Imported Upstream version 0.1
This commit is contained in:
commit
2b457cf5f6
2
.gitattributes
vendored
Normal file
2
.gitattributes
vendored
Normal file
@ -0,0 +1,2 @@
|
||||
*.pl linguist-language=C
|
||||
*.pm linguist-language=C
|
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@ -0,0 +1 @@
|
||||
*.swp
|
30
.travis.yml
Normal file
30
.travis.yml
Normal file
@ -0,0 +1,30 @@
|
||||
language: c
|
||||
|
||||
compiler:
|
||||
- gcc
|
||||
- clang
|
||||
|
||||
install:
|
||||
# for unit tests
|
||||
- sudo apt-get install -y check
|
||||
# for static code analysis
|
||||
- sudo apt-get install -y cppcheck rats
|
||||
# for test code coverage
|
||||
- sudo apt-get install -y lcov
|
||||
- gem install coveralls-lcov
|
||||
|
||||
before_script:
|
||||
- cd ${TRAVIS_BUILD_DIR}
|
||||
- lcov --directory . --zerocounters
|
||||
|
||||
script:
|
||||
# - find . -type f -name "*.c" -print | grep -v t\/ | xargs cppcheck 2>&1
|
||||
# - find . -type f -name "*.c" -print | grep -v t\/ | xargs rats --language=c
|
||||
- git clone --depth 10 https://github.com/proftpd/proftpd.git
|
||||
- cp mod_proxy_protocol.c proftpd/contrib/
|
||||
- cd proftpd
|
||||
- ./configure LIBS="-lm -lrt -pthread" --enable-devel=coverage --enable-tests --with-module=mod_proxy_protocol
|
||||
- make
|
||||
- make clean
|
||||
- ./configure LIBS="-lm -lrt -pthread" --enable-devel=coverage --enable-dso --enable-tests --with-shared=mod_proxy_protocol
|
||||
- make
|
15
README.md
Normal file
15
README.md
Normal file
@ -0,0 +1,15 @@
|
||||
proftpd-mod_proxy_protocol
|
||||
==========================
|
||||
|
||||
Status
|
||||
------
|
||||
[![Build Status](https://travis-ci.org/Castaglia/proftpd-mod_proxy_protocol.svg?branch=master)](https://travis-ci.org/Castaglia/proftpd-mod_proxy_protocol)
|
||||
[![License](https://img.shields.io/badge/license-GPL-brightgreen.svg)](https://img.shields.io/badge/license-GPL-brightgreen.svg)
|
||||
|
||||
Synopsis
|
||||
--------
|
||||
|
||||
The `mod_proxy_protocol` module for ProFTPD handles protocols that are used
|
||||
for conveying connection information via proxies such as <code>haproxy</code>.
|
||||
|
||||
See the [mod_proxy_protocol.html](https://htmlpreview.github.io/?https://github.com/Castaglia/proftpd-mod_proxy_protocol/blob/master/mod_proxy_protocol.html) documentation for more details.
|
1181
mod_proxy_protocol.c
Normal file
1181
mod_proxy_protocol.c
Normal file
File diff suppressed because it is too large
Load Diff
237
mod_proxy_protocol.html
Normal file
237
mod_proxy_protocol.html
Normal file
@ -0,0 +1,237 @@
|
||||
<html>
|
||||
<head>
|
||||
<title>ProFTPD module mod_proxy_protocol</title>
|
||||
</head>
|
||||
|
||||
<body bgcolor=white>
|
||||
|
||||
<hr>
|
||||
<center>
|
||||
<h2><b>ProFTPD module <code>mod_proxy_protocol</code></b></h2>
|
||||
</center>
|
||||
<hr><br>
|
||||
|
||||
<p>
|
||||
The purpose of the <code>mod_proxy_protocol</code> module is to handle
|
||||
protocols which are used by proxies, <i>e.g.</i> <code>haproxy</code>, for
|
||||
conveying information about the real origin/client to the backend server.
|
||||
Protocols like HTTP often have their own mechanism for doing so, via headers
|
||||
such as "X-Forwarded-For". Unfortunately, FTP does <b>not</b> have such a
|
||||
mechanism, nor does SSH.
|
||||
|
||||
<p>
|
||||
However, there <em>are</em> protocols which an provide this information without
|
||||
impacting FTP. HAproxy's <a href="http://haproxy.1wt.eu/download/1.5/doc/proxy-protocol.txt"><code>PROXY</code></a> protocol is one such mechanism. The
|
||||
<code>mod_proxy_protocol</code> module uses these mechanisms to change the
|
||||
information about the "remote" client so that it is the real client, not the
|
||||
proxy, whose IP address/port are logged and used for <i>e.g.</i> network ACLs.
|
||||
|
||||
<p>
|
||||
This module is contained in the <code>mod_proxy_protocol.c</code> file for
|
||||
ProFTPD 1.3.<i>x</i>, and is not compiled by default. Installation
|
||||
instructions are discussed <a href="#Installation">here</a>; detailed
|
||||
notes on best practices for using this module are <a href="#Usage">here</a>.
|
||||
|
||||
<p>
|
||||
The most current version of <code>mod_proxy_protocol</code> can be found at:
|
||||
<pre>
|
||||
<a href="https://github.com/Castaglia/proftpd-mod_proxy_protocol.git">https://github.com/Castaglia/proftpd-mod_proxy_protocol.git</a>
|
||||
</pre>
|
||||
|
||||
<h2>Author</h2>
|
||||
<p>
|
||||
Please contact TJ Saunders <tj <i>at</i> castaglia.org> with any
|
||||
questions, concerns, or suggestions regarding this module.
|
||||
|
||||
<h2>Directives</h2>
|
||||
<ul>
|
||||
<li><a href="#ProxyProtocolEngine">ProxyProtocolEngine</a>
|
||||
<li><a href="#ProxyProtocolTimeout">ProxyProtocolTimeout</a>
|
||||
<li><a href="#ProxyProtocolVersion">ProxyProtocolVersion</a>
|
||||
</ul>
|
||||
|
||||
<p>
|
||||
<hr>
|
||||
<h2><a name="ProxyProtocolEngine">ProxyProtocolEngine</a></h2>
|
||||
<strong>Syntax:</strong> ProxyProtocolEngine <em>on|off</em><br>
|
||||
<strong>Default:</strong> None<br>
|
||||
<strong>Context:</strong> server config, <code><VirtualHost></code>, <code><Global></code><br>
|
||||
<strong>Module:</strong> mod_proxy_protocol<br>
|
||||
<strong>Compatibility:</strong> 1.3.5rc4 and later
|
||||
|
||||
<p>
|
||||
The <code>ProxyProtocolEngine</code> directive enables the expectation
|
||||
and handling of protocols which provide information on proxied connections;
|
||||
support for these protocols is provided by <code>mod_proxy_protocol</code>.
