2001-05-23 17:02:58 +02:00
|
|
|
# this is the valid protocol blurb curl should generate
|
2004-09-08 10:08:38 +02:00
|
|
|
my @protocol= fixarray ( getpart("verify", "protocol") );
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2001-05-23 17:02:58 +02:00
|
|
|
# redirected stdout/stderr to these files
|
|
|
|
$STDOUT="$LOGDIR/stdout$testnum";
|
|
|
|
$STDERR="$LOGDIR/stderr$testnum";
|
2000-11-21 20:28:11 +01:00
|
|
|
|
2001-05-23 17:02:58 +02:00
|
|
|
# if this section exists, we verify that the stdout contained this:
|
2004-09-08 10:08:38 +02:00
|
|
|
my @validstdout = fixarray ( getpart("verify", "stdout") );
|
2000-11-21 20:28:11 +01:00
|
|
|
|
2001-05-23 17:02:58 +02:00
|
|
|
# if this section exists, we verify upload
|
|
|
|
my @upload = getpart("verify", "upload");
|
2000-11-21 20:28:11 +01:00
|
|
|
|
2005-04-15 00:52:08 +02:00
|
|
|
# if this section exists, it might be FTP server instructions:
|
|
|
|
my @ftpservercmd = getpart("reply", "servercmd");
|
2000-11-27 13:53:50 +01:00
|
|
|
|
2001-05-23 17:02:58 +02:00
|
|
|
my $CURLOUT="$LOGDIR/curl$testnum.out"; # curl output if not stdout
|
2000-11-21 20:28:11 +01:00
|
|
|
|
2000-11-13 17:06:16 +01:00
|
|
|
# name of the test
|
2001-05-23 17:02:58 +02:00
|
|
|
my @testname= getpart("client", "name");
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2000-11-14 11:18:44 +01:00
|
|
|
if(!$short) {
|
2001-05-23 17:02:58 +02:00
|
|
|
my $name = $testname[0];
|
|
|
|
$name =~ s/\n//g;
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "[$name]\n";
|
2000-11-14 11:18:44 +01:00
|
|
|
}
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2002-01-04 14:20:17 +01:00
|
|
|
if($listonly) {
|
|
|
|
return 0; # look successful
|
|
|
|
}
|
|
|
|
|
2002-12-12 13:20:06 +01:00
|
|
|
my @codepieces = getpart("client", "tool");
|
|
|
|
|
|
|
|
my $tool="";
|
|
|
|
if(@codepieces) {
|
|
|
|
$tool = $codepieces[0];
|
|
|
|
chomp $tool;
|
|
|
|
}
|
|
|
|
|
2005-01-20 23:48:43 +01:00
|
|
|
# remove server output logfiles
|
2002-01-04 14:20:17 +01:00
|
|
|
unlink($SERVERIN);
|
2005-01-20 23:48:43 +01:00
|
|
|
unlink($SERVER2IN);
|
2002-01-04 14:20:17 +01:00
|
|
|
|
|
|
|
if(@ftpservercmd) {
|
|
|
|
# write the instructions to file
|
|
|
|
writearray($FTPDCMD, \@ftpservercmd);
|
|
|
|
}
|
|
|
|
|
2003-05-19 15:06:10 +02:00
|
|
|
my (@setenv)= getpart("client", "setenv");
|
|
|
|
my @envs;
|
|
|
|
|
|
|
|
my $s;
|
|
|
|
for $s (@setenv) {
|
|
|
|
chomp $s; # cut off the newline
|
|
|
|
|
|
|
|
subVariables \$s;
|
|
|
|
|
|
|
|
if($s =~ /([^=]*)=(.*)/) {
|
|
|
|
my ($var, $content)=($1, $2);
|
|
|
|
$ENV{$var}=$content;
|
|
|
|
# remember which, so that we can clear them afterwards!
|
|
|
|
push @envs, $var;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-11-13 17:06:16 +01:00
|
|
|
# get the command line options to use
|
2005-05-07 01:21:34 +02:00
|
|
|
my @blaha;
|
|
|
|
($cmd, @blaha)= getpart("client", "command");
|
2000-11-13 17:06:16 +01:00
|
|
|
|
|
|
|
# make some nice replace operations
|
2001-05-23 17:02:58 +02:00
|
|
|
$cmd =~ s/\n//g; # no newlines please
|
2002-05-22 00:20:52 +02:00
|
|
|
|
2003-08-07 01:10:36 +02:00
|
|
|
# substitute variables in the command line
|
2002-05-22 00:20:52 +02:00
|
|
|
subVariables \$cmd;
|
|
|
|
|
2003-06-26 13:44:01 +02:00
|
|
|
if($curl_debug) {
|
2000-11-17 16:07:29 +01:00
|
|
|
unlink($memdump);
|
|
|
|
}
|
|
|
|
|
2008-03-06 02:11:43 +01:00
|
|
|
# create a (possibly-empty) file before starting the test
|
2001-05-28 17:26:15 +02:00
|
|
|
my @inputfile=getpart("client", "file");
|
2008-03-06 02:11:43 +01:00
|
|
|
my %fileattr = getpartattr("client", "file");
|
|
|
|
my $filename=$fileattr{'name'};
|
|
|
|
if(@inputfile || $filename) {
|
2001-05-28 17:26:15 +02:00
|
|
|
if(!$filename) {
|
2007-04-03 14:27:03 +02:00
|
|
|
logmsg "ERROR: section client=>file has no name attribute\n";
|
2005-05-16 09:07:00 +02:00
|
|
|
return -1;
|
2001-05-28 17:26:15 +02:00
|
|
|
}
|
2002-05-22 00:20:52 +02:00
|
|
|
my $fileContent = join('', @inputfile);
|
|
|
|
subVariables \$fileContent;
|
2005-05-25 14:26:20 +02:00
|
|
|
# logmsg "DEBUG: writing file " . $filename . "\n";
|
2007-06-08 19:03:50 +02:00
|
|
|
open(OUTFILE, ">$filename");
|
2007-06-08 00:42:26 +02:00
|
|
|
binmode OUTFILE; # for crapage systems, use binary
|
|
|
|
print OUTFILE $fileContent;
|
|
|
|
close(OUTFILE);
|
2001-05-28 17:26:15 +02:00
|
|
|
}
|
|
|
|
|
2002-01-08 10:32:41 +01:00
|
|
|
my %cmdhash = getpartattr("client", "command");
|
|
|
|
|
2000-11-17 16:07:29 +01:00
|
|
|
my $out="";
|
2002-01-08 10:32:41 +01:00
|
|
|
|
2003-08-07 01:10:36 +02:00
|
|
|
if($cmdhash{'option'} !~ /no-output/) {
|
|
|
|
#We may slap on --output!
|
2002-01-08 10:32:41 +01:00
|
|
|
if (!@validstdout) {
|
2002-12-12 17:46:45 +01:00
|
|
|
$out=" --output $CURLOUT ";
|
2002-01-08 10:32:41 +01:00
|
|
|
}
|
2000-11-17 16:07:29 +01:00
|
|
|
}
|
|
|
|
|
2008-04-25 06:19:50 +02:00
|
|
|
my $serverlogslocktimeout = $defserverlogslocktimeout;
|
|
|
|
if($cmdhash{'timeout'}) {
|
|
|
|
# test is allowed to override default server logs lock timeout
|
|
|
|
if($cmdhash{'timeout'} =~ /(\d+)/) {
|
|
|
|
$serverlogslocktimeout = $1 if($1 >= 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
my $postcommanddelay = $defpostcommanddelay;
|
|
|
|
if($cmdhash{'delay'}) {
|
|
|
|
# test is allowed to specify a delay after command is executed
|
|
|
|
if($cmdhash{'delay'} =~ /(\d+)/) {
|
|
|
|
$postcommanddelay = $1 if($1 > 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-12-12 13:20:06 +01:00
|
|
|
my $cmdargs;
|
|
|
|
if(!$tool) {
|
2008-06-08 22:53:49 +02:00
|
|
|
# run curl, add --verbose for debug information output
|
|
|
|
$cmdargs ="$out --include --verbose --trace-time $cmd";
|
2002-12-12 13:20:06 +01:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
$cmdargs = " $cmd"; # $cmd is the command line for the test file
|
|
|
|
$CURLOUT = $STDOUT; # sends received data to stdout
|
|
|
|
}
|
2000-11-17 16:07:29 +01:00
|
|
|
|
2001-06-14 14:16:07 +02:00
|
|
|
my @stdintest = getpart("client", "stdin");
|
2001-05-23 17:02:58 +02:00
|
|
|
|
|
|
|
if(@stdintest) {
|
|
|
|
my $stdinfile="$LOGDIR/stdin-for-$testnum";
|
|
|
|
writearray($stdinfile, \@stdintest);
|
|
|
|
|
|
|
|
$cmdargs .= " <$stdinfile";
|
2000-11-17 16:07:29 +01:00
|
|
|
}
|
2002-12-12 13:20:06 +01:00
|
|
|
my $CMDLINE;
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2002-12-12 13:20:06 +01:00
|
|
|
if(!$tool) {
|
|
|
|
$CMDLINE="$CURL";
|
2000-11-13 17:06:16 +01:00
|
|
|
}
|
2002-12-12 13:20:06 +01:00
|
|
|
else {
|
|
|
|
$CMDLINE="$LIBDIR/$tool";
|
2006-10-06 23:19:40 +02:00
|
|
|
if(! -f $CMDLINE) {
|
|
|
|
print "The tool set in the test case for this: '$tool' does not exist\n";
|
|
|
|
return -1;
|
|
|
|
}
|
2002-12-12 14:42:21 +01:00
|
|
|
$DBGCURL=$CMDLINE;
|
2002-12-12 13:20:06 +01:00
|
|
|
}
|
|
|
|
|
2007-10-25 21:39:52 +02:00
|
|
|
my $usevalgrind = $valgrind && ((getpart("verify", "valgrind"))[0] !~ /disable/);
|
|
|
|
if($usevalgrind) {
|
2008-06-19 03:12:02 +02:00
|
|
|
$CMDLINE = "$valgrind ".$valgrind_tool."--leak-check=yes --num-callers=16 ${valgrind_logfile}=$LOGDIR/valgrind$testnum $CMDLINE";
|
2004-04-22 12:33:55 +02:00
|
|
|
}
|
|
|
|
|
2003-08-07 01:10:36 +02:00
|
|
|
$CMDLINE .= "$cmdargs >>$STDOUT 2>>$STDERR";
|
2002-12-12 13:20:06 +01:00
|
|
|
|
|
|
|
if($verbose) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "$CMDLINE\n";
|
2004-04-13 07:57:50 +02:00
|
|
|
}
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2007-06-08 00:42:26 +02:00
|
|
|
print CMDLOG "$CMDLINE\n";
|
2000-11-21 18:07:16 +01:00
|
|
|
|
2004-04-30 10:03:07 +02:00
|
|
|
unlink("core");
|
|
|
|
|
|
|
|
my $dumped_core;
|
2003-12-17 16:33:04 +01:00
|
|
|
my $cmdres;
|
2004-05-10 11:01:45 +02:00
|
|
|
|
2007-04-24 00:58:45 +02:00
|
|
|
# Apr 2007: precommand isn't being used and could be removed
|
2004-06-17 10:06:03 +02:00
|
|
|
my @precommand= getpart("client", "precommand");
