[MEDIUM] session: move the analysis bit field to the buffer
It makes more sense to store the list of analysers in the buffer
than in the session since they are precisely plugged onto one
buffer.
diff --git a/include/proto/buffers.h b/include/proto/buffers.h
index 27bf2ea..4ceedc0 100644
--- a/include/proto/buffers.h
+++ b/include/proto/buffers.h
@@ -46,8 +46,9 @@
static inline void buffer_init(struct buffer *buf)
{
buf->l = buf->total = 0;
- buf->r = buf->lr = buf->w = buf->data;
+ buf->analysers = 0;
buf->flags = BF_EMPTY;
+ buf->r = buf->lr = buf->w = buf->data;
buf->rlim = buf->data + BUFSIZE;
}
diff --git a/include/types/buffers.h b/include/types/buffers.h
index f149ddb..d5177d7 100644
--- a/include/types/buffers.h
+++ b/include/types/buffers.h
@@ -57,6 +57,19 @@
#define BF_READ_TIMEOUT 32768 /* timeout while waiting for producer */
#define BF_WRITE_TIMEOUT 65536 /* timeout while waiting for consumer */
+
+/* Analysers (buffer->analysers).
+ * Those bits indicate that there are some processing to do on the buffer
+ * contents. It will probably evolved into a linked list later. Those
+ * analysers could be compared to higher level processors.
+ * The field is blanked by buffer_init() and only by analysers themselves
+ * afterwards.
+ */
+#define AN_REQ_INSPECT 0x00000001 /* inspect request contents */
+#define AN_REQ_HTTP_HDR 0x00000002 /* inspect HTTP request headers */
+#define AN_REQ_HTTP_BODY 0x00000004 /* inspect HTTP request body */
+#define AN_RTR_HTTP_HDR 0x00000008 /* inspect HTTP response headers */
+
/* describes a chunk of string */
struct chunk {
char *str; /* beginning of the string itself. Might not be 0-terminated */
@@ -73,6 +86,7 @@
unsigned int l; /* data length */
char *r, *w, *lr; /* read ptr, write ptr, last read */
char *rlim; /* read limit, used for header rewriting */
+ unsigned int analysers; /* bit field indicating what to do on the buffer */
unsigned char xfer_large; /* number of consecutive large xfers */
unsigned char xfer_small; /* number of consecutive small xfers */
unsigned long long total; /* total data read */
diff --git a/include/types/session.h b/include/types/session.h
index 436f652..65bb5e6 100644
--- a/include/types/session.h
+++ b/include/types/session.h
@@ -82,18 +82,6 @@
* and freed in session_free() !
*/
-/* analysis flags */
-#define AN_REQ_INSPECT 0x00000001 /* inspect request contents */
-#define AN_REQ_HTTP_HDR 0x00000002 /* inspect HTTP request headers */
-#define AN_REQ_HTTP_BODY 0x00000004 /* inspect HTTP request body */
-#define AN_REQ_ANY (AN_REQ_INSPECT|AN_REQ_HTTP_HDR|AN_REQ_HTTP_BODY)
-
-#define AN_RTR_INSPECT 0x00000008 /* inspect response contents */
-#define AN_RTR_HTTP_HDR 0x00000010 /* inspect HTTP response headers */
-#define AN_RTR_HTTP_BODY 0x00000020 /* inspect HTTP response body */
-#define AN_RTR_ANY (AN_RTR_INSPECT|AN_RTR_HTTP_HDR|AN_RTR_HTTP_BODY)
-
-
/* Termination sequence tracing.