|
||||
|
||||
<p>
|
||||
<hr>
|
||||
<h2><a name="ProxyProtocolTimeout">ProxyProtocolTimeout</a></h2>
|
||||
<strong>Syntax:</strong> ProxyProtocolTimeout <em>seconds</em><br>
|
||||
<strong>Default:</strong> 3sec<br>
|
||||
<strong>Context:</strong> server config, <code><VirtualHost></code>, <code><Global></code><br>
|
||||
<strong>Module:</strong> mod_proxy_protocol<br>
|
||||
<strong>Compatibility:</strong> 1.3.5rc4 and later
|
||||
|
||||
<p>
|
||||
The <code>ProxyProtocolTimeout</code> directive is used to configure the
|
||||
amount of time, in seconds, that <code>mod_proxy_protocol</code> will wait to
|
||||
receive the full expected proxy information. If the full information is
|
||||
not received within the given number of seconds, the connection to the client
|
||||
is closed.
|
||||
|
||||
<p>
|
||||
<hr>
|
||||
<h2><a name="ProxyProtocolVersion">ProxyProtocolVersion</a></h2>
|
||||
<strong>Syntax:</strong> ProxyProtocolVersion <em>protocolVersion</em><br>
|
||||
<strong>Default:</strong> haproxyV1<br>
|
||||
<strong>Context:</strong> server config, <code><VirtualHost></code>, <code><Global></code><br>
|
||||
<strong>Module:</strong> mod_proxy_protocol<br>
|
||||
<strong>Compatibility:</strong> 1.3.5rc4 and later
|
||||
|
||||
<p>
|
||||
The <code>ProxyProtocolVersion</code> directive is used to configure the
|
||||
protocol that <code>mod_proxy_protocol</code> expects to handle. The
|
||||
currently supported values are:
|
||||
<ul>
|
||||
<li><code>haproxyV1</code>
|
||||
<li><code>haproxyV2</code>
|
||||
</ul>
|
||||
|
||||
<p>
|
||||
<hr>
|
||||
<h2><a name="Usage">Usage</a></h2>
|
||||
|
||||
<p>
|
||||
<b>Example Configuration</b><br>
|
||||
<pre>
|
||||
<IfModule mod_proxy_protocol.c>
|
||||
ProxyProtocolEngine on
|
||||
ProxyProtocolTimeout 3sec
|
||||
|
||||
# Necessary to allow data transfers
|
||||
AllowForeignAddress on
|
||||
</IfModule>
|
||||
</pre>
|
||||
|
||||
<p>
|
||||
<b>Module Load Order</b><br>
|
||||
In order for <code>mod_proxy_protocol</code> to work its magic, it <b>must</b>
|
||||
the first module in line to handle the bytes coming in from the client.
|
||||
If some other module (such as <code>mod_sftp</code> or <code>mod_tls</code>)
|
||||
tries to handle the incoming bytes first, Bad Things will happen, since those
|
||||
modules will expect different protocols than the <code>PROXY</code> protocol.
|
||||
|
||||
<p>
|
||||
For <code>mod_proxy_protocol</code> to be the first module called, it must
|
||||
the <b>last</b> module loaded. To do this as a static module, you would
|
||||
use something like this when building proftpd:
|
||||
<pre>
|
||||
# ./configure --with-modules=...:mod_proxy_protocol
|
||||
</pre>
|
||||
ensuring that <code>mod_proxy_protocol</code> is the <b>last</b> module in
|
||||
your <code>--with-modules</code> list.
|
||||
|
||||
<p>
|
||||
As a shared module, configuring <code>mod_proxy_protocol</code> to be the
|
||||
last module loaded is much easier. Your configuration will have a list
|
||||
of <code>LoadModule</code> directives; the last of which would be:
|
||||
<pre>
|
||||
LoadModule mod_proxy_protocol.c
|
||||
</pre>
|
||||
|
||||
<p>
|
||||
<b>Trusting Senders of Proxy Data</b><br>
|
||||
Use of these proxy protocols means changes in audit trails and/or client
|
||||
access permissions (<i>e.g.</i> different <code>mod_wrap2</code> and/or
|
||||
<code>mod_geoip</code> rules will apply). Unscrupulous senders may try to
|
||||
actively lie to your server about the original client using these protocols.
|
||||
Thus you <b>must</b> trust the upstream machines <b>before</b> enabling the
|
||||
<code>mod_proxy_protocol</code> module.
|
||||
|
||||
<p>
|
||||
Put another way: do <b>not</b> use the <code>mod_proxy_protocol</code> module
|
||||
if your server handles connections from the open Internet. Doing so means
|
||||
that any machine can use the proxy protocol to hide their activities, or
|
||||
make it look like the connection is coming from someone else. <b>Only accept
|
||||
proxy information from trusted sources.</b>
|
||||
|
||||
<p>
|
||||
<b>Why <code>AllowForeignAddress</code> Is Needed</b><br>
|
||||
One of the consequences of allowing <code>mod_proxy_protocol</code> to change
|
||||
the remote IP address is that security checks performed on data transfers
|
||||
will cause problems. For active data transfers (<i>i.e.</i> for clients
|
||||
which send the <code>PORT</code> or <code>EPRT</code> commands),
|
||||
<code>proftpd</code> requires that the IP address sent in the command matches
|
||||
the IP address of the client which sends the command. Otherwise, a message
|
||||
like the following is logged:
|
||||
<pre>
|
||||
Refused PORT 127,0,0,1,218,225 (address mismatch)
|
||||
</pre>
|
||||
and the command is rejected.
|
||||
|
||||
<p>
|
||||
Similarly for passive data transfers (<i>i.e.</i> for clients which send the
|
||||
<code>PASV</code> or <code>EPSV</code> commands), <code>proftpd</code> requires
|
||||
that the remote IP address of the client which connects to the data transfer
|
||||
address <b>must</b> match the remote IP address of the client on the control
|
||||
connection. If the addresses do no match, then the following is logged:
|
||||
<pre>
|
||||
SECURITY VIOLATION: Passive connection from 127.0.0.1 rejected.
|
||||
</pre>
|
||||
and the control connection is closed.
|
||||
|
||||
<p>
|
||||
These security measures are done to prevent abuses of FTP data transfers
|
||||
such as the <a href="http://www.proftpd.org/docs/howto/FXP.html">FTP bounce</a>
|
||||
attack. However, the very fact that <code>mod_proxy_protocol</code> changes
|
||||
the remote IP address means that to allow data transfers when using this module,
|
||||
you need to use:
|
||||
<pre>
|
||||
AllowForeignAddress on
|
||||
</pre>
|
||||
in the same virtual host section in which the <code>ProxyProtocolEngine</code>
|
||||
directive appears.
