blob: 545f88c450a5d51906b5efdbc6ef7d24dd5886e6 [file] [log] [blame]
Willy Tarreaudd815982007-10-16 12:25:14 +02001/*
Willy Tarreaud1d54542012-09-12 22:58:11 +02002 * include/types/listener.h
3 * This file defines the structures needed to manage listeners.
Willy Tarreaube58c382011-07-24 18:28:10 +02004 *
Willy Tarreaud1d54542012-09-12 22:58:11 +02005 * Copyright (C) 2000-2012 Willy Tarreau - w@1wt.eu
Willy Tarreaube58c382011-07-24 18:28:10 +02006 *
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation, version 2.1
10 * exclusively.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
Willy Tarreaudd815982007-10-16 12:25:14 +020021
Willy Tarreaud1d54542012-09-12 22:58:11 +020022#ifndef _TYPES_LISTENER_H
23#define _TYPES_LISTENER_H
Willy Tarreaudd815982007-10-16 12:25:14 +020024
25#include <sys/types.h>
26#include <sys/socket.h>
27
Emeric Brun0b8d4d92012-05-18 15:46:21 +020028#ifdef USE_OPENSSL
29#include <openssl/ssl.h>
Emmanuel Hocdet5db33cb2017-03-30 19:19:37 +020030#include <types/ssl_sock.h>
Emeric Brun0b8d4d92012-05-18 15:46:21 +020031#endif
32
Willy Tarreaudd815982007-10-16 12:25:14 +020033#include <common/config.h>
34#include <common/mini-clist.h>
Christopher Faulet8d8aa0d2017-05-30 15:36:50 +020035#include <common/hathreads.h>
36
Willy Tarreau3fdb3662012-11-12 00:42:33 +010037#include <types/obj_type.h>
Willy Tarreau45cb4fb2009-10-26 21:10:04 +010038#include <eb32tree.h>
Willy Tarreaudd815982007-10-16 12:25:14 +020039
Willy Tarreaud1d54542012-09-12 22:58:11 +020040/* Some pointer types reference below */
41struct task;
42struct protocol;
Willy Tarreauf7bc57c2012-10-03 00:19:48 +020043struct xprt_ops;
Willy Tarreaud1d54542012-09-12 22:58:11 +020044struct proxy;
Willy Tarreauae9bea02016-11-25 14:44:52 +010045struct fe_counters;
Willy Tarreaudd815982007-10-16 12:25:14 +020046
Willy Tarreaudd815982007-10-16 12:25:14 +020047/* listener state */
Willy Tarreauf6502c52013-12-06 21:18:49 +010048enum li_state {
Willy Tarreaube58c382011-07-24 18:28:10 +020049 LI_NEW = 0, /* not initialized yet */
50 LI_INIT, /* all parameters filled in, but not assigned yet */
51 LI_ASSIGNED, /* assigned to the protocol, but not listening yet */
52 LI_PAUSED, /* listener was paused, it's bound but not listening */
Olivier Houchard1fc05162017-04-06 01:05:05 +020053 LI_ZOMBIE, /* The listener doesn't belong to the process, but is kept opened */
Willy Tarreaube58c382011-07-24 18:28:10 +020054 LI_LISTEN, /* started, listening but not enabled */
55 LI_READY, /* started, listening and enabled */
56 LI_FULL, /* reached its connection limit */
Willy Tarreaue6ca1fc2011-07-24 22:03:52 +020057 LI_LIMITED, /* transient state: limits have been reached, listener is queued */
Willy Tarreauf6502c52013-12-06 21:18:49 +010058} __attribute__((packed));
Willy Tarreaudabf2e22007-10-28 21:59:24 +010059
60/* Listener transitions
61 * calloc() set() add_listener() bind()
62 * -------> NEW ----> INIT ----------> ASSIGNED -----> LISTEN
63 * <------- <---- <---------- <-----
64 * free() bzero() del_listener() unbind()
65 *
66 * The file descriptor is valid only during these three states :
67 *
68 * disable()
69 * LISTEN <------------ READY
70 * A| ------------> |A
71 * || !max & enable() ||
72 * || ||
73 * || max ||
74 * || max & enable() V| !max
75 * |+---------------> FULL
76 * +-----------------
77 * disable()
78 *
Willy Tarreaue6ca1fc2011-07-24 22:03:52 +020079 * The LIMITED state my be used when a limit has been detected just before
80 * using a listener. In this case, the listener MUST be queued into the
81 * appropriate wait queue (either the proxy's or the global one). It may be
82 * set back to the READY state at any instant and for any reason, so one must
83 * not rely on this state.
