blob: 519eb70c61d2df85e4e0adea8d89d306d5f10329 [file] [log] [blame]
Willy Tarreau56e9c5e2012-07-06 09:47:57 +02001/*
2 * include/types/connection.h
3 * This file describes the connection struct and associated constants.
4 *
5 * Copyright (C) 2000-2012 Willy Tarreau - w@1wt.eu
6 *
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation, version 2.1
10 * exclusively.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22#ifndef _TYPES_CONNECTION_H
23#define _TYPES_CONNECTION_H
24
25#include <stdlib.h>
26#include <sys/socket.h>
27
28#include <common/config.h>
29
30/* referenced below */
Willy Tarreau56e9c5e2012-07-06 09:47:57 +020031struct protocol;
Willy Tarreauc5788912012-08-24 18:12:41 +020032struct connection;
33struct buffer;
34struct pipe;
Willy Tarreau3cefd522012-08-30 15:49:18 +020035struct server;
36struct proxy;
37struct si_applet;
38struct task;
39struct listener;
Willy Tarreau56e9c5e2012-07-06 09:47:57 +020040
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020041/* Polling flags that are manipulated by I/O callbacks and handshake callbacks
42 * indicate what they expect from a file descriptor at each layer. For each
43 * direction, we have 2 bits, one stating whether any suspected activity on the
44 * FD induce a call to the iocb, and another one indicating that the FD has
45 * already returned EAGAIN and that polling on it is essential before calling
46 * the iocb again :
47 * POL ENA state
48 * 0 0 STOPPED : any activity on this FD is ignored
49 * 0 1 ENABLED : any (suspected) activity may call the iocb
50 * 1 0 STOPPED : as above
51 * 1 1 POLLED : the FD is being polled for activity
52 *
53 * - Enabling an I/O event consists in ORing with 1.
54 * - Stopping an I/O event consists in ANDing with ~1.
55 * - Polling for an I/O event consists in ORing with ~3.
56 *
57 * The last computed state is remembered in CO_FL_CURR_* so that differential
Willy Tarreaue9dfa792012-09-01 17:26:16 +020058 * changes can be applied. After bits are applied, the POLL status bits are
59 * cleared so that it is possible to detect when an EAGAIN was encountered. For
60 * pollers that do not support speculative I/O, POLLED is the same as ENABLED
61 * and the POL flag can safely be ignored. However it makes a difference for
62 * the connection handler.
63 *
64 * The ENA flags are per-layer (one pair for SOCK, another one for DATA).
65 * The POL flags are only for the socket layer since they indicate that EAGAIN
66 * was encountered. Thus, the DATA layer uses its own ENA flag and the socket
67 * layer's POL flag.
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020068 */
69
Willy Tarreau900bc932012-07-06 09:52:14 +020070/* flags for use in connection->flags */
71enum {
72 CO_FL_NONE = 0x00000000,
73 CO_FL_ERROR = 0x00000001, /* a fatal error was reported */
Willy Tarreauc76ae332012-07-12 15:32:13 +020074 CO_FL_CONNECTED = 0x00000002, /* the connection is now established */
75 CO_FL_WAIT_L4_CONN = 0x00000004, /* waiting for L4 to be connected */
76 CO_FL_WAIT_L6_CONN = 0x00000008, /* waiting for L6 to be connected (eg: SSL) */
77
78 CO_FL_NOTIFY_SI = 0x00000010, /* notify stream interface about changes */
79
Willy Tarreau2c6be842012-07-06 17:12:34 +020080 /* flags below are used for connection handshakes */
Willy Tarreauc76ae332012-07-12 15:32:13 +020081 CO_FL_SI_SEND_PROXY = 0x00000020, /* send a valid PROXY protocol header */
Willy Tarreau22cda212012-08-31 17:43:29 +020082 CO_FL_ACCEPT_PROXY = 0x00000080, /* send a valid PROXY protocol header */
Willy Tarreauc76ae332012-07-12 15:32:13 +020083
84 /* below we have all handshake flags grouped into one */
Willy Tarreau22cda212012-08-31 17:43:29 +020085 CO_FL_HANDSHAKE = CO_FL_SI_SEND_PROXY | CO_FL_ACCEPT_PROXY,
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020086
Willy Tarreau2542b532012-08-31 16:01:23 +020087 CO_FL_INIT_SESS = 0x00000800, /* initialize a session before using data */
88
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020089 /* when any of these flags is set, polling is defined by socket-layer
90 * operations, as opposed to data-layer.
