blob: 3219309dbb88808ad54c2393e45705de22228dd9 [file] [log] [blame]
Willy Tarreau56e9c5e2012-07-06 09:47:57 +02001/*
2 * include/types/connection.h
3 * This file describes the connection struct and associated constants.
4 *
5 * Copyright (C) 2000-2012 Willy Tarreau - w@1wt.eu
6 *
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation, version 2.1
10 * exclusively.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22#ifndef _TYPES_CONNECTION_H
23#define _TYPES_CONNECTION_H
24
25#include <stdlib.h>
26#include <sys/socket.h>
27
28#include <common/config.h>
29
Willy Tarreaud1d54542012-09-12 22:58:11 +020030#include <types/listener.h>
31#include <types/protocol.h>
32
Willy Tarreau56e9c5e2012-07-06 09:47:57 +020033/* referenced below */
Willy Tarreauc5788912012-08-24 18:12:41 +020034struct connection;
35struct buffer;
36struct pipe;
Willy Tarreau3cefd522012-08-30 15:49:18 +020037struct server;
38struct proxy;
39struct si_applet;
40struct task;
Willy Tarreau56e9c5e2012-07-06 09:47:57 +020041
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020042/* Polling flags that are manipulated by I/O callbacks and handshake callbacks
43 * indicate what they expect from a file descriptor at each layer. For each
44 * direction, we have 2 bits, one stating whether any suspected activity on the
45 * FD induce a call to the iocb, and another one indicating that the FD has
46 * already returned EAGAIN and that polling on it is essential before calling
47 * the iocb again :
48 * POL ENA state
49 * 0 0 STOPPED : any activity on this FD is ignored
50 * 0 1 ENABLED : any (suspected) activity may call the iocb
51 * 1 0 STOPPED : as above
52 * 1 1 POLLED : the FD is being polled for activity
53 *
54 * - Enabling an I/O event consists in ORing with 1.
55 * - Stopping an I/O event consists in ANDing with ~1.
56 * - Polling for an I/O event consists in ORing with ~3.
57 *
58 * The last computed state is remembered in CO_FL_CURR_* so that differential
Willy Tarreaue9dfa792012-09-01 17:26:16 +020059 * changes can be applied. After bits are applied, the POLL status bits are
60 * cleared so that it is possible to detect when an EAGAIN was encountered. For
61 * pollers that do not support speculative I/O, POLLED is the same as ENABLED
62 * and the POL flag can safely be ignored. However it makes a difference for
63 * the connection handler.
64 *
65 * The ENA flags are per-layer (one pair for SOCK, another one for DATA).
66 * The POL flags are only for the socket layer since they indicate that EAGAIN
67 * was encountered. Thus, the DATA layer uses its own ENA flag and the socket
68 * layer's POL flag.
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020069 *
70 * The bits are arranged so that it is possible to detect a change by performing
71 * only a left shift followed by a xor and applying a mask to the result. The
72 * principle is that depending on what we want to check (data polling changes or
73 * sock polling changes), we mask different bits. The bits are arranged this way :
74 *
75 * S(ock) - W(ait) - C(urr) - P(oll) - D(ata)
76 *
77 * SOCK changes are reported when (S != C) || (W != P) => (S:W) != (C:P)
78 * DATA changes are reported when (D != C) || (W != P) => (W:C) != (P:D)
79 * The R and W bits are split apart so that we never shift more than 2 bits at
80 * a time, allowing move+shift to be done as a single operation on x86.
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +020081 */
82
Willy Tarreau900bc932012-07-06 09:52:14 +020083/* flags for use in connection->flags */
84enum {
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020085 CO_FL_NONE = 0x00000000, /* Just for initialization purposes */
Willy Tarreauc76ae332012-07-12 15:32:13 +020086
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020087 /* Do not change these values without updating conn_*_poll_changes() ! */
88 CO_FL_DATA_RD_ENA = 0x00000001, /* receiving data is allowed */
89 CO_FL_CURR_RD_POL = 0x00000002, /* receiving needs to poll first */
90 CO_FL_CURR_RD_ENA = 0x00000004, /* receiving is currently allowed */
91 CO_FL_WAIT_RD = 0x00000008, /* receiving needs to poll first */
92 CO_FL_SOCK_RD_ENA = 0x00000010, /* receiving handshakes is allowed */
93 CO_FL_DATA_WR_ENA = 0x00000020, /* sending data is desired */
94 CO_FL_CURR_WR_POL = 0x00000040, /* sending needs to poll first */
95 CO_FL_CURR_WR_ENA = 0x00000080, /* sending is currently desired */
96 CO_FL_WAIT_WR = 0x00000100, /* sending needs to poll first */
97 CO_FL_SOCK_WR_ENA = 0x00000200, /* sending handshakes is desired */
Willy Tarreauc76ae332012-07-12 15:32:13 +020098
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +020099 /* These flags are used by data layers to indicate they had to stop
100 * sending data because a buffer was empty (WAIT_DATA) or stop receiving
101 * data because a buffer was full (WAIT_ROOM). The connection handler
102 * clears them before first calling the I/O and data callbacks.
