blob: 9e5557d132a7b75a99fd59d76bc055b7458ceb61 [file] [log] [blame]
Christopher Fauletd7c91962015-04-30 11:48:27 +02001/*
2 * Stream filters related variables and functions.
3 *
4 * Copyright (C) 2015 Qualys Inc., Christopher Faulet <cfaulet@qualys.com>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
Willy Tarreau4c7e4b72020-05-27 12:58:42 +020013#include <haproxy/api.h>
Willy Tarreau2741c8c2020-06-02 11:28:02 +020014#include <haproxy/buf-t.h>
Willy Tarreau6be78492020-06-05 00:00:29 +020015#include <haproxy/cfgparse.h>
Willy Tarreaudfd3de82020-06-04 23:46:14 +020016#include <haproxy/compression.h>
Willy Tarreau8d366972020-05-27 16:10:29 +020017#include <haproxy/errors.h>
Willy Tarreauc7babd82020-06-04 21:29:29 +020018#include <haproxy/filters.h>
Willy Tarreau7d865a52020-06-04 10:57:05 +020019#include <haproxy/flt_http_comp.h>
Willy Tarreaudfd3de82020-06-04 23:46:14 +020020#include <haproxy/http_ana.h>
Willy Tarreau87735332020-06-04 09:08:41 +020021#include <haproxy/http_htx.h>
Willy Tarreau16f958c2020-06-03 08:44:35 +020022#include <haproxy/htx.h>
Willy Tarreau7a00efb2020-06-02 17:02:59 +020023#include <haproxy/namespace.h>
Willy Tarreaudfd3de82020-06-04 23:46:14 +020024#include <haproxy/stream.h>
Willy Tarreau5e539c92020-06-04 20:45:39 +020025#include <haproxy/stream_interface.h>
Willy Tarreau48fbcae2020-06-03 18:09:46 +020026#include <haproxy/tools.h>
Willy Tarreaudfd3de82020-06-04 23:46:14 +020027#include <haproxy/trace.h>
Christopher Fauletd7c91962015-04-30 11:48:27 +020028
Christopher Fauletd7c91962015-04-30 11:48:27 +020029
Christopher Fauleteea8fc72019-11-05 16:18:10 +010030#define TRACE_SOURCE &trace_strm
31
Christopher Fauletd7c91962015-04-30 11:48:27 +020032/* Pool used to allocate filters */
Willy Tarreau8ceae722018-11-26 11:58:30 +010033DECLARE_STATIC_POOL(pool_head_filter, "filter", sizeof(struct filter));
Christopher Fauletd7c91962015-04-30 11:48:27 +020034
35static int handle_analyzer_result(struct stream *s, struct channel *chn, unsigned int an_bit, int ret);
36
37/* - RESUME_FILTER_LOOP and RESUME_FILTER_END must always be used together.
38 * The first one begins a loop and the seconds one ends it.
39 *
40 * - BREAK_EXECUTION must be used to break the loop and set the filter from
41 * which to resume the next time.
42 *
Bertrand Jacquin874a35c2018-09-10 21:26:07 +010043 * Here is an example:
Christopher Fauletd7c91962015-04-30 11:48:27 +020044 *
45 * RESUME_FILTER_LOOP(stream, channel) {
46 * ...
47 * if (cond)
48 * BREAK_EXECUTION(stream, channel, label);
49 * ...
50 * } RESUME_FILTER_END;
51 * ...
52 * label:
53 * ...
54 *
55 */
56#define RESUME_FILTER_LOOP(strm, chn) \
57 do { \
58 struct filter *filter; \
59 \
Christopher Fauletda02e172015-12-04 09:25:05 +010060 if (strm_flt(strm)->current[CHN_IDX(chn)]) { \
61 filter = strm_flt(strm)->current[CHN_IDX(chn)]; \
62 strm_flt(strm)->current[CHN_IDX(chn)] = NULL; \
Christopher Fauletd7c91962015-04-30 11:48:27 +020063 goto resume_execution; \
64 } \
65 \
Christopher Fauletfcf035c2015-12-03 11:48:03 +010066 list_for_each_entry(filter, &strm_flt(s)->filters, list) { \
Christopher Fauletda02e172015-12-04 09:25:05 +010067 resume_execution:
Christopher Fauletd7c91962015-04-30 11:48:27 +020068
69#define RESUME_FILTER_END \
70 } \
71 } while(0)
72
Christopher Fauletda02e172015-12-04 09:25:05 +010073#define BREAK_EXECUTION(strm, chn, label) \
74 do { \
75 strm_flt(strm)->current[CHN_IDX(chn)] = filter; \
76 goto label; \
Christopher Fauletd7c91962015-04-30 11:48:27 +020077 } while (0)
78
79
80/* List head of all known filter keywords */
81static struct flt_kw_list flt_keywords = {
82 .list = LIST_HEAD_INIT(flt_keywords.list)
83};
84
85/*
86 * Registers the filter keyword list <kwl> as a list of valid keywords for next
87 * parsing sessions.
88 */
89void
90flt_register_keywords(struct flt_kw_list *kwl)
91{
92 LIST_ADDQ(&flt_keywords.list, &kwl->list);
93}
94
95/*
96 * Returns a pointer to the filter keyword <kw>, or NULL if not found. If the
97 * keyword is found with a NULL ->parse() function, then an attempt is made to
98 * find one with a valid ->parse() function. This way it is possible to declare
99 * platform-dependant, known keywords as NULL, then only declare them as valid
100 * if some options are met. Note that if the requested keyword contains an
101 * opening parenthesis, everything from this point is ignored.
102 */
103struct flt_kw *
104flt_find_kw(const char *kw)
105{
106 int index;
107 const char *kwend;
108 struct flt_kw_list *kwl;
109 struct flt_kw *ret = NULL;
110
111 kwend = strchr(kw, '(');
112 if (!kwend)
113 kwend = kw + strlen(kw);
114
115 list_for_each_entry(kwl, &flt_keywords.list, list) {
116 for (index = 0; kwl->kw[index].kw != NULL; index++) {
117 if ((strncmp(kwl->kw[index].kw, kw, kwend - kw) == 0) &&
118 kwl->kw[index].kw[kwend-kw] == 0) {
119 if (kwl->kw[index].parse)
120 return &kwl->kw[index]; /* found it !*/
121 else
122 ret = &kwl->kw[index]; /* may be OK */
123 }
124 }
125 }
126 return ret;
127}
128
129/*
130 * Dumps all registered "filter" keywords to the <out> string pointer. The
131 * unsupported keywords are only dumped if their supported form was not found.