Willy Tarreaudabf2e22007-10-28 21:59:24 +010084 */
Willy Tarreaudd815982007-10-16 12:25:14 +020085
Willy Tarreau6fb42e02007-10-28 17:02:33 +010086/* listener socket options */
Willy Tarreau7d9736f2016-10-21 16:34:21 +020087#define LI_O_NONE 0x0000
88#define LI_O_NOLINGER 0x0001 /* disable linger on this socket */
89#define LI_O_FOREIGN 0x0002 /* permit listening on foreing addresses ("transparent") */
90#define LI_O_NOQUICKACK 0x0004 /* disable quick ack of immediate data (linux) */
91#define LI_O_DEF_ACCEPT 0x0008 /* wait up to 1 second for data before accepting */
92#define LI_O_TCP_L4_RULES 0x0010 /* run TCP L4 rules checks on the incoming connection */
Willy Tarreau620408f2016-10-21 16:37:51 +020093#define LI_O_TCP_L5_RULES 0x0020 /* run TCP L5 rules checks on the incoming session */
Willy Tarreau7d9736f2016-10-21 16:34:21 +020094#define LI_O_CHK_MONNET 0x0040 /* check the source against a monitor-net rule */
95#define LI_O_ACC_PROXY 0x0080 /* find the proxied address in the first request line */
96#define LI_O_UNLIMITED 0x0100 /* listener not subject to global limits (peers & stats socket) */
97#define LI_O_TCP_FO 0x0200 /* enable TCP Fast Open (linux >= 3.7) */
98#define LI_O_V6ONLY 0x0400 /* bind to IPv6 only on Linux >= 2.4.21 */
99#define LI_O_V4V6 0x0800 /* bind to IPv4/IPv6 on Linux >= 2.4.21 */
100#define LI_O_ACC_CIP 0x1000 /* find the proxied address in the NetScaler Client IP header */
Willy Tarreau3c63fd82011-09-07 18:00:47 +0200101
102/* Note: if a listener uses LI_O_UNLIMITED, it is highly recommended that it adds its own
103 * maxconn setting to the global.maxsock value so that its resources are reserved.
104 */
Willy Tarreau6fb42e02007-10-28 17:02:33 +0100105
Emeric Brun89675492012-10-05 13:48:26 +0200106#ifdef USE_OPENSSL
Emeric Brun89675492012-10-05 13:48:26 +0200107#define BC_SSL_O_NONE 0x0000
Emeric Brun89675492012-10-05 13:48:26 +0200108#define BC_SSL_O_NO_TLS_TICKETS 0x0100 /* disable session resumption tickets */
Lukas Tribus53ae85c2017-05-04 15:45:40 +0000109#define BC_SSL_O_PREF_CLIE_CIPH 0x0200 /* prefer client ciphers */
Emeric Brun89675492012-10-05 13:48:26 +0200110#endif
111
Emmanuel Hocdet98263292016-12-29 18:26:15 +0100112/* ssl "bind" settings */
113struct ssl_bind_conf {
Willy Tarreauf5ae8f72012-09-07 16:58:00 +0200114#ifdef USE_OPENSSL
Emmanuel Hocdet98263292016-12-29 18:26:15 +0100115#ifdef OPENSSL_NPN_NEGOTIATED
116 char *npn_str; /* NPN protocol string */
117 int npn_len; /* NPN protocol string length */
118#endif
119#ifdef TLSEXT_TYPE_application_layer_protocol_negotiation
120 char *alpn_str; /* ALPN protocol string */
121 int alpn_len; /* ALPN protocol string length */
122#endif
Emmanuel Hocdet174dfe52017-07-28 15:01:05 +0200123 int verify:3; /* verify method (set of SSL_VERIFY_* flags) */
124 int no_ca_names:1; /* do not send ca names to clients (ca_file related) */
Olivier Houchardc2aae742017-09-22 18:26:28 +0200125 int early_data:1; /* early data allowed */
Emeric Brunfb510ea2012-10-05 12:00:26 +0200126 char *ca_file; /* CAfile to use on verify */
Emeric Brunfb510ea2012-10-05 12:00:26 +0200127 char *crl_file; /* CRLfile to use on verify */
