blob: 99acb5adc154f6e31cd6aa6d15c20a3788d9261e [file] [log] [blame]
Emeric Brun107ca302010-01-04 16:16:05 +01001/*
Willy Tarreaucd3b0942012-04-27 21:52:18 +02002 * Sample management functions.
Emeric Brun107ca302010-01-04 16:16:05 +01003 *
4 * Copyright 2009-2010 EXCELIANCE, Emeric Brun <ebrun@exceliance.fr>
Willy Tarreaucd3b0942012-04-27 21:52:18 +02005 * Copyright (C) 2012 Willy Tarreau <w@1wt.eu>
Emeric Brun107ca302010-01-04 16:16:05 +01006 *
7 * This program is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU General Public License
9 * as published by the Free Software Foundation; either version
10 * 2 of the License, or (at your option) any later version.
11 *
12 */
13
14#include <string.h>
15#include <arpa/inet.h>
Willy Tarreaudd2f85e2012-09-02 22:34:23 +020016#include <stdio.h>
Emeric Brun107ca302010-01-04 16:16:05 +010017
Willy Tarreau7e2c6472012-10-29 20:44:36 +010018#include <types/global.h>
19
Willy Tarreauc7e42382012-08-24 19:22:53 +020020#include <common/chunk.h>
Willy Tarreau23ec4ca2014-07-15 20:15:37 +020021#include <common/hash.h>
Willy Tarreaucd3b0942012-04-27 21:52:18 +020022#include <common/standard.h>
Willy Tarreaua4312fa2013-04-02 16:34:32 +020023#include <common/uri_auth.h>
Emeric Brun53d1a982014-04-30 18:21:37 +020024#include <common/base64.h>
Willy Tarreaucd3b0942012-04-27 21:52:18 +020025
Willy Tarreau9fcb9842012-04-20 14:45:49 +020026#include <proto/arg.h>
Willy Tarreaua4312fa2013-04-02 16:34:32 +020027#include <proto/auth.h>
28#include <proto/log.h>
Thierry FOURNIERd4373142013-12-17 01:10:10 +010029#include <proto/proto_http.h>
Willy Tarreaua4312fa2013-04-02 16:34:32 +020030#include <proto/proxy.h>
Willy Tarreaucd3b0942012-04-27 21:52:18 +020031#include <proto/sample.h>
Willy Tarreaua4312fa2013-04-02 16:34:32 +020032#include <proto/stick_table.h>
Emeric Brun107ca302010-01-04 16:16:05 +010033
Willy Tarreau1cf8f082014-02-07 12:14:54 +010034/* sample type names */
35const char *smp_to_type[SMP_TYPES] = {
36 [SMP_T_BOOL] = "bool",
37 [SMP_T_UINT] = "uint",
38 [SMP_T_SINT] = "sint",
39 [SMP_T_ADDR] = "addr",
40 [SMP_T_IPV4] = "ipv4",
41 [SMP_T_IPV6] = "ipv6",
42 [SMP_T_STR] = "str",
43 [SMP_T_BIN] = "bin",
Willy Tarreau1cf8f082014-02-07 12:14:54 +010044};
45
Willy Tarreau12785782012-04-27 21:37:17 +020046/* static sample used in sample_process() when <p> is NULL */
Willy Tarreaub4a88f02012-04-23 21:35:11 +020047static struct sample temp_smp;
Emeric Brun107ca302010-01-04 16:16:05 +010048
Willy Tarreau12785782012-04-27 21:37:17 +020049/* list head of all known sample fetch keywords */
50static struct sample_fetch_kw_list sample_fetches = {
51 .list = LIST_HEAD_INIT(sample_fetches.list)
Emeric Brun107ca302010-01-04 16:16:05 +010052};
53
Willy Tarreau12785782012-04-27 21:37:17 +020054/* list head of all known sample format conversion keywords */
55static struct sample_conv_kw_list sample_convs = {
56 .list = LIST_HEAD_INIT(sample_convs.list)
Emeric Brun107ca302010-01-04 16:16:05 +010057};
58
Willy Tarreau80aca902013-01-07 15:42:20 +010059const unsigned int fetch_cap[SMP_SRC_ENTRIES] = {
60 [SMP_SRC_INTRN] = (SMP_VAL_FE_CON_ACC | SMP_VAL_FE_SES_ACC | SMP_VAL_FE_REQ_CNT |
61 SMP_VAL_FE_HRQ_HDR | SMP_VAL_FE_HRQ_BDY | SMP_VAL_FE_SET_BCK |
62 SMP_VAL_BE_REQ_CNT | SMP_VAL_BE_HRQ_HDR | SMP_VAL_BE_HRQ_BDY |
63 SMP_VAL_BE_SET_SRV | SMP_VAL_BE_SRV_CON | SMP_VAL_BE_RES_CNT |
64 SMP_VAL_BE_HRS_HDR | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
65 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
66 SMP_VAL_FE_LOG_END),
67
68 [SMP_SRC_LISTN] = (SMP_VAL_FE_CON_ACC | SMP_VAL_FE_SES_ACC | SMP_VAL_FE_REQ_CNT |
69 SMP_VAL_FE_HRQ_HDR | SMP_VAL_FE_HRQ_BDY | SMP_VAL_FE_SET_BCK |
70 SMP_VAL_BE_REQ_CNT | SMP_VAL_BE_HRQ_HDR | SMP_VAL_BE_HRQ_BDY |
71 SMP_VAL_BE_SET_SRV | SMP_VAL_BE_SRV_CON | SMP_VAL_BE_RES_CNT |
72 SMP_VAL_BE_HRS_HDR | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
73 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
74 SMP_VAL_FE_LOG_END),
75
76 [SMP_SRC_FTEND] = (SMP_VAL_FE_CON_ACC | SMP_VAL_FE_SES_ACC | SMP_VAL_FE_REQ_CNT |
77 SMP_VAL_FE_HRQ_HDR | SMP_VAL_FE_HRQ_BDY | SMP_VAL_FE_SET_BCK |
78 SMP_VAL_BE_REQ_CNT | SMP_VAL_BE_HRQ_HDR | SMP_VAL_BE_HRQ_BDY |
79 SMP_VAL_BE_SET_SRV | SMP_VAL_BE_SRV_CON | SMP_VAL_BE_RES_CNT |
80 SMP_VAL_BE_HRS_HDR | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
81 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
82 SMP_VAL_FE_LOG_END),
83
84 [SMP_SRC_L4CLI] = (SMP_VAL_FE_CON_ACC | SMP_VAL_FE_SES_ACC | SMP_VAL_FE_REQ_CNT |
85 SMP_VAL_FE_HRQ_HDR | SMP_VAL_FE_HRQ_BDY | SMP_VAL_FE_SET_BCK |
86 SMP_VAL_BE_REQ_CNT | SMP_VAL_BE_HRQ_HDR | SMP_VAL_BE_HRQ_BDY |
87 SMP_VAL_BE_SET_SRV | SMP_VAL_BE_SRV_CON | SMP_VAL_BE_RES_CNT |
88 SMP_VAL_BE_HRS_HDR | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
89 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
90 SMP_VAL_FE_LOG_END),
91
92 [SMP_SRC_L5CLI] = (SMP_VAL___________ | SMP_VAL_FE_SES_ACC | SMP_VAL_FE_REQ_CNT |
93 SMP_VAL_FE_HRQ_HDR | SMP_VAL_FE_HRQ_BDY | SMP_VAL_FE_SET_BCK |
94 SMP_VAL_BE_REQ_CNT | SMP_VAL_BE_HRQ_HDR | SMP_VAL_BE_HRQ_BDY |
95 SMP_VAL_BE_SET_SRV | SMP_VAL_BE_SRV_CON | SMP_VAL_BE_RES_CNT |
96 SMP_VAL_BE_HRS_HDR | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
97 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
98 SMP_VAL_FE_LOG_END),
99
100 [SMP_SRC_TRACK] = (SMP_VAL_FE_CON_ACC | SMP_VAL_FE_SES_ACC | SMP_VAL_FE_REQ_CNT |
101 SMP_VAL_FE_HRQ_HDR | SMP_VAL_FE_HRQ_BDY | SMP_VAL_FE_SET_BCK |
102 SMP_VAL_BE_REQ_CNT | SMP_VAL_BE_HRQ_HDR | SMP_VAL_BE_HRQ_BDY |
103 SMP_VAL_BE_SET_SRV | SMP_VAL_BE_SRV_CON | SMP_VAL_BE_RES_CNT |
104 SMP_VAL_BE_HRS_HDR | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
105 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
106 SMP_VAL_FE_LOG_END),
107
108 [SMP_SRC_L6REQ] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL_FE_REQ_CNT |
109 SMP_VAL_FE_HRQ_HDR | SMP_VAL_FE_HRQ_BDY | SMP_VAL_FE_SET_BCK |
110 SMP_VAL_BE_REQ_CNT | SMP_VAL_BE_HRQ_HDR | SMP_VAL_BE_HRQ_BDY |
111 SMP_VAL_BE_SET_SRV | SMP_VAL_BE_SRV_CON | SMP_VAL___________ |
112 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
113 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
114 SMP_VAL___________),
115
116 [SMP_SRC_HRQHV] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL_FE_REQ_CNT |
117 SMP_VAL_FE_HRQ_HDR | SMP_VAL_FE_HRQ_BDY | SMP_VAL_FE_SET_BCK |
118 SMP_VAL_BE_REQ_CNT | SMP_VAL_BE_HRQ_HDR | SMP_VAL_BE_HRQ_BDY |
119 SMP_VAL_BE_SET_SRV | SMP_VAL_BE_SRV_CON | SMP_VAL___________ |
120 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
121 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
122 SMP_VAL___________),
123
124 [SMP_SRC_HRQHP] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL_FE_REQ_CNT |
125 SMP_VAL_FE_HRQ_HDR | SMP_VAL_FE_HRQ_BDY | SMP_VAL_FE_SET_BCK |
126 SMP_VAL_BE_REQ_CNT | SMP_VAL_BE_HRQ_HDR | SMP_VAL_BE_HRQ_BDY |
127 SMP_VAL_BE_SET_SRV | SMP_VAL_BE_SRV_CON | SMP_VAL_BE_RES_CNT |
128 SMP_VAL_BE_HRS_HDR | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
129 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
130 SMP_VAL_FE_LOG_END),
131
132 [SMP_SRC_HRQBO] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
133 SMP_VAL___________ | SMP_VAL_FE_HRQ_BDY | SMP_VAL_FE_SET_BCK |
134 SMP_VAL_BE_REQ_CNT | SMP_VAL_BE_HRQ_HDR | SMP_VAL_BE_HRQ_BDY |
135 SMP_VAL_BE_SET_SRV | SMP_VAL_BE_SRV_CON | SMP_VAL___________ |
136 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
137 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
138 SMP_VAL___________),
139
140 [SMP_SRC_BKEND] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
141 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
142 SMP_VAL_BE_REQ_CNT | SMP_VAL_BE_HRQ_HDR | SMP_VAL_BE_HRQ_BDY |
143 SMP_VAL_BE_SET_SRV | SMP_VAL_BE_SRV_CON | SMP_VAL_BE_RES_CNT |
144 SMP_VAL_BE_HRS_HDR | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
145 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
146 SMP_VAL_FE_LOG_END),
147
148 [SMP_SRC_SERVR] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
149 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
150 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
151 SMP_VAL___________ | SMP_VAL_BE_SRV_CON | SMP_VAL_BE_RES_CNT |
152 SMP_VAL_BE_HRS_HDR | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
153 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
154 SMP_VAL_FE_LOG_END),
155
156 [SMP_SRC_L4SRV] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
157 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
158 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
159 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL_BE_RES_CNT |
160 SMP_VAL_BE_HRS_HDR | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
161 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
162 SMP_VAL_FE_LOG_END),
163
164 [SMP_SRC_L5SRV] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
165 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
166 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
167 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL_BE_RES_CNT |
168 SMP_VAL_BE_HRS_HDR | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
