blob: 02524dd9a751e1e97bbef4de6995c56ab49db806 [file] [log] [blame]
Christopher Faulet3e3d3be2021-02-16 13:31:30 +01001/*
2 * Server-state management functions.
3 *
4 * Copyright (C) 2021 HAProxy Technologies, Christopher Faulet <cfaulet@haproxy.com>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
13#include <errno.h>
14
15#include <import/eb64tree.h>
16#include <import/xxhash.h>
Emeric Brun0c4a8a32021-06-11 10:48:45 +020017#include <import/ebistree.h>
Christopher Faulet3e3d3be2021-02-16 13:31:30 +010018
19#include <haproxy/api.h>
20#include <haproxy/backend.h>
21#include <haproxy/cfgparse.h>
22#include <haproxy/check.h>
23#include <haproxy/errors.h>
24#include <haproxy/global.h>
25#include <haproxy/log.h>
26#include <haproxy/port_range.h>
27#include <haproxy/proxy.h>
28#include <haproxy/resolvers.h>
29#include <haproxy/server.h>
30#include <haproxy/ssl_sock.h>
Willy Tarreaubf1ae1a2021-05-08 13:08:34 +020031#include <haproxy/tools.h>
Christopher Faulet3e3d3be2021-02-16 13:31:30 +010032
33
34/* Update a server state using the parameters available in the params list.
35 * The caller must provide a supported version
36 * Grabs the server lock during operation.
37 */
38static void srv_state_srv_update(struct server *srv, int version, char **params)
39{
40 char *p;
41 struct buffer *msg;
42 const char *warning;
43
44 /* fields since version 1
45 * and common to all other upcoming versions
46 */
47 enum srv_state srv_op_state;
48 enum srv_admin srv_admin_state;
49 unsigned srv_uweight, srv_iweight;
50 unsigned long srv_last_time_change;
51 short srv_check_status;
52 enum chk_result srv_check_result;
53 int srv_check_health;
54 int srv_check_state, srv_agent_state;
55 int bk_f_forced_id;
56 int srv_f_forced_id;
57 int fqdn_set_by_cli;
58 const char *fqdn;
59 const char *port_st;
60 unsigned int port_svc;
61 char *srvrecord;
62 char *addr;
63 int partial_apply = 0;
64#ifdef USE_OPENSSL
65 int use_ssl;
66#endif
67
68 fqdn = NULL;
69 port_svc = 0;
70 msg = alloc_trash_chunk();
71 if (!msg)
72 goto end;
73
74 HA_SPIN_LOCK(SERVER_LOCK, &srv->lock);
75
76 /* Only version 1 supported for now, don't check it. Fields are :
77 * srv_addr: params[0]
78 * srv_op_state: params[1]
79 * srv_admin_state: params[2]
80 * srv_uweight: params[3]
81 * srv_iweight: params[4]
82 * srv_last_time_change: params[5]
83 * srv_check_status: params[6]
84 * srv_check_result: params[7]
85 * srv_check_health: params[8]
86 * srv_check_state: params[9]
87 * srv_agent_state: params[10]
88 * bk_f_forced_id: params[11]
89 * srv_f_forced_id: params[12]
90 * srv_fqdn: params[13]
91 * srv_port: params[14]
92 * srvrecord: params[15]
93 * srv_use_ssl: params[16]
94 * srv_check_port: params[17]
95 * srv_check_addr: params[18]
96 * srv_agent_addr: params[19]
97 * srv_agent_port: params[20]
98 */
99
100 /* validating srv_op_state */
101 p = NULL;
102 errno = 0;
103 srv_op_state = strtol(params[1], &p, 10);
104 if ((p == params[1]) || errno == EINVAL || errno == ERANGE ||
105 (srv_op_state != SRV_ST_STOPPED &&
106 srv_op_state != SRV_ST_STARTING &&
107 srv_op_state != SRV_ST_RUNNING &&
108 srv_op_state != SRV_ST_STOPPING)) {
109 chunk_appendf(msg, ", invalid srv_op_state value '%s'", params[1]);
110 }
111
112 /* validating srv_admin_state */
113 p = NULL;
114 errno = 0;
115 srv_admin_state = strtol(params[2], &p, 10);
116 fqdn_set_by_cli = !!(srv_admin_state & SRV_ADMF_HMAINT);
117
118 /* inherited statuses will be recomputed later.
119 * Also disable SRV_ADMF_HMAINT flag (set from stats socket fqdn).