91 */
92 CO_FL_POLL_SOCK = CO_FL_HANDSHAKE | CO_FL_WAIT_L4_CONN | CO_FL_WAIT_L6_CONN,
93
Willy Tarreau986a9d22012-08-30 21:11:38 +020094 /* These flags are used to report whether the from/to addresses are set or not */
Willy Tarreaue9dfa792012-09-01 17:26:16 +020095 CO_FL_ADDR_FROM_SET = 0x00004000, /* addr.from is set */
96 CO_FL_ADDR_TO_SET = 0x00008000, /* addr.to is set */
Willy Tarreau2ba44652012-08-20 17:30:32 +020097
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020098 /* flags used to remember what shutdown have been performed/reported */
99 CO_FL_DATA_RD_SH = 0x00010000, /* DATA layer was notified about shutr/read0 */
100 CO_FL_DATA_WR_SH = 0x00020000, /* DATA layer asked for shutw */
101 CO_FL_SOCK_RD_SH = 0x00040000, /* SOCK layer was notified about shutr/read0 */
102 CO_FL_SOCK_WR_SH = 0x00080000, /* SOCK layer asked for shutw */
103
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200104 /* NOTE: do not change the values of any of the flags below, they're
105 * used with masks and bit shifts to quickly detect multiple changes.
106 */
107
108 /* These flags are used by data layers to indicate to indicate they had
109 * to stop sending data because a buffer was empty (WAIT_DATA) or stop
110 * receiving data because a buffer was full (WAIT_ROOM). The connection
111 * handler clears them before first calling the I/O and data callbacks.
112 */
113 CO_FL_WAIT_DATA = 0x00100000, /* data source is empty */
114 CO_FL_WAIT_ROOM = 0x00200000, /* data sink is full */
115
116 /* These flags are used by both socket-level and data-level callbacks
117 * to indicate that they had to stop receiving or sending because a
118 * socket-level operation returned EAGAIN. While setting these flags
119 * is not always absolutely mandatory (eg: when a reader estimates that
120 * trying again soon without polling is OK), it is however forbidden to
121 * set them without really attempting the I/O operation.
122 */
123 CO_FL_WAIT_RD = 0x00400000, /* receiving needs to poll first */
124 CO_FL_WAIT_WR = 0x00800000, /* sending needs to poll first */
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200125
126 /* flags describing the DATA layer expectations regarding polling */
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200127 CO_FL_DATA_RD_ENA = 0x01000000, /* receiving is allowed */
128 CO_FL_DATA_WR_ENA = 0x02000000, /* sending is desired */
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200129
130 /* flags describing the SOCK layer expectations regarding polling */
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200131 CO_FL_SOCK_RD_ENA = 0x04000000, /* receiving is allowed */
132 CO_FL_SOCK_WR_ENA = 0x08000000, /* sending is desired */
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200133
134 /* flags storing the current polling state */
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200135 CO_FL_CURR_RD_ENA = 0x10000000, /* receiving is allowed */
136 CO_FL_CURR_WR_ENA = 0x20000000, /* sending is desired */
137 CO_FL_CURR_RD_POL = 0x40000000, /* receiving needs to poll first */
138 CO_FL_CURR_WR_POL = 0x80000000, /* sending needs to poll first */
Willy Tarreau900bc932012-07-06 09:52:14 +0200139};
140
Willy Tarreau3cefd522012-08-30 15:49:18 +0200141/* target types */
142enum {
143 TARG_TYPE_NONE = 0, /* no target set, pointer is NULL by definition */
144 TARG_TYPE_CLIENT, /* target is a client, pointer is NULL by definition */
145 TARG_TYPE_PROXY, /* target is a proxy ; use address with the proxy's settings */
146 TARG_TYPE_SERVER, /* target is a server ; use address with server's and its proxy's settings */
147 TARG_TYPE_APPLET, /* target is an applet ; use only the applet */
148 TARG_TYPE_TASK, /* target is a task running an external applet */
149};
150
Willy Tarreauc5788912012-08-24 18:12:41 +0200151
152/* data_ops describes data-layer operations for a connection. They generally
153 * run over a socket-based control layer, but not always.