169 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
170 SMP_VAL_FE_LOG_END),
171
172 [SMP_SRC_L6RES] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
173 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
174 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
175 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL_BE_RES_CNT |
176 SMP_VAL_BE_HRS_HDR | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
177 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
178 SMP_VAL___________),
179
180 [SMP_SRC_HRSHV] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
181 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
182 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
183 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL_BE_RES_CNT |
184 SMP_VAL_BE_HRS_HDR | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
185 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
186 SMP_VAL___________),
187
188 [SMP_SRC_HRSHP] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
189 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
190 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
191 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL_BE_RES_CNT |
192 SMP_VAL_BE_HRS_HDR | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
193 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
194 SMP_VAL_FE_LOG_END),
195
196 [SMP_SRC_HRSBO] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
197 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
198 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
199 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
200 SMP_VAL___________ | SMP_VAL_BE_HRS_BDY | SMP_VAL_BE_STO_RUL |
201 SMP_VAL_FE_RES_CNT | SMP_VAL_FE_HRS_HDR | SMP_VAL_FE_HRS_BDY |
202 SMP_VAL___________),
203
204 [SMP_SRC_RQFIN] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
205 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
206 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
207 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
208 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
209 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
210 SMP_VAL_FE_LOG_END),
211
212 [SMP_SRC_RSFIN] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
213 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
214 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
215 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
216 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
217 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
218 SMP_VAL_FE_LOG_END),
219
220 [SMP_SRC_TXFIN] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
221 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
222 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
223 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
224 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
225 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
226 SMP_VAL_FE_LOG_END),
227
228 [SMP_SRC_SSFIN] = (SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
229 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
230 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
231 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
232 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
233 SMP_VAL___________ | SMP_VAL___________ | SMP_VAL___________ |
234 SMP_VAL_FE_LOG_END),
235};
236
237static const char *fetch_src_names[SMP_SRC_ENTRIES] = {
238 [SMP_SRC_INTRN] = "internal state",
239 [SMP_SRC_LISTN] = "listener",
240 [SMP_SRC_FTEND] = "frontend",
241 [SMP_SRC_L4CLI] = "client address",
242 [SMP_SRC_L5CLI] = "client-side connection",
243 [SMP_SRC_TRACK] = "track counters",
244 [SMP_SRC_L6REQ] = "request buffer",
245 [SMP_SRC_HRQHV] = "HTTP request headers",
246 [SMP_SRC_HRQHP] = "HTTP request",
247 [SMP_SRC_HRQBO] = "HTTP request body",
248 [SMP_SRC_BKEND] = "backend",
249 [SMP_SRC_SERVR] = "server",
250 [SMP_SRC_L4SRV] = "server address",
251 [SMP_SRC_L5SRV] = "server-side connection",
252 [SMP_SRC_L6RES] = "response buffer",
253 [SMP_SRC_HRSHV] = "HTTP response headers",
254 [SMP_SRC_HRSHP] = "HTTP response",
255 [SMP_SRC_HRSBO] = "HTTP response body",
256 [SMP_SRC_RQFIN] = "request buffer statistics",
257 [SMP_SRC_RSFIN] = "response buffer statistics",
258 [SMP_SRC_TXFIN] = "transaction statistics",
259 [SMP_SRC_SSFIN] = "session statistics",
260};
261
Willy Tarreaubf8e2512013-03-25 14:52:41 +0100262static const char *fetch_ckp_names[SMP_CKP_ENTRIES] = {
263 [SMP_CKP_FE_CON_ACC] = "frontend tcp-request connection rule",
264 [SMP_CKP_FE_SES_ACC] = "frontend tcp-request session rule",
265 [SMP_CKP_FE_REQ_CNT] = "frontend tcp-request content rule",
266 [SMP_CKP_FE_HRQ_HDR] = "frontend http-request header rule",
267 [SMP_CKP_FE_HRQ_BDY] = "frontend http-request body rule",
268 [SMP_CKP_FE_SET_BCK] = "frontend use-backend rule",
269 [SMP_CKP_BE_REQ_CNT] = "backend tcp-request content rule",
270 [SMP_CKP_BE_HRQ_HDR] = "backend http-request header rule",
271 [SMP_CKP_BE_HRQ_BDY] = "backend http-request body rule",
272 [SMP_CKP_BE_SET_SRV] = "backend use-server, balance or stick-match rule",
273 [SMP_CKP_BE_SRV_CON] = "server source selection",
274 [SMP_CKP_BE_RES_CNT] = "backend tcp-response content rule",
275 [SMP_CKP_BE_HRS_HDR] = "backend http-response header rule",
276 [SMP_CKP_BE_HRS_BDY] = "backend http-response body rule",
277 [SMP_CKP_BE_STO_RUL] = "backend stick-store rule",
278 [SMP_CKP_FE_RES_CNT] = "frontend tcp-response content rule",
279 [SMP_CKP_FE_HRS_HDR] = "frontend http-response header rule",
280 [SMP_CKP_FE_HRS_BDY] = "frontend http-response body rule",
281 [SMP_CKP_FE_LOG_END] = "logs",
282};
283
Thierry FOURNIER348971e2013-11-21 10:50:10 +0100284/* This function returns the type of the data returned by the sample_expr.
285 * It assumes that the <expr> and all of its converters are properly
286 * initialized.
287 */
288inline
289int smp_expr_output_type(struct sample_expr *expr)
290{
291 struct sample_conv_expr *smp_expr;
292
293 if (!LIST_ISEMPTY(&expr->conv_exprs)) {
294 smp_expr = LIST_PREV(&expr->conv_exprs, struct sample_conv_expr *, list);
295 return smp_expr->conv->out_type;
296 }
297 return expr->fetch->out_type;
298}
299
300
Willy Tarreau80aca902013-01-07 15:42:20 +0100301/* fill the trash with a comma-delimited list of source names for the <use> bit
302 * field which must be composed of a non-null set of SMP_USE_* flags. The return
303 * value is the pointer to the string in the trash buffer.
304 */
305const char *sample_src_names(unsigned int use)
306{
307 int bit;
308
309 trash.len = 0;
310 trash.str[0] = '\0';
311 for (bit = 0; bit < SMP_SRC_ENTRIES; bit++) {
312 if (!(use & ~((1 << bit) - 1)))
313 break; /* no more bits */
314
315 if (!(use & (1 << bit)))
316 continue; /* bit not set */
317
318 trash.len += snprintf(trash.str + trash.len, trash.size - trash.len, "%s%s",
319 (use & ((1 << bit) - 1)) ? "," : "",
320 fetch_src_names[bit]);
321 }
322 return trash.str;
323}
324
Willy Tarreaubf8e2512013-03-25 14:52:41 +0100325/* return a pointer to the correct sample checkpoint name, or "unknown" when
326 * the flags are invalid. Only the lowest bit is used, higher bits are ignored
327 * if set.
328 */
329const char *sample_ckp_names(unsigned int use)
330{
331 int bit;
332
333 for (bit = 0; bit < SMP_CKP_ENTRIES; bit++)
334 if (use & (1 << bit))
335 return fetch_ckp_names[bit];
336 return "unknown sample check place, please report this bug";
337}
338
Emeric Brun107ca302010-01-04 16:16:05 +0100339/*
Willy Tarreau80aca902013-01-07 15:42:20 +0100340 * Registers the sample fetch keyword list <kwl> as a list of valid keywords
341 * for next parsing sessions. The fetch keywords capabilities are also computed
342 * from their ->use field.
Emeric Brun107ca302010-01-04 16:16:05 +0100343 */
Willy Tarreau80aca902013-01-07 15:42:20 +0100344void sample_register_fetches(struct sample_fetch_kw_list *kwl)
Emeric Brun107ca302010-01-04 16:16:05 +0100345{
Willy Tarreau80aca902013-01-07 15:42:20 +0100346 struct sample_fetch *sf;
347 int bit;
348
349 for (sf = kwl->kw; sf->kw != NULL; sf++) {
350 for (bit = 0; bit < SMP_SRC_ENTRIES; bit++)
351 if (sf->use & (1 << bit))
352 sf->val |= fetch_cap[bit];
353 }
354 LIST_ADDQ(&sample_fetches.list, &kwl->list);
Emeric Brun107ca302010-01-04 16:16:05 +0100355}
356
357/*
Willy Tarreau12785782012-04-27 21:37:17 +0200358 * Registers the sample format coverstion keyword list <pckl> as a list of valid keywords for next
Emeric Brun107ca302010-01-04 16:16:05 +0100359 * parsing sessions.
360 */
Willy Tarreau12785782012-04-27 21:37:17 +0200361void sample_register_convs(struct sample_conv_kw_list *pckl)
Emeric Brun107ca302010-01-04 16:16:05 +0100362{
Willy Tarreau12785782012-04-27 21:37:17 +0200363 LIST_ADDQ(&sample_convs.list, &pckl->list);
Emeric Brun107ca302010-01-04 16:16:05 +0100364}
365
366/*
Willy Tarreau12785782012-04-27 21:37:17 +0200367 * Returns the pointer on sample fetch keyword structure identified by
Emeric Brun107ca302010-01-04 16:16:05 +0100368 * string of <len> in buffer <kw>.
