blob: 6f42a397f48e3f995e8966116f0adea4d8092895 [file] [log] [blame]
Christopher Faulet3e3d3be2021-02-16 13:31:30 +01001/*
2 * Server-state management functions.
3 *
4 * Copyright (C) 2021 HAProxy Technologies, Christopher Faulet <cfaulet@haproxy.com>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
13#include <errno.h>
14
15#include <import/eb64tree.h>
16#include <import/xxhash.h>
17
18#include <haproxy/api.h>
19#include <haproxy/backend.h>
20#include <haproxy/cfgparse.h>
21#include <haproxy/check.h>
22#include <haproxy/errors.h>
23#include <haproxy/global.h>
24#include <haproxy/log.h>
25#include <haproxy/port_range.h>
26#include <haproxy/proxy.h>
27#include <haproxy/resolvers.h>
28#include <haproxy/server.h>
29#include <haproxy/ssl_sock.h>
Willy Tarreaubf1ae1a2021-05-08 13:08:34 +020030#include <haproxy/tools.h>
Christopher Faulet3e3d3be2021-02-16 13:31:30 +010031
32
33/* Update a server state using the parameters available in the params list.
34 * The caller must provide a supported version
35 * Grabs the server lock during operation.
36 */
37static void srv_state_srv_update(struct server *srv, int version, char **params)
38{
39 char *p;
40 struct buffer *msg;
41 const char *warning;
42
43 /* fields since version 1
44 * and common to all other upcoming versions
45 */
46 enum srv_state srv_op_state;
47 enum srv_admin srv_admin_state;
48 unsigned srv_uweight, srv_iweight;
49 unsigned long srv_last_time_change;
50 short srv_check_status;
51 enum chk_result srv_check_result;
52 int srv_check_health;
53 int srv_check_state, srv_agent_state;
54 int bk_f_forced_id;
55 int srv_f_forced_id;
56 int fqdn_set_by_cli;
57 const char *fqdn;
58 const char *port_st;
59 unsigned int port_svc;
60 char *srvrecord;
61 char *addr;
62 int partial_apply = 0;
63#ifdef USE_OPENSSL
64 int use_ssl;
65#endif
66
67 fqdn = NULL;
68 port_svc = 0;
69 msg = alloc_trash_chunk();
70 if (!msg)
71 goto end;
72
73 HA_SPIN_LOCK(SERVER_LOCK, &srv->lock);
74
75 /* Only version 1 supported for now, don't check it. Fields are :
76 * srv_addr: params[0]
77 * srv_op_state: params[1]
78 * srv_admin_state: params[2]
79 * srv_uweight: params[3]
80 * srv_iweight: params[4]
81 * srv_last_time_change: params[5]
82 * srv_check_status: params[6]
83 * srv_check_result: params[7]
84 * srv_check_health: params[8]
85 * srv_check_state: params[9]
86 * srv_agent_state: params[10]
87 * bk_f_forced_id: params[11]
88 * srv_f_forced_id: params[12]
89 * srv_fqdn: params[13]
90 * srv_port: params[14]
91 * srvrecord: params[15]
92 * srv_use_ssl: params[16]
93 * srv_check_port: params[17]
94 * srv_check_addr: params[18]
95 * srv_agent_addr: params[19]
96 * srv_agent_port: params[20]
97 */
98
99 /* validating srv_op_state */
100 p = NULL;
101 errno = 0;
102 srv_op_state = strtol(params[1], &p, 10);
103 if ((p == params[1]) || errno == EINVAL || errno == ERANGE ||
104 (srv_op_state != SRV_ST_STOPPED &&
105 srv_op_state != SRV_ST_STARTING &&
106 srv_op_state != SRV_ST_RUNNING &&
107 srv_op_state != SRV_ST_STOPPING)) {
108 chunk_appendf(msg, ", invalid srv_op_state value '%s'", params[1]);
109 }
110
111 /* validating srv_admin_state */
112 p = NULL;
113 errno = 0;
114 srv_admin_state = strtol(params[2], &p, 10);
115 fqdn_set_by_cli = !!(srv_admin_state & SRV_ADMF_HMAINT);
116
117 /* inherited statuses will be recomputed later.
118 * Also disable SRV_ADMF_HMAINT flag (set from stats socket fqdn).
