Revert "MEDIUM: checks: capture groups in expect regexes"

This reverts commit 1979943c30ef285ed04f07ecf829514de971d9b2.

Captures in comment was only used when a tcp-check expect based on a negative
regex matching failed to eventually report what was captured while it was not
expected. It is a bit far-fetched to be useable IMHO. on-error and on-success
log-format strings are far more usable. For now there is few check sample
fetches (in fact only one...). But it could be really powerful to report info in
logs.
diff --git a/include/types/checks.h b/include/types/checks.h
index 5f6b5c9..8d17d51 100644
--- a/include/types/checks.h
+++ b/include/types/checks.h
@@ -247,7 +247,6 @@
 
 /* tcp-check expect flags */
 #define TCPCHK_EXPT_FL_INV    0x0001 /* Matching is inversed */
-#define TCPCHK_EXPT_FL_CAP    0x0002 /* Regex matching with capture */
 
 struct tcpcheck_expect {
 	enum tcpcheck_expect_type type;   /* Type of pattern used for matching. */
diff --git a/reg-tests/checks/tcp-check_comment-with-capture.vtc b/reg-tests/checks/tcp-check_comment-with-capture.vtc
deleted file mode 100644
index 31f8820..0000000
--- a/reg-tests/checks/tcp-check_comment-with-capture.vtc
+++ /dev/null
@@ -1,60 +0,0 @@
-varnishtest "tcp-check expect rule with capture groups"
-#EXCLUDE_TARGETS=freebsd,osx,generic
-#REQUIRE_VERSION=2.2
-#REGTEST_TYPE=slow
-# This script tests expect rules matching a regex with capture groups and
-# defining a comment with backreferences. Text and binary regex are tested.
-feature ignore_unknown_macro
-
-syslog S1 -level notice {
-    recv
-    expect ~ "[^:\\[ ]\\[${h1_pid}\\]: Proxy be1 started."
-    recv
-    expect ~ "[^:\\[ ]\\[${h1_pid}\\]: Health check for server be1/srv1 failed.*code=400 reason=Bad Request"
-} -start
-
-syslog S2 -level notice {
-    recv
-    expect ~ "[^:\\[ ]\\[${h1_pid}\\]: Proxy be2 started."
-    recv
-    expect ~ "[^:\\[ ]\\[${h1_pid}\\]: Health check for server be2/srv1 failed.*code=400 reason=Bad Request"
-} -start
-
-server s1 {
-    rxreq
-    txresp -status 400 -reason "Bad Request"
-} -start
-
-server s2 {
-    rxreq
-    txresp -status 400 -reason "Bad Request"
-} -start
-
-haproxy h1 -conf {
-  defaults
-    timeout client 5s
-    timeout connect 5s
-    timeout server 5s
-    timeout check 5s
-
-  backend be1
-    log ${S1_addr}:${S1_port} len 2048 local0
-    option tcp-check
-    option log-health-checks
-    tcp-check connect
-    tcp-check send "GET / HTTP/1.1\r\n\r\n"
-    tcp-check expect !rstring "HTTP/1\\.1\s+([45][0-9]{2})\s+([^\r\n]*)" comment " Bad response: code=\\1 reason=\\2"
-    server srv1 ${s1_addr}:${s1_port} check inter 1000ms rise 1 fall 1
-
-  backend be2
-    log ${S2_addr}:${S2_port} len 2048 local0
-    option tcp-check
-    option log-health-checks
-    tcp-check connect
-    tcp-check send-binary "474554202f20485454502f312e31200d0a0d0a" # GET / HTTP/1.1\r\n\r\n
-    tcp-check expect !rbinary "485454502F312E3120(34[0-9]{4}|35[0-9]{4})20(([^0].)*)" comment " Bad response: code=\\1 reason=\\2"
-    server srv1 ${s2_addr}:${s2_port} check inter 1000ms rise 1 fall 1
-} -start
-
-syslog S1 -wait
-syslog S2 -wait
diff --git a/src/checks.c b/src/checks.c
index c805c2b..7dff7e9 100644
--- a/src/checks.c
+++ b/src/checks.c
@@ -1060,18 +1060,6 @@
 		break;
 	case TCPCHK_EXPECT_REGEX_BINARY:
 		chunk_appendf(msg, " (binary regex) at step %d", tcpcheck_get_step_id(check, rule));
-
-		/* If references to the matched text were made, divide the
-		 * offsets by 2 to match offset of the original response buffer.
-		 */
-		if (rule->expect.flags & TCPCHK_EXPT_FL_CAP) {
-			int i;
-
-			for (i = 1; i < MAX_MATCH && pmatch[i].rm_so != -1; i++) {
-				pmatch[i].rm_so /= 2; /* at first matched char. */
-				pmatch[i].rm_eo /= 2; /* at last matched char. */
-			}
-		}
 		break;
 	case TCPCHK_EXPECT_CUSTOM:
 		chunk_appendf(msg, " (custom function) at step %d", tcpcheck_get_step_id(check, rule));
@@ -1087,13 +1075,7 @@
 	 */
 	if (rule->comment) {
 		chunk_strcat(msg, " comment: ");
-		if (rule->expect.flags & TCPCHK_EXPT_FL_CAP) {
-			int ret = exp_replace(b_tail(msg), b_room(msg), b_head(&check->bi), rule->comment, pmatch);
-			if (ret != -1) /* ignore comment if too large */
-				msg->data += ret;
-		}
-		else
-			chunk_strcat(msg, rule->comment);
+		chunk_strcat(msg, rule->comment);
 	}
 