|
||||
|
||||
<p>
|
||||
<hr>
|
||||
<h2><a name="Installation">Installation</a></h2>
|
||||
To install <code>mod_proxy_protocol</code>, copy the
|
||||
<code>mod_proxy_protocol.c</code> file into:
|
||||
<pre>
|
||||
<i>proftpd-dir</i>/contrib/
|
||||
</pre>
|
||||
after unpacking the latest proftpd-1.3.<i>x</i> source code. For including
|
||||
<code>mod_proxy_protocol</code> as a staticly linked module:
|
||||
<pre>
|
||||
$ ./configure --with-modules=...:mod_proxy_protocol
|
||||
</pre>
|
||||
To build <code>mod_proxy_protocol</code> as a DSO module:
|
||||
<pre>
|
||||
$ ./configure --enable-dso --with-shared=...:mod_proxy_protocol
|
||||
</pre>
|
||||
Then follow the usual steps:
|
||||
<pre>
|
||||
$ make
|
||||
$ make install
|
||||
</pre>
|
||||
|
||||
<p>
|
||||
For those with an existing ProFTPD installation, you can use the
|
||||
<code>prxs</code> tool to add <code>mod_proxy_protocol</code>, as a DSO module,
|
||||
to your existing server:
|
||||
<pre>
|
||||
$ prxs -c -i -d mod_proxy_protocol.c
|
||||
</pre>
|
||||
|
||||
<p>
|
||||
<hr>
|
||||
<font size=2><b><i>
|
||||
© Copyright 2013-2017 TJ Saunders<br>
|
||||
All Rights Reserved<br>
|
||||
</i></b></font>
|
||||
|
||||
<hr>
|
||||
</body>
|
||||
</html>
|
||||
|
11
t/config/maxhostsperuser.t
Normal file
11
t/config/maxhostsperuser.t
Normal file
@ -0,0 +1,11 @@
|
||||
#!/usr/bin/env perl
|
||||
|
||||
use lib qw(t/lib);
|
||||
use strict;
|
||||
|
||||
use Test::Unit::HarnessUnit;
|
||||
|
||||
$| = 1;
|
||||
|
||||
my $r = Test::Unit::HarnessUnit->new();
|
||||
$r->start("ProFTPD::Tests::Config::MaxHostsPerUser");
|
66
t/lib/ProFTPD/TestSuite/ProxiedFTP.pm
Normal file
66
t/lib/ProFTPD/TestSuite/ProxiedFTP.pm
Normal file
@ -0,0 +1,66 @@
|
||||
package ProFTPD::TestSuite::ProxiedFTP;
|
||||
|
||||
use strict;
|
||||
use vars qw(@ISA);
|
||||
|
||||
use Carp;
|
||||
use Net::FTP;
|
||||
|
||||
@ISA = qw(Net::FTP);
|
||||
|
||||
my $proxy_info = undef;
|
||||
|
||||
sub new {
|
||||
my $class = shift;
|
||||
my ($addr, $port, $proxy, $timeout) = @_;
|
||||
$timeout = 5 unless defined($timeout);
|
||||
my $debug = undef;
|
||||
|
||||
$proxy_info = $proxy;
|
||||
|
||||
if ($ENV{TEST_VERBOSE}) {
|
||||
$debug = 10;
|
||||
}
|
||||
|
||||
my $self = $class->SUPER::new($addr,
|
||||
Port => $port,
|
||||
Timeout => $timeout,
|
||||
Debug => $debug,
|
||||
);
|
||||
|
||||
unless ($self) {
|
||||
croak($@);
|
||||
}
|
||||
|
||||
return $self;
|
||||
}
|
||||
|
||||
# Override response() from Net::Cmd to trigger sending the PROXY command
|
||||
sub response {
|
||||
my $self = shift;
|
||||
|
||||
if (defined($proxy_info)) {
|
||||
if (ref($proxy_info)) {
|
||||
my ($proto, $src_addr, $dst_addr, $src_port, $dst_port) = @$proxy_info;
|
||||
$self->command("PROXY", $proto, $src_addr, $dst_addr, $src_port, $dst_port);
|
||||
|
||||
} else {
|
||||
$self->rawdatasend($proxy_info);
|
||||
}
|
||||
|
||||
$proxy_info = undef;
|
||||
}
|
||||
|
||||
$self->SUPER::response();
|
||||
}
|
||||
|
||||
sub login {
|
||||
my $self = shift;
|
||||
|
||||
unless ($self->SUPER::login(@_)) {
|
||||
croak("Failed to login: " . $self->code . " " . $self->message);
|
||||
}
|
||||
|
||||
return 1;
|
||||
}
|
||||
1;
|
229
t/lib/ProFTPD/Tests/Config/MaxHostsPerUser.pm
Normal file
229
t/lib/ProFTPD/Tests/Config/MaxHostsPerUser.pm
Normal file
@ -0,0 +1,229 @@
|
||||
package ProFTPD::Tests::Config::MaxHostsPerUser;
|
||||
|
||||
use lib qw(t/lib);
|
||||
use base qw(ProFTPD::TestSuite::Child);
|
||||
use strict;
|
||||
|
||||
use File::Spec;
|
||||
use IO::Handle;
|
||||
|
||||
use ProFTPD::TestSuite::FTP;
|
||||
use ProFTPD::TestSuite::ProxiedFTP;
|
||||
use ProFTPD::TestSuite::Utils qw(:auth :config :running :test :testsuite);
|
||||
|
||||
$| = 1;
|
||||
|
||||
my $order = 0;
|
||||
|
||||
my $TESTS = {
|
||||
maxhostsperuser_one => {
|
||||
order => ++$order,
|
||||
test_class => [qw(forking mod_proxy_protocol)],
|
||||
},
|
||||
|
||||
maxhostsperuser_one_multi_conns => {
|
||||
order => ++$order,
|
||||
test_class => [qw(forking mod_proxy_protocol)],
|
||||
},
|
||||
|
||||
};
|
||||
|
||||
sub new {
|
||||
return shift()->SUPER::new(@_);
|
||||
}
|
||||
|
||||
sub list_tests {
|
||||
return testsuite_get_runnable_tests($TESTS);
|
||||
}
|
||||
|
||||
sub maxhostsperuser_one {
|
||||
my $self = shift;
|
||||
my $tmpdir = $self->{tmpdir};
|
||||
my $setup = test_setup($tmpdir, 'config');
|
||||
|
||||
my $max_hosts = 1;
|
||||
|
||||
my $config = {
|
||||
PidFile => $setup->{pid_file},
|
||||
ScoreboardFile => $setup->{scoreboard_file},
|
||||
SystemLog => $setup->{log_file},
|
||||
|
||||
AuthUserFile => $setup->{auth_user_file},
|
||||
AuthGroupFile => $setup->{auth_group_file},
|
||||
|
||||
MaxHostsPerUser => $max_hosts,
|
||||
|
||||
IfModules => {
|
||||
'mod_delay.c' => {
|
||||
DelayEngine => 'off',
|
||||
},
|
||||
|
||||
'mod_proxy_protocol.c' => {
|
||||
ProxyProtocolEngine => 'on',
|
||||
},
|
||||
},
|
||||
};
|
||||
|
||||
my ($port, $config_user, $config_group) = config_write($setup->{config_file},
|
||||
$config);
|
||||
|
||||
my $proxy_info = ['TCP4', '1.1.1.1', '127.0.0.1', 111, $port];