|
|
|
|
if($precommand[0]) {
|
|
|
|
# this is pure perl to eval!
|
|
|
|
my $code = join("", @precommand);
|
|
|
|
eval $code;
|
|
|
|
if($@) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "perl: $code\n";
|
|
|
|
logmsg "precommand: $@";
|
2006-11-20 17:58:04 +01:00
|
|
|
stopservers($verbose);
|
2005-05-16 09:07:00 +02:00
|
|
|
return -1;
|
2004-06-17 10:06:03 +02:00
|
|
|
}
|
|
|
|
}
|
2004-05-10 11:01:45 +02:00
|
|
|
|
2001-02-20 14:58:39 +01:00
|
|
|
if($gdbthis) {
|
2008-06-19 03:12:02 +02:00
|
|
|
open(GDBCMD, ">$LOGDIR/gdbcmd");
|
2007-06-08 00:42:26 +02:00
|
|
|
print GDBCMD "set args $cmdargs\n";
|
|
|
|
print GDBCMD "show args\n";
|
|
|
|
close(GDBCMD);
|
2004-05-10 11:01:45 +02:00
|
|
|
}
|
|
|
|
# run the command line we built
|
|
|
|
if ($torture) {
|
2007-04-24 00:58:45 +02:00
|
|
|
$cmdres = torture($CMDLINE,
|
2008-06-19 03:12:02 +02:00
|
|
|
"$gdb --directory libtest $DBGCURL -x $LOGDIR/gdbcmd");
|
2004-05-10 11:01:45 +02:00
|
|
|
}
|
|
|
|
elsif($gdbthis) {
|
2008-06-19 03:12:02 +02:00
|
|
|
runclient("$gdb --directory libtest $DBGCURL -x $LOGDIR/gdbcmd");
|
2003-12-17 16:33:04 +01:00
|
|
|
$cmdres=0; # makes it always continue after a debugged run
|
2001-02-20 14:58:39 +01:00
|
|
|
}
|
|
|
|
else {
|
2007-09-20 22:39:17 +02:00
|
|
|
$cmdres = runclient("$CMDLINE");
|
2003-12-17 16:33:04 +01:00
|
|
|
my $signal_num = $cmdres & 127;
|
2004-04-30 10:03:07 +02:00
|
|
|
$dumped_core = $cmdres & 128;
|
2003-10-29 17:27:43 +01:00
|
|
|
|
|
|
|
if(!$anyway && ($signal_num || $dumped_core)) {
|
2003-12-17 16:33:04 +01:00
|
|
|
$cmdres = 1000;
|
2003-10-29 17:27:43 +01:00
|
|
|
}
|
|
|
|
else {
|
2008-09-26 16:08:33 +02:00
|
|
|
$cmdres >>= 8;
|
2008-09-26 20:56:56 +02:00
|
|
|
$cmdres = (2000 + $signal_num) if($signal_num && !$cmdres);
|
2003-10-29 17:27:43 +01:00
|
|
|
}
|
2001-02-20 14:58:39 +01:00
|
|
|
}
|
2004-04-30 10:03:07 +02:00
|
|
|
if(!$dumped_core) {
|
|
|
|
if(-r "core") {
|
|
|
|
# there's core file present now!
|
|
|
|
$dumped_core = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if($dumped_core) {
|
2007-04-03 14:27:03 +02:00
|
|
|
logmsg "core dumped\n";
|
2004-05-05 22:12:59 +02:00
|
|
|
if(0 && $gdb) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "running gdb for post-mortem analysis:\n";
|
2008-06-19 03:12:02 +02:00
|
|
|
open(GDBCMD, ">$LOGDIR/gdbcmd2");
|
2007-06-08 00:42:26 +02:00
|
|
|
print GDBCMD "bt\n";
|
|
|
|
close(GDBCMD);
|
2008-06-19 03:12:02 +02:00
|
|
|
runclient("$gdb --directory libtest -x $LOGDIR/gdbcmd2 -batch $DBGCURL core ");
|
|
|
|
# unlink("$LOGDIR/gdbcmd2");
|
2004-04-30 10:03:07 +02:00
|
|
|
}
|
|
|
|
}
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2008-04-24 01:55:34 +02:00
|
|
|
# If a server logs advisor read lock file exists, it is an indication
|
|
|
|
# that the server has not yet finished writing out all its log files,
|
|
|
|
# including server request log files used for protocol verification.
|
|
|
|
# So, if the lock file exists the script waits here a certain amount
|
|
|
|
# of time until the server removes it, or the given time expires.
|
|
|
|
|
2008-04-25 06:19:50 +02:00
|
|
|
if($serverlogslocktimeout) {
|
|
|
|
my $lockretry = $serverlogslocktimeout * 4;
|
|
|
|
while((-f $SERVERLOGS_LOCK) && $lockretry--) {
|
|
|
|
select(undef, undef, undef, 0.25);
|
|
|
|
}
|
|
|
|
if(($lockretry < 0) &&
|
|
|
|
($serverlogslocktimeout >= $defserverlogslocktimeout)) {
|
|
|
|
logmsg "Warning: server logs lock timeout ",
|
|
|
|
"($serverlogslocktimeout seconds) expired\n";
|
2008-04-24 01:55:34 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-04-25 06:19:50 +02:00
|
|
|
# Test harness ssh server does not have this synchronization mechanism,
|
|
|
|
# this implies that some ssh server based tests might need a small delay
|
|
|
|
# once that the client command has run to avoid false test failures.
|
|
|
|
|
|
|
|
sleep($postcommanddelay) if($postcommanddelay);
|
|
|
|
|
2007-04-24 00:58:45 +02:00
|
|
|
# run the postcheck command
|
|
|
|
my @postcheck= getpart("client", "postcheck");
|
|
|
|
$cmd = $postcheck[0];
|
|
|
|
chomp $cmd;
|
|
|
|
subVariables \$cmd;
|
|
|
|
if($cmd) {
|
2008-04-21 19:19:44 +02:00
|
|
|
logmsg "postcheck $cmd\n" if($verbose);
|
2007-09-20 22:39:17 +02:00
|
|
|
my $rc = runclient("$cmd");
|
2008-04-21 19:19:44 +02:00
|
|
|
# Must run the postcheck command in torture mode in order
|
|
|
|
# to clean up, but the result can't be relied upon.
|
|
|
|
if($rc != 0 && !$torture) {
|
2007-11-01 18:42:39 +01:00
|
|
|
logmsg " postcheck FAILED\n";
|
2007-04-24 00:58:45 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2001-11-29 21:15:59 +01:00