*
* These values have to be set into the field term_trace of a session when
@@ -174,7 +162,6 @@
int conn_retries; /* number of connect retries left */
int flags; /* some flags describing the session */
unsigned term_trace; /* term trace: 4*8 bits indicating which part of the code closed */
- unsigned int analysis; /* bit field indicating remaining analysis to perform on data */
struct buffer *req; /* request buffer */
struct buffer *rep; /* response buffer */
struct sockaddr_storage cli_addr; /* the client address */
diff --git a/src/client.c b/src/client.c
index 8c63387..3e1272e 100644
--- a/src/client.c
+++ b/src/client.c
@@ -107,7 +107,6 @@
}
s->flags = 0;
- s->analysis = 0;
s->term_trace = 0;
/* if this session comes from a known monitoring system, we want to ignore
@@ -168,12 +167,6 @@
s->flags |= SN_BE_ASSIGNED;
}
- if (p->mode == PR_MODE_HTTP)
- s->analysis |= AN_REQ_HTTP_HDR;
-
- if (s->fe->tcp_req.inspect_delay)
- s->analysis |= AN_REQ_INSPECT;
-
s->cli_state = CL_STDATA;
s->srv_state = SV_STIDLE;
s->req = s->rep = NULL; /* will be allocated later */
@@ -336,7 +329,13 @@
if (p->mode == PR_MODE_HTTP) /* reserve some space for header rewriting */
s->req->rlim -= MAXREWRITE;
- if (!(s->analysis & AN_REQ_ANY))
+ if (s->fe->tcp_req.inspect_delay)
+ s->req->analysers |= AN_REQ_INSPECT;
+
+ if (p->mode == PR_MODE_HTTP)
+ s->req->analysers |= AN_REQ_HTTP_HDR;
+
+ if (!s->req->analysers)
s->req->flags |= BF_MAY_FORWARD; /* don't wait to establish connection */
s->req->rto = s->fe->timeout.client;
diff --git a/src/proto_http.c b/src/proto_http.c
index 6802b5a..36bf1c5 100644
--- a/src/proto_http.c
+++ b/src/proto_http.c
@@ -688,14 +688,14 @@
do {
if (resync & PROCESS_REQ) {
resync &= ~PROCESS_REQ;
- if (s->analysis & AN_REQ_ANY) {
+ if (s->req->analysers) {
rqf = s->req->flags;
rpf = s->rep->flags;
if (process_request(s))
resync |= PROCESS_REQ;
- if (!(s->analysis & AN_REQ_ANY) && !(s->req->flags & BF_MAY_FORWARD))
+ if (!s->req->analysers && !(s->req->flags & BF_MAY_FORWARD))
s->req->flags |= BF_MAY_FORWARD;
if (rqf != s->req->flags || rpf != s->rep->flags)
@@ -705,14 +705,14 @@
if (resync & PROCESS_RTR) {
resync &= ~PROCESS_RTR;
- if (s->analysis & AN_RTR_ANY) {
+ if (s->rep->analysers) {
rqf = s->req->flags;
rpf = s->rep->flags;
if (process_response(s))
resync |= PROCESS_RTR;
- if (!(s->analysis & AN_RTR_ANY) && !(s->rep->flags & BF_MAY_FORWARD))
+ if (!s->rep->analysers && !(s->rep->flags & BF_MAY_FORWARD))
s->rep->flags |= BF_MAY_FORWARD;
if (rqf != s->req->flags || rpf != s->rep->flags)
@@ -767,10 +767,10 @@
t->expire = tick_first(tick_first(s->req->rex, s->req->wex),
tick_first(s->rep->rex, s->rep->wex));
- if (s->analysis & AN_REQ_ANY) {
- if (s->analysis & AN_REQ_INSPECT)
+ if (s->req->analysers) {
+ if (s->req->analysers & AN_REQ_INSPECT)
t->expire = tick_first(t->expire, s->inspect_exp);
- else if (s->analysis & AN_REQ_HTTP_HDR)
+ else if (s->req->analysers & AN_REQ_HTTP_HDR)
t->expire = tick_first(t->expire, s->txn.exp);
}
@@ -1634,22 +1634,23 @@
/* This function performs all the processing enabled for the current request.
* It normally returns zero, but may return 1 if it absolutely needs to be
* called again after other functions. It relies on buffers flags, and updates
- * t->analysis. It might make sense to explode it into several other functions.
+ * t->req->analysers. It might make sense to explode it into several other
+ * functions.