120 */
121 srv_admin_state &= ~SRV_ADMF_IDRAIN & ~SRV_ADMF_IMAINT & ~SRV_ADMF_HMAINT & ~SRV_ADMF_RMAINT;
122
123 if ((p == params[2]) || errno == EINVAL || errno == ERANGE ||
124 (srv_admin_state != 0 &&
125 srv_admin_state != SRV_ADMF_FMAINT &&
126 srv_admin_state != SRV_ADMF_CMAINT &&
127 srv_admin_state != (SRV_ADMF_CMAINT | SRV_ADMF_FMAINT) &&
128 srv_admin_state != (SRV_ADMF_CMAINT | SRV_ADMF_FDRAIN) &&
129 srv_admin_state != SRV_ADMF_FDRAIN)) {
130 chunk_appendf(msg, ", invalid srv_admin_state value '%s'", params[2]);
131 }
132
133 /* validating srv_uweight */
134 p = NULL;
135 errno = 0;
136 srv_uweight = strtol(params[3], &p, 10);
137 if ((p == params[3]) || errno == EINVAL || errno == ERANGE || (srv_uweight > SRV_UWGHT_MAX))
138 chunk_appendf(msg, ", invalid srv_uweight value '%s'", params[3]);
139
140 /* validating srv_iweight */
141 p = NULL;
142 errno = 0;
143 srv_iweight = strtol(params[4], &p, 10);
144 if ((p == params[4]) || errno == EINVAL || errno == ERANGE || (srv_iweight > SRV_UWGHT_MAX))
145 chunk_appendf(msg, ", invalid srv_iweight value '%s'", params[4]);
146
147 /* validating srv_last_time_change */
148 p = NULL;
149 errno = 0;
150 srv_last_time_change = strtol(params[5], &p, 10);
151 if ((p == params[5]) || errno == EINVAL || errno == ERANGE)
152 chunk_appendf(msg, ", invalid srv_last_time_change value '%s'", params[5]);
153
154 /* validating srv_check_status */
155 p = NULL;
156 errno = 0;
157 srv_check_status = strtol(params[6], &p, 10);
158 if (p == params[6] || errno == EINVAL || errno == ERANGE ||
159 (srv_check_status >= HCHK_STATUS_SIZE))
160 chunk_appendf(msg, ", invalid srv_check_status value '%s'", params[6]);
161
162 /* validating srv_check_result */
163 p = NULL;
164 errno = 0;
165 srv_check_result = strtol(params[7], &p, 10);
166 if ((p == params[7]) || errno == EINVAL || errno == ERANGE ||
167 (srv_check_result != CHK_RES_UNKNOWN &&
168 srv_check_result != CHK_RES_NEUTRAL &&
169 srv_check_result != CHK_RES_FAILED &&
170 srv_check_result != CHK_RES_PASSED &&
171 srv_check_result != CHK_RES_CONDPASS)) {
172 chunk_appendf(msg, ", invalid srv_check_result value '%s'", params[7]);
173 }
174
175 /* validating srv_check_health */
176 p = NULL;
177 errno = 0;
178 srv_check_health = strtol(params[8], &p, 10);
179 if (p == params[8] || errno == EINVAL || errno == ERANGE)
180 chunk_appendf(msg, ", invalid srv_check_health value '%s'", params[8]);
181
182 /* validating srv_check_state */
183 p = NULL;
184 errno = 0;
185 srv_check_state = strtol(params[9], &p, 10);
186 if (p == params[9] || errno == EINVAL || errno == ERANGE ||
187 (srv_check_state & ~(CHK_ST_INPROGRESS | CHK_ST_CONFIGURED | CHK_ST_ENABLED | CHK_ST_PAUSED | CHK_ST_AGENT)))
188 chunk_appendf(msg, ", invalid srv_check_state value '%s'", params[9]);
189
190 /* validating srv_agent_state */
191 p = NULL;
192 errno = 0;
193 srv_agent_state = strtol(params[10], &p, 10);
194 if (p == params[10] || errno == EINVAL || errno == ERANGE ||
195 (srv_agent_state & ~(CHK_ST_INPROGRESS | CHK_ST_CONFIGURED | CHK_ST_ENABLED | CHK_ST_PAUSED | CHK_ST_AGENT)))
196 chunk_appendf(msg, ", invalid srv_agent_state value '%s'", params[10]);
197
198 /* validating bk_f_forced_id */
199 p = NULL;
200 errno = 0;
201 bk_f_forced_id = strtol(params[11], &p, 10);
202 if (p == params[11] || errno == EINVAL || errno == ERANGE || !((bk_f_forced_id == 0) || (bk_f_forced_id == 1)))
203 chunk_appendf(msg, ", invalid bk_f_forced_id value '%s'", params[11]);
204
205 /* validating srv_f_forced_id */
206 p = NULL;
207 errno = 0;
208 srv_f_forced_id = strtol(params[12], &p, 10);
209 if (p == params[12] || errno == EINVAL || errno == ERANGE || !((srv_f_forced_id == 0) || (srv_f_forced_id == 1)))
210 chunk_appendf(msg, ", invalid srv_f_forced_id value '%s'", params[12]);
211
212 /* validating srv_fqdn */
213 fqdn = params[13];
214 if (fqdn && *fqdn == '-')
215 fqdn = NULL;
216 if (fqdn && (strlen(fqdn) > DNS_MAX_NAME_SIZE || invalid_domainchar(fqdn))) {