132 */
133void
134flt_dump_kws(char **out)
135{
136 struct flt_kw_list *kwl;
137 int index;
138
Christopher Faulet784063e2020-05-18 12:14:18 +0200139 if (!out)
140 return;
141
Christopher Fauletd7c91962015-04-30 11:48:27 +0200142 *out = NULL;
143 list_for_each_entry(kwl, &flt_keywords.list, list) {
144 for (index = 0; kwl->kw[index].kw != NULL; index++) {
145 if (kwl->kw[index].parse ||
146 flt_find_kw(kwl->kw[index].kw) == &kwl->kw[index]) {
147 memprintf(out, "%s[%4s] %s%s\n", *out ? *out : "",
148 kwl->scope,
149 kwl->kw[index].kw,
150 kwl->kw[index].parse ? "" : " (not supported)");
151 }
152 }
153 }
154}
155
156/*
Christopher Fauletb3f4e142016-03-07 12:46:38 +0100157 * Lists the known filters on <out>
158 */
159void
160list_filters(FILE *out)
161{
162 char *filters, *p, *f;
163
164 fprintf(out, "Available filters :\n");
165 flt_dump_kws(&filters);
166 for (p = filters; (f = strtok_r(p,"\n",&p));)
167 fprintf(out, "\t%s\n", f);
168 free(filters);
169}
170
171/*
Christopher Fauletd7c91962015-04-30 11:48:27 +0200172 * Parses the "filter" keyword. All keywords must be handled by filters
173 * themselves
174 */
175static int
176parse_filter(char **args, int section_type, struct proxy *curpx,
177 struct proxy *defpx, const char *file, int line, char **err)
178{
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100179 struct flt_conf *fconf = NULL;
Christopher Fauletd7c91962015-04-30 11:48:27 +0200180
181 /* Filter cannot be defined on a default proxy */
182 if (curpx == defpx) {
Christopher Fauletcc7317d2016-04-04 10:51:17 +0200183 memprintf(err, "parsing [%s:%d] : %s is not allowed in a 'default' section.",
Christopher Fauletd7c91962015-04-30 11:48:27 +0200184 file, line, args[0]);
185 return -1;
186 }
187 if (!strcmp(args[0], "filter")) {
188 struct flt_kw *kw;
189 int cur_arg;
190
191 if (!*args[1]) {
192 memprintf(err,
193 "parsing [%s:%d] : missing argument for '%s' in %s '%s'.",
194 file, line, args[0], proxy_type_str(curpx), curpx->id);
195 goto error;
196 }
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100197 fconf = calloc(1, sizeof(*fconf));
198 if (!fconf) {
Christopher Fauletd7c91962015-04-30 11:48:27 +0200199 memprintf(err, "'%s' : out of memory", args[0]);
200 goto error;
201 }
Christopher Fauletd7c91962015-04-30 11:48:27 +0200202
203 cur_arg = 1;
204 kw = flt_find_kw(args[cur_arg]);
205 if (kw) {
206 if (!kw->parse) {
207 memprintf(err, "parsing [%s:%d] : '%s' : "
208 "'%s' option is not implemented in this version (check build options).",
209 file, line, args[0], args[cur_arg]);
210 goto error;
211 }
Thierry Fournier3610c392016-04-13 18:27:51 +0200212 if (kw->parse(args, &cur_arg, curpx, fconf, err, kw->private) != 0) {
Christopher Fauletd7c91962015-04-30 11:48:27 +0200213 if (err && *err)
214 memprintf(err, "'%s' : '%s'",
215 args[0], *err);
216 else
217 memprintf(err, "'%s' : error encountered while processing '%s'",
218 args[0], args[cur_arg]);
219 goto error;
220 }
221 }
222 else {
223 flt_dump_kws(err);
224 indent_msg(err, 4);
225 memprintf(err, "'%s' : unknown keyword '%s'.%s%s",
226 args[0], args[cur_arg],
227 err && *err ? " Registered keywords :" : "", err && *err ? *err : "");
228 goto error;
229 }
230 if (*args[cur_arg]) {
231 memprintf(err, "'%s %s' : unknown keyword '%s'.",
232 args[0], args[1], args[cur_arg]);
233 goto error;
234 }
Christopher Faulet00e818a2016-04-19 17:00:44 +0200235 if (fconf->ops == NULL) {
236 memprintf(err, "'%s %s' : no callbacks defined.",
237 args[0], args[1]);
238 goto error;
239 }
Christopher Fauletd7c91962015-04-30 11:48:27 +0200240
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100241 LIST_ADDQ(&curpx->filter_configs, &fconf->list);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200242 }
243 return 0;
244
245 error:
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100246 free(fconf);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200247 return -1;
248
249
250}
251
252/*
253 * Calls 'init' callback for all filters attached to a proxy. This happens after
254 * the configuration parsing. Filters can finish to fill their config. Returns
255 * (ERR_ALERT|ERR_FATAL) if an error occurs, 0 otherwise.
256 */
Willy Tarreau64bca592016-12-21 20:13:11 +0100257static int
Christopher Fauletd7c91962015-04-30 11:48:27 +0200258flt_init(struct proxy *proxy)
259{
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100260 struct flt_conf *fconf;
Christopher Fauletd7c91962015-04-30 11:48:27 +0200261
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100262 list_for_each_entry(fconf, &proxy->filter_configs, list) {
263 if (fconf->ops->init && fconf->ops->init(proxy, fconf) < 0)
Christopher Fauletd7c91962015-04-30 11:48:27 +0200264 return ERR_ALERT|ERR_FATAL;
265 }
266 return 0;
267}
268
Christopher Faulet71a6a8e2017-07-27 16:33:28 +0200269/*
270 * Calls 'init_per_thread' callback for all filters attached to a proxy for each
271 * threads. This happens after the thread creation. Filters can finish to fill
272 * their config. Returns (ERR_ALERT|ERR_FATAL) if an error occurs, 0 otherwise.
273 */
274static int
275flt_init_per_thread(struct proxy *proxy)
276{
277 struct flt_conf *fconf;
278
279 list_for_each_entry(fconf, &proxy->filter_configs, list) {
280 if (fconf->ops->init_per_thread && fconf->ops->init_per_thread(proxy, fconf) < 0)
281 return ERR_ALERT|ERR_FATAL;
282 }
283 return 0;
284}
285
Willy Tarreau64bca592016-12-21 20:13:11 +0100286/* Calls flt_init() for all proxies, see above */
287static int
288flt_init_all()
289{
290 struct proxy *px;
291 int err_code = 0;
292
Olivier Houchardfbc74e82017-11-24 16:54:05 +0100293 for (px = proxies_list; px; px = px->next) {
Christopher Faulet400829c2020-11-02 16:08:09 +0100294 if (px->disabled) {
295 flt_deinit(px);
296 continue;
297 }
Willy Tarreau64bca592016-12-21 20:13:11 +0100298 err_code |= flt_init(px);
299 if (err_code & (ERR_ABORT|ERR_FATAL)) {
Christopher Faulet767a84b2017-11-24 16:50:31 +0100300 ha_alert("Failed to initialize filters for proxy '%s'.\n",
301 px->id);
Willy Tarreau64bca592016-12-21 20:13:11 +0100302 return err_code;
303 }
304 }
305 return 0;
306}
307
Joseph Herlantb35ea682018-11-15 12:24:23 -0800308/* Calls flt_init_per_thread() for all proxies, see above. Be careful here, it
309 * returns 0 if an error occurred. This is the opposite of flt_init_all. */
Christopher Faulet71a6a8e2017-07-27 16:33:28 +0200310static int
311flt_init_all_per_thread()
312{
313 struct proxy *px;
314 int err_code = 0;
315
Olivier Houchardfbc74e82017-11-24 16:54:05 +0100316 for (px = proxies_list; px; px = px->next) {
Christopher Faulet400829c2020-11-02 16:08:09 +0100317 if (px->disabled)
318 continue;
319
Christopher Faulet71a6a8e2017-07-27 16:33:28 +0200320 err_code = flt_init_per_thread(px);
321 if (err_code & (ERR_ABORT|ERR_FATAL)) {
Christopher Faulet767a84b2017-11-24 16:50:31 +0100322 ha_alert("Failed to initialize filters for proxy '%s' for thread %u.\n",
323 px->id, tid);
Christopher Faulet71a6a8e2017-07-27 16:33:28 +0200324 return 0;
325 }
326 }
327 return 1;
328}
329
Christopher Fauletd7c91962015-04-30 11:48:27 +0200330/*
331 * Calls 'check' callback for all filters attached to a proxy. This happens
332 * after the configuration parsing but before filters initialization. Returns
333 * the number of encountered errors.