*/
int process_request(struct session *t)
{
struct buffer *req = t->req;
struct buffer *rep = t->rep;
- DPRINTF(stderr,"[%u] process_req: c=%s s=%s set(r,w)=%d,%d exp(r,w)=%u,%u req=%08x rep=%08x analysis=%02x\n",
+ DPRINTF(stderr,"[%u] process_req: c=%s s=%s set(r,w)=%d,%d exp(r,w)=%u,%u req=%08x rep=%08x analysers=%02x\n",
now_ms,
cli_stnames[t->cli_state], srv_stnames[t->srv_state],
t->cli_fd >= 0 && fdtab[t->cli_fd].state != FD_STCLOSE ? EV_FD_ISSET(t->cli_fd, DIR_RD) : 0,
t->cli_fd >= 0 && fdtab[t->cli_fd].state != FD_STCLOSE ? EV_FD_ISSET(t->cli_fd, DIR_WR) : 0,
- req->rex, rep->wex, req->flags, rep->flags, t->analysis);
+ req->rex, rep->wex, req->flags, rep->flags, req->analysers);
update_state:
- if (t->analysis & AN_REQ_INSPECT) {
+ if (req->analysers & AN_REQ_INSPECT) {
struct tcp_rule *rule;
int partial;
@@ -1659,8 +1660,8 @@
* will be easier to change later.
*/
if (req->flags & BF_READ_ERROR) {
+ req->analysers = 0;
t->inspect_exp = TICK_ETERNITY;
- t->analysis &= ~AN_REQ_ANY;
t->fe->failed_req++;
if (!(t->flags & SN_ERR_MASK))
t->flags |= SN_ERR_CLICL;
@@ -1671,8 +1672,8 @@
/* Abort if client read timeout has expired */
else if (req->flags & BF_READ_TIMEOUT) {
+ req->analysers = 0;
t->inspect_exp = TICK_ETERNITY;
- t->analysis &= ~AN_REQ_ANY;
t->fe->failed_req++;
if (!(t->flags & SN_ERR_MASK))
t->flags |= SN_ERR_CLITO;
@@ -1721,7 +1722,7 @@
buffer_shutw(rep);
fd_delete(t->cli_fd);
t->cli_state = CL_STCLOSE;
- t->analysis &= ~AN_REQ_ANY;
+ req->analysers = 0;
t->fe->failed_req++;
if (!(t->flags & SN_ERR_MASK))
t->flags |= SN_ERR_PRXCOND;
@@ -1738,11 +1739,11 @@
/* if we get there, it means we have no rule which matches, or
* we have an explicit accept, so we apply the default accept.
*/
- t->analysis &= ~AN_REQ_INSPECT;
+ req->analysers &= ~AN_REQ_INSPECT;
t->inspect_exp = TICK_ETERNITY;
}
- if (t->analysis & AN_REQ_HTTP_HDR) {
+ if (req->analysers & AN_REQ_HTTP_HDR) {
/*
* Now parse the partial (or complete) lines.
* We will check the request syntax, and also join multi-line
@@ -1822,7 +1823,7 @@
txn->status = 400;
client_retnclose(t, error_message(t, HTTP_ERR_400));
msg->msg_state = HTTP_MSG_ERROR;
- t->analysis &= ~AN_REQ_ANY;
+ req->analysers = 0;
t->fe->failed_req++;
if (!(t->flags & SN_ERR_MASK))
@@ -1838,7 +1839,7 @@
txn->status = 408;
client_retnclose(t, error_message(t, HTTP_ERR_408));
msg->msg_state = HTTP_MSG_ERROR;
- t->analysis &= ~AN_REQ_ANY;
+ req->analysers = 0;
t->fe->failed_req++;
if (!(t->flags & SN_ERR_MASK))
t->flags |= SN_ERR_CLITO;
@@ -1851,7 +1852,7 @@
else if (req->flags & (BF_READ_ERROR | BF_SHUTR)) {
/* we cannot return any message on error */
msg->msg_state = HTTP_MSG_ERROR;
- t->analysis &= ~AN_REQ_ANY;
+ req->analysers = 0;
t->fe->failed_req++;
if (!(t->flags & SN_ERR_MASK))
t->flags |= SN_ERR_CLICL;
@@ -1875,7 +1876,7 @@
* of each header's length, so we can parse them quickly. *
****************************************************************/
- t->analysis &= ~AN_REQ_HTTP_HDR;
+ req->analysers &= ~AN_REQ_HTTP_HDR;
/* ensure we keep this pointer to the beginning of the message */
msg->sol = req->data + msg->som;
@@ -2205,7 +2206,7 @@
(txn->meth == HTTP_METH_GET || txn->meth == HTTP_METH_HEAD)) {
/* we have to check the URI and auth for this request.
