blob: 54c78b6740719430e8becb622b6a86bfea469f63 [file] [log] [blame]
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +01001/*
2 * MAP management functions.
3 *
4 * Copyright 2000-2013 Willy Tarreau <w@1wt.eu>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010013#include <stdio.h>
Willy Tarreau97218ce2021-04-30 14:57:03 +020014#include <syslog.h>
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010015
Willy Tarreau4c7e4b72020-05-27 12:58:42 +020016#include <haproxy/api.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020017#include <haproxy/applet-t.h>
18#include <haproxy/arg.h>
Willy Tarreau83487a82020-06-04 20:19:54 +020019#include <haproxy/cli.h>
Christopher Faulet908628c2022-03-25 16:43:49 +010020#include <haproxy/conn_stream.h>
21#include <haproxy/cs_utils.h>
Willy Tarreau2cd58092020-06-04 15:10:43 +020022#include <haproxy/map.h>
Willy Tarreau225a90a2020-06-04 15:06:28 +020023#include <haproxy/pattern.h>
Willy Tarreau7cd8b6e2020-06-02 17:32:26 +020024#include <haproxy/regex.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020025#include <haproxy/sample.h>
Willy Tarreau2eec9b52020-06-04 19:58:55 +020026#include <haproxy/stats-t.h>
Willy Tarreau5e539c92020-06-04 20:45:39 +020027#include <haproxy/stream_interface.h>
Willy Tarreau48fbcae2020-06-03 18:09:46 +020028#include <haproxy/tools.h>
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010029
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010030
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +020031/* Parse an IPv4 or IPv6 address and store it into the sample.
32 * The output type is IPv4 or IPv6.
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010033 */
Thierry FOURNIER503bb092015-08-19 08:35:43 +020034int map_parse_ip(const char *text, struct sample_data *data)
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010035{
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +020036 int len = strlen(text);
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010037
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +020038 if (buf2ip(text, len, &data->u.ipv4)) {
39 data->type = SMP_T_IPV4;
40 return 1;
41 }
42 if (buf2ip6(text, len, &data->u.ipv6)) {
43 data->type = SMP_T_IPV6;
44 return 1;
45 }
46 return 0;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010047}
48
49/* Parse a string and store a pointer to it into the sample. The original
50 * string must be left in memory because we return a direct memory reference.
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +010051 * The output type is SMP_T_STR. There is no risk that the data will be
52 * overwritten because sample_conv_map() makes a const sample with this
53 * output.
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010054 */
Thierry FOURNIER503bb092015-08-19 08:35:43 +020055int map_parse_str(const char *text, struct sample_data *data)
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010056{
Willy Tarreau843b7cb2018-07-13 10:54:26 +020057 data->u.str.area = (char *)text;
58 data->u.str.data = strlen(text);
59 data->u.str.size = data->u.str.data + 1;
Thierry FOURNIER503bb092015-08-19 08:35:43 +020060 data->type = SMP_T_STR;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010061 return 1;
62}
63
64/* Parse an integer and convert it to a sample. The output type is SINT if the
65 * number is negative, or UINT if it is positive or null. The function returns
66 * zero (error) if the number is too large.
67 */
Thierry FOURNIER503bb092015-08-19 08:35:43 +020068int map_parse_int(const char *text, struct sample_data *data)
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010069{
Thierry FOURNIER503bb092015-08-19 08:35:43 +020070 data->type = SMP_T_SINT;
Thierry FOURNIER136f9d32015-08-19 09:07:19 +020071 data->u.sint = read_int64(&text, text + strlen(text));
Thierry FOURNIER07ee64e2015-07-06 23:43:03 +020072 if (*text != '\0')
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010073 return 0;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010074 return 1;
75}
76
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010077/* This crete and initialize map descriptor.
78 * Return NULL if out of memory error
79 */
Thierry FOURNIER1e00d382014-02-11 11:31:40 +010080static struct map_descriptor *map_create_descriptor(struct sample_conv *conv)
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010081{
82 struct map_descriptor *desc;
83
84 desc = calloc(1, sizeof(*desc));
85 if (!desc)
86 return NULL;
87
88 desc->conv = conv;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010089
90 return desc;
91}
92
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010093/* This function load the map file according with data type declared into
94 * the "struct sample_conv".
95 *
96 * This function choose the indexation type (ebtree or list) according with
97 * the type of match needed.
98 */
Thierry FOURNIER3def3932015-04-07 11:27:54 +020099int sample_load_map(struct arg *arg, struct sample_conv *conv,
100 const char *file, int line, char **err)
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100101{
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100102 struct map_descriptor *desc;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100103
Christopher Faulet0eb967d2020-08-05 23:23:37 +0200104 if (!(global.mode & MODE_STARTING)) {
105 memprintf(err, "map: cannot load map at runtime");
106 return 0;
107 }
108
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100109 /* create new map descriptor */
Thierry FOURNIER1e00d382014-02-11 11:31:40 +0100110 desc = map_create_descriptor(conv);
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100111 if (!desc) {
112 memprintf(err, "out of memory");
113 return 0;
114 }
115
Thierry FOURNIER1e00d382014-02-11 11:31:40 +0100116 /* Initialize pattern */
117 pattern_init_head(&desc->pat);
118
119 /* This is original pattern, must free */
120 desc->do_free = 1;
121
122 /* Set the match method. */
Thierry FOURNIER1edc9712014-12-15 16:18:39 +0100123 desc->pat.match = pat_match_fcts[(long)conv->private];
124 desc->pat.parse = pat_parse_fcts[(long)conv->private];
125 desc->pat.index = pat_index_fcts[(long)conv->private];
Thierry FOURNIER1edc9712014-12-15 16:18:39 +0100126 desc->pat.prune = pat_prune_fcts[(long)conv->private];
127 desc->pat.expect_type = pat_match_types[(long)conv->private];
Thierry FOURNIER1e00d382014-02-11 11:31:40 +0100128
129 /* Set the output parse method. */
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100130 switch (desc->conv->out_type) {
Thierry FOURNIER1e00d382014-02-11 11:31:40 +0100131 case SMP_T_STR: desc->pat.parse_smp = map_parse_str; break;
Thierry FOURNIER07ee64e2015-07-06 23:43:03 +0200132 case SMP_T_SINT: desc->pat.parse_smp = map_parse_int; break;
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +0200133 case SMP_T_ADDR: desc->pat.parse_smp = map_parse_ip; break;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100134 default:
135 memprintf(err, "map: internal haproxy error: no default parse case for the input type <%d>.",
136 conv->out_type);
Andreas Seltenreich78f35952016-03-03 20:32:23 +0100137 free(desc);
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100138 return 0;
139 }
140
Thierry FOURNIER39bef452014-01-29 13:29:45 +0100141 /* Load map. */
Willy Tarreau843b7cb2018-07-13 10:54:26 +0200142 if (!pattern_read_from_file(&desc->pat, PAT_REF_MAP, arg[0].data.str.area, PAT_MF_NO_DNS,
Thierry FOURNIER94580c92014-02-11 14:36:45 +0100143 1, err, file, line))
Thierry FOURNIER1e00d382014-02-11 11:31:40 +0100144 return 0;
Thierry FOURNIER0ffe78c2013-12-05 14:40:25 +0100145
Willy Tarreauaa5801b2019-04-19 11:35:22 +0200146 /* the maps of type IP support a string as default value. This
147 * string can be an ipv4 or an ipv6, we must convert it.