119 */
120 srv_admin_state &= ~SRV_ADMF_IDRAIN & ~SRV_ADMF_IMAINT & ~SRV_ADMF_HMAINT & ~SRV_ADMF_RMAINT;
121
122 if ((p == params[2]) || errno == EINVAL || errno == ERANGE ||
123 (srv_admin_state != 0 &&
124 srv_admin_state != SRV_ADMF_FMAINT &&
125 srv_admin_state != SRV_ADMF_CMAINT &&
126 srv_admin_state != (SRV_ADMF_CMAINT | SRV_ADMF_FMAINT) &&
127 srv_admin_state != (SRV_ADMF_CMAINT | SRV_ADMF_FDRAIN) &&
128 srv_admin_state != SRV_ADMF_FDRAIN)) {
129 chunk_appendf(msg, ", invalid srv_admin_state value '%s'", params[2]);
130 }
131
132 /* validating srv_uweight */
133 p = NULL;
134 errno = 0;
135 srv_uweight = strtol(params[3], &p, 10);
136 if ((p == params[3]) || errno == EINVAL || errno == ERANGE || (srv_uweight > SRV_UWGHT_MAX))
137 chunk_appendf(msg, ", invalid srv_uweight value '%s'", params[3]);
138
139 /* validating srv_iweight */
140 p = NULL;
141 errno = 0;
142 srv_iweight = strtol(params[4], &p, 10);
143 if ((p == params[4]) || errno == EINVAL || errno == ERANGE || (srv_iweight > SRV_UWGHT_MAX))
144 chunk_appendf(msg, ", invalid srv_iweight value '%s'", params[4]);
145
146 /* validating srv_last_time_change */
147 p = NULL;
148 errno = 0;
149 srv_last_time_change = strtol(params[5], &p, 10);
150 if ((p == params[5]) || errno == EINVAL || errno == ERANGE)
151 chunk_appendf(msg, ", invalid srv_last_time_change value '%s'", params[5]);
152
153 /* validating srv_check_status */
154 p = NULL;
155 errno = 0;
156 srv_check_status = strtol(params[6], &p, 10);
157 if (p == params[6] || errno == EINVAL || errno == ERANGE ||
158 (srv_check_status >= HCHK_STATUS_SIZE))
159 chunk_appendf(msg, ", invalid srv_check_status value '%s'", params[6]);
160
161 /* validating srv_check_result */
162 p = NULL;
163 errno = 0;
164 srv_check_result = strtol(params[7], &p, 10);
165 if ((p == params[7]) || errno == EINVAL || errno == ERANGE ||
166 (srv_check_result != CHK_RES_UNKNOWN &&
167 srv_check_result != CHK_RES_NEUTRAL &&
168 srv_check_result != CHK_RES_FAILED &&
169 srv_check_result != CHK_RES_PASSED &&
170 srv_check_result != CHK_RES_CONDPASS)) {
171 chunk_appendf(msg, ", invalid srv_check_result value '%s'", params[7]);
172 }
173
174 /* validating srv_check_health */
175 p = NULL;
176 errno = 0;
177 srv_check_health = strtol(params[8], &p, 10);
178 if (p == params[8] || errno == EINVAL || errno == ERANGE)
179 chunk_appendf(msg, ", invalid srv_check_health value '%s'", params[8]);
180
181 /* validating srv_check_state */
182 p = NULL;
183 errno = 0;
184 srv_check_state = strtol(params[9], &p, 10);
185 if (p == params[9] || errno == EINVAL || errno == ERANGE ||
186 (srv_check_state & ~(CHK_ST_INPROGRESS | CHK_ST_CONFIGURED | CHK_ST_ENABLED | CHK_ST_PAUSED | CHK_ST_AGENT)))
187 chunk_appendf(msg, ", invalid srv_check_state value '%s'", params[9]);
188
189 /* validating srv_agent_state */
190 p = NULL;
191 errno = 0;
192 srv_agent_state = strtol(params[10], &p, 10);
193 if (p == params[10] || errno == EINVAL || errno == ERANGE ||
194 (srv_agent_state & ~(CHK_ST_INPROGRESS | CHK_ST_CONFIGURED | CHK_ST_ENABLED | CHK_ST_PAUSED | CHK_ST_AGENT)))
195 chunk_appendf(msg, ", invalid srv_agent_state value '%s'", params[10]);
196
197 /* validating bk_f_forced_id */
198 p = NULL;
199 errno = 0;
200 bk_f_forced_id = strtol(params[11], &p, 10);
201 if (p == params[11] || errno == EINVAL || errno == ERANGE || !((bk_f_forced_id == 0) || (bk_f_forced_id == 1)))
202 chunk_appendf(msg, ", invalid bk_f_forced_id value '%s'", params[11]);
203
204 /* validating srv_f_forced_id */
205 p = NULL;
206 errno = 0;
207 srv_f_forced_id = strtol(params[12], &p, 10);
208 if (p == params[12] || errno == EINVAL || errno == ERANGE || !((srv_f_forced_id == 0) || (srv_f_forced_id == 1)))
209 chunk_appendf(msg, ", invalid srv_f_forced_id value '%s'", params[12]);
210
211 /* validating srv_fqdn */
212 fqdn = params[13];
213 if (fqdn && *fqdn == '-')
214 fqdn = NULL;
215 if (fqdn && (strlen(fqdn) > DNS_MAX_NAME_SIZE || invalid_domainchar(fqdn))) {
