blob: 85ea48c306d1253617d32c4e15691ce09b49a6e9 [file] [log] [blame]
Willy Tarreau56e9c5e2012-07-06 09:47:57 +02001/*
2 * include/types/connection.h
3 * This file describes the connection struct and associated constants.
4 *
5 * Copyright (C) 2000-2012 Willy Tarreau - w@1wt.eu
6 *
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation, version 2.1
10 * exclusively.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22#ifndef _TYPES_CONNECTION_H
23#define _TYPES_CONNECTION_H
24
25#include <stdlib.h>
26#include <sys/socket.h>
27
28#include <common/config.h>
29
Willy Tarreaud1d54542012-09-12 22:58:11 +020030#include <types/listener.h>
Willy Tarreau3fdb3662012-11-12 00:42:33 +010031#include <types/obj_type.h>
Willy Tarreaud1d54542012-09-12 22:58:11 +020032#include <types/protocol.h>
33
Willy Tarreau56e9c5e2012-07-06 09:47:57 +020034/* referenced below */
Willy Tarreauc5788912012-08-24 18:12:41 +020035struct connection;
36struct buffer;
37struct pipe;
Willy Tarreau3cefd522012-08-30 15:49:18 +020038struct server;
39struct proxy;
40struct si_applet;
41struct task;
Willy Tarreau56e9c5e2012-07-06 09:47:57 +020042
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020043/* Polling flags that are manipulated by I/O callbacks and handshake callbacks
44 * indicate what they expect from a file descriptor at each layer. For each
45 * direction, we have 2 bits, one stating whether any suspected activity on the
46 * FD induce a call to the iocb, and another one indicating that the FD has
47 * already returned EAGAIN and that polling on it is essential before calling
48 * the iocb again :
49 * POL ENA state
50 * 0 0 STOPPED : any activity on this FD is ignored
51 * 0 1 ENABLED : any (suspected) activity may call the iocb
52 * 1 0 STOPPED : as above
53 * 1 1 POLLED : the FD is being polled for activity
54 *
55 * - Enabling an I/O event consists in ORing with 1.
56 * - Stopping an I/O event consists in ANDing with ~1.
57 * - Polling for an I/O event consists in ORing with ~3.
58 *
Willy Tarreauc8dd77f2012-11-05 17:52:26 +010059 * The last ENA state is remembered in CO_FL_CURR_* so that differential
Willy Tarreaue9dfa792012-09-01 17:26:16 +020060 * changes can be applied. After bits are applied, the POLL status bits are
61 * cleared so that it is possible to detect when an EAGAIN was encountered. For
62 * pollers that do not support speculative I/O, POLLED is the same as ENABLED
63 * and the POL flag can safely be ignored. However it makes a difference for
64 * the connection handler.
65 *
Willy Tarreauc8dd77f2012-11-05 17:52:26 +010066 * The ENA flags are per-layer (one pair for SOCK, another one for DATA). The
67 * POL flags are irrelevant to these layers and only reflect the fact that
68 * EAGAIN was encountered, they're materialised by the CO_FL_WAIT_* connection
69 * flags. POL flags always indicate a polling change because it is assumed that
70 * the poller uses a cache and does not always poll.
