blob: 4db7882e01c45fef4db8bdd314bb5d976b9887bc [file] [log] [blame]
Willy Tarreaubaaee002006-06-26 02:48:02 +02001/*
Willy Tarreau3667d5d2009-10-18 19:50:43 +02002 * include/types/proto_http.h
3 * This file contains HTTP protocol definitions.
4 *
Willy Tarreauff011f22011-01-06 17:51:27 +01005 * Copyright (C) 2000-2011 Willy Tarreau - w@1wt.eu
Willy Tarreau3667d5d2009-10-18 19:50:43 +02006 *
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation, version 2.1
10 * exclusively.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
Willy Tarreaubaaee002006-06-26 02:48:02 +020021
22#ifndef _TYPES_PROTO_HTTP_H
23#define _TYPES_PROTO_HTTP_H
24
Willy Tarreauc7e42382012-08-24 19:22:53 +020025#include <common/chunk.h>
Willy Tarreaue3ba5f02006-06-29 18:54:54 +020026#include <common/config.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020027
Willy Tarreau3bac9ff2007-03-18 17:31:28 +010028#include <types/hdr_idx.h>
29
Willy Tarreaufcffa692010-01-10 14:21:19 +010030/* These are the flags that are found in txn->flags */
Willy Tarreau3d300592007-03-18 18:34:41 +010031
32/* action flags */
33#define TX_CLDENY 0x00000001 /* a client header matches a deny regex */
34#define TX_CLALLOW 0x00000002 /* a client header matches an allow regex */
35#define TX_SVDENY 0x00000004 /* a server header matches a deny regex */
36#define TX_SVALLOW 0x00000008 /* a server header matches an allow regex */
37#define TX_CLTARPIT 0x00000010 /* the session is tarpitted (anti-dos) */
Willy Tarreaub608feb2010-01-02 22:47:18 +010038
Willy Tarreau92954fd2010-10-06 19:38:55 +020039/* transaction flags dedicated to cookies : bits values 0x20 to 0x80 (0-7 shift 5) */
Willy Tarreau3d300592007-03-18 18:34:41 +010040#define TX_CK_NONE 0x00000000 /* this session had no cookie */
Willy Tarreau92954fd2010-10-06 19:38:55 +020041#define TX_CK_INVALID 0x00000020 /* this session had a cookie which matches no server */
42#define TX_CK_DOWN 0x00000040 /* this session had cookie matching a down server */
43#define TX_CK_VALID 0x00000060 /* this session had cookie matching a valid server */
Willy Tarreaub761ec42010-10-07 15:28:23 +020044#define TX_CK_EXPIRED 0x00000080 /* this session had an expired cookie (idle for too long) */
45#define TX_CK_OLD 0x000000A0 /* this session had too old a cookie (offered too long ago) */
Willy Tarreauc89ccb62012-04-05 21:18:22 +020046#define TX_CK_UNUSED 0x000000C0 /* this session had a cookie but it was not used (eg: use-server was preferred) */
Willy Tarreau92954fd2010-10-06 19:38:55 +020047#define TX_CK_MASK 0x000000E0 /* mask to get this session's cookie flags */
48#define TX_CK_SHIFT 5 /* bit shift */
Willy Tarreau3d300592007-03-18 18:34:41 +010049
Willy Tarreauf1348312010-10-07 15:54:11 +020050/* response cookie information, bits values 0x100 to 0x700 (0-7 shift 8) */
51#define TX_SCK_NONE 0x00000000 /* no cookie found in the response */
52#define TX_SCK_FOUND 0x00000100 /* a persistence cookie was found and forwarded */
53#define TX_SCK_DELETED 0x00000200 /* an existing persistence cookie was deleted */
54#define TX_SCK_INSERTED 0x00000300 /* a persistence cookie was inserted */
55#define TX_SCK_REPLACED 0x00000400 /* a persistence cookie was present and rewritten */
56#define TX_SCK_UPDATED 0x00000500 /* an expirable persistence cookie was updated */
Willy Tarreau3d300592007-03-18 18:34:41 +010057#define TX_SCK_MASK 0x00000700 /* mask to get the set-cookie field */
Willy Tarreau3d300592007-03-18 18:34:41 +010058#define TX_SCK_SHIFT 8 /* bit shift */
Willy Tarreauf1348312010-10-07 15:54:11 +020059
60#define TX_SCK_PRESENT 0x00000800 /* a cookie was found in the server's response */
Willy Tarreau3d300592007-03-18 18:34:41 +010061
62/* cacheability management, bits values 0x1000 to 0x3000 (0-3 shift 12) */
63#define TX_CACHEABLE 0x00001000 /* at least part of the response is cacheable */
64#define TX_CACHE_COOK 0x00002000 /* a cookie in the response is cacheable */
65#define TX_CACHE_SHIFT 12 /* bit shift */
66
Willy Tarreaua36fc4d2012-02-17 17:39:37 +010067/* Unused: 0x4000, 0x8000, 0x10000, 0x20000, 0x80000 */
Willy Tarreaubaaee002006-06-26 02:48:02 +020068
Willy Tarreau5b154472009-12-21 20:11:07 +010069/* indicate how we *want* the connection to behave, regardless of what is in
70 * the headers. We have 4 possible values right now :
71 * - WANT_TUN : will be a tunnel (default when nothing configured or with CONNECT).