334 */
335int
336flt_check(struct proxy *proxy)
337{
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100338 struct flt_conf *fconf;
339 int err = 0;
Christopher Fauletd7c91962015-04-30 11:48:27 +0200340
Christopher Fauletff17b182019-01-07 15:03:22 +0100341 err += check_implicit_http_comp_flt(proxy);
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100342 list_for_each_entry(fconf, &proxy->filter_configs, list) {
343 if (fconf->ops->check)
344 err += fconf->ops->check(proxy, fconf);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200345 }
346 return err;
347}
348
349/*
350 * Calls 'denit' callback for all filters attached to a proxy. This happens when
351 * HAProxy is stopped.
352 */
353void
354flt_deinit(struct proxy *proxy)
355{
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100356 struct flt_conf *fconf, *back;
Christopher Fauletd7c91962015-04-30 11:48:27 +0200357
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100358 list_for_each_entry_safe(fconf, back, &proxy->filter_configs, list) {
Christopher Faulet400829c2020-11-02 16:08:09 +0100359 if (!proxy->disabled && fconf->ops->deinit)
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100360 fconf->ops->deinit(proxy, fconf);
361 LIST_DEL(&fconf->list);
362 free(fconf);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200363 }
364}
365
Christopher Faulet71a6a8e2017-07-27 16:33:28 +0200366/*
367 * Calls 'denit_per_thread' callback for all filters attached to a proxy for
368 * each threads. This happens before exiting a thread.
369 */
370void
371flt_deinit_per_thread(struct proxy *proxy)
372{
373 struct flt_conf *fconf, *back;
374
375 list_for_each_entry_safe(fconf, back, &proxy->filter_configs, list) {
376 if (fconf->ops->deinit_per_thread)
377 fconf->ops->deinit_per_thread(proxy, fconf);
378 }
379}
380
381
382/* Calls flt_deinit_per_thread() for all proxies, see above */
383static void
384flt_deinit_all_per_thread()
385{
386 struct proxy *px;
387
Christopher Faulet400829c2020-11-02 16:08:09 +0100388 for (px = proxies_list; px; px = px->next) {
389 if (!px->disabled)
390 flt_deinit_per_thread(px);
391 }
Christopher Faulet71a6a8e2017-07-27 16:33:28 +0200392}
393
Christopher Faulet92d36382015-11-05 13:35:03 +0100394/* Attaches a filter to a stream. Returns -1 if an error occurs, 0 otherwise. */
395static int
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100396flt_stream_add_filter(struct stream *s, struct flt_conf *fconf, unsigned int flags)
Christopher Faulet92d36382015-11-05 13:35:03 +0100397{
Christopher Faulet75bc9132018-11-30 15:18:09 +0100398 struct filter *f;
Christopher Faulet31ed32d2016-06-21 11:42:37 +0200399
Christopher Faulet0f17a9b2019-04-05 10:11:38 +0200400 if (IS_HTX_STRM(s) && !(fconf->flags & FLT_CFG_FL_HTX))
Christopher Faulet75bc9132018-11-30 15:18:09 +0100401 return 0;
402
403 f = pool_alloc(pool_head_filter);
Christopher Faulet92d36382015-11-05 13:35:03 +0100404 if (!f) /* not enough memory */
405 return -1;
406 memset(f, 0, sizeof(*f));
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100407 f->config = fconf;
Christopher Fauletda02e172015-12-04 09:25:05 +0100408 f->flags |= flags;
Christopher Faulet31ed32d2016-06-21 11:42:37 +0200409
410 if (FLT_OPS(f)->attach) {
411 int ret = FLT_OPS(f)->attach(s, f);
412 if (ret <= 0) {
Willy Tarreaubafbe012017-11-24 17:34:44 +0100413 pool_free(pool_head_filter, f);
Christopher Faulet31ed32d2016-06-21 11:42:37 +0200414 return ret;
415 }
416 }
417
Christopher Fauletfcf035c2015-12-03 11:48:03 +0100418 LIST_ADDQ(&strm_flt(s)->filters, &f->list);
Christopher Fauletda02e172015-12-04 09:25:05 +0100419 strm_flt(s)->flags |= STRM_FLT_FL_HAS_FILTERS;
Christopher Faulet92d36382015-11-05 13:35:03 +0100420 return 0;
421}
422
423/*
424 * Called when a stream is created. It attaches all frontend filters to the
425 * stream. Returns -1 if an error occurs, 0 otherwise.
426 */
427int
428flt_stream_init(struct stream *s)
429{
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100430 struct flt_conf *fconf;
Christopher Faulet92d36382015-11-05 13:35:03 +0100431
Christopher Fauletfcf035c2015-12-03 11:48:03 +0100432 memset(strm_flt(s), 0, sizeof(*strm_flt(s)));
433 LIST_INIT(&strm_flt(s)->filters);
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100434 list_for_each_entry(fconf, &strm_fe(s)->filter_configs, list) {
435 if (flt_stream_add_filter(s, fconf, 0) < 0)
Christopher Faulet92d36382015-11-05 13:35:03 +0100436 return -1;
437 }
438 return 0;
439}
440
441/*
442 * Called when a stream is closed or when analyze ends (For an HTTP stream, this
443 * happens after each request/response exchange). When analyze ends, backend
444 * filters are removed. When the stream is closed, all filters attached to the
445 * stream are removed.
446 */
447void
448flt_stream_release(struct stream *s, int only_backend)
449{
450 struct filter *filter, *back;
451
Christopher Fauletfcf035c2015-12-03 11:48:03 +0100452 list_for_each_entry_safe(filter, back, &strm_flt(s)->filters, list) {
Christopher Fauletda02e172015-12-04 09:25:05 +0100453 if (!only_backend || (filter->flags & FLT_FL_IS_BACKEND_FILTER)) {
Christopher Faulet31ed32d2016-06-21 11:42:37 +0200454 if (FLT_OPS(filter)->detach)
455 FLT_OPS(filter)->detach(s, filter);
Christopher Faulet92d36382015-11-05 13:35:03 +0100456 LIST_DEL(&filter->list);
Willy Tarreaubafbe012017-11-24 17:34:44 +0100457 pool_free(pool_head_filter, filter);
Christopher Faulet92d36382015-11-05 13:35:03 +0100458 }
459 }
Christopher Fauletfcf035c2015-12-03 11:48:03 +0100460 if (LIST_ISEMPTY(&strm_flt(s)->filters))
Christopher Fauletda02e172015-12-04 09:25:05 +0100461 strm_flt(s)->flags &= ~STRM_FLT_FL_HAS_FILTERS;
Christopher Faulet92d36382015-11-05 13:35:03 +0100462}
463
Christopher Fauletd7c91962015-04-30 11:48:27 +0200464/*
465 * Calls 'stream_start' for all filters attached to a stream. This happens when
466 * the stream is created, just after calling flt_stream_init
467 * function. Returns -1 if an error occurs, 0 otherwise.