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020071 */
72
Willy Tarreau900bc932012-07-06 09:52:14 +020073/* flags for use in connection->flags */
74enum {
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020075 CO_FL_NONE = 0x00000000, /* Just for initialization purposes */
Willy Tarreauc76ae332012-07-12 15:32:13 +020076
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020077 /* Do not change these values without updating conn_*_poll_changes() ! */
Willy Tarreauc8dd77f2012-11-05 17:52:26 +010078 CO_FL_SOCK_RD_ENA = 0x00000001, /* receiving handshakes is allowed */
79 CO_FL_DATA_RD_ENA = 0x00000002, /* receiving data is allowed */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020080 CO_FL_CURR_RD_ENA = 0x00000004, /* receiving is currently allowed */
81 CO_FL_WAIT_RD = 0x00000008, /* receiving needs to poll first */
Willy Tarreauc8dd77f2012-11-05 17:52:26 +010082
83 CO_FL_SOCK_WR_ENA = 0x00000010, /* sending handshakes is desired */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020084 CO_FL_DATA_WR_ENA = 0x00000020, /* sending data is desired */
Willy Tarreauc8dd77f2012-11-05 17:52:26 +010085 CO_FL_CURR_WR_ENA = 0x00000040, /* sending is currently desired */
86 CO_FL_WAIT_WR = 0x00000080, /* sending needs to poll first */
Willy Tarreauc76ae332012-07-12 15:32:13 +020087
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020088 /* These flags are used by data layers to indicate they had to stop
89 * sending data because a buffer was empty (WAIT_DATA) or stop receiving
90 * data because a buffer was full (WAIT_ROOM). The connection handler
91 * clears them before first calling the I/O and data callbacks.
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020092 */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020093 CO_FL_WAIT_DATA = 0x00000400, /* data source is empty */
94 CO_FL_WAIT_ROOM = 0x00000800, /* data sink is full */
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020095
Willy Tarreau986a9d22012-08-30 21:11:38 +020096 /* These flags are used to report whether the from/to addresses are set or not */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020097 CO_FL_ADDR_FROM_SET = 0x00001000, /* addr.from is set */
98 CO_FL_ADDR_TO_SET = 0x00002000, /* addr.to is set */
99
100 /* flags indicating what event type the data layer is interested in */
101 CO_FL_INIT_DATA = 0x00004000, /* initialize the data layer before using it */
102 CO_FL_WAKE_DATA = 0x00008000, /* wake-up data layer upon activity at the transport layer */
Willy Tarreau2ba44652012-08-20 17:30:32 +0200103
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200104 /* flags used to remember what shutdown have been performed/reported */
105 CO_FL_DATA_RD_SH = 0x00010000, /* DATA layer was notified about shutr/read0 */
106 CO_FL_DATA_WR_SH = 0x00020000, /* DATA layer asked for shutw */
107 CO_FL_SOCK_RD_SH = 0x00040000, /* SOCK layer was notified about shutr/read0 */
108 CO_FL_SOCK_WR_SH = 0x00080000, /* SOCK layer asked for shutw */
109
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200110 /* flags used to report connection status and errors */
111 CO_FL_ERROR = 0x00100000, /* a fatal error was reported */
112 CO_FL_CONNECTED = 0x00200000, /* the connection is now established */
113 CO_FL_WAIT_L4_CONN = 0x00400000, /* waiting for L4 to be connected */
114 CO_FL_WAIT_L6_CONN = 0x00800000, /* waiting for L6 to be connected (eg: SSL) */
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200115
Willy Tarreau9e272bf2012-10-03 21:04:48 +0200116 /* synthesis of the flags above */
117 CO_FL_CONN_STATE = 0x00FF0000, /* all shut/connected flags */
118
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200119 /*** All the flags below are used for connection handshakes. Any new
120 * handshake should be added after this point, and CO_FL_HANDSHAKE
121 * should be updated.
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200122 */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200123 CO_FL_SI_SEND_PROXY = 0x01000000, /* send a valid PROXY protocol header */
124 CO_FL_SSL_WAIT_HS = 0x02000000, /* wait for an SSL handshake to complete */
Willy Tarreau5f1504f2012-10-04 23:55:57 +0200125 CO_FL_ACCEPT_PROXY = 0x04000000, /* receive a valid PROXY protocol header */
126 CO_FL_LOCAL_SPROXY = 0x08000000, /* send a valid local PROXY protocol header */
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200127
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200128 /* below we have all handshake flags grouped into one */
Willy Tarreau5f1504f2012-10-04 23:55:57 +0200129 CO_FL_HANDSHAKE = CO_FL_SI_SEND_PROXY | CO_FL_SSL_WAIT_HS | CO_FL_ACCEPT_PROXY | CO_FL_LOCAL_SPROXY,
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200130
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200131 /* when any of these flags is set, polling is defined by socket-layer
132 * operations, as opposed to data-layer. Transport is explicitly not
133 * mentionned here to avoid any confusion, since it can be the same
134 * as DATA or SOCK on some implementations.