72 * - WANT_KAL : try to maintain keep-alive
73 * - WANT_SCL : enforce close on the server side
74 * - WANT_CLO : enforce close on both sides
75 */
76#define TX_CON_WANT_TUN 0x00000000 /* note: it's important that it is 0 (init) */
77#define TX_CON_WANT_KAL 0x00100000
78#define TX_CON_WANT_SCL 0x00200000
79#define TX_CON_WANT_CLO 0x00300000
80#define TX_CON_WANT_MSK 0x00300000 /* this is the mask to get the bits */
81
Willy Tarreaubbf0b372010-01-18 16:54:40 +010082#define TX_CON_CLO_SET 0x00400000 /* "connection: close" is now set */
83#define TX_CON_KAL_SET 0x00800000 /* "connection: keep-alive" is now set */
Willy Tarreau5b154472009-12-21 20:11:07 +010084
Willy Tarreaua36fc4d2012-02-17 17:39:37 +010085/* Unused: 0x1000000, 0x2000000 */
86
Willy Tarreaufcffa692010-01-10 14:21:19 +010087#define TX_WAIT_NEXT_RQ 0x04000000 /* waiting for the second request to start, use keep-alive timeout */
Willy Tarreau5b154472009-12-21 20:11:07 +010088
Willy Tarreaubbf0b372010-01-18 16:54:40 +010089#define TX_HDR_CONN_PRS 0x08000000 /* "connection" header already parsed (req or res), results below */
90#define TX_HDR_CONN_CLO 0x10000000 /* "Connection: close" was present at least once */
91#define TX_HDR_CONN_KAL 0x20000000 /* "Connection: keep-alive" was present at least once */
Willy Tarreau88d349d2010-01-25 12:15:43 +010092#define TX_USE_PX_CONN 0x40000000 /* Use "Proxy-Connection" instead of "Connection" */
Willy Tarreaubbf0b372010-01-18 16:54:40 +010093
Willy Tarreau92954fd2010-10-06 19:38:55 +020094/* used only for keep-alive purposes, to indicate we're on a second transaction */
95#define TX_NOT_FIRST 0x80000000 /* the transaction is not the first one */
96/* no more room for transaction flags ! */
Willy Tarreaubbf0b372010-01-18 16:54:40 +010097
Willy Tarreau8d5d7f22007-01-21 19:16:41 +010098/* The HTTP parser is more complex than it looks like, because we have to
99 * support multi-line headers and any number of spaces between the colon and
100 * the value.