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200103 */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200104 CO_FL_WAIT_DATA = 0x00000400, /* data source is empty */
105 CO_FL_WAIT_ROOM = 0x00000800, /* data sink is full */
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200106
Willy Tarreau986a9d22012-08-30 21:11:38 +0200107 /* These flags are used to report whether the from/to addresses are set or not */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200108 CO_FL_ADDR_FROM_SET = 0x00001000, /* addr.from is set */
109 CO_FL_ADDR_TO_SET = 0x00002000, /* addr.to is set */
110
111 /* flags indicating what event type the data layer is interested in */
112 CO_FL_INIT_DATA = 0x00004000, /* initialize the data layer before using it */
113 CO_FL_WAKE_DATA = 0x00008000, /* wake-up data layer upon activity at the transport layer */
Willy Tarreau2ba44652012-08-20 17:30:32 +0200114
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200115 /* flags used to remember what shutdown have been performed/reported */
116 CO_FL_DATA_RD_SH = 0x00010000, /* DATA layer was notified about shutr/read0 */
117 CO_FL_DATA_WR_SH = 0x00020000, /* DATA layer asked for shutw */
118 CO_FL_SOCK_RD_SH = 0x00040000, /* SOCK layer was notified about shutr/read0 */
119 CO_FL_SOCK_WR_SH = 0x00080000, /* SOCK layer asked for shutw */
120
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200121 /* flags used to report connection status and errors */
122 CO_FL_ERROR = 0x00100000, /* a fatal error was reported */
123 CO_FL_CONNECTED = 0x00200000, /* the connection is now established */
124 CO_FL_WAIT_L4_CONN = 0x00400000, /* waiting for L4 to be connected */
125 CO_FL_WAIT_L6_CONN = 0x00800000, /* waiting for L6 to be connected (eg: SSL) */
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200126
Willy Tarreau9e272bf2012-10-03 21:04:48 +0200127 /* synthesis of the flags above */
128 CO_FL_CONN_STATE = 0x00FF0000, /* all shut/connected flags */
129
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200130 /*** All the flags below are used for connection handshakes. Any new
131 * handshake should be added after this point, and CO_FL_HANDSHAKE
132 * should be updated.
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200133 */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200134 CO_FL_SI_SEND_PROXY = 0x01000000, /* send a valid PROXY protocol header */
135 CO_FL_SSL_WAIT_HS = 0x02000000, /* wait for an SSL handshake to complete */
136 CO_FL_ACCEPT_PROXY = 0x04000000, /* send a valid PROXY protocol header */
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200137
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200138 /* below we have all handshake flags grouped into one */
139 CO_FL_HANDSHAKE = CO_FL_SI_SEND_PROXY | CO_FL_SSL_WAIT_HS | CO_FL_ACCEPT_PROXY,
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200140
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200141 /* when any of these flags is set, polling is defined by socket-layer
142 * operations, as opposed to data-layer. Transport is explicitly not
143 * mentionned here to avoid any confusion, since it can be the same
144 * as DATA or SOCK on some implementations.
145 */
146 CO_FL_POLL_SOCK = CO_FL_HANDSHAKE | CO_FL_WAIT_L4_CONN | CO_FL_WAIT_L6_CONN,
Willy Tarreau900bc932012-07-06 09:52:14 +0200147};
148
Willy Tarreau3cefd522012-08-30 15:49:18 +0200149/* target types */
150enum {
151 TARG_TYPE_NONE = 0, /* no target set, pointer is NULL by definition */
152 TARG_TYPE_CLIENT, /* target is a client, pointer is NULL by definition */
153 TARG_TYPE_PROXY, /* target is a proxy ; use address with the proxy's settings */
154 TARG_TYPE_SERVER, /* target is a server ; use address with server's and its proxy's settings */
155 TARG_TYPE_APPLET, /* target is an applet ; use only the applet */
156 TARG_TYPE_TASK, /* target is a task running an external applet */
157};
158
Willy Tarreauc5788912012-08-24 18:12:41 +0200159
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200160/* xprt_ops describes transport-layer operations for a connection. They
161 * generally run over a socket-based control layer, but not always. Some
162 * of them are used for data transfer with the upper layer (rcv_*, snd_*)
163 * and the other ones are used to setup and release the transport layer.