468 */
469int
470flt_stream_start(struct stream *s)
471{
472 struct filter *filter;
473
Christopher Fauletfcf035c2015-12-03 11:48:03 +0100474 list_for_each_entry(filter, &strm_flt(s)->filters, list) {
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100475 if (FLT_OPS(filter)->stream_start && FLT_OPS(filter)->stream_start(s, filter) < 0)
Christopher Fauletd7c91962015-04-30 11:48:27 +0200476 return -1;
477 }
478 return 0;
479}
480
481/*
482 * Calls 'stream_stop' for all filters attached to a stream. This happens when
483 * the stream is stopped, just before calling flt_stream_release function.
484 */
485void
486flt_stream_stop(struct stream *s)
487{
488 struct filter *filter;
489
Christopher Fauletfcf035c2015-12-03 11:48:03 +0100490 list_for_each_entry(filter, &strm_flt(s)->filters, list) {
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100491 if (FLT_OPS(filter)->stream_stop)
492 FLT_OPS(filter)->stream_stop(s, filter);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200493 }
494}
495
Christopher Faulet92d36382015-11-05 13:35:03 +0100496/*
Christopher Fauleta00d8172016-11-10 14:58:05 +0100497 * Calls 'check_timeouts' for all filters attached to a stream. This happens when
498 * the stream is woken up because of expired timer.
499 */
500void
501flt_stream_check_timeouts(struct stream *s)
502{
503 struct filter *filter;
504
505 list_for_each_entry(filter, &strm_flt(s)->filters, list) {
506 if (FLT_OPS(filter)->check_timeouts)
507 FLT_OPS(filter)->check_timeouts(s, filter);
508 }
509}
510
511/*
Christopher Faulet92d36382015-11-05 13:35:03 +0100512 * Called when a backend is set for a stream. If the frontend and the backend
Christopher Faulet31ed32d2016-06-21 11:42:37 +0200513 * are not the same, this function attaches all backend filters to the
514 * stream. Returns -1 if an error occurs, 0 otherwise.
Christopher Faulet92d36382015-11-05 13:35:03 +0100515 */
516int
517flt_set_stream_backend(struct stream *s, struct proxy *be)
518{
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100519 struct flt_conf *fconf;
Christopher Faulet31ed32d2016-06-21 11:42:37 +0200520 struct filter *filter;
Christopher Faulet92d36382015-11-05 13:35:03 +0100521
522 if (strm_fe(s) == be)
Christopher Faulet31ed32d2016-06-21 11:42:37 +0200523 goto end;
Christopher Faulet92d36382015-11-05 13:35:03 +0100524
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100525 list_for_each_entry(fconf, &be->filter_configs, list) {
526 if (flt_stream_add_filter(s, fconf, FLT_FL_IS_BACKEND_FILTER) < 0)
Christopher Faulet92d36382015-11-05 13:35:03 +0100527 return -1;
528 }
Christopher Faulet31ed32d2016-06-21 11:42:37 +0200529
530 end:
531 list_for_each_entry(filter, &strm_flt(s)->filters, list) {
532 if (FLT_OPS(filter)->stream_set_backend &&
533 FLT_OPS(filter)->stream_set_backend(s, filter, be) < 0)
534 return -1;
535 }
536
Christopher Faulet92d36382015-11-05 13:35:03 +0100537 return 0;
538}
539
Christopher Fauletd7c91962015-04-30 11:48:27 +0200540
541/*
542 * Calls 'http_end' callback for all filters attached to a stream. All filters
543 * are called here, but only if there is at least one "data" filter. This
544 * functions is called when all data were parsed and forwarded. 'http_end'
545 * callback is resumable, so this function returns a negative value if an error
546 * occurs, 0 if it needs to wait for some reason, any other value otherwise.
547 */
548int
549flt_http_end(struct stream *s, struct http_msg *msg)
550{
551 int ret = 1;
552
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100553 DBG_TRACE_ENTER(STRM_EV_STRM_ANA|STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s, s->txn, msg);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200554 RESUME_FILTER_LOOP(s, msg->chn) {
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100555 if (FLT_OPS(filter)->http_end) {
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100556 DBG_TRACE_DEVEL(FLT_ID(filter), STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s);
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100557 ret = FLT_OPS(filter)->http_end(s, filter, msg);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200558 if (ret <= 0)
559 BREAK_EXECUTION(s, msg->chn, end);
560 }
Christopher Fauletd7c91962015-04-30 11:48:27 +0200561 } RESUME_FILTER_END;
562end:
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100563 DBG_TRACE_LEAVE(STRM_EV_STRM_ANA|STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200564 return ret;
565}
566
567/*
568 * Calls 'http_reset' callback for all filters attached to a stream. This
569 * happens when a 100-continue response is received.
570 */
571void
572flt_http_reset(struct stream *s, struct http_msg *msg)
573{
574 struct filter *filter;
575
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100576 DBG_TRACE_ENTER(STRM_EV_STRM_ANA|STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s, s->txn, msg);
Christopher Fauletfcf035c2015-12-03 11:48:03 +0100577 list_for_each_entry(filter, &strm_flt(s)->filters, list) {
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100578 if (FLT_OPS(filter)->http_reset) {
579 DBG_TRACE_DEVEL(FLT_ID(filter), STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s);
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100580 FLT_OPS(filter)->http_reset(s, filter, msg);
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100581 }
Christopher Fauletd7c91962015-04-30 11:48:27 +0200582 }
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100583 DBG_TRACE_LEAVE(STRM_EV_STRM_ANA|STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200584}
585
586/*
587 * Calls 'http_reply' callback for all filters attached to a stream when HA
588 * decides to stop the HTTP message processing.
589 */
590void
Willy Tarreau83061a82018-07-13 11:56:34 +0200591flt_http_reply(struct stream *s, short status, const struct buffer *msg)
Christopher Fauletd7c91962015-04-30 11:48:27 +0200592{
593 struct filter *filter;
594
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100595 DBG_TRACE_ENTER(STRM_EV_STRM_ANA|STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s, s->txn, msg);
Christopher Fauletfcf035c2015-12-03 11:48:03 +0100596 list_for_each_entry(filter, &strm_flt(s)->filters, list) {
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100597 if (FLT_OPS(filter)->http_reply) {
598 DBG_TRACE_DEVEL(FLT_ID(filter), STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s);
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100599 FLT_OPS(filter)->http_reply(s, filter, status, msg);
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100600 }
Christopher Fauletd7c91962015-04-30 11:48:27 +0200601 }
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100602 DBG_TRACE_LEAVE(STRM_EV_STRM_ANA|STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200603}
604
605/*
Christopher Faulet75bc9132018-11-30 15:18:09 +0100606 * Calls 'http_payload' callback for all "data" filters attached to a
607 * stream. This function is called when some data can be forwarded in the
608 * AN_REQ_HTTP_XFER_BODY and AN_RES_HTTP_XFER_BODY analyzers. It takes care to
609 * update the filters and the stream offset to be sure that a filter cannot
610 * forward more data than its predecessors. A filter can choose to not forward
611 * all data. Returns a negative value if an error occurs, else the number of
612 * forwarded bytes.
