blob: 9c3905639298593be2de0d1656c210a238fbbe22 [file] [log] [blame]
Willy Tarreaubaaee002006-06-26 02:48:02 +02001/*
Willy Tarreau3667d5d2009-10-18 19:50:43 +02002 * include/types/proto_http.h
3 * This file contains HTTP protocol definitions.
4 *
Willy Tarreauff011f22011-01-06 17:51:27 +01005 * Copyright (C) 2000-2011 Willy Tarreau - w@1wt.eu
Willy Tarreau3667d5d2009-10-18 19:50:43 +02006 *
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation, version 2.1
10 * exclusively.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
Willy Tarreaubaaee002006-06-26 02:48:02 +020021
22#ifndef _TYPES_PROTO_HTTP_H
23#define _TYPES_PROTO_HTTP_H
24
Willy Tarreauc7e42382012-08-24 19:22:53 +020025#include <common/chunk.h>
Willy Tarreaue3ba5f02006-06-29 18:54:54 +020026#include <common/config.h>
Thierry FOURNIERa054d412013-10-16 16:19:38 +020027#include <common/mini-clist.h>
Thierry FOURNIERf4e61292014-06-19 13:37:01 +020028#include <common/regex.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020029
Willy Tarreaudb4893d2017-09-21 08:40:02 +020030#include <types/channel.h>
Willy Tarreau0da5b3b2017-09-21 09:30:46 +020031#include <types/h1.h>
Willy Tarreau3bac9ff2007-03-18 17:31:28 +010032#include <types/hdr_idx.h>
Christopher Fauletd7c91962015-04-30 11:48:27 +020033#include <types/filters.h>
Willy Tarreauf07741d2016-11-11 07:56:48 +010034#include <types/sample.h>
Willy Tarreau3bac9ff2007-03-18 17:31:28 +010035
Willy Tarreaufcffa692010-01-10 14:21:19 +010036/* These are the flags that are found in txn->flags */
Willy Tarreau3d300592007-03-18 18:34:41 +010037
38/* action flags */
39#define TX_CLDENY 0x00000001 /* a client header matches a deny regex */
40#define TX_CLALLOW 0x00000002 /* a client header matches an allow regex */
41#define TX_SVDENY 0x00000004 /* a server header matches a deny regex */
42#define TX_SVALLOW 0x00000008 /* a server header matches an allow regex */
Willy Tarreau87b09662015-04-03 00:22:06 +020043#define TX_CLTARPIT 0x00000010 /* the transaction is tarpitted (anti-dos) */
Willy Tarreaub608feb2010-01-02 22:47:18 +010044
Willy Tarreau92954fd2010-10-06 19:38:55 +020045/* transaction flags dedicated to cookies : bits values 0x20 to 0x80 (0-7 shift 5) */
Willy Tarreau87b09662015-04-03 00:22:06 +020046#define TX_CK_NONE 0x00000000 /* this transaction had no cookie */
47#define TX_CK_INVALID 0x00000020 /* this transaction had a cookie which matches no server */
48#define TX_CK_DOWN 0x00000040 /* this transaction had cookie matching a down server */
49#define TX_CK_VALID 0x00000060 /* this transaction had cookie matching a valid server */
50#define TX_CK_EXPIRED 0x00000080 /* this transaction had an expired cookie (idle for too long) */
51#define TX_CK_OLD 0x000000A0 /* this transaction had too old a cookie (offered too long ago) */
52#define TX_CK_UNUSED 0x000000C0 /* this transaction had a cookie but it was not used (eg: use-server was preferred) */
53#define TX_CK_MASK 0x000000E0 /* mask to get this transaction's cookie flags */
Willy Tarreau92954fd2010-10-06 19:38:55 +020054#define TX_CK_SHIFT 5 /* bit shift */
Willy Tarreau3d300592007-03-18 18:34:41 +010055
Willy Tarreauf1348312010-10-07 15:54:11 +020056/* response cookie information, bits values 0x100 to 0x700 (0-7 shift 8) */
57#define TX_SCK_NONE 0x00000000 /* no cookie found in the response */
58#define TX_SCK_FOUND 0x00000100 /* a persistence cookie was found and forwarded */
59#define TX_SCK_DELETED 0x00000200 /* an existing persistence cookie was deleted */
60#define TX_SCK_INSERTED 0x00000300 /* a persistence cookie was inserted */
61#define TX_SCK_REPLACED 0x00000400 /* a persistence cookie was present and rewritten */
62#define TX_SCK_UPDATED 0x00000500 /* an expirable persistence cookie was updated */