|
|
|
# remove the special FTP command file after each test!
|
|
|
|
unlink($FTPDCMD);
|
|
|
|
|
2003-05-19 15:06:10 +02:00
|
|
|
my $e;
|
|
|
|
for $e (@envs) {
|
|
|
|
$ENV{$e}=""; # clean up
|
|
|
|
}
|
|
|
|
|
2007-04-25 01:28:57 +02:00
|
|
|
# Skip all the verification on torture tests
|
2007-04-24 00:58:45 +02:00
|
|
|
if ($torture) {
|
2007-04-25 01:28:57 +02:00
|
|
|
if(!$cmdres && !$keepoutfiles) {
|
|
|
|
cleardir($LOGDIR);
|
|
|
|
}
|
2007-04-24 00:58:45 +02:00
|
|
|
return $cmdres;
|
|
|
|
}
|
|
|
|
|
2001-05-23 17:02:58 +02:00
|
|
|
my @err = getpart("verify", "errorcode");
|
2005-03-17 09:17:48 +01:00
|
|
|
my $errorcode = $err[0] || "0";
|
2005-04-22 13:51:06 +02:00
|
|
|
my $ok="";
|
2003-12-17 16:33:04 +01:00
|
|
|
my $res;
|
2001-05-23 17:02:58 +02:00
|
|
|
if (@validstdout) {
|
|
|
|
# verify redirected stdout
|
|
|
|
my @actual = loadarray($STDOUT);
|
2000-11-17 16:58:25 +01:00
|
|
|
|
2008-05-01 12:51:16 +02:00
|
|
|
# variable-replace in the stdout we have from the test case file
|
|
|
|
@validstdout = fixarray(@validstdout);
|
|
|
|
|
2005-05-20 12:40:32 +02:00
|
|
|
# get all attributes
|
|
|
|
my %hash = getpartattr("verify", "stdout");
|
|
|
|
|
|
|
|
# get the mode attribute
|
|
|
|
my $filemode=$hash{'mode'};
|
|
|
|
if(($filemode eq "text") && $has_textaware) {
|
|
|
|
# text mode when running on windows: fix line endings
|
|
|
|
map s/\r\n/\n/g, @actual;
|
|
|
|
}
|
|
|
|
|
2008-01-05 00:31:04 +01:00
|
|
|
if($hash{'nonewline'}) {
|
|
|
|
# Yes, we must cut off the final newline from the final line
|
|
|
|
# of the protocol data
|
|
|
|
chomp($validstdout[$#validstdout]);
|
|
|
|
}
|
|
|
|
|
2003-04-30 19:15:38 +02:00
|
|
|
$res = compare("stdout", \@actual, \@validstdout);
|
2001-05-23 17:02:58 +02:00
|
|
|
if($res) {
|
2000-11-17 16:58:25 +01:00
|
|
|
return 1;
|
|
|
|
}
|
2005-04-22 13:51:06 +02:00
|
|
|
$ok .= "s";
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$ok .= "-"; # stdout not checked
|
2000-11-13 17:06:16 +01:00
|
|
|
}
|
2001-05-23 17:02:58 +02:00
|
|
|
|
2001-06-14 14:16:07 +02:00
|
|
|
my %replyattr = getpartattr("reply", "data");
|
2004-08-23 16:40:43 +02:00
|
|
|
if(!$replyattr{'nocheck'} && (@reply || $replyattr{'sendzero'})) {
|
2001-05-23 17:02:58 +02:00
|
|
|
# verify the received data
|
|
|
|
my @out = loadarray($CURLOUT);
|
2005-06-03 16:06:03 +02:00
|
|
|
my %hash = getpartattr("reply", "data");
|
|
|
|
# get the mode attribute
|
|
|
|
my $filemode=$hash{'mode'};
|
|
|
|
if(($filemode eq "text") && $has_textaware) {
|
|
|
|
# text mode when running on windows: fix line endings
|
|
|
|
map s/\r\n/\n/g, @out;
|
|
|
|
}
|
|
|
|
|
2003-04-30 19:15:38 +02:00
|
|
|
$res = compare("data", \@out, \@reply);
|
2001-05-23 17:02:58 +02:00
|
|
|
if ($res) {
|
2000-11-17 16:58:25 +01:00
|
|
|
return 1;
|
|
|
|
}
|
2005-04-22 13:51:06 +02:00
|
|
|
$ok .= "d";
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$ok .= "-"; # data not checked
|
2001-05-23 17:02:58 +02:00
|
|
|
}
|
2000-11-17 16:07:29 +01:00
|
|
|
|
2001-05-23 17:02:58 +02:00
|
|
|
if(@upload) {
|
|
|
|
# verify uploaded data
|
|
|
|
my @out = loadarray("$LOGDIR/upload.$testnum");
|
2003-04-30 19:15:38 +02:00
|
|
|
$res = compare("upload", \@out, \@upload);
|
2001-05-23 17:02:58 +02:00
|
|
|
if ($res) {
|
|
|
|
return 1;
|
2000-11-21 20:28:11 +01:00
|
|
|
}
|
2005-04-22 13:51:06 +02:00
|
|
|
$ok .= "u";
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$ok .= "-"; # upload not checked
|
2001-05-23 17:02:58 +02:00
|
|
|
}
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2001-05-23 17:02:58 +02:00
|
|
|
if(@protocol) {
|
2008-04-25 06:19:50 +02:00
|
|
|
# Verify the sent request
|
|
|
|
my @out = loadarray($SERVERIN);
|
2000-11-21 20:28:11 +01:00
|
|
|
|
2001-05-23 17:02:58 +02:00
|
|
|
# what to cut off from the live protocol sent by curl
|
|
|
|
my @strip = getpart("verify", "strip");
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2001-06-28 00:01:08 +02:00
|
|
|
my @protstrip=@protocol;
|
|
|
|
|
2002-02-22 11:50:36 +01:00
|
|
|
# check if there's any attributes on the verify/protocol section
|
|
|
|
my %hash = getpartattr("verify", "protocol");
|
|
|
|
|
|
|
|
if($hash{'nonewline'}) {
|
|
|
|
# Yes, we must cut off the final newline from the final line
|
|
|
|
# of the protocol data
|
|
|
|
chomp($protstrip[$#protstrip]);
|
|
|
|
}
|
|
|
|
|
2001-06-28 00:01:08 +02:00
|
|
|
for(@strip) {
|
2004-04-30 10:03:07 +02:00
|
|
|
# strip off all lines that match the patterns from both arrays
|
2004-04-29 15:31:57 +02:00
|
|
|
chomp $_;
|
2001-06-28 00:01:08 +02:00
|
|
|
@out = striparray( $_, \@out);
|
|
|
|
@protstrip= striparray( $_, \@protstrip);
|
|
|
|
}
|
2001-05-28 17:26:15 +02:00
|
|
|
|
2004-11-25 23:21:49 +01:00
|
|
|
# what parts to cut off from the protocol
|
|
|
|
my @strippart = getpart("verify", "strippart");
|
|
|
|
my $strip;
|
|
|
|
for $strip (@strippart) {
|
|
|
|
chomp $strip;
|
|
|
|
for(@out) {
|
|
|
|
eval $strip;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-04-30 19:15:38 +02:00
|
|
|
$res = compare("protocol", \@out, \@protstrip);
|
2001-05-23 17:02:58 +02:00
|
|
|
if($res) {
|
|
|
|
return 1;
|
|
|
|
}
|
2005-04-22 13:51:06 +02:00
|
|
|
|
|
|
|
$ok .= "p";
|
|
|
|
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$ok .= "-"; # protocol not checked
|
2000-11-17 16:58:25 +01:00
|
|
|
}
|
2000-11-27 13:53:50 +01:00
|
|
|
|
2001-05-28 17:26:15 +02:00
|
|
|
my @outfile=getpart("verify", "file");
|
|
|
|
if(@outfile) {
|
2007-09-20 22:39:17 +02:00
|
|
|
# we're supposed to verify a dynamically generated file!
|
2001-05-28 17:26:15 +02:00
|
|
|
my %hash = getpartattr("verify", "file");
|
|
|
|
|
|
|
|
my $filename=$hash{'name'};
|
|
|
|
if(!$filename) {
|
2007-04-03 14:27:03 +02:00
|
|
|
logmsg "ERROR: section verify=>file has no name attribute\n";
|
2006-11-20 17:58:04 +01:00
|
|
|
stopservers($verbose);
|
2005-05-16 09:07:00 +02:00
|
|
|
return -1;
|
2001-05-28 17:26:15 +02:00
|
|
|
}
|
|
|
|
my @generated=loadarray($filename);
|
|
|
|
|
2005-01-20 23:48:43 +01:00
|
|
|
# what parts to cut off from the file
|
|
|
|
my @stripfile = getpart("verify", "stripfile");
|
2006-09-06 12:03:34 +02:00
|
|
|
|
2005-05-25 14:26:20 +02:00
|
|
|
my $filemode=$hash{'mode'};
|
2005-04-28 23:04:58 +02:00
|
|
|
if(($filemode eq "text") && $has_textaware) {
|
2005-04-28 08:50:42 +02:00
|
|
|
# text mode when running on windows means adding an extra
|
|
|
|
# strip expression
|
|
|
|
push @stripfile, "s/\r\n/\n/";
|
|
|
|
}
|
|
|
|
|
2005-01-20 23:48:43 +01:00
|
|
|
my $strip;
|
|
|
|
for $strip (@stripfile) {
|
|
|
|
chomp $strip;
|
|
|
|
for(@generated) {
|
|
|
|
eval $strip;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-09-20 22:39:17 +02:00
|
|
|
@outfile = fixarray(@outfile);
|
|
|
|
|
2003-04-30 19:15:38 +02:00
|
|
|
$res = compare("output", \@generated, \@outfile);
|
2001-05-28 17:26:15 +02:00
|
|
|
if($res) {
|
|
|
|
return 1;
|
|
|
|
}
|
2005-04-22 13:51:06 +02:00
|
|
|
|
|
|
|
$ok .= "o";
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$ok .= "-"; # output not checked
|
2001-05-28 17:26:15 +02:00
|
|
|
}
|
|
|
|
|
2005-03-17 09:17:48 +01:00
|
|
|
# accept multiple comma-separated error codes
|
|
|
|
my @splerr = split(/ *, */, $errorcode);
|
|
|
|
my $errok;
|
|
|
|
foreach $e (@splerr) {
|
|
|
|
if($e == $cmdres) {
|
|
|
|
# a fine error code
|
|
|
|
$errok = 1;
|
|
|
|
last;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if($errok) {
|
2005-04-22 13:51:06 +02:00
|
|
|
$ok .= "e";
|
2004-04-30 12:37:40 +02:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
if(!$short) {
|
2008-02-20 13:14:31 +01:00
|
|
|
printf "\ncurl returned $cmdres, %d was expected\n", $errorcode;
|
2003-12-17 16:33:04 +01:00
|
|
|
}
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg " exit FAILED\n";
|
2004-04-30 12:37:40 +02:00
|
|
|
return 1;
|
2003-12-17 16:33:04 +01:00
|
|
|
}
|
|
|
|
|
2003-06-26 13:44:01 +02:00
|
|
|
@what = getpart("client", "killserver");
|
2003-04-01 10:41:49 +02:00
|
|
|
for(@what) {
|
|
|
|
my $serv = $_;
|
|
|
|
chomp $serv;
|
2006-11-20 17:58:04 +01:00
|
|
|
if($serv =~ /^ftp(\d*)(-ipv6|)/) {
|
|
|
|
my ($id, $ext) = ($1, $2);
|
|
|
|
#print STDERR "SERV $serv $id $ext\n";
|
|
|
|
ftpkillslave($id, $ext, $verbose);
|
|
|
|
}
|
2003-04-01 10:41:49 +02:00
|
|
|
if($run{$serv}) {
|
2006-11-20 17:58:04 +01:00
|
|
|
stopserver($run{$serv}); # the pid file is in the hash table
|
|
|
|
$run{$serv}=0; # clear pid
|
2003-04-01 10:41:49 +02:00
|
|
|
}
|
|
|
|
else {
|