154 */
155struct data_ops {
156 int (*rcv_buf)(struct connection *conn, struct buffer *buf, int count); /* recv callback */
157 int (*snd_buf)(struct connection *conn, struct buffer *buf, int flags); /* send callback */
158 int (*rcv_pipe)(struct connection *conn, struct pipe *pipe, unsigned int count); /* recv-to-pipe callback */
159 int (*snd_pipe)(struct connection *conn, struct pipe *pipe); /* send-to-pipe callback */
160 void (*shutr)(struct connection *, int); /* shutr function */
161 void (*shutw)(struct connection *, int); /* shutw function */
162 void (*close)(struct connection *); /* close the data channel on the connection */
Willy Tarreau15678ef2012-08-31 13:54:11 +0200163 int (*init)(struct connection *conn); /* initialize the data layer */
Willy Tarreauc5788912012-08-24 18:12:41 +0200164};
165
166/* app_cb describes read and write callbacks which are called upon detected I/O
167 * activity at the data layer. These callbacks are supposed to make use of the
168 * data_ops above to exchange data from/to buffers and pipes.
169 */
170struct app_cb {
171 void (*recv)(struct connection *conn); /* application-layer recv callback */
172 void (*send)(struct connection *conn); /* application-layer send callback */
173};
174
Willy Tarreau3cefd522012-08-30 15:49:18 +0200175/* a target describes what is on the remote side of the connection. */
176struct target {
177 int type;
178 union {
179 void *v; /* pointer value, for any type */
180 struct proxy *p; /* when type is TARG_TYPE_PROXY */
181 struct server *s; /* when type is TARG_TYPE_SERVER */
182 struct si_applet *a; /* when type is TARG_TYPE_APPLET */
183 struct task *t; /* when type is TARG_TYPE_TASK */
184 struct listener *l; /* when type is TARG_TYPE_CLIENT */
185 } ptr;
186};
187
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200188/* This structure describes a connection with its methods and data.
189 * A connection may be performed to proxy or server via a local or remote
190 * socket, and can also be made to an internal applet. It can support
191 * several data schemes (applet, raw, ssl, ...). It can support several
192 * connection control schemes, generally a protocol for socket-oriented
193 * connections, but other methods for applets.
194 */
195struct connection {
Willy Tarreauc5788912012-08-24 18:12:41 +0200196 const struct data_ops *data; /* operations at the data layer */
197 const struct protocol *ctrl; /* operations at the socket layer */
198 const struct app_cb *app_cb; /* application layer callbacks */
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200199 union { /* definitions which depend on connection type */
200 struct { /*** information used by socket-based connections ***/
201 int fd; /* file descriptor for a stream driver when known */
202 } sock;
203 } t;
Willy Tarreau900bc932012-07-06 09:52:14 +0200204 unsigned int flags; /* CO_F_* */
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200205 int data_st; /* data layer state, initialized to zero */
206 void *data_ctx; /* general purpose pointer, initialized to NULL */
Willy Tarreau3cefd522012-08-30 15:49:18 +0200207 struct target target; /* the target to connect to (server, proxy, applet, ...) */
Willy Tarreau986a9d22012-08-30 21:11:38 +0200208 struct {
209 struct sockaddr_storage from; /* client address, or address to spoof when connecting to the server */
210 struct sockaddr_storage to; /* address reached by the client if SN_FRT_ADDR_SET is set, or address to connect to */
211 } addr; /* addresses of the remote side, client for producer and server for consumer */
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200212};
213
214#endif /* _TYPES_CONNECTION_H */
215
216/*
217 * Local variables:
218 * c-indent-level: 8
219 * c-basic-offset: 8
220 * End:
221 */