Emmanuel Hocdet98263292016-12-29 18:26:15 +0100128 char *ciphers; /* cipher suite to use if non-null */
Emmanuel Hocdete7f2b732017-01-09 16:15:54 +0100129 char *curves; /* curves suite to use for ECDHE */
Emeric Brun2b58d042012-09-20 17:10:03 +0200130 char *ecdhe; /* named curve to use for ECDHE */
Emmanuel Hocdetdf701a22017-05-18 12:46:50 +0200131 struct tls_version_filter ssl_methods; /* ssl methods */
Emmanuel Hocdet98263292016-12-29 18:26:15 +0100132#endif
133};
134
135/* "bind" line settings */
136struct bind_conf {
137#ifdef USE_OPENSSL
138 struct ssl_bind_conf ssl_conf; /* ssl conf for ctx setting */
139 unsigned long long ca_ignerr; /* ignored verify errors in handshake if depth > 0 */
140 unsigned long long crt_ignerr; /* ignored verify errors in handshake if depth == 0 */
Emmanuel Hocdetf6b37c62017-03-06 15:34:44 +0100141 SSL_CTX *initial_ctx; /* SSL context for initial negotiation */
Emeric Brunfc0421f2012-09-07 17:30:07 +0200142 SSL_CTX *default_ctx; /* SSL context of first/default certificate */
Emmanuel Hocdet98263292016-12-29 18:26:15 +0100143 struct ssl_bind_conf *default_ssl_conf; /* custom SSL conf of default_ctx */
Emmanuel Hocdet65623372013-01-24 17:17:15 +0100144 int strict_sni; /* refuse negotiation if sni doesn't match a certificate */
Emmanuel Hocdet4608ed92017-01-20 13:06:27 +0100145 int ssl_options; /* ssl options */
Emeric Brunfc0421f2012-09-07 17:30:07 +0200146 struct eb_root sni_ctx; /* sni_ctx tree of all known certs full-names sorted by name */
147 struct eb_root sni_w_ctx; /* sni_ctx tree of all known certs wildcards sorted by name */
Nenad Merdanovic146defa2015-05-09 08:46:00 +0200148 struct tls_keys_ref *keys_ref; /* TLS ticket keys reference */
Christopher Faulet31af49d2015-06-09 17:29:50 +0200149
150 char *ca_sign_file; /* CAFile used to generate and sign server certificates */
151 char *ca_sign_pass; /* CAKey passphrase */
152
153 X509 *ca_sign_cert; /* CA certificate referenced by ca_file */
154 EVP_PKEY *ca_sign_pkey; /* CA private key referenced by ca_key */
Willy Tarreauf5ae8f72012-09-07 16:58:00 +0200155#endif
Willy Tarreauc95bad52016-12-22 00:13:31 +0100156 struct proxy *frontend; /* the frontend all these listeners belong to, or NULL */
Willy Tarreau71a8c7c2016-12-21 22:04:54 +0100157 struct xprt_ops *xprt; /* transport-layer operations for all listeners */
Willy Tarreau2a65ff02012-09-13 17:54:29 +0200158 int is_ssl; /* SSL is required for these listeners */
Christopher Faulet31af49d2015-06-09 17:29:50 +0200159 int generate_certs; /* 1 if generate-certificates option is set, else 0 */
Willy Tarreau6ae1ba62014-05-07 19:01:58 +0200160 unsigned long bind_proc; /* bitmask of processes allowed to use these listeners */
Willy Tarreau290e63a2012-09-20 18:07:14 +0200161 struct { /* UNIX socket permissions */
162 uid_t uid; /* -1 to leave unchanged */
163 gid_t gid; /* -1 to leave unchanged */
164 mode_t mode; /* 0 to leave unchanged */
165 } ux;
166 int level; /* stats access level (ACCESS_LVL_*) */
Andjelko Iharosc4df59e2017-07-20 11:59:48 +0200167 int severity_output; /* default severity output format in cli feedback messages */
Willy Tarreauf5ae8f72012-09-07 16:58:00 +0200168 struct list by_fe; /* next binding for the same frontend, or NULL */