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +0200148 */
Willy Tarreauaa5801b2019-04-19 11:35:22 +0200149 if (arg[1].type != ARGT_STOP && desc->conv->out_type == SMP_T_ADDR) {
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +0200150 struct sample_data data;
Willy Tarreau843b7cb2018-07-13 10:54:26 +0200151 if (!map_parse_ip(arg[1].data.str.area, &data)) {
152 memprintf(err, "map: cannot parse default ip <%s>.",
153 arg[1].data.str.area);
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +0200154 return 0;
155 }
Christopher Faulet6ad7df42020-08-07 11:45:18 +0200156 chunk_destroy(&arg[1].data.str);
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +0200157 if (data.type == SMP_T_IPV4) {
158 arg[1].type = ARGT_IPV4;
159 arg[1].data.ipv4 = data.u.ipv4;
160 } else {
161 arg[1].type = ARGT_IPV6;
162 arg[1].data.ipv6 = data.u.ipv6;
163 }
164 }
165
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100166 /* replace the first argument by this definition */
Christopher Faulet6ad7df42020-08-07 11:45:18 +0200167 chunk_destroy(&arg[0].data.str);
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100168 arg[0].type = ARGT_MAP;
169 arg[0].data.map = desc;
170
171 return 1;
172}
173
Thierry FOURNIER0a9a2b82015-05-11 15:20:49 +0200174static int sample_conv_map(const struct arg *arg_p, struct sample *smp, void *private)
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100175{
176 struct map_descriptor *desc;
Thierry FOURNIER1794fdf2014-01-17 15:25:13 +0100177 struct pattern *pat;
Willy Tarreau83061a82018-07-13 11:56:34 +0200178 struct buffer *str;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100179
180 /* get config */
181 desc = arg_p[0].data.map;
182
183 /* Execute the match function. */
Thierry FOURNIER1e00d382014-02-11 11:31:40 +0100184 pat = pattern_exec_match(&desc->pat, smp, 1);
Thierry FOURNIER1794fdf2014-01-17 15:25:13 +0100185
186 /* Match case. */
187 if (pat) {
Thierry FOURNIER503bb092015-08-19 08:35:43 +0200188 if (pat->data) {
Thierry Fournier8feaa662016-02-10 22:55:20 +0100189 /* In the regm case, merge the sample with the input. */
190 if ((long)private == PAT_MATCH_REGM) {
Emeric Brun27102212018-07-17 09:47:07 -0400191 struct buffer *tmptrash;
Willy Tarreau2842e052018-08-22 04:55:43 +0200192 int len;
Emeric Brun27102212018-07-17 09:47:07 -0400193
194 /* Copy the content of the sample because it could
195 be scratched by incoming get_trash_chunk */
196 tmptrash = alloc_trash_chunk();
197 if (!tmptrash)
198 return 0;
199
200 tmptrash->data = smp->data.u.str.data;
201 if (tmptrash->data > (tmptrash->size-1))
202 tmptrash->data = tmptrash->size-1;
203
204 memcpy(tmptrash->area, smp->data.u.str.area, tmptrash->data);
205 tmptrash->area[tmptrash->data] = 0;
206
Thierry Fournier8feaa662016-02-10 22:55:20 +0100207 str = get_trash_chunk();
Willy Tarreau2842e052018-08-22 04:55:43 +0200208 len = exp_replace(str->area, str->size,
209 tmptrash->area,
210 pat->data->u.str.area,
211 (regmatch_t *)smp->ctx.a[0]);
Nenad Merdanovic646b7742019-04-12 22:54:28 +0200212 free_trash_chunk(tmptrash);
213
Willy Tarreau2842e052018-08-22 04:55:43 +0200214 if (len == -1)
Thierry Fournier8feaa662016-02-10 22:55:20 +0100215 return 0;
Willy Tarreau2842e052018-08-22 04:55:43 +0200216
217 str->data = len;
Thierry Fournier8feaa662016-02-10 22:55:20 +0100218 smp->data.u.str = *str;
219 return 1;
220 }
221 /* Copy sample. */
Thierry FOURNIER5cc18d42015-08-19 09:02:36 +0200222 smp->data = *pat->data;
Thierry FOURNIER1794fdf2014-01-17 15:25:13 +0100223 smp->flags |= SMP_F_CONST;
Thierry FOURNIER1794fdf2014-01-17 15:25:13 +0100224 return 1;
225 }
226
227 /* Return just int sample containing 1. */
Thierry FOURNIER8c542ca2015-08-19 09:00:18 +0200228 smp->data.type = SMP_T_SINT;
Thierry FOURNIER136f9d32015-08-19 09:07:19 +0200229 smp->data.u.sint = 1;
Thierry FOURNIER1794fdf2014-01-17 15:25:13 +0100230 return 1;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100231 }
232
Joseph Herlantf43b88b2018-11-25 11:48:18 -0800233 /* If no default value available, the converter fails. */
Thierry FOURNIER933e5de2015-03-13 00:10:16 +0100234 if (arg_p[1].type == ARGT_STOP)
Thierry FOURNIER1794fdf2014-01-17 15:25:13 +0100235 return 0;
236
237 /* Return the default value. */
Thierry FOURNIER933e5de2015-03-13 00:10:16 +0100238 switch (desc->conv->out_type) {
239
240 case SMP_T_STR:
Thierry FOURNIER8c542ca2015-08-19 09:00:18 +0200241 smp->data.type = SMP_T_STR;
Thierry FOURNIER933e5de2015-03-13 00:10:16 +0100242 smp->flags |= SMP_F_CONST;
Thierry FOURNIER136f9d32015-08-19 09:07:19 +0200243 smp->data.u.str = arg_p[1].data.str;
Thierry FOURNIER933e5de2015-03-13 00:10:16 +0100244 break;
245
Thierry FOURNIER07ee64e2015-07-06 23:43:03 +0200246 case SMP_T_SINT:
Thierry FOURNIER8c542ca2015-08-19 09:00:18 +0200247 smp->data.type = SMP_T_SINT;
Thierry FOURNIER136f9d32015-08-19 09:07:19 +0200248 smp->data.u.sint = arg_p[1].data.sint;
Thierry FOURNIER933e5de2015-03-13 00:10:16 +0100249 break;
250
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +0200251 case SMP_T_ADDR:
252 if (arg_p[1].type == ARGT_IPV4) {
253 smp->data.type = SMP_T_IPV4;
254 smp->data.u.ipv4 = arg_p[1].data.ipv4;
255 } else {
256 smp->data.type = SMP_T_IPV6;
257 smp->data.u.ipv6 = arg_p[1].data.ipv6;
258 }
Thierry FOURNIER933e5de2015-03-13 00:10:16 +0100259 break;
260 }
261
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100262 return 1;
263}
264
William Lallemandad8be612016-11-18 19:26:17 +0100265/* This function is used with map and acl management. It permits to browse
266 * each reference. The variable <getnext> must contain the current node,
267 * <end> point to the root node and the <flags> permit to filter required
268 * nodes.
269 */
270static inline
271struct pat_ref *pat_list_get_next(struct pat_ref *getnext, struct list *end,
272 unsigned int flags)
273{
274 struct pat_ref *ref = getnext;
275
276 while (1) {
277
278 /* Get next list entry. */
279 ref = LIST_NEXT(&ref->list, struct pat_ref *, list);
280
281 /* If the entry is the last of the list, return NULL. */
282 if (&ref->list == end)
283 return NULL;
284
285 /* If the entry match the flag, return it. */
286 if (ref->flags & flags)
287 return ref;
288 }
289}
290
291static inline
292struct pat_ref *pat_ref_lookup_ref(const char *reference)
293{
294 int id;
295 char *error;
296
297 /* If the reference starts by a '#', this is numeric id. */
298 if (reference[0] == '#') {
299 /* Try to convert the numeric id. If the conversion fails, the lookup fails. */
300 id = strtol(reference + 1, &error, 10);
301 if (*error != '\0')
302 return NULL;
303
304 /* Perform the unique id lookup. */
305 return pat_ref_lookupid(id);
306 }
307
308 /* Perform the string lookup. */
309 return pat_ref_lookup(reference);
310}
311
312/* This function is used with map and acl management. It permits to browse
313 * each reference.