|
||||
|
||||
# Open pipes, for use between the parent and child processes. Specifically,
|
||||
# the child will indicate when it's done with its test by writing a message
|
||||
# to the parent.
|
||||
my ($rfh, $wfh);
|
||||
unless (pipe($rfh, $wfh)) {
|
||||
die("Can't open pipe: $!");
|
||||
}
|
||||
|
||||
my $ex;
|
||||
|
||||
# Fork child
|
||||
$self->handle_sigchld();
|
||||
defined(my $pid = fork()) or die("Can't fork: $!");
|
||||
if ($pid) {
|
||||
eval {
|
||||
sleep(1);
|
||||
|
||||
# First client should be able to connect and log in...
|
||||
my $client1 = ProFTPD::TestSuite::ProxiedFTP->new('127.0.0.1', $port,
|
||||
['TCP4', '127.0.0.1', '127.0.0.1', 12345, $port]);
|
||||
$client1->login($setup->{user}, $setup->{passwd});
|
||||
|
||||
# ...but the second client should be able to connect, but not login.
|
||||
my $client2 = ProFTPD::TestSuite::ProxiedFTP->new('127.0.0.1', $port,
|
||||
$proxy_info);
|
||||
eval { $client2->login($setup->{user}, $setup->{passwd}) };
|
||||
unless ($@) {
|
||||
die("Login succeeded unexpectedly");
|
||||
}
|
||||
|
||||
$client1->quit();
|
||||
};
|
||||
|
||||
if ($@) {
|
||||
$ex = $@;
|
||||
}
|
||||
|
||||
$wfh->print("done\n");
|
||||
$wfh->flush();
|
||||
|
||||
} else {
|
||||
eval { server_wait($setup->{config_file}, $rfh) };
|
||||
if ($@) {
|
||||
warn($@);
|
||||
exit 1;
|
||||
}
|
||||
|
||||
exit 0;
|
||||
}
|
||||
|
||||
# Stop server
|
||||
server_stop($setup->{pid_file});
|
||||
$self->assert_child_ok($pid);
|
||||
|
||||
test_cleanup($setup->{log_file}, $ex);
|
||||
}
|
||||
|
||||
sub maxhostsperuser_one_multi_conns {
|
||||
my $self = shift;
|
||||
my $tmpdir = $self->{tmpdir};
|
||||
my $setup = test_setup($tmpdir, 'config');
|
||||
|
||||
my $max_hosts = 1;
|
||||
|
||||
my $config = {
|
||||
PidFile => $setup->{pid_file},
|
||||
ScoreboardFile => $setup->{scoreboard_file},
|
||||
SystemLog => $setup->{log_file},
|
||||
|
||||
AuthUserFile => $setup->{auth_user_file},
|
||||
AuthGroupFile => $setup->{auth_group_file},
|
||||
|
||||
MaxHostsPerUser => $max_hosts,
|
||||
|
||||
IfModules => {
|
||||
'mod_delay.c' => {
|
||||
DelayEngine => 'off',
|
||||
},
|
||||
|
||||
'mod_proxy_protocol.c' => {
|
||||
ProxyProtocolEngine => 'on',
|
||||
},
|
||||
},
|
||||
};
|
||||
|
||||
my ($port, $config_user, $config_group) = config_write($setup->{config_file},
|
||||
$config);
|
||||
|
||||
my $proxy_info = ['TCP4', '1.1.1.1', '127.0.0.1', 111, $port];
|
||||
|
||||
# Open pipes, for use between the parent and child processes. Specifically,
|
||||
# the child will indicate when it's done with its test by writing a message
|
||||
# to the parent.
|
||||
my ($rfh, $wfh);
|
||||
unless (pipe($rfh, $wfh)) {
|
||||
die("Can't open pipe: $!");
|
||||
}
|
||||
|
||||
my $ex;
|
||||
|
||||
# Fork child
|
||||
$self->handle_sigchld();
|
||||
defined(my $pid = fork()) or die("Can't fork: $!");
|
||||
if ($pid) {
|
||||
eval {
|
||||
sleep(1);
|
||||
|
||||
# First client should be able to connect and log in...
|
||||
my $client1 = ProFTPD::TestSuite::ProxiedFTP->new('127.0.0.1', $port,
|
||||
['TCP4', '127.0.0.1', '127.0.0.1', 12345, $port]);
|
||||
$client1->login($setup->{user}, $setup->{passwd});