217 chunk_appendf(msg, ", invalid srv_fqdn value '%s'", params[13]);
218 fqdn = NULL;
219 }
220
221 port_st = params[14];
222 if (port_st) {
223 port_svc = strl2uic(port_st, strlen(port_st));
224 if (port_svc > USHRT_MAX) {
225 chunk_appendf(msg, ", invalid srv_port value '%s'", port_st);
226 port_st = NULL;
227 }
228 }
229
230 /* SRV record
231 * NOTE: in HAProxy, SRV records must start with an underscore '_'
232 */
233 srvrecord = params[15];
234 if (srvrecord && *srvrecord != '_')
235 srvrecord = NULL;
236
237 /* don't apply anything if one error has been detected */
238 if (msg->data)
239 goto out;
240 partial_apply = 1;
241
242 /* recover operational state and apply it to this server
243 * and all servers tracking this one */
244 srv->check.health = srv_check_health;
245 switch (srv_op_state) {
246 case SRV_ST_STOPPED:
247 srv->check.health = 0;
248 srv_set_stopped(srv, "changed from server-state after a reload", NULL);
249 break;
250 case SRV_ST_STARTING:
251 /* If rise == 1 there is no STARTING state, let's switch to
252 * RUNNING
253 */
254 if (srv->check.rise == 1) {
255 srv->check.health = srv->check.rise + srv->check.fall - 1;
256 srv_set_running(srv, "", NULL);
257 break;
258 }
259 if (srv->check.health < 1 || srv->check.health >= srv->check.rise)
260 srv->check.health = srv->check.rise - 1;
261 srv->next_state = srv_op_state;
262 break;
263 case SRV_ST_STOPPING:
264 /* If fall == 1 there is no STOPPING state, let's switch to
265 * STOPPED
266 */
267 if (srv->check.fall == 1) {
268 srv->check.health = 0;
269 srv_set_stopped(srv, "changed from server-state after a reload", NULL);
270 break;
271 }
272 if (srv->check.health < srv->check.rise ||
273 srv->check.health > srv->check.rise + srv->check.fall - 2)
274 srv->check.health = srv->check.rise;
275 srv_set_stopping(srv, "changed from server-state after a reload", NULL);
276 break;
277 case SRV_ST_RUNNING:
278 srv->check.health = srv->check.rise + srv->check.fall - 1;
279 srv_set_running(srv, "", NULL);
280 break;
281 }
282
283 /* When applying server state, the following rules apply:
284 * - in case of a configuration change, we apply the setting from the new
285 * configuration, regardless of old running state
286 * - if no configuration change, we apply old running state only if old running
287 * state is different from new configuration state
288 */
289 /* configuration has changed */
290 if ((srv_admin_state & SRV_ADMF_CMAINT) != (srv->next_admin & SRV_ADMF_CMAINT)) {
291 if (srv->next_admin & SRV_ADMF_CMAINT)
292 srv_adm_set_maint(srv);
293 else
294 srv_adm_set_ready(srv);
295 }
296 /* configuration is the same, let's compate old running state and new conf state */
297 else {
298 if (srv_admin_state & SRV_ADMF_FMAINT && !(srv->next_admin & SRV_ADMF_CMAINT))
299 srv_adm_set_maint(srv);
300 else if (!(srv_admin_state & SRV_ADMF_FMAINT) && (srv->next_admin & SRV_ADMF_CMAINT))
301 srv_adm_set_ready(srv);
302 }
303 /* apply drain mode if server is currently enabled */
304 if (!(srv->next_admin & SRV_ADMF_FMAINT) && (srv_admin_state & SRV_ADMF_FDRAIN)) {
305 /* The SRV_ADMF_FDRAIN flag is inherited when srv->iweight is 0
306 * (srv->iweight is the weight set up in configuration).
307 * There are two possible reasons for FDRAIN to have been present :
308 * - previous config weight was zero
309 * - "set server b/s drain" was sent to the CLI
310 *
311 * In the first case, we simply want to drop this drain state
312 * if the new weight is not zero anymore, meaning the administrator
313 * has intentionally turned the weight back to a positive value to
314 * enable the server again after an operation. In the second case,
315 * the drain state was forced on the CLI regardless of the config's
316 * weight so we don't want a change to the config weight to lose this
317 * status. What this means is :
318 * - if previous weight was 0 and new one is >0, drop the DRAIN state.
319 * - if the previous weight was >0, keep it.