369 *
370 */
Willy Tarreau12785782012-04-27 21:37:17 +0200371struct sample_fetch *find_sample_fetch(const char *kw, int len)
Emeric Brun107ca302010-01-04 16:16:05 +0100372{
373 int index;
Willy Tarreau12785782012-04-27 21:37:17 +0200374 struct sample_fetch_kw_list *kwl;
Emeric Brun107ca302010-01-04 16:16:05 +0100375
Willy Tarreau12785782012-04-27 21:37:17 +0200376 list_for_each_entry(kwl, &sample_fetches.list, list) {
Emeric Brun107ca302010-01-04 16:16:05 +0100377 for (index = 0; kwl->kw[index].kw != NULL; index++) {
378 if (strncmp(kwl->kw[index].kw, kw, len) == 0 &&
379 kwl->kw[index].kw[len] == '\0')
380 return &kwl->kw[index];
381 }
382 }
383 return NULL;
384}
385
386/*
Willy Tarreau12785782012-04-27 21:37:17 +0200387 * Returns the pointer on sample format conversion keyword structure identified by
Emeric Brun107ca302010-01-04 16:16:05 +0100388 * string of <len> in buffer <kw>.
389 *
390 */
Willy Tarreau12785782012-04-27 21:37:17 +0200391struct sample_conv *find_sample_conv(const char *kw, int len)
Emeric Brun107ca302010-01-04 16:16:05 +0100392{
393 int index;
Willy Tarreau12785782012-04-27 21:37:17 +0200394 struct sample_conv_kw_list *kwl;
Emeric Brun107ca302010-01-04 16:16:05 +0100395
Willy Tarreau12785782012-04-27 21:37:17 +0200396 list_for_each_entry(kwl, &sample_convs.list, list) {
Emeric Brun107ca302010-01-04 16:16:05 +0100397 for (index = 0; kwl->kw[index].kw != NULL; index++) {
398 if (strncmp(kwl->kw[index].kw, kw, len) == 0 &&
399 kwl->kw[index].kw[len] == '\0')
400 return &kwl->kw[index];
401 }
402 }
403 return NULL;
404}
405
Emeric Brun107ca302010-01-04 16:16:05 +0100406/******************************************************************/
Willy Tarreau12785782012-04-27 21:37:17 +0200407/* Sample casts functions */
Willy Tarreaub8c8f1f2012-04-23 22:38:26 +0200408/* Note: these functions do *NOT* set the output type on the */
409/* sample, the caller is responsible for doing this on return. */
Emeric Brun107ca302010-01-04 16:16:05 +0100410/******************************************************************/
411
Willy Tarreau342acb42012-04-23 22:03:39 +0200412static int c_ip2int(struct sample *smp)
Emeric Brun107ca302010-01-04 16:16:05 +0100413{
Willy Tarreau342acb42012-04-23 22:03:39 +0200414 smp->data.uint = ntohl(smp->data.ipv4.s_addr);
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100415 smp->type = SMP_T_UINT;
Emeric Brun107ca302010-01-04 16:16:05 +0100416 return 1;
417}
418
Willy Tarreau342acb42012-04-23 22:03:39 +0200419static int c_ip2str(struct sample *smp)
Emeric Brun107ca302010-01-04 16:16:05 +0100420{
Willy Tarreau47ca5452012-12-23 20:22:19 +0100421 struct chunk *trash = get_trash_chunk();
Emeric Brun107ca302010-01-04 16:16:05 +0100422
Willy Tarreau342acb42012-04-23 22:03:39 +0200423 if (!inet_ntop(AF_INET, (void *)&smp->data.ipv4, trash->str, trash->size))
Emeric Brun107ca302010-01-04 16:16:05 +0100424 return 0;
425
426 trash->len = strlen(trash->str);
Willy Tarreau342acb42012-04-23 22:03:39 +0200427 smp->data.str = *trash;
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100428 smp->type = SMP_T_STR;
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +0100429 smp->flags &= ~SMP_F_CONST;
Emeric Brun107ca302010-01-04 16:16:05 +0100430
431 return 1;
432}
433
Willy Tarreau342acb42012-04-23 22:03:39 +0200434static int c_ip2ipv6(struct sample *smp)
David du Colombier4f92d322011-03-24 11:09:31 +0100435{
Willy Tarreau342acb42012-04-23 22:03:39 +0200436 v4tov6(&smp->data.ipv6, &smp->data.ipv4);
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100437 smp->type = SMP_T_IPV6;
David du Colombier4f92d322011-03-24 11:09:31 +0100438 return 1;
439}
440
Willy Tarreau342acb42012-04-23 22:03:39 +0200441static int c_ipv62str(struct sample *smp)
David du Colombier4f92d322011-03-24 11:09:31 +0100442{
Willy Tarreau47ca5452012-12-23 20:22:19 +0100443 struct chunk *trash = get_trash_chunk();
David du Colombier4f92d322011-03-24 11:09:31 +0100444
Willy Tarreau342acb42012-04-23 22:03:39 +0200445 if (!inet_ntop(AF_INET6, (void *)&smp->data.ipv6, trash->str, trash->size))
David du Colombier4f92d322011-03-24 11:09:31 +0100446 return 0;
447
448 trash->len = strlen(trash->str);
Willy Tarreau342acb42012-04-23 22:03:39 +0200449 smp->data.str = *trash;
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100450 smp->type = SMP_T_STR;
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +0100451 smp->flags &= ~SMP_F_CONST;
David du Colombier4f92d322011-03-24 11:09:31 +0100452 return 1;
453}
454
455/*
Willy Tarreau342acb42012-04-23 22:03:39 +0200456static int c_ipv62ip(struct sample *smp)
David du Colombier4f92d322011-03-24 11:09:31 +0100457{
Willy Tarreau342acb42012-04-23 22:03:39 +0200458 return v6tov4(&smp->data.ipv4, &smp->data.ipv6);
David du Colombier4f92d322011-03-24 11:09:31 +0100459}
460*/
461
Willy Tarreau342acb42012-04-23 22:03:39 +0200462static int c_int2ip(struct sample *smp)
Emeric Brun107ca302010-01-04 16:16:05 +0100463{
Willy Tarreau342acb42012-04-23 22:03:39 +0200464 smp->data.ipv4.s_addr = htonl(smp->data.uint);
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100465 smp->type = SMP_T_IPV4;
Emeric Brun107ca302010-01-04 16:16:05 +0100466 return 1;
467}
468
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100469static int c_str2addr(struct sample *smp)
470{
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100471 if (!buf2ip(smp->data.str.str, smp->data.str.len, &smp->data.ipv4)) {
Thierry FOURNIERfd139902013-12-11 12:38:57 +0100472 if (!buf2ip6(smp->data.str.str, smp->data.str.len, &smp->data.ipv6))
473 return 0;
474 smp->type = SMP_T_IPV6;
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +0100475 smp->flags &= ~SMP_F_CONST;
Thierry FOURNIERfd139902013-12-11 12:38:57 +0100476 return 1;
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100477 }
478 smp->type = SMP_T_IPV4;
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +0100479 smp->flags &= ~SMP_F_CONST;
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100480 return 1;
481}
482
Willy Tarreau342acb42012-04-23 22:03:39 +0200483static int c_str2ip(struct sample *smp)
Emeric Brun107ca302010-01-04 16:16:05 +0100484{
Willy Tarreau342acb42012-04-23 22:03:39 +0200485 if (!buf2ip(smp->data.str.str, smp->data.str.len, &smp->data.ipv4))
Emeric Brun107ca302010-01-04 16:16:05 +0100486 return 0;
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100487 smp->type = SMP_T_IPV4;
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +0100488 smp->flags &= ~SMP_F_CONST;
Emeric Brun107ca302010-01-04 16:16:05 +0100489 return 1;
490}
491
Willy Tarreau342acb42012-04-23 22:03:39 +0200492static int c_str2ipv6(struct sample *smp)
David du Colombier4f92d322011-03-24 11:09:31 +0100493{
Thierry FOURNIERfd139902013-12-11 12:38:57 +0100494 if (!buf2ip6(smp->data.str.str, smp->data.str.len, &smp->data.ipv6))
495 return 0;
496 smp->type = SMP_T_IPV6;
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +0100497 smp->flags &= ~SMP_F_CONST;
Thierry FOURNIERfd139902013-12-11 12:38:57 +0100498 return 1;
David du Colombier4f92d322011-03-24 11:09:31 +0100499}
500
Thierry FOURNIERe87cac12014-03-12 15:07:59 +0100501/* The sample is always copied into a new one so that smp->size is always
502 * valid. The NULL char always enforces the end of string if it is met.
503 */
Emeric Brun8ac33d92012-10-17 13:36:06 +0200504static int c_bin2str(struct sample *smp)
505{
Willy Tarreau47ca5452012-12-23 20:22:19 +0100506 struct chunk *trash = get_trash_chunk();
Emeric Brun8ac33d92012-10-17 13:36:06 +0200507 unsigned char c;
508 int ptr = 0;
509
Thierry FOURNIERe87cac12014-03-12 15:07:59 +0100510 while (ptr < smp->data.str.len) {
511 c = smp->data.str.str[ptr];
512 if (!c)
513 break;
514 trash->str[ptr] = c;
515 ptr++;
Emeric Brun8ac33d92012-10-17 13:36:06 +0200516 }
Thierry FOURNIERe87cac12014-03-12 15:07:59 +0100517 trash->len = ptr;
518 trash->str[ptr] = 0;
Emeric Brun8ac33d92012-10-17 13:36:06 +0200519 smp->data.str = *trash;
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100520 smp->type = SMP_T_STR;
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +0100521 smp->flags &= ~SMP_F_CONST;
Emeric Brun8ac33d92012-10-17 13:36:06 +0200522 return 1;
523}
524
Willy Tarreau342acb42012-04-23 22:03:39 +0200525static int c_int2str(struct sample *smp)
Emeric Brun107ca302010-01-04 16:16:05 +0100526{
Willy Tarreau47ca5452012-12-23 20:22:19 +0100527 struct chunk *trash = get_trash_chunk();
Emeric Brun107ca302010-01-04 16:16:05 +0100528 char *pos;
529
Willy Tarreau342acb42012-04-23 22:03:39 +0200530 pos = ultoa_r(smp->data.uint, trash->str, trash->size);
Emeric Brun107ca302010-01-04 16:16:05 +0100531
532 if (!pos)
533 return 0;
534
Emeric Brun485479d2010-09-23 18:02:19 +0200535 trash->size = trash->size - (pos - trash->str);
Emeric Brun107ca302010-01-04 16:16:05 +0100536 trash->str = pos;
537 trash->len = strlen(pos);
Willy Tarreau342acb42012-04-23 22:03:39 +0200538 smp->data.str = *trash;
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100539 smp->type = SMP_T_STR;
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +0100540 smp->flags &= ~SMP_F_CONST;
Emeric Brun107ca302010-01-04 16:16:05 +0100541 return 1;
542}
543
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +0100544/* This function duplicates data and removes the flag "const". */
545int smp_dup(struct sample *smp)
Emeric Brun485479d2010-09-23 18:02:19 +0200546{
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +0100547 struct chunk *trash;
Emeric Brun485479d2010-09-23 18:02:19 +0200548
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +0100549 /* If the const flag is not set, we don't need to duplicate the
550 * pattern as it can be modified in place.