2006-11-20 17:58:04 +01:00
|
|
|
logmsg "RUN: The $serv server is not running\n";
|
2003-04-01 10:41:49 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-06-26 13:44:01 +02:00
|
|
|
if($curl_debug) {
|
2000-11-17 16:58:25 +01:00
|
|
|
if(! -f $memdump) {
|
2007-04-03 14:27:03 +02:00
|
|
|
logmsg "\n** ALERT! memory debugging with no output file?\n";
|
2000-11-17 16:58:25 +01:00
|
|
|
}
|
|
|
|
else {
|
2003-01-09 12:26:57 +01:00
|
|
|
my @memdata=`$memanalyze $memdump`;
|
2000-11-17 16:58:25 +01:00
|
|
|
my $leak=0;
|
|
|
|
for(@memdata) {
|
2000-11-21 16:48:40 +01:00
|
|
|
if($_ ne "") {
|
|
|
|
# well it could be other memory problems as well, but
|
|
|
|
# we call it leak for short here
|
2000-11-17 16:58:25 +01:00
|
|
|
$leak=1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if($leak) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "\n** MEMORY FAILURE\n";
|
|
|
|
logmsg @memdata;
|
2000-11-17 16:58:25 +01:00
|
|
|
return 1;
|
2000-11-17 16:07:29 +01:00
|
|
|
}
|
|
|
|
else {
|
2005-04-22 13:51:06 +02:00
|
|
|
$ok .= "m";
|
2000-11-17 16:07:29 +01:00
|
|
|
}
|
|
|
|
}
|
2004-04-30 12:37:40 +02:00
|
|
|
}
|
2005-04-22 13:51:06 +02:00
|
|
|
else {
|
|
|
|
$ok .= "-"; # memory not checked
|
|
|
|
}
|
|
|
|
|
2004-04-30 12:37:40 +02:00
|
|
|
if($valgrind) {
|
2005-01-07 22:11:13 +01:00
|
|
|
# this is the valid protocol blurb curl should generate
|
2007-10-25 21:39:52 +02:00
|
|
|
if($usevalgrind) {
|
2005-01-07 22:11:13 +01:00
|
|
|
|
2007-06-08 00:42:26 +02:00
|
|
|
opendir(DIR, "log") ||
|
2005-01-07 22:11:13 +01:00
|
|
|
return 0; # can't open log dir
|
2007-06-08 00:42:26 +02:00
|
|
|
my @files = readdir(DIR);
|
|
|
|
closedir(DIR);
|
2005-01-07 22:11:13 +01:00
|
|
|
my $f;
|
|
|
|
my $l;
|
|
|
|
foreach $f (@files) {
|
|
|
|
if($f =~ /^valgrind$testnum\.pid/) {
|
|
|
|
$l = $f;
|
|
|
|
last;
|
2005-01-30 13:56:36 +01:00
|
|
|
}
|
2005-01-07 22:11:13 +01:00
|
|
|
}
|
2005-02-10 09:50:33 +01:00
|
|
|
my $src=$ENV{'srcdir'};
|
|
|
|
if(!$src) {
|
|
|
|
$src=".";
|
|
|
|
}
|
2008-06-19 03:12:02 +02:00
|
|
|
my @e = valgrindparse($src, $feature{'SSL'}, "$LOGDIR/$l");
|
2005-02-10 09:50:33 +01:00
|
|
|
if($e[0]) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg " valgrind ERROR ";
|
|
|
|
logmsg @e;
|
2005-01-07 22:11:13 +01:00
|
|
|
return 1;
|
|
|
|
}
|
2005-04-22 13:51:06 +02:00
|
|
|
$ok .= "v";
|
2004-04-30 12:37:40 +02:00
|
|
|
}
|
2005-01-07 22:11:13 +01:00
|
|
|
else {
|
|
|
|
if(!$short) {
|
2007-10-25 21:39:52 +02:00
|
|
|
logmsg " valgrind SKIPPED\n";
|
2005-01-07 22:11:13 +01:00
|
|
|
}
|
2005-04-22 13:51:06 +02:00
|
|
|
$ok .= "-"; # skipped
|
2004-04-30 12:37:40 +02:00
|
|
|
}
|
2000-11-13 17:06:16 +01:00
|
|
|
}
|
2005-04-22 13:51:06 +02:00
|
|
|
else {
|
|
|
|
$ok .= "-"; # valgrind not checked
|
2000-11-17 16:15:48 +01:00
|
|
|
}
|
2005-04-22 13:51:06 +02:00
|
|
|
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "$ok " if(!$short);
|
2005-04-22 13:51:06 +02:00
|
|
|
|
|
|
|
my $sofar= time()-$start;
|
|
|
|
my $esttotal = $sofar/$count * $total;
|
|
|
|
my $estleft = $esttotal - $sofar;
|
2005-07-04 00:25:15 +02:00
|
|
|
my $left=sprintf("remaining: %02d:%02d",
|
2005-04-22 13:51:06 +02:00
|
|
|
$estleft/60,
|
|
|
|
$estleft%60);
|
2005-07-04 00:25:15 +02:00
|
|
|
printf "OK (%-3d out of %-3d, %s)\n", $count, $total, $left;
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2005-01-07 22:11:13 +01:00
|
|
|
# the test succeeded, remove all log files
|
|
|
|
if(!$keepoutfiles) {
|
|
|
|
cleardir($LOGDIR);
|
|
|
|
}
|
|
|
|
|
|
|
|
unlink($FTPDCMD); # remove the instructions for this test
|
|
|
|
|
2000-11-13 17:06:16 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2003-10-24 10:53:59 +02:00
|
|
|
#######################################################################
|
2006-11-20 17:58:04 +01:00
|
|
|
# Stop all running test servers
|
|
|
|
sub stopservers {
|
|
|
|
my ($verbose)=@_;
|
|
|
|
for(keys %run) {
|
|
|
|
my $server = $_;
|
|
|
|
my $pids=$run{$server};
|
|
|
|
my $pid;
|
|
|
|
my $prev;
|
|
|
|
|
|
|
|
foreach $pid (split(" ", $pids)) {
|
|
|
|
if($pid != $prev) {
|
|
|
|
# no need to kill same pid twice!
|
|
|
|
logmsg sprintf("* kill pid for %s => %d\n",
|
|
|
|
$server, $pid) if($verbose);
|
|
|
|
stopserver($pid);
|
2005-05-25 14:26:20 +02:00
|
|
|
}
|
2006-11-20 17:58:04 +01:00
|
|
|
$prev = $pid;
|
2005-05-04 01:14:43 +02:00
|
|
|
}
|
2008-08-23 13:25:14 +02:00
|
|
|
delete $run{$server};
|
2001-04-24 23:09:53 +02:00
|
|
|
}
|
2006-11-20 17:58:04 +01:00
|
|
|
ftpkillslaves($verbose);
|
2003-10-24 10:53:59 +02:00
|
|
|
}
|
2003-04-30 22:28:49 +02:00
|
|
|
|
2003-10-24 10:53:59 +02:00
|
|
|
#######################################################################
|
|
|
|
# startservers() starts all the named servers
|
|
|
|
#
|
2004-12-16 15:18:11 +01:00
|
|
|
# Returns: string with error reason or blank for success
|
|
|
|
|
2003-10-24 10:53:59 +02:00
|
|
|
sub startservers {
|
|
|
|
my @what = @_;
|
2006-11-20 17:58:04 +01:00
|
|
|
my ($pid, $pid2);
|
2002-12-12 13:20:06 +01:00
|
|
|
for(@what) {
|
|
|
|
my $what = lc($_);
|
2004-12-11 22:41:00 +01:00
|
|
|
$what =~ s/[^a-z0-9-]//g;
|
2002-12-12 13:20:06 +01:00
|
|
|
if($what eq "ftp") {
|
|
|
|
if(!$run{'ftp'}) {
|
2006-11-20 17:58:04 +01:00
|
|
|
($pid, $pid2) = runftpserver("", $verbose);
|
|
|
|
if($pid <= 0) {
|
2004-12-16 15:18:11 +01:00
|
|
|
return "failed starting FTP server";
|
2003-03-15 17:43:58 +01:00
|
|
|
}
|
2006-11-20 17:58:04 +01:00
|
|
|
printf ("* pid ftp => %d %d\n", $pid, $pid2) if($verbose);
|
|
|
|
$run{'ftp'}="$pid $pid2";
|
2002-12-12 13:20:06 +01:00
|
|
|
}
|
|
|
|
}
|
2005-01-17 21:20:34 +01:00
|
|
|
elsif($what eq "ftp2") {
|
|
|
|
if(!$run{'ftp2'}) {
|
2006-11-20 17:58:04 +01:00
|
|
|
($pid, $pid2) = runftpserver("2", $verbose);
|
|
|
|
if($pid <= 0) {
|
2005-01-17 21:20:34 +01:00
|
|
|
return "failed starting FTP2 server";
|
|
|
|
}
|
2006-11-20 17:58:04 +01:00
|
|
|
printf ("* pid ftp2 => %d %d\n", $pid, $pid2) if($verbose);
|
|
|
|
$run{'ftp2'}="$pid $pid2";
|
2005-01-17 21:20:34 +01:00
|
|
|
}
|
|
|
|
}
|
2005-04-18 08:57:44 +02:00
|
|
|
elsif($what eq "ftp-ipv6") {
|
|
|
|
if(!$run{'ftp-ipv6'}) {
|
2006-11-20 17:58:04 +01:00
|
|
|
($pid, $pid2) = runftpserver("", $verbose, "ipv6");
|
|
|
|
if($pid <= 0) {
|
2006-10-27 23:07:08 +02:00
|
|
|
return "failed starting FTP-IPv6 server";
|
2005-04-18 08:57:44 +02:00
|
|
|
}
|
2006-11-20 17:58:04 +01:00
|
|
|
logmsg sprintf("* pid ftp-ipv6 => %d %d\n", $pid,
|
|
|
|
$pid2) if($verbose);
|
|
|
|
$run{'ftp-ipv6'}="$pid $pid2";
|
2005-04-18 08:57:44 +02:00
|
|
|
}
|
|
|
|
}
|
2002-12-12 13:20:06 +01:00
|
|
|
elsif($what eq "http") {
|
|
|
|
if(!$run{'http'}) {
|
2006-11-20 17:58:04 +01:00
|
|
|
($pid, $pid2) = runhttpserver($verbose);
|
|
|
|
if($pid <= 0) {
|
2004-12-16 15:18:11 +01:00
|
|
|
return "failed starting HTTP server";
|
2004-05-17 12:53:34 +02:00
|
|
|
}
|
2006-11-20 17:58:04 +01:00
|
|
|
printf ("* pid http => %d %d\n", $pid, $pid2) if($verbose);
|
|
|
|
$run{'http'}="$pid $pid2";
|
2002-12-12 13:20:06 +01:00
|
|
|
}
|
|
|
|
}
|
2004-12-11 22:41:00 +01:00
|
|
|
elsif($what eq "http-ipv6") {
|
|
|
|
if(!$run{'http-ipv6'}) {
|
2006-11-20 17:58:04 +01:00
|
|
|
($pid, $pid2) = runhttpserver($verbose, "IPv6");
|
|
|
|
if($pid <= 0) {
|
2006-10-27 23:07:08 +02:00
|
|
|
return "failed starting HTTP-IPv6 server";
|
2004-12-11 22:41:00 +01:00
|
|
|
}
|
2006-11-20 17:58:04 +01:00
|
|
|
logmsg sprintf("* pid http-ipv6 => %d %d\n", $pid, $pid2)
|
|
|
|
if($verbose);
|
|
|
|
$run{'http-ipv6'}="$pid $pid2";
|
2004-12-11 22:41:00 +01:00
|
|
|
}
|
|
|
|
}
|
2002-12-12 13:20:06 +01:00
|
|
|
elsif($what eq "ftps") {
|
2007-03-08 03:38:49 +01:00
|
|
|
if(!$stunnel) {
|
|
|
|
# we can't run ftps tests without stunnel
|
|
|
|
return "no stunnel";
|
|
|
|
}
|
|
|
|
if(!$ssl_version) {
|
|
|
|
# we can't run ftps tests if libcurl is SSL-less
|
|
|
|
return "curl lacks SSL support";
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!$run{'ftp'}) {
|
|
|
|
($pid, $pid2) = runftpserver("", $verbose);
|
|
|
|
if($pid <= 0) {
|
|
|
|
return "failed starting FTP server";
|
|
|
|
}
|
|
|
|
printf ("* pid ftp => %d %d\n", $pid, $pid2) if($verbose);
|
|
|
|
$run{'ftp'}="$pid $pid2";
|
|
|
|
}
|
|
|
|
if(!$run{'ftps'}) {
|
|
|
|
($pid, $pid2) = runftpsserver($verbose);
|
|
|
|
if($pid <= 0) {
|
|
|
|
return "failed starting FTPS server (stunnel)";
|
|
|
|
}
|
|
|
|
logmsg sprintf("* pid ftps => %d %d\n", $pid, $pid2)
|
|
|
|
if($verbose);
|
|
|
|
$run{'ftps'}="$pid $pid2";