314 */
315static inline
316struct pattern_expr *pat_expr_get_next(struct pattern_expr *getnext, struct list *end)
317{
318 struct pattern_expr *expr;
319 expr = LIST_NEXT(&getnext->list, struct pattern_expr *, list);
320 if (&expr->list == end)
321 return NULL;
322 return expr;
323}
324
Willy Tarreau95f753e2021-04-30 12:09:54 +0200325/* expects the current generation ID in appctx->cli.cli.i0 */
William Lallemandad8be612016-11-18 19:26:17 +0100326static int cli_io_handler_pat_list(struct appctx *appctx)
327{
Christopher Faulet908628c2022-03-25 16:43:49 +0100328 struct conn_stream *cs = appctx->owner;
Emeric Brun8d85aa42017-06-29 15:40:33 +0200329 struct pat_ref_elt *elt;
330
Christopher Faulet908628c2022-03-25 16:43:49 +0100331 if (unlikely(cs_ic(cs)->flags & (CF_WRITE_ERROR|CF_SHUTW))) {
Emeric Brun8d85aa42017-06-29 15:40:33 +0200332 /* If we're forced to shut down, we might have to remove our
333 * reference to the last ref_elt being dumped.
334 */
335 if (appctx->st2 == STAT_ST_LIST) {
Dragan Dosen336a11f2018-05-04 16:27:15 +0200336 if (!LIST_ISEMPTY(&appctx->ctx.map.bref.users)) {
Willy Tarreau2b718102021-04-21 07:32:39 +0200337 LIST_DELETE(&appctx->ctx.map.bref.users);
Dragan Dosen336a11f2018-05-04 16:27:15 +0200338 LIST_INIT(&appctx->ctx.map.bref.users);
Emeric Brun8d85aa42017-06-29 15:40:33 +0200339 }
340 }
341 return 1;
342 }
William Lallemandad8be612016-11-18 19:26:17 +0100343
344 switch (appctx->st2) {
345
346 case STAT_ST_INIT:
Emeric Brun8d85aa42017-06-29 15:40:33 +0200347 /* the function had not been called yet, let's prepare the
348 * buffer for a response. We initialize the current stream
349 * pointer to the first in the global list. When a target
350 * stream is being destroyed, it is responsible for updating
351 * this pointer. We know we have reached the end when this
352 * pointer points back to the head of the streams list.
353 */
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100354 HA_SPIN_LOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
Emeric Brun8d85aa42017-06-29 15:40:33 +0200355 LIST_INIT(&appctx->ctx.map.bref.users);
356 appctx->ctx.map.bref.ref = appctx->ctx.map.ref->head.n;
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100357 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100358 appctx->st2 = STAT_ST_LIST;
359 /* fall through */
360
361 case STAT_ST_LIST:
Emeric Brunb5997f72017-07-03 11:34:05 +0200362
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100363 HA_SPIN_LOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
Emeric Brunb5997f72017-07-03 11:34:05 +0200364
Emeric Brun8d85aa42017-06-29 15:40:33 +0200365 if (!LIST_ISEMPTY(&appctx->ctx.map.bref.users)) {
Willy Tarreau2b718102021-04-21 07:32:39 +0200366 LIST_DELETE(&appctx->ctx.map.bref.users);
Emeric Brun8d85aa42017-06-29 15:40:33 +0200367 LIST_INIT(&appctx->ctx.map.bref.users);
368 }
369
370 while (appctx->ctx.map.bref.ref != &appctx->ctx.map.ref->head) {
William Lallemandad8be612016-11-18 19:26:17 +0100371 chunk_reset(&trash);
372
Emeric Brun8d85aa42017-06-29 15:40:33 +0200373 elt = LIST_ELEM(appctx->ctx.map.bref.ref, struct pat_ref_elt *, list);
374
Willy Tarreau95f753e2021-04-30 12:09:54 +0200375 if (elt->gen_id != appctx->ctx.cli.i0)
Willy Tarreauc93da692020-10-29 09:41:34 +0100376 goto skip;
377
William Lallemandad8be612016-11-18 19:26:17 +0100378 /* build messages */
Emeric Brun8d85aa42017-06-29 15:40:33 +0200379 if (elt->sample)
William Lallemandad8be612016-11-18 19:26:17 +0100380 chunk_appendf(&trash, "%p %s %s\n",
Emeric Brun8d85aa42017-06-29 15:40:33 +0200381 elt, elt->pattern,
382 elt->sample);
William Lallemandad8be612016-11-18 19:26:17 +0100383 else
384 chunk_appendf(&trash, "%p %s\n",
Emeric Brun8d85aa42017-06-29 15:40:33 +0200385 elt, elt->pattern);
William Lallemandad8be612016-11-18 19:26:17 +0100386
Christopher Faulet908628c2022-03-25 16:43:49 +0100387 if (ci_putchk(cs_ic(cs), &trash) == -1) {
William Lallemandad8be612016-11-18 19:26:17 +0100388 /* let's try again later from this stream. We add ourselves into
389 * this stream's users so that it can remove us upon termination.
390 */
Willy Tarreau2b718102021-04-21 07:32:39 +0200391 LIST_APPEND(&elt->back_refs, &appctx->ctx.map.bref.users);
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100392 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
Christopher Faulet908628c2022-03-25 16:43:49 +0100393 si_rx_room_blk(cs->si);
William Lallemandad8be612016-11-18 19:26:17 +0100394 return 0;
395 }
Willy Tarreauc93da692020-10-29 09:41:34 +0100396 skip:
William Lallemandad8be612016-11-18 19:26:17 +0100397 /* get next list entry and check the end of the list */
Emeric Brun8d85aa42017-06-29 15:40:33 +0200398 appctx->ctx.map.bref.ref = elt->list.n;
William Lallemandad8be612016-11-18 19:26:17 +0100399 }
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100400 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100401 /* fall through */
402
403 default:
404 appctx->st2 = STAT_ST_FIN;
405 return 1;
406 }
407}
408
409static int cli_io_handler_pats_list(struct appctx *appctx)
410{
Christopher Faulet908628c2022-03-25 16:43:49 +0100411 struct conn_stream *cs = appctx->owner;
William Lallemandad8be612016-11-18 19:26:17 +0100412
413 switch (appctx->st2) {
414 case STAT_ST_INIT:
415 /* Display the column headers. If the message cannot be sent,
Joseph Herlantf43b88b2018-11-25 11:48:18 -0800416 * quit the function with returning 0. The function is called
417 * later and restarted at the state "STAT_ST_INIT".
William Lallemandad8be612016-11-18 19:26:17 +0100418 */
419 chunk_reset(&trash);
420 chunk_appendf(&trash, "# id (file) description\n");
Christopher Faulet908628c2022-03-25 16:43:49 +0100421 if (ci_putchk(cs_ic(cs), &trash) == -1) {
422 si_rx_room_blk(cs->si);
William Lallemandad8be612016-11-18 19:26:17 +0100423 return 0;
424 }
425
426 /* Now, we start the browsing of the references lists.
Joseph Herlantf43b88b2018-11-25 11:48:18 -0800427 * Note that the following call to LIST_ELEM returns a bad pointer. The only
William Lallemandad8be612016-11-18 19:26:17 +0100428 * available field of this pointer is <list>. It is used with the function
Joseph Herlantf43b88b2018-11-25 11:48:18 -0800429 * pat_list_get_next() for returning the first available entry
William Lallemandad8be612016-11-18 19:26:17 +0100430 */
431 appctx->ctx.map.ref = LIST_ELEM(&pattern_reference, struct pat_ref *, list);
432 appctx->ctx.map.ref = pat_list_get_next(appctx->ctx.map.ref, &pattern_reference,
433 appctx->ctx.map.display_flags);
434 appctx->st2 = STAT_ST_LIST;
435 /* fall through */
436
437 case STAT_ST_LIST:
438 while (appctx->ctx.map.ref) {
439 chunk_reset(&trash);
440
441 /* Build messages. If the reference is used by another category than
Joseph Herlantf43b88b2018-11-25 11:48:18 -0800442 * the listed categories, display the information in the message.