Willy Tarreau3d300592007-03-18 18:34:41 +010063#define TX_SCK_MASK 0x00000700 /* mask to get the set-cookie field */
Willy Tarreau3d300592007-03-18 18:34:41 +010064#define TX_SCK_SHIFT 8 /* bit shift */
Willy Tarreauf1348312010-10-07 15:54:11 +020065
66#define TX_SCK_PRESENT 0x00000800 /* a cookie was found in the server's response */
Willy Tarreau3d300592007-03-18 18:34:41 +010067
68/* cacheability management, bits values 0x1000 to 0x3000 (0-3 shift 12) */
69#define TX_CACHEABLE 0x00001000 /* at least part of the response is cacheable */
70#define TX_CACHE_COOK 0x00002000 /* a cookie in the response is cacheable */
Willy Tarreau0ad8e0d2017-12-22 15:03:36 +010071#define TX_CACHE_IGNORE 0x00004000 /* do not retrieve object from cache */
Willy Tarreau3d300592007-03-18 18:34:41 +010072#define TX_CACHE_SHIFT 12 /* bit shift */
73
Willy Tarreau0ad8e0d2017-12-22 15:03:36 +010074/* Unused: 0x8000 */
Christopher Faulete6006242017-03-10 11:52:44 +010075
76#define TX_WAIT_CLEANUP 0x0010000 /* this transaction is waiting for a clean up */
77
78/* Unused: 0x20000, 0x80000 */
79
Willy Tarreaubaaee002006-06-26 02:48:02 +020080
Willy Tarreau5b154472009-12-21 20:11:07 +010081/* indicate how we *want* the connection to behave, regardless of what is in
82 * the headers. We have 4 possible values right now :
Godbachf2dd68d2014-12-10 10:21:30 +080083 * - WANT_KAL : try to maintain keep-alive (default when nothing configured)
Willy Tarreau70dffda2014-01-30 03:07:23 +010084 * - WANT_TUN : will be a tunnel (CONNECT).
Willy Tarreau5b154472009-12-21 20:11:07 +010085 * - WANT_SCL : enforce close on the server side
86 * - WANT_CLO : enforce close on both sides
87 */
Willy Tarreau70dffda2014-01-30 03:07:23 +010088#define TX_CON_WANT_KAL 0x00000000 /* note: it's important that it is 0 (init) */
89#define TX_CON_WANT_TUN 0x00100000
Willy Tarreau5b154472009-12-21 20:11:07 +010090#define TX_CON_WANT_SCL 0x00200000
91#define TX_CON_WANT_CLO 0x00300000
92#define TX_CON_WANT_MSK 0x00300000 /* this is the mask to get the bits */
93
Willy Tarreaubbf0b372010-01-18 16:54:40 +010094#define TX_CON_CLO_SET 0x00400000 /* "connection: close" is now set */
95#define TX_CON_KAL_SET 0x00800000 /* "connection: keep-alive" is now set */
Willy Tarreau5b154472009-12-21 20:11:07 +010096
Willy Tarreau068621e2013-12-23 15:11:25 +010097#define TX_PREFER_LAST 0x01000000 /* try to stay on same server if possible (eg: after 401) */
Willy Tarreaua36fc4d2012-02-17 17:39:37 +010098
Willy Tarreau50fc7772012-11-11 22:19:57 +010099#define TX_HDR_CONN_UPG 0x02000000 /* The "Upgrade" token was found in the "Connection" header */
Willy Tarreaufcffa692010-01-10 14:21:19 +0100100#define TX_WAIT_NEXT_RQ 0x04000000 /* waiting for the second request to start, use keep-alive timeout */
Willy Tarreau5b154472009-12-21 20:11:07 +0100101
Willy Tarreaubbf0b372010-01-18 16:54:40 +0100102#define TX_HDR_CONN_PRS 0x08000000 /* "connection" header already parsed (req or res), results below */
103#define TX_HDR_CONN_CLO 0x10000000 /* "Connection: close" was present at least once */
104#define TX_HDR_CONN_KAL 0x20000000 /* "Connection: keep-alive" was present at least once */
Willy Tarreau88d349d2010-01-25 12:15:43 +0100105#define TX_USE_PX_CONN 0x40000000 /* Use "Proxy-Connection" instead of "Connection" */
Willy Tarreaubbf0b372010-01-18 16:54:40 +0100106
Willy Tarreau92954fd2010-10-06 19:38:55 +0200107/* used only for keep-alive purposes, to indicate we're on a second transaction */
108#define TX_NOT_FIRST 0x80000000 /* the transaction is not the first one */
109/* no more room for transaction flags ! */
Willy Tarreaubbf0b372010-01-18 16:54:40 +0100110
Willy Tarreau8d5d7f22007-01-21 19:16:41 +0100111/* The HTTP parser is more complex than it looks like, because we have to
112 * support multi-line headers and any number of spaces between the colon and
113 * the value.