551 */
552 if (!(smp->flags & SMP_F_CONST))
553 return 1;
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100554
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +0100555 switch (smp->type) {
556 case SMP_T_BOOL:
557 case SMP_T_UINT:
558 case SMP_T_SINT:
559 case SMP_T_ADDR:
560 case SMP_T_IPV4:
561 case SMP_T_IPV6:
562 /* These type are not const. */
563 break;
564 case SMP_T_STR:
565 case SMP_T_BIN:
566 /* Duplicate data. */
567 trash = get_trash_chunk();
568 trash->len = smp->data.str.len < trash->size ? smp->data.str.len : trash->size;
569 memcpy(trash->str, smp->data.str.str, trash->len);
570 smp->data.str = *trash;
571 break;
572 default:
573 /* Other cases are unexpected. */
574 return 0;
575 }
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100576
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +0100577 /* remove const flag */
578 smp->flags &= ~SMP_F_CONST;
Emeric Brun485479d2010-09-23 18:02:19 +0200579 return 1;
580}
581
Thierry FOURNIER0e9af552013-12-14 14:55:04 +0100582int c_none(struct sample *smp)
Emeric Brun107ca302010-01-04 16:16:05 +0100583{
584 return 1;
585}
586
Willy Tarreau342acb42012-04-23 22:03:39 +0200587static int c_str2int(struct sample *smp)
Emeric Brun107ca302010-01-04 16:16:05 +0100588{
589 int i;
590 uint32_t ret = 0;
591
Thierry FOURNIER60bb0202014-01-27 18:20:48 +0100592 if (smp->data.str.len == 0)
593 return 0;
594
Willy Tarreau342acb42012-04-23 22:03:39 +0200595 for (i = 0; i < smp->data.str.len; i++) {
596 uint32_t val = smp->data.str.str[i] - '0';
Emeric Brun107ca302010-01-04 16:16:05 +0100597
Thierry FOURNIER60bb0202014-01-27 18:20:48 +0100598 if (val > 9) {
599 if (i == 0)
600 return 0;
Emeric Brun107ca302010-01-04 16:16:05 +0100601 break;
Thierry FOURNIER60bb0202014-01-27 18:20:48 +0100602 }
Emeric Brun107ca302010-01-04 16:16:05 +0100603
604 ret = ret * 10 + val;
605 }
606
Willy Tarreau342acb42012-04-23 22:03:39 +0200607 smp->data.uint = ret;
Thierry FOURNIERb805f712013-11-26 20:47:54 +0100608 smp->type = SMP_T_UINT;
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +0100609 smp->flags &= ~SMP_F_CONST;
Emeric Brun107ca302010-01-04 16:16:05 +0100610 return 1;
611}
612
Thierry FOURNIERd4373142013-12-17 01:10:10 +0100613static int c_str2meth(struct sample *smp)
614{
615 enum http_meth_t meth;
616 int len;
617
618 meth = find_http_meth(smp->data.str.str, smp->data.str.len);
619 if (meth == HTTP_METH_OTHER) {
620 len = smp->data.str.len;
621 smp->data.meth.str.str = smp->data.str.str;
622 smp->data.meth.str.len = len;
623 }
624 else
625 smp->flags &= ~SMP_F_CONST;
626 smp->data.meth.meth = meth;
627 smp->type = SMP_T_METH;
628 return 1;
629}
630
631static int c_meth2str(struct sample *smp)
632{
633 int len;
634 enum http_meth_t meth;
635
636 if (smp->data.meth.meth == HTTP_METH_OTHER) {
637 /* The method is unknown. Copy the original pointer. */
638 len = smp->data.meth.str.len;
639 smp->data.str.str = smp->data.meth.str.str;
640 smp->data.str.len = len;
641 smp->type = SMP_T_STR;
642 }
643 else if (smp->data.meth.meth < HTTP_METH_OTHER) {
644 /* The method is known, copy the pointer containing the string. */
645 meth = smp->data.meth.meth;
646 smp->data.str.str = http_known_methods[meth].name;
647 smp->data.str.len = http_known_methods[meth].len;
648 smp->flags |= SMP_F_CONST;
649 smp->type = SMP_T_STR;
650 }
651 else {
652 /* Unknown method */
653 return 0;
654 }
655 return 1;
656}
657
Willy Tarreau9700e5c2014-07-15 21:03:26 +0200658static int c_addr2bin(struct sample *smp)
659{
660 struct chunk *chk = get_trash_chunk();
661
662 if (smp->type == SMP_T_IPV4) {
663 chk->len = 4;
664 memcpy(chk->str, &smp->data.ipv4, chk->len);
665 }
666 else if (smp->type == SMP_T_IPV6) {
667 chk->len = 16;
668 memcpy(chk->str, &smp->data.ipv6, chk->len);
669 }
670 else
671 return 0;
672
673 smp->data.str = *chk;
674 smp->type = SMP_T_BIN;
675 return 1;
676}
677
Willy Tarreaubbfd1a22014-07-15 21:19:08 +0200678static int c_int2bin(struct sample *smp)
679{
680 struct chunk *chk = get_trash_chunk();
681
682 *(unsigned int *)chk->str = htonl(smp->data.uint);
683 chk->len = 4;
684
685 smp->data.str = *chk;
686 smp->type = SMP_T_BIN;
687 return 1;
688}
689
Willy Tarreau9700e5c2014-07-15 21:03:26 +0200690
Emeric Brun107ca302010-01-04 16:16:05 +0100691/*****************************************************************/
Willy Tarreau12785782012-04-27 21:37:17 +0200692/* Sample casts matrix: */
693/* sample_casts[from type][to type] */
694/* NULL pointer used for impossible sample casts */
Emeric Brun107ca302010-01-04 16:16:05 +0100695/*****************************************************************/
Emeric Brun107ca302010-01-04 16:16:05 +0100696
Thierry FOURNIER8af6ff12013-11-21 10:53:12 +0100697sample_cast_fct sample_casts[SMP_TYPES][SMP_TYPES] = {
Thierry FOURNIERd4373142013-12-17 01:10:10 +0100698/* to: BOOL UINT SINT ADDR IPV4 IPV6 STR BIN METH */
699/* from: BOOL */ { c_none, c_none, c_none, NULL, NULL, NULL, c_int2str, NULL, NULL, },
Willy Tarreaubbfd1a22014-07-15 21:19:08 +0200700/* UINT */ { c_none, c_none, c_none, c_int2ip, c_int2ip, NULL, c_int2str, c_int2bin, NULL, },
701/* SINT */ { c_none, c_none, c_none, c_int2ip, c_int2ip, NULL, c_int2str, c_int2bin, NULL, },
Thierry FOURNIERd4373142013-12-17 01:10:10 +0100702/* ADDR */ { NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, },
Willy Tarreau9700e5c2014-07-15 21:03:26 +0200703/* IPV4 */ { NULL, c_ip2int, c_ip2int, c_none, c_none, c_ip2ipv6, c_ip2str, c_addr2bin, NULL, },
704/* IPV6 */ { NULL, NULL, NULL, c_none, NULL, c_none, c_ipv62str, c_addr2bin, NULL, },
Thierry FOURNIERd4373142013-12-17 01:10:10 +0100705/* STR */ { c_str2int, c_str2int, c_str2int, c_str2addr, c_str2ip, c_str2ipv6, c_none, c_none, c_str2meth, },
706/* BIN */ { NULL, NULL, NULL, NULL, NULL, NULL, c_bin2str, c_none, c_str2meth, },
707/* METH */ { NULL, NULL, NULL, NULL, NULL, NULL, c_meth2str, c_meth2str, c_none, },
Willy Tarreauf0b38bf2010-06-06 13:22:23 +0200708};
Emeric Brun107ca302010-01-04 16:16:05 +0100709
Emeric Brun107ca302010-01-04 16:16:05 +0100710/*
Willy Tarreau12785782012-04-27 21:37:17 +0200711 * Parse a sample expression configuration:
Emeric Brun107ca302010-01-04 16:16:05 +0100712 * fetch keyword followed by format conversion keywords.
Willy Tarreau12785782012-04-27 21:37:17 +0200713 * Returns a pointer on allocated sample expression structure.
Willy Tarreaua4312fa2013-04-02 16:34:32 +0200714 * The caller must have set al->ctx.
Emeric Brun107ca302010-01-04 16:16:05 +0100715 */
Thierry FOURNIEReeaa9512014-02-11 14:00:19 +0100716struct sample_expr *sample_parse_expr(char **str, int *idx, const char *file, int line, char **err_msg, struct arg_list *al)
Emeric Brun107ca302010-01-04 16:16:05 +0100717{
Willy Tarreau833cc792013-07-24 15:34:19 +0200718 const char *begw; /* beginning of word */
719 const char *endw; /* end of word */
720 const char *endt; /* end of term */
Willy Tarreau12785782012-04-27 21:37:17 +0200721 struct sample_expr *expr;
722 struct sample_fetch *fetch;
723 struct sample_conv *conv;
Emeric Brun107ca302010-01-04 16:16:05 +0100724 unsigned long prev_type;
Willy Tarreau833cc792013-07-24 15:34:19 +0200725 char *fkw = NULL;
726 char *ckw = NULL;
Willy Tarreau689a1df2013-12-13 00:40:11 +0100727 int err_arg;
Emeric Brun107ca302010-01-04 16:16:05 +0100728
Willy Tarreau833cc792013-07-24 15:34:19 +0200729 begw = str[*idx];
730 for (endw = begw; *endw && *endw != '(' && *endw != ','; endw++);
731
732 if (endw == begw) {
Willy Tarreau975c1782013-12-12 23:16:54 +0100733 memprintf(err_msg, "missing fetch method");
Emeric Brun107ca302010-01-04 16:16:05 +0100734 goto out_error;
Emeric Brun485479d2010-09-23 18:02:19 +0200735 }
Emeric Brun107ca302010-01-04 16:16:05 +0100736
Willy Tarreau833cc792013-07-24 15:34:19 +0200737 /* keep a copy of the current fetch keyword for error reporting */
738 fkw = my_strndup(begw, endw - begw);
Emeric Brun107ca302010-01-04 16:16:05 +0100739
Willy Tarreau833cc792013-07-24 15:34:19 +0200740 fetch = find_sample_fetch(begw, endw - begw);
741 if (!fetch) {
Willy Tarreau975c1782013-12-12 23:16:54 +0100742 memprintf(err_msg, "unknown fetch method '%s'", fkw);
Emeric Brun107ca302010-01-04 16:16:05 +0100743 goto out_error;
Emeric Brun485479d2010-09-23 18:02:19 +0200744 }
Emeric Brun107ca302010-01-04 16:16:05 +0100745
Willy Tarreau833cc792013-07-24 15:34:19 +0200746 endt = endw;
747 if (*endt == '(') {
Willy Tarreau689a1df2013-12-13 00:40:11 +0100748 /* look for the end of this term and skip the opening parenthesis */
749 endt = ++endw;
Willy Tarreau833cc792013-07-24 15:34:19 +0200750 while (*endt && *endt != ')')
751 endt++;
752 if (*endt != ')') {
Willy Tarreau975c1782013-12-12 23:16:54 +0100753 memprintf(err_msg, "missing closing ')' after arguments to fetch keyword '%s'", fkw);
Willy Tarreau833cc792013-07-24 15:34:19 +0200754 goto out_error;
Emeric Brun485479d2010-09-23 18:02:19 +0200755 }
Emeric Brun485479d2010-09-23 18:02:19 +0200756 }
Emeric Brun107ca302010-01-04 16:16:05 +0100757
Willy Tarreau833cc792013-07-24 15:34:19 +0200758 /* At this point, we have :
759 * - begw : beginning of the keyword
Willy Tarreau689a1df2013-12-13 00:40:11 +0100760 * - endw : end of the keyword, first character not part of keyword
761 * nor the opening parenthesis (so first character of args
762 * if present).