216 chunk_appendf(msg, ", invalid srv_fqdn value '%s'", params[13]);
217 fqdn = NULL;
218 }
219
220 port_st = params[14];
221 if (port_st) {
222 port_svc = strl2uic(port_st, strlen(port_st));
223 if (port_svc > USHRT_MAX) {
224 chunk_appendf(msg, ", invalid srv_port value '%s'", port_st);
225 port_st = NULL;
226 }
227 }
228
229 /* SRV record
230 * NOTE: in HAProxy, SRV records must start with an underscore '_'
231 */
232 srvrecord = params[15];
233 if (srvrecord && *srvrecord != '_')
234 srvrecord = NULL;
235
236 /* don't apply anything if one error has been detected */
237 if (msg->data)
238 goto out;
239 partial_apply = 1;
240
241 /* recover operational state and apply it to this server
242 * and all servers tracking this one */
243 srv->check.health = srv_check_health;
244 switch (srv_op_state) {
245 case SRV_ST_STOPPED:
246 srv->check.health = 0;
247 srv_set_stopped(srv, "changed from server-state after a reload", NULL);
248 break;
249 case SRV_ST_STARTING:
250 /* If rise == 1 there is no STARTING state, let's switch to
251 * RUNNING
252 */
253 if (srv->check.rise == 1) {
254 srv->check.health = srv->check.rise + srv->check.fall - 1;
255 srv_set_running(srv, "", NULL);
256 break;
257 }
258 if (srv->check.health < 1 || srv->check.health >= srv->check.rise)
259 srv->check.health = srv->check.rise - 1;
260 srv->next_state = srv_op_state;
261 break;
262 case SRV_ST_STOPPING:
263 /* If fall == 1 there is no STOPPING state, let's switch to
264 * STOPPED
265 */
266 if (srv->check.fall == 1) {
267 srv->check.health = 0;
268 srv_set_stopped(srv, "changed from server-state after a reload", NULL);
269 break;
270 }
271 if (srv->check.health < srv->check.rise ||
272 srv->check.health > srv->check.rise + srv->check.fall - 2)
273 srv->check.health = srv->check.rise;
274 srv_set_stopping(srv, "changed from server-state after a reload", NULL);
275 break;
276 case SRV_ST_RUNNING:
277 srv->check.health = srv->check.rise + srv->check.fall - 1;
278 srv_set_running(srv, "", NULL);
279 break;
280 }
281
282 /* When applying server state, the following rules apply:
283 * - in case of a configuration change, we apply the setting from the new
284 * configuration, regardless of old running state
285 * - if no configuration change, we apply old running state only if old running
286 * state is different from new configuration state
287 */
288 /* configuration has changed */
289 if ((srv_admin_state & SRV_ADMF_CMAINT) != (srv->next_admin & SRV_ADMF_CMAINT)) {
290 if (srv->next_admin & SRV_ADMF_CMAINT)
291 srv_adm_set_maint(srv);
292 else
293 srv_adm_set_ready(srv);
294 }
295 /* configuration is the same, let's compate old running state and new conf state */
296 else {
297 if (srv_admin_state & SRV_ADMF_FMAINT && !(srv->next_admin & SRV_ADMF_CMAINT))
298 srv_adm_set_maint(srv);
299 else if (!(srv_admin_state & SRV_ADMF_FMAINT) && (srv->next_admin & SRV_ADMF_CMAINT))
300 srv_adm_set_ready(srv);
301 }
302 /* apply drain mode if server is currently enabled */
303 if (!(srv->next_admin & SRV_ADMF_FMAINT) && (srv_admin_state & SRV_ADMF_FDRAIN)) {
304 /* The SRV_ADMF_FDRAIN flag is inherited when srv->iweight is 0
305 * (srv->iweight is the weight set up in configuration).
306 * There are two possible reasons for FDRAIN to have been present :
307 * - previous config weight was zero
308 * - "set server b/s drain" was sent to the CLI
309 *
310 * In the first case, we simply want to drop this drain state
311 * if the new weight is not zero anymore, meaning the administrator
312 * has intentionally turned the weight back to a positive value to
313 * enable the server again after an operation. In the second case,
314 * the drain state was forced on the CLI regardless of the config's
315 * weight so we don't want a change to the config weight to lose this
316 * status. What this means is :
317 * - if previous weight was 0 and new one is >0, drop the DRAIN state.