320 */
321 if (srv_iweight > 0 || srv->iweight == 0)
322 srv_adm_set_drain(srv);
323 }
324
325 srv->last_change = date.tv_sec - srv_last_time_change;
326 srv->check.status = srv_check_status;
327 srv->check.result = srv_check_result;
328
329 /* Only case we want to apply is removing ENABLED flag which could have been
330 * done by the "disable health" command over the stats socket
331 */
332 if ((srv->check.state & CHK_ST_CONFIGURED) &&
333 (srv_check_state & CHK_ST_CONFIGURED) &&
334 !(srv_check_state & CHK_ST_ENABLED))
335 srv->check.state &= ~CHK_ST_ENABLED;
336
337 /* Only case we want to apply is removing ENABLED flag which could have been
338 * done by the "disable agent" command over the stats socket
339 */
340 if ((srv->agent.state & CHK_ST_CONFIGURED) &&
341 (srv_agent_state & CHK_ST_CONFIGURED) &&
342 !(srv_agent_state & CHK_ST_ENABLED))
343 srv->agent.state &= ~CHK_ST_ENABLED;
344
345 /* We want to apply the previous 'running' weight (srv_uweight) only if there
346 * was no change in the configuration: both previous and new iweight are equals
347 *
348 * It means that a configuration file change has precedence over a unix socket change
349 * for server's weight
350 *
351 * by default, HAProxy applies the following weight when parsing the configuration
352 * srv->uweight = srv->iweight
353 */
354 if (srv_iweight == srv->iweight) {
355 srv->uweight = srv_uweight;
356 }
357 server_recalc_eweight(srv, 1);
358
359 /* load server IP address */
360 if (strcmp(params[0], "-") != 0)
361 srv->lastaddr = strdup(params[0]);
362
363 if (fqdn && srv->hostname) {
364 if (strcmp(srv->hostname, fqdn) == 0) {
365 /* Here we reset the 'set from stats socket FQDN' flag
366 * to support such transitions:
367 * Let's say initial FQDN value is foo1 (in configuration file).
368 * - FQDN changed from stats socket, from foo1 to foo2 value,
369 * - FQDN changed again from file configuration (with the same previous value
370 set from stats socket, from foo1 to foo2 value),
371 * - reload for any other reason than a FQDN modification,
372 * the configuration file FQDN matches the fqdn server state file value.
373 * So we must reset the 'set from stats socket FQDN' flag to be consistent with
374 * any further FQDN modification.
375 */
376 srv->next_admin &= ~SRV_ADMF_HMAINT;
377 }
378 else {
379 /* If the FDQN has been changed from stats socket,
380 * apply fqdn state file value (which is the value set
381 * from stats socket).
382 * Also ensure the runtime resolver will process this resolution.
383 */
384 if (fqdn_set_by_cli) {
385 srv_set_fqdn(srv, fqdn, 0);
386 srv->flags &= ~SRV_F_NO_RESOLUTION;
387 srv->next_admin |= SRV_ADMF_HMAINT;
388 }
389 }
390 }
391 /* If all the conditions below are validated, this means
392 * we're evaluating a server managed by SRV resolution
393 */
394 else if (fqdn && !srv->hostname && srvrecord) {
395 int res;
Emeric Brun0c4a8a32021-06-11 10:48:45 +0200396 int i;
397 char *tmp;
Christopher Faulet3e3d3be2021-02-16 13:31:30 +0100398
399 /* we can't apply previous state if SRV record has changed */
400 if (srv->srvrq && strcmp(srv->srvrq->name, srvrecord) != 0) {
401 chunk_appendf(msg, ", SRV record mismatch between configuration ('%s') and state file ('%s) for server '%s'. Previous state not applied", srv->srvrq->name, srvrecord, srv->id);
402 goto out;
403 }
404
405 /* create or find a SRV resolution for this srv record */
406 if (srv->srvrq == NULL && (srv->srvrq = find_srvrq_by_name(srvrecord, srv->proxy)) == NULL)
407 srv->srvrq = new_resolv_srvrq(srv, srvrecord);
408 if (srv->srvrq == NULL) {
409 chunk_appendf(msg, ", can't create or find SRV resolution '%s' for server '%s'", srvrecord, srv->id);
410 goto out;
411 }
412
413 /* prepare DNS resolution for this server */
414 res = srv_prepare_for_resolution(srv, fqdn);
415 if (res == -1) {
416 chunk_appendf(msg, ", can't allocate memory for DNS resolution for server '%s'", srv->id);
417 goto out;
418 }
419
Emeric Brun0c4a8a32021-06-11 10:48:45 +0200420 /* Remove from available list and insert in tree
421 * since this server has an hostname
422 */
423 LIST_DEL_INIT(&srv->srv_rec_item);
424 srv->host_dn.key = tmp = strdup(srv->hostname_dn);
425
426 /* convert the key in lowercase because tree
427 * lookup is case sensitive but we don't care
428 */
429 for (i = 0; tmp[i]; i++)
430 tmp[i] = tolower(tmp[i]);
431
432 /* insert in tree */
433 ebis_insert(&srv->srvrq->named_servers, &srv->host_dn);
434
Christopher Faulet3e3d3be2021-02-16 13:31:30 +0100435 /* Unset SRV_F_MAPPORTS for SRV records.