William Lallemandad8be612016-11-18 19:26:17 +0100443 */
Dragan Dosena75eea72021-05-21 16:59:15 +0200444 chunk_appendf(&trash, "%d (%s) %s. curr_ver=%u next_ver=%u entry_cnt=%llu\n", appctx->ctx.map.ref->unique_id,
William Lallemandad8be612016-11-18 19:26:17 +0100445 appctx->ctx.map.ref->reference ? appctx->ctx.map.ref->reference : "",
Dragan Dosena75eea72021-05-21 16:59:15 +0200446 appctx->ctx.map.ref->display, appctx->ctx.map.ref->curr_gen, appctx->ctx.map.ref->next_gen,
447 appctx->ctx.map.ref->entry_cnt);
William Lallemandad8be612016-11-18 19:26:17 +0100448
Christopher Faulet908628c2022-03-25 16:43:49 +0100449 if (ci_putchk(cs_ic(cs), &trash) == -1) {
William Lallemandad8be612016-11-18 19:26:17 +0100450 /* let's try again later from this stream. We add ourselves into
451 * this stream's users so that it can remove us upon termination.
452 */
Christopher Faulet908628c2022-03-25 16:43:49 +0100453 si_rx_room_blk(cs->si);
William Lallemandad8be612016-11-18 19:26:17 +0100454 return 0;
455 }
456
457 /* get next list entry and check the end of the list */
458 appctx->ctx.map.ref = pat_list_get_next(appctx->ctx.map.ref, &pattern_reference,
459 appctx->ctx.map.display_flags);
460 }
461
William Lallemandad8be612016-11-18 19:26:17 +0100462 /* fall through */
463
464 default:
465 appctx->st2 = STAT_ST_FIN;
466 return 1;
467 }
468 return 0;
469}
470
471static int cli_io_handler_map_lookup(struct appctx *appctx)
472{
Christopher Faulet908628c2022-03-25 16:43:49 +0100473 struct conn_stream *cs = appctx->owner;
William Lallemandad8be612016-11-18 19:26:17 +0100474 struct sample sample;
475 struct pattern *pat;
476 int match_method;
477
478 switch (appctx->st2) {
479 case STAT_ST_INIT:
480 /* Init to the first entry. The list cannot be change */
481 appctx->ctx.map.expr = LIST_ELEM(&appctx->ctx.map.ref->pat, struct pattern_expr *, list);
482 appctx->ctx.map.expr = pat_expr_get_next(appctx->ctx.map.expr, &appctx->ctx.map.ref->pat);
483 appctx->st2 = STAT_ST_LIST;
484 /* fall through */
485
486 case STAT_ST_LIST:
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100487 HA_SPIN_LOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100488 /* for each lookup type */
489 while (appctx->ctx.map.expr) {
490 /* initialise chunk to build new message */
491 chunk_reset(&trash);
492
493 /* execute pattern matching */
494 sample.data.type = SMP_T_STR;
495 sample.flags = SMP_F_CONST;
Willy Tarreau843b7cb2018-07-13 10:54:26 +0200496 sample.data.u.str.data = appctx->ctx.map.chunk.data;
497 sample.data.u.str.area = appctx->ctx.map.chunk.area;
Emeric Brunb5997f72017-07-03 11:34:05 +0200498
William Lallemandad8be612016-11-18 19:26:17 +0100499 if (appctx->ctx.map.expr->pat_head->match &&
500 sample_convert(&sample, appctx->ctx.map.expr->pat_head->expect_type))
501 pat = appctx->ctx.map.expr->pat_head->match(&sample, appctx->ctx.map.expr, 1);
502 else
503 pat = NULL;
504
505 /* build return message: set type of match */
506 for (match_method=0; match_method<PAT_MATCH_NUM; match_method++)
507 if (appctx->ctx.map.expr->pat_head->match == pat_match_fcts[match_method])
508 break;
509 if (match_method >= PAT_MATCH_NUM)
510 chunk_appendf(&trash, "type=unknown(%p)", appctx->ctx.map.expr->pat_head->match);
511 else
512 chunk_appendf(&trash, "type=%s", pat_match_names[match_method]);
513
514 /* case sensitive */
515 if (appctx->ctx.map.expr->mflags & PAT_MF_IGNORE_CASE)
516 chunk_appendf(&trash, ", case=insensitive");
517 else
518 chunk_appendf(&trash, ", case=sensitive");
519
520 /* Display no match, and set default value */
521 if (!pat) {
522 if (appctx->ctx.map.display_flags == PAT_REF_MAP)
523 chunk_appendf(&trash, ", found=no");
524 else
525 chunk_appendf(&trash, ", match=no");
526 }
527
528 /* Display match and match info */
529 else {
530 /* display match */
531 if (appctx->ctx.map.display_flags == PAT_REF_MAP)
532 chunk_appendf(&trash, ", found=yes");
533 else
534 chunk_appendf(&trash, ", match=yes");
535
536 /* display index mode */
537 if (pat->sflags & PAT_SF_TREE)
538 chunk_appendf(&trash, ", idx=tree");
539 else
540 chunk_appendf(&trash, ", idx=list");
541
542 /* display pattern */
543 if (appctx->ctx.map.display_flags == PAT_REF_MAP) {
544 if (pat->ref && pat->ref->pattern)
545 chunk_appendf(&trash, ", key=\"%s\"", pat->ref->pattern);
546 else
547 chunk_appendf(&trash, ", key=unknown");
548 }
549 else {
550 if (pat->ref && pat->ref->pattern)
551 chunk_appendf(&trash, ", pattern=\"%s\"", pat->ref->pattern);
552 else
553 chunk_appendf(&trash, ", pattern=unknown");
554 }
555
556 /* display return value */
557 if (appctx->ctx.map.display_flags == PAT_REF_MAP) {
558 if (pat->data && pat->ref && pat->ref->sample)
559 chunk_appendf(&trash, ", value=\"%s\", type=\"%s\"", pat->ref->sample,
560 smp_to_type[pat->data->type]);
561 else
562 chunk_appendf(&trash, ", value=none");
563 }
564 }
565
566 chunk_appendf(&trash, "\n");
567
568 /* display response */
Christopher Faulet908628c2022-03-25 16:43:49 +0100569 if (ci_putchk(cs_ic(cs), &trash) == -1) {
William Lallemandad8be612016-11-18 19:26:17 +0100570 /* let's try again later from this stream. We add ourselves into
571 * this stream's users so that it can remove us upon termination.
572 */
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100573 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
Christopher Faulet908628c2022-03-25 16:43:49 +0100574 si_rx_room_blk(cs->si);
William Lallemandad8be612016-11-18 19:26:17 +0100575 return 0;
576 }
577
578 /* get next entry */
579 appctx->ctx.map.expr = pat_expr_get_next(appctx->ctx.map.expr,
580 &appctx->ctx.map.ref->pat);
581 }
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100582 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100583 /* fall through */
584
585 default:
586 appctx->st2 = STAT_ST_FIN;
William Lallemandad8be612016-11-18 19:26:17 +0100587 return 1;
588 }
589}
590
591static void cli_release_mlook(struct appctx *appctx)
592{
Willy Tarreau61cfdf42021-02-20 10:46:51 +0100593 ha_free(&appctx->ctx.map.chunk.area);
William Lallemandad8be612016-11-18 19:26:17 +0100594}
595
596
Aurélien Nephtaliabbf6072018-04-18 13:26:46 +0200597static int cli_parse_get_map(char **args, char *payload, struct appctx *appctx, void *private)
William Lallemandad8be612016-11-18 19:26:17 +0100598{
599 if (strcmp(args[1], "map") == 0 || strcmp(args[1], "acl") == 0) {
600 /* Set flags. */
601 if (args[1][0] == 'm')
602 appctx->ctx.map.display_flags = PAT_REF_MAP;
603 else
604 appctx->ctx.map.display_flags = PAT_REF_ACL;
605
606 /* No parameter. */
607 if (!*args[2] || !*args[3]) {
Willy Tarreau9d008692019-08-09 11:21:01 +0200608 if (appctx->ctx.map.display_flags == PAT_REF_MAP)
609 return cli_err(appctx, "Missing map identifier and/or key.\n");
610 else
611 return cli_err(appctx, "Missing ACL identifier and/or key.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100612 }
613
614 /* lookup into the maps */
615 appctx->ctx.map.ref = pat_ref_lookup_ref(args[2]);
616 if (!appctx->ctx.map.ref) {
Willy Tarreau9d008692019-08-09 11:21:01 +0200617 if (appctx->ctx.map.display_flags == PAT_REF_MAP)
618 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
619 else
620 return cli_err(appctx, "Unknown ACL identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100621 }
622
623 /* copy input string. The string must be allocated because
624 * it may be used over multiple iterations. It's released
625 * at the end and upon abort anyway.
