blob: 50f1936842094b42f5178781f8ea11183e4fe7a0 [file] [log] [blame]
Willy Tarreaudd815982007-10-16 12:25:14 +02001/*
Willy Tarreaud1d54542012-09-12 22:58:11 +02002 * include/types/listener.h
3 * This file defines the structures needed to manage listeners.
Willy Tarreaube58c382011-07-24 18:28:10 +02004 *
Willy Tarreaud1d54542012-09-12 22:58:11 +02005 * Copyright (C) 2000-2012 Willy Tarreau - w@1wt.eu
Willy Tarreaube58c382011-07-24 18:28:10 +02006 *
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation, version 2.1
10 * exclusively.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
Willy Tarreaudd815982007-10-16 12:25:14 +020021
Willy Tarreaud1d54542012-09-12 22:58:11 +020022#ifndef _TYPES_LISTENER_H
23#define _TYPES_LISTENER_H
Willy Tarreaudd815982007-10-16 12:25:14 +020024
25#include <sys/types.h>
26#include <sys/socket.h>
27
Emeric Brun0b8d4d92012-05-18 15:46:21 +020028#ifdef USE_OPENSSL
29#include <openssl/ssl.h>
Emmanuel Hocdet5db33cb2017-03-30 19:19:37 +020030#include <types/ssl_sock.h>
Emeric Brun0b8d4d92012-05-18 15:46:21 +020031#endif
32
Willy Tarreaudd815982007-10-16 12:25:14 +020033#include <common/config.h>
34#include <common/mini-clist.h>
Christopher Faulet8d8aa0d2017-05-30 15:36:50 +020035#include <common/hathreads.h>
Christopher Fauletc644fa92017-11-23 22:44:11 +010036#include <common/standard.h>
Christopher Faulet8d8aa0d2017-05-30 15:36:50 +020037
Willy Tarreau3fdb3662012-11-12 00:42:33 +010038#include <types/obj_type.h>
Willy Tarreau45cb4fb2009-10-26 21:10:04 +010039#include <eb32tree.h>
Willy Tarreaudd815982007-10-16 12:25:14 +020040
Willy Tarreaud1d54542012-09-12 22:58:11 +020041/* Some pointer types reference below */
42struct task;
43struct protocol;
Willy Tarreauf7bc57c2012-10-03 00:19:48 +020044struct xprt_ops;
Willy Tarreaud1d54542012-09-12 22:58:11 +020045struct proxy;
Willy Tarreauae9bea02016-11-25 14:44:52 +010046struct fe_counters;
Willy Tarreaudd815982007-10-16 12:25:14 +020047
Willy Tarreaudd815982007-10-16 12:25:14 +020048/* listener state */
Willy Tarreauf6502c52013-12-06 21:18:49 +010049enum li_state {
Willy Tarreaube58c382011-07-24 18:28:10 +020050 LI_NEW = 0, /* not initialized yet */
51 LI_INIT, /* all parameters filled in, but not assigned yet */
52 LI_ASSIGNED, /* assigned to the protocol, but not listening yet */
53 LI_PAUSED, /* listener was paused, it's bound but not listening */
Olivier Houchard1fc05162017-04-06 01:05:05 +020054 LI_ZOMBIE, /* The listener doesn't belong to the process, but is kept opened */
Willy Tarreaube58c382011-07-24 18:28:10 +020055 LI_LISTEN, /* started, listening but not enabled */
56 LI_READY, /* started, listening and enabled */
57 LI_FULL, /* reached its connection limit */
Willy Tarreaue6ca1fc2011-07-24 22:03:52 +020058 LI_LIMITED, /* transient state: limits have been reached, listener is queued */
Willy Tarreauf6502c52013-12-06 21:18:49 +010059} __attribute__((packed));
Willy Tarreaudabf2e22007-10-28 21:59:24 +010060
61/* Listener transitions
62 * calloc() set() add_listener() bind()
63 * -------> NEW ----> INIT ----------> ASSIGNED -----> LISTEN
64 * <------- <---- <---------- <-----
65 * free() bzero() del_listener() unbind()
66 *
67 * The file descriptor is valid only during these three states :
68 *
69 * disable()
70 * LISTEN <------------ READY
71 * A| ------------> |A
72 * || !max & enable() ||
73 * || ||
74 * || max ||
75 * || max & enable() V| !max
76 * |+---------------> FULL
77 * +-----------------
78 * disable()
79 *
Willy Tarreaue6ca1fc2011-07-24 22:03:52 +020080 * The LIMITED state my be used when a limit has been detected just before
81 * using a listener. In this case, the listener MUST be queued into the
82 * appropriate wait queue (either the proxy's or the global one). It may be
83 * set back to the READY state at any instant and for any reason, so one must
84 * not rely on this state.