|
||||
|
||||
# ...but the second client should be able to connect, but not login.
|
||||
my $client2 = ProFTPD::TestSuite::ProxiedFTP->new('127.0.0.1', $port,
|
||||
$proxy_info);
|
||||
eval { $client2->login($setup->{user}, $setup->{passwd}) };
|
||||
unless ($@) {
|
||||
die("Login succeeded unexpectedly");
|
||||
}
|
||||
|
||||
# Even though we can't log in, we should be able to connect quite
|
||||
# a few more times
|
||||
|
||||
my $clients = [];
|
||||
for (my $i = 0; $i < 10; $i++) {
|
||||
my $client = ProFTPD::TestSuite::ProxiedFTP->new('127.0.0.1', $port,
|
||||
$proxy_info);
|
||||
push(@$clients, $client);
|
||||
}
|
||||
|
||||
$client1->quit();
|
||||
};
|
||||
|
||||
if ($@) {
|
||||
$ex = $@;
|
||||
}
|
||||
|
||||
$wfh->print("done\n");
|
||||
$wfh->flush();
|
||||
|
||||
} else {
|
||||
eval { server_wait($setup->{config_file}, $rfh) };
|
||||
if ($@) {
|
||||
warn($@);
|
||||
exit 1;
|
||||
}
|
||||
|
||||
exit 0;
|
||||
}
|
||||
|
||||
# Stop server
|
||||
server_stop($setup->{pid_file});
|
||||
$self->assert_child_ok($pid);
|
||||
|
||||
test_cleanup($setup->{log_file}, $ex);
|
||||
}
|
||||
|
||||
1;
|
2233
t/lib/ProFTPD/Tests/Modules/mod_proxy_protocol.pm
Normal file
2233
t/lib/ProFTPD/Tests/Modules/mod_proxy_protocol.pm
Normal file
File diff suppressed because it is too large
Load Diff
150
t/lib/ProFTPD/Tests/Modules/mod_proxy_protocol/sftp.pm
Normal file
150
t/lib/ProFTPD/Tests/Modules/mod_proxy_protocol/sftp.pm
Normal file
@ -0,0 +1,150 @@
|
||||
package ProFTPD::Tests::Modules::mod_proxy_protocol::sftp;
|
||||
|
||||
use lib qw(t/lib);
|
||||
use base qw(ProFTPD::TestSuite::Child);
|
||||
use strict;
|
||||
|
||||
use File::Path qw(mkpath);
|
||||
use File::Spec;
|
||||
use IO::Handle;
|
||||
|
||||
use ProFTPD::TestSuite::ProxiedFTP;
|
||||
use ProFTPD::TestSuite::Utils qw(:auth :config :running :test :testsuite);
|
||||
|
||||
$| = 1;
|
||||
|
||||
my $order = 0;
|
||||
|
||||
my $TESTS = {
|
||||
proxy_protocol_sftp_with_proxy => {
|
||||
order => ++$order,
|
||||
test_class => [qw(forking mod_proxy_protocol mod_sftp)],
|
||||
},
|
||||
|
||||
proxy_protocol_sftp_without_proxy => {
|
||||
order => ++$order,
|
||||
test_class => [qw(forking mod_proxy_protocol mod_sftp)],
|
||||
},
|
||||
|
||||
};
|
||||
|
||||
sub new {
|
||||
return shift()->SUPER::new(@_);
|
||||
}
|
||||
|
||||
sub list_tests {
|
||||
# return testsuite_get_runnable_tests($TESTS);
|
||||
return qw(
|
||||
proxy_protocol_sftp_with_proxy
|
||||
);
|
||||
}
|
||||
|
||||
sub set_up {
|
||||
my $self = shift;
|
||||
$self->SUPER::set_up(@_);
|
||||
|
||||
# Make sure that mod_sftp does not complain about permissions on the hostkey
|
||||
# files.
|
||||
|
||||
my $rsa_host_key = File::Spec->rel2abs("$ENV{PROFTPD_TEST_DIR}/t/etc/modules/mod_sftp/ssh_host_rsa_key");
|
||||
my $dsa_host_key = File::Spec->rel2abs("$ENV{PROFTPD_TEST_DIR}/t/etc/modules/mod_sftp/ssh_host_dsa_key");
|
||||
|
||||
unless (chmod(0400, $rsa_host_key, $dsa_host_key)) {
|
||||
die("Can't set perms on $rsa_host_key, $dsa_host_key: $!");
|
||||
}
|
||||
}
|
||||
|
||||
sub proxy_protocol_sftp_with_proxy {
|
||||
my $self = shift;
|
||||
my $tmpdir = $self->{tmpdir};
|
||||
my $setup = test_setup($tmpdir, 'proxy_protocol');
|
||||
|
||||
my $rsa_host_key = File::Spec->rel2abs("$ENV{PROFTPD_TEST_DIR}/t/etc/modules/mod_sftp/ssh_host_rsa_key");
|
||||
my $dsa_host_key = File::Spec->rel2abs("$ENV{PROFTPD_TEST_DIR}/t/etc/modules/mod_sftp/ssh_host_dsa_key");
|
||||
|
||||
my $config = {
|
||||
PidFile => $setup->{pid_file},
|
||||
ScoreboardFile => $setup->{scoreboard_file},
|
||||
SystemLog => $setup->{log_file},
|
||||
TraceLog => $setup->{log_file},
|
||||
Trace => 'ssh2:20',
|
||||
|
||||
AuthUserFile => $setup->{auth_user_file},
|
||||
AuthGroupFile => $setup->{auth_group_file},
|
||||
|
||||
IfModules => {
|
||||
'mod_delay.c' => {
|
||||
DelayEngine => 'off',
|
||||
},
|
||||
|
||||
'mod_proxy_protocol.c' => {
|
||||
ProxyProtocolEngine => 'on',
|
||||
},
|
||||
|
||||
'mod_sftp.c' => [
|
||||
"SFTPEngine on",
|
||||
"SFTPLog $setup->{log_file}",
|
||||
"SFTPHostKey $rsa_host_key",
|
||||
"SFTPHostKey $dsa_host_key",
|
||||
],
|
||||
},
|
||||
};
|
||||
|
||||
my ($port, $config_user, $config_group) = config_write($setup->{config_file},
|
||||
$config);