318 * - if the previous weight was >0, keep it.
319 */
320 if (srv_iweight > 0 || srv->iweight == 0)
321 srv_adm_set_drain(srv);
322 }
323
324 srv->last_change = date.tv_sec - srv_last_time_change;
325 srv->check.status = srv_check_status;
326 srv->check.result = srv_check_result;
327
328 /* Only case we want to apply is removing ENABLED flag which could have been
329 * done by the "disable health" command over the stats socket
330 */
331 if ((srv->check.state & CHK_ST_CONFIGURED) &&
332 (srv_check_state & CHK_ST_CONFIGURED) &&
333 !(srv_check_state & CHK_ST_ENABLED))
334 srv->check.state &= ~CHK_ST_ENABLED;
335
336 /* Only case we want to apply is removing ENABLED flag which could have been
337 * done by the "disable agent" command over the stats socket
338 */
339 if ((srv->agent.state & CHK_ST_CONFIGURED) &&
340 (srv_agent_state & CHK_ST_CONFIGURED) &&
341 !(srv_agent_state & CHK_ST_ENABLED))
342 srv->agent.state &= ~CHK_ST_ENABLED;
343
344 /* We want to apply the previous 'running' weight (srv_uweight) only if there
345 * was no change in the configuration: both previous and new iweight are equals
346 *
347 * It means that a configuration file change has precedence over a unix socket change
348 * for server's weight
349 *
350 * by default, HAProxy applies the following weight when parsing the configuration
351 * srv->uweight = srv->iweight
352 */
353 if (srv_iweight == srv->iweight) {
354 srv->uweight = srv_uweight;
355 }
356 server_recalc_eweight(srv, 1);
357
358 /* load server IP address */
359 if (strcmp(params[0], "-") != 0)
360 srv->lastaddr = strdup(params[0]);
361
362 if (fqdn && srv->hostname) {
363 if (strcmp(srv->hostname, fqdn) == 0) {
364 /* Here we reset the 'set from stats socket FQDN' flag
365 * to support such transitions:
366 * Let's say initial FQDN value is foo1 (in configuration file).
367 * - FQDN changed from stats socket, from foo1 to foo2 value,
368 * - FQDN changed again from file configuration (with the same previous value
369 set from stats socket, from foo1 to foo2 value),
370 * - reload for any other reason than a FQDN modification,
371 * the configuration file FQDN matches the fqdn server state file value.
372 * So we must reset the 'set from stats socket FQDN' flag to be consistent with
373 * any further FQDN modification.
374 */
375 srv->next_admin &= ~SRV_ADMF_HMAINT;
376 }
377 else {
378 /* If the FDQN has been changed from stats socket,
379 * apply fqdn state file value (which is the value set
380 * from stats socket).
381 * Also ensure the runtime resolver will process this resolution.
382 */
383 if (fqdn_set_by_cli) {
384 srv_set_fqdn(srv, fqdn, 0);
385 srv->flags &= ~SRV_F_NO_RESOLUTION;
386 srv->next_admin |= SRV_ADMF_HMAINT;
387 }
388 }
389 }
390 /* If all the conditions below are validated, this means
391 * we're evaluating a server managed by SRV resolution
392 */
393 else if (fqdn && !srv->hostname && srvrecord) {
394 int res;
395
396 /* we can't apply previous state if SRV record has changed */
397 if (srv->srvrq && strcmp(srv->srvrq->name, srvrecord) != 0) {
398 chunk_appendf(msg, ", SRV record mismatch between configuration ('%s') and state file ('%s) for server '%s'. Previous state not applied", srv->srvrq->name, srvrecord, srv->id);
399 goto out;
400 }
401
402 /* create or find a SRV resolution for this srv record */
403 if (srv->srvrq == NULL && (srv->srvrq = find_srvrq_by_name(srvrecord, srv->proxy)) == NULL)
404 srv->srvrq = new_resolv_srvrq(srv, srvrecord);
405 if (srv->srvrq == NULL) {
406 chunk_appendf(msg, ", can't create or find SRV resolution '%s' for server '%s'", srvrecord, srv->id);
407 goto out;
408 }
409
410 /* prepare DNS resolution for this server */
411 res = srv_prepare_for_resolution(srv, fqdn);
412 if (res == -1) {
413 chunk_appendf(msg, ", can't allocate memory for DNS resolution for server '%s'", srv->id);
414 goto out;
415 }
416
417 /* Unset SRV_F_MAPPORTS for SRV records.
418 * SRV_F_MAPPORTS is unfortunately set by parse_server()
419 * because no ports are provided in the configuration file.
420 * This is because HAProxy will use the port found into the SRV record.