135 */
136 CO_FL_POLL_SOCK = CO_FL_HANDSHAKE | CO_FL_WAIT_L4_CONN | CO_FL_WAIT_L6_CONN,
Willy Tarreau1e954912012-10-12 17:50:05 +0200137
138 /* This last flag indicates that the transport layer is used (for instance
139 * by logs) and must not be cleared yet. The last call to conn_xprt_close()
140 * must be done after clearing this flag.
141 */
142 CO_FL_XPRT_TRACKED = 0x80000000,
Willy Tarreau900bc932012-07-06 09:52:14 +0200143};
144
Willy Tarreau14cba4b2012-11-30 17:33:05 +0100145
146/* possible connection error codes */
147enum {
148 CO_ER_NONE, /* no error */
Willy Tarreau8e3bf692012-12-03 15:41:18 +0100149 CO_ER_PRX_EMPTY, /* nothing received in PROXY protocol header */
150 CO_ER_PRX_ABORT, /* client abort during PROXY protocol header */
Willy Tarreau0af29122012-12-03 15:35:00 +0100151 CO_ER_PRX_TIMEOUT, /* timeout while waiting for a PROXY header */
Willy Tarreau8e3bf692012-12-03 15:41:18 +0100152 CO_ER_PRX_TRUNCATED, /* truncated PROXY protocol header */
153 CO_ER_PRX_NOT_HDR, /* not a PROXY protocol header */
154 CO_ER_PRX_BAD_HDR, /* bad PROXY protocol header */
155 CO_ER_PRX_BAD_PROTO, /* unsupported protocol in PROXY header */
156
Willy Tarreau20879a02012-12-03 16:32:10 +0100157 CO_ER_SSL_EMPTY, /* client closed during SSL handshake */
158 CO_ER_SSL_ABORT, /* client abort during SSL handshake */
Willy Tarreau0af29122012-12-03 15:35:00 +0100159 CO_ER_SSL_TIMEOUT, /* timeout during SSL handshake */
Willy Tarreau20879a02012-12-03 16:32:10 +0100160 CO_ER_SSL_TOO_MANY, /* too many SSL connections */
161 CO_ER_SSL_NO_MEM, /* no more memory to allocate an SSL connection */
162 CO_ER_SSL_RENEG, /* forbidden client renegociation */
163 CO_ER_SSL_CA_FAIL, /* client cert verification failed in the CA chain */
164 CO_ER_SSL_CRT_FAIL, /* client cert verification failed on the certificate */
165 CO_ER_SSL_HANDSHAKE, /* SSL error during handshake */
166 CO_ER_SSL_NO_TARGET, /* unkonwn target (not client nor server) */
Willy Tarreau14cba4b2012-11-30 17:33:05 +0100167};
168
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200169/* xprt_ops describes transport-layer operations for a connection. They
170 * generally run over a socket-based control layer, but not always. Some
171 * of them are used for data transfer with the upper layer (rcv_*, snd_*)
172 * and the other ones are used to setup and release the transport layer.