* FIXME!!! that one is rather dangerous, we want to
- * make it follow standard rules (eg: clear t->analysis).
+ * make it follow standard rules (eg: clear req->analysers).
*/
if (stats_check_uri_auth(t, rule_set))
return 1;
@@ -2442,7 +2443,7 @@
ctx.idx = 0;
http_find_header2("Transfer-Encoding", 17, msg->sol, &txn->hdr_idx, &ctx);
if (ctx.idx && ctx.vlen >= 7 && strncasecmp(ctx.line+ctx.val, "chunked", 7) == 0)
- t->analysis |= AN_REQ_HTTP_BODY;
+ req->analysers |= AN_REQ_HTTP_BODY;
else {
ctx.idx = 0;
http_find_header2("Content-Length", 14, msg->sol, &txn->hdr_idx, &ctx);
@@ -2463,7 +2464,7 @@
hint = t->be->url_param_post_limit;
/* now do we really need to buffer more data? */
if (len < hint)
- t->analysis |= AN_REQ_HTTP_BODY;
+ req->analysers |= AN_REQ_HTTP_BODY;
/* else... There are no body bytes to wait for */
}
}
@@ -2500,7 +2501,7 @@
return_bad_req: /* let's centralize all bad requests */
txn->req.msg_state = HTTP_MSG_ERROR;
txn->status = 400;
- t->analysis &= ~AN_REQ_ANY;
+ req->analysers = 0;
client_retnclose(t, error_message(t, HTTP_ERR_400));
t->fe->failed_req++;
return_prx_cond:
@@ -2513,7 +2514,7 @@
; // to keep gcc happy
}
- if (t->analysis & AN_REQ_HTTP_BODY) {
+ if (req->analysers & AN_REQ_HTTP_BODY) {
/* We have to parse the HTTP request body to find any required data.
* "balance url_param check_post" should have been the only way to get
* into this. We were brought here after HTTP header analysis, so all
@@ -2571,12 +2572,24 @@
req->flags & (BF_FULL | BF_READ_ERROR | BF_READ_NULL | BF_READ_TIMEOUT)) {
/* The situation will not evolve, so let's give up on the analysis. */
t->logs.tv_request = now; /* update the request timer to reflect full request */
- t->analysis &= ~AN_REQ_HTTP_BODY;
+ req->analysers &= ~AN_REQ_HTTP_BODY;
}
}
+ /* Note: eventhough nobody should set an unknown flag, clearing them right now will
+ * probably reduce one day's debugging session.
+ */
+#ifdef DEBUG_DEV
+ if (req->analysers & ~(AN_REQ_INSPECT | AN_REQ_HTTP_HDR | AN_REQ_HTTP_BODY)) {
+ fprintf(stderr, "FIXME !!!! unknown analysers flags %s:%d = 0x%08X\n",
+ __FILE__, __LINE__, req->analysers);
+ ABORT_NOW();
+ }
+#endif
+ req->analysers &= AN_REQ_INSPECT | AN_REQ_HTTP_HDR | AN_REQ_HTTP_BODY;
+
/* we want to leave with that clean */
- if (unlikely(t->analysis & AN_REQ_ANY))
+ if (unlikely(req->analysers != 0))
goto update_state;
return 0;
}
@@ -2584,7 +2597,8 @@
/* This function performs all the processing enabled for the current response.
* It normally returns zero, but may return 1 if it absolutely needs to be
* called again after other functions. It relies on buffers flags, and updates
- * t->analysis. It might make sense to explode it into several other functions.