421 */
422 srv->flags &= ~SRV_F_MAPPORTS;
423 }
424
425 if (port_st)
426 srv->svc_port = port_svc;
427
428
429 if (params[16]) {
430#ifdef USE_OPENSSL
431 use_ssl = strtol(params[16], &p, 10);
432
433 /* configure ssl if connection has been initiated at startup */
434 if (srv->ssl_ctx.ctx != NULL)
435 ssl_sock_set_srv(srv, use_ssl);
436#endif
437 }
438
439 port_st = NULL;
440 if (params[17] && strcmp(params[17], "0") != 0)
441 port_st = params[17];
442 addr = NULL;
443 if (params[18] && strcmp(params[18], "-") != 0)
444 addr = params[18];
445 if (addr || port_st) {
446 warning = srv_update_check_addr_port(srv, addr, port_st);
447 if (warning) {
448 chunk_appendf(msg, ", %s", warning);
449 goto out;
450 }
451 }
452
453 port_st = NULL;
454 if (params[20] && strcmp(params[20], "0") != 0)
455 port_st = params[20];
456 addr = NULL;
457 if (params[19] && strcmp(params[19], "-") != 0)
458 addr = params[19];
459 if (addr || port_st) {
460 warning = srv_update_agent_addr_port(srv, addr, port_st);
461 if (warning) {
462 chunk_appendf(msg, ", %s", warning);
463 goto out;
464 }
465 }
466
467 out:
468 HA_SPIN_UNLOCK(SERVER_LOCK, &srv->lock);
469 if (msg->data) {
470 if (partial_apply == 1)
471 ha_warning("server-state partially applied for server '%s/%s'%s\n",
472 srv->proxy->id, srv->id, msg->area);
473 else
474 ha_warning("server-state application failed for server '%s/%s'%s\n",
475 srv->proxy->id, srv->id, msg->area);
476 }
477 end:
478 free_trash_chunk(msg);
479}
480
481/*
482 * Loop on the proxy's servers and try to load its state from <st_tree> using
483 * srv_state_srv_update(). The proxy name and the server name are concatenated
484 * to form the key. If found the entry is removed from the tree.
485 */
486static void srv_state_px_update(const struct proxy *px, int vsn, struct eb_root *st_tree)
487{
488 struct server_state_line *st_line;
489 struct eb64_node *node;
490 struct server *srv;
491 unsigned long key;
492
493 for (srv = px->srv; srv; srv = srv->next) {
494 chunk_printf(&trash, "%s %s", px->id, srv->id);
495 key = XXH3(trash.area, trash.data, 0);
496 node = eb64_lookup(st_tree, key);
497 if (!node)
498 continue; /* next server */
499 st_line = eb64_entry(node, typeof(*st_line), node);
500 srv_state_srv_update(srv, vsn, st_line->params+4);
501
502 /* the node may be released now */
503 eb64_delete(node);
504 free(st_line->line);
505 free(st_line);
506 }
507}
508
509/*
510 * read next line from file <f> and return the server state version if one found.
511 * If no version is found, then 0 is returned
512 * Note that this should be the first read on <f>
513 */
514static int srv_state_get_version(FILE *f) {
515 char mybuf[SRV_STATE_LINE_MAXLEN];
516 char *endptr;
517 long int vsn;
518
519 /* first character of first line of the file must contain the version of the export */
520 if (fgets(mybuf, SRV_STATE_LINE_MAXLEN, f) == NULL)
521 return 0;
522
523 vsn = strtol(mybuf, &endptr, 10);
524 if (endptr == mybuf || *endptr != '\n') {
525 /* Empty or truncated line */
526 return 0;
527 }
528
529 if (vsn < SRV_STATE_FILE_VERSION_MIN || vsn > SRV_STATE_FILE_VERSION_MAX) {
530 /* Wrong version number */
531 return 0;
532 }
533
534 return vsn;
535}
536
537
538/*
539 * parses server state line stored in <buf> and supposedly in version <version>.
540 * Set <params> accordingly on success. It returns 1 on success, 0 if the line
541 * must be ignored and -1 on error.