|
|
|
|
}
|
2001-04-24 23:09:53 +02:00
|
|
|
}
|
2002-12-12 13:20:06 +01:00
|
|
|
elsif($what eq "file") {
|
|
|
|
# we support it but have no server!
|
|
|
|
}
|
|
|
|
elsif($what eq "https") {
|
2004-12-16 23:45:06 +01:00
|
|
|
if(!$stunnel) {
|
|
|
|
# we can't run ftps tests without stunnel
|
|
|
|
return "no stunnel";
|
2002-12-12 13:20:06 +01:00
|
|
|
}
|
2004-12-17 11:09:06 +01:00
|
|
|
if(!$ssl_version) {
|
2004-12-16 23:45:06 +01:00
|
|
|
# we can't run ftps tests if libcurl is SSL-less
|
|
|
|
return "curl lacks SSL support";
|
|
|
|
}
|
|
|
|
|
2002-12-12 14:42:21 +01:00
|
|
|
if(!$run{'http'}) {
|
2006-11-20 17:58:04 +01:00
|
|
|
($pid, $pid2) = runhttpserver($verbose);
|
|
|
|
if($pid <= 0) {
|
2004-12-16 15:18:11 +01:00
|
|
|
return "failed starting HTTP server";
|
2003-03-15 17:43:58 +01:00
|
|
|
}
|
2006-11-20 17:58:04 +01:00
|
|
|
printf ("* pid http => %d %d\n", $pid, $pid2) if($verbose);
|
|
|
|
$run{'http'}="$pid $pid2";
|
2002-12-12 14:42:21 +01:00
|
|
|
}
|
2002-12-12 13:20:06 +01:00
|
|
|
if(!$run{'https'}) {
|
2006-11-20 17:58:04 +01:00
|
|
|
($pid, $pid2) = runhttpsserver($verbose);
|
|
|
|
if($pid <= 0) {
|
2004-12-16 15:18:11 +01:00
|
|
|
return "failed starting HTTPS server (stunnel)";
|
2003-06-13 11:04:08 +02:00
|
|
|
}
|
2006-11-20 17:58:04 +01:00
|
|
|
logmsg sprintf("* pid https => %d %d\n", $pid, $pid2)
|
|
|
|
if($verbose);
|
|
|
|
$run{'https'}="$pid $pid2";
|
2002-12-12 13:20:06 +01:00
|
|
|
}
|
2001-04-24 23:09:53 +02:00
|
|
|
}
|
2005-09-15 22:25:02 +02:00
|
|
|
elsif($what eq "tftp") {
|
|
|
|
if(!$run{'tftp'}) {
|
2006-11-20 17:58:04 +01:00
|
|
|
($pid, $pid2) = runtftpserver("", $verbose);
|
|
|
|
if($pid <= 0) {
|
2005-09-15 22:25:02 +02:00
|
|
|
return "failed starting TFTP server";
|
|
|
|
}
|
2006-11-20 17:58:04 +01:00
|
|
|
printf ("* pid tftp => %d %d\n", $pid, $pid2) if($verbose);
|
|
|
|
$run{'tftp'}="$pid $pid2";
|
2005-09-15 22:25:02 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
elsif($what eq "tftp-ipv6") {
|
|
|
|
if(!$run{'tftp-ipv6'}) {
|
2006-11-20 17:58:04 +01:00
|
|
|
($pid, $pid2) = runtftpserver("", $verbose, "IPv6");
|
|
|
|
if($pid <= 0) {
|
2005-09-15 22:25:02 +02:00
|
|
|
return "failed starting TFTP-IPv6 server";
|
|
|
|
}
|
2006-11-20 17:58:04 +01:00
|
|
|
printf("* pid tftp-ipv6 => %d %d\n", $pid, $pid2) if($verbose);
|
|
|
|
$run{'tftp-ipv6'}="$pid $pid2";
|
2005-09-15 22:25:02 +02:00
|
|
|
}
|
|
|
|
}
|
2007-06-05 15:50:59 +02:00
|
|
|
elsif($what eq "sftp" || $what eq "scp" || $what eq "socks4" || $what eq "socks5" ) {
|
2007-03-24 02:01:28 +01:00
|
|
|
if(!$run{'ssh'}) {
|
|
|
|
($pid, $pid2) = runsshserver("", $verbose);
|
|
|
|
if($pid <= 0) {
|
|
|
|
return "failed starting SSH server";
|
|
|
|
}
|
|
|
|
printf ("* pid ssh => %d %d\n", $pid, $pid2) if($verbose);
|
|
|
|
$run{'ssh'}="$pid $pid2";
|
|
|
|
}
|
2008-01-03 21:48:22 +01:00
|
|
|
if($what eq "socks4" || $what eq "socks5") {
|
|
|
|
if(!$run{'socks'}) {
|
2008-01-11 21:17:33 +01:00
|
|
|
($pid, $pid2) = runsocksserver("", $verbose);
|
2007-06-05 15:50:59 +02:00
|
|
|
if($pid <= 0) {
|
|
|
|
return "failed starting socks server";
|
|
|
|
}
|
|
|
|
printf ("* pid socks => %d %d\n", $pid, $pid2) if($verbose);
|
|
|
|
$run{'socks'}="$pid $pid2";
|
2008-01-03 21:48:22 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if($what eq "socks5") {
|
2008-01-04 14:00:40 +01:00
|
|
|
if(!$sshdid) {
|
|
|
|
# Not an OpenSSH or SunSSH ssh daemon
|
2008-01-03 21:48:22 +01:00
|
|
|
logmsg "Not OpenSSH or SunSSH; socks5 tests need at least OpenSSH 3.7\n";
|
|
|
|
return "failed starting socks5 server";
|
|
|
|
}
|
2008-01-04 14:00:40 +01:00
|
|
|
elsif(($sshdid =~ /OpenSSH/) && ($sshdvernum < 370)) {
|
2008-01-03 21:48:22 +01:00
|
|
|
# Need OpenSSH 3.7 for socks5 - http://www.openssh.com/txt/release-3.7
|
2008-01-04 14:00:40 +01:00
|
|
|
logmsg "$sshdverstr insufficient; socks5 tests need at least OpenSSH 3.7\n";
|
2008-01-03 21:48:22 +01:00
|
|
|
return "failed starting socks5 server";
|
|
|
|
}
|
2008-01-04 14:00:40 +01:00
|
|
|
elsif(($sshdid =~ /SunSSH/) && ($sshdvernum < 100)) {
|
2008-01-03 21:48:22 +01:00
|
|
|
# Need SunSSH 1.0 for socks5
|
2008-01-04 14:00:40 +01:00
|
|
|
logmsg "$sshdverstr insufficient; socks5 tests need at least SunSSH 1.0\n";
|
2008-01-03 21:48:22 +01:00
|
|
|
return "failed starting socks5 server";
|
|
|
|
}
|
|
|
|
}
|
2007-03-24 02:01:28 +01:00
|
|
|
}
|
2003-03-15 18:11:13 +01:00
|
|
|
elsif($what eq "none") {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "* starts no server\n" if ($verbose);
|
2003-03-15 18:11:13 +01:00
|
|
|
}
|
2002-12-12 13:20:06 +01:00
|
|
|
else {
|
|
|
|
warn "we don't support a server for $what";
|
2006-04-10 15:03:20 +02:00
|
|
|
return "no server for $what";