Christopher Faulet75bc9132018-11-30 15:18:09 +0100613 */
614int
615flt_http_payload(struct stream *s, struct http_msg *msg, unsigned int len)
616{
617 struct filter *filter;
618 unsigned long long *strm_off = &FLT_STRM_OFF(s, msg->chn);
Christopher Faulet421e7692019-06-13 11:16:45 +0200619 unsigned int out = co_data(msg->chn);
Christopher Faulet81340d72020-02-26 15:47:22 +0100620 int ret, data;
Christopher Faulet75bc9132018-11-30 15:18:09 +0100621
Christopher Faulet81340d72020-02-26 15:47:22 +0100622 ret = data = len - out;
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100623 DBG_TRACE_ENTER(STRM_EV_STRM_ANA|STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s, s->txn, msg);
Christopher Faulet75bc9132018-11-30 15:18:09 +0100624 list_for_each_entry(filter, &strm_flt(s)->filters, list) {
625 /* Call "data" filters only */
626 if (!IS_DATA_FILTER(filter, msg->chn))
627 continue;
628 if (FLT_OPS(filter)->http_payload) {
629 unsigned long long *flt_off = &FLT_OFF(filter, msg->chn);
630 unsigned int offset = *flt_off - *strm_off;
631
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100632 DBG_TRACE_DEVEL(FLT_ID(filter), STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s);
Christopher Faulet71179a32020-02-07 16:40:33 +0100633 ret = FLT_OPS(filter)->http_payload(s, filter, msg, out + offset, data - offset);
Christopher Faulet75bc9132018-11-30 15:18:09 +0100634 if (ret < 0)
635 goto end;
Christopher Fauletc50ee0b2020-02-24 16:20:09 +0100636 data = ret + *flt_off - *strm_off;
Christopher Faulet75bc9132018-11-30 15:18:09 +0100637 *flt_off += ret;
Christopher Faulet75bc9132018-11-30 15:18:09 +0100638 }
639 }
Christopher Faulet71179a32020-02-07 16:40:33 +0100640
641 /* Only forward data if the last filter decides to forward something */
642 if (ret > 0) {
643 ret = data;
644 *strm_off += ret;
645 }
Christopher Faulet75bc9132018-11-30 15:18:09 +0100646 end:
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100647 DBG_TRACE_LEAVE(STRM_EV_STRM_ANA|STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s);
Christopher Faulet75bc9132018-11-30 15:18:09 +0100648 return ret;
649}
650
651/*
Christopher Fauletd7c91962015-04-30 11:48:27 +0200652 * Calls 'channel_start_analyze' callback for all filters attached to a
653 * stream. This function is called when we start to analyze a request or a
654 * response. For frontend filters, it is called before all other analyzers. For
655 * backend ones, it is called before all backend
656 * analyzers. 'channel_start_analyze' callback is resumable, so this function
657 * returns 0 if an error occurs or if it needs to wait, any other value
658 * otherwise.
659 */
660int
661flt_start_analyze(struct stream *s, struct channel *chn, unsigned int an_bit)
662{
663 int ret = 1;
664
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100665 DBG_TRACE_ENTER(STRM_EV_STRM_ANA|STRM_EV_FLT_ANA, s);
666
Christopher Fauletd7c91962015-04-30 11:48:27 +0200667 /* If this function is called, this means there is at least one filter,
668 * so we do not need to check the filter list's emptiness. */
669
Christopher Faulete6006242017-03-10 11:52:44 +0100670 /* Set flag on channel to tell that the channel is filtered */
671 chn->flags |= CF_FLT_ANALYZE;
672
Christopher Fauletd7c91962015-04-30 11:48:27 +0200673 RESUME_FILTER_LOOP(s, chn) {
Christopher Faulet0184ea72017-01-05 14:06:34 +0100674 if (!(chn->flags & CF_ISRESP)) {
675 if (an_bit == AN_REQ_FLT_START_BE &&
676 !(filter->flags & FLT_FL_IS_BACKEND_FILTER))
677 continue;
678 }
679 else {
680 if (an_bit == AN_RES_FLT_START_BE &&
681 !(filter->flags & FLT_FL_IS_BACKEND_FILTER))
682 continue;
683 }
Christopher Fauletd7c91962015-04-30 11:48:27 +0200684
Christopher Fauletb2e58492019-11-12 11:13:01 +0100685 FLT_OFF(filter, chn) = 0;
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100686 if (FLT_OPS(filter)->channel_start_analyze) {
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100687 DBG_TRACE_DEVEL(FLT_ID(filter), STRM_EV_FLT_ANA, s);
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100688 ret = FLT_OPS(filter)->channel_start_analyze(s, filter, chn);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200689 if (ret <= 0)
690 BREAK_EXECUTION(s, chn, end);
691 }
692 } RESUME_FILTER_END;
693
694 end:
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100695 ret = handle_analyzer_result(s, chn, an_bit, ret);
696 DBG_TRACE_LEAVE(STRM_EV_STRM_ANA|STRM_EV_FLT_ANA, s);
697 return ret;
Christopher Fauletd7c91962015-04-30 11:48:27 +0200698}
699
700/*
Christopher Faulet3a394fa2016-05-11 17:13:39 +0200701 * Calls 'channel_pre_analyze' callback for all filters attached to a
702 * stream. This function is called BEFORE each analyzer attached to a channel,
703 * expects analyzers responsible for data sending. 'channel_pre_analyze'
704 * callback is resumable, so this function returns 0 if an error occurs or if it
705 * needs to wait, any other value otherwise.
706 *
707 * Note this function can be called many times for the same analyzer. In fact,
708 * it is called until the analyzer finishes its processing.