101 *
102 * All those examples must work :
103
104 Hdr1:val1\r\n
105 Hdr1: val1\r\n
106 Hdr1:\t val1\r\n
107 Hdr1: \r\n
108 val1\r\n
109 Hdr1:\r\n
110 val1\n
111 \tval2\r\n
112 val3\n
113
114 *
115 */
116
Willy Tarreau58f10d72006-12-04 02:26:12 +0100117/* Possible states while parsing HTTP messages (request|response) */
Willy Tarreau8d5d7f22007-01-21 19:16:41 +0100118#define HTTP_MSG_RQBEFORE 0 // request: leading LF, before start line
119#define HTTP_MSG_RQBEFORE_CR 1 // request: leading CRLF, before start line
120
121/* these ones define a request start line */
122#define HTTP_MSG_RQMETH 2 // parsing the Method
123#define HTTP_MSG_RQMETH_SP 3 // space(s) after the ethod
124#define HTTP_MSG_RQURI 4 // parsing the Request URI
125#define HTTP_MSG_RQURI_SP 5 // space(s) after the Request URI
126#define HTTP_MSG_RQVER 6 // parsing the Request Version
127#define HTTP_MSG_RQLINE_END 7 // end of request line (CR or LF)
128
129#define HTTP_MSG_RPBEFORE 8 // response: leading LF, before start line
130#define HTTP_MSG_RPBEFORE_CR 9 // response: leading CRLF, before start line
131
132/* these ones define a response start line */
133#define HTTP_MSG_RPVER 10 // parsing the Response Version
134#define HTTP_MSG_RPVER_SP 11 // space(s) after the Response Version
135#define HTTP_MSG_RPCODE 12 // response code
136#define HTTP_MSG_RPCODE_SP 13 // space(s) after the response code
137#define HTTP_MSG_RPREASON 14 // response reason
138#define HTTP_MSG_RPLINE_END 15 // end of response line (CR or LF)
139
140/* common header processing */
141
142#define HTTP_MSG_HDR_FIRST 16 // waiting for first header or last CRLF (no LWS possible)
143#define HTTP_MSG_HDR_NAME 17 // parsing header name
144#define HTTP_MSG_HDR_COL 18 // parsing header colon
145#define HTTP_MSG_HDR_L1_SP 19 // parsing header LWS (SP|HT) before value
146#define HTTP_MSG_HDR_L1_LF 20 // parsing header LWS (LF) before value
147#define HTTP_MSG_HDR_L1_LWS 21 // checking whether it's a new header or an LWS
148#define HTTP_MSG_HDR_VAL 22 // parsing header value
149#define HTTP_MSG_HDR_L2_LF 23 // parsing header LWS (LF) inside/after value
150#define HTTP_MSG_HDR_L2_LWS 24 // checking whether it's a new header or an LWS
151
152#define HTTP_MSG_LAST_LF 25 // parsing last LF
Willy Tarreau655dce92009-11-08 13:10:58 +0100153
154/* error state : must be before HTTP_MSG_BODY so that (>=BODY) always indicates
155 * that data are being processed.
156 */
157
158#define HTTP_MSG_ERROR 26 // an error occurred
159
160/* Body processing.
161 * The state HTTP_MSG_BODY is a delimiter to know if we're waiting for headers
162 * or body. All the sub-states below also indicate we're processing the body,
163 * with some additional information.
164 */
165#define HTTP_MSG_BODY 27 // parsing body at end of headers
166#define HTTP_MSG_100_SENT 28 // parsing body after a 100-Continue was sent
167#define HTTP_MSG_CHUNK_SIZE 29 // parsing the chunk size (RFC2616 #3.6.1)
168#define HTTP_MSG_DATA 30 // skipping data chunk / content-length data
Willy Tarreau54d23df2012-10-25 19:04:45 +0200169#define HTTP_MSG_CHUNK_CRLF 31 // skipping CRLF after data chunk
Willy Tarreau655dce92009-11-08 13:10:58 +0100170#define HTTP_MSG_TRAILERS 32 // trailers (post-data entity headers)
Willy Tarreau8d5d7f22007-01-21 19:16:41 +0100171
Willy Tarreau5523b322009-12-29 12:05:52 +0100172/* we enter this state when we've received the end of the current message */
173#define HTTP_MSG_DONE 33 // message end received, waiting for resync or close
174#define HTTP_MSG_CLOSING 34 // shutdown_w done, not all bytes sent yet
175#define HTTP_MSG_CLOSED 35 // shutdown_w done, all bytes sent
Willy Tarreau610ecce2010-01-04 21:15:02 +0100176#define HTTP_MSG_TUNNEL 36 // tunneled data after DONE
Willy Tarreau58f10d72006-12-04 02:26:12 +0100177
Willy Tarreaua36fc4d2012-02-17 17:39:37 +0100178
179/*
180 * HTTP message status flags (msg->flags)
181 */
182