114 *
115 * All those examples must work :
116
117 Hdr1:val1\r\n
118 Hdr1: val1\r\n
119 Hdr1:\t val1\r\n
120 Hdr1: \r\n
121 val1\r\n
122 Hdr1:\r\n
123 val1\n
124 \tval2\r\n
125 val3\n
126
127 *
128 */
129
Willy Tarreaua36fc4d2012-02-17 17:39:37 +0100130/*
131 * HTTP message status flags (msg->flags)
132 */
Willy Tarreaua36fc4d2012-02-17 17:39:37 +0100133#define HTTP_MSGF_CNT_LEN 0x00000001 /* content-length was found in the message */
134#define HTTP_MSGF_TE_CHNK 0x00000002 /* transfer-encoding: chunked was found */
135
136/* if this flags is not set in either direction, we may be forced to complete a
137 * connection as a half-way tunnel (eg if no content-length appears in a 1.1
138 * response, but the request is correctly sized)
139 */
140#define HTTP_MSGF_XFER_LEN 0x00000004 /* message xfer size can be determined */
141#define HTTP_MSGF_VER_11 0x00000008 /* the message is HTTP/1.1 or above */
142
Willy Tarreau80a92c02014-03-12 10:41:13 +0100143/* If this flag is set, we don't process the body until the connect() is confirmed.
144 * This is only used by the request forwarding function to protect the buffer
145 * contents if something needs them during a redispatch.
146 */
147#define HTTP_MSGF_WAIT_CONN 0x00000010 /* Wait for connect() to be confirmed before processing body */
Christopher Fauletd7c91962015-04-30 11:48:27 +0200148#define HTTP_MSGF_COMPRESSING 0x00000020 /* data compression is in progress */
Willy Tarreaua36fc4d2012-02-17 17:39:37 +0100149
150
Willy Tarreau79da4692008-11-19 20:03:04 +0100151/* Redirect flags */
152enum {
153 REDIRECT_FLAG_NONE = 0,
154 REDIRECT_FLAG_DROP_QS = 1, /* drop query string */
Willy Tarreau81e3b4f2010-01-10 00:42:19 +0100155 REDIRECT_FLAG_APPEND_SLASH = 2, /* append a slash if missing at the end */
Willy Tarreau79da4692008-11-19 20:03:04 +0100156};
Willy Tarreaub463dfb2008-06-07 23:08:56 +0200157
158/* Redirect types (location, prefix, extended ) */
159enum {
160 REDIRECT_TYPE_NONE = 0, /* no redirection */
161 REDIRECT_TYPE_LOCATION, /* location redirect */
162 REDIRECT_TYPE_PREFIX, /* prefix redirect */
Willy Tarreau2e1dca82012-09-12 08:43:15 +0200163 REDIRECT_TYPE_SCHEME, /* scheme redirect (eg: switch from http to https) */
Willy Tarreaub463dfb2008-06-07 23:08:56 +0200164};
165
Cyril Bonté47fdd8e2010-04-25 00:00:51 +0200166/* Perist types (force-persist, ignore-persist) */
167enum {
168 PERSIST_TYPE_NONE = 0, /* no persistence */
169 PERSIST_TYPE_FORCE, /* force-persist */
170 PERSIST_TYPE_IGNORE, /* ignore-persist */
171};
172
Willy Tarreau5735d7e2013-12-07 00:18:34 +0100173enum ht_auth_m {
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +0100174 HTTP_AUTH_WRONG = -1, /* missing or unknown */
175 HTTP_AUTH_UNKNOWN = 0,
176 HTTP_AUTH_BASIC,
177 HTTP_AUTH_DIGEST,
Willy Tarreau5735d7e2013-12-07 00:18:34 +0100178} __attribute__((packed));
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +0100179
Willy Tarreau0b748332014-04-29 00:13:29 +0200180/* final results for http-request rules */
181enum rule_result {
182 HTTP_RULE_RES_CONT = 0, /* nothing special, continue rules evaluation */
Thierry FOURNIERbc4c1ac2015-02-25 13:36:14 +0100183 HTTP_RULE_RES_YIELD, /* call me later because some data is missing. */
Willy Tarreau0b748332014-04-29 00:13:29 +0200184 HTTP_RULE_RES_STOP, /* stopped processing on an accept */
185 HTTP_RULE_RES_DENY, /* deny (or tarpit if TX_CLTARPIT) */