542 * The caller must provide a supported version
543 */
544static int srv_state_parse_line(char *buf, const int version, char **params)
545{
546 int buflen, arg, ret;
547 char *cur;
548
549 buflen = strlen(buf);
550 cur = buf;
551 ret = 1; /* be optimistic and pretend a success */
552
553 /* we need at least one character and a non-truncated line */
554 if (buflen == 0 || buf[buflen - 1] != '\n') {
555 ret = -1;
556 goto out;
557 }
558
559 /* skip blank characters at the beginning of the line */
560 while (isblank((unsigned char)*cur))
561 ++cur;
562
563 /* ignore empty or commented lines */
564 if (!*cur || *cur == '\n' || *cur == '#') {
565 ret = 0;
566 goto out;
567 }
568
569 /* Removes trailing '\n' to ease parsing */
570 buf[buflen - 1] = '\0';
571
572 /* we're now ready to move the line into <params> */
573 memset(params, 0, SRV_STATE_FILE_MAX_FIELDS * sizeof(*params));
574 arg = 0;
575 while (*cur) {
576 /* first of all, stop if there are too many fields */
577 if (arg >= SRV_STATE_FILE_MAX_FIELDS)
578 break;
579
580 /* then skip leading spaces */
581 while (*cur && isblank((unsigned char)*cur)) {
582 ++cur;
583 if (!*cur)
584 break;
585 }
586
587 /*
588 * idx:
589 * be_id: params[0]
590 * be_name: params[1]
591 * srv_id: params[2]
592 * srv_name: params[3]
593 * v1
594 * srv_addr: params[4]
595 * srv_op_state: params[5]
596 * srv_admin_state: params[6]
597 * srv_uweight: params[7]
598 * srv_iweight: params[8]
599 * srv_last_time_change: params[9]
600 * srv_check_status: params[10]
601 * srv_check_result: params[11]
602 * srv_check_health: params[12]
603 * srv_check_state: params[13]
604 * srv_agent_state: params[14]
605 * bk_f_forced_id: params[15]
606 * srv_f_forced_id: params[16]
607 * srv_fqdn: params[17]
608 * srv_port: params[18]
609 * srvrecord: params[19]
610 *
611 * srv_use_ssl: params[20] (optional field)
612 * srv_check_port: params[21] (optional field)
613 * srv_check_addr: params[22] (optional field)
614 * srv_agent_addr: params[23] (optional field)
615 * srv_agent_port: params[24] (optional field)
616 *
617 */
618 params[arg++] = cur;
619
620 /* look for the end of the current field */
621 while (*cur && !isblank((unsigned char)*cur)) {
622 ++cur;
623 if (!*cur)
624 break;
625 }
626
627 /* otherwise, cut the field and move to the next one */
628 *cur++ = '\0';
629 }
630
631 /* if the number of fields does not match the version, then return an error */
632 if (version == 1 &&
633 (arg < SRV_STATE_FILE_MIN_FIELDS_VERSION_1 ||
634 arg > SRV_STATE_FILE_MAX_FIELDS_VERSION_1))
635 ret = -1;
636
637 out:
638 return ret;
639}
640
641
642/*
643 * parses a server state line using srv_state_parse_line() and store the result
644 * in <st_tree>. If an error occurred during the parsing, the line is
645 * ignored. if <px> is defined, it is used to check the backend id/name against
646 * the parsed params and to compute the key of the line.
647 */
648static int srv_state_parse_and_store_line(char *line, int vsn, struct eb_root *st_tree,
649 struct proxy *px)
650{
651 struct server_state_line *st_line;
652 int ret = 0;
653
654 /* store line in tree and duplicate the line */
655 st_line = calloc(1, sizeof(*st_line));
656 if (st_line == NULL)
657 goto skip_line;
658 st_line->line = strdup(line);
659 if (st_line->line == NULL)
660 goto skip_line;
661
662 ret = srv_state_parse_line(st_line->line, vsn, st_line->params);
663 if (ret <= 0)
664 goto skip_line;
665
666 /* Check backend name against params if <px> is defined */
667 if (px) {
668 int check_id = (atoi(st_line->params[0]) == px->uuid);
669 int check_name = (strcmp(px->id, st_line->params[1]) == 0);
670 int bk_f_forced_id = (atoi(st_line->params[15]) & PR_O_FORCED_ID);
671
672
673 if (!check_id && !check_name) {
674 /* backend does not match at all: skip the line */
675 goto skip_line;
676 }
677 else if (!check_id) {
678 /* Id mismatch: warn but continue */
679 ha_warning("Proxy '%s': backend ID mismatch: from server state file: '%s', from running config '%d'\n",
680 px->id, st_line->params[0], px->uuid);
681 send_log(px, LOG_NOTICE, "backend ID mismatch: from server state file: '%s', from running config '%d'\n",
682 st_line->params[0], px->uuid);
683 }
684 else if (!check_name) {
685 /* Name mismatch: warn and skip the line, except if the backend id was forced
686 * in the previous configuration */
687 ha_warning("Proxy '%s': backend name mismatch: from server state file: '%s', from running config '%s'\n",
688 px->id, st_line->params[1], px->id);
689 send_log(px, LOG_NOTICE, "backend name mismatch: from server state file: '%s', from running config '%s'\n",
690 st_line->params[1], px->id);
691 if (!bk_f_forced_id)
692 goto skip_line;
693 }
694 }
695
696 /*
697 * The key: "be_name srv_name"
698 * if <px> is defined: be_name == px->id
699 * otherwise: be_name == params[1]
700 */
701 chunk_printf(&trash, "%s %s", (px ? px->id : st_line->params[1]), st_line->params[3]);
702 st_line->node.key = XXH3(trash.area, trash.data, 0);
703 if (eb64_insert(st_tree, &st_line->node) != &st_line->node) {
704 /* this is a duplicate key, probably a hand-crafted file, drop it! */
705 goto skip_line;
706 }
707
708 return ret;
709
710 skip_line:
711 /* free up memory in case of error during the processing of the line */
712 if (st_line) {
713 free(st_line->line);
714 free(st_line);
715 }
716 return ret;
717}
718
719/* Helper function to get the server-state file path.