|
2001-04-24 23:09:53 +02:00
|
|
|
}
|
|
|
|
}
|
2003-10-24 10:53:59 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
##############################################################################
|
|
|
|
# This function makes sure the right set of server is running for the
|
|
|
|
# specified test case. This is a useful design when we run single tests as not
|
|
|
|
# all servers need to run then!
|
|
|
|
#
|
2004-12-16 15:18:11 +01:00
|
|
|
# Returns: a string, blank if everything is fine or a reason why it failed
|
|
|
|
#
|
2003-10-24 10:53:59 +02:00
|
|
|
|
|
|
|
sub serverfortest {
|
|
|
|
my ($testnum)=@_;
|
|
|
|
|
|
|
|
my @what = getpart("client", "server");
|
|
|
|
|
|
|
|
if(!$what[0]) {
|
2007-04-03 14:27:03 +02:00
|
|
|
warn "Test case $testnum has no server(s) specified";
|
2004-12-16 15:18:11 +01:00
|
|
|
return "no server specified";
|
2003-10-24 10:53:59 +02:00
|
|
|
}
|
|
|
|
|
2007-10-26 21:26:04 +02:00
|
|
|
for (@what) {
|
|
|
|
my $proto = lc($_);
|
|
|
|
chomp $proto;
|
|
|
|
if (! grep /^$proto$/, @protocols) {
|
|
|
|
if (substr($proto,0,5) ne "socks") {
|
2008-06-13 22:45:34 +02:00
|
|
|
return "curl lacks $proto support";
|
2007-10-26 21:26:04 +02:00
|
|
|
}
|
|
|
|
}
|
2007-03-09 22:01:39 +01:00
|
|
|
}
|
|
|
|
|
2003-10-24 10:53:59 +02:00
|
|
|
return &startservers(@what);
|
2001-04-24 23:09:53 +02:00
|
|
|
}
|
2000-11-13 17:06:16 +01:00
|
|
|
|
|
|
|
#######################################################################
|
|
|
|
# Check options to this test program
|
|
|
|
#
|
|
|
|
|
2001-03-12 13:58:30 +01:00
|
|
|
my $number=0;
|
|
|
|
my $fromnum=-1;
|
2000-11-21 20:28:11 +01:00
|
|
|
my @testthis;
|
2007-04-26 01:18:52 +02:00
|
|
|
my %disabled;
|
2007-10-11 23:15:09 +02:00
|
|
|
while(@ARGV) {
|
2000-11-14 11:18:44 +01:00
|
|
|
if ($ARGV[0] eq "-v") {
|
|
|
|
# verbose output
|
|
|
|
$verbose=1;
|
|
|
|
}
|
2007-04-30 22:15:33 +02:00
|
|
|
elsif($ARGV[0] =~ /^-b(.*)/) {
|
|
|
|
my $portno=$1;
|
|
|
|
if($portno =~ s/(\d+)$//) {
|
|
|
|
$base = int $1;
|
|
|
|
}
|
|
|
|
}
|
2001-08-21 15:18:07 +02:00
|
|
|
elsif ($ARGV[0] eq "-c") {
|
2004-05-17 12:53:34 +02:00
|
|
|
# use this path to curl instead of default
|
2004-12-21 11:10:40 +01:00
|
|
|
$DBGCURL=$CURL=$ARGV[1];
|
2001-08-21 15:18:07 +02:00
|
|
|
shift @ARGV;
|
|
|
|
}
|
2001-01-27 19:50:54 +01:00
|
|
|
elsif ($ARGV[0] eq "-d") {
|
2004-05-17 12:53:34 +02:00
|
|
|
# have the servers display protocol output
|
2001-01-27 19:50:54 +01:00
|
|
|
$debugprotocol=1;
|
|
|
|
}
|
2006-04-10 15:03:20 +02:00
|
|
|
elsif ($ARGV[0] eq "-f") {
|
|
|
|
# run fork-servers, which makes the server fork for all new
|
|
|
|
# connections This is NOT what you wanna do without knowing exactly
|
|
|
|
# why and for what
|
|
|
|
$forkserver=1;
|
|
|
|
}
|
2001-02-20 14:58:39 +01:00
|
|
|
elsif ($ARGV[0] eq "-g") {
|
|
|
|
# run this test with gdb
|
|
|
|
$gdbthis=1;
|
|
|
|
}
|
2000-11-14 11:18:44 +01:00
|
|
|
elsif($ARGV[0] eq "-s") {
|
|
|
|
# short output
|
|
|
|
$short=1;
|
|
|
|
}
|
2003-11-13 11:05:44 +01:00
|
|
|
elsif($ARGV[0] eq "-n") {
|
|
|
|
# no valgrind
|
|
|
|
undef $valgrind;
|
|
|
|
}
|
2003-10-24 10:53:59 +02:00
|
|
|
elsif($ARGV[0] =~ /^-t(.*)/) {
|
|
|
|
# torture
|
|
|
|
$torture=1;
|
|
|
|
my $xtra = $1;
|
2004-05-10 11:01:45 +02:00
|
|
|
|
2003-10-24 15:00:19 +02:00
|
|
|
if($xtra =~ s/(\d+)$//) {
|
|
|
|
$tortalloc = $1;
|
2003-10-24 10:53:59 +02:00
|
|
|
}
|
2004-05-13 09:52:33 +02:00
|
|
|
# we undef valgrind to make this fly in comparison
|
|
|
|
undef $valgrind;
|
2003-10-24 10:53:59 +02:00
|
|
|
}
|
2000-11-17 16:15:48 +01:00
|
|
|
elsif($ARGV[0] eq "-a") {
|
|
|
|
# continue anyway, even if a test fail
|
|
|
|
$anyway=1;
|
|
|
|
}
|
2004-04-13 07:57:50 +02:00
|
|
|
elsif($ARGV[0] eq "-p") {
|
|
|
|
$postmortem=1;
|
|
|
|
}
|
2002-01-04 14:20:17 +01:00
|
|
|
elsif($ARGV[0] eq "-l") {
|
|
|
|
# lists the test case names only
|
|
|
|
$listonly=1;
|
|
|
|
}
|
2001-05-04 09:47:11 +02:00
|
|
|
elsif($ARGV[0] eq "-k") {
|
|
|
|
# keep stdout and stderr files after tests
|
|
|
|
$keepoutfiles=1;
|
|
|
|
}
|
2000-11-14 11:28:25 +01:00
|
|
|
elsif($ARGV[0] eq "-h") {
|
|
|
|
# show help text
|
|
|
|
print <<EOHELP
|
2008-07-27 04:34:27 +02:00
|
|
|
Usage: runtests.pl [options] [test selection(s)]
|
2000-11-17 16:15:48 +01:00
|
|
|
-a continue even if a test fails
|
2007-04-30 22:15:33 +02:00
|
|
|
-bN use base port number N for test servers (default $base)
|
|
|
|
-c path use this curl executable
|
2001-01-27 19:50:54 +01:00
|
|
|
-d display server debug info
|
2001-02-20 14:58:39 +01:00
|
|
|
-g run the test case with gdb
|
2000-11-14 11:28:25 +01:00
|
|
|
-h this help text
|
2001-05-04 09:47:11 +02:00
|
|
|
-k keep stdout and stderr files present after tests
|
2002-01-04 14:20:17 +01:00
|
|
|
-l list all test case names/descriptions
|
2007-04-30 22:15:33 +02:00
|
|
|
-n no valgrind
|
|
|
|
-p print log file contents when a test fails
|
2000-11-14 11:28:25 +01:00
|
|
|
-s short output
|
2007-04-30 22:15:33 +02:00
|
|
|
-t[N] torture (simulate memory alloc failures); N means fail Nth alloc
|
2000-11-14 11:28:25 +01:00
|
|
|
-v verbose output
|
2001-04-24 23:09:53 +02:00
|
|
|
[num] like "5 6 9" or " 5 to 22 " to run those tests only
|
2007-04-30 22:15:33 +02:00
|
|
|
[!num] like "!5 !6 !9" to disable those tests
|
2008-07-27 04:34:27 +02:00
|
|
|
[keyword] like "IPv6" to select only tests containing the key word
|
|
|
|
[!keyword] like "!cookies" to disable any tests containing the key word
|
2000-11-14 11:28:25 +01:00
|
|
|
EOHELP
|
|
|
|
;
|
|
|
|
exit;
|
|
|
|
}
|
2000-11-14 11:18:44 +01:00
|
|
|
elsif($ARGV[0] =~ /^(\d+)/) {
|
2001-03-12 13:58:30 +01:00
|
|
|
$number = $1;
|
|
|
|
if($fromnum >= 0) {
|
|
|
|
for($fromnum .. $number) {
|
|
|
|
push @testthis, $_;
|
|
|
|
}
|
|
|
|
$fromnum = -1;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
push @testthis, $1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
elsif($ARGV[0] =~ /^to$/i) {
|
2001-03-13 23:14:53 +01:00
|
|
|
$fromnum = $number+1;
|
2000-11-14 11:18:44 +01:00
|
|
|
}
|
2007-04-26 01:18:52 +02:00
|
|
|
elsif($ARGV[0] =~ /^!(\d+)/) {
|
|
|
|
$fromnum = -1;
|
|
|
|
$disabled{$1}=$1;
|
|
|
|
}
|
2007-10-11 23:15:09 +02:00
|
|
|
elsif($ARGV[0] =~ /^!(.+)/) {
|
|
|
|
$disabled_keywords{$1}=$1;
|
|
|
|
}
|
2008-07-27 04:34:27 +02:00
|
|
|
elsif($ARGV[0] =~ /^([-[{a-zA-Z].*)/) {
|
|
|
|
$enabled_keywords{$1}=$1;
|
|
|
|
}
|
2007-10-11 23:15:09 +02:00
|
|
|
else {
|
|
|
|
print "Unknown option: $ARGV[0]\n";
|
|
|
|
exit;
|
|
|
|
}
|
|
|
|
shift @ARGV;
|
|
|
|
}
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2000-11-21 20:28:11 +01:00
|
|
|
if($testthis[0] ne "") {
|
|
|
|
$TESTCASES=join(" ", @testthis);
|
|
|
|
}
|
|
|
|
|
2003-11-13 11:05:44 +01:00
|
|
|
if($valgrind) {
|
|
|
|
# we have found valgrind on the host, use it
|
|
|
|
|
|
|
|
# verify that we can invoke it fine
|
2007-09-20 22:39:17 +02:00
|
|
|
my $code = runclient("valgrind >/dev/null 2>&1");
|
2003-11-13 11:05:44 +01:00
|
|
|
|
|
|
|
if(($code>>8) != 1) {
|
2005-05-25 14:26:20 +02:00
|
|
|
#logmsg "Valgrind failure, disable it\n";
|
2003-11-13 11:05:44 +01:00
|
|
|
undef $valgrind;
|
2007-09-20 22:39:17 +02:00
|
|
|
} else {
|
|
|
|
|
|
|
|
# since valgrind 2.1.x, '--tool' option is mandatory
|
|
|
|
# use it, if it is supported by the version installed on the system
|
|
|
|
runclient("valgrind --help 2>&1 | grep -- --tool > /dev/null 2>&1");
|
|
|
|
if (($? >> 8)==0) {
|
|
|
|
$valgrind_tool="--tool=memcheck ";
|
|
|
|
}
|
|
|
|
open(C, "<$CURL");
|
|
|
|
my $l = <C>;
|
|
|
|
if($l =~ /^\#\!/) {
|
2007-10-25 16:30:51 +02:00
|
|
|
# A shell script. This is typically when built with libtool,
|
|
|
|
$valgrind="../libtool --mode=execute $valgrind";
|
2007-09-20 22:39:17 +02:00
|
|
|
}
|
|
|
|
close(C);