Christopher Fauletd7c91962015-04-30 11:48:27 +0200709 */
710int
Christopher Faulet3a394fa2016-05-11 17:13:39 +0200711flt_pre_analyze(struct stream *s, struct channel *chn, unsigned int an_bit)
Christopher Fauletd7c91962015-04-30 11:48:27 +0200712{
713 int ret = 1;
714
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100715 DBG_TRACE_ENTER(STRM_EV_STRM_ANA|STRM_EV_FLT_ANA, s);
716
Christopher Fauletd7c91962015-04-30 11:48:27 +0200717 RESUME_FILTER_LOOP(s, chn) {
Christopher Faulet3a394fa2016-05-11 17:13:39 +0200718 if (FLT_OPS(filter)->channel_pre_analyze && (filter->pre_analyzers & an_bit)) {
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100719 DBG_TRACE_DEVEL(FLT_ID(filter), STRM_EV_FLT_ANA, s);
Christopher Faulet3a394fa2016-05-11 17:13:39 +0200720 ret = FLT_OPS(filter)->channel_pre_analyze(s, filter, chn, an_bit);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200721 if (ret <= 0)
722 BREAK_EXECUTION(s, chn, check_result);
723 }
724 } RESUME_FILTER_END;
725
726 check_result:
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100727 ret = handle_analyzer_result(s, chn, 0, ret);
728 DBG_TRACE_LEAVE(STRM_EV_STRM_ANA|STRM_EV_FLT_ANA, s);
729 return ret;
Christopher Faulet309c6412015-12-02 09:57:32 +0100730}
731
732/*
Christopher Faulet3a394fa2016-05-11 17:13:39 +0200733 * Calls 'channel_post_analyze' callback for all filters attached to a
734 * stream. This function is called AFTER each analyzer attached to a channel,
735 * expects analyzers responsible for data sending. 'channel_post_analyze'
736 * callback is NOT resumable, so this function returns a 0 if an error occurs,
737 * any other value otherwise.
738 *
739 * Here, AFTER means when the analyzer finishes its processing.
740 */
741int
742flt_post_analyze(struct stream *s, struct channel *chn, unsigned int an_bit)
743{
744 struct filter *filter;
745 int ret = 1;
746
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100747 DBG_TRACE_ENTER(STRM_EV_STRM_ANA|STRM_EV_FLT_ANA, s);
748
Christopher Faulet3a394fa2016-05-11 17:13:39 +0200749 list_for_each_entry(filter, &strm_flt(s)->filters, list) {
750 if (FLT_OPS(filter)->channel_post_analyze && (filter->post_analyzers & an_bit)) {
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100751 DBG_TRACE_DEVEL(FLT_ID(filter), STRM_EV_FLT_ANA, s);
Christopher Faulet3a394fa2016-05-11 17:13:39 +0200752 ret = FLT_OPS(filter)->channel_post_analyze(s, filter, chn, an_bit);
753 if (ret < 0)
754 break;
755 }
756 }
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100757 ret = handle_analyzer_result(s, chn, 0, ret);
758 DBG_TRACE_LEAVE(STRM_EV_STRM_ANA|STRM_EV_FLT_ANA, s);
759 return ret;
Christopher Faulet3a394fa2016-05-11 17:13:39 +0200760}
761
762/*
Christopher Faulet0184ea72017-01-05 14:06:34 +0100763 * This function is the AN_REQ/RES_FLT_HTTP_HDRS analyzer, used to filter HTTP
764 * headers or a request or a response. Returns 0 if an error occurs or if it
765 * needs to wait, any other value otherwise.
Christopher Faulet309c6412015-12-02 09:57:32 +0100766 */
767int
768flt_analyze_http_headers(struct stream *s, struct channel *chn, unsigned int an_bit)
769{
Christopher Faulet1339d742016-05-11 16:48:33 +0200770 struct http_msg *msg;
771 int ret = 1;
Christopher Faulet309c6412015-12-02 09:57:32 +0100772
Christopher Faulet1339d742016-05-11 16:48:33 +0200773 msg = ((chn->flags & CF_ISRESP) ? &s->txn->rsp : &s->txn->req);
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100774 DBG_TRACE_ENTER(STRM_EV_STRM_ANA|STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s, s->txn, msg);
775
Christopher Faulet309c6412015-12-02 09:57:32 +0100776 RESUME_FILTER_LOOP(s, chn) {
Christopher Faulet1339d742016-05-11 16:48:33 +0200777 if (FLT_OPS(filter)->http_headers) {
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100778 DBG_TRACE_DEVEL(FLT_ID(filter), STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s);
Christopher Faulet1339d742016-05-11 16:48:33 +0200779 ret = FLT_OPS(filter)->http_headers(s, filter, msg);
Christopher Faulet309c6412015-12-02 09:57:32 +0100780 if (ret <= 0)
781 BREAK_EXECUTION(s, chn, check_result);
782 }
783 } RESUME_FILTER_END;
Christopher Faulet9c44e482020-02-12 15:31:20 +0100784
785 if (HAS_DATA_FILTERS(s, chn)) {
786 size_t data = http_get_hdrs_size(htxbuf(&chn->buf));
787 struct filter *f;
788
789 list_for_each_entry(f, &strm_flt(s)->filters, list) {
790 if (IS_DATA_FILTER(f, chn))
791 FLT_OFF(f, chn) = data;
792 }
793 }
Christopher Faulet309c6412015-12-02 09:57:32 +0100794
795 check_result:
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100796 ret = handle_analyzer_result(s, chn, an_bit, ret);
797 DBG_TRACE_LEAVE(STRM_EV_STRM_ANA|STRM_EV_HTTP_ANA|STRM_EV_FLT_ANA, s);
798 return ret;
Christopher Fauletd7c91962015-04-30 11:48:27 +0200799}
800
801/*
802 * Calls 'channel_end_analyze' callback for all filters attached to a
803 * stream. This function is called when we stop to analyze a request or a
804 * response. It is called after all other analyzers. 'channel_end_analyze'
805 * callback is resumable, so this function returns 0 if an error occurs or if it
806 * needs to wait, any other value otherwise.