Willy Tarreau833cc792013-07-24 15:34:19 +0200763 * - endt : end of the term (=endw or last parenthesis if args are present)
764 */
765
766 if (fetch->out_type >= SMP_TYPES) {
Willy Tarreau975c1782013-12-12 23:16:54 +0100767 memprintf(err_msg, "returns type of fetch method '%s' is unknown", fkw);
Emeric Brun107ca302010-01-04 16:16:05 +0100768 goto out_error;
Emeric Brun485479d2010-09-23 18:02:19 +0200769 }
Emeric Brun107ca302010-01-04 16:16:05 +0100770 prev_type = fetch->out_type;
Willy Tarreau833cc792013-07-24 15:34:19 +0200771
Willy Tarreau12785782012-04-27 21:37:17 +0200772 expr = calloc(1, sizeof(struct sample_expr));
Emeric Brun485479d2010-09-23 18:02:19 +0200773 if (!expr)
774 goto out_error;
Emeric Brun107ca302010-01-04 16:16:05 +0100775
776 LIST_INIT(&(expr->conv_exprs));
777 expr->fetch = fetch;
Willy Tarreau2e845be2012-10-19 19:49:09 +0200778 expr->arg_p = empty_arg_list;
Emeric Brun107ca302010-01-04 16:16:05 +0100779
Willy Tarreau689a1df2013-12-13 00:40:11 +0100780 /* Note that we call the argument parser even with an empty string,
781 * this allows it to automatically create entries for mandatory
782 * implicit arguments (eg: local proxy name).
783 */
784 al->kw = expr->fetch->kw;
785 al->conv = NULL;
786 if (make_arg_list(endw, endt - endw, fetch->arg_mask, &expr->arg_p, err_msg, NULL, &err_arg, al) < 0) {
787 memprintf(err_msg, "fetch method '%s' : %s", fkw, *err_msg);
788 goto out_error;
789 }
Willy Tarreau2e845be2012-10-19 19:49:09 +0200790
Willy Tarreau689a1df2013-12-13 00:40:11 +0100791 if (!expr->arg_p) {
792 expr->arg_p = empty_arg_list;
Emeric Brun485479d2010-09-23 18:02:19 +0200793 }
Willy Tarreau689a1df2013-12-13 00:40:11 +0100794 else if (fetch->val_args && !fetch->val_args(expr->arg_p, err_msg)) {
795 memprintf(err_msg, "invalid args in fetch method '%s' : %s", fkw, *err_msg);
Emeric Brun485479d2010-09-23 18:02:19 +0200796 goto out_error;
Emeric Brun107ca302010-01-04 16:16:05 +0100797 }
798
Willy Tarreau833cc792013-07-24 15:34:19 +0200799 /* Now process the converters if any. We have two supported syntaxes
800 * for the converters, which can be combined :
801 * - comma-delimited list of converters just after the keyword and args ;
802 * - one converter per keyword
803 * The combination allows to have each keyword being a comma-delimited
804 * series of converters.
805 *
806 * We want to process the former first, then the latter. For this we start
807 * from the beginning of the supposed place in the exiting conv chain, which
808 * starts at the last comma (endt).
809 */
810
811 while (1) {
Willy Tarreau12785782012-04-27 21:37:17 +0200812 struct sample_conv_expr *conv_expr;
Emeric Brun107ca302010-01-04 16:16:05 +0100813
Willy Tarreau833cc792013-07-24 15:34:19 +0200814 if (*endt == ')') /* skip last closing parenthesis */
815 endt++;
Emeric Brun107ca302010-01-04 16:16:05 +0100816
Willy Tarreau833cc792013-07-24 15:34:19 +0200817 if (*endt && *endt != ',') {
818 if (ckw)
Willy Tarreau975c1782013-12-12 23:16:54 +0100819 memprintf(err_msg, "missing comma after conv keyword '%s'", ckw);
Willy Tarreau833cc792013-07-24 15:34:19 +0200820 else
Willy Tarreau975c1782013-12-12 23:16:54 +0100821 memprintf(err_msg, "missing comma after fetch keyword '%s'", fkw);
Emeric Brun107ca302010-01-04 16:16:05 +0100822 goto out_error;
Emeric Brun485479d2010-09-23 18:02:19 +0200823 }
Emeric Brun107ca302010-01-04 16:16:05 +0100824
Willy Tarreau833cc792013-07-24 15:34:19 +0200825 while (*endt == ',') /* then trailing commas */
826 endt++;
827
828 begw = endt; /* start of conv keyword */
829
830 if (!*begw) {
831 /* none ? skip to next string */
832 (*idx)++;
833 begw = str[*idx];
834 if (!begw || !*begw)
835 break;
836 }
837
838 for (endw = begw; *endw && *endw != '(' && *endw != ','; endw++);
839
840 free(ckw);
841 ckw = my_strndup(begw, endw - begw);
842
843 conv = find_sample_conv(begw, endw - begw);
844 if (!conv) {
845 /* we found an isolated keyword that we don't know, it's not ours */
846 if (begw == str[*idx])
847 break;
Willy Tarreau975c1782013-12-12 23:16:54 +0100848 memprintf(err_msg, "unknown conv method '%s'", ckw);
Willy Tarreau833cc792013-07-24 15:34:19 +0200849 goto out_error;
850 }
Emeric Brun107ca302010-01-04 16:16:05 +0100851
Willy Tarreau833cc792013-07-24 15:34:19 +0200852 endt = endw;
853 if (*endt == '(') {
854 /* look for the end of this term */
855 while (*endt && *endt != ')')
856 endt++;
857 if (*endt != ')') {
Willy Tarreau975c1782013-12-12 23:16:54 +0100858 memprintf(err_msg, "syntax error: missing ')' after conv keyword '%s'", ckw);
Willy Tarreau833cc792013-07-24 15:34:19 +0200859 goto out_error;
Emeric Brun485479d2010-09-23 18:02:19 +0200860 }
Willy Tarreau833cc792013-07-24 15:34:19 +0200861 }
862
863 if (conv->in_type >= SMP_TYPES || conv->out_type >= SMP_TYPES) {
Willy Tarreau975c1782013-12-12 23:16:54 +0100864 memprintf(err_msg, "returns type of conv method '%s' is unknown", ckw);
Emeric Brun107ca302010-01-04 16:16:05 +0100865 goto out_error;
Emeric Brun485479d2010-09-23 18:02:19 +0200866 }
Emeric Brun107ca302010-01-04 16:16:05 +0100867
868 /* If impossible type conversion */
Willy Tarreau12785782012-04-27 21:37:17 +0200869 if (!sample_casts[prev_type][conv->in_type]) {
Willy Tarreau975c1782013-12-12 23:16:54 +0100870 memprintf(err_msg, "conv method '%s' cannot be applied", ckw);
Emeric Brun107ca302010-01-04 16:16:05 +0100871 goto out_error;
Emeric Brun485479d2010-09-23 18:02:19 +0200872 }
Emeric Brun107ca302010-01-04 16:16:05 +0100873
874 prev_type = conv->out_type;
Willy Tarreau12785782012-04-27 21:37:17 +0200875 conv_expr = calloc(1, sizeof(struct sample_conv_expr));
Emeric Brun485479d2010-09-23 18:02:19 +0200876 if (!conv_expr)
877 goto out_error;
Emeric Brun107ca302010-01-04 16:16:05 +0100878
879 LIST_ADDQ(&(expr->conv_exprs), &(conv_expr->list));
880 conv_expr->conv = conv;
881
Willy Tarreau833cc792013-07-24 15:34:19 +0200882 if (endt != endw) {
Willy Tarreaub27c0d32012-04-20 16:04:47 +0200883 int err_arg;
Willy Tarreau21d68a62012-04-20 15:52:36 +0200884
Willy Tarreau9fcb9842012-04-20 14:45:49 +0200885 if (!conv->arg_mask) {
Willy Tarreau975c1782013-12-12 23:16:54 +0100886 memprintf(err_msg, "conv method '%s' does not support any args", ckw);
Emeric Brun485479d2010-09-23 18:02:19 +0200887 goto out_error;
888 }
Willy Tarreau9e92d322010-01-26 17:58:06 +0100889
Willy Tarreaua4312fa2013-04-02 16:34:32 +0200890 al->kw = expr->fetch->kw;
891 al->conv = conv_expr->conv->kw;
Willy Tarreau975c1782013-12-12 23:16:54 +0100892 if (make_arg_list(endw + 1, endt - endw - 1, conv->arg_mask, &conv_expr->arg_p, err_msg, NULL, &err_arg, al) < 0) {
893 memprintf(err_msg, "invalid arg %d in conv method '%s' : %s", err_arg+1, ckw, *err_msg);
Willy Tarreau21d68a62012-04-20 15:52:36 +0200894 goto out_error;
895 }
896
Willy Tarreau2e845be2012-10-19 19:49:09 +0200897 if (!conv_expr->arg_p)
898 conv_expr->arg_p = empty_arg_list;
899
Thierry FOURNIEReeaa9512014-02-11 14:00:19 +0100900 if (conv->val_args && !conv->val_args(conv_expr->arg_p, conv, file, line, err_msg)) {
Willy Tarreau975c1782013-12-12 23:16:54 +0100901 memprintf(err_msg, "invalid args in conv method '%s' : %s", ckw, *err_msg);
Emeric Brun485479d2010-09-23 18:02:19 +0200902 goto out_error;
903 }
904 }
Willy Tarreau833cc792013-07-24 15:34:19 +0200905 else if (ARGM(conv->arg_mask)) {
Willy Tarreau975c1782013-12-12 23:16:54 +0100906 memprintf(err_msg, "missing args for conv method '%s'", ckw);
Emeric Brun485479d2010-09-23 18:02:19 +0200907 goto out_error;
Emeric Brun107ca302010-01-04 16:16:05 +0100908 }
909 }
Emeric Brun485479d2010-09-23 18:02:19 +0200910
Willy Tarreau833cc792013-07-24 15:34:19 +0200911 out:
912 free(fkw);
913 free(ckw);
Emeric Brun107ca302010-01-04 16:16:05 +0100914 return expr;
915
916out_error:
Willy Tarreau12785782012-04-27 21:37:17 +0200917 /* TODO: prune_sample_expr(expr); */
Willy Tarreau833cc792013-07-24 15:34:19 +0200918 expr = NULL;
919 goto out;
Emeric Brun107ca302010-01-04 16:16:05 +0100920}
921
922/*
Willy Tarreau12785782012-04-27 21:37:17 +0200923 * Process a fetch + format conversion of defined by the sample expression <expr>
Willy Tarreau32a6f2e2012-04-25 10:13:36 +0200924 * on request or response considering the <opt> parameter.