436 * SRV_F_MAPPORTS is unfortunately set by parse_server()
437 * because no ports are provided in the configuration file.
438 * This is because HAProxy will use the port found into the SRV record.
439 */
440 srv->flags &= ~SRV_F_MAPPORTS;
441 }
442
443 if (port_st)
444 srv->svc_port = port_svc;
445
446
447 if (params[16]) {
448#ifdef USE_OPENSSL
449 use_ssl = strtol(params[16], &p, 10);
450
451 /* configure ssl if connection has been initiated at startup */
452 if (srv->ssl_ctx.ctx != NULL)
453 ssl_sock_set_srv(srv, use_ssl);
454#endif
455 }
456
457 port_st = NULL;
458 if (params[17] && strcmp(params[17], "0") != 0)
459 port_st = params[17];
460 addr = NULL;
461 if (params[18] && strcmp(params[18], "-") != 0)
462 addr = params[18];
463 if (addr || port_st) {
464 warning = srv_update_check_addr_port(srv, addr, port_st);
465 if (warning) {
466 chunk_appendf(msg, ", %s", warning);
467 goto out;
468 }
469 }
470
471 port_st = NULL;
472 if (params[20] && strcmp(params[20], "0") != 0)
473 port_st = params[20];
474 addr = NULL;
475 if (params[19] && strcmp(params[19], "-") != 0)
476 addr = params[19];
477 if (addr || port_st) {
478 warning = srv_update_agent_addr_port(srv, addr, port_st);
479 if (warning) {
480 chunk_appendf(msg, ", %s", warning);
481 goto out;
482 }
483 }
484
485 out:
486 HA_SPIN_UNLOCK(SERVER_LOCK, &srv->lock);
487 if (msg->data) {
488 if (partial_apply == 1)
489 ha_warning("server-state partially applied for server '%s/%s'%s\n",
490 srv->proxy->id, srv->id, msg->area);
491 else
492 ha_warning("server-state application failed for server '%s/%s'%s\n",
493 srv->proxy->id, srv->id, msg->area);
494 }
495 end:
496 free_trash_chunk(msg);
497}
498
499/*
500 * Loop on the proxy's servers and try to load its state from <st_tree> using
501 * srv_state_srv_update(). The proxy name and the server name are concatenated
502 * to form the key. If found the entry is removed from the tree.
503 */
504static void srv_state_px_update(const struct proxy *px, int vsn, struct eb_root *st_tree)
505{
506 struct server_state_line *st_line;
507 struct eb64_node *node;
508 struct server *srv;
509 unsigned long key;
510
511 for (srv = px->srv; srv; srv = srv->next) {
512 chunk_printf(&trash, "%s %s", px->id, srv->id);
513 key = XXH3(trash.area, trash.data, 0);
514 node = eb64_lookup(st_tree, key);
515 if (!node)
516 continue; /* next server */
517 st_line = eb64_entry(node, typeof(*st_line), node);
518 srv_state_srv_update(srv, vsn, st_line->params+4);
519
520 /* the node may be released now */
521 eb64_delete(node);
522 free(st_line->line);
523 free(st_line);
524 }
525}
526
527/*
528 * read next line from file <f> and return the server state version if one found.
529 * If no version is found, then 0 is returned
530 * Note that this should be the first read on <f>
531 */
532static int srv_state_get_version(FILE *f) {
533 char mybuf[SRV_STATE_LINE_MAXLEN];
534 char *endptr;
535 long int vsn;
536
537 /* first character of first line of the file must contain the version of the export */
538 if (fgets(mybuf, SRV_STATE_LINE_MAXLEN, f) == NULL)
539 return 0;
540
541 vsn = strtol(mybuf, &endptr, 10);
542 if (endptr == mybuf || *endptr != '\n') {
543 /* Empty or truncated line */
544 return 0;
545 }
546
547 if (vsn < SRV_STATE_FILE_VERSION_MIN || vsn > SRV_STATE_FILE_VERSION_MAX) {
548 /* Wrong version number */
549 return 0;
550 }
551
552 return vsn;
553}
554
555
556/*
557 * parses server state line stored in <buf> and supposedly in version <version>.
558 * Set <params> accordingly on success. It returns 1 on success, 0 if the line
559 * must be ignored and -1 on error.