183#define HTTP_MSGF_CNT_LEN 0x00000001 /* content-length was found in the message */
184#define HTTP_MSGF_TE_CHNK 0x00000002 /* transfer-encoding: chunked was found */
185
186/* if this flags is not set in either direction, we may be forced to complete a
187 * connection as a half-way tunnel (eg if no content-length appears in a 1.1
188 * response, but the request is correctly sized)
189 */
190#define HTTP_MSGF_XFER_LEN 0x00000004 /* message xfer size can be determined */
191#define HTTP_MSGF_VER_11 0x00000008 /* the message is HTTP/1.1 or above */
192
193
194
Willy Tarreau79da4692008-11-19 20:03:04 +0100195/* Redirect flags */
196enum {
197 REDIRECT_FLAG_NONE = 0,
198 REDIRECT_FLAG_DROP_QS = 1, /* drop query string */
Willy Tarreau81e3b4f2010-01-10 00:42:19 +0100199 REDIRECT_FLAG_APPEND_SLASH = 2, /* append a slash if missing at the end */
Willy Tarreau79da4692008-11-19 20:03:04 +0100200};
Willy Tarreaub463dfb2008-06-07 23:08:56 +0200201
202/* Redirect types (location, prefix, extended ) */
203enum {
204 REDIRECT_TYPE_NONE = 0, /* no redirection */
205 REDIRECT_TYPE_LOCATION, /* location redirect */
206 REDIRECT_TYPE_PREFIX, /* prefix redirect */
Willy Tarreau2e1dca82012-09-12 08:43:15 +0200207 REDIRECT_TYPE_SCHEME, /* scheme redirect (eg: switch from http to https) */
Willy Tarreaub463dfb2008-06-07 23:08:56 +0200208};
209
Cyril Bonté47fdd8e2010-04-25 00:00:51 +0200210/* Perist types (force-persist, ignore-persist) */
211enum {
212 PERSIST_TYPE_NONE = 0, /* no persistence */
213 PERSIST_TYPE_FORCE, /* force-persist */
214 PERSIST_TYPE_IGNORE, /* ignore-persist */
215};
216
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100217/* Known HTTP methods */
218typedef enum {
219 HTTP_METH_NONE = 0,
220 HTTP_METH_OPTIONS,
221 HTTP_METH_GET,
222 HTTP_METH_HEAD,
223 HTTP_METH_POST,
224 HTTP_METH_PUT,
225 HTTP_METH_DELETE,
226 HTTP_METH_TRACE,
227 HTTP_METH_CONNECT,
228 HTTP_METH_OTHER,
229} http_meth_t;
230
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +0100231enum {
232 HTTP_AUTH_WRONG = -1, /* missing or unknown */
233 HTTP_AUTH_UNKNOWN = 0,
234 HTTP_AUTH_BASIC,
235 HTTP_AUTH_DIGEST,
236};
237
Willy Tarreauff011f22011-01-06 17:51:27 +0100238enum {
239 HTTP_REQ_ACT_UNKNOWN = 0,
240 HTTP_REQ_ACT_ALLOW,
241 HTTP_REQ_ACT_DENY,
242 HTTP_REQ_ACT_HTTP_AUTH,
243 HTTP_REQ_ACT_MAX
244};
245
Willy Tarreau436d9ed2011-05-11 16:10:11 +0200246/*
247 * All implemented return codes
248 */
249enum {
Willy Tarreauae94d4d2011-05-11 16:28:49 +0200250 HTTP_ERR_200 = 0,
251 HTTP_ERR_400,
Willy Tarreau436d9ed2011-05-11 16:10:11 +0200252 HTTP_ERR_403,
253 HTTP_ERR_408,
254 HTTP_ERR_500,
255 HTTP_ERR_502,
256 HTTP_ERR_503,
257 HTTP_ERR_504,
258 HTTP_ERR_SIZE
259};
260
Cyril Bontécf8d9ae2012-04-04 12:57:18 +0200261/* Actions available for the stats admin forms */
262enum {
263 ST_ADM_ACTION_NONE = 0,
264 ST_ADM_ACTION_DISABLE,
265 ST_ADM_ACTION_ENABLE,
Willy Tarreaud7282242012-06-04 00:22:44 +0200266 ST_ADM_ACTION_STOP,
267 ST_ADM_ACTION_START,
Willy Tarreau4f8a83c2012-06-04 00:26:23 +0200268 ST_ADM_ACTION_SHUTDOWN,
Cyril Bontécf8d9ae2012-04-04 12:57:18 +0200269};
270
Cyril Bonté19979e12012-04-04 12:57:21 +0200271/* status codes available for the stats admin page */
272enum {
273 STAT_STATUS_INIT = 0,
274 STAT_STATUS_DENY, /* action denied */
275 STAT_STATUS_DONE, /* the action is successful */
276 STAT_STATUS_ERRP, /* an error occured due to invalid values in parameters */
277 STAT_STATUS_EXCD, /* an error occured because the buffer couldn't store all data */
278 STAT_STATUS_NONE, /* nothing happened (no action chosen or servers state didn't change) */
279 STAT_STATUS_PART, /* the action is partially successful */
280 STAT_STATUS_UNKN, /* an unknown error occured, shouldn't happen */
281 STAT_STATUS_SIZE
282};
283
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100284/* This is an HTTP message, as described in RFC2616. It can be either a request
285 * message or a response message.