186 HTTP_RULE_RES_ABRT, /* abort request, msg already sent (eg: auth) */
187 HTTP_RULE_RES_DONE, /* processing done, stop processing (eg: redirect) */
188 HTTP_RULE_RES_BADREQ, /* bad request */
189};
190
Willy Tarreau436d9ed2011-05-11 16:10:11 +0200191/*
192 * All implemented return codes
193 */
194enum {
Willy Tarreauae94d4d2011-05-11 16:28:49 +0200195 HTTP_ERR_200 = 0,
196 HTTP_ERR_400,
Willy Tarreau436d9ed2011-05-11 16:10:11 +0200197 HTTP_ERR_403,
CJ Ess108b1dd2015-04-07 12:03:37 -0400198 HTTP_ERR_405,
Willy Tarreau436d9ed2011-05-11 16:10:11 +0200199 HTTP_ERR_408,
Tim Duesterhuse2b10bf2018-04-27 21:18:46 +0200200 HTTP_ERR_421,
Olivier Houchard51a76d82017-10-02 16:12:07 +0200201 HTTP_ERR_425,
CJ Ess108b1dd2015-04-07 12:03:37 -0400202 HTTP_ERR_429,
Willy Tarreau436d9ed2011-05-11 16:10:11 +0200203 HTTP_ERR_500,
204 HTTP_ERR_502,
205 HTTP_ERR_503,
206 HTTP_ERR_504,
207 HTTP_ERR_SIZE
208};
209
Cyril Bonté19979e12012-04-04 12:57:21 +0200210/* status codes available for the stats admin page */
211enum {
212 STAT_STATUS_INIT = 0,
213 STAT_STATUS_DENY, /* action denied */
214 STAT_STATUS_DONE, /* the action is successful */
215 STAT_STATUS_ERRP, /* an error occured due to invalid values in parameters */
216 STAT_STATUS_EXCD, /* an error occured because the buffer couldn't store all data */
217 STAT_STATUS_NONE, /* nothing happened (no action chosen or servers state didn't change) */
218 STAT_STATUS_PART, /* the action is partially successful */
219 STAT_STATUS_UNKN, /* an unknown error occured, shouldn't happen */
220 STAT_STATUS_SIZE
221};
222
Lukas Tribus23953682017-04-28 13:24:30 +0000223/* This is an HTTP message, as described in RFC7230. It can be either a request
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100224 * message or a response message.
225 *
226 * The values there are a little bit obscure, because their meaning can change
Willy Tarreaubb2e6692014-07-10 19:06:10 +0200227 * during the parsing. Please read carefully doc/internal/body-parsing.txt if
228 * you need to manipulate them. Quick reminder :
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100229 *
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100230 * - eoh (End of Headers) : relative offset in the buffer of first byte that
231 * is not part of a completely processed header.
232 * During parsing, it points to last header seen
Willy Tarreaufa355d42009-11-29 18:12:29 +0100233 * for states after START. When in HTTP_MSG_BODY,
234 * eoh points to the first byte of the last CRLF
Willy Tarreauea1175a2012-03-05 15:52:30 +0100235 * preceeding data. Relative to buffer's origin.
Willy Tarreau0558a022014-03-13 15:48:45 +0100236 * This value then remains unchanged till the end
237 * so that we can rewind the buffer to change some
238 * headers if needed (eg: http-send-name-header).
239 *
Willy Tarreau877e78d2013-04-07 18:48:08 +0200240 * - sov (start of value) : Before HTTP_MSG_BODY, points to the value of
241 * the header being parsed. Starting from
242 * HTTP_MSG_BODY, will point to the start of the
Willy Tarreaubb2e6692014-07-10 19:06:10 +0200243 * body (relative to buffer's origin). It can be
244 * negative when forwarding data. It stops growing
245 * once data start to leave the buffer.
Willy Tarreau877e78d2013-04-07 18:48:08 +0200246 *
247 * - next (parse pointer) : next relative byte to be parsed. Always points
248 * to a byte matching the current state.