560 * The caller must provide a supported version
561 */
562static int srv_state_parse_line(char *buf, const int version, char **params)
563{
564 int buflen, arg, ret;
565 char *cur;
566
567 buflen = strlen(buf);
568 cur = buf;
569 ret = 1; /* be optimistic and pretend a success */
570
571 /* we need at least one character and a non-truncated line */
572 if (buflen == 0 || buf[buflen - 1] != '\n') {
573 ret = -1;
574 goto out;
575 }
576
577 /* skip blank characters at the beginning of the line */
578 while (isblank((unsigned char)*cur))
579 ++cur;
580
581 /* ignore empty or commented lines */
582 if (!*cur || *cur == '\n' || *cur == '#') {
583 ret = 0;
584 goto out;
585 }
586
587 /* Removes trailing '\n' to ease parsing */
588 buf[buflen - 1] = '\0';
589
590 /* we're now ready to move the line into <params> */
591 memset(params, 0, SRV_STATE_FILE_MAX_FIELDS * sizeof(*params));
592 arg = 0;
593 while (*cur) {
594 /* first of all, stop if there are too many fields */
595 if (arg >= SRV_STATE_FILE_MAX_FIELDS)
596 break;
597
598 /* then skip leading spaces */
599 while (*cur && isblank((unsigned char)*cur)) {
600 ++cur;
601 if (!*cur)
602 break;
603 }
604
605 /*
606 * idx:
607 * be_id: params[0]
608 * be_name: params[1]
609 * srv_id: params[2]
610 * srv_name: params[3]
611 * v1
612 * srv_addr: params[4]
613 * srv_op_state: params[5]
614 * srv_admin_state: params[6]
615 * srv_uweight: params[7]
616 * srv_iweight: params[8]
617 * srv_last_time_change: params[9]
618 * srv_check_status: params[10]
619 * srv_check_result: params[11]
620 * srv_check_health: params[12]
621 * srv_check_state: params[13]
622 * srv_agent_state: params[14]
623 * bk_f_forced_id: params[15]
624 * srv_f_forced_id: params[16]
625 * srv_fqdn: params[17]
626 * srv_port: params[18]
627 * srvrecord: params[19]
628 *
629 * srv_use_ssl: params[20] (optional field)
630 * srv_check_port: params[21] (optional field)
631 * srv_check_addr: params[22] (optional field)
632 * srv_agent_addr: params[23] (optional field)
633 * srv_agent_port: params[24] (optional field)
634 *
635 */
636 params[arg++] = cur;
637
638 /* look for the end of the current field */
639 while (*cur && !isblank((unsigned char)*cur)) {
640 ++cur;
641 if (!*cur)
642 break;
643 }
644
645 /* otherwise, cut the field and move to the next one */
646 *cur++ = '\0';
647 }
648
649 /* if the number of fields does not match the version, then return an error */
650 if (version == 1 &&
651 (arg < SRV_STATE_FILE_MIN_FIELDS_VERSION_1 ||
652 arg > SRV_STATE_FILE_MAX_FIELDS_VERSION_1))
653 ret = -1;
654
655 out:
656 return ret;
657}
658
659
660/*
661 * parses a server state line using srv_state_parse_line() and store the result
662 * in <st_tree>. If an error occurred during the parsing, the line is
663 * ignored. if <px> is defined, it is used to check the backend id/name against
664 * the parsed params and to compute the key of the line.
665 */
666static int srv_state_parse_and_store_line(char *line, int vsn, struct eb_root *st_tree,
667 struct proxy *px)
668{
669 struct server_state_line *st_line;
670 int ret = 0;
671
672 /* store line in tree and duplicate the line */
673 st_line = calloc(1, sizeof(*st_line));
674 if (st_line == NULL)
675 goto skip_line;
676 st_line->line = strdup(line);
677 if (st_line->line == NULL)
678 goto skip_line;
679
680 ret = srv_state_parse_line(st_line->line, vsn, st_line->params);
681 if (ret <= 0)
682 goto skip_line;
683
684 /* Check backend name against params if <px> is defined */
685 if (px) {
686 int check_id = (atoi(st_line->params[0]) == px->uuid);
687 int check_name = (strcmp(px->id, st_line->params[1]) == 0);
688 int bk_f_forced_id = (atoi(st_line->params[15]) & PR_O_FORCED_ID);
689
690
691 if (!check_id && !check_name) {
692 /* backend does not match at all: skip the line */
693 goto skip_line;
694 }
695 else if (!check_id) {
696 /* Id mismatch: warn but continue */
697 ha_warning("Proxy '%s': backend ID mismatch: from server state file: '%s', from running config '%d'\n",
698 px->id, st_line->params[0], px->uuid);
699 send_log(px, LOG_NOTICE, "backend ID mismatch: from server state file: '%s', from running config '%d'\n",
700 st_line->params[0], px->uuid);
701 }
702 else if (!check_name) {
703 /* Name mismatch: warn and skip the line, except if the backend id was forced
704 * in the previous configuration */
705 ha_warning("Proxy '%s': backend name mismatch: from server state file: '%s', from running config '%s'\n",
706 px->id, st_line->params[1], px->id);
707 send_log(px, LOG_NOTICE, "backend name mismatch: from server state file: '%s', from running config '%s'\n",
708 st_line->params[1], px->id);
709 if (!bk_f_forced_id)
710 goto skip_line;
711 }
712 }
713
714 /*
715 * The key: "be_name srv_name"
716 * if <px> is defined: be_name == px->id
717 * otherwise: be_name == params[1]
718 */
719 chunk_printf(&trash, "%s %s", (px ? px->id : st_line->params[1]), st_line->params[3]);
720 st_line->node.key = XXH3(trash.area, trash.data, 0);
721 if (eb64_insert(st_tree, &st_line->node) != &st_line->node) {
722 /* this is a duplicate key, probably a hand-crafted file, drop it! */
723 goto skip_line;
724 }
725
726 return ret;
727
728 skip_line:
729 /* free up memory in case of error during the processing of the line */
730 if (st_line) {
731 free(st_line->line);
732 free(st_line);
733 }
734 return ret;
735}
736
737/* Helper function to get the server-state file path.
