MINOR: tcp-rules: Make tcp-request capture a custom action
Now, this action is use its own dedicated function and is no longer handled "in
place" during the TCP rules evaluation. Thus the action name ACT_TCP_CAPTURE is
removed. The action type is set to ACT_CUSTOM and a check function is used to
know if the rule depends on request contents while there is no inspect-delay.
diff --git a/include/proto/action.h b/include/proto/action.h
index b7339f4..eb660dd 100644
--- a/include/proto/action.h
+++ b/include/proto/action.h
@@ -80,4 +80,12 @@
*/
int check_trk_action(struct act_rule *rule, struct proxy *px, char **err);
+/* check a capture rule. This function should be called during the configuration
+ * validity check.
+ *
+ * The function returns 1 in success case, otherwise, it returns 0 and err is
+ * filled.
+ */
+int check_capture(struct act_rule *rule, struct proxy *px, char **err);
+
#endif /* _PROTO_ACTION_H */
diff --git a/include/types/action.h b/include/types/action.h
index 1077ec9..63dcfcf 100644
--- a/include/types/action.h
+++ b/include/types/action.h
@@ -93,7 +93,6 @@
ACT_TCP_EXPECT_PX,
ACT_TCP_EXPECT_CIP,
ACT_TCP_CLOSE, /* close at the sender's */
- ACT_TCP_CAPTURE, /* capture a fetched sample */
};
/* NOTE: if <.action_ptr> is defined, the referenced function will always be
diff --git a/src/action.c b/src/action.c
index 544d3e4..dad7472 100644
--- a/src/action.c
+++ b/src/action.c
@@ -81,6 +81,26 @@
return 1;
}
+/* check a capture rule. This function should be called during the configuration
+ * validity check.
+ *
+ * The function returns 1 in success case, otherwise, it returns 0 and err is
+ * filled.
+ */
+int check_capture(struct act_rule *rule, struct proxy *px, char **err)
+{
+ if (rule->from == ACT_F_TCP_REQ_CNT && (px->cap & PR_CAP_FE) && !px->tcp_req.inspect_delay &&
+ !(rule->arg.trk_ctr.expr->fetch->val & SMP_VAL_FE_SES_ACC)) {
+ ha_warning("config : %s '%s' : a 'tcp-request capture' rule explicitly depending on request"
+ " contents without any 'tcp-request inspect-delay' setting."
+ " This means that this rule will randomly find its contents. This can be fixed by"
+ " setting the tcp-request inspect-delay.\n",
+ proxy_type_str(px), px->id);
+ }
+
+ return 1;
+}
+
int act_resolution_cb(struct dns_requester *requester, struct dns_nameserver *nameserver)
{
struct stream *stream;
diff --git a/src/cfgparse.c b/src/cfgparse.c
index 3ff8a8d..3d72af9 100644
--- a/src/cfgparse.c
+++ b/src/cfgparse.c
@@ -3481,26 +3481,6 @@
newsrv = newsrv->next;
}
- /* check if we have a frontend with "tcp-request content" looking at L7
- * with no inspect-delay
- */
- if ((curproxy->cap & PR_CAP_FE) && !curproxy->tcp_req.inspect_delay) {
- list_for_each_entry(arule, &curproxy->tcp_req.inspect_rules, list) {
- if (arule->action == ACT_TCP_CAPTURE &&
- !(arule->arg.cap.expr->fetch->val & SMP_VAL_FE_SES_ACC))
- break;
- }
-
- if (&arule->list != &curproxy->tcp_req.inspect_rules) {
- ha_warning("config : %s '%s' : some 'tcp-request content' rules explicitly depending on request"
- " contents were found in a frontend without any 'tcp-request inspect-delay' setting."
- " This means that these rules will randomly find their contents. This can be fixed by"
- " setting the tcp-request inspect-delay.\n",
- proxy_type_str(curproxy), curproxy->id);
- err_code |= ERR_WARN;
- }
- }
-
/* Check filter configuration, if any */
cfgerr += flt_check(curproxy);
diff --git a/src/tcp_rules.c b/src/tcp_rules.c
index fbd8768..4f90ced 100644
--- a/src/tcp_rules.c
+++ b/src/tcp_rules.c
@@ -185,33 +185,6 @@
else if (rule->action == ACT_ACTION_DENY) {
goto deny;
}
- else if (rule->action == ACT_TCP_CAPTURE) {
- struct sample *key;
- struct cap_hdr *h = rule->arg.cap.hdr;
- char **cap = s->req_cap;
- int len;
-
- key = sample_fetch_as_type(s->be, sess, s, SMP_OPT_DIR_REQ | partial, rule->arg.cap.expr, SMP_T_STR);
- if (!key)
- continue;
-
- if (key->flags & SMP_F_MAY_CHANGE)
- goto missing_data;
-
- if (cap[h->index] == NULL)
- cap[h->index] = pool_alloc(h->pool);
-
- if (cap[h->index] == NULL) /* no more capture memory */
- continue;
-
- len = key->data.u.str.data;
- if (len > h->len)
- len = h->len;
-
- memcpy(cap[h->index], key->data.u.str.area,
- len);
- cap[h->index][len] = 0;
- }
}
}
@@ -688,6 +661,47 @@
return ACT_RET_CONT;
}
+/* This function executes a capture actions. It executes a fetch expression,
+ * turns the result into a string and puts it in a capture slot. On success, it
+ * returns ACT_RET_CONT. If it must yield, it return ACT_RET_YIELD. Otherwsize
+ * ACT_RET_ERR is returned.
+ */
+static enum act_return tcp_action_capture(struct act_rule *rule, struct proxy *px,
+ struct session *sess, struct stream *s, int flags)
+{
+ struct sample *key;
+ struct cap_hdr *h = rule->arg.cap.hdr;
+ char **cap = s->req_cap;
+ int len, opt;
+
+ opt = ((rule->from == ACT_F_TCP_REQ_CNT) ? SMP_OPT_DIR_REQ : SMP_OPT_DIR_RES);
+ if (flags & ACT_FLAG_FINAL)
+ opt |= SMP_OPT_FINAL;
+
+ key = sample_fetch_as_type(s->be, sess, s, opt, rule->arg.cap.expr, SMP_T_STR);
+ if (!key)
+ goto end;
+
+ if ((key->flags & SMP_F_MAY_CHANGE) && !(flags & ACT_FLAG_FINAL))
+ return ACT_RET_YIELD; /* key might appear later */
+
+ if (cap[h->index] == NULL) {
+ cap[h->index] = pool_alloc(h->pool);
+ if (cap[h->index] == NULL) /* no more capture memory, ignore error */
+ goto end;
+ }
+
+ len = key->data.u.str.data;
+ if (len > h->len)
+ len = h->len;
+
+ memcpy(cap[h->index], key->data.u.str.area, len);
+ cap[h->index][len] = 0;
+
+ end:
+ return ACT_RET_CONT;
+}
+
/* Parse a tcp-request rule. Return a negative value in case of failure */
static int tcp_parse_request_rule(char **args, int arg, int section_type,
struct proxy *curpx, struct proxy *defpx,
@@ -794,7 +808,9 @@
rule->arg.cap.expr = expr;
rule->arg.cap.hdr = hdr;
- rule->action = ACT_TCP_CAPTURE;
+ rule->action = ACT_CUSTOM;
+ rule->action_ptr = tcp_action_capture;
+ rule->check_ptr = check_capture;
}
else if (strncmp(args[arg], "track-sc", 8) == 0) {
struct sample_expr *expr;