720 * If <filename> starts with a '/', it is considered as an absolute path. In
721 * this case or if <global.server_state_base> is not set, <filename> only is
722 * considered. Otherwise, the <global.server_state_base> is concatenated to
723 * <filename> to produce the file path and copied to <dst_path>. in both cases,
724 * the result must not exceeds <maxpathlen>.
725 *
726 * The len is returned on success or -1 if the path is too long. On error, the
727 * caller must not rely on <dst_path>.
728 */
729static inline int srv_state_get_filepath(char *dst_path, int maxpathlen, const char *filename)
730{
Willy Tarreau6d4173e2021-03-12 13:57:19 +0100731 char *sep;
Christopher Faulet3e3d3be2021-02-16 13:31:30 +0100732 int len = 0;
733
734 /* create the globalfilepath variable */
735 if (*filename == '/' || !global.server_state_base) {
736 /* absolute path or no base directory provided */
Willy Tarreau47a30c42021-03-12 14:09:10 +0100737 len = strlcpy2(dst_path, filename, maxpathlen);
Christopher Faulet3e3d3be2021-02-16 13:31:30 +0100738 }
739 else {
740 /* concat base directory and global server-state file */
Willy Tarreau6d4173e2021-03-12 13:57:19 +0100741 sep = (global.server_state_base[strlen(global.server_state_base)-1] != '/' ? "/": "");
Christopher Faulet3e3d3be2021-02-16 13:31:30 +0100742 len = snprintf(dst_path, maxpathlen, "%s%s%s", global.server_state_base, sep, filename);
743 }
744 return (len < maxpathlen ? len: -1);
745}
746
747
748/* This function parses all the proxies and only take care of the backends (since we're looking for server)
749 * For each proxy, it does the following:
750 * - opens its server state file (either one or local one)
751 * - read whole file, line by line
752 * - analyse each line to check if it matches our current backend:
753 * - backend name matches
754 * - backend id matches if id is forced and name doesn't match
755 * - if the server pointed by the line is found, then state is applied
756 *
757 * If the running backend uuid or id differs from the state file, then HAProxy reports
758 * a warning.
759 *
760 * Grabs the server's lock via srv_state_srv_update().
761 */
762void apply_server_state(void)
763{
764 /* tree where global state_file is loaded */
765 struct eb_root global_state_tree = EB_ROOT_UNIQUE;
766 struct proxy *curproxy;
767 struct server_state_line *st_line;
768 struct eb64_node *node, *next_node;
769 FILE *f;
770 char mybuf[SRV_STATE_LINE_MAXLEN];
771 char file[MAXPATHLEN];
772 int local_vsn, global_vsn, len, linenum;
773
774 global_vsn = 0; /* no global file */
775 if (!global.server_state_file)
776 goto no_globalfile;
777 len = srv_state_get_filepath(file, MAXPATHLEN, global.server_state_file);
778 if (len == -1) {
779 ha_warning("config: Can't load global server state file: file too long.\n");
780 goto no_globalfile;
781 }
782
783 /* Load global server state in a tree */
784 errno = 0;
785 f = fopen(file, "r");
786 if (!f) {
787 ha_warning("config: Can't open global server state file '%s': %s\n", file, strerror(errno));
788 goto no_globalfile;
789 }
790
791 global_vsn = srv_state_get_version(f);
792 if (global_vsn == 0) {
793 ha_warning("config: Can't get version of the global server state file '%s'.\n",
794 file);
795 goto close_globalfile;
796 }
797
798 for (linenum = 1; fgets(mybuf, SRV_STATE_LINE_MAXLEN, f); linenum++) {
799 int ret;
800
801 ret = srv_state_parse_and_store_line(mybuf, global_vsn, &global_state_tree, NULL);
802 if (ret == -1) {
803 ha_warning("config: corrupted global server state file '%s' at line %d.\n",
804 file, linenum);
805 global_vsn = 0;
806 break;
807 }
808 }
809
810 close_globalfile:
811 fclose(f);
812
813 no_globalfile:
814 /* parse all proxies and load states form tree (global file) or from local file */
815 for (curproxy = proxies_list; curproxy != NULL; curproxy = curproxy->next) {
816 struct eb_root local_state_tree = EB_ROOT_UNIQUE;
817
Christopher Faulet6f691102021-03-04 16:35:26 +0100818 /* Must be an enabled backend with at least a server */
819 if (!(curproxy->cap & PR_CAP_BE) || curproxy->disabled || !curproxy->srv)
Christopher Faulet3e3d3be2021-02-16 13:31:30 +0100820 continue; /* next proxy */
821
Christopher Faulet6f691102021-03-04 16:35:26 +0100822 /* Mode must be specified */
823 BUG_ON(curproxy->load_server_state_from_file == PR_SRV_STATE_FILE_UNSPEC);
824
Christopher Faulet3e3d3be2021-02-16 13:31:30 +0100825 /* No server-state file for this proxy */
826 if (curproxy->load_server_state_from_file == PR_SRV_STATE_FILE_NONE)
827 continue; /* next proxy */
828
829 if (curproxy->load_server_state_from_file == PR_SRV_STATE_FILE_GLOBAL) {
830 /* when global file is used, we get data from the tree
831 * Note that in such case we don't check backend name neither uuid.
832 * Backend name can't be wrong since it's used as a key to retrieve the server state
833 * line from the tree.
834 */
835 if (global_vsn)
836 srv_state_px_update(curproxy, global_vsn, &global_state_tree);
837 continue; /* next proxy */
838 }
839
840 /*
841 * Here we load a local server state-file
842 */
843
844 /* create file variable */
845 len = srv_state_get_filepath(file, MAXPATHLEN, curproxy->server_state_file_name);
846 if (len == -1) {
847 ha_warning("Proxy '%s': Can't load local server state file: file too long.\n", curproxy->id);
848 continue; /* next proxy */
849 }
850
851 /* Load local server state in a tree */
852 errno = 0;
853 f = fopen(file, "r");
854 if (!f) {
855 ha_warning("Proxy '%s': Can't open server state file '%s': %s.\n",
856 curproxy->id, file, strerror(errno));
857 continue; /* next proxy */
858 }
859
860 /* first character of first line of the file must contain the version of the export */
861 local_vsn = srv_state_get_version(f);
862 if (local_vsn == 0) {
863 ha_warning("Proxy '%s': Can't get version of the server state file '%s'.\n",
864 curproxy->id, file);
865 goto close_localfile;
866 }
867
868 /* First, parse lines of the local server-state file and store them in a eb-tree */
869 for (linenum = 1; fgets(mybuf, SRV_STATE_LINE_MAXLEN, f); linenum++) {
870 int ret;
871
872 ret = srv_state_parse_and_store_line(mybuf, local_vsn, &local_state_tree, curproxy);
873 if (ret == -1) {
874 ha_warning("Proxy '%s': corrupted server state file '%s' at line %d.\n",
875 curproxy->id, file, linenum);
876 local_vsn = 0;
877 break;
878 }
879 }
880
881 if (local_vsn)
882 srv_state_px_update(curproxy, local_vsn, &local_state_tree);
883
Ilya Shipitsind7a988c2021-03-04 23:26:15 +0500884 /* Remove unused server-state lines */
Christopher Faulet3e3d3be2021-02-16 13:31:30 +0100885 node = eb64_first(&local_state_tree);
886 while (node) {
887 st_line = eb64_entry(node, typeof(*st_line), node);
888 next_node = eb64_next(node);
889 eb64_delete(node);
890
891 if (local_vsn) {
892 /* if no server found, then warn */
893 ha_warning("Proxy '%s': can't find server '%s' in backend '%s'\n",
894 curproxy->id, st_line->params[3], curproxy->id);
895 send_log(curproxy, LOG_NOTICE, "can't find server '%s' in backend '%s'\n",
896 st_line->params[3], curproxy->id);
897 }
898
899 free(st_line->line);
900 free(st_line);
901 node = next_node;
902 }
903
904 close_localfile:
905 fclose(f);
906 }
907
908 node = eb64_first(&global_state_tree);
909 while (node) {
910 st_line = eb64_entry(node, typeof(*st_line), node);
911 next_node = eb64_next(node);
912 eb64_delete(node);
913 free(st_line->line);
914 free(st_line);
915 node = next_node;
916 }
917}