286 *
287 * The values there are a little bit obscure, because their meaning can change
288 * during the parsing :
289 *
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100290 * - eoh (End of Headers) : relative offset in the buffer of first byte that
291 * is not part of a completely processed header.
292 * During parsing, it points to last header seen
Willy Tarreaufa355d42009-11-29 18:12:29 +0100293 * for states after START. When in HTTP_MSG_BODY,
294 * eoh points to the first byte of the last CRLF
Willy Tarreauea1175a2012-03-05 15:52:30 +0100295 * preceeding data. Relative to buffer's origin.
Willy Tarreaufa4a03c2012-03-09 21:28:54 +0100296 * - sov : When in HTTP_MSG_BODY, will point to the first
Willy Tarreauea1175a2012-03-05 15:52:30 +0100297 * byte of data (relative to buffer's origin).
Willy Tarreau09d1e252012-05-18 22:36:34 +0200298 * - sol (start of line) : start of current line during parsing, or zero.
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100299 * - eol (End of Line) : relative offset in the buffer of the first byte
300 * which marks the end of the line (LF or CRLF).
Willy Tarreauea1175a2012-03-05 15:52:30 +0100301 * Note that all offsets are relative to the origin of the buffer (buf->p)
302 * which always points to the beginning of the message (request or response).
303 * Since a message may not wrap, pointer computations may be one without any
304 * care for wrapping (no addition overflow nor subtract underflow).
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100305 */
306struct http_msg {
matt.farnsworth@nokia.com1c2ab962008-04-14 20:47:37 +0200307 unsigned int msg_state; /* where we are in the current message parsing */
Willy Tarreaua36fc4d2012-02-17 17:39:37 +0100308 unsigned int flags; /* flags describing the message (HTTP version, ...) */
Willy Tarreau394db372012-10-12 22:40:39 +0200309 struct channel *chn; /* pointer to the channel transporting the message */
Willy Tarreaua458b672012-03-05 11:17:50 +0100310 unsigned int next; /* pointer to next byte to parse, relative to buf->p */
Willy Tarreaufa4a03c2012-03-09 21:28:54 +0100311 unsigned int sov; /* current header: start of value */
Willy Tarreaufa355d42009-11-29 18:12:29 +0100312 unsigned int eoh; /* End Of Headers, relative to buffer */
Willy Tarreau09d1e252012-05-18 22:36:34 +0200313 unsigned int sol; /* start of current line during parsing otherwise zero */
Willy Tarreau12e48b32012-03-05 16:57:34 +0100314 unsigned int eol; /* end of line */
Willy Tarreaufa355d42009-11-29 18:12:29 +0100315 int err_pos; /* err handling: -2=block, -1=pass, 0+=detected */
Willy Tarreau962c3f42010-01-10 00:15:35 +0100316 union { /* useful start line pointers, relative to ->sol */
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100317 struct {
matt.farnsworth@nokia.com1c2ab962008-04-14 20:47:37 +0200318 int l; /* request line length (not including CR) */
Willy Tarreau26927362012-05-18 23:22:52 +0200319 int m_l; /* METHOD length (method starts at buf->p) */
matt.farnsworth@nokia.com1c2ab962008-04-14 20:47:37 +0200320 int u, u_l; /* URI, length */
321 int v, v_l; /* VERSION, length */
322 } rq; /* request line : field, length */
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100323 struct {
matt.farnsworth@nokia.com1c2ab962008-04-14 20:47:37 +0200324 int l; /* status line length (not including CR) */
Willy Tarreau26927362012-05-18 23:22:52 +0200325 int v_l; /* VERSION length (version starts at buf->p) */
matt.farnsworth@nokia.com1c2ab962008-04-14 20:47:37 +0200326 int c, c_l; /* CODE, length */
327 int r, r_l; /* REASON, length */
328 } st; /* status line : field, length */
329 } sl; /* start line */
Willy Tarreau124d9912011-03-01 20:30:48 +0100330 unsigned long long chunk_len; /* cache for last chunk size or content-length header value */
331 unsigned long long body_len; /* total known length of the body, excluding encoding */
Willy Tarreaufa355d42009-11-29 18:12:29 +0100332 char **cap; /* array of captured headers (may be NULL) */
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100333};
334
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +0100335struct http_auth_data {
336 int method; /* one of HTTP_AUTH_* */
337 struct chunk method_data; /* points to the creditial part from 'Authorization:' header */
338 char *user, *pass; /* extracted username & password */
339};
340
Willy Tarreauff011f22011-01-06 17:51:27 +0100341struct http_req_rule {
342 struct list list;
343 struct acl_cond *cond; /* acl condition to meet */
344 unsigned int action;
345 struct {
346 char *realm;
347 } http_auth;
348};
349
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100350/* This is an HTTP transaction. It contains both a request message and a
351 * response message (which can be empty).