 	/* Finally, the check status code is set if the failing expect rule
@@ -2271,21 +2253,13 @@
 		match = my_memmem(b_head(&check->bi), b_data(&check->bi), istptr(expect->data), istlen(expect->data)) != NULL;
 		break;
 	case TCPCHK_EXPECT_REGEX:
-		if (expect->flags & TCPCHK_EXPT_FL_CAP)
-			match = regex_exec_match2(expect->regex, b_head(&check->bi), MIN(b_data(&check->bi), b_size(&check->bi)-1),
-						  MAX_MATCH, pmatch, 0);
-		else
-			match = regex_exec2(expect->regex, b_head(&check->bi), MIN(b_data(&check->bi), b_size(&check->bi)-1));
+		match = regex_exec2(expect->regex, b_head(&check->bi), MIN(b_data(&check->bi), b_size(&check->bi)-1));
 		break;
 
 	case TCPCHK_EXPECT_REGEX_BINARY:
 		chunk_reset(&trash);
 		dump_binary(&trash, b_head(&check->bi), b_data(&check->bi));
-		if (expect->flags & TCPCHK_EXPT_FL_CAP)
-			match = regex_exec_match2(expect->regex, b_head(&trash), MIN(b_data(&trash), b_size(&trash)-1),
-						  MAX_MATCH, pmatch, 0);
-		else
-			match = regex_exec2(expect->regex, b_head(&trash), MIN(b_data(&trash), b_size(&trash)-1));
+		match = regex_exec2(expect->regex, b_head(&trash), MIN(b_data(&trash), b_size(&trash)-1));
 		break;
 	case TCPCHK_EXPECT_CUSTOM:
 		if (expect->custom)
@@ -3935,7 +3909,7 @@
 	enum healthcheck_status err_st = HCHK_STATUS_L7RSP;
 	enum healthcheck_status tout_st = HCHK_STATUS_L7TOUT;
 	long min_recv = -1;
-	int inverse = 0, with_capture = 0;
+	int inverse = 0;
 
 	str = on_success_msg = on_error_msg = comment = pattern = NULL;
 	if (!*(args[cur_arg+1])) {
@@ -4203,25 +4177,6 @@
 		cur_arg++;
 	}
 
-	if (comment) {
-		char *p = comment;
-
-		while (*p) {
-			if (*p == '\\') {
-				p++;
-				if (!*p || !isdigit((unsigned char)*p) ||
-				    (*p == 'x' && (!*(p+1) || !*(p+2) || !ishex(*(p+1)) || !ishex(*(p+2))))) {
-					memprintf(errmsg, "invalid backreference in 'comment' argument");
-					goto error;
-				}
-				with_capture = 1;
-			}
-			p++;
-		}
-		if (with_capture && !inverse)
-			memprintf(errmsg, "using backreference in a positive expect comment is useless");
-	}
-
 	chk = calloc(1, sizeof(*chk));
 	if (!chk) {
 		memprintf(errmsg, "out of memory");
@@ -4234,7 +4189,6 @@
 	chk->expect.type = type;
 	chk->expect.min_recv = min_recv;
 	chk->expect.flags |= (inverse ? TCPCHK_EXPT_FL_INV : 0);
-	chk->expect.flags |= (with_capture ? TCPCHK_EXPT_FL_CAP : 0);
 	chk->expect.ok_status = ok_st;
 	chk->expect.err_status = err_st;
 	chk->expect.tout_status = tout_st;
@@ -4278,7 +4232,7 @@
 	case TCPCHK_EXPECT_REGEX_BINARY:
 	case TCPCHK_EXPECT_HTTP_REGEX_STATUS:
 	case TCPCHK_EXPECT_HTTP_REGEX_BODY:
-		chk->expect.regex = regex_comp(pattern, 1, with_capture, errmsg);
+		chk->expect.regex = regex_comp(pattern, 1, 0, errmsg);
 		if (!chk->expect.regex)
 			goto error;
 		break;