|
||||
|
||||
# Open pipes, for use between the parent and child processes. Specifically,
|
||||
# the child will indicate when it's done with its test by writing a message
|
||||
# to the parent.
|
||||
my ($rfh, $wfh);
|
||||
unless (pipe($rfh, $wfh)) {
|
||||
die("Can't open pipe: $!");
|
||||
}
|
||||
|
||||
my $ex;
|
||||
|
||||
# Fork child
|
||||
$self->handle_sigchld();
|
||||
defined(my $pid = fork()) or die("Can't fork: $!");
|
||||
if ($pid) {
|
||||
eval {
|
||||
sleep(2);
|
||||
|
||||
my $client = ProFTPD::TestSuite::ProxiedFTP->new('127.0.0.1', $port);
|
||||
$client->send_proxy_raw('1.1.1.1', '2.2.2.2', 111, 222);
|
||||
my $banner = $client->getline();
|
||||
chomp($banner);
|
||||
|
||||
unless ($banner =~ /^SSH\-2\.0\-mod_sftp/) {
|
||||
die("Received unexpected banner from mod_sftp: '$banner'");
|
||||
}
|
||||
|
||||
print $client "SSH-2.0-ProFTPD_mod_proxy_protocol_sftp_Test\r\n";
|
||||
};
|
||||
|
||||
if ($@) {
|
||||
$ex = $@;
|
||||
}
|
||||
|
||||
$wfh->print("done\n");
|
||||
$wfh->flush();
|
||||
|
||||
} else {
|
||||
eval { server_wait($setup->{config_file}, $rfh, 10) };
|
||||
if ($@) {
|
||||
warn($@);
|
||||
exit 1;
|
||||
}
|
||||
|
||||
exit 0;
|
||||
}
|
||||
|
||||
# Stop server
|
||||
server_stop($setup->{pid_file});
|
||||
|
||||
$self->assert_child_ok($pid);
|
||||
|
||||
test_cleanup($setup->{log_file}, $ex);
|
||||
}
|
||||
|
||||
1;
|
304
t/lib/ProFTPD/Tests/Modules/mod_proxy_protocol/tls.pm
Normal file
304
t/lib/ProFTPD/Tests/Modules/mod_proxy_protocol/tls.pm
Normal file
@ -0,0 +1,304 @@
|
||||
package ProFTPD::Tests::Modules::mod_proxy_protocol::tls;
|
||||
|
||||
use lib qw(t/lib);
|
||||
use base qw(ProFTPD::TestSuite::Child);
|
||||
use strict;
|
||||
|
||||
use File::Path qw(mkpath);
|
||||
use File::Spec;
|
||||
use IO::Handle;
|
||||
use Net::Cmd qw(CMD_OK CMD_MORE);
|
||||
|
||||
use ProFTPD::TestSuite::ProxiedFTP;
|
||||
use ProFTPD::TestSuite::Utils qw(:auth :config :running :test :testsuite);
|
||||
|
||||
$| = 1;
|
||||
|
||||
my $order = 0;
|
||||
|
||||
my $TESTS = {
|
||||
proxy_protocol_tls_login_with_proxy => {
|
||||
order => ++$order,
|
||||
test_class => [qw(forking mod_proxy_protocol mod_tls)],
|
||||
},
|
||||
|
||||
proxy_protocol_tls_login_with_proxy_useimplicitssl => {
|
||||
order => ++$order,
|
||||
test_class => [qw(forking mod_proxy_protocol mod_tls)],
|
||||
},
|
||||
|
||||
};
|
||||
|
||||
sub new {
|
||||
return shift()->SUPER::new(@_);
|
||||
}
|
||||
|
||||
sub list_tests {
|
||||
# Check for the required Perl modules:
|
||||
#
|
||||
# Net-SSLeay
|
||||
# IO-Socket-SSL
|
||||
|
||||
my $required = [qw(
|
||||
Net::SSLeay
|
||||
IO::Socket::SSL
|
||||
)];
|
||||
|
||||
foreach my $req (@$required) {
|
||||
eval "use $req";
|
||||
if ($@) {
|
||||
print STDERR "\nWARNING:\n + Module '$req' not found, skipping all tests\n";
|
||||
|
||||
if ($ENV{TEST_VERBOSE}) {
|
||||
print STDERR "Unable to load $req: $@\n";
|
||||
}
|
||||
|
||||
return qw(testsuite_empty_test);
|
||||
}
|
||||
}
|
||||
|
||||
# return testsuite_get_runnable_tests($TESTS);
|
||||
return qw(
|
||||
proxy_protocol_tls_login_with_proxy_useimplicitssl
|
||||
);
|
||||
}
|
||||
|
||||
sub proxy_protocol_tls_login_with_proxy {
|
||||
my $self = shift;
|
||||
my $tmpdir = $self->{tmpdir};
|
||||
my $setup = test_setup($tmpdir, 'proxy_protocol');
|
||||
|
||||
my $server_cert_file = File::Spec->rel2abs("$ENV{PROFTPD_TEST_DIR}/t/etc/modules/mod_tls/server-cert.pem");
|
||||
my $ca_file = File::Spec->rel2abs("$ENV{PROFTPD_TEST_DIR}/t/etc/modules/mod_tls/ca-cert.pem");
|
||||
|
||||
my $config = {
|
||||
PidFile => $setup->{pid_file},
|
||||
ScoreboardFile => $setup->{scoreboard_file},
|
||||
SystemLog => $setup->{log_file},
|
||||
TraceLog => $setup->{log_file},
|
||||
Trace => 'netio:10 proxy_protocol:20',
|
||||
|
||||
AuthUserFile => $setup->{auth_user_file},
|
||||
AuthGroupFile => $setup->{auth_group_file},
|
||||
|
||||
IfModules => {
|
||||
'mod_delay.c' => {
|
||||
DelayEngine => 'off',
|
||||
},
|
||||
|
||||
'mod_proxy_protocol.c' => {
|
||||
ProxyProtocolEngine => 'on',
|
||||
},
|
||||
|
||||
'mod_tls.c' => {
|
||||
TLSEngine => 'on',
|
||||
TLSLog => $setup->{log_file},
|
||||
TLSProtocol => 'SSLv3 TLSv1',
|
||||
TLSRequired => 'on',
|
||||
TLSRSACertificateFile => $server_cert_file,
|
||||
TLSCACertificateFile => $ca_file,
|
||||
},
|
||||
},
|
||||
};
|
||||
|
||||
my ($port, $config_user, $config_group) = config_write($setup->{config_file},
|
||||
$config);