738 * If <filename> starts with a '/', it is considered as an absolute path. In
739 * this case or if <global.server_state_base> is not set, <filename> only is
740 * considered. Otherwise, the <global.server_state_base> is concatenated to
741 * <filename> to produce the file path and copied to <dst_path>. in both cases,
742 * the result must not exceeds <maxpathlen>.
743 *
744 * The len is returned on success or -1 if the path is too long. On error, the
745 * caller must not rely on <dst_path>.
746 */
747static inline int srv_state_get_filepath(char *dst_path, int maxpathlen, const char *filename)
748{
Willy Tarreau6d4173e2021-03-12 13:57:19 +0100749 char *sep;
Christopher Faulet3e3d3be2021-02-16 13:31:30 +0100750 int len = 0;
751
752 /* create the globalfilepath variable */
753 if (*filename == '/' || !global.server_state_base) {
754 /* absolute path or no base directory provided */
Willy Tarreau47a30c42021-03-12 14:09:10 +0100755 len = strlcpy2(dst_path, filename, maxpathlen);
Christopher Faulet3e3d3be2021-02-16 13:31:30 +0100756 }
757 else {
758 /* concat base directory and global server-state file */
Willy Tarreau6d4173e2021-03-12 13:57:19 +0100759 sep = (global.server_state_base[strlen(global.server_state_base)-1] != '/' ? "/": "");
Christopher Faulet3e3d3be2021-02-16 13:31:30 +0100760 len = snprintf(dst_path, maxpathlen, "%s%s%s", global.server_state_base, sep, filename);
761 }
762 return (len < maxpathlen ? len: -1);
763}
764
765
766/* This function parses all the proxies and only take care of the backends (since we're looking for server)
767 * For each proxy, it does the following:
768 * - opens its server state file (either one or local one)
769 * - read whole file, line by line
770 * - analyse each line to check if it matches our current backend:
771 * - backend name matches
772 * - backend id matches if id is forced and name doesn't match
773 * - if the server pointed by the line is found, then state is applied
774 *
775 * If the running backend uuid or id differs from the state file, then HAProxy reports
776 * a warning.
777 *
778 * Grabs the server's lock via srv_state_srv_update().