Willy Tarreauc5788912012-08-24 18:12:41 +0200173 */
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200174struct xprt_ops {
Willy Tarreauc5788912012-08-24 18:12:41 +0200175 int (*rcv_buf)(struct connection *conn, struct buffer *buf, int count); /* recv callback */
176 int (*snd_buf)(struct connection *conn, struct buffer *buf, int flags); /* send callback */
177 int (*rcv_pipe)(struct connection *conn, struct pipe *pipe, unsigned int count); /* recv-to-pipe callback */
178 int (*snd_pipe)(struct connection *conn, struct pipe *pipe); /* send-to-pipe callback */
179 void (*shutr)(struct connection *, int); /* shutr function */
180 void (*shutw)(struct connection *, int); /* shutw function */
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200181 void (*close)(struct connection *); /* close the transport layer */
182 int (*init)(struct connection *conn); /* initialize the transport layer */
Willy Tarreauc5788912012-08-24 18:12:41 +0200183};
184
Willy Tarreau74beec32012-10-03 00:41:04 +0200185/* data_cb describes the data layer's recv and send callbacks which are called
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200186 * when I/O activity was detected after the transport layer is ready. These
187 * callbacks are supposed to make use of the xprt_ops above to exchange data
Willy Tarreau4aa36832012-10-02 20:07:22 +0200188 * from/to buffers and pipes. The <wake> callback is used to report activity
189 * at the transport layer, which can be a connection opening/close, or any
Willy Tarreauf4e114f2012-10-03 01:12:30 +0200190 * data movement. The <init> callback may be called by the connection handler
191 * at the end of a transport handshake, when it is about to transfer data and
Willy Tarreau2396c1c2012-10-03 21:12:16 +0200192 * the data layer is not ready yet. Both <wake> and <init> may abort a connection
193 * by returning < 0.
Willy Tarreauc5788912012-08-24 18:12:41 +0200194 */
Willy Tarreau74beec32012-10-03 00:41:04 +0200195struct data_cb {
196 void (*recv)(struct connection *conn); /* data-layer recv callback */
197 void (*send)(struct connection *conn); /* data-layer send callback */
Willy Tarreau2396c1c2012-10-03 21:12:16 +0200198 int (*wake)(struct connection *conn); /* data-layer callback to report activity */
Willy Tarreauf4e114f2012-10-03 01:12:30 +0200199 int (*init)(struct connection *conn); /* data-layer initialization */
Willy Tarreauc5788912012-08-24 18:12:41 +0200200};
201
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200202/* This structure describes a connection with its methods and data.
203 * A connection may be performed to proxy or server via a local or remote
204 * socket, and can also be made to an internal applet. It can support
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200205 * several transport schemes (applet, raw, ssl, ...). It can support several
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200206 * connection control schemes, generally a protocol for socket-oriented
207 * connections, but other methods for applets.
208 */
209struct connection {
Willy Tarreauc5788912012-08-24 18:12:41 +0200210 const struct protocol *ctrl; /* operations at the socket layer */
Willy Tarreau378e0412012-10-13 14:33:58 +0200211 const struct xprt_ops *xprt; /* operations at the transport layer */
Willy Tarreau74beec32012-10-03 00:41:04 +0200212 const struct data_cb *data; /* data layer callbacks */
Willy Tarreau14cba4b2012-11-30 17:33:05 +0100213 unsigned int flags; /* CO_FL_* */
Willy Tarreau378e0412012-10-13 14:33:58 +0200214 int xprt_st; /* transport layer state, initialized to zero */
215 void *xprt_ctx; /* general purpose pointer, initialized to NULL */
Willy Tarreaucd379952012-09-27 22:14:33 +0200216 void *owner; /* pointer to upper layer's entity (eg: stream interface) */
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200217 union { /* definitions which depend on connection type */
218 struct { /*** information used by socket-based connections ***/
219 int fd; /* file descriptor for a stream driver when known */
220 } sock;
221 } t;
Willy Tarreau14cba4b2012-11-30 17:33:05 +0100222 unsigned int err_code; /* CO_ER_* */
Willy Tarreau3fdb3662012-11-12 00:42:33 +0100223 enum obj_type *target; /* the target to connect to (server, proxy, applet, ...) */
Willy Tarreau986a9d22012-08-30 21:11:38 +0200224 struct {
225 struct sockaddr_storage from; /* client address, or address to spoof when connecting to the server */
Willy Tarreaucd379952012-09-27 22:14:33 +0200226 struct sockaddr_storage to; /* address reached by the client, or address to connect to */
Willy Tarreau986a9d22012-08-30 21:11:38 +0200227 } addr; /* addresses of the remote side, client for producer and server for consumer */
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200228};
229
230#endif /* _TYPES_CONNECTION_H */
231
232/*
233 * Local variables:
234 * c-indent-level: 8
235 * c-basic-offset: 8
236 * End:
237 */