|
||||
|
||||
# Open pipes, for use between the parent and child processes. Specifically,
|
||||
# the child will indicate when it's done with its test by writing a message
|
||||
# to the parent.
|
||||
my ($rfh, $wfh);
|
||||
unless (pipe($rfh, $wfh)) {
|
||||
die("Can't open pipe: $!");
|
||||
}
|
||||
|
||||
my $ex;
|
||||
|
||||
require IO::Socket::SSL;
|
||||
|
||||
# Fork child
|
||||
$self->handle_sigchld();
|
||||
defined(my $pid = fork()) or die("Can't fork: $!");
|
||||
if ($pid) {
|
||||
eval {
|
||||
sleep(2);
|
||||
|
||||
my $client = ProFTPD::TestSuite::ProxiedFTP->new('127.0.0.1', $port,
|
||||
['TCP4', '1.1.1.1', '2.2.2.2', 111, 222]);
|
||||
my $ok = $client->command("AUTH", "TLS")->response();
|
||||
unless ($ok == CMD_OK || $ok == CMD_MORE) {
|
||||
die($client->message);
|
||||
}
|
||||
|
||||
my $ssl_opts = {
|
||||
SSL_version => 'SSLv23',
|
||||
};
|
||||
|
||||
my $ssl_client = IO::Socket::SSL->start_SSL($client, %$ssl_opts);
|
||||
unless ($ssl_client) {
|
||||
die("TLS handshake failed: " . IO::Socket::SSL::errstr());
|
||||
}
|
||||
|
||||
push(@IO::Socket::SSL::ISA, 'Net::Cmd');
|
||||
|
||||
$ok = $ssl_client->command("USER", $setup->{user})->response();
|
||||
unless ($ok == CMD_OK || $ok == CMD_MORE) {
|
||||
die($client->message);
|
||||
}
|
||||
|
||||
$ok = $ssl_client->command("PASS", $setup->{passwd})->response();
|
||||
unless ($ok == CMD_OK || $ok == CMD_MORE) {
|
||||
die($client->message);
|
||||
}
|
||||
|
||||
$ok = $ssl_client->command("QUIT")->response();
|
||||
unless ($ok == CMD_OK) {
|
||||
die($client->message);
|
||||
}
|
||||
};
|
||||
|
||||
if ($@) {
|
||||
$ex = $@;
|
||||
}
|
||||
|
||||
$wfh->print("done\n");
|
||||
$wfh->flush();
|
||||
|
||||
} else {
|
||||
eval { server_wait($setup->{config_file}, $rfh, 10) };
|
||||
if ($@) {
|
||||
warn($@);
|
||||
exit 1;
|
||||
}
|
||||
|
||||
exit 0;
|
||||
}
|
||||
|
||||
# Stop server
|
||||
server_stop($setup->{pid_file});
|
||||
|
||||
$self->assert_child_ok($pid);
|
||||
|
||||
test_cleanup($setup->{log_file}, $ex);
|
||||
}
|
||||
|
||||
sub proxy_protocol_tls_login_with_proxy_useimplicitssl {
|
||||
my $self = shift;
|
||||
my $tmpdir = $self->{tmpdir};
|
||||
my $setup = test_setup($tmpdir, 'proxy_protocol');
|
||||
|
||||
my $server_cert_file = File::Spec->rel2abs("$ENV{PROFTPD_TEST_DIR}/t/etc/modules/mod_tls/server-cert.pem");
|
||||
my $ca_file = File::Spec->rel2abs("$ENV{PROFTPD_TEST_DIR}/t/etc/modules/mod_tls/ca-cert.pem");
|
||||
|
||||
my $config = {
|
||||
PidFile => $setup->{pid_file},
|
||||
ScoreboardFile => $setup->{scoreboard_file},
|
||||
SystemLog => $setup->{log_file},
|
||||
|
||||
AuthUserFile => $setup->{auth_user_file},
|
||||
AuthGroupFile => $setup->{auth_group_file},
|
||||
|
||||
IfModules => {
|
||||
'mod_delay.c' => {
|
||||
DelayEngine => 'off',
|
||||
},
|
||||
|
||||
'mod_proxy_protocol.c' => {
|
||||
ProxyProtocolEngine => 'on',
|
||||
},
|
||||
|
||||
'mod_tls.c' => {
|
||||
TLSEngine => 'on',
|
||||
TLSLog => $setup->{log_file},
|
||||
TLSProtocol => 'SSLv3 TLSv1',
|
||||
TLSRequired => 'on',
|
||||
TLSRSACertificateFile => $server_cert_file,
|
||||
TLSCACertificateFile => $ca_file,
|
||||
TLSOptions => 'UseImplicitSSL',
|
||||
},
|
||||
},
|
||||
};
|
||||
|
||||
my ($port, $config_user, $config_group) = config_write($setup->{config_file},
|
||||
$config);
|
||||
|
||||
# Open pipes, for use between the parent and child processes. Specifically,
|
||||
# the child will indicate when it's done with its test by writing a message
|
||||
# to the parent.
|
||||
my ($rfh, $wfh);
|
||||
unless (pipe($rfh, $wfh)) {
|
||||
die("Can't open pipe: $!");
|
||||
}
|
||||
|
||||
my $ex;
|
||||
|
||||
require IO::Socket::SSL;
|
||||
|
||||
# Fork child
|
||||
$self->handle_sigchld();
|
||||
defined(my $pid = fork()) or die("Can't fork: $!");
|
||||
if ($pid) {
|
||||
eval {
|
||||
sleep(2);
|
||||
|
||||
my $client = ProFTPD::TestSuite::ProxiedFTP->new('127.0.0.1', $port,
|
||||
['TCP4', '1.1.1.1', '2.2.2.2', 111, 222]);
|
||||
|
||||
my $ssl_opts = {
|
||||
SSL_version => 'SSLv23',
|
||||
};
|
||||
|
||||
my $ssl_client = IO::Socket::SSL->start_SSL($client, %$ssl_opts);
|
||||
unless ($ssl_client) {
|
||||
die("TLS handshake failed: " . IO::Socket::SSL::errstr());
|
||||
}
|
||||
|
||||
push(@IO::Socket::SSL::ISA, 'Net::Cmd');
|
||||
|
||||
my $ok = $ssl_client->response();
|
||||
unless ($ok == CMD_OK || $ok == CMD_MORE) {
|
||||
die($client->message);
|
||||
}
|
||||
|
||||
$ok = $ssl_client->command("USER", $setup->{user})->response();
|
||||
unless ($ok == CMD_OK || $ok == CMD_MORE) {
|
||||
die($client->message);
|
||||
}
|
||||
|
||||
$ok = $ssl_client->command("PASS", $setup->{passwd})->response();
|
||||
unless ($ok == CMD_OK || $ok == CMD_MORE) {
|
||||
die($client->message);
|
||||
}
|
||||
|
||||
$ok = $ssl_client->command("QUIT")->response();
|
||||
unless ($ok == CMD_OK) {
|
||||
die($client->message);
|
||||
}
|
||||
};
|
||||
|
||||
if ($@) {
|
||||
$ex = $@;
|
||||
}
|
||||
|
||||
$wfh->print("done\n");
|
||||
$wfh->flush();
|
||||
|
||||
} else {
|
||||
eval { server_wait($setup->{config_file}, $rfh, 10) };
|
||||
if ($@) {
|
||||
warn($@);
|
||||
exit 1;
|
||||
}
|
||||
|
||||
exit 0;
|
||||
}
|
||||
|
||||
# Stop server
|
||||
server_stop($setup->{pid_file});
|
||||
|
||||
$self->assert_child_ok($pid);
|
||||
|
||||