Willy Tarreau12785782012-04-27 21:37:17 +0200925 * Returns a pointer on a typed sample structure containing the result or NULL if
926 * sample is not found or when format conversion failed.
Emeric Brun107ca302010-01-04 16:16:05 +0100927 * If <p> is not null, function returns results in structure pointed by <p>.
Willy Tarreau12785782012-04-27 21:37:17 +0200928 * If <p> is null, functions returns a pointer on a static sample structure.
Willy Tarreaub8c8f1f2012-04-23 22:38:26 +0200929 *
930 * Note: the fetch functions are required to properly set the return type. The
931 * conversion functions must do so too. However the cast functions do not need
932 * to since they're made to cast mutiple types according to what is required.
Emeric Brun107ca302010-01-04 16:16:05 +0100933 */
Willy Tarreau12785782012-04-27 21:37:17 +0200934struct sample *sample_process(struct proxy *px, struct session *l4, void *l7,
935 unsigned int opt,
936 struct sample_expr *expr, struct sample *p)
Emeric Brun107ca302010-01-04 16:16:05 +0100937{
Willy Tarreau12785782012-04-27 21:37:17 +0200938 struct sample_conv_expr *conv_expr;
Emeric Brun107ca302010-01-04 16:16:05 +0100939
Willy Tarreau18387e22013-07-25 12:02:38 +0200940 if (p == NULL) {
Willy Tarreaub4a88f02012-04-23 21:35:11 +0200941 p = &temp_smp;
Willy Tarreau6c616e02014-06-25 16:56:41 +0200942 memset(p, 0, sizeof(*p));
Willy Tarreau18387e22013-07-25 12:02:38 +0200943 }
Emeric Brun107ca302010-01-04 16:16:05 +0100944
Willy Tarreauef38c392013-07-22 16:29:32 +0200945 if (!expr->fetch->process(px, l4, l7, opt, expr->arg_p, p, expr->fetch->kw))
Emeric Brun107ca302010-01-04 16:16:05 +0100946 return NULL;
947
Emeric Brun107ca302010-01-04 16:16:05 +0100948 list_for_each_entry(conv_expr, &expr->conv_exprs, list) {
Willy Tarreau12e50112012-04-25 17:21:49 +0200949 /* we want to ensure that p->type can be casted into
950 * conv_expr->conv->in_type. We have 3 possibilities :
951 * - NULL => not castable.
952 * - c_none => nothing to do (let's optimize it)
953 * - other => apply cast and prepare to fail
954 */
Willy Tarreau12785782012-04-27 21:37:17 +0200955 if (!sample_casts[p->type][conv_expr->conv->in_type])
Willy Tarreau12e50112012-04-25 17:21:49 +0200956 return NULL;
957
Willy Tarreau12785782012-04-27 21:37:17 +0200958 if (sample_casts[p->type][conv_expr->conv->in_type] != c_none &&
959 !sample_casts[p->type][conv_expr->conv->in_type](p))
Emeric Brun107ca302010-01-04 16:16:05 +0100960 return NULL;
961
Willy Tarreau12e50112012-04-25 17:21:49 +0200962 /* OK cast succeeded */
963
Willy Tarreau342acb42012-04-23 22:03:39 +0200964 if (!conv_expr->conv->process(conv_expr->arg_p, p))
Emeric Brun107ca302010-01-04 16:16:05 +0100965 return NULL;
Emeric Brun107ca302010-01-04 16:16:05 +0100966 }
967 return p;
968}
969
Willy Tarreaue7ad4bb2012-12-21 00:02:32 +0100970/*
Willy Tarreaua4312fa2013-04-02 16:34:32 +0200971 * Resolve all remaining arguments in proxy <p>. Returns the number of
972 * errors or 0 if everything is fine.
973 */
974int smp_resolve_args(struct proxy *p)
975{
976 struct arg_list *cur, *bak;
977 const char *ctx, *where;
978 const char *conv_ctx, *conv_pre, *conv_pos;
979 struct userlist *ul;
980 struct arg *arg;
981 int cfgerr = 0;
982
983 list_for_each_entry_safe(cur, bak, &p->conf.args.list, list) {
984 struct proxy *px;
985 struct server *srv;
986 char *pname, *sname;
987
988 arg = cur->arg;
989
990 /* prepare output messages */
991 conv_pre = conv_pos = conv_ctx = "";
992 if (cur->conv) {
993 conv_ctx = cur->conv;
994 conv_pre = "conversion keyword '";
995 conv_pos = "' for ";
996 }
997
998 where = "in";
999 ctx = "sample fetch keyword";
1000 switch (cur->ctx) {
1001 case ARGC_STK:where = "in stick rule in"; break;
1002 case ARGC_TRK: where = "in tracking rule in"; break;
1003 case ARGC_LOG: where = "in log-format string in"; break;
Thierry FOURNIER1c0054f2013-11-20 15:09:52 +01001004 case ARGC_HRQ: where = "in http-request header format string in"; break;
1005 case ARGC_HRS: where = "in http-response header format string in"; break;
Willy Tarreaua4312fa2013-04-02 16:34:32 +02001006 case ARGC_UIF: where = "in unique-id-format string in"; break;
Thierry FOURNIERd18cd0f2013-11-29 12:15:45 +01001007 case ARGC_RDR: where = "in redirect format string in"; break;
Willy Tarreau3a4ac422014-06-13 16:17:14 +02001008 case ARGC_CAP: where = "in capture rule in"; break;
Willy Tarreaua4312fa2013-04-02 16:34:32 +02001009 case ARGC_ACL: ctx = "ACL keyword"; break;
1010 }
1011
1012 /* set a few default settings */
1013 px = p;
1014 pname = p->id;
1015
1016 switch (arg->type) {
1017 case ARGT_SRV:
1018 if (!arg->data.str.len) {
1019 Alert("parsing [%s:%d] : missing server name in arg %d of %s%s%s%s '%s' %s proxy '%s'.\n",
1020 cur->file, cur->line,
1021 cur->arg_pos + 1, conv_pre, conv_ctx, conv_pos, ctx, cur->kw, where, p->id);
1022 cfgerr++;
1023 continue;
1024 }
1025
1026 /* we support two formats : "bck/srv" and "srv" */
1027 sname = strrchr(arg->data.str.str, '/');
1028
1029 if (sname) {
1030 *sname++ = '\0';
1031 pname = arg->data.str.str;
1032
1033 px = findproxy(pname, PR_CAP_BE);
1034 if (!px) {
1035 Alert("parsing [%s:%d] : unable to find proxy '%s' referenced in arg %d of %s%s%s%s '%s' %s proxy '%s'.\n",
1036 cur->file, cur->line, pname,
1037 cur->arg_pos + 1, conv_pre, conv_ctx, conv_pos, ctx, cur->kw, where, p->id);
1038 cfgerr++;
1039 break;
1040 }
1041 }
1042 else
1043 sname = arg->data.str.str;
1044
1045 srv = findserver(px, sname);
1046 if (!srv) {
1047 Alert("parsing [%s:%d] : unable to find server '%s' in proxy '%s', referenced in arg %d of %s%s%s%s '%s' %s proxy '%s'.\n",
1048 cur->file, cur->line, sname, pname,
1049 cur->arg_pos + 1, conv_pre, conv_ctx, conv_pos, ctx, cur->kw, where, p->id);
1050 cfgerr++;
1051 break;
1052 }
1053
1054 free(arg->data.str.str);
1055 arg->data.str.str = NULL;
1056 arg->unresolved = 0;
1057 arg->data.srv = srv;
1058 break;
1059
1060 case ARGT_FE:
1061 if (arg->data.str.len) {
1062 pname = arg->data.str.str;
1063 px = findproxy(pname, PR_CAP_FE);
1064 }
1065
1066 if (!px) {
1067 Alert("parsing [%s:%d] : unable to find frontend '%s' referenced in arg %d of %s%s%s%s '%s' %s proxy '%s'.\n",
1068 cur->file, cur->line, pname,
1069 cur->arg_pos + 1, conv_pre, conv_ctx, conv_pos, ctx, cur->kw, where, p->id);
1070 cfgerr++;
1071 break;
1072 }
1073
1074 if (!(px->cap & PR_CAP_FE)) {
1075 Alert("parsing [%s:%d] : proxy '%s', referenced in arg %d of %s%s%s%s '%s' %s proxy '%s', has not frontend capability.\n",
1076 cur->file, cur->line, pname,
1077 cur->arg_pos + 1, conv_pre, conv_ctx, conv_pos, ctx, cur->kw, where, p->id);
1078 cfgerr++;
1079 break;
1080 }
1081
1082 free(arg->data.str.str);
1083 arg->data.str.str = NULL;
1084 arg->unresolved = 0;
1085 arg->data.prx = px;
1086 break;
1087
1088 case ARGT_BE:
1089 if (arg->data.str.len) {
1090 pname = arg->data.str.str;
1091 px = findproxy(pname, PR_CAP_BE);
1092 }
1093
1094 if (!px) {
1095 Alert("parsing [%s:%d] : unable to find backend '%s' referenced in arg %d of %s%s%s%s '%s' %s proxy '%s'.\n",
1096 cur->file, cur->line, pname,
1097 cur->arg_pos + 1, conv_pre, conv_ctx, conv_pos, ctx, cur->kw, where, p->id);
1098 cfgerr++;
1099 break;
1100 }
1101
1102 if (!(px->cap & PR_CAP_BE)) {
1103 Alert("parsing [%s:%d] : proxy '%s', referenced in arg %d of %s%s%s%s '%s' %s proxy '%s', has not backend capability.\n",
1104 cur->file, cur->line, pname,
1105 cur->arg_pos + 1, conv_pre, conv_ctx, conv_pos, ctx, cur->kw, where, p->id);
1106 cfgerr++;
1107 break;
1108 }
1109
1110 free(arg->data.str.str);
1111 arg->data.str.str = NULL;
1112 arg->unresolved = 0;
1113 arg->data.prx = px;
1114 break;
1115
1116 case ARGT_TAB:
1117 if (arg->data.str.len) {
1118 pname = arg->data.str.str;
1119 px = find_stktable(pname);
1120 }
1121
1122 if (!px) {
1123 Alert("parsing [%s:%d] : unable to find table '%s' referenced in arg %d of %s%s%s%s '%s' %s proxy '%s'.\n",
1124 cur->file, cur->line, pname,