626 */
Willy Tarreau843b7cb2018-07-13 10:54:26 +0200627 appctx->ctx.map.chunk.data = strlen(args[3]);
628 appctx->ctx.map.chunk.size = appctx->ctx.map.chunk.data + 1;
629 appctx->ctx.map.chunk.area = strdup(args[3]);
Willy Tarreau9d008692019-08-09 11:21:01 +0200630 if (!appctx->ctx.map.chunk.area)
631 return cli_err(appctx, "Out of memory error.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100632
633 return 0;
634 }
635 return 1;
636}
637
Willy Tarreau97218ce2021-04-30 14:57:03 +0200638static int cli_parse_prepare_map(char **args, char *payload, struct appctx *appctx, void *private)
639{
640 if (strcmp(args[1], "map") == 0 ||
641 strcmp(args[1], "acl") == 0) {
642 uint next_gen;
643 char *msg = NULL;
644
645 /* Set ACL or MAP flags. */
646 if (args[1][0] == 'm')
647 appctx->ctx.map.display_flags = PAT_REF_MAP;
648 else
649 appctx->ctx.map.display_flags = PAT_REF_ACL;
650
651 /* lookup into the refs and check the map flag */
652 appctx->ctx.map.ref = pat_ref_lookup_ref(args[2]);
653 if (!appctx->ctx.map.ref ||
654 !(appctx->ctx.map.ref->flags & appctx->ctx.map.display_flags)) {
655 if (appctx->ctx.map.display_flags == PAT_REF_MAP)
656 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
657 else
658 return cli_err(appctx, "Unknown ACL identifier. Please use #<id> or <file>.\n");
659 }
660 next_gen = pat_ref_newgen(appctx->ctx.map.ref);
661 return cli_dynmsg(appctx, LOG_INFO, memprintf(&msg, "New version created: %u\n", next_gen));
662 }
663
664 return 0;
665}
666
Emeric Brun8d85aa42017-06-29 15:40:33 +0200667static void cli_release_show_map(struct appctx *appctx)
668{
669 if (appctx->st2 == STAT_ST_LIST) {
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100670 HA_SPIN_LOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
Emeric Brun8d85aa42017-06-29 15:40:33 +0200671 if (!LIST_ISEMPTY(&appctx->ctx.map.bref.users))
Willy Tarreau2b718102021-04-21 07:32:39 +0200672 LIST_DELETE(&appctx->ctx.map.bref.users);
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100673 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
Emeric Brun8d85aa42017-06-29 15:40:33 +0200674 }
675}
676
Aurélien Nephtaliabbf6072018-04-18 13:26:46 +0200677static int cli_parse_show_map(char **args, char *payload, struct appctx *appctx, void *private)
William Lallemandad8be612016-11-18 19:26:17 +0100678{
679 if (strcmp(args[1], "map") == 0 ||
680 strcmp(args[1], "acl") == 0) {
Willy Tarreau95f753e2021-04-30 12:09:54 +0200681 const char *gen = NULL;
William Lallemandad8be612016-11-18 19:26:17 +0100682
683 /* Set ACL or MAP flags. */
684 if (args[1][0] == 'm')
685 appctx->ctx.map.display_flags = PAT_REF_MAP;
686 else
687 appctx->ctx.map.display_flags = PAT_REF_ACL;
688
689 /* no parameter: display all map available */
690 if (!*args[2]) {
William Lallemandad8be612016-11-18 19:26:17 +0100691 appctx->io_handler = cli_io_handler_pats_list;
692 return 0;
693 }
694
Willy Tarreau95f753e2021-04-30 12:09:54 +0200695 /* For both "map" and "acl" we may have an optional generation
696 * number specified using a "@" character before the pattern
697 * file name.
698 */
699 if (*args[2] == '@') {
700 gen = args[2] + 1;
701 args++;
702 }
703
William Lallemandad8be612016-11-18 19:26:17 +0100704 /* lookup into the refs and check the map flag */
705 appctx->ctx.map.ref = pat_ref_lookup_ref(args[2]);
706 if (!appctx->ctx.map.ref ||
707 !(appctx->ctx.map.ref->flags & appctx->ctx.map.display_flags)) {
Willy Tarreau9d008692019-08-09 11:21:01 +0200708 if (appctx->ctx.map.display_flags == PAT_REF_MAP)
709 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
710 else
711 return cli_err(appctx, "Unknown ACL identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100712 }
Willy Tarreau95f753e2021-04-30 12:09:54 +0200713
714 /* set the desired generation id in cli.i0 */
715 if (gen)
716 appctx->ctx.cli.i0 = str2uic(gen);
717 else
718 appctx->ctx.cli.i0 = appctx->ctx.map.ref->curr_gen;
719
William Lallemandad8be612016-11-18 19:26:17 +0100720 appctx->io_handler = cli_io_handler_pat_list;
Emeric Brun8d85aa42017-06-29 15:40:33 +0200721 appctx->io_release = cli_release_show_map;
William Lallemandad8be612016-11-18 19:26:17 +0100722 return 0;
723 }
724
725 return 0;
726}
727
Aurélien Nephtaliabbf6072018-04-18 13:26:46 +0200728static int cli_parse_set_map(char **args, char *payload, struct appctx *appctx, void *private)
William Lallemandad8be612016-11-18 19:26:17 +0100729{
730 if (strcmp(args[1], "map") == 0) {
731 char *err;
732
733 /* Set flags. */
734 appctx->ctx.map.display_flags = PAT_REF_MAP;
735
736 /* Expect three parameters: map name, key and new value. */
Willy Tarreau9d008692019-08-09 11:21:01 +0200737 if (!*args[2] || !*args[3] || !*args[4])
738 return cli_err(appctx, "'set map' expects three parameters: map identifier, key and value.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100739
740 /* Lookup the reference in the maps. */
741 appctx->ctx.map.ref = pat_ref_lookup_ref(args[2]);
Willy Tarreau9d008692019-08-09 11:21:01 +0200742 if (!appctx->ctx.map.ref)
743 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100744
745 /* If the entry identifier start with a '#', it is considered as
746 * pointer id
747 */
748 if (args[3][0] == '#' && args[3][1] == '0' && args[3][2] == 'x') {
749 struct pat_ref_elt *ref;
750 long long int conv;
751 char *error;
752
753 /* Convert argument to integer value. */
754 conv = strtoll(&args[3][1], &error, 16);
Willy Tarreau9d008692019-08-09 11:21:01 +0200755 if (*error != '\0')
756 return cli_err(appctx, "Malformed identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100757
758 /* Convert and check integer to pointer. */
759 ref = (struct pat_ref_elt *)(long)conv;
Willy Tarreau9d008692019-08-09 11:21:01 +0200760 if ((long long int)(long)ref != conv)
761 return cli_err(appctx, "Malformed identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100762
Aurélien Nephtali9a4da682018-04-16 19:02:42 +0200763 /* Try to modify the entry. */
William Lallemandad8be612016-11-18 19:26:17 +0100764 err = NULL;
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100765 HA_SPIN_LOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100766 if (!pat_ref_set_by_id(appctx->ctx.map.ref, ref, args[4], &err)) {
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100767 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
Willy Tarreau9d008692019-08-09 11:21:01 +0200768 if (err)
769 return cli_dynerr(appctx, memprintf(&err, "%s.\n", err));
770 else
771 return cli_err(appctx, "Failed to update an entry.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100772 }
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100773 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100774 }
775 else {
776 /* Else, use the entry identifier as pattern
777 * string, and update the value.