Willy Tarreaudabf2e22007-10-28 21:59:24 +010085 */
Willy Tarreaudd815982007-10-16 12:25:14 +020086
Willy Tarreau6fb42e02007-10-28 17:02:33 +010087/* listener socket options */
Willy Tarreau7d9736f2016-10-21 16:34:21 +020088#define LI_O_NONE 0x0000
89#define LI_O_NOLINGER 0x0001 /* disable linger on this socket */
90#define LI_O_FOREIGN 0x0002 /* permit listening on foreing addresses ("transparent") */
91#define LI_O_NOQUICKACK 0x0004 /* disable quick ack of immediate data (linux) */
92#define LI_O_DEF_ACCEPT 0x0008 /* wait up to 1 second for data before accepting */
93#define LI_O_TCP_L4_RULES 0x0010 /* run TCP L4 rules checks on the incoming connection */
Willy Tarreau620408f2016-10-21 16:37:51 +020094#define LI_O_TCP_L5_RULES 0x0020 /* run TCP L5 rules checks on the incoming session */
Willy Tarreau7d9736f2016-10-21 16:34:21 +020095#define LI_O_CHK_MONNET 0x0040 /* check the source against a monitor-net rule */
96#define LI_O_ACC_PROXY 0x0080 /* find the proxied address in the first request line */
97#define LI_O_UNLIMITED 0x0100 /* listener not subject to global limits (peers & stats socket) */
98#define LI_O_TCP_FO 0x0200 /* enable TCP Fast Open (linux >= 3.7) */
99#define LI_O_V6ONLY 0x0400 /* bind to IPv6 only on Linux >= 2.4.21 */
100#define LI_O_V4V6 0x0800 /* bind to IPv4/IPv6 on Linux >= 2.4.21 */
101#define LI_O_ACC_CIP 0x1000 /* find the proxied address in the NetScaler Client IP header */
William Lallemand75ea0a02017-11-15 19:02:58 +0100102#define LI_O_INHERITED 0x2000 /* inherited FD from the parent process (fd@) */
William Lallemande22f11f2018-09-11 10:06:27 +0200103#define LI_O_MWORKER 0x4000 /* keep the FD open in the master but close it in the children */
Willy Tarreau3c63fd82011-09-07 18:00:47 +0200104
105/* Note: if a listener uses LI_O_UNLIMITED, it is highly recommended that it adds its own
106 * maxconn setting to the global.maxsock value so that its resources are reserved.
107 */
Willy Tarreau6fb42e02007-10-28 17:02:33 +0100108
Emeric Brun89675492012-10-05 13:48:26 +0200109#ifdef USE_OPENSSL
Emeric Brun89675492012-10-05 13:48:26 +0200110#define BC_SSL_O_NONE 0x0000
Emeric Brun89675492012-10-05 13:48:26 +0200111#define BC_SSL_O_NO_TLS_TICKETS 0x0100 /* disable session resumption tickets */
Lukas Tribus53ae85c2017-05-04 15:45:40 +0000112#define BC_SSL_O_PREF_CLIE_CIPH 0x0200 /* prefer client ciphers */
Emeric Brun89675492012-10-05 13:48:26 +0200113#endif
114
Emmanuel Hocdet98263292016-12-29 18:26:15 +0100115/* ssl "bind" settings */
116struct ssl_bind_conf {
Willy Tarreauf5ae8f72012-09-07 16:58:00 +0200117#ifdef USE_OPENSSL
Emmanuel Hocdet98263292016-12-29 18:26:15 +0100118#ifdef OPENSSL_NPN_NEGOTIATED
119 char *npn_str; /* NPN protocol string */
120 int npn_len; /* NPN protocol string length */
121#endif
122#ifdef TLSEXT_TYPE_application_layer_protocol_negotiation
123 char *alpn_str; /* ALPN protocol string */
124 int alpn_len; /* ALPN protocol string length */
125#endif
Emmanuel Hocdet174dfe52017-07-28 15:01:05 +0200126 int verify:3; /* verify method (set of SSL_VERIFY_* flags) */
127 int no_ca_names:1; /* do not send ca names to clients (ca_file related) */
Olivier Houchardc2aae742017-09-22 18:26:28 +0200128 int early_data:1; /* early data allowed */
Emeric Brunfb510ea2012-10-05 12:00:26 +0200129 char *ca_file; /* CAfile to use on verify */
Emeric Brunfb510ea2012-10-05 12:00:26 +0200130 char *crl_file; /* CRLfile to use on verify */