352 */
353struct http_txn {
Willy Tarreau520bbb22010-01-10 11:31:22 +0100354 struct http_msg req; /* HTTP request message */
Willy Tarreauac1932d2011-10-24 19:14:41 +0200355 struct hdr_idx hdr_idx; /* array of header indexes (max: global.tune.max_http_hdr) */
Willy Tarreau520bbb22010-01-10 11:31:22 +0100356 unsigned int flags; /* transaction flags */
357 http_meth_t meth; /* HTTP method */
358
359 int status; /* HTTP status from the server, negative if from proxy */
360 struct http_msg rsp; /* HTTP response message */
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100361
Willy Tarreau520bbb22010-01-10 11:31:22 +0100362 char *uri; /* first line if log needed, NULL otherwise */
363 char *cli_cookie; /* cookie presented by the client, in capture mode */
364 char *srv_cookie; /* cookie presented by the server, in capture mode */
Willy Tarreaua3377ee2010-01-10 10:49:11 +0100365 char *sessid; /* the appsession id, if found in the request or in the response */
Willy Tarreauf64d1412010-10-07 20:06:11 +0200366 int cookie_first_date; /* if non-zero, first date the expirable cookie was set/seen */
367 int cookie_last_date; /* if non-zero, last date the expirable cookie was set/seen */
Willy Tarreau520bbb22010-01-10 11:31:22 +0100368
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +0100369 struct http_auth_data auth; /* HTTP auth data */
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100370};
371
Willy Tarreau33a7e692007-06-10 19:45:56 +0200372/* This structure is used by http_find_header() to return values of headers.
Willy Tarreau588bd4f2011-09-01 22:22:28 +0200373 * The header starts at <line>, the value (excluding leading and trailing white
374 * spaces) at <line>+<val> for <vlen> bytes, followed by optional <tws> trailing
375 * white spaces, and sets <line>+<del> to point to the last delimitor (colon or
376 * comma) before this value. <prev> points to the index of the header whose next
377 * is this one.
Willy Tarreau33a7e692007-06-10 19:45:56 +0200378 */
379struct hdr_ctx {
Willy Tarreau68085d82010-01-18 14:54:04 +0100380 char *line;
Willy Tarreau33a7e692007-06-10 19:45:56 +0200381 int idx;
Willy Tarreau588bd4f2011-09-01 22:22:28 +0200382 int val; /* relative to line, may skip some leading white spaces */
383 int vlen; /* relative to line+val, stops before trailing white spaces */
384 int tws; /* added to vlen if some trailing white spaces are present */
Willy Tarreau68085d82010-01-18 14:54:04 +0100385 int del; /* relative to line */
386 int prev; /* index of previous header */
Willy Tarreau33a7e692007-06-10 19:45:56 +0200387};
Willy Tarreau58f10d72006-12-04 02:26:12 +0100388
Willy Tarreaubaaee002006-06-26 02:48:02 +0200389#endif /* _TYPES_PROTO_HTTP_H */
390
391/*
392 * Local variables:
393 * c-indent-level: 8
394 * c-basic-offset: 8
395 * End:
396 */