778 */
779 err = NULL;
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100780 HA_SPIN_LOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100781 if (!pat_ref_set(appctx->ctx.map.ref, args[3], args[4], &err)) {
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100782 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
Willy Tarreau9d008692019-08-09 11:21:01 +0200783 if (err)
784 return cli_dynerr(appctx, memprintf(&err, "%s.\n", err));
785 else
786 return cli_err(appctx, "Failed to update an entry.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100787 }
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100788 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100789 }
790
791 /* The set is done, send message. */
Willy Tarreau3b6e5472016-11-24 15:53:53 +0100792 appctx->st0 = CLI_ST_PROMPT;
William Lallemandad8be612016-11-18 19:26:17 +0100793 return 0;
794 }
795 return 1;
796}
797
Aurélien Nephtaliabbf6072018-04-18 13:26:46 +0200798static int cli_parse_add_map(char **args, char *payload, struct appctx *appctx, void *private)
William Lallemandad8be612016-11-18 19:26:17 +0100799{
800 if (strcmp(args[1], "map") == 0 ||
801 strcmp(args[1], "acl") == 0) {
Willy Tarreaubb51c442021-04-30 15:23:36 +0200802 const char *gen = NULL;
803 uint genid = 0;
William Lallemandad8be612016-11-18 19:26:17 +0100804 int ret;
805 char *err;
806
807 /* Set flags. */
808 if (args[1][0] == 'm')
809 appctx->ctx.map.display_flags = PAT_REF_MAP;
810 else
811 appctx->ctx.map.display_flags = PAT_REF_ACL;
812
Willy Tarreaubb51c442021-04-30 15:23:36 +0200813 /* For both "map" and "acl" we may have an optional generation
814 * number specified using a "@" character before the pattern
815 * file name.
816 */
817 if (*args[2] == '@') {
818 gen = args[2] + 1;
819 args++;
820 }
821
Aurélien Nephtali25650ce2018-04-18 14:04:47 +0200822 /* If the keyword is "map", we expect:
823 * - three parameters if there is no payload
824 * - one parameter if there is a payload
825 * If it is "acl", we expect only two parameters
William Lallemandad8be612016-11-18 19:26:17 +0100826 */
827 if (appctx->ctx.map.display_flags == PAT_REF_MAP) {
Aurélien Nephtali25650ce2018-04-18 14:04:47 +0200828 if ((!payload && (!*args[2] || !*args[3] || !*args[4])) ||
Willy Tarreau9d008692019-08-09 11:21:01 +0200829 (payload && !*args[2]))
830 return cli_err(appctx,
831 "'add map' expects three parameters (map identifier, key and value)"
832 " or one parameter (map identifier) and a payload\n");
William Lallemandad8be612016-11-18 19:26:17 +0100833 }
Willy Tarreau9d008692019-08-09 11:21:01 +0200834 else if (!*args[2] || !*args[3])
835 return cli_err(appctx, "'add acl' expects two parameters: ACL identifier and pattern.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100836
837 /* Lookup for the reference. */
838 appctx->ctx.map.ref = pat_ref_lookup_ref(args[2]);
839 if (!appctx->ctx.map.ref) {
Willy Tarreau9d008692019-08-09 11:21:01 +0200840 if (appctx->ctx.map.display_flags == PAT_REF_MAP)
841 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
842 else
843 return cli_err(appctx, "Unknown ACL identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100844 }
845
Willy Tarreaubb51c442021-04-30 15:23:36 +0200846 if (gen) {
847 genid = str2uic(gen);
848 if ((int)(genid - appctx->ctx.map.ref->next_gen) > 0) {
849 if (appctx->ctx.map.display_flags == PAT_REF_MAP)
850 return cli_err(appctx, "Version number in the future, please use 'prepare map' before.\n");
851 else
852 return cli_err(appctx, "Version number in the future, please use 'prepare acl' before.\n");
853 }
854 }
855
William Lallemandad8be612016-11-18 19:26:17 +0100856 /* The command "add acl" is prohibited if the reference
857 * use samples.
858 */
859 if ((appctx->ctx.map.display_flags & PAT_REF_ACL) &&
860 (appctx->ctx.map.ref->flags & PAT_REF_SMP)) {
Willy Tarreau9d008692019-08-09 11:21:01 +0200861 return cli_err(appctx,
862 "This ACL is shared with a map containing samples. "
863 "You must use the command 'add map' to add values.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100864 }
Willy Tarreauf7dd0e82021-04-29 16:02:48 +0200865
866 /* Add value(s). If no payload is used, key and value are read
867 * from the command line and only one key is set. If a payload
868 * is passed, one key/value pair is read per line till the end
869 * of the payload is reached.
870 */
William Lallemandad8be612016-11-18 19:26:17 +0100871 err = NULL;
Aurélien Nephtali25650ce2018-04-18 14:04:47 +0200872
Willy Tarreauf7dd0e82021-04-29 16:02:48 +0200873 do {
874 char *key = args[3];
875 char *value = args[4];
876 size_t l;
Aurélien Nephtali25650ce2018-04-18 14:04:47 +0200877
Willy Tarreauf7dd0e82021-04-29 16:02:48 +0200878 if (payload) {
879 /* key and value passed as payload, one pair per line */
880 if (!*payload)
881 break;
882
Aurélien Nephtali25650ce2018-04-18 14:04:47 +0200883 key = payload;
884 l = strcspn(key, " \t");
885 payload += l;
886
Willy Tarreau9d008692019-08-09 11:21:01 +0200887 if (!*payload && appctx->ctx.map.display_flags == PAT_REF_MAP)
888 return cli_dynerr(appctx, memprintf(&err, "Missing value for key '%s'.\n", key));
889
Aurélien Nephtali25650ce2018-04-18 14:04:47 +0200890 key[l] = 0;
891 payload++;
892
893 /* value */
894 payload += strspn(payload, " \t");
895 value = payload;
896 l = strcspn(value, "\n");
897 payload += l;
898 if (*payload)
899 payload++;
900 value[l] = 0;
Willy Tarreauf7dd0e82021-04-29 16:02:48 +0200901 }
Aurélien Nephtali25650ce2018-04-18 14:04:47 +0200902
Willy Tarreau4053b032021-04-29 16:55:17 +0200903 if (appctx->ctx.map.display_flags != PAT_REF_MAP)
904 value = NULL;
905
906 HA_SPIN_LOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
Willy Tarreaubb51c442021-04-30 15:23:36 +0200907 ret = !!pat_ref_load(appctx->ctx.map.ref, gen ? genid : appctx->ctx.map.ref->curr_gen, key, value, -1, &err);
Willy Tarreau4053b032021-04-29 16:55:17 +0200908 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
909
Willy Tarreauf7dd0e82021-04-29 16:02:48 +0200910 if (!ret) {
911 if (err)
912 return cli_dynerr(appctx, memprintf(&err, "%s.\n", err));
913 else
914 return cli_err(appctx, "Failed to add a key.\n");
Aurélien Nephtali9a4da682018-04-16 19:02:42 +0200915 }
Willy Tarreauf7dd0e82021-04-29 16:02:48 +0200916 } while (payload && *payload);
William Lallemandad8be612016-11-18 19:26:17 +0100917
918 /* The add is done, send message. */
Willy Tarreau3b6e5472016-11-24 15:53:53 +0100919 appctx->st0 = CLI_ST_PROMPT;
William Lallemandad8be612016-11-18 19:26:17 +0100920 return 1;
921 }
922
923 return 0;
924}
925
Aurélien Nephtaliabbf6072018-04-18 13:26:46 +0200926static int cli_parse_del_map(char **args, char *payload, struct appctx *appctx, void *private)
William Lallemandad8be612016-11-18 19:26:17 +0100927{
928 if (args[1][0] == 'm')
929 appctx->ctx.map.display_flags = PAT_REF_MAP;
930 else
931 appctx->ctx.map.display_flags = PAT_REF_ACL;
932
933 /* Expect two parameters: map name and key. */
Willy Tarreau9d008692019-08-09 11:21:01 +0200934 if (!*args[2] || !*args[3]) {
935 if (appctx->ctx.map.display_flags == PAT_REF_MAP)
936 return cli_err(appctx, "This command expects two parameters: map identifier and key.\n");
937 else
938 return cli_err(appctx, "This command expects two parameters: ACL identifier and key.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100939 }
940
941 /* Lookup the reference in the maps. */
942 appctx->ctx.map.ref = pat_ref_lookup_ref(args[2]);
943 if (!appctx->ctx.map.ref ||
Willy Tarreau9d008692019-08-09 11:21:01 +0200944 !(appctx->ctx.map.ref->flags & appctx->ctx.map.display_flags))
945 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100946
947 /* If the entry identifier start with a '#', it is considered as
948 * pointer id
949 */
950 if (args[3][0] == '#' && args[3][1] == '0' && args[3][2] == 'x') {
951 struct pat_ref_elt *ref;
952 long long int conv;
953 char *error;
954
955 /* Convert argument to integer value. */
956 conv = strtoll(&args[3][1], &error, 16);
Willy Tarreau9d008692019-08-09 11:21:01 +0200957 if (*error != '\0')
958 return cli_err(appctx, "Malformed identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100959
960 /* Convert and check integer to pointer. */
961 ref = (struct pat_ref_elt *)(long)conv;
Willy Tarreau9d008692019-08-09 11:21:01 +0200962 if ((long long int)(long)ref != conv)
963 return cli_err(appctx, "Malformed identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100964
965 /* Try to delete the entry. */
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100966 HA_SPIN_LOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100967 if (!pat_ref_delete_by_id(appctx->ctx.map.ref, ref)) {
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100968 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100969 /* The entry is not found, send message. */
Willy Tarreau9d008692019-08-09 11:21:01 +0200970 return cli_err(appctx, "Key not found.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100971 }
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100972 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100973 }
974 else {
975 /* Else, use the entry identifier as pattern
976 * string and try to delete the entry.