Emmanuel Hocdet98263292016-12-29 18:26:15 +0100131 char *ciphers; /* cipher suite to use if non-null */
Dirkjan Bussink415150f2018-09-14 11:14:21 +0200132#if (OPENSSL_VERSION_NUMBER >= 0x10101000L && !defined OPENSSL_IS_BORINGSSL && !defined LIBRESSL_VERSION_NUMBER)
133 char *ciphersuites; /* TLS 1.3 cipher suite to use if non-null */
134#endif
Emmanuel Hocdete7f2b732017-01-09 16:15:54 +0100135 char *curves; /* curves suite to use for ECDHE */
Emeric Brun2b58d042012-09-20 17:10:03 +0200136 char *ecdhe; /* named curve to use for ECDHE */
Emmanuel Hocdetdf701a22017-05-18 12:46:50 +0200137 struct tls_version_filter ssl_methods; /* ssl methods */
Emmanuel Hocdet98263292016-12-29 18:26:15 +0100138#endif
139};
140
141/* "bind" line settings */
142struct bind_conf {
143#ifdef USE_OPENSSL
144 struct ssl_bind_conf ssl_conf; /* ssl conf for ctx setting */
145 unsigned long long ca_ignerr; /* ignored verify errors in handshake if depth > 0 */
146 unsigned long long crt_ignerr; /* ignored verify errors in handshake if depth == 0 */
Emmanuel Hocdetf6b37c62017-03-06 15:34:44 +0100147 SSL_CTX *initial_ctx; /* SSL context for initial negotiation */
Emeric Brunfc0421f2012-09-07 17:30:07 +0200148 SSL_CTX *default_ctx; /* SSL context of first/default certificate */
Emmanuel Hocdet98263292016-12-29 18:26:15 +0100149 struct ssl_bind_conf *default_ssl_conf; /* custom SSL conf of default_ctx */
Emmanuel Hocdet65623372013-01-24 17:17:15 +0100150 int strict_sni; /* refuse negotiation if sni doesn't match a certificate */
Emmanuel Hocdet4608ed92017-01-20 13:06:27 +0100151 int ssl_options; /* ssl options */
Emeric Brunfc0421f2012-09-07 17:30:07 +0200152 struct eb_root sni_ctx; /* sni_ctx tree of all known certs full-names sorted by name */
153 struct eb_root sni_w_ctx; /* sni_ctx tree of all known certs wildcards sorted by name */
Nenad Merdanovic146defa2015-05-09 08:46:00 +0200154 struct tls_keys_ref *keys_ref; /* TLS ticket keys reference */
Christopher Faulet31af49d2015-06-09 17:29:50 +0200155
156 char *ca_sign_file; /* CAFile used to generate and sign server certificates */
157 char *ca_sign_pass; /* CAKey passphrase */
158
159 X509 *ca_sign_cert; /* CA certificate referenced by ca_file */
160 EVP_PKEY *ca_sign_pkey; /* CA private key referenced by ca_key */
Willy Tarreauf5ae8f72012-09-07 16:58:00 +0200161#endif
Willy Tarreauc95bad52016-12-22 00:13:31 +0100162 struct proxy *frontend; /* the frontend all these listeners belong to, or NULL */
Christopher Fauleta717b992018-04-10 14:43:00 +0200163 struct mux_proto_list *mux_proto; /* the mux to use for all incoming connections (specified by the "proto" keyword) */
Willy Tarreau71a8c7c2016-12-21 22:04:54 +0100164 struct xprt_ops *xprt; /* transport-layer operations for all listeners */
Willy Tarreau2a65ff02012-09-13 17:54:29 +0200165 int is_ssl; /* SSL is required for these listeners */
Christopher Faulet31af49d2015-06-09 17:29:50 +0200166 int generate_certs; /* 1 if generate-certificates option is set, else 0 */
Willy Tarreau6ae1ba62014-05-07 19:01:58 +0200167 unsigned long bind_proc; /* bitmask of processes allowed to use these listeners */
Christopher Fauletc644fa92017-11-23 22:44:11 +0100168 unsigned long bind_thread[LONGBITS]; /* bitmask of threads (per processes) allowed to use these listeners */
Willy Tarreau290e63a2012-09-20 18:07:14 +0200169 struct { /* UNIX socket permissions */