1125 cur->arg_pos + 1, conv_pre, conv_ctx, conv_pos, ctx, cur->kw, where, p->id);
1126 cfgerr++;
1127 break;
1128 }
1129
1130 if (!px->table.size) {
1131 Alert("parsing [%s:%d] : no table in proxy '%s' referenced in arg %d of %s%s%s%s '%s' %s proxy '%s'.\n",
1132 cur->file, cur->line, pname,
1133 cur->arg_pos + 1, conv_pre, conv_ctx, conv_pos, ctx, cur->kw, where, p->id);
1134 cfgerr++;
1135 break;
1136 }
1137
1138 free(arg->data.str.str);
1139 arg->data.str.str = NULL;
1140 arg->unresolved = 0;
1141 arg->data.prx = px;
1142 break;
1143
1144 case ARGT_USR:
1145 if (!arg->data.str.len) {
1146 Alert("parsing [%s:%d] : missing userlist name in arg %d of %s%s%s%s '%s' %s proxy '%s'.\n",
1147 cur->file, cur->line,
1148 cur->arg_pos + 1, conv_pre, conv_ctx, conv_pos, ctx, cur->kw, where, p->id);
1149 cfgerr++;
1150 break;
1151 }
1152
1153 if (p->uri_auth && p->uri_auth->userlist &&
1154 !strcmp(p->uri_auth->userlist->name, arg->data.str.str))
1155 ul = p->uri_auth->userlist;
1156 else
1157 ul = auth_find_userlist(arg->data.str.str);
1158
1159 if (!ul) {
1160 Alert("parsing [%s:%d] : unable to find userlist '%s' referenced in arg %d of %s%s%s%s '%s' %s proxy '%s'.\n",
1161 cur->file, cur->line, arg->data.str.str,
1162 cur->arg_pos + 1, conv_pre, conv_ctx, conv_pos, ctx, cur->kw, where, p->id);
1163 cfgerr++;
1164 break;
1165 }
1166
1167 free(arg->data.str.str);
1168 arg->data.str.str = NULL;
1169 arg->unresolved = 0;
1170 arg->data.usr = ul;
1171 break;
1172 }
1173
1174 LIST_DEL(&cur->list);
1175 free(cur);
1176 } /* end of args processing */
1177
1178 return cfgerr;
1179}
1180
1181/*
Willy Tarreau5b4bf702014-06-13 16:04:35 +02001182 * Process a fetch + format conversion as defined by the sample expression
1183 * <expr> on request or response considering the <opt> parameter. The output is
1184 * always of type string. If a stable sample can be fetched, or an unstable one
1185 * when <opt> contains SMP_OPT_FINAL, the sample is converted to a string and
1186 * returned without the SMP_F_MAY_CHANGE flag. If an unstable sample is found
1187 * and <opt> does not contain SMP_OPT_FINAL, then the sample is returned as-is
1188 * with its SMP_F_MAY_CHANGE flag so that the caller can check it and decide to
1189 * take actions (eg: wait longer). If a sample could not be found or could not
1190 * be converted, NULL is returned.
Willy Tarreaue7ad4bb2012-12-21 00:02:32 +01001191 */
1192struct sample *sample_fetch_string(struct proxy *px, struct session *l4, void *l7,
1193 unsigned int opt, struct sample_expr *expr)
1194{
Willy Tarreau5b4bf702014-06-13 16:04:35 +02001195 struct sample *smp = &temp_smp;
Willy Tarreaue7ad4bb2012-12-21 00:02:32 +01001196
Willy Tarreau6c616e02014-06-25 16:56:41 +02001197 memset(smp, 0, sizeof(*smp));
1198
Willy Tarreau5b4bf702014-06-13 16:04:35 +02001199 if (!sample_process(px, l4, l7, opt, expr, smp)) {
1200 if ((smp->flags & SMP_F_MAY_CHANGE) && !(opt & SMP_OPT_FINAL))
1201 return smp;
Willy Tarreaue7ad4bb2012-12-21 00:02:32 +01001202 return NULL;
Willy Tarreau5b4bf702014-06-13 16:04:35 +02001203 }
Willy Tarreaue7ad4bb2012-12-21 00:02:32 +01001204
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +01001205 if (!sample_casts[smp->type][SMP_T_STR])
Willy Tarreaue7ad4bb2012-12-21 00:02:32 +01001206 return NULL;
1207
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +01001208 if (!sample_casts[smp->type][SMP_T_STR](smp))
Willy Tarreaue7ad4bb2012-12-21 00:02:32 +01001209 return NULL;
1210
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +01001211 smp->type = SMP_T_STR;
Willy Tarreau5b4bf702014-06-13 16:04:35 +02001212 smp->flags &= ~SMP_F_MAY_CHANGE;
Willy Tarreaue7ad4bb2012-12-21 00:02:32 +01001213 return smp;
1214}
1215
Emeric Brun107ca302010-01-04 16:16:05 +01001216/*****************************************************************/
Willy Tarreau12785782012-04-27 21:37:17 +02001217/* Sample format convert functions */
Willy Tarreaub8c8f1f2012-04-23 22:38:26 +02001218/* These functions set the data type on return. */
Emeric Brun107ca302010-01-04 16:16:05 +01001219/*****************************************************************/
1220
Emeric Brun53d1a982014-04-30 18:21:37 +02001221static int sample_conv_bin2base64(const struct arg *arg_p, struct sample *smp)
1222{
1223 struct chunk *trash = get_trash_chunk();
1224 int b64_len;
1225
1226 trash->len = 0;
1227 b64_len = a2base64(smp->data.str.str, smp->data.str.len, trash->str, trash->size);
1228 if (b64_len < 0)
1229 return 0;
1230
1231 trash->len = b64_len;
1232 smp->data.str = *trash;
1233 smp->type = SMP_T_STR;
1234 smp->flags &= ~SMP_F_CONST;
1235 return 1;
1236}
1237
Thierry FOURNIER2f49d6d2014-03-12 15:01:52 +01001238static int sample_conv_bin2hex(const struct arg *arg_p, struct sample *smp)
1239{
1240 struct chunk *trash = get_trash_chunk();
1241 unsigned char c;
1242 int ptr = 0;
1243
1244 trash->len = 0;
1245 while (ptr < smp->data.str.len && trash->len <= trash->size - 2) {
1246 c = smp->data.str.str[ptr++];
1247 trash->str[trash->len++] = hextab[(c >> 4) & 0xF];
1248 trash->str[trash->len++] = hextab[c & 0xF];
1249 }
1250 smp->data.str = *trash;
1251 smp->type = SMP_T_STR;
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +01001252 smp->flags &= ~SMP_F_CONST;
Thierry FOURNIER2f49d6d2014-03-12 15:01:52 +01001253 return 1;
1254}
1255
Willy Tarreau23ec4ca2014-07-15 20:15:37 +02001256/* hashes the binary input into a 32-bit unsigned int */
1257static int sample_conv_djb2(const struct arg *arg_p, struct sample *smp)
1258{
1259 smp->data.uint = hash_djb2(smp->data.str.str, smp->data.str.len);
1260 if (arg_p && arg_p->data.uint)
1261 smp->data.uint = full_hash(smp->data.uint);
1262 smp->type = SMP_T_UINT;
1263 return 1;
1264}
1265
Willy Tarreau12785782012-04-27 21:37:17 +02001266static int sample_conv_str2lower(const struct arg *arg_p, struct sample *smp)
Emeric Brun107ca302010-01-04 16:16:05 +01001267{
1268 int i;
1269
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +01001270 if (!smp_dup(smp))
1271 return 0;
1272
Willy Tarreau342acb42012-04-23 22:03:39 +02001273 if (!smp->data.str.size)
Emeric Brun485479d2010-09-23 18:02:19 +02001274 return 0;
1275
Willy Tarreau342acb42012-04-23 22:03:39 +02001276 for (i = 0; i < smp->data.str.len; i++) {
1277 if ((smp->data.str.str[i] >= 'A') && (smp->data.str.str[i] <= 'Z'))
1278 smp->data.str.str[i] += 'a' - 'A';
Emeric Brun107ca302010-01-04 16:16:05 +01001279 }
1280 return 1;
1281}
1282
Willy Tarreau12785782012-04-27 21:37:17 +02001283static int sample_conv_str2upper(const struct arg *arg_p, struct sample *smp)
Emeric Brun107ca302010-01-04 16:16:05 +01001284{
1285 int i;
1286
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +01001287 if (!smp_dup(smp))
1288 return 0;
1289
Willy Tarreau342acb42012-04-23 22:03:39 +02001290 if (!smp->data.str.size)
Emeric Brun485479d2010-09-23 18:02:19 +02001291 return 0;
1292
Willy Tarreau342acb42012-04-23 22:03:39 +02001293 for (i = 0; i < smp->data.str.len; i++) {
1294 if ((smp->data.str.str[i] >= 'a') && (smp->data.str.str[i] <= 'z'))
1295 smp->data.str.str[i] += 'A' - 'a';
Emeric Brun107ca302010-01-04 16:16:05 +01001296 }
1297 return 1;
1298}
1299
Willy Tarreauf9954102012-04-20 14:03:29 +02001300/* takes the netmask in arg_p */
Willy Tarreau12785782012-04-27 21:37:17 +02001301static int sample_conv_ipmask(const struct arg *arg_p, struct sample *smp)
Willy Tarreaud31d6eb2010-01-26 18:01:41 +01001302{
Willy Tarreau342acb42012-04-23 22:03:39 +02001303 smp->data.ipv4.s_addr &= arg_p->data.ipv4.s_addr;
Willy Tarreaub8c8f1f2012-04-23 22:38:26 +02001304 smp->type = SMP_T_IPV4;
Willy Tarreaud31d6eb2010-01-26 18:01:41 +01001305 return 1;
1306}
1307
Willy Tarreau0dbfdba2014-07-10 16:37:47 +02001308/* takes an UINT value on input supposed to represent the time since EPOCH,
1309 * adds an optional offset found in args[1] and emits a string representing
1310 * the local time in the format specified in args[1] using strftime().