977 */
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100978 HA_SPIN_LOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100979 if (!pat_ref_delete(appctx->ctx.map.ref, args[3])) {
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100980 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100981 /* The entry is not found, send message. */
Willy Tarreau9d008692019-08-09 11:21:01 +0200982 return cli_err(appctx, "Key not found.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100983 }
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100984 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100985 }
986
987 /* The deletion is done, send message. */
Willy Tarreau3b6e5472016-11-24 15:53:53 +0100988 appctx->st0 = CLI_ST_PROMPT;
William Lallemandad8be612016-11-18 19:26:17 +0100989 return 1;
990}
991
Willy Tarreauff3feeb2021-04-30 13:31:43 +0200992/* continue to clear a map which was started in the parser. The range of
993 * generations this applies to is taken from appctx->ctx.cli.i0 for the oldest
994 * and appctx->ctx.cli.i1 for the latest.
995 */
Willy Tarreaud1d005d2019-12-20 18:22:02 +0100996static int cli_io_handler_clear_map(struct appctx *appctx)
997{
Willy Tarreaud1d005d2019-12-20 18:22:02 +0100998 int finished;
999
1000 HA_SPIN_LOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
Willy Tarreauff3feeb2021-04-30 13:31:43 +02001001 finished = pat_ref_purge_range(appctx->ctx.map.ref, appctx->ctx.cli.i0, appctx->ctx.cli.i1, 100);
Willy Tarreaud1d005d2019-12-20 18:22:02 +01001002 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
1003
1004 if (!finished) {
1005 /* let's come back later */
Christopher Faulet908628c2022-03-25 16:43:49 +01001006 si_rx_endp_more(cs_si(appctx->owner));
Willy Tarreaud1d005d2019-12-20 18:22:02 +01001007 return 0;
1008 }
1009 return 1;
1010}
1011
Willy Tarreauff3feeb2021-04-30 13:31:43 +02001012/* note: sets appctx->ctx.cli.i0 and appctx->ctx.cli.i1 to the oldest and
1013 * latest generations to clear, respectively, and will call the clear_map
1014 * handler.
1015 */
Aurélien Nephtaliabbf6072018-04-18 13:26:46 +02001016static int cli_parse_clear_map(char **args, char *payload, struct appctx *appctx, void *private)
William Lallemandad8be612016-11-18 19:26:17 +01001017{
1018 if (strcmp(args[1], "map") == 0 || strcmp(args[1], "acl") == 0) {
Willy Tarreauff3feeb2021-04-30 13:31:43 +02001019 const char *gen = NULL;
1020
William Lallemandad8be612016-11-18 19:26:17 +01001021 /* Set ACL or MAP flags. */
1022 if (args[1][0] == 'm')
1023 appctx->ctx.map.display_flags = PAT_REF_MAP;
1024 else
1025 appctx->ctx.map.display_flags = PAT_REF_ACL;
1026
Willy Tarreauff3feeb2021-04-30 13:31:43 +02001027 /* For both "map" and "acl" we may have an optional generation
1028 * number specified using a "@" character before the pattern
1029 * file name.
1030 */
1031 if (*args[2] == '@') {
1032 gen = args[2] + 1;
1033 args++;
1034 }
1035
William Lallemandad8be612016-11-18 19:26:17 +01001036 /* no parameter */
1037 if (!*args[2]) {
Willy Tarreau9d008692019-08-09 11:21:01 +02001038 if (appctx->ctx.map.display_flags == PAT_REF_MAP)
1039 return cli_err(appctx, "Missing map identifier.\n");
1040 else
1041 return cli_err(appctx, "Missing ACL identifier.\n");
William Lallemandad8be612016-11-18 19:26:17 +01001042 }
1043
1044 /* lookup into the refs and check the map flag */
1045 appctx->ctx.map.ref = pat_ref_lookup_ref(args[2]);
1046 if (!appctx->ctx.map.ref ||
1047 !(appctx->ctx.map.ref->flags & appctx->ctx.map.display_flags)) {
Willy Tarreau9d008692019-08-09 11:21:01 +02001048 if (appctx->ctx.map.display_flags == PAT_REF_MAP)
1049 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
1050 else
1051 return cli_err(appctx, "Unknown ACL identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +01001052 }
1053
Willy Tarreauff3feeb2021-04-30 13:31:43 +02001054 /* set the desired generation id in cli.i0/i1 */
1055 if (gen)
1056 appctx->ctx.cli.i1 = appctx->ctx.cli.i0 = str2uic(gen);
1057 else
1058 appctx->ctx.cli.i1 = appctx->ctx.cli.i0 = appctx->ctx.map.ref->curr_gen;
1059
Willy Tarreaud1d005d2019-12-20 18:22:02 +01001060 /* delegate the clearing to the I/O handler which can yield */
1061 return 0;
William Lallemandad8be612016-11-18 19:26:17 +01001062 }
Willy Tarreaud1d005d2019-12-20 18:22:02 +01001063 return 1;
William Lallemandad8be612016-11-18 19:26:17 +01001064}
1065
Willy Tarreau7a562ca2021-04-30 15:10:01 +02001066/* note: sets appctx->ctx.cli.i0 and appctx->ctx.cli.i1 to the oldest and
1067 * latest generations to clear, respectively, and will call the clear_map
1068 * handler.
1069 */
1070static int cli_parse_commit_map(char **args, char *payload, struct appctx *appctx, void *private)
1071{
1072 if (strcmp(args[1], "map") == 0 || strcmp(args[1], "acl") == 0) {
1073 const char *gen = NULL;
1074 uint genid;
1075 uint ret;
1076
1077 /* Set ACL or MAP flags. */
1078 if (args[1][0] == 'm')
1079 appctx->ctx.map.display_flags = PAT_REF_MAP;
1080 else
1081 appctx->ctx.map.display_flags = PAT_REF_ACL;
1082
1083 if (*args[2] != '@')
1084 return cli_err(appctx, "Missing version number.\n");
1085
1086 /* The generation number is mandatory for a commit. The range
1087 * of generations that get trashed by a commit starts from the
1088 * opposite of the current one and ends at the previous one.