807 */
808int
809flt_end_analyze(struct stream *s, struct channel *chn, unsigned int an_bit)
810{
811 int ret = 1;
812
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100813 DBG_TRACE_ENTER(STRM_EV_STRM_ANA|STRM_EV_FLT_ANA, s);
814
Christopher Faulete6006242017-03-10 11:52:44 +0100815 /* Check if all filters attached on the stream have finished their
816 * processing on this channel. */
817 if (!(chn->flags & CF_FLT_ANALYZE))
818 goto sync;
819
Christopher Fauletd7c91962015-04-30 11:48:27 +0200820 RESUME_FILTER_LOOP(s, chn) {
Christopher Fauletb2e58492019-11-12 11:13:01 +0100821 FLT_OFF(filter, chn) = 0;
Christopher Fauletda02e172015-12-04 09:25:05 +0100822 unregister_data_filter(s, chn, filter);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200823
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100824 if (FLT_OPS(filter)->channel_end_analyze) {
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100825 DBG_TRACE_DEVEL(FLT_ID(filter), STRM_EV_FLT_ANA, s);
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100826 ret = FLT_OPS(filter)->channel_end_analyze(s, filter, chn);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200827 if (ret <= 0)
828 BREAK_EXECUTION(s, chn, end);
829 }
830 } RESUME_FILTER_END;
831
Christopher Faulete6006242017-03-10 11:52:44 +0100832 end:
833 /* We don't remove yet this analyzer because we need to synchronize the
834 * both channels. So here, we just remove the flag CF_FLT_ANALYZE. */
835 ret = handle_analyzer_result(s, chn, 0, ret);
Christopher Faulet570f7992017-07-06 15:53:02 +0200836 if (ret) {
Christopher Faulete6006242017-03-10 11:52:44 +0100837 chn->flags &= ~CF_FLT_ANALYZE;
Christopher Faulet02c7b222015-12-22 12:01:29 +0100838
Christopher Faulet570f7992017-07-06 15:53:02 +0200839 /* Pretend there is an activity on both channels. Flag on the
840 * current one will be automatically removed, so only the other
841 * one will remain. This is a way to be sure that
842 * 'channel_end_analyze' callback will have a chance to be
843 * called at least once for the other side to finish the current
Joseph Herlantb35ea682018-11-15 12:24:23 -0800844 * processing. Of course, this is the filter responsibility to
Christopher Faulet570f7992017-07-06 15:53:02 +0200845 * wakeup the stream if it choose to loop on this callback. */
846 s->req.flags |= CF_WAKE_ONCE;
847 s->res.flags |= CF_WAKE_ONCE;
848 }
849
850
Christopher Faulete6006242017-03-10 11:52:44 +0100851 sync:
852 /* Now we can check if filters have finished their work on the both
853 * channels */
854 if (!(s->req.flags & CF_FLT_ANALYZE) && !(s->res.flags & CF_FLT_ANALYZE)) {
855 /* Sync channels by removing this analyzer for the both channels */
856 s->req.analysers &= ~AN_REQ_FLT_END;
857 s->res.analysers &= ~AN_RES_FLT_END;
Christopher Fauletc6062be2016-10-31 11:22:37 +0100858
Christopher Faulete6006242017-03-10 11:52:44 +0100859 /* Remove backend filters from the list */
860 flt_stream_release(s, 1);
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100861 DBG_TRACE_LEAVE(STRM_EV_STRM_ANA|STRM_EV_FLT_ANA, s);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200862 }
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100863 else {
864 DBG_TRACE_DEVEL("waiting for sync", STRM_EV_STRM_ANA|STRM_EV_FLT_ANA, s);
865 }
Christopher Fauletd7c91962015-04-30 11:48:27 +0200866 return ret;
867}
868
Christopher Fauletd7c91962015-04-30 11:48:27 +0200869
870/*
Christopher Fauletb2e58492019-11-12 11:13:01 +0100871 * Calls 'tcp_payload' callback for all "data" filters attached to a
872 * stream. This function is called when some data can be forwarded in the
873 * AN_REQ_FLT_XFER_BODY and AN_RES_FLT_XFER_BODY analyzers. It takes care to
874 * update the filters and the stream offset to be sure that a filter cannot
875 * forward more data than its predecessors. A filter can choose to not forward
876 * all data. Returns a negative value if an error occurs, else the number of
877 * forwarded bytes.
Christopher Fauletd7c91962015-04-30 11:48:27 +0200878 */
Christopher Fauletb2e58492019-11-12 11:13:01 +0100879int
880flt_tcp_payload(struct stream *s, struct channel *chn, unsigned int len)
Christopher Fauletd7c91962015-04-30 11:48:27 +0200881{
Christopher Fauletda02e172015-12-04 09:25:05 +0100882 struct filter *filter;
Christopher Fauletb2e58492019-11-12 11:13:01 +0100883 unsigned long long *strm_off = &FLT_STRM_OFF(s, chn);
884 unsigned int out = co_data(chn);
Christopher Faulet81340d72020-02-26 15:47:22 +0100885 int ret, data;
Christopher Fauletd7c91962015-04-30 11:48:27 +0200886
Christopher Faulet81340d72020-02-26 15:47:22 +0100887 ret = data = len - out;
Christopher Fauletb2e58492019-11-12 11:13:01 +0100888 DBG_TRACE_ENTER(STRM_EV_TCP_ANA|STRM_EV_FLT_ANA, s);
Christopher Fauletfcf035c2015-12-03 11:48:03 +0100889 list_for_each_entry(filter, &strm_flt(s)->filters, list) {
Christopher Fauletda02e172015-12-04 09:25:05 +0100890 /* Call "data" filters only */
891 if (!IS_DATA_FILTER(filter, chn))
892 continue;
Christopher Fauletb2e58492019-11-12 11:13:01 +0100893 if (FLT_OPS(filter)->tcp_payload) {
894 unsigned long long *flt_off = &FLT_OFF(filter, chn);
895 unsigned int offset = *flt_off - *strm_off;
Christopher Fauletda02e172015-12-04 09:25:05 +0100896
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100897 DBG_TRACE_DEVEL(FLT_ID(filter), STRM_EV_TCP_ANA|STRM_EV_FLT_ANA, s);
Christopher Faulet71179a32020-02-07 16:40:33 +0100898 ret = FLT_OPS(filter)->tcp_payload(s, filter, chn, out + offset, data - offset);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200899 if (ret < 0)
900 goto end;
Christopher Fauletc50ee0b2020-02-24 16:20:09 +0100901 data = ret + *flt_off - *strm_off;
Christopher Fauletb2e58492019-11-12 11:13:01 +0100902 *flt_off += ret;
Christopher Fauletd7c91962015-04-30 11:48:27 +0200903 }
Christopher Fauletd7c91962015-04-30 11:48:27 +0200904 }
Christopher Faulet71179a32020-02-07 16:40:33 +0100905
906 /* Only forward data if the last filter decides to forward something */
907 if (ret > 0) {
908 ret = data;
909 *strm_off += ret;
910 }
Christopher Fauletd7c91962015-04-30 11:48:27 +0200911 end:
Christopher Fauletb2e58492019-11-12 11:13:01 +0100912 DBG_TRACE_LEAVE(STRM_EV_TCP_ANA|STRM_EV_FLT_ANA, s);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200913 return ret;
914}
915
916/*
917 * Called when TCP data must be filtered on a channel. This function is the
Christopher Faulet0184ea72017-01-05 14:06:34 +0100918 * AN_REQ/RES_FLT_XFER_DATA analyzer. When called, it is responsible to forward
919 * data when the proxy is not in http mode. Behind the scene, it calls
920 * consecutively 'tcp_data' and 'tcp_forward_data' callbacks for all "data"
921 * filters attached to a stream. Returns 0 if an error occurs or if it needs to
922 * wait, any other value otherwise.