1311 */
1312static int sample_conv_ltime(const struct arg *args, struct sample *smp)
1313{
1314 struct chunk *temp;
1315 time_t curr_date = smp->data.uint;
1316
1317 /* add offset */
1318 if (args[1].type == ARGT_SINT || args[1].type == ARGT_UINT)
1319 curr_date += args[1].data.sint;
1320
1321 temp = get_trash_chunk();
1322 temp->len = strftime(temp->str, temp->size, args[0].data.str.str, localtime(&curr_date));
1323 smp->data.str = *temp;
1324 smp->type = SMP_T_STR;
1325 return 1;
1326}
1327
Willy Tarreau23ec4ca2014-07-15 20:15:37 +02001328/* hashes the binary input into a 32-bit unsigned int */
1329static int sample_conv_sdbm(const struct arg *arg_p, struct sample *smp)
1330{
1331 smp->data.uint = hash_sdbm(smp->data.str.str, smp->data.str.len);
1332 if (arg_p && arg_p->data.uint)
1333 smp->data.uint = full_hash(smp->data.uint);
1334 smp->type = SMP_T_UINT;
1335 return 1;
1336}
1337
Willy Tarreau0dbfdba2014-07-10 16:37:47 +02001338/* takes an UINT value on input supposed to represent the time since EPOCH,
1339 * adds an optional offset found in args[1] and emits a string representing
1340 * the UTC date in the format specified in args[1] using strftime().
1341 */
1342static int sample_conv_utime(const struct arg *args, struct sample *smp)
1343{
1344 struct chunk *temp;
1345 time_t curr_date = smp->data.uint;
1346
1347 /* add offset */
1348 if (args[1].type == ARGT_SINT || args[1].type == ARGT_UINT)
1349 curr_date += args[1].data.sint;
1350
1351 temp = get_trash_chunk();
1352 temp->len = strftime(temp->str, temp->size, args[0].data.str.str, gmtime(&curr_date));
1353 smp->data.str = *temp;
1354 smp->type = SMP_T_STR;
1355 return 1;
1356}
1357
Willy Tarreau23ec4ca2014-07-15 20:15:37 +02001358/* hashes the binary input into a 32-bit unsigned int */
1359static int sample_conv_wt6(const struct arg *arg_p, struct sample *smp)
1360{
1361 smp->data.uint = hash_wt6(smp->data.str.str, smp->data.str.len);
1362 if (arg_p && arg_p->data.uint)
1363 smp->data.uint = full_hash(smp->data.uint);
1364 smp->type = SMP_T_UINT;
1365 return 1;
1366}
1367
Willy Tarreau5b8ad222013-07-25 12:17:57 +02001368/************************************************************************/
1369/* All supported sample fetch functions must be declared here */
1370/************************************************************************/
1371
1372/* force TRUE to be returned at the fetch level */
1373static int
1374smp_fetch_true(struct proxy *px, struct session *s, void *l7, unsigned int opt,
Willy Tarreauef38c392013-07-22 16:29:32 +02001375 const struct arg *args, struct sample *smp, const char *kw)
Willy Tarreau5b8ad222013-07-25 12:17:57 +02001376{
1377 smp->type = SMP_T_BOOL;
1378 smp->data.uint = 1;
1379 return 1;
1380}
1381
1382/* force FALSE to be returned at the fetch level */
1383static int
1384smp_fetch_false(struct proxy *px, struct session *s, void *l7, unsigned int opt,
Willy Tarreauef38c392013-07-22 16:29:32 +02001385 const struct arg *args, struct sample *smp, const char *kw)
Willy Tarreau5b8ad222013-07-25 12:17:57 +02001386{
1387 smp->type = SMP_T_BOOL;
1388 smp->data.uint = 0;
1389 return 1;
1390}
1391
1392/* retrieve environment variable $1 as a string */
1393static int
1394smp_fetch_env(struct proxy *px, struct session *s, void *l7, unsigned int opt,
Willy Tarreauef38c392013-07-22 16:29:32 +02001395 const struct arg *args, struct sample *smp, const char *kw)
Willy Tarreau5b8ad222013-07-25 12:17:57 +02001396{
1397 char *env;
1398
1399 if (!args || args[0].type != ARGT_STR)
1400 return 0;
1401
1402 env = getenv(args[0].data.str.str);
1403 if (!env)
1404 return 0;
1405
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +01001406 smp->type = SMP_T_STR;
1407 smp->flags = SMP_F_CONST;
Willy Tarreau5b8ad222013-07-25 12:17:57 +02001408 smp->data.str.str = env;
1409 smp->data.str.len = strlen(env);
1410 return 1;
1411}
1412
Willy Tarreau6236d3a2013-07-25 14:28:25 +02001413/* retrieve the current local date in epoch time, and applies an optional offset
1414 * of args[0] seconds.
1415 */
1416static int
1417smp_fetch_date(struct proxy *px, struct session *s, void *l7, unsigned int opt,
Willy Tarreauef38c392013-07-22 16:29:32 +02001418 const struct arg *args, struct sample *smp, const char *kw)
Willy Tarreau6236d3a2013-07-25 14:28:25 +02001419{
1420 smp->data.uint = date.tv_sec;
1421
1422 /* add offset */
1423 if (args && (args[0].type == ARGT_SINT || args[0].type == ARGT_UINT))
1424 smp->data.uint += args[0].data.sint;
1425
1426 smp->type = SMP_T_UINT;
1427 smp->flags |= SMP_F_VOL_TEST | SMP_F_MAY_CHANGE;
1428 return 1;
1429}
1430
Willy Tarreau84310e22014-02-14 11:59:04 +01001431/* generate a random 32-bit integer for whatever purpose, with an optional
1432 * range specified in argument.
1433 */
1434static int
1435smp_fetch_rand(struct proxy *px, struct session *s, void *l7, unsigned int opt,
1436 const struct arg *args, struct sample *smp, const char *kw)
1437{
1438 smp->data.uint = random();
1439
1440 /* reduce if needed. Don't do a modulo, use all bits! */
1441 if (args && args[0].type == ARGT_UINT)
1442 smp->data.uint = ((uint64_t)smp->data.uint * args[0].data.uint) >> 32;
1443
1444 smp->type = SMP_T_UINT;
1445 smp->flags |= SMP_F_VOL_TEST | SMP_F_MAY_CHANGE;
1446 return 1;
1447}
1448
Willy Tarreau5b8ad222013-07-25 12:17:57 +02001449/* Note: must not be declared <const> as its list will be overwritten.
1450 * Note: fetches that may return multiple types must be declared as the lowest
1451 * common denominator, the type that can be casted into all other ones. For
1452 * instance IPv4/IPv6 must be declared IPv4.
1453 */
1454static struct sample_fetch_kw_list smp_kws = {ILH, {
1455 { "always_false", smp_fetch_false, 0, NULL, SMP_T_BOOL, SMP_USE_INTRN },
1456 { "always_true", smp_fetch_true, 0, NULL, SMP_T_BOOL, SMP_USE_INTRN },
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +01001457 { "env", smp_fetch_env, ARG1(1,STR), NULL, SMP_T_STR, SMP_USE_INTRN },
Willy Tarreau6236d3a2013-07-25 14:28:25 +02001458 { "date", smp_fetch_date, ARG1(0,SINT), NULL, SMP_T_UINT, SMP_USE_INTRN },
Willy Tarreau84310e22014-02-14 11:59:04 +01001459 { "rand", smp_fetch_rand, ARG1(0,UINT), NULL, SMP_T_UINT, SMP_USE_INTRN },
Willy Tarreau5b8ad222013-07-25 12:17:57 +02001460 { /* END */ },
1461}};
1462
Emeric Brun107ca302010-01-04 16:16:05 +01001463/* Note: must not be declared <const> as its list will be overwritten */
Willy Tarreaudc13c112013-06-21 23:16:39 +02001464static struct sample_conv_kw_list sample_conv_kws = {ILH, {
Emeric Brun53d1a982014-04-30 18:21:37 +02001465 { "base64", sample_conv_bin2base64,0, NULL, SMP_T_BIN, SMP_T_STR },
Willy Tarreau12785782012-04-27 21:37:17 +02001466 { "upper", sample_conv_str2upper, 0, NULL, SMP_T_STR, SMP_T_STR },
1467 { "lower", sample_conv_str2lower, 0, NULL, SMP_T_STR, SMP_T_STR },
Thierry FOURNIER2f49d6d2014-03-12 15:01:52 +01001468 { "hex", sample_conv_bin2hex, 0, NULL, SMP_T_BIN, SMP_T_STR },
Willy Tarreau12785782012-04-27 21:37:17 +02001469 { "ipmask", sample_conv_ipmask, ARG1(1,MSK4), NULL, SMP_T_IPV4, SMP_T_IPV4 },
Willy Tarreau0dbfdba2014-07-10 16:37:47 +02001470 { "ltime", sample_conv_ltime, ARG2(1,STR,SINT), NULL, SMP_T_UINT, SMP_T_STR },
1471 { "utime", sample_conv_utime, ARG2(1,STR,SINT), NULL, SMP_T_UINT, SMP_T_STR },
Willy Tarreau23ec4ca2014-07-15 20:15:37 +02001472 { "djb2", sample_conv_djb2, ARG1(0,UINT), NULL, SMP_T_BIN, SMP_T_UINT },
1473 { "sdbm", sample_conv_sdbm, ARG1(0,UINT), NULL, SMP_T_BIN, SMP_T_UINT },
1474 { "wt6", sample_conv_wt6, ARG1(0,UINT), NULL, SMP_T_BIN, SMP_T_UINT },
Willy Tarreau9fcb9842012-04-20 14:45:49 +02001475 { NULL, NULL, 0, 0, 0 },
Emeric Brun107ca302010-01-04 16:16:05 +01001476}};
1477
1478__attribute__((constructor))
Willy Tarreau12785782012-04-27 21:37:17 +02001479static void __sample_init(void)
Emeric Brun107ca302010-01-04 16:16:05 +01001480{
Willy Tarreau5b8ad222013-07-25 12:17:57 +02001481 /* register sample fetch and format conversion keywords */
1482 sample_register_fetches(&smp_kws);
Willy Tarreau12785782012-04-27 21:37:17 +02001483 sample_register_convs(&sample_conv_kws);
Emeric Brun107ca302010-01-04 16:16:05 +01001484}