Willy Tarreau4348fad2012-09-20 16:48:07 +0200169 struct list listeners; /* list of listeners using this bind config */
Bertrand Jacquin93b227d2016-06-04 15:11:10 +0100170 uint32_t ns_cip_magic; /* Excepted NetScaler Client IP magic number */
Willy Tarreauf5ae8f72012-09-07 16:58:00 +0200171 char *arg; /* argument passed to "bind" for better error reporting */
172 char *file; /* file where the section appears */
173 int line; /* line where the section appears */
174};
175
Willy Tarreaudd815982007-10-16 12:25:14 +0200176/* The listener will be directly referenced by the fdtab[] which holds its
177 * socket. The listener provides the protocol-specific accept() function to
178 * the fdtab.
179 */
180struct listener {
Willy Tarreau3fdb3662012-11-12 00:42:33 +0100181 enum obj_type obj_type; /* object type = OBJ_TYPE_LISTENER */
Willy Tarreauf6502c52013-12-06 21:18:49 +0100182 enum li_state state; /* state: NEW, INIT, ASSIGNED, LISTEN, READY, FULL */
183 short int nice; /* nice value to assign to the instanciated tasks */
Willy Tarreaudd815982007-10-16 12:25:14 +0200184 int fd; /* the listen socket */
Willy Tarreauf6502c52013-12-06 21:18:49 +0100185 char *name; /* listener's name */
Krzysztof Piotr Oledzki052d4fd2009-10-04 14:52:57 +0200186 int luid; /* listener universally unique ID, used for SNMP */
Willy Tarreau6fb42e02007-10-28 17:02:33 +0100187 int options; /* socket options : LI_O_* */
Willy Tarreauae9bea02016-11-25 14:44:52 +0100188 struct fe_counters *counters; /* statistics counters */
Willy Tarreaudd815982007-10-16 12:25:14 +0200189 struct protocol *proto; /* protocol this listener belongs to */
190 int nbconn; /* current number of connections on this listener */
191 int maxconn; /* maximum connections allowed on this listener */
Willy Tarreauc73ce2b2008-01-06 10:55:10 +0100192 unsigned int backlog; /* if set, listen backlog */
Willy Tarreau16a21472012-11-19 12:39:59 +0100193 unsigned int maxaccept; /* if set, max number of connections accepted at once */
Willy Tarreaudd815982007-10-16 12:25:14 +0200194 struct list proto_list; /* list in the protocol header */
Willy Tarreaueb472682010-05-28 18:46:57 +0200195 int (*accept)(struct listener *l, int fd, struct sockaddr_storage *addr); /* upper layer's accept() */
Willy Tarreau10b688f2015-03-13 16:43:12 +0100196 enum obj_type *default_target; /* default target to use for accepted sessions or NULL */
Willy Tarreaue6ca1fc2011-07-24 22:03:52 +0200197 struct list wait_queue; /* link element to make the listener wait for something (LI_LIMITED) */
Willy Tarreau3bc13772008-12-07 11:50:35 +0100198 unsigned int analysers; /* bitmap of required protocol analysers */
Willy Tarreaube1b9182009-06-14 18:48:19 +0200199 int maxseg; /* for TCP, advertised MSS */
Willy Tarreau2af207a2015-02-04 00:45:58 +0100200 int tcp_ut; /* for TCP, user timeout */
Willy Tarreauf6502c52013-12-06 21:18:49 +0100201 char *interface; /* interface name or NULL */
Willy Tarreau90a570f2009-10-04 20:54:54 +0200202
Christopher Faulet9dcf9b62017-11-13 10:34:01 +0100203 __decl_hathreads(HA_SPINLOCK_T lock);
Christopher Faulet8d8aa0d2017-05-30 15:36:50 +0200204