|
|
|
|
|
|
|
|
# valgrind 3 renamed the --logfile option to --log-file!!!
|
|
|
|
my $ver=join(' ', runclientoutput("valgrind --version"));
|
|
|
|
# cut off all but digits and dots
|
|
|
|
$ver =~ s/[^0-9.]//g;
|
|
|
|
|
|
|
|
if($ver >= 3) {
|
|
|
|
$valgrind_logfile="--log-file";
|
|
|
|
}
|
2003-11-13 11:05:44 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-09-20 22:39:17 +02:00
|
|
|
if ($gdbthis) {
|
|
|
|
# open the executable curl and read the first 4 bytes of it
|
|
|
|
open(CHECK, "<$CURL");
|
|
|
|
my $c;
|
|
|
|
sysread CHECK, $c, 4;
|
|
|
|
close(CHECK);
|
|
|
|
if($c eq "#! /") {
|
|
|
|
# A shell script. This is typically when built with libtool,
|
|
|
|
$libtool = 1;
|
|
|
|
$gdb = "libtool --mode=execute gdb";
|
|
|
|
}
|
2006-03-03 15:37:44 +01:00
|
|
|
}
|
|
|
|
|
2004-09-08 10:08:38 +02:00
|
|
|
$HTTPPORT = $base + 0; # HTTP server port
|
|
|
|
$HTTPSPORT = $base + 1; # HTTPS server port
|
|
|
|
$FTPPORT = $base + 2; # FTP server port
|
|
|
|
$FTPSPORT = $base + 3; # FTPS server port
|
2004-12-11 22:41:00 +01:00
|
|
|
$HTTP6PORT = $base + 4; # HTTP IPv6 server port (different IP protocol
|
|
|
|
# but we follow the same port scheme anyway)
|
2005-01-17 21:20:34 +01:00
|
|
|
$FTP2PORT = $base + 5; # FTP server 2 port
|
2005-04-18 08:57:44 +02:00
|
|
|
$FTP6PORT = $base + 6; # FTP IPv6 port
|
2005-09-15 22:25:02 +02:00
|
|
|
$TFTPPORT = $base + 7; # TFTP (UDP) port
|
|
|
|
$TFTP6PORT = $base + 8; # TFTP IPv6 (UDP) port
|
2007-03-24 02:01:28 +01:00
|
|
|
$SSHPORT = $base + 9; # SSH (SCP/SFTP) port
|
2007-06-05 15:50:59 +02:00
|
|
|
$SOCKSPORT = $base + 10; # SOCKS port
|
2004-09-08 10:08:38 +02:00
|
|
|
|
2005-12-06 08:44:18 +01:00
|
|
|
#######################################################################
|
|
|
|
# clear and create logging directory:
|
|
|
|
#
|
|
|
|
|
|
|
|
cleardir($LOGDIR);
|
|
|
|
mkdir($LOGDIR, 0777);
|
|
|
|
|
2000-11-13 17:06:16 +01:00
|
|
|
#######################################################################
|
|
|
|
# Output curl version and host info being tested
|
|
|
|
#
|
|
|
|
|
2002-01-08 10:32:41 +01:00
|
|
|
if(!$listonly) {
|
2005-04-28 23:04:58 +02:00
|
|
|
checksystem();
|
2002-01-08 10:32:41 +01:00
|
|
|
}
|
2000-11-13 17:06:16 +01:00
|
|
|
|
|
|
|
#######################################################################
|
2000-11-14 11:18:44 +01:00
|
|
|
# If 'all' tests are requested, find out all test numbers
|
2000-11-13 17:06:16 +01:00
|
|
|
#
|
|
|
|
|
|
|
|
if ( $TESTCASES eq "all") {
|
2000-11-14 11:18:44 +01:00
|
|
|
# Get all commands and find out their test numbers
|
2007-06-08 00:42:26 +02:00
|
|
|
opendir(DIR, $TESTDIR) || die "can't opendir $TESTDIR: $!";
|
|
|
|
my @cmds = grep { /^test([0-9]+)$/ && -f "$TESTDIR/$_" } readdir(DIR);
|
|
|
|
closedir(DIR);
|
2000-11-14 11:18:44 +01:00
|
|
|
|
2007-06-08 19:03:50 +02:00
|
|
|
open(D, "<$TESTDIR/DISABLED");
|
2007-06-08 00:42:26 +02:00
|
|
|
while(<D>) {
|
2006-09-13 12:16:36 +02:00
|
|
|
if(/^ *\#/) {
|
|
|
|
# allow comments
|
|
|
|
next;
|
|
|
|
}
|
|
|
|
if($_ =~ /(\d+)/) {
|
2007-04-26 01:18:52 +02:00
|
|
|
$disabled{$1}=$1; # disable this test number
|
2006-09-13 12:16:36 +02:00
|
|
|
}
|
|
|
|
}
|
2007-06-08 00:42:26 +02:00
|
|
|
close(D);
|
2006-09-13 12:16:36 +02:00
|
|
|
|
2000-11-15 09:21:14 +01:00
|
|
|
$TESTCASES=""; # start with no test cases
|
|
|
|
|
2004-05-17 12:53:34 +02:00
|
|
|
# cut off everything but the digits
|
2000-11-14 11:18:44 +01:00
|
|
|
for(@cmds) {
|
|
|
|
$_ =~ s/[a-z\/\.]*//g;
|
2000-11-15 09:21:14 +01:00
|
|
|
}
|
2008-07-27 04:34:27 +02:00
|
|
|
# sort the numbers from low to high
|
2006-09-13 12:48:03 +02:00
|
|
|
foreach my $n (sort { $a <=> $b } @cmds) {
|
2007-04-26 01:18:52 +02:00
|
|
|
if($disabled{$n}) {
|
2006-09-13 12:16:36 +02:00
|
|
|
# skip disabled test cases
|
2007-04-26 01:18:52 +02:00
|
|
|
my $why = "configured as DISABLED";
|
2006-09-13 12:48:03 +02:00
|
|
|
$skipped++;
|
|
|
|
$skipped{$why}++;
|
|
|
|
$teststat[$n]=$why; # store reason for this test case
|
2006-09-13 12:16:36 +02:00
|
|
|
next;
|
|
|
|
}
|
2006-09-13 12:48:03 +02:00
|
|
|
$TESTCASES .= " $n";
|
2000-11-14 11:18:44 +01:00
|
|
|
}
|
2000-11-13 17:06:16 +01:00
|
|
|
}
|
|
|
|
|
2000-11-21 18:07:16 +01:00
|
|
|
#######################################################################
|
|
|
|
# Start the command line log
|
|
|
|
#
|
2007-06-08 19:03:50 +02:00
|
|
|
open(CMDLOG, ">$CURLLOG") ||
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "can't log command lines to $CURLLOG\n";
|
2000-11-21 18:07:16 +01:00
|
|
|
|
2003-10-24 10:53:59 +02:00
|
|
|
#######################################################################
|
2004-04-13 07:57:50 +02:00
|
|
|
|
2007-04-25 22:09:32 +02:00
|
|
|
# Display the contents of the given file. Line endings are canonicalized
|
2008-07-24 04:16:48 +02:00
|
|
|
# and excessively long files are elided
|
2004-04-13 07:57:50 +02:00
|
|
|
sub displaylogcontent {
|
|
|
|
my ($file)=@_;
|
2007-06-08 00:42:26 +02:00
|
|
|
if(open(SINGLE, "<$file")) {
|
2007-04-25 22:09:32 +02:00
|
|
|
my $linecount = 0;
|
|
|
|
my $truncate;
|
|
|
|
my @tail;
|
2007-06-08 00:42:26 +02:00
|
|
|
while(my $string = <SINGLE>) {
|
2007-04-05 02:14:27 +02:00
|
|
|
$string =~ s/\r\n/\n/g;
|
|
|
|
$string =~ s/[\r\f\032]/\n/g;
|
|
|
|
$string .= "\n" unless ($string =~ /\n$/);
|
2008-07-24 04:16:48 +02:00
|
|
|
$string =~ tr/\n//;
|
|
|
|
for my $line (split("\n", $string)) {
|
|
|
|
$line =~ s/\s*\!$//;
|
|
|
|
if ($truncate) {
|
|
|
|
push @tail, " $line\n";
|
|
|
|
} else {
|
|
|
|
logmsg " $line\n";
|
|
|
|
}
|
|
|
|
$linecount++;
|
|
|
|
$truncate = $linecount > 1000;
|
|
|
|
}
|
2007-04-25 22:09:32 +02:00
|
|
|
}
|
|
|
|
if (@tail) {
|
|
|
|
logmsg "=== File too long: lines here were removed\n";
|
|
|
|
# This won't work properly if time stamps are enabled in logmsg
|
|
|
|
logmsg join('',@tail[$#tail-200..$#tail]);
|
2007-04-03 14:27:03 +02:00
|
|
|
}
|
2007-06-08 00:42:26 +02:00
|
|
|
close(SINGLE);
|
2004-04-13 07:57:50 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
sub displaylogs {
|
2004-04-14 09:04:45 +02:00
|
|
|
my ($testnum)=@_;
|
2007-06-08 00:42:26 +02:00
|
|
|
opendir(DIR, "$LOGDIR") ||
|
2004-04-13 07:57:50 +02:00
|
|
|
die "can't open dir: $!";
|
2007-06-08 00:42:26 +02:00
|
|
|
my @logs = readdir(DIR);
|
|
|
|
closedir(DIR);
|
2004-04-14 09:04:45 +02:00
|
|
|
|
2008-06-19 03:12:02 +02:00
|
|
|
logmsg "== Contents of files in the $LOGDIR/ dir after test $testnum\n";
|
2007-04-06 06:24:13 +02:00
|
|
|
foreach my $log (sort @logs) {
|
|
|
|
if($log =~ /\.(\.|)$/) {
|
|
|
|
next; # skip "." and ".."