test_cleanup($setup->{log_file}, $ex);
|
||||
}
|
||||
|
||||
1;
|
139
t/lib/ProFTPD/Tests/Modules/mod_proxy_protocol/wrap2.pm
Normal file
139
t/lib/ProFTPD/Tests/Modules/mod_proxy_protocol/wrap2.pm
Normal file
@ -0,0 +1,139 @@
|
||||
package ProFTPD::Tests::Modules::mod_proxy_protocol::wrap2;
|
||||
|
||||
use lib qw(t/lib);
|
||||
use base qw(ProFTPD::TestSuite::Child);
|
||||
use strict;
|
||||
|
||||
use File::Path qw(mkpath);
|
||||
use File::Spec;
|
||||
use IO::Handle;
|
||||
|
||||
use ProFTPD::TestSuite::ProxiedFTP;
|
||||
use ProFTPD::TestSuite::Utils qw(:auth :config :running :test :testsuite);
|
||||
|
||||
$| = 1;
|
||||
|
||||
my $order = 0;
|
||||
|
||||
my $TESTS = {
|
||||
proxy_protocol_wrap2_config_deny => {
|
||||
order => ++$order,
|
||||
test_class => [qw(forking mod_proxy_protocol mod_wrap2)],
|
||||
},
|
||||
|
||||
};
|
||||
|
||||
sub new {
|
||||
return shift()->SUPER::new(@_);
|
||||
}
|
||||
|
||||
sub list_tests {
|
||||
return testsuite_get_runnable_tests($TESTS);
|
||||
}
|
||||
|
||||
sub proxy_protocol_wrap2_config_deny {
|
||||
my $self = shift;
|
||||
my $tmpdir = $self->{tmpdir};
|
||||
my $setup = test_setup($tmpdir, 'proxy_protocol');
|
||||
|
||||
my $allow_file = File::Spec->rel2abs("$tmpdir/wrap2.allow");
|
||||
if (open(my $fh, "> $allow_file")) {
|
||||
unless (close($fh)) {
|
||||
die("Can't write $allow_file: $!");
|
||||
}
|
||||
|
||||
} else {
|
||||
die("Can't open $allow_file: $!");
|
||||
}
|
||||
|
||||
my $deny_file = File::Spec->rel2abs("$tmpdir/wrap2.deny");
|
||||
if (open(my $fh, "> $deny_file")) {
|
||||
print $fh "ALL: 1.1.1.1\n";
|
||||
|
||||
unless (close($fh)) {
|
||||
die("Can't write $deny_file: $!");
|
||||
}
|
||||
|
||||
} else {
|
||||
die("Can't open $deny_file: $!");
|
||||
}
|
||||
|
||||
my $config = {
|
||||
PidFile => $setup->{pid_file},
|
||||
ScoreboardFile => $setup->{scoreboard_file},
|
||||
SystemLog => $setup->{log_file},
|
||||
|
||||
AuthUserFile => $setup->{auth_user_file},
|
||||
AuthGroupFile => $setup->{auth_group_file},
|
||||
|
||||
IfModules => {
|
||||
'mod_delay.c' => {
|
||||
DelayEngine => 'off',
|
||||
},
|
||||
|
||||
'mod_proxy_protocol.c' => {
|
||||
ProxyProtocolEngine => 'on',
|
||||
},
|
||||
|
||||
'mod_wrap2.c' => {
|
||||
WrapEngine => 'on',
|
||||
WrapTables => "file:$allow_file file:$deny_file",
|
||||
WrapLog => $setup->{log_file},
|
||||
}
|
||||
},
|
||||
};
|
||||
|
||||
my ($port, $config_user, $config_group) = config_write($setup->{config_file},
|
||||
$config);
|
||||
|
||||
# Open pipes, for use between the parent and child processes. Specifically,
|
||||
# the child will indicate when it's done with its test by writing a message
|
||||
# to the parent.
|
||||
my ($rfh, $wfh);
|
||||
unless (pipe($rfh, $wfh)) {
|
||||
die("Can't open pipe: $!");
|
||||
}
|
||||
|
||||
my $ex;
|
||||
|
||||
# Fork child
|
||||
$self->handle_sigchld();
|
||||
defined(my $pid = fork()) or die("Can't fork: $!");
|
||||
if ($pid) {
|
||||
eval {
|
||||
sleep(2);
|
||||
|
||||
my $client = ProFTPD::TestSuite::ProxiedFTP->new('127.0.0.1', $port);
|
||||
$client->send_proxy('1.1.1.1', '2.2.2.2', 111, 222);
|
||||
eval { $client->login($setup->{user}, $setup->{passwd}) };
|
||||
unless ($@) {
|
||||
die("Login succeeded unexpectedly");
|
||||
}
|
||||
};
|
||||
|
||||
if ($@) {
|
||||
$ex = $@;
|
||||
}
|
||||
|
||||
$wfh->print("done\n");
|
||||
$wfh->flush();
|
||||
|
||||
} else {
|
||||
eval { server_wait($setup->{config_file}, $rfh, 10) };
|
||||
if ($@) {
|
||||
warn($@);
|
||||
exit 1;
|
||||
}
|
||||
|
||||
exit 0;
|
||||
}
|
||||
|
||||
# Stop server
|
||||
server_stop($setup->{pid_file});
|
||||
|
||||
$self->assert_child_ok($pid);
|
||||
|
||||
test_cleanup($setup->{log_file}, $ex);
|
||||
}
|
||||
|
||||
1;
|
11
t/modules/mod_proxy_protocol.t
Normal file
11
t/modules/mod_proxy_protocol.t
Normal file
@ -0,0 +1,11 @@
|
||||
#!/usr/bin/env perl
|
||||
|
||||
use lib qw(t/lib);
|
||||
use strict;
|
||||
|
||||
use Test::Unit::HarnessUnit;
|
||||
|
||||
$| = 1;
|
||||
|
||||
my $r = Test::Unit::HarnessUnit->new();
|
||||
$r->start("ProFTPD::Tests::Modules::mod_proxy_protocol");
|
11
t/modules/mod_proxy_protocol/sftp.t
Normal file
11
t/modules/mod_proxy_protocol/sftp.t
Normal file
@ -0,0 +1,11 @@
|
||||
#!/usr/bin/env perl
|
||||
|
||||
use lib qw(t/lib);
|
||||
use strict;
|
||||
|
||||
use Test::Unit::HarnessUnit;
|
||||
|
||||
$| = 1;
|
||||
|
||||
my $r = Test::Unit::HarnessUnit->new();
|
||||
$r->start("ProFTPD::Tests::Modules::mod_proxy_protocol::sftp");
|
11
t/modules/mod_proxy_protocol/tls.t
Normal file
11
t/modules/mod_proxy_protocol/tls.t
Normal file
@ -0,0 +1,11 @@
|
||||
#!/usr/bin/env perl
|
||||
|
||||
use lib qw(t/lib);
|
||||
use strict;
|
||||
|
||||
use Test::Unit::HarnessUnit;
|
||||
|
||||
$| = 1;
|
||||
|
||||
my $r = Test::Unit::HarnessUnit->new();
|
||||
$r->start("ProFTPD::Tests::Modules::mod_proxy_protocol::tls");
|
11
t/modules/mod_proxy_protocol/wrap2.t
Normal file
11
t/modules/mod_proxy_protocol/wrap2.t
Normal file
@ -0,0 +1,11 @@
|
||||
#!/usr/bin/env perl
|
||||
|
||||
use lib qw(t/lib);
|
||||
use strict;
|
||||
|
||||
use Test::Unit::HarnessUnit;
|
||||
|
||||
$| = 1;
|
||||
|
||||
my $r = Test::Unit::HarnessUnit->new();
|
||||
$r->start("ProFTPD::Tests::Modules::mod_proxy_protocol::wrap2");
|
Loading…
Reference in New Issue
Block a user