+ * t->rep->analysers. It might make sense to explode it into several other
+ * functions.
*/
int process_response(struct session *t)
{
@@ -2592,15 +2606,15 @@
struct buffer *req = t->req;
struct buffer *rep = t->rep;
- DPRINTF(stderr,"[%u] process_rep: c=%s s=%s set(r,w)=%d,%d exp(r,w)=%u,%u req=%08x rep=%08x analysis=%02x\n",
+ DPRINTF(stderr,"[%u] process_rep: c=%s s=%s set(r,w)=%d,%d exp(r,w)=%u,%u req=%08x rep=%08x analysers=%02x\n",
now_ms,
cli_stnames[t->cli_state], srv_stnames[t->srv_state],
t->srv_fd >= 0 && fdtab[t->srv_fd].state != FD_STCLOSE ? EV_FD_ISSET(t->srv_fd, DIR_RD) : 0,
t->srv_fd >= 0 && fdtab[t->srv_fd].state != FD_STCLOSE ? EV_FD_ISSET(t->srv_fd, DIR_WR) : 0,
- req->rex, rep->wex, req->flags, rep->flags, t->analysis);
+ req->rex, rep->wex, req->flags, rep->flags, rep->analysers);
update_state:
- if (t->analysis & AN_RTR_HTTP_HDR) { /* receiving server headers */
+ if (rep->analysers & AN_RTR_HTTP_HDR) { /* receiving server headers */
/*
* Now parse the partial (or complete) lines.
* We will check the response syntax, and also join multi-line
@@ -2672,7 +2686,7 @@
}
t->be->failed_resp++;
t->srv_state = SV_STCLOSE;
- t->analysis &= ~AN_RTR_ANY;
+ rep->analysers = 0;
txn->status = 502;
client_return(t, error_message(t, HTTP_ERR_502));
if (!(t->flags & SN_ERR_MASK))
@@ -2698,7 +2712,7 @@
}
t->be->failed_resp++;
t->srv_state = SV_STCLOSE;
- t->analysis &= ~AN_RTR_ANY;
+ rep->analysers = 0;
txn->status = 502;
client_return(t, error_message(t, HTTP_ERR_502));
if (!(t->flags & SN_ERR_MASK))
@@ -2727,7 +2741,7 @@
}
t->be->failed_resp++;
t->srv_state = SV_STCLOSE;
- t->analysis &= ~AN_RTR_ANY;
+ rep->analysers = 0;
txn->status = 504;
client_return(t, error_message(t, HTTP_ERR_504));
if (!(t->flags & SN_ERR_MASK))
@@ -2749,7 +2763,7 @@
* of each header's length, so we can parse them quickly. *
****************************************************************/
- t->analysis &= ~AN_RTR_HTTP_HDR;
+ rep->analysers &= ~AN_RTR_HTTP_HDR;
/* ensure we keep this pointer to the beginning of the message */
msg->sol = rep->data + msg->som;
@@ -2825,7 +2839,7 @@
buffer_shutw(req);
fd_delete(t->srv_fd);
t->srv_state = SV_STCLOSE;
- t->analysis &= ~AN_RTR_ANY;
+ rep->analysers = 0;
txn->status = 502;
client_return(t, error_message(t, HTTP_ERR_502));
if (!(t->flags & SN_ERR_MASK))
@@ -3046,8 +3060,20 @@
return 0;
}
+ /* Note: eventhough nobody should set an unknown flag, clearing them right now will
+ * probably reduce one day's debugging session.