249 *
Willy Tarreau30fe8182015-05-01 23:14:54 +0200250 * - sol (start of line) : start of current line before MSG_BODY. Starting
Christopher Faulet113f7de2015-12-14 14:52:13 +0100251 * from MSG_BODY and until MSG_TRAILERS, contains
252 * the length of the last parsed chunk size so that
253 * when added to sov it always points to the
254 * beginning of the current data chunk.
255 * in MSG_TRAILERS state, it contains the length of
256 * the last parsed part of the trailer headers.
Willy Tarreau0558a022014-03-13 15:48:45 +0100257 *
258 * - eol (End of Line) : Before HTTP_MSG_BODY, relative offset in the
259 * buffer of the first byte which marks the end of
260 * the line current (LF or CRLF).
261 * From HTTP_MSG_BODY to the end, contains the
262 * length of the last CRLF (1 for a plain LF, or 2
263 * for a true CRLF). So eoh+eol always contain the
264 * exact size of the header size.
265 *
Willy Tarreauea1175a2012-03-05 15:52:30 +0100266 * Note that all offsets are relative to the origin of the buffer (buf->p)
267 * which always points to the beginning of the message (request or response).
268 * Since a message may not wrap, pointer computations may be one without any
269 * care for wrapping (no addition overflow nor subtract underflow).
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100270 */
271struct http_msg {
Willy Tarreau0da5b3b2017-09-21 09:30:46 +0200272 enum h1_state msg_state; /* where we are in the current message parsing */
273 enum h1_state err_state; /* the state where the parsing error was detected, only is MSG_ERROR */
Willy Tarreau3770f232013-12-07 00:01:53 +0100274 unsigned char flags; /* flags describing the message (HTTP version, ...) */
Willy Tarreau10e61cb2017-01-04 14:51:22 +0100275 /* 5 bytes unused here */
Willy Tarreau394db372012-10-12 22:40:39 +0200276 struct channel *chn; /* pointer to the channel transporting the message */
Willy Tarreaua458b672012-03-05 11:17:50 +0100277 unsigned int next; /* pointer to next byte to parse, relative to buf->p */
Willy Tarreaubb2e6692014-07-10 19:06:10 +0200278 int sov; /* current header: start of value ; data: start of body */
Willy Tarreaufa355d42009-11-29 18:12:29 +0100279 unsigned int eoh; /* End Of Headers, relative to buffer */
Willy Tarreau09d1e252012-05-18 22:36:34 +0200280 unsigned int sol; /* start of current line during parsing otherwise zero */
Willy Tarreau12e48b32012-03-05 16:57:34 +0100281 unsigned int eol; /* end of line */
Willy Tarreaufa355d42009-11-29 18:12:29 +0100282 int err_pos; /* err handling: -2=block, -1=pass, 0+=detected */
Willy Tarreau962c3f42010-01-10 00:15:35 +0100283 union { /* useful start line pointers, relative to ->sol */
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100284 struct {
matt.farnsworth@nokia.com1c2ab962008-04-14 20:47:37 +0200285 int l; /* request line length (not including CR) */
Willy Tarreau26927362012-05-18 23:22:52 +0200286 int m_l; /* METHOD length (method starts at buf->p) */
matt.farnsworth@nokia.com1c2ab962008-04-14 20:47:37 +0200287 int u, u_l; /* URI, length */
288 int v, v_l; /* VERSION, length */
289 } rq; /* request line : field, length */
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100290 struct {
matt.farnsworth@nokia.com1c2ab962008-04-14 20:47:37 +0200291 int l; /* status line length (not including CR) */
Willy Tarreau26927362012-05-18 23:22:52 +0200292 int v_l; /* VERSION length (version starts at buf->p) */
matt.farnsworth@nokia.com1c2ab962008-04-14 20:47:37 +0200293 int c, c_l; /* CODE, length */
294 int r, r_l; /* REASON, length */
295 } st; /* status line : field, length */
296 } sl; /* start line */
Willy Tarreau124d9912011-03-01 20:30:48 +0100297 unsigned long long chunk_len; /* cache for last chunk size or content-length header value */
298 unsigned long long body_len; /* total known length of the body, excluding encoding */
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100299};
300
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +0100301struct http_auth_data {
Willy Tarreau5735d7e2013-12-07 00:18:34 +0100302 enum ht_auth_m method; /* one of HTTP_AUTH_* */
303 /* 7 bytes unused here */
Willy Tarreau83061a82018-07-13 11:56:34 +0200304 struct buffer method_data; /* points to the creditial part from 'Authorization:' header */
Willy Tarreau5735d7e2013-12-07 00:18:34 +0100305 char *user, *pass; /* extracted username & password */
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +0100306};
307
William Lallemand73025dd2014-04-24 14:38:37 +0200308struct proxy;
309struct http_txn;
Willy Tarreau87b09662015-04-03 00:22:06 +0200310struct stream;
William Lallemand73025dd2014-04-24 14:38:37 +0200311
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100312/* This is an HTTP transaction. It contains both a request message and a
313 * response message (which can be empty).