KOVACS Krisztianb3e54fe2014-11-17 15:11:45 +0100205 const struct netns_entry *netns; /* network namespace of the listener*/
206
Willy Tarreau4348fad2012-09-20 16:48:07 +0200207 struct list by_fe; /* chaining in frontend's list of listeners */
208 struct list by_bind; /* chaining in bind_conf's list of listeners */
Willy Tarreau2a65ff02012-09-13 17:54:29 +0200209 struct bind_conf *bind_conf; /* "bind" line settings, include SSL settings among other things */
Willy Tarreauf5ae8f72012-09-07 16:58:00 +0200210
Willy Tarreau7b815632011-10-21 18:51:57 +0200211 /* warning: this struct is huge, keep it at the bottom */
212 struct sockaddr_storage addr; /* the address we listen to */
Willy Tarreau90a570f2009-10-04 20:54:54 +0200213 struct {
Willy Tarreau53fb4ae2009-10-04 23:04:08 +0200214 struct eb32_node id; /* place in the tree of used IDs */
Willy Tarreau90a570f2009-10-04 20:54:54 +0200215 } conf; /* config information */
Willy Tarreaudd815982007-10-16 12:25:14 +0200216};
217
Willy Tarreau26982662012-09-12 23:17:10 +0200218/* Descriptor for a "bind" keyword. The ->parse() function returns 0 in case of
219 * success, or a combination of ERR_* flags if an error is encountered. The
220 * function pointer can be NULL if not implemented. The function also has an
Willy Tarreau4348fad2012-09-20 16:48:07 +0200221 * access to the current "bind" config line. The ->skip value tells the parser
222 * how many words have to be skipped after the keyword.
Willy Tarreau26982662012-09-12 23:17:10 +0200223 */
224struct bind_kw {
225 const char *kw;
Willy Tarreau4348fad2012-09-20 16:48:07 +0200226 int (*parse)(char **args, int cur_arg, struct proxy *px, struct bind_conf *conf, char **err);
Willy Tarreau26982662012-09-12 23:17:10 +0200227 int skip; /* nb of args to skip */
228};
Emmanuel Hocdet98263292016-12-29 18:26:15 +0100229struct ssl_bind_kw {
230 const char *kw;
231 int (*parse)(char **args, int cur_arg, struct proxy *px, struct ssl_bind_conf *conf, char **err);
232 int skip; /* nb of args to skip */
233};
Willy Tarreau26982662012-09-12 23:17:10 +0200234
235/*
236 * A keyword list. It is a NULL-terminated array of keywords. It embeds a
237 * struct list in order to be linked to other lists, allowing it to easily
238 * be declared where it is needed, and linked without duplicating data nor
Willy Tarreau51fb7652012-09-18 18:24:39 +0200239 * allocating memory. It is also possible to indicate a scope for the keywords.
Willy Tarreau26982662012-09-12 23:17:10 +0200240 */
241struct bind_kw_list {
Willy Tarreau51fb7652012-09-18 18:24:39 +0200242 const char *scope;
Willy Tarreau26982662012-09-12 23:17:10 +0200243 struct list list;
244 struct bind_kw kw[VAR_ARRAY];
245};
246
247
Olivier Houchardf73629d2017-04-05 22:33:04 +0200248struct xfer_sock_list {
249 int fd;
250 char *iface;
251 char *namespace;
252 int options; /* socket options LI_O_* */
253 struct xfer_sock_list *prev;
254 struct xfer_sock_list *next;
255 struct sockaddr_storage addr;
256};
257
Willy Tarreaud1d54542012-09-12 22:58:11 +0200258#endif /* _TYPES_LISTENER_H */
Willy Tarreaudd815982007-10-16 12:25:14 +0200259
260/*
261 * Local variables:
262 * c-indent-level: 8
263 * c-basic-offset: 8
264 * End:
265 */