+ */
+#ifdef DEBUG_DEV
+ if (rep->analysers & ~(AN_RTR_HTTP_HDR)) {
+ fprintf(stderr, "FIXME !!!! unknown analysers flags %s:%d = 0x%08X\n",
+ __FILE__, __LINE__, rep->analysers);
+ ABORT_NOW();
+ }
+#endif
+ rep->analysers &= AN_RTR_HTTP_HDR;
+
/* we want to leave with that clean */
- if (unlikely(t->analysis & AN_RTR_ANY))
+ if (unlikely(rep->analysers != 0))
goto update_state;
return 0;
}
@@ -3085,7 +3111,7 @@
fd_delete(t->cli_fd);
t->cli_state = CL_STCLOSE;
trace_term(t, TT_HTTP_CLI_1);
- if (!(t->analysis & AN_REQ_ANY)) {
+ if (!req->analysers) {
if (!(t->flags & SN_ERR_MASK))
t->flags |= SN_ERR_CLICL;
if (!(t->flags & SN_FINST_MASK)) {
@@ -3148,7 +3174,7 @@
t->cli_state = CL_STCLOSE;
trace_term(t, TT_HTTP_CLI_7);
}
- if (!(t->analysis & AN_REQ_ANY)) {
+ if (!req->analysers) {
if (!(t->flags & SN_ERR_MASK))
t->flags |= SN_ERR_CLITO;
if (!(t->flags & SN_FINST_MASK)) {
@@ -3178,7 +3204,7 @@
t->cli_state = CL_STCLOSE;
trace_term(t, TT_HTTP_CLI_9);
}
- if (!(t->analysis & AN_REQ_ANY)) {
+ if (!req->analysers) {
if (!(t->flags & SN_ERR_MASK))
t->flags |= SN_ERR_CLITO;
if (!(t->flags & SN_FINST_MASK)) {
@@ -3567,7 +3593,7 @@
#endif
}
else {
- t->analysis |= AN_RTR_HTTP_HDR;
+ rep->analysers |= AN_RTR_HTTP_HDR;
buffer_set_rlim(rep, BUFSIZE - MAXREWRITE); /* rewrite needed */
t->txn.rsp.msg_state = HTTP_MSG_RPBEFORE;
/* reset hdr_idx which was already initialized by the request.
@@ -3577,7 +3603,7 @@
}
t->srv_state = SV_STDATA;
- if (!(t->analysis & AN_RTR_ANY))
+ if (!rep->analysers)
t->rep->flags |= BF_MAY_FORWARD;
req->wex = TICK_ETERNITY;
goto update_state;
@@ -3598,7 +3624,7 @@
t->be->failed_resp++;
t->srv_state = SV_STCLOSE;
trace_term(t, TT_HTTP_SRV_6);
- if (!(t->analysis & AN_RTR_ANY)) {
+ if (!rep->analysers) {
if (!(t->flags & SN_ERR_MASK))
t->flags |= SN_ERR_SRVCL;
if (!(t->flags & SN_FINST_MASK))
@@ -3682,7 +3708,7 @@
if (may_dequeue_tasks(t->srv, t->be))
process_srv_queue(t->srv);
}
- if (!(t->analysis & AN_RTR_ANY)) {
+ if (!rep->analysers) {
if (!(t->flags & SN_ERR_MASK))
t->flags |= SN_ERR_SRVTO;
if (!(t->flags & SN_FINST_MASK))
@@ -3714,7 +3740,7 @@
if (may_dequeue_tasks(t->srv, t->be))
process_srv_queue(t->srv);
}
- if (!(t->analysis & AN_RTR_ANY)) {
+ if (!rep->analysers) {
if (!(t->flags & SN_ERR_MASK))
t->flags |= SN_ERR_SRVTO;
if (!(t->flags & SN_FINST_MASK))
@@ -5168,7 +5194,7 @@
txn->status = 401;
client_retnclose(t, &msg);
trace_term(t, TT_HTTP_URI_1);
- t->analysis &= ~AN_REQ_ANY;
+ t->req->analysers = 0;
if (!(t->flags & SN_ERR_MASK))
t->flags |= SN_ERR_PRXCOND;
if (!(t->flags & SN_FINST_MASK))
diff --git a/src/proto_uxst.c b/src/proto_uxst.c
index 9e31e1d..1fe2807 100644
--- a/src/proto_uxst.c
+++ b/src/proto_uxst.c
@@ -412,7 +412,6 @@
}
s->flags = 0;
- s->analysis = 0;
s->term_trace = 0;
if ((t = pool_alloc2(pool2_task)) == NULL) {