Christopher Fauletd7c91962015-04-30 11:48:27 +0200923 */
924int
925flt_xfer_data(struct stream *s, struct channel *chn, unsigned int an_bit)
926{
Christopher Fauletb2e58492019-11-12 11:13:01 +0100927 unsigned int len;
Christopher Fauletd7c91962015-04-30 11:48:27 +0200928 int ret = 1;
929
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100930 DBG_TRACE_ENTER(STRM_EV_STRM_ANA|STRM_EV_TCP_ANA|STRM_EV_FLT_ANA, s);
931
Christopher Fauletda02e172015-12-04 09:25:05 +0100932 /* If there is no "data" filters, we do nothing */
Christopher Fauletb2e58492019-11-12 11:13:01 +0100933 if (!HAS_DATA_FILTERS(s, chn))
Christopher Fauletda02e172015-12-04 09:25:05 +0100934 goto end;
Christopher Fauletd7c91962015-04-30 11:48:27 +0200935
936 /* Be sure that the output is still opened. Else we stop the data
937 * filtering. */
938 if ((chn->flags & (CF_READ_ERROR|CF_READ_TIMEOUT|CF_WRITE_ERROR|CF_WRITE_TIMEOUT)) ||
Willy Tarreau44a41a82018-06-19 07:16:31 +0200939 ((chn->flags & CF_SHUTW) && (chn->to_forward || co_data(chn))))
Christopher Fauletd7c91962015-04-30 11:48:27 +0200940 goto end;
941
Christopher Fauletb2e58492019-11-12 11:13:01 +0100942 if (s->flags & SF_HTX) {
943 struct htx *htx = htxbuf(&chn->buf);
944 len = htx->data;
945 }
946 else
947 len = c_data(chn);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200948
Christopher Fauletb2e58492019-11-12 11:13:01 +0100949 ret = flt_tcp_payload(s, chn, len);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200950 if (ret < 0)
951 goto end;
Willy Tarreaubcbd3932018-06-06 07:13:22 +0200952 c_adv(chn, ret);
Christopher Fauletda02e172015-12-04 09:25:05 +0100953
Christopher Fauletd7c91962015-04-30 11:48:27 +0200954 /* Stop waiting data if the input in closed and no data is pending or if
955 * the output is closed. */
Christopher Fauletb2e58492019-11-12 11:13:01 +0100956 if (chn->flags & CF_SHUTW) {
Christopher Fauletd7c91962015-04-30 11:48:27 +0200957 ret = 1;
958 goto end;
959 }
Christopher Fauletb2e58492019-11-12 11:13:01 +0100960 if (chn->flags & CF_SHUTR) {
961 if (((s->flags & SF_HTX) && htx_is_empty(htxbuf(&chn->buf))) || c_empty(chn)) {
962 ret = 1;
963 goto end;
964 }
965 }
Christopher Fauletd7c91962015-04-30 11:48:27 +0200966
967 /* Wait for data */
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100968 DBG_TRACE_DEVEL("waiting for more data", STRM_EV_STRM_ANA|STRM_EV_TCP_ANA|STRM_EV_FLT_ANA, s);
Christopher Fauletd7c91962015-04-30 11:48:27 +0200969 return 0;
970 end:
971 /* Terminate the data filtering. If <ret> is negative, an error was
972 * encountered during the filtering. */
Christopher Fauleteea8fc72019-11-05 16:18:10 +0100973 ret = handle_analyzer_result(s, chn, an_bit, ret);
974 DBG_TRACE_LEAVE(STRM_EV_STRM_ANA|STRM_EV_TCP_ANA|STRM_EV_FLT_ANA, s);
975 return ret;
Christopher Fauletd7c91962015-04-30 11:48:27 +0200976}
977
978/*
979 * Handles result of filter's analyzers. It returns 0 if an error occurs or if
980 * it needs to wait, any other value otherwise.
981 */
982static int
983handle_analyzer_result(struct stream *s, struct channel *chn,
984 unsigned int an_bit, int ret)
985{
986 int finst;
Christopher Faulete058f732019-09-06 15:24:55 +0200987 int status = 0;
Christopher Fauletd7c91962015-04-30 11:48:27 +0200988
989 if (ret < 0)
990 goto return_bad_req;
991 else if (!ret)
992 goto wait;
993
994 /* End of job, return OK */
995 if (an_bit) {
996 chn->analysers &= ~an_bit;
997 chn->analyse_exp = TICK_ETERNITY;
998 }
999 return 1;
1000
1001 return_bad_req:
1002 /* An error occurs */
1003 channel_abort(&s->req);
1004 channel_abort(&s->res);
1005
1006 if (!(chn->flags & CF_ISRESP)) {
Christopher Faulet0184ea72017-01-05 14:06:34 +01001007 s->req.analysers &= AN_REQ_FLT_END;
Christopher Fauletd7c91962015-04-30 11:48:27 +02001008 finst = SF_FINST_R;
Christopher Faulete058f732019-09-06 15:24:55 +02001009 status = 400;
Christopher Fauletd7c91962015-04-30 11:48:27 +02001010 /* FIXME: incr counters */
1011 }
1012 else {
Christopher Faulet0184ea72017-01-05 14:06:34 +01001013 s->res.analysers &= AN_RES_FLT_END;
Christopher Fauletd7c91962015-04-30 11:48:27 +02001014 finst = SF_FINST_H;
Christopher Faulete058f732019-09-06 15:24:55 +02001015 status = 502;
Christopher Fauletd7c91962015-04-30 11:48:27 +02001016 /* FIXME: incr counters */
1017 }
1018
Christopher Faulet3d119692019-07-15 22:04:51 +02001019 if (IS_HTX_STRM(s)) {
Christopher Fauletd7c91962015-04-30 11:48:27 +02001020 /* Do not do that when we are waiting for the next request */
Christopher Faulete058f732019-09-06 15:24:55 +02001021 if (s->txn->status > 0)
Christopher Fauletfc9cfe42019-07-16 14:54:53 +02001022 http_reply_and_close(s, s->txn->status, NULL);
Christopher Fauletd7c91962015-04-30 11:48:27 +02001023 else {
Christopher Faulete058f732019-09-06 15:24:55 +02001024 s->txn->status = status;
1025 http_reply_and_close(s, status, http_error_message(s));
Christopher Fauletd7c91962015-04-30 11:48:27 +02001026 }
1027 }
1028
1029 if (!(s->flags & SF_ERR_MASK))
1030 s->flags |= SF_ERR_PRXCOND;
1031 if (!(s->flags & SF_FINST_MASK))
1032 s->flags |= finst;
Christopher Fauleteea8fc72019-11-05 16:18:10 +01001033 DBG_TRACE_DEVEL("leaving on error", STRM_EV_FLT_ANA|STRM_EV_FLT_ERR, s);
Christopher Fauletd7c91962015-04-30 11:48:27 +02001034 return 0;
1035
1036 wait:
1037 if (!(chn->flags & CF_ISRESP))
1038 channel_dont_connect(chn);
Christopher Fauleteea8fc72019-11-05 16:18:10 +01001039 DBG_TRACE_DEVEL("wairing for more data", STRM_EV_FLT_ANA, s);
Christopher Fauletd7c91962015-04-30 11:48:27 +02001040 return 0;
1041}
1042
1043
1044/* Note: must not be declared <const> as its list will be overwritten.
1045 * Please take care of keeping this list alphabetically sorted, doing so helps
1046 * all code contributors.
1047 * Optional keywords are also declared with a NULL ->parse() function so that
1048 * the config parser can report an appropriate error when a known keyword was
1049 * not enabled. */
1050static struct cfg_kw_list cfg_kws = {ILH, {
1051 { CFG_LISTEN, "filter", parse_filter },
1052 { 0, NULL, NULL },
1053 }
1054};
1055
Willy Tarreau0108d902018-11-25 19:14:37 +01001056INITCALL1(STG_REGISTER, cfg_register_keywords, &cfg_kws);
1057
Willy Tarreau172f5ce2018-11-26 11:21:50 +01001058REGISTER_POST_CHECK(flt_init_all);
1059REGISTER_PER_THREAD_INIT(flt_init_all_per_thread);
1060REGISTER_PER_THREAD_DEINIT(flt_deinit_all_per_thread);
1061
Christopher Fauletd7c91962015-04-30 11:48:27 +02001062/*
1063 * Local variables:
1064 * c-indent-level: 8
1065 * c-basic-offset: 8
1066 * End:
1067 */