170 uid_t uid; /* -1 to leave unchanged */
171 gid_t gid; /* -1 to leave unchanged */
172 mode_t mode; /* 0 to leave unchanged */
173 } ux;
174 int level; /* stats access level (ACCESS_LVL_*) */
Andjelko Iharosc4df59e2017-07-20 11:59:48 +0200175 int severity_output; /* default severity output format in cli feedback messages */
Willy Tarreauf5ae8f72012-09-07 16:58:00 +0200176 struct list by_fe; /* next binding for the same frontend, or NULL */
Willy Tarreau4348fad2012-09-20 16:48:07 +0200177 struct list listeners; /* list of listeners using this bind config */
Bertrand Jacquin93b227d2016-06-04 15:11:10 +0100178 uint32_t ns_cip_magic; /* Excepted NetScaler Client IP magic number */
Willy Tarreauf5ae8f72012-09-07 16:58:00 +0200179 char *arg; /* argument passed to "bind" for better error reporting */
180 char *file; /* file where the section appears */
181 int line; /* line where the section appears */
182};
183
Willy Tarreaudd815982007-10-16 12:25:14 +0200184/* The listener will be directly referenced by the fdtab[] which holds its
185 * socket. The listener provides the protocol-specific accept() function to
186 * the fdtab.
187 */
188struct listener {
Willy Tarreau3fdb3662012-11-12 00:42:33 +0100189 enum obj_type obj_type; /* object type = OBJ_TYPE_LISTENER */
Willy Tarreauf6502c52013-12-06 21:18:49 +0100190 enum li_state state; /* state: NEW, INIT, ASSIGNED, LISTEN, READY, FULL */
191 short int nice; /* nice value to assign to the instanciated tasks */
Willy Tarreaudd815982007-10-16 12:25:14 +0200192 int fd; /* the listen socket */
Willy Tarreauf6502c52013-12-06 21:18:49 +0100193 char *name; /* listener's name */
Krzysztof Piotr Oledzki052d4fd2009-10-04 14:52:57 +0200194 int luid; /* listener universally unique ID, used for SNMP */
Willy Tarreau6fb42e02007-10-28 17:02:33 +0100195 int options; /* socket options : LI_O_* */
Willy Tarreauae9bea02016-11-25 14:44:52 +0100196 struct fe_counters *counters; /* statistics counters */
Willy Tarreaudd815982007-10-16 12:25:14 +0200197 struct protocol *proto; /* protocol this listener belongs to */
198 int nbconn; /* current number of connections on this listener */
199 int maxconn; /* maximum connections allowed on this listener */
Willy Tarreauc73ce2b2008-01-06 10:55:10 +0100200 unsigned int backlog; /* if set, listen backlog */
Willy Tarreau16a21472012-11-19 12:39:59 +0100201 unsigned int maxaccept; /* if set, max number of connections accepted at once */
Willy Tarreaudd815982007-10-16 12:25:14 +0200202 struct list proto_list; /* list in the protocol header */
Willy Tarreaueb472682010-05-28 18:46:57 +0200203 int (*accept)(struct listener *l, int fd, struct sockaddr_storage *addr); /* upper layer's accept() */
Willy Tarreau10b688f2015-03-13 16:43:12 +0100204 enum obj_type *default_target; /* default target to use for accepted sessions or NULL */
Willy Tarreaue6ca1fc2011-07-24 22:03:52 +0200205 struct list wait_queue; /* link element to make the listener wait for something (LI_LIMITED) */
Willy Tarreau3bc13772008-12-07 11:50:35 +0100206 unsigned int analysers; /* bitmap of required protocol analysers */
Willy Tarreaube1b9182009-06-14 18:48:19 +0200207 int maxseg; /* for TCP, advertised MSS */
Willy Tarreau2af207a2015-02-04 00:45:58 +0100208 int tcp_ut; /* for TCP, user timeout */
Willy Tarreauf6502c52013-12-06 21:18:49 +0100209 char *interface; /* interface name or NULL */