779 */
780void apply_server_state(void)
781{
782 /* tree where global state_file is loaded */
783 struct eb_root global_state_tree = EB_ROOT_UNIQUE;
784 struct proxy *curproxy;
785 struct server_state_line *st_line;
786 struct eb64_node *node, *next_node;
787 FILE *f;
788 char mybuf[SRV_STATE_LINE_MAXLEN];
789 char file[MAXPATHLEN];
790 int local_vsn, global_vsn, len, linenum;
791
792 global_vsn = 0; /* no global file */
793 if (!global.server_state_file)
794 goto no_globalfile;
795 len = srv_state_get_filepath(file, MAXPATHLEN, global.server_state_file);
796 if (len == -1) {
797 ha_warning("config: Can't load global server state file: file too long.\n");
798 goto no_globalfile;
799 }
800
801 /* Load global server state in a tree */
802 errno = 0;
803 f = fopen(file, "r");
804 if (!f) {
805 ha_warning("config: Can't open global server state file '%s': %s\n", file, strerror(errno));
806 goto no_globalfile;
807 }
808
809 global_vsn = srv_state_get_version(f);
810 if (global_vsn == 0) {
811 ha_warning("config: Can't get version of the global server state file '%s'.\n",
812 file);
813 goto close_globalfile;
814 }
815
816 for (linenum = 1; fgets(mybuf, SRV_STATE_LINE_MAXLEN, f); linenum++) {
817 int ret;
818
819 ret = srv_state_parse_and_store_line(mybuf, global_vsn, &global_state_tree, NULL);
820 if (ret == -1) {
821 ha_warning("config: corrupted global server state file '%s' at line %d.\n",
822 file, linenum);
823 global_vsn = 0;
824 break;
825 }
826 }
827
828 close_globalfile:
829 fclose(f);
830
831 no_globalfile:
832 /* parse all proxies and load states form tree (global file) or from local file */
833 for (curproxy = proxies_list; curproxy != NULL; curproxy = curproxy->next) {
834 struct eb_root local_state_tree = EB_ROOT_UNIQUE;
835
Christopher Faulet6f691102021-03-04 16:35:26 +0100836 /* Must be an enabled backend with at least a server */
837 if (!(curproxy->cap & PR_CAP_BE) || curproxy->disabled || !curproxy->srv)
Christopher Faulet3e3d3be2021-02-16 13:31:30 +0100838 continue; /* next proxy */
839
Christopher Faulet6f691102021-03-04 16:35:26 +0100840 /* Mode must be specified */
841 BUG_ON(curproxy->load_server_state_from_file == PR_SRV_STATE_FILE_UNSPEC);
842
Christopher Faulet3e3d3be2021-02-16 13:31:30 +0100843 /* No server-state file for this proxy */
844 if (curproxy->load_server_state_from_file == PR_SRV_STATE_FILE_NONE)
845 continue; /* next proxy */
846
847 if (curproxy->load_server_state_from_file == PR_SRV_STATE_FILE_GLOBAL) {
848 /* when global file is used, we get data from the tree
849 * Note that in such case we don't check backend name neither uuid.
850 * Backend name can't be wrong since it's used as a key to retrieve the server state
851 * line from the tree.
852 */
853 if (global_vsn)
854 srv_state_px_update(curproxy, global_vsn, &global_state_tree);
855 continue; /* next proxy */
856 }
857
858 /*
859 * Here we load a local server state-file
860 */
861
862 /* create file variable */
863 len = srv_state_get_filepath(file, MAXPATHLEN, curproxy->server_state_file_name);
864 if (len == -1) {
865 ha_warning("Proxy '%s': Can't load local server state file: file too long.\n", curproxy->id);
866 continue; /* next proxy */
867 }
868
869 /* Load local server state in a tree */
870 errno = 0;
871 f = fopen(file, "r");
872 if (!f) {
873 ha_warning("Proxy '%s': Can't open server state file '%s': %s.\n",
874 curproxy->id, file, strerror(errno));
875 continue; /* next proxy */
876 }
877
878 /* first character of first line of the file must contain the version of the export */
879 local_vsn = srv_state_get_version(f);
880 if (local_vsn == 0) {
881 ha_warning("Proxy '%s': Can't get version of the server state file '%s'.\n",
882 curproxy->id, file);
883 goto close_localfile;
884 }
885
886 /* First, parse lines of the local server-state file and store them in a eb-tree */
887 for (linenum = 1; fgets(mybuf, SRV_STATE_LINE_MAXLEN, f); linenum++) {
888 int ret;
889
890 ret = srv_state_parse_and_store_line(mybuf, local_vsn, &local_state_tree, curproxy);
891 if (ret == -1) {
892 ha_warning("Proxy '%s': corrupted server state file '%s' at line %d.\n",
893 curproxy->id, file, linenum);
894 local_vsn = 0;
895 break;
896 }
897 }
898
899 if (local_vsn)
900 srv_state_px_update(curproxy, local_vsn, &local_state_tree);
901
Ilya Shipitsind7a988c2021-03-04 23:26:15 +0500902 /* Remove unused server-state lines */
Christopher Faulet3e3d3be2021-02-16 13:31:30 +0100903 node = eb64_first(&local_state_tree);
904 while (node) {
905 st_line = eb64_entry(node, typeof(*st_line), node);
906 next_node = eb64_next(node);
907 eb64_delete(node);
908
909 if (local_vsn) {
910 /* if no server found, then warn */
911 ha_warning("Proxy '%s': can't find server '%s' in backend '%s'\n",
912 curproxy->id, st_line->params[3], curproxy->id);
913 send_log(curproxy, LOG_NOTICE, "can't find server '%s' in backend '%s'\n",
914 st_line->params[3], curproxy->id);
915 }
916
917 free(st_line->line);
918 free(st_line);
919 node = next_node;
920 }
921
922 close_localfile:
923 fclose(f);
924 }
925
926 node = eb64_first(&global_state_tree);
927 while (node) {
928 st_line = eb64_entry(node, typeof(*st_line), node);
929 next_node = eb64_next(node);
930 eb64_delete(node);
931 free(st_line->line);
932 free(st_line);
933 node = next_node;
934 }
935}