|
|
|
|
}
|
|
|
|
if($log =~ /^\.nfs/) {
|
|
|
|
next; # skip ".nfs"
|
|
|
|
}
|
|
|
|
if(($log eq "memdump") || ($log eq "core")) {
|
|
|
|
next; # skip "memdump" and "core"
|
|
|
|
}
|
|
|
|
if((-d "$LOGDIR/$log") || (! -s "$LOGDIR/$log")) {
|
|
|
|
next; # skip directory and empty files
|
|
|
|
}
|
|
|
|
if(($log =~ /^stdout\d+/) && ($log !~ /^stdout$testnum/)) {
|
|
|
|
next; # skip stdoutNnn of other tests
|
|
|
|
}
|
|
|
|
if(($log =~ /^stderr\d+/) && ($log !~ /^stderr$testnum/)) {
|
|
|
|
next; # skip stderrNnn of other tests
|
|
|
|
}
|
|
|
|
if(($log =~ /^upload\d+/) && ($log !~ /^upload$testnum/)) {
|
|
|
|
next; # skip uploadNnn of other tests
|
|
|
|
}
|
|
|
|
if(($log =~ /^curl\d+\.out/) && ($log !~ /^curl$testnum\.out/)) {
|
|
|
|
next; # skip curlNnn.out of other tests
|
|
|
|
}
|
|
|
|
if(($log =~ /^test\d+\.txt/) && ($log !~ /^test$testnum\.txt/)) {
|
|
|
|
next; # skip testNnn.txt of other tests
|
2004-04-13 07:57:50 +02:00
|
|
|
}
|
2007-05-30 19:15:05 +02:00
|
|
|
if(($log =~ /^file\d+\.txt/) && ($log !~ /^file$testnum\.txt/)) {
|
|
|
|
next; # skip fileNnn.txt of other tests
|
|
|
|
}
|
2007-10-25 20:07:13 +02:00
|
|
|
if(($log =~ /^valgrind\d+/) && ($log !~ /^valgrind$testnum/)) {
|
|
|
|
next; # skip valgrindNnn of other tests
|
|
|
|
}
|
2007-04-06 06:24:13 +02:00
|
|
|
logmsg "=== Start of file $log\n";
|
|
|
|
displaylogcontent("$LOGDIR/$log");
|
|
|
|
logmsg "=== End of file $log\n";
|
2004-04-13 07:57:50 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-11-14 11:18:44 +01:00
|
|
|
#######################################################################
|
|
|
|
# The main test-loop
|
|
|
|
#
|
|
|
|
|
2001-03-12 14:46:23 +01:00
|
|
|
my $failed;
|
2000-11-15 08:09:37 +01:00
|
|
|
my $testnum;
|
2000-11-28 13:49:39 +01:00
|
|
|
my $ok=0;
|
|
|
|
my $total=0;
|
2003-06-26 13:44:01 +02:00
|
|
|
my $lasttest;
|
2005-04-22 13:51:06 +02:00
|
|
|
my @at = split(" ", $TESTCASES);
|
2005-04-28 10:23:25 +02:00
|
|
|
my $count=0;
|
2005-04-22 13:51:06 +02:00
|
|
|
|
|
|
|
$start = time();
|
2001-04-24 23:09:53 +02:00
|
|
|
|
2005-04-22 13:51:06 +02:00
|
|
|
foreach $testnum (@at) {
|
2000-11-13 17:06:16 +01:00
|
|
|
|
2003-06-26 13:44:01 +02:00
|
|
|
$lasttest = $testnum if($testnum > $lasttest);
|
2005-04-22 13:51:06 +02:00
|
|
|
$count++;
|
2003-06-26 13:44:01 +02:00
|
|
|
|
2005-04-22 13:51:06 +02:00
|
|
|
my $error = singletest($testnum, $count, scalar(@at));
|
2003-06-26 13:44:01 +02:00
|
|
|
if($error < 0) {
|
2003-01-27 14:51:35 +01:00
|
|
|
# not a test we can run
|
2001-04-24 23:09:53 +02:00
|
|
|
next;
|
|
|
|
}
|
|
|
|
|
2003-01-27 14:51:35 +01:00
|
|
|
$total++; # number of tests we've run
|
|
|
|
|
2001-03-12 14:46:23 +01:00
|
|
|
if($error>0) {
|
2001-05-23 17:02:58 +02:00
|
|
|
$failed.= "$testnum ";
|
2004-04-13 07:57:50 +02:00
|
|
|
if($postmortem) {
|
|
|
|
# display all files in log/ in a nice way
|
2004-04-14 09:04:45 +02:00
|
|
|
displaylogs($testnum);
|
2004-04-13 07:57:50 +02:00
|
|
|
}
|
2001-03-12 14:46:23 +01:00
|
|
|
if(!$anyway) {
|
|
|
|
# a test failed, abort
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "\n - abort tests\n";
|
2001-03-12 14:46:23 +01:00
|
|
|
last;
|
|
|
|
}
|
2000-11-17 16:07:29 +01:00
|
|
|
}
|
2000-11-28 13:49:39 +01:00
|
|
|
elsif(!$error) {
|
2003-01-27 14:51:35 +01:00
|
|
|
$ok++; # successful test counter
|
2000-11-28 13:49:39 +01:00
|
|
|
}
|
2000-11-13 17:06:16 +01:00
|
|
|
|
|
|
|
# loop for next test
|
|
|
|
}
|
|
|
|
|
2000-11-21 18:07:16 +01:00
|
|
|
#######################################################################
|
|
|
|
# Close command log
|
|
|
|
#
|
2007-06-08 00:42:26 +02:00
|
|
|
close(CMDLOG);
|
2000-11-21 18:07:16 +01:00
|
|
|
|
2003-10-24 10:53:59 +02:00
|
|
|
# Tests done, stop the servers
|
2006-11-20 17:58:04 +01:00
|
|
|
stopservers($verbose);
|
2000-11-21 16:48:40 +01:00
|
|
|
|
2008-01-03 21:48:22 +01:00
|
|
|
unlink($SOCKSPIDFILE);
|
|
|
|
|
2003-08-14 14:59:54 +02:00
|
|
|
my $all = $total + $skipped;
|
|
|
|
|
2001-03-12 13:58:30 +01:00
|
|
|
if($total) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg sprintf("TESTDONE: $ok tests out of $total reported OK: %d%%\n",
|
|
|
|
$ok/$total*100);
|
2001-03-12 14:46:23 +01:00
|
|
|
|
|
|
|
if($ok != $total) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "TESTFAIL: These test cases failed: $failed\n";
|
2001-03-12 14:46:23 +01:00
|
|
|
}
|
2001-03-12 13:58:30 +01:00
|
|
|
}
|
|
|
|
else {
|
2007-04-03 14:27:03 +02:00
|
|
|
logmsg "TESTFAIL: No tests were performed\n";
|
2001-03-12 13:58:30 +01:00
|
|
|
}
|
2003-08-14 14:59:54 +02:00
|
|
|
|
|
|
|
if($all) {
|
2005-04-22 13:51:06 +02:00
|
|
|
my $sofar = time()-$start;
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "TESTDONE: $all tests were considered during $sofar seconds.\n";
|
2003-08-14 14:59:54 +02:00
|
|
|
}
|
|
|
|
|
2001-04-24 23:09:53 +02:00
|
|
|
if($skipped) {
|
2003-06-26 13:44:01 +02:00
|
|
|
my $s=0;
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg "TESTINFO: $skipped tests were skipped due to these restraints:\n";
|
2003-06-26 13:44:01 +02:00
|
|
|
|
|
|
|
for(keys %skipped) {
|
|
|
|
my $r = $_;
|
2003-08-14 14:59:54 +02:00
|
|
|
printf "TESTINFO: \"%s\" %d times (", $r, $skipped{$_};
|
2003-06-26 13:44:01 +02:00
|
|
|
|
|
|
|
# now show all test case numbers that had this reason for being
|
|
|
|
# skipped
|
|
|
|
my $c=0;
|
2007-04-03 17:59:52 +02:00
|
|
|
for(0 .. scalar @teststat) {
|
2003-06-26 13:44:01 +02:00
|
|
|
my $t = $_;
|
|
|
|
if($teststat[$_] eq $r) {
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg ", " if($c);
|
|
|
|
logmsg $_;
|
2003-06-26 13:44:01 +02:00
|
|
|
$c++;
|
|
|
|
}
|
|
|
|
}
|
2005-05-25 14:26:20 +02:00
|
|
|
logmsg ")\n";
|
2003-06-26 13:44:01 +02:00
|
|
|
}
|
2003-03-15 17:43:58 +01:00
|
|
|
}
|
2008-04-24 01:55:34 +02:00
|
|
|
|
2001-05-28 17:26:15 +02:00
|
|
|
if($total && ($ok != $total)) {
|
|
|
|
exit 1;
|
|
|
|
}
|