314 */
315struct http_txn {
Willy Tarreauac1932d2011-10-24 19:14:41 +0200316 struct hdr_idx hdr_idx; /* array of header indexes (max: global.tune.max_http_hdr) */
Willy Tarreau520bbb22010-01-10 11:31:22 +0100317 struct http_msg rsp; /* HTTP response message */
Willy Tarreauc8987b32013-12-06 23:43:17 +0100318 struct http_msg req; /* HTTP request message */
319 unsigned int flags; /* transaction flags */
320 enum http_meth_t meth; /* HTTP method */
321 /* 1 unused byte here */
322 short status; /* HTTP status from the server, negative if from proxy */
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100323
William Lallemandf528fff2017-11-23 19:43:17 +0100324 char cache_hash[20]; /* Store the cache hash */
Willy Tarreau520bbb22010-01-10 11:31:22 +0100325 char *uri; /* first line if log needed, NULL otherwise */
326 char *cli_cookie; /* cookie presented by the client, in capture mode */
327 char *srv_cookie; /* cookie presented by the server, in capture mode */
Willy Tarreauf64d1412010-10-07 20:06:11 +0200328 int cookie_first_date; /* if non-zero, first date the expirable cookie was set/seen */
329 int cookie_last_date; /* if non-zero, last date the expirable cookie was set/seen */
Willy Tarreau520bbb22010-01-10 11:31:22 +0100330
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +0100331 struct http_auth_data auth; /* HTTP auth data */
Willy Tarreau3bac9ff2007-03-18 17:31:28 +0100332};
333
William Lallemand73025dd2014-04-24 14:38:37 +0200334
Willy Tarreau33a7e692007-06-10 19:45:56 +0200335/* This structure is used by http_find_header() to return values of headers.
Willy Tarreau588bd4f2011-09-01 22:22:28 +0200336 * The header starts at <line>, the value (excluding leading and trailing white
337 * spaces) at <line>+<val> for <vlen> bytes, followed by optional <tws> trailing
338 * white spaces, and sets <line>+<del> to point to the last delimitor (colon or
339 * comma) before this value. <prev> points to the index of the header whose next
340 * is this one.
Willy Tarreau33a7e692007-06-10 19:45:56 +0200341 */
342struct hdr_ctx {
Willy Tarreau68085d82010-01-18 14:54:04 +0100343 char *line;
Willy Tarreau33a7e692007-06-10 19:45:56 +0200344 int idx;
Willy Tarreau588bd4f2011-09-01 22:22:28 +0200345 int val; /* relative to line, may skip some leading white spaces */
346 int vlen; /* relative to line+val, stops before trailing white spaces */
347 int tws; /* added to vlen if some trailing white spaces are present */
Willy Tarreau68085d82010-01-18 14:54:04 +0100348 int del; /* relative to line */
349 int prev; /* index of previous header */
Willy Tarreau33a7e692007-06-10 19:45:56 +0200350};
Willy Tarreau58f10d72006-12-04 02:26:12 +0100351
Thierry FOURNIERd4373142013-12-17 01:10:10 +0100352struct http_method_name {
353 char *name;
354 int len;
355};
356
Thierry FOURNIER36481b82015-08-19 09:01:53 +0200357extern struct action_kw_list http_req_keywords;
358extern struct action_kw_list http_res_keywords;
William Lallemand73025dd2014-04-24 14:38:37 +0200359
Thierry FOURNIERd4373142013-12-17 01:10:10 +0100360extern const struct http_method_name http_known_methods[HTTP_METH_OTHER];
361
Willy Tarreaubafbe012017-11-24 17:34:44 +0100362extern struct pool_head *pool_head_http_txn;
Willy Tarreaueee5b512015-04-03 23:46:31 +0200363
Willy Tarreaubaaee002006-06-26 02:48:02 +0200364#endif /* _TYPES_PROTO_HTTP_H */
365
366/*
367 * Local variables:
368 * c-indent-level: 8
369 * c-basic-offset: 8
370 * End:
371 */