Willy Tarreau90a570f2009-10-04 20:54:54 +0200210
Christopher Faulet9dcf9b62017-11-13 10:34:01 +0100211 __decl_hathreads(HA_SPINLOCK_T lock);
Christopher Faulet8d8aa0d2017-05-30 15:36:50 +0200212
KOVACS Krisztianb3e54fe2014-11-17 15:11:45 +0100213 const struct netns_entry *netns; /* network namespace of the listener*/
214
Willy Tarreau4348fad2012-09-20 16:48:07 +0200215 struct list by_fe; /* chaining in frontend's list of listeners */
216 struct list by_bind; /* chaining in bind_conf's list of listeners */
Willy Tarreau2a65ff02012-09-13 17:54:29 +0200217 struct bind_conf *bind_conf; /* "bind" line settings, include SSL settings among other things */
Willy Tarreauf5ae8f72012-09-07 16:58:00 +0200218
Willy Tarreau7b815632011-10-21 18:51:57 +0200219 /* warning: this struct is huge, keep it at the bottom */
220 struct sockaddr_storage addr; /* the address we listen to */
Willy Tarreau90a570f2009-10-04 20:54:54 +0200221 struct {
Willy Tarreau53fb4ae2009-10-04 23:04:08 +0200222 struct eb32_node id; /* place in the tree of used IDs */
Willy Tarreau90a570f2009-10-04 20:54:54 +0200223 } conf; /* config information */
Willy Tarreaudd815982007-10-16 12:25:14 +0200224};
225
Willy Tarreau26982662012-09-12 23:17:10 +0200226/* Descriptor for a "bind" keyword. The ->parse() function returns 0 in case of
227 * success, or a combination of ERR_* flags if an error is encountered. The
228 * function pointer can be NULL if not implemented. The function also has an
Willy Tarreau4348fad2012-09-20 16:48:07 +0200229 * access to the current "bind" config line. The ->skip value tells the parser
230 * how many words have to be skipped after the keyword.
Willy Tarreau26982662012-09-12 23:17:10 +0200231 */
232struct bind_kw {
233 const char *kw;
Willy Tarreau4348fad2012-09-20 16:48:07 +0200234 int (*parse)(char **args, int cur_arg, struct proxy *px, struct bind_conf *conf, char **err);
Willy Tarreau26982662012-09-12 23:17:10 +0200235 int skip; /* nb of args to skip */
236};
Emmanuel Hocdet98263292016-12-29 18:26:15 +0100237struct ssl_bind_kw {
238 const char *kw;
239 int (*parse)(char **args, int cur_arg, struct proxy *px, struct ssl_bind_conf *conf, char **err);
240 int skip; /* nb of args to skip */
241};
Willy Tarreau26982662012-09-12 23:17:10 +0200242
243/*
244 * A keyword list. It is a NULL-terminated array of keywords. It embeds a
245 * struct list in order to be linked to other lists, allowing it to easily
246 * be declared where it is needed, and linked without duplicating data nor
Willy Tarreau51fb7652012-09-18 18:24:39 +0200247 * allocating memory. It is also possible to indicate a scope for the keywords.
Willy Tarreau26982662012-09-12 23:17:10 +0200248 */
249struct bind_kw_list {
Willy Tarreau51fb7652012-09-18 18:24:39 +0200250 const char *scope;
Willy Tarreau26982662012-09-12 23:17:10 +0200251 struct list list;
252 struct bind_kw kw[VAR_ARRAY];
253};
254
255
Olivier Houchardf73629d2017-04-05 22:33:04 +0200256struct xfer_sock_list {
257 int fd;
258 char *iface;
259 char *namespace;
260 int options; /* socket options LI_O_* */
261 struct xfer_sock_list *prev;
262 struct xfer_sock_list *next;
263 struct sockaddr_storage addr;
264};
265
Willy Tarreaud1d54542012-09-12 22:58:11 +0200266#endif /* _TYPES_LISTENER_H */
Willy Tarreaudd815982007-10-16 12:25:14 +0200267
268/*
269 * Local variables:
270 * c-indent-level: 8
271 * c-basic-offset: 8
272 * End:
273 */