1089 */
1090 gen = args[2] + 1;
1091 genid = str2uic(gen);
1092 appctx->ctx.cli.i1 = genid - 1;
1093 appctx->ctx.cli.i0 = appctx->ctx.cli.i1 - ((~0U) >> 1);
1094
1095 /* no parameter */
1096 if (!*args[3]) {
1097 if (appctx->ctx.map.display_flags == PAT_REF_MAP)
1098 return cli_err(appctx, "Missing map identifier.\n");
1099 else
1100 return cli_err(appctx, "Missing ACL identifier.\n");
1101 }
1102
1103 /* lookup into the refs and check the map flag */
1104 appctx->ctx.map.ref = pat_ref_lookup_ref(args[3]);
1105 if (!appctx->ctx.map.ref ||
1106 !(appctx->ctx.map.ref->flags & appctx->ctx.map.display_flags)) {
1107 if (appctx->ctx.map.display_flags == PAT_REF_MAP)
1108 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
1109 else
1110 return cli_err(appctx, "Unknown ACL identifier. Please use #<id> or <file>.\n");
1111 }
1112
1113 HA_SPIN_LOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
1114 if (genid - (appctx->ctx.map.ref->curr_gen + 1) <
1115 appctx->ctx.map.ref->next_gen - appctx->ctx.map.ref->curr_gen)
1116 ret = pat_ref_commit(appctx->ctx.map.ref, genid);
1117 else
1118 ret = 1;
1119 HA_SPIN_UNLOCK(PATREF_LOCK, &appctx->ctx.map.ref->lock);
1120
1121 if (ret != 0)
1122 return cli_err(appctx, "Version number out of range.\n");
1123
1124 /* delegate the clearing to the I/O handler which can yield */
1125 return 0;
1126 }
1127 return 1;
1128}
1129
William Lallemandad8be612016-11-18 19:26:17 +01001130/* register cli keywords */
1131
1132static struct cli_kw_list cli_kws = {{ },{
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001133 { { "add", "acl", NULL }, "add acl [@<ver>] <acl> <pattern> : add an acl entry", cli_parse_add_map, NULL },
1134 { { "clear", "acl", NULL }, "clear acl [@<ver>] <acl> : clear the contents of this acl", cli_parse_clear_map, cli_io_handler_clear_map, NULL },
1135 { { "commit","acl", NULL }, "commit acl @<ver> <acl> : commit the ACL at this version", cli_parse_commit_map, cli_io_handler_clear_map, NULL },
1136 { { "del", "acl", NULL }, "del acl <acl> [<key>|#<ref>] : delete acl entries matching <key>", cli_parse_del_map, NULL },
1137 { { "get", "acl", NULL }, "get acl <acl> <value> : report the patterns matching a sample for an ACL", cli_parse_get_map, cli_io_handler_map_lookup, cli_release_mlook },
1138 { { "prepare","acl",NULL }, "prepare acl <acl> : prepare a new version for atomic ACL replacement", cli_parse_prepare_map, NULL },
1139 { { "show", "acl", NULL }, "show acl [@<ver>] <acl>] : report available acls or dump an acl's contents", cli_parse_show_map, NULL },
1140 { { "add", "map", NULL }, "add map [@<ver>] <map> <key> <val> : add a map entry (payload supported instead of key/val)", cli_parse_add_map, NULL },
1141 { { "clear", "map", NULL }, "clear map [@<ver>] <map> : clear the contents of this map", cli_parse_clear_map, cli_io_handler_clear_map, NULL },
1142 { { "commit","map", NULL }, "commit map @<ver> <map> : commit the map at this version", cli_parse_commit_map, cli_io_handler_clear_map, NULL },
1143 { { "del", "map", NULL }, "del map <map> [<key>|#<ref>] : delete map entries matching <key>", cli_parse_del_map, NULL },
1144 { { "get", "map", NULL }, "get map <acl> <value> : report the keys and values matching a sample for a map", cli_parse_get_map, cli_io_handler_map_lookup, cli_release_mlook },
1145 { { "prepare","map",NULL }, "prepare map <acl> : prepare a new version for atomic map replacement", cli_parse_prepare_map, NULL },
1146 { { "set", "map", NULL }, "set map <map> [<key>|#<ref>] <value> : modify a map entry", cli_parse_set_map, NULL },
1147 { { "show", "map", NULL }, "show map [@ver] [map] : report available maps or dump a map's contents", cli_parse_show_map, NULL },
William Lallemandad8be612016-11-18 19:26:17 +01001148 { { NULL }, NULL, NULL, NULL }
1149}};
1150
Willy Tarreau0108d902018-11-25 19:14:37 +01001151INITCALL1(STG_REGISTER, cli_register_kw, &cli_kws);
William Lallemandad8be612016-11-18 19:26:17 +01001152
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +01001153/* Note: must not be declared <const> as its list will be overwritten
1154 *
1155 * For the map_*_int keywords, the output is declared as SMP_T_UINT, but the converter function
1156 * can provide SMP_T_UINT, SMP_T_SINT or SMP_T_BOOL depending on how the patterns found in the
1157 * file can be parsed.
1158 *
1159 * For the map_*_ip keyword, the output is declared as SMP_T_IPV4, but the converter function
1160 * can provide SMP_T_IPV4 or SMP_T_IPV6 depending on the patterns found in the file.
1161 *
1162 * The map_* keywords only emit strings.
1163 *
1164 * The output type is only used during the configuration parsing. It is used for detecting
1165 * compatibility problems.
1166 *
1167 * The arguments are: <file>[,<default value>]
1168 */
1169static struct sample_conv_kw_list sample_conv_kws = {ILH, {
Thierry FOURNIER1edc9712014-12-15 16:18:39 +01001170 { "map", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_STR },
1171 { "map_str", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_STR },
1172 { "map_beg", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_BEG },
1173 { "map_sub", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_SUB },
1174 { "map_dir", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_DIR },
1175 { "map_dom", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_DOM },
1176 { "map_end", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_END },
1177 { "map_reg", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_REG },
Thierry Fournier8feaa662016-02-10 22:55:20 +01001178 { "map_regm", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_REGM},
Thierry FOURNIER07ee64e2015-07-06 23:43:03 +02001179 { "map_int", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_SINT, SMP_T_STR, (void *)PAT_MATCH_INT },
Thierry FOURNIER1edc9712014-12-15 16:18:39 +01001180 { "map_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_ADDR, SMP_T_STR, (void *)PAT_MATCH_IP },
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +01001181
Thierry FOURNIERbf65cd42015-07-20 17:45:02 +02001182 { "map_str_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_STR, SMP_T_SINT, (void *)PAT_MATCH_STR },
1183 { "map_beg_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_STR, SMP_T_SINT, (void *)PAT_MATCH_BEG },
1184 { "map_sub_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_STR, SMP_T_SINT, (void *)PAT_MATCH_SUB },
1185 { "map_dir_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_STR, SMP_T_SINT, (void *)PAT_MATCH_DIR },
1186 { "map_dom_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_STR, SMP_T_SINT, (void *)PAT_MATCH_DOM },
1187 { "map_end_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_STR, SMP_T_SINT, (void *)PAT_MATCH_END },
1188 { "map_reg_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_STR, SMP_T_SINT, (void *)PAT_MATCH_REG },
1189 { "map_int_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_SINT, SMP_T_SINT, (void *)PAT_MATCH_INT },
1190 { "map_ip_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_ADDR, SMP_T_SINT, (void *)PAT_MATCH_IP },
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +01001191
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +02001192 { "map_str_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_ADDR, (void *)PAT_MATCH_STR },
1193 { "map_beg_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_ADDR, (void *)PAT_MATCH_BEG },
1194 { "map_sub_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_ADDR, (void *)PAT_MATCH_SUB },
1195 { "map_dir_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_ADDR, (void *)PAT_MATCH_DIR },
1196 { "map_dom_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_ADDR, (void *)PAT_MATCH_DOM },
1197 { "map_end_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_ADDR, (void *)PAT_MATCH_END },
1198 { "map_reg_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_ADDR, (void *)PAT_MATCH_REG },
1199 { "map_int_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_SINT, SMP_T_ADDR, (void *)PAT_MATCH_INT },
1200 { "map_ip_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_ADDR, SMP_T_ADDR, (void *)PAT_MATCH_IP },
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +01001201
1202 { /* END */ },
1203}};
1204
Willy Tarreau0108d902018-11-25 19:14:37 +01001205INITCALL1(STG_REGISTER, sample_register_convs, &sample_conv_kws);