Willy Tarreauc5788912012-08-24 18:12:41 +0200164 */
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200165struct xprt_ops {
Willy Tarreauc5788912012-08-24 18:12:41 +0200166 int (*rcv_buf)(struct connection *conn, struct buffer *buf, int count); /* recv callback */
167 int (*snd_buf)(struct connection *conn, struct buffer *buf, int flags); /* send callback */
168 int (*rcv_pipe)(struct connection *conn, struct pipe *pipe, unsigned int count); /* recv-to-pipe callback */
169 int (*snd_pipe)(struct connection *conn, struct pipe *pipe); /* send-to-pipe callback */
170 void (*shutr)(struct connection *, int); /* shutr function */
171 void (*shutw)(struct connection *, int); /* shutw function */
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200172 void (*close)(struct connection *); /* close the transport layer */
173 int (*init)(struct connection *conn); /* initialize the transport layer */
Willy Tarreauc5788912012-08-24 18:12:41 +0200174};
175
Willy Tarreau74beec32012-10-03 00:41:04 +0200176/* data_cb describes the data layer's recv and send callbacks which are called
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200177 * when I/O activity was detected after the transport layer is ready. These
178 * callbacks are supposed to make use of the xprt_ops above to exchange data
Willy Tarreau4aa36832012-10-02 20:07:22 +0200179 * from/to buffers and pipes. The <wake> callback is used to report activity
180 * at the transport layer, which can be a connection opening/close, or any
Willy Tarreauf4e114f2012-10-03 01:12:30 +0200181 * data movement. The <init> callback may be called by the connection handler
182 * at the end of a transport handshake, when it is about to transfer data and
Willy Tarreau2396c1c2012-10-03 21:12:16 +0200183 * the data layer is not ready yet. Both <wake> and <init> may abort a connection
184 * by returning < 0.
Willy Tarreauc5788912012-08-24 18:12:41 +0200185 */
Willy Tarreau74beec32012-10-03 00:41:04 +0200186struct data_cb {
187 void (*recv)(struct connection *conn); /* data-layer recv callback */
188 void (*send)(struct connection *conn); /* data-layer send callback */
Willy Tarreau2396c1c2012-10-03 21:12:16 +0200189 int (*wake)(struct connection *conn); /* data-layer callback to report activity */
Willy Tarreauf4e114f2012-10-03 01:12:30 +0200190 int (*init)(struct connection *conn); /* data-layer initialization */
Willy Tarreauc5788912012-08-24 18:12:41 +0200191};
192
Willy Tarreau3cefd522012-08-30 15:49:18 +0200193/* a target describes what is on the remote side of the connection. */
194struct target {
195 int type;
196 union {
197 void *v; /* pointer value, for any type */
198 struct proxy *p; /* when type is TARG_TYPE_PROXY */
199 struct server *s; /* when type is TARG_TYPE_SERVER */
200 struct si_applet *a; /* when type is TARG_TYPE_APPLET */
201 struct task *t; /* when type is TARG_TYPE_TASK */
202 struct listener *l; /* when type is TARG_TYPE_CLIENT */
203 } ptr;
204};
205
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200206/* This structure describes a connection with its methods and data.
207 * A connection may be performed to proxy or server via a local or remote
208 * socket, and can also be made to an internal applet. It can support
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200209 * several transport schemes (applet, raw, ssl, ...). It can support several
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200210 * connection control schemes, generally a protocol for socket-oriented
211 * connections, but other methods for applets.
212 */
213struct connection {
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200214 const struct xprt_ops *xprt; /* operations at the transport layer */
Willy Tarreauc5788912012-08-24 18:12:41 +0200215 const struct protocol *ctrl; /* operations at the socket layer */
Willy Tarreau74beec32012-10-03 00:41:04 +0200216 const struct data_cb *data; /* data layer callbacks */
Willy Tarreaucd379952012-09-27 22:14:33 +0200217 void *owner; /* pointer to upper layer's entity (eg: stream interface) */
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200218 union { /* definitions which depend on connection type */
219 struct { /*** information used by socket-based connections ***/
220 int fd; /* file descriptor for a stream driver when known */
221 } sock;
222 } t;
Willy Tarreau900bc932012-07-06 09:52:14 +0200223 unsigned int flags; /* CO_F_* */
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200224 int xprt_st; /* transport layer state, initialized to zero */
225 void *xprt_ctx; /* general purpose pointer, initialized to NULL */
Willy Tarreau3cefd522012-08-30 15:49:18 +0200226 struct target target; /* the target to connect to (server, proxy, applet, ...) */
Willy Tarreau986a9d22012-08-30 21:11:38 +0200227 struct {
228 struct sockaddr_storage from; /* client address, or address to spoof when connecting to the server */
Willy Tarreaucd379952012-09-27 22:14:33 +0200229 struct sockaddr_storage to; /* address reached by the client, or address to connect to */
Willy Tarreau986a9d22012-08-30 21:11:38 +0200230 } addr; /* addresses of the remote side, client for producer and server for consumer */
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200231};
232
233#endif /* _TYPES_CONNECTION_H */
234
235/*
236 * Local variables:
237 * c-indent-level: 8
238 * c-basic-offset: 8
239 * End:
240 */